It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' - With Slides

page: 2
137
<< 1    3  4  5 >>

log in

join
share:

posted on Jul, 31 2013 @ 11:08 AM
link   
It's really disappointing seeing what extremes my own Govt. goes to in the name of "safety"... They act like a stalkerish ex-gf who is peaking into every aspect of your life. This Govt. hasn't been "by the people, for the people" in a VERY LONG time. Its all agenda driven with under-the-table handshakes. I hate using cliche's but the more layers you peel off this onion the stinkier it does get...

To my Govt., you continue to let me down at every turn. I wish I was proud of you all and your actions, but I'm not. The older/wiser I get, the more sad/angry I grow with you....



posted on Jul, 31 2013 @ 11:08 AM
link   
I added images of each slide to the opening post.



posted on Jul, 31 2013 @ 11:15 AM
link   

Originally posted by muzzleflash
What I want to know is if we have this really powerful spy system...

Why do we still have terrorist attacks that seem like a surprise?
How did those mass jail breaks happen without them being prepared for it?

What's the point of all this surveillance if it doesn't prevent anything?

And if it did prevent something tragic, wouldn't they brag about it to convince us it's a good idea?
Why wouldn't they if they specifically choose not to defend it?

All I have are questions mostly.

Because US need an enemy
See first
The point is blackmailing, control, power



posted on Jul, 31 2013 @ 11:19 AM
link   

Originally posted by elouina
"Over 300 terrorists captured with Xkeyscore.." So they are saying that this is the program that caught the 300 terrorists that they were alluding to? Then perhaps the other domestic spying programs of the NSA are not necessary?

Don't get me wrong, I don't want any of this to be used on US citizens.
edit on 31-7-2013 by elouina because: (no reason given)


That must be 300 secret prisoners in secret investigations with secret evidence within secret courts. Are the prisons all secret too? I count heads at Gitmo and there aren't even a few I could say came from this program for timelines and dates. So....Where would those 300 desperadoes be off to, I wonder?

Or...could they just be lying like a cheap rug and pulling numbers out of their imagination because they sound good..and no one ever intends to support a single bit of it publicly? Oh, I love a Government that lies on the SMALL things when the truth would actually serve them better. They THEN expect us to believe a word they say about something important?
They're funny sometimes.



posted on Jul, 31 2013 @ 11:24 AM
link   
reply to post by SkepticOverlord
 


I have found that if you are interested in looking at the people who are doing this. Search the term "Real-Time Regional Gateway (RT-RG)". You will end up finding interesting people like this.

www.linkedin.com...




Kara Buxton's Experience Real-Time Regional Gateway Analyst/Trainer U.S. Air Force, National Security Agency Government Agency; 10,001+ employees; Defense & Space industry December 2010 – Present (2 years 8 months) ADET certified instructor on the Real-Time Regional Gateway (RT-RG) tool suite. Collaborated with software developers to document abnormalities and recommend improvements through timely communications. Prepared deploying individuals with training/instruction on the RT-RG analytic tools. Maintained and updated mission-specific working aids relied on by analysts to get the most current information. Signals Intelligence Analyst United States Air Force Government Agency; 10,001+ employees; Defense & Space industry 2004 – Present (9 years) Expeditionary Support Team Analyst U.S. Air Force, National Security Agency July 2008 – December 2010 (2 years 6 months) Provided prompt actionable intelligence to tactical war fighters in a joint 24/7 environment. Ensured tasked Threat Warning units adhered to standards in Sensitive Reconnaissance Operations support and authored post mission summaries Provided National-level support and coordination between NSA/CSS sites, National Geospatial Agency, Central Intelligence Agency, foreign partners, the Office of Naval Intelligence and forward deployed forces. Interpreted content of national metadata databases using mapping tools to depict complete data in graphic formats resulting in actionable threat reporting to troops in harm's way. Briefed senior government civilians, Commissioned Officers and Senior Enlisted personnel in a joint force environment daily. Trained and mentored joint service intelligence analysts to perform duties effectively on the Expeditionary Support Team. Network/Signals Intelligence Analyst/Reporter U.S. Air Force, NSA/CSS Georgia May 2005 – March 2008 (2 years 11 months) Analyzed and reported on highly significant events related to targets hostile to United States interests. Authored, provided quality control checks, and oversaw the release of thousands of reports, to include end-product reports. Monitored real-time operations in and around target country region, provided guidance on time-sensitive inquiries from various customers. Monitored hardware sustainability and usage for over 15 systems located off-site and abroad. Trained multiple analysts on reporting procedures, real-time activity monitoring and section specific tasks. Tools: Developed program familiarity and proficiency in the following tools/databases: ArcGIS, RT-RG tool suite, MS Office, and numerous Intelligence Community tools and databases.


Or this guy.

www.linkedin.com...




Sr Consultant Booz Allen Hamilton Public Company; 10,001+ employees; Management Consulting industry August 2011 – Present (2 years) Augusta, Georgia Area Analytical support. SIGINT Analyst 3rd Battalion 20th Special Forces Group (Airborne) April 2007 – August 2011 (4 years 5 months) Camp Blanding Florida • Trained in the use of SIGINT collection radios to include PRD-13, DRT, AR8200. • Learned basic Radio Frequency theory and how it applies to SIGINT collection. • Trained on Analytical tools to include GOOGLE EARTH, ANALYST NOTEBOOK, and ARCGIS. • Set up and maintained a Trojan Spirit-LITE for use in SIGINT training and missions. SIGINT Analyst Special Operations Task Force East Afghanistan March 2009 – April 2011 (2 years 2 months) Bagram, Afghanistan • Wrote SIGINT reports using NSA-G METRICS, Real Time Regional Gateway, GOOGLE EARTH, ARCGIS, ANCHORY, and MAUQI. • Performed Geo-Spatial Meta Data Analysis on SIGINT reporting using Real Time Regional Gateway, TOWERPOWER, SIGint NAVigator, MAINWAY, Sigint Emitter Discovery Base, TREASURE TROVE, CEDES, RIPCORD, WRANGLER, VANTAGE, MUAWI, ANCHORY, ARGIS, GOOGLE EARTH, and BELLVIEW. • After analyzing these reports and after I performed Geo-Spatial Meta Data Analysis of these messages, I provided our commanders on the ground timely and accurate intelligence and developed targets of interest for our commanders to pursue. • Operated automated data processing equipment for SIGINT collection, processing and reporting utilizing the Tactical Collection Coordination Cell, CINEPLEX and GISTQUE toolsets. • Maintained analytical working aids to support target collection, identification, and location. • Performed Electronic Preparation of the Battlefield for Afghanistan utilizing TOWERPOWER, Sigint Emitter Discovery Base, ARCGIS, GOOGLE EARTH, and Microsoft Office toolsets. • Collaborated analytical efforts with numerous governmen



posted on Jul, 31 2013 @ 11:29 AM
link   
reply to post by Wrabbit2000
 


Well very valid points. In front of Congress... Gen Alexander said it had stopped 50 attacks. When pressed he could only name 1. It turns out the one he named was found out by other means and not PRISM OR XKeyscore.

They are lying.. It is as simple as that and are willing to do whatever it takes to ensure the program(s) continue.


Too much money is at stake.. Too many people employed to have it any other way.
edit on 31-7-2013 by GArnold because: (no reason given)



posted on Jul, 31 2013 @ 11:31 AM
link   
Real-Time Regional Gateway (RT-RG)

It is tied into the NSA/CSS and special forces. Is there a story behind Petraeus Scandal not being reported by Donoilon to the President here? That would be General Petraeus sex scandal with NSA operative Paula Broadwell and NSA Thomas Donilon not reporting the issue to President Obama until after he won the election. PRISM scandals birth? So is all this coming out because Obama did not like what happened and sent Snowden on a secret mission from the White House?



posted on Jul, 31 2013 @ 11:35 AM
link   
So...

Now that the cat is out of the bag, how do we get our hands on this software? I have a few ex girlfriends I'd like to peek in on and see what they're up to these days.

Programs like this could be HEAVILY abused by bored analysts.

"Hm...lets see what Nancy Pelosi has been up to the past few days...oooo she has a thing for feet? I'll have to remember that for later..."

Now anyone can be blackmailed. As I read in another thread on here, the average person commits 3 crimes a day (most unknowingly). Well, the NSA can know and find out.

I still want a copy of that software though...



posted on Jul, 31 2013 @ 11:38 AM
link   

Originally posted by MystikMushroom
So...

Now that the cat is out of the bag, how do we get our hands on this software? I have a few ex girlfriends I'd like to peek in on and see what they're up to these days.

Programs like this could be HEAVILY abused by bored analysts.

"Hm...lets see what Nancy Pelosi has been up to the past few days...oooo she has a thing for feet? I'll have to remember that for later..."

Now anyone can be blackmailed. As I read in another thread on here, the average person commits 3 crimes a day (most unknowingly). Well, the NSA can know and find out.

I still want a copy of that software though...


Yes , with this program they can find if you downloaded illegal copy of Dexter and invoice a fine



posted on Jul, 31 2013 @ 11:38 AM
link   
How about this guy?

www.linkedin.com...



Director, Pacific and Far East Operations / Project Manager TexelTek, Inc. Privately Held; 51-200 employees; Computer Software industry October 2007 – May 2010 (2 years 8 months) Korea PROJECT DEVELOPMENT AND CONTROL: - Served as the Project Manager and a Product Owner for the Intelligence Agency Real-time Regional Gateway (RTRG) program in Korea using agile software development processes - Performed the Program Management of TexelTek Pacific operations, contracts, deliverables, budget, logistics, and systems integration and acquisition, including a 3000 sq. ft. office space DEVELOPMENT AND IMPLEMENTATION OF INTELLIGENCE SYSTEMS: - Assisted in the design and planning for Korea and Japan military components to integrate new RTRG intelligence systems and database capabilities - Senior liaison performing the transformation of analytical requirements into design tasks for developers based on 10 years experience with data management, processes and sources in Korea - Joined with 5 other companies in the development and design of the RTRG database architecture and user interface assembling over 100 distinct data sources and 25 web applications CONTRACT AND PERSONNEL MANAGEMENT: - Managed a technical team of 13 Software, Systems, Information Assurance, and Analyst engineers in Korea and the U.S., supplemented by10 temporary personnel monthly for integration efforts - Successfully developed the proposals, statements of work, and budget analysis for 5 contracts in Korea, 2 of which were accepted as a sub-contract


South Korea and Japan are part of this. And this guys past is interesting to say the least. You should go to the link and see everything.



posted on Jul, 31 2013 @ 11:46 AM
link   
Oh look at that! Freedom! wow. Thats .. thats just great.


When do we get to play with this tech


uhm wtf with all the leaks?
edit on 31-7-2013 by Nephalim because: (no reason given)



posted on Jul, 31 2013 @ 11:59 AM
link   
Holy hamburgers Batman, they are tracking people by their MAC Addresses that made the back of head explode! They are even getting PGP encryption, I knew that the encryption protocols available to the public aren't safe but damn!

Oh well. At this point we watch them while they are watching us. It's like jeez, you guys are really going that far, we have to find a way to turn that strength into a weakness. Nice to see that the USAF have a hand in this..

I've been watching for a long time



posted on Jul, 31 2013 @ 12:24 PM
link   
reply to post by muzzleflash
 


I for years got this burning question. If you see what is capable with all the tech. They can basically most probably read a number plate from space. Every foot of this earth is scanned a couple of times over every minute. They can find a "possible threat" in a crowd on the other side of the world but they can not find a missing person is say the desert or the position of a sinking ship. These tech analyze everything and report on irregularities. All above should be that but they never assist. Just so funny. I say they just do not wanna help each other



posted on Jul, 31 2013 @ 12:33 PM
link   
reply to post by xavi1000
 


Now we know who is mining our email addresses for all the spam and junk mail we receive. Nice little side line for an enterprising nsa officer. Just think of it add .... Got 5 billion or so email addresses for sale. Can track if they use your add or not and will update with personal details of choices, place of residence est for direct custom made adds to each. .....



posted on Jul, 31 2013 @ 12:35 PM
link   
So then if they know everything why is there still child porn on the internet. They know who each and every one of those bastards is. They could have shoot them all by now



posted on Jul, 31 2013 @ 01:10 PM
link   
If we look at Why and by Who the Internet was made for maybe its no surprise.
edit on 31-7-2013 by Skyfloating because: (no reason given)



posted on Jul, 31 2013 @ 01:19 PM
link   

Originally posted by Stealthwatch
So then if they know everything why is there still child porn on the internet. They know who each and every one of those bastards is. They could have shoot them all by now

They won't stop it because they want it. It's the sick part that I don't want to believe but is likely the case, they are involved in peddling it. Not to say all of those employed in the sector, but there's a lot of corruption that allows it to continue because it's bought.
edit on 31-7-2013 by dreamingawake because: (no reason given)



posted on Jul, 31 2013 @ 01:44 PM
link   

Originally posted by muzzleflash
What I want to know is if we have this really powerful spy system...

Why do we still have terrorist attacks that seem like a surprise?
How did those mass jail breaks happen without them being prepared for it?

What's the point of all this surveillance if it doesn't prevent anything?



Here is one to add onto that list.

If all of what you ask is true, and it is, this started with 9/11.

So if the goal was to surveill us 24/7 and it started with 9/11 then
it seems that the ones surveilling us are responsible for the cause...



posted on Jul, 31 2013 @ 01:49 PM
link   
Just saw this on Twitter, was surprised I didn't see it on ATS this morning (guess I checked a little before it was posted). I can't believe the amount of disclosure that's happening every single day. This is really mind blowing. All this is coming out. What else are we going to find out in only a few days? In the next weeks?

Have been watching David Wilcock's show on Gaiam TV and starting to get more and more convinced...and his website has a lot to say about disclosure, including that it's orchestrated, that we're getting certain info at certain times as part of a big disclosure plan (link).

It makes you wonder--if all this stuff is coming out, stuff that people used to think you were crazy for believing--I remember just last year many of my friends thinking I was crazy for suggesting that we were all being monitored online, all the time--it really pushes the envelope and makes you wonder what else might be true. Aliens having contact with human governments seems less and less far off every day...



posted on Jul, 31 2013 @ 01:59 PM
link   
reply to post by Heliophant
 


Not to go off topic, but Apple needs to have the bio-scanner feature for NFC capabilities - you know, so your phone can be your credit card. (Not that I agree, just pointing it out). Carry on.



new topics

top topics



 
137
<< 1    3  4  5 >>

log in

join