Traffic Shaping, A Technique that NSA uses to spy on Americans

SumG

Level 2
Thread author
Verified
Apr 26, 2017
89
Screenshot_1.png


According to the latest analysis, the NSA has secret means of “diverting parts of Internet traffic that move on global communications cables,” which allows it to neglect protections put into place by Congress to limit domestic surveillance on Americans.

TheNewFindings, published Thursday, supports a 2014 paper by researchers Axel Arnbak and Sharon Goldberg, published on News, which speculated that the NSA, whose mission it is to produce data from overseas targets, was using a “traffic shaping” technique to map US internet data abroad so that it could be incidentally obtained under the authority of a largely unknown executive order.

US citizens are allowed constitutional protections against surveillance or hunts of their personal data. Anytime the administration wants to access an American’s data, they must obey the rules of the Foreign Intelligence Surveillance (FISA) Court, a Washington DC-based court that approves the government’s surveillance programs.

But if that related data is collected outside the US, the bulk of the NSA’s authority derives from a presidential decree dating back more than 30 Years.

But if that related data is collected outside the US, the bulk of the NSA’s authority derives from a presidential decree dating back more than 30 Years.

The so-called Administrative Order 12333, signed into legislation by President Ronald Reagan in 1981, went on to convert the bulk of the NSA’s authority, expanding the agency’s collection abilities to both foreign and domestic targets. The system is far more agreeable than the Foreign Intelligence Surveillance Act, as passed by Congress, as it falls solely under the watch of the administrative branch and is not reviewed by the courts.

A former NSA official turned whistleblower Bill Binney once called the executive order as a “blank check” for the intelligence agencies to carry surveillance when other laws fail or don’t reach far enough.

Although the current research notes that the agency’s expertise to carry out the traffic shaping technique is concealed due to the highly classified nature of any surveillance program, the NSA can use its legal powers to “sidestep constitutional restrictions imposed by Congress and the surveillance courts,” said Goldberg, who authored the report.​
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
US govt will see the light eventually. Let the CIA computer do the monitoring and tell them when there might be a problem to investigate. Yes, do the normal CIA intelligence and run scenarios on the CIA central computer, but wait for the computer to put that information together with its private internet info gathering to let them know when a situation may be becoming a danger to someone someplace. This is the CIA how it's meant to be. The Reagan era leaders put on a clinic here in the US and Margaret Thatcher in GB, Mitterrand in France, Helmut Kohl in Germany, various leaders in Japan. They showed us the security framework for western nations that guarantees safe competition between the nations and for all of us.

NSA will be and should dumped for keeps. NSA always was a bad idea and a waste of money. Having two security agencies operating inevitably means the agencies turn against each other. Not supposed to run 2 a-vs right? Same thing and always a bad idea.
 

Entreri

Level 7
Verified
May 25, 2015
342
These are merely criminal organizations now, NSA, CIA, GCHQ, CSEC etc. Spying illegally on their citizens, subverting various software and hardware, some cases with the willing participating (mainly American high-tech companies). Going after companies that will not bow down and comply (e.g. Kasperksy).
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top