Skip to comments.NSA Leaker: I Had Authority 'To Wiretap Anyone'
Posted on 06/09/2013 11:03:15 PM PDT by Nachum
Edward Snowden, the 29-year-old who leaked information about the NSA's data surveillance programs, said he had the authority to wiretap even the president's email if he had a personal email address.
In an interview with Glenn Greenwald the UK Guardian posted on Sunday, Snowden said while the NSA surveillance programs were at first more narrowly tailored, the agency now "specifically targets the communications of everyone" and stores them because "it's the easiest and most efficient" way to achieve their ends. He said he had the authority to wiretap nearly everyone in the United States.
(Excerpt) Read more at breitbart.com ...
Shades of Lieutenant Quarles.
This goes out to the Threat Matrix Ping List. Anyone wanting on or off, you know the routine, I think.
The sweeping up of all communications has been reported for years in multiple MSM outlets. There is so much data that only a little of it can be analyzed. Again past reporting indicated that once they located a suspect and got a warrant they’d go into the archive and start pulling everything related to that individual and follow the threads. They need the data stored because without it they can only trace future activity.
Based upon the guys reported bio I am smelling a hoax. The FISA warrant apparently accurate, but where and how he got it is open to question. Annymous, Chinese or even our gov’t could have given this guy that document and a few others. One of the goals might be able to damage our intelligence collection ability for years in the same way the Church Commission did.
>> He said he had the authority to wiretap nearly everyone in the United States.
He couldn’t possibly wiretap everyone. So he might have had the authority to wire tap “anyone” that met certain parameters.
A phenomenal diversion this has been.
thanks to this program, we are exactly one dictator short of a police state. the data is all there. only the moral character of public “servants” stands in the way of this db being used against whole factions of the people.
Who gave him the authority to wiretap nearly everyone in the US and how many people did he oversee?
The correct spelling is Leiutenant Quarles Harris Jr. (1983-03-07 to 2008-04-18), SSN 578-11-2856, dat's who!
This is all going to wash out, and the kid will go on to live his life with the recognition “he did the right thing”.
Once I shared those opinions. But the following programs
are very powerful and all encompassing.
‘. IGRAM Integrated Graphics and Multimedia Report - uses attached media, connected via hyperlinks, to enhance or clarify the information in the original serialized reports.
JDISS A tactical extension of the DODISS network that is capable of performing multiple functions and providing links to various intelligence systems and databases.
GALE Lite Generic Area Limitation Environment - A suite of tools and automated services designed to support a wide range of intelligence analysis functions.
NRTD Supplies a combined near-real-time intelligence picture derived from SIGINT and other sources to operational and intelligence customers at all levels.
OILSTOCK A high-resolution, geographic based graphics system used to display real-time and historical data over a map background.
VINTAGE HARVEST World-wide web-based analytic tool offering comprehensive information about signals to the U.S Intelligence community and second party partners.
WRANGLER Elint Database that provdes characteristics of non-communications emitters.
(this is one of my favorite concepts. TWB)
He was a sysadmin. They operate at a level below the audit trails and checks. Who knows what he could access!
Of course, he wasn't the only sysadmin, so he would have needed to be discreet.
Believe it or not, I was JUST coming back to correct that.
With the amount of information and knowledge he has on Obama and his lackeys...
I can only imagine what is being said in the stench-ridden White House right now...
Just imagine what these psychopaths are saying on the phone and to each other.
"I want him dead" was probably said at least a dozen times this evening over there.
You make reference to the constraint, "that met certain parameters."
There needs to be a mechanism in place to enforce such a constraint. My point was, sysadmins are in a position to skate right past that mechanism (part of their job is maintaining the facilities that enforce the constraint for normal employees). The only real check on sysadmins is other sysadmins.
Who knows what resources Snowden had access to? E.g., perhaps he could have recorded POTUS's conversations on a USB stick. But for how long without being noticed? And for what purpose? And for what claim to fame compared to the one he now makes?
If I were he, I'd have loaded my USB stick with the most damaging possible rosters of NSA information. Then, I'd have made copies, placed them in envelopes addressed to suitable organizations, and entrusted them to different folks with the admonition, if anything happens to me ....
>> My point was, sysadmins are in a position to skate right past that mechanism
I believe you’re overstating the omnipotent authority of this particular system administrator.
>> Who knows what resources Snowden had access to?
That’s a good question. Who knows?
I’m done for the night. FRegards!
Posted elsewhere on threads; fits here also:
Anyone who doesnt think that at some point Obama and his regime thugs wont use the data gathered by the NSA for their own nefarious reasons against individuals or groups of individuals of the opposite political party or religious groups, or pro-Israel groups, has rocks in their heads where a brain should be. The Obama thugs could pluck out info on you or me, on our entire internet lives. They would know everything, our e-mails, our bank accounts and/or credit cards, our health records, everything. Any politically oriented operative within the NSA could do this and bypass any required search warrant needed to do so by simply doing the search on an individual and surreptiously pass it on to whomever wants it, usually a political ideologue of liberal/socialist bent.
The dangers here are tremendous. The government is asking us to trust them on this data mining, that it will not be abused. We already know that the Obama regime is very willing to abuse and use govt agencies for their own political purposes. Look to the IRS spying and abuse of citizens of the opposite political party, or wrong religion in their eyes, or those with a pro-Israel bent.
