“His response was to fight it with the only weapons at hand—passive resistance and open displays of contempt.” ― Kurt Vonnegut, The Sirens of Titan
Long before the mess of hydra tentacles and poison pots and wall-to-wall internet surveillance, there was the FBI’s Carnivore program, the “unfortunately named” program that turned internet connections into swamplands of slowness, every time it took a bite out of a citizens time. Unlike today’s nefarious, hiden, and very thoroughly plausibly denied, Carnivore was as it’s name suggested: a crippling, internet death of your connection as it pawed over your cyber bits and bytes.
Carnivore was so inept that even amateur internet watchers could observe it in action. The FBI and the NSA etc., used Carnivore more as a tool of nascent experimentation into “what can we get away with” than anything else-it was that gruesome.
And, with Carnivore, they targeted individuals, carefully abusing human live in secret; using people they deemed unlikeable, to build ‘human needles,’ whose browsing habits, personal details, and other things were placed into the thing we know today as “the haystack.”
Build IT and They Will Come: How the NSA used Carnivore to create targeted online speakers, and then, targeted them with next generation privacy invasion tools.
But first-came Carnivore
These days, with the internet a virual hunting grounds where agencies stalk and target citizens, often like ducks in a barrel-that they put in the barrel In the first place ( or, as the NSA-SSHATS like to say ” first, you build the needle, then you build the needlestck. Then, you add hay”)
They route, redirect, and ruin machines with malware in milliseconds, or envelope users, and whole towns in Fake Google, Carnivore’s ability to simply slow your connection to mind meltingly minute long speeds, seems so quaint, and kind of pathetic, and cute, like a puppy: all teething, no tooth.
A Blast From the Past: How the FBI Gave Senator Patrick Leahy a 16 Year Long Hand Job, as it Worked with Corporations, and other Alphabet Agencies to Build the Infrastructure of Total Mind Messin’ and other-as-yet-disclosed-mayhem.
STATEMENT OF HON. PATRICK J. LEAHY, A U.S. SENATOR FROM THE
STATE OF VERMONT
Senator Leahy. Thank you, Mr. Chairman. We talk about ISP’s
and URL’s and all this new language of the Internet age that
Mr. Cerf and others gave us. And I thank you most of the time,
Mr. Cerf. There are days when connections are slow when I
don’t, but that is not your fault.
What we are doing here actually is carrying on a 200-year
conversation about how we assure the rights of the American
people, the rights of all of you, the rights of me and the
chairman and everybody else to be secure in their persons, in
their houses, in their papers, and their effects, secure
against unreasonable searches and seizures. That obviously goes
back to the Constitution’s Fourth Amendment.
Back at the time of the Framers, you gained access to a
person’s private effects by being there. You were going to find
out what was in somebody’s desk drawer by walking in the house
and opening the desk. You were going to find out what papers
they had in their inside pocket by searching them and searching
their inside pocket. It is a lot different today. You can be a
mile away or 10,000 miles away and search information about
most families, certainly those who have computers and are on
This is really the concern that I have. On the one hand, I
ask the question, are we dealing with a legitimate surveillance
tool in a cyber age when we know that criminals can move
billions of dollars electronically; when terrorists can plan
damage from a point on another continent to a residence or a
warehouse in the United States; when a kidnaper can deal with
somebody in a different State, or where a child abuser can seek
out a victim hundreds of miles away. But on the other hand, is
this surveillance something that goes way beyond what we the
American people want?
It is legitimate to ask the FBI, which has come up with
this unfortunately named device–and I suspect nobody has
claimed credit as the author of the name, but we should not
allow ourselves to be distracted simply by the name. Call it
anything you want. The question we have to ask, and
legitimately, is has the FBI given themselves a tool which
allows them to go way beyond what the American people would
allow, what the stated mandate of the FBI would allow, and
certainly what the Congress or anyone else would accept.
I think these are the kinds of questions that we have to
ask because new communications technologies both have benefits
and pose challenges to privacy and law enforcement. The
Congress has, I think, worked successfully, in a bipartisan
fashion, to mediate this tension with a combination of very
stringent procedures for law enforcement access to our
communications, but also legal protections to maintain privacy
and confidentiality, whether it is in person, over the
telephone, fax, computer, or elsewhere….
….follow te link-connect te dots!