You must log in or register to comment.

tomistruth t1_j4fj56q wrote

Real title should be; "NSA asks Republican held congress to pass bill allowing unauthorized monitoring of US citizens and wants money to hire fulltime citizen spies."

Nothing to worry about. Go on folks. Watch Friends or The Office or Games of Thrones whatever. Democracy and privacy is not at stake. We are just realtime collecting all your emails and passwords.


Adbam t1_j4gt9lu wrote

Congress isn't held by the Republicans, only the house is.


nicuramar t1_j4ifwkx wrote

> Real title should be; “NSA asks Republican held congress to pass bill allowing unauthorized monitoring of US citizens and wants money to hire fulltime citizen spies.”

The real title should be neither that or what it is, since they are both clearly biased. Instead, it should state as plainly as possible, the facts. Opinions and analysis can follow, as long as it’s separated from facts.


tomistruth t1_j4ih7d8 wrote

We are far past the point of no return of good journalism. Journalism is dead. We are at the "Please don't get worse." stage where damage control can only be done, if the forces fighting corruption are more vocal than those commiting crimes and corruption.

So yeah, fuck neutrality.


Not_the_brightest t1_j4iimn2 wrote

Real title should actually be “NSA asks Republican held congress to pass bill allowing unauthorized monitoring of US citizens they are currently illegally doing”.


CaptG33ch t1_j4guyon wrote

"Friends or The Office or Games of Thrones"


WTWIV t1_j4f8kmb wrote

I love it when an article ends with a zinger!

> More broadly, the OIG seems to want the DOI to develop a security posture that's less fly-by-night crypto space fintech startup, and more federal government agency with an $18.1 billion dollar budget.

Also, in response to the next quoted section below: we could start by bringing in the manufacturing of all IT infrastructure “in-house” so there’s less risk of secret back doors to get through routers and firewalls.

> The US Department of the Interior's mission is to protect America's natural resources, but it might have a hard time doing so if its systems remain as unsecured as a recent Office of the Inspector General report uncovered.

>There's no better way to relay the conclusions than the report itself: "We found that the Department's management practices and password complexity requirements were not sufficient to prevent potential unauthorized access to its systems and data," the OIG said [PDF].


fellipec t1_j4ft3t8 wrote

Like they aren't doing that or would stop doing that


SeroSeren t1_j4hgr6o wrote

All of the big tech platforms are and share it with each other. They only need access to one.


be-like-water-2022 t1_j4fpvgr wrote

Rights aren't rights if someone can take them away. They're privileges. That's all we've ever had in this country is a bill of temporary privileges. And if you read the news even badly, you know that every year, the list gets shorter and shorter and shorter.

George Carlin


cryptoderpin t1_j4gaw1r wrote

And that’s why I stopped caring. I don’t do what’s “asked of me” and troll that bitch all the way down.


Captn-Bojangles t1_j4flk3m wrote

Nope! Don’t trust the NSA. Ed knew what they are doing to the citizens of the US.


Worsebetter t1_j4g3xbh wrote

They already do this. Look at the idaho murders. They somehow pulled his anonymous comments from a defunct social network when he was a teenager. How does that happen? And they did it fast.


Wwwweb t1_j4gsex6 wrote

OSINT is a thing.

A lot of stuff is on the internet archive, including tapatalk, and I'm sure that various projects have indexed that data by whatever identifying information there is. Email address, for example.


zerosaved t1_j4izn7q wrote

And the government hires firms that specialize in being able to filter out noise from big data to find exactly what they’re looking for and all associated digital trails, for example, Palantir. They can pull all of your data and internet behaviors and patterns and create a timeline spanning years with granular access down to the seconds of each day. And they could do that all before even being given the go-ahead to access your “protected” data.


dratseb t1_j4gninz wrote

Wait what? I thought they tracked him by watching camera footage of the area and getting his license plate. Do you have a link?


Worsebetter t1_j4gnws5 wrote

I mean that happened also - outside of the internet


NoPossibility t1_j4go29m wrote

Don’t know about the OP’s topic, but I will say I’ll be surprised if they didn’t know who it was in the first day by cell phone data alone. He supposedly turned off his phone during the murders, but many cell phones still transmit when “off”. I wouldn’t be surprised at all if his location was shown as being in the house by non-essential transmissions while in an “off” mode, but the cops are keeping it quiet that they can track a phone this way.


dotjazzz t1_j4h2nwf wrote

You keep digging that hole, you'll end up the dark side of the earth. Radio transmission isn't rocket science, it can be easily detected, dumb ass.


NoPossibility t1_j4h76bm wrote

It’s not some brain dead conspiracy theory. The NSA and CIA were using this kind of technology way back in 2004. Imagine what they can do today.

And it isnt just cellphones that could’ve given away the location. Health devices like step counters, headphones, etc can sometimes record location data that gets reincorporated to a device’s location history when the hub device like a cellphone is reconnected. There are many ways to piece together meta data from someone’s devices to paint a complete picture of who they are, where they are/went, and what they were doing (ie, stopped in front of a store display for 20 seconds facing west). Any number of these could be pieced together to identify who was likely in the house.

If he government wanted to hide their methods of discovery (which they’ve been known to do), they could easily piece together the map and say they found evidence of the car passing a banks cameras to justify their investigation pattern without revealing their true method of discovery.

When the San Bernardino shooter’s phone was capture, it was widely reported that they had a back door method to break into encrypted phones but didn’t want to reveal it. They pressured Apple to break open the phone for them and got rebuffed. Then soon after they revealed an Israeli company was able to do it for them, and they got the data they wanted. All of the legal pressure on Apple was an attempt to hide that they already were able to open it but didn’t want to admit it publicly. But they also didn’t have a solid legal/public way to have gotten their information and needed a cover story.

Same happened with Wi-Fi/cell signal hijacking. Government would set up fake cellular hot spots to hijack radio signals and rap lines and location data.

Now this is extremely unlikely to have been used in a rural Idaho town with no recent murders. But it illustrates that the technology to track a device is very advanced, sometimes not documented or intended by the handset manufacturer, and the government often attempts to deceive the public to hide their methods so they can continue using it as long as they can without public outcry or the arms race of encryption and behavior changes among people who may conduct criminal acts.


dratseb t1_j4hg4zu wrote

Oh yeah, the military was setting up fake cell towers in Afghanistan to catch terrorists. I’m not surprised at all the government was doing it to citizens.


technofuture8 t1_j4j0ci0 wrote

From what I understand they caught the dude who killed the Idaho girls because he left behind a sheath for his knife and from the sheath they were able to get his DNA????


rex8499 t1_j4gzvdm wrote

"please authorize us to do what we're already doing."


cryptoderpin t1_j4gaomf wrote

Again, they stopped??


metarx t1_j4gmhjf wrote

Right? I don't think they stopped what Snowden "alerted" us too, where was the law that made them? Never happened


cryptoderpin t1_j4gmydf wrote

Even if there was a law against it, they would just John Yoo that shit with some new language to circumvent whatever.


metarx t1_j4gn38g wrote

Right, laws mean nothing if not enforced, something entirely lacking


cryptoderpin t1_j4gqvkq wrote

All laws end at the barrel of a gun. Why stop at stealing everyone’s information and violating your fourth amendment right when there are no consequences from the people.


FPOWorld t1_j4i9pbh wrote

The argument that they’re doing this to protect us from terrorists fell apart on Jan. 6th.


SoftwareMaven t1_j4omo7f wrote

I mean, if anything, that would be an argument that they really aren’t surveilling US people, which the NSA is (supposedly) not allowed to do. If they had warned us about it, it would be direct proof they were spying on us.


FPOWorld t1_j4ori82 wrote

This would be a good point if nobody on Jan 6th had ties to any foreign targets (not a single person?) and we didn’t know they were already using it to spy on US citizens.


Aboxofphotons t1_j4hwoz8 wrote

When has any American authority ever given a fuck about the safety or privacy of it's people?


gerberag t1_j4h429i wrote

That hasn't stopped.

They just want to be able to use and share the data with agencies outside the NSA.


n3w4cc01_1nt t1_j4h78d9 wrote

as long as they promise the secret service and dhs don't go on a cat food and glue bender then have an animal house party in dc after killing 6 cops


Eurotrashie t1_j4ilv9i wrote

Seriously, like the NSA ever stopped. They did it before and they are doing it now.


Sajun t1_j4iocgg wrote

as if they ever stopped


Khalaio t1_j4h2jty wrote

The funny thing about this 1984 shit… no one wants to do the surveilling, just get the bonus, hold their power position, and enjoy their… redacted ;)


Gildenstern2u t1_j4hq2yj wrote

I’m gonna have to make sure I take more selfies of me grabbing my own nutsack.


trisul-108 t1_j4k6vak wrote

I think there is a huge public misunderstanding of the technology. Technologically, the only way to obtain data on terrorism and cyberwar attacks is to collect it all the time. How the data is processed is what needs to be regulated in a democracy.

Russia is collecting all the data they can get about us. Even TikTok is spying on our children and their parents. And somehow, no one is bothered that the Chinese military has this data about us. Slowly, China and possibly Russia are gaining an advantage over us, because we do not know how to regulate spooks in a democracy ... they don't need to regulate, they just collect everything they can.

When Russia starts using cyber attack to disconnect our civilian infrastructure: electricity, water, heating, communications, transport, traffic etc. it will be too late to start collecting data.

Yes, we need oversight, absolutely. But the proper agencies also need the data. Oversight needs to be setup on how it is used. As it is, civil society is saying "if they have no data, they cannot abuse it". This is no longer a viable strategy and China and Russia are preparing to wage war against us, a war that will initially be cyberwar, because everyone is nuclear.