Avatar feed
Responses: 6
MAJ Jim Woods
3
3
0
Totally Shocked..... ROTF
(3)
Comment
(0)
SSgt Forensic Meteorological Consultant
(0)
Reply
(0)
Avatar small
LTC Battalion Commander
2
2
0
No surprise there? I know Snowden was a chuckle-head, but he let the cat out of the bag on what our government was planning on doing to its own citizens?
(2)
Comment
(0)
COL Ted Mc
COL Ted Mc
9 y
LTC (Join to see) - Colonel; I suspect that history is going to be somewhat kinder to Mr. Snowden then expected at first.
(1)
Reply
(0)
LTC Battalion Commander
LTC (Join to see)
9 y
From my foxhole, I suspected it was going on... However, there are protocols when dealing with high classified programs. Clinton could take some notes? that email server was wide open to a Battalions worth of cyber units from Russia and China? God only knows what was deleted from those emails and the damage it is/could cause. Now this program and many, many more we don't know about... who knows where this will leads us.
(0)
Reply
(0)
COL Ted Mc
COL Ted Mc
>1 y
LTC (Join to see) - Colonel; I'd agree that there was a possibility that Ms. Clinton's eMail server was "wide open" (but that hasn't been shown to be the case yet and [assuming all of the other procedural and legal steps were properly complied with is actually irrelevant]) but there is an old maxim that people who are looking for something in one place don't find it if it is another place (and find it even less often if they don't even know that that other place exists).

I will agree that Ms. Clinton's conduct was HIGHLY ill-advised. I am still not convinced that there is a "reasonable likelihood of conviction" if a prosecution is started (and apparently the Department of Justice [which is supposed to know more about the situation than I do] shares my opinion).
(0)
Reply
(0)
Avatar small
MSG Mitch Dowler
2
2
0
Actually NSA data has long been used to monitor Citizens. Our government has not run in a Constitutional manner for a many, many years.
(2)
Comment
(0)
COL Ted Mc
COL Ted Mc
9 y
MSG Mitch Dowler - Master Sergeant; Since the Fourth Amendment states that only "persons, houses, papers, and effects" are protected from "unreasonable searches and seizures" it is quite possible to obtain a "legal opinion" that people's COMMUNICATIONS are NOT "constitutionally protected" (unless, of course, you want to follow the rulings of "activist judges").
(1)
Reply
(0)
MSG Mitch Dowler
MSG Mitch Dowler
9 y
Communications using phones, internet, etc. are the papers and effects of our times just as AR-15's, AK's and the like are the muskets of today covered by the second amendment. I sense a bit of facetiousness in your post so I imagine you were already in agreement with me.

As I have stated many times the Constitution and Bill of Rights do not grant rights. Rights are granted by our Creator as the Declaration of Independence gives proper credit to. The Constitution and Bill of Rights merely enumerate or affirm those God given rights every person everywhere in the world already has which are infringed upon by various degrees by the governments people have to live with.

Our forefathers did indeed fear that enumerating certain rights would give the false impression of being all inclusive as you have demonstrated by stating that methods such as pony express, telegram, computer and internet are not protected.
(0)
Reply
(0)
Maj Kevin "Mac" McLaughlin
Maj Kevin "Mac" McLaughlin
9 y
Please describe how you think they do this, where, and for what reason... you might think it's obvious but I'd really like to know how and why you think it's being done.
(0)
Reply
(0)
MSG Mitch Dowler
MSG Mitch Dowler
9 y
As a 20 year Signal Soldier retiree and with another 17 years working in the telecommunications field of the private sector I have a small amount of experience in this. The internet is a web of routers and optical carrier connections owned and operated by private carriers. The major connections take place in large regional hubs in large buildings where these carriers have collocation facilities and cross-connect to each other in meet-me-rooms managed by the building or collocation operator. The building has fiber connection paths through the building usually using an elevator shaft as a fiber a cable chimney. At some location along this path NSA, a private company contracted by NSA or often NSA posing a private company inserts themselves in that path. There are passive devices made by various manufacturers that these internet 10 Gig circuits or even larger pass through. These devices are also used to monitor and analyze voice or internet traffic for legitimate troubleshooting and quality of service reasons. These passive devices do not affect the circuit even if there is a complete power failure but they do allow the transmitted frames to be aggregated and passed off to other routers and servers for storage or analysis. These servers that perform storage and analysis functions may be thousands of miles away such as the facility near Salt Lake City, UT. NSA employees are common in these buildings but they look and act like any other technician working for a private company.

This is only one method.
(0)
Reply
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close