PDA

View Full Version : NSA collects millions of text messages



bogeyman
17th January 2014, 00:11
"NSA extracts location, contacts and financial transactions. 'Dishfire' program sweeps up 'pretty much everything it can'. GCHQ using database to search metadata from UK numbers."

http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep

The documents:

http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents

ghostrider
17th January 2014, 02:36
I use it to my advantage , I give them ancient history everyday ...today's was , 131,000 years ago Atlant came to earth from time shifted Beta-Centauri and established greater Atlantis and lesser Atlantis and Lemuria ... Refugees from the plejares led by Armus settled in modern day Armenia , also refugees from Sirius settle in other locations on earth ...

korgh
17th January 2014, 09:17
We are living in a world like George Orwell's novel 1984 predicted.... and is getting worst.
There is a timeline of NSA domestic spying were you can see what's going on: Timeline of NSA Domestic Spying (https://www.eff.org/nsa-spying/timeline) by EFF

This is interesting too: (from Electrospaces / http://electrospaces.blogspot.pt/)

On November 23, the Dutch newspaper NRC Handelsblad published a new slide from the Snowden documents. The slide is from a Top Secret NSA management presentation from 2012 and shows the agency's worldwide information collection capabilities.

As the slide is titled "Driver 1: Worldwide SIGINT/Defense Cryptologic Platform" there must be more slides with "Drivers", but unfortunately these were not published.

This article will take a close look at the map and tries to provide an explanation of the various interception locations of what is NSA's new ECHELON network for the internet age:

http://i44.tinypic.com/2zgi744.jpg

The slide shows five types of data collection, called "Classes of Accesses". These correspond to the organizational channels through which NSA gathers it's intelligence:

- 3rd PARTY/LIAISON - Intelligence sharing with foreign agencies
- REGIONAL - SCS units, a joint venture between NSA and CIA
- CNE - NSA's Tailored Access Operations (TAO) division
- LARGE CABLE - NSA's Special Source Operations (SSO) division
- FORNSAT - NSA's Global Access Operations (GAO) division


Besides the collection capabilities shown in this map, NSA also collects data through spy planes and satellites (called Overhead Collection) and a range of tactical collection systems used to support military operations.


Cheers

sigma6
17th January 2014, 10:11
Techno insanity.... George could never have conceived the kind of computational power that exists today. Isaac Asimov overshot it, but pretty accurate in many ways... I think people are both underestimating how potentially violating it is to have everything digitized and networked, and over-estimating their ability to manipulate and integrate this information because of really bad movies and such (MEDIA).

I think they are storing it for the future much like cryogenics believers were freezing bodies' on the 'speculation' (an far left field imo) that someday the technology will exist to work on their bodies ... the storing of millions, more likely trillions, of bits of data would be a nightmare for any data mining engineer... for now I see them doing more backing up, then anything else. And that strategy could end up, like the Cryogenic idea, being just a stalemate at best or a huge, huge waste of time and money and resources, on top of being morally dangerous and socially unacceptable in the worst case . Makes me wonder.

When I saw that movie Eagle eye. It was unbelievably overblown. Ironically some of the bigger issues are more 'human' issues. Like who could read all that? The amount of data stored couldn't physically possibly all be read in the first place, by any one group or organization today. But it could be referenced as database eventually. A paper trail generator... automatically extracting and piling up all the garbage on, not EVERY man and Woman, but ANY man or woman they might choose to PIN POINT and ATTACK... for whatever reason... But for now, Eagle Eye is not even close. Geez, you can barely get Windows applications to run on Windows ... LOL

None-the-less, the juggernaut of investment and infrastructure buildout will never end I don't doubt. Unforeseen times ahead.

toad
17th January 2014, 19:09
Your local police is also dumping information from cell towers, and making it routine for them to use specific spoofing hardware to mimic a celltower, to make extracting and siphoning off data that much easier. :(

“We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” said Christopher Soghoian, principal technologist for the American Civil Liberties Union. “Judges are having to make up these powers as they go along.”

Add that with privatized and civilian drone use, we're heading towards a wild future.

bogeyman
17th January 2014, 21:24
I filed quite a few FOIA requests to the NSA and each request they came up with nothing, yet they collect vast amount of data, the mind boggles.

Milneman
18th January 2014, 21:47
If this is what they're doing, as reported, you can assume they've already found another way to do what they're doing that you don't know about.