69 online
 
Most Popular Choices
Share on Facebook 6 Printer Friendly Page More Sharing
General News    H2'ed 6/7/14

On 6/5, 65 Things We Know About NSA Surveillance That We Didn't Know a Year Ago

By       (Page 2 of 5 pages) Become a premium member to see this article and all articles as one long page.   1 comment
Message Electronic Frontier Foundation

14. The Foreign Intelligence Surveillance Court has issued orders that allow the NSA to share raw data--without personally identifying information stripped out-- with the FBI, CIA, and the National Counterterrorism Center.

15. Pursuant to a memorandum of understanding, the NSA regularly shares raw data with Israel without stripping out personally identifying information about U.S. persons.

16. The Snowden disclosures have made it clear the Obama administration misled the Supreme Court about key issues in ACLU's case against NSA spying, Clapper v. Amnesty International, leading to the dismissal of the case for lack of standing.

17. The NSA "hacked into Al Jazeera's internal communications system." NSA documents stated that "selected targets had 'high potential as sources of intelligence.'"

18. The NSA used supposedly anonymous Google cookies as beacons for surveillance, helping them to track individual users.

19. The NSA "intercepts 'millions of images per day' -- including about 55,000 'facial recognition quality images'" and processes them with powerful facial recognition software.

20. The NSA facial recognition program "can now compare spy satellite photographs with intercepted personal photographs taken outdoors to determine the location."

21. Although most NSA reform has focused on Section 215 of the PATRIOT Act, and most advocates have also pushed for reform of Section 702 of the FISA Amendments Act, some of the worst NSA spying happens under the authority of Executive Order 12333, which President Obama could repeal or modify today.

22. The NSA collected Americans' cell phone location information for two years as part of a pilot project to see how it could use such information in its massive databases.

23. In one month, March 2013, the NSA collected 97 billion pieces of intelligence from computer networks worldwide, including 3 billion pieces of intelligence from US computer networks.


(Image by Unknown Owner)   Details   DMCA
24. The NSA has targeted Tor, a set of tools that allow Internet users to browse the net anonymously.

25. The NSA program MUSCULAR infiltrates links between the global data centers of technology companies such as Google and Yahoo. Many companies have responded to MUSCULAR by encrypting traffic over their internal networks.

26. The XKEYSCORE program analyzes emails, online chats and the browsing histories of millions of individuals anywhere in the world.

27. NSA undermines the encryption tools relied upon by ordinary users, companies, financial institutions, targets, and non-targets as part of BULLRUN, an unparalleled effort to weaken the security of all Internet users, including you.

28. The NSA's Dishfire operation has collected 200 million text messages daily from users around the globe, which can be used to extract valuable information such as location data, contact retrievals, credit card details, missed call alerts, roaming alerts (which indicate border crossings), electronic business cards, credit card payment notifications, travel itinerary alerts, and meeting information.

29. Under the CO-TRAVELER operation, the US collects location information from global cell towers, Wi-Fi, and GPS hubs, which is then information analyzed over time, in part in order to determine a target's traveling companions.

Next Page  1  |  2  |  3  |  4  |  5

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Supported 2   Valuable 2   Must Read 1  
Rate It | View Ratings

Electronic Frontier Foundation Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in


Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Demolishing Eight Common Excuses People Make for NSA Mass Surveillance

Petition to Obama Administration: End the Harassment and Targeting of Reporters

TPP Leak Confirms the Worst: US Negotiators Still Trying to Trade Away Internet Freedoms |

How NSA Mass Surveillance is Hurting the US Economy

TPP Won't Wrap Up This Year, But Fast Track Remains a Threat

Hundreds of South Carolina Inmates Sent to Solitary Confinement Over Facebook

To View Comments or Join the Conversation:

Tell A Friend