Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

THE TRUTH ABOUT NSA SPYING: They Still Have Your Internet Data And Tech Giants Know It
Business Insider ^ | 6-7-2013 | Michael Kelley

Posted on 06/07/2013 6:24:53 AM PDT by blam

THE TRUTH ABOUT NSA SPYING: They Still Have Your Internet Data And Tech Giants Know It

Michael Kelley
Jun. 7, 2013, 9:00 AM

The Washington Post has backtracked on its claim that nine major tech firms 'participate knowingly' in the National Security Agency's domestic surveillance program, Jon Russell of The Next Web reports.

But that doesn't mean that the dragnet snooping didn't happen, or that the tech heavyweights didn't know about it.

On Thursday The Post and The Guardian reported on leaked NSA powerpoint slides that detail an eavesdropping program — dubbed PRISM — based on "legally-compelled collection" of extracting reams of data from Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL and Apple with the "assistance of communications providers in the US."

The Post article now suggests the firms were unaware of PRISM after Apple, Facebook, Microsoft and Google denied involvement, and Director of National Intelligence James Clapper declassified information about the program to address "inaccuracies."

From Russell:

... the paper’s new stance is a huge admission. For one thing, it adds to the growing claim that the agency instead accessed the information indirectly. In such a case, the most likely method would be via ISPs or mobile operators, but that remains unconfirmed.

Actually, according to investigative reporting and whistleblower testimony, it's pretty clear that the NSA has bugged every major ISP and mobile provider.

(Excerpt) Read more at businessinsider.com ...


TOPICS: Extended News; News/Current Events
KEYWORDS: fbi; nsa; obama; prism; spying; threatmatrix
Navigation: use the links below to view more comments.
first previous 1-2021-40 last
To: blam; Black Agnes; seeker41; edcoil; Hardraade; rarestia; darkwing104; hoosiermama; ...

http://en.wikipedia.org/wiki/ECHELON

http://en.wikipedia.org/wiki/Room_641A


21 posted on 06/07/2013 7:08:48 AM PDT by PieterCasparzen (We have to fix things ourselves)
[ Post Reply | Private Reply | To 1 | View Replies]

To: KeyLargo

Now the question is did Axelrod have access to this data on which he built that “super election system” he bragged about and the DNC woman marveled over?

It would make sense for the dems to get a leg up by using their own computer geeks to mine the information if they could get their hands on the raw data.

Just wondering


22 posted on 06/07/2013 7:10:30 AM PDT by glm
[ Post Reply | Private Reply | To 20 | View Replies]

To: blam
 photo CENSORED_zps871c35d8.gif Coming to a blog near you...
23 posted on 06/07/2013 7:13:56 AM PDT by baddog 219
[ Post Reply | Private Reply | To 1 | View Replies]

To: blam
Through all of this whole data collection/spying talk.
I keep hearing that they can't read the main body of your comments or listen to your conversations unless they get a warrant.
Well the fact is, yes they can.
The law states that they can not use it in a court of law without a warrant. At least for now.
One government agency has already passed personal info to there accomplices.
24 posted on 06/07/2013 7:16:45 AM PDT by Falcon4.0
[ Post Reply | Private Reply | To 1 | View Replies]

To: glm

—— Now the question is did Axelrod have access to this data on which he built that “super election system” he bragged about and the DNC woman marveled over? ——

Assume so unless proven otherwise.

In the congressional hearing yesterday, Holder wouldn’t answer a question regarding evesdropping on members of congress.

I will also believe that this accounts for Roberts’ reversal on Commiecare.


25 posted on 06/07/2013 7:16:54 AM PDT by St_Thomas_Aquinas
[ Post Reply | Private Reply | To 22 | View Replies]

Comment #26 Removed by Moderator

To: glm

Good question ! Send it to Breitbart, maybe one of their investigators can find the answer!


27 posted on 06/07/2013 7:17:25 AM PDT by hoosiermama (Obama: "Born in Kenya" Lying now or then!)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Black Agnes

Two things.

A source who knew Phil Zimmerman very well claimed to have been in the room with Phil when he was leaned on by the feds and threatened. That guy is dead now, and incidentally, I was the last person who talked to him - he wanted the location of the author of s-tools. That was in the evening. He was dead in the morning. Harold Highland.

