General Discussion
In reply to the discussion: More crackpot thinking from Glenn Greenwald [View all]leveymg
(36,418 posts)So is the data processing involved. The sort of initial parsing and categorization that NSA does with that data is not dissimilar to Google's protocols and algorithms.
Analysis of this semi-finished data set is a separate set of technologies than collection, categorization and indexing. The indexed relational NSA database is in turn run through more specialized software developed by other alphabet agencies to carry out things like profiling, predictive analysis, social network analysis. NSA still does the bulk of the cryptology, but the FBI, CIA, DIA, etc. do their own focused sorts of analyses, a lot of which overlaps, and this intelligence is in turn disseminated to intelligence users according to clearance levels and compartmentalized programs.
Domestic collection of phone, email, text is done through splitters that link into the data network hubs operated by ATT, the other telcos (and has been since the 1994 CALEA Act - if you don't know the law I'm referring to here, you need to study up); VOIP and web traffic is collected through similar mandatory data splitters that connect into the main ISPs; NSA also accesses all data in the domain registries, and private data networks interception is carried out mainly by signals interception -- cable taps, satellite intercepts, microwave, old fashioned over-the-air transmissions -- and related technical means of collection conducted by the NSA and the military.
Storage of all this "take" is the simplest task of all - it's just adding more stacks on racks, in the same way you or I might add additional memory by buying another external hard-drive and plugging it in to your processor.
You are the crackpot here, and an ignorant one.