Tip:
Highlight text to annotate it
X
Dear citizens of the Internet .....
Far too long We THE PEOPLE have suffered at the hands of the tyrant we have come to
know as our goverment.
Our constition states that our goverment should be of the people, by the people , and for
the people.
However, this tyrant has placed itself far above the people !
In the United states alone there are currently 23 active Goverment
surveillance programs A system deployed by the National Security
Agency to analyze global electronic information. In March 2013,this system, code named,
Boundless Informant gathered 14 billion data reports from Iran, 6.3 billion from India,
and 2.8 billion from the United States.
BULLRUN, a highly classified U.S. National Security Agency program to preserve its ability
to eavesdrop on encrypted communications by influencing and weakening
encryption standards, by obtaining master encryption keys, and by gaining access to
data before or after it is encrypted either by
agreement, by force of law, or by computer network exploitation (hacking).
Carnivore: A system implemented by the Federal Bureau of Investigation that was designed
to monitor email and electronic communications. Apparently replaced by commercial
software such as NarusInsight. Comprehensive National Cybersecurity Initiative
DCSNet: The Federal Bureau of Investigation (FBI)'s point-and-click surveillance system
that can perform instant wiretaps on any telecommunications device located in
the United States.
Fairview: A mass surveillance program directed at foreign mobile phone users.
Financial Crimes Enforcement Network: A bureau of the Department of the Treasury that collects
and analyzes financial transactions in order to combat financial
crimes.
Magic Lantern: A keystroke logging software deployed by the FBI in the form of an e-mail
attachment. When activated, it acts as a trojan horse and allows the FBI
to decrypt user communications.
Main Core: A personal and financial database storing information of millions of U.S. citizens
believed to be threats to national security. The data mostly comes from
the NSA, FBI, CIA, as well as other government sources.
MAINWAY: NSA database containing metadata for hundreds of billions of telephone calls
made through the four largest telephone carriers in the United States.
MUSCULAR: Overseas wiretapping of Google's and Yahoo's unencrypted internal networks
by the NSA.
Nationwide Suspicious Activity Reporting Initiative: Under this government initiative, a Suspicious
Activity Report (SAR) may be filed by law enforcers, public
safety personnel, owners of critical infrastructure or the general public.
NSA ANT catalog: a 50 page document listing technology available to the United States
National Security Agency (NSA) ANT division to aid in cyber-surveillance.
PRISM: A clandestine national security electronic surveillance program operated by the United
States National Security Agency (NSA) which can target customers of participating
corporations outside or inside the United States.
Room 641A: A telecommunication interception facility operated by AT&T for the U.S. National
Security Agency.
Special Collection Service (SCS): A black budget program that is responsible for "close
surveillance, burglary, wiretapping, and breaking and entering." It employs covert
listening device technologies to bug foreign embassies, communications centers,
computer facilities, fiber-optic networks, and government installations.
Stellar Wind (code name): The open secret code name for four surveillance programs.
Tailored Access Operations: Intelligence-gathering unit of the NSA that is capable of harvesting
approximately 2 petabytes of data per hour.
Terrorist Finance Tracking Program: A joint initiative run by the CIA and the Department
of the Treasury to access the SWIFT (Society for Worldwide Interbank Financial
Telecommunication) transaction database as part of the Bush administration's
"Global War on Terrorism". According to the U.S. government, its efforts to counter terrorist
activities were compromised after the existence of the Terrorist Finance Tracking
Program was leaked to the media.
Intelligence Community (IC): A cooperative federation of 16 government agencies working
together, but also separately, to gather intelligence and conduct espionage.
Utah Data Center: The Intelligence Community's $1.5 billion dollar data storage center that
is designed to store extremely large amounts of data, on the scale of yottabytes.
X-Keyscore: A system used by the United States National Security Agency for searching and
analysing internet data about foreign nationals.
the Terrorist Surveillance Program: was Replaced by PRISM.
PRISM is a clandestine mass electronic surveillance data mining program launched in 2007 by the
National Security Agency (NSA), with participation from an unknown
by the British equivalent agency, GCHQ.
PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.
The Prism program collects stored Internet communications based on demands made to Internet
companies such as Google Inc. and Apple Inc. under Section 702 of the FISA
Amendments Act of 2008 to turn over any data that match court-approved search terms.
The NSA can use these Prism requests to target communications that were encrypted when they
traveled across the Internet backbone, to focus on stored data that telecommunication
filtering systems discarded earlier, and to get data that is easier to handle,
among other things.
PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush
Administration. The program is operated under the supervision
of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC)
pursuant to the Foreign Intelligence Surveillance Act (FISA). Its existence was leaked six years
later by NSA contractor Edward Snowden, who warned that the extent
of mass data collection was far greater than the public knew
and included what he characterized as "dangerous" and "criminal" activities.
The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent
documents have demonstrated a financial arrangement between
NSA's Special Source Operations division (SSO) and PRISM partners in the millions
of dollars.
Documents indicate that PRISM is "the number one source of raw intelligence used for NSA
analytic reports", and it accounts for 91% of the NSA's Internet traffic
acquired under FISA section 702 authority." The leaked information came to light
one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications
giant Verizon Communications to turn over to the NSA logs
tracking all of its customers' telephone calls on an ongoing daily basis.
U.S. government officials have disputed some aspects of the Guardian and Washington Post
stories and have defended the program by asserting it cannot be used on
domestic targets without a warrant, that it has helped to prevent acts of terrorism, and
that it receives independent oversight from the federal government's executive, judicial
and legislative branches.
On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the
NSA's data gathering practices constitute "a circumscribed, narrow system
directed at us being able to protect our people.
Wake up america !! ........Our country is spying on us all..
President Eisenhower was right on point about the military-industrial complex, but he could
not have predicted the emergence of the massive surveillance state
combining the government and private sector that bolsters it.
Sadly, neither President Obama nor his former Republican challenger, Mitt Romney, has the
desire or moral courage to fight the growing power and influence of the Corporate
Security State. We are witnessing the integration of spying on two levels,
the government level (federal, state and local) and the corporate level (via telecom providers,
web services and credit card companies).
If you are a user of Facebook, Twitter, LinkedIn, YouTube, Craigslist or any other popular site,
the U.S. security state is watching you.
An increasing number of federal agencies are employing sophisticated means to monitor Americans'
use of social networking sites.
Federal entities from the National Security Agency (NSA) and the Defense Department to
the Department of Homeland Security (DHS) to even the Internal Revenue Service
(IRS) are involved in developing programs to track the American public online.
the following is a brief summary of some of the other programs.
1. Justice Department. The Electronic Frontier Foundation (EFF) released a report from the
DOJ’s Computer Crime and Intellectual Property section, "Obtaining
and Using Evidence from Social Networking Sites," that describes how evidence from
social networking sites can reveal personal communications that might help "establish
motives and personal relationships."
It reports that monitored data from such sites can provide location information and "prove
and disprove alibis." Perhaps most illuminating, it advises agents
that “going undercover” on social media sites can enable law enforcement to
communicate with suspects and targets, gain access to nonpublic information and map social
relationships.
The DOJ document notes that Twitter retains the last login IP address, but does not preserve
data unless legally required to do so.
2. The IRS uses a variety of social media sites like Facebook, Google, Twitter, MySpace,
YouTube and Second Life to investigate taxpayers. It seems to have started
this practice in 2009, providing agents with special training on social networking.
The EFF posted the IRS’ 38-page training that offers detailed tips to agents on how
to conduct searches, locate relevant taxpayer information, narrow down and refine results.
3. The Office of the Director of National Intelligence is seeking a tool that integrates
all online information, including web searches, Wikipedia edits and
traffic webcams.
4. The Defense Department has solicited proposals through DARPA for a $42 million dollar “Social
Media Strategic Communications” (SMISC) program, a tool
that tracks social media and weeds out information. It has set four goals for the project: one
to detect, classify and measure the development of ideas, concepts in hidden social
media messages; two specify the structure of the campaign and influence in social media
sites and the community they create; three identify the participants and intention in
conducting a social media campaign of persuasion and measure its effect; and four develop
an effective counter-message to an identified campaign carried out against the enemy.
5. The FBI is soliciting a bid for a program that seems very similar to the DHS social-network
monitoring program. Dubbed the "FBI Social Media Application,”
the program would have "the ability to rapidly assemble critical open source information
and intelligence ... to quickly vet, identify and geo-locate breaking events, incidents
and emerging threats."
In the FBI’s 12-page solicitation, it requests a program that can quickly identify, display
and locate alerts on geo-spatial maps and enable users to summarize the "who,
what, when, where and why" of specific threats and incidents. Going further, it seeks
to not simply detect “credible threats,” but to identify those organizing and taking
part in gatherings and to predict upcoming events. According to the FBI, "Social media
will be a valued source of information to the SIOC i.e., Strategic Information and
Operations Center intelligence analyst in a crisis because it will be both eyewitness
and first response to the crisis."
An FBI spokesperson insisted, "We will not focus on specific persons or protected groups,
but on words that relate to 'events' and 'crisis' and activities constituting
violations of federal criminal law or threats to national security.
Examples of these words will include lockdown, bomb, suspicious package, white powder, active
shoot, school lockdown, and many more. ” Rest assured, much like the assurances
voiced by the DHS, the FBI insists that its monitoring won't be used to focus on specific
individuals or groups.However they are lieing .
6. Department of Homeland Security. A more aggressive monitoring program was recently
revealed by the Electronic Privacy Information Center (EPIC) when it secured
from the DHS a list of approximately 380 keywords that the agency tracks.
