informationliberation
The news you're not supposed to know...




Austrian Economics: Understand Economics, Understand the World
The Century of the Self: The Untold History of Controlling the Masses Through the Manipulation of Unconscious Desires
The Disappearing Male: From Virility to Sterility

The Obama Deception: The Mask Comes Off
Operation Gladio: The Hidden History of U.S. Sponsored False Flag Terrorism in EuropeThe New American Century: The Untold History of The Project for the New American Century
(more)
Article posted Aug 21 2013, 7:54 AM Category: Big Brother/Orwellian Source: Zero Hedge Print

How The NSA Scours 75% Of The Nation's Internet Traffic - In One Chart

by Tyler Durden

The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic. The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But the WSJ reports that officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones. Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work. Here is how the system operates...

Via Wall Street Journal,
The NSA - which possesses only limited legal authority to spy on U.S. citizens - has, according to the Wall Street Journal, built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say.

The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones.

The programs, code-named Blarney, Fairview, Oakstar, Lithium and Stormbrew, among others, filter and gather information at major telecommunications companies. Blarney, for instance, was established with AT&T.

This filtering takes place at more than a dozen locations at major Internet junctions in the U.S., officials say. Previously, any NSA filtering of this kind was largely believed to be happening near points where undersea or other foreign cables enter the country.

Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work.
...

"Technology is moving us swiftly into a world where the only barriers to this kind of dragnet surveillance are the protections enshrined into law,"

...
The systems operate like this:

The NSA asks telecom companies to send it various streams of Internet traffic it believes most likely to contain foreign intelligence.

This is the first cut of the data.



These requests don't ask for all Internet traffic. Rather, they focus on certain areas of interest, according to a person familiar with the legal process. "It's still a large amount of data, but not everything in the world," this person says.

The second cut is done by NSA.

It briefly copies the traffic and decides which communications to keep based on what it calls "strong selectors" - say, an email address, or a large block of computer addresses that correspond to an organization it is interested in. In making these decisions, the NSA can look at content of communications as well as information about who is sending the data.
Easy as that...





Latest Big Brother/Orwellian
- FDA Says Tobacco Manufacturers Can No Longer Call Additive-Free & Natural Cigarettes Additive-Free & Natural
- Appeals Court Strikes Down Ruling Finding NSA Phone Records Collection Unconstitutional
- City of San Jose Looking To Attach Automatic License Plate Readers To Garbage Trucks
- Nebraska Teachers Sign Pledge Promising To Propagandize Students
- Wisconsin High School To Randomly Drug Test Students
- Chicago, Los Angeles Police Departments Have Been Using 'Stingrays On Steroids' For Over A Decade
- Study Shows More Americans Than Ever Support Banning Books
- EU Printing Comics Full Of Pro-EU Propaganda For Children









No Comments Posted Add Comment


Add Comment
Name
Comment

* No HTML


Verification *
Please Enter the Verification Code Seen Below
 


PLEASE NOTE
Please see our About Page, our Disclaimer, and our Comments Policy.


FAIR USE NOTICE
This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.

About Us - Disclaimer - Privacy Policy



Advanced Search
Username:

Password:

Remember Me
Forgot Password?
Register

Cocaine Production Plummets After DEA Kicked Out of Bolivia - 08/28FDA Says Tobacco Manufacturers Can No Longer Call Additive-Free & Natural Cigarettes Additive-Free & Natural - 08/29This Cop Killed 6 People & Retired, Now He Trains Cops By Shocking Them When They Hesitate to Shoot - 08/29TSA Agent Forced College Student into Bathroom for 'Security Search' and Sexually Assaulted Her - 08/29Jerry Seinfeld Hilariously Trolls Cops After they Shut Down his Son's Lemonade Stand - 08/28Texas Town Fires Police Dept., Hires Private Citizens For Security -- Guess What Happened to Crime? - 08/28Police Make Instructional Video on How to Be Nice While they Rob You - 08/28Feds Go Door-To-Door To Inform Gun Owners Rights Not Absolute - 08/26

Man Follows Speeding Cop, Finds Out He Was Speeding To Buy PeanutsMission Creeps: Homeland Security Agents Confiscate Women's Panties For 'Copyright Infringement'Cop Shoots Couple's Dog, Threatens Jail For Trying To Save Dog's LifeSWAT Team Shoots Teen Girl & Her Dog During Pot Raid On Wrong HomeDurham, NC Cop Testifies Faking 911 Calls To Enter Homes Is "Official Policy"Indiana Sheriff Says US A "War Zone" To Justify New MRAP Military VehicleTampa Cops Surveil Pot Dealer, Catch Him Selling Pot, Raid His Home & Kill Him"You Just Shot An Unarmed Man!": Witness Says Police Shot His Friend With His Hands Up
(more)

 
Top