Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
In reply to the discussion: “We don’t have a domestic spying program” Just incredible . . . [View all]ProSense
(116,464 posts)5. This article is about
Hints of the surveillance appeared in a set of rules, leaked by Mr. Snowden, for how the N.S.A. may carry out the 2008 FISA law. One paragraph mentions that the agency seeks to acquire communications about the target that are not to or from the target. The pages were posted online by the newspaper The Guardian on June 20, but the telltale paragraph, the only rule marked Top Secret amid 18 pages of restrictions, went largely overlooked amid other disclosures.
To conduct the surveillance, the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border. The senior intelligence official, who, like other former and current government officials, spoke on condition of anonymity because of the sensitivity of the topic, said the N.S.A. makes a clone of selected communication links to gather the communications, but declined to specify details, like the volume of the data that passes through them.
<...>
The official said that a computer searches the data for the identifying keywords or other selectors and stores those that match so that human analysts could later examine them. The remaining communications, the official said, are deleted; the entire process takes a small number of seconds, and the system has no ability to perform retrospective searching.
<...>
The official said the keyword and other terms were very precise to minimize the number of innocent American communications that were flagged by the program. At the same time, the official acknowledged that there had been times when changes by telecommunications providers or in the technology had led to inadvertent overcollection. The N.S.A. monitors for these problems, fixes them and reports such incidents to its overseers in the government...The disclosure sheds additional light on statements intelligence officials have made recently, reassuring the public that they do not target Americans for surveillance without warrants.
To conduct the surveillance, the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border. The senior intelligence official, who, like other former and current government officials, spoke on condition of anonymity because of the sensitivity of the topic, said the N.S.A. makes a clone of selected communication links to gather the communications, but declined to specify details, like the volume of the data that passes through them.
<...>
The official said that a computer searches the data for the identifying keywords or other selectors and stores those that match so that human analysts could later examine them. The remaining communications, the official said, are deleted; the entire process takes a small number of seconds, and the system has no ability to perform retrospective searching.
<...>
The official said the keyword and other terms were very precise to minimize the number of innocent American communications that were flagged by the program. At the same time, the official acknowledged that there had been times when changes by telecommunications providers or in the technology had led to inadvertent overcollection. The N.S.A. monitors for these problems, fixes them and reports such incidents to its overseers in the government...The disclosure sheds additional light on statements intelligence officials have made recently, reassuring the public that they do not target Americans for surveillance without warrants.
...the process of gathering information on foreign targets.
As the article states, this is a revelation from June, and the ACLU covered it. Bringing it to light again serves the purpose of focusing on what needs to be done to address the way the information is gathered.
Edit history
Please sign in to view edit histories.
Recommendations
0 members have recommended this reply (displayed in chronological order):
31 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
RecommendedHighlight replies with 5 or more recommendations
This comment is so sad because it demonstrates how successful the 'grooming' of citizens
sabrina 1
Aug 2013
#22
So every time I send an e-mail or a FaceBook message to a friend in Argentina,
Common Sense Party
Aug 2013
#14
1 more thing. NSA can search your emails for talking *about* a target, not just talking *to*
Catherina
Aug 2013
#23
He thought he said "pieing", as we do not hit people with pies...of course.
Safetykitten
Aug 2013
#30