The Spying Industrial Complex

Chris Soghoian, whose post on 8 million times the government has used GPS tracking on Sprint’s customers in the last year, has apparently flushed out the spying policies of many of the nation’s telecoms. Cryptome has them posted–though (as Mary points out) Yahoo has freaked out and initiated take-down proceedings.

Yahoo isn’t happy that a detailed menu of the spying services it provides law enforcement agencies has leaked onto the web.

Shortly after Threat Level reported this week that Yahoo had blocked the FOIA release of its law enforcement and intelligence price list, someone provided a copy of the company’s spying guide to the whistleblower site Cryptome.

The 17-page guide describes Yahoo’s data retention policies and the surveillance capabilities it can provide law enforcement, with a pricing list for these services. Cryptome also published lawful data-interception guides for Cox Communications, SBC, Cingular, Nextel, GTE and other telecoms and service providers.

But of all those companies, it appears to be Yahoo’s lawyers alone who have issued a DMCA takedown notice to Cryptome demanding the document be removed. Yahoo claims that publication of the document is a copyright violation, and gave Cryptome owner John Young a Thursday deadline for removing the document. So far, Young has refused.

Meanwhile, Soghoian asked a really interesting question on Saturday:

Nextel charged $150 per GPS ping in 2002. http://bit.ly/7hg8Ys How much did Sprint/Nextel charge for the 8 million pings over the last year?

If Sprint/Nextel’s rates last year were what Nextel’s were six years ago, then those 8 million pings would have netted them $1.2 billion.

Sprint’s operating revenues in 2008 were $35 billion. Even if Sprint has lowered its price for GPS pings (doubtful for a company in some trouble, though possible given the way they’ve automated the process for the government), allowing the government to spy on its customers is still a huge part of its income. And that’s not counting the other kinds of spying Sprint facilitates, such as the $1500 Nextel charged for a pen register (Sprint charged differently in 2002, with $250 for a pen register or trap and trace within one market, plus $25 a day after that).

You see, these companies only look like telecom companies. Really, they’re telecom and surveillance companies. The question is, how much telecom is it, and how much surveillance?

image_print
56 replies
  1. Jim White says:

    Now that we know what Sprint has been doing, is anyone else creeped out by the Sprint commercials like this one where they provide information about how many people are their network are doing certain things in certain places? Can someone please do a parody? It would be so easy!

    • klynn says:

      And I wonder how much $$$ the teleco’s make selling that metadata from listening in and tracking our usage?

      I thought individuals were paid to be included in marketing studies with their knowledge and choice? Not the other way around.

      Telecoms are laughing all the way to the bank. Imagine that kind of knowledge in the hands of the financial industry? It would create quite the upper hand in investing. Wonder if it could be considered insider trading?

      Hmmm…

      • Jim White says:

        Thanks. I searched him and found this one. It pokes at Sprint but isn’t overt enough about spying for the government to fit what I was wanting. A video spoof would be best. Maybe something that uses the original but adds snark the way Colbert does in his “Word” segments.

    • beowulf says:

      As I mentioned on another thread when this story broke, Sprint has lost almost $2.8 billion in the past 4 quarters (the stock is under $4.00 a share). If Sprint had jacked up their fees by $350 for each of their 8 million GPS pings and they’d have been profitable

      At risk of sounding like Stephen Colbert (“the market has spoken”), increasing the cost of GPS monitoring is more likely to limit law enforcement surveillance than judicial oversight.

      • Leen says:

        my contract with Sprint was up 6 months ago. No calls from them when it was up offering me a better deal, free phone etc. When I recently called to see what kind of deal I would be available to me, the sales person was rather blase . Could care less if I renewed my contract.

        Very very different from their past efforts to keep one as a customer.

  2. klynn says:

    That is creepy. Amazing to see an admission on spying in an ad! How about lower fees since we seem to be paying twice for setvices, bills and tax dollars.

  3. scribe says:

    The telecom facilitates the more lucrative surveillance….

    Also, has anyone bothered to get this stuff up to wikileaks?

    • bobschacht says:

      Thanks for this link. This is an important report that deserves additional analysis and discussion here at the Wheel House.

      Whoops– My prayers are answered already– see new post upstairs.

      Bob in AZ

  4. bobschacht says:

    What is the difference between “marketing research” like Google has always done, in order to place the right ads in front of your eyeballs, and “spying”?

    The only difference I can see is that with “spying,” the teleco’s are doing the spying for a third party. But wasn’t Google already selling its “marketing research” to third parties for advertising purposes?

    What am I missing here? I certainly am uncomfortable with where this is going, but if Congress is going to legislate in this area (and they should), they need to know where to draw the line.

    Bob in AZ

  5. pdaly says:

    Yahoo has freaked out and initiated take-down proceedings.

    My first thought when I read that was “predator drones.”

    If Yahoo’s gambit with “copyright” protection works, then we should call ourselves independent contractors and claim all our emails/conversations/web surfing questions are copyrighted and cannot be shared without our permission.

    • fatster says:

      Your suggestion quickened the beat of my old Yippee heart. How do we declare ourselves independent contractors and all our email/web activity copyrighted, and mess with their heads (and hopefully their spying)?

  6. bgrothus says:

    I have Working Assets/CREDO with my service provided by Sprint, I think. I just sent them a link to this post.

  7. Blub says:

    The problem is this is only about the direct-type of surveillance – surveillance explicitly connected with law enforcement or purchased by law enforcement agencies. Even worse is the vastly sophisticated and targetted marketing profile stuff these companies sell as a matter of course to anyone – including, theoretically, to government agencies, political lobbies, advocacy groups, and, I suppose, even law enforcement. “provide me with the list of people in a given zip code who frequent anti-war websites, who buy progression books, and who are registered to vote…”

  8. billybugs says:

    I disabled the GPS on my cellphone ,I would encourage everyone to do so.
    I don’t want anyone tracking my whereabouts for any reason.

  9. Leen says:

    these four reports by Carl Cameron soon after 9/11 were so fascinating. “back doors” Infosys, Comverse,’

    Over at Information Clearing House
    Tonight, in the second of four reports on spying by Israelis in the U.S., we learn about an Israeli-based private communications company, for whom a half-dozen of those 60 detained suspects worked. American investigators fear information generated by this firm may have fallen into the wrong hands and had the effect of impeded the Sept. 11 terror inquiry. Here’s Carl Cameron’s second report.

    FOX News. Part 2 of a 4 part series – Part 1 – Part 3 – Part 4

  10. robspierre says:

    What I find interesting is how completely the telco mindset has changed in 10 years.

    I used to work on the hardware-vendor side of the industry, after the Bell system breakup but not too long after. Everything back then was about insuring subscriber security: what you could and could not attach to switching equipment, how the operating systems on the switches were managed, how connection-attempts to the administrative interfaces were logged (on paper), etc. This wasn’t just or even primarily altruistic: it all had to do with either billing and revenue or wiretapping laws.

    How did this change happen? Basically, the old-line, home-grown Phone Company managers were replaced by types like Carly Fiorina (who was at Lucent just before the latter’s collapse, if I recall correctly). These generic business types did not know how a telco had been run or what its legal and moral obligations might be. They just knew how to maximize their own compensation in the shortest possible time. They neither knew nor cared about revenue or profit–which is why telcos are largely basket cases now. And they refused to invest in any new technologies, so the internet largely developed free of the telco ethos for security.

    • john in sacramento says:

      For instance this one which I haven’t had a chance to dig around into yet

      A sends:
      Website for cops to find real provider of a phone number

      http://www.npac.com/
      http://www.sostechnology.co.uk/manipulation.asp

      Excerpt, Specifically it,

      * prevents specific mobile phones making outgoing calls;
      * prevents specific mobile phones from receiving incoming calls;
      * provides a ring tone no reply to the caller;
      * prevents SMS text messages from being delivered;
      * alters, and then passes on, SMS text messages in real time;
      * indentifies devices through MSISDN (phone number) or IMEI (handest identifier);

      The system is controlled remotely from a secure monitoring centre under the control of the security agency. This prevents outside interference in the operation of the system, or reliance upon any other agencies. It operates in real time and instantly implements instructions. The system can therefore instantaneously disrupt unlawful activities without reliance on other agencies to implement time critical instructions.

      From the site just referenced

      http://www.sostechnology.co.uk/over_the_air_interception.asp

      GSM Interception | Over-the-air Interception
      Our external over-the-air (OTA) mobile monitoring system is totally passive, requiring no connection to the mobile network or co-operation of the mobile network operator. As a result, it is completely discrete.

      It captures the radio transmission signals for the uplink and the downlink channels, analyses and interprets the protocol, and allows the operator to hear, record and see the desired information in real time, online and/or stored for later off-line analysis.

      This OTA Mobile Monitoring Solution is a next generation development in monitoring of GSM mobile voice and SMS messages, and is a joint venture offering. It is the first and only system in the world to allow real time monitoring of the A5.2 and A5.1 encryption standards.

      It is not restricted to country specific algorithm protocols and hence works globally. It is first of its kind in this respect. The operator can use it in any country, and it is ready to use as soon as it is turned on. [More]

      I don’t know what this means legally, but, it looks like a toy that a lot of agencies would want to use

      • benmasel says:

        The first test-drive: Memorial Day weekend of 2000, as the Sauk County, WI Sheriff’s Dept was preparing to shut down the Weedstock Festival, all cellphones which had been in communication with my landline (the public number for the event) in the previous 3 days went dead. They went active again 4 hours after the cops had occupied the site.

        (We eventually won lawsuits deeming the “Weedstock Ordinance” an unconstitutional violation of Freedom of Assembly, costing the County’s taxpayers $165,000)

        • john in sacramento says:

          I know someone who was organizing an event against the war for Veterans for Peace a few years ago, who oddly enough, as the event approached his cell stopped working – nothing – zero – zip – nada – couldn’t call anyone, couldn’t receive a call, as the event approached

          Miraculously and coincidentally, after the event, it started working

          No warrant was ever shown him

        • benmasel says:

          No warrant, unless they illegally withheld it in discovery on the civil suit. There’s no Statutory requiorement for va warrant to cut off communications, and so far as I know, no subsequent caselaw.

        • benmasel says:

          However, since we were suing the County, in State Court, it’s barely possible some layer of Feds got a warrant.

          At the previous year’s weedstock, FEMA guys, with marked windbreakers, were shooting video, which they subsequently used for a training fil;m on conducting perimeter harrassment of eventgoers. I learned of the film at ythe Rainbow Gathering, where, when I was kibbutzing rousts of vehicles along the approach road, one of the US Forest Service Law Enforcement cops blurted out “Hey, that’s the guy from the movie!” “What movie?” “The one they showed us last week. You were birddogging the Sheriffs Deputies at Weedstock.”

  11. knowbuddhau says:

    How does the Quantico Circuit fit into all this?

    A U.S. government office in Quantico, Virginia, has direct, high-speed access to a major wireless carrier’s systems, exposing customers’ voice calls, data packets and physical movements to uncontrolled surveillance, according to a computer security consultant who says he worked for the carrier in late 2003.

    “What I thought was alarming is how this carrier ended up essentially allowing a third party outside their organization to have unfettered access to their environment,” Babak Pasdar, now CEO of New York-based Bat Blue told Threat Level. “I wanted to put some access controls around it; they vehemently denied it. And when I wanted to put some logging around it, they denied that.”

    As background, James Bamford was on Democracy Now! October 14, 2008, describing the history and means of literally “splitting the beam:” by running fiber optics through prisms, the entire telecom data stream can be duplicated. Worse, Bamford asserts: the contract to tap us was outsourced to just two (2) shadowy companies based in Israel.

    And what Mark Klein was talking about, he was a supervisor for twenty-two years over at AT&T, and he discovered this secret room in this facility in San Francisco, this very tall, ten-, twelve-story building out in San Francisco, which is basically the switch, AT&T’s switch for their communications in that part of the country, the sort of western part of the country.

    And what happened is that during the 1990s and early in the ’80s and the ’70s, the NSA used to collect information by putting out big dishes and collecting satellite communications that would come down. It was very easy. They put the dishes out; satellite transmits the telephone calls and messages, emails and so forth down to earth; and the satellite picks it up. And then NSA collects it. NSA didn’t have to deal with the telecommunication companies at all, because they could get the information independent of the telecom companies.

    Then, in the late ’90s, things began to change, and fiber optics became a big thing for telecommunications. Fiber optics are cables in which the communications are transmitted, not electronically, but by photons, light signals. And that made life very difficult for NSA. It meant the communications, instead of being able to pick them up in a big dish, they were now being transmitted under the ocean in these cables. And the only way to get access to it would be to put a submarine down and try to tap into those cables. But that, from the people I’ve talked to, has not been very successful with fiber-optic cables. So the only other way to really do this is by making some kind of agreement with the telecom companies, so that NSA could actually basically cohabitate some of the telecom companies’ locations. And that’s what happened. NSA began making these agreements with AT&T and other companies, and that in order to get access to the actual cables, they had to build these secret rooms in these buildings.

    So what would happen would be the communications on the cables would come into the building, and then the cable would go to this thing called a splitter box, which was a box that had something that was similar to a prism, a glass prism. And the prism was shaped like a prism, and the light signals would come in, and they’d be split by the prism. And one copy of the light signal would go off to where it was supposed to be going in the telecom system, and the other half, this new cloned copy of the cables, would actually go one floor below to NSA’s secret room. So you had one copy of everything coming in and going to NSA’s secret room. And in the secret room was equipment by a private company called Narus, the very small company hardly anybody has ever heard of that created the hardware and the software to analyze these cables and then pick out the targets NSA is looking for and then forward the targeted communications onto NSA headquarters.

    AMY GOODMAN: So you have these companies, AT&T and Verizon, that are secretly working with the NSA and tapping Americans’ phone lines, and these companies actually outsource the actual tapping to some little-known foreign companies?

    JAMES BAMFORD: Yeah. There’s two major—or not major, they’re small companies, but they service the two major telecom companies. This company, Narus, which was founded in Israel and has large Israel connections, does the—basically the tapping of the communications on AT&T. And Verizon chose another company, ironically also founded in Israel and largely controlled by and developed by people in Israel called Verint.

    So these two companies specialize in what’s known as mass surveillance. Their literature—I read this literature from Verint, for example—is supposed to only go to intelligence agencies and so forth, and it says, “We specialize in mass surveillance,” and that’s what they do. They put these mass surveillance equipment in these facilities. So you have AT&T, for example, that, you know, considers it’s their job to get messages from one person to another, not tapping into messages, and you get the NSA that says, we want, you know, copies of all this. So that’s where these companies come in. These companies act as the intermediary basically between the telecom companies and the NSA.

    AMY GOODMAN: Now, Jim Bamford, take this a step further, because you say the founder and former CEO of one of these companies is now a fugitive from the United States somewhere in Africa?

    JAMES BAMFORD: Well, you know, this is a company that the US government is getting all its tapped information from. It’s a company that Verizon uses as its tapping company, its eavesdropping company. And very little is known about these companies. Congress has never looked into any of this. I don’t know—I don’t think they even know that there is—that these companies exist. But the company that Verizon uses, Verint, the founder of the company, the former head of the company, is now a fugitive in—hiding out in Africa in the country of Namibia, because he’s wanted on a number of felony warrants for fraud and other charges. And then, two other top executives of the company, the general counsel and another top official of the parent company, have also pled guilty to these charges.

    So, you know, you’ve got companies—these companies have foreign connections with potential ties to foreign intelligence agencies, and you have problems of credibility, problems of honesty and all that. And these companies—through these two companies pass probably 80 percent or more of all US communications at one point or another. And it’s even—gets even worse in the fact that these companies also supply their equipment all around the world to other countries, to countries that don’t have a lot of respect for individual rights—Vietnam, China, Libya, other countries like that. And so, these countries use this equipment to filter out dissident communications and people trying to protest the government. It gives them the ability to eavesdrop on communications and monitor dissident email communications. And as a result of that, people are put in jail, and so forth. So—

    AMY GOODMAN: And despite all of this—

    JAMES BAMFORD: —this is a whole area—I’m sorry?

    AMY GOODMAN: Despite all of this, these telecom companies still have access to the most private communications of people all over America and actually, it ends up, around the world. And at the beginning of the summer [of 2008], the Democrats and Republicans joined together in granting retroactive immunity to these companies for spying on American citizens.

    JAMES BAMFORD: Yes….

    And we all know how BO voted, and how he and Holder have outdone Bush and his gang.

