It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

NSA monitoring everybody? I don't think so

page: 1
4
<<   2 >>

log in

join
share:

posted on Aug, 3 2013 @ 12:02 PM
link   
Seriously speaking, with all this stuff in the news lately about NSA surveillance you have to ask yourself, can they watch everybody?
We have what? 300 million people in the United States? lets say 50% text, e-mail or go online on any given day...thats 150 million texts and e mails if only once a day.

Think of the manpower required to read those.

My dad is former NSA..previous to that ASA if any of you know what that is. I've heard of computers with speeds in zeta seconds which are probably obsolete now.

My dad works for FEMA now...trust me, he is a good guy.....but back in the day he told me they did not monitor random cell phone calls, they could any cell phone call if they wanted too.If you said the word "bomb and president" it would not trigger anything.

Think about it...even if with the advancements in computers, if they picked up every target word in every e mail, text message or cell phone call and spit out on a piece of paper the originator of said target word, how tall would that stack of paper be?
How long would it take for an actual human analyst to look at said paper and make a determination?

As much as I hear about the "focus on this while we do this", I think this may be the big distraction.




posted on Aug, 3 2013 @ 12:06 PM
link   
Think about the fact they're trying to spy on nations like China and Russia simultaneously and the result is thinned even more so.

Like they've said, it's mostly not in real time but rather something previously designated, a keyword etc will generate a response that requires a person to look it over. That person is privvy to the ability of making mistakes as any person.

It's not fool proof



posted on Aug, 3 2013 @ 12:20 PM
link   
when the meta data hits a certain key point in the algorithm, it is "filtered" up, each time getting a "go" or "no go"...when a "point of interest" is reached, only then will humans actually deal with it. even this is highly speculative due to very nature of the secrecy involved.



posted on Aug, 3 2013 @ 12:26 PM
link   
It's not that they're "watching" everybody...it's more like they're just catching everything in between source & destination & pack-ratting it in case they need it at some point in the future...

Not really that hard with a lot of money, political clout & storage space - The key is going to be the access software that brings targets to their attention & pin points query results

Ala Eagle Eye...



posted on Aug, 3 2013 @ 12:28 PM
link   
The N.S.A. actually does monitor everyone, and in a lot of cases, store their data. However, accessing that data is the hard part. So they use algorithms that bring up people based on keywords, or if they stumble upon a person of interest, they can retroactively bring up their whole internet history.

However, like you said, the N.S.A. has mentioned that they often miscalculate or miss targets due to the fact that they have way too much data to sift through. The internet is a gigantic place.
edit on 3-8-2013 by darkbake because: (no reason given)



posted on Aug, 3 2013 @ 12:40 PM
link   
This subject always makes me think of this.



Anyway I believe they are just filtering the data stream for certain information and some will always slip by.



posted on Aug, 3 2013 @ 12:53 PM
link   
A single super computer could pour through that level of data in minutes seeking out key words and matching them with a list of other variables to look for suspects.
Once a "suspicious" message or link is found, then (as another poster already mentioned), it gets sent to a human's desk, complete with a "threat level" attached.

From there it likely get's divided into different files depending on urgency.

Of course, considering how broad the parameters are for what constitutes a "terrorist" these days, I'm guessing it's easier to make a list of potential loyalists, and just consider everyone else enemies of the state.



posted on Aug, 3 2013 @ 01:11 PM
link   
in 2008 they could hold 3 days worth of data rolling in the NSA, i'd imagine its similar even now maybe a week but you need a Utah datacentre to store it all ready for filtering so they'll grab everything and over time filter out what they don't want...linux iso traffic, windows updates and other stuff they know what it is so they're left with a lot less than started with and then with some deep drilling software to find the stuff they want they'll probably only need to keep a very small %age of the traffic for human intervention and for most common communication platforms they'll have the required ways to grab the data from the company so they wouldn't have to hold it themselves



posted on Aug, 3 2013 @ 01:25 PM
link   
reply to post by tinner07
 

The way you state it yes that would be hard to believe, but that is not how it works. They do in fact take everything in word for word. NSA Collects 'Word for Word' Every Domestic Communication, Says Former Analyst



RUSSELL TICE: This was in 2002-2003 time frame. The NSA were targeting individuals. In that case, they were judges like the Supreme Court. I held in my hand Judge Alito's targeting information for his phones and his staff and his family.



RUSSELL TICE, former National Security Agency analyst: Well, two months ago, I contacted some colleagues at NSA. We had a little meeting, and the question came up, was NSA collecting everything now? Because we kind of figured that was the goal all along. And the answer came back. It was, yes, they are collecting everything, contents word for word, everything of every domestic communication in this country. JUDY WOODRUFF: Both of you know what the government says is that we're collecting this -- we're collecting the number of phone calls that are made, the e-mails, but we're not listening to them. WILLIAM BINNEY: Well, I don't believe that for a minute. OK?

edit on 3-8-2013 by ParanoidAmerican because: (no reason given)

edit on 3-8-2013 by ParanoidAmerican because: (no reason given)



posted on Aug, 3 2013 @ 01:29 PM
link   
Coming from someone who's well rounded and employed in the IT field, they don't need to do any monitoring themselves. They've compiled algorithms to create documentation on anyone and everyone they can and accordingly to that documentation they assign that documentation with threat ratings. Anyone on Facebook, anyone who uses a cellphone, etc - all of that information goes through extremely advanced processing and compiles files and threat assessments on everyone anyone who uses those kinds of technologies. It's not rocket science, if you break it down into compartmentalization it's quite easy actually.

Face it, we've all got a little file on us(which was created by computers), and if someone wants to know something about you, they type in your name and social security etc - and they've got everything and anything they would ever need to know to achieve their desired goal.



posted on Aug, 3 2013 @ 01:32 PM
link   
reply to post by darkbake
 





The N.S.A. actually does monitor everyone, and in a lot of cases, store their data.


I don't think this is is true. I think they monitor what they can. Inside the US the internet is a very meshed network. I don't believe they monitor every router. I think this is complete BS. Your traffic does not travel to every node, it may stop well short of a monitored node. I also don't think anyone has the ability to sift all the traffic. Not yet, maybe in 20 years they could monitor current traffic, but in 20 years the paradigm will change. It's much simpler to monitor end points for interexsting traffic, i.e. Facebook, mail servers and the like.



posted on Aug, 3 2013 @ 01:35 PM
link   
OP i totally agree,

I think that Snowdens revelations and the revelations by Duncan Campbell back in the '90s do demonstrate that they could probably on paper intercept and spy on everyone but in reality the practicalities of this make it impossible.

there is no way that there is some NSA agent sitting about listening to us making plans for dinner and so on.

they probably dont even know whose number is whose.

like i keep saying on these threads, this has been going on and we have known about it long before Snowden came along and it was never really much of a issue so why is it now.

The NSA are not bothered about listening into the mundane boredom of everyone's lifes, even us ATS members, rather they are more bothered about listening out for national security threats.



posted on Aug, 3 2013 @ 01:35 PM
link   
reply to post by coldkidc
 


True, they aren't literally watching everybody in real time and catching key words.
It's only a matter of time before technology is advanced to where they can though.

This week I was emailing a friend back and forth and noticed the email replies were being edited for grammar check, after it was sent. It changed our words. Not just a spellcheck but reading through how we wrote sentences and editing them to be proper. Neither of us could figure out who enabled this grammar check. Was it set by default into our OS or by the email servers we used. It was the first time I noticed it. I found it to be intrusive.



posted on Aug, 3 2013 @ 01:36 PM
link   

Originally posted by tinner07
Think about it...even if with the advancements in computers, if they picked up every target word in every e mail, text message or cell phone call and spit out on a piece of paper the originator of said target word, how tall would that stack of paper be?
How long would it take for an actual human analyst to look at said paper and make a determination?


All I have to say is nsa.gov1.info...

They don't need to monitor the logs full time, they just plan to store all the information in this giant data center, then have a super computer analyze and categorize everything. Then when they need your file, it will be pulled from the archive and used against you.



Current Openings

Job Title: Domestic Intelligence Specialist
Job ID: 6662013
Location: Utah Data Center

Responsibilities
The responsibilities of our Domestic Intelligence Specialists are broad and cover the entire spectrum of the information needs of our Intelligence Community.

Qualifications
We are looking for people with a solid understanding of the technology utilized by our domestic targets. You should have broad expertise with multiple social media sites and a "sixth sense" about human behavior. If you feel you possess an uncanny ability to analyze people based on limited information, then we would like to talk to you!

Applicants should possess:

Demonstrated expertise in metadata analysis, telecommunications technologies, data collection, and reporting
Ability to "connect the dots" when assessing disparate data to obtain unique insight into target intentions
Strong curiosity and inquisitive nature when examining highly personal information
Ability to analyze collected data to derive facts, inferences, and projections concerning capabilities, intentions, and likelihood of mischief under various situations
Ability to maintain absolute discretion under all circumstances unless called upon to do otherwise
Deep understanding and rational fear of domestic national security threats
Strong moral compass

edit on 8/3/2013 by eXia7 because: (no reason given)



posted on Aug, 3 2013 @ 01:38 PM
link   
# 21 Yes, they do. Implicit is the fact that as the goalposts are moved as per what 'constitutes a threat', past data, things you said in complete candor, will be used to staple you to all tomorrow's parties. They even have programs to determine how well you are conforming. How hard you are trying to support any and all Official Stories. See any thread re 9 one won. You simply lack the vision to see this.

When you click on a star, it is noted, trust me. All that flashes across your screen, noted, fed into the machine. This has been so for years. Eventually, your computer will biologically, forensically, link you to your keyboard. There's your internet driver's license. There will be no excuses, and no mercy. You can rest assured that if every dog collar in the world were smashed to pieces, there will continue to be cell towers set up for purposes that dad will not reveal to you. A little ECT never hurt anyone, especially when they are unaware of it. I love totinos.

Trust me. You don't want to know about it.

Now...who, exactly, is behind the curtain?

Oh yes...the smartest and most intelligent, who are 'the most fit to run things'.
edit on 3-8-2013 by TheWhiteKnight because: (no reason given)

edit on 3-8-2013 by TheWhiteKnight because: (no reason given)



posted on Aug, 3 2013 @ 01:42 PM
link   
reply to post by Variable
 

They don't monitor any routers, do you know how a prism works? Well the program takes its name from how fiber optic lines are tapped into. The taps are placed on the feed side of servers (Facebook, Google, ect..) and cyphins up data before it hits the serve, like a signal delay without the delay....

Fiber Tap
edit on 3-8-2013 by ParanoidAmerican because: (no reason given)

edit on 3-8-2013 by ParanoidAmerican because: (no reason given)



posted on Aug, 3 2013 @ 01:42 PM
link   
reply to post by b3l13v3
 





Face it, we've all got a little file on us(which was created by computers), and if someone wants to know something about you, they type in your name and social security etc - and they've got everything and anything they would ever need to know to achieve their desired goal.


I don't know how well informed you are about how it all works given this statement. It's one thing to have unfettered access to databases that most have to pay for. It's another thing entire, to believe that everyone has a file with all the information about you. This is complete bs. The amount of information that can be gleaned from publicly sourced databases is one thing, no doubt they have other databases from end points like Facebook and the like. But jumping from this to they monitor all your traffic and pin it to a person is naive.

It goes without saying that you are now using a public web site. You should always assume your information "could" be gleaned. I think the reality is you would have to trip a trigger before you get close scrutiny. A trigger would be direct contact with non US based nodes. Especially those like Pakistan, Yemen and the like.

