No, NSA Phone Spying Has Not Ended | Fortune
A U.S. District Court Judge ruled that the NSA's metadata surveillance The case, says the Guardian, will likely ultimately end up in front of the. A system created in to end the bulk collection of calling records of communications metadata — records showing who contacted whom. PRISM is a code name for a program under which the United States National Security Agency . Data, both content and metadata, that already have been collected under the PRISM program, . June 10 "We have no idea when they [ Foreign Intelligence Surveillance Court] meet, we have no idea what their judgments are.".
Guardian The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account a "selector" in NSA parlance associated with the individual being targeted.
Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used. One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous.
Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.
NSA Ends Sept. Era Surveillance Program : The Two-Way : NPR
A slide entitled "plug-ins" in a December document describes the various fields of information that can be searched. It includes "every email address seen in a session by both username and domain", "every phone number seen in a session eg address book entries or signature block " and user activity — "the webmail and chat activity to include username, buddylist, machine specific cookies etc".
Email monitoring In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual's email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA. One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought. Guardian The analyst then selects which of those returned emails they want to read by opening them in NSA reading software. The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, "communications that transit the United States and communications that terminate in the United States".
One document, a top secret guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act ofexplains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications: Guardian Chats, browsing history and other internet activity Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
Guardian An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.
Guardian Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed. Guardian As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls "nearly everything a typical user does on the internet".
Guardian The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies. Guardian The quantity of communications accessible through programs such as XKeyscore is staggeringly large.
One NSA report from estimated that there were bn "call events" collected and stored in the NSA databases, and close to bn internet records.
- NSA Ends Sept. 11-Era Surveillance Program
- XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
- NSA Metadata Collection Is Unconstitutional, Judge Says
Each day, the document says, bn records were added. William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.
Instead, telecom companies will retain and access the data on their customers. The NSA may then seek warrants from the secretive courts created by the Foreign Intelligence Surveillance Act FISA in order to compel these companies to hand over pertinent information on terrorism suspects and affiliates.
There are exceptions to these items though. What kinds of exceptions?
NSA Metadata Collection Is Unconstitutional, Judge Says | Smart News | Smithsonian
The agency has requested permission to keep its records for the past five years intact through Feb. This will ostensibly allow the agency to make sure nothing has gone awry during the transition. As mentioned, the database contains metadata.
It includes information on phone calls such as who, when, and how long—for instance, the identity of the sender and recipient, the duration, and the time and date. Metadata does not include the content of conversations. Why did the NSA need such broad powers to begin with? That way the NSA could find out vital intel in emergency situations at the drop of a hat. On the face of it, that capability might seem reasonable. The argument gains support in the wake of the recent terror attacks in Paris as well as other places around the world.
U.S. court hands win to NSA over metadata collection
An investigation into the success of the program, however, revealed no evidence that the program ever helped in any case. Plus, privacy advocates have been quick to note the potential for abuse and lack of checks and balances for whomever has access to the database.
Will any parts of the old program continue? In addition to the technical extension of the database until Feb. For instance, does the authority of that supplementary note supersede the Freedom Act?