informationliberation
The news you're not supposed to know...




Austrian Economics: Understand Economics, Understand the World
The Century of the Self: The Untold History of Controlling the Masses Through the Manipulation of Unconscious Desires
The Disappearing Male: From Virility to Sterility

The Obama Deception: The Mask Comes Off
Operation Gladio: The Hidden History of U.S. Sponsored False Flag Terrorism in EuropeThe New American Century: The Untold History of The Project for the New American Century
(more)
Article posted Aug 21 2013, 7:54 AM Category: Big Brother/Orwellian Source: Zero Hedge Print

How The NSA Scours 75% Of The Nation's Internet Traffic - In One Chart

by Tyler Durden

The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic. The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But the WSJ reports that officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones. Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work. Here is how the system operates...

Via Wall Street Journal,
The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say.

The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones.

The programs, code-named Blarney, Fairview, Oakstar, Lithium and Stormbrew, among others, filter and gather information at major telecommunications companies. Blarney, for instance, was established with AT&T.

This filtering takes place at more than a dozen locations at major Internet junctions in the U.S., officials say. Previously, any NSA filtering of this kind was largely believed to be happening near points where undersea or other foreign cables enter the country.

Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work.
...

"Technology is moving us swiftly into a world where the only barriers to this kind of dragnet surveillance are the protections enshrined into law,"

...
The systems operate like this:

The NSA asks telecom companies to send it various streams of Internet traffic it believes most likely to contain foreign intelligence.

This is the first cut of the data.



These requests don't ask for all Internet traffic. Rather, they focus on certain areas of interest, according to a person familiar with the legal process. "It's still a large amount of data, but not everything in the world," this person says.

The second cut is done by NSA.

It briefly copies the traffic and decides which communications to keep based on what it calls "strong selectors" - say, an email address, or a large block of computer addresses that correspond to an organization it is interested in. In making these decisions, the NSA can look at content of communications as well as information about who is sending the data.
Easy as that...





Latest Big Brother/Orwellian
- DEA Caught Scheming to Monitor Gun Show Participants Using License Plate Readers
- New Regs Say Passengers Cannot Fly Without Biometric ID Card
- Drug Dealers Swapping Down To Old Cellphones To Stay One Step Ahead In The 'Tech Arms Race'
- Revealed: Canadian Spy Program Illustrates "Giant X-Ray Machine Over All Our Digital Lives"
- US Engaged in Massive Car Spying Program
- France Announces Plans To Hold The Internet Responsible For Terrorism
- Je Suis Disappoint: French Court Convicts Idiots For Homophobic Stupidity
- The Many Problems with the DEA's Bulk Phone Records Collection Program









No Comments Posted Add Comment


Add Comment
Name
Comment

* No HTML


Verification *
Please Enter the Verification Code Seen Below
 


PLEASE NOTE
Please see our About Page, our Disclaimer, and our Comments Policy.


FAIR USE NOTICE
This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.

About Us - Disclaimer - Privacy Policy



Advanced Search
Username:

Password:

Remember Me
Forgot Password?
Register

Another Reason Uber Gets Banned: DUIs Are An Essential Revenue Stream - 01/29Video: Americans Want Obama to Repeal the Bill of Rights - 01/26Quebec Woman Suing Cop Who Left Her Locked In Back Of Police Truck With Man Who Ended Up Raping Her - 01/31Ex-Gf Of Seattle Cop Says She Smoked Pot Stolen From Evidence, Referred To Blacks As N*****s - 01/31Canada Unveils New Anti-Terrorism Bill That Moves for 'Unprecedented Expansion of Powers' - 01/31New Mexico Grand Jury Finds Police Shooting Unjustified, DA Refuses to Prosecute - 01/30Police Label Hippy Group Whose Message Is "Peace & Love" 'Domestic Extremists' - 01/30NYPD to Permanently Patrol Protests with Machine Guns - 01/30

Man Follows Speeding Cop, Finds Out He Was Speeding To Buy PeanutsMission Creeps: Homeland Security Agents Confiscate Women's Panties For 'Copyright Infringement'Cop Shoots Couple's Dog, Threatens Jail For Trying To Save Dog's LifeSWAT Team Shoots Teen Girl & Her Dog During Pot Raid On Wrong HomeDurham, NC Cop Testifies Faking 911 Calls To Enter Homes Is "Official Policy"Indiana Sheriff Says US A "War Zone" To Justify New MRAP Military VehicleTampa Cops Surveil Pot Dealer, Catch Him Selling Pot, Raid His Home & Kill Him"You Just Shot An Unarmed Man!": Witness Says Police Shot His Friend With His Hands Up
(more)

 
Top