Typical Problem-Reaction-Solution
So the issue of the NSA creating a database which tracks every phone call made in the United States is starting to make headlines. I first read about this issue a few weeks ago on some of my geek websites, but now the story is getting more press since the telecom giants (AT&T, Bellsouth, Verizon, but not Qwest) are under fire. Don't get this confused with the NSA wiretapping fiasco, that's a completely different privacy violation. Also, don't get that mistaken with the Department of Justice ordering Google to surrender their users' search logs.
This program tracks every call made in the US. From the database created, you can then extrapolate information from the matrices formed. Of course this program was created to increase intelligence in order to keep us safe from terrorist attacks. The only way to let the terrorists win is if we change our lives because of them. ..clearly that's not happening..
I thought terrorists worked in cells, where each cell was completely independent of the other. But who knows.. maybe tracking the frequency in which you talk to Miss Cleo might help our intelligence agencies?
Are any of yall creative enough to imagine how this information could be misused? Don't bother.. here are a few of my examples:
Insider Information: So there's a rumor that Microsoft and Playboy might merge to make software that has even more holes. It's just a rumor though.. but upon checking our new Big Brother program, our trusty government officials see heavy phone traffic between Bill G. of Redmond, Washington and Hugh H. at the Playboy mansion. Sounds like a good time to call your broker.
Maintaining Political Power: So you're in office, but notice someone gaining enough popularity to challenge your seat. Don't sweat it, just run the Watergate play out of Nixon's playbook and everything will be fine. The similarities here could fuel another post.
Crippling Social Networks: By monitoring the communications of terrorist cells, you can eventually follow the matrix to their leader. Unfortunately that also applies to other social networks. Think the civil rights movement would have had much success if this program had existed? How about the civil war?
Don't get me wrong folks, when I'm king.. I'll definitely have these types of programs in effect. It's much easier to stay in power when you can pinpoint and eliminate your opposition. Check out Problem-Reaction-Solution for some perspective.
9 Comments:
davey, i've an experiment that you should try. since the wiretapping news was reported, some friends and i drop phrases like durka durka, mohammud jihad, and shoe bomb during our telephone conversations. we figure the govt is so inefficent that they will still never show up on my door step. they should be all over me. i use "buzz" words, call people in new jersey, and have a middle eastern sounding name (of course we know it's indian, but i'm 100% sure the morons in the nsa cant tell the difference. they probably lump all our name in a group labeled "furren names"). maybe my accent is throwing them off the trail. i think i'm going to have to start talking like dad on the phone. anyway, you should try it too and see whose house the nsa shows up at first. loser buys beers at the next uga/usc game.
I might have a one-up on you thanks to my mindless rantings on here. Doubt I'm a blip on the NSA rader, but one political candidate in SC has asked me to remove incriminating pictures of him from the site.
But here's another point of BS in this program- it supposedly doesn't monitor the actual phone conversation. It only records the number called, to my knowledge. So the logical anti-terrorism component of sniffing for keywords (like cocaine, assassination, bomb) isn't a factor. That just makes me more suspicious.. because obviously the only efficient way to use the database is to _first_ decide on your target (terrorist or political opponent) and then track from there.
check out this link, davey.
http://blogs.abcnews.com/theblotter/2006/05/federal_source_.html
take it will a grain of salt because it is from a blog on the abc news website, but would it really surprise you if g-dub and co used the wiretapping to root out confidential sources leaking info about the administration? scary, scary stuff in my opinion.
the address was cut off for some reason. let me try this again.
http://blogs.abcnews.com/theblotter/2006/05/
federal_source_.html
Yeh, I saw that when I was reading up on this stuff. Nobody else has reported it, but I would not put it past the administration to use the phone call database to discover government leaks.
If true, it's double-edged.
-We used the database to discover spies and leaks concerning national security. Cool.
-We used the database to find out who told the news about our illegal affairs.. congrats you've been promoted to the position of assistant janitor. Not cool.
America, we're going to have a hot one tonight.
It's down to the semi-finals after Chris' shocking departure last week.
Tune in tonight at 8/7c to watch Taylor, Katherine, and Elliott try to sing their way into the finals.
You won't want to miss it.
Seacrest, out.
Nice! Where you get this guestbook? I want the same script.. Awesome content. thankyou.
»
Why would Bill Gates be calling Hugh Hill?? Maybe customer of the decade but....thats' just so ridiculous you know? And there should be no suspicion with your accent Cletus. Remember McDonalds on the NY trip where everyone in the line knew you weren't from around there? Georgia dick indeed.
Nice post. The Summer of Dev is off to a great start it seems.
Post a Comment
<< Home