Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
In reply to the discussion: Revealed: the top secret rules that allow NSA to use US data without a warrant [View all]questionseverything
(11,850 posts)94. the nsa does the encryption
It gets run through the system, split into two parts, and stored until data-mining finds an "articulable suspicion", and another agency is alerted and seeks a FISA warrant. The content isn't looked at until a warrant is issued, we are told, but the content (acquired by the universal collection 2015 program) -- which must be minimized under 702 if not obtained with a proper FISA warrant -- is retained in a compartmentalized state. The content is isolated electronically (encrypted) from the metadata - that's how Bill Binney explained the process. The President also admits that's how the process works, here:
STEP 1: "2015" sweeps up the content and metadata into a database:
"You have my telephone number connecting with your telephone number. There are no names. There is no content in that database. All it is, is the number pairs, when those calls took place, how long they took place. So that database is sitting there," he said.
STEP 2: The NSA encrypts the content, stores the content, and profiling software start crawling through the metadata looking for links to foreign bad guys. NSA managers can deencrypt and put it back together again if the profiilng and datamining software shows there's an "articulable suspicion." FBI obtains a FISA warrant.
"Now, if the NSA through some other sources, maybe through the FBI, maybe through a tip that went to the CIA, maybe through the NYPD. Get a number that where there's a reasonable, articulable suspicion that this might involve foreign terrorist activity related to al-Qaeda and some other international terrorist actors.
Then, what the NSA can do is it can query that database to see did this number pop up? Did they make any other calls? And if they did, those calls will be spit out
STEP 3: NSA sends the reassembled data over to CIA or FBI:
A report will be produced. It will be turned over to the FBI. At no point is any content revealed because there's no content," Obama explained.
////////////////
i did not write the above post it is a copy from another du'er but it is the best explaination i have seen and he wrote the first paragraph and the rest are the presidents words in the charlie rose interview....notice step 2...STEP 2: The NSA encrypts the content, stores the content, and profiling software start crawling through the metadata looking for links to foreign bad guys.............................so i read that it is all encrypted
we have gone from probable cause to reasonable suspicion to articulable suspion
Edit history
Please sign in to view edit histories.
Recommendations
0 members have recommended this reply (displayed in chronological order):
186 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
RecommendedHighlight replies with 5 or more recommendations
Revealed: the top secret rules that allow NSA to use US data without a warrant [View all]
Catherina
Jun 2013
OP
That depends on your interpretation of 3(b)(4), 5(2) and 6(b)(8) of the document.
Pholus
Jun 2013
#145
Every attorney who gives a shit about his or her ethical obligations to clients should
HardTimes99
Jun 2013
#146
this is _it_ there is no escaping this now, this is willful misinterpretation of the intent
Monkie
Jun 2013
#12
And, I guess, some of the analysts work for Booz Allen which I hear is owned by the Carlyle
byeya
Jun 2013
#3
You nailed that part of it. We are paying for all of this and Bushco makes the profit n/t
Catherina
Jun 2013
#4
Or where John Edwards was going to meet his mistress, and Ellitiot Spitzer, and and and
Catherina
Jun 2013
#11
I've decided to look on the bright side. Soviet jokes *were* falling out of fashion.
Pholus
Jun 2013
#8
Only two hours? The CIA advisor probably said, "Let's wrap this up." That always works with a mummy.
randome
Jun 2013
#20
so you two doing the classic derailment or you actually going to say anything on topic?
Monkie
Jun 2013
#25
because 3 of the points make a circular argument, breaking the seeming intent of the law
Monkie
Jun 2013
#9
data/content from a US machine, im sorry, if you cant see this there just is no hope for you
Monkie
Jun 2013
#19
i never used the word bullshit, or called constitutional lawyers with harvard education a joke
Monkie
Jun 2013
#31
The domestic communication section in the doc states that inadvertent collections are
BenzoDia
Jun 2013
#21
Well then the Guardian needs to produce some FBI docs to back up their claims of abuse.
BenzoDia
Jun 2013
#28
The Guardian doesn't seem to be in the business of producing anything concrete
railsback
Jun 2013
#40
With their painfully long walls of text to beat their average readers into agreement.
BenzoDia
Jun 2013
#46
i can relate to that, for me its not the personal attacks, its the casual racism and
Monkie
Jun 2013
#73
Have any Military Intel Lawyers arrived yet? They're all over twitter blowing a gasket
Catherina
Jun 2013
#68
we had/have a pretend lawyer here, not sure if they were intel or not, stupid yes
Monkie
Jun 2013
#72
the bbc is ignoring this too, so similar, but without advertising or captain crunch
Monkie
Jun 2013
#107
No kidding. If it wasn't a Guardian article, I'd suspect that the NSA purposely leaked those to
BenzoDia
Jun 2013
#54
a day ago it was, we never target americans by accident to, oh well, we guess and go by a 51% chance
Monkie
Jun 2013
#92
This needs to be its own OP, imo. Very powerful stuff you've written here and it
HardTimes99
Jun 2013
#152
Yeah, I saw it and am glad he made it an OP. Thanks for the heads-up! - nt
HardTimes99
Jun 2013
#186
"heaviest users of PGP-encrypted email are lawyers handling confidential, privileged attorney-client
Catherina
Jun 2013
#117
"exceptionally grave damage" v "serious damage" if made public and means of collection
Catherina
Jun 2013
#93
If they're contacting overseas they're fair game, even if a reasonable suspicion.
Catherina
Jun 2013
#116
No, I am not a racist hater. I am a self-hating Black hater. Whatever the fuck that is
Catherina
Jun 2013
#129
You mean like the unravelling of OWS? Lol! When you make predictions like this I
sabrina 1
Jun 2013
#161
no worries, and yes it was pretty harsh, but you arent being called a racist either?
Monkie
Jun 2013
#170
Inadvertently! Well, that covers a lot. It gives a perfect excuse to those who are caught
sabrina 1
Jun 2013
#159
Not to worry, soon they won't have to hide anything anymore. With some on the 'left' now joining the
sabrina 1
Jun 2013
#174
Is "Inadvertantly" like "Collateral Damage"? "Unfortunate Civilan Deaths"? "Acts of God"?
Tierra_y_Libertad
Jun 2013
#172