    • Gitcheegumee says:

      From May,2006:

      What really happened the day Porter Goss resigned

      http://www.businessweek.com/bwdaily/dnflash/may2006/nf2

      President George W. Bush has bestowed on his intelligence czar, John Negroponte, broad authority, in the name of national security, to excuse publicly traded companies from their usual accounting and securities-disclosure obligations. Notice of the development came in a brief entry in the Federal Register, dated May 5, 2006, that was opaque to the untrained eye.

      Unbeknownst to almost all of Washington and the financial world, Bush and every other President since Jimmy Carter have had the authority to exempt companies working on certain top-secret defense projects from portions of the 1934 Securities Exchange Act. Administration officials told BusinessWeek that they believe this is the first time a President has ever delegated the authority to someone outside the Oval Office. It couldn’t be immediately determined whether any company has received a waiver under this provision.

      The timing of Bush’s move is intriguing. On the same day the President signed the memo, Porter Goss resigned as director of the Central Intelligence Agency amid criticism of ineffectiveness and poor morale at the agency. Only six days later, on May 11, USA Today reported that the National Security Agency had obtained millions of calling records of ordinary citizens provided by three major U.S. phone companies. Negroponte oversees both the CIA and NSA in his role as the administration’s top intelligence official.

      William McLucas, the Securities & Exchange Commission’s former enforcement chief, suggested that the ability to conceal financial information in the name of national security could lead some companies “to play fast and loose with their numbers.” McLucas, a partner at the law firm Wilmer Cutler Pickering Hale & Dorr in Washington, added: “It could be that you have a bunch of books and records out there that no one knows about.”

      • bobschacht says:

        The timing of Bush’s move is intriguing. On the same day the President signed the memo, Porter Goss resigned as director of the Central Intelligence Agency amid criticism of ineffectiveness and poor morale at the agency.

        I’m failing to connect the dots here. How is Porter Goss’s resignation tied to Bush’s move? The normal inference would be that Goss was opposed to Bush’s move, but Goss hardly seems like one to defend the rights of ordinary citizens. So, pardon my denseness, but please explain your implication.

        Bob in AZ

    • Leen says:

      The first to come out with the Israeli based telecommunication companies was Carl Cameron in late fall of 2001. Have never been any more stories that I am aware of in the MSM.

      Cameron mentioned Comverse and Infosys and Amdocs. He also mentioned in that four part report that there was a great deal of concern that a back door had been infiltrated by another country into this system.

      http://www.informationclearinghouse.info/article7544.htm
      First Cameron report

      The Amdocs memo says the system should be used to prevent phone fraud. But U.S. counterintelligence analysts say it could also be used to spy through the phone system. Fox News has learned that the N.S.A has held numerous classified conferences to warn the F.B.I. and C.I.A. how Amdocs records could be used. At one NSA briefing, a diagram by the Argon national lab was used to show that if the phone records are not secure, major security breaches are possible.

      Another briefing document said, “It has become increasingly apparent that systems and networks are vulnerable.…Such crimes always involve unauthorized persons, or persons who exceed their authorization…citing on exploitable vulnerabilities.”

      Those vulnerabilities are growing, because according to another briefing, the U.S. relies too much on foreign companies like Amdocs for high-tech equipment and software. “Many factors have led to increased dependence on code developed overseas…. We buy rather than train or develop solutions.”

      U.S. intelligence does not believe the Israeli government is involved in a misuse of information, and Amdocs insists that its data is secure. What U.S. government officials are worried about, however, is the possibility that Amdocs data could get into the wrong hands, particularly organized crime. And that would not be the first thing that such a thing has happened. Fox News has documents of a 1997 drug trafficking case in Los Angeles, in which telephone information, the type that Amdocs collects, was used to “completely compromise the communications of the FBI, the Secret Service, the DEO and the LAPD.”

      We’ll have that and a lot more in the days ahead – Brit.

      HUME: Carl, I want to take you back to your report last night on those 60 Israelis who were detained in the anti-terror investigation, and the suspicion that some investigators have that they may have picked up information on the 9/11 attacks ahead of time and not passed it on.

      There was a report, you’ll recall, that the Mossad, the Israeli intelligence agency, did indeed send representatives to the U.S. to warn, just before 9/11, that a major terrorist attack was imminent. How does that leave room for the lack of a warning?

