The NSA watches you poop.

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
Rating Obama??Ts NSA Reform Plan: EFF Scorecard Explained | Electronic Frontier Foundation
rrr_img_57703.jpg
 

Malakriss

Golden Baronet of the Realm
12,391
11,798

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
everything you mentioned is a wish list of some sort.

It's not a list of things pulled out of thin air. it's a list of things that have been compiled from experts commenting the the conversation about nsa surveilance, if you listen to people like william binney or thomas drake talk about what needs to change that's where they got that list.
 

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
In the latest indication of a growing libertarian wing of the GOP, the Republican National Committee passed a resolution Friday calling for an investigation into the "gross infringement" of Americans' rights by National Security Agency programs that were revealed by Edward Snowden.

The resolution also calls on on Republican members of Congress to enact amendments to the Section 215 program that currently allows the spy agency to collect records of almost every domestic telephone call. The amendment should make clear that "blanket surveillance of the Internet activity, phone records and correspondence - electronic, physical, and otherwise - of any person residing in the U.S. is prohibited by law and that violations can be reviewed in adversarial proceedings before a public court," the resolution reads.

Exclusive: Republican Party Calls For End To NSA Domestic Phone Records Program | TIME.com
 

Dyvim

Bronze Knight of the Realm
1,420
195
Wait i was always told its constitutional as long as they (and the potus) thinks its constitutional.
 

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
My best educated guess is that we will find that major companies and institutions like hospitals are given limited access to the nsa databases like prism, that it's not limited to the nsa and it's evolving into massive centralized economic power on top of "national security".
 

Malakriss

Golden Baronet of the Realm
12,391
11,798
If that was happening wouldn't Snowden have leaked it since he's all about protecting the people? Or is it one of those things youjust knowin the same way that Lumiejust knowseverything he rants about?
 

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
I think it's just starting to come out, i've seen/heard a lot of tidbits leading in this direction, I just felt like making a prediction really, time will tell.

Snowden Says no doubt NSA Engages in Industrial Spying - Businessweek

N.S.A. Spied on Allies, Aid Groups and Businesses - NYTimes.com

I think they spy for major companies on the foreign front and domestically they are gonna start linking together all the agencies so they can cross reference these gigantic databases.

every person in america eventually is going to have an electronic file that stores every bit of cross referenced data that comes through legal or snooping channels and britain as usual is the coalmine canary for all things orwellian

New giant database will store private details of EVERY person in 'Big Brother' Britain | Mail Online

It will sweep away data protection restrictions that require information to be used only for the purpose it was taken, such as limiting access to health records to the Department of Health.
Even low-ranking officials working for Town Halls could lay their hands on the most sensitive personal information, such as incomes and details of any benefits received.
it's gonna start with health records and obamacare most likely.

How Obamacare's 'privacy nightmare' database really works - Jul. 23, 2013

They'll just start increasing the things stored and their relations, your twitter and face book will be stored along with your IRS, health and phone records, so they could get that and be a couple clicks away from tracking you real time or just turn the mic and camera on depending on the level of access to your file, look at your cloud backups, whatever they feel like they can get away with. it's just gonna eventually merge into a gigantic federal file for everyone and whenever they get any info on you they'll just keep it on your file.

it might not be one singular database but a web of them however the effect would be the same, a couple clicks and there will be a file for everyone that covers your footprint of existence.
 

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
DOJ Says Company That Vetted Snowden Faked 665,000 Background Checks | Techdirt

Beginning in at least March 2008 and continuing through at least September 2012, USIS management devised and executed a scheme to deliberately circumvent contractually required quality reviews of completed background investigations in order to increase the company's revenues and profits. Specifically, USIS devised a practice referred to internally as "dumping" or "flushing," which involved releasing cases to OPM and representing them as complete when, in fact, not all ROIs comprising those cases had received a quality review as required by the Fieldwork Contracts.

