1) Brazil accuses Canada of spying after NSA leaks
Canadian ambassador summoned to explain claims spy agency collected Brazilian energy ministry internet and phone data
http://www.theguardian.com/world/2013/oct/08/brazil-accuses-canada-spying-nsa-leaks
………………………………………………………..
2) NSA accused of spying on Brazilian oil company Petrobras http://www.theguardian.com/world/2013/sep/09/nsa-spying-brazil-oil-petrobras
…………………………………………………………………………………………………
3) Lawmakers Who Upheld NSA Phone Spying Received Double the Defense Industry Cash
7-26-13 U.S. House Representatives who received $100,000+ each in 2011-2012 period of contributions from Defense industry voted 24 to 5 to continue NSA phone call surveillance of Americans. The House of Representatives overall vote in July 2013 was 217-205 to continue the NSA phone call surveillance program. The financial analysis was done by MapLight. http://www.wired.com/threatlevel/2013/07/money-nsa-vote/
…………………………………………………………………………………………………………………………………..
4) In our opinion: Make the NSA accountable
9-29-13 For defenders of constitutional checks and balances, the Obama administration’s stance is troubling because the NSA remains unaccountable to Congress or to adversary proceedings before a transparently independent judiciary. The only review of the agency’s surveillance techniques are before the Foreign Intelligence Surveillance Court, a secret body of federal judges that hears arguments from only one side: the NSA. http://www.deseretnews.com/article/765638738/Make-the-NSA-accountable.html?pg=all
…………………………………………………………………………………………….
5) How America’s Top Tech Companies Created the Surveillance State
7-25-13 In an interview with National Journal, former NSA Director Michael Hayden indirectly confirmed Microsoft’s involvement. “This is a home game for us,” Hayden says. “Are we not going to take advantage that so much of it goes through Redmond, Washington? Why would we not turn the most powerful telecommunications and computing management structure on the planet to our use?”
Most of this co-opting of the private sector has happened with the full-throated support of both Republicans and Democrats in Congress, again behind closed doors. Today, Hayden says, the agency itself is all but indistinguishable from the private sector it has exploited. Its best technology is designed by the private sector—“There isn’t a phone or computer at Fort Meade that the government owns,” he says—and its surveillance systems are virtually interwoven with their products. The huge controversy over Snowden’s employment by one of these private contractors, Booz Allen Hamilton, was just the barest tip of the iceberg, according to intelligence and industry officials. One by one, Hayden says, the NSA contracted with companies to “make them part of our team,” as he puts it….
The origins of the intelligence-industrial complex date back to World War II and a program called Shamrock, under which the NSA came to an agreement with ITT and other companies to collect outgoing telegrams and international cables. That secret program was exposed in the 1970s….
a single bottom line: All products had to be reviewed by the NSA,” says William Reinsch, who was undersecretary of Commerce during a critical period in the 1990s when the NSA was undergoing a dramatic decline from the chief innovator of America’s spying technologies, and instead finding itself falling behind Silicon Valley and the telecom industry. “That review meant [NSA] got to look at them.… It was a source of considerable irritation to companies—not the basic fact of it but that NSA wanted to continue to do it for every product.
The NSA came to understand that it was better for them if the world was fully populated with technologies that they knew and understood.” Especially if the agency had the consent of industry to penetrate those technologies. If industry refused, the NSA had the unique ability to both reward and punish, thanks to its implicit veto power over deals and exports, Reinsch says. Though the public didn’t know it, the agency also became a major presence when the nation’s telecom industry went through a revolution, moving from the Bell system to a flurry of start-ups and a blizzard of mergers. “The NSA’s ability to access [telecommunications data] became a factor in all those telecom acquisitions,” Reinsch says. It and other intelligence agencies “weighed in and said we want to review this transaction. We want to say no if we think it’s a bad idea.” The NSA rarely exercised that right, but its leverage was useful in co-opting the tech and telecom sectors into its plans. http://www.nationaljournal.com/magazine/how-america-s-top-tech-companies-created-the-surveillance-state-20130725
……………………………………………………………………………………………………………………….
6) NSA Signals Intelligence – Industrial and Diplomatic Espionage
9-23-13 due to US communications infrastructure access that allows for gathering intelligence not only on terrorist activities, but a broad spectrum of of intelligence on any number of issues – for example, energy, oil, military procurement, and even how some UN votes will play out before they are held.
Industrial and diplomatic espionage
The Brazilian news outlet O Globo released several documents obtained from Edward Snowden, which included a slide on the PRISM program indicating an interest in a range of topics. The slide was entitled “A week in the Life of PRISM Reporting,” and it featured a list showing oil and military procurement as topics of interest on Venezuela, while energy, narcotics, internal security, and political affairs were listed as topics of interest relating to Mexico. Other documents showed that Brazil was an important intelligence target in Latin America, and that Brazilian telecommunications companies had cooperated in obtaining data.
Following these revelations, the US Ambassador to Brazil, Thomas A. Shannon Jr., said that some of the information published in O Globo was inaccurate, and announced an investigation into the allegations stemming from the publication. A few weeks later, journalist Glenn Greenwald testified to the Brazilian Senate Committee on Foreign Relations and National Defense (CRE), revealing a letter written by Shannon (then Assistant Secretary of State for Western Hemisphere Affairs) in 2009 to General Alexander, in which he thanked the NSA for “deep insight into the plans and intentions” of participants of the Fifth Summit of Americas. The letter continued by anticipating the Organization of American States General Assembly and expressing hopes that the NSA would obtain more important intelligence information for US diplomatic efforts.
Another document provided by Edward Snowden appeared in the Brazilian magazine Época detailing how NSA signals intelligence capabilities were used to successfully undermine Brazil’s mediation attempts at the UN Security Council during negotiations over Iran sanctions. In effect, surveillance of UN Security Council partners helped the US determine the optimal moment to push for a vote on sanctions. The vote was advanced and succeeded in spite of a signed agreement having being reached by Iran, with the support of Brazil and Turkey.
A summary of the US Intelligence Community budget for fiscal year 2013 states that the top five mission objectives for the community are: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage, and conducting cyber-operations. While the report on how the US was able to monitor a UN vote on Iran sanctions seems to fit with the second mission objective, this sort of surveillance is clearly of a more diplomatic nature than a security concern.
Communications between aides of Brazil’s President Dilma Rousseff, as well as those of Mexican President Enrique Pena Nieto, were also of interest to the NSA, according to a recent TV Globointerview with Glenn Greenwald. Brazil Justice Minister Jose Eduardo Cardozo called the spying “an attack on our country’s sovereignty.” http://www.transcend.org/tms/2013/09/nsa-signals-intelligence-industrial-and-diplomatic-espionage/
………………………………………………………………………………………………………………….
7) What’s wrong with the NSA’s womb-to-tomb 24/7 surveillance
The spooks can see everything we do, hear everything we say, see everywhere we go. You got a problem with that? If not, you should 6-10-13
……………………………………………………………………………………
8) USAPATRIOT Act~Victim~
Under the USAPATRIOT Act, I’ve been Terrorized daily, by the Department of Justice Sneak and Peek warrant, which allow the police to break into someone’s home or business and collect evidence without even notifying the person or organization that they’ve been the subject of a search.
The practice has been going on now for 4 years at a cost of 5 million dollar per year, advance surveillance and Sneak and Peek.
Daily harassment, denying me the opportunity to work, there goal is to force me into a life of crime, in-order to support myself
Therefore, arresting me and removing for sociality
Currently, I’m unemployed, and supporting law enforcement with opportunity to have a job harassing me. So far, I estimate over 15 million dollars has been spent, Basic break-down of DOJ resources’
15 Man surveillance cars to support surveillance box ~ Rented apartment to servile from ~ home break-ins-daily
24 hours surveillance by 7 days~ Wire-taps landline and wireless ~ email intercept ~ general harassment from field agents~ Paid informate to collect information about me~ Field agent canvassing my neighborhood, flashing my picture to obtain any information, general harassment~ where-ever I go, they go
They have and will disrupt the Catholic Church services, when-ever I attend Mass, taking pictures, asking question about me
At the end of the Day, there’s no acts’ or evidence of any crimes committed by me, this has been going on for 4 years now!
Your USAPATRIOT Act at Work!
10) 7-3-13 CMS
The world’s largest democracy is moving forward with plans to implement a program called the Central Monitoring System (CMS) which will eventually allow security agencies and even tax officials to intercept any emails and phone calls within the country without oversight by the judicial system or elected officials. The program, which was first announced in 2011, means that Indian citizens and visitors to the country will essentially have no assurances about the privacy of their in-country communications from government surveillance.
Questions about the specifics of the program have gone unanswered because officials say making the details public would limit its effectiveness — a narrative anyone following the NSA leaks will think sounds familiar. It appears the system will function similarly to the NSA’s PRISM content snooping program, in that there will be interception data servers on the premises of private telecommunications firms, but the Indian program will have fewer privacy safeguards than PRISM. http://thinkprogress.org/justice/2013/07/03/2244361/india-surveillance-colonial-era/
The Central Monitoring System, abbreviated to CMS, is a clandestine mass electronic surveillance data mining program installed by the Centre for Development of Telematics (C-DOT), an Indian Government owned telecommunications technology development centre,[1] and operated by Telecom Enforcement Resource and Monitoring (TERM) Cells.[2] The CMS gives India’s security agencies and income tax officials centralized access to India’s telecommunications network[3] and the ability to listen in on and record mobile, landline and satellite[4] calls and voice over Internet Protocol (VoIP), and read private emails, SMS and MMS and track the geographical location of individuals,[5] all in real time.[6] It can also be used to monitor posts shared on social media such as Facebook, LinkedIn and Twitter, and to track users’ search histories on Google,[7][8][9] without any oversight by courts or Parliament. According to a government official, an agency “shall enter data related to target in the CMS system and approach the telecom services provider (TSP), at which point the process is automated, and the provider simply sends the data to a server which forwards the requested information”.[10] The intercepted data is subject to pattern recognition and other automated tests to detect emotional markers, such as hate, compassion or intent, and different forms of dissent.[6] Telecom operators in India are obligated by law to give access to their networks to every legal enforcement agency.[11] From 2014 onwards, all mobile telephony operators will be required to track and store the geographical location from which subscribers make or receive calls,[12] meaning that, in addition to the contact number of the person a caller speaks to, the duration of the call and details of the mobile tower used, the Call Data Records (CDR) will now also contain details of the caller’s location. The system aims to attain a tracking accuracy of 80% in the first year of operation, followed by 95% accuracy in the second year, in urban areas. Commander (rtd) Mukesh Saini, former national information security coordinator of the Government of India, expressed fears that all CDR details would eventually be fed into the central server for access through the CMS.[13]
The Times of India described CMS as “the single window from where government arms such as the National Investigation Agency or the tax authorities will be able to monitor every byte of communication.”[5] Prior to CMS, agencies had had to seek court orders for surveillance, and had to send in an individual request to a telecom operator or Internet service provider whenever it wanted to monitor the activity of a particular target.[14] The Ministry of Home Affairs now has the sole power to decide who to monitor.[8] The system was created without approval from Parliament,[15] provides no avenues for redress and places no consequences in case of abuse.[6] The government stated that the cost of implementing CMS was 400 crore (US$61 million). However, on 21 June 2013, The Hindu, reported that it had obtained project documents relating to CMS, which showed that the project’s budget was “nearly double” that amount.[16] http://en.wikipedia.org/wiki/Central_Monitoring_System
……………………………………………………………………………………………………..
11) Jimmy Carter’s National Security Adviser – a key American foreign policy architect (Zbigniew Brzezinski) – wrote in 1970:
The [future] era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen. These files will be subject to instantaneous retrieval by the authorities.
…………………………………………………………………………………………………
12) 7-8-2008
Bush: Telecom Immunity More Important Than Surveillance Powers https://www.eff.org/deeplinks/2008/07/bush-telecom-immunity-more-important-then-surveill
16) So important has the facade become to many upon earth that to please the outer manifestation they are willing to sell their own birthright–their right to expand the soul–and become castaways from the supreme purpose….The veil that hangs betweeen the Holy of Holies and the holy place in man must be torn asunder by noble and determined attention….men must hold with absolute fervor to the idea that God is acting through them to confer the greatest benefits upon them; they must yield to His will and honor it.
Our reason for making this simple statement is to clarify here and now, for the profound as well as for those who are less illumined, that midst all the varieties of life’s experiences and mirrored expressions lies the great mystery of Being which all must unravel for themselves that they may know true God-happiness in themselves and in their search.
-Fun Wey: Pearl 9:3
……………………………………………………………………………………………………………
17) The increased use of such electronic devices will afford mankind less and less privacy; and as the governments of the world seek to employ them in their own interest and for the protection of freedom, so the enemies of freedom will also use the same devices on their own behalf. When men are boxed-in from beneath, to the right, to the left, below and behind, there isonly one way to go and that is up or remain boxed-in below. -Mighty Victory: Pearls of Wisdom 9:4
……………………………………………………………………………………………………………
18) One must transform control into cooperation and reciprocal information. -Master Morya: Fiery World 1934
…………………………