Skip to main content
  • 181 Accesses

Abstract

This chapter discusses problems inherent in the technologies themselves, such as their tendency to produce false positives, and it assesses the efficiency of various subprograms such as Section 702 (FISA) investigations and Section 215 (Patriot Act) investigations. It discusses conventional investigations and shows the relationship between these and available high-tech solutions. It also examines Section 702 programs operating without judicial oversight, such as MUSCULAR and INCENSOR. In addition, it examines lesser-known ways in which the NSA surveillance program is tapping into popular devices to sweep up personal information, such as smartphone applications, missed calls and contact lists, electronic business cards, chats, credit card transactions, and text messaging. Finally, it examines subprograms that transcend the original purposes of the system to prevent terrorism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. National Security Agency, Procedures Used by the National Security Agency in Connection with Acquisitions of Foreign Intelligence Information pursuant to Section 702 of the Foreign Intelligence Surveillance Act as Amended, October 31, 2011, Section 3(c)(1). Retrieved on June 18, 2014 from https://www.aclu.org/files/assets/minimization_procedures_used_by_nsa_in_connection_with_fisa_sect_702.pdf.

    Google Scholar 

  2. G. Givens, J. R. Beveridge, B. A. Draper, and D. Bolme, “A Statistical Assessment of Subject Factors in the PCA Recognition of Human Faces,” Proceedings of the 2003 Conference on Computer Vision and Pattern Recognition Workshop, 8 (2003), p. 7.

    Google Scholar 

Download references

Authors

Copyright information

© 2014 Elliot D. Cohen

About this chapter

Cite this chapter

Cohen, E.D. (2014). Network Searches and Applications. In: Technology of Oppression: Preserving Freedom and Dignity in an Age of Mass, Warrantless Surveillance. Palgrave Macmillan, New York. https://doi.org/10.1057/9781137408211_4

Download citation

Publish with us

Policies and ethics