TITLE

Big Data Surveillance Is Real Purpose of Huge NSA Phone Record Sweep

AUTHOR(S)
Rash, Wayne
PUB. DATE
June 2013
SOURCE
eWeek;6/ 6/2013, p2
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports that the surveillance of big data is the real purpose of the storage of phone calls to the U.S. National Security Agency (NSA). It states that the phone calls which were handed over by phone company Verizon only included the callers' phone numbers and call duration. It says that the NSA is interested in discovering call patterns in the U.S. that seem to occur in conjunction with the patterns of possible terrorist attacks.
ACCESSION #
91662566

 

Related Articles

  • NSA collecting daily domestic telephone data from Verizon: The Guardian. GILL, KATHY // Moderate Voice;6/5/2013, p11 

    The article offers information on the National Security Agency(NSA)'s instruction to Verizon Communications Inc. to provide an electronic copy of all U.S. phone call detail records. It states that Verizon Business Network Services Inc. has networks in North America, Europe, Asia, Latin America,...

  • Mind the Gap. Batey, Angus // Aviation Week & Space Technology;8/19/2013, Vol. 175 Issue 28, p53 

    The article examines the challenges brought about by data-privacy concerns from ongoing communications surveillance being conducted by the U.S. government. Topics discussed include industry consensus on a strategy for the National Security Agency (NSA) and telecom sector to capitalize on leaks...

  • Speaking About Spying.  // Syracuse New Times;7/10/2013, Issue 2185, p4 

    An interview with Dan Maffei, U.S. Representative for New York's 24th congressional district, is presented. He says that the collection of the phone records of Americans by the U.S. National Security Agency (NSA) is justified only when it involves prevention of terrorism. He mentions that he is...

  • New Jersey, feds tussle over NSA phone-records scandal. Weaver, Heather Forsgren // RCR Wireless News;6/19/2006, Vol. 25 Issue 25, p24 

    The article reports on the public fight between the state government of New Jersey and the U.S. federal government about whether five telecommunications companies turned over customer call records to the National Security Agency and in doing so violated New Jersey's consumer-protection law. The...

  • Big Brother is Watching. Hennie, Jeff // American Iron Magazine;Sep2013, Issue 301, p28 

    The article focuses on the intelligence activities being done by the U.S. government. The National Security Agency (NSA) leak showed the world how the government is running a clandestine electronic surveillance program as well as how President Barack Obama gave a top secret order to a Verizon...

  • The NSA Black Hole: 5 Basic Things We Still Don't Know About the Agency's Snooping. Elliott, Justin; Meyer, Theodoric // Pro Publica;6/10/2013, p2 

    The article raises a number of questions about mass surveillance activities of the U.S. Federal Bureau of Investigation (FBI) and the National Security Agency (NSA). The first question concerns with the collection of phone records of Americans by the NSA with the cooperation of telecommunication...

  • The Surveillance Society: Show Me the Pictures.  // BAGnewsNotes;6/10/2013, p2 

    Photographs are presented related to surveillance detection and imagery from the U.S. National Security Agency (NSA).

  • Political Economies of Surveillance. Ball, Kirstie S.; Wood, David Murakami // Surveillance & Society;2013, Vol. 11 Issue 1/2, p1 

    An introduction to the journal is presented in which the editors discuss the politics behind surveillance and the existence of society under this surveillance by U.S. National Security Agency.

  • US Snooping Program Had Server in India: Report.  // India -- West;8/9/2013, Vol. 38 Issue 38, pA34 

    The article focuses on a report issued by the newspaper "Guardian," according to which the XKeyscore surveillance program run by the U.S. National Security Agency has installed 700 snooping servers at 150 locations across the globe including India, which enable analysts to search databases.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics