eye_of_the_storm

Fascism + Solutions

Recommended Posts

and we may have a very benign pussycat govt at the moment in regards to how aggressivley

they pry into our privacy. for what ever reasons. the current group said that they are only monitoring 35 million americans currently. i know i totally believe them, dont you? wink wink nudge nudge(they could be watching now afterall)

but at some point there could become a govt in place that isnt so benign and they will be inheriting all these wonderful intrusion capabilities.

Share this post


Link to post
Share on other sites

I will also hold myself as president to a new standard of openness .... Let me say it as simply as I can: Transparency and the rule of law will be the touchstones of this presidency.

 

My Administration is committed to creating an unprecedented level of openness in Government. We will work together to ensure the public trust and establish a system of transparency, public participation, and collaboration. Openness will strengthen our democracy and promote efficiency and effectiveness in Government.

 

This president has demonstrated a commitment to transparency and openness that is greater than any administration has shown in the past, and he's been committed to that since he ran for president and he's taken a significant number of measures to demonstrate that.

“Nobody is listening to your telephone calls. That is not what this program is about.” - Obama

Actor Shia LaBeouf was on the “Tonight Show” on Sept. 16, 2008, plugging the film “Eagle Eye,” a thriller about a secret government computer connected to cameras and communications systems everywhere in the country, as told by Breitbart.com.

Surprisingly, LaBeouf told host Jay Leno that an FBI consultant on the film had played him a recording of a private conversation with a girlfriend that took place two years before he was cast in the film.

in 2008, tells you exactly where the PRISM program came from:

 

“NSA began making these agreements with AT&T and other companies, and that in order to get access to the actual cables, they had to build these secret rooms in these buildings.

a splitter box, which was a box that had something that was similar to a prism, a glass prism.

the other half, this new cloned copy of the cables, would actually go one floor below to NSA’s secret room.

“… And in the secret room was equipment by a private company called Narus, the very small company hardly anybody has ever heard of that created the hardware and the software to analyze these cables and then pick out the targets NSA is looking for and then forward the targeted communications onto NSA headquarters.”

two Israeli companies, Narus and Verint, that almost nobody knew about. They played a key role in developing and selling the technology that allowed NSA to deploy its PRISM spying program

Narus, which was founded in Israel and has large Israel connections, does the — basically the tapping of the communications on AT&T. And Verizon chose another company, ironically also founded in Israel and largely controlled by and developed by people in Israel called Verint.

Verint, the founder of the company, the former head of the company, is now a fugitive in — hiding out in Africa in the country of Namibia, because he’s wanted on a number of felony warrants for fraud and other charges.

these [two] companies have foreign connections with potential ties to foreign intelligence agencies, and you have problems of credibility, problems of honesty and all that. And these companies — through these two companies pass probably 80 percent or more of all US communications at one point or another.

So essentially, since before 2008, 80% (or more) of US communications have been illegally DIRECTLY intercepted and split by 2 private FOREIGN (Israe!i) companies and shared with both the N5A and very likely their foreign (M0ssad) intelligence too. Which is why Shia's 2-yo PRIVATE phone call had been recorded and archived - with obviously NO "Federal court approval."

Image+%253D+Trump+You%2527re+fired+To+Bi

Edited by vortex
  • Like 1

Share this post


Link to post
Share on other sites

You can't fire a dictator.

 

there are other options.

it is way cool that our dictator has invited debate about some of these recent developments while at the same time even talking about them in an informed context is illegal.

i think the dictator is actually the nsa and it is up to the chief executive to stand up to them and tell them they have gone too far and chill the hell out. but when sitting president openly expresses his dis-trust of the intelligence creeps. well, we see what happened to jfk.

never ever ever never give the govt the benefit of the doubt.

 

Share this post


Link to post
Share on other sites

But what about my award?

-Richard Windsor

Would it be in the government's best interest to issue you one?

Share this post


Link to post
Share on other sites

there are other options.

it is way cool that our dictator has invited debate about some of these recent developments while at the same time even talking about them in an informed context is illegal.

i think the dictator is actually the nsa and it is up to the chief executive to stand up to them and tell them they have gone too far and chill the hell out.

Yeah, but I think he has already voiced his position in that he agrees it is wrong but isn't going to force any changes.

 

The Institution is alive and well. And very well fed, I must say. I mean, it can print however much money it wants.

Share this post


Link to post
Share on other sites

Don't say we weren't warned over 50 years ago about the dangers of the 'military industrial complex'. Eisenhower warns about the dangers of. The NSA is part of the Pentagon.

 

  • Like 1

Share this post


Link to post
Share on other sites

Rep. Peter King wants to prosecute reporters. That violates the 1st. amendment!

I think Rep. Peter King should get his head out of his ass. You can't change the constitution just because the media is telling the American people the truth.

  • Like 1

Share this post


Link to post
Share on other sites

Congress persons expressing anger after extent of program is revealed. It is Congress that approved of this and has been briefed. Just feigning ignorance and passing the buck to someone else.

 

The hearings on this must be open to the public with no more claims of internal security!

 

http://www.democraticunderground.com/1014506849

  • Like 1

Share this post


Link to post
Share on other sites

i wanna prosecute peter king and his like minded cohorts.

when in the course of human history, it becomes necessary,,,,,

i do along with many of my fellow rural kentuckians complain about the GD "government"

but it is made up of folks and in the case of us congress every 2 years they are up for election.

and we continue to re-elect these same scoundrels. keeping the same habits and wanting a different result is the definition of insanity for some.

i still aint over the presidential election of '92

we had a chance for a third party to become relevant in american politics. but of course americans love their 2 party gridlock and secret laws, otherwise why do we continue to keep the same GD government in place.

Edited by zerostao
  • Like 1

Share this post


Link to post
Share on other sites

WoW! You get passionate now and again, don't you?

its a lifestyle LOL

just polishing up on my provacatuer? skilz

but it isnt really rallyin' the troops so to speak

but its still fun

some stuff i post up is tongue in cheek

and i try to keep folks guessing when i am serious and when i aint

try to keep a balanced mix on that

Edited by zerostao

Share this post


Link to post
Share on other sites

some stuff i post up is tongue in cheek

and i try to keep folks guessing when i am serious and when i aint

try to keep a balanced mix on that

Hehehe. I do the same thing but I am sure you were already aware of that.

Share this post


Link to post
Share on other sites

Seems as though the U.S. has been hacking the Chinese IT infrastructure.

 

 

http://www.democraticunderground.com/1014507127

 

http://www.huffingtonpost.com/2013/06/12/edward-snowden-south-china-morning-post-hong-kong-_n_3430082.html

 

For anyone wanting to stay current on this; http://www.reuters.com/news/us

Well when you simply apply Freudian projection to the US - it becomes extremely evident that everything they accuse other entities of, is actually what they themselves are MOST guilty of (ter0rism, censorship, po!ice state, cyber atacks, currency manipulation, etc).

ME_175_FingerPoint22.png

The US/NW0 has been waging a non-stop smear campaign against China (& Russia) for decades now, because they are difficult to enslave through debt (like most other countries). This means that they must be conquered primarily through propaganda and warfare.

 

American sheeple are actually trained to hate all the global resistance movements that actually offer some competition, hedges and possible refuge against their future global enslavement - yet worship and trust their own slavemaster stalker!

Snowden said that according to unverified documents seen by the Post, the NSA had been hacking computers in Hong Kong and on the mainland since 2009.

 

One of the targets in the SAR, according to Sn0wden, was Chinese University and public officials, businesses and students in the city. The documents also point to hacking activity by the NSA against mainland targets.

 

Snowden believed there had been more than 61,000 NSA hacking operations globally, with hundreds of targets in Hong Kong and on the mainland.

 

“We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” he said.

 

Snowden said he was releasing the information to demonstrate “the hypocrisy of the US government when it claims that it does not target civilian infrastructure, unlike its adversaries”.

 

“Not only does it do so, but it is so afraid of this being known that it is willing to use any means, such as diplomatic intimidation, to prevent this information from becoming public.”

 

“All I can do is rely on my training and hope that world governments will refuse to be bullied by the United States into persecuting people seeking political refuge.”

 

“The reality is that I have acted at great personal risk to help the public of the world, regardless of whether that public is American, European, or Asian.”

Meanwhile, they will continue their hypocritical attacks until all resistance to their world domination has been subdued. Make no mistake, the NW0 is about ALWAYS the aggressor acting in pre-emptive offense, never actual self-defense - and all while cursing & POINTING THEIR FINGER AT THEIR VICTIMS! :mellow:

Before there was Edward Snowden and the leak of explosive documents showing widespread government surveillance, there was Mark Klein - a telecommunications technician who alleged that AT&T was allowing U.S. spies to siphon vast amounts of customer data without warrants.

 

Klein's allegations and the news reports about them launched dozens of consumer lawsuits in early 2006 against the government and telecommunications companies. The lawsuits alleged invasion of privacy and targeted the very same provisions of the Foreign Intelligence Surveillance Act that are at the center of the latest public outcry.

 

"I warned whoever I could," Klein said in telephone interview from his home in Alameda, a city across the bay from San Francisco. "I was angry then. I'm angrier now."

 

All the lawsuits prompted by Klein's disclosures were bundled up and shipped to a single San Francisco federal judge to handle. Nearly all the cases were tossed out when Congress in 2008 granted the telecommunications retroactive immunity from legal challenges, a law the U.S. Supreme Court upheld.

 

"The United States government under both administrations has been stonewalling us in court," said Lee Tien, an attorney with the Electronic Frontier Foundation, which represents the consumers who filed that lawsuit.

 

James Clapper, director of national intelligence, personally urged U.S. District Judge Jeffrey White to throw out the remaining lawsuit. Clapper wrote the judge in September that the government risks "exceptionally grave damage to the national security of the United States" if forced to fight the lawsuit.

 

A decade earlier, Klein began to sniff out the contours of the large-scale data collection. In 2002, he let in a visitor to his AT&T office in San Francisco who identified himself as an NSA representative. The NSA official interviewed Klein's colleague, who said he was given top-secret government clearance soon after the encounter.

 

A year later, Klein was touring another AT&T office in San Francisco where he saw the colleague installing a special room. By coincidence, Klein was transferred to that location a few months later and quickly discovered the colleague with the government clearance was the only person with access to the special room.

 

When the colleague retired in 2004, he gave Klein several documents, including highly technical wiring diagrams. The diagrams showed AT&T's electronic communications flowed through a "splitter," which created identical copies of the digital material. One copy continued on to its intended destination of consumer email in-boxes, phones and the like. The other copy flowed into the secret room.

 

"That's when I knew," Klein said.

 

Other documents showed similar setups at other communication companies, including Internet service providers and other telecommunications companies.

 

Those documents are now part of the lawsuit EFF is pursuing against the government.

 

Klein said he decided to publicize his concerns after President Bush in 2005, responding to a New York Times story about domestic eavesdropping, defended the program as limited to only foreign-based communications.

 

"It was clear that the NSA was looking at everything," Klein said. "It wasn't limited to foreign communications."

 

On Tuesday, Klein said that for a number of reasons, Snowden's disclosures sparked more public outrage than his own revelations did more than seven years ago.

 

For one thing, Klein said, Snowden had direct access to a secret court order and details of the program, while Klein pieced together the government's surveillance through internal AT&T documents and in discussions with colleagues who worked on the project.

 

"The government painted me as a nobody, a technician who was merely speculating," said Klein, who made his disclosures after he accepted a buyout and retired from AT&T in 2004. "Now we have an actual copy of a FISA court order. There it is in black and white. It's undisputable. They can't deny that."

So again, since at least 2002, the Feds have been DIRECTLY INTERCEPTING & recording all communications carte blanche through all the major phone & internet companies - contrary to ALL their public denials now.

Obviously when our elected officials claim they "only" indiscriminately collect phone records - that is a blatant LIE. And a very old one, at that..

ECHEL0N is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement

 

It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.

 

"On the existence of a global system for the interception of private and commercial communications (ECHEL0N interception system)" was created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.

Carniv0re was a system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. It used a customizable packet sniffer that can monitor all of a target user's Internet traffic. Carniv0re was implemented in October 1997. By 2005 it had been replaced with improved commercial software such as Narus!nsight.

And all with OUR tax dollars, mind you!!

Edited by vortex

Share this post


Link to post
Share on other sites

...and for anyone who says its just metadata..

 

http://www.zerohedge.com/contributed/2013-06-12/%E2%80%9Cmetadata%E2%80%9D-can-tell-government-more-about-you-content-your-phonecalls

 

 

What [government officials] are trying to say is that disclosure of metadata—the details about phone calls, without the actual voice—isn’t a big deal, not something for Americans to get upset about if the government knows. Let’s take a closer look at what they are saying:

  • They know you rang a phone sex service at 2:24 am and spoke for 18 minutes. But they don’t know what you talked about.
  • They know you called the suicide prevention hotline from the Golden Gate Bridge. But the topic of the call remains a secret.

  • They know you spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour. But they don’t know what was discussed.

  • They know you received a call from the local NRA office while it was having a campaign against gun legislation, and then called your senators and congressional representatives immediately after. But the content of those calls remains safe from government intrusion.

  • They know you called a gynecologist, spoke for a half hour, and then called the local Planned Parenthood’s number later that day. But nobody knows what you spoke about.

Sorry, your phone records—oops, “so-called metadata”—can reveal a lot more about the content of your calls than the government is implying. Metadata provides enough context to know some of the most intimate details of your lives. And the government has given no assurances that this data will never be correlated with other easily obtained data.

 

 

 

“When you take all those records of who’s communicating with who,
you can build social networks and communities for everyone in the world
,” mathematician and NSA
William Binney — “one of the best analysts in history,” who left the agency in 2001 amid privacy concerns — told Daily Intelligencer. “And when you marry it up with the content,” which he is convinced the NSA is collecting as well, “you have leverage against everybody in the country.”

 

“You are unique in the world,” Binney explained, based on the identifying attributes of the machines you use. “If I want to know who’s in the tea party, I can put together the metadata and see who’s communicating with who. I can construct the network of the tea party. If I want to pass that data to the IRS, then I can do that. That’s the danger here.”

 

At
, Jane Mayer quoted mathematician and engineer Susan Landau’s hypothetical: “For example, she said, in the world of business, a pattern of phone calls from key executives can reveal impending corporate takeovers. Personal phone calls can also reveal sensitive medical information: ‘You can see a call to a gynecologist, and then a call to an oncologist, and then a call to close family members.’”

 

“There’s a lot you can infer,” Binney continued. “If you’re calling a physician and he’s a heart specialist, you can infer someone is having heart problems. It’s all in the databases.” The data, he said, is “all compiled by code. The software does it all from the beginning — they have dossiers of everyone in the country. That’s done automatically. When you want to investigate or target somebody, a human becomes involved.”

 

***

 

“The public doesn’t understand,” Landau told Mayer. “It’s
much more intrusive than content
.”

 

 

.....................

>

The information collected on the AP [in the recent scandal regarding the government spying on reporters] was telephony metadata: precisely what the court order against Verizon shows is being collected by the NSA on millions of Americans every day.

 

***

 

Discussing the use of GPS data collected from mobile phones, an
that even location information on its own could reveal a person’s secrets: “A person who knows all of another’s travels can deduce whether he is a weekly churchgoer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groups,” it read, “and not just one such fact about a person, but all such facts.”

Postscript: The government is – in fact – gathering content, as well as metadata.

And mass surveillance doesn’t work to keep us safe. It does, however, set up a technological framework allowing for “turnkey tyranny”.

 

 

 

one of the many reasons I shunned facebook and never participated.

 

 

 

 

 

 

"the us is behaving like china"

-ai weiwei

 

http://www.guardian.co.uk/commentisfree/2013/jun/11/nsa-surveillance-us-behaving-like-china?CMP=twt_gu

Edited by joeblast
  • Like 1

Share this post


Link to post
Share on other sites