When a National Security Agency contractor revealed top-secret details this month on the government's collection of Americans' phone and Internet records, one select group of intelligence veterans breathed a sigh of relief.
Thomas Drake, William Binney and J. Kirk Wiebe belong to a select fraternity: the NSA officials who paved the way.
For years, the three whistle-blowers had told anyone who would listen that the NSA collects huge swaths of communications data from U.S. citizens. They had spent decades in the top ranks of the agency, designing and managing the very data-collection systems they say have been turned against Americans. When they became convinced that fundamental constitutional rights were being violated, they complained first to their superiors, then to federal investigators, congressional oversight committees and, finally, to the news media.
To the intelligence community, the trio are villains who compromised what the government classifies as some of its most secret, crucial and successful initiatives. They have been investigated as criminals and forced to give up careers, reputations and friendships built over a lifetime.
Today, they feel vindicated.
He's an American who has been exposed to some incredible information regarding the deepest secrets of the United States government. And we are seeing the initial outlines and contours of a very systemic, very broad, a Leviathan surveillance state and much of it is in violation of the fundamental basis for our own country - in fact, the very reason we even had our own American Revolution. And the Fourth Amendment for all intents and purposes was revoked after 9/11. ...
Q: What did you learn from the document - the Verizon warrant issued by the Foreign Intelligence Surveillance Court - that Snowden leaked?
It's an extraordinary order. I mean, it's the first time we've publicly seen an actual, secret, surveillance-court order. I don't really want to call it "foreign intelligence" (court) anymore, because I think it's just become a surveillance court, OK? And we are all foreigners now. By virtue of that order, every single phone record that Verizon has is turned over each and every day to NSA.
There is no probable cause. There is no indication of any kind of counterterrorism investigation or operation. It's simply: "Give us the data." ...
There's really two other factors here in the order that you could get at. One is that the FBI requesting the data. And two, the order directs Verizon to pass all that data to NSA, not the FBI.
But when it comes to these data, the massive data information collecting on U.S. citizens and everything in the world they can, I guess the real problem comes with trust. That's really the issue. The government is asking for us to trust them.
It's not just the trust that you have to have in the government. It's the trust you have to have in the government employees, (that) they won't go in the database - they can see if their wife is cheating with the neighbor or something like that. You have to have all the trust of all the contractors who are parts of a contracting company who are looking at maybe other competitive bids or other competitors outside their - in their same area of business. And they might want to use that data for industrial intelligence gathering and use that against other companies in other countries even. So they can even go into a base and do some industrial espionage. So there is a lot of trust all around and the government, most importantly, the government has no way to check anything that those people are doing.
[May 24, 2014] No Place to Hide: Edward Snowden, the NSA and the Surveillance State by Glenn Greenwald review
At the outset of Glenn Greenwald's communications with the "anonymous leaker" later identified as 29-year-old former NSA employee Edward Snowden, Greenwald a journalist, blogger and former lawyer and the film-maker Laura Poitras, with whom he is collaborating, are told to use a PGP ("pretty good privacy") encryption package. Only then will materials be sent to him since, as Snowden puts it, encryption is "not just for spies and philanderers". Eventually Greenwald receives word that a Federal Express package has been sent and will arrive in a couple of days. He doesn't know what it will contain a computer program or the secret and incriminating US government documents themselves but nothing comes on the scheduled day of delivery. FedEx says that the package is being held in customs for "reasons unknown". Ten days later it is finally delivered. "I tore open the envelope and found two USB thumb drives" and instructions for using the programs, Greenwald writes.
His account reminded me of the time, nearly a decade ago, when I was researching Britain's road to war in Iraq, and went through a similar experience. I was waiting for an overnight FedEx envelope to reach me in New York, sent from my London chambers; it contained materials that might relate to deliberations between George Bush and Tony Blair (materials of the kind that seem to be holding up the Chilcot inquiry). A day passed, then another, then two more. Eventually, I was told I could pick up the envelope at a FedEx office, but warned that it had been tampered with, which turned out to something of an understatement: there was no envelope for me to tear open, as the tearing had already occurred and all the contents had been removed. FedEx offered no explanation.
As Greenwald notes, experiences such as this, which signal that you may be being watched, can have a chilling effect, but you just find other ways to carry on. FedEx (and its like) are avoided, and steps are taken to make sure that anything significant or sensitive is communicated by other means. In any event, and no doubt like many others, I proceed on the basis that all my communications personal and professional are capable of being monitored by numerous governments, including my own. Whether they are is another matter, as is the question of what happens with material obtained by such surveillance a point that this book touches on but never really addresses. Greenwald's argument is that it's not so much what happens with the material that matters, but the mere fact of its being gathered. Even so, his point is a powerful one.
This is the great importance of the astonishing revelations made by Snowden, as facilitated by Greenwald and Poitras, with help from various news media, including the Guardian. Not only does it confirm what many have suspected that surveillance is happening but it also makes clear that it's happening on an almost unimaginably vast scale. One might have expected a certain targeting of individuals and groups, but we now know that data is hovered up indiscriminately. We have learned that over the last decade the NSA has collected records on every phone call made by every American (it gathers the who, what and when of the calls, known as metadata, but not the content), as well as email data. We have learned that this happens with the cooperation of the private sector, with all that implies for their future as consorts in global surveillance. We have learned, too, that the NSA reviews the contents of the emails and internet communications of people outside the US, and has tapped the phones of foreign leaders (such as German chancellor Angel Merkel), and that it works with foreign intelligence services (including Britain's GCHQ), so as to be able to get around domestic legal difficulties. Our suspicions have been confirmed that the use of global surveillance is not limited to the "war on terror", but is marshalled towards the diplomatic and even economic advantage of the US, a point Greenwald teases out using the PowerPoint materials relied on by the agencies themselves. Such actions have been made possible thanks to creative and dodgy interpretations of legislation (not least the Patriot Act implemented just after 9/11). These activities began under President Bush, and they have been taken forward by President Obama. It would be a generous understatement to refer to British "cooperation" in these matters, although Greenwald's intended audience seems to be mostly in the US, and he goes light on the British until it comes to the treatment of his partner, David Miranda, who was detained in the UK under anti-terror legislation.
When the revelations first came out, in the summer of 2013, Snowden explained that he "had the capability without any warrant to search for, seize, and read your communications". That meant "anyone's communications at any time", he added, justifying the public disclosure on the grounds that this "power to change people's fates" was "a serious violation of the law". Snowden's actions, and the claims he has made, have catalysed an important debate in the US, within Congress (where views have not necessarily followed party lines) and among academics and commentators. Views are polarised among reasonable individuals, such as New Yorker legal writer Jeff Toobin ("no proof of any systematic, deliberate violations of law"), and the New York Review of Books's David Cole ("secret and legally dubious activities at home and abroad"), and in the US federal courts. In Britain, by contrast, the debate has been more limited, with most newspapers avoiding serious engagement and leaving the Guardian to address the detail, scale and significance of the revelations. Media enterprises that one might have expected to rail at the powers of Big Government have remained conspicuously restrained behaviour that is likely, over the long term, to increase the power of the surveillance state over that of the individual. With the arrival of secret courts in Britain, drawing on the experience of the US, it feels as if we may be at a tipping point. Such reluctance on the part of our fourth estate has given the UK parliament a relatively free rein, leaving the Intelligence and Security Committee to plod along, a somewhat pitiful contrast to its US counterparts.
The big issue at stake here is privacy, and the relationship between the individual and the state, and it goes far beyond issues of legality (although Snowden's fear of arrest, and perhaps also Greenwald's, seems rather real). It is in the nature of government that information will be collected, and that some of it should remain confidential. "Privacy is a core condition of being a free person," Greenwald rightly proclaims, allowing us a realm "where we can act, think, speak, write, experiment and choose how to be away from the judgmental eyes of others".
Snowden's revelations challenge us to reflect on the ideal balance between the power of the state to know and the right of the individual to go about her or his business unencumbered, and this in turn raises fundamental questions about the power of the media, on which Greenwald has strong views, usually (but not always) fairly articulated. He makes the case for Snowden, and it's a compelling one. One concern with WikiLeaks acting independently was the apparently random nature of its disclosures, without any obvious filtering on the basis of public interest or the possible exposure to risk of certain individuals. What is striking about this story, and the complex interplay between Snowden, Greenwald, Poitras and the Guardian, is that the approach was different, as the justification for the leaks seems to have been at the forefront of all their minds. In his recent book Secrets and Leaks Rahul Sagar identified a set of necessary conditions for leaks. Is there clear evidence of abuse of authority? Will the release threaten public safety? Is the scale of the release limited? Many people, though not all, see these as having been met in the Snowden case.
Britain needs a proper debate about the power of the state to collect information of the kind that Snowden has told us about, including its purpose and limits. The technological revolution of the past two decades has left UK law stranded, with parliament seemingly unable (and perhaps unwilling) to get a proper grip on the legal framework that is needed to restrain our political governors and the intelligence services, not least in their dance with the US. "The greatest threat is that we shall become like those who seek to destroy us", the legendary US diplomat George Kennan warned in 1947. In response, revelations can be made, Greenwald's book published, and a Pulitzer prize awarded. Long may it go on.
Philippe Sands QC is professor of law at University College London. To order No Place to Hide for £15 with free UK p&p call Guardian book service on 0330 333 6846 or go to guardianbookshop.co.uk
No Place to Hide: Edward Snowden, the NSA and the Surveillance State
by Glenn Greenwald
Tell us what you think: Star-rate and review this book
Imlessbiasedthanyou2, 23 May 2014 8:41am
Ed Snowden needs to be pardoned.
Glenn Greenwald and the Guardian have been the only source for this information in the UK, which is a disgusting state is affairs. The timidity of our media is striking, embarrassing and scary.
Information needs to be collected by security agencies within reason. Indiscriminate harvesting is information corrupts democracy indescribably.
Incumbent powers can, and will, use private information to quell legitimate protest and debate, and protect their own interests at the expense of justice for their own citizens, and the innocent citizens of foreign countries. They will use it to bribe public servants and corrupt democracy.
Innocent information can still be used against you. It is a failure of intellect and imagination to doubt this, and proclaim the old, untrue mantra, "nothing to hide, nothing to fear".
This cannot be disputed, and so those who continue to defend the actions of our governments are either blind, ignorant or working in tandem.
Thank you Ed Snowden, Glenn Greenwald and the Guardian.
Keep this story alive. It's almost the only one that matters.
mirageseekr, 23 May 2014 11:45am
While I agree that personal privacy is important and needed I think the bigger concern is what happens to democracy when people in authority can be blackmailed. The important thing about Snowden was that he confirmed what Tice and Binney have been saying all along and just lacked the actual evidence.
What I see with some of the rulings from the courts and laws from congress is puppets on a string. They know their argument fails to hold water and yet the feverishly stand by and defend it. The only reasonable answer for that is someone has the goods on them and is using it, just as Russ Tice has been saying for years. So the major question and one I hope Snowden and Greenwald have the answer to is, who is the puppet master?
Our societies have only the charade of democracy. Now the proverbial curtain has been pulled back and we must look to see the truth. Tice has said he saw the orders for surveillance of Obama and Supreme court justices as well as top brass. So who is it exactly that this very expensive system paid for by our tax dollars is used for. We know the "terrorism" is a lie or possibly a distraction for workers they may worry about having a conscious. They claim it is not for industrial espionage, but I am willing to bet some people have made lots of money from having access to information that was stolen. To me the tin foil hat club had it right all along. The people calling the shots are the Council on Foreign Relations, The Trilateral Commission, and Bilderbergs. And if that is true then we have a few global elite of un-elected people determining economies, wars, policy for us all and doing it in violation of sovereignty laws. I wish The Guardian would report more on the military state the USA has become, daily the police beat and kill people here. The DHS has been loading up on ammunition that is not used for target ranges and is against the Geneva convention, the TSA, just ordered weapons and ammunition. The State Department just got a few tons of explosives even the post office has a SWAT team. We have allowed them to build a standing army within our country in direct violation of our constitution. The FEMA camps are up and running and NDAA ensures you can be quietly taken away in the night with absolutely no rights and no charges and even gives them the right to kill Americans. This is not a partisan issue, the bill passed 84-15. So how much more will it take for Americans to realize that the only difference between the US right now and Nazi Germany is that they haven't started loading the trains yet. The US also learned from the Germans mistakes, they will most likely not go house to house with weapons at first. It will be some false flag to make the population willingly go. Maybe it will be like the drills they have had (one in Denver) where they took the schoolchildren to the football arena for a FEMA/DHS "drill" except they forgot to make any mention to the parents about it. The puppet masters need to be exposed now, there is not much more time to wait to see how this is going to work out.
MiltonWiltmellow, 23 May 2014 11:48am
Snowden's revelations challenge us to reflect on the ideal balance between the power of the state to know and the right of the individual to go about her or his business unencumbered, and this in turn raises fundamental questions about the power of the media, on which Greenwald has strong views, usually (but not always) fairly articulated.
These sorts of understatements represent a sort of passive acceptance. (e.g., "Let's debate about the tigers dragging our children to the jungle where it devours them. Tiger's have legitimate needs too. Maybe if we stake goats, the tigers will devour the goats instead of our children ... " )
The entire relationship between State and individual changes when the State takes it upon itself to monitor the everyday activities of its citizens.
This isn't an academic question which august authorities like yourself can debate among themselves for the next ten or twenty years.
This is a fucking tiger in the nursery.
Either the citizen has basic human rights (the right to freely interact with others) or the citizen turns into a subject -- a potential threat to State security and thus a suspect.
The question isn't "how much secret surveillance should be allowed" but rather "how can this secret surveillance be stopped?
AhBrightWings -> MiltonWiltmellow, 23 May 2014 12:41pm
Brilliant Milton. Couldn't agree more, and love your metaphor. Just because it's crouched under the dust-ruffle doesn't mean it isn't there. If you've watched footage of tigers hunting, they often freeze for long periods of time to lull their prey into a fall sense of well-being.
As you said so well: This is a fucking tiger in the nursery.
LostintheUSMiltonWiltmellow, 23 May 2014 1:26pm
And it is not just about reading our emails, etc. Or listening into phone calls. I mentioned an obscure book to my husband (in the same room) that has been out of print for 34 years one day while working on my computer and a short while later there was an ad for that book that popped up on gmail.
Think about that.
And NONE of this is about "protecting" us. The Boston Marathon bombers were all over the radar for their previous activities and the NSA was paying them no mind. This web is to protect the oligarchy from us peasants. We are living in 17th century France...the aristocracy pay no taxes and we are being taxed and worked to death.
Levi Genes -> LostintheUS, 24 May 2014 11:44am
The Boston Marathon bombers were all over the radar for their previous activities and the NSA was paying them no mind. This web is to protect the oligarchy from us peasants.
It's much more violently proactive than simple 'protections' from potential opposition. The reason they appear now on the 'radar' is because the so-called Boston 'bombers' were deeply run by the FBI for the same nefarious reasons as are all other patsies in the parade of US false flag operations: deflection from public investigation identifying the actual terrorist perpetrators / plausible deniability for the public to bite on to facilitate the desired effect of implemented programs of public terror. The evidence of state sponsored terror is there if one chooses to look.
The recent, violent murder in Florida of an associate / witness to that FBI operation by an FBI agent / interrogator, tasked with insuring that associate / witness's compliance to the prescriptive, government narrative of the Boston event as force fed to the public by compliant / co-opted mass media, is but yet another thinly but effectively veiled, social conditioning manipulation of public consciousness reinforcing the enabling myth of just who is the actual threat to public peace and safety.
Boston was an exercise in social conditioning to martial law where no civil rights exist. They shut the city down in contrived pretext and stormed through whatever private domain they chose as a show of force in exercise of police state power over all constitutionally based constraints. All on a desperate, audacious and unthinkable lie.
You will do exactly what you're told to do, when you're told to do it, by heavily armed masked men in black, storming through your house without your invitation, ostensibly in pursuit of and protecting you from the terrible phantoms created by their masters.
Bagdad, Boston, London, Kiev, no matter. Same game of violent control from the same power cabal while draining the hard earned wealth and civil power of the masses by the same boom/ bust / state terrorist means. All of it, an horrific extension of covert enablement by forced public pacification to Operation Gladio and its drive to global dominion.
NATO / NWO intent is defined by its break-away elitist culture of absolute authoritarianism by absolute systemic corruption in absolute secrecy. Snowden and his journalist associates are providing a glimpse of its all encompassing scope. Our individual response, or lack thereof, will determine our fate as either citizens with rights based in moral principles and economic equity, or as mere commodities for use as needed by hidden powers.
A stark choice, as the presumptive enemies of the state that we in fact are.
guest88888epinoa, 24 May 2014 3:29am
Baubles handed out - nothing changed.
Agreed. Ultimately, despite their good intentions, I feel as though both Greenwald and Snowden aren't pushing the case against dragnet surveillance hard enough. We don't need a debate. This is fascism pure and simple, and they are spying on us because they fear the day that we revolt against their putrid austerity and the general failure of capitalism.
The Grauniad of course possesses no perspective whatsoever. Seriously Mr. Sands, we need a debate? You find out the majority of the world is being spied on and violated, and you are actually think that a few cosmetic changes will make a difference?
There will be no debate, and you know it. But I suppose that while you are wealthy and safe from economic deprivation, who cares if the NSA tramples on the freedoms of common people, all in defense of the ultra-rich, right?
KilgoreTrout2012, 23 May 2014 12:14pm
"NSA has collected records on every phone call made by every American (it gathers the who, what and when of the calls, known as metadata, but not the content), as well as email data."
I don't buy it's just metadata, since the US and are allies have the technology to do so, the content is also being "saved". Most likely US "content" is collected in Great Britain to give the NSA plausible deniability that they are not collecting content. And the US probably has Great Britain's "content".
The NSA may not have the technology to truly read all that data today but someday it will all be collated, analyzed, and used to put each citizen into national security classifications. Your travel, jobs prospects, etc. will be limited based on where you fall in their assessments.
guest88888 -> KilgoreTrout2012, 24 May 2014 3:34am
I don't buy it's just metadata,
Of course I agree with you sentiment that the US and its cronies are lying through their teeth about everything, but I want to point out that metadata collection is far more intrusive than just regular wiretapping.
Greenwald gave a great example. To paraphrase:
If I call an AIDS clinic, and you monitor the content of my call, I may never bring up the actual disease in most of my conversations. I might say, let's meet at this time, or book an appointment, or make small talk etc.
But, if you have the metadata, you can know that I've been calling an AIDS clinic repeatedly. You can know where I'm calling from. You can find out where I've been getting meds (from the pharmacy).
In short, you can rapidly figure out if I have AIDS, what I'm doing about it, even how I may have got it. Much easier with metadata than simple wire-tappping.
Not that much analysis needed, since you need much less data.
AhBrightWings, 23 May 2014 12:35pm
Not sure I agree that the debate has been "more limited" in Great Britain. The Guardian is, after all, a British publication and it has had ten times (conservatively) more coverage than any other journal I know of, and continued congratulations for doing so.
The problem in the US is that we can't get any traction on the revelations that kicks over into judicial action to end this crime spree. Congress is ossified, the populace is mummified, and so we march on, becoming the United States of Zombieland, where the only signs of sentient life are in the MIC and its many tentacles and claws.
Snowden's sacrifice and Greenwald's work only have value if people wake up and use what we've learned. The mystery is what we are all waiting for. The trajectory from UPS hold-ups to being held-up in a cell is shorter--when things truly take a dire turn (and we may get lucky and they may not, I fully concede that)--than many want to concede. The rise of every despot and tyrant has illustrated that arc well. Why do we think we'll be the exception to that pattern?
Our exceptionalism appears to have blinded us in more ways than one.
Theodore McIntire, 23 May 2014 12:54pm
In addition to revealing how invasive and law/truth twisting big governments / organizations (of any orientation and denomination) are likely to behave, the Snowden revelations also showed how much the media and public are/were disengaged from reality and blindly trusting of big governments / organizations.
Except for those poor souls who live in fear or live off the fear of others... They are very afraid and angry about the Snowden revelations and any other disruptions to their fear based animal herd behavior.
CraigSummers, 23 May 2014 1:32pm
I find it interesting that you don't mention even once in your review the potential ramifications of compromising US intelligence. This is an extremely important consideration in the debate (at least to some concerned citizens). In addition, the released information goes far beyond civil liberties in many instances. One can certainly question the motives of Greenwald. Greenwald has a body of written work from Salon, the Guardian and others which indicate he was not motivated entirely by a debate about "privacy" and civil liberties.
The release of information that the NSA spied on universities in Hong Kong coincided with Snowden's arrival in the special administrative region of the People's Republic of China. This was hardly a coincidence - and shows the level of planning used by Snowden before illegally stealing tens of thousands of top secret documents.
".......The big issue at stake here is privacy, and the relationship between the individual and the state, and it goes far beyond issues of legality (although Snowden's fear of arrest.......seems rather real)...."
Jesus, ya think?
Leondeinos -> CraigSummers, 23 May 2014 4:26pm
The ramifications are simply that the NSA has been caught in its full incompetence and arrogance. Snowden did the world a great favor. Greenwald's book is a good read that does expose and explore those ramifications for the world.
The version of the Defense Intelligence Agency's assessment of damage done by Edward Snowden's leaks released by the US (here on the Guardian website) contains no information about the potential ramifications of compromising US intelligence. This "redacted" version consists 12 pages of blanks out of a total of 39 pages in the original. What you see is what you get. A year after Snowden's revelations, it is a pathetic, contemptible defence of a vast waste of money, people, and diplomatic reputation by the US government.
EFF: Amazon, AT&T, and Snapchat Most Likely To Rat On You To the Gov't
May 16, 2014 | Slashdot
jfruh (300774) writes "The EFF has released its annual "Who Has Your Back" report, which uses publicly available records to see which web companies do the most to resist government demands for your personal data, by requiring warrants and being transparent about requests received.
Social media giants Facebook and Twitter scored quite well; Snapchat was at the bottom of the list, and Amazon and AT&T didn't do much better."Here's the report itself.#1 rats (Score:5, Informative)
Banks. They rat you out to the government in every which way. Any given transaction is sent to the DEA and IRS just for starters. And of course the NSA gets everything by hook or by crook.
Re:2014: Trusting anyone online, ever. (Score:4, Informative)
Of the few people who have commented on my original comment, I decided to reply to yours since you're touching on the most points I'd additionally like to cover anyway.
Yes, the real problem is that almost nobody will listen -- but my theory is that of that group of people who won't listen, they break down into people who don't understand, or care, or have been indoctrinated to not care, that their personal privacy is actually something of value to them, and once it's gone, it's gone, and it may not be possible to get it back. I think that the younger the person we're talking about, the less they care, and what's worse, they really think that anyone who does value and protect their privacy 'has something to hide', i.e. they think those people are Bad People who are committing crimes or something.
I blame corporate brainwashing and perhaps government propaganda for this attitude; these younger people will grow up into a world where the idea of not sharing more-or-less every moment of their waking lives with the world is completely foreign to them, and that if you don't share everything, there's something wrong with you. Older people remember a world where individual privacy was something that every healthy person wanted, and was entitled to as a human being -- and because of this attitude, younger people say 'well, they're old, they don't understand' and any warnings about privacy being violated is ignored.
So far as planning to discontinue usage of your debit card (and presumably go cash-only)? Hate to tell you, but the situation has deteriorated to the point where if you do at some point have your financial paper trail taper off to almost nothing, you'll draw the attention of the government, which will assume you're up to no good and will start scrutinizing you.
Then when they see you online footprint is also next to nothing, they'll be nearly convinced you're up to some sort of criminal activities, and you very well might be surveilled and profiled. If you happen to be in the wrong place(s) at the right time, you may be implicated in something you have absolutely nothing to do with, but since their 'profile' of you will seem to indicate to them that you're hiding something (because you're not one of the bleeting sheep they've carefully indoctrinated to be that way) it won't matter what you say to them or can prove. Welcome to the Dystopia, friend. "I do not plan on ever being a threat", you said at the end of your comment; I'm sorry, but in the end, as I said above, it won't matter, if you happen to get caught in one of their drag-nets.
I do sympathize with you, and hopefully one decade things will turn around, but until then, I actually recommend you 'hide in plain sight' because to do too much to erase yourself, ironically, will just draw attention.
[May 16, 2014] Luke Harding and the spy as editor by Giovanni Tiso
The question asked by the computer is always Are you sure you want to delete this?, never Are you sure you want to save this?, or even Are you Sure you want to write this?
Overland literary journal
What is also tritely, exhaustingly ironic, in the context of the NSA revelations and every political thriller since Enemy of the State, is that users of social media effectively write their own surveillance reports. 'Subject got up and consumed hearty organic breakfast.' 'Subject expressed unsavoury political views after reading article in the morning's paper.' Tweet-length entries in a drab chronicle of life beyond the cyber-curtain. And on top of that, we secret-police one another. 'I remember that thing you said two years ago, in fact, I have kept a record of it.' It's all filed in a myriad archives, and yours and mine can be just as sinister as those that belong to the NSA, Google or Facebook.
You'll recall what happened with Facebook. For years we all posted on it as it if weren't an archive, because it wasn't: there was no timeline nor search function. Then came Timeline, which made it possible to browse your life as you spent it on Facebook, unless you bothered to go back and delete large chunks of it in a brief time window after the introduction of the new future. This put users in front of two equally unpleasant options: revise and self-censor, or have your own barely authorised biography suddenly published under the imprint of Mark Zuckerberg. With a casual insult added to the injury: the implication by a host of commentators and Zuckerberg himself that you should have known all along that it would come to this.
When the time came, I didn't revise, I didn't self-censor. I told myself that it was a personal choice, that it had nothing to do with digital technology abhorring a vacuum. The question asked by the computer is always Are you sure you want to delete this?, never Are you sure you want to save this?, or even Are you Sure you want to write this? That's what makes the image of the self-deleting paragraph so haunting. It's a perverse inversion of how things are supposed to work. Deleting information should always and only be something that happens by accident, never on purpose, not even the purpose of an adversary. Even our enemies should want us to keep writing more and more things, the better to surveil us with.
Giovanni Tiso is an Italian writer and translator based in Aotearoa/New Zealand. In 2006 he completed a PhD at Wellington's Victoria University on the relationship between memory and technology. He also blogs at Bat, Bean, Beam and tweets as @gtiso.
[May 3, 2014] Everyone is under surveillance now, says whistleblower Edward Snowden by Associated Press
May 3, 2014 | The Guardian
The US intelligence whistleblower Edward Snowden has warned that entire populations, rather than just individuals, now live under constant surveillance.
"It's no longer based on the traditional practice of targeted taps based on some individual suspicion of wrongdoing," he said. "It covers phone calls, emails, texts, search history, what you buy, who your friends are, where you go, who you love."
Snowden made his comments in a short video that was played before a debate on the proposition that surveillance today is a euphemism for mass surveillance, in Toronto, Canada.
The surveillance state exists to monitor dissent. That's what it's for.
All our comments on this site are being logged, everyone who is participating on this thread is having their emails, calls, texts and online activity monitored. GCHQ and the NSA know most of us are not not terrorists.
They are interested in the enemies of the ruling class: thinkers, dissenters, trade unionists, strikers, intellectuals, writers, teachers etc, anyone with a brain who criticises the status quo. They are terrified the working class will mobilise. Their best weapon is surveillance. It's totally political.
SinisterLord -> ellatynemouth
Everything we do online is monitored. First they collect it. All of it. After that they can dissect and analyse at their leisure.
This is not about Spooks-style races against time to catch terrorists, it's about having the capability to build dossiers on people. Even the Huff post now insists on facebook verification before users are allowed to post. It's a now a known fact, thanks to Snowden that some of the commentators on here are just GCHQ shills paid to 'nudge the debate'..
And it's working! Why? Because unlike the US and rest of the democratic world, no one over here seems to actually care.
ByThePeople -> franklin100
"There is little value in ensuring the survival of our nation (United States of America) if our traditions do not survive with it.
And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand it's meaning to the very limits of official censorship and concealment.
That I do not intend to permit, to the extent that it's in my control."
- Quote from JFK on April 27, 1961 - Assassinated November 22, 1963
This total surveillance society is set up in anticipation of the coming social unrest.
Longwoodsy -> HARPhilby
It's more to do with maintaining control in an abusive relationship.
If the entire population is under surveillance there is no method of analyzing that data. As an example, one big university produces millions of emails a day, how earth could anyone make sense of that data. Even if they look for 'buzzwords' they would be overloaded with crap from the guardian comment section.
Obviously, to get money from the government, the contractors (like Snowden) sell their techniques as effective. But in reality these techniques cannot work and are a total waste of resources. My only concern is this waste, not my privacy.
My personal assumption has always been that internet use and email has always been monitored by either government, the email providor,broadband providor etc.because nothing in life is free and information is valuable for these massive companies.
Having said that I am very grateful for Snowdon bringing this information to everyones attention because with little awareness and lack of control there potentially could have been some pretty nasty and petty invasions into people's privacy.
MakeBeerNotWar -> villas1
- Dershowitz is a double scumbag as he for years has pushed for the pardon of American traitor Jonathan Pollard whom he feels is so much better a human being than Snowden because he spied on the US for it's ally Israel. lol - the "ally" that did it's best to sink the USS Liberty. I wish Dershowitz had been aboard Liberty that day in 1967 as his *American* countrymen fought for their lives under attack by our "ally" and held his dying *countrymen* in his arms.
Pyrrho San Pellegrino
What a true champion of the people. He's crystalized the awareness of people that they're being spied on en masse. This ties in with the one-world gov agenda. The ultimate vision is to have us all spied on, because people will be basically worker ants. And only certain types of people will be able to climb the ladder in that one-world setup. It will be an ethnoreligious hierarchy. No ascension is possible in that world for people outside of the supremacist alpha controller group, except in terms of how good a slave that ant is. The better slave you are, the more butt-kissing you do, the more you can get closer to the power nexus. It's a true satanic setup. I'm sure this sounds all far-fetched and surreal, but it's here already; it's just creeping and lurking and inching ever more close to total domination, when it will more clearly show itself on the surface. But by that time everyone will be totally helpless to resist. Tyranny is in the future for humanity. One of the few obstacles to this is their worker ants going public and revealing the plans. That's why they're terrified of people like Snowden. They cannot have any more Snowdens, which is why they will go so far as waging proxy war on Russia. But Snowdens --- people who have the free, rebellious human spirit --- are man's
ZeroNada7even -> Pyrrho San Pellegrino
None are more hopelessly enslaved than those who falsely believe they are free.
friztofratzo -> Pyrrho San Pellegrino
The sad truth is most of us couldn't care less, we already LOVE Big Brother.
If the NSA is paranoid about surveillance , it's not to protect you from terrorists. Its for 3 simple reasons:
- Protect themselves from public uprising
- Serve and help US corporations
- Means of coercion, manipulation, corruption in politics home and abroad.
Quote: Everyone is under surveillance now
The only one good thing about that is the NSA,GHQ and security services know just how much they are justifiably reviled for their abuse of power in spying on untold millions of innocent people.
Bolshiepamphleteer -> MadWorld
Are they bovvered ?
icurahuman2 -> Bolshiepamphleteer
Are they bovvered ?
That everyone now knows? You bet they're "bovvered"! No-one trusts them, them being the NSA/GCHQ etc cabal, they're families certainly don't, or their neighbours, nor do their co-workers who are now all potential whistleblowers or informants. I wouldn't be surprised to see some "go postal" under the stress of it all. Any social standing they might have had before has detriorated by a long ways, I bet they don't get invited to as many backyard BBQ's as they used to.
Edward Snowden is a hero and the defenders of the secret state are everywhere. Secret State makes representation and democracy meaningless.
No one can prevent terrorism when a state uses it as a weapon against its own people. When a state uses terror it is fearful of all those who have not pledged allegiance, who are not conscripts, who are not mercenaries. The state then claims it understands terror and how it works, but, of course, it never sees the bully coming unless it really wants to. If we are being left alone then we must have a use to the state and that is such a horrible thought.
The huge problem we now have is the complacency of most people regarding this problem. As a teacher, I was shocked when My class of 17 Year-olds said they didn't mind the NSA having access to their Facebook page but they found the idea of their parents having access to it intolerable. So basically, they don't mind hundreds of strange adults in a foreign country having access, but do mind allowing the people who love and care for them most to have access.
The public need to have their consciousness raised. The is a ticking bomb...
On the plus side, at least MI5 have a complete list of UKIP and BNP sympathisers
oppons -> jsane
On the plus side?
Do you really think the security services consider data from ukip and bnp websites and forums a bonus, or even important?
In what situation do you think in GCHQ they are going to say 'Phew, disaster averted guys, by some miracle we managed to successfully hack the ukip and bnp servers, the Gods must be looking down on us'
Nope, cant envisage that ever being considered a plus side, but what I can see is some weak attempt by you at implying ukip and bnp would having something to fear from mi15, nice try 4/10
That Charlie Bauer 2013 magazine article.
So the truth is finally out - we're all being watched. Some time ago I covered online identities including shagsites like Grindr, but the very notion of this most recent internet profiling is making me feel a bit queezy. Either way, I can't help thinking that all this Ed Snowden stuff is really just the tip of the slippery iceberg.
All this surveillance makes me wonder how they are ever going to get us to behave ourselves. We're all free and well out of our closets and we all know our rights. And we're not doing anything illegal, are we? What we do in bed is (now) our own business as long as it doesn't constitute any form of involuntary force over another. Correct? And we can also perve away across the internet - because we see this as free information- and delude ourselves that we are still operating within the law. Even if we don't know what the law is.
Most people I talk to about my concerns tell me they have nothing to hide, 'Whoever they are, they can't spy on everything we get up to online. Can they?'
There are also those of us who say 'they can look at whatever they want I'm not hiding anything or breaking any laws ' This is where we come unstuck.
It was Michel Foucault who came up with the idea of surveillance which he based on old fashioned prisons called Panopticons. In the centre of these prisons was an observation tower with slit windows where the guards would sit. In a circle around these were the prison cells with railings on both sides so the guards could see through each cell at every prisoner. But here was the trick - the prisoners couldn't tell if they were being observed or not because they couldn't see through the slits in the tower at the guards. What the prisoners did, because they didn't know if they were being watched, was regulate their own behavior.
In other words, they started to 'behave' themselves. This meant the job was done and cheaply too because sometimes the central turrets had no guards inside but the prisoners didn't know that and so they behaved themselves.
This is becoming the same way with the internet but they can't afford to police us anymore so they profile us instead building up a contrived image of who we are via every activity we make on the internet, text, phone, Facebook, Grindr
So do we have to 'Behave' ourselves because they may be looking? It's actually gone beyond that. We have to regulate our behavior now because Ed Snowden informed us that they can go back at any point and put together a case based on hearsay from our own digital history. And we will not be able to defend this because they will carry all the so-called 'evidence'.
Whenever you complain about a politician shafting the economy or Murdoch using wealth to cover everything up, just remember that information is also designed to make you lose all faith in any system of order. So that when if it were all to break down, in that good old colonial way, the powers that be will stomp in with a new moral treaty in hand in order to 'protect' us from ourselves.
Profiling is not only about 'Targeting' advertising at you via your online searches. They now know your all your sexual peccadillos by what porn you view even how long it take for you to orgasm as a result - Is that personal enough for you?
As for 'having nothing to hide', your personal information may seem innocuous now, but think about some idiot invested with power at GCHQ compiling their tailored choice of profile based on carefully selected 'real events' from your online life. What about that time you and a mate stumbled on the 'How to make a nail bomb' website when you were drunk or having a disagreement. Or that time when you typed 'Sexy boys' into Google search when you really should have tapped in 'Sexy men'.
All of this - as well as what you bought at the Tesco Metro yesterday - and your most recent STD information, is currently on a chip the size of your little toenail at a storage facility in Fuckhampton, Pennsylvania. And it's not what you are doing now in your temporarily emancipated lives but what can be held against you from your digital past if someone decides you've suddenly stepped out of line. And they wont be favorable either. Even if you believe yourself to have a moral compass, they can shift the polarity of your identity to make you appear to be Josef Fritzl if they so desire.
What will happen is that we will enter a closet far colder than the one we've just broken out of. Of course we'll all be equal - but we'll all be stuck in there together.
Relax - none of this is actually real. It's only a profile of you that does not exist yet and will only ever really be a fragmented case in a virtual court of law.
Not that I agree with it, but I think people completely overestimate the ability for a spy agency to process all that data in a meaningful way...
Pyrrho San Pellegrino -> tixxZadinia
That's what the 3rd party contractors are for, like Booz Hamilton. Shift the grunt processing work to the private sector.
jsane -> StixxZadinia
That misses the point. Without Snowden's revelations the establishment would have denied outright the scale of data collection. Anyone who says "I'm fine about this" is entitled to their opinion. But it's clearly illegal/unconstitutional and that is why it was covered up.
Once you have sorted data collection, the next step is processing. Car numberplate recognition from CCTV is easy. Face recognition is growing in reliability (Facebook is interested in this technology, and is making huge strides. I'm sure the NSA is at least as advanced, if only by stealing their software). So in a country like the UK with high CCTV coverage, and high mobile phone usage, suddenly the secret police know everywhere you go, and everyone you meet.
I would imagine this in place now. In another 5 years, imagine what could be achieved.
I think people completely overestimate the ability for a spy agency to process all that data in a meaningful way...
Absolutely 100% agree, there are approximately 2.5billion Internet users worldwide, there is no way they can personally monitor more than a tiny minority. If you do something that raises your profile as a paedophile, terrorist, fraudster, industrial spy then they can focus in on you but for ordinary law abiding individuals the concern is, in my opinion, vastly overhyped.
You clearly have not been paying attention have you.
StixxZadinia -> supercobrajet
I'm not paranoid is that's what you mean. But I am realistic. These days you can still make a large passenger airline disappear, do you really think they can get anything sensible out of the sheer volume of internet traffic? I doubt it.
People's privacy is violated without any suspicion of wrongdoing, former National Security Agency contractor claims
In Corporate political American & the United Kingdom world this is how it will be.
We, us humble plebs, live in their Corporate political world not them in ours.
We are just commodities who are there for them to use and abuse.
They preach democracy and freedom at home and have no shame, at all, propping up dictators across the world and doing so for the past five decades. The, Kiev, fascist molotov cocktail police murdering coup d'ιtat thugs their latest expensive NATO adventure.
Corporate White House America:
£3 Billion corporate power. Lobbyist in the back pockets of politicians; paid to lobby the Corporate White House to buy get out of jail free cards in order to get anticompetitive favours and avoid their responsibility to the wider world community.
It's highly unlikely that surveillance would have prevented the 9/11 attacks. The Pentagon is protected from attack by a no fly zone enforced by the Air Force. Any unauthorised plane flying towards the Penthouse is supposed to be intercepted and ordered to change course. Non compliance would result in it being shot down. One or two light planes were intercepted in the months before the attack, yet on the day a huge airliner flew in unchallenged, and the planes that should have intercepted it were hundreds of miles away, and flying in the wrong direction. If they can't get that right, what chance is there that the terrorists would have been noticed.
QueenBoadicea -> derekcolmanJaitcH
Nor did it prevent the Boston bombings or any of the high school shootings, so what is it for, if not to spy on all of us thereby making our democracy a total lieThe GCHQ is the bigger enemy of the two. NO transparency, NO meaningful oversight, NO meaningful government control.Pyrrho San Pellegrino -> JaitcH
And they replicate Apple when it comes to answering pertinent questions.
The good news is that they are where they never wanted to be - front and centre of the public's attention.
Where is the legislation, or the regulation, that empowered them to steal personal pictures, including nudes, of Yahoo users. What security benefit has that served?
At least the watched, us, can take meaningful steps to make their spying harder. Use TOR, TAILS and VPN software. Clear your cookies daily (a browser setting); use SILENT CIRCLE, use PGP, and remove your SIM (and hide it) when crossing international borders. If you buy Chinese-made cell phones you are assured they don't send everything to the NSA or GCHQ.
The Terrorists/Freedom Fighter/Criminals are already changing their modes of communication, rendering much of what GCHQ and NSA redundant. Notwithstanding the fact that the key targets are going 'dark' to GCHQ and NSA, these spies continue to consume disproportionate amounts of money - all for a failing enterprise.
If you participate in lawful public protest, don't use your cell handsets, switch to MESH radio products that resist jamming and can easily be encrypted (Search for MESH network. Occupy) or look in Wikipedia for MESH.
Serval; Dovetail; Musubi; Auto-BAHN; Twimight all provide information on how to keep YOUR communications private and lock out GCHQ & NSA.
Remember, the longer they spend decrypting 'nothing' messages, their failure increases.
Remember, using social networks (Facebook, Twitter, etc.) is giving your privacy away. And feeding the database of the spies.I kind of feel like the military project that was the internet was phased into the civilian sector 20-some-odd years ago, with the explicit one-world agenda in mind. But that was high-level NWO planning. The lower level implementers and architects in academia thought it was about "freedom" and "increased consumer choice" and "communication" and "bridging divides" and "connecting the world" and other such pleasantries.
The shadow world government had other intentions: the collectivization of everyone.
It gives the shadow government a top-down view of basically the whole social grid and all of its interconnections. That's achieved through front-end services like Facebook; but also, there's a back-end "Facebook" that the public doesn't see. It's a general file on everyone's info. It's all power.
They're getting their future worker ants to self-organize and self-grid. Getting on the grid is pitched as the height of "freedom", with words like "sharing" and being "connected".
The first moron to say 'If you've done nothing wrong or nothing to hide, you've got nothing to fear', gets a massive kick in the knackers. To those people who still believe that it holds true, god help you.
jetassistedostrich -> nowwhataretheyupto
You got that right. Powerful political organizations are compiling lists of potential political enemies who's only crime is to hold, peacefully and democratically, an opposing political point of view. How this information may be used in another changed world after the next 9/11 style event, and the next "patriot act" that further removes due process, cannot be known, but I cannot imagine it will be to the advantage of any ordinary, law-abiding citizen.
The left should rejoice over the stasi controls. Ideology they have is control everything. Look at all the lefts laws. The word they live to use is control. The more control you give the more the stasi will take.
antipodes -> LeftIsShrinking
So Hitler was from the left then? I would say that we get confused by using labels that don't really fit. Tony Blair was hardly from the left while Malcolm Fraser was hardly from the right. Today's ALP is a weird and confused mixture of left centrist and right. Even the unions have their right wingers like Joe Bullock who used his corporate power to get elected to parliament.
Those creating our controlled world today are not Governments but corporations through neocons with one foot in the corporate camp and the other in politics.
Anyone who watched the Victoria Nuland tape on Ukraine should understand that it was not Obama or the US congress deciding what would happen in Ukraine it was Nuland who summoned the Vice President and to the Head of the UN to go to Ukraine to give "attaboy" speeches in favour of her chosen new leader of Ukraine.
In the USA, ALEC (the American Legislative Exchange Committee) with their powerful corporate members continue to push their model laws through the Congress and state legislatures to reduce gun controls and water down laws protecting workplace safety environmental protection.
The NSA and other state security organizations work with ALEC and the Bankers to destroy democratic protest movements like Occupy.
Tony Abbott is moving Australia towards this USA model and already has a weaker version of ALEC in the IPA. There members and employees are thick on the ground in the Abbott administration.
He is also moving to reduce the power Government and hand this power and government businesses to corporations.
Any person who wants to Australia to not be run by right wing corporations should be grateful for Snowden's revelations and be prepared to resist Abbott and his cronies in the IPA. They do not have your interest at heart.
Errr. And this is a surprise?
antipodes -> murraynho
It may not be a surprise but it is confirmed which gives those of us who care about our freedom and our right to privacy greater moral authority when we contest the states right to collect masses of information on us.
What is also concerning is that in the USA and increasingly in Australia and other Western countries those in charge of security and insecurity are private companies owned by huge powerful military industrial and finance companies that can spy on their rivals and steal their intellectual property for their own enrichment at our expense.
The information they gather can be used for blackmailing individuals to profit the security companies and to force politicians to award them more contracts.
I don't mind being spied on, so long as I don't get blown up, not a hard choice when it comes down to it.
And really, lets be honest, the CIA and mi6/GCHQ are after the bad guys, I don't think they are interested in anything apart from stopping terrorists, and if you think otherwise i'm afraid you are delusional.
Most people fall over themselves to let the world know their every move via twitter/facebook, why get so mad?
maddymilnes -> oppons
Define bad guys...imagine if an extreme right wing party were in power and what they would do with the information.
Well, the NSA and GCHQ are each receiving about 2 Tb of randomly-generated data from me each month.
Drown the fuckers.
MCA van Loenen
What is the big deal here. Only people that want to hide something especially things online should be worried. And that can only be a good thing. Away with all the secrecy!
curiouswes -> MCA van Loenen
What is the big deal here.
If you live in the USA and can read this article,, and can then tell me there is no "big deal" here, then I'd venture to say the big deal is your reading comprehension ability.
antipodes -> MCA van Loenen
Great MCA van Loenen will you kindly post all of your banking information online so we can read it and while you are at it what about your personal emails between you and your partner so we can be sure you are not some sort of sexual deviant.
It comes as no surprise that, in an inter-connected technological world, we are all subject to surveillance of some sort.
When governments use this as a means of controlling their population and people in foreign countries - as is happening - we need to ask exactly who is behind the mass surveillance and who (what state, political group, or religious group, etc) they are they working for.
Governments will - already have - attempted to use "terrorism" and "national security" as pretexts for any form of surveillance. It is unacceptable without clear explanation, democratic approval and accountability. We need to protect our freedoms.
Whistleblowers like Edward Snowden put their lives in jeopardy to inform us of what various state bodies do "in the interest of the public." They need to be protected, congratulated and valued for their bravery and honesty.
we are all subject to surveillance of some sort.
It's never ceased to amaze me that the collection of data for marketing purposes (the more efficient delivery of offers that can be either accepted or refused) is widely regarded as less acceptable than the collection of data by government for whatever purpose it may deem proper, including extreme prejudice, which amount to offers impossible to refuse.
There is, alas, much more government spying to come, as soon as they get around to it.
From Sept 11 we willingly let them do it to us .1000's of changes to laws in 100's of countries ensued .We believed the story of the war on terror . Now we act surprised that they did it . Would you expect a police officer to say 'no thanks we dont want more powerful weapons and we wouldnt use them if we had them anyway ' ?
AhBrightWings -> sunshinewestmelb
Well...that's exactly why some of us were protesting the very day the insane tautology "war on terror" (how exactly do you declare war on an abstract noun?) was unleashed. We were told we were "cranks," "un-American," "traitors," and "terrorist sympathizers." Those were the kind words.
My sister had her yard trashed repeatedly, garbage thrown at her, death threats left on the lawn, obscenities screamed at her house, and her car keyed for daring to hang a sign that kept track of the Iraqi war dead. My niece was reprimanded by the principal and threatened with explusion, at ten, for posting a picture on her locker of bombed Iraqi children, with the simply query: "What would you do if it were someone you knew? Join the peace movement." My sister's friend, an elderly Quaker woman, stood every single Saturday for ten years protesting this misbegotten war. She has been called a "fucking bitch," had trash, rocks, bottles, and dog shit thrown at her for exercising her constitutional rights to assemble and speak. She often went home bruised. My children were a toddler and five-year-old protesting outside of the White House with a million other people. My daughter returned at ten, having driven with me from Ohio to mark the onset of this insanity, and I said to my friends, fellow Salon readers that met up to protest, that I now realized there was a real chance she would mark each decade of her life in the shadow of this insanity.
So no, not all of "us" by any means are surprised by this. Some of us called it down the line exactly as it has unfolded one terrible, inevitable, absolutely predictable step at a time. Some of us even tried in futile, small ways to stop it. We were told we were wearing tin hats and were fools for the efforts.
That said, I agree with your overarching sense that it is too late. I have no idea of how-- and little hope that we can-- now backtrack, especially since the NSA revelations have not tipped us over into widespread protests, ones where those doing the right thing aren't being excoriated and alienated for holding their government accountable.
But it isn't just the mainstream media we shouldn't trust , we shouldn't trust the alternative media either. People like Alex Jones , Christopher Greene , David Icke and Abby Martin of RT's Breaking the Set are all raving lunatics in my opinion although much of what they say maybe true , I feel some of it is just to try to scare people. When people are scared the global elite have total control. So I sometimes wonder if the people I've mentioned above are just working for the elitists trying to scare us into slavery , or are they true fighters of freedom?
William Greendale -> EXILE64
The political power is in the hands of those who have the economic power, ie. the capitalist class.
Many of the alternative media seems to be against state control, but is any on them against capitalism? The state is in the hands of capitalists and that doesn't change as long as the society is a capitalist one.
It could be a good strategy by the capitalists to make people believe that they should fight against state as such and not fight for the control of state (ie. fight for the control of the means of production).
The next step is the worrisome one....where the local police start being able to use the information and sit outside your house watching your internet activity and then busting you for checking out porn based upon whether your too liberal or not for their liking. Not too dissimilar from Brazil or a Kafka novel. 10 years ago people believed it would never get to where we are now....but look at where it is.
America...Land of the Free....is actually mirroring the former Soviet Union in many of it's behaviors.
''where the local police start being able to use the information and sit outside your house watching your internet activity and then busting you for checking out porn based upon whether your too liberal or not for their liking.''
Do you really imagine that anyone would ever be interested in 'no marks' like that?
Longasyourarm -> elevengoalposts
They would if you are an elected official, or a political enemy, or maybe if they just fancy what you have.
Hoover did it at the FBI, and human nature does not change.
Ourselves, and our lives are now nothing but searchable criteria. This is a stupid amount of power waiting to be misused by anyone with access to it and the fact that people don't realise or seem to care is worrying and sad.
Credit where credit's due though, this government have done a great job stifling debate on this issue here.
From everything I have read, it seems clear that the NSA and collaborating governments, such as our own, are collecting all possible information on all citizens. This is processed in gigantic databases that can be accessed at any time. The 'legitimate' use of this system then requires an investigator, unknown and unaccountable to us, to examine someone's life record only when they have a valid reason, which must be selected from a drop-down list.
The reassurance offered by former NSA director Keith Alexander (which tacitly confirms this picture) is that these are good, responsible people, there to protect us, and they will be disciplined if they abuse the searches.
So, don't worry, everyone. The state and its foreign allies are recording the communications, contacts, movements, purchase history, library lists, and views of every man, woman and child. But it's fine, because they are not allowed to look at your life record unless they give a reason. Also, the state and all its foreign allies are comprised of good people, and only ever out to help you.
That they have the balls to tell us this with a straight face, to even suggest that this is compatible with the Constitution, demonstrates the extent of the state's contempt for the citizen, and the once unthinkable reality it has normalised.
The implication of criticisms of unconstitional mass surveilance, is that NSA's actual missions, as opposed to "preserving our way of life," are antithetical propositions. Bush and Condoleeza Rice, with ties to the oil industry, received briefs before 9/11 warning them of Al Qaida plans to use planes to attack buildings of significance in the U.S., and chose not to act to secure airports. What security-related information NSA might, or might not, have collected at that time, was obviously irrelevant to the outcome of a war on Iraq a country that did not attack us and which, at the time, had nothing to do with Al Qaida, and had not, as propagandists alleged, weapons of mass destruction.
I've seen a Facebook meme a few times that says something like 'pointing out the illegal things your government has done is itself illegal'. Is this just more Facebook crap or is it actually based on something?
William Greendale maxiboy339
Well, it might be true. I wouldn't be surprised if some anti-terrorism law said in effect just that.
Pointing out that the governement has done something illegal could be seen as hostile against the government and as such as an attack against the government and thereby "all the good people".
The feeling that those who make or impose the laws don't need to abide them is quite prevalent in our time. In the good old days people thought it was important that the authorities were law-abiding.
SinisterLord William Greendale
Reminds me of that ridiculous statement by John Sawer - Chief of MI6 in response to the Guardian's revelations:-
"It's clear that our adversaries are rubbing their hands in glee," he told lawmakers. "Al Qaeda is lapping it up.""
Scare-mongering arsewipes basically.
Andrew G Mooney
And all of this data is secure within the covert surveillance systems? How long before there's a trade with data-mining corporations and their HR departments?
Of the 40k people with security clearance to access these systems, how many are double-agents working on behalf of foreign intelligence agencies or terrorist groups?
It's amusing that most people continue with the charade of pseudo-anonymity. What people need to do is flood the internet with bogus search data and "Likes!" to render the algorithms of surveillance unreliable. It's a personal choice as to whether or not people choose to leave a valid data trail by their online activity. I'd love to see any agency try to parse my online data trail to my real-life. \
If even a small percentage adopt "Do Not Track", randomly likes things they dislike, and generally remix/mash-up their data, the corporations that complied with the surveillance state demands suddenly will have a blizzard of irrelevant data they cannot monetize. And there would be some rather amusing court cases that would establish the fact that the Interweb is already trashed. Just because somebody posts something on the Interweb, does that mean it's "true"? Do people take an oath to confirm their search history and shopping wish-lists are true?
Time for everyone to become The Unreliable Narrator. It's time to destroy Teh Interwebz, as an act of revenge. And for lulz, of course!
William Greendale Andrew G Mooney
I think that's exactly what those in power want to achieve: make us like something we dislike.
What Snowden proved id that the US Government has declared a direct war with the US Constitution in order to 'somehow' provided security. So my question to the US Government is, what are you fighting to protect?
If all this metadata collection is supposed to leave us safer then why are there so many school shootings, and mass shooting on our military bases, or the Boston bombing, Benghazi and the list goes on and on... Either the US government is spending trillions on a failed surveillance program or they knowingly allowed these horrific events to take place. Regardless of which answer is true the solution is the same, refund the NSA! Arrest the Congress members and Judges that supported it on charges of treason and prove to us that the 14th Amendment still exist by dropping all charges against Snowden.
The story here shouldn't be "everyone is being spied on" because we knew that. The story is various parties had a debate. But that's not really interesting.
What is interesting and at the same time headshakingly depressing is the decision by the German government to not allow Edward Snowden to come to Germany to give evidence before a hearing on the NSA on the basis of (unsolicited) "advice" (for that read "threat") from a US law firm that anyone in the committee who interviewed him would be effectively breaking the (US) law and would be liable to prosecution (quote: "has jurisdiction to prosecute crimes committed in Germany, Russia or elsewhere through which classified information from the U.S. has been disclosed") and, for example, might not want to step foot in the USA for fear of being arrested. The German government said they didn't want to upset commercial and political relations between the two countries.
Invent an enemy, in this case an Islamic bogeyman, to enable justification of mass surveillance. The (supposed) terrorists are not the ones the NSA and GCHQ see as a threat to the powers that be. It's really Mr and Mrs average that they feel need spied on and suppressed.
People forget that 9/11 was the start of 'preemption', adopted from techniques used by clever people in the Middle East. No longer would the West respond to attacks, it would respond to 'perceived threats'.
Preemptive strikes are based on intelligence gathering and give the user the godlike power to take out a 'potential' threat before the threat is enacted: so now we have more arrests on unfounded, unproven accusations, actions taken by 'association', and the equivalent within our own societies of drone strikes on innocent people acting 'suspiciously' with the concomitant 'collateral damage' of innocent women and kids. We have grown used to seeing it happen on our screens and told it is in our own interests.
Preemption through mass data storage makes people think that so much data cannot possibly be scanned so quickly or meaningfully and therefore is not a threat to the innocent. To understand how quickly the infinitessimal can be read, try first folding the biggest piece of paper you can find more than ten times - you quickly find it is so thick you cant even get to a hundred layers. Now realise that computers can repeat things millions of times in a second and don't have things like 'thickness' to stop them - then do the final test and do a Google search: all you have to do is put in three or four words that 'imply' meaning and you will get an INSTANT answer from the TRILLIONS of bits of data that Google hold and add to constantly every day.
Intelligence agencies obviously have the equivalent speed of filtering for their own data and can trawl every day's data for their 'meaningful combinations in an instant.
Then consider what you get from Google: you get 'weighted' information according to the commercial preferential treatment certain sources pay for to place their infommercials first. Google also tries to preempt what you are looking for by cookying your own details and using those cookies it to set your (or more probably its own) priorities.
So the intel agencies can easily do the same - they must set 'weights of suspicion' into their searches to preempt who is most likely to be those persons they are looking for.
All very well you may say, but we know that drone victims have often been zapped for merely carrying out actions that fit a 'pattern' (i.e. search pattern).
By writing this comment, I may be attributing to myself a suspicious pattern and will rise up the suspicion order. Why? Because I am intelligent and can see how things work? Because I may be informing other innocent people (who by preemption are quite likely nevertheless to be other 'suspicious characters') and I therefore need to be silenced in case the wrong people see how its done??
That is how we, as innocent observers, can very quickly and very easily get branded as suspicious by the use of automated pattern searching. Anybody who has used artificial intelligence programming will know that expert systems rarely tell the system user how they reached their clever conclusions and how just one input error can lead to a totally wrong solution to the problem. That is how drone controllers kill innocent people and that is how the types of systems now being used by all intel agencies are so dangerous without human intelligence having a full grasp of and control over all the stages of the filtering process.
So don't tell me I have nothing to fear by being an 'innocent citizen', a bystander to the new 'shoot them before they shoot you' culture so typical of the US gun lobby mentality, or CIA 'shit happens' consolation spin, and 'don't worry: what you don't know can't hurt you' political demagoguery.
Surveillance isn't security it's ideology.
The ability of secret services who operate, in part, outside of the laws we commonly understand anyway, to snoop on anybody is, well exactly what they are designed to do.
So who gets snooped on ? Generally speaking the figures show that it's just less that 500.000 per 50 million who interest the secret services. It's worth drawing on the procedures of 'neutralisation' which the Nazis applied to each country it invaded. Lists of Jews and the racially impure aside, the short lists of suspects to be neutralised usually only ran into the 10s of thousands per entire population. The list of individuals to be 'neutralised' in the event of a successful Nazi invasion in the UK was a mere 17.000 individuals. The statistics reveal that it is the minority of a population who maintain the presence liberal freedoms largely through their voice.
What do you have to do to get on the snoop list ? Well apart from the usual connections with anything political including it seems being a member of an anti-ring road pressure group, crime, vice, drugs, terrorism, illicit money , arms, slave, terrorism, contentious forms of cultural expression etc - if you stick your neck out and get noticed - if you want to be a player - if you make yourself publicly known, if you become associated with any kind of issue that comes to bare in the media, if you approach any national institution where state security has an aspect, then you are potentially a subject who needs to be looked in to.
On top of that you have to look at the political allegiances of the intelligent service personnel who may bend the law so they can examine you at close call. There're very likely to be into the fuzziness of the law that operates within intelligence anyway. On top of that they get a kick out of the power snooping gives them. Then there's always the bonus they might be sourcing a subject who needs to be legitimately watched and that kind of find creates promotion. On top of that might be a background in the military, perhaps with service in Northern Ireland along with a pathological right wing allegiances to, in the UK at least, Queen and country. In the UK the police are notoriously divided by along class lines with the Police traditionally loathing the upper middle class bastions of the Law courts and judges. This division runs through the heart of the institutions that run through British Law. Your rogue snooper is likely to belong to the upper middle class loathing / right wing / Freemason aspirant faction.
The one safe guard in the UK at least, is that paranoid secret service snoopers with nothing better to do may feel an omnipotent sense of power over individuals, even revel in a sense of actually authoring by veto History itself, but their hands are in fact tied by the 'case-live locks' which bind the results of snooping. These simple rules and procedures which control the ability of a case file to actually condemn a subject in a court of law are the difference between living in a fascist/totalitarian state and living in a free liberal state. The line that separates them turns out to be very close in deed. A simple procedure that must be followed. However it effectively castrates the omnipotent fantasies of our annoying in-house secret service snoopers and defers them to the reality of Law which in the end is often organised by the priorities and budget constraints of front line police with limited man-power and who unlike their secret service counter parts, must be seen to act strictly within accordance of the Law.
Edward Frederick -> Ezell
Knowledge is power.
Privileged knowledge is the destroyer of justice.
Egalitarian economics and politics cannot exist without egalitarian information access and processing
George Orwell will be turning in his grave
Serves us right!
We are more interested in interest rates, mortgages and footy than our own freedom
As for anybody else's freedom?
It's all about money.
The Washington-led New World Order have cynically hijacked 911 and used it as their excuse to watch and record everything we do.
It's got effectively nothing to do with terrorism, and everything to do with industrial espionage and control.
As with pursuing the mafia, one only needs to follow the money trail.
And it all leads back to big business and senior politicians in Washington (and satellite regimes).
Vocalista -> eldudeabides
With the collapse of communism in 1989, the powers that (should never) be needed a new bogeyman to continue the military industrial complex...terrorism is the new communism.
consciouslyinformed -> eldudeabides
Yes it is all about money.
The surveillance, however did not begin with 9/11; the surveillance has been in effect for many many many years. Especially more so with the advent of computers.
Try using the Internet to learn about the way science, philosophers, and other more highly beneficial groups of human beings have been able to demonstrate some of the most complex designs of the universe, and how those mysteries reveal far more important aspects of our connection to "the whole universe." That, my friend is reality. The other bs, is a fiction perpetrated by individuals whose wealth and position they pay others to be part of a demeaning exercise for further wealth and power, is their own fable. Remember, most fairy tales have horrific content, such as what nightmares are made of....
Use the knowledge that we have unfettered access to, in order to pursue loftier insight and enlightenment, and leave the head games to the head cases! Yes?
I watched the debate on the live stream provided (sad , I know ;-) )
It seemed to me, Dershowitz wanted to make the debate one of: Surveillance: for or against. He may be great at law , but he clearly knew nothing on the technical side about what these agencies do.
Although, he caught Grenwald out at one point with regards to Greenwald's point about 'Terrorism ' being just a pretext' ,Dershowitz rightly reasoned, that therefore there must be a another motive, which Greenwald couldn't or wouldn't elaborate on . Greenwald could have and shouild have brushed this off easier though.
The killer point was made by Greenwald imho, it was made at Hayden's expense. Hayden claimed multiple oversight protections are in place to prevent misuse of data. However, Greenwald rightly countered with his own question; If so many protections are in place how come Snowden walked off with all your documents, and worse, you didn't at the time (and still don't know having spent millions investigating) what he took?
What amazes me is that what we see today is not new and didn't just happen yesterday!
But the problem was that most people weren't paying attention when they should have been!
I had argued over fifteen years ago, that the Government had the ability to watch, read and listen to everything we did with the internet and mobile phones, and also pointed out at the time that because they had the ability, they were almost certainly going to utilise it! They has already passed laws that required that US computer and communication companies install back doors into equipment and software sold to foreign companies to enable them to do so and there was no reason to believe that they wouldn't use the same ability to spy domestically.
People rolled their eyes and accused me of being paranoid because no-one would believe that they would do so!
The fact that the technology, that makes the internet and these other forms of communications possible, were all born of military projects, and the Government was quite happy to give away this knowledge for civilian purposes, should have given us a clue that when they finally arrived in our homes, the technology could be used for more nefarious purposes.
And so it has.
Nothing is given away for free! There is always a price!
"What is state surveillance?" Greenwald asked. "If it were about targeting in a discriminate way against those causing harm, there would be no debate.
Well said, Glenn, as usual. and many of us agree. (As for Hayden, who would ever trust a man who says, "Trust me.")
If one really wants to know about some of the indiscriminate activities taking place in the U.S., please take a look at fightgangstalking.com "Gang stalking" (a terrible term, IMO) is nothing more than "street language" for certain counterintelligence activities that are being run by the FBI, in conjuction with other agencies, including state and local law enforcement. These "activities" are nothing more than witch hunts, in most cases) Disinformation swirls... and anyone who tries to get the attention of the MSM (or anyone else, for that matter) is quickly labeled "delusional".
So, bottom line, what we currently have in the U.S. is a Stasi-like apparatus, ruining the lives of a lot of good people. For now, these operations are running under the radar of most, but that they're a reality... is a fact. Bush and Cheney apparently decided to run with Operation TIPs, without congressional authorization, and it continues.
Make no mistake, "Operation TIPS" (with some twists) is in full swing and has been for a very long time:
[May 03, 2014] Ask Slashdot What To Do With Misdirected Email
The fact that gmail ignores dot in email address treating email@example.com and firstname.lastname@example.org has interesting security implications. The same for treating email@example.com and firstname.lastname@example.org as identical. As one commenter noted "Oh and Google needs to admit they fucked up and fix it, I'm pretty sure that guys info I got could lead to some sort of lawsuit."
Jan 13, 2014 | Slashdot
An anonymous reader writes "My Gmail account is of the form (first initial).(middle initial).(common last name)@gmail.com. I routinely receive emails clearly intended for someone else. These range from newsletters to personal and business emails. I've received email with various people's addresses, phone numbers and even financial information.
A few years ago I started saving the more interesting ones, and now have an archive of hundreds of emails directed at no less than eight distinct individuals. I used to try replying to the personal ones with a form response, but it didn't seem to help.
To make matters worse, I frequently find I can't use my email to create a new account at various sites because it's already been registered. Does anyone else have this problem? Is there any good way to handle this?"
Get a real mail account (5, Insightful)
Get a real mail account and get off Gmail/Hotmail/other free service. You get what you pay for.
Re: Get a real mail account (4, Informative)
This. Domains are cheap, and hosting/forwarding is cheap. Plus you get some level of personalization.
Also easier to remember. email@example.com is catchy while firstname.lastname@example.org is generic and easily forgotten.
Re: Get a real mail account (4, Insightful)
Exactly. This also covers the case where your ISP or Microsoft or Google does something that you can't abide by. It decouples you from your provider.
You can move to a different email hosting service or even run your own without much inconvenience. It also looks a little more professional than having a HotMail account.
Re: Get a real mail account
Absolutely. I must have avoided the melee since I domained back in '95. Gmail was interesting for porn accounts and whatnot, but now mailinator is better.
Gmail isn't good for anything anymore except privacy violations.
Re: Get a real mail account (1)
I've used my own domain for 9 years with paid hosting thru a major host. Personally I can't stand webmail and stick to traditional POP3 email and for that purpose it suits me. But it is easy enough to set up domain forwarding to services like gmail if you choose (most likely for a fee).
The nice thing about buying a domain is you can pretty much set up unlimited email addresses under the domain for any purpose you choose, or use a single email address as a "catch-all" for said domain. Web services like Facebook won't know and won't care.
As for specific hosting recommendations, they are all about the same in terms of terrible service and support, but I encourage you to research and decide for yourself.
Re: The only plausible solution... (0)
Is to change your name
You'd be surprised at the amount of misaddressed email I get at Montague.Cornelius.Blunderbuss@gmail.com. It's rather astonishing, I do say.
Re:Abandon Your Real Name (1)
As for the rest of your problem, just set up a second Gmail address with a nonsensical middle name (first initial).turnip.(common last name)@gmail.com and have it forward to your "real" gmail address. Problem solved.
This is actually a good idea even if you don't have the problem that the original poster had. I created a new gmail account with that general idea a little while back which I use for things like online retailers. It makes it really easy to filter those emails out of my personal inbox, which can be a pain sometimes otherwise.
The email@example.com addresses would let you do something similar, but they've got a couple serious drawbacks -- many (in my experience, probably "most") websites will reject an email address with a + sign, and also it exposes your actual personal address. Using a separate gmail address solves those.
I do wish that Google would come up with a proper disposable email address solution.
This. As for misdirected email, i had a similar problem a couple of years back when someone decided to use my email (no real name) for his facebook account. As it seems email confirmation is optional and the guy made a full profile, added friends etc xD
gmail plus sign postfix
Well, I have a solution to your "email has already been registered" issue.
Gmail will treat firstname.lastname@example.org as the same address as email@example.com, both will go into the firstname.lastname@example.org account.
Give the site an email address with a plus sign postfix like that and it should detect it as a new unique address.
Some sites don't allow the plus symbol in email addresses (even though it's a valid character), so mileage may vary.
Re:gmail plus sign postfix (2)
MANY sites don't allow the plus symbol in email addresses (even though it's a valid character), so mileage may vary.
Seriously, having used "plus-addressing" for many years, I can attest to the fact that many websites won't accept it.
I know of one site where I did register years ago, but their de-registration page won't accept the "plus-address" that I used to register (rakuten.com, I'm looking at you).
Yes (4, Funny)
Yes, I have this exact same problem. However, I do not keep other people's e-mail.
I have been able to track down the correct people to whom the e-mails belong. In two cases, the people are lawyers and the e-mails contained either personal or confidential information.
Another case is a general contractor, and I've received quotes from subcontractors, blueprints and general correspondence.
In one case it was a confirmation of tickets for a theme park. (I debated showing up as soon as the park opened and claiming the tickets, but ethics got the better of me.)
These people now reside in my address book. I forward the e-mail in question over to them, and CC a copy to the sender.
What is the problem?
To make matters worse, I frequently find I can't use my email to create a new account at various sites because it's already been registered.
Why not make a password reset for them (unless they have "security questions") and change the email? Then you can create your own account. It is not your problem that some hobo can't enter their own e-mail address when registering accounts.
As for the unwanted email, tell the sender politely that they have sent personal/confidential information to you, an unsuspecting third party with a similar address. Then throw any future mail from them away. I have gotten some mail like this, but they all rectified their mistake and stopped sending to me. If they wouldn't, it isn't my problem (apart from pressing the "junk email" button in my MUA).
Even worse: Facebook does not validate e-mails (0)
So I got somebody else's Facebook notifications. From time to time, I get some e-mail from Facebook stating the e-mail address has not been verified (with no description on what to do if you are not the intended recipient). I hoped this situation would die with time, but it is already five months since I got the first e-mail.
At some stage in the past, I also got some e-mails from ebay about a seller and a buyer discussing transaction e-mails. These ones did actually die.
In both cases, the e-mail account the messages should go was not the one I tend to give out. Google allows for different spellings on the same account. Your e-mail account may be achieved by following permutations:
And this is not a bug, it is a feature.
I have the same problem (4, Funny)
I use my first initial+last name as my email address and get mail destined for a half dozen people. One person is an elderly gentleman in the midwest, I've given up any hope of getting him to stop giving out my email address. I only get a half dozen or so a month so it's not too bad.
I usually send a form letter to emails where it looks like a person might read the response (as opposed to newsletters, etc). For those emails where I don't think a human will read the response, I usually just hit the Spam button, unless there's a quick and easy to find unsubscribe link.
Sometimes when an email has a signature that says that if I receive a copy of the email in error I must delete all copies, in my reply, I ask whether they want to work on a time and materials basis or a fixed price $500 contract for me to track down and delete the email from all devices that it may have been delivered to (having emails go to a phone, tablet, several computers, imap download + backup means a fair amount of work to find and delete it everywhere). So far none have been willing to pay. I wonder if I could accept their demand to delete all copies of the email as implicit authorization to do the work and then bill them for the work.
I like mail redirectors. Everyone but true spammers will respond to you redirecting all the mail from their domain back to the support address for that domain. Preface it with, "you must have lost this, I am helping., HERE" And resend the email. Maybe twice to make sure it isn't lost. Works every time.
me too (0)
my gmail is email@example.com and i have this problem all the time. i have on occasion looked up the person using my email by searching the phone book for people with my name around the address of the local businesses and people that frequently email me... usually it appears the people are 60+ but when someone used my email to start a twitter account it was someone in his 30s based on the picture he used on the account. i did like someone above said and used email based password reset and posted on the account that the person was using the wrong email address and that the account should be removed from their friend list or whatever twitter does.
in general i am really annoyed by the email i constantly get, though the other week i did get some tickets to an indoor trampoline place that sounded fun... sadly the place was 2500 miles away. most the people using my account i think are leaving off the random number or swapping out a _ for an inconsequential . that leads me to getting their emails.
I have the same issue (0)
I have had several emails from job applications to registrations on shopping sites to my gmail. I reply telling the person that they have contacted the wrong person, and advise them to contact the intended recipient by another means.
I once got a schedule for a church rota for somewhere in the states, and when I replied saying I wasn't the person in question they asked me to forward it to them! I'm not quite sure how they expected me to do this.
This misaddressing of emails is probably really confusing the NSA email contact database though.
Had this issue (0)
Someone was registering for sites using my GMail address without the dot I use. They registered for a site and an email came through confirming their details, including phone number.
I phoned up and asked him politely to not use my email address.
He accused me of hacking his account he has used for 2 years.
I explained I have had the account since GMail was 'invite only'.
Got swore at loads, so hung up and set up a rule so that mail without the dot is ignored and trashed. Problem solved!
Re: Had this issue
For what it's worth, GMail treats all e-mail addresses that are identical other than dots as the same e-mail address internally, so firstname.lastname@example.org, email@example.com, firstname.lastname@example.org, and email@example.com are all going to be the same account.
I've noticed that forum spammers like to use that trick to get around "each account must have a unique e-mail" settings on certain types of forum software.
Unsubscribe or filter (1)
I have the same problem. There's at least two dozens distinct individuals who have had emails erroneously addressed to my inbox.
For automated emails that offer an easy link to unsubscribe or dissociate my email address from that account, I use the provided link. Those are pretty easy.
Sometimes people register for paid services that send a monthly bill and it comes to my email address. They may or may not be of English origin. For these, I just add a filter or rule to my email provider or client to just delete them or move them. Communicating with someone, possibly in another language, possibly requiring lots of bureaucratic red tape, is not really worth it. If they care about it enough, it's their responsibility to fix it.
The most annoying case is when a large group of friends start an email thread with a whole bunch of different people in the "to" or "cc" field. Asking them to correct the email address is pretty much an exercise in futility, since all it takes is one person to hit 'reply to all' and your email address is back on the thread. For these, I just block every recipient on the thread.
I've never had the problem of someone already having registered my email. One way around it would be to set up another email address that just forwards to your actual email address.
Yep, I have this issue
1) If I can track down the person, I try to contact them and let them know they have they're using the wrong email
2) If it's a real person sending the email (like when one person have out my email for his house refinance stuff), I email the person back asking them to contact via phone or whatever the person and tell them they have the wrong email address
3) If a person in #2 does so and i keep receiving new emails because the person doesn't learn, I ask someone again like in #2, though this time I recommend they they stop doing business with, or throw out the job application, or whatever because the person is so stupid that they can't even figure out their own address
4) I've been know to find the person via their relatives and ask them to inform the person that they're using the wrong email
5) For sites where registrations were done, I simply go to the site, click Forgot Password, get a reset, go in, and change the information so it's no longer to my email address. Often I change the address to STOP+USING+[MY+ADDRESS]@gmail.com. Sometimes logging in to the account has the benefits of getting me their address and/or phone number to contact, which I've done.
6) In cases where I've changed the email address and they've had tech support change it back to mine, I go back in to the account and change ALL the info to mine, so now it become my account and they can no longer use it or get any access to it.
I've just been dealing with this (1)
I use a personal domain for my actual mail, but have accounts at all the major free mail sites too, just for spam or whatever.
I started getting mail to my Yahoo account which wasn't spam, but clearly not for me, as part of a group of people participating in a medical imaging conference. For a while I just blew it off, but eventually the organizer mailed my actual non-yahoo address by mistake as well. So I decided to be swell about it and let her know that I'm not the person she's trying to reach. She said "Oh, I'm sorry, I meant to do (yourname)@yahoo.com, thanks!", and so I told her "well no, that's also me, sorry". I proceeded to tell her an address which would work for her intended recipient (work email for the person she was trying to mail, who isn't me).
Basically she refused to believe she has been sending to the wrong address, and said "I had no idea two people could have the same email address, I guess Yahoo must allow it or something". At that point, I gave up and just let it go again. It's not high-volume enough to matter.
Me too (1)
They can't reply or get your reply because they can't log in, I went so far as to track one person down via an ad sent to them, I have also received someone's complete information, SSN, etc. In the end I just drag them to the trash.
Oh and Google needs to admit they fucked up and fix it, I'm pretty sure that guys info I got could lead to some sort of lawsuit.
Happens to me a lot with my own domain (4, Insightful)
I own a very short domain name where the first part of the name is the same as many organization's name.
e.g., if it was example.com then others have example.co.uk or exampleinc.com etc and I get a LOT of their email because I wildcard my domain for email and people just assume that example.com will work
As I get them, I add a postfix rule to reject that specific username but I still get stuff, including very confidential stuff.
I haven't advised these organizations because I fear they'll just turn around and try to dispute to get my domain or accuse me of criminal interception or whatever. So I just delete them and they can wonder why they never got a reply.
Rule #1: "Email is not a guaranteed service."
Rule #2: "Email is not secure. Stop sending confidential stuff through it"
Get your own domain name (1)
I had various problems with email address collisions as well. Then when I had to change ISPs, I decided to get my own domain name. It's a little different when you own your own email address. If you register a domain, you can be firstname.lastname@example.org or such. Then you just forward from your actual email host to the registered email address. It's only a few dollars a year. Then YOU decide who gets an email address for your domain, and you can have whatever policy you want to avoid collisions.
bah, you guys are no fun (2)
Y'all are missing out on a good time.
I have a gmail account with the first name dot last name set up. As you can imagine I get quite a few messages for people who forget to tell their friends about their middle initial. However from context, I can often tell which of my name-sharing buddies the email was intended for. Over the years I have actually gotten to know a couple of them, which is fun.
I don't bother trying to tell the senders about the mistakes, they usually do nothing, oddly. The recipient, however, tends to get on it effectively.
It's quite interesting do talk to them. What's in a name?
Worst is Barnes and noble, nook
They won't take your email address off if some uses it by mistake, you are stuck getting perpetual updates
This happens to me a lot, too
A few months back, I received an email on my Gmail from the agent of an NFL player. The agent was apparently looking to help his client negotiate a contract, and conveniently attached a draft of said contract. I went and updated the NFL player's Wikipedia entry stating that he was going into free agency and looking for a gig. Hey, I could have done a lot worse, like placing bets using inside info or something.
Many, many years ago, I had the screen name "File" on AOL. There was some sort of ancient productivity suite (maybe Notes, or 123, or something) where you would cc a message to "file" in order to keep a local copy, and many AOL users presumed their email service worked the same way. Oh sweet Christ, the things that landed in my inbox there over the years..
Haven't had this issue with GMail, but with other (2)
My GMail (and Yahoo! as well) username is (first name)(middle name)(last name), all fairly common [in fact at my current employer there are multiple matches of (first name)(last name), and my father has the same (first name)(last name) as well], and I have not had this problem with either service. Perhaps using initials instead of full names is part of it; or your last-name may have different demographic connotations.
I did, however, recently have that problem with a Comcast account. When the tech visited our home for installation, he created an account (first name)(last name) @comcast.net . I didn't actually give it out anywhere, yet within a few months it was filled with a hundred or so messages for someone in another state. I did try responding to one item that seemed moderately important, and whoever got the response [the help-desk of some organization] didn't seem to grasp that I had no connection with the intended recipient. Since I hadn't advertised it anywhere, it was easy to change the username, to (my first initial)(wife's first initial)(my last initial)(wife's last initial)(string of digits) @comcast.net. While this address appears to have been reused, apparently Comcast no longer allows address reuse; I tried using a previous ID that I had used a long time ago, and it was not available.
Since you ask for advice, I recommend two courses of action:
1. As long as you still have access to that address, when you receive anything that is clearly misdirected and potentially of high value, deal with it politely. Don't use a "form response", instead personalize the response to the content of the message. CC the intended recipient on the response, if you are able to divine who it is. Once you've dealt with the matter, delete the whole thread. For newsletters, try following an "unsubscribe" action, if that's not available mark as spam.
2. Consider an exit strategy from your current e-mail address, no matter how much is attached to it. See the Google help posting "Change your username". For the new address, try a long nickname or full first name instead of first initial; or maybe add a string of numbers, a city your contacts will recognize, or a title. Give your important contacts plenty of advance notice, post the new address with the reasons you're switching [perhaps with a list of the confusing other identities as well] on your "old" Google+ profile. After a reasonable time (say six months or a year), delete your old account. Make sure you change your address at all the "various sites" you've registered at before doing so, in case you need to use a password reset function.
Periods don't count (0)
Also, note that the periods in your name don't make any difference. Email addressed to Something.Else@gmail.com, Some.ThingElse@gmail.com and SomethingElse@gmail.com go to the same mailbox.
... If you are certain that everyone will use the periods just as you specified then it is pretty easy to add a filter which separates the mail into different folders based on the position of the periods. That can automatically filter email addresses that aren't formatted to your liking.
[Apr 13, 2014] NSA Exploited Heartbleed Bug For YEARS, Leaving Consumers Vulnerable To Attack
April 11, 2014 | Washington's Blog
Top computer and internet experts say that NSA spying breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by for example creating backdoors that malicious hackers can get through.
Remember, American and British spy agencies have intentionally weakened security for many decades. And it's getting worse and worse. For example, they plan to use automated programs to infect millions of computers.
NSA also encourages large internet companies to delay patching vulnerabilities, to allow the NSA time to exploit them. See this and this. In other words, the NSA encourages companies to allow vulnerabilities to remain unfixed.
You've heard of the scary new "Heartbleed" computer vulnerability?
The NSA has exploited it and kept it hidden from consumers and security experts for years. Bloomberg reports:
The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said.
Heartbleed appears to be one of the biggest glitches in the Internet's history, a flaw in the basic security of as many as two-thirds of the world's websites.
Putting the Heartbleed bug in its arsenal, the NSA was able to obtain passwords and other basic data that are the building blocks of the sophisticated hacking operations at the core of its mission, but at a cost. Millions of ordinary users were left vulnerable to attack from other nations' intelligence arms and criminal hackers.
"It flies in the face of the agency's comments that defense comes first," said Jason Healey, director of the cyber statecraft initiative at the Atlantic Council and a former Air Force cyber officer. "They are going to be completely shredded by the computer security community for this."
[Apr 07, 2014] The NSA Spying Machine An Interactive Graphic
April 03, 2014 | Businessweek
With every new leak from Edward Snowden's bottomless trove of pilfered documents, it gets harder to keep track of all the bizarre ways the National Security Agency has cooked up to spy on people and governments. This may help.
Data in Motion
NSA's spies divide targets into two broad categories: data in motion and data at rest. Information moving to and from mobile phones, computers, data centers, and satellites is often easier to grab, and the agency sucks up vast amounts worldwide. Yet common data such as e-mail is often protected with encryption once it leaves a device, making it harder-but not impossible-to crack.
Data at Rest
Retrieving information from hard drives, overseas data centers, or cell phones is more difficult, but it's often more valuable because stored data is less likely to be encrypted, and spies can zero in on exactly what they want. NSA lawyers can compel U.S. companies to hand over some of it; agency hackers target the most coveted and fortified secrets inside computers of foreign governments.
Where the Data Goes
Much of the data the NSA compiles from all these efforts will be stored in its million-square-foot data center near Bluffdale, Utah. It can hold an estimated 12 exabytes of data. An exabyte is the equivalent of 1 billion gigabytes.
[Jan 02, 2014] Your USB cable, the spy: Inside the NSA's catalog of surveillance magic
Dec 31, 2013 | Ars TechnicaOld_Fogie_Late_Bloomer -> Ars CenturionReader FavIt's not like this comes as a surprise, as such (as with the initial revelations, you always suspected SOMETHING like this could be going on) but to see it confirmed, and to get a sense of the breadth of it all...Seriously, it's enough to make me profoundly reevaluate the role of technology in my life.
I had to chuckle a bit, when I read about the Huawei injection. Obviously the government knew what they did, when they blocked Huawei from official contracts. They knew those products were vulnerable because the NSA did it! Five years ago!
PlisskenArs -> Centurion
This is bad. I guess I need to rethink my stance on companies like Cisco blaming the NSA revelations on their declining sales overseas. I thought it was largely overstated -- at least at this early stage -- but now? How could any foreign corporation feel comfortable purchasing technology from a U.S. vendor? Whether these vendors are cooperating directly with the NSA or not doesn't seem to matter anymore.
See, this sort of targeted surveillance is the kind of thing I'd expect the NSA/GCHQ/et al to be developing. It's the mass dragnet capture of data that is objectionable, both on grounds of the obvious human rights abuse, and of it being a large expense that has - with all evidence available thus far - produced absolutely no results.
cdclndcArs -> Praefectuset
An implanted wireless device is the NSA's go-to approach for dealing with "air-gapped" networks-networks that don't have an Internet connection for security reasons.
Sometime in the past I was responsible for signing off on situations such as described in the quote. Not only were the networks not allowed to have an 'Internet connection' but the possibility of inadvertently having one was removed as well. Anyone with a bit of tech knowledge can disable a gateway many different ways, but we had to lock things down enough that someone couldn't accidentally do so much as plug in a cable to a live network (physically lock down access, physically disable radios, lock down IPs and subnets so as to be unusable the general LAN if by some means someone had a 100' Cat5e cable and zero common sense, on and on...).
Radios in the USB cables? That really got me there. It's not something you can readily look for without an RF Spectrum Analylizer and jumping through so many hoops as to be impracticable and wasting countless manhours. Clever scary that. While signing off on that is not part of my job at the moment, I'm really not sure how to handle that now in good conscious after these revelations.
I once worked with a guy who always talked about how he worked in a Faraday cage when he worked for one of the big government contractors, I don't remember which one. I always thought it was a little overboard, but seeing this now, seems like they probably knew about some of these things and had the right idea.
For example, one collection of BIOS hacks called the "MONTANA" family (SCHOOLMONTANA, SIERRAMONTANA, and STUCCOMONTANA), was designed to target Juniper Networks routers using the JUNOS operating system-a FreeBSD derivative.
I wonder if the updated version is called HANNAHMONTANA?
Well folks, unless you think a dystopian future of 1984 surveillance is a sustainable and productive future for humanity, it looks like We The Peons need to burn these motherfuckers down. I'm not just talking NSA, I'm talking ALL of them. They won't stop this shit until we physically destroy the means.
Seriously, corruption will be the end of our species if we can't get a fucking handle on the difference between productive and counterproductive activities, which can also be generalized as growing/making things, versus preying on each other. Replacing fossil fuel energy would be a good example of a productive human project with a high sustainability value.
For me, these revelations are now starting to go too far. Although as someone said it's not necessarily Snowdon that released this.
Revealing that the NSA / GCHQ routinely tapped most peoples email and social media to understand the connections is completely fair game for whistleblowing - that is mass surveilence.
Like others who have already posted however this sort of targetted spying is exactly what I expect spys to do.
If we get angry about this then there's a risk we lose the chance to fight back on the things that really are overkill.
"New corporate policy: All new hardware to be reflashed with manufacturer's firmware upon arrival"
We're going to need signed open source code, with a live distributed verification / trust checking scheme (so no single entity can publish fake signatures). We have every reason to NOT TRUST everything we can't see and inspect ourselves. Of course, if companies want to do open firmware, great, I'll be glad to buy.
Google matched content
Oldies But Goodies
[Dec 01, 2017] NSA hacks system administrators, new leak reveals
[Nov 08, 2017] Learning to Love McCarthyism by Robert Parry
[Sep 23, 2017] Welcome to 1984 Big Brother Google Now Watching Your Every Political Move
[Sep 18, 2017] Google was seed funded by the US National Security Agency (NSA) and Central Intelligence Agency (CIA). The company now enjoys lavish partnerships with military contractors like SAIC, Northrop Grumman and Blackbird.
[Jul 29, 2017] Ray McGovern The Deep State Assault on Elected Government Must Be Stopped
[Nov 12, 2018] Obama s CIA Secretly Intercepted Congressional Communications About Whistleblowers
[Aug 22, 2018] Facebook Kills "Inauthentic" Foreign News Accounts - US Propaganda Stays Alive
[Mar 25, 2018] Cambridge Analytica Scandal Rockets to Watergate Proportions and Beyond by Adam Garrie
[Feb 23, 2018] NSA Genius Debunks Russiagate Once For All
[Feb 22, 2018] Bill Binney explodes the rile of 17 agances security assessment memo in launching the Russia witch-hunt
[Jan 24, 2018] The FBI Hand Behind Russia-gate by Ray McGovern
[Jan 22, 2018] If Trump is an authoritarian, why don t Democrats treat him like one? by Corey Robin
[Jan 02, 2018] The Still-Missing Evidence of Russia-gate by Dennis J. Bernstein
[Dec 28, 2017] How CrowdStrike placed malware in DNC hacked servers by Alex Christoforou
[Dec 28, 2017] From Snowden To Russia-gate - The CIA And The Media
[Aug 16, 2019] Ministry of truth materialized in XXI century in a neoliberal way by Kit Knightly
[Aug 16, 2019] Lapdogs for the Government and intelligence agencies by Greg Maybury
[Jun 30, 2019] Orwell s 1984 No Longer Reads Like Fiction It s The Reality Of Our Times by Robert Bridge
[Jun 11, 2019] The Omnipresent Surveillance State: Orwell s 1984 Is No Longer Fiction by John W. Whitehead
[Jun 02, 2019] Somer highlights of Snowden spreach at Dalhousie University
[May 08, 2019] Obama Spied on Other Republicans and Democrats As Well by Larry C Johnson
[Apr 21, 2019] Whenever someone inconveniences the neoliberal oligarchy, the entire neoliberal MSM mafia tells us 24 x7 how evil and disgusting that person is. It's true of the leader of every nation which rejects neoliberal globalization as well as for WikiLeaks founder Julian Assange
[Mar 17, 2019] Mueller uses the same old false flag scams, just different packaging of his forensics-free findings
[Mar 07, 2019] Are you ready? Here is all the data Facebook and Google have on you by Dylan Curran
[Jan 08, 2019] No, wealth isn t created at the top. It is merely devoured there by Rutger Bregman
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Haters Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|You can use PayPal to to buy a cup of coffee for authors of this site|
Last modified: March, 29, 2020