Results 1 to 10 of 10

Thread: Keywords Homeland Security Uses to Monitor Social Networking Sites

  1. #1
    Join Date
    May 2009
    Location
    New York
    Posts
    3,772

    Keywords Homeland Security Uses to Monitor Social Networking Sites

    Here's a list of keywords used by the Department of Homeland Security to monitor social network sites:


    Read more: Dept. of Homeland Security Forced to Release List of Keywords Used to Monitor Social Networking Sites - Forbes

  2. #2
    List is a year old and as I have said before, I really doubt now that DHS, FBI, DOJ, etal bother with words and phrases.

    Not with the new Utah Center for NSA now open for business.

    Privacy of World Citizens Wiped Out by USA
    Privacy of World Citizens Wiped Out by USA

  3. #3
    Join Date
    May 2009
    Location
    New York
    Posts
    3,772
    The Guardian reports the National Security Agency is currently collecting the telephone records of millions of US customers of Verizon.

    According to a 2010 Washington Post story, "Every day collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." Theses communications are the result of both foreign and domestic spying.

    This includes the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails--parking receipts, travel itineraries, bookstore purchases, and other digital 'pocket litter.'" According to a "senior intelligence official" quoted in the story, the Utah facility will also be a vital tool in breaking encrypted codes.
    Read more: The Government Records and Stores Every Phone Call and Email - CIO.com

  4. #4
    Quote Originally Posted by iowadawg View Post
    List is a year old and as I have said before, I really doubt now that DHS, FBI, DOJ, etal bother with words and phrases.

    Not with the new Utah Center for NSA now open for business.

    Privacy of World Citizens Wiped Out by USA
    Privacy of World Citizens Wiped Out by USA
    This is conjecture, but I doubt they've discarded the list. I suspect instead theyve refined the technique by incorporating something along the lines of a google style algorithm to winnow down the list based on context.
    -- Do not meddle in the affairs of dragons, for you are crunchy and good with ketchup. --

  5. #5
    What I found weird, are all these billions dollars spent in technologies that cannot catch these sick terrorists.


    Take a look at the list, that's pretty impressive!

    Terrorist Attacks in the U.S. or Against Americans | Infoplease.com

    Why can't they prevent more atrocities with all technologies available?

  6. #6
    Hard to catch bass if you're fishing for catfish.

    DHS has scrubbed the training manuals of those "insensitive" words like "radical islamic terrorists".
    Their focus is on "rightwing extremists". They aren't looking for terrorists in mosques, they're searching tea party rallies.
    -- Do not meddle in the affairs of dragons, for you are crunchy and good with ketchup. --

  7. #7
    Join Date
    May 2009
    Location
    New York
    Posts
    3,772
    The Government is using a program which is code-named PRISM. They can watch you as you type.

    According to the Post the National Security Agency and FBI are “tapping directly into the central servers of nine leading US Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.”

    All of the biggest technology companies in America participate in PRISM, including Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. Dropbox is coming next, according to reports.

    Quote Originally Posted by robjones View Post
    Hard to catch bass if you're fishing for catfish.

    DHS has scrubbed the training manuals of those "insensitive" words like "radical islamic terrorists".
    Their focus is on "rightwing extremists". They aren't looking for terrorists in mosques, they're searching tea party rallies.
    The NSA uses keywords to produce 51 percent certainty that a target is “foreign” or like you said it all depends on the keywords.

  8. #8
    If you have not read it since high school, re-read the book "1984." The Thought Police are actively supporting Big Brother.

    If you have a Kindle or other e-reader it is a free download. It is amazing how much of that story has come true. It just took a few years longer than Orwell imagined.
    "Democracy is two wolves and a lamb voting on what to have for lunch. Liberty is a well-armed lamb contesting the vote." -- Benjamin Franklin


  9. #9
    Quote Originally Posted by TopDogger View Post
    If you have not read it since high school, re-read the book "1984." The Thought Police are actively supporting Big Brother.

    If you have a Kindle or other e-reader it is a free download. It is amazing how much of that story has come true. It just took a few years longer than Orwell imagined.

    We are going in a modern feudalism looking like this: royalty (bank cartel), lords (wealthy), vassals (politicians), knights (executive branch), fiefs (multi national corporations and national corporations), and peasants (people).

    Nothing changed really, we are still oppressed and exploited.

  10. #10
    Join Date
    May 2009
    Location
    New York
    Posts
    3,772
    NSA Whistleblower: Obama Took Down General Petraeus with Surveilance Program

    William Binney, whistleblower and former NSA crypto-mathematician who served in the agency for decades, said the David Petraeus sex scandal was most likely exposed using illegal surveillance of his email.
    NSA Whistleblower: Obama Took Down General Petraeus with Surveillance Program


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •