surveillance update/overview/study

Image

1) Brazil accuses Canada of spying after NSA leaks

Canadian ambassador summoned to explain claims spy agency collected Brazilian energy ministry internet and phone data

http://www.theguardian.com/world/2013/oct/08/brazil-accuses-canada-spying-nsa-leaks

………………………………………………………..

2)  NSA accused of spying on Brazilian oil company Petrobras   http://www.theguardian.com/world/2013/sep/09/nsa-spying-brazil-oil-petrobras

…………………………………………………………………………………………………

3)  Lawmakers Who Upheld NSA Phone Spying Received Double the Defense Industry Cash

7-26-13        U.S. House Representatives who received $100,000+ each in 2011-2012 period of contributions from Defense industry voted 24 to 5 to continue NSA phone call surveillance of Americans.  The House of Representatives overall vote in July 2013 was 217-205 to continue the NSA phone call surveillance program.  The financial analysis was done by MapLight.     http://www.wired.com/threatlevel/2013/07/money-nsa-vote/

…………………………………………………………………………………………………………………………………..

4)  In our opinion: Make the NSA accountable

9-29-13   For defenders of constitutional checks and balances, the Obama administration’s stance is troubling because the NSA remains unaccountable to Congress or to adversary proceedings before a transparently independent judiciary. The only review of the agency’s surveillance techniques are before the Foreign Intelligence Surveillance Court, a secret body of federal judges that hears arguments from only one side: the NSA.   http://www.deseretnews.com/article/765638738/Make-the-NSA-accountable.html?pg=all

…………………………………………………………………………………………….

5)  How America’s Top Tech Companies Created the Surveillance State

7-25-13   In an interview with National Journal, former NSA Director Michael Hayden indirectly confirmed Microsoft’s involvement. “This is a home game for us,” Hayden says. “Are we not going to take advantage that so much of it goes through Redmond, Washington? Why would we not turn the most powerful telecommunications and computing management structure on the planet to our use?”

Most of this co-opting of the private sector has happened with the full-throated support of both Republicans and Democrats in Congress, again behind closed doors. Today, Hayden says, the agency itself is all but indistinguishable from the private sector it has exploited. Its best technology is designed by the private sector—“There isn’t a phone or computer at Fort Meade that the government owns,” he says—and its surveillance systems are virtually interwoven with their products. The huge controversy over Snowden’s employment by one of these private contractors, Booz Allen Hamilton, was just the barest tip of the iceberg, according to intelligence and industry officials. One by one, Hayden says, the NSA contracted with companies to “make them part of our team,” as he puts it….

The origins of the intelligence-industrial complex date back to World War II and a program called Shamrock, under which the NSA came to an agreement with ITT and other companies to collect outgoing telegrams and international cables. That secret program was exposed in the 1970s….

a single bottom line:  All products had to be reviewed by the NSA,” says William Reinsch, who was undersecretary of Commerce during a critical period in the 1990s when the NSA was undergoing a dramatic decline from the chief innovator of America’s spying technologies, and instead finding itself falling behind Silicon Valley and the telecom industry. “That review meant [NSA] got to look at them.… It was a source of considerable irritation to companies—not the basic fact of it but that NSA wanted to continue to do it for every product.

The NSA came to understand that it was better for them if the world was fully populated with technologies that they knew and understood.” Especially if the agency had the consent of industry to penetrate those technologies. If industry refused, the NSA had the unique ability to both reward and punish, thanks to its implicit veto power over deals and exports, Reinsch says. Though the public didn’t know it, the agency also became a major presence when the nation’s telecom industry went through a revolution, moving from the Bell system to a flurry of start-ups and a blizzard of mergers. “The NSA’s ability to access [telecommunications data] became a factor in all those telecom acquisitions,” Reinsch says. It and other intelligence agencies “weighed in and said we want to review this transaction. We want to say no if we think it’s a bad idea.” The NSA rarely exercised that right, but its leverage was useful in co-opting the tech and telecom sectors into its plans.  http://www.nationaljournal.com/magazine/how-america-s-top-tech-companies-created-the-surveillance-state-20130725

……………………………………………………………………………………………………………………….

6)  NSA Signals Intelligence – Industrial and Diplomatic Espionage

9-23-13    due to US communications infrastructure access that allows for gathering intelligence not only on terrorist activities, but a broad spectrum of of intelligence on any number of issues – for example, energy, oil, military procurement, and even how some UN votes will play out before they are held.

Industrial and diplomatic espionage

The Brazilian news outlet O Globo released several documents obtained from Edward Snowden, which included a slide on the PRISM program indicating an interest in a range of topics. The slide was entitled “A week in the Life of PRISM Reporting,” and it featured a list showing oil and military procurement as topics of interest on Venezuela, while energy, narcotics, internal security, and political affairs were listed as topics of interest relating to Mexico. Other documents showed that Brazil was an important intelligence target in Latin America, and that Brazilian telecommunications companies had cooperated in obtaining data.

Following these revelations, the US Ambassador to Brazil, Thomas A. Shannon Jr., said that some of the information published in O Globo was inaccurate, and announced an investigation into the allegations stemming from the publication. A few weeks later, journalist Glenn Greenwald testified to the Brazilian Senate Committee on Foreign Relations and National Defense (CRE), revealing a letter written by Shannon (then Assistant Secretary of State for Western Hemisphere Affairs) in 2009 to General Alexander, in which he thanked the NSA for “deep insight into the plans and intentions” of participants of the Fifth Summit of Americas. The letter continued by anticipating the Organization of American States General Assembly and expressing hopes that the NSA would obtain more important intelligence information for US diplomatic efforts.

Another document provided by Edward Snowden appeared in the Brazilian magazine Época detailing how NSA signals intelligence capabilities were used to successfully undermine Brazil’s mediation attempts at the UN Security Council during negotiations over Iran sanctions. In effect, surveillance of UN Security Council partners helped the US determine the optimal moment to push for a vote on sanctions. The vote was advanced and succeeded in spite of a signed agreement having being reached by Iran, with the support of Brazil and Turkey.

summary of the US Intelligence Community budget for fiscal year 2013 states that the top five mission objectives for  the community are: combating terrorism, stopping the spread of nuclear and other unconventional weapons, warning U.S. leaders about critical events overseas, defending against foreign espionage, and conducting cyber-operations. While the report on how the US was able to monitor a UN vote on Iran sanctions seems to fit with the second mission objective, this sort of surveillance is clearly of a more diplomatic nature than a security concern.

Communications between aides of Brazil’s President Dilma Rousseff, as well as those of Mexican President Enrique Pena Nieto, were also of interest to the NSA,  according to a recent TV Globointerview with Glenn Greenwald. Brazil Justice Minister Jose Eduardo Cardozo called the spying “an attack on our country’s sovereignty.”  http://www.transcend.org/tms/2013/09/nsa-signals-intelligence-industrial-and-diplomatic-espionage/

………………………………………………………………………………………………………………….

7)  What’s wrong with the NSA’s womb-to-tomb 24/7 surveillance

The spooks can see everything we do, hear everything we say, see everywhere we go. You got a problem with that? If not, you should                6-10-13

http://www.itworld.com/it-management/360373/what-s-wrong-nsa-s-womb-tomb-247-surveillance#sthash.XRpylFxZ.dpuf

……………………………………………………………………………………

8)  USAPATRIOT Act~Victim~
Under the USAPATRIOT Act, I’ve been Terrorized daily, by the Department of Justice Sneak and Peek warrant, which allow the police to break into someone’s home or business and collect evidence without even notifying the person or organization that they’ve been the subject of a search.

The practice has been going on now for 4 years at a cost of 5 million dollar per year, advance surveillance and Sneak and Peek.
Daily harassment, denying me the opportunity to work, there goal is to force me into a life of crime, in-order to support myself
Therefore, arresting me and removing for sociality

Currently, I’m unemployed, and supporting law enforcement with opportunity to have a job harassing me. So far, I estimate over 15 million dollars has been spent, Basic break-down of DOJ resources’

15 Man surveillance cars to support surveillance box ~ Rented apartment to servile from ~ home break-ins-daily
24 hours surveillance by 7 days~ Wire-taps landline and wireless ~ email intercept ~ general harassment from field agents~ Paid informate to collect information about me~ Field agent canvassing my neighborhood, flashing my picture to obtain any information, general harassment~ where-ever I go, they go
They have and will disrupt the Catholic Church services, when-ever I attend Mass, taking pictures, asking question about me

At the end of the Day, there’s no acts’ or evidence of any crimes committed by me, this has been going on for 4 years now!

Your USAPATRIOT Act at Work!

……………………………………………………………………………………………………………………………………………
 9)   Booz Allen, like PriceWaterhouseCoopers, has hq in Tyson’s Corner in the D.C. beltway.  Booz Allen wrote a thesis on reinventing government, but their’s is minus the vision of real freedom.  Booz Allen/Carlyle Group and the success cult are the wrong choice, wrong game, wrong direction for freedom.  The Director of National Intelligence (Clapper) is from Booz Allen, and his main database apparently is PINWALE, a program code by Booz Allen.  True oversight and leadership is our job, Americans of the light; don’t believe it is their job.                  Running NSA is basically INSA, whose chairman of the board currently is a longtime henchman of Kissinger’s named Negroponte.            -R, Mt. Shasta
……………………………………………………………………………..

10)  7-3-13         CMS

The world’s largest democracy is moving forward with plans to implement a program called the Central Monitoring System (CMS) which will eventually allow security agencies and even tax officials to intercept any emails and phone calls within the country without oversight by the judicial system or elected officials. The program, which was first announced in 2011, means that Indian citizens and visitors to the country will essentially have no assurances about the privacy of their in-country communications from government surveillance.

Questions about the specifics of the program have gone unanswered because officials say making the details public would limit its effectiveness — a narrative anyone following the NSA leaks will think sounds familiar. It appears the system will function similarly to the NSA’s PRISM content snooping program, in that there will be interception data servers on the premises of private telecommunications firms, but the Indian program will have fewer privacy safeguards than PRISM.  http://thinkprogress.org/justice/2013/07/03/2244361/india-surveillance-colonial-era/

The Central Monitoring System, abbreviated to CMS, is a clandestine mass electronic surveillance data mining program installed by the Centre for Development of Telematics (C-DOT), an Indian Government owned telecommunications technology development centre,[1] and operated by Telecom Enforcement Resource and Monitoring (TERM) Cells.[2] The CMS gives India’s security agencies and income tax officials centralized access to India’s telecommunications network[3] and the ability to listen in on and record mobilelandline and satellite[4] calls and voice over Internet Protocol (VoIP), and read private emailsSMS and MMS and track the geographical location of individuals,[5] all in real time.[6] It can also be used to monitor posts shared on social media such as FacebookLinkedIn and Twitter, and to track users’ search histories on Google,[7][8][9] without any oversight by courts or Parliament. According to a government official, an agency “shall enter data related to target in the CMS system and approach the telecom services provider (TSP), at which point the process is automated, and the provider simply sends the data to a server which forwards the requested information”.[10] The intercepted data is subject to pattern recognition and other automated tests to detect emotional markers, such as hate, compassion or intent, and different forms of dissent.[6] Telecom operators in India are obligated by law to give access to their networks to every legal enforcement agency.[11] From 2014 onwards, all mobile telephony operators will be required to track and store the geographical location from which subscribers make or receive calls,[12] meaning that, in addition to the contact number of the person a caller speaks to, the duration of the call and details of the mobile tower used, the Call Data Records (CDR) will now also contain details of the caller’s location. The system aims to attain a tracking accuracy of 80% in the first year of operation, followed by 95% accuracy in the second year, in urban areas. Commander (rtd) Mukesh Saini, former national information security coordinator of the Government of India, expressed fears that all CDR details would eventually be fed into the central server for access through the CMS.[13]

The Times of India described CMS as “the single window from where government arms such as the National Investigation Agency or the tax authorities will be able to monitor every byte of communication.”[5] Prior to CMS, agencies had had to seek court orders for surveillance, and had to send in an individual request to a telecom operator or Internet service provider whenever it wanted to monitor the activity of a particular target.[14] The Ministry of Home Affairs now has the sole power to decide who to monitor.[8] The system was created without approval from Parliament,[15] provides no avenues for redress and places no consequences in case of abuse.[6] The government stated that the cost of implementing CMS was INR400 crore (US$61 million). However, on 21 June 2013, The Hindu, reported that it had obtained project documents relating to CMS, which showed that the project’s budget was “nearly double” that amount.[16]   http://en.wikipedia.org/wiki/Central_Monitoring_System

……………………………………………………………………………………………………..

11)  Jimmy Carter’s National Security Adviser – a key American foreign policy architect (Zbigniew Brzezinski) – wrote in 1970:

The [future] era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen. These files will be subject to instantaneous retrieval by the authorities.

http://www.truthmediatv.org/2013/07/high-level-us-government-officials-have.html#sthash.AyiH5Tfa.dpuf

…………………………………………………………………………………………………

12)    7-8-2008

Bush: Telecom Immunity More Important Than Surveillance Powers  https://www.eff.org/deeplinks/2008/07/bush-telecom-immunity-more-important-then-surveill

……………………………………………………………………………………………..
13)    7-9-08  The Senate gave President Bush what he wanted Wednesday, sending him a bill expanding his surveillance authority and granting legal amnesty to telecommunications companies that facilitated his warrantless surveillance program.  On a 69-28 vote, the Senate approved an administration-backed update to the Foreign Intelligence Surveillance Act    http://rawstory.com/news/2008/Wiretap_immunity_bill_gets_closer_to_0709.html
………………………………………………………………..
14)    But even intelligence agency employees are somewhat concerned about spying on the world finance system, according to one document from the UK’s intelligence agency GCHQ concerning the legal perspectives on “financial data” and the agency’s own cooperations with the NSA in this area. The collection, storage and sharing of politically sensitive data is a deep invasion of privacy, and involved “bulk data” full of “rich personal information,” much of which “is not about our targets,” the document says.  http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html
……………………………………………………………………………………………………….
15)    Some of you have seen the perversion of this information-gathering in police-state tactics that have occurred in this century. These are definite and deliberate perversions by the false hierarchy of my legions who work only to expound upon and to expand the Christ-teachings for all.        -K-17:  3-24-1974 via Messenger ECP
…………………………………………………………………………………………..

16)  So important has the facade become to many upon earth that to please the outer manifestation they are willing to sell their own birthright–their right to expand the soul–and become castaways from the supreme purpose….The veil that hangs betweeen the Holy of Holies and the holy place in man must be torn asunder by noble and determined attention….men must hold with absolute fervor to the idea that God is acting through them to confer the greatest benefits upon them; they must yield to His will and honor it.

Our reason for making this simple statement is to clarify here and now, for the profound as well as for those who are less illumined, that midst all the varieties of life’s experiences and mirrored expressions lies the great mystery of Being which all must unravel for themselves that they may know true God-happiness in themselves and in their search.

-Fun Wey:  Pearl 9:3

……………………………………………………………………………………………………………
17)   The increased use of such electronic devices will afford mankind less and less privacy; and as the governments of the world seek to employ them in their own interest and for the protection of freedom, so the enemies of freedom will also use the same devices on their own behalf.  When men are boxed-in from beneath, to the right, to the left, below and behind, there isonly one way to go and that is up or remain boxed-in below.    -Mighty Victory:  Pearls of Wisdom 9:4

……………………………………………………………………………………………………………

18)   One must transform control into cooperation and reciprocal information.     -Master Morya:  Fiery World 1934

………………………………………………………………………………………………………….
19)   And the people lose their vision proportionately as they increase in self-indulgence, in selfishness, in the cults of success, ambition and pride.
  This is a disease that begins in the leaders, that is transfered to the people, that is then increased in them and returned to the leaders until the nation is at odds….And there is nothing but spying on one another and the attempts at the coup to remove the statesmen and those who are in the position of leadership.    -Afra, see http://books.google.com/books?id=6ghrmJHPJ4MC&pg=PA180&dq=clare+prophet+spying&hl=en&sa=X&ei=UZtUUtCWLcHniwK3r4GYCA&ved=0CEwQ6AEwBDgK#v=onepage&q=clare%20prophet%20spying&f=false
……………………………………………………………
20)  For the intelligence in this country is neglecting now to isolate those individuals who are known to be agents of the KGB….and are being unchecked because of the avalanche of opposition to the departments of this government who ought to be in the position to act and to act swiftly.   -Gautama Buddha:  4-23-1978 at NYC, see http://books.google.com/books?id=_trI7hom-1EC&pg=PA228&dq=clare+prophet+spying&hl=en&sa=X&ei=fp1UUuGaDcGRiAKDxoFo&ved=0CEIQ6AEwAjgK#v=onepage&q=clare%20prophet%20spying&f=false
…………………………………………………………….
21)   Thus Satanism is far more rampant than you would calculate.  For it has to do with World Communism and the shedding of blood of the lightbearers in every nation.  It has to do with the abortion of life that is the work of Herod and his henchmen….Blessed hearts, much hangs in the balance.       -Archeia Mary:  4-21-1987 at Dallas via Messenger ECP; see http://books.google.com/books?id=v9-n6keDGDMC&pg=PA218&dq=clare+prophet+pearls+1987+satan+seed&hl=en&sa=X&ei=VQzRUILdLaqWjAKIr4DICg&sqi=2&ved=0CDEQ6AEwAA#v=onepage&q=clare%20prophet%20pearls%201987%20satan%20seed&f=false    (Archeia Mary by Ruth Hawkins, below:)

…………………………

Advertisements
Aside | This entry was posted in Uncategorized and tagged . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s