Christian Forums

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

This Is Crazy

Lewis

Member
Codename PRISM: Secret government program mines data from 9 U.S. Internet companies, including photographs, email and more

12887293-mmmain.jpg



The Washington Post

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.
The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who know about PRISM were bound by oaths of office to hold their tongues.
An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, “NSA reporting increasingly relies on PRISM†as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.
That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.
The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.†PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war.
Dropbox , the cloud storage and synchronization service, is described as “coming soon.â€
Government officials declined to comment for this story.
Roots in the ’70s

PRISM is an heir, in one sense, to a history of intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. The NSA calls these Special Source Operations, and PRISM falls under that rubric.
The technology companies, which participate knowingly in PRISM operations include Microsoft, Yahoo, Google, Facebook, AOL, Skype, YouTube, & Apple.
The Silicon Valley operation works alongside a parallel program, code-named BLARNEY, that gathers up “metadata†— address packets, device signatures and the like — as it streams past choke points along the backbone of the Internet. BLARNEY’s top-secret program summary, set down alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.â€
But the PRISM program appears more nearly to resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over “exponential growth†in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques.
The PRISM program is not a dragnet, exactly. From inside a company’s data stream the NSA is capable of pulling out anything it likes, but under current rules the agency does not try to collect it all.
Analysts who use the system from a Web portal at Fort Meade key in “selectors,†or search terms, that are designed to produce at least 51 percent confidence in a target’s “foreignness.†That is not a very stringent test. Training materials obtained by the Post instruct new analysts to submit accidentally collected U.S. content for a quarterly report, “but it’s nothing to worry about.â€
Even when the system works just as advertised, with no American singled out for targeting, the NSA routinely collects a great deal of American content. That is described as “incidental,†and it is inherent in contact chaining, one of the basic tools of the trade. To collect on a suspected spy or foreign terrorist means, at minimum, that everyone in the suspect’s inbox or outbox is swept in. Intelligence analysts are typically taught to chain through contacts two “hops†out from their target, which increases “incidental collection†exponentially. The same math explains the aphorism, from the John Guare play, that no one is more than “six degrees of separation†from Kevin Bacon.
A ‘directive’

Formally, in exchange for immunity from lawsuits, companies like Yahoo and AOL are obliged accept a “directive†from the attorney general and the director of national intelligence to open their servers to the FBI’s Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA. In 2008, Congress gave the Justice Department authority to for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company “to comply.â€
In practice, there is room for a company to maneuver, delay or resist. When a clandestine intelligence program meets a highly regulated industry, said a lawyer with experience in bridging the gaps, neither side wants to risk a public fight. The engineering problems so immense, in systems of such complexity and frequent change, that the FBI and NSA would be hard pressed to build in back doors without active help from each company.
Apple demonstrated that resistance is possible, for reasons unknown, when it held out for more than five years after Microsoft became PRISM’s first corporate partner in May 2007. Twitter, which has cultivated a reputation for aggressive defense of its users’ privacy, is still conspicuous by its absence from the list of “private sector partners.â€
“Google cares deeply about the security of our users’ data,†a company spokesman said. “We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a ‘back door’ for the government to access private user data.â€
Like market researchers, but with far more privileged access, collection managers in the NSA’s Special Source Operations group, which oversees the PRISM program, are drawn to the wealth of information about their subjects in online accounts. For much the same reason, civil libertarians and some ordinary users may be troubled by the menu available to analysts who hold the required clearances to “task†the PRISM system.
There has been “continued exponential growth in tasking to Facebook and Skype,†according to the 41 PRISM slides. With a few clicks and an affirmation that the subject is believed to be engaged in terrorism, espionage or nuclear proliferation, an
analyst obtains full access to Facebook’s “extensive search and surveillance capabilities against the variety of online social networking services.â€
According to a separate “User’s Guide for PRISM Skype Collection,†that service can be monitored for audio when one end of the call is a conventional telephone and for any combination of “audio, video, chat, and file transfers†when Skype users connect by computer alone. Google’s offerings include Gmail, voice and video chat, Google Drive files, photo libraries, and live surveillance of search terms.
Firsthand experience with these systems, and horror at their capabilities, is what drove a career intelligence officer to provide PowerPoint slides about PRISM and supporting materials to The Washington Post in order to expose what he believes to b a gross intrusion on privacy. “They quite literally can watch your ideas form as you type,†the officer said.
http://www.masslive.com/politics/index.ssf/2013/06/codename_prism_secret_program_data_mining.html
 
I have not trusted government from the time of the warren commission... and they sure haven't changed
 
I have not trusted government from the time of the warren commission... and they sure haven't changed

I agree, the WC was not good.

OP, I'm not too surprised.

Sent from my HTC One SV using Tapatalk 2
 
Exactly...apply that to anything and that is why we are circling the drain.

Thats the fear with people these days. Taking things way out of proportion.

They need to understand there is a difference between 0.00000000000001% and 100%

No,most of them just need to know the difference between freedom and liberty and consumption and dependence...they could also use a dictionary to see what private and privacy mean instead of seeking to define indifference and apathy as a lack of fear.
 
I will agree to this if we can have full ablilities to monitor and record what the politicians say and do in private.
 
