![]() it appears this database is being used so that when they learn that someone is suspicious they want to quickly see who that person was talking to and who was talking to those people without having to go back to the phone companies and present individual orders and that would slow down the process and/or maybe the phone companies would have disposed of the data after some time for their own business purposes. but that doesn't mean that what they're saying to people is being eavesdropped upon. ordinary people's calls are being logged in here. not the contents of those calls but this number called that number at such and such a date from such and such a location. what this appears to be doing isĪssembling a giant library of calls made inside the united states and calls made between the united states and abroad. and that involves the calling log data that siobhan was just referring to from sprint and verizon and at&t. > well, so he's referring specifically to the first of these now three major intelligence disclosures over the last three days. explain what - what is going on in the search for data. > brown: charlie, we heard the president say "no one is listening to your calls." so flesh this out a bit. i mean, it may be the kind of thing that - something they do periodically for different purposes. > brown: you're saying, though, it's not clear whether that program continues. the intelligence officials pick up in the course of their terrorism investigation. but in this case it's just being used to collect as much information as possible to balance it against leads and things like that. > brown: shiv sean, we also learned today that the data collection program on the phone call which is first came outĪs have lots of different types of information from data brokers which you can - one can buy, you can buy it for direct marketing purposes. and so what prism seems to be is the manifestation of that program that's called 702 orders in the world - this universe, going to internet companies, at least nine of them, who are participating in the program by, when being presented with these orders and requests under them, turning over information about e-mails and other electronic traffic that they have about the overseas targets and the people they're communicating with. that would include e-mails to and from those people, even if they were communicating with people inside the united states. ![]() you could get a basket surveillance order that would be good for up to a year aimed at, say, surveilled suspecting al qaeda targets in pakistan. Authority and an element of that was that surveillance aims at foreigners overseas did not need to have individualized warrants even if that collection was taking place on u.s.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |