Menu
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Vault
Time Travel Schematics
T.E.C. Time Archive
The Why Files
Have You Seen...?
Chronovisor
TimeTravelForum.tk
TimeTravelForum.net
ParanormalNetwork.net
Paranormalis.com
ConspiracyCafe.net
Streams
Live streams
Featured streams
Multi-Viewer
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Navigation
Install the app
Install
More options
Contact us
Close Menu
Forums
Paranormal Forum
Conspiracies & Cover-ups
NSA Files (Raw Documents + Whistleblower Edward Snowden Video)
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Opmmur" data-source="post: 71151" data-attributes="member: 13"><p><a href="http://leaksource.wordpress.com/tag/documents/" target="_blank">Documents</a>, <a href="http://leaksource.wordpress.com/tag/domestic/" target="_blank">Domestic</a>, <a href="http://leaksource.wordpress.com/tag/edward-snowden/" target="_blank">Edward Snowden</a>, <a href="http://leaksource.wordpress.com/tag/files/" target="_blank">Files</a>, <a href="http://leaksource.wordpress.com/tag/footage/" target="_blank">Footage</a>, <a href="http://leaksource.wordpress.com/tag/glenn-greenwald/" target="_blank">Glenn Greenwald</a>, <a href="http://leaksource.wordpress.com/tag/greenwald/" target="_blank">Greenwald</a>, <a href="http://leaksource.wordpress.com/tag/guardian/" target="_blank">Guardian</a>, <a href="http://leaksource.wordpress.com/tag/hong-kong/" target="_blank">Hong Kong</a>, <a href="http://leaksource.wordpress.com/tag/interview/" target="_blank">Interview</a>, <a href="http://leaksource.wordpress.com/tag/leak/" target="_blank">leak</a>, <a href="http://leaksource.wordpress.com/tag/leaks/" target="_blank">Leaks</a>, <a href="http://leaksource.wordpress.com/tag/news/" target="_blank">News</a>, <a href="http://leaksource.wordpress.com/tag/nsa/" target="_blank">NSA</a>, <a href="http://leaksource.wordpress.com/tag/nsa-files/" target="_blank">NSA Files</a>, <a href="http://leaksource.wordpress.com/tag/raw/" target="_blank">Raw</a>, <a href="http://leaksource.wordpress.com/tag/raw-documents/" target="_blank">Raw Documents</a>, <a href="http://leaksource.wordpress.com/tag/snowden/" target="_blank">Snowden</a>, <a href="http://leaksource.wordpress.com/tag/surveillance/" target="_blank">Surveillance</a>, <a href="http://leaksource.wordpress.com/tag/video/" target="_blank">Video</a>, <a href="http://leaksource.wordpress.com/tag/washington-post/" target="_blank">Washington Post</a>, <a href="http://leaksource.wordpress.com/tag/whistleblower/" target="_blank">whistleblower</a></p><p><span style="font-size: 18px"><strong>NSA Files (Raw Documents + Whistleblower Edward Snowden Video)</strong></span></p><p> </p><p>In <a href="http://leaksource.wordpress.com/category/leaksource-original-news/" target="_blank">LEAKSOURCE ORIGINAL NEWS</a> on <strong>June 13, 2013</strong> at <strong>1:08 AM</strong></p><p style="text-align: center"><strong>NSA COLLECTING PHONE RECORDS OF MILLIONS OF VERIZON CUSTOMERS DAILY</strong></p><p>TOP SECRET COURT ORDER REQUIRING VERIZON TO HAND OVER ALL CALL DATA TO NSA (<a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/146191694" target="_blank">View this document on Scribd</a></span></p> <p style="text-align: center"><strong>NSA PRISM PROGRAM TAPS IN TO USER DATA OF APPLE, GOOGLE AND OTHERS</strong></p> <p style="text-align: center"></p><p></p><p>TOP SECRET NSA PRISM PROGRAM CLAIMS DIRECT ACCESS TO SERVERS OF FIRMS INCLUDING GOOGLE, APPLE AND FACEBOOK (Story/<a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html" target="_blank">WashingtonPost</a>/<a href="http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data" target="_blank">Guardian</a>)</p><p>INTRODUCING THE PROGRAM: A slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved.</p><p> </p><p><a href="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-1.jpg" target="_blank"><img src="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-1.jpg?w=604&h=442" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p> </p><p>MONITORING A TARGET’S COMMUNICATION: This diagram shows how the bulk of the world’s electronic communications move through companies based in the United States.