{"id":187088,"date":"2013-06-22T20:37:00","date_gmt":"2013-06-23T01:37:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2013\/06\/22\/like-rendering-for-torture-only-with-data\/"},"modified":"2013-06-22T20:37:00","modified_gmt":"2013-06-23T01:37:00","slug":"like-rendering-for-torture-only-with-data","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2013\/06\/22\/like-rendering-for-torture-only-with-data\/","title":{"rendered":"Like Rendering for Torture, Only With Data"},"content":{"rendered":"<p>In another scoop, the <i>Guardian<\/i> has revealed that GCHQ, the British Equivalent of the NSA, <a href=\"http:\/\/www.guardian.co.uk\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa\">engaged in the same sort of massive data drift net as the NSA<\/a>:<\/p>\n<blockquote><p><span style=\"color: blue;\">Britain&#8217;s spy agency GCHQ has secretly gained access to the network of cables which carry the world&#8217;s phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">The sheer scale of the agency&#8217;s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">One key innovation has been GCHQ&#8217;s ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">\u2026\u2026\u2026<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: &#8220;<b><span style=\"font-variant: small-caps;\">We have a light oversight regime compared with the US<\/span><\/b>&#8220;.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was &#8220;your call&#8221;.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.<\/span><\/p><\/blockquote>\n<p>(<i>Emphasis mine<\/i>)<\/p>\n<p>What we are seeing here is the moral equivalent of the rendition for torture that the CIA engaged in with despotic governments.<\/p>\n<p>In this case, the NSA is not allowed to spy on Americans, so they have the British do it for them and then they review the data under the British &#8220;Light oversight regime.&#8221;<\/p>\n<p>Note that this in addition to the <a href=\"https:\/\/www.eff.org\/deeplinks\/2013\/06\/depth-review-new-nsa-documents-expose-how-americans-can-be-spied-without-warrant\">exceptions and shadings on the NSA&#8217;s own surveillance discussed by the Electronic Frontier Foundation<\/a>.<\/p>\n<p>Taken together, it&#8217;s a blue print for a lawless surveillance state.<\/p>\n<p>(<i>updated title<\/i>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In another scoop, the Guardian has revealed that GCHQ, the British Equivalent of the NSA, engaged in the same sort of massive data drift net as the NSA: Britain&#8217;s spy agency GCHQ has secretly gained access to the network of cables which carry the world&#8217;s phone calls and internet traffic and has started to process &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[971,970,1102,1103],"tags":[],"class_list":["post-187088","post","type-post","status-publish","format-standard","hentry","category-civil-rights","category-corruption","category-intelligence","category-secrecy"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/187088"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=187088"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/187088\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=187088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=187088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=187088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}