HomeLatest ThreadsGreatest ThreadsForums & GroupsMy SubscriptionsMy Posts
DU Home » Latest Threads » Forums & Groups » Main » General Discussion (Forum) » Guardian: "XKeyscore: NSA...

Wed Jul 31, 2013, 09:05 AM

Guardian: "XKeyscore: NSA tool collects 'nearly everything a user does on the internet'"

Last edited Wed Jul 31, 2013, 12:31 PM - Edit history (1)

XKeyscore: NSA tool collects 'nearly everything a user does on the internet'



• XKeyscore gives 'widest-reaching' collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
NSA's XKeyscore program – read one of the presentations

Glenn Greenwald
theguardian.com, Wednesday 31 July 2013 08.56 EDT


One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet.'

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its "widest reaching" system for developing intelligence from the internet.

...

"I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.

...

The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.

...









Chats, browsing history and other internet activity











To solve this problem, the NSA has created a multi-tiered system that allows analysts to store "interesting" content in other databases, such as one named Pinwale which can store material for up to five years.





"The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.



Acknowledging what he called "a number of compliance problems", Clapper attributed them to "human error" or "highly sophisticated technology issues" rather than "bad faith".


http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

257 replies, 33182 views

Reply to this thread

Back to top Alert abuse

Always highlight: 10 newest replies | Replies posted after I mark a forum
Replies to this discussion thread
Arrow 257 replies Author Time Post
Reply Guardian: "XKeyscore: NSA tool collects 'nearly everything a user does on the internet'" (Original post)
Catherina Jul 2013 OP
think Jul 2013 #1
appal_jack Jul 2013 #6
think Jul 2013 #11
reformist2 Jul 2013 #114
bvar22 Jul 2013 #177
ConservativeDemocrat Jul 2013 #209
reusrename Aug 2013 #218
usGovOwesUs3Trillion Aug 2013 #248
think Jul 2013 #2
Catherina Jul 2013 #5
snooper2 Jul 2013 #3
bunnies Jul 2013 #4
Catherina Jul 2013 #7
bunnies Jul 2013 #10
think Jul 2013 #17
LiberalEsto Jul 2013 #12
NealK Jul 2013 #99
snooper2 Jul 2013 #9
bunnies Jul 2013 #13
snooper2 Jul 2013 #16
bunnies Jul 2013 #23
snooper2 Jul 2013 #33
bunnies Jul 2013 #75
backscatter712 Jul 2013 #118
Th1onein Jul 2013 #188
snooper2 Aug 2013 #236
Th1onein Aug 2013 #249
Mojorabbit Aug 2013 #212
leveymg Jul 2013 #18
bunnies Jul 2013 #26
hootinholler Jul 2013 #36
leveymg Jul 2013 #54
leveymg Jul 2013 #40
bunnies Jul 2013 #67
leveymg Jul 2013 #84
kentuck Jul 2013 #91
leveymg Jul 2013 #95
questionseverything Jul 2013 #142
questionseverything Jul 2013 #146
leveymg Jul 2013 #149
Ghost Dog Aug 2013 #219
leveymg Aug 2013 #223
Th1onein Jul 2013 #191
leveymg Jul 2013 #194
Th1onein Aug 2013 #254
Th1onein Jul 2013 #189
leveymg Jul 2013 #198
Th1onein Jul 2013 #200
leveymg Jul 2013 #202
Ghost Dog Aug 2013 #220
Th1onein Aug 2013 #252
Th1onein Aug 2013 #253
Th1onein Jul 2013 #186
bunnies Aug 2013 #227
Th1onein Aug 2013 #250
Coyotl Jul 2013 #43
Th1onein Jul 2013 #192
GiaGiovanni Aug 2013 #245
backscatter712 Jul 2013 #85
xchrom Jul 2013 #8
leveymg Jul 2013 #14
Catherina Jul 2013 #29
leveymg Jul 2013 #42
Catherina Jul 2013 #52
leveymg Aug 2013 #231
Catherina Aug 2013 #232
snot Jul 2013 #15
Civilization2 Jul 2013 #19
truebluegreen Jul 2013 #21
Civilization2 Jul 2013 #46
sabrina 1 Jul 2013 #90
truebluegreen Jul 2013 #138
Hippo_Tron Jul 2013 #201
Catherina Jul 2013 #32
Civilization2 Jul 2013 #49
hootinholler Jul 2013 #39
RC Jul 2013 #48
LondonReign2 Jul 2013 #72
nadinbrzezinski Jul 2013 #77
MisterP Jul 2013 #157
rhett o rick Jul 2013 #176
truebluegreen Jul 2013 #20
whttevrr Jul 2013 #22
Jackpine Radical Jul 2013 #71
Th1onein Aug 2013 #255
caseymoz Jul 2013 #24
grahamhgreen Jul 2013 #158
Harmony Blue Jul 2013 #179
OnyxCollie Jul 2013 #25
think Jul 2013 #28
OnyxCollie Jul 2013 #44
think Jul 2013 #80
NealK Jul 2013 #115
think Jul 2013 #122
NealK Jul 2013 #129
nebenaube Jul 2013 #50
OnyxCollie Jul 2013 #53
grahamhgreen Jul 2013 #162
Marr Jul 2013 #27
gordianot Jul 2013 #30
Quantess Jul 2013 #197
gordianot Jul 2013 #204
xocet Jul 2013 #31
Marr Jul 2013 #34
carolinayellowdog Jul 2013 #103
Marr Jul 2013 #107
Savannahmann Jul 2013 #35
leveymg Jul 2013 #45
Enthusiast Aug 2013 #224
leveymg Aug 2013 #225
Enthusiast Aug 2013 #228
leveymg Aug 2013 #230
Enthusiast Aug 2013 #234
LondonReign2 Jul 2013 #74
Historic NY Jul 2013 #37
Electric Monk Aug 2013 #213
Historic NY Aug 2013 #222
TBF Jul 2013 #38
leveymg Jul 2013 #47
usGovOwesUs3Trillion Aug 2013 #247
grasswire Jul 2013 #131
Go Vols Jul 2013 #139
marions ghost Jul 2013 #140
TBF Jul 2013 #147
Catherina Jul 2013 #159
chimpymustgo Jul 2013 #170
Coyotl Jul 2013 #41
leveymg Jul 2013 #51
Catherina Jul 2013 #65
Coyotl Jul 2013 #134
AzDar Jul 2013 #55
steve2470 Jul 2013 #56
idwiyo Jul 2013 #57
Buns_of_Fire Jul 2013 #58
Kablooie Jul 2013 #79
HardTimes99 Jul 2013 #195
Harmony Blue Jul 2013 #59
usGovOwesUs3Trillion Jul 2013 #60
DesMoinesDem Jul 2013 #61
Harmony Blue Jul 2013 #63
DesMoinesDem Jul 2013 #66
Harmony Blue Jul 2013 #70
nadinbrzezinski Jul 2013 #83
sabrina 1 Jul 2013 #136
Catherina Jul 2013 #69
backscatter712 Jul 2013 #87
IDemo Jul 2013 #145
Th1onein Jul 2013 #193
backscatter712 Jul 2013 #203
Th1onein Aug 2013 #251
randome Jul 2013 #106
NealK Jul 2013 #125
randome Jul 2013 #128
Civilization2 Jul 2013 #135
randome Jul 2013 #137
Go Vols Jul 2013 #156
randome Jul 2013 #167
neverforget Jul 2013 #187
randome Jul 2013 #196
Go Vols Aug 2013 #237
questionseverything Jul 2013 #144
randome Jul 2013 #169
Enthusiast Aug 2013 #226
caduceus111 Aug 2013 #221
randome Aug 2013 #229
fascisthunter Jul 2013 #185
nolabels Jul 2013 #62
Catherina Jul 2013 #64
leveymg Jul 2013 #113
Catherina Jul 2013 #120
Catherina Jul 2013 #130
cantbeserious Jul 2013 #68
Xithras Jul 2013 #73
ljm2002 Jul 2013 #100
Kablooie Jul 2013 #76
Swede Atlanta Jul 2013 #78
Harmony Blue Jul 2013 #82
truedelphi Jul 2013 #174
QC Jul 2013 #81
LondonReign2 Jul 2013 #86
ProSense Jul 2013 #88
leveymg Jul 2013 #92
cantbeserious Jul 2013 #93
ProSense Jul 2013 #96
leveymg Jul 2013 #97
ProSense Jul 2013 #101
leveymg Jul 2013 #108
randome Jul 2013 #111
ProSense Jul 2013 #117
leveymg Jul 2013 #151
xocet Jul 2013 #104
LondonReign2 Jul 2013 #119
Agony Jul 2013 #190
damnedifIknow Jul 2013 #89
leveymg Jul 2013 #102
pecwae Jul 2013 #94
kentuck Jul 2013 #98
AnotherMcIntosh Jul 2013 #105
leveymg Jul 2013 #109
PowerToThePeople Jul 2013 #110
reformist2 Jul 2013 #112
Safetykitten Jul 2013 #116
sofa king Jul 2013 #121
LondonReign2 Jul 2013 #148
arely staircase Jul 2013 #123
randome Jul 2013 #126
arely staircase Jul 2013 #127
LondonReign2 Jul 2013 #150
marions ghost Jul 2013 #153
LondonReign2 Jul 2013 #166
marions ghost Jul 2013 #173
Vashta Nerada Jul 2013 #124
Silent3 Jul 2013 #132
Xithras Jul 2013 #160
Silent3 Jul 2013 #206
treestar Jul 2013 #205
usGovOwesUs3Trillion Jul 2013 #207
Silent3 Aug 2013 #214
usGovOwesUs3Trillion Aug 2013 #215
Silent3 Aug 2013 #216
usGovOwesUs3Trillion Aug 2013 #217
Silent3 Aug 2013 #239
usGovOwesUs3Trillion Aug 2013 #240
Silent3 Aug 2013 #241
usGovOwesUs3Trillion Aug 2013 #242
Silent3 Aug 2013 #244
usGovOwesUs3Trillion Aug 2013 #246
bobduca Aug 2013 #235
Zorra Jul 2013 #133
NealK Jul 2013 #141
snappyturtle Jul 2013 #143
Rex Jul 2013 #152
Amonester Aug 2013 #257
Luminous Animal Jul 2013 #154
madrchsod Jul 2013 #155
Liberal_in_LA Jul 2013 #164
WillyT Jul 2013 #161
Catherina Jul 2013 #168
Liberal_in_LA Jul 2013 #163
Catherina Jul 2013 #165
DeSwiss Jul 2013 #171
felix_numinous Jul 2013 #172
Catherina Jul 2013 #175
randome Jul 2013 #180
Luminous Animal Jul 2013 #178
Waiting For Everyman Jul 2013 #181
Harmony Blue Jul 2013 #199
GoneFishin Jul 2013 #182
grahamhgreen Jul 2013 #183
Fire Walk With Me Jul 2013 #184
jazzimov Jul 2013 #208
ucrdem Aug 2013 #211
blkmusclmachine Aug 2013 #210
Name removed Aug 2013 #233
Coyotl Aug 2013 #238
steve2470 Aug 2013 #243
blackspade Aug 2013 #256

Response to Catherina (Original post)

Wed Jul 31, 2013, 09:23 AM

1. But I was told the NSA is only collecting meta data!

 

Perhaps if I click my heels 3 times everything will return to normal....