B. To keep a reliable PGP, use either the 2.62I with keys crowdverified or the gpg. The verisign shit is worthless.


28 posted on 06/07/2013 7:17:38 AM PDT by Hardraade (http://junipersec.wordpress.com (Obama equals Osama))
[ Post Reply | Private Reply | To 8 | View Replies]

To: seeker41

I had a creepier exchange with Verizon back in the very early ‘00’s. I didn’t have a computer or a modem at home. Home was for relaxation. I read books and did crafting and cooking. Relaxing stuff.

Had a visitor from back home for 3 or 4 days who brought their laptop with modem. Used that for the duration of their visit to check their email and what not.

About 2 days after they’d left I got a phone call from Verizon customer service wanting to know if I was interested in their data plan to use with my new computer.

...!...

creepy.


29 posted on 06/07/2013 7:21:21 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 26 | View Replies]

To: NoKoolAidforMe

-— God help us. Only He can. ——

I can see from your tagline that you know the other component of a good earthly backup program —a gun.

The Communist Who Shall Not Be Named must really be steamed about the failure of his confiscation effort.

But he’ll be back.


30 posted on 06/07/2013 7:22:17 AM PDT by St_Thomas_Aquinas
[ Post Reply | Private Reply | To 12 | View Replies]

To: blam

HEY government snoopers! Are you reading this? You are fascists, stalinists, and the KGB. Go to hell!


31 posted on 06/07/2013 7:23:09 AM PDT by I want the USA back (Pi$$ed off yet?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Timber Rattler

Not just FISA judges. Local magistrates -—SCOTUS have done some peculiar things in the last few years.
Blackmail? Payola? Chicago corruption ?


32 posted on 06/07/2013 7:23:29 AM PDT by hoosiermama (Obama: "Born in Kenya" Lying now or then!)
[ Post Reply | Private Reply | To 14 | View Replies]

To: blam

http://en.wikipedia.org/wiki/Comprehensive_National_Cybersecurity_Initiative

http://en.wikipedia.org/wiki/Utah_Data_Center

http://en.wikipedia.org/wiki/Stellar_Wind_%28code_name%29

http://en.wikipedia.org/wiki/Trailblazer_Project


33 posted on 06/07/2013 7:29:54 AM PDT by PieterCasparzen (We have to fix things ourselves)
[ Post Reply | Private Reply | To 1 | View Replies]

To: blam

People are forgetting that this government has identified Tea Partiers, gun control advocates and other conservatives as “terrorists”. When we read that the phone spying efforts were aimed at rooting out terrorists and their networks, I do not think that the government thinks that “terrorist” means what we think it means. I think that they wanted to monitor US calling patterns to identify conservatives and their allies.


34 posted on 06/07/2013 8:04:21 AM PDT by Piranha (We laugh at honor and are shocked to find traitors in our midst.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Black Agnes

I do not believe strong encryption is crackable.

The world’s best have tried and failed - the algorithms are pretty bulletproof.

I think what they have found is that the people they are interested in are too dumb to properly secure their communications.


35 posted on 06/07/2013 8:09:21 AM PDT by proxy_user
[ Post Reply | Private Reply | To 8 | View Replies]

To: proxy_user

They don’t use ‘front door’ cracking techniques. Trust me on this.

Usage of encryption undoubtedly flags you for closer inspection.


36 posted on 06/07/2013 8:14:49 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 35 | View Replies]

To: Black Agnes

The problem with your theory is that the best encryption code is open-source. In fact, I have the C code for BlwoFish on my computer. I have inspected it carefully, and there are no back doors.

Now if I were to compile this code into a library, and then write a chat client that uses that library, I would have an unbreakable means of communication. The only problem would be key distribution.


37 posted on 06/07/2013 8:40:58 AM PDT by proxy_user
[ Post Reply | Private Reply | To 36 | View Replies]

To: proxy_user

I wasn’t speaking of a code based back door.

There are plenty of mathematical ones.


38 posted on 06/07/2013 8:42:16 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 37 | View Replies]

To: proxy_user

Lol. AQ has done two special public key implementations.

The USDHS has backdoors to both.


39 posted on 06/07/2013 8:45:18 AM PDT by Hardraade (http://junipersec.wordpress.com (Obama equals Osama))
[ Post Reply | Private Reply | To 37 | View Replies]

To: BitWielder1

Is there someway we can make this collection effort backfire?


40 posted on 06/07/2013 8:50:06 AM PDT by mcshot (God bless the USA! THE GUN DEBATE WAS SETTLED IN 1791!!!)
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-40 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson