Skip to comments.
New Details Show Broader NSA Surveillance Reach
The Wall Street Journal ^
| August 20, 2013
| SIOBHAN GORMAN and JENNIFER VALENTINO-DEVRIES
Posted on 08/20/2013 5:51:05 PM PDT by John W
WASHINGTONThe National Security Agencywhich possesses only limited legal authority to spy on U.S. citizenshas built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say.
The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.
Details of these surveillance programs were gathered from interviews with current and former intelligence and government officials and people from companies that help build or operate the systems, or provide data. Most have direct knowledge of the work.
(Excerpt) Read more at online.wsj.com ...
TOPICS: Breaking News; News/Current Events
KEYWORDS: benghazi; fastandfurious; impeachnow; irs; nsa; nsascandal; nsaspying; spyingonamericans; surveillancestate; treason; warrantlesssearches
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60 next last
To: John W
America is now under a dictator King Obama. And we have nothing to stop this destruct of America. Even the Republicans are totally ineffective and worthless.
To: dayglored
Perfect! Thanks, and you are in the list!
22
posted on
08/20/2013 7:11:49 PM PDT
by
null and void
(Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
To: Logical me
You’re quite defeated aren’t you?
23
posted on
08/20/2013 7:16:12 PM PDT
by
HollyB
To: originalbuckeye
> This is the most corrupt and lawless Admin in the history of our once great country. And NO ONE will do anything about it!
Revelation 13:4
And they worshipped the dragon which gave power unto the beast: and they worshipped the beast, saying, Who is like unto the beast? who is able to make war with him?
To: John W
We know that the enemy has worked hard not to use electronic communications, relying instead on mules to carry information.
Now that this is public, why collect data that isn’t related to terrorism since the terrorists are not using electronic communications?
Furthermore, IIRC they only need 4 metadata points (or is it 5) to identify you specifically and individually. Could this information be abused? Take a look at history, recent history specifically and see that government lies, obfuscates and is by its very nature political.
25
posted on
08/20/2013 7:37:59 PM PDT
by
1010RD
(First, Do No Harm)
To: John W
26
posted on
08/20/2013 7:38:00 PM PDT
by
Timber Rattler
(Just say NO! to RINOS and the GOP-E)
To: null and void
Nully could you add me to your NJC Ping list..?
Thanks..!
27
posted on
08/20/2013 7:43:09 PM PDT
by
gaijin
To: originalbuckeye
"This is the most corrupt and lawless Admin in the history of our once great country. And NO ONE will do anything about it!"
The extra surveillance has been going on for over 30 years--a little at first and incrementally more since then. Favored constituents behind Nixon were pushing for that along with most favored nation trade status for China and increased trade with Muslim nations in the Middle East. It's not so much one political party but a class of constituents controlling both parties and wanting protection from the common rabble. That's also what happened to marriage, family, kids, constitutional rights, business, religion, academia, the courts, politics and national loyalty.
28
posted on
08/20/2013 7:43:49 PM PDT
by
familyop
(We Baby Boomers are croaking in an avalanche of rotten politics smelled around the planet.)
To: gaijin
The digitized voice conversations are stored long enough for the software to convert it to text. It is the text that is stored. And reading text is not listening to phone conversation. Read the law. It only applies to the listening of phone conversation. They are deceiving us through the use of new voice recognition technology.
This is my own opinion, of course. However, with voice recognition technology, I am certain that is how they are getting around the law.
29
posted on
08/20/2013 7:45:02 PM PDT
by
jonrick46
(The opium of Communists: other people's money.)
To: 1010RD
"Now that this is public, why collect data that isnt related to terrorism since the terrorists are not using electronic communications?"
After some decisions during the early 1970s to change government, business, academic and family policies (and laws), presentations were made in the late 1970s to inform government officials that wars in the future (from the '70s) would be fought against rioting American citizens. Enemies of the future were depicted as young laborers wearing jeans, red bandannas over their faces, T-shirts, running shoes, etc. The presentations stated that wars with foreign nations would no longer happen.
30
posted on
08/20/2013 7:51:32 PM PDT
by
familyop
(We Baby Boomers are croaking in an avalanche of rotten politics smelled around the planet.)
To: DManA
Your attitude in this context could be deemed a “belligerent act”. (See belligerentact.org.)
HF
31
posted on
08/20/2013 8:08:51 PM PDT
by
holden
(Alter or abolish it yet?)
To: John W
The NSA “scandals” are a distraction. NSA had authorization to do many of the things we are upset about.
The bigger more important issues are the fact that US government agencies were used to influence the outcome of elections. Presidential elections.
And where did the data in Obama’s Civitas database come from? IRS, Census, HHS, Homeland Security, NSA?
32
posted on
08/20/2013 8:09:35 PM PDT
by
DBrow
To: John W; All
Was then Secretary of the Treasury Timmy Geithner the original author of the IRS harassment policy towards the TEA Party?
33
posted on
08/20/2013 8:33:14 PM PDT
by
Graewoulf
(Traitor John Roberts' Commune-Style Obama'care' violates U.S. Constitution AND Anti-Trust Law.)
To: originalbuckeye
It’s not just this administration. It’s this government. And it started with old man Bush.
34
posted on
08/20/2013 8:42:06 PM PDT
by
VerySadAmerican
(When you vote for evil because you can't see evil, you ARE evil.)
To: VerySadAmerican
Long before Bush my FRiend.
35
posted on
08/20/2013 8:44:39 PM PDT
by
eyedigress
((zOld storm chaser from the west)/ ?s)
To: John W
what did Bronco Bama know and when did he know he knew it?
This Message Not Approved by the NSA
36
posted on
08/20/2013 8:46:01 PM PDT
by
MeshugeMikey
(Block Captain..Tyranny Response Team)
To: eyedigress
37
posted on
08/20/2013 8:50:53 PM PDT
by
Liberty Valance
(Keep a simple manner for a happy life :o)
To: Liberty Valance
38
posted on
08/20/2013 9:04:13 PM PDT
by
eyedigress
((zOld storm chaser from the west)/ ?s)
To: Liberty Valance
The details of the what are under the Reagan admin. Clinton played no different. The escalation in the 1990’s is quick.
39
posted on
08/20/2013 9:09:19 PM PDT
by
eyedigress
((zOld storm chaser from the west)/ ?s)
To: gaijin
Absolutely! As soon as you follow the rule.
40
posted on
08/20/2013 9:58:28 PM PDT
by
null and void
(Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson