Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

One of the easiest ways to feel strong, and to hide from the world, is the sunglasses/headphones combo. By covering your eyes and ears, it sends the world’s largest “don’t talk to me” signal, while keeping any issue far away.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

No matter what the issue, unless you die, you’ll have another go at things. Even in love, taking a bow, then coming back later is always an option. Follow your heart.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

Brown was accused of being the mastermind behind a robbery attempt. In the “plot,” an armored truck was to be stopped and robbed at gunpoint. In practice, the driver was killed.

While prosecutors could not obtain Brown’s phone records (which would be needed to directly link him to a crime), they used the phone records of other suspects. Brown received multiple calls from one suspect, but otherwise has not been proven to actually have known about the plot. The supposed NSA records would be needed to prove his innocence, as their content would theoretically show that his calls were unrelated.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

Specifically, the Guardian leaks documents which suggested that, using the PATRIOT Act and FISA, the government had effectively created a record of every Verizon call, text, and message. The court order has been used to underscore the sheer scale and volume of intelligence gathering schemes that undermine the Constitution, such as PRISM.

This video is processing – it'll appear automatically when it's done.

Now, the programs that have been discussed over the last couple days in the press are secret in the sense that they're classified. But they're not secret in the sense that when it comes to telephone calls, every member of Congress has been briefed on this program. With respect to all these programs, the relevant intelligence committees are fully briefed on these programs. These are programs that have been authorized by broad bipartisan majorities repeatedly since 2006.

And so, I think at the outset, it's important to understand that your duly elected representatives have been consistently informed on exactly what we're doing. Now, let me take the two issues separately.

When it comes to telephone calls, nobody is listening to your telephone calls. That’s not what this program is about. As was indicated, what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not looking at content. But by sifting through this so-called metadata, they may identify potential leads with respect to folks who might engage in terrorism. If these folks -- if the intelligence community then actually wants to listen to a phone call, they've got to go back to a federal judge, just like they would in a criminal investigation.

So I want to be very clear -- some of the hype that we’ve been hearing over the last day or so -- nobody is listening to the content of people's phone calls. This program, by the way, is fully overseen not just by Congress, but by the FISA Court -- a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them, and that it's being carried out consistent with the Constitution and rule of law. And so, not only does that court authorize the initial gathering of data, but -- I want to repeat -- if anybody in government wanted to go further than just that topline data and want to, for example, listen to Jackie Calmes’ phone call, they would have to go back to a federal judge and indicate why, in fact, they were doing further probing."

(Tr. Statement of President Obama, June 7, 2013, last viewed June 9, 2013, at .)
Terrence Brown (Ft. Marshall Dore Louis & U.S. District Court for the Southern District of Florida) – US v. Brown (Motion to Compel Production of Phone Records)
Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

This video is processing – it'll appear automatically when it's done.

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

While the need to have some sort of intelligence gathering apparatus is very well defined, balancing this need with the Constitution in the post-Cold War period is not easy. With the extremes of no security and too much spying, the end results can often be abuses of power or failures to identify threats. The PATRIOT Act, in its original iteration, was supposedly designed to corral these potential abuses, forcing a court order and periodic Congressional approval for data gathering. Instead, the measure has been perverted to justify any effort, so long as a court order, done in secret, is attached.

Of course, plenty of critics feared at the time that the Patriot Act would lead to exactly these kinds of abuses. Here’s a handy 2003 roundup of the criticisms and lawsuits that the legislation had already attracted less than two years after passage.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

The controversial act gives the Executive Branch certain powers to pursue “enemies” and perceived terror threats. These measures tread the line of legality, often stepping over it with secret court approval. While originally intended to allow small, rare intrusions into the law, the measure has now been used to justify PRISM, the capture of Verizon data, and more – all on U.S. citizens.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

This, in more common terms, is called a “backdoor.” Destroying the active system, or even modifying it in a noticeable way, is not the goal of a malicious hacker. If that were to occur, the intrusion would be easily detected and closed. Instead, the goal is to allow easy repeat access, keeping a “door” into the system open, while remaining private.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

Fort Meade serves as the nerve center for NSA and military information technology procedures. Housing not only the NSA center, but also the Defense Information School and the headquarters of United States Cyber Command, the complex is vital to U.S. espionage and intelligence efforts.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

If you missed all three cases:

  • PRISM was revealed by the Guardian and Washington Post as a massive, NSA-led online data espionage program. Devised to uncover “foreign” threats, the program has faced harsh criticism for its apparent “wide net” approach to monitoring online communications. The result is potential rights violations on the entire U.S. population.

  • It was also revealed that the NSA, in line with the PATRIOT Act and FISA, secured the records of Verizon users in an attempt to achieve the same security goal. While the NSA argues that the “legitimacy” of the emergency powers, combined with the snooping only on targets, reduces the privacy violations, critics point again to the “wide net” approach.

  • Edward Snowden, an NSA contractor, revealed himself as the leaker of the NSA PRISM documents, shortly before exiling himself to Hong Kong. While being hailed as a hero by many, he is expected to face charges and possibly “rendering” by a CIA secret camp.

This video is processing – it'll appear automatically when it's done.