How do you gain surveillance access without FISA?
Cyber Security Commission.
Tom Donilon = NSA, General Alexander = IronNet
Former NSA head, Tom Donilon, leaker and Benghazi schmo under Obama appointed to head new CENC in early 2016. Lots to cover up, lots of money, lots of NSA access! In addition, ex-IBM Palmisano and Crowdstrike’s Chabinsky and other notables.
General Alexander and IronNet! After leaving as head USG cyber command, has patents for cures:
Keith Alexander’s Unethical Get-Rich-Quick Plan
Lots of government officials have found ways to monetize public service in the private sector, but none more audaciously than the former head of the NSA.
Now, all of a sudden, with millions in his pocket from private sector, he has proprietary software for the government.
FOIA released memo with redactions of Alexander preparing for exit for his cash in…
Who is IronNet?
Who sinks Millions of dollars into IronNet? Trident Capital…now Forgepoint.com. Who is on advisory board? Craig Abod… Arahsoft. The leading IT contractors for the US government.
Who recently invested in Alexander’s company for international expansion? C5. Look at their board…
Crowdstrike is an OBVIOUS, and we all know how they helped out…
Don’t get me started on Donilon, it goes on and on, and on. My supposition is that IT access and the edict of evaluating fault points for cyber commission evaluation.. But, way beyond that, it’s a group that covers the holes for the Psyops, HRC, DNC, RNC.. Big game fishing! And this.. Look who attends these public “cyber forums” meet during election year :
Commission on Enhancing National Cybersecurity
The CIA is permitted to conduct domestic surveillance operations in cooperation with the FBI according to EO 12333.
By: Lycaon @Cynacin
The CIA can begin surveillance on a domestic target even without a FISA warrant, by approval of the CIA General Counsel.
The CIA General Counsel under the Trump campaign spying operation would have been Obama appointee, Caroline Diane Krass.
Additional information shared by !Annie!Webber! @909946zil
Read up on Stingray technology used by gov and LE agencies.
Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About
How Stingrays Work
The Stingray is a brand name of an IMSI catcher targeted and sold to law enforcement. A Stingray works by masquerading as a cell phone tower—to which your mobile phone sends signals to every 7 to 15 seconds whether you are on a call or not— and tricks your phone into connecting to it. As a result, the government can figure out who, when and to where you are calling, the precise location of every device within the range, and with some devices, even capture the content of your conversations. (Read the Wall Street Journal’s detailed explanation for more.)
Given the breadth of information that it can stealthily obtain, the government prefers the public and judges alike not know exactly how Stingrays work and they have even argued in court that it should be able to keep its use of the technology secret. The Electronic Privacy Information Center has filed a FOIA request for more information on Stingrays, but the FBI is dragging its feet and is sitting on 25,000 pages of documents explaining the device. 
Surveillance drones or unmanned aerial systems (UASs) raise significant issues for privacy and civil liberties. Drones are capable highly advanced surveillance, and drones already in use by law enforcement can carry various types of equipment including live-feed video cameras, infrared cameras, heat sensors, and radar. Some military versions can stay in air the hours for hours or days at a time, and their high-tech cameras can scan entire cities, or alternatively, zoom in and read a milk carton from 60,000 feet. They can also carry wifi crackers and fake cell phone towers that can determine your location or intercept your texts and phone calls. Drone manufacturers even admit they are made to carry “less lethal” weapons such as tasers or rubber bullets.
Privacy law has not kept up with the rapid pace of drone technology, and police may believe they can use drones to spy on citizens with no warrant or legal process whatsoever. Several bills are currently going through Congress, which attempt to provide privacy protections to Americans who may be caught up in drone surveillance. As the numbers of entities authorized to fly drones accelerates in the coming years—the FAA estimates as many as 30,000 drones could be flying in US skies by 2020—EFF will continue to push for transparency in the drone authorization process and work to ensure the privacy of all Americans is protected. 
Vast Network of Government Viper Towers Revealed, & They Can Tap Your Cell Phone
Recent data provided to us by Anonymous shows a disturbing development. An unknown government agency has contracted with Verizon to build a vast network of Vipers. These fake cell towers can be utilized to intercept cellular signals, meaning that the voice calls, text messages, exact location, and other mobile data of private citizens can be tapped by Big Brother. “We are currently tracking a government contract with Verizon to install Viper towers,” explains Sam, our contact within Anonymous. “These towers can and will be used to spy on law abiding American citizens.” While Viper towers in and of themselves aren’t exactly new news, the sheer number of Viper towers now known to be in existence is a fresh revelation. 
HOW THE NSA WARRANTLESS WIRETAP SYSTEM WORKS
2/2006 – The National Security Agency (NSA) is opening so many phone taps that it is physically impossible to obtain court-reviewed warrants. It is time to forget warrants and move on. This Administration certainly has. 
The new technology at the root of the NSA wiretap scandal
“Massive leaps in surveillance laws” indeed. TIA became public in 2002, and Congress quickly put the kibosh on it. This is right about the time that Bush secretly signed the executive order authorizing the new NSA wiretap program. So, are TIA and the NSA wiretapping directive related? That probably depends on what you mean by “related.” I doubt seriously they’re the same thing, but it’s entirely possible that the undescribed new technology used in the NSA wiretapping program was also going to be deployed as a part of TIA’s massive data collection efforts. My main point in bringing up TIA is twofold: 1) TIA-like efforts are still going on (Defensetech catalogs some), and 2) the government has been trying to use new technology, like database tech and voice recognition, for domestic surveillance for a long time. And when I say a long time, I mean well before the current administration came into office.
The domestic electronic surveillance ball really got rolling under the Clinton administration, with the 1994 Communications Assistance for Law Enforcement Act (CALEA). CALEA mandated that the telcos aid wiretapping by installing remote wiretap ports onto their digital switches so that the switch traffic would be available for snooping by law enforcement. After CALEA passed, the FBI no longer had to go on-site with wiretapping equipment in order to tap a line—they could monitor and digitally process voice communications from the comfort of the home office. (The FCC has recently ruled that CALEA covers VOIP services, which means that providers like Vonage will have to find a way to comply.)