{"id":878,"date":"2012-03-17T09:35:14","date_gmt":"2012-03-17T13:35:14","guid":{"rendered":"http:\/\/goodwin.drexel.edu\/isensor\/smho\/?p=878"},"modified":"2012-03-17T09:35:14","modified_gmt":"2012-03-17T13:35:14","slug":"total-information-awareness-surveillance-program-is-back","status":"publish","type":"post","link":"https:\/\/shuyuanmaryho.com\/?p=878","title":{"rendered":"\u2018Total Information Awareness\u2019 surveillance program is back"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?p=878\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p>A new feature story in this month\u2019s Wired blows the lid off plans for a massive new National Security Agency data center in Utah that represents the resurrection of a program that Congress killed in 2003, known as \u201cTotal Information Awareness,\u201d targeting literally all electronic communications all over the world \u2014 including those made by American citizens.<\/p>\n<p>The proposal was to build computing systems that could suck up every electronic communication on the planet and filter them through a smart super-computer that would flag certain conversations, emails, transactions and other items of interest for further review. It was a program so monstrous in scope that after a brief legislative battle, Congress imposed strict regulations on the type of technology that could accomplish those ends, prohibiting it from ever being used against Americans.<\/p>\n<p>But if well sourced intelligence reporter James Bamford is to be believed, as of this year, their efforts to stop it are moot.<\/p>\n<p>According to Bamford, the NSA\u2019s new data center in Utah will be the most all-encompassing spy machine ever conceived, capable of breaking almost any encryption, reading any email and recording any phone call anywhere in the world, even if it\u2019s not made over the Internet. A network of ultra-sensitive satellites enhance the center\u2019s intelligence-finding capabilities with the unique ability to sniff electronic communications from a massive distance.<\/p>\n<p>More troubling still, Bamford\u2019s three covert sources who worked for the NSA reportedly claim that the agency is dumping Americans\u2019 communications into the mix, knowingly violating the U.S. Constitution in pursuit of a modern-day Manhattan Project.<\/p>\n<p>When Congress struck down the Pentagon\u2019s \u201cTotal Information Awareness\u201d program, they did, however, authorize funding for \u201dprocessing, analysis, and collaboration tools for counter terrorism foreign intelligence,\u201d which is precisely how the NSA describes this data center. Just a year after that authorization, Bamford notes that the Department of Energy founded a computing facility where scientists developed technology that was secretly being funneled to the NSA for the data center currently under construction.<\/p>\n<p>More at Wired Magazine at http:\/\/www.wired.com\/threatlevel\/2012\/03\/ff_nsadatacenter\/all\/1 <\/p>\n<p>Text from RawStory.com: http:\/\/www.rawstory.com\/rs\/2012\/03\/16\/total-information-awareness-surveillance-program-returns-bigger-than-ever\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new feature story in this month\u2019s Wired blows the lid off plans for a massive new National Security Agency data center in Utah that represents the resurrection of a program that Congress killed in 2003, known as \u201cTotal Information &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?p=878\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-878","post","type-post","status-publish","format-standard","hentry","category-the-latest-news-ideas-problems-strategies-and-tactics-in-securing-cyberspace-and-virtual-organizations-discussed-by-experts-in-industries-as-well-as-academia"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=878"}],"version-history":[{"count":0,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/878\/revisions"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}