Posted on 06/06/2013 5:53:04 PM PDT by kristinn
The National Security Agency's monitoring of Americans includes customer records from the three major phone networks as well as emails and Web searches, and the agency also has cataloged credit-card transactions, said people familiar with the agency's activities.
The disclosure this week of an order by a secret U.S. court for Verizon Communications Inc.'s phone records set off the latest public discussion of the program. But people familiar with the NSA's operations said the initiative also encompasses phone-call data from AT&T Inc. and Sprint Nextel Corp., records from Internet-service providers and purchase information from credit-card providers.
The agency is using its secret access to the communications of millions of Americans to target possible terrorists, said people familiar with the effort.
The NSA's efforts have become institutionalizedyet not so well known to the publicunder laws passed in the wake of the Sept. 11, 2001, attacks. Most members of Congress defended them Thursday as a way to root out terrorism, but civil-liberties groups decried the program.
"Everyone should just calm down and understand this isn't anything that is brand new,'' said Senate Majority Leader Harry Reid (D., Nev.), who added that the phone-data program has "worked to prevent'' terrorist attacks.
Senate Intelligence Chairman Dianne Feinstein (D., Calif.) said the program is lawful and that it must be renewed by Congress every three months. She said the revelation about Verizon, reported by the London-based newspaper the Guardian, seemed to coincide with its latest renewal.
Civil-liberties advocates slammed the NSA's actions. "The most recent surveillance program is breathtaking. It shows absolutely no effort to narrow or tailor the surveillance of citizens," said Jonathan Turley, a constitutional law expert at George Washington University.
The arrangement with the country's three largest phone companies means that every time the majority of Americans makes a call, NSA
(Excerpt) Read more at online.wsj.com ...
People are forgetting that this government has identified Tea Partiers, gun control advocates and other conservatives as “terrorists”. When we read that the phone spying efforts were aimed at rooting out terrorists and their networks, I do not think that the government thinks that “terrorist” means what we think it means. I think that they wanted to monitor US calling patterns to identify conservatives and their allies.
A short history of Echelon, the grandparent of Prism:
http://echelononline.free.fr/documents/dc/inside_echelon.htm
The worlds most secret electronic surveillance system has its main origin in the conflicts of the Second World War. In a deeper sense, it results from the invention of radio and the fundamental nature of telecommunications. The creation of radio permitted governments and other communicators to pass messages to receivers over transcontinental distances. But there was a penalty - anyone else could listen in. Previously, written messages were physically secure (unless the courier carrying them was ambushed, or a spy compromised communications). The invention of radio thus created a new importance for cryptography, the art and science of making secret codes. It also led to the business of signals intelligence, now an industrial scale activity.
Although the largest surveillance network is run by the US NSA, it is far from alone. Russia, China, France and other nations operate worldwide networks. Dozens of advanced nations use sigint as a key source of intelligence. Even smaller European nations such as Denmark, the Netherlands or Switzerland have recently constructed small, Echelon-like stations to obtain and process intelligence by eavesdropping on civil satellite communications.
During the 20th century, governments realised the importance of effective secret codes. But they were often far from successful. During the Second World War, huge allied codebreaking establishments in Britain and America analysed and read hundreds of thousands of German and Japanese signals. What they did and how they did it remained a cloely-guarded secret for decades afterwards. In the intervening period, the US and British sigint agencies, NSA and Government Communications Headquarters (GCHQ) constructed their worldwide listening network.
The system was established under a secret 1947 UKUSA Agreement, which brought together the British and American systems, personnel and stations. To this was soon joined the networks of three British commonwealth countries, Canada, Australia and New Zealand. Later, other countries including Norway, Denmark, Germany and Turkey signed secret sigint agreements with the United States and became third parties participants in the UKUSA network.
Besides integrating their stations, each country appoints senior officials to work as liaison staff at the others headquarters. The United States operates a Special US Liaison Office (SUSLO) in London and Cheltenham, while a SUKLO official from GCHQ has his own suite of offices inside NSA headquarters at Fort Meade, between Washington and Baltimore.
Under the UKUSA agreement, the five main English-speaking countries took responsibility for overseeing surveillance in different parts of the globe . Britains zone included Africa and Europe, east to the Ural Mountains of the former USSR; Canada covered northern latitudes and polar regions; Australia covered Oceania. The agreement prescribed common procedures, targets, equipment and methods that the sigint agencies would use.
Among them were international regulations for sigint security , which required that before anyone was admitted to knowledge of the arrangements for obtaining and handling sigint, they must first undertake a lifelong commitment to secrecy.
Every individual joining a UKUSA sigint organisation must be indoctrinated and, often re-indoctrinated each time they are admitted to knowledge of a specific project. They are told only what they need to know, and that the need for total secrecy about their work never ceases.
“Now, was Maxine right in warning that come 2016, obama isnt planning on leaving office?”
Is that what she said? I remember Newt (after Romney had already won the nomination) saying that forget about 2012, we should worry if there will even be an election in ‘16, or something similar to that. Meaning pretty much what Crazy Max said.
About that Tree of L1berty needing watering thing.
Did the feds also obtain everybody’s passwords for access to various online accounts?
Ah They can tell you who accessed it....never thought about asking. Then Can they also block the people from using it again? I don’t have time to weed through tons of spam.
There was an alert on the top right side of the screen when I logged in.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.