NSA Prism If NSA has done such a great job in protect Americans from terrorist, why is it that NSA did not discover that the World Trade Center buildings wereMessage 1 of 1 , Jun 21View Source
If NSA has done such a great job in protect Americans from terrorist, why is it that NSA did not discover that the World Trade Center buildings were collapsed due to controlled demolition by explosives?
What NSA has been doing without a warrant is collecting all the phone numbers and email addresses (the ID of our computer) of all US persons for calls, faxes, email, to and from the US or within the US (these numbers or computer bits is called" maga-data") .
Once they have reasonable suspicion regarding a person, then NSA is required to get a FISA warrant before accessing this mega-data base. This access is for information about a SUSPECT. After NSA gets this warrant, then NSA can look back into the past phone numbers and email addresses (the ID of our computer) made to and from this suspect. Also NSA can start monitoring and recording the content of the suspect's electronic communications.
MORE open source information about NSA
Carnivore (aka DCS1000 // DCS is reported to stand for "Digital Collection System")
NSA monitoring without a warrant:
Whenever a US citizen makes a phone call overseas, no warrant is required in order for the NSA to legally listen to and tape record a phone call, fax, or email. Now it is alleged that NSA computers scan all phone calls and emails made to a foreign nation for KEY WORDS (via DCS1000) and preserve within an NSA computer(s) memory the content of the calls or emails so a NSA analyst can listening to these flagged KEY WORD hits.
NSA destroys any communications where in a KEY WORD hit if flagged by their computer that involves an American citizen during communication to and from another nation. NSA also minimized the identity of the US Citizen when a KEY WORD POINTS to a foreign suspect of terrorism or of a national security interest.
NSA has a two person rule, so that no one NSA employee can access the computer memory and the maga-data base.
is a term associated with a global network of computers that automatically search through millions of intercepted messages for pre-programmed keywords or fax, telex and e-mail addresses. Every word of every message in the radio /TV frequencies selected at a station is automatically searched. The processors in the network are known as the ECHELON Dictionaries. ECHELON connects all these computers and allows the individual stations to function as distributed elements an integrated system. An ECHELON station's Dictionary contains not only its parent agency's chosen keywords, but also lists for each of the other four agencies in the UKUSA system [NSA, GCHQ, DSD, GCSB and CSE]
United States intelligence officials have developed two programs which many experts believe may be used to enhance ECHELON's capabilities. One of these programs, Oasis, automatically creates machine-readable transcripts from television and audio broadcasts. Reports indicate that Oasis can also distinguish individual speakers and detect personal characteristics (such as gender) then denote these characteristics in the transcripts it creates. The other program, FLUENT, allows English-language keyword searches of non-English materials. This data mining tool not only finds pertinent documents, but also translates them, although the number of languages that can currently be translated is apparently limited (Russian, Chinese, Portuguese, Serbo-Croatian, Korean and Ukrainian). In addition, FLUENT displays the frequency with which a given word is used in a document and can handle alternate search term spellings.
The Communications Assistance for Law Enforcement Act (CALEA) generally requires telecommunications carriers both to modify their existing networks and to design and deploy new generations of equipment (including software), all to ensure that carriers can meet certain specified "capability" and "capacity" requirements related to the ability of authorized government agencies to engage in wiretapping.
NSA Gave Up Names of Americans Wiretapped to John Bolton
Obama and Nixon: A Historical Perspective - May 20, 2013 by Robert F. Kennedy Jr.
GOP Crazies Compare Obama To Nixon
US Signals Intelligence/ Code breaking and code making: 1916 to 1947
parts one to three