{"id":8037,"date":"2013-06-07T00:23:29","date_gmt":"2013-06-07T00:23:29","guid":{"rendered":"http:\/\/sonicfrog.net\/?p=8037"},"modified":"2013-06-07T16:46:32","modified_gmt":"2013-06-07T16:46:32","slug":"connecting-the-dots-liars","status":"publish","type":"post","link":"https:\/\/sonicfrog.net\/?p=8037","title":{"rendered":"Connecting The Dots&#8230; LIARS!"},"content":{"rendered":"<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top: 5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\",\"StumbleUpon\",\"Digg\",\"Reddit\",\"Bebo\",\"Delicious\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_image_folder_url = \"\";var hupso_url_t=\"\";var hupso_title_t=\"Connecting%20The%20Dots...%20LIARS%21\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div><p>So&#8230;. The good folks in Washington DC are trying to defend the revelation that the Government has been <a href=\"http:\/\/www.nytimes.com\/2013\/06\/07\/us\/nsa-verizon-calls.html?pagewanted=all&amp;_r=0\">data mining Verizon communications<\/a>.\u00a0 Here&#8217;s their defense:<\/p>\n<blockquote>\n<p itemprop=\"articleBody\">Responding to the disclosure, Senator Dianne Feinstein of California and Senator Saxby Chambliss of Georgia said on Thursday that the order appeared to be a routine reauthorization as part of a broader program that lawmakers have long known about.<\/p>\n<p itemprop=\"articleBody\">\u201cAs far as I know, this is an exact three-month renewal of what has been the case for the past seven years,\u201d said Ms. Feinstein, the top Democrat on the Intelligence Committee. It was carried out by the Foreign Intelligence Surveillance Court \u201cunder the business records section of the Patriot Act,\u201d she said. \u201cTherefore, it is lawful. It has been briefed to Congress.\u201d<\/p>\n<p itemprop=\"articleBody\">The program appears to warehouse and analyze calling \u201cmetadata\u201d \u2014 time and number logs showing when communications have been made, but not their content or the name of any subscriber \u2014 that the government analyzes to try to identify terrorists. Mr. Chambliss, the intelligence panel\u2019s top Republican, said that under the rules of the program, when a computer program flags a number as suspicious, the authorities return to the national security court for permission to scrutinize that person more closely.<\/p>\n<p itemprop=\"articleBody\">\u201c<strong>It\u2019s metadata only and it\u2019s what we call minimized<\/strong>,\u201d Mr. Chambliss said. \u201cAll of these numbers are basically ferreted out by a computer, but if there\u2019s a number that matches a terrorist number that has been dialed by a U.S. number or dialed from a terrorist to a U.S. number, then that may be flagged. And they may or may not seek a court order to go further on that particular instance. But that\u2019s the only time that this information is ever used in any kind of substantive way.\u201d<\/p>\n<p itemprop=\"articleBody\">Senator Lindsey Graham, Republican of South Carolina, told reporters on Thursday that he did not have a problem with the surveillance program because it was imperative in the war on terror.<\/p>\n<p itemprop=\"articleBody\">\u201cIf we don\u2019t do it,\u201d Mr. Graham said, \u201cwe\u2019re crazy.\u201d<\/p>\n<p>Representative Mike Rogers, Republican of Michigan and the chairman of the House Intelligence Committee, said in a news conference Thursday that <strong>the National Security Agency program helped stop a significant domestic terrorist attack in the United States<\/strong> in the last few years. He did not give more information on the possible nature of the attack.<\/p><\/blockquote>\n<p>Mr. Rogers (I&#8217;m so mad right now, that doesn&#8217;t even make me smile a little) show us some proof that this is indeed true.<\/p>\n<p>In another report, Feinstein indicates there have been multiple foiled attacks:<\/p>\n<blockquote><p>Sen. Dianne Feinstein did not specify how many attempted attacks had been prevented, or the nature of the threats, but the California Democrat said there had been more than one.<\/p><\/blockquote>\n<p>OK. So which is it? IS it &#8220;one&#8221;, or is it &#8220;many&#8221;, or does this require another interesting &#8220;it all depends on what the definition of &#8216;is&#8217; is&#8221; moment?<br \/>\nI noted that Sxby Chambliss says this:<\/p>\n<blockquote><p>\u201c<strong>It\u2019s metadata only and it\u2019s what we call minimized<\/strong>,\u201d Mr. Chambliss said. \u201cAll of these numbers are basically ferreted out by a computer, but if there\u2019s a number that matches a terrorist number that has been dialed by a U.S. number or dialed from a terrorist to a U.S. number, then that may be flagged. And they may or may not seek a court order to go further on that particular instance. But that\u2019s the only time that this information is ever used in any kind of substantive way.\u201d<\/p><\/blockquote>\n<p>Well, except that isn&#8217;t the only data you guys are collecting, is it? In a separate story <a href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\">that just broke<\/a>:<\/p>\n<blockquote><p>The National Security Agency has obtained direct access to the systems of Google, Facebook, <a title=\"More from guardian.co.uk on Apple\" href=\"http:\/\/www.guardian.co.uk\/technology\/apple\">Apple<\/a> and other US <a title=\"More from guardian.co.uk on Internet\" href=\"http:\/\/www.guardian.co.uk\/technology\/internet\">internet<\/a> giants, according to a top secret document obtained by the Guardian.<\/p>\n<p>The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.<\/p><\/blockquote>\n<p>Oops!<\/p>\n<p>Chambliss, you are a liar. They are NOT just collecting &#8220;metadata&#8221;&#8230; They are going for the whole shebang!<\/p>\n<p>I ask you, how difficult is it for the Government to connect the Verizon (AT&amp;T, T-Mobile, Sprint) phone number of customer X to all of that persons ENTIRE internet activities?<\/p>\n<p>Not very.<\/p>\n<p>And this can all be done in secret because idiot politician like Chambliss and Feinstein supported, and continue to support, the Patriot Act, which as we all now see, gave the US Government open and complete access to virtually ALL our online activities! And remember, the agencies are now encouraged to share intel with each other.<\/p>\n<p>How did we go from &#8220;They might spy on your library records&#8221; to this in just one decade?<\/p>\n<p>The former USSR and Stalin would be proud!<\/p>\n<p>PS. Oh&#8230; And just think of what they&#8217;ll do next now that their precious PRISM program failed to pick up the Boston Marathon plot!<\/p>\n<p>And it can and will be done in secret, because the Patriot Act gives them the cover to do so!<\/p>\n","protected":false},"excerpt":{"rendered":"<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/share-medium.png\" style=\"border:0px; padding-top: 5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\",\"StumbleUpon\",\"Digg\",\"Reddit\",\"Bebo\",\"Delicious\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_image_folder_url = \"\";var hupso_url_t=\"\";var hupso_title_t=\"Connecting%20The%20Dots...%20LIARS%21\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div><p>So&#8230;. The good folks in Washington DC are trying to defend the revelation that the Government has been data mining Verizon communications.\u00a0 Here&#8217;s their defense: Responding to the disclosure, Senator Dianne Feinstein of California and Senator Saxby Chambliss of Georgia said on Thursday that the order appeared to be a routine reauthorization as part of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[47],"tags":[],"_links":{"self":[{"href":"https:\/\/sonicfrog.net\/index.php?rest_route=\/wp\/v2\/posts\/8037"}],"collection":[{"href":"https:\/\/sonicfrog.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sonicfrog.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sonicfrog.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sonicfrog.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8037"}],"version-history":[{"count":7,"href":"https:\/\/sonicfrog.net\/index.php?rest_route=\/wp\/v2\/posts\/8037\/revisions"}],"predecessor-version":[{"id":8045,"href":"https:\/\/sonicfrog.net\/index.php?rest_route=\/wp\/v2\/posts\/8037\/revisions\/8045"}],"wp:attachment":[{"href":"https:\/\/sonicfrog.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sonicfrog.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sonicfrog.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}