|
...search on...when those words appear in an electronic transmission, fax, or phone conversation, they get flagged to see if a pattern begins to emerge. Those transmissions containing one or more keywords are traced to their origin, and that origin becomes a person of interest.
All of this scanning is done by special satellite systems, and special ground-based systems designed for sifting through enormous amounts of data. That data is sorted and stored in the massive computer systems maintained by the NSA.
I would not count on encryption helping to conceal what's contained in your emails. The NSA has been in the code-breaking business for a LONG time...very little, if anything, escapes them.
|