Who cares?
OK, PM me the conversations/messages you've had in the past few days.
I promise not to leak anything.
 
Our rights, our freedom and our liberties are slowly decaying - and it's people with a I don't care attitude that is going to allow this to continue on - we need to stand up for our Nation again and fight Washington against these civil liberties that we trust in and value.
 
Can't count how many times I have been scolded for saying I don't care about "global warming" something that doesn't exist and is based on junk/political science which is based on records of only 150 or so years compared to the thousands if not millions of years that the planet has existed which may or may not result in the Sea level rising by one inch in the year 2525...our country is being dismantled right before our eyes right now and WILL result in OUR children living in tyranny and some people don't care....amazing.
 
Last edited by a moderator:
Rewind time a bit.
Well, I really don't care about planned parenthood performing abortions in cases of rape or if the mother's health is in jeopardy. No big deal.
Now, fast forward to the present. Abortion is now used as a means of birth control.

These things are planted. The seeds look innocent enough. After all who cares about the fruits it will bear since nobody really knows, or cares. Except perhaps the planter. But looking at that small thing well, it's only a stupid, small, innocuous thing hurting nobody. And it's certainly not hurting me one bit.
 
well the problem here is that its two things. the family is broken in America, second the powers that be offer fakes solutions that are really power grabs.
 
The IRS was used against citizens wanting to make their voices heard.
Could PRISM be used to eavesdrop on political opponents' communications?
If so it would make Watergate look insignificant.
 
Last edited by a moderator:
Through the Prism: Let government make its case for data mining
http://www.kansascity.com/2013/06/07/4278758/through-the-prism-let-government.html


The most troubling aspect of the government data dragnet is the potential for abuse. Searching for patterns that might reveal terror networks is one thing; most Americans understand and appreciate that the government has a responsibility to protect citizens. But access to massive databases also seems to present the opportunity for spying on political opponents, minority groups and activists. Illegal targeting of individuals and groups has happened before in our history and Americans are right to be wary of it.

So Obama quickly seeks to prosecute those responsible for leaking PRISM to slam the door on a potential firestorm if it's revealed it's been used to collect data on political opponents. All it would take is one instance that it had been used in that manner.

Yeah, I can see where Obama would be a bit uneasy right now. Currently that possibility is but a whisper overshadowed by the hype of collecting data on everybody.

This one will definitely be worth watching.
 
Even non-Americans should be worried. America spies on citizens of other countries to protect you guys.
 
NSA whistle-blower who sought to 'inform the public' in surveillance leak faces jail
http://www.foxnews.com/politics/2013/06/10/report-nsa-contract-worker-is-surveillance-source/

The source of the bombshell leaks about the U.S. government gathering information on billions of phone calls and Internet activities risks decades in jail for the disclosures if the U.S. can extradite him from Hong Kong, where he says he has taken refuge after saying his sole motive was to “inform the public.”

Edward Snowden, 29, who claims to have worked as a contractor at the National Security Agency and the CIA, allowed The Guardian and The Washington Post to reveal his identity Sunday. Snowden, in a video that appeared on the Guardian’s website, said two NSA surveillance programs are wide open to abuse.

"Any analyst at any time can target anyone. Any selector. Anywhere," Snowden said. "I, sitting at my desk, had the authority to wiretap anyone, from you or your accountant to a federal judge to even the president if I had a personal email."
 
Well, what do we expect?....I mean after all there are millions upon millions of loggers that use the internet for criminal activities, including terrorists in order to manufacture wickedness. They should patrol it's avenues. Think about it, with all the people that utilize this form of communication, education and entertainment we need officers behind the scene to facilitate(for the most part)the travelers in an ethical authoritative process. Our highways and byways are patrolled and for good reason....then why not the internet? Which has some seedy villainous trafficker's proliferating it's means, and using it to produce some of the most vile services and products created.

I wish they would ban porn altogether from the internet and anything related to actual gambling.

There are many reasons for our government to tap in and while all of them may be highly questionable and of concern especially in light of all the past and present issues....it is important to remember that as others have said "If we have nothing to hide, then what shall we be concerned about?"

Our only freedom is in JESUS the son of GOD, and we are to pray as he taught us and walk as he did and listen to the wisdom that the heavenly father GOD almighty grants us.

Praise be to GOD the heavenly father and his son lord JESUS CHRIST forever>>>>>>>>>>>>>>>>>>
 
This is a global issue. Every country, every province, every territory can be targeted in the spirit of "patrolling the highways".
I would think they should have the right to participate or not. If a European country decides to patrol it's own communications webs that's up to them. If not then again that's entirely up to them. WE may have initiated the Patriot Act but that doesn't mean the entire planet is then under that law. That would be like a Colorado Highway Patrolman seizing the authority to issue tickets on the German Autobahn.
 
Even non-Americans should be worried. America spies on citizens of other countries to protect you guys.
That is correct Nick, we are the best spies on the planet. And before we let you blow our cover' we will kill you.
 
I am not bothered that one government would spy on another.. sorta like White house to White house..

What we are seeing today is just more invasion because of technical knowledge ... I would guess years back the servants could be paid handsomely for info... "they" will use, have used what ever it takes to reach their goals...today most folks don't have in home hired help we have gadgets that tell on us....
 
Back
Top