

SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.


Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.

Testifying before the House judiciary committee, NSA deputy director John C. Inglis said that the agency's analysts can perform "a second or third hop query" through its massive store of telephone and internet records in order to find connections to terrorist organizations.
"Hops" are a technical term indicating connections between people, the Guardian's Spencer Ackerman explains. "A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with."
According to Inglis, this spying web is permitted under rules set by the secret Foreign Intelligence Surveillance Court, or FISA court. However, those justifications remain unknown due to the Department of Justice's insistence that, because of the classified content of their dealings, the court's interpretation of the law must also be kept secret.
Documents leaked by NSA whistleblower Edward Snowden and released by the Guardian previously exposed the practice of "contact chaining," or analyzing networks with two degrees of separation from the "target." Wednesday's hearing disclosures go another step further in revealing the true extent of the seemingly endless web of surveillance.
_____________________
Dear Common Dreams reader, It’s been nearly 30 years since I co-founded Common Dreams with my late wife, Lina Newhouser. We had the radical notion that journalism should serve the public good, not corporate profits. It was clear to us from the outset what it would take to build such a project. No paid advertisements. No corporate sponsors. No millionaire publisher telling us what to think or do. Many people said we wouldn't last a year, but we proved those doubters wrong. Together with a tremendous team of journalists and dedicated staff, we built an independent media outlet free from the constraints of profits and corporate control. Our mission has always been simple: To inform. To inspire. To ignite change for the common good. Building Common Dreams was not easy. Our survival was never guaranteed. When you take on the most powerful forces—Wall Street greed, fossil fuel industry destruction, Big Tech lobbyists, and uber-rich oligarchs who have spent billions upon billions rigging the economy and democracy in their favor—the only bulwark you have is supporters who believe in your work. But here’s the urgent message from me today. It's never been this bad out there. And it's never been this hard to keep us going. At the very moment Common Dreams is most needed, the threats we face are intensifying. We need your support now more than ever. We don't accept corporate advertising and never will. We don't have a paywall because we don't think people should be blocked from critical news based on their ability to pay. Everything we do is funded by the donations of readers like you. When everyone does the little they can afford, we are strong. But if that support retreats or dries up, so do we. Will you donate now to make sure Common Dreams not only survives but thrives? —Craig Brown, Co-founder |

Testifying before the House judiciary committee, NSA deputy director John C. Inglis said that the agency's analysts can perform "a second or third hop query" through its massive store of telephone and internet records in order to find connections to terrorist organizations.
"Hops" are a technical term indicating connections between people, the Guardian's Spencer Ackerman explains. "A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with."
According to Inglis, this spying web is permitted under rules set by the secret Foreign Intelligence Surveillance Court, or FISA court. However, those justifications remain unknown due to the Department of Justice's insistence that, because of the classified content of their dealings, the court's interpretation of the law must also be kept secret.
Documents leaked by NSA whistleblower Edward Snowden and released by the Guardian previously exposed the practice of "contact chaining," or analyzing networks with two degrees of separation from the "target." Wednesday's hearing disclosures go another step further in revealing the true extent of the seemingly endless web of surveillance.
_____________________

Testifying before the House judiciary committee, NSA deputy director John C. Inglis said that the agency's analysts can perform "a second or third hop query" through its massive store of telephone and internet records in order to find connections to terrorist organizations.
"Hops" are a technical term indicating connections between people, the Guardian's Spencer Ackerman explains. "A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with."
According to Inglis, this spying web is permitted under rules set by the secret Foreign Intelligence Surveillance Court, or FISA court. However, those justifications remain unknown due to the Department of Justice's insistence that, because of the classified content of their dealings, the court's interpretation of the law must also be kept secret.
Documents leaked by NSA whistleblower Edward Snowden and released by the Guardian previously exposed the practice of "contact chaining," or analyzing networks with two degrees of separation from the "target." Wednesday's hearing disclosures go another step further in revealing the true extent of the seemingly endless web of surveillance.
_____________________