Echelon's attack- Notice the LONG list of words, phrases in your email, fax, phone conversation that can trigger the supersecret NSA to tape and/or monitor your communicationsgreenspun.com : LUSENET : TimeBomb 2000 (Y2000) : One Thread
Please make a link to this great article by a respected writer of worldnetdaily on Echelon's attack.http://www.worldnetdaily.com/bluesky_btl/19991027_xcbtl_the_echelo.shtml
Notice the LONG list of words, phrases in your email, fax, phone conversation that can trigger the supersecret NSA to tape and/or monitor your communications. Very fascinating reading. Kewek this list next to your PC. To play safe, avoid using any of these words . Many people are very naive about the covert ops of our beloved country. There are no doubt agents of disinformation on this board who will seek to belittle articles of these natures.
-- Researcher (firstname.lastname@example.org), December 01, 1999
-- haha (email@example.com), December 01, 1999.
Explosives, guns, assassination, conspiracy, primers, detonators, initiators, main charge, nuclear charges, ambush, sniping, motorcade, IRS, BATF, jtf-6, mjtf, hrt, srt, hostages, munitions, weapons, TNT, rdx, amfo, hmtd, picric acid, silver nitrite, mercury fulminate, presidential motorcade, salt peter, charcoal, sulfur, c4, composition b, amatol, petn, lead azide, lead styphante, ddnp, tetryl, nitrocellulose, nitrostarch, mines, grenades, rockets, fuses, delay mechanism, mortars, rpg7, propellants, incendiaries, incendiary device, thermite, security forces, intelligence, agencies, hrt, resistance, psyops, infiltration, assault team, defensive elements, evasion, detection, mission, communications, the football, platter charge, shaped charges, m118, claymore, body armor, charges, shrapnel, timers, timing devices, boobytraps, detcord, pmk 40, silencers, Uzi, HK-MP5, AK-47, FAL, Jatti, Skorpion MP, teflon bullets, cordite, napalm, law, Stingers, RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, Air Force One, M60, RPK74, SG530, SG540, Galil arm, Walther WA2000, HK33KE, Parker-Hale MOD. 82, AKR, Ingram MAC10, M3, L34A1, Walther MPL, AKS-74, HK-GR6, subsonic rounds, ballistic media, special forces, JFKSWC, SFOD-D, SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT, GIGN, Exon Shell, radint, MB, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT, RFI, ZL31, SIGDASYS, TDM, SUKLO, SUSLO, TELINT, fake, TEXTA, ELF, LF, MF, SIGS, VHF, Recon, peapod, PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, SHF, ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z- 200, 15kg, DUVDEVAN, RFX, nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, SARA, Rapid Reaction, JSOFC3IP, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, M-x spook, Z-150T, High Security, Security Evaluation, Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism, real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT, NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM, Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, .tc, 2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere, Mole, Keyhole, NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS, CFD, quarter, Cornflower, Daisy, Egret, Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video, Intiso, r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600 Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash, ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax encryption, white noise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG, Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, JTF-6, AVN, ISSSP, Anonymous, W, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, owhere, .ch, hope, emc, industrial espionage, SUPIR, PI, TSCI, spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA- DST, INI, watchers, keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib, primacord, RSP, Z7, Becker, Nerd, fangs, Austin, no|d, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET, cocaine, Vale, IG, Kosovo, Dake, 36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, +=, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS, Reprieve, NZC- 332, edition, cards, mania, 701, CTP, CATO, Phon-e, Chicago Posse, NSDM, l0ck, spook, keywords, QRR, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM, Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, Fort Meade, *&, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :, Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, South Africa, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, cryptanalysis, nuclear, 52 52 N - 03 03 W, Morgan, Canine, GEBA, INSCOM, MEMEX, Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S, Area51, SABC, basement, ISWG, $ @, data-haven, NSDD, black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan, pirg, curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global, gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx, Abdurahmon, snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock, PABX, Electron, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor, CipherTAC-2000, Etacs, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis, Kamumaruha, DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government, NSY, hate, speedbump, joe, illuminati, BOSS, Kourou, Misawa, Morse, HF, P415, ladylove, filofax, Gulf, lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani, Lanceros, Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI, DC6, Larson, P99, HERF pipe-bomb, 2.3 Oz., cocaine, $, impact, Roswell, ESN, COS, E.T., credit card, b9, fraud, ST1, assassinate, virus, ISCS, ISPR, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, WWSV, Atlas, IWWSVCS, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB, eternity server, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros, Standford, niche, ISEP, ISEC, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, NSOF, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA, HAMASMOIS, SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man, Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach, Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF, Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP, Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox, Aum, AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS, cdi, VIA, DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor, Templar, THAAD, package, CISD, ISG, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss, secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4, Analyzer, embassy, Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, EPL, SPINTCOM, ISS-ADP, Merv, Mexico, SUR, SO13, Rojdykarna, airframe, 510, EuroFed, Avi, shelter, Crypto AG.
