Beyond the Cusp

March 23, 2017

Was Andrew Napolitano Correct?

 

Was Andrew Napolitano Correct when on “Fox & Friends” he claimed that British intelligence officials had helped former President Barack Obama spy on Donald Trump? We know one thing, he was definitely wrong to have said so without having run the idea past Fox News’s law department, the “Fox & Friends” show’s writers, any managers related to both the “Fox & Friends” show and those responsible for Judge Napolitano and perhaps anyone else he could have found even to include the people behind each of the three cameras shooting the show and perhaps the microphone grip just for good measure. Apparently he also needed to include our friends, the British, into the mix of the Trump accusation his phones in Trump Tower were tapped by the Obama Administration. Of course any allegation which includes the Russians with the election victory by Donald Trump is perfectly within bounds as with the Russian allegations the target is President Trump and with Judge Napolitano’s British accusation the target is President Obama. The difference is more than obvious, it is also very revealing. In American media, even the presumed conservative darling Fox News, any accusation against President Trump can spread guilt to any target and still be acceptable while accusations against President Obama may not apply guilt to other targets because expressing potential for guilt of President Obama is what was not permissible and thus also the British. But perhaps delving deeper might be an interesting exercise and be quite revealing.

 

Judge Andrew Napolitano

Judge Andrew Napolitano

 

We need to go back to the era of PRISM or before that Echelon as well as whatever the code name was back to the mid-1950’s which was finally revealed to the public in the mid-2000’s and was simply the latest data gathering system used by the National Security Agency (NSA) in coordination with the data collection abilities of the other Anglo-nations, Great Britain, Canada, Australia and New Zealand with the United States in order to be capable of collecting, through coordination, the maximized capabilities of their systems. Their coordinating their systems meant that they could prevent duplicating each other’s efforts. In order to guarantee that each nation would still have access to whatever data they needed there was an agreement. The initial agreement was called the UKUSA Agreement, or the United Kingdom – United States of America Agreement. The actual agreement upon full ratification included all the Anglo-nations mentioned above. This agreement also permitted each nation to have total access to the information of the other nations. Now as it was easiest for each member nation to collect complete and total accumulation and compilation of their own population’s data, each nation was assigned with the collection of all electronic communication including phones of all varieties, internet, wireless and any other variety of communication which lent to interception. Obviously ground mail was still safe from this collection processes though e-mail was not and was also collected along with all else.

 

The fact that each nation in the group, the United States, Great Britain, New Zealand, Australia and Canada all have laws which do not permit spying on their own citizens without first having a judge issue a warrant; this made it such a tedious and limiting requirement that each country desired some means of getting around this nasty limitation. Unsurprisingly, leaks revealed that they found just the means by which to collect what was their hearts, and snooping, desires without the needless waste of finding some judge to issue a warrant, even after the The Foreign Intelligence Surveillance Act of 1978 (FISA) and the accompanying FISA Courts where warrants could be granted in complete and total secrecy. But what if your target was somebody who you did not believe that even a FISA Court would issue a warrant? Well, one could always resort to the “old school” method for such situations. The five nations which finally entered the UKUSA Agreement agreed that when any one deemed they required intercepting, read bugging, anyone of their own citizens, something universally illegal under several laws, they would simply request a surveillance report covering the individuals phone numbers, their internet e-mail address and internet entrance and other electronic identifiers using all the direct alpha-numeric identifiers such that no names were ever exchanged. The nation receiving the request would then query all five nations’ data collection systems and compile their report simply listing all communications by the target accounts and thus the individual of interest. This report was then presented to the nation unable to actually collect such information themselves legally without making legal requests at some level. This was the method, as we pointed out, back in the day. Now, all those out there who believe that this method of data acquisition has fallen by the wayside and is no longer accessible, raise your hands. Let’s see, OK George, put your hand down, not funny. So, we all believe that if somebody from the political, law enforcement, foreign intelligence collection group or domestic intelligence group desired to gain such information, they could simply contact somebody they could trust from one of the other nations and have all the information they might desire and all without anybody being all the wiser.

