Oh Lord!
There was a lot of folks brainwashed anon, including me (not about Bernie but other things). He was young.
Review:
Patriot.
Q
This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks
Paul Szoldra
Sep. 16, 2016, 8:00 AM
https://www.businessinsider.com/snowden-leaks-timeline-2016-9
Here is everything that Snowden's leaks revealed between 2013 and 2014:
• With a top-secret court order, the NSA collected the telephone records from millions of Verizon customers. — June 6, 2013
NSA PRISM slide
The Guardian
• The NSA accessed and collected data through back doors into US internet companies such as Google and Facebook with a program called Prism. — June 7, 2013
• An 18-page presidential memo shows Obama ordering intelligence officials to draw up a list of overseas targets for cyberattacks. — June 7, 2013
• Documents reveal the NSA's Boundless Informant program, which gives the agency near real-time ability to understand how much intelligence coverage there is on certain areas through use of a "heat map." — June 8, 2013
• The NSA was hacking computers in Hong Kong and mainland China, few of which were military systems. — June 13, 2013
• Britain's GCHQ (its intelligence agency) intercepted phone and internet communications of foreign politicians attending two G-20 meetings in London in 2009. — June 16, 2013
• Top-secret procedures show steps the NSA must take to target and collect data from "non-US persons" and how it must minimize data collected on US citizens. — June 20, 2013
• Britain's GCHQ taps fiber-optic cables to collect and store global email messages, Facebook posts, internet histories, and calls, and then shares the data with the NSA. — June 21, 2013
• The NSA has a program codenamed EvilOlive that collects and stores large quantities of Americans' internet metadata, which contains only certain information about online content. Email metadata, for example, reveals the sender and recipient addresses and time but not content or subject. — June 27, 2013
• Until 2011, the Obama administration permitted the NSA's continued collection of vast amounts of Americans' email and internet metadata under a Bush-era program called Stellar Wind. — June 27, 2013
• The US government bugged the offices of the European Union in New York, Washington, and Brussels. — June 29, 2013
• The US government spies on at least 38 foreign embassies and missions, using a variety of electronic surveillance methods. — June 30, 2013
• The NSA spies on millions of phone calls, emails, and text messages of ordinary German citizens. — June 30, 2013
• Using a program called Fairview, the NSA intercepts internet and phone-call data of Brazilian citizens. — July 6, 2013
• Monitoring stations set up in Australia and New Zealand help feed data back to NSA's XKeyscore program. — July 6, 2013
• The NSA conducts surveillance on citizens in a number of Latin American countries, including Venezuela, Colombia, Argentina, Panama, Ecuador, Peru, and others. The agency also sought information on oil, energy, and trade. — July 9, 2013
• The Washington Post publishes a new slide detailing NSA's "Upstream" program of collecting communications from tech companies through fiber-optic cables to then feed into its Prism database. — July 10, 2013
• Germany's Federal Intelligence Service, BND, helps contribute data to the NSA's XKeyscore program. — July 20, 2013
NSA2
The Guardian
• NSA analysts, using the XKeyscore program, can search through enormous databases of emails, online chats, and browsing histories of targets. — July 31, 2013
• The US government paid Britain's GCHQ roughly $155 million over three years to gain access and influence over its spying programs. — August 1, 2013
• Seven of the world's leading telecommunications companies provide GCHQ with secret, unlimited access to their network of undersea cables. — August 2, 2013
• The NSA provided surveillance to US diplomats in order to give them the upper hand in negotiations at the UN Summit of the Americas. — August 2, 2013
• The NSA sifts through vast amounts of Americans' email and text communications going in and out of the country. — August 8, 2013
• Internal NSA document reveals an agency "loophole" that allows a secret backdoor for the agency to search its databases for US citizens' emails and phone calls without a warrant. — August 9, 2013
• NSA collection on Japan is reportedly maintained at the same priority as France and Germany. — August 12, 2013
• The NSA broke privacy rules thousands of times per year, according to an internal audit. — August 15, 2013
• NSA analysts revealed to have sometimes spied on love interests, with the practice common enough to have coined the term LOVEINT, or love intercepts. (It was unclear whether this report came from Snowden docs.) — August 23, 2013
• Britain runs a secret internet-monitoring station in the Middle East to intercept emails, phone calls, and web traffic, The Independent reports, citing Snowden documents. Snowden denies giving The Independent any documents, alleging the UK government leaked them in an attempt to discredit him. — August 23, 2013
• The top-secret US intelligence "black budget" is revealed for 2013, with 16 spy agencies having a budget of $52.6 billion. — August 29, 2013
Black BudgetMartin Grandjean
• Expanding upon data gleaned from the "black budget," the NSA is found to be paying hundreds of millions of dollars each year to US companies for access to their networks. — August 29, 2013
• The US carried out 231 offensive cyberattacks in 2011. — August 30, 2013
• The NSA hacked into Qatar-based media network Al Jazeera's internal communications system. — August 31, 2013
• The NSA spied on former Brazilian President Dilma Rousseff and Mexican President Enrique Peña Nieto (then a candidate). — September 1, 2013
• Using a "man in the middle" attack, NSA spied on Google, the French Ministry of Foreign Affairs, the Society for Worldwide Interbank Financial Telecommunications, and the Brazilian oil company Petrobras. — September 2, 2013
• A US intelligence "black budget" reveals Al Qaeda's effort to jam, hack, and/or shoot down US surveillance drones. — September 3, 2013
• A joint investigation by ProPublica, The New York Times, and The Guardian finds the NSA is winning its war against internet encryption with supercomputers, technical know-how, and court orders. — September 5, 2013
• The NSA has the ability to access user data for most major smartphones on the market, including Apple iPhones, BlackBerrys, and Google Android phones. — September 7, 2013
• The NSA shares raw intelligence data (with information about American citizens) to Israel with an information-sharing agreement. — September 11, 2013
• The NSA monitors banks and credit institutions for a comprehensive database that can track the global flow of money. — September 16, 2013
• Britain's GCHQ launched a cyberattack against Belgacom, a partly state-owned Belgian telecommunications company. — September 20, 2013
• The NSA spies on Indian diplomats and other officials in an effort to gain insight into the country's nuclear and space programs. — September 23, 2013
• The NSA's internal "wiki" website characterizes political and legal opposition to drone attacks as part of "propaganda campaigns" from America's "adversaries." — September 25, 2013
• Since 2010, the NSA has used metadata augmented with other data from public, commercial, and other sources to create sophisticated graphs that map Americans' social connections. — September 28, 2013
• The NSA stores a massive amount of internet metadata from internet users, regardless of whether they are being targeted, for up to one year in a database called Marina. — September 30, 2013
• The NSA and GCHQ worked together to compromise the anonymous web-browsing Tor network. — October 4, 2013
• Canada's signals intelligence agency, CSEC, spied on phone and computer networks of Brazil's Ministry of Mines and Energy and shared the information with the "Five Eyes" intelligence services of the US, Canada, Britain, Australia, and New Zealand. — October 7, 2013
nsa computer spying
A reflection of Charlie Miller is pictured on his computer screen in his home-office in Wildwood, Missouri April 30, 2013. Miller is a security researcher at Twitter who previously worked for the National Security Agency (NSA). REUTERS/Sarah Conard
• The NSA collected more than 250 million email contact lists from services such as Yahoo and Gmail. — October 14, 2013
• NSA surveillance was revealed to play a key role in targeting for overseas drone strikes. — October 16, 2013
• The NSA spied on French citizens, companies, and diplomats, and monitored communications at France's embassy in Washington and its UN office in New York. — October 21, 2013
• The NSA tapped the mobile phone of German Chancellor Angela Merkel. — October 23, 2013
• The NSA spied on Italian citizens, companies, and government officials. — October 24, 2013
• The NSA monitored the phone calls of 35 world leaders and encouraged other government agencies to share their "Rolodexes" of foreign politicians so it could monitor them. — October 25, 2013
• The NSA spied on Spanish leaders and citizens. — October 25, 2013
• The NSA stations surveillance teams at 80 locations around the world. — October 27, 2013
• A joint program between the NSA and Britain's GCHQ called Muscular infiltrates and copies data flowing out of Yahoo and Google's overseas data centers. One slide boasted of "SSL added and removed here!" with a smiley face. — October 30, 2013
• The NSA spied on the Vatican. (The Panorama website did not cite Snowden as the source.) — October 30, 2013
Review:
HUSSEIN CABINET / STAFF
Who used private email addresses?
What was the purpose?
LL.
HRC.
JC.
JC.
CS.
AM.
We don't say his name.
RR.
SR.
JB.
HA.
VJ.
Did Hussein use a private email address?
@what?
Who just resigned from GOOG?
Why was ES in NK?
Why was ES in NK?
What private network did ES set up in NK?
What private network did ES set up in NK?
Who else was in NK during this time?
What private email address did Hussein use while in office?
Why would the Chairman of GOOG travel to NK?
WHY WOULD NK ALLOW ACCESS TO ES?
Nothing is ever truly erased/deleted.
These people are STUPID.
DECLASS-POTUS_
THE SHOT HEARD AROUND THE WORLD.
Q
ES is written twice in 2 lines
Edward Snowden and Eric Schmidt went to NK
They both helped set up the server