USIS engaged in the practice of dumping in order to meet budgeted goals and, therefore, increase its revenues and profits. Given that USIS was paid by OPM for each completed case, the more cases USIS completed each month the more money it received from OPM. USIS's dumping practices also enabled the company to receive annual performance incentive payments that it would not otherwise have been entitled to receive absent the dumping
Oh, and it became so profitable, they set up a computer program to help them defraud the government and not complete background checks. No joke.
Initially, USIS would dump cases manually. Soon after the dumping started, however, USIS began using a software program called Blue Zone to assist in the dumping practices. Through Blue Zone, USIS was able to identify a large number of background investigations, quickly make an electronic "Review Complete" notation indicating that the ROIs at issue had gone through the review process even if they had not, and then automatically release all of those ROIs to OPM with the "Review Complete" notation attached. By using Blue Zone, USIS was able to substantially increase the number of background investigations that could be dumped in a short time period.
 

chaos

Buzzfeed Editor
17,324
4,839
I think it's just starting to come out, i've seen/heard a lot of tidbits leading in this direction, I just felt like making a prediction really, time will tell.
But it is specifically not starting to come out. Where at first everyone assumed companies like Google were working with the NSA we now know the NSA was tapping their internal data center communication, or other companies were being forced to hand over expired keys by FISA court order, or untold government agencies complaining specifically about not having access to this information and trying to get it, or whatever. There are very few stories of companies actually working with the NSA, like the RSA story.
 

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
there's direct cooperation, you can see it in the billing they send to the nsa for doing tapsMicrosoft folded earlyand we learned that if they don't comply they'll get the data anyways, basically you are pointing out and we are learning from the people talking because they were strong armed and didn't like it.

NSA paying U.S. companies for access to communications networks

at&t verizon and sprint are paid for nsa access

Confirmed: NSA Paid Google, Microsoft, Others Millions for PRISM Aid

it's not even just the nsa it's thegeneral government as well


The tech companies are lying when they say they "didn't know" or don't help like obama did at the start of the affair when heweakly tried to deny the existence of the worst aspects of the programfor the 1st week. The motive for lying seems prettystraight forward. They can't claim they aren't helping or "didn't know" when they are billing the nsa for access.
 

Whidon

Blackwing Lair Raider
1,880
2,906
People beat up Nixon for that among other things. But in practice it's pretty much close to the truth.
 

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show - NBC News

The division of GCHQ known as JTRIG responded to the surge in hacktivism. In another document taken from the NSA by Snowden and obtained by NBC News, a JTRIG official said the unit's mission included computer network attacks, disruption, "Active Covert Internet Operations," and "Covert Technical Operations." Among the methods listed in the document were jamming phones, computers and email accounts andmasquerading as an enemy in a "false flag" operation. The same document said GCHQ was increasing its emphasis on using cyber tools to attack adversaries.
 

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
Greenwalds new news venture

"The Intercept"

The NSA's Secret Role in the U.S. Assassination Program


According to a former drone operator for the military's Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target's identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.
~
What's more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.

"People get hung up that there's a targeted list of people," he says. "It's really like we're targeting a cell phone. We're not going after people - we're going after their phones, in the hopes that the person on the other end of that missile is the bad guy."
~
he former JSOC drone operator estimates that the overwhelming majority of high-value target operations he worked on in Afghanistan relied on signals intelligence, known as SIGINT, based on the NSA's phone-tracking technology.

"Everything they turned into a kinetic strike or a night raid was almost 90 percent that," he says. "You could tell, because you'd go back to the mission reports and it will say 'this mission was triggered by SIGINT,' which means it was triggered by a geolocation cell."
~
As the former drone operator explains, the process of tracking and ultimately killing a targeted person is known within the military as F3: Find, Fix, Finish. "Since there's almost zero HUMINT operations in Yemen - at least involving JSOC - every one of their strikes relies on signals and imagery for confirmation: signals being the cell phone lock, which is the 'find' and imagery being the 'unblinking eye' which is the 'fix.'" The "finish" is the strike itself.

"JSOC acknowledges that it would be completely helpless without the NSA conducting mass surveillance on an industrial level," the former drone operator says. "That is what creates those baseball cards you hear about," featuring potential targets for drone strikes or raids.

President Obama signs authorizations for "hits" that remain valid for 60 days. If a target cannot be located within that period, it must be reviewed and renewed. According to the former drone operator, it can take 18 months or longer to move from intelligence gathering to getting approval to actually carrying out a strike in Yemen. "What that tells me," he says, "is that commanders, once given the authorization needed to strike, are more likely to strike when they see an opportunity - even if there's a high chance of civilians being killed, too - because in their mind they might never get the chance to strike that target again."
 

fanaskin

Well known agitator
<Silver Donator>
55,858
137,961
apparently they play russian roulette with their sim cards, lucky draw gets the drone strike (and confuses us) heh
smile.png

Some top Taliban leaders, knowing of the NSA's targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. "They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave," the former drone operator says. "That's how they confuse us."