The National Security Agency has acknowledged in a new classified briefing that it does not need court authorization to listen to domestic phone calls.
Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed “simply based on an analyst deciding that.”
If the NSA wants “to listen to the phone,” an analyst’s decision is sufficient, without any other legal authorization required, Nadler said he learned. “I was rather startled,” said Nadler, an attorney and congressman who serves on the House Judiciary committee…
Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said. [We documented Tuesday that the government is illegally spying on all Americans … and then giving the info to giant corporations.]
These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden ….
Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.
Along with the NSA, the Central Intelligence Agency, the Federal Bureau of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords….
The information provided by Snowden also exposed a secret NSA program known as Blarney. As the program was described in the Washington Post (WPO), the agency gathers metadata on computers and devices that are used to send e-mails or browse the Internet through principal data routes, known as a backbone.
That metadata includes which version of the operating system, browser and Java software are being used on millions of devices around the world, information that U.S. spy agencies could use to infiltrate those computers or phones and spy on their users.
“It’s highly offensive information,” said Glenn Chisholm, the former chief information officer for Telstra Corp (TLS)., one of Australia’s largest telecommunications companies, contrasting it to defensive information used to protect computers rather than infiltrate them….
WARNING: The National Security Agency is likely recording and storing this communication as part of its unlawful spying programs on all Americans … and people worldwide. The people who created the NSA spying program say that this communication – and any responses – can and will be used against the American people at any time in the future should folks in government decide to go after us for political reasons. And private information in digital communications may be given to big companies by the government.
I put this in the “genocide/democide” category due to the utility of this program in carrying out an orderly extermination of “undesireables,” which would include pretty much everyone with an independent thought in his/her head. Dissolution of national boundaries (the “north american union” for instance) requires an erasure of the historical knowledge that gives rise to national identity. No wonder the secret government supported the khmer rouge experiment in cambodia. They want to start with a clean slate. A lobotomy of human history and civilization is what they’re preparing for. Why not? Obviously they can afford it as long as we believe their funny money has value. They’re only taking possession of what we’ve voluntarily given them by borrowing our entire economy into existence.