      CAMERON: I remember the report, Brit. We did it first internationally right here on your show on the 14th. What investigators are saying is that that warning from the Mossad was nonspecific and general, and they believe that it may have had something to do with the desire to protect what are called sources and methods in the intelligence community. The suspicion being, perhaps those sources and methods were taking place right here in the United States.

      The question came up in select intelligence committee on Capitol Hill today. They intend to look into what we reported last night, and specifically that possibility – Brit.

      • Gitcheegumee says:

        How NSA Uses Private Companies to Spy On You – Verint and Verisign. … which requires telecommunications carriers to keep their networks … .org., and edu sites, to install the NetDiscovery network traffic analyzer and …
        http://www.democraticunderground.com › Discuss – Cached – Similar

        • bobschacht says:

          How NSA Uses Private Companies to Spy On You – Verint and Verisign. … which requires telecommunications carriers to keep their networks … .org., and edu sites, to install the NetDiscovery network traffic analyzer and …

          Dam straight. You gotta keep an eye on those edu sites. Gotta bunch of commie sympathizers there. You can’t trust’em.

          Bob in AZ
          (Do I have to add the /s tag? Or would anyone really think I was serious?)

  12. john in sacramento says:

    Then there’s the COFEE takedown order. So, what does COFEE allow?

    … law enforcement agencies without on-the-scene computer forensics capabilities can now more easily, reliably, and cost-effectively collect volatile live evidence. An officer with even minimal computer experience can be tutored—in less than 10 minutes—to use a pre-configured COFEE device. This enables the officer to take advantage of the same common digital forensics tools used by experts to gather important volatile evidence, while doing little more than simply inserting a USB device into the computer.

    Which is fine if they have a court order, but, if they don’t …

  13. orionATL says:

    Well, well,

    Spying is a now a profit center for our society’s giant
    telecommunications corporations.

    No wonder the senators had no
    Intention of allowing corporations to be held liable for violating their customers privacy.

    Corporate benefit from immunity was twofold:

    – no lawsuits to settle

    And

    – the right to pursue this wonderful new profit center to the tune of billions.

    So telecomm immunity was a certain thing for reasons not known by u.a. peasants, since senators and reps will always march to a tune so pleasing to large corporations.

    With the telecom immunity issue corporate interests and congressional interests met in the equivalent to provo, Utah.

    God save the constitution’s bill of rights from hence forward .

    virtue of immunity

    Corporate profit

  14. pmorlan says:

    Well isn’t that rich. Yahoo and the others have no problem passing along our private info whenever it suit them but let someone get their hands on the info these corporate giants want to keep private and they unleash their legal departments to squelch it. Amazing.

  15. Leen says:

    I’ve been with Sprint for six years. Each time my two year contract ended they were all over it trying to make a deal, keep the customer, free phone. When my contract ran out six months ago, no phone calls, no offers, no extras. Just called them the other day and they were truly blase as if they did not care whether I stayed or went with another company.

    Wonder how much they are making from these government contracts?

    Do you think this is all on record or a different set of books and record keeping for these government contracts?

    • Gitcheegumee says:

      Unbeknownst to almost all of Washington and the financial world, Bush and every other President since Jimmy Carter have had the authority to exempt companies working on certain top-secret defense projects from portions of the 1934 Securities Exchange Act. Administration officials told BusinessWeek that they believe this is the first time a President has ever delegated the authority to someone outside the Oval Office.
      The timing of Bush’s move is intriguing. On the same day the President signed the memo, Porter Goss resigned as director of the Central Intelligence Agency amid criticism of ineffectiveness and poor morale at the agency. Only six days later, on May 11, USA Today reported that the National Security Agency had obtained millions of calling records of ordinary citizens provided by three major U.S. phone companies. Negroponte oversees both the CIA and NSA in his role as the administration’s top intelligence official

      NOTE: Well what jumps out at me is just what is the definition of top secret defense-and how many companies other than communications companies may be exempted,for example Halliburton and Blackwater?

  16. bobschacht says:

    Gitch,
    If you mean I should follow the link and read the original article, I can’t– clicking on the link gave me a “file not found” error.

    If you mean I should read your whole comment again, I did, and I am sufficiently dense that I still need your help in connecting the dots. Innuendo and implications sometimes don’t work for me. I need a plain statement about why you think Porter Goss resigned, relative to Bush’s action.