Reply to this post

Back to top Alert abuse Link here Permalink


Response to think (Reply #1)

Wed Jul 31, 2013, 09:44 AM

6. That's 'cuz the NSA never met a datum that they didn't like (& archive...)

 

That's 'cuz the NSA never met a datum that they didn't like (& archive...)

I came close to writing "the NSA never met a data that they didn't like," but my sixth grade science teacher's voice in my head shouted me down. It's tough when humor and grammar collide.



-app

Reply to this post

Back to top Alert abuse Link here Permalink


Response to appal_jack (Reply #6)

Wed Jul 31, 2013, 09:50 AM

11. Then I'll try to mind my p's & q's in responding

 

wouldn't want to be accused of verbal abuse....

for agent Mike just in case you don't have a sense of humor

Reply to this post

Back to top Alert abuse Link here Permalink


Response to think (Reply #11)

Wed Jul 31, 2013, 12:21 PM

114. Hi Agent Mike!!


Or is it really Miguel, because the NSA outsourced to Mexico???

Reply to this post

Back to top Alert abuse Link here Permalink


Response to think (Reply #1)

Wed Jul 31, 2013, 07:13 PM

177. RELAX.

The Snoopers have to be "reasonably assured" the any communication they decided to target must be Foreign Traffic.
That has been interpreted to mean that they spies must have at least a 51% chance of your conversation being at least 1/2 foreign before they Record and Compile every fucking you say.

That is [font size=5]a 51% confidence in a target's "foreignness".[/font]

"Flipping a coin, plus 1%"

Here.
John Oliver explains it better that I can:

Good News! You're Not Paranoid
http://www.thedailyshow.com/watch/mon-june-10-2013/good-news--you-re-not-paranoid---nsa-oversight

Reply to this post

Back to top Alert abuse Link here Permalink


Response to think (Reply #1)

Wed Jul 31, 2013, 11:57 PM

209. Everything in that presentation **IS** Metadata

Seriously, did you not look at the slides just posted?

I think we've identified the real problem. Greenwald isn't smart enough to understand a simple powerpoint presentation.

- C.D. Proud Member of the Reality Based Community

Reply to this post

Back to top Alert abuse Link here Permalink


Response to ConservativeDemocrat (Reply #209)

Thu Aug 1, 2013, 03:46 AM

218. This implementation has been explained to you several times.

 

The software automatically deals with satisfying all legal requirements established by the FISA courts for both metadata and content.

This is exactly what the software is designed for.

This is exactly what it does.

If there is something that you still cannot understand, feel free to ask questions.

It's like you're barking into the wilderness here. If you need more help with understanding what's going on with this, just ask and maybe someone will be able to get through to you.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to ConservativeDemocrat (Reply #209)

Thu Aug 1, 2013, 06:28 PM

248. Right. Which they use to query for the content.

 

That they can not display due to privacy concerns, which demonstrates more integrity than our government.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 09:33 AM

2. Nothing like the revelation that EVERYTHING is being monitored

 

to squelch a conversation....

Reply to this post

Back to top Alert abuse Link here Permalink


Response to think (Reply #2)

Wed Jul 31, 2013, 09:39 AM

5. And "hoovered" for future use. It's"highly sophisticated technology issues" rather than "bad faith"

You gotta love the newspeak

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 09:38 AM

3. That's pretty cool, on Page 13 IP 58.65.157.5 is a mail server in Pakistan

 

Nice to see they are using Linux too-


Yo Greeny, why you redacting pages...I thought you were going to show us EVERYTHING!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 09:39 AM

4. So does that mean that...

 

every American who has communications with someone outside of the country would be in this searchable database? Am I reading that correctly?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #4)

Wed Jul 31, 2013, 09:45 AM

7. Yes, communications with people outside of the country or coming in to the country are fair game

Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. "It's very rare to be questioned on our searches," Snowden told the Guardian in June, "and even when we are, it's usually along the lines of: 'let's bulk up the justification'."


That's how NSA employees were already caught getting their jollies listening to the pillow talk and sex chats of US citizens overseas, to include journalists and military personnel.


That sounds so noble. And the NSA would never abuse its awesome surveillance power, right? Wrong. In 2008, NSA workers told ABC News that they routinely eavesdropped on phone sex between troops serving overseas and their loved ones in America. They listened in on both satellite phone calls and calls from the phone banks in Iraq's Green Zone where soldiers call home. Former Navy Arab linguist, David Murfee Faulk described how a coworker would say, "Hey, check this out… there's good phone sex or there's some pillow talk, pull up this call, it's really funny, go check it out." Faulk explained they would gossip about the best calls during breaks. "It would be some colonel making pillow talk and we would say, 'Wow, this was crazy.'"

http://www.theatlanticwire.com/politics/2013/06/nsa-spying-verizon-analysis/65963/

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Reply #7)

Wed Jul 31, 2013, 09:49 AM

10. So Im in there then.

 

fan-fucking-tastic. I feel so much safer now.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #10)

Wed Jul 31, 2013, 10:06 AM

17. I've heard there's furriners here on this very board....

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Reply #7)

Wed Jul 31, 2013, 09:52 AM

12. All my DU Lounge posts?

 

Oh nooooooooo

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Reply #7)

Wed Jul 31, 2013, 12:01 PM

99. That's totally disgusting.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #4)

Wed Jul 31, 2013, 09:45 AM

9. If the tables are joined possibly..

 

For example, if mister Asshole terrorist #43 who is British flies to Sudan and gets online. Let's say he is a prime target and he logs into his email and sends one to bunnies@aol.com but the idiot mistyped and meant to send it to bunies@aol.com-

Then your account would be in the database store and when they do a search for information related to the targets account your info would pop up.


For a high level power-point slide if it's all true they have some pretty sharp developers. Being able to programmatically track and categorize indicators based on language is pretty cool.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Reply #9)

Wed Jul 31, 2013, 09:58 AM

13. The slide made it seem like anyone could be a "target" though...

 

Just put in some bogus reason for the lookup and all you need is an email address. If they sweep up ALL communications between Americans and anyone in foreign countries then it wouldnt matter if a suspect contacted me. Im already in that database anyway.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #13)

Wed Jul 31, 2013, 10:05 AM

16. We know from previous data there are 117K "targets"

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Reply #16)

Wed Jul 31, 2013, 10:19 AM

23. So does it only sweep up communications with the "targets" ?

 

This whole thing hurts my brain.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #23)

Wed Jul 31, 2013, 10:32 AM

33. There is a lot of junk traffic on the Internet

 

I was told by one vendor that 18% of traffic on the Internet are DDOS attacks, SIP Bots, Malware, etc,.

I'm sure there are some servers where they pull all data...Probably some mail servers and different hosting servers where "bad guys" have web domains.

The problem becomes the number of humans you have to look at data. For example, there are only so many folks who speak Farsi at the NSA. I know first hand the FBI can use some more linguists. They are literally looking for a needle in a haystack. Or I should say, trying to look at 117K needles in a million haystacks when you think of all the web servers, mail servers, and chat communicators in the World.

From these new slides looks like they can basically have "pop-up" notifications when a target say, logs into their email account.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Reply #33)

Wed Jul 31, 2013, 11:28 AM

75. It seems a bit less ominous put that way.

 

I guess the "real" problem is its potential for abuse? Id love to see a list of those being targeted. I hope I dont accidentally sell one of them something on ebay.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Reply #33)

Wed Jul 31, 2013, 12:31 PM

118. The real technical magic is in the search engines.

Most of the traffic can be easily filtered out - DDNS packets can be immediately identified and discarded, for example, as can most kinds of spam.

And the useful bits can often also be easily identified - when you see data going back and forth between a random user and one of Facebook's servers, that indicates it might contain something useful.

But like I said, there's a reason they're building that monster data center in Utah - because they're doing the same thing Google is doing - search engines on a massive scale.

If Google can find useful information in the middle of the Internet and put it at your reach at the click of a mouse, certainly the NSA can do that too.

Except they're not indexing and searching public web pages. They're indexing and searching your metadata, your private emails & phone calls, your social networks...

As for linguistics - again, that can be augmented by software - Google Translate, for example can usually make a comprehensible, if awkward, English translation of any web page in a foreign language. The linguists would only be needed for the tough cases.

I'll say it yet again - the NSA has built Google for Tyrants.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Reply #33)

Wed Jul 31, 2013, 09:52 PM

188. OH GET REAL!

Do you REALLY think that this system was actually set up to catch terrorists? Hahaha! They are hoovering all of the data, ALL of it, because they CAN. And, when they want you to tow the line, they've already got your data stored, and then they "collect" it from the database where it's STORED for YEARS, and "target" you by reading it.

Anyone who thinks they're doing this to protect us from terrorists is a complete idiot.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Th1onein (Reply #188)

Thu Aug 1, 2013, 09:56 AM

236. sorry, but you're not that important to the NSA LOL

 

I like feelings of grandeur as well at times but really, think about it

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Reply #236)

Fri Aug 2, 2013, 01:22 AM

249. Sorry, but you completely miss the point.

THINK for a minute. If they get it ALL, they can sort through it at their leisure. You might not be a threat today, or tomorrow, but you might be later on. Things don't always stay the same, especially in times of great change, and this fascist state is marching onward into the future.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to snooper2 (Reply #33)

Thu Aug 1, 2013, 12:45 AM

212. Once they do the two hops it seems

they could be in a whole lot of people's business.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #13)

Wed Jul 31, 2013, 10:06 AM

18. If you're in the database, all subsequent searches will potentially turn you up -even three hops out

It appears that the trigger for getting into the database is appallingly remote from reasonable suspicion. Over time, the chances of being misidentified go up with additional analyst and automated searches. Remember, this is a an "intelligent system" that learns from each use or automated search. The Garbage-in problem always applies.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #18)

Wed Jul 31, 2013, 10:21 AM

26. I think I may be confused about what, exactly, gets one in the database.

 

I thought it was all communications between an American and someone outside of the country.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #26)

Wed Jul 31, 2013, 10:38 AM

36. Using the internet gets one in the DB

Using your cell phone gets one in the DB

There is still a question about if telephone content is captured. We know that all internet content is captured (including content of things like skype calls, etc).

Reply to this post

Back to top Alert abuse Link here Permalink


Response to hootinholler (Reply #36)

Wed Jul 31, 2013, 10:58 AM

54. The ambiguity is whether domestic phone content is STILL datamined.

Bushies couldn't resist the temptation. That ability to do targeted wiretapping, as we are told by whistleblowers, was abused from the top down on orders of Dick "The Prince of Dankness".

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #26)

Wed Jul 31, 2013, 10:41 AM

40. You get into the system by being within the database of any agency, US or foreign, that feeds into

the system. The system is partially automated, so that it "reads" all traffic across the network (including CALEA compliant switches and routers, and cable traffic) and if a tagged number or URL or email address is picked up, or a suspicious pattern is detected (e.g., a cluster of persons talking to each other on trak phones, encrypted communications, etc.), it sends an alert. That's the automated profiling step that usually starts a manual search by an analyst. That's one way.

Another way you can get into the NSA database is by the subsequent action of an analyst (NSA employee or contractor) who uses these tools to search up to three hops out for additional evidence. The analyst is supposed to justify a subsequent search step by a targeted party being outside the US. But, the automated profiling step red flags all activity its algorithms have been programmed to treat as suspicious. The analyst's job is to try to confirm the suspicious activity involves a foreign person abroad, and if possible the nature of the threat posed prior to seeking a warrant, which kicks the case to another agency for follow-up investigation.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #40)

Wed Jul 31, 2013, 11:17 AM

67. Thanks.

 

wow. You certainly know your shit.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #67)

Wed Jul 31, 2013, 11:38 AM

84. All gov't agencies operate essentially the same way. I know my stuff about a related agency.

But, methods, technologies and procedures generally carry over across the Intelligence Community.

I am interpreting this new information on the basis of what I understand about similar, networked government investigative units.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #84)

Wed Jul 31, 2013, 11:50 AM

91. You should change your name...

to ProIntelligence.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to kentuck (Reply #91)

Wed Jul 31, 2013, 11:52 AM

95. I am pro-intelligence

and pro-Fourth Amendment.

I'll think about it.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #95)

Wed Jul 31, 2013, 01:31 PM

142. from the article

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

SO THE "THERE IS NO CONTENT" IS INCORRECT

Reply to this post

Back to top Alert abuse Link here Permalink


Response to questionseverything (Reply #142)

Wed Jul 31, 2013, 01:47 PM

146. content,content,content

The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to questionseverything (Reply #142)

Wed Jul 31, 2013, 02:02 PM

149. "'THERE IS NO CONTENT' IS INCORRECT" - correct.

That statement by Obama is misleading. It only describes one small compartment of the system analysts can access without a warrant in the process of gathering evidence that might justify seeking a warrant during the 72 hours period -- a loophole in the FISA allows, or as NSA interprets to allow.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #149)

Thu Aug 1, 2013, 04:25 AM

219. You say 'analysts', but who actually has access, and who are they working for?

- Edit: & see reply at #202 below

cf. these comments to the Guardian article:

mswinkle 31 July 2013 2:16pm

Glenn I sure hope snkwden gave you examples of top officials and how they might be blackmailed. if he did it would nlow this wide open. if he didn't then he will be stuck as a fugitive for a long time.

BTW Glenn given this sory why have you not contacted the whistleblower i think his name is TIce. he has stated that Obama and many others were specifically targeted. Surely what he has to say dovetailes with this and Telling his story here would reach a larger audience.

I have a strong feeling you have no intention of covering what he has to say on a national newspaper like this. Maybe you will stick it in your book


muscleguy 31 July 2013 3:39pm

I assume that the 'damaging information' Snowden has on a dead man's switch for release if anything untoward happens to him includes stuff like this. He says the NSA know what he has got. So it's checkmate to Snowden at the moment despite being besieged.


ZincKidd 01 August 2013 7:24am

I suspect the reason Obama has bent over backwards for the NSA is simply because of what they've got on him. Just like old J. Edgar. Keep your enemies close and your friends closer...

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Ghost Dog (Reply #219)

Thu Aug 1, 2013, 07:46 AM

223. The temptation is always there when you have a tool this powerful to use it in any number

of unethical and illegal ways. I believe Tice, and it's completely consistent with what I understand Cheney also did at CIA when the Vice President pressured people there to fabricate evidence of Iraq WMD for a cassus belli. Cheney couldn't have done that without the support of top people at both agencies, so it isn't just Cheney.

I think it's interesting that they had their eyes on Petraeus for a long time, under both Bush and Obama, and how rapidly he rose up from a two star to CIA Director, before they finally used surveillance to get rid of him. So, maybe, this watching the watchers thing isn't an entirely bad thing. But, that also assumes that those who are really running the show have enough wisdom to use this power constructively, and I'm not entirely convinced that's always the case.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #40)

Wed Jul 31, 2013, 10:01 PM

191. Sorry, leveymg. I believe you are wrong.

And the crap you are posting sounds suspiciously like the crap that the NSA posted on it's website and then pulled when someone outed it as not being true.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Th1onein (Reply #191)

Wed Jul 31, 2013, 10:18 PM

194. Care to explain what you mean by that?

I wasn't aware that I was carrying water for the NSA, but am curious to hear what you have to say.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #194)

Fri Aug 2, 2013, 02:03 AM

254. It seems to me that you are echoing all of the crowd

that is saying that they have to go through a bunch of checks before they can access our data. I don't think that's true at all.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #26)

Wed Jul 31, 2013, 09:58 PM

189. Yeah, you ARE confused.

YOU ARE ALREADY IN THE DATABASE. EVERYTHING YOU'VE DONE ON THE INTERNET, OR YOUR PHONE FOR THE PAST, AT LEAST, FIVE YEARS. Your data is stored.

When Clapper talked about this, he talked about your data being like a book, on a shelf. When they want to "collect" your data, they simply take the book off of the shelf (ie., pull the data out of the database) and when they "target" you, they read the book (ie., read over your data).

YOU ARE IN THE DATABASE. EVERYTHING.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Th1onein (Reply #189)

Wed Jul 31, 2013, 10:34 PM

198. All that data is useless without software that identifies "red flags" that NSA considers suspicous.

It can be as simple as a phone conversation with someone identified as "terrorist" on an NSA list, or as complicated as meeting a profile due to patterns of behavior (using a trak phone or encryption) in combination with other characteristics (ethicity, banking history, education, travels, etc.)

That automated profiling is just the first step in a more intensive profiling process that involves additional systems used by an NSA analyst to identify the person and perhaps something of the nature of the threat.

When I say that someone gets into the system through other databases, I was referring to the 2nd step of the profiling phase, during which the analyst can search across a number of databases.

If this sounds like something the NSA has said, it's because it is based in agency statements and documents leaked and otherwise released. What's wrong with that?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #198)

Wed Jul 31, 2013, 10:44 PM

200. ROFLMAO! Useless? Are you kidding me?

Not if you want to target someone to make them tow the line. Say a Congressman, or Senator, that you want vote a certain way. Or a judge, that you want to rule a certain way. Or a juror. Or anybody.

THIS SYSTEM IS NOT FOR FERRETING OUT TERRORISTS. It's used to control us.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Th1onein (Reply #200)

Wed Jul 31, 2013, 10:51 PM

202. I'm a member of the Whistleblower Coalition. Russell Tice will tell you all about the misuse of NSA

by Dick Cheney. Please, see,

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #202)

Thu Aug 1, 2013, 04:49 AM

220. ^^^ This. Tice points to abuse and lists as targets:

News organisations and Journalists; US Companies that do international business; Financial Institutions; The State Department; High- and Mid-ranking Military Generals; Law firms and lawyers; The Supreme Court and Judges; High-ranking Intelligence Officers; Barack Obama (and other Senators, Congressmen and candidates)...


Who might be so abusing now, if Cheney was pointed to then?

Tice points to "upper echelons of the intelligence community" as "running the show (the shadow government)."

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Ghost Dog (Reply #220)

Fri Aug 2, 2013, 01:51 AM

252. Yep

And they're after Snowden because he got tangible evidence of their misdeeds. And they KNOW he's got MORE.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #202)

Fri Aug 2, 2013, 01:52 AM

253. Thank you for posting this, leveymg!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #13)

Wed Jul 31, 2013, 09:47 PM

186. REMEMBER THIS: You are not a target until they get your info off of the database.

You see, they've COLLECTED and STORED everything that you say or do or the internet, and probably on your cell phone, too. Then, only when you are TARGETED do they "take the book off the shelf and read it," as Clapper said.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Th1onein (Reply #186)

Thu Aug 1, 2013, 08:05 AM

227. But...

 

whats to stop some random contractor from taking me "off the shelf"? Not that theres a reason to, but they *could* do that, for no reason. Correct?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #227)

Fri Aug 2, 2013, 01:25 AM

250. Hey, they've already listened to soldiers' pillow talk and had fun laughing about it.

And there are thousands and thousands of contractors, many like Snowden. If Snowden, a high school drop out can get your shit, what's to stop anyone else?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #4)

Wed Jul 31, 2013, 10:45 AM

43. No, everything everyone does on the internet is in the memory in its entirety

 

and some parts are retained for longer than others.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Coyotl (Reply #43)

Wed Jul 31, 2013, 10:03 PM

192. ABSOLUTELY CORRECT.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Coyotl (Reply #43)

Thu Aug 1, 2013, 06:00 PM

245. Not just the metadata?

 

?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to bunnies (Reply #4)

Wed Jul 31, 2013, 11:40 AM

85. Yep. It's Six Degrees from Kevin Bacon...

Except it's Twelve Degrees, and Kevin Bacon is Osama Bin Laden... which means everyone's a terrorist, and needs to be tracked!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 09:45 AM

8. du rec.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:00 AM

14. Note next to last slide: 42 billion records in XKEYSCORE system.

That's a lot of "interesting" data that's being stored without warrants, and it isn't just metadata, and it isn't just foreign persons. Note in Slides 3 and 5, the list of justifications for searching the system for US person data, in addition to a Miranda number (warrant).

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #14)

Wed Jul 31, 2013, 10:27 AM

29. I just updated the OP with a link to the full slide set

http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation

Enjoy

These slides are dated 2008... Their capabilities have increased quite a bit since then

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Reply #29)

Wed Jul 31, 2013, 10:45 AM

42. Are they pre or post FISA Amendment Act?

Major difference. Also, Snowden started as an NSA contractor earlier this year - how did he get five year old training materials, unless they are still in use?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #42)

Wed Jul 31, 2013, 10:53 AM

52. These seem to be pre.

The date on the full slide set is Feb 2008

http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation

I'm sure they're still in use, they would have asked that question at the House Hearing I'm sure. How shameful that Obama thwarted that Hearing but all that means is that critics will have even more information and good questions for the September House Hearing.

The Senate Hearing today is just a love fest with the intelligence community. "Thanks for keeping us safe blah blah"

http://www.senate.gov/isvp/?comm=judiciary&type=live&filename=judiciary073113

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Reply #52)

Thu Aug 1, 2013, 09:01 AM

231. The implication that these training materials are still in use at NSA are staggering.

If Snowden was given these as part of his NSA orientation earlier this year, these materials indicate that nothing really changed with the provisions of the 2008 FISA Amendment (FAA). The Agency found a bunch of easy workarounds. They certainly buttress his assertions that analysts freely and routinely access the Internet communications of US persons, including content.

It also goes a long way toward confirming what I've been saying for a long time that what NSA is essentially running is a universal profiling system that collects and datamines a wide variety of personal information across databases. The profiling system isn't just about identifying foreign terrorists, but is the successor of Bill Binney's ThinThread system that monitors the population's communications, Americans and foreigners, alike, for characteristics the system has been programmed to associate with "suspicious" activities. That is completely contrary to the 4th Amendment's protection against warrantless searches and seizures.

Sometimes, I hate being right.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #231)

Thu Aug 1, 2013, 09:15 AM

232. If anything had changed, they wouldn't all be tripping over their lies

They could come clean with the American people and say "well it used to be that way, but not any longer".

This is why Snowden was so upset and said it was killing him to watch NSA officials AND the Gang of Eight lie to the American people without even blinking. Another thing a lot of people are missing is that it's not just Snowden, when Snowden first communicated with Greenwald, his emails specifically said "we"- "we have something to share", "we have something to show you". There are a lot of decent people who work at the NSA, they get hooked by being able to use skills for something they're passionate about that don't have a lot of value on the outside world, like math skills for code-creaking, language skills and hacking skills. I think they can go on for years, stuck in the fun of those shiny new toys and then one day, for whatever reason, it hits them that what they're doing is wrong. That why the agencies are flipping out and forbidding their employees and students even read the stories. It's not the slides they're worried about but the discussion.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:05 AM

15. K&R'd!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:14 AM

19. Where are all the corporate-surveillance state cheerleaders to tell us it is all a lie, and,.

 

nothing illegal happening, no rights being violated,. Greenwald is a libritard, and a bad bad man, who is lying, and has no "evidence",. he just makes this stuff up, because he hates America, and is a racist who don't like that Obama is president, and supports the rethugs,. because they just know it, can feel the truthiness in their guts?

Anyway, hi to those folks, have fun.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #19)

Wed Jul 31, 2013, 10:16 AM

21. And "this is nothing new, we've known all about it for years."

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to truebluegreen (Reply #21)

Wed Jul 31, 2013, 10:48 AM

46. yes that too,. I never understood that one, we have known about global warming for years too,.

 

that does not lessen its importance!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #46)

Wed Jul 31, 2013, 11:48 AM

90. I know, if anything that is even a worse indictment on the Government, that they 'know all this for

years' but did nothing to stop it. So Whistle Blowers have to keep blowing the whistle because of the inaction, to put it mildly, of our Government. That is incredible. Some tried, like Ron Wyden but until Snowden's leaks, was basically ignored.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #46)

Wed Jul 31, 2013, 01:08 PM

138. +1

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to truebluegreen (Reply #21)

Wed Jul 31, 2013, 10:47 PM

201. I suspected it for years, but I'll admit that the reality is different than I pictured

I had little doubt that the government had access to all of my online activity if it was interested. But I didn't realize that some junior NSA analyst who I met at a bar one night could go into work the next day and search my activity with little oversight from a supervisor.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #19)

Wed Jul 31, 2013, 10:31 AM

32. Note confirmation that this is an Anglo operation: US, Australia, Canada, Great Britain, New Zealand

Top Secret//COMINT// REL to USA, AUS, CAN, GBR, NZL

Release to USA, Australia, Canada, Great Britain, New Zealand (the Five Eyes Countries: http://en.wikipedia.org/wiki/Five_Eyes)

http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Reply #32)

Wed Jul 31, 2013, 10:49 AM

49. of course gottaw "work" with our partners in the war of terror,. oops I mean war ON terror.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #19)

Wed Jul 31, 2013, 10:39 AM

39. And it takes 4 people to sign off on it

Or some such absurdity.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #19)

Wed Jul 31, 2013, 10:48 AM

48. When they pop up elsewhere on DU, denying the obvious, give them the link to this thread.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #19)

Wed Jul 31, 2013, 11:21 AM

72. Oh, not to worry

They're working on a dozen new OPs updating us on Snowden's airport adventures and Greenwald's positions from 2003 in the hopes of drowning this out or at least making people waste time countering their distractions.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #19)

Wed Jul 31, 2013, 11:29 AM

77. You forgot the boxes in the garage and the pole dancer

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #19)

Wed Jul 31, 2013, 02:49 PM

157. the more they blunt the reaction, the longer it takes to get anything done, and the smaller

that rollback will be

it's not even a matter of delaying us by making us fight them, or demoralizing us: it's about poisoning public discourse by declaring what its limits are--by redefining the very context within which politics is performed, by altering how common sense itself operates ("spies are evil" is rendered more important than "presidential planes are sovereign"

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #19)

Wed Jul 31, 2013, 06:05 PM

176. And that Snowden doesnt have shit and yet he is giving it to the Russians. Go easy on the NSA

 

apologists. These revelations are a major shock to their carefully constructed denial bubbles. They believe in blind faith in the Big Daddy and when that "faith" is questioned, they can be nasty.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:15 AM

20. The picture just keeps getting clearer, and worse.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:18 AM

22. Yeah... but... Vonage is safe, right?

I mean, VOIP doesn't get hoovered, right?

Do people still use 'land lines' anymore?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to whttevrr (Reply #22)

Wed Jul 31, 2013, 11:21 AM

71. Oh, certainly land lines are used. The Deputy Sheriffs Association,

the nice people who want to help me dump my timeshare, and every politician in the country all call me on my landline.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to whttevrr (Reply #22)

Fri Aug 2, 2013, 02:09 AM

255. Noi, VOIP is hoovered too.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:20 AM

24. Never mind facts! Greenwald's a turd!!

That's all I need to know!



Oh, yeah. K&R

Reply to this post

Back to top Alert abuse Link here Permalink


Response to caseymoz (Reply #24)

Wed Jul 31, 2013, 02:52 PM

158. HAHAHA! Now, I must get back to posting lies for my think tank.....

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to caseymoz (Reply #24)

Wed Jul 31, 2013, 07:16 PM

179. That sums it up haha.

Sad and funny in one swoop.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:20 AM

25. Chill. it's only metadata

 

And it's stripped of any personal information. We knew about this in 2006; why the outrage?

This is hair-on-fire hyperbole by racists trying to bring down our black President. Plus, Greenwald supported Bush/is a libertarian/lives in Brazil/wrote for the CATO Institute.

So sayeth the Surveillance State Sycophants.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to OnyxCollie (Reply #25)

Wed Jul 31, 2013, 10:25 AM

28. Yes, but those memes are so yesterday. Any predictions on what

 

new memes that will come out?....



Just having fun of course....

Reply to this post

Back to top Alert abuse Link here Permalink


Response to think (Reply #28)

Wed Jul 31, 2013, 10:47 AM

44. I'm not going to do any work for them.

 

They're already lazy thinkers.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to OnyxCollie (Reply #44)

Wed Jul 31, 2013, 11:32 AM

80. You nailed that. Instead of a new meme they have gone green

 

and are recycling....

Reply to this post

Back to top Alert abuse Link here Permalink


Response to think (Reply #28)

Wed Jul 31, 2013, 12:23 PM

115. Greenwald doesn't use dental floss.

When he was a teen he would pay an adult to buy beer for him.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to NealK (Reply #115)

Wed Jul 31, 2013, 12:34 PM

122. That's pretty damning evidence. We better make a separate thread for this!

 

keep up the good work citizen spy! I think we've got the goods on him now!



It shouldn't be necessary but hey thanks for the laughs!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to think (Reply #122)

Wed Jul 31, 2013, 12:39 PM

129. No problem.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to OnyxCollie (Reply #25)

Wed Jul 31, 2013, 10:51 AM

50. What you just said is insuffient for the system to operate...

 

It is everything.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to nebenaube (Reply #50)

Wed Jul 31, 2013, 10:54 AM

53. (I know.)

 

Just repeating what ignorant children have said.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to OnyxCollie (Reply #25)

Wed Jul 31, 2013, 02:55 PM

162. It's an outrage in all police states. - Where's ur sarcasm thingy???

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:30 AM

30. One of the best postings I have ever seen on DU. I'll go one further.

If the NSA can do this it should be safe to assume others also have this capability.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to gordianot (Reply #30)

Wed Jul 31, 2013, 10:34 PM

197. But who else has such an elaborate system in place?

Remember the massive NSA center being built (in Arizona I believe, IIRC), with billions (or was it trillions) of dollars funneled into running it?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Quantess (Reply #197)

Wed Jul 31, 2013, 11:09 PM

204. How about someone who is being accused of Cyber warfare?

Missles, tanks, ships are obsolete compared to the new cyber battleground even your own people do not suspect what you can do? It took a major leak to create concern.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:30 AM

31. K & R: Of course, DNI Clapper is completely honest & does not know a thing about this.





Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:36 AM

34. The apologists seem conspicuously absent.

 

I guess they haven't been told what they think yet.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Marr (Reply #34)

Wed Jul 31, 2013, 12:07 PM

103. what they're ROFLing about, hardly what they think

when the "how we feel and how we want to manipulate others' emotions" consensus is reached, by their emoticons shall we know them

Reply to this post

Back to top Alert abuse Link here Permalink


Response to carolinayellowdog (Reply #103)

Wed Jul 31, 2013, 12:11 PM

107. Psst! Look-- I stole their mascot:

 



Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:37 AM

35. Waiting for the flood of posts from the apologists..

 

About how Greenwald is a real a-hole and doing terrible things and we're dumb enough o fall for the Libertarian/Republican plan to weaken our party.

What a fucking disaster we have become.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Savannahmann (Reply #35)

Wed Jul 31, 2013, 10:47 AM

45. They're waiting for the Talking Point memo to arrive.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #45)

Thu Aug 1, 2013, 07:46 AM

224. Pfft!

[URL=.html][IMG][/IMG][/URL]

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Enthusiast (Reply #224)

Thu Aug 1, 2013, 07:49 AM

225. Well, you guys were really slow to react to this one, and weren't very effective when you did.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #225)

Thu Aug 1, 2013, 08:14 AM

228. You misunderstand.

I thought what you said was funny. And I was in agreement. I'm not one of "you guys".