The allegedly threatening terms were found in the DHS’ Analyst Desktop Binder, part
of its 2011 Media Monitoring Capability (MMC) program.
These terms are organized into nine categories:
Agencies 26 terms, including “DHS,” “FBI”, “CIA,” “Air Marshal,” “United Nations”
and “Red Cross”; Domestic security
52 terms, including "assassination," "dirty bomb," “crash,” “first responder,”
“screening” and “death.” Hazardous materials
34 terms, including "hazmat," “nuclear," “leak,” “burn” and “cloud.”
Public health 47 terms, including "ebola," "contamination,"
“wave,” “pork” and “agriculture.” Infrastructure security
35 terms, including “AMTRAK,” “airport," "subway," “port,” “electric” and “cancelled.”
Southwest border violence 65 terms, including "drug cartel," "decapitated,"
“gunfight,” “marijuana,” “***,” “border” and “bust.”
Terrorism 55 terms, including “Jihad,” “biological
weapons,” “suicide attack,” “plot” and “pirates.”
Emergencies and weather 41 terms, including “disaster,” "hurricane,"
"power outage," “ice,” “storm” and “help.”
Cyber security 25 terms, including “cyber terror,” “malware,”
“virus,” “hacker,” “worm,” “China” and “Trojan.”
The DHS has been engaged in monitoring social networking sites like Facebook, Twitter, Flickr,
YouTube and LinkedIn as well as blogs since at least 2010. Its effort
is run through the Office of Operations Coordination and Planning (OPS), National
Operations Center (NOC), and is entitled “Publicly Available Social Media Monitoring and Situational
Awareness (Initiative).” Its ostensible purpose is to provide situational
awareness and strengthen its common operating picture.
The scope of DHS’ practice of social monitoring was unexpectedly revealed in a special congressional
hearing, the House Subcommittee on Counterintelligence
and Intelligence, headed by Rep. Patrick Meehan (R-PA), in February.
Two DHS officials, Chief Privacy Officer Mary Ellen Callahan and Director of Operations
Coordination and Planning Richard Chavez, raised the representatives' ire by appearing
to be deliberately stonewalling on the scope and practice of the agency's social
media surveillance.
Most disturbing, the DHS reps appeared unsure about the monitoring program’s goals, how
the gathered information would be used and whether it would be shared with other
agencies. In an unusual show of bipartisan unity, Reps. Billy Long (R-MO),
Jackie Speier (D-CA) and Bennie Thompson (D-MS) joined Rep. Meehan in chastising the DHS officials.
Under intense congressional probing, DHS reps revealed that the keywords chosen for monitoring
were drawn from commercially available, off-the-shelf database programs
that were customized to meet its specifications. The agency was particularly interested
in determining first witnesses to breaking events like the 2011 Tucson shooting of Gabrielle
Giffords and others and the January 2012 bomb threat at an Austin school.
The DHS reps insisted that data gathered was only used to confirm other news reports and
that information on private citizens was not being collected. however this came
to be all lies. In addition, they claimed that that all personally identifying
information was regularly scrubbed from the agency’s servers.
Few should feel comforted by the DHS assurances. At the House hearing, it was also revealed
that the agency was involved in what appears to be an ongoing campaign
to monitor the actions and beliefs of individual Americans engaged in community-based
political activism. which is groups such as anonymous and other patriots alike.
It compiled a report, “Residents Voice Opposition Over Possible Plan to Bring Guantanamo Detainees
to Local Prison-Standish MI,” that tracked community reactions to
the proposed location of Guantánamo detainees in a local Michigan prison. The DHS report
is part of the EPIC documents acquired through
a Freedom of Information request. It details that information was gathered from
a variety of sources, including newspaper articles and responses, blogs
by local activists, and Twitter and Facebook posts.
The House hearing also shed light on the DHS practice of outsourcing keyword tracking of
social media through a sole-source contract to the giant defense contractor,
General Dynamics. In 2011, General Dynamics had revenues of $5.5 billion dollars of which
84 percent came from government contracts. Earlier this year, it’s Advanced Information
Systems division was awarded a $14 million dollar DHS contract to (in the words of a
press release) “provide constant and continual watch operations for critical communications
to the agency's National Coordinating Center.” In addition, it will “identify the possible
impacts of potentially disruptive events.
In keeping with the prevailing ethos of corporate unaccountability, it turns out if the General
Dynamics employees are found to have misused the information
garnered from a social network user, including a journalist or public figure, the employee
must take a training course or, worst case, lose his/her job. No criminal penalties are
specified.
wake up americia .......... Open your eyes..........the time is now to stop them in there tacks me
must use the same tactics to combat this war that has been waged against
us.
wake up Americia !!!!!
WE are Anonymous
we are legion
we do not forgive
we do not forget
Expect Anonymous !!!