Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsWaPo: New documents reveal parameters of NSA’s secret surveillance programs
New documents reveal parameters of NSAs secret surveillance programs
By Ellen Nakashima, Greg Miller and Barton Gellman
<...>
Nonetheless, the documents contain a series of steps NSA takes to determine a foreigners location. Agency analysts examine leads that may come from other agencies, including from human sources. They conduct research in NSA databases, scrutinize Internet protocol addresses and target Internet links that terminate in a foreign country.
<...>
To prevent U.S. citizens and legal residents from being targeted, NSA keeps a database of phone numbers and e-mail addresses associated with people thought to be living in the United States. New requests are compared to the records on that list. Matches are considered signals to put the surveillance on hold...The document on minimization spells out rules for protecting privacy, some of which have been described publicly. The rules protect not just citizens, but foreigners in the United States.
If domestic communications contain no significant foreign intelligence information, they must be promptly destroyed. Communications concerning Americans may not be kept for more than five years.
If a target who was outside the United States enters the country, the monitoring must stop immediately.
Communications between a person under criminal indictment in the United States and his or her attorney may be preserved if they contain foreign intelligence information. The portions that do not may not be reviewed or used in any criminal prosecution. And any proposed sharing of the communications must be reviewed by the NSA general counsel first.
http://www.washingtonpost.com/world/national-security/new-documents-reveal-parameters-of-nsas-secret-surveillance-programs/2013/06/20/54248600-d9f7-11e2-a9f2-42ee3912ae0e_story.html
By Ellen Nakashima, Greg Miller and Barton Gellman
<...>
Nonetheless, the documents contain a series of steps NSA takes to determine a foreigners location. Agency analysts examine leads that may come from other agencies, including from human sources. They conduct research in NSA databases, scrutinize Internet protocol addresses and target Internet links that terminate in a foreign country.
<...>
To prevent U.S. citizens and legal residents from being targeted, NSA keeps a database of phone numbers and e-mail addresses associated with people thought to be living in the United States. New requests are compared to the records on that list. Matches are considered signals to put the surveillance on hold...The document on minimization spells out rules for protecting privacy, some of which have been described publicly. The rules protect not just citizens, but foreigners in the United States.
If domestic communications contain no significant foreign intelligence information, they must be promptly destroyed. Communications concerning Americans may not be kept for more than five years.
If a target who was outside the United States enters the country, the monitoring must stop immediately.
Communications between a person under criminal indictment in the United States and his or her attorney may be preserved if they contain foreign intelligence information. The portions that do not may not be reviewed or used in any criminal prosecution. And any proposed sharing of the communications must be reviewed by the NSA general counsel first.
http://www.washingtonpost.com/world/national-security/new-documents-reveal-parameters-of-nsas-secret-surveillance-programs/2013/06/20/54248600-d9f7-11e2-a9f2-42ee3912ae0e_story.html
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
5 replies, 1093 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (2)
ReplyReply to this post
5 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
WaPo: New documents reveal parameters of NSA’s secret surveillance programs (Original Post)
ProSense
Jun 2013
OP
Be careful ProSense, all this rational information will get the conspiracy theorists lathered up.
okaawhatever
Jun 2013
#5
kentuck
(111,069 posts)1. Those are the required parameters.
Are we to assume that the NSA obeyed the letter of the law? Do we assume the CIA would obey the letter of the law? Then i would say that we are very naive and have learned nothing from history. They are not going to make anything public that will jeopardize their secrets, their real secrets.
Logical
(22,457 posts)2. When our side is in charge no need to worry about that bad stuff happening! n-t
ProSense
(116,464 posts)3. Kick! n/t
grasswire
(50,130 posts)4. where does NSA get a database of email identities attached to names...
....and phone numbers?
okaawhatever
(9,461 posts)5. Be careful ProSense, all this rational information will get the conspiracy theorists lathered up.
The fact that it was printed in one of the two papers to reveal the story will only make it worse. Thanks for the info.