“There is great bitterness” about NSA in Germany, etc.

The Süddeutsche (Munich daily) headlined its report: “The Americans have lied to us”.

The report said Washington had not met Berlin’s key demands which included a promise to stop listening to politicians’ phone calls, give German officials access to the alleged listening station in the US Embassy, explain how long Merkel’s phone was monitored, and state whether or not she was the only prominent Germany politician to be targeted.

The civil servant told the paper: “We’re getting nothing.”

The Süddeutsche also said that the head of Germany’s foreign intelligence agency (BND) Gerhard Schindler had told colleagues that he would rather not the sign the deal in its current form. “There is great bitterness,” the paper added.  http://www.thelocal.de/20140114/germany-gives-up-hope-of-no-spy-deal-with-nsa-usa

…………………………………………….

NSA collects on the average day over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users.  In a statement to The Guardian, an NSA spokeswoman said the Dishfire system processes and stores lawfully collected SMS data.  “As we have previously stated, the implication that NSA’s collection is arbitrary and unconstrained is false,” she said, according to The Guradian. “NSA’s activities are focused and specifically deployed against — and only against — valid foreign intelligence targets in response to intelligence requirements.” 

………………………………………………………………………………………

8-11-13  Specification is also provided on what areas of interest are to be mostly looked at in different countries. Der Spiegel, which published the leaked document on Saturday, focuses on which German issues interested US spying agency the most. 

 

The new National Security Agency (NSA) Utah Data Center facility is seen under construction in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah in this NSA file photo shot in May of 2013 and released to Reuters July 9, 2013. (Reuters/National Security Agency/Handout via Reuters)

The new National Security Agency (NSA) Utah Data Center facility is seen under construction in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah in this NSA file photo shot in May of 2013 and released to Reuters July 9, 2013. (Reuters/National Security Agency/Handout via Reuters)

 

The top ranking areas marked with a ‘3’ are the country’s foreign policy and economic issues. Arms exports, new technology, advanced conventional weapons and international trade were all assigned a lesser priority of ‘4’. When it comes to the whole of the European Union, the spheres of interest are almost identical.  http://rt.com/news/nsa-priority-list-russia-351/

…………………………………………………….

7-31-13   The world is witnessing the creation of a new world order that involves the security state apparatus as an overwhelming force, Julian Assange said during his speech at OHM2013 Observe, Hack, Make conference.

“We are seeing the doubling of the power of the national security agency every four years,” Assange said, adding that even some experts might not have “enough perspective about what is going on.”    http://rt.com/news/assange-nsa-surveillance-doubles-872/  

…………………………………………………………………………………………………………………………………………………………….

.enigmaenigma, 14 January, 02:48#   Mr. Dogo’s assertion that the NSA program is an audit trail is equally ridiculous as the assertion that it prevents terrorist attacks. Unless the terrorist is using their home phone or contracted cell phone how would the NSA know what calls they made and from where and to who? What if the terrorist uses no phone or e-mail? Before phones or e-mail there was terrorism. No, neither reason is the true story, what the NSA is tracking is the political associations and activities of American citizens for the express purpose of identifying those that oppose the corporate states domestic and foreign policies. It is the same technique used by the Nazi party before and after coming to power in Germany to identify and round up those who opposed fascism. This is the only explanation that makes any sense and is rooted in the history of programs of these kind.     

 
Advertisements
This entry was posted in Uncategorized and tagged , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s