Now Reading
NSA tapes 20 billion phone records Every Day, social media – Data Mining

NSA tapes 20 billion phone records Every Day, social media – Data Mining

by irleaksSeptember 29, 2013
PRISM, XKeyscore, FinSpy, Mainway are just a few of the programs NSA has to read, listen to, and watch everything you do!
Think about this..
they watch you in your own living room, 
bedroom, bathroom, auto, work office, 

connect the data to your credit card, 
so every retailer, airport or security 
Traffic cam
cam knows who and where you are 
The National Security Agency is using its vast stores of communications data to build detailed graphs of Americans’ social ties, according to a new report, raising new questions about the scope and legality of the spy agency’s surveillance mission. A report published today by The New York Times says that since 2010, the NSA has been building a social graph capable of identifying Americans’ associates, locations, and more.
The report, based on documents provided by former NSA contractor Edward Snowden and the Times’ own interviews, describes how the NSA builds a detailed portrait of its targets by chaining together metadata from many different sources. “The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data,” the report says.  
 In August of that year, it began taking in an additional 1.1 billion cellphone records per day from an undisclosed US service provider. 
WITHOUT congressional approval!
The Times obtained a top-secret document that describes how the NSA searches for 94 “entity types,” such as phone numbers, email addresses and IP addresses, and correlates them with 164 “relationship types” to map its targets’ connections. The report suggests that even though the content of the communications is not recorded, the NSA can still get detailed information about a person’s friends, family, therapy schedule, or extramarital affairs.
The Verge Reports
The security breach revealed that the government gathers billions of pieces of data—phone calls, emails, photos, and videos—from Facebook, Twitter, Linkedin, Yahoo, Bing,  Facebook, Microsoft,  Tumblr,  Skype,  and other communications giants, then combs through the information for leads on national security threats. The disclosure caused a global uproar over the sanctity of privacy, the need for security, and the perils of government secrecy. People rightfully have been concerned about where the government gets the data—from all of us—but equal attention has not been paid to what it actually does with it. Here’s a guide to big-data mining, NSA-style. 
Just how much data do we produce? A recent study by IBM estimates that humanity creates 2.5 quintillion bytes of data every day. (If these data bytes were pennies laid out flat, they would blanket the earth five times.) That total includes stored information—photos, videos, social-media posts, word-processing files, phone-call records, financial records, and results from science experiments—and data that normally exists for mere moments, such as phone-call content and Skype chats.

The NSA controversy began when Snowden revealed that the U.S. government was collecting the phone-metadata records of every Verizon customer—including millions of Americans. At the request of the FBI, FISA Court judge Roger Vinson issued an order compelling the company to hand over its phone records.

Read more: NSA Data Mining: How It Works – Popular Mechanics
Follow us: @PopMech on Twitter | popularmechanics on Facebook 

Visit us at

On the heels of the metadata-mining leak, Snowden exposed another NSA surveillance effort, called US-984XN. Every collection platform or source of raw intelligence is given a name, called a Signals Intelligence Activity Designator (SIGAD), and a code name. SIGAD US-984XN is better known by its code name: PRISM. PRISM involves the collection of digital photos, stored data, file transfers, emails, chats, videos, and video conferencing from nine Internet companies.

What is XKeyscore? 

In late July Snowden released a 32-page, top-secret PowerPoint presentation that describes software that can search hundreds of databases for leads. Snowden claims this program enables low-level analysts to access communications without oversight, circumventing the checks and balances of the FISA court. The NSA and White House vehemently deny this, and the documents don’t indicate any misuse. The slides do describe a powerful tool that NSA analysts can use to find hidden links inside troves of information. “My target speaks German but is in Pakistan—how can I find him?” one slide reads. Another asks: “My target uses Google Maps to scope target locations—can I use this information to determine his email address?” This program enables analysts to submit one query to search 700 servers around the world at once, combing disparate sources to find the answers to these questions. 

How many people think this is violating your rights?  Then stand up and do something about it
About The Author