Click me
Transcribed

Is Someone Listening?

IS SOMEONE LISTENING? With the revelation that the federal government, through the National Security Agency, has been collecting phone and Internet records of U.S. citizens in the name of preventing terrorism, Americans are wondering whether private communication exists. Let's explore how this surveillance works and the history of domestic spying programs (because, let's face it, they're not new) and how, even with broader knowledge of the government's activities, a minority of Americans oppose such programs. HOW IT WORKS The recently revealed surveillance programs that collect mobile phone and Internet work in very much the same way: by copying data and filing it for searching and analysis. Splitter AO00 0 Secret Network Internet Router Customers A HISTORY OF DOMESTIC SURVEILLANCE Since the advent of the telephone, investigators and private individuals have used wiretaps and intercepted communications. And as technology has advanced, so have surveillance methods. But to be sure, the possibility that someone's listening is nothing new. 1900 TELEPHONE TAPS Wiretapping starts soon after the invention of the phone. Early telephones require operators to patch and transfer calls, so intercepting JUNE 4, 1928 SUPREME COURT APPROVES OF WIRETAPPING In Olmstead vs. United States, the court rules that federal agents can legally and constitutionally wiretap personal telephone conversations and use those conversations as communication on private calls is very easy. But even without operators, wiretapping is still relatively easy. evidence in court. OCT. 10, 1963 – JUNE 1, 1966 AUGUST 1945 RFK, FBI WIRETAP MLK The FBI begins tapping the home and office of civil rights leader Martin Luther King Jr. Only after King's murder is the program revealed. PROJECT SHAMROCK The Armed Forces Security Agency (the predecessor to the NSA) starts receiving microfilm copies of every telegram that enters and leaves the country and routes them to the propriate agency. At one time the program was analyzing up to 150,000 messages a month (and this was before super-fast processing speeds and high-capacity storage). DEC. 18, 1967 KATZ V. UNITED STATES The Supreme Court overturns the previous precedent of Olmstead v. United States in a pair of decisions. One ruling says the Fourth Amendment applies to JUNE 19, 1968 FEDERAL LAW RESTRICTS WIRETAPPING The Omnibus Crime Control and Safe Streets Act purports to restrict wiretapping and safeguard privacy, but it explicitly protects presidential powers to order surveillance in national JUNE 17, 1972 – AUG.9, 1974 WATERGATE SCANDAL electronic President Richard Nixon directs a transmissions, and the other says that the amendment extends to anywhere someone can reasonably privacy (a home, hotel room, phone booth, etc.). conspiracy to wiretap the Democratic National Committee headquarters and then tries to cover up the ensuing scandal. Nixon resigns, and several top security matters. pect aides are convicted in connection to the conspiracy. OCT. 1, 1986 May 1975 SHAMROCK ENDS Oct. 23, 1995 ELECTRONIC COMMUNICATIONS Congressional critics began to investigate and expose Project SHAMROCK. In FIRST COURT-ORDERED INTERNET WIRETAP A judge allows wiretapping in the case of Julio Ardita, who used Harvard computers to gain access to government sites. The first court-ordered PRIVACY ACT An amendment to a 1968 crime bill, the act seeks to enhance the privacy of emails, web pages, cell phones and more while in transit by making search warrants harder to acquire. But it does little to ensure the privacy of stored electronic communications. response, the NSA terminates the program. wiretap allows authorities to identify and arrest Ardita, who pleads guilty in 1998. OCT. 25, 1978 FOREIGN INTELLIGENCE SURVEILLANCE ACT Signed into law by President Jimmy Carter, FISA allows electronic 2000– 2006 surveillance without a court order under THINTHREAD AND TRAILBLAZER ThinThread, an NSA program intended strictly for foreign surveillance, is designed to compile massive amounts of phone and email data, systematically audit its own analysts and encrypt data tied to American citizens. The program never gets off the ground and is replaced by Trailblazer, a more expensive alternative that lacks the restriction against domestic surveillance. Trailblazer runs massively behind schedule and is abandoned in 2006. presidential authorization and permits court-ordered electronic surveillance. Later amendments would come during the so-called War on Terror. OCT. 31, 2001 Oct. 26, 2001 WHISTLES BLOWN PATRIOT ACT Former NSA official William Binney resigns after learning the program he invented (ThinThread) had been transformed to In response to the terror attacks of Sept. 11, President George W. Bush signs the Patriot Act, which includes allowing roving wiretaps that make it possible for warrants to cover an individual suspect rather than an individual device. target American citizens after 9/11. OCT. 16, 2005 WARRANTLESS AUG. 5, 2007 WIRETAPPING The New York Times PROTECT AMERICA ACT exposes the warrantless wiretapping of thousands of U.S. citizens by the NSA, dating as far back as 2002 in a report delayed for a year due to White House pressure. The Protect America Act amends FISA to address warrants, foreign and domestic wiretaps, data monitoring and more. The Department of Justice says the act FISA to its original focus of protecting the rights of persons in the United States, while not acting as an obstacle to gathering foreign intelligence on targets located in foreign tores countries." JULY 10, 2008 FISA AMENDMENTS ACT OF 2008 Changes to FISA include a clause providing immunity to telecommunications companies that cooperate with the government, one permitting an increase in the allotted length for warrantless wiretaps (up to a week) and one permitting the government to destroy search records. APRIL 15, 2009 NSA DENIES ALLEGATIONS OF ILLEGAL WIRETAPS The New York Times reports on domestic wiretapping by the NSA. When the news breaks, the NSA responds by claiming that its "intelligence operations, including programs for collection and analysis, are in strict accordance with U.S. laws and regulations." Two months later, PRISM begins collecting data from Facebook, joining Microsoft, Yahoo and Google. JULY 8, 2012 CELLULAR CARRIERS REVEAL 1.3 MILLION USER DATA REQUESTS The Times says law enforcement agencies are requesting enormous amounts of subscriber information from cellular APRIL 25– JULY 19, 2013 VERIZON GRANTS NSA METADATA Verizon reveals it's giving the NSA access to daily reports that include information on calls, such as length, location, time of day and more without revealing the content of the call. carriers. The nature of the collection remains ambiguous, including whether they collected the content of text messages. JUNE 19, 2013 JUNE 5, 2013 DRONE SURVEILLANCE EDWARD SNOWDEN FBI Director Robert Mueller admits that SHOCKS THE WORLD the United States uses drones for Technical contractor Edward Snowden domestic surveillance. released classified NSA material to media outlets that release details on some surveillance programs, including PRISM, which acquires user data from Microsoft, Yahoo, Google, Facebook, YouTube, Skype, AOL and Apple. Snowden flees to Hong Kong and continues to covertly communicate with some press. www PROGRAMS DRAW SUPPORT Shortly after Edward Snowden's revelation, a majority of Americans said they were not opposed to the NSA's domestic surveillance programs. Support* Oppose* 58% 39% Includes answers qualified by "somewhat" http://www.theatlanticwire.com/politics/2013/06/americans-want-more-information-nsa-surveillance-could-they-get-it/66389/ http://www.popsci.com/technology/article/2013-06/timeline-wiretapping-united-states SOURCES https://www.eff.org/ SECURITYDEGREEHUB.COM

Is Someone Listening?

shared by caradelany on Jul 08
283 views
1 share
0 comments
The latest shocker to the United States came just weeks ago, when Edward Snowden released classified information to major media outlets with details on how the NSA is collecting user data from sites m...

Tags

prism nsa

Category

Politics
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size