| ▲ | lern_too_spel a day ago | ||||||||||||||||||||||||||||||||||||||||||||||||||||
> Many times. Clearly not. > They detail methods and partners used in mass surveillance on US soil involving US corporations and US routed internet backbone connections. PRISM is a data ingestion system whereby the NSA ingests data collected by the FBI Data Intercept Technology Unit that gets data from specific accounts under court order. The DITU is clearly labeled in the diagram on the slide showing how it works. The NSA has no integration with the companies at all. The "Internet backbone" has nothing to do with PRISM. > No independently verifiable proof is provided that US persons are not targeted by this program. If the FBI gives a section 702 court order to a company for an account that isn't for a foreigner outside the U.S., they are not going to comply. The FBI wouldn't even ask. The very idea that you think "verifiable proof" is needed shows you believed the ridiculous conspiracy theory that the NSA could directly fetch any account's data, which was supported by neither the law nor the leaked documents but only by Greenwald's fever dreams > Instead we're gifted such lovely terms as LOVEINT: https://en.wikipedia.org/wiki/LOVEINT in which the NSA admits to warrant-less domestic spying for the most trivial of reasons. Yet another document that you claim to have read but didn't. The cases where they were able to surveil the person they were stalking were foreigners outside the U.S. The domestic cases involved querying for associates using the metadata. Neither one is "domestic spying" and certainly don't show any evidence of domestic mass surveillance. > "However, in recent years, FVEY documents have shown that member agencies are intentionally spying on one another's private citizens and sharing the collected information with each other." Once again, if you bothered to read the source documents, you would find that this quote is not supported by the citations. The first citation shows that the U.S. The first is about how the U.S. is allowed to use UK phone numbers in its metadata collection for chaining analysis, not to share that data or analysis with the UK as the quote claims. The second is about how Australia is allowed to share data it collected outside the U.S. and the U.S. with the U.S. without first looking for and removing the data of Australians who happened to be abroad whose data was collected, not for the U.S. to spy on Australians as your quote claims. Lesson: If you see a claim that describes something that is clearly illegal, you should verify it before you repeat stuff that is very clearly nonsense and come off as a tin foil hat wearing conspiracy theorist. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | timschmidt a day ago | parent [-] | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Yes I am familiar with the official statements. They do not constitute "independently verifiable proof ... that US persons are not targeted by this program." and carry far less weight than the previously quoted and linked testimony which directly contradicts them when considered in context of the disclosures. The same folks you'd have us believe without question have lied repeatedly about these very programs: http://www.allgov.com/news/controversies/nsa-director-alexan... https://apnews.com/article/business-33a88feb083ea35515de3c73... Since the official statements aren't trustworthy, I'll accept independently verifiable (by a group like EFF) proof. I'd be a sillybilly to accept less. Should be pretty easy. NSA has EFF's contact information from that lawsuit ( https://en.wikipedia.org/wiki/Jewel_v._National_Security_Age... ) in which they destroyed evidence against a court order, and argued "state secrets" against every claim. You know, the one that explicitly avoided deciding the constitutionality of all this on procedural grounds. Totally trustworthy behavior. Everyone responds that way when asked to prove they're not mass surveilling Americans. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||