 

So, what is the most important concept behind all of this spy vs. spy scenario? Well, it has to be the part that nobody would be any the wiser. Would it be possible for somebody in the government, say the President, or more likely a subordinate, a trusted subordinate with contacts across a border in say New Zealand or perhaps Canada to gather a compiled report which includes all the communications, or simply phone conversations, from a specific set of alphanumerics representing a person of interest even daily? The obvious answer is an obvious “Yes” and all without anybody in either government actually believing anything untoward had taken place. Are such requests made currently? Probably, though nowhere near in the numbers which were likely back twenty or so years ago. Still, this polite gentlemen’s agreement was put in place for just the reason that listening to then candidate Trump’s phone calls was made to produce. Did President Obama actually order or just request such a report from the British? The truth is it is unlikely but did he actually mention that he was wondering what Trump was up to, very likely. Might an overeager subordinate have then issued such a request hoping to have something interesting he or she could then report to the President? You tell me and if you have a name and proof, that would be appreciated as well. We promise not to use such information, well, not without giving you the credit if you desire such as we would not desire taking the heat alone. What is obvious is that the scenario is not beyond possibility.

 

What must be added to this entire scenario is that the new NSA data collection systems currently are capable of collecting every single last piece of electronic data from the United States plus probably Europe and a select dozen additional nations just for fun without taxing their systems which are tied into world-wide communications networks at their sources. Further, when gathering data using the numerical address the actual target remains unidentified in almost every situation as numerical identifiers can be used which disguise the actual target from those collecting the data. Thus, simply using such identifiers one can draw up all the information from any identifier for any period simply by entering a query into the huge data storage complex outside Reno, Nevada. This could even be done directly out of virtually any office of a Congressperson and nothing untoward would ever be suspected. From the White House, well, that might raise some suspicions, but from any agency which is assigned to gather information, nobody would ever suspect anything. Even those who are responsible for guarding that all data acquisition is done all legal and above boards have so much to review that it is very possible that many requests get through never being reviewed as review is probably reserved for such demands made by courts and other persons having a purpose to request such reviews. This means that even had Trump had his file accessed, nobody is likely to have been the wiser and it is entirely possible that the old UKUSA Agreement system of scratch my back and I’ll scratch yours could have been used to make tracing all the more difficult. Whatever the actual situation, Judge Napolitano was hired to give commentary, his best assessments and legal advice. His commentary if presented as fact might have been a bit overly pretentious, but was not entirely out of line. If he presented it as theory, then it was within the assigned duties of a commentator. Whatever the situation proves forth, should the Judge need a part-time, non-paying position, we can always use another commentator here at BTC whose views might be appreciated by our readers and who would add to our broad views of what is, what may be and what we wish would be.

 

Beyond the Cusp

 

April 6, 2014

Are Privacy Rights Even Possible Today?

The United States Constitution stipulates a carefully constructed and balanced governance with opposing interests and powers separated and posed as checks against the usurpation of excessive power over time by any one branch, individual or small group of individuals. Still, the Founding Fathers were challenged by the representatives of the various states and the people to give stated recognition and formalized structure to the protections of the individual from the power and infringement by the government which resulted in the first ten amendments, the Bill of Rights. This set of Amendments placed defined limitations on the government and its related institutions as well as defined unabridged rights awarded the people by an authority which superseded the government and any individual, group, corporation or entity. Initially there were a dozen proposed Amendments which were to constitute the Bill of Rights but only ten survived the ratification process. The first of the two Amendments which were not ratified pertained to the number of representatives and the maximum number of citizens they would be permitted to represent all in a sliding scale that increased the ratio as the number of representatives in the House of Representatives is increased as the total passed each hundred. It is easier to read the proposal than explain, so, it reads, “After the first enumeration required by the first article of the Constitution, there shall be one Representative for every thirty thousand, until the number shall amount to one hundred, after which the proportion shall be so regulated by Congress, that there shall be not less than one hundred Representatives, nor less than one Representative for every forty thousand persons, until the number of Representatives shall amount to two hundred; after which the proportion shall be so regulated by Congress, that there shall not be less than two hundred Representatives, nor more than one Representative for every fifty thousand persons.” The other rejected Amendment concerned the rate of payment for members of the House of Representatives and read, “No law, varying the compensation for the services of the Senators and Representatives, shall take effect, until an election of Representatives shall have intervened.”

 

All that may be interesting but it also has as much relevance to the modern world as do those definitions for the number of citizens each House of Representatives member has in their districts as today that number is in excess of seven hundreds of thousands, not the tens of thousands as was originally thought to be a fair ratio. The idea of personal anonymity and the safeguarding of each person from excessive government intrusion and inspection were considered sacrosanct at the writing and founding of the United States. This was a unique concept whose origins were a recent concept then and now is either a concept that has never been addressed for much of the world and becoming a quaint and dated concept where it originated in the political parlors and by the political philosophers and thinkers leading up to the founding of the United States and the explosion of representative governance in Europe and America. The current debate has taken some twists and turns especially since the revelations introduced into the public conscience through the release of classified information by Edward Snowden about the extent of spying on individual citizens by the United States government. Of course his releases told of what many thought to be excessive intrusions by the NSA and other data gathering government agencies and were perceived as being something relatively new as such unprecedented ability for gathering data, especially electronic data, was thought to be a recently acquired ability for government. The reality is even more frightening than what was revealed by Mr. Snowden as the NSA has been capable of recording virtually every bit of electronic data generated in the United States since somewhere back in the 1970s. This ability has been supplemented and expanded repeatedly going through different names, one of the more memorable being the Echelon System used in the 1980 -90s which also was capable of recording huge amounts of data comparable to the total electronic data output of the United States. It is apparent that the NSA has increased their abilities in, at a minimum, direct correlation to the amount of electronic data capable of being produced by the United States, no small feat. Recent revelation have told of the United States actually recording every e-mail and electronic communication of any one nation in the world in addition to its abilities to monitor the United States electronic output and some have spoken of the ability to record to some extent and level all the electronic communications and generated data of the entire planet. What possibility for privacy remains when measured against such unfathomable abilities?

 

Those who specialize in knowing the extent and depth of the abilities to gather data on an individual often are quoted, though almost always as an anonymous source, telling of borderline or even absolutely mind-boggling abilities possessed by the government spying and law enforcement agencies. There have been cases claiming they have the ability to listen to a conversation in a closed room from as much as a quarter or half mile distant simply by pointing a specialized laser at a window pane and interpreting the changes in the vibration of the glass molecules as long as the window is not covered by a thick, sound dampening set of curtains. There are claims that they can locate people using thermal imaging through walls of almost any building. Many have heard that the spy satellites optics are capable of reading a newspaper that somebody is reading sitting on a park bench. The Soviet Union demanded that their government employees never carry any classified documents outside of buildings unless they were safely contained in a briefcase. Many of the tactics used in the biggest Hollywood films such as listening in on conversations from a distance utilizing parabolic microphones and other such routine spy thriller capabilities are likely outdated by the time we see them in movies. There was a recent report that some government agency was researching some form of determining through observable and easily collected data who would be most likely to commit crimes, what those crimes would be, whom they would target and when the crime would be committed with some degree of dependable accuracy. What is the obligation of the government if they are capable of predicting future criminal events in preventing any harm resulting from such acts and how close are we to replacing the precogs lying in a pool and seeing events referred to as precrimes as in the movie Minority Report except using instruments, computers and software programs to predict such possibilities. Between the abilities of governments for data collection, computing of metadata, and making accurate predictions and profiling individuals, what possibility does anybody have of escaping with even the slightest shred of privacy intact? And what can be done to prevent governments from misusing such data, and even more important, what limits should be placed on private companies when it comes to sharing personal data and forming profiles on individuals which can and are used in targeted advertising and other such abilities. And even if such limitations were to be incorporated into regulations or criminal codes, how would they even be enforced or even could they be enforced and if enforced, what other problems would result from government attempting to gather the proof of such crimes being committed? It becomes mind-boggling just playing out the ever-expanding web resulting from data collection and manipulation.

 

The final area that also is providing insights which may be an even bigger threat is in the area of AI, artificial intelligence. Google and Microsoft are working with the United States government and who knows who else to utilize the data they are able to collect using buying patterns and search terminology used when searching the internet and many other data inputs to formulate a program or set of programs that will be able to predict future trends and reason and think in a manner close to that of a human being. They claim such research is being used to better serve the public and to be able to design robots in the future that will be better enabled to interact with people. What threats to our privacy exist as a result of such research and is there any way we can protect ourselves from such intrusions? The result of everything we are experiencing and that are being reported is that there is no longer anything that even resembles the privacy that the Founding Fathers attempted to give the people guarantees would be held sacred by government. That is looking less and less likely with every revelation. Now the United States is implementing a healthcare system which will posit all the healthcare information into the computers of the IRS, Internal Revenue Service, the tax people. How much power will the government have when the IRS has complete records of your healthcare and your financial situation? How will government use such data and will the government now determine the level of healthcare a person will be entitled to be provided conditional on their financial worth to the society as a whole? This could easily enter an area which at its worst could result in some form of euthanasia and a form of means testing to qualify for healthcare treatments at the least. Thinking too long and too hard on the completeness of the government’s ability to gather every iota of personal information on each and every individual, especially realizing that each of us are potentially ourselves, and to utilize this data to predict our future actions and results of everything in our lives such that they can literally know before we ourselves are aware of what tomorrow holds for each of us and use this ability for nefarious purposes which will compromise every shred of our privacy and most know our most intimate thoughts before we even have them, can any government or person be trusted with such knowledge and the power it imparts. Some of the items which were restricted to the areas of futurist political science fiction such as in Orwell’s 1984 and Huxley’s Brave New World are now becoming within the grasp of government and companies making these stories warnings of what is coming soon to our worlds and it will make for many horrifying prognostications on what our lives will become. Power corrupts, absolute power corrupts absolutely and ultimate power corrupts beyond imagination and what is coming is beyond even that.

 

Beyond the Cusp

 

July 12, 2013

NSA Snooping Bothersome, How About the IRS?

Ever since Edward Snowden blew the lid off of the NSA Prism Program and the cataloguing virtually every single electronic signal worldwide, people have been in panic mode worrying over an overly intrusive government. The fact that the information readily available is that of trends and unless some trigger causes there to be suspicions about a particular person, the government would never actually listen to or read any of one’s personal catalogued information. This does not appear to have allayed many people’s fears and likely with a fair amount of good cause. The simple fact that this treasure trove of personal data and possibly inconvenient facts are in some gigantic storage site just waiting for somebody to decide to misuse these presumably secure files for whatever nefarious purpose their evil little heart’s desire is simply too much of a threat to allow people to maintain absolute sense of calm.

 

To those amongst us that knew about the predecessor to Prism which was called Echelon, we faced this fact back in the late 1980s or 1990s when that system was sufficiently powerful to record almost every electronic signal of the day. Running concurrent to Echelon was an agreement between the Anglo-nations of Australia, Canada, Britain and the United States that each nation would monitor the civilian information gathered through Echelon and should anything of interest be found then alert the nation where the suspected person resided. This allowed for domestic monitoring of each nations citizenry without running afoul of the laws against domestic spying by the intelligence agencies such as the CIA and NSA. No longer does the government feel it is necessary to go to such extents to avoid the regulations and laws which make spying within the borders by our intelligence agencies forbidden. Now they simply promise that the information they are collecting will simply be left unsifted beyond searching for suspicious patterns or other such traits trip set indicators. Of course we need not fear as we all can be assured that there are no people in government who might, without cause, actually sift through the personal information even if they have a friend who suspects his or her spouse may be having something undesired and would really appreciate knowing who he or she has been trading emails with? I mean, what could possibly go wrong when every phone conversation, email, instant message, web site visited, television show or movie watched, and purchase made is recorded and available to anybody within the Federal Government with the proper security clearance to peruse at their leisure?

 

Believe it or not, the invasion of privacy that Prism permits the Federal Government through the NSA is about to be dwarfed by the invasion of our medical privacy by an arm of the Federal Government which has already been proven to use their powers for nefarious and vindictive reasons when the IRS held up and demanded unnecessary details and information from conservative and pro-Israel organizations seeking tax exempt status. Starting with the advent of Obama Care the IRS will be charged with keeping the files of our entire medical histories. They will be able to profile every American for health problems and have influence over treatments that will be allowed to be made available. They will assess fees and make numerous health care decisions. Does having the IRS, who already holds every iota of your personal financial information, now be charged with your entire health care and medical history make you feel at all comfortable? Between the IRS and the NSA there will no longer be a single secret about your life that the government will not be privy to. I would be hard pressed to pick which I find more troublesome, the NSA with every byte and possibly bit of my electronic history or the IRS having every piece of my financial and health histories at their fingertips. And even if one could choose which is worse, you can depend on the fact that there will be sharing of this information between the two agencies whenever anybody’s name becomes one of those “names of interest”, whatever that may come to mean.

 

How much longer before we will all find ourselves being careful not to allow too much emotion to show as such discretions might raise the suspicions of some government minder who would then file your name as a person of interest which would start a full review of your files to decide if your show of emotion was out of sorts requiring further investigation and monitoring or simply some understandable reaction to a recent event. We must also remember the networking by numerous municipalities of all the city’s public and private security cameras tied to facial recognition software, and more are joining this list every month. And just to make an obvious prediction, the government at all levels will very soon be able to track your vehicle on every trip it makes. This will come into play once sufficient numbers of people drive vehicles which use little or no petroleum fuels. This will cause the government to tax your vehicular mileage which will require every vehicle to be fitted with an electronic identifier with GPS route and distance tracking for the purpose of collecting revenue. Such would never be utilized by the government to discover who belongs to the gun club or regularly drive to TEA Party events or other places of particular interest. Some people will tell you the government already has this ability to track movements of anybody by following their cellphone. The answer to that is sometimes let your cellphone stay home while you clandestinely go to your destination assured of arriving under complete secrecy. Privacy? We don’t need no individual privacy.

 

Beyond the Cusp

 

Next Page »

Blog at WordPress.com.

%d bloggers like this: