1. The information vacuum cleaner

    ... stations and taps on fiber-optic communication lines. All the input data are merged into an NSA secure ... . The taps allowed the NSA to monitor Iraqi nuclear, chemical and missile weapons developments. Less ... Roosevelt said, "Gentlemen do not read each other's mail." With that comment, Stimson shut down his

  2. PRISM targets worldwide communications


    ... WASHINGTON -- It is a top-secret data-mining program that "connects the dots" for terrorism ... security electronic surveillance program operated by the National Security Agency, sometimes ... ." This highly secretive program offers the U.S. intelligence community a major information-gathering

  3. Spy rules make spies the rulers


    ... ," said George Washington University privacy law expert Dan Solove. "Once you do, a lot of obligations ... judges have signed off on broad orders allowing the NSA to use information "inadvertently" collected ... , 2009 detailing the procedures the NSA is to follow in order to minimize the collection of data

  4. Beck: Not a Jew alive if Hitler had Obama's tech


    ... program while interviewing NSA whistleblower William Binney. Binney worked at the National ... anything.' Really? They already are! You wanna shut down the tea party? They can do it overnight. You ... . ... All they have to do is put the connections in, hit print, round them up." "There wouldn't be a Jew

  5. Fight to unplug NSA heads to court

    the-court-overseeing-nsa-spying-has-already-found-it-violated-the-constitution-at-least-once (1)

    ... to add. NSA spy program could be halted Klayman's suit is the first to challenge the legality ... of the NSA spy program. He claimed the program violates the privacy rights of over 300 million ... whether they have any connection to terrorists or terrorism. One NSA program supposedly targets

  6. Army bans soldiers from reading about NSA

    Tom Grundy

    ... and clicked on any 'NSA program' slide show please inform me immediately. It is much easier fix (sic ... -reaching" collection of online data. In addition, NSA analysts don't need prior authorization to conduct ... only to the U.S., Australia, Canada, Great Britain and New Zealand. The program gives NSA access

  7. Feds decide fate of NSA spoofer

    The NSA claimed copyright infringement after a businessman created a parody version of the agency's logo.

    ... to do satire or parodies and criticize these agencies when something like this hangs over you. I got ... [caption id="attachment_505377" align="alignright" width="394" caption="The NSA claimed copyright ... ] "The NSA. The only part of government that actually listens." That classic line making fun

  8. The disturbing truth about new FBI chief

    ... the illegal NSA (National Security Administration) eavesdropping program. ... It was Comey who gave his ... legal approval to enable that NSA eavesdropping program to spy on Americans without warrants; the same ... that the oversight mechanisms on the government's widespread surveillance of phone records and online

  9. Top Democrat clashes with NSA

    Patrick Leahy, Dianne Feinstein

    ... . Critics, including former NSA contractor James Snowden, who revealed the data-collection program ... a warrant. He said the NSA activities do not involve listening to peoples phone calls, do not involve ... as the target is believed to be overseas. It is that broad authority the NSA uses in the PRISM program

  10. NSA chief plays word games on domestic spying


    ... claimed the NSA does not intercept Americans phone calls or online information? In March 2012, Rep ... several ex-NSA staffers describing phone and data surveillance of Americans. Following ... Threats and Capabilities Subcommittee of the Armed Services Committee: JOHNSON: Does the NSA