Skip to comments.How the NSA's XKeyscore program works
Posted on 08/01/2013 8:17:06 AM PDT by SoFloFreeper
click here to read article
Just start listing the terrible things about yourself:
Guns (we don’t talk about that);
“Are you now, or have you ever been, a Republican?”;
Written my Congresscritter;
the new xbox is DOA.
cloud computing is for suckers.
Bump for good hints...
But do remember to change your MAC address and avoid video cameras. And change locations often.
That story is highly exaggerated.
The truth is bad enough: Ms Catalano got visited for posting an innocuous picture of some fireworks on Facebook.
The SWAT team pic the Atlantic Wire used is also fraudulent. It was taken in Watertown, Massachusetts during the Joker Tsarnaev manhunt but is made to appear relevant.
Are you familiar with Keyscrambler? I have been using it with both IE and Firefox for several years.
The newest version, however, which expands the keyscrambling to other programs, crashed my system when I tried to install it several months ago. Now, I just use the older version because I am using the older (v 15) version of Firefox.
Yea i used to use it but use this alternative now > http://www.zemana.com/. No single security control is a panacea but, together provide “Defense in depth”.
But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
and there it is...
Save for later
Okay, so they’re collecting all this data about us. One day, when they will least expect it, all this info can be used against them, fun part is, they would have done all the work for us. Sad part is, it may not be in our lifetime.
The pendulum swings both ways.
“your phone is ALWAYS an open mic. that audio data can/will be processed and pushed through voice recognition to produce a text document to be parsed”
BS. But if you really believe that then keep your cell radio turned off. Kind of defeats the purpose though.
Thanks for posting.
Ping for later reading.
My life details are pretty boring. But for other folks I’m sure all the snooping is a real concern.
Mostly I’m sad that future generations won’t know the simple life we had in the 1960’s, ‘70’s. Maybe at some point they will get tired of the constant monitoring, pull the plug, and toss all computers and cell phones. Rebel against the virtual world and its eye on you!
everyone in government has access to all of the pictures of your colonoscopies and the brand of toilet paper you use and how much TP you use...just in case TP has to be rationed under Obamacare....
I just do all my internetting with full knowledge that Big Brother is watching.
If they ever come for me, I’m going to find a great constitutional lawyer and own a few federal facilities after all the lawsuits are said and done.
Some are but those are mostly "smart" phones waiting for voice commands.
standard phone on the desk... always on mic
smart phones... installed agent with voice2text capability that will constantly convert conversations it picks up, shipping the resultant text (and meta data) when parameters suggest