Posted on 03/09/2017 6:32:56 AM PST by blutobob
RE: The FBI investigated a Trump server in its Russia probe, but no charges are expected
This raises a whole lot of questions:
1) Was the proper paperwork filed?
2) Was there probable cause?
3) Who gave the order and why?
4) Was the intent to target Trump, or to target Russia?
Not an arrest warrant, but warrant, as in its not necessary or there is no reason to take it to that level.
+100.
You're first I've seen make this excellent connection.
Apparently they didn't even know where they were until after they were wiped.
The question of the month/year:
How on earth does Comey manage to keep his job????
The dirty answer:
He has the dirt on most of the players! Hes been watching them via their TVs, smart phones and other devices, for a long time now.
Also, he knows what type of porn and how much porn the GOPe
has watched for years. If they watched that porn on government computers/tablets and smart phones.
He knows what crimes they have committed. Crimes if committed by us result in a long and expensive trial and long jail sentences.
Thanks.
If they knew where her servers were, they would not go there.
“Was this information gathered by Five Eyes and then handed-off to the FBI?”
You just signalled that you are probably an old geezer like me. Five eyes and Echelon have been retired.
Meet Muscular, one of the replacements for Echelon/5 eyes:
MUSCULAR (surveillance program)
From Wikipedia, the free encyclopedia
MUSCULAR (DS-200B), located in the United Kingdom,[1] is the name of a surveillance programme jointly operated by Britain’s Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA) that was revealed by documents which were released by Edward Snowden and interviews with knowledgeable officials.[2]
GCHQ is the primary operator of the program.[1]GCHQ and the National Security Agency have secretly broken into the main communications links that connect the data centers of Yahoo! and Google.[3]Substantive information about the program was made public at the end of October 2013.
1 Overview
2 Operational details
3 Reactions and countermeasures
4 Gallery
5 See also
6 References
7 External links
Overview:
The programme is jointly run by:
Government Communications Headquarters (GCHQ) (United Kingdom)
U.S. National Security Agency (NSA)
MUSCULAR is one of at least four other similar programs that rely on a trusted 2nd party, programs which together are known as WINDSTOP.
In a 30-day period from December 2012 to January 2013, MUSCULAR was responsible for collecting 181 million records. It was however dwarfed by another WINDSTOP program known (insofar) only by its code DS-300 and codename INCENSER, which collected over 14 billion records in the same period.[4]
Operational details:
According to the leaked document the NSAs acquisitions directorate sends millions of records every day from internal Yahoo! and Google networks to data warehouses at the agencys headquarters at Fort Meade, Maryland. The programme operates via an access point known as DS-200B, which is outside the United States, and it relies on an unnamed telecommunications operator to provide secret access for the NSA and the GCHQ.[3]
According to the Washington Post, the MUSCULAR program collects more than twice as many data points (selectors in NSA jargon) compared to the better known PRISM.[2] Unlike PRISM, the MUSCULAR program requires no (FISA or other type of) warrants.
Because of the huge amount of data involved, MUSCULAR has presented a special challenge to NSA’s Special Source Operations. For example, when Yahoo! decided to migrate a large amount of mailboxes between its data centers, the NSA’s PINWALE database (their primary analytical database for the Internet) was quickly overwhelmed with the data coming from MUSCULAR.[5]
Closely related programmes are called INCENSER and TURMOIL. TURMOIL, belonging to the NSA, is a system for processing the data collected from MUSCULAR.[1]
According to a post-it style note from the presentation, the exploitation relied on the fact that (at the time at least) data was transmitted unencrypted inside Google’s private cloud, with “Google Front End Servers” stripping and respectively adding back SSL from/to external connections. According to the Washington Post: “Two engineers with close ties to Google exploded in profanity when they saw the drawing.” After the information about MUSCULAR was published by the press, Google announced that it was working on deploying encrypted communication between its datacenters.[2]
https://en.wikipedia.org/wiki/MUSCULAR_(surveillance_program)
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.