33 votes

Someone *IS* recording the content of the calls!

We've heard over and over and over that the NSA is only collecting "metadata." However, it seems like it has been implied (maybe directly said) that if there is suspicion of deviant activity, then the NSA (or the concerned 3-letter agency) can later go back and listen to the actual content of the calls. Therefore, someone is also collecting the content of every call made whether foreign or domestic.

My question is: Who is storing this data?

Is the NSA program in question only analyzing the "metadata" while, also, actually storing the content for later use if needed?

Nonetheless, some entity (entities) has (have) created a database of the content of every call being made in the united States.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

5 days later

Don't you love it? lol

Just open the box and see

the "metadata" line is bullshit.

NSA stores it in Utah in a $2 billion dollar hard drive.

they steal some of it from room 641a.

They hoover everything

They say it's a "search" only when they access the data. They won't ("can't") search it without a judge, they say.

Until you come under suspicion, you're privacy is "safe".

If you come under suspicion, they have all of your phone calls, locations, call records, and email to use against you.

They parse the language like it's a live grenade.


all digital data is kept- forever

what they don't mention is that digital data is easy to tamper with as well. So, even if it didn't exist they could make it so!

5th Amendment.

Off the topic at hand.
They say they can use the past phone conversation. Well being married. Doesn't the spouse have the right not to testify against her husband? If she knew something, doesn't she has the right to remain silent? Can this be clarified?

. . . . . . _ . . . _ _ .
. _ . . _ _ . . . . _ _ . . . . . . . _ . . _ . .
. _ . . _ _ . . . . _ _ . . . . . . . _ . . _ . .

You'd think so.

But with all this 'enemy combatant' nonsense, who knows.

You don't build a WAREHOUSE.. to park your car.

Besides the fact that the answer is (already) disclosed right here:

We can KNOW that this 'no content' claim is absurd on its FACE:
(credit to Mike Rivero / http://whatreallyhappened.com/)

"Let's try a simple calculation. Every day there are three billion phone calls made in the United States. Let us stipulate that the meta-data for that phone call takes 1 kilobyte of data. That is actually a lot, but let's assume the government is being their usual inefficient selves.

To save the metadata for every single phone call going back to the start of this system would take 3 billion calls per day times 1 kilobyte, times 365 days per year, times 7 years. That works out to storage of 7.6 quadrillion bytes of data. Yet it has been announced that the NSA's facility in Utah has a data capacity of a Septillion bytes of data. That is 1,000,000,000 times as much storage than they need for just the meta-data! Even for the government, that is a huge waste, if they are not saving the content of the calls.
The average length of a telephone call in the United States is 3:15. Sampled at 8000 cps, that creates an mp3 files under 200 Kbytes in size. Together with the meta-data, let's round it up to an even 200K for simplicity sake. Times 3 billion phone calls per day, times 365 days per year, times 7 years, yields a storage requirement for all those saved phone calls of 1,533,000,000,000,000,000 bytes of data. That is 1.5 Quintillion. If we expand it to every phone call in the whole world for every day for those last 7 years, that comes to 6.2 Quintillion bytes needed. Let's add 20% overhead for indexing and organization, and we get 7.4 Quintillion bytes of data.

Even THIS is still just a tiny fraction of the advertised Septillion size of the Utah facility.

There is no question the Utah facility has the capability of saving every single phone call made in the world for the last seven years, with lots and lots of room for something else as well. We may presume that this septillion-sized data center is close to being full, because NSA has started construction on an additional center in Maryland."

Cyril's picture

It's in fact in the zettabytes

Folks, in fact we're talking about several zettabytes (n * 1,000,000,000,000,000,000,000) of data:


"Cyril" pronounced "see real". I code stuff.


"To study and not think is a waste. To think and not study is dangerous." -- Confucius

ChristianAnarchist's picture

Video is stored as well. The

Video is stored as well. The video from millions of cameras will account for the rest of the used data storage and the reason they need to build an additional facility...

Spread this news

...most here are probably aware of this, but spread this all over the internet.

with more attention and traction, constituents knowing this information can lobby their representatives for action. in short, the only way to affect the NSA is to cut its funding. period.


remember this?

iway onderway ifway eythay ancay anslatetray igpay atinlay? =)

Daughter of 1776 American Revolutionists

Who's got my data? Where's my data? When's it gonna return?

http://youtu.be/BuNX4uo6J_w Who's on first?

Fly: Will I be secure in your web?
Spider: Very secure.

Fly: Will you listen to my pleas?
Spider: No. I have no ability to do that.

Fly: Will you remember me?
Spider: No. You stay here will be completely confidential.

Fly: Help! [gasp] Help!
Spider: No. I have no warrant. There will be no trace of you ever haven been here....

Disclaimer: Mark Twain (1835-1910-To be continued) is unlicensed. His river pilot's license went delinquent in 1862. Caution advised. Daily Paul

They're recording the entire call

They're recording the entire call. But not only that. They're converting your speech to text and building a database based on personality profiles.

Wake the F#$% up.


