Forum Settings
       
Reply To Thread

Expectation of privacy was nice while it lastedFollow

#152 Jul 18 2016 at 7:37 PM Rating: Excellent
Liberal Conspiracy
*******
TILT
"I would explain this but I have to jump into my car and drive to Chili's on a moment's notice!"

Edited, Jul 18th 2016 8:38pm by Jophiel
____________________________
Belkira wrote:
Wow. Regular ol' Joph fan club in here.
#153 Jul 18 2016 at 7:50 PM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
Gbaji wrote:

Seriously? That's incredibly naive of you.
Yes, seriously. Society tends to think smarter with technology, not dumber.

Gbaji wrote:
Except that the logic follows the technical. If it costs me 100 man hours to hack into one person's computer and read his electronic diary, it's not efficient to use wide scale hacking of private computers as a means to find potential criminals.

If it costs me .000001 man hours to hack into one person's computer and read his electronic diary, it's very very efficient to use wide scale hacking of private computers as a means to find potential criminals.
We can also create a machine that can counts millions of pennies at a time. You're not getting the logic point.

Gbaji wrote:
People will abuse any power you give them. My argument is to be cautious about what power we grant the government over our private information. I'm not sure why this is even remotely controversial. I'm not even proposing any specific legal change or activity. Just saying "let's make sure that people remember that privacy is important, because if they stop thinking it's important to them, then they wont resist if/when some government agency decides to try some sort of mass hacking scheme". I'm not saying what *will* happen, but what *might* happen. Why is that such a problem?
The controversy isn't the concept of being cautious of providing private information to the government. The controversy is your third grade logical jump of doing automatic mass hacking of random people. That is both logically and technically stupid.


Gbaji wrote:
Please tell me you're kidding. I could actually write down all the ways you are wrong here, but it would take more time than I'm willing to spend writing, or that anyone else is willing to spend reading. Um... But for starters, let's just say that the very idea of typing "the command" is where you start off being wrong. You're still assuming a person sitting at a keyboard click clacking away. That's not remotely what I'm talking about here.

I've probably forgotten more about IP packets, TCP stacks, and physical device buffer structures than you will ever know in your lifetime.
You act as if robots fall out of the sky and create their own scripts. SOMEONE is writing the script. If you don't want to write the command, please describe the command that you are referring to. Tell me what you would be looking for. Don't give me the "I don't have time to write" BS, given the amount of text you write on a daily basis.


#154 Jul 18 2016 at 8:01 PM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
gbaji wrote:
Almalieque wrote:
Let me walk the dog with you on this, since you clearly don't understand. Let's ignore technical limitations and pretend the government just scanned every single computer in the nation and grabbed everything automatically. Now what?


Let's ignore the technical limitations and pretend the government just sent agents into every home in the nation and seized every single personal paper and document. Now what?

The answer is that I don't have to answer "now what?". We either accept that the 4th amendment exists for a reason, or we don't. If we do accept its existence (and importance), then it doesn't matter why someone might want to keep personal papers private. He has a right to do so, and that right doesn't change if that "paper" is in electronic form. The same answer applies to both situations equally.

Do you understand yet?

Edited, Jul 18th 2016 5:08pm by gbaji
I'm not questioning the moral and legal justification of the action. I'm saying that it's simply not feasible to do, therefore, will never be an actual concern.

Fortunately, this went a lot faster than expected. The reality, that hit you in the face hence why you're trying to move away from computers, is that even if you had all of that data, it would be impossible to filter through it. The most logical approach would be to target individuals who openly raise flags. This is opposed to running programs that randomly grab tons of information.

P.S. Funny how you don't honor the 4th amendment during "stop and frisk" and "show me your papers". How convenient that when YOU become the victim, justice must be done.
#155 Jul 18 2016 at 8:25 PM Rating: Good
Avatar
*****
13,240 posts
Mark Udall,of the Senate Intelligence Committee, who oversaw the PRISM program wrote:

“As it is written, there is nothing to prohibit the intelligence community from searching through a pile of communications, which may have been incidentally or accidentally been collected without a warrant, to deliberately search for the phone calls or e-mails of specific Americans,”
____________________________
Just as Planned.
#156 Jul 18 2016 at 8:33 PM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
Which does not support automatically grabbing random data. Notice the last part of the sentence said "specific Americans". This means that the search is targeted. When you search a device, there are supposed to be perimeters, where certain things are off limits. This says that there aren't any parameters and everything that is searched is fair game.

