NSA - Prism Bigger than just Verizon - Page 8 - FaunaClassifieds
FaunaClassifieds  
 Sponsors »  Breeders | Dealers |  Importers/Exporters | Caging | Feed | Supplies | Services | Events 
  Inside FaunaClassifieds » Product Reviews |  Classifieds!   | Photo Gallery   | Banner Advertising 
 
  Do you want to be able to bump and highlight your classified ads? Click here!

Go Back   FaunaClassifieds > General Interest Forums > Preparedness & Self-Reliance Forum

Notices

Preparedness & Self-Reliance Forum Survivalism, Livestock, Preparedness, Self Reliant Homesteading, Individual Liberty

Reply
 
Thread Tools Display Modes
Old 07-07-2013, 12:49 PM   #71
Lucille
The courts seem to be developing a system of law quietly that supports the government in its taking of information:


http://www.nytimes.com/2013/07/07/us...it_th_20130707
 
Old 07-09-2013, 12:15 AM   #72
Dennis Hultman
Quote:
Originally Posted by Dennis Hultman View Post

Part two released today.


 
Old 07-12-2013, 06:54 AM   #73
RJK890
http://www.washingtonpost.com/wp-srv...ion-documents/

Quote:
NSA slides explain the PRISM data-collection program
Published: June 6, 2013, Updated July 10, 2013
The top-secret PRISM program allows the U.S. intelligence community to gain access from nine Internet companies to a wide range of digital information, including e-mails and stored data, on foreign targets operating outside the United States. The program is court-approved but does not require individual warrants. Instead, it operates under a broader authorization from federal judges who oversee the use of the Foreign Intelligence Surveillance Act (FISA). Some documents describing the program were first released by The Washington Post on June 6. The newly released documents below give additional details about how the program operates, including the levels of review and supervisory control at the NSA and FBI. The documents also show how the program interacts with the Internet companies. These slides, annotated by The Post, represent a selection from the overall document, and certain portions are redacted. Read related article.

Related NSA graphics
See the inner workings of the NSA's top secret spy program »

550,000 miles of undersea cables connect the world »

What is the Federal Intelligence Surveillance Court? »

Who holds top-secret security clearances? »

New slide published July 10
Upstream program
This slide shows PRISM as only one part of the NSA’s system for electronic eavesdropping. The "Upstream" program collects from the fiber-optic cable networks that carry much of the world’s Internet and phone data. The underlying map depicts the undersea cables that connect North America to the rest of the world.


Slides published June 29
Acquiring data from a new target
This slide describes what happens when an NSA analyst "tasks" the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the "selectors," or search terms. The supervisor must endorse the analyst's "reasonable belief," defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection.


The FBI uses government equipment on private company property to retrieve matching information from a participating company, such as Microsoft or Yahoo and pass it without further review to the NSA.
For stored communications, but not for live surveillance, the FBI consults its own databases to make sure the selectors do not match known Americans.
This is where data enters NSA systems, described more fully on the next slide.
The Foreign Intelligence Surveillance Court does not review any individual collection request.
Analyzing information collected from private companies
After communications information is acquired, the data are processed and analyzed by specialized systems that handle voice, text, video and "digital network information" that includes the locations and unique device signatures of targets.


From the FBI's interception unit on the premises of private companies, the information is passed to one or more "customers" at the NSA, CIA or FBI.
PRINTAURA automates the traffic flow. SCISSORS and Protocol Exploitation sort data types for analysis in NUCLEON (voice), PINWALE (video), MAINWAY (call records) and MARINA (Internet records).
The systems identified as FALLOUT and CONVEYANCE appear to be a final layer of filtering to reduce the intake of information about Americans.
Each target is assigned a case notation
The PRISM case notation format reflects the availability, confirmed by The Post's reporting, of real-time surveillance as well as stored content.


Depending on the provider, the NSA may receive live notifications when a target logs on or sends an e-mail, or may monitor a voice, text or voice chat as it happens (noted on the first slide as "Surveillance").
Searching the PRISM database
On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM's counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected "incidentally" during surveillance of those targets.


Original slides published June 6
Introducing the program
A slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved.


The program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables.
This note indicates that the program is the number one source of raw intelligence used for NSA analytic reports.
The seal of
Special Source Operations, the NSA term for alliances with trusted U.S. companies.
Monitoring a target's communication
This diagram shows how the bulk of the world’s electronic communications move through companies based in the United States.


Providers and data
The PRISM program collects a wide range of data from the nine companies, although the details vary by provider.


Participating providers
This slide shows when each company joined the program, with Microsoft being the first, on Sept. 11, 2007, and Apple the most recent, in October 2012
.
 
Old 07-15-2013, 12:42 AM   #74
Dennis Hultman
Edward Snowden Press Conference - Moscow Airport - July 12th

 
Old 07-15-2013, 02:05 AM   #75
Dennis Hultman
Quote:
Published on Jul 14, 2013

glenn greenwald. RIO DE JANEIRO — Edward Snowden has very sensitive "blueprints" detailing how the National Security Agency operates that would allow someone who read them to evade or even duplicate NSA surveillance, a journalist close to the intelligence leaker said Sunday.

Glenn Greenwald, a columnist with The Guardian newspaper who closely communicates with Snowden and first reported on his intelligence leaks, told The Associated Press that the former NSA systems analyst has "literally thousands of documents" that constitute "basically the instruction manual for how the NSA is built."

"In order to take documents with him that proved that what he was saying was true he had to take ones that included very sensitive, detailed blueprints of how the NSA does what they do," Greenwald said in Brazil, adding that the interview was taking place about four hours after his last interaction with Snowden.

Snowden emerged from weeks of hiding in a Moscow airport Friday, and said he was willing to meet President Vladimir Putin's condition that he stop leaking U.S. secrets if it means Russia would give him asylum until he can move on to Latin America.

Greenwald told The AP that Snowden has insisted the information from those documents not be made public. The journalist said it "would allow somebody who read them to know exactly how the NSA does what it does, which would in turn allow them to evade that surveillance or replicate it."

Despite their sensitivity, Greenwald said he didn't think that disclosure of the documents would prove harmful to Americans or their national security.

"I think it would be harmful to the U.S. government, as they perceive their own interests, if the details of those programs were revealed," said the 46-year-old former constitutional and civil rights lawyer who has written three books contending the government has violated personal rights in the name of protecting national security.

He has previously said the documents have been encrypted to help ensure their safekeeping.

Greenwald, who has also co-authored a series of articles in Rio de Janeiro's O Globo newspaper focusing on NSA actions in Latin America, said he expected to continue publishing further stories based on other Snowden documents over the next four months.
 
Old 07-25-2013, 02:42 PM   #76
Dennis Hultman
Debate & Vote To Stop NSA Data Collection. Voted Down In House

 
Old 07-25-2013, 03:48 PM   #77
Metachrosis
Well advanced past ever stopping it, no body listened to the foil hats.
They will turn up the control pressure once they are insured people accept this and adjust thru compliance.
This too has already been openly discussed and scoffed at
and then folks went back to sleep.
 
Old 07-27-2013, 01:30 AM   #78
Dennis Hultman
Obama Promise To 'Protect Whistleblowers' Just Disappeared From Change.gov
Quote:
The folks from the Sunlight Foundation have noticed that the Change.gov website, which was set up by the Obama transition team after the election in 2008 has suddenly been scrubbed of all of its original content. They noted that the front page had pointed to the White House website for a while, but you could still access a variety of old material and agendas. They were wondering why the administration would suddenly pull all that interesting archival information... and hit upon a clue. A little bit from the "ethics agenda":

Protect Whistleblowers: Often the best source of information about waste, fraud, and abuse in government is an existing government employee committed to public integrity and willing to speak out. Such acts of courage and patriotism, which can sometimes save lives and often save taxpayer dollars, should be encouraged rather than stifled. We need to empower federal employees as watchdogs of wrongdoing and partners in performance. Barack Obama will strengthen whistleblower laws to protect federal workers who expose waste, fraud, and abuse of authority in government. Obama will ensure that federal agencies expedite the process for reviewing whistleblower claims and whistleblowers have full access to courts and due process.

Yeah. That statement seems a bit embarrassing at the very same time Obama's administration is threatening trade sanctions against anyone who grants asylum to Ed Snowden. Also... at the same time that we get to see how whistleblower Bradley Manning's "full access to courts and due process" will turn out. So far, it's been anything but reasonable, considering that the UN has already condemned Manning's treatment as "cruel and inhuman." And people wonder why Snowden left the country...
http://www.techdirt.com/articles/201...hangegov.shtml
 

Join now to reply to this thread or open new ones for your questions & comments! FaunaClassifieds.com is the largest online community about Reptile & Amphibians, Snakes, Lizards and number one classifieds service with thousands of ads to look for. Registration is open to everyone and FREE. Click Here to Register!

 
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off


All times are GMT -4. The time now is 01:20 PM.







TESTING!
Fauna Top Sites


Powered by vBulletin® Version 3.7.3
Copyright ©2000 - 2020, Jelsoft Enterprises Ltd.
Page generated in 0.04696894 seconds with 12 queries
Content copyrighted ©2002-2018, FaunaClassifieds, LLC