Under the authority of a provision in the Patriot Act, the Foreign Intelligence Surveillance Court has ordered telecommunications companies to turn over the phone records of nearly every call in the United States to the government. These orders, sought by the Justice Department, must be renewed every 90 days, and the data are stored by the National Security Agency. These records do not contain the names of callers or the calls’ content; they do include phone numbers, times and call durations.
NSA phone surveillance was also upheld by the now-notorious FISA courts , the secret courts which have granted legal go-aheads to the FBI and NSA for their spying over the last decade. In September, a FISA court judge ruled that the NSA’s phone program may have been skirting unconstitutional action, but it was still constitutional.
The Obama administration maintains that the secret Foreign Intelligence Surveillance Court (FISC) has found that dragnet phone metadata collection is constitutional. This is based on a 1979 Supreme Court decision, Smith v. Maryland , which found that police could collect a few days’ worth of suspects’ phone metadata without a warrant because the telephone company – a third party – also had access to that data, meaning there was no expectation of privacy on the suspects’ part.
Director of National Intelligence James Clapper decried the revelation of the intelligence-gathering programs as reckless and said it has done “huge, grave damage.” In recent days, he took the rare step of declassifying some details about them to respond to media reports about counterterrorism techniques employed by the government.
Senator Ron Wyden, an intelligence committee member who has emerged as a leading opponent of bulk collection, says the metadata provides NSA with a “human relations database”. For many, surveillance occurs when someone else collects anything on their interactions, movements, or communications, rather than when that other party collects certain kinds of information. And it hardly makes sense to say, as Alexander did, that surveillance on Americans doesn’t occur when NSA collects the sort of information that it believes actually has intelligence value.
Legislation by the Senate Intelligence Committee, which was approved by an 11-4 vote, would increase congressional and judicial oversight of intelligence activities. It also would create 10-year prison sentences for people who access the classified material without authorization, according to a statement released by committee chairwoman Sen. Dianne Feinstein, D-Calif., and Sen. Saxby Chambliss, R-Ga., the panel’s top Republican.
Sen. Lindsey Graham, R-SC., says the U.S. intelligence surveillance of phone records allows analysts to monitor U.S. phone records for a pattern of calls, even if those numbers have no known connection to terrorism. Graham says the National Security Agency then matches phone numbers against known terrorists. Graham helped draft the surveillance law that governs the surveillance program.
Some of the servers the agency uses are run by foreign intelligence services of friendly nations, including Britain, Australia, Canada, and New Zealand, but other servers may be on the soil of countries unaware that the agency is mining Internet “pipes” on their soil. Some of the harvesting of data takes place on the coasts of the United States and along the Mexican border. Most sites are in Europe, the Middle East, and along the borders of India, Pakistan, and China.
At the start of the hearing, the Obama administration released previously classified documents outlining the rules for how the domestic phone records may be accessed and used by intelligence analysts. And as senators debated the program, The Guardian newspaper published on its website a still-classified 32-page presentation, apparently downloaded by Edward J. Snowden, a former NSA contractor, that describes a separate surveillance activity by the agency.
Now it’s time to do your own NSA Surveillance. With the way cell phones have ingrained themselves in today’s society all around the world, no one even thinks twice about them. Of course most phones these days have cameras built into them as well but those are obvious, what if you need something a bit more covert? That’s where our latest device, the Phone Spy 2, comes into play.
With a camera hidden in the top of the phone you can walk around pretending to text message or even set the phone down on a table or counter and record everything that happens without anyone having even the slightest idea. Best of all the device menu system even looks like popular user interfaces so you can use the device normally to avoid suspicion.
Please note: Only the hidden camera functions of this device are officially supported.
New Products | |
Top Featured Products | |
Motion Detector Alarm Color Hidden Camera With Built-In DVR - Mini Alarm DVR with PIR Detection & Motion Detection The PIR MOTION DETECTOR HIDDEN CAMERA with built-in DVR is the best on the market. It doesn't just look... Motion Detector Alarm Color Hidden Camera With Built-In DVR |
SecureShot 1080p High-Def Electrical Box Hidden Camera/DVR w/NightVision - This ultimate electrical box SecureShot DVR offers features others only imagine. Our 940nm invisible IR illuminator array records in total darkness... SecureShot 1080p High-Def Electrical Box Hidden Camera/DVR w/NightVision |
USB Camstick Spy Camera w/Night Vision - The CamstickNV looks and functions like an ordinary flash drive. Yet this storage device conceals a DVR capable of recording both audio and quality color video.Motion activation mod... USB Camstick Spy Camera w/Night Vision |
SecureShot First Alert Smoke Detector Camera/DVR w/NightVision & 1 Year Battery - Our SecureShot Full High Definition 1080P Smoke Detector w/ 1 Year Standby Battery Camera/DVR is MADE IN USA. It features Amazing 1080P Full... SecureShot First Alert Smoke Detector Camera/DVR w/NightVision & 1 Year Battery |
Cross Hidden Spy Camera w/Built in DVR - The Cross Hidden Spy Camera with built in DVR is a tiny spy camera hidden inside a mini wearable cross. Cross Hidden Spy Camera w/Built in DVR |
Bush Baby Wifi Outlet - This functional 6 plug wall outlet can support up to six devices and even comes with two functional USB ports and comes in Black or White color. With this built in hidden camera you can keep track ... Bush Baby Wifi Outlet |
Mini Phone Charger Spy Camera/DVR - Functional phone charger. Our NEW Mini Charger Spy Camera/DVR is a small but powerful device. It offers Hi-Definition 1080p recording resolution hidden discreetly inside a functional ... Mini Phone Charger Spy Camera/DVR |
Bush Baby Stealth Hi-Def Outlet Spy Camera/DVR - FREE 16GB Micro SD Card - This wall adapter is perfect for just about any location. Its built-in camera on the front is positioned so that this ordinary looking object can b... Bush Baby Stealth Hi-Def Outlet Spy Camera/DVR - FREE 16GB Micro SD Card |
Secureguard 4K Ultra HD WiFi Battery Powered Fire Alarm Strobe Spy Camera - - 4K Resolution Battery Powered Spy Camera This Fire Strobe is WiFi enabled with a 4K Spy camera inside.You can remotely view and control the cam... Secureguard 4K Ultra HD WiFi Battery Powered Fire Alarm Strobe Spy Camera |
Secureguard 4K Ultra HD WiFi iPhone Dock Radio Spy Camera - Our Secureguard 4K Resolution WiFi Spy Camera is an iPhone Dock Radio with WiFi enabled with a 4K Spy camera inside.You can remotely view and control the camera ... Secureguard 4K Ultra HD WiFi iPhone Dock Radio Spy Camera |
Bush Baby 4K WiFi Two Camera Smoke Detector Spy Camera/DVR - ON SALE: $30 OFF!Are you looking for a smoke detector that covers all angles of the room? Then look no further. The Bush Baby 4K WiFi Two Camera Smoke Detector S... Bush Baby 4K WiFi Two Camera Smoke Detector Spy Camera/DVR |
Bush Baby 4K WiFi Dog Spy Camera/DVR - The Bush Baby 4K Wi-Fi Dog is the perfect device to protect your young ones. Whether you are making sure your child is staying out of trouble or keeping an eye on the babysitter no o... Bush Baby 4K WiFi Dog Spy Camera/DVR |
Be assured that your shopping experience is completely safe. The order site is secured using a Thawte SSL Web Server Certificate which encrypts all data to and from the site. However, if you prefer to pay with check or money order, just choose the off-line option when you check out. |