“His response was to fight it with the only weapons at hand—passive resistance and open displays of contempt.” ― Kurt Vonnegut, The Sirens of Titan


Long before the mess of hydra tentacles and poison pots and wall-to-wall internet surveillance, there was the FBI’s Carnivore program,  the “unfortunately named” program that turned internet connections into swamplands of slowness, every time it took a bite out of a citizens time. Unlike today’s nefarious, hiden, and very thoroughly plausibly denied, Carnivore was as it’s name suggested: a crippling, internet death of your connection as it pawed over your cyber bits and bytes.

Carnivore was so inept that even amateur internet watchers could observe it in action. The FBI and the NSA etc., used Carnivore more as a tool of nascent experimentation into “what can we get away with” than anything else-it was that gruesome.

And, with Carnivore, they targeted individuals, carefully abusing human live in secret; using people they deemed unlikeable, to build ‘human needles,’ whose browsing habits, personal details, and other things were placed into the thing we know today as “the haystack.”

Build IT and They Will Come: How the NSA used Carnivore to create targeted online speakers, and then, targeted them with next generation privacy invasion tools.

But first-came Carnivore


These days, with the internet a virual hunting grounds where agencies stalk and target citizens, often like ducks in a barrel-that they put in the barrel In the first place ( or, as the NSA-SSHATS like to say ” first, you build the needle, then you build the needlestck. Then, you add hay”)

They route, redirect, and ruin  machines with malware in milliseconds, or envelope users, and whole towns in Fake Google, Carnivore’s ability to simply slow your connection to mind meltingly minute long speeds, seems so quaint, and kind of pathetic, and cute, like a puppy: all teething, no tooth.

A Blast From the Past: How the FBI Gave Senator Patrick Leahy a 16 Year Long Hand Job, as it Worked with Corporations, and other Alphabet Agencies to Build the Infrastructure of Total Mind Messin’ and other-as-yet-disclosed-mayhem.

Senator Leahy. Thank you, Mr. Chairman. We talk about ISP’s

and URL’s and all this new language of the Internet age that

Mr. Cerf and others gave us. And I thank you most of the time,

Mr. Cerf. There are days when connections are slow when I

don’t, but that is not your fault.

What we are doing here actually is carrying on a 200-year

conversation about how we assure the rights of the American

people, the rights of all of you, the rights of me and the

chairman and everybody else to be secure in their persons, in

their houses, in their papers, and their effects, secure

against unreasonable searches and seizures. That obviously goes

back to the Constitution’s Fourth Amendment.

Back at the time of the Framers, you gained access to a

person’s private effects by being there. You were going to find

out what was in somebody’s desk drawer by walking in the house

and opening the desk. You were going to find out what papers

they had in their inside pocket by searching them and searching

their inside pocket. It is a lot different today. You can be a

mile away or 10,000 miles away and search information about

most families, certainly those who have computers and are on

the Net.

This is really the concern that I have. On the one hand, I

ask the question, are we dealing with a legitimate surveillance

tool in a cyber age when we know that criminals can move

billions of dollars electronically; when terrorists can plan

damage from a point on another continent to a residence or a

warehouse in the United States; when a kidnaper can deal with

somebody in a different State, or where a child abuser can seek

out a victim hundreds of miles away. But on the other hand, is

this surveillance something that goes way beyond what we the

American people want?

It is legitimate to ask the FBI, which has come up with

this unfortunately named device–and I suspect nobody has

claimed credit as the author of the name, but we should not

allow ourselves to be distracted simply by the name. Call it

anything you want. The question we have to ask, and

legitimately, is has the FBI given themselves a tool which

allows them to go way beyond what the American people would

allow, what the stated mandate of the FBI would allow, and

certainly what the Congress or anyone else would accept.

I think these are the kinds of questions that we have to

ask because new communications technologies both have benefits

and pose challenges to privacy and law enforcement. The

Congress has, I think, worked successfully, in a bipartisan

fashion, to mediate this tension with a combination of very

stringent procedures for law enforcement access to our

communications, but also legal protections to maintain privacy

and confidentiality, whether it is in person, over the

telephone, fax, computer, or elsewhere….

….follow te link-connect te dots!


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


This entry was posted on October 8, 2016 by in Uncategorized.

We’re all so meta that the NSA targets our intellectual detritus.


Enter your email address to follow this blog and receive notifications of new posts by email.

Join 14 other followers

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 14 other followers


Follow pop~agenda~culture on WordPress.com


Member of The Internet Defense League

%d bloggers like this: