NSA Copies All Internet Data, Creates Dossiers on Every User

J.P. Hicks
Blog Tips

The Associated Press dropped a bombshell report yesterday that claims the NSA's secret Internet spy program Prism is just a small part of a much more "expansive and intrusive" digital spying effort.

According to the AP, the NSA copies ALL INTERNET traffic in and out of the United States for analysis by hoovering all data that passes through fiber lines.

"Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light," AP reports.

Prism was originally thought to be a program to force Internet companies to hand over private user data to the government. But it turns out that Prism is actually a filtering tool to "make sense of the cacophony of the Internet's raw feed...Prism takes large beams of data and helps the government find discrete, manageable strands of information."

It then manages those strands of data by creating dossiers on every Internet user, providing the government with "names, addresses, conversation histories and entire archives of email inboxes."

And, of course, all of this data is collected and kept on innocent people without a warrant or any probable cause.

This explosive report comes the same day that the NSA held a classified briefing for members of Congress where they admit to listening to phone calls within the United States without a warrant.

CNET reports:

Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed "simply based on an analyst deciding that."

If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he learned. "I was rather startled," said Nadler, an attorney and congressman who serves on the House Judiciary committee.

Nadler told CNET that the "same legal standards that apply to phone calls also apply to e-mail messages, text messages, and instant messages." 

In other words, the NSA claims the authority to listen to any call or read any email based on the whims of an analyst, not a court order based on probable cause.

This is precisely the power Edward Snowden, as an analyst working for the private NSA contract Booz Allen Hamilton, claimed to have in his interview with The Guardian.

All of these recent revelations seem to confirm the worst fears of civil liberties groups. The American government is indeed listening to our phone calls and reading our emails without a warrant and little to no oversight to how this information is accessed or used.

What's even worse, they're building dossiers on all Americans to be tapped whenever one of the hundreds of thousands of analysts decides to, and all of it occurs in secret.

This is perhaps the most egregious breach of the public's trust in the history of the United States.  The government operates with complete secrecy while knowing all private information about its citizens.

Weren't we supposed to have a transparent government with individual privacy for citizens? 

J.P. Hicks is an entrepreneur, info-activist, pro blogger, editor of BlogTips.com and author of Secrets to Making Money with a Free Blog. Follow @ Twitter, or like on Facebook.

Sign Up for FREE Advanced Blog Tips
10 Reasons to Get Our Newsletter


Share your views...

16 Respones to "NSA Copies All Internet Data, Creates Dossiers on Every User"

Anonymous said...

Yo NSA! Wassap!

June 16, 2013 at 4:24 AM
Anonymous said...

just being native american automatically places you on their list

June 16, 2013 at 9:25 AM
Anonymous said...


June 16, 2013 at 3:36 PM
Anonymous said...

I have 8 hotmail accounts each collecting 6,500-10,000 e-mails a piece. Good luck to the NSA if they wish to sort them. Can they tell me which ones are worth reading please?


June 16, 2013 at 4:21 PM
Anonymous said...

its der choos,stupid!

June 16, 2013 at 4:31 PM
Anonymous said...

But, they are only interested in criminals and terrorists, right? a law abiding citizen should have nothing to worry about and nothing to hide, right? Our politicians and the agents that work for them are honorable, aren't they? Welcome to 1984.

June 16, 2013 at 5:25 PM
Anonymous said...

yawwwwwn.... ever hear of Echelon? That puppy was doing the whole planet decades ago... imagine what they have now :)

June 16, 2013 at 6:24 PM
Henry A. Eckstein said...

Sorry, but it doesn't quite work that way!

The Echelon system which has been active since the 1960's
has been the premiere international communications gathering
tool for SigInt (Signals Intelligence) and has gathered faxes, telexes, emails, cables, SOME international voice calls and
other communications by the five major participants (USA, Canada,
Australia, Britain, New Zealand) for the use by the NSA and each country's intelligence services for over 45 years now.

In the 1990's, Echelon was morphed AND INTEGRATED into a software-based text and voice vacuum system developed by
the FBI called Carnivore which was used for narcotics
enforcement and for securities/financial fraud investigations.

After a MAJOR broughah in Congress where Carnivore came to light after some ABUSE of its capabilities by front-line FBI personnel
for personal use, managers were fired, the programme wss officially shutdown at the FBI and then administrative and technical personnel were secretly transferred over to the CIA and the NSA who then created competing versions of the software and ever since, have been continiously snapping at each others heels trying to get THEIR version of Carnivore to be the "Official" version.

PRISM is merely a RENAMED version of Carnivore with some added
features that include fuzzy logic-based pattern matching, relationship determination, time and distance mapping of
communications, some advanced graphing and charting capabilities and an INTERNAL version of FaceBook, informally called SEARCHBOOK
which is an advanced relational database system that has updates
from users copied from incoming data streams at the main switches
of Internet Service Providers (ISP) Verizon, ATT, Sprint, etc.
input into their own databases. NO need to actually break into Facebook/Twitter/LinkedIn, etc. at all...just use Man-In-The-Middle attacks to capture the updates and posts into a custom user interface which can then be searched and datamined to the
NSA's/CIA's delight!

While the hardware (array processors and digital signal processors) are fully capable of scanning through many tens of millions of pages and millions of voice calls a day, simple keyword matching and boolean logic narrow down the focus to SELECT targets which then
get assigned to internal agents who then determine whether a
captured voice/text/mail data stream warrants further investigation.

While HITS (as they call them internally) ARE kept in databases for long periods of time, a formal DOSSIER is only initiated when
specific if-then-else logic dictates that a dossier KEEP criteria
has been met. It can take as little as 48 hours for a hit-list to
be eliminated from the Carnivore/PRISM system if the "Garbage Collection" routines built into the system signify that further investigation is not warranted or needed. While the NSA DOES HAVE
many hundreds of EXABYTES of storage space, time and logic dictate
that TRULY ACTIVE and ONLINE dossiers are kept only a few hundred thousand people and OFFLINE dossiers number between 2 to 5 million.

The scary thing is ...that I know how the system works BETTER
than their own engineers, since the NSA/CIA lost some key tech people due to some "Bad Blood" between departments and because
of my age and experience in database programming have been able
to keep up with the State of the Art in Database Management Theory.

The problem is that they've got a bunch of SQL programmers
who KNOW NOTHING about low-level B-Trees or Spread-Core Quicksorts
...all they know is how to do an SQL search and have NO idea that
databases need to be Garbage Collected and Physically Sorted and Indexed on a Hard Disk Sector-by-Sector basis!

But again, Carnivore/PRISM has been around a LOOOOON TIME !!!!!

June 16, 2013 at 10:52 PM
Usor said...

What a bunch of social misfits. Have they got their long black boots yet?

June 16, 2013 at 11:59 PM
Anonymous said...

Thanks, Henry, for that cogent description and analysis.

Sounds like you're saying cheap programming labor = unworkable databases over time.

June 17, 2013 at 1:04 AM
Anonymous said...

The time is come when the American people need to roundup all of the people involved in these programs for trial on charges of treason against the American people. This should include engineers, designers, programmers, political figures who allowed and abeted this illegal data gathering upon Americans.
Death sentences upon conviction for treason should be dispersed. The Constution of The United States is a sacred document and can never be set aside on the whim of some offical.

June 17, 2013 at 3:20 AM
Goliath said...

Good. Let them listen. The analysts will learn the TRUTH about the traitorous ISRAELI filth that has taken over our govt/media.

ISRAEL did 9/11!!! Fiqure that out NSA, or do you already know and are just COVERING it up?

June 17, 2013 at 7:41 AM
Anonymous said...


June 17, 2013 at 8:41 AM
JP Hicks said...

Mark Zuckerberg called users “dumb f-cks” for believing they have any privacy online.

Google CEO Eric Schmidt has said “We know where you are. We know where you’ve been. We can more or less know what you’re thinking about,” and “If you have something that you don’t want anyone to know maybe you shouldn’t be doing it in the first place…computers will remember it forever.”

Henry A. Eckstein said...

Actually, my earlier rant against the SQL programmers is an age related issue.

It's like modern math, almost NO ONE teached long-hand division and multiplication anymore and so the BASICS math are lost to the generations.

Ergo, with SQL and JAVA programmers, they are shielded from the low-level B-Trees (Binary Searched and Sorted Database Lists)
and Operating System-level file organization.

In some cases, it's nice to be able to skip a step or two in a young programmer's development...BUT...if they don't know the UNDERLYING workings of teh engine they are programming, they'll make mistakes AND LEAVE VULNERABILITIES....for example. In teh NSA/CIA Carnivore Databases...are the low-level Linked Lists and record Indexes ENCRYPTED...UNLIKELY! Ergo...someone of my sophistication could use a sector-editor (i.e. low-level disk reader) to copy ONLY the B-TREE indexes and Linked List pointers to figure out pointer-references and relationships between various records.
THEN I'll be able to find the KEY record(s)
that contains information allowing me to
FIND and READ the DECRYPTION KEYS used to decrypt ANY and/or ALL database records.
I could then even find the name and pointer to the database log file and INJECT FAKE
database access dates, times and usernames
and thus point the blame ELSEWHERE instead
of on me! And since many use intelligence agencies tend to use Oracle or IBM's DB2
I know that those systems reorganize whole
low-level HARD DISK structures in a logical
(ha!) manner on a sector-by-sector basis.

And because THOSE indexes aren't encyrpted either, I'll just run my sector-sweeper
and find out the location of the disk-based
decryption keys or at the very least find
the memory variable (and it pointer-location)
that contains the decryption key.

The NSA/CIA isn't SMART ENOUGH to know that
for superior security YOU ALWAYS KEEP YOUR
a CPU chip's on-cache and local registers
rather than in main heap RAM/Virtual memory
that you need to keep your Encrypt/Decrypt
routines ALSO in on-chip caches and since
most on-chip caches these dats are 64 kilobytes OR MORE! space is no longer
a real problem...otherwise they could
always ASK Intel/AMD/ARM to put a
16 MEGABYTE on-chip high-speed SRAM cache
on their chips for storing Encrypt/Decrypt
microcode and their keys PLUS keeping all INPUT/OUTPUT of an immediate encrypt/decrypt
would increase security a thousand-fold!
The only thing saved in heap memory and on-disk would be the ENCRYPTED output...
BUT NOOOOOOO...that would be too obvious!


Back to the original rant!

Age is the big issue and since the
programmers grew up on Macs and Windows
with SQL and JAVA they really have no clue
as to how low-level file operations and
low-level memory operations affect security.

That of course make ME a very dangerous
person because I DON'T NEED NO STINKIN'
KEYS to enter your safe...I just BYPASS
ALL THE LOCKS with the digital equivalent
of a 60,000 PSI Water Cutter!

June 18, 2013 at 4:22 PM
Gajendran said...

thank you henry detailed Analysis

July 12, 2013 at 11:50 PM

Post a Comment


Make Money Blogging

© 2013 Blogging Tips and Internet News All Rights Reserved