Skip to main content

Three hops between you and the Gulag

The motivation that the NSA uses to justify its data trawling is rather disturbing.

In testimony on 18 July 2013 before the House Judiciary Committee, National Security Agency Deputy Director Chris Inglis said that the NSA’s probing of data in search of terrorist activity extendedtwo to three hopsaway from suspected terrorists. Previously, NSA leaders had said surveillance was limited to only two “hops” from a suspect.

What do they Record?

The NSA records *everything*:  Metadata, Email, Chat and Voice.  They only ever talk about metadata.  The rest of their activities are cloaked in weasel words.  For example, the chief of the NSA insists that they only analyze meta data and if it proves interesting, then they will get an order to retrieve a phone call.  He is a weasel word expert - the best - that is why he got the job.

They can only retrieve the phone call if it was already recorded.  An example is the phone call analysis of the wife of the Boston Marathon bomber, which was retrieved for analysis weeks after the last faint echoes of her voice faded away into the ether.  So obviously they must be recording everything in real time.  

Cyber Stalking

New documents that were released in October 2013 showed that the NSA was actively tapping the phone calls of dozens of world leaders.  This is getting really sordid and looks like General Alexander "cyber stalking" the President of Brazil and the Chancellor of Germany.

From Gulfnews
Of course the general is being set up as the fall guy and he already tendered his resignation effective next year, but the real culprits were the congressmen who approved the Patriot Act.  The general was just doing his job, but he should have known better - he is a grown up after all.

How much is 3 hops?

Consider that most of the readers are techo geeks and not travelling salesmen, lets say that you dear reader, talk to about 500 people.  So, Hop One will be about the number of people in a typical High School.  Now think about how many dope heads and rugby players that circle may include.

Hop 2 gets interesting at about 500 x 500 = 250,000 people.  A fair number.  About the number of people in a small prairy town in North America.  That size town should include a 2000 bed prison, a 300 bed homeless shelter and at least one trailer park.

Once we get to Hop 3, all bets are off at 500 x 500 x 500 = 125, 000, 000

If we look at the CIA World Book, that number is larger than most European countries, larger than any one American state, or about four times the total population of Canada.

So what Mr Inglis in effect said, is that as soon as the NSA has a terr on the line, they will trawl through every active phone call in North America.

With a three hop search, you are guaranteed to be guilty by association to something - several somethings.  I can hear Senator McCarthy musing: "Mmmm, I see that a friend of your second cousin twice removed is a card carrying member of The Party... That is not good, Mr Smith...".

Bad Data

The problem with overly wide data trawling, is the amplified risk of errors, misinformation and false accusations.  In the UK, five people were falsely arrested due to bad computer information last year, 2012:  http://www.iocco-uk.info/docs/2012%20Annual%20Report%20of%20the%20Interception%20of%20Communications%20Commissioner%20WEB.pdf

Extrapolating from this single government report, we could infer 5 wrongful arrests in France, 5 in Germany, 1 in Canada and 15 in the USA.  Per year.  Every year.  Do you want to have your life ruined by bad computer data?

The data analysis problem faced by the NSA is similar to issues the medical profession faces where a cancer screening test that is too sensitive, results in misdiagnosis and ruinously damaging treatment of people who were actually perfectly healthy to begin with.  The damage caused by false positives far outweigh the damage of missed positives.

I am an ex-Army Signals Officer.  I have sworn allegiance to Her Majesty QEII.  For the life of me, I can't see how having huge rooms filled with thousands of semi-literate high school drop-outs like the infamous Mr Snowden, trawling through the email and phone calls of hundreds of millions of law abiding citizens, can possibly be a good thing. The odds are totally against such a system and we are the people on the receiving end of the inevitable errors.

This is ridiculous.  Something's got to give.

What can you do about it?

In a surveillance state, your only hope is to subscribe to Twitter and start following the Pope:
http://www.richarddawkins.net/news_articles/2013/7/17/-vatican-offers-time-off-purgatory-to-followers-of-pope-francis-tweets

Now go and install Redphone, Jitsi and Mailvelope to turn your communications black!

Comments

Popular posts from this blog

Parasitic Quadrifilar Helical Antenna

This article was reprinted in OSCAR News, March 2018:  http://www.amsat-uk.org If you want to receive Satellite Weather Pictures , then you need a decent antenna, otherwise you will receive more noise than picture. For polar orbit satellites, one needs an antenna with a mushroom shaped radiation pattern .  It needs to have strong gain towards the horizon where the satellites are distant, less gain upwards where they are close and as little as possible downwards, which would be wasted and a source of noise.  Most satellites are spin stabilized and therefore the antenna also needs circular polarization, otherwise the received signal will flutter as the antennas rotate through nulls. The helical antenna, first proposed by Kraus in 1948, is the natural solution to circular polarized satellite communications.  It is a simple twisted wire - there seems to be nothing to it.  Various papers have been published on helix antennas, so the operation is pretty well understood. Therefore,

To C or not to C, That is the Question

As most would know, the Kernighan and Ritchie C Programming Language is an improved version of B, which is a simplified version of BCPL, which is derived from ALGOL, which is the Ur computer language that started the whole madness, when Adam needed an operating system for his Abacus, to count Eve's apples in the garden of Eden in Iraq.  The result is that C is my favourite, most hated computer language , which I use for everything. At university, I learned FORTRAN with punch cards on a Sperry-Univac, in order to run SPICE, to simulate an operational amplifier.  Computers rapidly lost their glamour after that era! Nobody taught me C.  I bought the book and figured it out myself. Over time, I wrote a couple of assemblers, a linker-locator, various low level debuggers and schedulers and I even fixed a bug in a C compiler - not because I wanted to, but because I had to, to get the job done!   Much of my software work was down in the weeds with DSP and radio modems ( Synchronization,

Weather Satellite Turnstile Antennas for the 2 meter Band

NEC2, 2 m band, 146 MHz, Yagi Turnstile Simulation and Build This article describes a Turnstile Antenna for the 2 meter band, 146 MHz amateur satcom, 137 MHz NOAA and Russian Meteor weather satellites.  Weather satellite reception is described here .  A quadrifilar helical antenna is described here .   Engineering, is the art of making what you need,  from what you can get. Radiation Pattern of the Three Element Yagi-Uda Antenna Once one combine and cross two Yagis, the pattern becomes distinctly twisted. The right hand polarization actually becomes visible in the radiation pattern plot, which I found really cool. Radiation Pattern of Six Element Turnstile Antenna Only a true RF Geek can appreciate the twisted invisible inner beauty of a herring bone antenna... Six Element Turnstile Antenna Essentially, it is three crosses on a stick.  The driven elements are broken in the middle at the drive points.  The other elements can go straight throug