informationliberation
The news you're not supposed to know...




An Introduction to Austrian Economics: Understand Economics, Understand Everything
The Century of the Self: The Untold History of Controlling the Masses Through the Manipulation of Unconscious Desires
The Disappearing Male: From Virility to Sterility

The Obama Deception: The Mask Comes Off
Operation Gladio: The Hidden History of U.S. Sponsored False Flag Terrorism in EuropeThe New American Century: The Untold History of The Project for the New American Century
(more)
Article posted Aug 21 2013, 7:54 AM Category: Big Brother/Orwellian Source: Zero Hedge Print

How The NSA Scours 75% Of The Nation's Internet Traffic - In One Chart

by Tyler Durden

The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic. The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But the WSJ reports that officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones. Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work. Here is how the system operates...

Via Wall Street Journal,
The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say.

The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones.

The programs, code-named Blarney, Fairview, Oakstar, Lithium and Stormbrew, among others, filter and gather information at major telecommunications companies. Blarney, for instance, was established with AT&T.

This filtering takes place at more than a dozen locations at major Internet junctions in the U.S., officials say. Previously, any NSA filtering of this kind was largely believed to be happening near points where undersea or other foreign cables enter the country.

Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work.
...

"Technology is moving us swiftly into a world where the only barriers to this kind of dragnet surveillance are the protections enshrined into law,"

...
The systems operate like this:

The NSA asks telecom companies to send it various streams of Internet traffic it believes most likely to contain foreign intelligence.

This is the first cut of the data.



These requests don't ask for all Internet traffic. Rather, they focus on certain areas of interest, according to a person familiar with the legal process. "It's still a large amount of data, but not everything in the world," this person says.

The second cut is done by NSA.

It briefly copies the traffic and decides which communications to keep based on what it calls "strong selectors" - say, an email address, or a large block of computer addresses that correspond to an organization it is interested in. In making these decisions, the NSA can look at content of communications as well as information about who is sending the data.
Easy as that...





Latest Big Brother/Orwellian
- David Cameron Says Non-Violent Conspiracy Theorists Are Just As Dangerous As ISIS
- Aussie Teenager Fearful For His Life After Newspaper Misidentifies Him As A Terrorist With Wrong Facebook Photo
- FBI's Facial Recognition Program Hits 'Full Operational Capability'
- Student Suspended For Saying 'Bless You' After Classmate Sneezed
- The Worst Trolls On The Internet Are The Government Trolls
- Feds Ignore First Amendment, Supreme Court Precedent In Seizing Domain Of Social Network For Sex Workers
- US Supreme Court Rules Cops Need Warrants to Search Cell Phones
- State Legislators Discussing Laws That Will Put Law Enforcement Surveillance Cameras Inside Private Businesses









No Comments Posted Add Comment


Add Comment
Name
Comment

* No HTML


Verification *
Please Enter the Verification Code Seen Below
 


PLEASE NOTE
Please see our About Page, our Disclaimer, and our Comments Policy.


FAIR USE NOTICE
This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.

About Us - Disclaimer - Privacy Policy



Advanced Search
Username:

Password:

Remember Me
Forgot Password?
Register

Cops Seize Car When Told To Get A Warrant, Tell Owner That's What He Gets For 'Exercising His Rights' - 09/29Pittsburgh Cops Tased Man While He Was Praying For His Dead Son In ER: Lawsuit - 09/28Sheriff Pummels a Man With His Badge In a Fit Road Rage - 09/28Cop Who Murdered James Boyd, Caught Plotting on Dashcam, "I'm Going to Shoot Him in the Penis" - 09/29Blackmail, Witness Tampering, Criminal Misconduct: Routine Business for the Flathead County Gestapo - 09/29SC Trooper Groubert Told Supervisor Man He Shot 'Kept Coming Towards' Him, Contradicting Video - 09/29Pennsylvania Cop Snatches Camera from Man, Claiming it is Illegal to Record without Permission - 09/28Did Miami Police Wrongfully Execute Four, Including Their Informant? - 09/28

Rialto, CA Police Made to Wear Cameras, Use of Force Drops by Over Two-ThirdsCop Who Karate Chopped NY Judge In Throat Gets Off Scot-FreeFlorida Cop Smashes Compliant Woman's Face Into Car -- "Maybe Now You Can Understand Simple Instructions"VIDEO: Lapel Cam Reveals A Day In The Life Of A U.S. Police Officer (Tasing, Beating, Breaking & Entering, Stomping On Heads... and Laughing About It)Caught On Tape: Officer Sucker Punches Inmate In Face, Files Report Claiming 'Self Defense'Insult Person On Twitter, Go To JailSWAT Team Brings TV Crew To Film Raid Against Threatening Internet Critic -- Raids Innocent Grandma InsteadCop Karate Chops NY Judge In The Throat
(more)

 
Top