Bitcoin = Death Processors

Bitcoin = Death Processors

     by Darin Stevenson / Medium

bitcoin Is Makeworky Unmoney

bitcoin is not exactly money. It’s a potentially valuable abstraction of computational ‘work’ that ‘earns’ bitcoin value. But what is bitcoin value and what is the nature of the work? The answers are bizarre because they are nonsensical.

bitcoin value is an abstraction of participation in the history of the network and its transactions. ‘Work’ is a (largely) nonuseful recomputation of, first, the transaction history of the network — which has to be reprocessed each time there is a bitcoin transaction. Then, continual banging away at some useless math with added ‘weight factor’ that makes it arbitrarily difficult for computers to accomplish the generation of a new record-set over time.

The bitcoin algorithms adjust this factor in order to require enough ersatz work so that the heartbeat of the system pulses (produces a block) approximately every ten minutes… and they scale the computational complexity accordingly via input from bitcoin’s own daily developmental activity.

By crossing an invented computational abyss, millions of computers and other machines, many of which have been secretly compromised by hacks, are working full tilt, around the clock… to simply generate a deeper abyss requiring ever-more powerful and numerous computers to cross. And this generates ‘blocks’ in an economy of numbers in machines. These numbers are not exactly money, and their actual value is more complex than cash. And the machines must be serviced, cooled, attended and backed-up, as must the results of their nearly useless hyperactivity.

Most participants are using machines specially designed to resolve these invented computational targets, and as we make faster computers to do this, the network amplifies the difficulty to throttle the pulse.

What is all this about? Well, it’s not a simple question.

Let’s start with money.


What Is Money?

To understand money, one must begin to understand its sources. Perhaps the most fundamental of such introductions is the direct and fascinated observation of animals in nature. The origins of money (and memory) are in nature; exploring them has profound implications for own developing creativity and intelligence.

Beavers, squirrels and other small creatures, including the incredibly inventive corvids, store food (and sometimes treasures) in hiding places we call caches. Some predators may also cache food briefly (meat tends to go bad or get eaten by other creatures who can sense its presence). So, too, ants, wasps, bees and other social insects. This is actually a mode of living memory.

Notice the homonomy here? Cache and cash are the same sound, and this isn’t accidental. Direct relation with nature as and through living places is the original source of our concepts of value. Our relationships with environmentally accessible resources and caching are not merely the beginning of our monetary systems, they are the probable origin point of the peculiar forms of memory and cognition that are the hallmark of our species.

We carefully cache and value our dead. And money is an abstraction of dead people, places, and moments.

Our kind of mind was born in forests and places fraught with elaborate relational constellations of biodiversity and symbiotic intelligence. Alas, the nominal treasure we acquired there went haywire, and now we have nearly wiped those places off the map and erased them from our experience. What was their replacement?

Money (and machines). A representation of cached value, extensible to nearly any common domain of exchange.

There are no living places anymore. We do not encounter or create value… we get cash. Most of the time… that means that someone, or some ecology somewhere, is being wiped out. The results are representational forms of wealth and power.

We don’t have ancient forests any more, and the futures they portended are gone. What there are, are sheets of paper, ingots of gold, diamonds, and little banks of numbers… in machines. On balance sheets.

***

Numeric Supremacy

Numbers. We keep track of them. Too often they become lethal fictions with which ‘we’ (ostensibly: our societies and their systems) determine who lives and who dies. Who is wealthy and who bereft. Everyone is identified by and for the sake of numbers. We imagine these numbers to be true, just, inviolable. But we do not really understand the valuations or applications we celebrate and avow as real; there are always many aspects of value with crucial bearing on any analysis that we leave out of our accounting. Living beings, for example. Minds.

Many of our bizarre celebrations of monetary value or obedience to statistical analyses are simply flawed. It’s hard to get reasonable statistics for any real-world situation. Sometimes we are using stats that are cripplingly outdated or merely wrong. Assays attempting to discover the (astronomical) number of birds killed by electricity transmission only counted those found near wires. What’s the actual number, or a very close guess? We don’t know, because statistics are not entirely reliable beyond their well-behaved purposive contexts. Statistics, it turns out, are very often both manipulable and conveniently monodimensional.

So, too, the cash that stands sovereign behind them.

Such ‘numbers’ and our mishandling of them partly determine or suggest to us what to believe or think about ourselves, each other… the nature of the real. They portend what resources are protected, abstracted from nature, transported or obliterated, for what purposes, and whose ‘profit’.

We seem to have a serious vulnerability as regards representations. Our peculiar fantasies about the meaning of progress or success have cast life on Earth into direct competition with their outcomes—living beings and places now compete for terrain, safety and survival directly against not only objects, habits and machines… but mere data. And they lose.

So do we.

photograph can become so popular that hundreds or even thousands of creatures must die simply to sustain and transmit it millions or billions of times. As unthinkable as this is, it is a fact: people die because numbers in machines merit more resources, attention, care, and nurturance than living beings.

Our electronic activity and transactions have absolutely lethal real world costs that no one is paying attention to. And as we continue to invest human attention and work in an increasingly unreal electronic representation of reality, those prices become staggering. They were unsurvivable 20 years ago. Today, they are simply an ever-expanding array of new forms of environmental, social and psychological rape. For profit. And they can hide in our cultures and lives in ways that are as deadly as they are invisible.

***

When Costs Go Explosive — And Invisible

One of the statistics that is modestly important here is the present population of our species and its growth over say, the last 100 years or so. These figures project their significance on everything we do, and dramatically magnify the repercussions of our common choices simply by increasing the power and frequency of the activities that produce them. An automobile trip to the grocery store has an environmental impact that rises precipitously as populations repeating it double or quadruple.

And this is what has been happening with our population for quite a while now. Perhaps it is nearly as significant that the number of objects per person… particularly machines… has skyrocketed in developed nations. In other words: there are at least two population problems. Ours, and that represented by our machines. Most are happy to complain about the humans. Nearly no one is complaining about the machines.

I find this suspicious.

Here are some ‘interesting numbers’: the statistics of human population growth. It took us at least 2 million years to reach our first billion. It took us approximately 123 to reach the next.

A mere 33 took us to our third.

 

The population gradient for ambient human bodies on Earth.

Prior to around 1800, the most serious human threats to the living planet were deforestation for the sake of construction, war or fuel and maybe wildfires. Secondary to those was mass hunting—particularly the vast atrocities that wiped out entire populations of animals for sport, base ignorance, commerce, or purposes related to human habitation of terrain.

But between the 2nd and 3rd tiers of the human population explosion, new and profusely invasive competitors for resources, attention and terrain were multiplying madly—at rates no one really bothered to examine. During this period, two specific human activity-threats skyrocketed into cultural and ecological dominance, and their impact continues to inscribe a deadly and indelible mark on both human history and terrestrial ecology. I speak here of the machine and the product-for-profit.

Machines are objects against which human beings and living places must directly compete—and we are losing this competition. Inert objects merit more care, attention, valuation, developmental interest, terrain rights, fuel and ‘freedom to reproduce’ than their human originators or the ecologies that are the sources of life and planetary homeostasis. Every living being and place has been subjected to their intrusion, emissions and domination—especially in war. Further, the invention and development of mechanical technology has had profound and unexpected impacts on human development.

Over the past 150 years, Homo Sapiens Sapiens has effectively redirected or even replaced our evolutionary developmental progress in a number of unexpected ways by inhibition, substitution, self-poisoning and, most significantly, by wiping out the ecologies which were the original sources of our evolutionary ascent; standing nearby as both agency of accomplishment and cause we find ‘the machine’.

I would argue that our broad-scale fascination with machines has derailed the development of the intellectual and relational assets necessary to direct our own cultures, let alone the technologies in question, with any degree of insight or wisdom. We have become materialists, and in so doing, we have sounded the death knell of the nurseries of life and intelligence on Earth.

Our extended cultures and collectives are not properly equipped to direct the forces that value, pursue and accomplish technological and industrial development. Our ordinary activities produce results so incredibly ill-considered that were we to pause even briefly in contemplation of them we would prohibit them absolutely. We do not thus pause. Money and the need for it fuel the conversion of the living planet to representations such as cash or goods. And so, too, our human potentials and minds.

It’s murder for money.

Numbers in machines that represent value.

Representations like money arise when what is being represented is no longer available to common experience or expression. As the forests of oral memory were wiped out, we acquired writing. As the experience of the profound value of living beings and places disappeared from common experience, we got a new kind of greenery: cash.

And as cash begins to disappear, we will achieve the ‘third wave’ of re-representation: digital money. Stuff that is not even an object. Nothing more than numbers in machines.

In the case of bitcoin, we are talking about machines that compete against living places and human lives for energy, space, resources, and … attention.

***

Hashing For Cash: Machines Get busy

So, let’s get down to business. What is bitcoin, really? You can think of it as a machine contagion—a network of devices amped to their performance tolerances—machines that do nothing but reprocess every transaction that ever occurred on their network (thus achieving ‘consensus’) while, at the same time, ‘mining’ new blocks of coins (currently worth about 25 btc) by solving a purposefully cumbersome mathematical formula which doesn’t actually accomplish anything other than enforcing computational difficulty. That is: making millions of machines grind away madly at nothing.

This mining process is both the reprocessing of transactions (to join the network), and a ‘weight’ factor that is incremented to insure that the average time for the entire network to ‘solve’ a block (that is, to produce an accurate guess close enough to a mathematically supplied target) is ‘about 10 minutes’.

When you initiate a new machine into the network, you download the current transaction record (a 6-gigabyte file) of the entire history of bitcoin and reprocess it (this takes around 24 hours). You then either ‘mine’ alone (an almost useless endeavor which would take ~98 years to solve a block) or you join a pool of machines. By joining a pool, you get statistically better performance in terms of satoshi (currently: USD $0.0000046543 each) earned as you are ‘rewarded’ for work done by your machine’s participation in the pool.

The more processing power (raw computational force over time) you can bring to bear on ‘the problem’ … the better a chance you have to earn incremental additions to your ‘wallet’ or account. Of course, most of the problem is invented… to be this kind of problem—one that requires more and more computational activity to qualify as complete. And we have now invented specialized machines and chips just to solve this problem.

Machines involved in mining are pressed to the limits of their power consumption and performance profiles; they are ‘pinned’ at 100%+ of their computing power, ceaselessly, and thus generate heat (as well as consuming copious quantities of electrical power).

Because they remain hot, they have to be electronically ventilated. This process of power-heating something we must in turn power-cool, for the phony ‘sake’ of mathematical processes intended to make more work each time they are implemented is deranged. We’re essentially turning computers into heaters that we have to cool to recompute previous computations with. On purpose. A single day of the environmental costs of this process are so catastrophic that if we ever did the accounting — if anyone did — we would immediately understand that this entire idea is a mode of ‘fracking the whole environment’ whose costs rise explosively with every moment we continue the process.

These traditionalists worry that a larger block size will raise the minimum amount of computing power required to fully participate in the Bitcoin network’s peer-to-peer process for clearing transactions. To fully participate in this process, a computer needs to receive a copy of every transaction that has ever been made on the network, which can add up to gigabytes of data every month. If the block limit is raised, then running a Bitcoin node will become even more resource-intensive, potentially pricing out smaller players.

— Ars Magna: A New Deal could End Bitcoin’s Running Civil War

Only a species that had gone entirely insane, and consciously intended to wipe out life on Earth would ever consider such a process. But any species that could actively celebrate and expand it — must be understood as both emphatically suicidal and openly omnicidal. In short: they intend to kill everything, anything, and themselves — and are hell-bent on the continuous and unlimited expansion of this agenda.

The activity of the bitcoin process and some similar networks are not only burning down the future; they are also obliterating the history of humanity and life on Earth, faster and more aggressively every moment, by destroying the living results and opportunities established by this history, and insuring that the benefits that might otherwise blossom into astonishing ‘interest on investment’, are killed off by the necessity of breeding, operating, heating and cooling millions of machines that do makework for a resource that only exists as numbers in machines.

No one with anything resembling a mind would ever allow, let alone celebrate this, and the fact that our modern cultures are doing both is a symptom more serious than our obsessions with war, ecological atrocity, rape-for-profit, and the generation of other lethal processes such as the automobile, the atomic bomb, nuclear reactors and prisons.

bitcoin is an invisible, self-expanding prison/war that, like fracking ‘hides the damage’ in every place and life on Earth. It is a way of violently undermining the very bases of life on Earth, and the fact that no one is doing the accounting is a sign that the social and environmental intelligences of our species have become actively self-compromising.

Imagine if your immune system started producing new forms of HIV instead of macrophages and antibodies… and you begin to get the picture.

Thankfully, there is a limit to the process, but it’s taking a while to get there. The limit is 21 million bitcoins, at least in the present implementation. What does this mean? Well, it means that, according to some sources, 80% of mineable bitcoins will have been acquired within about a year. It also means that the miner margin will shrink, making the process less attractive. It’s not clear what will take place, or if the tail end of this process can be completely accomplished. It’s also not impossible that the present implementation will begin to transform, or reiterate itself once all bitcoins have been mined.

bitcoin forks into two processes 08.01.17.


 

Money is cached torture, murder, atrocity, and domination. It represents possible transactions in future time by obliterating living beings and opportunities in present time.

The only ‘value’ of the computation thus accomplished is that it leverages statistical complexity against computational power in order to mathematically throttle block (and thus bitcoin) production. So, we are inventing increasing quantities of work for increasing quantities of computers to do and the easier it becomes, the more we throttle it to make it harder… faster.

Purportedly, all of this bother results in profit, at least in theory. I say in theory because the putative returns require investments… of time, space, electricity, temperature, attention… and… computation. What one invests in one way is lost twice, both in the investment and in what more profitable or noble work might have been done with the same effort or resources.

There are a wide variety of other problems here, from the fact that malware that infects vast numbers of machines has been found mining bitcoin (resource diversion), to the embarrassing ‘sudden disappearance’ of thousands (or occasionally millions) of dollars worth of bitcoins in thefts from ‘exchanges’ or technical bungles (wallet loss).

Why are we purchasing banks of highly specialized computers and heating them up with computational burdens that tax their performance spec and then paying to cool them back down—in order to accomplish nothing useful?

The answer is that we have invented a ‘false problem’ that tens of thousands of machines now work to achieve the result for relatively uninterrupted, and these machines are themselves resources which require resources to build, run, track, back up, and otherwise maintain. How much varies widely by installation, but as you can see in the image that begins this essay, many people are building banks of machines that do nothing but process bitcoin blocks. Nothing else. Just that. And these have to be housed, stored, powered, repaired, attended, backed-up, protected, and cooled.

Bitcoin Energy Usage Analysis.

bitcoin is an essentially mechano-vampiric paradigm where massive amounts of actually usless computation are done with increasing ferocity while producing nothing of any value whatsoever except a kind of pure abstraction of computing having been done, and the glorious ‘record of transactions’ which becomes a veritable church of common computational record—and remains just as meaningless in that guise.

Those who are involved in this racket have chosen to dedicate cash, space, power and other resources to the process. But what is the process? It is to process a meaningless series of processes, ever-more ineffectively, on purpose.

That’s the wrong thing to dedicate resources to, and it produces direct mechanical competition against our own minds, cultures, needs and development. The idea of a homegrown electronic cryptocurrency is not entirely misguided. Personally, I think it would be powerful to develop something that produces value based on merit of actual work, discovery or contribution… accomplished by individuals or collectives. This is something I hope we may see relatively soon. But what bitcoin is and is doing is stridently malformed.


What exactly is profit? A crucial part of the answer is that it is the abstracted remains of obliterated lives, pricelessly irreplaceable ecosystems and precious relationships we never noticed or acknowledged, let alone understood. It is the remains of what might have been revolutionary intelligence, discovery, mutual uplift, evolution, wonder and actual human progress. It is the bodies and remains of animals, human beings and families, dreams of access to new developmental and creative opportunities, and living worlds of possibility that were burnt down and turned into little sheets of paper.

***

In all too many cases, the ‘next big thing’ is actually the next endlessly self-amplifying graveyard.

 

It is well-known that a ‘materially successful’ male or female represents an attractive mating partner for a variety of reasons, both profound and superficial in nature. In effect, the ‘standing cache’ of a given person or group is a signal about how effective various aspects of their skills and/or intelligence are in the specific domains that these representations are derived from.

The problem is this: the message is mixed, because their cache is social power… but its sources and functions often begin with atrocities,, some of which reach far back into the history of our people and the land.

The Kwakiutl called their money objects yaklelwas, which means “bad things,” a word that has the same root as ‘dead bodies” and “intestines.” When they had their potlatch money-destruction ceremonies they said they were “wiping off the shame” from their body, like one wipes off shit, by giving money away or destroying it.(11)

Bitcoin Block Reward Halving Countdown (many interesting up-to-the-moment statistics about the current state of the process).

Note : There are now a large number of cryptocurrencies, each with unique features, benefits and costs of operation. While some of these may utilize similar processes that require vast amounts of computational activity to generate, others do not. I am presently doing some research to understand more about the other systems, some of which are mentioned in the comments.

Photos: Life inside of China’s massive and remote bitcoin mines

Editor’s note: This article originally appeared on Medium.  Republished with permission of the author.

Time is Short: Cyber-sabotage in Saudi Arabia

Time is Short: Cyber-sabotage in Saudi Arabia

Civilization is not a static force. It has metastasized across the world by accelerating its own development, by transforming the blood and corpses of its victims into new weapons with which to wage its relentless war against all life

Grasslands become grain monocultures feeding armies, conquering forests and mountains that become ships and swords that kill other cultures, conquering more forests and mountains, whose trees and minerals are turned into timber mills and trains, going forth to dam rivers, turning the relentless fluidity of their being to electricity to smelt iron and steel and aluminum, which in turn become guns and ocean tankers, which expand this superstructure ever further, tirelessly taking in what little wild remains, absorbing everything and everyone into this accelerating death march.

And yet, as the world is tied and bound tighter into this brutal arrangement, civilization (and especially industrialism) becomes more and more vulnerable, more open and fragile to disruption and destruction.

This brittleness is exemplified by the near-total dependence of the industrial economy on “advanced” technology, and the internet. This dependency upon a decentralized and accessible system that is poorly regulated and controlled—at least compared to other physical structures, like the offices of the same corporations— presents a potential point of powerful leverage against the operation of civilization.

Activists and resisters around the world are beginning to realize this, and seize the opportunity it presents to groups engaged in asymmetric forces against destruction.

Such as in Saudi Arabia; from a recent article in the New York Times;

“On Aug. 15, more than 55,000 Saudi Aramco [described as the world’s most valuable company] employees stayed home from work to prepare for one of Islam’s holiest nights of the year — Lailat al Qadr, or the Night of Power — celebrating the revelation of the Koran to Muhammad.

That morning, at 11:08, a person with privileged access to the Saudi state-owned oil company’s computers, unleashed a computer virus to initiate what is regarded as among the most destructive acts of computer sabotage on a company to date. The virus erased data on three-quarters of Aramco’s corporate PCs — documents, spreadsheets, e-mails, files — replacing all of it with an image of a burning American flag.”

This attack presents a good example of targeting a systemic weak point within the infrastructure of Saudi Aramco and maximizing impact through effective use of systems disruption: destroying three-fourths of corporate data will have impacts that last for weeks, and inhibit the company’s operation for some time. In fact, the attack leveraged the company’s response against itself:

“Immediately after the attack, Aramco was forced to shut down the company’s internal corporate network, disabling employees’ e-mail and Internet access, to stop the virus from spreading.”

The cyber-sabotage also highlights the importance of careful planning and timing.

“The hackers picked the one day of the year they knew they could inflict the most damage…”

This smart and strategic approach to action planning is something that is too often overlooked, ignored, or dismissed entirely. Yet for resistance to be effective, it must follow the same principles. Rather than striking at weak points to cripple the operation or function of industrial activity, attacks are typically made against symbolic or superficial targets, leaving the operation of the brutal industrial machine unscathed. We cannot continue to stumble with strategic blindness, lashing out all but randomly, and no more than hoping to hit the mark.

Again, civilization is not a static force: every hour, more forests, prairies, mountains and species are destroyed and extirpated. Every hour, civilization is pulled further into biotic collapse. We are out of time. With everything at stake, we are not only justified in using any means necessary to bring down civilization; it is our moral mandate as living beings to do so. But for that resistance to truly be meaningful and effective, it must also be smart. It cannot be reactive and sporadic, but strategic and coordinated; designed not just to inflict damage or dent profit margins, but to disable the fundamental support-systems that sustain industrial civilization and bring it all to a screeching halt.

This is one reason why cyber-sabotage has such potential as a tactic to be used in dismantling industrial civilization. Most, if not all, of the critical systems that sustain it are by now reliant upon computer networks, which as the Saudi Aramco attack demonstrates, are very vulnerable to disruption.

Online attacks also lend themselves as a tactic to asymmetric forces, and allow a very small group of people to carry out decisive, coordinated strikes from a distance, rather than requiring people on the ground to coordinate across the country to achieve a similar effect.

Civilization’s relentless growth and accelerating technology-spiral has rendered murder and death across the planet on a scale that would be unimaginable if it weren’t the horrific reality we now find ourselves in. But this process of unceasing centralization and control has also become its weakness, and for all its imposing gigantism, the tower of civilization is incredibly unstable, and now begins to sway precariously. It’s time to push with all our might, and topple it once and for all.

Learning to leverage key systems against themselves is crucial to the success of a militant resistance movement, and ultimately is at the core of any effective strategy to disable the function of industrial civilization and ultimately to dismantle it. Cyber-sabotage presents a vital opportunity to use the dynamics of industrial operations—such as the complete dependency of the electric grid or oil refineries upon complex computer systems—to accomplish that most fundamental and necessary goal.

Time is Short: Reports, Reflections & Analysis on Underground Resistance is a biweekly bulletin dedicated to promoting and normalizing underground resistance, as well as dissecting and studying its forms and implementation, including essays and articles about underground resistance, surveys of current and historical resistance movements, militant theory and praxis, strategic analysis, and more. We welcome you to contact us with comments, questions, or other ideas at undergroundpromotion@deepgreenresistance.org

US and UK exporting surveillance technologies to nations with “poor human rights records”

By Jamie Doward / The Observer

Britain is exporting surveillance technology to countries run by repressive regimes, sparking fears it is being used to track political dissidents and activists.

The UK’s enthusiastic role in the burgeoning but unregulated surveillance market is becoming an urgent concern for human rights groups, who want the government to ensure that exports are regulated in a similar way to arms.

Much of the technology, which allows regimes to monitor internet traffic, mobile phone calls and text messages, is similar to that which the government has controversially signalled it wants to use in the UK.

The campaign group, Privacy International, which monitors the use of surveillance technology, claims equipment being exported includes devices known as “IMSI catchers” that masquerade as normal mobile phone masts and identify phone users and malware – software that can allow its operator to control a target’s computer, while allowing the interception to remain undetected.

Trojan horse software that allows hackers to remotely activate the microphone and camera on another person’s phone, and “optical cyber solutions” that can tap submarine cable landing stations, allowing for the mass surveillance of entire populations, are also being exported, according to the group.

Privacy International said it had visited international arms and security fairs and identified at least 30 UK companies that it believes have exported surveillance technology to countries including Syria, Iran, Yemen and Bahrain. A further 50 companies exporting similar technology from the US were also identified. Germany and Israel were also identified as big exporters of surveillance technology, in what is reportedly a £3bn a year industry.

Last month Privacy International asked 160 companies about sales of equipment to repressive regimes. So far fewer than 10 have written back to deny selling to nations with poor human rights records. The campaign group warns: “The emerging information and communications infrastructures of developing countries are being hijacked for surveillance purposes, and the information thereby collected is facilitating unlawful interrogation practices, torture and extrajudicial executions.”

Many of the brochures, presentations and marketing videos used by surveillance companies to promote their technology have now been posted on the WikiLeaks website, while a list of firms identified by Privacy International as a cause for concern has been provided to the Department for Business, Innovation and Skills. The trade minister, Mark Prisk, has been briefed on the situation.

Last month the European council banned the export of surveillance technologies to Iranian authorities in response to serious human rights violations. It has imposed similar bans on exports to Syria.

But human rights groups said equipment was still being sold to commercial organisations in the two countries and called for the government to take stronger action.

“By the time the embargo is in place the ship has sailed,” said Eric King, head of research at Privacy International. “Our research shows the idea that this is not a British problem is wrong. We need governments to act now. In a few years this equipment will need to be updated; these countries don’t have the technical expertise to do it, so this is something the UK needs to be aware of and to take action against now.”

Read more from The Raw Story: http://www.rawstory.com/rs/2012/04/07/uk-exporting-surveillance-technology-to-repressive-nations/

New legislation will allow UK government to monitor every call, email, text, and website visit

By BBC News

The government will be able to monitor the calls, emails, texts and website visits of everyone in the UK under new legislation set to be announced soon.

Internet firms will be required to give intelligence agency GCHQ access to communications on demand, in real time.

The Home Office says the move is key to tackling crime and terrorism, but civil liberties groups have criticised it.

Tory MP David Davis called it “an unnecessary extension of the ability of the state to snoop on ordinary people”.

Attempts by the last Labour government to take similar steps failed after huge opposition, including from the Tories.

‘Unprecedented step’

A new law – which may be announced in the forthcoming Queen’s Speech in May – would not allow GCHQ to access the content of emails, calls or messages without a warrant.

But it would enable intelligence officers to identify who an individual or group is in contact with, how often and for how long. They would also be able to see which websites someone had visited.

In a statement, the Home Office said action was needed to “maintain the continued availability of communications data as technology changes”.

David Davis Conservative MP and former shadow home secretary

“It is vital that police and security services are able to obtain communications data in certain circumstances to investigate serious crime and terrorism and to protect the public,” a spokesman said.

“As set out in the Strategic Defence and Security Review we will legislate as soon as parliamentary time allows to ensure that the use of communications data is compatible with the government’s approach to civil liberties.”

But Conservative MP and former shadow home secretary David Davis said it would make it easier for the government “to eavesdrop on vast numbers of people”.

“What this is talking about doing is not focusing on terrorists or criminals, it’s absolutely everybody’s emails, phone calls, web access…” he told the BBC.

Read more from BBC News: http://www.bbc.co.uk/news/uk-politics-17576745

New NSA surveillance center will track everything from private emails to parking receipts

By James Bamford, Wired

The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s the heart of Mormon country, where religious pioneers first arrived more than 160 years ago. They came to escape the rest of the world, to understand the mysterious words sent down from their god as revealed on buried golden plates, and to practice what has become known as “the principle,” marriage to multiple wives.

Today Bluffdale is home to one of the nation’s largest sects of polygamists, the Apostolic United Brethren, with upwards of 9,000 members. The brethren’s complex includes a chapel, a school, a sports field, and an archive. Membership has doubled since 1978—and the number of plural marriages has tripled—so the sect has recently been looking for ways to purchase more land and expand throughout the town.

But new pioneers have quietly begun moving into the area, secretive outsiders who say little and keep to themselves. Like the pious polygamists, they are focused on deciphering cryptic messages that only they have the power to understand. Just off Beef Hollow Road, less than a mile from brethren headquarters, thousands of hard-hatted construction workers in sweat-soaked T-shirts are laying the groundwork for the newcomers’ own temple and archive, a massive complex so large that it necessitated expanding the town’s boundaries. Once built, it will be more than five times the size of the US Capitol.

Rather than Bibles, prophets, and worshippers, this temple will be filled with servers, computer intelligence experts, and armed guards. And instead of listening for words flowing down from heaven, these newcomers will be secretly capturing, storing, and analyzing vast quantities of words and images hurtling through the world’s telecommunications networks. In the little town of Bluffdale, Big Love and Big Brother have become uneasy neighbors.

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”

For the NSA, overflowing with tens of billions of dollars in post-9/11 budget awards, the cryptanalysis breakthrough came at a time of explosive growth, in size as well as in power. Established as an arm of the Department of Defense following Pearl Harbor, with the primary purpose of preventing another surprise assault, the NSA suffered a series of humiliations in the post-Cold War years. Caught offguard by an escalating series of terrorist attacks—the first World Trade Center bombing, the blowing up of US embassies in East Africa, the attack on the USS Cole in Yemen, and finally the devastation of 9/11—some began questioning the agency’s very reason for being. In response, the NSA has quietly been reborn. And while there is little indication that its actual effectiveness has improved—after all, despite numerous pieces of evidence and intelligence-gathering opportunities, it missed the near-disastrous attempted attacks by the underwear bomber on a flight to Detroit in 2009 and by the car bomber in Times Square in 2010—there is no doubt that it has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created.

In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever.

From Wired: http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1