cryptogon.com news – analysis – conspiracies

October 31st, 2007

Please indulge me by re-reading this extended passage from Synthetic Environments for Analysis and Simulation:

Remember Russell Tice, the NSA SIGINT officer who had knowledge of a special access NSA operation that was so disturbing that he tried to tell the U.S. Congress about it?

What was Tice talking about here:

Tice said his information is different from the Terrorist Surveillance Program that Bush acknowledged in December and from news accounts this week that the NSA has been secretly collecting phone call records of millions of Americans. “It’s an angle that you haven’t heard about yet,” he said.

An angle that we haven’t heard about. Since everyone and his dog knows about the mass surveillance, what could that angle be?

More recently, Tice said that the NSA intercepts of civilian traffic is “the tip of the iceberg” and says, again, that there is something else, something we still don’t know about. Here’s part of the interview between Tice and Reason:

REASON: What prompted you to step forward now? Tice: Well, I’ve known this for a long time and I’ve kept my mouth shut… REASON: You’re referring to what James Risen calls “The Program,” the NSA wiretaps that have been reported on? Tice: No, I’m referring to what I need to tell Congress that no one knows yet, which is only tertiarily connected to what you know about now.

Ok, so the outrage that Tice was willing to ruin his life over is only “tertiarily connected” to the operation we already new about.

Tice continues:

In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.

The surveillance side of this is the chickenfeed. There’s something far more sinister than the simple surveillance… an angle we haven’t heard about yet.

Tice never did tell his story to Congress about this different aspect of the program.

Well, my guess is that it has something to do with providing surveillance data for this SEAS World Sim thing, and that individual Americans are being watched and potentially targeted with it. Tice’s background seems to involve a lot of traditional electronic warfare, radar and ELINT stuff. Maybe Tice’s deal involved the collection of the mobile phone GPS and/or triangulation data which would provide realtime spacial/geographic data to the SEAS system. In other words, SEAS sees you. They could bring up a map of a city and plot your path based on the information that your phone is exchanging with the mobile network.

— End Excerpt —

In summary, my thesis was that the NSA operation that Tice was involved with was related to tracking individual Americans, on the ground, in real time, using the mobile phone networks.

Ok, now, Wired’s Threat Level just published a story about Hancock, an AT&T programming language that was designed for parsing large blocks of data for surveillance purposes. Within the context of my theory above—about the operation Tice was involved with—look at this:

Programs written in Hancock work by analyzing data as it flows into a data warehouse. That differentiates the language from traditional data-mining applications which tend to look for patterns in static databases. A 2004 paper published in ACM Transactions on Programming Languages and Systems shows how Hancock code can sift calling card records, long distance calls, IP addresses and internet traffic dumps, and even track the physical movements of mobile phone customers as their signal moves from cell site to cell site.

All of these tidbits… It’s all the same operation. They have an unthinkable surveillance capability that includes all of your email, web, purchasing and telephone activity. And, if I’m right, they’re keeping track of where you are and where you’ve been. Oh yeah, wave at the birdy.

I know. It’s too incredible. Impossible, you might think.

What’s impossible is trying to grasp what the intelligence agencies did with $43.5 billion just in 2007. Yeah. Yeah. Incompetence. Inefficiency. Ripoffs. The usual $4000 toilet seat refrain. Fine. But if that’s your perspective, what’s your theory about the operation Tice was involved with?

They got something for the billions of dollars spent on this crap over the last several years and I’m pretty sure that it knows more about all of us than we can imagine.

There’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it…

Via: Wired:

From the company that brought you the C programming language comes Hancock, a C variant developed by AT&T researchers to mine gigabytes of the company’s telephone and internet records for surveillance purposes.

An AT&T research paper published in 2001 and unearthed today by Andrew Appel at Freedom to Tinker shows how the phone company uses Hancock-coded software to crunch through tens of millions of long distance phone records a night to draw up what AT&T calls “communities of interest” — i.e., calling circles that show who is talking to whom.

The system was built in the late 1990s to develop marketing leads, and as a security tool to see if new customers called the same numbers as previously cut-off fraudsters — something the paper refers to as “guilt by association.”

But it’s of interest to THREAT LEVEL because of recent revelations that the FBI has been requesting “communities of interest” records from phone companies under the USA PATRIOT Act without a warrant. Where the bureau got the idea that phone companies collect such data has, until now, been a mystery.

According to a letter from Verizon to a congressional committee earlier this month, the FBI has been asking Verizon for “community of interest” records on some of its customers out to two generations — i.e., not just the people that communicated with an FBI target, but also those who talked to people who talked to an FBI target. Verizon, though, doesn’t create those records and couldn’t comply. Now it appears that AT&T invented the concept and the technology. It even owns a patent on some of its data mining methods, issued to two of Hancock’s creators in 2002.

Programs written in Hancock work by analyzing data as it flows into a data warehouse. That differentiates the language from traditional data-mining applications which tend to look for patterns in static databases. A 2004 paper published in ACM Transactions on Programming Languages and Systems shows how Hancock code can sift calling card records, long distance calls, IP addresses and internet traffic dumps, and even track the physical movements of mobile phone customers as their signal moves from cell site to cell site.

With Hancock, “analysts could store sufficiently precise information to enable new applications previously thought to be infeasible,” the program authors wrote.