    Thanks in advance,
    Bob in AZ

      • bobschacht says:

        Thanks– that link worked for me. But I still fail to see the Porter Goss connection, unless it can be argued that Goss for some reason was resisting granting this waiver. But why? Goss is not known to be a civil libertarian, or to be hostile to business interests, so I don’t understand why he would resign, if this was the issue, as Gitcheegumee seems to imply. I still don’t get it. Do you?

        The fault perhaps is not Gitcheegumee’s, because he(?)’s just passing along Business Week’s hint that the timing was linked to Porter Goss’s resignation: Gitch cannot be faulted for making clear what was not clear in the article. I was merely hoping that Gitch or someone else could connect the dots about that for me.

        Bob in AZ

        • fatster says:

          Seems like Business Week was highlighting a few dots, doesn’t it, without actually drawing the connections? I had to guffaw when the article continued with Perino saying there was no significance whatsoever about the date the memo was signed. Coming from Perino, that comment tends to make one’s eyes narrow and one wonder. And then you think about some of the other things she’s said and figure she wouldn’t know anyway.

  17. shekissesfrogs says:

    Billybugs @21, Disabling the GPS on your phone doesn’t work. It works by triangulating the distance/time between towers. You’ll have to take the battery out, like AQ does.
    The gov can even turn on the microphone remotely and listen in on your conversations.
    http://www.earthfirstjournal.org/article.php?id=303
    $350 for one GPS location is absurdly priced
    35 cents would be more what it’s worth, it shouldn’t cost any more than calling information.

    My son worked on an early version of GPS tracking on Nextel phones in 2003, it involved plotting the locations on MSN maps all day, and the storing the records.. The application was meant to track equipment repairmen and they time they spent on location for billing purposes, and also the time that they actually left the house in the morning for work.They were paying about $500 per month to track a dozen phones all month.

    There is a link to a blog from crytome.org, and the yahoo spy page that is pretty interesting. The blogger keeps up with some issues of government/business spying/data collection issues on telephones. http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html

  18. Gitcheegumee says:

    @50 and @52

    Greetings,folks.

    Have been out of pocket ALL day.

    Now, I have done some very rudimentary research on the inference -assuming there is one- of the Business Week piece.

    YOWZA!

    The TPM site has an extraordinary collection of threads going back to 2006 ,specifally on Goss.I will provide link -it’s definitely worth a bookmark.

    From the cursory review, my money says the timing of the resignation is correlated to disclosuer and fallout on the warrantless wiretaps of Jane Harman(AIPAC spy scandal),authorized by Goss, according to one of the threads.

    Also, there is much discussion on the fact that Goss had hired Dusty Foggo-knowing the security risk he may have posed because of extra curricular activites including hookergate at the Watergate,among other things-like Foggo’s ties to Duke Cunningham.

    Why bother with warrantless wiretaps if you can give telecommunications companies the legal right to tap phones-AND- allow them to legally keep potentially millions of $$$ of accounting transactions”off the books”? Gives new meaning to “black book”,no?

    Truly superior stuff at TPM:

    Porter Goss | TPMMuckrakerSep 18, 2009 … Reporter: So why is President Bush accepting Porter Goss’s resignation? What do you make of the timing of it? …
    tpmmuckraker.talkingpointsmemo.com/porter_goss/ – Cached

    • Gitcheegumee says:

      Goss was appointed the CIA director in 2004. He abruptly resigned in May 2006,just mere daysbefore the FBI raided Foggo’s home and office.

      Goss,the practice of waterboarding and who knew what and when became a huge issue ,with the exposure of the Abu Grhraib inhumanities.

      Goss had stated in 2005,while CIA director, that the US did not waterboard…..

      Enmptywheel did a thread here this spring on this very matter:

      Emptywheel » Porter Goss Escalates Attacks on Pelosi and Harman …Apr 25, 2009 … Plus, Goss didn’t get the Harman stuff till later–probably 2005. … Did Porter Goss inform congress that waterboarding involved a doctor so …
      emptywheel.firedoglake.com/…/porter-goss-attacks-on-pelosi-and-harman-but-admits-cia-broke-the-law/ – Cached – Similar

Comments are closed.