Peerflow

Open participation through a fast Internet

Menu

Skip to content
  • Home
  • About

Where the Recipient is Going to Be: Any E-Mail, File Transfer, or Web Search

wainstein.jpg People are surprised to learn this?
In the end, it turns out it’s all about the emails.

— Spying Fight about Emails, Not Phone Calls, DOJ Reveals, By Ryan Singel ThreatLevel, Wired, March 04, 2008 | 4:47:36 PMCategories: NSA

The blogger goes on to point out that almost all of the recent fearmongering, which has been about telephone calls, is just plain wrong. Duh! Half the fearmongers don’t understand what they’re talking about (e.g., Sen. Saxby Chambliss told me that it’s because communications used to be wireless and are now over wires and coax). Their sources of talking points, such as McConnell, emphasize such things because they don’t want us to know that they’re already doing what they do explicitly propose for the future: “giving government the authority to examine the content of any e-mail, file transfer, or Web search.”

Notice he said authority, not ability. They already have the ability.

It wouldn’t be necessary for AT&T to send everything over to NSA through that “secret” room in San Francisco if all they wanted was telephone. And it’s long been clear that the thing the present administration doesn’t like about FISA is that it has to approve intercepts on a case-by-case basis.

But in response to a question at the meeting by David Kris, a former federal prosecutor and a FISA expert, Wainstein said FISA’s current strictures did not cover strictly foreign wire and radio communications, even if acquired in the United States. The real concern, he said, is primarily e-mail, because “essentially you don’t know where the recipient is going to be” and so you would not know in advance whether the communication is entirely outside the United States.

— Wiretap Compromise in Works, FISA Update May Hinge On Two Separate Votes, By Ellen Nakashima and Paul Kane, Washington Post Staff Writers, Tuesday, March 4, 2008; A03

So what they want to do is to hoover up everything, without bothering to ask FISA. And they are doing it. t, even though it’s blatantly illegal. If they’re not, why do they want immunity so bad?

It may have seemed that convicted and pardoned felon Admiral Poindexter’s DARPA Total Information Awareness program went away, but government analysis of dissident opinions from large amounts of data has gotten quite a bit of research funding.

This blanket spying isn’t just online, either.

President Bush quietly has claimed sweeping new powers to open Americans’ mail without a judge’s warrant.

Bush asserted the new authority Dec. 20 after signing legislation that overhauls some postal regulations. He then issued a “signing statement” that declared his right to open mail under emergency conditions, contrary to existing law and contradicting the bill he had just signed, according to experts who have reviewed it.

Bush says feds can open mail without warrant, By James Gordon Meek, New York Daily News, 4 Jan 2008

The White House claims the Constitution gives the president authority to do this. But of course the White House claims the Constitution supports the “unitary executive” theory, in which the president controls the whole government, including Congress and the Courts, with no oversight. Nevermind that the Constitution explicitly establishes three co-equal branches of government so they can check each other and avoid exactly this kind of abuse.

There’s some chance that Congress may finally stand up on its hind legs and do its job of checking the executive. The FISA “compromise” vote scheduled in the House for this week has been delayed. That’s good. All Congress needs to do about FISA is to do nothing. Don’t extend it; don’t approve retroactive amnesty; don’t do anything. The court cases already filed can then proceed to find out what has really been going on. I’m betting it’s going to make J. Edgar Hoover look like a choirboy.

-jsq

This entry was posted in Censorship, Corruption, Distributed Participation, Espionage, Filtering, Government, Internet freedom, Postal Service, Research, Wiretapping and tagged recipient wiretapping fearmongering illegal email file transfer web search Kenneth Wainstein McConnell Saxby Chambliss NSA AT&T FISA DOJ DARPA Total Information Awareness TIA Poindexter dissident on March 7, 2008 by John S. Quarterman.

Post navigation

← Kaput: What Your Domain Becomes if U.S. Treasury Says So Jettisoned: 8 Centuries of Common Carriage Law →

Recent Posts

  • NSA PRISM, Writs of Assistance, Rattlesnakes, and the Fourth Amendment
  • Senators Feinstein and Chambliss shuffle their feet about FISA
  • NSA domestic spying: we stopped it in 1977 and we can stop it again
  • Peerflow has moved to this new WordPress site
  • Economists still calling computer networks “virtual” while interconnectivity is exposing economic externalities

Recent Comments

  • John S. Quarterman on About
  • Ziebart on About
  • GFR June 16 phone conference | Get FISA Right on NSA PRISM, Writs of Assistance, Rattlesnakes, and the Fourth Amendment
  • GFR June 12 phone conference minutes | Get FISA Right on NSA domestic spying: we stopped it in 1977 and we can stop it again
  • NSA PRISM, Writs of Assistance, Rattlesnakes, and the Fourth Amendment | Peerflow on Senators Feinstein and Chambliss shuffle their feet about FISA

Archives

  • June 2013
  • April 2013
  • April 2012
  • January 2012
  • December 2011
  • March 2011
  • December 2010
  • June 2010
  • February 2010
  • August 2009
  • June 2009
  • April 2009
  • March 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007

Categories

  • Advertising
  • Antitrust
  • Applications
  • Art
  • Books
  • BPL
  • Broadband
  • Cable
  • Capacity
  • Censorship
  • Communication
  • Competition
  • Consolidation
  • Content
  • Copyright
  • Corruption
  • Current Affairs
  • Devices
  • Distributed Participation
  • DSL
  • Duopoly
  • Economics
  • Education
  • Emotion
  • Espionage
  • Film
  • Filtering
  • Food and Drink
  • FTTH
  • Games
  • Government
  • History
  • Hosting
  • Indians
  • Innovation
  • International acces
  • Internet Access
  • Internet freedom
  • Internet History
  • Internet Speed
  • IP over TV
  • IPTV
  • Law
  • Malware
  • Management
  • Marketing
  • Military
  • Monopoly
  • Municipal Access
  • Music
  • National Security
  • Net Neutrality
  • Opportunity
  • Packet Shaping
  • Piracy
  • Poetry
  • Politics
  • Postal Service
  • Press
  • Principles
  • Privacy
  • Public Policy
  • Public Safety
  • Radio
  • Regulation
  • Religion
  • Research
  • Rural Access
  • Science
  • Search
  • Senior Access
  • Society
  • Spectrum Allocation
  • Sports
  • Stakeholders
  • Stifling
  • Telephone
  • Television
  • Throttling
  • Travel
  • Uncategorized
  • Video
  • Violence
  • VoIP
  • Voting
  • Weblogs
  • Wireless Internet
  • Wiretapping

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
Proudly powered by WordPress