V



posted on Aug, 3 2013 @ 01:43 PM
link   

Originally posted by tinner07
Seriously speaking, with all this stuff in the news lately about NSA surveillance you have to ask yourself, can they watch everybody?
We have what? 300 million people in the United States? lets say 50% text, e-mail or go online on any given day...thats 150 million texts and e mails if only once a day.

Think of the manpower required to read those.

My dad is former NSA..previous to that ASA if any of you know what that is. I've heard of computers with speeds in zeta seconds which are probably obsolete now.

My dad works for FEMA now...trust me, he is a good guy.....but back in the day he told me they did not monitor random cell phone calls, they could any cell phone call if they wanted too.If you said the word "bomb and president" it would not trigger anything.

Think about it...even if with the advancements in computers, if they picked up every target word in every e mail, text message or cell phone call and spit out on a piece of paper the originator of said target word, how tall would that stack of paper be?
How long would it take for an actual human analyst to look at said paper and make a determination?

As much as I hear about the "focus on this while we do this", I think this may be the big distraction.



With all due respect, I think you miss the actual point of the data collection. you are relying on the media for what it is all about. The built the data collection centers, with public money, right out in public, for a reason - they are not hiding what they are doing, the are "leaking" now to get us to be okay with it after this news cycle ends. The collection is not to see what your facebook says about your ex, or even what supplies you are collecting for you Halloween fun. This is the excuse given, the reason is far more important.

First, the alphabet agencies are not government agencies, but agencies FUNDED by the government - there is a difference.

Second, these agencies are concerned with things other then terror, the CIA for example, in the public record, uses the tactic to bring down governments for any number of reasons. As long at the actions are not taken against them personally they really don't care, as the tactic is needed to justify the money spent to keep them in business. All reasonable: If there are no criminals why do we need cops? A few crimes and well, cops it is. This isn't in dispute, never has been, and works not different then your neighborhood police policy.

Three, this is the most important. The information is NOT primarily used for criminal activity, it is used to manipulate and control the entire economic system. Yes, if you wrote "I'm planning on selling 200 pounds of gold on the 25th" your email goes to the head of the line. If a chinese diplomat says he's bringing in 2 tons of silver to china, that email goes to the front of the line. If Iran wants to sell oil at 10 dollars a barrel to trash the dollar, you'll see a raging spike in oil prices, followed by war threats against Iran, followed by a retraction email - all because they caught that in the prism web.

The system is designed to control the world, not those in it. They truly don't care about anything you do unless it is on the scale of the above. They want the world off "cash" and into all electronic currency, bitcoin was a test balloon, and once they do, this system will then keep the rich rich, the poor poor and the planet in perfect harmony.

Lastly, there is another reason for the system, involving things unseen and unknown to us all. It is time to scan the emails, the calls, the texts for folks proclaiming to be either extraterrestrial, or in contact with those from afar. They want to know...



posted on Aug, 3 2013 @ 02:04 PM
link   
if they collect data on one innocent person they have broken the law and must be brought to justice. i hear a lot of people making excuses for these pricks but with all due respect our govt. is out of control and running illegal activities that would make the mexican drug cartel blush. i'm sorry i have no gray area on this issue. they are criminals and i'm not okay with what they're doing and never will be.



posted on Aug, 3 2013 @ 02:16 PM
link   
reply to post by tinner07
 

It depends on what you mean by "monitoring." If the NSA has your telco's business records but aren't actively querying you, are they monitoring you? Is the telco that creates and owns those records monitoring you? If the NSA can listen to your phone conversations but doesn't, is it monitoring you? If your telco can listen to your phone conversations but doesn't, is it monitoring you? If your internet traffic is intercepted by an NSA machine somewhere but discarded because it isn't interesting or targetable, are you being monitored? When your ISP receives packets from your computer and forwards them somewhere else, is it monitoring you?



new topics

top topics



 
4
<<   2 >>

log in

join