BOUNDLESS INFORMANT, Project Bullrun, PRISM, TAR, Snowden TED Speech, Documents

BOUNDLESS INFORMANT, Project Bullrun, PRISM, Snowden TED Speech

File:Doc01187820130608104742-1.jpghttps://i0.wp.com/upload.wikimedia.org/wikipedia/commons/5/5c/Boundless-heatmap-large-001.jpghttps://i0.wp.com/upload.wikimedia.org/wikipedia/commons/8/85/Image-526202-galleryV9-ppub.jpg

File:Doc01187820130608104742-2.jpg

File:Doc01187820130608104742-3.jpg

File:Doc01187820130608104742-4.jpg

https://i0.wp.com/cdn.thenextweb.com/wp-content/blogs.dir/1/files/2013/09/NSA-diagram-001.jpg

http://i2.wp.com/codigoespagueti.com/wp-content/uploads/2013/09/NSA-Bullrun-1-001.jpg

https://i0.wp.com/static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/9/5/1378396354932/NSA-Bullrun-2-001.jpg

https://i0.wp.com/upload.wikimedia.org/wikipedia/commons/thumb/f/fb/Classification_guide_for_Project_BULLRUN.pdf/page1-463px-Classification_guide_for_Project_BULLRUN.pdf.jpg

Bullrun, another US program for massive surveillance. Snowden‘s revelations represented a heartquake for IT securityThe extension of US surveillance activities seems to have no limits neither borderlines, every communication and data despite protected with sophisticated encryption mechanisms were accessible by US Intelligence and its partners like Britain’s GCHQ.

https://i0.wp.com/www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/10/NSA%20google%202_0.jpg

PRISM

https://i0.wp.com/static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/6/6/1370557489060/Prism-008.jpg

https://i0.wp.com/static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/6/6/1370553948414/Prism-001.jpg

PRISM slide crop

File:Prism-slide-6.jpg

File:Prism-slide-7.jpg

File:Prism-slide-8.jpg

File:Prism-slide-9.jpg

File:Prism-week-in-life-straight.png

File:Upstream-slide.jpg

File:Prism slide 2.jpg

https://i0.wp.com/www.independent.co.uk/incoming/article8914139.ece/BINARY/original/pg-2-nsa-hacking-graphic.jpg

https://i0.wp.com/www.washingtonpost.com/rf/image_606w/2010-2019/WashingtonPost/2013/08/16/National-Security/Graphics/updated_2_NSA_breaches16_606.jpg

TAR – Targeting Rationale

When NSA analysts want to “task” new collections or search an existing database, they are required to fill out a form that includes their “targeting rationale.” The rationale is provided for oversight by the Justice Department and the office of the Director of National Intelligence when NSA personnel use the powers that Congress gave them in the FISA Amendments Act of 2008. This document tells NSA analysts how to explain their targeting decisions without giving “extraneous information” to “our FAA overseers.”

Analysts are specifically warned that they “MUST NOT” provide the evidence on which they base their “reasonable articulable suspicion” that a target will produce valid foreign intelligence. They are also forbidden to disclose the “selectors,” or search terms, they plan to use. In examples that draw on actual searches, the document shows how to strip out details and substitute generic descriptions.

A senior intelligence official said in an interview that this form provides only the “headline” and that the document should not be misread to suggest that the NSA is hiding anything from its outside auditors. Particulars are available on request, the official said, by supervisors at the Justice Department and the office of the Director of National Intelligence, and those offices often delve deeply into the details. The official acknowledged that the details are not included in reports to Congress or the Foreign Intelligence Surveillance Court.

TAR – Targeting Rationale

Key Below images.

https://i0.wp.com/upload.wikimedia.org/wikipedia/commons/thumb/c/cc/Target-analyst-rationale-instructions-final.pdf/page1-2083px-Target-analyst-rationale-instructions-final.pdf.jpg
https://i0.wp.com/upload.wikimedia.org/wikipedia/commons/thumb/c/cc/Target-analyst-rationale-instructions-final.pdf/page3-2083px-Target-analyst-rationale-instructions-final.pdf.jpghttps://i0.wp.com/upload.wikimedia.org/wikipedia/commons/thumb/c/cc/Target-analyst-rationale-instructions-final.pdf/page4-2083px-Target-analyst-rationale-instructions-final.pdf.jpg

FVEY

This refers to the “Five Eyes” intelligence partnership, which includes the NSA’s counterparts in Canada, the United Kingdom, Australia and New Zealand.

FAA

The FISA Amendments Act of 2008, which was renewed in 2012.

RAGTIME

RAGTIME is the cover name for collection in the United States in operations that began with the Bush administration’s warrantless surveillance program and have since been authorized by Congress and the Foreign Intelligence Surveillance Court.

UTT

Unified Targeting Tool is one of the many graphical front ends for requesting new intelligence collection or querying databases of previously collected data.

Octave

Octave is another graphical front end for requesting new intelligence collection or querying databases of previously collected data.

“Five Eyes” agreement between Australia, Canada, New Zealand, the UK, and the US. It had a non-adversarial court system designed to rubber-stamp requests, and it had defeated all corporate attempts to block access to said data. The only lasting effect of warrantless wiretapping was Congress passing a law to grant retroactive immunity to the companies involved.

MUSCULAR

https://i0.wp.com/cdn.arstechnica.net/wp-content/uploads/2013/10/muscular-640x420.png

 Google Data Centers:

Google Datacenter When legal surveillance isn’t enough: NSA hacked the fiber optic links between Google, Yahoo datacenters

The NSA’s principal tool to exploit the Google and Yahoo data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, GCHQ. The Post said NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants.
https://i0.wp.com/media-cache-cd0.pinimg.com/736x/b3/82/63/b38263d4d27ce55904ca7b4cc35d0f80.jpg

http://tedconfblog.files.wordpress.com/2014/03/ted2014_rl_2r9b40931.jpg?w=900&h=600

SEE ALSO:

Snowden Leaks MYSTIC NSA Surveillance System

Edward Snowden details contain TURBINE, other surveillance technology

JTRIG Leaks Part 1

How To Stop NSA Spying