Jump to content
Join the Unexplained Mysteries community today! It's free and setting up an account only takes a moment.
- Sign In or Create Account -

NSA Requests ALL Phone Records From Verizon


Dark_Grey

Recommended Posts

He was supposed to have the most "transparent" government ever......

obama-changes-funny-278x339.jpg

Most certainly seems tyranical.

When he signed the NDAA, he said it would never be used against Americans. HE LIED!! It was a lie when he said it.

  • Like 2
Link to comment
Share on other sites

They tried to sell this in congress today, by saying they had had a hand in stopping local and allies ifty times.

Let's see that is fifty out of ten billion phone calls collected. They asre building a huge computer complex in utah. If you think that complex is only there ro record phone calls and emails, with out reading/listening to them. I have a bridge I can sell you.

  • Like 1
Link to comment
Share on other sites

Leaker Vows Details on NSA Access to Tech Servers

Edward Snowden takes extraordinary precautions in a "live chat."

http://www.informationclearinghouse.info/article35325.htm

By Doug Stanglin

June 18, 2013 "Information Clearing House - NSA leaker Edward Snowden, answering questions Monday in a live blog on his revelations about the top-secret agency, denied charges he was spying for China and vowed to release more details on the NSA's "direct access" to the tech companies' servers

"Truth is coming, and it cannot be stopped," Snowden said, according to

The Guardian, which held the "live chat" on its website.

  • Like 1
Link to comment
Share on other sites

FBI Virus Runs Rampant, Infecting Thousands of Computers

Um.. the story does say that it's a scam under a fictitious name ...

  • Like 2
Link to comment
Share on other sites

Um.. the story does say that it's a scam under a fictitious name ...

Well-aware of that.

Link to comment
Share on other sites

They tried to sell this in congress today, by saying they had had a hand in stopping local and allies ifty times.

Let's see that is fifty out of ten billion phone calls collected. They asre building a huge computer complex in utah. If you think that complex is only there ro record phone calls and emails, with out reading/listening to them. I have a bridge I can sell you.

the question I have is, if they are storing so much information, yet not reviewing it, how do they find and thwart threats immediately. Seems to me that they are merely storing it for use after-the fact. Which then makes their claims of thwarting attacks seem a little questionable. All they are storing is after-the-fact, after-the-event stuff. Where is the prevention is this?

Edited by regeneratia
  • Like 1
Link to comment
Share on other sites

Computer programs that sift through the data for items of interest are not hard to conceive, and I'm sure not hard to obtain if one has the resources.

After-the-fact searches would also be helpful. In short it seems to me such data collecting, while some view it as an invasion of privacy, in the end will benefit society greatly. Like all things, of course, it needs regulation.

Link to comment
Share on other sites

Computer programs that sift through the data for items of interest are not hard to conceive, and I'm sure not hard to obtain if one has the resources.

After-the-fact searches would also be helpful. In short it seems to me such data collecting, while some view it as an invasion of privacy, in the end will benefit society greatly. Like all things, of course, it needs regulation.

I agree....with your post's last three words. I hope that our "representatives" do too.

  • Like 2
Link to comment
Share on other sites

Computer programs that sift through the data for items of interest are not hard to conceive, and I'm sure not hard to obtain if one has the resources.

After-the-fact searches would also be helpful. In short it seems to me such data collecting, while some view it as an invasion of privacy, in the end will benefit society greatly. Like all things, of course, it needs regulation.

Perhaps you are operating under the assumption that the US government is beneficent, and has only our (its citizens) best interests at heart.

That is not really a valid assumption.

The data collection of PRISM operates in violation of the Fourth Amendment where it says "no warrant shall issue but upon probable cause."

  • Like 2
Link to comment
Share on other sites

Whether or not all this is within the Fourth Amendment is still being adjudicated. My prediction is the government will win with just a few rules imposed.

There is always a posible conflict of interest between employees and owners of any business, and that includes bureaucrats and citizens of a nation. The general presumption, however, is that in the end everyone's best interests are preserved. I see nothing wrong in government "spying" on citizens such as criminals, terrorists, corporate cheats, and so on. Even a policeman walking down the street noting what is going on can be deemed "spying" if you are paranoid enough.

It's a tradeoff between having effecting governance and anarchy.

Link to comment
Share on other sites

Whether or not all this is within the Fourth Amendment is still being adjudicated. My prediction is the government will win with just a few rules imposed.

There is always a posible conflict of interest between employees and owners of any business, and that includes bureaucrats and citizens of a nation. The general presumption, however, is that in the end everyone's best interests are preserved. I see nothing wrong in government "spying" on citizens such as criminals, terrorists, corporate cheats, and so on. Even a policeman walking down the street noting what is going on can be deemed "spying" if you are paranoid enough.

It's a tradeoff between having effecting governance and anarchy.

Being adjudicated by whom, Frank?

It is disheartening, but somehow not surprising, to have a Vietnamese come down on the side of the government, instead of down on the side of the individual and the rule of law.

Authoritarianism and statism thrive in Vietnam, it appears.

  • Like 2
Link to comment
Share on other sites

Whether or not all this is within the Fourth Amendment is still being adjudicated. My prediction is the government will win with just a few rules imposed.

There is always a posible conflict of interest between employees and owners of any business, and that includes bureaucrats and citizens of a nation. The general presumption, however, is that in the end everyone's best interests are preserved. I see nothing wrong in government "spying" on citizens such as criminals, terrorists, corporate cheats, and so on. Even a policeman walking down the street noting what is going on can be deemed "spying" if you are paranoid enough.

It's a tradeoff between having effecting governance and anarchy.

The government need not violate the Fourth Amendment to stop anarchy. Enforcing existing constitutional laws is fine.

  • Like 3
Link to comment
Share on other sites

Ah, now things are moving the right direction:

Related Issues

NSA Spying

Google petitions FISA court for ability to disclose NSA user-data requests on First Amendment basis

"Other companies should follow suit," the Electronic Frontier Foundation said in a Twitter post Tuesday afternoon. But other companies' reaction was muted. A source at one Internet company suggested that a lawsuit might be cumbersome and slow down the disclosure process.

https://www.eff.org/mention/inshare1-google-petitions-fisa-court-ability-disclose-nsa-user-data-requests-first-amendment

  • Like 2
Link to comment
Share on other sites

The government need not violate the Fourth Amendment to stop anarchy. Enforcing existing constitutional laws is fine.

It is a pretty impossible expectation when your law enforcement officals are breaking the law and doing things that are unConstitutional.

FBI broke law for years in phone record searches

By John Solomon and Carrie Johnson

Special to The Washington Post and Washington Post Staff Writer

Tuesday, January 19, 2010

http://www.washingtonpost.com/wp-dyn/content/article/2010/01/18/AR2010011803982.html

http://addon.100searchengines.com/texis/open/search?q=Judge+rules+secret+FBI+letters+unconstitutional

Judge rules secret FBI national security letters Unconstitutional ...

  • Like 3
Link to comment
Share on other sites

They are using the fbi, a department of the government, to investagate the irs, the nsa, and the department of justes. Can you say massive coverup.

  • Like 1
Link to comment
Share on other sites

It is a pretty impossible expectation when your law enforcement officals are breaking the law and doing things that are unConstitutional.

I live in hope. There still are good guys in high places. Most employees and spies, in the alphabet agencies, are patriots. We just have to worry about a minority of rogues.

  • Like 2
Link to comment
Share on other sites

I live in hope. There still are good guys in high places. Most employees and spies, in the alphabet agencies, are patriots. We just have to worry about a minority of rogues.

It sure seems like the rogues rule.

  • Like 1
Link to comment
Share on other sites

The rogues are the ones in charge. The irs just finished investagateing itself. It found it had done nothing wrong.

  • Like 1
Link to comment
Share on other sites

It sure seems like the rogues rule.

The bad guys get all the press. It doesn't help that they might have blackmailed some of the good guys.

  • Like 2
Link to comment
Share on other sites

The bad guys get all the press. It doesn't help that they might have blackmailed some of the good guys.

I am learning these days that there is evil in the good guys and good in the bad ones.

==========

http://consortiumnew...ackmail-scheme/

Bush’s Foiled NSA Blackmail Scheme

June 21, 2013

---

I always called it the Coalition of the sWilling.

Edited by regeneratia
  • Like 2
Link to comment
Share on other sites

Public release date: 28-Jun-2013, php, http://www.eurekalert.org/pub_releases/2013-06/miot-lws062713.php

Massachusetts Institute of Technology

Low-power Wi-Fi signal tracks movement -- even behind walls

'Wi-Vi' is based on a concept similar to radar and sonar imaging

CAMBRIDGE, MA -- The comic-book hero Superman uses his X-ray vision to spot bad guys lurking behind walls and other objects. Now we could all have X-ray vision, thanks to researchers at MIT's Computer Science and Artificial Intelligence Laboratory.

Researchers have long attempted to build a device capable of seeing people through walls. However, previous efforts to develop such a system have involved the use of expensive and bulky radar technology that uses a part of the electromagnetic spectrum only available to the military.

Now a system being developed by Dina Katabi, a professor in MIT's Department of Electrical Engineering and Computer Science, and her graduate student Fadel Adib, could give all of us the ability to spot people in different rooms using low-cost Wi-Fi technology. "We wanted to create a device that is low-power, portable and simple enough for anyone to use, to give people the ability to see through walls and closed doors," Katabi says.

The system, called "Wi-Vi," is based on a concept similar to radar and sonar imaging. But in contrast to radar and sonar, it transmits a low-power Wi-Fi signal and uses its reflections to track moving humans. It can do so even if the humans are in closed rooms or hiding behind a wall.

As a Wi-Fi signal is transmitted at a wall, a portion of the signal penetrates through it, reflecting off any humans on the other side. However, only a tiny fraction of the signal makes it through to the other room, with the rest being reflected by the wall, or by other objects. "So we had to come up with a technology that could cancel out all these other reflections, and keep only those from the moving human body," Katabi says.

Motion detector

To do this, the system uses two transmit antennas and a single receiver. The two antennas transmit almost identical signals, except that the signal from the second receiver is the inverse of the first. As a result, the two signals interfere with each other in such a way as to cancel each other out. Since any static objects that the signals hit — including the wall — create identical reflections, they too are cancelled out by this nulling effect.

In this way, only those reflections that change between the two signals, such as those from a moving object, arrive back at the receiver, Adib says. "So, if the person moves behind the wall, all reflections from static objects are cancelled out, and the only thing registered by the device is the moving human."

Once the system has cancelled out all of the reflections from static objects, it can then concentrate on tracking the person as he or she moves around the room. Most previous attempts to track moving targets through walls have done so using an array of spaced antennas, which each capture the signal reflected off a person moving through the environment. But this would be too expensive and bulky for use in a handheld device.

So instead Wi-Vi uses just one receiver. As the person moves through the room, his or her distance from the receiver changes, meaning the time it takes for the reflected signal to make its way back to the receiver changes too. The system then uses this information to calculate where the person is at any one time.

Possible uses in disaster recovery, personal safety, gaming

Wi-Vi, being presented at the Sigcomm conference in Hong Kong in August, could be used to help search-and-rescue teams to find survivors trapped in rubble after an earthquake, say, or to allow police officers to identify the number and movement of criminals within a building to avoid walking into an ambush.

It could also be used as a personal safety device, Katabi says: "If you are walking at night and you have the feeling that someone is following you, then you could use it to check if there is someone behind the fence or behind a corner."

The device can also detect gestures or movements by a person standing behind a wall, such as a wave of the arm, Katabi says. This would allow it to be used as a gesture-based interface for controlling lighting or appliances within the home, such as turning off the lights in another room with a wave of the arm.

Unlike today's interactive gaming devices, where users must stay in front of the console and its camera at all times, users could still interact with the system while in another room, for example. This could open up the possibility of more complex and interesting games, Katabi says.

