🏰 TradeFortress 🏰 (OP)
Bitcoin Veteran
VIP
Legendary
Offline
Activity: 1316
Merit: 1043
👻
|
|
June 06, 2013, 05:53:52 AM |
|
http://www.guardian.co.uk/world/interactive/2013/jun/06/verizon-telephone-data-court-orderIT IS HEREBY ORDERED that, the Custodian of Records shall produce to the National Security Agency (NSA) upon service of this Order, and continue production on an ongoing daily basis thereafter for the duration of this Order, unless otherwise ordered by the Court, an electronic copy of the following tangible things: all call detail records or "telephony metadata" created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls. This Order does not require Verizon to produce telephony metadata for communications wholly originating and terminating in foreign countries. Telephony metadata includes comprehensive communications routing information,. including but not limited to session identifying information (e.g., originating and terminating telephone number, International Mobile Subscriber Identity (IMSI) number, International Mobile station Equipment Identity (IMEI) number, etc.), trunk identifier, telephone calling card numbers, and time and duration of call. ... IT IS FURTHER ORDERED that no person shall disclose to any other person that the FBIor NSA has sought or obtained tangible things under this Order, other than to: (a) those persons to whom disclosure is necessary to comply with such Order; (b) an attorney to obtain legal advice or assistance with respect to the production of things in response to the Order; or (c) other persons as permitted by the Director of the FBI or the Director's designee. A person to whom disclosure is made pursuant to (a), (b), or (c)
|
|
|
|
wdmw
|
|
June 06, 2013, 05:35:01 PM |
|
You are in violation, sir.
|
|
|
|
wtfvanity
|
|
June 06, 2013, 06:02:32 PM |
|
http://www.guardian.co.uk/world/interactive/2013/jun/06/verizon-telephone-data-court-orderIT IS HEREBY ORDERED that, the Custodian of Records shall produce to the National Security Agency (NSA) upon service of this Order, and continue production on an ongoing daily basis thereafter for the duration of this Order, unless otherwise ordered by the Court, an electronic copy of the following tangible things: all call detail records or "telephony metadata" created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls. This Order does not require Verizon to produce telephony metadata for communications wholly originating and terminating in foreign countries. Telephony metadata includes comprehensive communications routing information,. including but not limited to session identifying information (e.g., originating and terminating telephone number, International Mobile Subscriber Identity (IMSI) number, International Mobile station Equipment Identity (IMEI) number, etc.), trunk identifier, telephone calling card numbers, and time and duration of call. ... IT IS FURTHER ORDERED that no person shall disclose to any other person that the FBIor NSA has sought or obtained tangible things under this Order, other than to: (a) those persons to whom disclosure is necessary to comply with such Order; (b) an attorney to obtain legal advice or assistance with respect to the production of things in response to the Order; or (c) other persons as permitted by the Director of the FBI or the Director's designee. A person to whom disclosure is made pursuant to (a), (b), or (c) Wow. It says calls specifically, but I'd be curious if text messages are included, or are part of a separate order. Wonder what the requests to ISP's and such ask for.
|
WTF! Don't Click Here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
|
|
AzureEngineer
Member
Offline
Activity: 98
Merit: 10
|
|
June 06, 2013, 06:56:36 PM |
|
The U.S. government is all about freedom. It thinks it is delicious and gobbles it up whenever available.
|
My name was simply a play on "Blue Engineer" from Team Fortress. I am not affiliated with Microsoft or the Azure project.
|
|
|
myrkul
|
|
June 06, 2013, 07:19:01 PM |
|
The U.S. government is all about freedom. It thinks it is delicious and gobbles it up whenever available.
+1
|
|
|
|
TheButterZone
Legendary
Offline
Activity: 3066
Merit: 1032
RIP Mommy
|
|
June 06, 2013, 10:43:35 PM Last edit: June 07, 2013, 02:32:08 AM by TheButterZone |
|
Government has been tapping phones for decades; Lily Tomlin's Laugh-In character Ernestine resonated because AT&T's complicity was exposed at the time. As long as government exists, your civil rights will be violated by it with effective impunity.
|
Saying that you don't trust someone because of their behavior is completely valid.
|
|
|
Wilikon
Legendary
Offline
Activity: 1176
Merit: 1001
minds.com/Wilikon
|
|
June 06, 2013, 11:15:04 PM |
|
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.htmlU.S. intelligence mining data from nine U.S. Internet companies in broad secret program ......The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time. The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who know about PRISM were bound by oaths of office to hold their tongues. … The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war. ......But the PRISM program appears more nearly to resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over “exponential growth” in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques. The PRISM program is not a dragnet, exactly. From inside a company’s data stream the NSA is capable of pulling out anything it likes, but under current rules the agency does not try to collect it all. Analysts who use the system from a Web portal at Fort Meade key in “selectors,” or search terms, that are designed to produce at least 51 percent confidence in a target’s “foreignness.” That is not a very stringent test. Training materials obtained by the Post instruct new analysts to submit accidentally collected U.S. content for a quarterly report, “but it’s nothing to worry about.” ......An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.
|
|
|
|
PerfectAgent
Sr. Member
Offline
Activity: 252
Merit: 250
Still the Best 1973
|
|
June 07, 2013, 12:53:26 AM |
|
You are in violation, sir. You too, seeing as you quoted that statement on a public forum.
|
|
|
|
pekv2
|
|
June 07, 2013, 01:50:10 PM |
|
They are trolling for google searches from what I heard. This is the absolute reason why you should use VPN + https://ixquick.com . I think you could even use google search with vpn, and they would come up empty.
|
|
|
|
FoBoT
|
|
June 07, 2013, 04:22:07 PM |
|
James R Clapper , head of NSA, is a traitor to humanity
|
|
|
|
peonminer
|
|
June 07, 2013, 08:10:35 PM |
|
The U.S. government is all about freedom. It thinks it is delicious and gobbles it up whenever available.
lolololol
|
|
|
|
Stampbit
|
|
June 07, 2013, 08:16:34 PM |
|
How exactly is this a threat to our freedom? If the government wanted to spy on you they could find out more than just what you said on the phone.
|
|
|
|
farlack
Legendary
Offline
Activity: 1310
Merit: 1000
|
|
June 07, 2013, 08:44:15 PM |
|
They're only logging the time of the call, and the time it ended, not the audio.
Who cares, the searching for bomb on google, and saying bomb on the phone doesn't trigger anything so its assumed to be safe to talk on the phone.
|
|
|
|
Mike Christ
aka snapsunny
Legendary
Offline
Activity: 1078
Merit: 1003
|
|
June 07, 2013, 09:42:34 PM |
|
How exactly is this a threat to our freedom? If the government wanted to spy on you they could find out more than just what you said on the phone.
Agreed. Government itself is a threat to our freedom, this is just another side-effect.
|
|
|
|
Spendulus
Legendary
Offline
Activity: 2926
Merit: 1386
|
|
June 08, 2013, 01:30:45 AM |
|
They're only logging the time of the call, and the time it ended, not the audio.
Who cares, the searching for bomb on google, and saying bomb on the phone doesn't trigger anything so its assumed to be safe to talk on the phone.
Who said anything about bomb? Wrong presumption. Say the party in power is X, and you are an avid follower of party Y. One hundred primary leaders of Y are identified, then tracebacks for two years are done as follows. Those who communicated with Y, designate Y1 Those who communicated with Y1, designate Y2 Those who communicated with Y2, designate Y3 Now search for comm between Y2, Y1 and Y3 and use a threshold of activity, build a list of those who have activity in Y group above that threshold. Send list to IRS for punishment.
|
|
|
|
Spendulus
Legendary
Offline
Activity: 2926
Merit: 1386
|
|
June 08, 2013, 01:32:16 AM |
|
You are in violation, sir. You too, seeing as you quoted that statement on a public forum. What is curious is that the companies that have publicly denied this, such as Google and Verizon, did not just on being asked the question reply "No Comment."
|
|
|
|
mprep
Global Moderator
Legendary
Offline
Activity: 3794
Merit: 2612
In a world of peaches, don't ask for apple sauce
|
|
June 09, 2013, 10:28:06 AM |
|
You are in violation, sir. You too, seeing as you quoted that statement on a public forum. What is curious is that the companies that have publicly denied this, such as Google and Verizon, did not just on being asked the question reply "No Comment." If they admitted it then it would ruin their rep.
|
|
|
|
Spendulus
Legendary
Offline
Activity: 2926
Merit: 1386
|
|
June 09, 2013, 05:56:10 PM |
|
You are in violation, sir. You too, seeing as you quoted that statement on a public forum. What is curious is that the companies that have publicly denied this, such as Google and Verizon, did not just on being asked the question reply "No Comment." If they admitted it then it would ruin their rep. Sounds like what was called in gangster parlance a "made man", eg , some honest guy that got blackmailed, honeytrapped or otherwise made into a member of the gangsters. So evil has spread?
|
|
|
|
craslovell
Legendary
Offline
Activity: 1470
Merit: 1021
|
|
June 10, 2013, 12:52:23 AM |
|
|
|
|
|
|
|