informationliberation
The news you're not supposed to know...




Austrian Economics: Understand Economics, Understand the World
The Century of the Self: The Untold History of Controlling the Masses Through the Manipulation of Unconscious Desires
The Disappearing Male: From Virility to Sterility

The Obama Deception: The Mask Comes Off
Operation Gladio: The Hidden History of U.S. Sponsored False Flag Terrorism in EuropeThe New American Century: The Untold History of The Project for the New American Century
(more)
Article posted Aug 21 2013, 7:54 AM Category: Big Brother/Orwellian Source: Zero Hedge Print

How The NSA Scours 75% Of The Nation's Internet Traffic - In One Chart

by Tyler Durden

The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic. The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But the WSJ reports that officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones. Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work. Here is how the system operates...

Via Wall Street Journal,
The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say.

The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones.

The programs, code-named Blarney, Fairview, Oakstar, Lithium and Stormbrew, among others, filter and gather information at major telecommunications companies. Blarney, for instance, was established with AT&T.

This filtering takes place at more than a dozen locations at major Internet junctions in the U.S., officials say. Previously, any NSA filtering of this kind was largely believed to be happening near points where undersea or other foreign cables enter the country.

Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work.
...

"Technology is moving us swiftly into a world where the only barriers to this kind of dragnet surveillance are the protections enshrined into law,"

...
The systems operate like this:

The NSA asks telecom companies to send it various streams of Internet traffic it believes most likely to contain foreign intelligence.

This is the first cut of the data.



These requests don't ask for all Internet traffic. Rather, they focus on certain areas of interest, according to a person familiar with the legal process. "It's still a large amount of data, but not everything in the world," this person says.

The second cut is done by NSA.

It briefly copies the traffic and decides which communications to keep based on what it calls "strong selectors" - say, an email address, or a large block of computer addresses that correspond to an organization it is interested in. In making these decisions, the NSA can look at content of communications as well as information about who is sending the data.
Easy as that...





Latest Big Brother/Orwellian
- Schools To Parents: If You Let Your Kid Play 'Call Of Duty' We'll Call CPS On You
- Publishers Actively Monitoring Testing Students' Social Media Posts For Possible Cheating
- New Bill Would Have Teachers Diagnose Psychological Issues in Children and Report them to Police
- How The Copyright Industry Wants To Undermine Anonymity & Free Speech: 'True Origin' Bills
- Even If Congress Lets Section 215 Expire, The NSA May Be Able To Keep On Collecting Phone Metadata
- Report: Feds Urge Banks to Call Cops on Customers Who Withdraw $5,000 or More
- UK Police Can't Confirm Or Deny Investigation Of Journalists It Publicly Confirmed In 2013
- Snowden Docs Reveal Canada a Major Player in Global Spy Operations









No Comments Posted Add Comment


Add Comment
Name
Comment

* No HTML


Verification *
Please Enter the Verification Code Seen Below
 


PLEASE NOTE
Please see our About Page, our Disclaimer, and our Comments Policy.


FAIR USE NOTICE
This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.

About Us - Disclaimer - Privacy Policy



Advanced Search
Username:

Password:

Remember Me
Forgot Password?
Register

Bureaucrats Panic As Traffic Ticket Revenue Plummets Across U.S. - 03/30South Florida Parole Officer Rapes Woman Who Records The Entire Act On Video - 03/30Female Cop Sucker Punches Handcuffed Man in the Face for No Reason, Fellow Cops Do Nothing - 03/30Woman Exonerated After Spending 22 Years on Death Row Based on Cop's Lie - 03/30Vancouver Police Officer Smashes Driver's Window After Refusing to Tell Him Why He is Under Arrest - 03/30Cop Indicted for Tasering a Teen, Leaving him in a Coma, for Asserting his Rights During Stop - 03/30Texas Politician Expected to Withdraw Anti-Cop Watching Bill After Opposition From Police Union - 03/30Two Former Feds Charged With Stealing Bitcoin During Silk Road Probe - 03/30

Man Follows Speeding Cop, Finds Out He Was Speeding To Buy PeanutsMission Creeps: Homeland Security Agents Confiscate Women's Panties For 'Copyright Infringement'Cop Shoots Couple's Dog, Threatens Jail For Trying To Save Dog's LifeSWAT Team Shoots Teen Girl & Her Dog During Pot Raid On Wrong HomeDurham, NC Cop Testifies Faking 911 Calls To Enter Homes Is "Official Policy"Indiana Sheriff Says US A "War Zone" To Justify New MRAP Military VehicleTampa Cops Surveil Pot Dealer, Catch Him Selling Pot, Raid His Home & Kill Him"You Just Shot An Unarmed Man!": Witness Says Police Shot His Friend With His Hands Up
(more)

 
Top