Hacker News new | past | comments | ask | show | jobs | submit login

> the actual text/content

First, the metadata is probably more interesting in most cases. Being able to map usage patterns (from the timestamp) and relationships (from the src/dst metadata) is an incredible power. This is why I am utterly amazed how with how little attention COTRAVELER has gotten. Even without section 215/etc, just letting the phone company construct a surprisingly accurate map of your life is far too tempting a power. All because you carry a transponder in your pocket.

As for the actual text, you have to pay attention to the word-games the NSA plays. The NSA has stated several times that they only record "foreign" communication. Leaked documents indicated the record the full-take of several countries (the Bahamas, etc). The trick was confirmed by Snowden explicitly in his interview with John Oliver (and hinted previously), this is referring to the wire, not the people at each end. If you data goes is routed outside of the USA, they record it. This suggests an explanation for those strange BGP attacks a while back, where all traffic to places like google.com was routed through various remote countries.




The NSA's "upstream collection" program involves copying entire datastreams (actual content) from internet hubs across America. The EFF mentions it on their main "NSA Spying" page here, https://www.eff.org/nsa-spying.


Yes, agreed. Reading the Patriot Act, in light of Snowden disclosures, makes it easy to see how they justify collecting all content from every American.

The USA Freedom Act re-authorizes the Patriot Act as is with the exception that in many cases specific selectors are needed for surveillance (and I'm sure a CSV of 300 million SSNs or millions of IP addresses would do).

Below are the sections that would expire unless the USA Freedom Act passes or they re-up the Patriot Act.

Section 201 -- Wiretapping in terrorism cases. This added crimes to the list of when wiretapping may be done. It's used to target journalists, activists, or anyone else who can be suspected of "providing material support to terrorists".

Section 202 -- Wiretapping in computer fraud and abuse felony cases. Used to harass and intimidate whistleblowers, such as Drake.

Section 203(b) -- Sharing wiretap information. Enables parallel reconstruction and lets all federal agencies share in the surveillance.

Section 203(d) -- Sharing foreign intelligence information. Like the above section but lets intel be shared with local officials. This is how you end up with local police mining Facebook chats for Occupy Wallstreet plans.

Section 204 -- FISA pen register/trap and trace exceptions. Lets NSA tap into the internet backbone. Justification for implanting malware into Xcode, cell phones, routers, etc.

Section 206 -- FISA roving wiretaps. General search warrants for companies, facilities, etc (and their millions of customers/employees/students/users).

Section 209 -- Seizure of voicemail messages pursuant to warrants. Lets voicemail content be harvested as easily as e-mail and internet traffic.

Section 212 -- Emergency disclosure of electronic surveillance. Immunity to internet/phone companies for helping run the surveillance state.

Section 214 -- FISA pen register/trap and trace authority. Lets all internet, phone lines, and devices be tapped, including inside the US.

Section 215 -- FISA access to tangible items. Like the above section but compels companies to assist in the surveillance.

Section 217 -- Interception of computer trespasser communications. Like the above section but it explicitly authorizes collecting full content.

Section 218 -- Purpose for FISA orders. Declares every American subject to surveillance, whether for petty crime, serious crime, terrorism, pre-crime, or juicy gossip.

Section 220 -- Nationwide service of search warrants for electronic evidence. Ensures that a few judges near D.C. can rubberstamp paperwork and have their orders apply anywhere in the country.

Section 223 -- Civil liability and discipline for privacy violations. This sections suggests that government liability for surveillance sunsets too.

Section 225 -- Provider immunity for FISA wiretap assistance. Immunity for all companies helping run the surveillance state.

... And in case that's not enough to go full Orwell, there's also the Intelligence Reform and Terrorism Prevention Act of 2004, which is also re-authorized in the USA Freedom Act.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: