It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

NSA admits listening to U.S. phone calls without warrants - Angry yet?

page: 12
87
<< 9  10  11   >>

log in

join
share:

posted on Jun, 17 2013 @ 04:33 PM
link   
Looks like Nadler is denying this story.


www.theatlanticwire.com...




posted on Jun, 17 2013 @ 04:55 PM
link   
so....Are they allowing tours at the Bluffdale location? I would like to see it.

I can wear a suit and tie.



posted on Jun, 17 2013 @ 08:28 PM
link   
reply to post by elouina
 


What scares them more than anything else is the talk, texts, tweets and emails showing how the sheeple are waking up.




posted on Jun, 17 2013 @ 08:58 PM
link   
Thru-out the years, I have demonstrated via letters to my state and federal representatives, and on one occasion, I even got arrested for voicing my concerns down at the capitol. I’m neither a liberal tree-huggin super freak nor a die-hard right wing conservative. I consider myself a libertarian with some conservative overtones.

Our country is/has been going to hell in a hand basket for quite a few years now, and I just don’t understand why people don’t do anything about it. Everyone seems to be all pizzed off, but yet, they sit behind a computer screen with one thumb up their ass, and the other on the keyboard. I’m utterly baffled by this.



posted on Jun, 17 2013 @ 09:05 PM
link   
Being at war, I would do these 4 things to attack, neutralize or protect from my enemy (Or my future enemy):

1- I would get his position. Where he'll attack, where the hits will be coming. Any GPS, celllphone, laptop or any device connected to a network would provide localization.

2- I would identify him. Who it is, what he looks like. Biometry, passport, medical record, anything that could provide information about him.

3- then I would try to know what his up to. this is where the NSA prism seems to cover. Get any digital footprint, for the longest time, who knows...

4- Neutralize, control, eliminate the target...Blackmail, drone, everything is useful to get your enemy down.

And metadata is what you're looking for. Individually, any infos worth nothing, put together, it's a powerful tool.

I guess next step is to remove human intervention to collect the data. That way, we can be assure that no leaks will occure...

I'm I a paranoiac??
edit on 17-6-2013 by myrddin99 because: (no reason given)



posted on Jun, 18 2013 @ 07:12 AM
link   
I think most people are under the impression there is a men in black sitting in a dark room listening in on there every phone call, WELL maybe not everyone, just mentally ill/unstable conspiracy theorists

This is not how the system works at all, its simply a keyword Intel gatherer THAT ONLY A TERRORIST should fear unless they're using a carrier pigeon for Communications with each other

Paranoia is the only know problem with this system other then that it works a treat and is nowhere near as intrusive as people are made to believe by paranoid morons going ballistic on the likes of Facebook and other social networking sites, another problem with it is trusting and allowing nerds with no balls in the program

That's just making it more & more difficult and expensive to protect people from terrorists


Personally i couldn't give a monkeys if my government is monitoring my Coms for keywords, i have nothing to hide and no intentions of killing my fellow countrymen so therefore i wont be further investigated if i happened to just say BOMB BOMB BOMB BOMB over the phone to my nan alerting the system

But i can however see how mentally unstable conspiracy theorist fear it, and make out it to be something its not or that some congressman is sitting in the loft flipping himself off over your phone call to your girlfriend, *sigh*

edit on 18-6-2013 by TritonTaranis because: (no reason given)



posted on Jun, 18 2013 @ 11:13 AM
link   
OK. Anyone out there remember their high school history? Or do our schools not hit on the subject of McCarthyism anymore. Pull it up on the web. This can/will be a repeat of that era with drastic updates of apps. This happened when Senator McCarthy headed up a witch hunt. People were accused of disloyalty, subversion and treason with out proper evidence. Our Government can/does go after the groups/individuals who do not act as the administration deems we should. This wide spread snooping is leaving us open to horrible repercussions. WAKE UP!!!!



posted on Jun, 18 2013 @ 07:12 PM
link   

Originally posted by searching411
OK. Anyone out there remember their high school history? Or do our schools not hit on the subject of McCarthyism anymore.


To answer your question, not in my experience they don't. My 14 year old came home on his weekend visit to show me that he was assigned a report on Joseph Stalin's life, and though he came away from it with an understanding of what a cruel man Stalin was, He has absolutely no idea what McCarthyism is/was.



posted on Jun, 18 2013 @ 08:47 PM
link   
So with all this talk of Metadata and how the NSA does not get to hear the phone calls content. Are you at least curious what they do get to see in the Metadata? where all do they get the Metadata from? Well here is a little bit of information on the Metadata they gather and how it is used.

Main page seems simple.
www.niem.gov...
Communities still makes it seem pretty simple until you notice them talking about Fusion Centers and Intelligence.
www.niem.gov...
Then there is the resource page which begins to tell you about gang database and even everybodies medical prescription database,
www.niem.gov...
Then they have the tools avalible for people to help collect the data to read.
www.niem.gov...

But all this is the simple versions compared to what the NSA has. Corporations even get to play with this data when they sign up with Citizen Corps or one of the other Department of Homeland Security Corps.
www.dhs.gov...

So you have databases scattered all over that are linked together by using NIEM format for the Meatdata. That way the government can allow access to it from any where and have a standard on how to read it. And that is wher they get the name NIEM..

National Information Exchange Model.
en.wikipedia.org...



The National Information Exchange Model (NIEM) (/niːm/ neem) is an XML-based information exchange framework from the United States. NIEM represents a collaborative partnership of agencies and organizations across all levels of government (federal, state, tribal, and local) and with private industry. The purpose of this partnership is to effectively and efficiently share critical information at key decision points throughout the whole of the justice, public safety, emergency and disaster management, intelligence, and homeland security enterprise. NIEM is designed to develop, disseminate, and support enterprise-wide information exchange standards and processes that will enable jurisdictions to automate information sharing. NIEM is an outgrowth of the United States Department of Justice's Global Justice XML Data Model (GJXDM) project. NIEM is now being expanded to include other federal and state agencies such as the Office of the Director of National Intelligence, Federal Bureau of Investigation, Texas, Florida, New York, Pennsylvania, and others.


So all this started with Department of Justice's Global Justice XML Data Model. Notice how it even says Global Justice. And ow it is being brought home. And it is being spun like a spider web into every government and state agency and even the corporations,Cell phone companies,Internet companies, hospitals, drug stores the list goes on. Where every thing is in as separate database. But with the cloud and common Metadata NIEM it can all be accessed at will by our government and those they wish to share it with.

Today they asked the NSA guy can you flip a switch and listen to some ones phone call. He said no. But that is a bogus question to give him a way to not legally lie to the US citizens. They don't flip switches on anything anymore. They use buttons and key boards..I would of liked to ask the guy after that can you tell what at the NSA operates with a switch besides the light switch on the wall. And he would of probably said nothing does.

Want to meet a couple of people in charge?
www.niem.gov...



Wendy Coyle, PMP Department of Homeland Security NPPD/CS&C/NSD wendy.coyle@hq.dhs.gov Dee Harwood, CSSLP Department of Homeland Security NPPD/CS&C/NSD deanne.harwood@dhs.gov


Wendy Coyle?

www.linkedin.com...




Wendy Coyle, PMP's Experience IT Specialist/NIEM Cyber Domain Co-Steward US Department of Homeland Security Government Agency; 10,001+ employees; Government Administration industry August 2011 – Present (1 year 11 months) Washington D.C. Metro Area Information Sharing Lead, Network Security Deployment. Responsible for the Information Sharing capability development of the National Cybersecurity Protection System (EINSTEIN). Associate Booz Allen Hamilton Public Company; 10,001+ employees; Management Consulting industry February 2011 – October 2011 (9 months) Task Manager Northrop Grumman Public Company; 10,001+ employees; NOC; Defense & Space industry September 2003 – March 2011 (7 years 7 months) Manage an 10 plus team of analysts and system administrators to support the DISA Office of Information & Knowledge Management office. Provide senior level leadership in meeting the overall goals and objectives of providing system lifecycle support for DISA enterprise intranet services and applications. Projects supported: Provide direct support of DISA's Identity Management initiative, DISA on Defense Knowledge Online, and operations & maintenance support for DISA's enterprise content management system called "DISA Workspaces" built on Vignette Collab product. Provide task leader oversight for above and Electronic Records Management pilot, Intranet Support help desk, various marketing and training tasks in support of Intranet services and applications, system admin support of certain OIKM assets, Groupware Systems support, and facilitation/technography support. NG Task Leader Defense Information Systems Agency Educational Institution; 51-200 employees; Nonprofit Organization Management industry 2007 – 2008 (1 year) Task Manager at OSD NII Northrop Grumman Corporation Public Company; 10,001+ employees; NOC; Defense & Space industry 1999 – 2003 (4 years)


Did you expect anything less?

Dee Harwood is a little more hidden with herself. But I did find this.

www.blogger.com...



Blogs I follow OpsSoftBlog securitymetrics.org


OpsSoft is now a closed business they use to sell the software to read all the Metadata from NIEM which was sold to the public. Was there a problem with the software or was it being abused for spying?

securitymetrics.org is interesting because it ties into all the credit card companies.And it is based out of Utah where the NSA spy center is being built.

en.wikipedia.org...




SecurityMetrics is a multinational merchant data security and compliance company headquartered in Orem, Utah.[2] The company is a Payment Card Industry (PCI) Data Security Standard (DSS) vendor, listed[3] as a Qualified Security Assessor (QSA), Approved Scanning Vendor (ASV), P2PE QSA, PCI Forensic Investigator (PFI) and Payment Application Qualified Security Assessor (PA-QSA) by the PCI Security Standards Council.[4] SecurityMetrics has working relationships with major payment processing companies and global acquiring banks such as Global Payments Inc, Sterling Payment Technologies, and FirstMerit Bank to provide PCI compliance, TIN matching, and other security solutions to their merchants.[5] SecurityMetrics currently has the largest support staff in the PCI industry worldwide, fielding over 132,000 calls a month, and employs nearly 400 employees.[6] SecurityMetrics has been an A+ accredited business through the Better Business Bureau (BBB) since May 2005.[7] Contents [hide] 1 Product History 2 Awards 2.1 2013 2.2 2012 2.3 2011 2.4 2010 3 References 4 External links Product History[edit]SecurityMetrics was founded in 2000 by Brad Caldwell with the goal to test website security.[8] In 2002, SecurityMetrics released its first vulnerability scanning appliance. In 2003 SecurityMetrics released its first hardware device with intrusion detection and vulnerability assessment technology, and conducted its first forensic investigation. SecurityMetrics was officially named a QSA and ASV by the PCI Council in 2006,[9] and certified as a security assessor for all four major card associations in the United States: Visa, MasterCard, American Express, and Discover. In 2008, SecurityMetrics hit the 1 million customer mark and in 2009 the company was officially named a PA-QSA by the PCI Council. In 2010 it released PANscan®,[10] a card data discovery tool. In response to the IRS new tax identification number matching requirements in 2011,[11] SecurityMetrics released SecurityMetrics TIN Matching. In 2011 the company also released a network threat sensor called Vision. In 2012, SecurityMetrics released a program intended to reduce business liability called SecurityMetrics Assurance[12] and its new PCI verification and testing program, PCI Focus. In 2013, SecurityMetrics released a Health Insurance Portability and Accountability Act compliance assessment program[13] intended to assist covered entity healthcare organizations in complying with HIPAA Security and Omnibus Final Rule[14] regulations. In May the company also announced an app called MobileScan [15] intended to scan payment processing phones and tablets for security vulnerabilities. Awards[edit]

edit on 18-6-2013 by JBA2848 because: (no reason given)



posted on Jun, 19 2013 @ 02:10 AM
link   
An article about NSA net snooping.

www.technewsdaily.com...