</p><p> </p><p><a href="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-2.jpg" target="_blank"><img src="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-2.jpg?w=604&h=453" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p> </p><p>PROVIDERS AND DATA: The PRISM program collects a wide range of data from the nine companies, although the details vary by provider.</p><p> </p><p><a href="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-3.jpg" target="_blank"><img src="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-3.jpg?w=604&h=453" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p> </p><p>PARTICIPATING PROVIDERS: This slide shows when each company joined the program, with Microsoft being the first, on Sept. 11, 2007, and Apple the most recent, in October 2012.</p><p> </p><p><a href="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-4.jpg" target="_blank"><img src="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-4.jpg?w=604&h=453" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p> </p><p>This slide details different methods of data collection under the FISA Amendment Act.</p><p> </p><p><a href="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-5.jpg" target="_blank"><img src="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-5.jpg?w=604" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p> </p><p>ACQUIRING DATA FROM A NEW TARGET: This slide describes what happens when an NSA analyst “tasks” the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the “selectors,” or search terms. The supervisor must endorse the analyst’s “reasonable belief,” defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection.</p><p> </p><p><a href="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-6.jpg" target="_blank"><img src="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-6.jpg?w=604&h=453" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p> </p><p>ANALYZING INFORMATION COLLECTED FROM PRIVATE COMPANIES: After communications information is acquired, the data are processed and analyzed by specialized systems that handle voice, text, video and “digital network information” that includes the locations and unique device signatures of targets.</p><p> </p><p><a href="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-7.jpg" target="_blank"><img src="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-7.jpg?w=604&h=453" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p> </p><p>EACH TARGET IS ASSIGNED A CASE NOTATION: The PRISM case notation format reflects the availability, confirmed by The Post’s reporting, of real-time surveillance as well as stored content.</p><p> </p><p><a href="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-8.jpg" target="_blank"><img src="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-8.jpg?w=604&h=453" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p> </p><p>SEARCHING THE PRISM DATABASE: On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM’s counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected “incidentally” during surveillance of those targets.</p><p> </p><p><a href="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-9.jpg" target="_blank"><img src="http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-9.jpg?w=604&h=414" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p style="text-align: center"></p> <p style="text-align: center"><strong>OBAMA ORDERS US TO DRAW UP OVERSEAS TARGET LIST FOR CYBER-ATTACKS</strong></p> <p style="text-align: center"></p><p>TOP SECRET OBAMA PRESIDENTIAL DIRECTIVE STEPS UP OFFENSIVE CYBER CAPABILITIES TO “ADVANCE US OBJECTIVES AROUND THE WORLD” (<a href="http://www.guardian.co.uk/world/2013/jun/07/obama-china-targets-cyber-overseas" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/147533760" target="_blank">View this document on Scribd</a></span></p> <p style="text-align: center"><strong>BOUNDLESS INFORMANT: THE NSA’S SECRET TOOL TO TRACK GLOBAL SURVEILLANCE DATA</strong></p><p>3-PAGE BOUNDLESS INFORMANT EXPLANATION DOCUMENT, WHICH SHOWS THE NSA COLLECTED ALMOST 3 BILLION PIECES OF INTELLIGENCE FROM US COMPUTER NETWORKS OVER A 30-DAY PERIOD ENDING IN MARCH (<a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/147533808" target="_blank">View this document on Scribd</a></span></p><p>TOP SECRET NSA BOUNDLESS INFORMANT TOOL DETAILS AND MAPS BY COUNTRY THE VOLUMINOUS AMOUNT OF INFORMATION IT COLLECTS FROM COMPUTER AND TELEPHONE NETWORKS (<a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/147534679" target="_blank">View this document on Scribd</a></span></p> <p style="text-align: center"><strong>GCHQ INTERCEPTED FOREIGN POLITICIANS’ COMMUNICATIONS AT G20 SUMMITS</strong></p><p>EXTRACTS FROM LEAKED TOP SECRET GCHQ DOCUMENT DESCRIBING AGENCY’S “RECENT SUCCESSES” SPYING ON FOREIGN POLITICIANS AT G20 SUMMITS (<a href="http://www.guardian.co.uk/uk/2013/jun/16/gchq-intercepted-communications-g20-summits" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/148220338" target="_blank">View this document on Scribd</a></span></p> <p style="text-align: center"><strong>THE TOP SECRET RULES THAT ALLOW NSA TO USE US DATA WITHOUT A WARRANT</strong></p><p>TOP-SECRET DOCUMENT SHOWS FISA JUDGES SIGNED OFF ON BROAD ORDERS ALLOWING NSA TO MAKE USE OF INFORMATION “INADVERTENTLY” COLLECTED FROM DOMESTIC US COMMUNICATIONS WITHOUT A WARRANT (<a href="http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/150524811" target="_blank">View this document on Scribd</a></span></p><p>SECRET DOCUMENT DETAILS PROCEDURES THE NSA IS REQUIRED TO FOLLOW TO TARGET “NON-US PERSONS” UNDER ITS FOREIGN INTELLIGENCE POWERS – AND WHAT THE AGENCY DOES TO MINIMIZE DATA COLLECTED ON US CITIZENS AND RESIDENTS (<a href="http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/150524907" target="_blank">View this document on Scribd</a></span></p><p>ONE-PARAGRAPH ORDER, SIGNED BY FISA COURT JUDGE, DECLARES PROCEDURES SUBMITTED BY ATTORNEY GENERAL ON BEHALF OF NSA ARE CONSISTENT WITH US LAW AND FOURTH AMENDMENT (<a href="http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/150524950" target="_blank">View this document on Scribd</a></span></p> <p style="text-align: center"><strong>NSA COLLECTED US EMAIL RECORDS IN BULK FOR MORE THAN 2 YEARS UNDER OBAMA</strong></p><p>SECRET CORRESPONDENCE INVOLVING ATTORNEY GENERAL MICHAEL MUKASEY IN 2007 REQUESTING PERMISSION FOR NSA TO EXPAND ITS “CONTACT CHAINS” DEEPER INTO AMERICANS’ EMAIL RECORDS (<a href="http://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obama" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/150526583" target="_blank">View this document on Scribd</a></span></p><p>TOP SECRET DRAFT REPORT FROM 2009 BY NSA’S INSPECTOR GENERAL SHOWS DEVELOPMENT OF “COLLECTION OF BULK INTERNET METADATA” UNDER PROGRAM LAUNCHED UNDER BUSH (<a href="http://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obama" target="_blank">Story/Guardian</a>)</p><p style="text-align: center"><span style="font-size: 10px"><a href="http://www.scribd.com/doc/150528544" target="_blank">View this document on Scribd</a></span></p> <p style="text-align: center"><strong>EDWARD SNOWDEN: THE WHISTLEBLOWER BEHIND THE NSA SURVEILLANCE REVELATIONS</strong></p><p>EDWARD SNOWDEN, THE SOURCE BEHIND THE GUARDIAN’S NSA FILES, TALKS TO <a href="https://twitter.com/ggreenwald" target="_blank">GLENN GREENWALD</a> IN HONG KONG ABOUT HIS MOTIVES FOR THE BIGGEST INTELLIGENCE LEAK IN A GENERATION (<a href="http://www.guardian.co.uk/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance" target="_blank">Story/Guardian</a>)</p></blockquote><p></p>
[QUOTE="Opmmur, post: 71151, member: 13"] [URL='http://leaksource.wordpress.com/tag/documents/']Documents[/URL], [URL='http://leaksource.wordpress.com/tag/domestic/']Domestic[/URL], [URL='http://leaksource.wordpress.com/tag/edward-snowden/']Edward Snowden[/URL], [URL='http://leaksource.wordpress.com/tag/files/']Files[/URL], [URL='http://leaksource.wordpress.com/tag/footage/']Footage[/URL], [URL='http://leaksource.wordpress.com/tag/glenn-greenwald/']Glenn Greenwald[/URL], [URL='http://leaksource.wordpress.com/tag/greenwald/']Greenwald[/URL], [URL='http://leaksource.wordpress.com/tag/guardian/']Guardian[/URL], [URL='http://leaksource.wordpress.com/tag/hong-kong/']Hong Kong[/URL], [URL='http://leaksource.wordpress.com/tag/interview/']Interview[/URL], [URL='http://leaksource.wordpress.com/tag/leak/']leak[/URL], [URL='http://leaksource.wordpress.com/tag/leaks/']Leaks[/URL], [URL='http://leaksource.wordpress.com/tag/news/']News[/URL], [URL='http://leaksource.wordpress.com/tag/nsa/']NSA[/URL], [URL='http://leaksource.wordpress.com/tag/nsa-files/']NSA Files[/URL], [URL='http://leaksource.wordpress.com/tag/raw/']Raw[/URL], [URL='http://leaksource.wordpress.com/tag/raw-documents/']Raw Documents[/URL], [URL='http://leaksource.wordpress.com/tag/snowden/']Snowden[/URL], [URL='http://leaksource.wordpress.com/tag/surveillance/']Surveillance[/URL], [URL='http://leaksource.wordpress.com/tag/video/']Video[/URL], [URL='http://leaksource.wordpress.com/tag/washington-post/']Washington Post[/URL], [URL='http://leaksource.wordpress.com/tag/whistleblower/']whistleblower[/URL] [SIZE=5][B]NSA Files (Raw Documents + Whistleblower Edward Snowden Video)[/B][/SIZE] In [URL='http://leaksource.wordpress.com/category/leaksource-original-news/']LEAKSOURCE ORIGINAL NEWS[/URL] on [B]June 13, 2013[/B] at [B]1:08 AM[/B] [CENTER][B]NSA COLLECTING PHONE RECORDS OF MILLIONS OF VERIZON CUSTOMERS DAILY[/B][/CENTER] TOP SECRET COURT ORDER REQUIRING VERIZON TO HAND OVER ALL CALL DATA TO NSA ([URL='http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/146191694']View this document on Scribd[/URL][/SIZE][/CENTER] [CENTER][B]NSA PRISM PROGRAM TAPS IN TO USER DATA OF APPLE, GOOGLE AND OTHERS[/B][/CENTER] [CENTER] [/CENTER] TOP SECRET NSA PRISM PROGRAM CLAIMS DIRECT ACCESS TO SERVERS OF FIRMS INCLUDING GOOGLE, APPLE AND FACEBOOK (Story/[URL='http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html']WashingtonPost[/URL]/[URL='http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data']Guardian[/URL]) INTRODUCING THE PROGRAM: A slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved. [URL='http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-1.jpg'][IMG]http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-1.jpg?w=604&h=442[/IMG][/URL] MONITORING A TARGET’S COMMUNICATION: This diagram shows how the bulk of the world’s electronic communications move through companies based in the United States. [URL='http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-2.jpg'][IMG]http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-2.jpg?w=604&h=453[/IMG][/URL] PROVIDERS AND DATA: The PRISM program collects a wide range of data from the nine companies, although the details vary by provider. [URL='http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-3.jpg'][IMG]http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-3.jpg?w=604&h=453[/IMG][/URL] PARTICIPATING PROVIDERS: This slide shows when each company joined the program, with Microsoft being the first, on Sept. 11, 2007, and Apple the most recent, in October 2012. [URL='http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-4.jpg'][IMG]http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-4.jpg?w=604&h=453[/IMG][/URL] This slide details different methods of data collection under the FISA Amendment Act. [URL='http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-5.jpg'][IMG]http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-5.jpg?w=604[/IMG][/URL] ACQUIRING DATA FROM A NEW TARGET: This slide describes what happens when an NSA analyst “tasks” the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the “selectors,” or search terms. The supervisor must endorse the analyst’s “reasonable belief,” defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection. [URL='http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-6.jpg'][IMG]http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-6.jpg?w=604&h=453[/IMG][/URL] ANALYZING INFORMATION COLLECTED FROM PRIVATE COMPANIES: After communications information is acquired, the data are processed and analyzed by specialized systems that handle voice, text, video and “digital network information” that includes the locations and unique device signatures of targets. [URL='http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-7.jpg'][IMG]http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-7.jpg?w=604&h=453[/IMG][/URL] EACH TARGET IS ASSIGNED A CASE NOTATION: The PRISM case notation format reflects the availability, confirmed by The Post’s reporting, of real-time surveillance as well as stored content. [URL='http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-8.jpg'][IMG]http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-8.jpg?w=604&h=453[/IMG][/URL] SEARCHING THE PRISM DATABASE: On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM’s counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected “incidentally” during surveillance of those targets. [URL='http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-9.jpg'][IMG]http://leaksource.files.wordpress.com/2013/06/top-secret-nsa-prism-slide-9.jpg?w=604&h=414[/IMG][/URL] [CENTER] [/CENTER] [CENTER][B]OBAMA ORDERS US TO DRAW UP OVERSEAS TARGET LIST FOR CYBER-ATTACKS[/B][/CENTER] [CENTER] [/CENTER] TOP SECRET OBAMA PRESIDENTIAL DIRECTIVE STEPS UP OFFENSIVE CYBER CAPABILITIES TO “ADVANCE US OBJECTIVES AROUND THE WORLD” ([URL='http://www.guardian.co.uk/world/2013/jun/07/obama-china-targets-cyber-overseas']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/147533760']View this document on Scribd[/URL][/SIZE][/CENTER] [CENTER][B]BOUNDLESS INFORMANT: THE NSA’S SECRET TOOL TO TRACK GLOBAL SURVEILLANCE DATA[/B][/CENTER] 3-PAGE BOUNDLESS INFORMANT EXPLANATION DOCUMENT, WHICH SHOWS THE NSA COLLECTED ALMOST 3 BILLION PIECES OF INTELLIGENCE FROM US COMPUTER NETWORKS OVER A 30-DAY PERIOD ENDING IN MARCH ([URL='http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/147533808']View this document on Scribd[/URL][/SIZE][/CENTER] TOP SECRET NSA BOUNDLESS INFORMANT TOOL DETAILS AND MAPS BY COUNTRY THE VOLUMINOUS AMOUNT OF INFORMATION IT COLLECTS FROM COMPUTER AND TELEPHONE NETWORKS ([URL='http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/147534679']View this document on Scribd[/URL][/SIZE][/CENTER] [CENTER][B]GCHQ INTERCEPTED FOREIGN POLITICIANS’ COMMUNICATIONS AT G20 SUMMITS[/B][/CENTER] EXTRACTS FROM LEAKED TOP SECRET GCHQ DOCUMENT DESCRIBING AGENCY’S “RECENT SUCCESSES” SPYING ON FOREIGN POLITICIANS AT G20 SUMMITS ([URL='http://www.guardian.co.uk/uk/2013/jun/16/gchq-intercepted-communications-g20-summits']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/148220338']View this document on Scribd[/URL][/SIZE][/CENTER] [CENTER][B]THE TOP SECRET RULES THAT ALLOW NSA TO USE US DATA WITHOUT A WARRANT[/B][/CENTER] TOP-SECRET DOCUMENT SHOWS FISA JUDGES SIGNED OFF ON BROAD ORDERS ALLOWING NSA TO MAKE USE OF INFORMATION “INADVERTENTLY” COLLECTED FROM DOMESTIC US COMMUNICATIONS WITHOUT A WARRANT ([URL='http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/150524811']View this document on Scribd[/URL][/SIZE][/CENTER] SECRET DOCUMENT DETAILS PROCEDURES THE NSA IS REQUIRED TO FOLLOW TO TARGET “NON-US PERSONS” UNDER ITS FOREIGN INTELLIGENCE POWERS – AND WHAT THE AGENCY DOES TO MINIMIZE DATA COLLECTED ON US CITIZENS AND RESIDENTS ([URL='http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/150524907']View this document on Scribd[/URL][/SIZE][/CENTER] ONE-PARAGRAPH ORDER, SIGNED BY FISA COURT JUDGE, DECLARES PROCEDURES SUBMITTED BY ATTORNEY GENERAL ON BEHALF OF NSA ARE CONSISTENT WITH US LAW AND FOURTH AMENDMENT ([URL='http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/150524950']View this document on Scribd[/URL][/SIZE][/CENTER] [CENTER][B]NSA COLLECTED US EMAIL RECORDS IN BULK FOR MORE THAN 2 YEARS UNDER OBAMA[/B][/CENTER] SECRET CORRESPONDENCE INVOLVING ATTORNEY GENERAL MICHAEL MUKASEY IN 2007 REQUESTING PERMISSION FOR NSA TO EXPAND ITS “CONTACT CHAINS” DEEPER INTO AMERICANS’ EMAIL RECORDS ([URL='http://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obama']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/150526583']View this document on Scribd[/URL][/SIZE][/CENTER] TOP SECRET DRAFT REPORT FROM 2009 BY NSA’S INSPECTOR GENERAL SHOWS DEVELOPMENT OF “COLLECTION OF BULK INTERNET METADATA” UNDER PROGRAM LAUNCHED UNDER BUSH ([URL='http://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obama']Story/Guardian[/URL]) [CENTER][SIZE=10px][URL='http://www.scribd.com/doc/150528544']View this document on Scribd[/URL][/SIZE][/CENTER] [CENTER][B]EDWARD SNOWDEN: THE WHISTLEBLOWER BEHIND THE NSA SURVEILLANCE REVELATIONS[/B][/CENTER] EDWARD SNOWDEN, THE SOURCE BEHIND THE GUARDIAN’S NSA FILES, TALKS TO [URL='https://twitter.com/ggreenwald']GLENN GREENWALD[/URL] IN HONG KONG ABOUT HIS MOTIVES FOR THE BIGGEST INTELLIGENCE LEAK IN A GENERATION ([URL='http://www.guardian.co.uk/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance']Story/Guardian[/URL]) [/QUOTE]
Insert quotes…
Verification
Post reply
Forums
Paranormal Forum
Conspiracies & Cover-ups
NSA Files (Raw Documents + Whistleblower Edward Snowden Video)
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top