Latest NSA Leak

Latest Fun Facts Leak From NSA

Latest Fun Facts Leak From NSA

1)  The NSA generally destroys communication of U.S. persons that are collected incidental to collecting data on foreign individuals — unless the communication is encrypted, which means that encrypted email and text communications involving U.S. persons that are collected by the NSA in the course of conducting bulk collections would be retained by the agency.

It does this as a matter of course, the document appears to say, to further its research and assessment into cracking encryption. The NSA may retain the encrypted communications for “any period of time” during which it might prove to be useful.

Per the document: “In the context of a cryptanalytic effort, maintenance of technical data bases requires retention of all communications that are enciphered or reasonably believed to contain secret meaning, and sufficient duration may consist of any period of time during which encrypted material is subject to, or of use in, cryptanalysis.”

Furthermore, using the “wrong” encryption program might make you an NSA target. That’s because the National Security Agency takes a number of variables into account in determining whether it can target you for surveillance.

One indicator that you might be fair game: using “specific types of cryptology or steganography” that are “extensively used by individuals associated with a foreign power or foreign territory.”

Latest NSA Leak

image source: http://wired.com/

National Security Agency headquarters, Fort Meade, Maryland. Photo: Wikipedia

 These are some Latest Fun Facts Leak From NSA

2)  The NSA maintains a massive database of U.S. email addresses and phone numbers. The agency says it does this only to help determine who is a U.S. citizen and therefore make sure that it’s not accidentally spying on those people.

Per one of the documents, the NSA “maintains records of telephone numbers and electronic communications accounts/addresses/identifiers that NSA has reason to believe are being used by United States persons.

Prior to targeting, a particular telephone number or electronic communications account/address/identifier will be compared against those records in order to ascertain whether NSA has reason to believe that telephone number or electronic communications account/address/identifier is being used by a United States person.”

3)  If the NSA intercepts data between an attorney and client, it will still be retained, but will be marked for special handling, such that the portion of the communication related to national security is segregated from the rest of the communication.

The procedures apply, however, only when the client is known to be under criminal indictment. The rules do not mention what the NSA does if the clients are communicating with their attorneys on civil cases and other legal matters.

4)  When the NSA does pick up purely domestic communications, it can still use or pass the intercepted call or email to the FBI or other federal agencies if there is evidence of a crime or a national security leak.

Although the NSA has long been allowed by statute to refer to the FBI information collected in national security investigation if it shows evidence of a crime, this has always been presumed to refer to targeted investigations.

But it takes on new meaning in light of what we now know about the kinds of bulk collections the NSA is doing of internet communications, including of U.S. data, and raises the possibility for the government to do pattern analysis to uncover criminal activity on large sets of data.

“When you combine the ability to share evidence of a crime unrelated to foreign intelligence with the … bulk acquisition of every American’s records, you have obvious potential for the use of this to circumvent even ordinary safeguards applying to criminal investigations,” says Julian Sanchez, research fellow at the Cato Institute.

“It becomes a completely different story if you’re saying that everyone’s records are in the pool now, and you still have the ability to share information….”

5)  The NSA also maintains a database of information incidentally collected from GSM and Home Location Registers to determine when a foreign person being targeted has entered the U.S.

According to the document, “These registers receive updates whenever a GSM phone moves into a new service area. Analysis of this HLR information provides a primary indicator of a foreign user of a mobile telephone entering the United States.”

A Last fun fact: The NSA still uses magnetic tapes

Sources :  http://en.wikipedia.org/wiki, http://wired.com

83 thoughts on “Latest Fun Facts Leak From NSA

  1. For newest news you have to pay a visit world-wide-web and on the web I
    found this site as a best web page for most up-to-date
    updates.

  2. I just couldn’t leave your web site before suggesting that I really loved the standard information an individual provide to
    your guests? Is gonna be back continuously to investigate cross-check
    new posts

  3. Kickstarter funded film ‘Fool’s Day’ wins best short at Cleveland film festival.
    15 mega pixel digital camera is located on the back of the unit,
    which incorporates Autofocus and an LED flash to
    simplify the task of taking photos even in low lighting conditions.
    Consumers will definitely feel happy with operations for Push Mail, Email, MMS and SMS within the
    huge space available.

  4. Pingback: web directory
  5. Pingback: lv sale
  6. Pingback: aqui
  7. Pingback: music
  8. Pingback: Sonnenschutz
  9. Pingback: KazNMU
  10. Pingback: Hules
  11. Pingback: Naheed Ali
  12. Pingback: lv Bags Outlet
  13. Pingback: Hermes Bags Sale
  14. Pingback: Wholesale ysl Bags
  15. Pingback: lv Bags Outlet
  16. Pingback: lv Bags Outlet
  17. Pingback: Hermes Bags Sale
  18. Pingback: pet sitting naples
  19. Pingback: Green Smoke e-cigs
  20. Pingback: naples pet sitting
  21. Pingback: dior Bags Discount
  22. Pingback: Hermes Bags Sale
  23. Pingback: Hermes Bags Sale
  24. Pingback: Wholesale ysl Bags
  25. Pingback: Cheap gucci Bags
  26. Pingback: dior Bags Discount
  27. Pingback: test me
  28. Wonderful story, reckoned we could combine several unrelated information, nevertheless truly worth taking a search, whoa did a single discover about Mid East has got more problerms too

  29. Wonderful story, reckoned we could combine a number of unrelated data, nonetheless truly worth taking a look, whoa did 1 master about Mid East has got much more problerms at the same time

  30. Pingback: My Homepage
  31. Pingback: Mulberry Sale 2014

Comments are closed.