BOUNDLESS INFORMANT, Project Bullrun, PRISM, Snowden TED Speech
Bullrun, another US program for massive surveillance. Snowden‘s revelations represented a heartquake for IT securityThe extension of US surveillance activities seems to have no limits neither borderlines, every communication and data despite protected with sophisticated encryption mechanisms were accessible by US Intelligence and its partners like Britain’s GCHQ.
TAR – Targeting Rationale
When NSA analysts want to “task” new collections or search an existing database, they are required to fill out a form that includes their “targeting rationale.” The rationale is provided for oversight by the Justice Department and the office of the Director of National Intelligence when NSA personnel use the powers that Congress gave them in the FISA Amendments Act of 2008. This document tells NSA analysts how to explain their targeting decisions without giving “extraneous information” to “our FAA overseers.”
Analysts are specifically warned that they “MUST NOT” provide the evidence on which they base their “reasonable articulable suspicion” that a target will produce valid foreign intelligence. They are also forbidden to disclose the “selectors,” or search terms, they plan to use. In examples that draw on actual searches, the document shows how to strip out details and substitute generic descriptions.
A senior intelligence official said in an interview that this form provides only the “headline” and that the document should not be misread to suggest that the NSA is hiding anything from its outside auditors. Particulars are available on request, the official said, by supervisors at the Justice Department and the office of the Director of National Intelligence, and those offices often delve deeply into the details. The official acknowledged that the details are not included in reports to Congress or the Foreign Intelligence Surveillance Court.
TAR – Targeting Rationale
Key Below images.
This refers to the “Five Eyes” intelligence partnership, which includes the NSA’s counterparts in Canada, the United Kingdom, Australia and New Zealand.
The FISA Amendments Act of 2008, which was renewed in 2012.
RAGTIME is the cover name for collection in the United States in operations that began with the Bush administration’s warrantless surveillance program and have since been authorized by Congress and the Foreign Intelligence Surveillance Court.
Unified Targeting Tool is one of the many graphical front ends for requesting new intelligence collection or querying databases of previously collected data.
Octave is another graphical front end for requesting new intelligence collection or querying databases of previously collected data.
“Five Eyes” agreement between Australia, Canada, New Zealand, the UK, and the US. It had a non-adversarial court system designed to rubber-stamp requests, and it had defeated all corporate attempts to block access to said data. The only lasting effect of warrantless wiretapping was Congress passing a law to grant retroactive immunity to the companies involved.