Tag Archives: John S. Quarterman

NSA PRISM, Writs of Assistance, Rattlesnakes, and the Fourth Amendment

British Crown dragnets of information against smuggling led to the U.S. Fourth Amendment, and U.S. defense against those dragnets was the origin of the Gadsden rattlesnake flag. Those colonial Writs of Assistance were much like that FISA court order for Verizon call logs and the NSA PRISM wide-range domestic communications dragnet, while Senators Feinstein and Chambliss act like the colonial royal governors who issued those Writs.

The Fourth Amendment to the U.S. Constitution:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Senators Feinstein and Chambliss admit there is no probable cause, and no particular description of the place to be searched or the persons or things to be seized.

The Fourth Amendment was proposed because of things very like that FISA court order to Verizon back in colonial times, namely writs of assistance to stop smuggling:

In 1760, governor [Francis] Bernard of Massachusetts authorized the use by revenue officers of writs of assistance. Writs of assistance were Continue reading

Senators Feinstein and Chambliss shuffle their feet about FISA

Senators Dianne Feinstein (D-CA) and Saxby Chambliss (R-GA) lamely tried to defend the Verizon call log wiretapping, which they full well know is actually part of a dragnet of all U.S. communications. Ed O’Keefe wrote for the Washingtohn Post yesterday, Transcript: Dianne Feinstein, Saxby Chambliss explain, defend NSA phone records program,

Dianne Feinstein:

As far as I know, this is the exact three month renewal of what has been the case for the past seven years. This renewal is carried out by the FISA Court under the business records section of the Patriot Act. Therefore, it is lawful.

It has been briefed to Congress and the letters that we have distributed — and you’ll note on the dates, this is prior to the Patriot Act amendments coming before the body, each of those. As you know, this is just Continue reading

NSA domestic spying: we stopped it in 1977 and we can stop it again

After seven years or more, it’s good people are finally noticing the NSA spying program: now maybe enough people will do something about it like we did in 1977.

Don’t believe it’s just limited to who calls who: since at least 2005, AT&T (and most likely all the other telcos) has been sending all telecommunications to NSA. This stuff started after 9/11 and was legalized by the FISA Amendments Act of 2008. Before 9/11 NSA respected a rigorous wall between it and domestic spying. Time to put that wall back up. Bruce Schneier wrote 29 December 2005, Project Shamrock,

Decades before 9/11, and the subsequent Bush order that directed the NSA to eavesdrop on every phone call, e-mail message, and who-knows-what-else going into or out of the United States, U.S. citizens included, they did the same thing with telegrams. It was called Project Shamrock, and anyone who thinks this is new legal and technological terrain should read up on that program.

Project SHAMROCK…was an espionage exercise that involved the accumulation of all telegraphic data entering into or exiting from the United States. The Armed Forces Security Agency (AFSA) and its successor NSA were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegraphs via the Western Union and its associates RCA and ITT. Operation Shamrock lasted well into the 1960s when computerized operations (HARVEST) made it possible to search for keywords rather than read through all communications.

Project SHAMROCK became so successful that in 1966 Continue reading

Economists still calling computer networks “virtual” while interconnectivity is exposing economic externalities

While artists and designers have discovered there’s no sharp distinction between “real” and “virtual” (aka the New Aesthetic), economists are still talking about “virtual”, even as the networks of computers they’re referring to are exposing the economic externalities the greed of the “first economy” is built on.

Bill Davidow wrote for the Atlantic 10 April 2012, How Computers Are Creating a Second Economy Without Workers,

“Twenty years ago, if you went into an airport you would walk up to a counter and present paper tickets to a human being. That person would register you on a computer, notify the flight you’d arrived, and check your luggage in. All this was done by humans.”
Well, except for that part about “a computer”. And the flight computers in the airplane. And the FAA computers. And….

This is also true:

“Today, you walk into an airport and look for a machine. You put in a frequent-flier card or credit card, and it takes just three or four seconds to get back a boarding pass, receipt, and luggage tag. What interests me is what happens in those three or four seconds. The moment the card goes in, you are starting a huge conversation conducted entirely among machines. Once your name is recognized, computers are checking your flight status with the airlines, your past travel history, your name with the TSA (and possibly also with the National Security Agency). They are checking your seat choice, your frequent-flier status, and your access to lounges.”
While Bruce Sterling can (rightly, I think) say that’s not AI, nonetheless it all happens without much human intervention. And pixelated images of airplanes don’t start to indicate what’s going on in there.

The punchline:

“Here’s the challenge: In the past, every million-dollar increase in economic output generated on the order of ten jobs. In the future, in the productive Second Economy, it may generate only one or two.”
That’s not new. I’m a farmer, and 90% of farm jobs in this country Continue reading