3 posts tagged with nsa by bukharin.
Displaying 1 through 3 of 3.

Related tags:
+ (57)
+ (40)
+ (33)
+ (27)
+ (25)
+ (25)
+ (19)
+ (18)
+ (16)
+ (15)
+ (15)
+ (14)
+ (14)
+ (14)
+ (13)
+ (13)
+ (13)
+ (12)
+ (12)
+ (11)
+ (10)
+ (10)
+ (9)
+ (8)
+ (8)
+ (8)
+ (7)
+ (7)
+ (7)
+ (7)
+ (7)
+ (7)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)


Users that often use this tag:
anemone of the state (13)
Postroad (13)
homunculus (12)
digaman (9)
jeffburdges (5)
zarq (3)
paleyellowwithorange (3)
i_am_a_Jedi (3)
bukharin (3)
Sleeper (3)
the man of twists ... (3)
Noisy Pink Bubbles (2)
stoneweaver (2)
scalefree (2)
dunkadunc (2)
Pope Guilty (2)
lattiboy (2)
orthogonality (2)
amberglow (2)
Steven Den Beste (2)

Pentagon sets its sights on social networking websites

Pentagon sets its sights on social networking websites From the fine folks that brought you the Total Terrorism Information Awareness program, another wickedly-named branch of the NSA, the Disruptive Technologies Office (formerly ARDA), is funding research into the usefulness of the Semantic Web for combing through and profiling the 80 million members of MySpace.
posted by bukharin on Jun 9, 2006 - 45 comments

 

Specter: Administration broke law

Sen. Arlen Specter, R-Pa., chairman of the Senate Judiciary Committee, says President George W. Bush's warrantless surveillance program appears to be illegal. Appearing on NBC's "Meet the Press," Specter called the administration's legal reasoning "strained and unrealistic" and said the program appears to be "in flat violation" of the Foreign Intelligence Surveillance Act.
posted by bukharin on Feb 5, 2006 - 47 comments

NSA Whistleblower Alleges Illegal Spying

Watch what you say. Russell Tice, the NSA whistleblower who was the source for the NYT, has alleged that the the technology exists to track and sort through every domestic and international phone call as they are switched through centers, such as one in New York, and to search for key words or phrases that a terrorist might use. "If you picked the word 'jihad' out of a conversation," Tice said, "the technology exists that you focus in on that conversation, and you pull it out of the system for processing." What else are they listening for?
posted by bukharin on Jan 10, 2006 - 87 comments

Page: 1