#FedBullies #EXPOSED! #NSA Publishes #Surveillance #Strategies - TopicsExpress



          

#FedBullies #EXPOSED! #NSA Publishes #Surveillance #Strategies #FBI #DOJ #DoD #Prism PRISM Data Collection Program: Our #1 Source of Raw Intelligence Using the PRISM program, our analysts can extract information directly from the servers of nine major American internet companies: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. This important partnership gives us #direct access to audio, video, photographs, e-mails, #documents and connection logs for each of these systems. Established in 2007, the PRISM program has allowed us to closely track targeted individuals over time. Our ability to conduct #live surveillance of #search terms has given us important insights into their thoughts and intentions. Below are some slides from a recent presentation describing the extent of our abilities: NSA PRISM program chart This slide lists our information providers and the type of data available to our analysts NSA PRISM program chart This slide shows how PRISM has evolved over time. We expect to add more providers soon! To learn more about this program, visit the source that initially disclosed it. Tracking Our Surveillance Data: Boundless Informant The "Boundless Informant" mapping tool provides our analysts the means to track intelligence collection statistics worldwide. Using a color-coded map, we can quickly determine the volume of collection data we have by geographical location. This global heat map assigns each nation a color code based on its surveillance intensity ranging from green (least subjected to surveillance) through yellow and orange to red (most surveillance). With the monthly domestic intelligence collection volume at almost three billion pieces, the United States is assigned the color orange. NSA surveillance map - Boundless Informant To learn more about this program, visit the source that initially disclosed it. Our Domestic Intercept Stations NSA technicians have installed intercept stations at key junction points, or switches, throughout the country. These switches are located in large windowless buildings owned by the major telecommunication companies and control the domestic internet traffic flow across the nation. A fiber optic splitter is placed on the incoming communication lines and routes the traffic to an NSA intercept station for processing. View a sample route that internet data traverses from a home in Toronto to the San Francisco Art Institute passing through several NSA intercept stations. Eventually, all of the domestic data flow will be routed to the new Utah Data Center when it opens in Fall 2013. The NSA also monitors all satellite communications in and out of the U.S. via satellite receivers located across the country. NSA intercept station - listening device NSA map of listening posts and domestic surveillance More information about this map Our Undersea Cable Tapping Strategy By tapping into the worldwide network of undersea cables, our OAKSTAR, STORMBREW, BLARNEY and FAIRVIEW systems can process data as it flows across the internet. Each system is responsible for different types of intercepted data. For example, the BLARNEY system gathers metadata describing who is speaking to whom and through which networks and devices. There are two methods employed for tapping into the undersea cable network. A modified nuclear submarine houses the technicians and gear needed to place the physical taps on the undersea cables along strategic points in the network. The second method involves using intercept probes at the point where the cables connect to the landing stations in various countries. These probes capture and copy the data as it flows onward. map of NSA undersea cable intercepts View an interactive map of worldwide undersea cables XKeyscore: Our Real-Time Internet Monitoring Capability As data flows through our worldwide data collection points, the XKeyscore system indexes and stores this information in a rolling three-day buffer database containing all internet activity passing through each collection site. XKeyscore is a massive distributed Linux cluster with over 700 servers distributed around the world. The theory behind XKeyscore is simple: People spend a large amount of time on the web performing actions that are anonymous. We can use this traffic to detect anomalies which can lead us to intelligence by itself, or provide a selection path for further inquiries. Examples of anomalous events: Someone searching the web for "suspicious stuff" or someone who is using encryption. This slide shows a worldwide map of the XKeyscore server locations This slide shows how metadata is extracted and stored in the XKeyscore database
Posted on: Fri, 09 Aug 2013 03:51:32 +0000

Trending Topics



Recently Viewed Topics




© 2015