New Search

If you are not happy with the results below please do another search

118 search results for: usa purge

71

Exigent Letters

July 2002: CAU formed March 14, 2003: First exigent letter issued in NY May 2003: First contract with telecom for onsite exigent assistance March 2004: Last contract with telecom for onsite exigent assistance February 2, 2005: Operation W NSL signed; Tracker database attempted February 2006: Procedures to verify factual accuracy of FISA applications May 12, […]

Share this entry
72

Thursday: Thunder Much

It’s Thor’s Day, the Norse god of thunder’s day. This dude has a really poor selection of images available until the 20th century, and most are commercial. Doesn’t say much about his powers, does it. Speaking of powers, mine are tapped out. I have a massive, partially-completed timeline on the Flint water crisis scheduled to […]

Share this entry
73

The Reasons to Shut Down the (Domestic) Internet Dragnet: Purpose and Dissemination Limits, Correlations, and Functionality

Charlie Savage has a story that confirms (he linked some of my earlier reporting) something I’ve long argued: NSA was willing to shut down the Internet dragnet in 2011 because it could do what it wanted using other authorities. In it, Savage points to an NSA IG Report on its purge of the PRTT data that he […]

Share this entry
75

I Con the Record: Drop the Lawsuits and We’ll Release the Data Hostages

I Con the Record just announced that the NSA will make the phone dragnet data it has “analytically unavailable” after the new system goes live in November, and unavailable even to techs three months later. On June 29, 2015, the Foreign Intelligence Surveillance Court approved the Government’s application to resume the Section 215 bulk telephony metadata program […]

Share this entry
76

The Timing of the Contemplated Upstream Cyber-Grab

There’s an aspect missing thus far from the discussion of NSA’s possible bid for a cyber certification under Section 702 for primary use in the collection of attack signatures that could not be attributed to a foreign government. The timing. The discussion of creating a new Section 702 certificate came in the aftermath of the […]

Share this entry
77

NSA Reported a Section 702 Upstream Overcollection Incident in 2012

I’m working on a longer post on the timing of the NSA’s bid to get a cyber Section 702 certificate in 2012. But I wanted to point to a detail about upstream 702 collection that may be relevant to the issue. According to the 4Q FY2012 Intelligence Oversight Board report — the one covering the quarter ending September […]

Share this entry
78

Sony, the White House, and 10 Downing Street: What’s the Quid Pro Quo?

Lots of ugly things crawled out of Sony Pictures Entertainment’s emails leaked by hackers this past autumn. The leak of emails and intellectual property, including then-unreleased film The Interview, was labeled “a serious national security matter” by the White House. In January this year, President Obama issued an executive order increasing sanctions against North Korea, […]

Share this entry
79

A Guide to the 5+ Known Intelligence Community Telecommunications Metadata Dragnets

I’ve been laying this explanation out since USA Today provided new details on DEA’s International Dragnet, but it’s clear it needs to be done in more systematic fashion, because really smart people continue to mistakenly treat the Section 215 database as the analogue to the DEA dragnet described by USAT, which it’s not. There are […]

Share this entry
80

Is There a Programmatic Stingray?

The NYT yesterday had a story on the secrecy surrounding Stingrays including these admissions from an FBI affidavit to explain the secrecy. A fuller explanation of the F.B.I.’s position is provided in two publicly sworn affidavits about StingRay, including one filed in 2014 in Virginia. In the affidavit, a supervisory special agent, Bradley S. Morrison, […]

Share this entry