###

Written by Helen Knight, MIT News Office

  • Like 2
Link to comment
Share on other sites

Public release date: 28-Jun-2013, php, http://www.eurekaler...t-lws062713.php

Massachusetts Institute of Technology

Low-power Wi-Fi signal tracks movement -- even behind walls

'Wi-Vi' is based on a concept similar to radar and sonar imaging

CAMBRIDGE, MA -- The comic-book hero Superman uses his X-ray vision to spot bad guys lurking behind walls and other objects. Now we could all have X-ray vision, thanks to researchers at MIT's Computer Science and Artificial Intelligence Laboratory.

Researchers have long attempted to build a device capable of seeing people through walls. However, previous efforts to develop such a system have involved the use of expensive and bulky radar technology that uses a part of the electromagnetic spectrum only available to the military.

Now a system being developed by Dina Katabi, a professor in MIT's Department of Electrical Engineering and Computer Science, and her graduate student Fadel Adib, could give all of us the ability to spot people in different rooms using low-cost Wi-Fi technology. "We wanted to create a device that is low-power, portable and simple enough for anyone to use, to give people the ability to see through walls and closed doors," Katabi says.

The system, called "Wi-Vi," is based on a concept similar to radar and sonar imaging. But in contrast to radar and sonar, it transmits a low-power Wi-Fi signal and uses its reflections to track moving humans. It can do so even if the humans are in closed rooms or hiding behind a wall.

As a Wi-Fi signal is transmitted at a wall, a portion of the signal penetrates through it, reflecting off any humans on the other side. However, only a tiny fraction of the signal makes it through to the other room, with the rest being reflected by the wall, or by other objects. "So we had to come up with a technology that could cancel out all these other reflections, and keep only those from the moving human body," Katabi says.

Motion detector

To do this, the system uses two transmit antennas and a single receiver. The two antennas transmit almost identical signals, except that the signal from the second receiver is the inverse of the first. As a result, the two signals interfere with each other in such a way as to cancel each other out. Since any static objects that the signals hit — including the wall — create identical reflections, they too are cancelled out by this nulling effect.

In this way, only those reflections that change between the two signals, such as those from a moving object, arrive back at the receiver, Adib says. "So, if the person moves behind the wall, all reflections from static objects are cancelled out, and the only thing registered by the device is the moving human."

Once the system has cancelled out all of the reflections from static objects, it can then concentrate on tracking the person as he or she moves around the room. Most previous attempts to track moving targets through walls have done so using an array of spaced antennas, which each capture the signal reflected off a person moving through the environment. But this would be too expensive and bulky for use in a handheld device.

So instead Wi-Vi uses just one receiver. As the person moves through the room, his or her distance from the receiver changes, meaning the time it takes for the reflected signal to make its way back to the receiver changes too. The system then uses this information to calculate where the person is at any one time.

Possible uses in disaster recovery, personal safety, gaming

Wi-Vi, being presented at the Sigcomm conference in Hong Kong in August, could be used to help search-and-rescue teams to find survivors trapped in rubble after an earthquake, say, or to allow police officers to identify the number and movement of criminals within a building to avoid walking into an ambush.

It could also be used as a personal safety device, Katabi says: "If you are walking at night and you have the feeling that someone is following you, then you could use it to check if there is someone behind the fence or behind a corner."

The device can also detect gestures or movements by a person standing behind a wall, such as a wave of the arm, Katabi says. This would allow it to be used as a gesture-based interface for controlling lighting or appliances within the home, such as turning off the lights in another room with a wave of the arm.

Unlike today's interactive gaming devices, where users must stay in front of the console and its camera at all times, users could still interact with the system while in another room, for example. This could open up the possibility of more complex and interesting games, Katabi says.

###

Written by Helen Knight, MIT News Office

I've heard about this before. Pretty scary stuff.

I don't understand why they need all this information....it's definitely not to catch terrorists.....

  • Like 1
Link to comment
Share on other sites

I've heard about this before. Pretty scary stuff.

I don't understand why they need all this information....it's definitely not to catch terrorists.....

OUr government is getting way, way out of hand. Heinlein said that if a government requires more than one building, it is way too big.

  • Like 2
Link to comment
Share on other sites

OUr government is getting way, way out of hand. Heinlein said that if a government requires more than one building, it is way too big.

Isn't he a science fiction author?

Link to comment
Share on other sites

Isn't he a science fiction author?

So?

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.