"Take hold of the future or the future will take hold of you." -- Patrick Dixon

Cyril's picture



"Cyril" pronounced "see real". I code stuff.


"To study and not think is a waste. To think and not study is dangerous." -- Confucius

Cyril's picture

"WAKE THE F... UP" : I approve this message.

"WAKE THE F... UP" : I approve this message.

NO sarcasm.

They can RECORD, STORE, and KEEP absolutely everything of interest (theirs) ABOUT EVERY SINGLE ONE OF US, here, IN THIS COUNTRY, and elsewhere... and do it FOR YEARS of our lifetimes; here's some basic figures homework:


Yes, we can rightfully "WAKE THE F... UP".

It is time.

"Cyril" pronounced "see real". I code stuff.


"To study and not think is a waste. To think and not study is dangerous." -- Confucius

Good Point

I wonder if they're also able to search the text they converted the speech to. Maybe they'll argue that "that's different!"

I wonder if that's another Glenn Greenwald/Ed Snowden revelation.

They likely don't need to.

They likely don't need to. There is already commercial software available that can flag calls based on content. Voice to text is not a necessary step.

Where oh where has my little data gone? Where oh where...?

http://youtu.be/mFrM61c_8ME TraceRoute IP command (1 minute tutorial) will display to you each hop your data takes to get to any destination at the moment you query. Your data's route will change w/o notice. Each computer hop along your data's way may inspect & pass along to whomever they choose. No warrant need apply.

Have data. Will travel.

Disclaimer: Mark Twain (1835-1910-To be continued) is unlicensed. His river pilot's license went delinquent in 1862. Caution advised. Daily Paul

main core


I use Blue Wave, but don't expect one of THEIR silly taglines.



Total information databases have been worked toward and built since at least the 1990s. The efforts have received exponentially increased funding and technological/legal support since 2001. There has been some semantic ambiguity in the NSA's reporting of what they do, but phone, email, and various internet service providers have not been inaccurate in declaring that they haven't provided blanket content to the NSA. The NSA doesn't need industrial entities to provide them with content. They take it. More specifically they intercept it, copy it, store it. Their access is virtually hardwired to the networks hubs. Their database creation is massive but quite simple. What they need, ask for, and get from entities like Verizon and Google is information to help them query this database, to data-mine. They already have phone conversations and email content. What they need from service providers is the information that aligns addresses and numbers and dates and such with peoples' names.

The Big Picture

Here's a good video giving insight and support of what I've tried to say...

The NSA is committed to collecting ALL data [i.e. ALL emails, ALL phone conversations, etc.]. That's how technology works now. They don't filter anything at the point of collection. Their goal is to gather, collect, intercept, ALL data! The creation of such a database is simple stuff. The tricky part is in the data-mining, querying that database. The metadata they receive from Verizon and Google [etc.] helps them navigate their database. For example: it's likely that [they're attempting that] ALL of the email CONTENT and comments to the Daily Paul I've generated for the past few years HAVE ALREADY BEEN and continues to be copied and stored in their colossal database. They are not necessarily reading/reviewing all [or any] of that content, UNTIL someone with access to that database decides he or she doesn't like me and I am flagged for targeting. At that point the database is queried to reveal my personal content history [emails, phone conversations, comments to the Daily Paul, etc.]. Analysts can then successfully review a rather complete picture of me, my associations, my political views, my mental state, etc. The "metadata" they regularly request and receive from Verizon, Google and such helps them search for and locate the components of "me" in their database.

Now, about the "UNTIL someone decides to target me/you"...
For the sake of expedience, they are also attempting to create either a separate database of organized data or a database of organized pointers to the general database structured to provide a dossier on every person, not only in the USA, but on the planet. Just how far advanced they are with this is anybody's guess.

Message to NSA moles: I'm kidding about all of this. I'm actually a science fiction writer. :p

another article...

relating The Big Picture to navigating the semantic traps of deception...


"It's a little bit weird!" o_o

The last point made in this video is directly pertinent to my above comment...

"I think you're misunderstanding the perceived problem here, Mr. President. No one is saying that you broke any laws. We're just saying, it's a little bit weird that you didn't have to."

EDIT: So the video link provided in the linked RP post is not exactly stable. It's a general Daily Show link whose content changes. So I'm glad I printed out the pertinent quote as it no longer matches the link, but OMG Stewart's sidekick is hilarious [and poignantly insightful]! :D

The google technology is already here and is open to anyone

google voice is recording calls. You can see one part of it by looking at your voicemail transcripts. There are options to record all conversations so that user could store it.

Conventional email, internet searches, telephones should, by default, be considered unsecured and public communication. End of discussion, full stop.

Engage in Secure Exchange

fireant's picture

They are storing the content,

according to the many reports I've read on it.
All one has to do to understand why this is so dangerous is to imagine the day when NSA becomes politicized in the same way the IRS has been under this administration; the day when it is considered criminal or subversive to belong to a Tea Party or Liberty movement. I see it as another tool for tyranny; a dangerous one, where one party rule can easily be attained.
It matters not one has nothing to hide today, for tommorrow, that nothing will be a crime.

Undo what Wilson did

Logically this must be true