informationliberation
The news you're not supposed to know...




An Introduction to Austrian Economics: Understand Economics, Understand Everything
The Century of the Self: The Untold History of Controlling the Masses Through the Manipulation of Unconscious Desires
The Disappearing Male: From Virility to Sterility

The Obama Deception: The Mask Comes Off
Operation Gladio: The Hidden History of U.S. Sponsored False Flag Terrorism in EuropeThe New American Century: The Untold History of The Project for the New American Century
(more)
Article posted Aug 21 2013, 7:54 AM Category: Big Brother/Orwellian Source: Zero Hedge Print

How The NSA Scours 75% Of The Nation's Internet Traffic - In One Chart

by Tyler Durden

The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic. The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But the WSJ reports that officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones. Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work. Here is how the system operates...

Via Wall Street Journal,
The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say.

The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones.

The programs, code-named Blarney, Fairview, Oakstar, Lithium and Stormbrew, among others, filter and gather information at major telecommunications companies. Blarney, for instance, was established with AT&T.

This filtering takes place at more than a dozen locations at major Internet junctions in the U.S., officials say. Previously, any NSA filtering of this kind was largely believed to be happening near points where undersea or other foreign cables enter the country.

Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work.
...

"Technology is moving us swiftly into a world where the only barriers to this kind of dragnet surveillance are the protections enshrined into law,"

...
The systems operate like this:

The NSA asks telecom companies to send it various streams of Internet traffic it believes most likely to contain foreign intelligence.

This is the first cut of the data.



These requests don't ask for all Internet traffic. Rather, they focus on certain areas of interest, according to a person familiar with the legal process. "It's still a large amount of data, but not everything in the world," this person says.

The second cut is done by NSA.

It briefly copies the traffic and decides which communications to keep based on what it calls "strong selectors" - say, an email address, or a large block of computer addresses that correspond to an organization it is interested in. In making these decisions, the NSA can look at content of communications as well as information about who is sending the data.
Easy as that...





Latest Big Brother/Orwellian
- FBI's Facial Recognition Program Hits 'Full Operational Capability'
- Student Suspended For Saying 'Bless You' After Classmate Sneezed
- The Worst Trolls On The Internet Are The Government Trolls
- Feds Ignore First Amendment, Supreme Court Precedent In Seizing Domain Of Social Network For Sex Workers
- US Supreme Court Rules Cops Need Warrants to Search Cell Phones
- State Legislators Discussing Laws That Will Put Law Enforcement Surveillance Cameras Inside Private Businesses
- Obama Admin Seeks Authority To Ruin All GPS Navigation Systems
- Judge Says NSA Can Continue To Destroy Evidence









No Comments Posted Add Comment


Add Comment
Name
Comment

* No HTML


Verification *
Please Enter the Verification Code Seen Below
 


PLEASE NOTE
Please see our About Page, our Disclaimer, and our Comments Policy.


FAIR USE NOTICE
This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.

About Us - Disclaimer - Privacy Policy



Advanced Search
Username:

Password:

Remember Me
Forgot Password?
Register

Man Calls Cops To Report Vandals At His Home, They Show Up And Kill Him - 09/18Austin Police Officer Tries To Paint Police Accountability Groups As 'Domestic Extremists' In FOIA'ed Emails - 09/18Delaware Court Overturns Hearsay Traffic Stops - 09/18This Week's Corrupt Cops Stories - 09/18"You Have The Right To Shut Up": Police Raid Tavern, Lock Doors, Forcibly Search Dozens of Patrons - 09/17Government Seeks To Steal Elderly Car Crash Victim's Home Over Single Missed Property Tax Payment - 09/17FBI Investigates: Teen In A Coma After Cop Deploys Taser During Routine Traffic Stop - 09/17Apple Will No Longer Unlock Most iPhones, iPads for Police, Even With Search Warrants - 09/18

Rialto, CA Police Made to Wear Cameras, Use of Force Drops by Over Two-ThirdsCop Who Karate Chopped NY Judge In Throat Gets Off Scot-FreeFlorida Cop Smashes Compliant Woman's Face Into Car -- "Maybe Now You Can Understand Simple Instructions"VIDEO: Lapel Cam Reveals A Day In The Life Of A U.S. Police Officer (Tasing, Beating, Breaking & Entering, Stomping On Heads... and Laughing About It)Caught On Tape: Officer Sucker Punches Inmate In Face, Files Report Claiming 'Self Defense'Insult Person On Twitter, Go To JailSWAT Team Brings TV Crew To Film Raid Against Threatening Internet Critic -- Raids Innocent Grandma InsteadCop Karate Chops NY Judge In The Throat
(more)

 
Top