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Enthusiast (Reply #228)

Thu Aug 1, 2013, 08:45 AM

230. Oh, Jeez - I'm so sorry.

Seems I'm becoming reflexively defensive after yet another day of battling it out with the deniers on this board. Internet PTSD.

Please accept my apologies.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #230)

Thu Aug 1, 2013, 09:35 AM

234. No problem.

A natural mistake.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Savannahmann (Reply #35)

Wed Jul 31, 2013, 11:25 AM

74. Also, the endlessly repeated meme

that they haven't proven anything. It doesn't matter what facts you show them, they say it doesn't prove anything, LOL

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:38 AM

37. Wait all on the internet, the same internet....

originally developed for the defense dept. Wow who would have thought. The degrees of separation from its early intended use isn't really that great.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Historic NY (Reply #37)

Thu Aug 1, 2013, 12:45 AM

213. Whoomp there it is

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Electric Monk (Reply #213)

Thu Aug 1, 2013, 07:12 AM

222. Once again the ONN is spot on........

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:39 AM

38. Personally I'd like to know what all this is costing -

besides being a clear violation of the 4th amendment all of this monitoring has got to be freaking expensive! Who is holding the government contracts to do this work and what is it costing the tax payers?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to TBF (Reply #38)

Wed Jul 31, 2013, 10:48 AM

47. NSA annual budget is @ $80 billion - most of it goes to contractors.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #47)

Thu Aug 1, 2013, 06:12 PM

247. That's actually secret, too

 

Hopefully that will be revealed soon, too

Reply to this post

Back to top Alert abuse Link here Permalink


Response to TBF (Reply #38)

Wed Jul 31, 2013, 12:49 PM

131. Here's what it's costing us.

Head start for x number of kiddos
Meals on Wheels for x number of seniors
Food stamps for hungry children
Jobs, jobs, jobs
Medical care and benefits for veterans
Infrastructure repairs

....for starters.

It's the biggest heist the world has ever known, I suspect. Bigger even than the war on some drugs, which looted the treasury.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to grasswire (Reply #131)

Wed Jul 31, 2013, 01:20 PM

139. +1

Reply to this post

Back to top Alert abuse Link here Permalink


Response to grasswire (Reply #131)

Wed Jul 31, 2013, 01:23 PM

140. right

Reply to this post

Back to top Alert abuse Link here Permalink


Response to grasswire (Reply #131)

Wed Jul 31, 2013, 01:56 PM

147. Excellent response - thank you. nt

Reply to this post

Back to top Alert abuse Link here Permalink


Response to grasswire (Reply #131)

Wed Jul 31, 2013, 02:52 PM

159. ^^This^^. ^^This^^. Thank you n/t

Reply to this post

Back to top Alert abuse Link here Permalink


Response to grasswire (Reply #131)

Wed Jul 31, 2013, 03:47 PM

170. Excellent post. OP material!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:42 AM

41. People tended not to believe this when we revealed it on DU years ago.

 

You can well imagine who ended up on a watch list for releasing this secret six years ago.

Deja DU: L. Coyote Nov-09-07
Are ALL COMMUNICATIONS routed overseas to circumvent US law and the Constitution?
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x2245762

I was told years ago that ALL fiber optic communication traffic was routed overseas so that "everything" was moved outside the protections of the law and Constitution and ANYTHING could be monitored. I thought the idea quite fantastic even though it came from a very reliable source that would know exactly such things. Then, the story of the fiber optic splitters hit my radar. I now see now how easily exactly that, routing ALL COMMUNICATIONS overseas, was accomplished.

Is that Bush's and the Telecom's HUGE crime hidden and covered-up behind this story?

If the telecoms get immunity, will it aid in covering up Bush's crime.
ABSOLUTELY! That is why it is so important to the Rs! Support = obstruction of justice.

Have we arrived at the point in the history of the Bushco junta where
laws passed and people nominated are part of crimes of obstructing justice?

===================
AT&T Whistleblower: Telecom Immunity Is A Cover-Up
By Spencer Ackerman - Nov 7, 2007
http://www.tpmmuckraker.com/archives/004662.php


Earlier today we flagged that Mark Klein, who uncovered a secret surveillance room run by the NSA ..........

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Coyotl (Reply #41)

Wed Jul 31, 2013, 10:52 AM

51. Probably earlier than that when ECHELON was first revealed (I recall) by Bamford.

ECHELON is "Five Eyes," and think that came out in the 1990s along with the insight that "they tap our phones, and we tap theirs."

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Coyotl (Reply #41)

Wed Jul 31, 2013, 11:16 AM

65. I'll bet there were cries to shut up the "Conspiracy Woo" talk too

People like Mark Klein deserve a medal and a cash award for all the bullshit they were put through.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Reply #65)

Wed Jul 31, 2013, 12:59 PM

134. Washington, D.C. wasn't very receptive to Mark Klein, just Keith Olbermann spoke out

 

pretty much. The M$M was blissfully unconcerned as they were being spied on.

Even today, everyone forgets the fact that American law only applies in America.

It is NOT illegal to spy on Americans if their communications are routed offshore one inch! This includes a lot more players than the NSA, and more than governments too.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 10:59 AM

55. K & R

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:01 AM

56. It's all legal and if you have nothing to hide, no worries




Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:06 AM

57. K&R

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:07 AM

58. NSA: The world's biggest collector of porn links. nt

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Buns_of_Fire (Reply #58)

Wed Jul 31, 2013, 11:30 AM

79. I wonder how many blackmail schemes will come from this?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Kablooie (Reply #79)

Wed Jul 31, 2013, 10:21 PM

195. Ever wonder why Obama feels so compelled to keep appointing

 

torture-enabling hacks like Comey to his administration? An easy, albeit ultimately unprovable, explanation is that the NSA and Cheney's goons got the drop on him as of about 2004 (per NSA whistle blower Russell Tice) and put the screws to him on January 20, 2009 and thereafter.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:08 AM

59. This is a good post

and only highlights that this issue will not go away.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:10 AM

60. Holly Shit! The more documentary evidence of these abuses, the better!

 

This just the kinda information I was looking for in my metadata OP.

Thanks for sharing

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:11 AM

61. Some randome thoughts

 

Where is the proof? These top secret NSA documents don't prove anything! I don't care that the NSA verified that this program exists. Where is the evidence?! When is Snowden going to come over to my house and give me a demo?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DesMoinesDem (Reply #61)

Wed Jul 31, 2013, 11:12 AM

63. This is proof

if you choose to believe this is not real..well...it is your choice.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Harmony Blue (Reply #63)

Wed Jul 31, 2013, 11:17 AM

66. I was just doing an impersonation.

 

There is a hint in my title, but it might be hard to tell if you haven't read this person's posts.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DesMoinesDem (Reply #66)

Wed Jul 31, 2013, 11:20 AM

70. Sorry about that. :)

I am the dunce afterall.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DesMoinesDem (Reply #66)

Wed Jul 31, 2013, 11:34 AM

83. There is a reason I studiously avoid him (as in ignore)

 

But that was pretty close to what I expect to not see

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DesMoinesDem (Reply #66)

Wed Jul 31, 2013, 01:03 PM

136. And a very good impersonation it was!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DesMoinesDem (Reply #61)

Wed Jul 31, 2013, 11:20 AM

69. And I won't believe it unless he brings his girlfriend to spell it while pole-dancing

The denials are unbelievable. Not just a river in Egypt lol.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DesMoinesDem (Reply #61)

Wed Jul 31, 2013, 11:41 AM

87. Wow, you make a lot of prosense! n/t

Reply to this post

Back to top Alert abuse Link here Permalink


Response to backscatter712 (Reply #87)

Wed Jul 31, 2013, 01:38 PM

145. Link, please...

Reply to this post

Back to top Alert abuse Link here Permalink


Response to backscatter712 (Reply #87)

Wed Jul 31, 2013, 10:16 PM

193. Puh-leaze! You need to struggle4progress in your spelling skills!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Th1onein (Reply #193)

Wed Jul 31, 2013, 10:54 PM

203. You sidn't be dithering around! n/t

Reply to this post

Back to top Alert abuse Link here Permalink


Response to backscatter712 (Reply #203)

Fri Aug 2, 2013, 01:26 AM

251. lol

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DesMoinesDem (Reply #61)

Wed Jul 31, 2013, 12:09 PM

106. How cute to know I am in your thoughts.

 

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.


Are you going to claim I said the technology for this does not exist? I never said that.

Now where is the evidence that the NSA is using this tool to target non-foreign personnel?

So once again, I ask: "Is the NSA using this tool illegally or abusively?" I suspect what your answer is since you seem -for whatever reason- to so willingingly believe anything that dribbles out of Greenwald's mouth.

As usual, Greenwald very carefully lays his verbal trap to lure you in because you so willingly want to keep your hair on fire. He does not point out that there is no evidence if illegality or abuse because he doesn't want you to ask such questions as I posed.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to randome (Reply #106)

Wed Jul 31, 2013, 12:37 PM

125. And he also never use dental floss.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to NealK (Reply #125)

Wed Jul 31, 2013, 12:39 PM

128. Yes, well, I do so I'm a fine upstanding Amerikanski!

 

Take that, Greenwald!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to randome (Reply #106)

Wed Jul 31, 2013, 01:01 PM

135. So where can YOU point to some story Greenwald has exaggerated or lied or played up?!?!?

 

"since you seem -for whatever reason- to so willingingly believe anything that dribbles out of Greenwald's mouth",.

Track record is important, yours is constant badgering about "proof" and "legality" when we all can see the proofs as they keep rolling out, from all over, not just the individuals you choose to argumentum ad hominem. Everything Hitler did was "legal", according to him. And you know that is not the point! We are debating what is acceptable to us not some corporate-dictators.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Civilization2 (Reply #135)

Wed Jul 31, 2013, 01:05 PM

137. You call it 'badgering' to ask if there is evidence of illegality or abuse?

 

This is a software tool that the NSA uses. They are required to use it only on foreign individuals. Is there any evidence they are using it for American citizens?

If there is not, then it is not illegal. If you think such software tools should be illegal, I have no problem with that but I think your chances of seeing that happen are nil.

Again, where is the evidence of illegality or abuse? I keep asking this and no one can seem to answer it.

I am not a 'supporter' of the NSA but I do think it's imperative to look at everything critically, including S&G's claims.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to randome (Reply #137)

Wed Jul 31, 2013, 02:45 PM

156. No evidence now,

looks like we will have to wait on another leak.

Sen. Sheldon Whitehouse, D-R.I., said in a rebuke of government secrecy. "It all came out in response to a leaker. There was no organized plan for how we rationally declassify this so that the American people can participate in the debate."


http://www.democraticunderground.com/10023380596

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Go Vols (Reply #156)

Wed Jul 31, 2013, 03:26 PM

167. I'm all for making changes so long as they aren't knee-jerk changes arising from fear.

 

Or misinterpretations. This technology exists and is getting better and faster. It isn't going away. We simply need to learn how to use it safely.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to randome (Reply #167)

Wed Jul 31, 2013, 09:48 PM

187. Fear is how we arrived here.

It's now how we should live.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to neverforget (Reply #187)

Wed Jul 31, 2013, 10:22 PM

196. Maybe the bureaucrats and politicians are afraid but not me.

 

[hr][font color="blue"][center]Don't ever underestimate the long-term effects of a good night's sleep.[/center][/font][hr]

Reply to this post

Back to top Alert abuse Link here Permalink


Response to randome (Reply #137)


Response to randome (Reply #106)

Wed Jul 31, 2013, 01:36 PM

144. from the article

"I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

///////////////////////

so much for the 3 or 4 supervisors signing off line

Reply to this post

Back to top Alert abuse Link here Permalink


Response to questionseverything (Reply #144)

Wed Jul 31, 2013, 03:31 PM

169. You're calling Snowden's claims 'evidence'?

 

The technology is to be used for tracking foreign suspects. If there is evidence this is being used for American citizens, let's see the evidence and let the chips fall where they may.

Notice the Guardian article buries that point in the middle of the article.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to randome (Reply #169)

Thu Aug 1, 2013, 08:02 AM

226. Snowden's claims ring true to us.

Claims by defenders of the establishment do not ring true.

The American people recognize there is something fundamentally wrong in the nation. Fundamentally wrong. This wrong is affecting every aspect of the nation. It's right in our face. The government is no longer a 'responsible to the people' representative body.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to randome (Reply #106)

Thu Aug 1, 2013, 05:15 AM

221. Power corrupts...proof:

randome says:
As usual, Greenwald very carefully lays his verbal trap to lure you in because you so willingly want to keep your hair on fire. He does not point out that there is no evidence if illegality or abuse because he doesn't want you to ask such questions as I posed.


Uh, huh. Like these kinds of programs would never be abused. Just like the bulk phone records collection of every single American with a telephone, right?

From today:

Documents show NSA violated court orders on collection of phone records


WASHINGTON — National Security Agency officials violated secret federal court orders authorizing the daily collection of domestic email and telephone data from hundreds of millions of Americans, according to previously top-secret documents made public Wednesday by the Obama administration.

Several senior members of the Senate Intelligence Committee, when approached about the breaches, said they were aware of them but declined to answer questions about their nature.

“I don’t know why you need to ask me,” said the panel’s chairwoman, Sen. Dianne Feinstein, D-Calif.

A spokesman for Sen. Ron Wyden, D-Ore., told McClatchy that Wyden, who is also a member of the Intelligence Committee, was referring to the violations in an interview he gave Tuesday to MSNBC. An outspoken critic of the NSA programs, Wyden said that the breaches involving telephone call data were “serious.”


Reply to this post

Back to top Alert abuse Link here Permalink


Response to caduceus111 (Reply #221)

Thu Aug 1, 2013, 08:25 AM

229. You're kidding, right?

 

You're going to point to an example of the system working to support your contention that the system does not work.

Might want to see a chiropractor.

Courts rein in LE agencies every day in America. That's how the system works.

Of course any LE agency has the capability of abusing its responsibilities. But I believe we are all in agreement that there needs to be more transparency and less secrecy all around where the NSA is concerned.

Then we can decide if certain practices are abusive and need to stop.

Believing everything that comes out of S&G's mouths is not a good way to evaluate evidence, IMO. Neither of them have shown evidence of illegal or abusive behavior. If the NSA is behaving that way, let's see the evidence and let the chips fall where they may.
[hr][font color="blue"][center]Don't ever underestimate the long-term effects of a good night's sleep.[/center][/font][hr]

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DesMoinesDem (Reply #61)

Wed Jul 31, 2013, 09:36 PM

185. As Random as a wet fart sound file on a computer

 

and predictable as point and click.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:11 AM

62. Good morning Agent Mike

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:14 AM

64. So there's an X-Bluecoat-Via: header inserted in the XKeyscore slides...



Interesting. From Reporters Without Borders in "Enemies of the Internet, 2013 Report" earlier this year:

ENEMIES OF THE INTERNET /12 MARCH 2013/ CORPORATE ENEMIES / BLUE COAT

BLUE COAT
American Company Blue Coat, specialized in online security, is best known for its Internet censorship equipment.
This equipment also allows for the supervision of journalists, netizens and their sources. (...)

The company also provides network analysis systems called „Intelligence Centres“, which are used by companies and governments to monitor online traffic and identify performance problems. They allow for the monitoring of individual online behaviour.

Blue Coat offers Deep Packet Inspection technology, which can be used to survey and censor the Internet. With DPI, it is possible to look into every single Internet Protocol packet and subject it to special treatment based on content (censored or banned words) or type (email, VoIP or BitTorrent Protocol). DPI not only threatens the principle of Net Neutrality , which Reporters Without Borders defends, but also the privacy of users. It makes single users identifiable and, in countries that flout the rule of law and violate
human rights, often exposes them to arbitrary imprisonment, violence or even torture
.

...

DPI is especially threatening to journalists, bloggers, activists and their sources, as it inhibits private, anonymous communication.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Reply #64)

Wed Jul 31, 2013, 12:20 PM

113. I'm not seeing that line on the slide. Where is it?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #113)

Wed Jul 31, 2013, 12:32 PM

120. 11th line down n/t

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #113)

Wed Jul 31, 2013, 12:44 PM

130. The Facebook chat slide is interesting to. If you know how to read that and what to do next



It takes you straight to that person's FB page and personal information.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:17 AM

68. All Sanctioned And Approved By Obama And Congress

eom

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:25 AM

73. You have to love Mike Rogers - R's denial of the claim

"He's lying. It's impossible for him to do what he was saying he could do."

Not "That system doesn't exist."
Not "We can't comment on that."
Not "I've never heard of that program."
Not "Its capabilities don't do what they're claiming."
Not "We only comply with the law."
Not "We're trying to protect you."

Merely "Snowden didn't have access to that." Which really isn't a denial at all.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Xithras (Reply #73)

Wed Jul 31, 2013, 12:01 PM

100. Good catch.

You are right, his statement is carefully worded and your interpretation is right on the money IMO.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:28 AM

76. Seems to me difficult to be shocked that this exists.


This technology does seem nearly essential to track down terrorist communications.
I mean we always knew the CIA and FBI had something like this
Bit it certainly is worrying that anyone's Internet use can be grabbed and looked at like this without a warrant.
It seems some kind of warrant system should be required to access.
Allowing this to be used on anyone is extremely dangerous.

The fact that hundreds of people in many companies have access is crazy.
This privatizing of national security is wrong and it's just a matter of time before abuses, that are probably going on right now, become public.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:29 AM

78. And that is why I occasionally include spurious statements, words, etc. in e-mails, postings, etc...

 

The postings are totally void of any meaning but I know they are things our government pays analysts to look at. That way I contribute to keeping them fucking looking for nothing...no payback for our billions or trillions we are paying.

I am glad to burn their resources. It was kind of like the former Soviet Union. It was only when we had burned their resources to the ground that we won. So the more we keep these NSA freaks chasing rabbit holes the better off we are. Eventually when they consume 1/2 of the national GDP the stupid Congresscritters will realize this is stupid and put an end to it.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Swede Atlanta (Reply #78)

Wed Jul 31, 2013, 11:34 AM

82. What a waste of taxpayer money!

And I agree it will reach a point where Congress decides to pull the plug on this shenanigans.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Swede Atlanta (Reply #78)

Wed Jul 31, 2013, 05:02 PM

174. I like your attitude, and your philosophy, but unfortunately --

the whole reason this Surveillance program is going forward is because our Congress critters are in bed with the Military Industrial Governmental Surveillance Complex. The annual 1.2 trillion dollars of military monies is being diverted over to Surveillance programs.

If you think that the 750 millions of dollars that Richard Blum got for his construction company after we launched the war against the people of Iraq, wait till we find out five years from now how many hundreds of millions of dollars the couple makes on the Surveillance contracts. (Blum is the spouse of Di Feinstein. If anyone here thinks she serves on the Intelligence Committee of the US SEnate for any reason other than padding her and Dickie Poo's fortunes, I don't know what to tell them.)

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:34 AM

81. Glenn Greenwald is a big ole meanie!!!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:40 AM

86. Imagine how much more sophisticated this system has likely become in the last 5 years

Last edited Wed Jul 31, 2013, 12:28 PM - Edit history (1)

The NSA could do this in 2008; what are they capable of now?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:42 AM

88. Yeah, it's good to know these training documents exists, and the best part:

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Again, Greenwald is talking about "technological capability." He's speculating and has no evidence that any laws are being ignored. The program targets are foreign.

Greenwald is now recycling his breaking revelations.
http://www.democraticunderground.com/10023378966


Reply to this post

Back to top Alert abuse Link here Permalink


Response to ProSense (Reply #88)

Wed Jul 31, 2013, 11:51 AM

92. They describe an operating system that has gone off the reservation of Congressional intent

The program targets are foreign, but EVERYONE gets profiled as a potential terrorist by the system to determine who will be targeted with a warrant.

Not many of us would argue that sort of universal profiling system was within the ambit of the legislation's framers.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to ProSense (Reply #88)

Wed Jul 31, 2013, 11:51 AM

93. Ever More Character Assassination

eom

Reply to this post

Back to top Alert abuse Link here Permalink


Response to cantbeserious (Reply #93)

Wed Jul 31, 2013, 11:54 AM

96. Making a point is not a "Character Assassination" n/t

Reply to this post

Back to top Alert abuse Link here Permalink


Response to ProSense (Reply #96)

Wed Jul 31, 2013, 11:58 AM

97. You would be more persuasive if you just stuck to the facts about the NSA program and, for a change,

got off the ad hominem attacks on Greenwald and Snowden. Your skepticism is welcome, your ax is no longer sharp enough to cut it on this topic. Bury it for a while.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #97)

Wed Jul 31, 2013, 12:05 PM

101. Actually,

"You would be more persuasive if you just stuck to the facts about the NSA program and, for a change, got off the ad hominem attacks on Greenwald and Snowden. Your skepticism is welcome, your ax is no longer sharp enough to cut it on this topic. Bury it for a while. "

...I wasn't trying to be "persuasive." I was stating a fact: Making a point isn't a "character assassination."

Those who believe Greenwald should not be criticized are not going to be persuaded, and will continue to use such claims to deflect criticism. I'll, repeat my point, which clearly was not a "character assassination":

Yeah, it's good to know these training documents exists, and the best part:

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Again, Greenwald is talking about "technological capability." He's speculating and has no evidence that any laws are being ignored. The program targets are foreign.

Greenwald is now recycling his breaking revelations.
http://www.democraticunderground.com/10023378966

Reply to this post

Back to top Alert abuse Link here Permalink


Response to ProSense (Reply #101)

Wed Jul 31, 2013, 12:11 PM

108. You're repeating yourself, literally.

You post so much, are you partially automated? Also, you never addressed my point about the system being inconsistent with Congressional intent. Please engage on that.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #108)

Wed Jul 31, 2013, 12:17 PM

111. 'Inconsistent with Congressional intent' is not a crime.

 

I believe Congress fully intended for the NSA to monitor foreign suspects. In fact, that's the entire reason for the NSA's existence.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to leveymg (Reply #108)

Wed Jul 31, 2013, 12:24 PM

117. Fascinating!

"You post so much, are you partially automated?"

Post counting is now being used to deflect. Let me share some facts:

  1. I am not the DUer with the most posts.

  2. There are posters who start nearly twice as many threads as I do on any given day.

  3. I tend to participate in my threads, mostly responding to attempted deflections and personal attacks.
So unless you believe anyone with a high post count nearing or exceeding mine is "partially automated," your comment falls under item 3.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to ProSense (Reply #117)

Wed Jul 31, 2013, 02:09 PM

151. Your second response to my question was a near duplicate of the first. This one is a deflection.

But, I'd rather keep the dialogue on point and not make this a personal pissing contest. You never answered my question about whether you think this system conforms with the intent of Congress.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to ProSense (Reply #88)

Wed Jul 31, 2013, 12:08 PM

104. It appears that the talking points have congealed. n/t

Reply to this post

Back to top Alert abuse Link here Permalink


Response to xocet (Reply #104)

Wed Jul 31, 2013, 12:31 PM

119. Yup, as predicted

it's the "this proves nothing, this is legal" brigade. Alexander could sit in their living rooms running the damn thing and it wouldn't sway them one iota.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to ProSense (Reply #88)

Wed Jul 31, 2013, 09:58 PM

190. Keep catapulting the Propaganda! (it might be working...?)

Good job!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:46 AM

89. What happens if you order something online

and it's in a different country? I've ordered stuff from China before so am I red flagged?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to damnedifIknow (Reply #89)

Wed Jul 31, 2013, 12:06 PM

102. In itself, that is probably not enough to get "red flagged" (depending upon what you buy), but it is

something the system will retain and if combined with other things, might trip an alarm getting you closer scrutiny.

It's all determined by a very complex set of mathematical algorithms and what else is in there about you.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:52 AM

94. Oh no, the gov't would never

use that info for anything other than honorable purposes!

I love that last sentence with the Clapper attributes. My god, do people actually believe these lame excuses?

K&R, Catherina, and thank you for posts on this continuing bullshit.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 12:00 PM

98. Bookmarked

To read more closely.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 12:09 PM

105. Edward R Murrow: "A nation of sheep will beget a government of wolves."

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to AnotherMcIntosh (Reply #105)

Wed Jul 31, 2013, 12:15 PM

109. +2 (Extra points for Murrow)

Reply to this post

Back to top Alert abuse Link here Permalink


Response to AnotherMcIntosh (Reply #105)

Wed Jul 31, 2013, 12:15 PM

110. smart man.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 12:19 PM

112. Now we're getting to the nitty-gritty... good stuff!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 12:23 PM

116. There will be some hipster/tech apologist along soon to explain it all for us that this is not bad.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 12:32 PM

121. My god, how shocking and unexpected!

We should all direct our outrage at this President, and be careful to forget about:

The Total Information Awareness Program:

2002: http://www.democraticunderground.com/articles/02/11/21_4th.html

2005: http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=104x5681899

2006: http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=364x498378

CARNIVORE:

2004: http://www.democraticunderground.com/discuss/duboard.php?az=show_mesg&forum=102&topic_id=419239&mesg_id=419338

2005:http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=102x1151853

Domestic surveillance:

2007: http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x2488557

2001--February, 2001: http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=103x326639
______________________________________

First of all, fuck all of you who have made a ten-year career out of marginalizing the people who reported and passed on these stories, keeping it firmly in the paranoid conspiracy-theory box long enough for the practice to become institutionalized, codified, and legal.

Second, any of you who wish to separate the absolutely criminal practices that created this monster from the civil rights you no longer have today is whistling Dixie. You cannot replace the rights that have been taken from you without also prosecuting the Bush Administration for creating and running this system, illegally, for at least seven years. Bush ain't gonna be prosecuted, so I don't give a flying fuck if you want your rights back now--you simply are not going to get them back because we already allowed it to happen. Ask Ben Franklin about rights not exercised, and what happens to them.

So, third, you can go ahead and try to take apart the American surveillance state now, but it won't work. Instead, your head-on efforts are going to put you and me first against the wall when Jeb steals it.

Our only hope now is to gain control of this apparatus and use it against the people who created it. Destroy Jeb Bush's career before he can get in. Force Dick Cheney to renounce his citizenship and move to Dubai. Wreck Karl Rove with his own disgusting resume. Find the trillion dollars Rumsfeld and Wolfowitz stole. Savage and destroy the careers of top Republican donors.

And, since that ain't gonna happen, either, we have little recourse but to keep pretending we live in a republic until the day when the biological truth forces Americans to eat their oppressors.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to sofa king (Reply #121)

Wed Jul 31, 2013, 01:56 PM

148. I agree with much of what you said

You forgot a key date, however:

January, 2009: Obama inaugurated.

Yes, we should have prosecuted BushCo; who is responsible for the failure to do so?

Yes, we should have been rolling back the surveillance capabilities once a Democrat was in charge; who is responsible for the failure to do so?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 12:36 PM

123. Big woop. I heard the FBI taps the mafia's phones too

This is the biggest bunch of nothing ever. They have to get a warrant to do it to an individual American other wise it is limited to overseas signals - which is what the NSA does.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to arely staircase (Reply #123)

Wed Jul 31, 2013, 12:38 PM

126. But...but...Greenwald said stuff and Snowden "saw things"!

 

Why do you hate the truth so much?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to randome (Reply #126)

Wed Jul 31, 2013, 12:39 PM

127. because I am an authoritarian persona nt

Reply to this post

Back to top Alert abuse Link here Permalink


Response to arely staircase (Reply #123)

Wed Jul 31, 2013, 02:04 PM

150. Please contact Gen. Alexander for a home demo

Nothing else will convince you

Reply to this post

Back to top Alert abuse Link here Permalink


Response to LondonReign2 (Reply #150)

Wed Jul 31, 2013, 02:22 PM

153. Or just go down to your local Information Awareness Office and ask....



(actual logo--Wiki) That eye on the dollar bill is now the eye of global surveillance.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to marions ghost (Reply #153)

Wed Jul 31, 2013, 03:24 PM

166. Like everything else, though, its location is a secret

Reply to this post

Back to top Alert abuse Link here Permalink


Response to LondonReign2 (Reply #166)

Wed Jul 31, 2013, 04:52 PM

173. Well, it's a recombinant entity

when they tried to modify it in 2002--it just grew new arms and names and branched out into different places.

The special domain of a few...

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 12:37 PM

124. That's insane.

 

Why does the NSA have so much power and authority?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 12:49 PM

132. HTTPS

Not that it justifies spying on HTTP traffic just because it's possible to do so, but anything that people want to keep private should go over HTTPS anyway, or other secure protocols.

Notice, for instance, that Facebook currently works over HTTPS. Banking and credit card sites work over HTTPS. Of course, using HTTPS doesn't guarantee that the government doesn't have an arrangement to collect data directly from the opposite end of such secure connections, but it does prevent snooping of in-transit traffic.

I'm not terribly worried at any rate. I think a lot of the supposed capability of these systems is marketing hype from the people who've created the systems, people who want to get lucrative government contracts.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Silent3 (Reply #132)

Wed Jul 31, 2013, 02:53 PM

160. Technically it's not even required that the other party comply.

If the government intercepts your HTTPS traffic, they merely need to serve a warrant to the cert provider to obtain the keys for the SSL cert used by the site you connected to. Once they have the key, they can decode anything you sent. Facebook uses Verisign certificates. If the government wants to know what you're doing on Facebook, they don't need to get the data from Facebook, they can simply get the cert from Verisign and decode it themselves. In fact, I'd be pretty shocked if the NSA didn't already have the certs from most of the major sites like Facebook and Google on file just for that purpose.

It DOES prevent realtime snooping (because even with the key, the NSA doesn't have the computing power to decrypt every SSL connection in America in realtime), but SSL doesn't do much to protect your data if the government actually has some interest in your data for some reason (and conveniently, the "useless" metadata, which isn't protected by SSL, tells them exactly which certificates they need to use to decrypt everything).

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Xithras (Reply #160)

Wed Jul 31, 2013, 11:31 PM

206. Have certificate authorities actually been presented with such warrants?

And if so, not all of them are US companies, so the need for them (or their US offices) to comply, or keep such requests secret, isn't clear to me. Since giving away private keys is giving away a lot, I'd hope that a company issued such a warrant (and especially merely a non-warrant request) would fight it hard, as the scope of what a company gives away when surrendering its own, or a client company's, private keys is huge, much bigger than the scope of any particular suspected communications.

That would be like demanding an entire city allow every home in that city to be searched just because a few homes in the city are suspected of harboring stolen property.

Have things at the NSA (or any other US intelligence operations) gotten that far out of hand? Perhaps, but I'm not quite ready to set my hair on fire yet, as if somehow assuming the absolute worst based on a few accusations and PowerPoint slides is somehow the smart thing to do, so that "they" don't pull the wool over your eyes.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Silent3 (Reply #132)

Wed Jul 31, 2013, 11:14 PM

205. That's what I was wondering

They who have lost all credibility on these things call it an "NSA program" as if someone there invented it. But is is really a program that any company could buy? And then it can be used by the NSA the same way they could use a wiretap.

Boils down to new technology. If private companies have it, the government can get hands on it, too.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Silent3 (Reply #132)

Wed Jul 31, 2013, 11:44 PM

207. Not when they have access to the content, HTTPS only encrypts data during transit from 1 computer

 

to another computer... once it arrives it is automatically decrypted.

You may not be worried, but you know what they say, ignorance is bliss, but deliberate ignorance is probably bad for your mental health.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to usGovOwesUs3Trillion (Reply #207)

Thu Aug 1, 2013, 12:47 AM

214. The HTTP technology being described, however, is about intercepting data in transit...

...with I think the point being that such technology can gather a lot of info specifically without having to tap in at the arrival point.

If you want to assume that the government can also tap in at every arrival point, that is I suppose possible, but then the OP story is superfluous to that assumption.

I'm concerned enough with what's fairly certain about the NSA, and what certainly needs reforming, without having to see my hair on fire that every thing I hear MUST BE the "tip of the iceberg", as if the only possible somehow smart thing to do is to assume with great unshakable confidence that "they" can do anything, and can get anything, they want.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Silent3 (Reply #214)

Thu Aug 1, 2013, 12:52 AM

215. Not True.

 

They have TOP SECRET documents, and first hand accounts, indicating they have DIRECT SERVER ACCESS.

Burry your head in the sand if you like, but don't be rude and condescend to folks who are paying close attention, and/or have subject matter expertise in digital communications.

Thanks

Reply to this post

Back to top Alert abuse Link here Permalink


Response to usGovOwesUs3Trillion (Reply #215)

Thu Aug 1, 2013, 01:12 AM

216. Direct server access where? Getting what? And what's that got to do with XKeyscore?

Yes, there are indications of direct server access, in some places, getting some data. But that's not what this particular XKeyscore story is about. The opposite of having one's head in the sand is not blurring the details of separate stories into one big OMGBBQ.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Silent3 (Reply #216)

Thu Aug 1, 2013, 01:19 AM

217. From all the Biggies: Google, Microsoft, Apple, Skype, etc.

 

In case you don't realize it, these stories are all about 1 thing, NSA Spying by their unprecedented global (yes America included) harvesting, storing, and analyzing of almost ALL of our digital communications.

FYI

Reply to this post

Back to top Alert abuse Link here Permalink


Response to usGovOwesUs3Trillion (Reply #217)

Thu Aug 1, 2013, 04:48 PM

239. The stories so far have not said that Google, Microsoft, Apple, Skype et al...

...have been giving, or forced to give, the NSA everything that goes through them and their servers. The extent of any of that is just conjecture. (Somehow the "wise" thing is to assume everything you hear is just the "tip of the iceberg", a defensive stance so automatic for some people they don't even realize when they're doing it it anymore.)

And if it were true that such access was so pervasive, that would make what's being said in the OP about XKeyscore less relevant.

Just because you can pick an umbrella topic ("these stories are all about 1 thing, NSA Spying" doesn't mean that blurring details about separate stories and alleged spying programs under that umbrella topic is warranted or helpful.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Silent3 (Reply #239)

Thu Aug 1, 2013, 04:52 PM

240. Nonsense, their logos are all over the first batch of docs

 

This second release shows the UI of the app they use to pull up the data.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to usGovOwesUs3Trillion (Reply #240)

Thu Aug 1, 2013, 04:57 PM

241. And do those docs say...

..."These are the logos of companies we've completed infiltrated/gained complete cooperation from so that we capture and record all of their data"?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Silent3 (Reply #241)

Thu Aug 1, 2013, 05:15 PM

242. DIRECT ACCESS

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to usGovOwesUs3Trillion (Reply #242)

Thu Aug 1, 2013, 05:20 PM

244. So you saw the words "direct access" on a PowerPoint slide...

...and that assures you that it's been proven that the NSA records all data from all the servers from all of those companies? That's the only realistically possible interpretation?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Silent3 (Reply #244)

Thu Aug 1, 2013, 06:01 PM

246. The documentary evidence, combined with the first-hand accounts

 

And their primary mission (spying) paint a pretty clear picture for most reasonable observers.

This law breaking needs to be stopped ASAP!

Join the fight, and pass the word to all your fellows

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Silent3 (Reply #216)

Thu Aug 1, 2013, 09:54 AM

235. Log extracts from the big isps

https packets are like sealed envelopes, but they still have internet addresses. which are owned by isps. While you are correct https content is not immediately decryptable its trivial to crack them with a huge data center.

This is why every encrypted packet is saved FOREVER, because terrorists!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 12:56 PM

133. I am completely non-violent, I have always been completely non-violent, and

I know for a fact that they have an extensive file on me.

I have been involved in non-violent democratic anti-fascist movements since Vietnam.

What can I do? I have no say in the matter whatsoever.

If I get my way, someday I will have some say in the matter.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 01:29 PM

141. K&R

Great post.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 01:35 PM

143. Thank you for ALL this info...bookmarked....K&R nt

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 02:11 PM

152. You can spoof, use a proxy server, hide behind a uber powerful firewall

 

use inprivate surfing...DOESN'T MATTER. This is akin to something I always tell people, "if a thief wants to break into your house, he will no matter what you do to protect your property'. IOW, there is NO privacy on the WWW. NOT in one country, NOT in one city. NOWHERE.

And it has been this way since the invention of the BBS. That is over 40 YEARS! If people are getting upset NOW, good! BUT, it has been going on for about 40 years now! Hell, they were wiretapping phones long before anyone even heard of the term! And where does MOST of our technology come from? The military. SAME with the WWW.

IOW, we've all been playing around and surfing on military web servers for decades now.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Rex (Reply #152)

Fri Aug 2, 2013, 10:50 PM

257. Yep. That sums it up for the www.

Even older with the phones.

Anyone who thought they were using all these gimmicks in total privacy is naïve beyond redemption.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 02:32 PM

154. Kick

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 02:36 PM

155. all i can say about this is.....

have a nice day spybot!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to madrchsod (Reply #155)

Wed Jul 31, 2013, 02:58 PM

164. lol

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 02:54 PM

161. HUGE K & R !!! - THANK YOU !!!

 

sorry i missed this earlier






Reply to this post

Back to top Alert abuse Link here Permalink


Response to WillyT (Reply #161)

Wed Jul 31, 2013, 03:27 PM

168. It's impossible to keep up!

I miss so much because DU is moving so fast right now!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 02:57 PM

163. snoopy bastard

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 03:10 PM

165. Need to know codenames of NSA analyis and surveillance databases? Just browse Linked In

This only works for unclassified names



Edit: I think it's a safe bet to agree with Greenwald's statement that there's lots more coming lol.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 04:42 PM

171. So the Pentagon knows all, eh?

 

K&R

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 04:48 PM

172. K&R thank you Catherina.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 05:26 PM

175. ACLU: New Report Confirms NSA's Ability to Access Americans' Online Activity

New Report Confirms NSA's Ability to Access Americans' Online Activity

July 31, 2013

FOR IMMEDIATE RELEASE
CONTACT: 212-549-2666, media@aclu.org

NEW YORK – The government can easily see the content of Americans' Internet communication and web browsing activities, according to a report published today in The Guardian.

"The latest revelations make clear that the government's surveillance activities are far more extensive and intrusive than previously understood, and they underscore that the surveillance laws are in desperate need of reform," said American Civil Liberties Union Deputy Legal Director Jameel Jaffer, who testified before the Senate Judiciary Committee today about NSA surveillance. "These documents also call into question the truth of some of the representations that intelligence officials have made to the public and Congress over the last two months. Intelligence officials have said repeatedly that NSA analysts do not have the ability to sift indiscriminately through Americans' sensitive information, but this new report suggests they do."

The revelations today come at a time when public opinion has begun to shift in favor of strengthening Americans' privacy rights and a growing bipartisan group in Congress works to rein in NSA surveillance of Americans' communications.

"The seemingly never-ending NSA disclosures show the frightening power the government has afforded itself without the knowledge of the American people," said Michelle Richardson, legislative counsel at the ACLU's Washington Legislative Office. "The recent Amash amendment vote shows that the public has had enough with the blanket, warrantless surveillance of its communications. Without significant reforms to these programs, the government is going to lose them."

http://www.aclu.org/national-security/new-report-confirms-nsas-ability-access-americans-online-activity

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Reply #175)

Wed Jul 31, 2013, 07:21 PM

180. Yes, technology gives the government, any organization in fact, the ABILITY to spy.

 

Does this mean the NSA is violating its own laws and regulations which mandate they can only monitor foreign communications?

Nothing in either of these articles points to that. It's only the ever-fearful 'ability'. They could be spying on all of us. Duh.
[hr][font color="blue"][center]Don't ever underestimate the long-term effects of a good night's sleep.[/center][/font][hr]

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 07:13 PM

178. Kick.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 08:27 PM

181. Bookmarking, this is a keeper.

A big "thank you!" to you, and to the other DUers who are keeping us on top of the developments in this situation. Much appreciated!

The only thing that makes me feel a little better about this, is that a lot of people recognize the gravity of it and are duly alarmed about it, including the more thinking people, and thankfully at least some in Congress.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Waiting For Everyman (Reply #181)

Wed Jul 31, 2013, 10:41 PM

199. The key is to keep the pressure up

and more facts are being revealed. Stay informed and we can slowly turn the tide on this massive overreach.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 08:34 PM

182. K & R.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 09:20 PM

183. It's called a police state.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 09:32 PM

184. "...no review by a court or NSA staff..." Warrantless.

 

WASHINGTON (Reuters) - New revelations from former security contractor Edward Snowden that U.S. intelligence agencies have access to a vast online tracking tool came to light on Wednesday, as lawmakers put the secret surveillance programs under greater scrutiny.

The Guardian, citing documents from Snowden, published National Security Agency training materials for the XKeyscore program, which the British newspaper described as the NSA's widest-reaching system that covers "nearly everything a typical user does on the Internet."

Intelligence analysts can conduct surveillance through XKeyscore by filling in an on-screen form giving only a "broad justification" for the search and no review by a court or NSA staff, the newspaper said.

http://news.yahoo.com/u-declassify-documents-spy-programs-surveillance-court-033021541.html

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Wed Jul 31, 2013, 11:49 PM

208. Hold on, that presentation is dated 25 Feb 2008

which was BEFORE the FISA Act was passed on 07/10/2008. That's when we KNEW that Bush was illegally collecting data and phone calls without a warrant. Which is WHY Congress passed the act in July.

Do they have anything after the Act was passed?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to jazzimov (Reply #208)

Thu Aug 1, 2013, 12:04 AM

211. +1

more baloney from the royal funny farm

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Thu Aug 1, 2013, 12:00 AM

210. See "Operation Northwoods" for some informative background:

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)


Response to Catherina (Original post)

Thu Aug 1, 2013, 11:35 AM

238. kicking

 

this thread does not need reposting!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Thu Aug 1, 2013, 05:18 PM

243. kick nt

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Catherina (Original post)

Fri Aug 2, 2013, 09:48 AM

256. Thanks for the post.

I'm glad people beyond progressives are waking up to the facts about these illegal activities.

Reply to this post

Back to top Alert abuse Link here Permalink

Reply to this thread