Let's Know Things cover art

Let's Know Things

By: Colin Wright
  • Summary

  • A calm, non-shouty, non-polemical, weekly news analysis podcast for folks of all stripes and leanings who want to know more about what's happening in the world around them. Hosted by analytic journalist Colin Wright since 2016.

    letsknowthings.substack.com
    Colin Wright
    Show More Show Less
Episodes
  • Section 702
    Apr 23 2024
    This week we talk about STELLARWIND, 9/11, and the NSA.We also discuss warrantless surveillance, intelligence agencies, and FISA.Recommended Book: Period: The Real Story of Menstruation by Kate ClancyTranscriptImmediately after the terrorist attacks in the US on September 11, 2001, then President George W. Bush gave his approval for the National Security Agency, the NSA, to run a portfolio of significant and ever-evolving cross-agency efforts aimed at preventing future attacks of that kind, scale, and scope.The thinking behind this collection of authorizations to various US intelligence agencies, which would operate in tandem with the NSA, was that we somehow didn't see this well-orchestrated, complex plan coming, and though revelations in later years suggested we kind of did, we just didn't act on the intelligence we had, in those early, post-attack days, everyone at the top was scrambling to reassure the country that things would be okay, while also worrying that more attacks from someone, somewhere, might be impending.So the President signed a bunch of go-aheads that typically wouldn't have been signed, and the government gave a lot of power to the NSA to amalgamate the resulting intelligence data in ways that also wouldn't have previously been okay'd, but that, in those unusual circumstances, were considered to be not just acceptable, but desirable and necessary.This jumble of intelligence service activities, approved by the president and delegated to the NSA, became known as the President's Surveillance Program, and they were kept secret, in part because of how unprecedented they were, and in part because those in charge didn't want to risk their opposition—those they knew about, like Al Qaeda, but also those that might be waiting in the wings to attack the US while it was perceptually weakened and vulnerable—they didn't want to risk those entities knowing what they were doing, what they knew about, how they were collecting data, and so on.The info that was gleaned via these programs was compiled and stored in an SCI, which stands for Sensitive Compartment Information, and which refers to a type of document control system, a bit like Top Secret or Classified, in that it allows those running it to set what level of access people must have to view, process, use, or even discuss its contents, and this particular SCI was codenamed STELLARWIND.Among other activities, the programs feeding data into the Stellarwind SCI mined huge databases of email and phone communications, alongside web-browsing and financial activities; all sorts of tracking information that's collected by various components of intelligence, law enforcement, and other government and government-adjacent services were tapped and harvested.All of this data was then funneled into this one program, and though the degree to which this much information is useful up for debate, because having a slew of data doesn't mean that data is organized in useful ways, in 2004 the US Justice Department discovered that the NSA was not just collecting this sort of data when it was connected to foreign entities or entities that have been connected to terrorism, it was also collecting it from sources and people, including just average everyday Americans and small businesses that were doing no terrorism at all, and which had no links to terrorism, and it was doing so on American soil.After this discovery, then-President Bush said, well, the NSA is allowed to do that, that's fine, but they can only look at collected metadata related to terrorism—so they can collect whatever they want, sweep up gobs of information, file-away whatever drifts into their expansive and undifferentiating nets, but they're not allowed to look at and use anything not related to terrorism; and with that clarification to keep the Justice Department from doing anything that might hinder the program, the president reauthorized it that same year, 2004.There was disagreement within the government about the legality of all this, some entities saying that warrantless wiretapping of American citizens was illegal, even if the collected data was supposedly unusable unless some kind of terrorism connection could be ginned up to justify it. But those in charge ultimately decided that it would be irresponsible not to use these wiretapping powers the NSA wielded to protect American lives, and even said that Congress had no power to stop them from doing so, because it fell within their wheelhouse, that of defense against potential future foreign attack.All of the President's Surveillance Programs officially expired on February 1 of 2007, but new legislation that same year, and more in 2008, extended some of these activities, all with the justification of protecting the US from future terrorist attacks, and in 2009, a report published by the Inspectors General of the country's intelligence agencies found, in essence, that the now-retired President's Surveillance Program went way beyond what was ...
    Show More Show Less
    17 mins
  • Presidential Immunity
    Apr 16 2024
    This week we talk about diplomatic immunity, Trump’s court cases, and the Supreme Court.We also discuss Nixon, Clinton, and the US Constitution.Recommended Book: My upcoming book, How To Turn 39 (https://books2read.com/htt39), which is available for pre-order today :)TranscriptThere's a concept in international law—diplomatic immunity—that says, in essence, certain government officials should be immune from the laws of foreign countries, including those within which they're operating.This is a very old concept, based on similar rights that were granted to envoys and messengers back in the oldest documented periods of human civilizations.The idea is that if different cultures, whether organized into tribes or kingdoms or nation states, are going to be able to deal with each other, they need to maintain open and reliable means of communication. Thus, the folks tasked with carrying messages between leaders of these different groups would need to be fairly confident that they wouldn't be hassled or attacked or prosecuted by the people they were bringing those messages to, and whose messages they were bringing back to their own leaders.Such representatives have at times been imprisoned or killed by their hosts, but this is relatively rare, because any governing body that treated ambassadors from other cultures in this way would have trouble dealing with anyone outside their current legal sway, and that would in turn mean less trade, less reliable peace, and less opportunity to generally cross-pollinate with cultures they might benefit from cross-pollinating with.As a general rule, at least in the modern iteration of diplomatic immunity, folks operating under the auspices of this policy can still be punished for their misdeeds, it's just that they'll generally be declared persona non grata, expelled from the country where they did something wrong, rather than punished under that country's laws.In some rare instances a country hosting a misbehaving or criminal ambassador or other diplomat might ask that person's home country to waive their immunity, basically saying, look, this person killed someone or got drunk and drove recklessly through our capitol city's downtown, we'd like to try them in our courts, and it may be that the government running that misbehaving person's home country says, okay, yeah, that's messed up, you go ahead; but usually—even if that person has done something truly reprehensible—they'll instead say, no, sorry, we'll pull them back and they won't be allowed to return to your country or serve as an ambassador anywhere else, because they've shown themselves to be unreliable, and we might even try them in a court here, in their home country, but we can't allow our people, no matter what they do, to fall under the legal jurisdiction of some other nation, because that would set a bad precedent, and it may make people wary of working for us in this capacity in the future—surely you understand.There are tiers of diplomatic immunity, depending on the seniority of the diplomat or other representative in question, and the Congress of Vienna of the early 1800s charted out the basis for how these things work, in much detail, formalizing a lot of what was already in the ether back then, and creating an outline that was then further formalized in 1961's Vienna Convention on Diplomatic Relations, which has been almost universally ratified and respected, though of course there's been a lot of grey area in terms of what harassment of a representative, which is a no-no according to this convention, entails, and to what degree it can be proven, and thus punished, if violated.We saw a lot of grey area utility during the height of the Cold War in particular, in part because many diplomats were moonlighting as spies, which is still true today, though it was even more overt and worrisome to their host countries, back then, so harassment, kidnappings, even assassinations of diplomats were more common then, than today, though they were still almost universally done covertly so that no one seemed to be violating these nearly universally accepted terms.What I'd like to talk about today is another type of legal immunity—in this case, Presidential Immunity in the US—and why this type of immunity is at the center of former US President Trump's ongoing legal cases.—In the United States, many politicians and high-level appointees enjoy some of the immunity-related privileges in their own country that diplomats of various stripes have traditionally enjoyed elsewhere.Most of these figures are only protected by this immunity under very specific circumstances, though, not universally.Judges, while doing court-related, judge-work, for instance, have absolute civil immunity—so a judge who falls afoul of the law in the course of their duty as a judge, doing judge-things, will tend to get away with whatever it is they did wrong, though this won't generally apply to non-judge things they do during that ...
    Show More Show Less
    20 mins
  • XZ Utils Hack
    Apr 9 2024
    This week we talk about Linux, backdoors, and the Open Source community.We also discuss CPU usage, state-backed hackers, and SSH.Recommended Book: The Underworld by Susan CaseyTranscriptIn the world of computers, a "backdoor" is a means of accessing a device or piece of software via an alternative entry point that allows one to bypass typical security measures and often, though not always, to do so in a subtle, undetected and maybe even undetectable manner.While backdoors can be built into hardware and software systems by the companies that make those devices and apps and bits of internet architecture, and while some governments and agencies, including the Chinese government, and allegedly folks at the NSA, have at times installed backdoors in relevant hardware and software for surveillance purposes, backdoors are generally the domain of tech-oriented criminals of various stripes, most of whom make use of vulnerabilities that are baked into their targets in order to gain access, and then while inside the administration components of a system, they write some code or find some kind of management lever meant to give the company or other entity behind the target access for non-criminal, repair and security purposes, and that then allows them to continue to gain access in the future; like using a rock to prop open a door.Concerns over a backdoor being installed in vital systems is fundamental to why the US and European governments have been so hesitant to allow Chinese-made 5G hardware into their wireless communication systems: there's a chance that, with the aid, or perhaps just at the prodding of the Chinese government, such hardware, or the software it utilizes, could contain a Trojan or other packet of code, hidden from view and hardcoded into the devices in some covert manner; these devices could also harbor even smaller devices, indistinguishable from hardware that's meat to be there, that would allow them to do the same via more tangible means.Though there were almost certainly other economic and technology-dominance reasons for the clampdown on products made by Chinese tech company Huawei beginning in earnest in 2012, and escalating rapidly during the US Trump administration, that process was at least ostensibly tied to worries that a Chinese company, prone to spying and stealing foreign tech, already, might incorporate itself into fundamental global communication infrastructure.It was underpricing everybody else, offering whizbang new high-end 5G technology at a discount, and supposedly, if the accusations are true, at least, doing so as part of a bigger plan to tap into all sorts of vital aspects of these systems, giving them unparalleled access to all communications, basically, but also giving them the ability, supposedly, to shut down those systems with the press of a button in the event that China wants or needs to do so at some point, if they ever decide to invade Taiwan, for instance, and want to distract the Western world until that invasion is complete, or just make rallying a defense a lot more difficult.Other, confirmed and successfully deployed backdoors have been found in all sorts of products, ranging from counterfeit Cisco network products, like routers and modems, some of which were installed in military and government facilities back in 2008 before they were recognized for what they were, to Microsoft software, Wordpress plugins, and a brand of terminals that manage the data sent along fiber-optic cables, mostly for high-speed internet purposes.Again, in some cases, the entities making these products sometimes do install what are literally or essentially backdoors in their hardware and software because it allows them to, for instance, help their customers retrieve lost passwords, fix issues, install security updates, and so on.But backdoors of any shape or size are considered to be major security vulnerabilities, as stealing a password or getting access to a vital terminal could then grant someone with bad intentions access to absolutely everything, giving them god-like control over all aspects of a customer's information and operations, or maybe all of the company's customer's information and operations, and that creates a single point of failure that most companies want to avoid, because at a certain point there's no real way to prevent a truly determined and well-funded foe if they know the payout for investing in accessing that terminal or getting that password would be that substantial.What I'd like to talk about today is a long-term effort to do exactly that, the target, in this case, being small, but the potential payoff of backdooring it being pretty much as big as you can imagine.—XZ Utils is the name of an Open Source data compression utility, which means that it squishes data in such a way that no information is lost, but so that big files and other packets of information become smaller, and that makes it faster and easier and cheaper to send that data from place to ...
    Show More Show Less
    19 mins

What listeners say about Let's Know Things

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.