{"id":57127,"date":"2013-08-08T18:36:46","date_gmt":"2013-08-08T17:36:46","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/breaking-news\/nsa-not-spying-on-americans-just-overcollecting-their-data\/57127\/"},"modified":"2013-08-08T20:33:06","modified_gmt":"2013-08-08T19:33:06","slug":"nsa-not-spying-on-americans-just-overcollecting-their-data","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/latest-news\/nsa-not-spying-on-americans-just-overcollecting-their-data\/","title":{"rendered":"NSA not \u2018spying\u2019 on Americans, just \u2018overcollecting\u2019 their data"},"content":{"rendered":"<p>An NSA source has admitted the agency\u2019s data collection technology makes it impossible to intercept communication with foreigners without gathering data on US citizens. This counters Obama\u2019s claim that US surveillance only concerns \u2018terrorist threats.\u2019<\/p>\n<p>A senior official at the National Security Agency anonymously<br \/>\nexplained the process to The New York Times, broadly confirming<br \/>\nthe revelations about US spying mechanisms leaked by Edward<br \/>\nSnowden in previous weeks.<\/p>\n<p>According to Foreign Intelligence Surveillance Act (FISA)<br \/>\nregulations from 2008, the NSA is only allowed to track<br \/>\ncommunication between foreign suspects, or a foreigner and an<br \/>\nAmerican, without a warrant. Collecting data exchanged between US<br \/>\ncitizens that way is illegal.<\/p>\n<p>But it appears to be impossible to filter out data relevant to a<br \/>\nparticular suspect in real-time without capturing a much larger<br \/>\nflow of information passing through the world\u2019s communication<br \/>\ncables, as data parcels are fractured and need to be copied whole<br \/>\nbefore being pieced together.<\/p>\n<p>This data includes communication between non-suspect US citizens,<br \/>\nalthough accessing such correspondence is illegal.<\/p>\n<p>The needed information concerning legitimate foreign suspects is<br \/>\npicked out from the mass with what the source called a <i>\u201cvery<br \/>\nprecise\u201d<\/i> \u2018selector\u2019 &#8211; an email address, name or some other<br \/>\nform of identifier pertinent to a suspect. Then, a <i>\u201cclone of<br \/>\nselected communication links\u201d<\/i> such as emails or internet<br \/>\nbrowsing histories is made. It is then stored and distributed to<br \/>\nother agencies for further investigation.<\/p>\n<p>The rest of the information is discarded, according to the<br \/>\n<a href=\"http:\/\/www.nytimes.com\/2013\/08\/08\/us\/broader-sifting-of-data-abroad-is-seen-by-nsa.html?hp&amp;pagewanted=all\" target=\"_blank\">source<\/a>. He added that since the overall<br \/>\namount of data gathered is so huge, it can only be stored for a<br \/>\nlimited time \u2014 so <i>\u201cretrospective searches\u201d<\/i> are not<br \/>\npossible. Snowden\u2019s records indicated the storage period to be up<br \/>\nto three days.<\/p>\n<p>But the NSA insider admitted that illegal American data is<br \/>\ngathered not only at the initial stage, but is sometimes<br \/>\n<i>\u201cinadvertently collected\u201d<\/i> after the filter is applied<br \/>\n(picture it as a very precise Google search that nevertheless<br \/>\nproduces accidental results). After presumably being illegally<br \/>\nexamined by an NSA agent, this data is removed within \u201c<i>a small<br \/>\nnumber of seconds<\/i>.\u201d<\/p>\n<p>The NSA employee claimed that such <i>\u201covercollection\u201d<\/i> of US<br \/>\ndata occurs routinely, but is regularly reported to overseers,<br \/>\nand the \u2018selector\u2019 search mechanisms are modified to produce<br \/>\nresults more relevant to catching actual terror suspects.<\/p>\n<p>In response to the revelations, NSA spokesperson Judith A. Emmel<br \/>\ntold The Times that the agency <i>\u201ccollects only what it is<br \/>\nexplicitly authorized to collect,\u201d<\/i> and that its targets are<br \/>\n<i>\u201cforeign powers and their agents, foreign organizations,<br \/>\nforeign persons or international terrorists.\u201d<\/i><\/p>\n<p><img decoding=\"async\" alt=\"National Security Agency(NSA) at Fort Meade, Maryland (AFP Photo)\" src=\"http:\/\/admin.rt.com\/files\/news\/20\/0a\/30\/00\/2.jpg\" \/><\/p>\n<p>Earlier this week, Obama also staunchly defended the NSA.<\/p>\n<p>\u201c<i>We don&#8217;t have a domestic spying program. What we do have are<br \/>\nsome mechanisms where we can track a phone number or an email<br \/>\naddress that we know is connected to some sort of terrorist<br \/>\nthreat,\u201d<\/i> the President said on the Tonight Show.<\/p>\n<p>The validity of those statements seems to hinge on a somewhat<br \/>\nnarrow and self-defined meaning of what it is to \u201c<i>collect<\/i>\u201d<br \/>\ndata and to <i>\u201ctarget.\u201d<\/i><\/p>\n<p>Assuming that NSA agents work exclusively in good faith and never<br \/>\nbreak regulations, it is plausible that they \u201c<i>collect<\/i>\u201d<br \/>\nonly information from suspects, and that US individuals are never<br \/>\n\u201c<i>targeted<\/i>.\u201d That is, their names are never typed in as<br \/>\n\u2018selectors.\u2019<\/p>\n<p>But in a more general way, it is also clear that even the most<br \/>\nhonest-minded NSA staff will possess information relating to<br \/>\nmillions of innocent Americans, which they are not legally<br \/>\nallowed to read, and that occasionally this information will be<br \/>\naccessed on a routine basis &#8211; without any legal or practical<br \/>\nsupervision.<\/p>\n<p>Republished from: <a title=\"NSA not \u2018spying\u2019 on Americans, just \u2018overcollecting\u2019 their data\" href=\"http:\/\/rt.com\/usa\/nsa-snowden-xkeyscore-overcollection-235\/\" target=\"_blank\">RT<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An NSA source has admitted the agency\u00e2\u20ac\u2122s data collection technology makes it impossible to intercept communication with foreigners without gathering data on US citizens. This counters Obama\u00e2\u20ac\u2122s claim that US surveillance only concerns \u00e2\u20ac\u02dcterrorist threats.\u00e2\u20ac\u2122<\/p>\n","protected":false},"author":1,"featured_media":57128,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487,18],"tags":[],"class_list":{"0":"post-57127","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-breaking-news","8":"category-latest-news"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/57127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=57127"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/57127\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/57128"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=57127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=57127"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=57127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}