Department of Homeland SecurityNational Operations CenterMedia Monitoring CapabilityDesktop Reference Binder 2011. Contains IOI charts and the format for reporting IOI's.

www.scribd.com...



posted on Jun, 20 2013 @ 11:24 PM
link   
Want to know how to fight back? This video is an address given by Jacob Applebaum, hacker activist and Wikileaks member who advocates for a free internet, transparency for government and corporations and privacy for individuals. January 2012 he visited Australia where this address was filmed. In it he offers a few suggestions of some things people can do to fight back against surveillance. Basically "# them up" seems to be the way to go

Hopefully any Australianisms he uses are easily understood. If not, just ask. To start, MP = Member of Parliament.




Also check out this link: Project PM for more info relating to a project set up for investigative journalists (inc. Greenwald and possibly Hastings amongst others) to sort out the trove of docs from Stratfor hacked by Anonymous and leaked to Barrett Brown. They point to a web of government and private security organisations conspiring to undertake illegal surveillance. It's ongoing.
edit on 21-6-2013 by Archie because: .



posted on Jun, 28 2013 @ 02:57 AM
link   
reply to post by elouina
 


So, it's time we gave them all something to listen to? I can imagine all sorts of conversations they would not want to hear!!!!!


So, what can we talk about, that will make them loathe their jobs?



posted on Jun, 28 2013 @ 04:00 AM
link   
reply to post by Archie
 


Please note the Project PM link in my post is no longer operational. Since I typed that post, the site was breached and data was being collected on people who visited by shadowy entitites so it has been pulled down.



posted on Jul, 17 2013 @ 06:28 AM
link   

Originally posted by pigsy2400
are people just angrier because its been confirmed?


Well yeah before this I was just a nutbag conspiracy theorist!



posted on Jul, 17 2013 @ 07:36 AM
link   

Originally posted by VforVendettea
reply to post by elouina
 

What scares them more than anything else is the talk, texts, tweets and emails showing how the sheeple are waking up.


Waking up or not, governments always fear their people, and with good reason, no government can possibly withstand the swarm.

Just look at the L.A. riots, and the UK riots too. Look at history and you'll see that all it takes is enough people, over a large area, and the existing forces within a country cannot cope. They are quickly overwhelmed.

I've seen documentaries on several instances like this, and in each case it becomes clear that there is a critical point at which the authorities can no longer manage an event of civil uprising. It's happened on a smaller scale in other European countries in recent times, with protests turning ugly and the police unable to do much about it.

It's just a numbers game, if you have more protesters/rioters/revolutionaries than you have police or military on hand to deal with them, it cannot easily be controlled and prevented.

So, knowing this, the best way to prevent it is to monitor everyone and keep a close eye on early indicators. The wider public needs focal points for protest, it needs communication to a large audience, through websites, FB pages, Twitter etc... that's the key here. The government can watch such things and start to infiltrate and prevent, silence and arrest any who might be capable of creating such a movement.

This is nothing to do with catching some preacher in a cave in Afghanistan from telling someone in the US or UK to do something, it's about the real threat to the dominance of government in a country - the public themselves.

The € is going to collapse, no doubt about it. The US is in almost $17 trillion of debt. We've seen shocks to the global economy that could have sunk the entire system before now and the only thing holding it all together is an obedient media, some cash to paper over the chasm and the ignorance of the masses to just "keep on spending".

This is all going to collapse at some point, and now the US and other governments have a perfect system in place to try to silence civil uprising before any feet even hit the pavement.
edit on 17-7-2013 by Rocker2013 because: (no reason given)



new topics

top topics



 
87
<< 9  10  11   >>

log in

join