Audits and grant stalling past elections to harm opposition parties from being able to organize and get their word out to educate the public on the constitution, etc., was the norm of this Obama Admin. Look at EPA bullying as a weapon by this Admin, or all the regulations being shoved down our throats, in particular affecting the business community; banks and corporations forced to become crony capitalists used by this crooked regime. Look to Obamacare and its thousands of rules and regulations that were hidden from the public and we are just now finding out what all is entailed in Obamacare.
What in heavens name would stop them from having ideologue plants spy on citizens e-mails and their backgrounds contained on the internet, basically their whole lives encapsulated therein, to use for their own politically evil intentions? I suspect they have already done this.
SCOTUS John Roberts might have been one of those whose background was looked into by the Obama regime and then used against him to blackmail him into voting for Obamacare. Well never know. But I wouldnt sit here too comfortably and agree that this massive data mining is necessary for our safety rather than using more narrow targeting of data gathering with greater restrictions on its use and how it is mined. I have zero faith in the integrity of the current govt and what they would not stoop to in order to further their political cause. We have no true safeguards. Zero.
Has to be hundreds and hundreds of contractors with his level of security on and off.
Just saying that’s how it is.
Left town/job on May 1. What happened right before that that he may have “overheard” that prompted the decision to move forward? Had he been listening in to particular government official ? There are more shoes to follow. Tomorrows meeting with congress could easily be an attempt to get ahead of it
I don’t believe him
What strikes me odd, is he’s 29 years old. How do you get such a highly sensitive job right off the bat like that?
Does obama make the threat matrix? He should be somewhere near the top.
Boy, would I love to see a dump of Obama's Blackberry. We'd learn a lot from that.
90 trillion emails are sent every year, which is about 300 million per day. How do you sort through that?
Check it out.
They are called “Super Computers” and the gov has lots of them.
With the chained super computers that the government has built. I hate to quote a bad movie but in Independence Day when the dad says, “you don’t think they paid $500 for a hammer... do you”. I bet there is a treasure trove of things that we have paid for that we know nothing about strictly used to spy on us.
Why not? We have had other whistle blowers who have said similar things in the past. Even under Clinton a few came out and said that all our phone conversations were recorded and could be reproduced. Why not electronic files? I have a good friend in computer forensics. Very little you have entered or emailed from your computer can be be erased even if you think you have reformatted.
I don’t doubt the data mining — look at the facility at Bluffdale. And all of this has been known for a decade as part of the Eschelon program.
I question this 29 year old high school dropout being given a job at NSA at $200,000/yr. And after 3 months he has unprecedented access to information.
This is all a set up.
But by whom?
Don’t know but security agencies don’t hire people with this kids background and lack thereof and then give him unprecedented access and authority.
“How do you get such a highly sensitive job right off the bat like that?”
18 year old enlistees are hired directly by the Air Force, who runs the NSA, to be in such career fields. They do the grunt work of listening and monitoring.
“He couldnt possibly wiretap everyone.”
Sure he can. The systems are setup to allow access to any stream or record. If he knows an IP address, an email address, a phone number, any data point reference at all, he can.
“, you dont think they paid $500 for a hammer... do you. “
No need to skim off hammer purchases. They have tens of billions to work with every year.
A monster of such proportion - but yes, our government is spying on American citizens.
He wasn't a lieutenant. His name was Leiutenant Quarles Harris, Jr.
Roughly the same way you sort through massive amounts of geophone data to determine where on earth to drill for oil.
Only you can print all the money you need to buy all the computational power and data storage the job requires.
-——How do you sort through that?-——
Simple, you discriminate and profile.
Then do it again.
When you find those fitting the target profile, attack.
I know. Read more.
That's the whole idea. They're using our money to digitally stalk us. And using the database that SHOULD be used to ferret out REAL threats to public safety for their own political gains. And suppressing political dissent.
Let's say it takes 10,000 steps to sort a single email into a bin for content, addressee and source. With a single 1 GHz processor that would take 1/100,000 of a second. There are 8,640,000,000 hundred-thousanths of a second in a day.
300 million would be done before lunch.
Don't like my numbers? Plug in your own.
>>What strikes me odd, is hes 29 years old. How do you get such a highly sensitive job right off the bat like that?<<
If you exhibit unusual comprehension of a task and have unique ideas on how to accomplish it you could easily find yourself in charge of the entire operation if your superiors agree with your line of thinking.
>> Roughly the same way you sort through massive amounts of geophone data to determine where on earth to drill for oil.
You’re talking about static data.
There’s no way one person can continuously receive, process, and analyze an aggregate of all the data being processed in every central office, mail server, regional routers, etc. It’s a fantasy to think that’s possible.
The NSA uses continuous indexing to find associations between things. However, a person can also query all that data and ask for specific things. Of course no person can sort through much data at all by themselves. Often queries take days or weeks to perform as all queries are queued according to priority.
Wow. Just wow.
I hope he did as you suggest here, and I hope he’s got the goods on Hillary Clinton.
She was soooo smug about stealing the FBI files, and she’s been blackmailing people ever since.
I want to see it all come back to bite her on her ample butt.