No matter how much you may choose to be in denial, there is simply no logic in surfing through millions of unrelated files when you have people admitting to certain crimes on the net.

Edited, Jul 19th 2016 5:13am by Almalieque
#157 Jul 19 2016 at 5:35 AM Rating: Good
Avatar
*****
13,240 posts
Holy shit are you dense?

He said you can search for specific Americans private info out of the massive pool of collected data.

The parameters are a joke because anyone with access to system can search for anything. Also when you have conditions like "at least 51 percent confidence in a target's 'foreignness." There is an awful lot of wiggle room for abuse.
____________________________
Just as Planned.
#158 Jul 19 2016 at 5:40 AM Rating: Good
Avatar
*****
13,240 posts
Quote:
No matter how much you may choose to be in denial, there is simply no logic in surfing through millions of unrelated files when you have people admitting to certain crimes on the net.

Wtf? No one is saying people have no purpose when they search stuff. The problem is that they can look for anything, You can search through and look at private emails of people who are not under any suspicion and that you do not have a warrant for, and search for incriminating evidence for any crime, or non-crime but frowned upon activity.

That's the problem.
____________________________
Just as Planned.
#159 Jul 19 2016 at 5:41 AM Rating: Good
Avatar
*****
13,240 posts
Quote:
No matter how much you may choose to be in denial, there is simply no logic in surfing through millions of unrelated files when you have people admitting to certain crimes on the net.

Wtf? No one is saying people have no purpose when they search stuff. The problem is that they can look for anything, You can search through and look at private emails of people who are not under any suspicion and that you do not have a warrant for, and search for incriminating evidence for any crime, or non-crime but frowned upon activity.

That's the problem.
____________________________
Just as Planned.
#160 Jul 19 2016 at 6:21 AM Rating: Default
The All Knowing
Avatar
*****
10,265 posts

TLW wrote:
Wtf? No one is saying people have no purpose when they search stuff. The problem is that they can look for anything, You can search through and look at private emails of people who are not under any suspicion and that you do not have a warrant for, and search for incriminating evidence for any crime, or non-crime but frowned upon activity.

That's the problem.
Gbaji is arguing that the government will one day create an automated system that will massively grab random information from people. I countered to say that the search will always be targeted, because it is not feasible to gain results from random files. Whether or not you think that is moral and/or legal, that is another discussion.

TLW wrote:
Holy **** are you dense?

He said you can search for specific Americans private info out of the massive pool of collected data.

The parameters are a joke because anyone with access to system can search for anything. Also when you have conditions like "at least 51 percent confidence in a target's 'foreignness." There is an awful lot of wiggle room for abuse.
I know what it said. If the goal were to target a specific candidate, then that means the search was also targeted. Remember, I'm countering the notion that the government will create an automated system that will randomly grab information. You quoted "at least 51%". That's not random. Whether or not that is legal, moral or ethical is another discussion. However, it's not random.

#161 Jul 19 2016 at 8:24 AM Rating: Good
***
1,159 posts
Quote:
Gbaji is arguing that the government will one day create an automated system that will massively grab random information from people. I countered to say that the search will always be targeted, because it is not feasible to gain results from random files.


No one is saying you go straight from massive data seizure to prosecuting everyone implicated inside it without any targeted analysis.

What you do is create an internal database with the random files. You can then search this internal database freely without having to justify your perusal of information. This has a large abuse potential. To actually build a case against people and get 'results', you would still need some kind of method to your trawl, yes, but there is nothing infeasible about creating the database in the first place - and the creation of an internal database of non-analysed data creates a state of affairs very different to unanalysed data out in its natural habitat, the real world.

There is a lot of 'automated' big data stuff you can do, as well, but there's no need to get into that.
____________________________
Timelordwho wrote:
I'm not quite sure that scheming is an emotion.
#162 Jul 19 2016 at 9:36 AM Rating: Good
Avatar
*****
13,240 posts
"targeted" changes very quickly from "one guy" to "set of all people who have donated to a political org I don't like" when it is expedient to do so.

Also, seriously, what the heck? "It's ok because it isn't random"

I don't think there is a government database extensive enough to hold this level of dumb.
____________________________
Just as Planned.
#163 Jul 19 2016 at 9:48 AM Rating: Good
GBATE!! Never saw it coming
Avatar
****
9,957 posts
Almalieque wrote:
Gbaji is arguing that the government will one day create an automated system that will massively grab random information from people.
Already created ... over a decade ago.

Well, not "random" so much as "completely mirroring all data moving through specific points and dumping all the data into storage".
____________________________
remorajunbao wrote:
One day I'm going to fly to Canada and open the curtains in your office.

#164 Jul 19 2016 at 10:06 AM Rating: Good
*******
50,767 posts
Kavekkk wrote:
No one is saying you go straight from massive data seizure to prosecuting everyone implicated inside it without any targeted analysis.
Couple of people are saying that updating current laws to include new technology will lead to massive data seizures and intrusions and such, though.
____________________________
George Carlin wrote:
I think it’s the duty of the comedian to find out where the line is drawn and cross it deliberately.
#165 Jul 19 2016 at 10:15 AM Rating: Excellent
Meat Popsicle
*****
13,666 posts
Timelordwho wrote:
"targeted" changes very quickly from "one guy" to "set of all people who have donated to a political org I don't like" when it is expedient to do so.
My money is something more like "list of people who might be interested in buying new consumer electronics," because there's gotta be a wealth of information there, but that's just me.

Smiley: tinfoilhat
____________________________
That monster in the mirror, he just might be you. -Grover
#166 Jul 19 2016 at 2:31 PM Rating: Decent
Encyclopedia
******
35,568 posts
Almalieque wrote:
Yes, seriously. Society tends to think smarter with technology, not dumber.


No, they don't. Modern communication technology merely allows people to be dumb even faster and to a wider audience than ever before.

Quote:
We can also create a machine that can counts millions of pennies at a time. You're not getting the logic point.


Yes, I am. You're actually arguing my point for me. It become worth counting pennies if you can do so very very quickly. When you can't, you don't. Surely you see how this applies to the case at hand? Nah. Probably not.

Quote:
The controversy isn't the concept of being cautious of providing private information to the government. The controversy is your third grade logical jump of doing automatic mass hacking of random people. That is both logically and technically stupid.


And despite you claims, that's exactly how it would be done. I get that you don't actually understand the technology. And that's fine. But please, for the love of all that is holy, stop making claims about how a hypothetical attempt to obtain mass private information by the government might be done.

Quote:
You act as if robots fall out of the sky and create their own scripts. SOMEONE is writing the script.


Wow? Really? It's almost like I don't actually do that for a living or something.

Quote:
If you don't want to write the command, please describe the command that you are referring to. Tell me what you would be looking for. Don't give me the "I don't have time to write" BS, given the amount of text you write on a daily basis.


The command? There's a ton of commands and tools. You could go old school and use something like snoop (which will give you passive scanning of a subnet's traffic, but not a ton of info about individual system). Any of a host of rpc commands will provide you information on network systems around you and the services they're providing (at least on your subnet). Of course, you can also do tricks like pinging the broadcast address to fill the local router's arp table, then reading that to get a complete list of systems on your subnet and use that as a starting point. There are a wide array of port scanning tools (nmap is one simple one). Some of them more stealthy that others, of course.

Here's the thing though. These are basic commands and tools. There are literally libraries full of information about this. What you're asking me is the equivalent of saying "give me the formula for physics". Um... Which one? How do they interconnect? It's a massive subject to look at. And to be perfectly honest, you don't even speak the language.

Edited, Jul 19th 2016 1:49pm by gbaji
____________________________
King Nobby wrote:
More words please
#167 Jul 19 2016 at 2:53 PM Rating: Decent
Encyclopedia
******
35,568 posts
Almalieque wrote:
Fortunately, this went a lot faster than expected. The reality, that hit you in the face hence why you're trying to move away from computers, is that even if you had all of that data, it would be impossible to filter through it. The most logical approach would be to target individuals who openly raise flags. This is opposed to running programs that randomly grab tons of information.


Dude. 1975 called and wants its telecommunications technology back.

Seriously? You obviously have absolutely no clue how advanced data searches have become. How do you think google works?

Quote:
P.S. Funny how you don't honor the 4th amendment during "stop and frisk" and "show me your papers". How convenient that when YOU become the victim, justice must be done.


Since this is the second time you mentioned it in this thread, do I really have to repeat the same response? Fine: There's a difference between public and private spaces. Those other searches were occurring in public spaces. Totally different thing.
____________________________
King Nobby wrote:
More words please
#168 Jul 19 2016 at 2:56 PM Rating: Good
Avatar
*****
13,240 posts
someproteinguy wrote:
Timelordwho wrote:
"targeted" changes very quickly from "one guy" to "set of all people who have donated to a political org I don't like" when it is expedient to do so.
My money is something more like "list of people who might be interested in buying new consumer electronics," because there's gotta be a wealth of information there, but that's just me.

Smiley: tinfoilhat


Governments and corporations have very different reasons for wanting access to lots of data.
____________________________
Just as Planned.
#169 Jul 19 2016 at 3:12 PM Rating: Excellent
Meat Popsicle
*****
13,666 posts
Timelordwho wrote:
someproteinguy wrote:
Timelordwho wrote:
"targeted" changes very quickly from "one guy" to "set of all people who have donated to a political org I don't like" when it is expedient to do so.
My money is something more like "list of people who might be interested in buying new consumer electronics," because there's gotta be a wealth of information there, but that's just me.

Smiley: tinfoilhat


Governments and corporations have very different reasons for wanting access to lots of data.
All the more reason to collaborate, you're not directly competing with each other and one man's trash is another man's treasure.

Smiley: wink
____________________________
That monster in the mirror, he just might be you. -Grover
#170 Jul 19 2016 at 3:20 PM Rating: Decent
Encyclopedia
******
35,568 posts
Friar Bijou wrote:
Almalieque wrote:
Gbaji is arguing that the government will one day create an automated system that will massively grab random information from people.
Already created ... over a decade ago.


Yeah, this. I'm not sure how Alma doesn't know that the government already has a database and search tools. The issue is that, at least officially, they're not allowed to gather information stored on people's home computers, or stored "privately" on a hosted server. They can only obtain information transmitted plain text across the internet (again, officially), and data available publicly on social media and other internet sites open to the public (like say a forum like this one).

My argument is that the current collecting and searching, while somewhat unsettling, is not actually illegal under the 4th amendment, since the data is "public" and was obtained in a public space (ie: what you post on an online forum carries no expectation of being private), but that we need to make extra sure to firewall off the idea of extending that data collection into actual "private" locations. My concern is that the more people shout and scream about the collection of information in public locations, and the more these screams result in no legal changes (cause the courts have consistently ruled there's no privacy violation there), that people will come to believe that privacy doesn't exist at all (you know, like the thread title suggests), or that the courts have ruled that we have no privacy, and thus stop opposing intrusions into our actual private data locations. And if that happens, then we will have a condition like I've been saying.

There's no technology issue here. The ability to collect and store and search through the volumes of data we're talking about already exists. The only thing preventing this (again assuming it's not already happening Smiley: tinfoilhat is the legal prohibitions in place. And that's only as powerful as the people make it.

Quote:
Well, not "random" so much as "completely mirroring all data moving through specific points and dumping all the data into storage".


Yeah. Not random at all. They collect *everything*. I honestly don't think Alma understands how vast the data storage capabilities out there are and how fast data on that storage can be accessed.
____________________________
King Nobby wrote:
More words please
#171 Jul 19 2016 at 3:29 PM Rating: Excellent
Meat Popsicle
*****
13,666 posts
gbaji wrote:
Almalieque wrote:
Fortunately, this went a lot faster than expected. The reality, that hit you in the face hence why you're trying to move away from computers, is that even if you had all of that data, it would be impossible to filter through it. The most logical approach would be to target individuals who openly raise flags. This is opposed to running programs that randomly grab tons of information.


Dude. 1975 called and wants its telecommunications technology back.

Seriously? You obviously have absolutely no clue how advanced data searches have become. How do you think google works?
Obviously can't speak for him, but I think the point is even if it's trivial to do there's still no point in doing it. Starting from a targeted point (say visits to a terrorist website) will always be more likely to yield "good" terrorist candidates than a broad and blind search/hack/whatever. Given they have limited resources to follow up on leads there's no point to generating more candidates for closer monitoring as there's never going to be the resources to do anything useful with that information.

The only way you'd ever start with a blind search through a database is if you had absolutely no idea where to start looking, in which case you probably have bigger problems than the ethical concerns that come from mass surveillance.

Edited, Jul 19th 2016 2:31pm by someproteinguy
____________________________
That monster in the mirror, he just might be you. -Grover
#172 Jul 19 2016 at 3:30 PM Rating: Decent
Encyclopedia
******
35,568 posts
someproteinguy wrote:
[/quote]All the more reason to collaborate, you're not directly competing with each other and one man's trash is another man's treasure.

Smiley: wink


Have you ever read the small print on the privacy statements attached on pretty much every business dealing/contract you enter into? They pretty much always contain an exemption for law enforcement (which is their CYA for subpoenaed info) and some fairly broad language that'll say something about legitimate government interests and national security and blah blah blah... So yeah. Already happening. Has been for decades really. It's just that the technology to really collect and search through that mountain of data on a mass scale for useful patterns is relatively recent.
____________________________
King Nobby wrote:
More words please
#173 Jul 19 2016 at 3:49 PM Rating: Decent
Encyclopedia
******
35,568 posts
someproteinguy wrote:
Obviously can't speak for him, but I think the point is even if it's trivial to do there's still no point in doing it. Starting from a targeted point (say visits to a terrorist website) will always be more likely to yield "good" terrorist candidates than a broad and blind search/hack/whatever. Given they have limited resources to follow up on leads there's no point to generating more candidates for closer monitoring as there's never going to be the resources to do anything useful with that information.


That assumes they're looking for terrorists. As I (and at least one other person) have already mentioned, once you have the database, you can just as easily search for "people associated with a political organization I dislike who have a higher than 51% chance of being involved in a marital affair, or who's children might be substance abusers, or who may have visited a **** site, or who's travel patterns indicate a chance of being a closeted homosexual, etc, etc, etc". Then passing that information to a "dirty tricks squad" to try to dig up something for political use to damage said opposing political organization. Or use it directly via some sort of blackmail or extortion.

In a climate where things like a prominent pastor being caught buying drugs or the magazine subscription of a female VP candidate is used as political fodder, surely you can see how this might be abused? Any information about someone, even if just implied via data patterns, can be used as a starting point for digging into them to find something to make hay about.

And again, my main concern is that truly "private" information remain protected from such things. There's already a risk of the sort of abuse I mention above, but since that is (at least in theory) limited to just public information collected about someone, it's less likely to yield fruit. If you have access to private information stored on people's computers, then the potential for there being valuable/harmful data in there grows significantly, which increases the odds that it will be used in the manner I mention above (bang for the buck on the search time in this case).

Quote:
The only way you'd ever start with a blind search through a database is if you had absolutely no idea where to start looking, in which case you probably have bigger problems than the ethical concerns that come from mass surveillance.


It's not having no idea where to start looking that is a concern. It's looking for things that we probably don't think our intelligence services should be looking at/for that is. I'm generally of the mindset that at some point we do have to trust our intelligence services to do their jobs properly and not go outside the boundaries required for those jobs. However, that doesn't mean that I think we should just abandon the concept of privacy and trust blindly that no one will ever abuse that power. I happen to think that putting that dividing line for data collection (absent warrant) at the whole "public vs private" point is a good way to go. It gives our intelligence forces sufficient information to do their jobs, while still protecting our rights.
____________________________
King Nobby wrote:
More words please
#174 Jul 19 2016 at 4:09 PM Rating: Excellent
Meat Popsicle
*****
13,666 posts
gbaji wrote:
That assumes they're looking for terrorists.
It doesn't have to, you could apply the same logic to just about any other situation. Blindly searching a vast database is a poor way to do things just in general if you have any way to at all filter down the information first.

Now that's probably of little solace if one someone with harmful motives gains illegal access to the information and starts searching for dirt on people starting with a short list of "Republican Party donors" or similar. Assuming there's useful information to be gained by doing that, of course. TLW obviously already hinted at the issue that a database of information that's relevant to a terrorist investigation isn't necessarily good for other things. Given we don't know for sure what information the government keeps saved and accessible we're left speculating about the prospects. Whether or not it's worthwhile to hack into that for marketing information, political advantage, monetary gain, etc is a whole different concern. One we can't really address and we're more or less forced to take the word of people who say it's secure and not of concern to us. Which, of course, doesn't sit well with many people.

Edited, Jul 19th 2016 3:14pm by someproteinguy
____________________________
That monster in the mirror, he just might be you. -Grover
#175 Jul 19 2016 at 5:30 PM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
Kavekkk wrote:
No one is saying you go straight from massive data seizure to prosecuting everyone implicated inside it without any targeted analysis.

What you do is create an internal database with the random files. You can then search this internal database freely without having to justify your perusal of information. This has a large abuse potential. To actually build a case against people and get 'results', you would still need some kind of method to your trawl, yes, but there is nothing infeasible about creating the database in the first place - and the creation of an internal database of non-analysed data creates a state of affairs very different to unanalysed data out in its natural habitat, the real world.

There is a lot of 'automated' big data stuff you can do, as well, but there's no need to get into that.


TLW wrote:
"targeted" changes very quickly from "one guy" to "set of all people who have donated to a political org I don't like" when it is expedient to do so.

Also, seriously, what the heck? "It's ok because it isn't random"

I don't think there is a government database extensive enough to hold this level of dumb.


The video below demonstrates choosing to randomly grab millions and millions of files over specifically targeting people that you have leads on.

#176 Jul 19 2016 at 5:52 PM Rating: Default
The All Knowing
Avatar
*****
10,265 posts
Gbaji wrote:
No, they don't. Modern communication technology merely allows people to be dumb even faster and to a wider audience than ever before.
That's only if you consider "efficient" as being dumb.

Gbaji wrote:
Yes, I am. You're actually arguing my point for me. It become worth counting pennies if you can do so very very quickly. When you can't, you don't. Surely you see how this applies to the case at hand? Nah. Probably not.
Now provide me real life scenarios where this is CURRENTLY a need where it would be worth the resources to create. That's the logic part you're not grasping.

Gbaji wrote:
And despite you claims, that's exactly how it would be done. I get that you don't actually understand the technology. And that's fine. But please, for the love of all that is holy, stop making claims about how a hypothetical attempt to obtain mass private information by the government might be done.
Again, according to the logic that you have provided, we should never give anyone any power ever, because those people will abuse it and society will be unable to do anything about it. That is literally your argument. "Don't use banks because the CEOs will run off with your money and buy mansions". "Better not get Internet, because the ISP will steal all of your information". "Better not use cloud service, because the provider will steal and sell your information".


Gbaji wrote:

Wow? Really? It's almost like I don't actually do that for a living or something.
If this is what you do for a living, then you must understand that PEOPLE are involved. So, quit acting like a person wouldn't be involved in an automated scenario.


Quote:
The command?
Yes, the command. I can present a command that will scan the entire subnets. It's one sentence. I'm asking you to logically speak what type of command (commands) would you use to get this done. What would you scan? What would be your parameters? I'm curious to know what type of scan would present you results in a timely fashion and go unnoticed. When I scan my VMware, my actual PC picks up the IP and blocks it.
Reply To Thread

Colors Smileys Quote OriginalQuote Checked Help

 

Recent Visitors: 277 All times are in CST
Anonymous Guests (277)