Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 17 December 2012

NCTC Scope "Breathtaking" - "Pre-Cogs" - fiction to fact in 10 years

Posted on 08:22 by Unknown
via The Wall Street Journal...
Counterterrorism officials wanted to create a government dragnet, sweeping up millions of records about U.S. citizens—even people suspected of no crime...

 


The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation.

Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans "reasonably believed to constitute terrorism information" may be permanently retained...

The changes also allow databases of U.S. civilian information to be given to foreign governments for analysis of their own. In effect, U.S. and foreign governments would be using the information to look for clues that people might commit future crimes.

"It's breathtaking" in its scope, said a former senior administration official familiar with the White House debate. (more)
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in cautionary tale, FutureWatch, government, law, mores, privacy, Ra-parents, spybot, statistics, tracking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • Digital Cameras Easily Turned into Spying Devices
    Newer cameras increasingly sport built-in Wi-Fi capabilities or allow users to add SD cards to achieve them in order to be able to upload a...
  • How secure is the Merkel-Phone?
    (Latest update: October 28, 2013) In an article by the German magazine Der Spiegel it was said that the NSA probably also eavesdropped on t...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • Highly secure mobile phones
    (Updated: June 5, 2013) In the previous post we saw that ordinary mobile phones offer only limited protection against eavesdropping. Theref...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ►  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ▼  2012 (84)
    • ▼  December (33)
      • 2013 at the International Spy Museum
      • Predicting Personal Aerial Surveillance – Drone On
      • Are They Tracking You? - Government Cell Phone Sur...
      • Turkish PM: Five Electronic Surveillance Devices F...
      • See Two App Store Icons on Your Phone? Beware.
      • Putting Spyware on Daughter's Phone Nets Restraini...
      • Remember the spy who was found dead in a duffle ba...
      • Wiretapping Sweeps Over China
      • Repeat after me, class, "Emails are postcards."
      • Christmas, and another phone company Pontius Pilat...
      • KGB: We Bugged Royals (We're shocked.)
      • Three Years of Privacy Stories - Wall Street Journal
      • Android Virus Uses Your Phone to Spread Spam
      • SpyCam Story #664 - This Month In SpyCam News
      • Florida Man Convicted in Wiretapping Scheme Target...
      • Android Malware Among Top Threats for 2013
      • FutureWatch: New TSCM Tool on the Far Horizon
      • The Bugging Report Too Dangerous to be Released
      • " I heard that law enforcement has some sort of sc...
      • Dockworkers Union Alleges Eavesdropping - West Coa...
      • Top 5 Wireless Tips for IT Pros
      • UPDATE: From our "Persistence is Futile" file...
      • Google Funds Spy Technology - Surveillance to the ...
      • UPDATE: $50 Hacking Device Opens Millions of Hotel...
      • NCTC Scope "Breathtaking" - "Pre-Cogs" - fiction t...
      • 2012 - Targeting U.S. Technologies Report Out
      • Security Flaw – Samsung Handsets & Tablets
      • TSCM Bug Sweeps: When, and When Not To - Part II
      • Feeb to Fed Xmas Files Secret Flash Sale
      • How to secure your Android phone - 14 Tips
      • Bus-ted... Public Buses Quietly Adding Microphones...
      • "Get me Bond. I'm ticked at the watchmakers."
      • Pictures at the NSA's 60th anniversary
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile