"Only dull people are brilliant at breakfast"
-Oscar Wilde
Brilliant at Breakfast title banner "The liberal soul shall be made fat, and he that watereth, shall be watered also himself."
-- Proverbs 11:25
"...you have a choice: be a fighting liberal or sit quietly. I know what I am, what are you?" -- Steve Gilliard, 1964 - 2007

"For straight up monster-stomping goodness, nothing makes smoke shoot out my ears like Brilliant@Breakfast" -- Tata

"...the best bleacher bum since Pete Axthelm" -- Randy K.

"I came here to chew bubblegum and kick ass. And I'm all out of bubblegum." -- "Rowdy" Roddy Piper (1954-2015), They Live
Thursday, July 19, 2007

And speaking of the Bush Administration's real agenda....
Posted by Jill | 8:11 AM
...which has NOTHING to do with fighting terrorism and EVERYTHING to do with amassing power, Fred Kaplan at Slate tells us to get ready for even MORE Big Brother tactics:

In the National Intelligence Estimate titled "The Terrorist Threat to the Homeland," which was released Tuesday, there's an intriguing section that suggests an impending push for more domestic surveillance.

Most of the report (which I analyzed here) concerns an alleged resurgence of al-Qaida. But toward the end, the authors mention a small but expanding number of "violent Islamic extremists inside the United States" who are "becoming more connected ideologically, virtually, and/or in a physical sense to the global extremist movement."

The report also notes dangers posed by "non-Muslim terrorist groups," "single-issue groups," and "even small numbers of alienated people" who might "find and connect with one another, justify and intensify their anger, and mobilize resources to attack—all without requiring a centralized terrorist organization, training camp, or leader."



Then comes the point:

The ability to detect broader and more diverse terrorist plotting in this environment will challenge current U.S. defensive efforts and the tools we use to detect and disrupt plots. It will also require greater understanding of how suspect activities at the local level relate to strategic threat information and how best to identify indicators of terrorist activity in the midst of legitimate interactions.

One aspect of this is uncontroversial—the need to integrate city and state law enforcement ("suspect activities at the local level") to national watch lists and other databases ("strategic threat information"). This effort falls under the Department of Homeland Security, and it's a disgrace that, with such a large budget, nobody has yet devised a systematic method of doing this.

However, the other part of this passage ("how best to identify indicators of terrorist activity in the midst of legitimate interactions") pushes a very hot button.

A year and a half ago, passionate arguments broke out over reports about the National Security Agency's "data-mining" technologies. A couple of years earlier, the Pentagon attempted to fund a still-more intrusive program called the "Total Information Awareness" network. (The latter effort failed, but the concept was almost certainly re-routed to the NSA or elsewhere.) Concerns were raised about privacy rights, the abuse of power, and the worth of such networks to begin with.

Judging from the NIE (not just from these key passages but from its general assessment of a "persistent and evolving terrorist threat"), the debate over these vast surveillance systems will soon be renewed. So, it's worth making some distinctions that tended not to be made the last time around, at least in much of the public discussion.

The key distinction is the one between data-mining and wiretapping.

In data-mining, the NSA casts a vast "net" across the global communications system, encompassing, at least in theory, every phone call, e-mail, electronic signal, and so forth. The idea is not to monitor all these calls (there's not enough time or manpower to do that, in any case) but rather to detect patterns. If someone makes or receives a number of calls to or from, say, Pakistan, Iraq, or Syria—or if someone is in frequent contact with someone else who makes or receives such calls—this pattern would set off alarm bells. At that point, an intelligence officer might want to start monitoring that person or those people to see who they are, what they're doing, and whether anything about them or their behavior seems ominous.

I don't think anyone, other than libertarians, should have a problem with this sort of data-mining. Nor do I think there should be a problem with the idea of monitoring people whose calling patterns set off alarm bells.



Perhaps not -- if we had an Administration that was trustworthy. But this one decided on September 11, 2001, that an aware, thinking population was its worst enemy, and has done everything it can to treat this country's citizens as guilty until proven innocent. An executive branch that was truly about the nation's safety could perhaps -- PERHAPS -- be trusted with an endeavor like this one. But can we EVER trust those we choose to lead us, once they get a taste from the Fountain of Power? Certainly we can't trust this one, which has been so blatant about its lust for absolute rule over not just this country, but the entire world.

Labels: ,

Bookmark and Share