Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Vendome

Not a big issue, if you have them handy and it doesn’t require a lot of effort on your part, no prob. Otherwise I will do some digging on my own and ping you back if I find items that look like they match to see if they ring any bells.

Your vanity post was the first thing I thought of when I heard the guy making such a broad brush adamant statement that Snowden was somehow a traitor for unveiling something a lot of us knew was going on well before (ala carnivore et al.).


44 posted on 06/25/2013 10:10:03 PM PDT by jurroppi1
[ Post Reply | Private Reply | To 43 | View Replies ]


To: jurroppi1

It’s not a real problem but, I’m in the middle of closing out my month, getting orders straight and occasionally entertaining myself on FR.


45 posted on 06/25/2013 10:56:27 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies ]

To: jurroppi1

Here are links to FISA and their reasonable cause arguments

https://www.google.com/search?q=%22Reasonable+Cause%22+fisa&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a&channel=fflb


46 posted on 06/25/2013 10:59:18 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies ]

To: jurroppi1

https://www.eff.org/nsa-spying/faq

Excellent resource. Note the number of different technologies, databases used, etc.

This is how I know Snowden is full of Chit and cannot just type in a few commands to get access to this.


47 posted on 06/25/2013 11:05:00 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies ]

To: jurroppi1

https://www.google.com/search?q=Whole+pipe+access+trawls+every+device+transmitting&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a&channel=fflb#client=firefox-a&hs=ffP&rls=org.mozilla:en-US%3Aofficial&channel=fflb&sclient=psy-ab&q=Whole+pipe+access+trawls+nsa&oq=Whole+pipe+access+trawls+nsa&gs_l=serp.3...12458.12657.0.12704.3.3.0.0.0.0.195.305.0j2.2.0...0.0...1c.1.18.psy-ab.AL4rUwST95E&pbx=1&bav=on.2,or.r_qf.&bvm=bv.48340889,d.cGE&fp=aa240c7ce24752ec&biw=1920&bih=952


48 posted on 06/25/2013 11:05:57 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies ]

To: jurroppi1

Symopsis of 1934 Communications Act:
http://itlaw.wikia.com/wiki/Communications_Act_of_1934

The act itself:
http://www.fas.org/sgp/crs/misc/R41733.pdf

Article revealing what the 1934 Communications act made possible:
http://epic.org/privacy/wiretap/98-326.pdf

Pay attention to Olmstead.


49 posted on 06/25/2013 11:16:14 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies ]

To: jurroppi1

NPR
http://www.npr.org/templates/story/story.php?storyId=5061834

Good graphic
http://www.whocalledmyphone.net/wire-tapping/

Here is one document I relied on for my research:
http://en.convdocs.org/download/docs-57665/57665.doc

You will need to enter a captcha to download but, it is very, very good and there are excellent footnotes there.


50 posted on 06/25/2013 11:24:09 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies ]

To: jurroppi1

NPR
just perused the rest of my erstwhile article and much of it I adlibbed.

If you have a specific question let me know.

My article was nearly three times longer and I had to pare it down to what was at least relevant and could quickly make sense.

I’m looking for a few more links.


51 posted on 06/25/2013 11:26:20 PM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies ]

To: jurroppi1

NSA Killed System That Sifted Phone Data Legally
http://www.commondreams.org/headlines06/0518-07.htm

The Whistle Blower Who Expossed Warrantless Wiretaps
http://web.archive.org/web/20081215105850/http://www.newsweek.com/id/174601

EFF articles on listening to your private communications
https://www.eff.org/search/site/listen

EFF on Backdoor surveillance
https://www.eff.org/search/site/listen?f[0]=field_issue%3A540

The Government Wants A Backdoor Into Your Online Communications
https://www.eff.org/deeplinks/2013/05/caleatwo
Local Cops Following Big Brother’s Lead, Getting Cell Phone Location Data Without a Warrant
https://www.eff.org/deeplinks/2012/04/local-cops-following-big-brothers-lead-getting-cell-phone-location-data-without

Another Court Says “National Security” Isn’t Blank Check for Illegal Spying
https://www.eff.org/deeplinks/2006/10/another-court-says-national-security-isnt-blank-check-illegal-spying

A Government-Mandated Backdoor for Every Network
https://www.eff.org/deeplinks/2004/10/government-mandated-backdoor-every-network

Taking the “Long View” on the Fourth Amendment
Stored Records and the Sanctity of the Home
http://stlr.stanford.edu/2008/02/taking-the-long-view-on-the-fourth-amendment/

Excellent, Excellent discussion about privacy rights as relates to an intangible such as electronic communications.

There is a synopsis at the link and at the bottom the full article:
http://stlr.stanford.edu/2008/01/the-olmsteadian-seizure-clause/

Some more stuff I posted that is related:
http://www.freerepublic.com/focus/news/3032709/posts?page=9#9

Does Big Data Make it legal?
http://www.huffingtonpost.com/mary-shannon-little/does-big-data-make-it-legal_b_3431381.html

Boundless Informant: The NSA’s Secret Tool To Track Global Surveillance Data
http://www.huffingtonpost.com/2013/06/08/boundless-informant-the-n_n_3409841.html

Boundless Informant
http://www.huffingtonpost.com/news/boundless-informant

Awesome sight with more information than you can shake a stick at
Boundless Informant-Augmented State Surveillance
http://thesocietypages.org/cyborgology/2013/06/14/boundless-informant-augmented-state-surveillance/

Washington Post
Stellar Wind/U.S. surveillance architecture includes collection of revealing Internet, phone metadata
http://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_print.html

Talk Left’s discussion of Prism and Stellar Wind
http://www.talkleft.com/story/2013/6/7/42840/79770/civilliberties/PRISM-and-Stellar-Wind-Programs

Green Star and early ATT project and very clever. Also, they were lucky to get away with it and they say so at the end of the article
http://cryptome.org/2013/01/att-greenstar-spy.htm

CNET
http://www.freerepublic.com/focus/f-news/3031810/posts

Surveillance Monitor
http://w2.eff.org/Privacy/Surveillance/surveillancemonitor.html

A ton of links here:
http://cryptome.org/0001/ms-spy-takedown.htm

JOINT REPLY COMMENTS OF THE UNITED STATES DEPARTMENT
OF JUSTICE, FEDERAL BUREAU OF INVESTIGATION AND DRUG ENFORCEMENT ADMINISTRATION
http://askcalea.fbi.gov/pet/docs/20040427_jper_reply.pdf

FBI Target Netphoning-CNET
http://news.cnet.com/2100-1028-5056424.html

The War on Terrorism: FBI Wants Expanded Wiretapping Authority -
http://technology.findlaw.com/modern-law-practice/the-war-on-terrorism-fbi-wants-expanded-wiretapping-authority.html#_edn23

Circuit Switching vs Packet Switching
http://voip.about.com/od/voipbasics/a/switchingtypes.htm

SISMI-Telecom scandal
http://en.wikipedia.org/wiki/SISMI-Telecom_scandal

Forced-access regulation
http://en.wikipedia.org/wiki/Forced-access_regulation

There’s a bunch more but, I have to get back to work.

Feel free to ping me if you need anything else.

I got more stuff in my head that just comes up when a cue calls it.


52 posted on 06/26/2013 12:03:39 AM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 44 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson