Archived material Access restricted Article
Rantburg

Today's Front Page   View All of Wed 12/21/2005 View Tue 12/20/2005 View Mon 12/19/2005 View Sun 12/18/2005 View Sat 12/17/2005 View Fri 12/16/2005 View Thu 12/15/2005
1
2005-12-21 Home Front: WoT
Speculation on why the NSA wiretaps are different
Archived material is restricted to Rantburg regulars and members. If you need access email fred.pruitt=at=gmail.com with your nick to be added to the members list. There is no charge to join Rantburg as a member.
Posted by 3dc 2005-12-21 01:06|| || Front Page|| [1 views since 2007-05-07]  Top

#1 The article doesn't really say anything, but here is my rampant speculation.

They are data mining mobile phone calls. Mobile phones transmit over the airwaves so anyone with the right equipment can listen in. You start off with known patterns from captured terrorist's cellphones, then randomly sample calls looking for the same patterns. Once you get one that fits the pattern, you then listen in for that SIM and as more data comes in you progressively refine your hit list.

You could set up a listening station pretty much anywhere, but I guess embassies and consulates are probably being used. I assume the problem occurs when you sample calls made to or originating from the USA.
Posted by phil_b">phil_b  2005-12-21 02:03|| http://autonomousoperation.blogspot.com/]">[http://autonomousoperation.blogspot.com/]  2005-12-21 02:03|| Front Page Top

#2 WHY??? See "AMERICAN TALIBAN(S)" and Terrorists LAWFULLY RESIDING, LAWFULLY LEARNING, and LAWFULLY WORKING in the same countries they later attack, etc. See also ISLAMIC/ISLAMIST BOLSHEVIKS-MARXISTS-COMMUNISTS, aka Mohammendans-for-Marx/Stalin - you know, America only being attacked by Radical Muslims, NOT Muslims + COMMIES, on 9-11!? 'NUFF SAID.
Posted by JosephMendiola 2005-12-21 03:14||   2005-12-21 03:14|| Front Page Top

#3 Joe, I'm one of your defenders, but that seems to be a duplicate copy of an early post, which is a NoNo here.

Don't abuse our tolerance for colorful expression.
Posted by phil_b">phil_b  2005-12-21 05:46|| http://autonomousoperation.blogspot.com/]">[http://autonomousoperation.blogspot.com/]  2005-12-21 05:46|| Front Page Top

#4 From their writing on this subject it seems that the left, including the MSM, are at a big disadvantage in this area, because 1) very few of them have ever had clearances, and 2) they seem to be technically clueless.

There are technical problems with FISA that make it obsolete, and it should be revised. But I imagine it would be difficult to craft specific language for a law without giving away technical details.
Posted by HV 2005-12-21 06:52||   2005-12-21 06:52|| Front Page Top

#5 They could also be building a network of numbers called, land or wireless, from each known terr phone number. Then, without any human intervention, tapping automatically, the numbers called under certain conditions, frequency called, number of other terr numbers calling too, etc. They could be tapping to build their netwoek of numbers called or received as well as conversations. Just looking at frequency of calls to/from would give a good idea of the network. Given the number of PCs and cell phones we've captured, it should not be hard to get such a program started with a large batch of probable terr numbers. A whole new maening to "reach out and touch someone".
Posted by Uninemble Uninter4828 2005-12-21 08:24||   2005-12-21 08:24|| Front Page Top

#6 Im with the Data minning thing I remember right after 9-11 alot of intel was found that could have put 2+2 together but the analyst were swamped so they wanted a key word program data minner to work as a dog for the analyst letting them only analize the relevant important stuff. In such a case the gov couldnt tell without giving away the edge yet at the same time the privacy would be held unless of course you were using the key words and getting yourself on the analyst desk otherwise you would just be a number in a computer no analyst. Of course this system has room for abuse like changing the key words to something like what the Chineese use but what military weapon and especially intel tool dont have potential for abuse, you just got to trust the gov somewhat and at least go at it from a innocent until proven guilty standing.

Ohhh and those cell phone taps are actaully the NSA ability to tap all signals shot through satalites which means all cell phones international calls and nowadays the bulk of even the land line calls and most if not near all long distance, those knock off companies usually bring signals to thier station then bounce over sats then on.

The bad part if I am right is that we are going to hear about taps on all sorts of people even though the question would be how many were analized?

No matter what the outcome these constant leaks must be plugged and the culprits procecuted to the point of scareing future leakers off. In WW2 we had "loose lips sink ships" signs and commercials in this war it aint ships its civilians and soldgiers who are sunk.
Posted by C-Low 2005-12-21 12:27||   2005-12-21 12:27|| Front Page Top

00:05 DeltaJuliet
00:00 Paul Moloney
23:18 Captain America
23:07 Classical_Liberal
23:07 Besoeker
23:02 twobyfour
23:01 Skidmark
22:53 Rafael
22:48 Skidmark
22:47 Glenmore
22:46 Old Marine
22:45 Skidmark
22:41 DMFD
22:37 Danking70
22:35 mjslack
22:34 Barbara Skolaut
22:28 jules 2
22:28 trailing wife
22:19 49 pan
22:13 Thomosh Gravinter9151
22:08 mhw
21:38 Bobby
21:34 Besoeker
21:26 Rafael









Paypal:
Google
Search WWW Search rantburg.com