{"id":92,"date":"2006-02-05T19:11:08","date_gmt":"2006-02-05T23:11:08","guid":{"rendered":"http:\/\/cherrycoated.com\/wordpress\/?p=92"},"modified":"2006-02-05T19:11:08","modified_gmt":"2006-02-05T23:11:08","slug":"article-analyzes-nsa-techniques","status":"publish","type":"post","link":"http:\/\/www.webliminal.com\/webliminalblog\/commentary\/article-analyzes-nsa-techniques","title":{"rendered":"Article analyzes NSA techniques"},"content":{"rendered":"<p>An article published in today&#8217;s Washington Post contains an extensive analysis of the NSA&#8217;s techniques in eavesdropping on communications. It does a good job describing some of the techniques used, the available sources, and the lack of results. The article implies that NSA and other surveillance groups are using this as an opportunity to experiment and further refine their automated and AI augmented tools.<br \/>\n<a title=\"Surveillance Net Yields Few Suspects\" href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/02\/04\/AR2006020401373.html\">Surveillance Net Yields Few Suspects<\/a><\/p>\n<p>&#8220;Intelligence officers who eavesdropped on thousands of Americans in overseas calls under authority from President Bush have dismissed nearly all of them as potential suspects after hearing nothing pertinent to a terrorist threat, according to accounts from current and former government officials and private-sector sources with knowledge of the technologies in use.&#8221;<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>An article published in today&#8217;s Washington Post contains an extensive analysis of the NSA&#8217;s techniques in eavesdropping on communications. It does a good job describing some of the techniques used, the available sources, and the lack of results. The article implies that NSA and other surveillance groups are using this as an opportunity to experiment [&hellip;]<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-92","post","type-post","status-publish","format-standard","hentry","category-commentary"],"_links":{"self":[{"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/posts\/92","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/comments?post=92"}],"version-history":[{"count":0,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/posts\/92\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/media?parent=92"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/categories?post=92"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/tags?post=92"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}