{"id":68310,"date":"2015-12-28T12:00:03","date_gmt":"2015-12-28T12:00:03","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=68310"},"modified":"2015-12-28T05:24:45","modified_gmt":"2015-12-28T05:24:45","slug":"surveillance-techniques-how-your-data-becomes-our-data","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/12\/surveillance-techniques-how-your-data-becomes-our-data\/","title":{"rendered":"Surveillance Techniques: How Your Data Becomes Our Data"},"content":{"rendered":"<p style=\"text-align: left;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-banner-world-spying-surveillance-big-brother.jpg\"  rel=\"attachment wp-att-68318\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68318\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-banner-world-spying-surveillance-big-brother.jpg\" alt=\"nsa-banner-world spying surveillance big brother\" width=\"630\" height=\"164\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-banner-world-spying-surveillance-big-brother.jpg 630w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-banner-world-spying-surveillance-big-brother-300x78.jpg 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">In 2001, NSA published the secret &#8220;<a target=\"_blank\" href=\"https:\/\/www.eff.org\/files\/filenode\/December%202000%20Transition%20nsa25.pdf\" >Transition 2001<\/a>&#8221; report defining our strategy for the 21st century. No longer could we simply access analog communications using conventional means, the new digital world of globally-networked encrypted communications required a dramatic change to our surveillance strategy: <strong><em>NSA would need to &#8220;live on the network&#8221;<\/em><\/strong>.<\/p>\n<p style=\"text-align: left;\">We&#8217;ve turned our nation&#8217;s Internet and telecommunications companies into collection partners by installing filters in their facilities, serving them with secret court orders, building back doors into their software and acquiring keys to break their encryption.<\/p>\n<p style=\"text-align: left;\"><strong>Our Domestic Intercept Stations<\/strong><\/p>\n<p style=\"text-align: left;\">NSA technicians have installed intercept stations at key junction points, or switches, throughout the country. These switches are located in large windowless buildings owned by the major telecommunication companies and control the domestic internet traffic flow across the nation. A fiber optic splitter is placed on the incoming communication lines and routes the traffic to an NSA intercept station for processing.<\/p>\n<p style=\"text-align: left;\"><a target=\"_blank\" href=\"http:\/\/ixmaps.ca\/cgi-bin\/tr-query.cgi?query_type=traceroute_id&amp;arg=1859\" >View a sample route<\/a> that internet data traverses from a home in Toronto to the San Francisco Art Institute passing through several NSA intercept stations.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-spy-machine-surveillance-phone-big-brother.jpg\"  rel=\"attachment wp-att-68311\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-68311\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-spy-machine-surveillance-phone-big-brother.jpg\" alt=\"nsa-spy-machine surveillance phone big brother\" width=\"700\" height=\"700\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-spy-machine-surveillance-phone-big-brother.jpg 700w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-spy-machine-surveillance-phone-big-brother-150x150.jpg 150w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-spy-machine-surveillance-phone-big-brother-300x300.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p style=\"text-align: left;\"><a target=\"_blank\" href=\"https:\/\/nsa.gov1.info\/surveillance\/nsa-surveillance-map-lg.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-68313\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-surveillance-map-spy-phone-usa-big-brother.jpg\" alt=\"nsa-surveillance-map spy phone usa big brother\" width=\"700\" height=\"401\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-surveillance-map-spy-phone-usa-big-brother.jpg 924w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-surveillance-map-spy-phone-usa-big-brother-300x172.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/12\/nsa-surveillance-map-spy-phone-usa-big-brother-768x440.jpg 768w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/>Larger version of map <\/a><\/p>\n<h4 style=\"text-align: left;\"><a target=\"_blank\" href=\"http:\/\/www.aclu.org\/files\/pdfs\/eavesdropping101.pdf\" >More information about this map<\/a><\/h4>\n<h4 style=\"text-align: left;\">Bulk Collection of U.S. Citizens&#8217; Phone Records<\/h4>\n<p style=\"text-align: left;\">In the past, we used our close partnership with the FBI to collect bulk telephone records on an ongoing basis using a <a target=\"_blank\" href=\"https:\/\/nsa.gov1.info\/dni\/index.html#fisa\" >Top Secret order<\/a> from the Foreign Intelligence Surveillance Court (FISA). The metadata we collected from this program gave us information about what communications you sent and received, who you talked to, where you were when you talked to them, the lengths of your conversations, and what kind of device you were using.<\/p>\n<p style=\"text-align: left;\">In mid-2015, Congress passed the USA Freedom Act sadly ending this valuable bulk collection program for the time being.<\/p>\n<h4 style=\"text-align: left;\">The PRISM Program:\u00a0 Our #1 Source of Raw Intelligence<\/h4>\n<p style=\"text-align: left;\"><a target=\"_blank\" href=\"https:\/\/nsa.gov1.info\/surveillance\/\" >To continue reading and see graphs, figures, tables, maps and references Go to Original \u2013 nsa.gov1.info<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve turned our nation&#8217;s Internet and telecommunications companies into collection partners by installing filters in their facilities, serving them with secret court orders, building back doors into their software and acquiring keys to break their encryption. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-68310","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/68310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=68310"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/68310\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=68310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=68310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=68310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}