FISA Amendments Act Section 702 (Part 1)

INTRODUCTION

This series of publications will highlight the copious amounts of surveillance orchestrated by the National Security Agency on U.S. and foreign citizens, intelligence agencies, and other entities that may have piqued the interest of the NSA.

The Foreign Intelligence Surveillance Act (FISA) of 1978 Amendments Act of 2008 is an extension of the original FISA Act of 1978 that was signed into law by President George W. Bush and the 110th United States Congress on July 10, 2008. It was then re-authorized by President Barack Obama on December 30, 2012.

Source: https://www.intelligence.senate.gov/laws/fisa-amendments-act-2008

NSA STATEMENT ON STOPPING FISA § 702 “UPSTREAM” ACTIVITIES

Excerpt from the NSA Statement:

Under Section 702, NSA collects internet communications in two ways: “downstream” (previously referred to as PRISM) and “upstream.” Under downstream collection, NSA acquires communications “to or from” a Section 702 selector (such as an email address). Under upstream collection, NSA acquires communications “to, from, or about” a Section 702 selector. An example of an “about” email communication is one that includes the targeted email address in the text or body of the email, even though the email is between two persons who are not themselves targets. The independent Privacy and Civil Liberties Oversight Board described these collection methods in an exhaustive report published in 2014.”

Source: https://archive.fo/6lQjF

PCLOB REPORT PURSUANT TO FISA § 702 (PDF FILE)

The Privacy and Civil Liberties Oversight Board (PCLOB) in 2014 issued this report some time after it became a new, independent agency. The Section 702 Study came into the spotlight when “[PCLOB] Board Members identified a series of programs and issues to prioritize for review.”

On page 7 of the report, PCLOB identifies FISA § 702:
PCLOB Report 2014 screenshot page 7

FISA § 702, according to PCLOB, has not been intentionally abused by the various intelligence agencies (FBI, CIA, NSA, CSS, etc.) that have practiced it.

Source (PDF): https://www.pclob.gov/library/702-report.pdf

PCLOB & SECTION 215

PCLOB section 215 - interview

Source: https://www.wikileaks.org/podesta-emails/emailid/12259

HOW THE NSA USES FISA 2008 § 702 – ABUSES & PROCEDURES

Source: https://www.eff.org/deeplinks/2014/05/way-nsa-uses-section-702-deeply-troubling-heres-why

FISA 2008 § 702 & WIKILEAKS

This is more speculative on our end, but if we were the U.S. intelligence agencies, and Wikileaks was publishing damaging info about us, we would ABSOLUTELY want to exploit FISA to detect and intercept future publications to save our public confidence.

Someone wants to send DNC emails to Wikileaks? Use FISA to find out who it is.

Someone wants to leak war crimes to Wikileaks? Use FISA and find out who it is.

Someone wants to expose the NSA botnet? Use FISA and find out who it is.

Someone wants to expose the intelligence agencies abusing FISA? Use FISA and find out who it is.

You get the idea. Some are starting to believe that FISA was used to identify the one who leaked the DNC emails to Wikileaks. It would make sense, considering Wikileaks boasts a very secure and encrypted submission process. It would take the power of an  entire intelligence agency to figure it out.

More coming soon! This is still developing, so we will publish more as we come across new information.

WATCHCOM

Advertisements

One thought on “FISA Amendments Act Section 702 (Part 1)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s