-- uh oh (firstname.lastname@example.org), December 01, 1999.
So anyone gotta macro?
-- Hokster (email@example.com), December 01, 1999.
'these natures' obviously a missed grasp of a fundamental issue in the english language... 'to play save' should read 'to play it safe'...
I am one of the people on this board who will try to identify people who may be engaging in covert ops for THEIR country. You look like you might be one...
-- (...@.......), December 01, 1999.
uuummmmm....is there any word in the English language that we can use?
-- TM (firstname.lastname@example.org), December 01, 1999.
How odd-- "Scully" is on the list -- "Mulder" is not.
-- Tom Carey (email@example.com), December 02, 1999.
-- C. Hill (firstname.lastname@example.org), December 02, 1999.
So if I claim the writer of this list is a Nerd, they will read this. Hi there NSA guys and gals, got any juicy inside scoop you could post?
-- squid (Itsdark@down.here), December 02, 1999.
I noted some curious exceptions and inclusions. No "anthrax", yet Armani (as in Italian suits) was included. Also, a legitmate list would be alphabetized. Not to say that many, if not most, of the terms aren't on the pigs' list.
-- A (A@AisA.com), December 02, 1999.
Anyone want to write a quick program (comma-delimited list, shouldn't be hard to do) to alphabetize the list for quick reference?
Wackendude and Wackenhutt?? Retinal fetish?? Sears Tower?? This list is priceless!!
-- counting down (email@example.com), December 02, 1999.
At quick glance... don't see "caffe latte" or "fruitcake" on the list.
My e-mail must not be NSA monitored then.
-- Diane J. Squire (firstname.lastname@example.org), December 02, 1999.
"Ronco?" And you silly people thought that the Amazing Ronco (c) Combination Mushroom Mincer, Rutabaga Ruffler, and Squirrel Squasher (tm) you bought from that infomercial was just something harmless, didn't you?
-- Ron Popeil (I've Got@Your.Number), December 02, 1999.
"...Bubba the Love Sponge..." My, my. Hey, if it bothers you, just avoid any words containing a vowel or the consonants "D", "N", "R", "S", or "T", and everything should be just fine.
-- The Whistler (I'm Here, I'm There, I'm Everywhere@so.beware), December 02, 1999.
Just change Y to K and Kou'll be alright.
-- GoldReal (GoldReal@aol.com), December 02, 1999.
Please delete this thread.
-- Colin MacDonald (email@example.com), December 02, 1999.
Why delete it Collin??
What do you have against good ol fun?
There is so much crap and nonsense on a lot of the other treads and I don't see ya howler there?
Whats up ?
-- whatsup (Whats@up.col), December 02, 1999.
Whew!! at least they didn't mention ROPE as in "get a rope" !!!! Taz
-- Taz (Tassie123@aol.com), December 02, 1999.
If this were to work at all, you are giving the Bin Laden's and the Sadam's of this world a chance to pass messages with as much cover as possible at a time when the FBI has warned of an increased danger of terrorist attacks. Ever think this dumb idea just might have originated with the terrorists?
-- John (jh@NotReal.ca), December 02, 1999.
Who can come up with a story, paragraph, or epic novel, using as many of these words (and as few useless non-list words) as possible? Extra points if it rhymes.
-- Linda (firstname.lastname@example.org), December 02, 1999.
From: Y2K, ` la Carte by Dancr (pic), near Monterey, California
AOL? Now that's got to generate a lot of false hits! I once got disconnected, with a warning about a "Terms of Service" violation because, while participating in a discussion of whether AOL show lower it's rates to a flat $20, I argued that if they didn't then Case would soon be dead in the water.
-- Dancr (email@example.com), December 02, 1999.
Can't believe I'm the first one who gets to shout... TIMEBOMB BINGO!!
-- Brooks (firstname.lastname@example.org), December 02, 1999.
John... Nothing here helps the bad guys.
1) They already know these things
2) If the list were real someone would already be on their way to prison.
3) Someone besides the sysops would have removed it before it got hit twice... and nobody would have known why.
4) This list a ploy to get people to pull traffic across the network that will trigger the echelon software and thus help to overload that system, only the poster knows if it is a deliberate attempt to cause problems with echelon or not. Perhaps they are just ignorant.
-- (...@.......), December 02, 1999.
From a recent email:
Subj: "Semantic Forests" and U. S. patent number 5,937,422 Date: Wednesday, December 1, 1999 6:33:20 PM From: email@example.com To: Fun_People@langston.com
From: firstname.lastname@example.org (Peter Langston) Reply-to: email@example.com To: Fun_People@langston.com
X-Lib-of-Cong-ISSN: 1098-7649 -=[ Fun_People ]=- X-http://www.langston.com/psl-bin/Fun_People.cgi From: firstname.lastname@example.org
Jacking in from the "Sticks and Stones" Port:
By Suelette Dreyfus Special Correspondent CyberWire Dispatch
"Semantic Forests" doesn't mean much to the average person. But if you say it in concert with the words "automatic voice telephone interception" and "U.S. National Security Agency" to a computational linguist, you might just witness the physical manifestations of the word "fear."
Words are funny things, often so imprecise. Two people can have a telephone conversation about sex, without ever mentioning the word. And when the artist formerly known as Prince sang a song about "cream," he wasn't talking about a dairy product.
All this linguistic imprecision has largely protected our voice conversations from the prying ears of governments. Until now.
Or, more particularly, it protected us until 15 April, 1997 - the date the NSA lodged a secret patent application at the US Patent Office. Of course, the content of the NSA patent was not made public for two years, since the Patent Office keeps patent applications secret until they are approved, which in this case was August 10, 1999.
What is so worrying about patent number 5,937,422? The NSA is believed to be the largest and by far most well-funded spy agency in the world, a Microsoft of Spookdom. This document provides the first hard evidence that the NSA appears to be well on its way to creating eavesdropping software capable of listening to millions of international telephone calls a day. Automatically.
Patents are sometimes simply ambit claims, legal handcuffs on what often amounts to little more than theory. Not in this case. This is real. The U.S. Department of Defense has developed the NSA's patent ideas into a real software program, called "Semantic Forests," which it has been lab testing for at least two years.
Two important reports to the European Parliament, in 1998 and 1999, and Nicky Hager's 1996 book "Secret Power" reveal that the NSA intercepts international faxes and emails. At the time, this revelation upset a great number of people, no doubt including the European companies which lost competitive tenders to American corporations not long after the NSA found its post-Cold War "new economy" calling: economic espionage.
Voice telephone calls, however, well, that is another story. Not even the world's most technically advanced spy agency has the ability to do massive telephone interception and automatically massage the content looking for particular words, and presumably topics. Or so said a comprehensive recent report to the European Parliament.
In April 1999, a report commissioned by the Parliament's Office of Scientific and Technological Options Assessment (STOA), concluded that "effective voice 'wordspotting' systems do not exist" and "are not in use".
The tricky bit there is "do not exist". Maybe these systems haven't been deployed en masse, but it is looking increasingly like they do actually exist, probably in some form which may be closer to the more powerful topic spotting.
Do The Math ============
There are two new pieces of evidence to support this, and added together, they raise some fairly explosive questions about exactly what the NSA is doing with the millions of international phone calls it intercepts every day in its electronic eavesdropping web commonly known as Echelon.
First. The NSA's shiny new patent describes a method of "automatically generating a topic description for text and sorting text by topic." Sound like a sophisticated web search engine? That's because it is.
This is a search engine designed to trawl through "machine transcribed speech," in the words of the patent application. Think computers automatically typing up words falling from human lips. Now think of a powerful search engine trawling through those words.
Maybe the spy agency only wants to transcribe the BBC Radio World News, but I don't think so. The patent contains a few more linguistic clues about the NSA's intent - little golden Easter eggs buried in the legal long grass. The "Background to the Invention" section of every patent application is the place where the intellectual property lawyers desperately try to waive away everyone else's right to claim anything even remotely touching on the patent.
In this section, the NSA attorneys observed there has been "growing Interest" in automatically identifying topics in "unconstrained speech."
Only a lawyer could make talking sound so painful. "Unconstrained speech" means human conversation. Maybe it's been "unconstrained" by the likelihood of being automatically transcribed for real time topic searching.
Here's the part where the imprecision of words - particularly spoken words - comes in. Machine transcribed conversations are raw, and very hard to analyze automatically with software. Many experts thought the NSA couldn't go driftnet fishing in the content of everyone's international phone calls because the technology to transcribe and analyze those calls was too young.
However, if the NSA didn't have the technology to do automatic transcription of speech, why would it have patented a sifting method which, by its very own words, is aimed at transcripts of human speech?
As Australian cryptographer Julian Assange, who discovered the DoD and patent papers while investigating NSA capabilities observed: "Why make tires if you don't have a car? Maybe we haven't seen the car yet, but we can infer that it exists by all the tires and roads."
One of the top American cryptographers, Bruce Schneier, also believes the NSA already has machine transcription capability. "One of the Holy Grails of the NSA is the ability to automatically search through voice traffic," Schneier said. "They would have expended considerable effort on this capability, and this research indicates at least some of it has been fruitful."
Second, two Department of Defense academic papers show the U.S. developed a real software program, called "Semantic Forests," to implement the patented method.
Published as part of the Text REtrieval Conference (TREC) in 1997 and 1998, the Semantic Forest papers show the program has one main purpose: "performing retrieval on the output of automatic speech-to-text (speech recognition) systems." In other words, the U.S. built this software *specifically* to sift through computer-transcribed human speech.
If that doesn't send a chill down your spine, read on.
The DoD's second prime purpose for Semantic Forests was to "explore rapid Prototyping" of this information retrieval system. That statement was written in 1997.
There's also an unambiguous link between Semantic Forests and the NSA patent, it's human and its name is Patrick Schone.
Schone appears on the NSA patent documents, as an inventor, and the Semantic Forests papers, as an author and he works at Ft. Meade, NSA's headquarters.
Specifically, he works in the DoD's "Speech Research Branch" which just happens to be located at, you guessed it, Ft. Meade.
Very Clever Fish ================
The NSA and the DoD refused to comment on the patent or Semantic Forests respectively. Not surprising really but no matter, since the Semantic Forest papers speak for themselves. The papers reveal a software program which, while somewhat raw a year ago, was advancing quickly in its ability to fish relevant data out of various document pools, including those based on speech.
For example, in one set of tests, the scientists increased the average precision rate for finding relevant documents per query from 19% to 27% in just one year, from 1997 to 1998. Tests in 1998 on another set of documents, in the "Spoken Document Retrieval" pool were turning up similar stats around 20-23 per cent. The team also discovered that a little hand-fiddling in the software reaped large rewards.
According to the 1998 TREC paper: "When we supplemented the topic lists for all the queries (by hand) to contain additional words from the relevant documents, our average precision at the number of relevant documents went from 28% to 50%."
The truth is that Schone and his colleagues have created a truly clever invention. They have done some impressive research. What a shame all this creativity and laborious testing is going to be used for such dark, Orwellian purposes.
Let's work on the mental image of that dark landscape. The NSA sucks down phone calls, emails - all sorts of communications to its satellite bases. Its computers sift through the data looking for information which might interest the U.S. or, if the Americans happen to be feeling generous that day, their allies.
Now, whenever NSA agents want to find out about you, they pull up a slew of details about you on their database. And not just the run-of-the-mill gumshoe detective stuff like your social security number, address, but the telephone number of every person you call regularly, and everything you have said when making those calls to 1-900-Lick-Me from your hotel room on those stop overs in Cleveland.
And here's the real scary stuff:
The NSA likely already has a file on many of us. It's not a traditional manilla file with your name typed neatly on the front. It's the ability to reference you, or anyone who matches your patterns of behavior and contacts, in the NSA's databases. Now, or in the near future, this file may not just include who you are, but what you *say*.
British Member of the European Parliament Glyn Ford is one of the few politicians around who is truly concerned with the individual's right to privacy. A driving force behind the European Parliament's STOA panel's two year investigation into electronic communications, Ford is worried that the NSA possesses technologies that are "potentially very dangerous" to privacy and yet have no controls over their activities.
The Australian aboriginal activist and lawyer Noel Pearson once said that that the British gave three great things to the world: tea, cricket and common law. If unchecked, the NSA and its sister spy agencies in the UK/USA agreement may use this technology to lead an assault on the most important of those gifts and the common law tenet "innocent until proven guilty" may be the first casualty.
How ironic: one Blair wrote '1984' as fiction, and another is helping to make it fact.
= = = = = = = = = = = = = = = =
An Australian-American writer, Suelette Dreyfus was educated in the UK and US, studied at Oxford University and Columbia University in New York, where she won the prestigious Teichmann Prize for excellence and originality in writing.
-- harl (email@example.com), December 03, 1999.
I just copied the list and sent email to myself that included all the words. I have several different accounts set up. Let's see who knocks on my door.
-- Carol (firstname.lastname@example.org), December 03, 1999.