It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The U.S. Department of Agriculture (USDA) offered an unusual contract (PDF) this month, soliciting bids from private software developers for a trial program that would scour the Internet for detailed information on all animal sales, potential animal welfare abuses and other unlawful economic activities relating to animals within the U.S.
In other words, the U.S. government is preparing to spend taxpayer money to spy on Americans’ Internet use, so that it can better protect animals and ensure their handlers have paid for all the proper licenses.
The program, according to a contract publicly available on FedBizOpps.gov, would see a third party developer creating a system that scours forums, websites, usenet groups, social media — and even live chat rooms — for any information relating to sales of pets, exotic animals, animals used for exhibit, teaching, testing or other experimentation, and, particularly, any and all potentially unlicensed hose shows or auctions....
Originally posted by thisguyrighthere
Internet classifieds and forums where animals are bought, sold and traded such as agri forums isnt anywhere near enough information to determine a situation of abuse.
Scour Craigslists Farm and Garden section.
If looking for abusive situations internet postings are basically worthless.
Unless they're counting on that one in 300 million idiot who puts up an add like "free dog, I'm sick of kicking it." Or "bait puppies here L@@K!!!"
Unless Im missing some magic power that dumping terms into a database has this is simply a futile exercise.
Originally posted by RealSpoke
Animal cops already look on craigslist for fighting dogs for sale. I saw it on Animal Planet at least.
And things like this www.thesmokinggun.com... .....edit on 27-3-2012 by RealSpoke because: (no reason given)
Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.”
He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US.
Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email.
The NSA also has the ability to eavesdrop on phone calls directly and in real time. According to Adrienne J. Kinne, who worked both before and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the World Trade Center attacks “basically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.” Even journalists calling home from overseas were included. “A lot of time you could tell they were calling their families,” she says, “incredibly intimate, personal conversations.” Kinne found the act of eavesdropping on innocent fellow citizens personally distressing. “It’s almost like going through and finding somebody’s diary,” she says.
“I had proposed that we automate the process of requesting a warrant and automate approval so we could manage a couple of million intercepts a day, rather than subvert the whole process.” But such a system would have required close coordination with the courts, and NSA officials weren’t interested in that, Binney says. Instead they continued to haul in data on a grand scale.
There is still one technology preventing untrammeled government access to private digital data: strong encryption. Available in three different strengths—128 bits, 192 bits, and 256 bits—it’s incorporated in most commercial email programs and web browsers and is considered so strong that the NSA has even approved its use for top-secret US government communications...
Breaking into those complex mathematical shells like the AES is one of the key reasons for the construction going on in Bluffdale.
Named Jaguar for its speed, it clocked in at 1.75 petaflops, officially becoming the world’s fastest computer in 2009.
Meanwhile, over in Building 5300, the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems.