>>258697
>we need to see exactly how our government
>spies on its citizens
That goes directly to something called "sources and methods" and THAT, my fellow anon, is the holy grail that you don't get to see. I'll give you an example:
The "Stingray" device (mimics a cell tower) allows a cell phone to be used as a tracking device, all one needs is the phone number. There are multiple LEO's that have the Stingray. That is public knowledge at this point, but there's more.
Police have devices that will suck all data out of your cell phone in a matter of minutes at a stop. Some LEO's have been using these regularly. Ever hear of "Stop and Frisk"? It wasn't long ago that this was strictly national intelligence stuff, then it went downstream to .mil and now it's in the hands of LEO's at the local level.
Business intelligence geeks have proved that a cell phone's mike can be turned on and off remotely, even if powered down, as long as the battery is in the phone. Once above a certain level, that's a possibility. Expect to see a downward migration of this technology too.
Per CALEA, cell towers must be capable of DF'ing cell phones in real-time and the phone companies keep records of that info because storage is practically free. It's something they don't want in the court system (they don't want people to know) but when a crime occurs all the LEO's have to do is ask which cell phones were near a specific spot within a 20 minute (or whatever time frame) period of time. That's called a list of suspects.
A bit of data mining and they have the names and data on everyone who has their phone tied to their name. The rest of the cell phones are unknown. If they're on, the phone company can give a general location in real time. Stingray takes over. Subject is stopped by police who mine their cell phone to get all their past calls, messages, photos, browsing history, all social media passwords, banking info, everything. You can't believe how much data people store in smart phones, and it takes 1-2 minutes to get it all.
But guess what? Even if you're never considered a suspect, the data leached off your phone is now in their database for future reference.
Let's say that based on this procedure, the LEO strongly suspect an individual. They now use "normal" methods and procedures to develop a case against that individual so as to not have to reveal how they zeroed in on that person in the first place or what initial evidence they got from them in that manner.
Expand your thinking. What this means is that merely being in the wrong place at the wrong time makes you a suspect. What do you have on your phone that might give the LEO's something to investigate?
All of this is common knowledge to anyone with any awareness at all. This technological genie is out of the bottle. Don't want it to happen? Don't carry a cell phone.
We might be able to get some documents released that prove MI6 was sitting in Fort Meade using our equipment to spy on American citizens at the request of the clowns who couldn't legally do it, but don't expect them to explain how they did it.