24 votes

WSJ: New Details Show Broader NSA Surveillance Reach! Programs Cover 75% of Nation's Traffic!

New Details Show Broader NSA Surveillance Reach
Programs Cover 75% of Nation's Traffic, Can Snare Emails

SIOBHAN GORMAN, JENNIFER VALENTINO-DEVRIES
Updated August 20, 2013, 11:31 p.m. ET

WASHINGTON—The National Security Agency—which possesses only limited legal authority to spy on U.S. citizens—has built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say.

The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system's broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones.

H/T: InfoWars.com

NSA Has Ability to Illegally Spy On 75% of All Internet Traffic
More evidence NSA surveils American people, not foreign terrorists

Kurt Nimmo
Infowars.com
August 21, 2013

NSA would have us believe they only conduct surveillance on foreign terrorists, but this lie was recently put to rest in a Wall Street Journal article. In fact, according to current and former NSA officials, the agency has the ability to spy on 75 percent of all internet traffic in the United States, and probably more.

Following the September 11, 2001, attacks, the government began intercepting a wide array of communications. This, of course, is not news. In May, 2006, a former AT&T technician, Mark Klein, revealed how the NSA worked closely with telecoms to capture massive amounts of data from Americans not suspected of a crime or participating in terrorism.

The government claims it is only captures “metadata,” or data about data, but the Wall Street Journal report reveals this is little more than a flimsy government lie.




Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

FISA Domestic Spying Loopholes

I am going to relate to you a story of the BIGGEST loophole that exists, regarding 'foreign-based communications'. It began happening in spring 2008, just as I began getting involved in Ron Paul's bid for President.
The Windows OS I was using kept urging me to install an 'important update' regarding the CLOCK function of my computer. Naturally, i have my machine set to only 'notify' me, and I ignored this one, because my CLOCK was fine. it kept asking me to update several times in the next few months...
Quite by accident, I noticed that when I forwarded an email, and it was responded to, it came back to me with an ENTIRELY DIFFERENT TIME-STAMP as the actual time that I had sent it (in reference to MY ORIGINAL time and date). In MY case (where I am in the CONUS), when I had sent an email at 8:00 PM MST, it was reflected that it was sent at 1:00 A.M. MST, THE NEXT DAY, five hours later than I sent it. i tracked this for several days, asking freinds to reply as a test, and every time, my emails came back showing a five-hour difference. They were stamped in 'GMT minus one', as opposed to 'GMT minus six'.
REMEMBER, this was when the 'FISA' renewal hearings were taking place, back then, and there were allegations AT THIS TIME that the NSA, etc, were intercepting internet and telephone traffic (the San Fransisco 'secret room' whistleblower was starting to make waves in Federal Court at this time).
I deduced that my internet emails were being sent to a location outside the United States, to a foreign location in the GMT minus one area, and then being reflected BACK to the CONUS for delivery, thus BYPASSING the FISA legal requirements. Shortly after i emailed several people with my screenshots and conclusions, I lost internet for almost 72 hours, and when i got it back, all my 'customized home pages' on ALL of my email accounts had been reset to ALEXANDRIA, VIRGINIA. Approximately 2 weeks later, they all reverted back to their original places (AOL took the longest, lasting over 3 weeks).

I thought you all might be interested in this first-hand experience.

Snowden's 'revelations' are simply a confirmation of what I have been well-aware of (and some others in the alternet arena) for several years. He was some GREAT details, though!

I AM
MONTGOMERY SCOTT

This is going to come handy for ALL DP'er

despite the current trend of things happening so fast, there is a free market alternative to surfing the Internet anonymously.

http://btguard.com/

By running an encrypted VPN you will protect yourself from NSA surveillance.

upvote so everyone can see

His name is Edward Snowden

What is Capitalism?
http://youtu.be/yNF09pUPypw

The Flag In Your Avatar.

Is that 'diver down'?
No, I guess not. 'Diver down' is red/white stripe/red.

HERE is a flag for the New World Order that might interest you. it is from one of my missions with Admiral Kirk. It's actually kind of, well, 'pre-predictive'.
http://www.bing.com/images/search?q=flags+yellow+over+black&...

I AM
MONTGOMERY SCOTT

In A Perfect World,

In a perfect world, internet users would not have to rush around seeking to protect their privacy.
Of COURSE, internet users would do some 'due diligence' research and come to the understanding that the 'internet' that they THINK is 'open' is controlled and operated by the 'gatekeepers' who established it (back in the early 1970's); and therefore is subject to the whims of those 'gatekeepers'.

Your suggestion might be viable for a short period of time, but under sufficient pressure, the CODEX originator(s) will either be 'forced' to 'backdoor' the encryption codes, or be, in time, completely SHUT DOWN. Current examples include the 'encryption sites' that Snowden and Greenwald were using for communication. PAST examples include the attacks on WIKILEAKS. ONGOING examples include the removal of videos on 'YOUTUBE' by request of governments, citing 'third-party violations', and the shut-down of 'PRESS TV' (out of Iran) in many nations.

HOW, really, can one tell if the site you are leading to is NOT actually ANOTHER site, already in CONTROL of the 'gatekeepers'?

I trust your motives. Do not misunderstand me in this.

I wish you the best, and hope for the best, but I am not at this late date concerned. They already know about me.

I AM
MONTGOMERY SCOTT

You just can't trust anything politicians say.

when they say black, they mean white.

Look at this video clip of the insanity.
http://www.dailypaul.com/296528/video-politicians-war-on-log...

www.SuccessCouncil.com
Protect your assets and profit from the greatest wealth transfer in history.

not sure if the link is time sensitive, but for those who are

unable to view the mainlink on the thread on the frontpage, try the above. thanks.

Predictions in due Time...
http://www.youtube.com/watch?v=zGDisyWkIBM

"Let it not be said that no one cared, that no one objected once it's realized that our liberties and wealth are in jeopardy." - Dr. Ronald Ernest Paul

pardon folks, apparently, was already posted

on frontpage: http://www.dailypaul.com/296503#comment-3175255

Predictions in due Time...
http://www.youtube.com/watch?v=zGDisyWkIBM

"Let it not be said that no one cared, that no one objected once it's realized that our liberties and wealth are in jeopardy." - Dr. Ronald Ernest Paul