Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

NSA Leaker: I Had Authority 'To Wiretap Anyone'
Breitbart ^ | 6/9/13 | Tony Lee

Posted on 06/09/2013 11:03:15 PM PDT by Nachum

Edward Snowden, the 29-year-old who leaked information about the NSA's data surveillance programs, said he had the authority to wiretap even the president's email if he had a personal email address.

In an interview with Glenn Greenwald the UK Guardian posted on Sunday, Snowden said while the NSA surveillance programs were at first more narrowly tailored, the agency now "specifically targets the communications of everyone" and stores them because "it's the easiest and most efficient" way to achieve their ends. He said he had the authority to wiretap nearly everyone in the United States.

(Excerpt) Read more at breitbart.com ...


TOPICS: News/Current Events
KEYWORDS: 666; anyone; genius; hero; leaker; nsa; obamaspeople; terrorism; threatmatrix; tyranny; wiretap
Navigation: use the links below to view more comments.
first 1-5051 next last

1 posted on 06/09/2013 11:03:15 PM PDT by Nachum
[ Post Reply | Private Reply | View Replies]

To: LucyT; thouworm; maggief; Myrddin; shibumi; Hardraade; Candor7; Absolutely Nobama; caww; ...

Shades of Lieutenant Quarles.

This goes out to the Threat Matrix Ping List. Anyone wanting on or off, you know the routine, I think.


2 posted on 06/09/2013 11:12:55 PM PDT by MestaMachine (My caps work. You gotta earn them.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

The sweeping up of all communications has been reported for years in multiple MSM outlets. There is so much data that only a little of it can be analyzed. Again past reporting indicated that once they located a suspect and got a warrant they’d go into the archive and start pulling everything related to that individual and follow the threads. They need the data stored because without it they can only trace future activity.

Based upon the guys reported bio I am smelling a hoax. The FISA warrant apparently accurate, but where and how he got it is open to question. Annymous, Chinese or even our gov’t could have given this guy that document and a few others. One of the goals might be able to damage our intelligence collection ability for years in the same way the Church Commission did.


3 posted on 06/09/2013 11:25:15 PM PDT by airedale
[ Post Reply | Private Reply | To 1 | View Replies]

>> He said he had the authority to wiretap nearly everyone in the United States.

He couldn’t possibly wiretap everyone. So he might have had the authority to wire tap “anyone” that met certain parameters.

A phenomenal diversion this has been.


4 posted on 06/09/2013 11:34:53 PM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

thanks to this program, we are exactly one dictator short of a police state. the data is all there. only the moral character of public “servants” stands in the way of this db being used against whole factions of the people.


5 posted on 06/09/2013 11:36:27 PM PDT by dadfly
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gene Eric

Who gave him the authority to wiretap nearly everyone in the US and how many people did he oversee?


6 posted on 06/09/2013 11:41:23 PM PDT by Alaska Wolf (I)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Gene Eric; MestaMachine
"A phenomenal diversion this has been."

The IRS, Bengazhi, gun running to Syrian insurgents and Mexican gangs all have much more palpable links to the White House.

This "thing" is an abuse that predates The Usurper.

Methinks they want this in the headlines - as it is.
7 posted on 06/10/2013 12:00:38 AM PDT by shibumi (Cover it with gas and set it on fire.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: MestaMachine
Shades of Lieutenant Quarles.

The correct spelling is Leiutenant Quarles Harris Jr. (1983-03-07 to 2008-04-18), SSN 578-11-2856, dat's who!

8 posted on 06/10/2013 12:19:19 AM PDT by cynwoody
[ Post Reply | Private Reply | To 2 | View Replies]

To: shibumi

This is all going to wash out, and the kid will go on to live his life with the recognition “he did the right thing”.


9 posted on 06/10/2013 12:19:46 AM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Gene Eric
‘There is so much data that only a little of it can be analyzed.’
‘He couldn’t possibly wiretap everyone.’

Once I shared those opinions. But the following programs
are very powerful and all encompassing.

‘. IGRAM Integrated Graphics and Multimedia Report - uses attached media, connected via hyperlinks, to enhance or clarify the information in the original serialized reports.
JDISS A tactical extension of the DODISS network that is capable of performing multiple functions and providing links to various intelligence systems and databases.
GALE Lite Generic Area Limitation Environment - A suite of tools and automated services designed to support a wide range of intelligence analysis functions.
NRTD Supplies a combined near-real-time intelligence picture derived from SIGINT and other sources to operational and intelligence customers at all levels.
OILSTOCK A high-resolution, geographic based graphics system used to display real-time and historical data over a map background.
VINTAGE HARVEST World-wide web-based analytic tool offering comprehensive information about signals to the U.S Intelligence community and second party partners.
WRANGLER Elint Database that provdes characteristics of non-communications emitters.
(this is one of my favorite concepts. TWB)

http://quizlet.com/20210774/print/
TWB

10 posted on 06/10/2013 12:22:43 AM PDT by TWhiteBear (Sarah Palin...The Flame of the North)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Gene Eric
He couldn’t possibly wiretap everyone. So he might have had the authority to wire tap “anyone” that met certain parameters.

He was a sysadmin. They operate at a level below the audit trails and checks. Who knows what he could access!

Of course, he wasn't the only sysadmin, so he would have needed to be discreet.

11 posted on 06/10/2013 12:25:14 AM PDT by cynwoody
[ Post Reply | Private Reply | To 4 | View Replies]

Comment #12 Removed by Moderator

To: cynwoody; TWhiteBear
I don't mean to be disrespectful, but it is fantasy to think one guy, even with "root" access, could possibly wiretap "everyone". But that's not my concern. My point was made in the second sentence of my post:

So he might have had the authority to wire tap “anyonethat met certain parameters.

13 posted on 06/10/2013 12:40:28 AM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: cynwoody

Believe it or not, I was JUST coming back to correct that.
Thank you.


14 posted on 06/10/2013 12:48:58 AM PDT by MestaMachine (My caps work. You gotta earn them.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Nachum
Man, have we got to keep the pressure on Congress to protect this guy.

With the amount of information and knowledge he has on Obama and his lackeys...

I can only imagine what is being said in the stench-ridden White House right now...

Just imagine what these psychopaths are saying on the phone and to each other.

"I want him dead" was probably said at least a dozen times this evening over there.

15 posted on 06/10/2013 1:05:25 AM PDT by Prole
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gene Eric
So he might have had the authority to wire tap “anyonethat met certain parameters.

You make reference to the constraint, "that met certain parameters."

There needs to be a mechanism in place to enforce such a constraint. My point was, sysadmins are in a position to skate right past that mechanism (part of their job is maintaining the facilities that enforce the constraint for normal employees). The only real check on sysadmins is other sysadmins.

Who knows what resources Snowden had access to? E.g., perhaps he could have recorded POTUS's conversations on a USB stick. But for how long without being noticed? And for what purpose? And for what claim to fame compared to the one he now makes?

If I were he, I'd have loaded my USB stick with the most damaging possible rosters of NSA information. Then, I'd have made copies, placed them in envelopes addressed to suitable organizations, and entrusted them to different folks with the admonition, if anything happens to me ....

16 posted on 06/10/2013 1:08:39 AM PDT by cynwoody
[ Post Reply | Private Reply | To 13 | View Replies]

To: cynwoody

>> My point was, sysadmins are in a position to skate right past that mechanism

I believe you’re overstating the omnipotent authority of this particular system administrator.

>> Who knows what resources Snowden had access to?

That’s a good question. Who knows?

I’m done for the night. FRegards!


17 posted on 06/10/2013 1:16:48 AM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Gene Eric

Posted elsewhere on threads; fits here also:

Anyone who doesn’t think that at some point Obama and his regime thugs won’t use the data gathered by the NSA for their own nefarious reasons against individuals or groups of individuals of the opposite political party or religious groups, or pro-Israel groups, has rocks in their heads where a brain should be. The Obama thugs could pluck out info on you or me, on our entire internet lives. They would know everything, our e-mails, our bank accounts and/or credit cards, our health records, everything. Any politically oriented operative within the NSA could do this and bypass any required search warrant needed to do so by simply doing the search on an individual and surreptiously pass it on to whomever wants it, usually a political ideologue of liberal/socialist bent.

The dangers here are tremendous. The government is asking us to trust them on this data mining, that it will not be abused. We already know that the Obama regime is very willing to abuse and use gov’t agencies for their own political purposes. Look to the IRS spying and abuse of citizens of the opposite political party, or wrong religion in their eyes, or those with a pro-Israel bent.

Audits and grant stalling past elections to harm opposition parties from being able to organize and get their word out to educate the public on the constitution, etc., was the norm of this Obama Admin. Look at EPA bullying as a weapon by this Admin, or all the regulations being shoved down our throats, in particular affecting the business community; banks and corporations forced to become crony capitalists used by this crooked regime. Look to Obamacare and its thousands of rules and regulations that were hidden from the public and we are just now finding out what all is entailed in Obamacare.

What in heaven’s name would stop them from having ideologue plants spy on citizens’ e-mails and their backgrounds contained on the internet, basically their whole lives encapsulated therein, to use for their own politically evil intentions? I suspect they have already done this.

SCOTUS John Roberts might have been one of those whose background was looked into by the Obama regime and then used against him to blackmail him into voting for Obamacare. We’ll never know. But I wouldn’t sit here too comfortably and agree that this massive data mining is necessary for our safety rather than using more narrow targeting of data gathering with greater restrictions on its use and how it is mined. I have zero faith in the integrity of the current gov’t and what they would not stoop to in order to further their political cause. We have no true safeguards. Zero.


18 posted on 06/10/2013 2:22:27 AM PDT by flaglady47 (When the gov't fears the people, liberty; When the people fear the gov't, tyranny.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: cynwoody

Has to be hundreds and hundreds of contractors with his level of security on and off.

Just saying that’s how it is.


19 posted on 06/10/2013 2:25:38 AM PDT by Monty22002
[ Post Reply | Private Reply | To 11 | View Replies]

To: maggief

Left town/job on May 1. What happened right before that that he may have “overheard” that prompted the decision to move forward? Had he been listening in to particular government official ? There are more shoes to follow. Tomorrows meeting with congress could easily be an attempt to get ahead of it


20 posted on 06/10/2013 2:58:56 AM PDT by hoosiermama (Obama: "Born in Kenya" Lying now or then!)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Nachum
Here are 185 examples of Barack Obama’s lying, lawbreaking, corruption, cronyism, etc.
21 posted on 06/10/2013 3:10:35 AM PDT by grundle
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

I don’t believe him


22 posted on 06/10/2013 4:01:54 AM PDT by Uncle Chip
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

What strikes me odd, is he’s 29 years old. How do you get such a highly sensitive job right off the bat like that?


23 posted on 06/10/2013 4:19:12 AM PDT by visualops (artlife.us)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MestaMachine

Does obama make the threat matrix? He should be somewhere near the top.


24 posted on 06/10/2013 4:41:46 AM PDT by gotribe (Limit The Government's Right To Bear Arms)
[ Post Reply | Private Reply | To 2 | View Replies]

To: hoosiermama
May the 1st is a big commie calibrations day throughout the whole Commie world.... MAY DAY CELEBRATION.
25 posted on 06/10/2013 5:04:57 AM PDT by American Constitutionalist
[ Post Reply | Private Reply | To 20 | View Replies]

To: Nachum
"... he had the authority to wiretap even the president's email ..."

Boy, would I love to see a dump of Obama's Blackberry. We'd learn a lot from that.

26 posted on 06/10/2013 5:24:51 AM PDT by Paine in the Neck (Socialism consumes everything. Bolshies' gonna bolsh.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

90 trillion emails are sent every year, which is about 300 million per day. How do you sort through that?


27 posted on 06/10/2013 5:56:08 AM PDT by sergeantdave (No, I don't have links for everything I post)
[ Post Reply | Private Reply | To 1 | View Replies]

To: gotribe

http://www.freerepublic.com/focus/f-news/2980615/posts

Check it out.


28 posted on 06/10/2013 6:32:05 AM PDT by MestaMachine (My caps work. You gotta earn them.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: sergeantdave

They are called “Super Computers” and the gov has lots of them.


29 posted on 06/10/2013 6:48:58 AM PDT by Scarlet Pimpernel (And what rough beast, its hour come round at last, Slouches towards Bethlehem to be born?)
[ Post Reply | Private Reply | To 27 | View Replies]

To: sergeantdave

With the chained super computers that the government has built. I hate to quote a bad movie but in Independence Day when the dad says, “you don’t think they paid $500 for a hammer... do you”. I bet there is a treasure trove of things that we have paid for that we know nothing about strictly used to spy on us.


30 posted on 06/10/2013 6:51:20 AM PDT by Resolute Conservative
[ Post Reply | Private Reply | To 27 | View Replies]

To: Uncle Chip
"I don’t believe him"

Why not? We have had other whistle blowers who have said similar things in the past. Even under Clinton a few came out and said that all our phone conversations were recorded and could be reproduced. Why not electronic files? I have a good friend in computer forensics. Very little you have entered or emailed from your computer can be be erased even if you think you have reformatted.

31 posted on 06/10/2013 7:04:58 AM PDT by Nachum (The Obama "List" at www.nachumlist.com)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Nachum

I don’t doubt the data mining — look at the facility at Bluffdale. And all of this has been known for a decade as part of the Eschelon program.

I question this 29 year old high school dropout being given a job at NSA at $200,000/yr. And after 3 months he has unprecedented access to information.

Please —

This is all a set up.


32 posted on 06/10/2013 7:15:58 AM PDT by Uncle Chip
[ Post Reply | Private Reply | To 31 | View Replies]

To: Uncle Chip
'This is all a set up.'

But by whom?

33 posted on 06/10/2013 7:29:12 AM PDT by Nachum (The Obama "List" at www.nachumlist.com)
[ Post Reply | Private Reply | To 32 | View Replies]

To: Nachum

Don’t know but security agencies don’t hire people with this kids background and lack thereof and then give him unprecedented access and authority.


34 posted on 06/10/2013 7:34:21 AM PDT by Uncle Chip
[ Post Reply | Private Reply | To 33 | View Replies]

To: visualops

“How do you get such a highly sensitive job right off the bat like that?”

18 year old enlistees are hired directly by the Air Force, who runs the NSA, to be in such career fields. They do the grunt work of listening and monitoring.


35 posted on 06/10/2013 7:36:28 AM PDT by CodeToad (Liberals are bloodsucking ticks. We need to light the matchstick to burn them off. -786 +969)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Gene Eric

“He couldn’t possibly wiretap everyone.”

Sure he can. The systems are setup to allow access to any stream or record. If he knows an IP address, an email address, a phone number, any data point reference at all, he can.


36 posted on 06/10/2013 7:37:43 AM PDT by CodeToad (Liberals are bloodsucking ticks. We need to light the matchstick to burn them off. -786 +969)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Resolute Conservative

“, “you don’t think they paid $500 for a hammer... do you”. “

No need to skim off hammer purchases. They have tens of billions to work with every year.


37 posted on 06/10/2013 7:39:52 AM PDT by CodeToad (Liberals are bloodsucking ticks. We need to light the matchstick to burn them off. -786 +969)
[ Post Reply | Private Reply | To 30 | View Replies]

To: MestaMachine
The more we do to you, the less you seem to believe we are doing it - - Josef Mengele

A monster of such proportion - but yes, our government is spying on American citizens.

38 posted on 06/10/2013 7:50:51 AM PDT by GOPJ (The more we do to you, the less you seem to believe we are doing it - Josef Mengele (new NSA motto))
[ Post Reply | Private Reply | To 2 | View Replies]

To: MestaMachine
Shades of Lieutenant(sic) Quarles.

He wasn't a lieutenant. His name was Leiutenant Quarles Harris, Jr.

39 posted on 06/10/2013 7:56:04 AM PDT by Alaska Wolf (I)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Gene Eric
He couldn’t possibly wiretap everyone.

Why?

40 posted on 06/10/2013 7:59:45 AM PDT by null and void (Republicans create the tools of opression, and the democrats gleefully use them!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: sergeantdave
90 trillion emails are sent every year, which is about 300 million per day. How do you sort through that?

Roughly the same way you sort through massive amounts of geophone data to determine where on earth to drill for oil.

Only you can print all the money you need to buy all the computational power and data storage the job requires.

41 posted on 06/10/2013 8:07:08 AM PDT by null and void (Republicans create the tools of opression, and the democrats gleefully use them!)
[ Post Reply | Private Reply | To 27 | View Replies]

To: sergeantdave

-——How do you sort through that?-——

Simple, you discriminate and profile.

Then do it again.

When you find those fitting the target profile, attack.


42 posted on 06/10/2013 8:10:09 AM PDT by bert ((K.E. N.P. N.C. +12 ..... Who will shoot Liberty Valence?)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Alaska Wolf

I know. Read more.


43 posted on 06/10/2013 8:13:54 AM PDT by MestaMachine (My caps work. You gotta earn them.)
[ Post Reply | Private Reply | To 39 | View Replies]

To: null and void
"Only you can print all the money you need to buy all the computational power and data storage the job requires."

That's the whole idea. They're using our money to digitally stalk us. And using the database that SHOULD be used to ferret out REAL threats to public safety for their own political gains. And suppressing political dissent.

44 posted on 06/10/2013 8:16:01 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 41 | View Replies]

To: sergeantdave
90 trillion emails are sent every year, which is about 300 million per day. How do you sort through that?

Let's say it takes 10,000 steps to sort a single email into a bin for content, addressee and source. With a single 1 GHz processor that would take 1/100,000 of a second. There are 8,640,000,000 hundred-thousanths of a second in a day.

300 million would be done before lunch.

Don't like my numbers? Plug in your own.

45 posted on 06/10/2013 8:22:46 AM PDT by null and void (Republicans create the tools of opression, and the democrats gleefully use them!)
[ Post Reply | Private Reply | To 27 | View Replies]

To: visualops; Uncle Chip

>>What strikes me odd, is he’s 29 years old. How do you get such a highly sensitive job right off the bat like that?<<

If you exhibit unusual comprehension of a task and have unique ideas on how to accomplish it you could easily find yourself in charge of the entire operation if your superiors agree with your line of thinking.


46 posted on 06/10/2013 9:53:32 AM PDT by B4Ranch (AGENDA: Grinding America Down ----- http://vimeo.com/63749370)
[ Post Reply | Private Reply | To 23 | View Replies]

To: null and void; sergeantdave; CodeToad

>> Roughly the same way you sort through massive amounts of geophone data to determine where on earth to drill for oil.

You’re talking about static data.

There’s no way one person can continuously receive, process, and analyze an aggregate of all the data being processed in every central office, mail server, regional routers, etc. It’s a fantasy to think that’s possible.


47 posted on 06/10/2013 11:53:02 AM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Gene Eric

The NSA uses continuous indexing to find associations between things. However, a person can also query all that data and ask for specific things. Of course no person can sort through much data at all by themselves. Often queries take days or weeks to perform as all queries are queued according to priority.


48 posted on 06/10/2013 11:55:19 AM PDT by CodeToad (Liberals are bloodsucking ticks. We need to light the matchstick to burn them off. -786 +969)
[ Post Reply | Private Reply | To 47 | View Replies]

To: Gene Eric
Do you seriously think it has to be one person??????

Wow. Just wow.

49 posted on 06/10/2013 11:59:40 AM PDT by null and void (Republicans create the tools of opression, and the democrats gleefully use them!)
[ Post Reply | Private Reply | To 47 | View Replies]

To: cynwoody

I hope he did as you suggest here, and I hope he’s got the goods on Hillary Clinton.

She was soooo smug about stealing the FBI files, and she’s been blackmailing people ever since.

I want to see it all come back to bite her on her ample butt.


50 posted on 06/10/2013 12:04:44 PM PDT by miserare
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first 1-5051 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson