A question does come up here though... what is wrong with getting a judge's order first? Is time? Is it fear that the judge will say no? Both of those things can be easily handled: get a judge to approve only these things as part of their work load so he / she is always available. For the second, train that judge in why such things are necessary, how terrorists work, etc. In this way the judge both has the time and understanding and can thus wade through what is really necessary and what might be just the authorities over doing it.
International Level: International Guru / Political Participation: 3209 100%
The problem is in the sheer number of conversations that the NSA listens to. The eavesdropping program, which has been around for decades, requires that analysts listen into hundreds of conversations per day, listening for certain, specific, subjects.
The technicians are not allowed, under extreme penalty, to discuss ANYTHING that they hear, not even with their supervisors or clergy, unless it fits those specific subjects and situations. So, even if they hear a bank robbery being planned, or a murder being discussed, they cannot even be called upon in a court of law to reveal what they have heard.
This program is also unique in that none of the information gathered through it can be used to prosecute, or even charge someone with a crime, not even for terrorist activities. It can only be used as intelligence information, to lead to further, much more intense investigation.
This program is EXACTLY like the US and British intelligence programs during WWII where they intercepted and decrypted radio communications from the Germans.
International Level: International Guru / Political Participation: 854 85.4%
During WWII they homed in on specific communications though as opposed to the whole population at large not so? Maybe the people who are trying to stop these things do not want to be found out in other crimes not related to terrorism?
International Level: International Guru / Political Participation: 3209 100%
Why can't America listen to all calls coming into our country from foreign nationals. We are not giving up our rights when these calls are monitored for suspicious words. The N.S.A does not care if they hear about an Aphgan Mother talking to her son in America about his brother. That kind of information is ignored by the computer programs used to filter out suspicious discussions . When the computer finds conversations that meet certain criteria (use of certain phrases and topics) these converstations are sent to individuals to determine if it is about potentially dangerous actions that can be destructive to our nation.
From the New York Times
Why we listen
PHILIP BOBBITT
QUOTE |
Consider that on Sept. 10, 2001, the N.S.A. intercepted two messages: "The match begins tomorrow" and "Tomorrow is zero hour." These were not picked up through surveillance of suspected individuals but from random monitoring of pay phones in areas of Afghanistan where Al Qaeda was active. Not surprisingly, these messages were not translated or disseminated until Sept. 12th. |
International Level: Politician / Political Participation: 109 10.9%
U.S. SENATE APPROVES PLAN TO ALLOW SPYING ON SUSPECTED TERRORISTS
The U.S. Senate voted late Friday to temporarily give the American government expanded authority to eavesdrop on suspected foreign terrorists without court warrants.
Ref. https://www.cbc.ca/story/world/national/200...-terrorism.html
QUOTE |
In the end it comes down to this... how much of your rights are you willing to give up in order to seek for 'protection' from armed forces? In the old days the military could acquire your home for soldiers to stay if needs be - this invasion of privacy may have been considered worst than eavesdropping, but people were willing to put up with it so that they would not fall into the hands of the enemy. |
Telecom Whistleblower Discovers Circuit that Allows Access to All Systems on Wireless Carrier -- Phone Calls, Text Messages, Emails and More
Babak Pasdar is a computer security expert who was hired in 2003 to help restructure the tech infrastructure at a major wireless telecommunications company. What he found shocked him. The company had set up a system that gave a third party, presumably a governmental entity, access to every communication coming through that company¹s infrastructure. This means every email, internet use, document transmission, video, text message, as well as the ability to listen to and record any phone call.
Ref. https://www.democracynow.org/2008/4/10/tele...lower_discovers