Skip navigation

Tag Archives: fourth amendment

Snowden Level Documents Reveal Stealth DHS Spy Grid

Government documents obtained exclusively by Infowars expose massive DHS domestic spy grid designed to track citizens in real time through mega government databases.

Anthony Gucciardi & Mikael Thalen
Infowars.com
November 12, 2013

Exclusive documents obtained by Infowars from an insider government source have revealed the true origin and nature of the highly secretive ‘mesh network’ spy grid that has garnered massive media attention due to the fact that the network’s strange downtown Seattle spy boxes can track the last 1,000 GPS locations of cellphone users. But as new documents reveal, the grid is far deeper than the media is telling you. The Seattle DHS spy system ultimately ties in with an enormous stealth database that acts as an intelligence hub for all of your personal data.

On page 55 of the “Port Security Video Surveillance System with Wireless Mesh Network” project document that we have obtained, a diagram reveals the system’s basic communication abilities in regards to the Port of Seattle that the DHS has refused to comment on despite funding with millions in taxpayer dollars:

DHS spy system’s basic communication abilities in regards to the Port of Seattle ‘mesh network’ tracking system.

The Infowars team is closely reviewing the document and will publish it in whole soon. More images seen in the extensive documentation:

dhs-spy-pdf-2

A documented image of the actual spy system put in place, highlighted in the original document itself.

seattle-dhs-spy-1

A further breakdown of the spy operation.

The wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions.

Labeled by their intersection location such as “1st&University” and “2nd& Seneca,” the multiple network devices are easily detected in Seattle’s downtown area through a simple Wi-Fi enabled device, leading many residents to wonder if they are being detected in return.

“How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?” asked Seattle newspaper The Stranger.

According to reports from Kiro 7 News, the mesh network devices can capture a mobile user’s IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited.

So far Seattle police have been tight-lipped about the network’s roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement.

According to The Stranger’s investigation, Seattle Police detective Monty Moss claims the department has no plans to use the mesh network for surveillance… unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy.

Unknown to the public until now, information regarding the system has been hiding in plain view since last February at minimum. Diagrams attached to a March 2012 proposal request (# DIT-2996), which have since been approved, updated and finalized, are publicly viewable at the Seattle.gov website.

Several connections can be made by studying the diagram, including its now apparent link to Seattle’s public waterfront. The recent instillation of 30 Department of Homeland Security-funded surveillance cameras on Seattle’s popular waterfront, complete with mesh network devices attached, were purported to increase the Port of Seattle’s protection against such acts as terrorism. Residents soon discovered multiple cameras facing inward toward Seattle homes, not towards the coast line as allegedly intended. The “accident” was later remedied by city officials.

While unknown members of multiple law enforcement agencies will have access to the mesh network, so will the Seattle Fusion Center, where FBI and Homeland Security gather data on Americans deemed “extremist” for such crimes as “loving liberty.” Incredibly, even the U.S. Senate called the Fusion Centers a “useless and costly effort that tramples on civil liberties” in a 2012 bi-partisan report.

Page 65 of the public document details the information-collecting capabilities of the Mesh Network Mesh System (NMS), revealing its ability to collect identifying data of anyone “accessing the network.” Although the document details an alert system for reporting unauthorized access, a public user guide from a similar Aruba software program lists the ability to collect “a wealth of information about unassociated devices,” validating fears of local residents who walk through the mesh network’s perimeter.

“The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”

The bottom left of the diagram shows what may be the Seattle Department of Transportation Intelligent Transportation Systems Network, linked directly into the mesh network. According to the Department of Transportation website, the system controls several surveillance related items such as license plate readers and closed circuit TV (CCTV) systems.

An early draft of the diagram appears to show Seattle police vehicle’s ability to receive and “control” certain aspects of the mesh network. Whether police were originally intended to control surveillance cameras from their vehicles, including their panning, tilting and zooming abilities, remains unclear. According to statements made by Seattle’s Assistant Chief Paul McDonagh last February regarding the waterfront cameras specifically, “only a few people would have that capability, so the officer on the street would just have the ability to view it.”

In reality, Seattle is only one of countless cities across the country being flooded with a sea of surveillance equipment. While the public has focused mainly on surveillance issues relating to the NSA, the federal government has continued its 20-plus year dragnet surveillance grid roll out of covert conversation-recording microphones.

As recently reported by Storyleak, multiple cities including Las Vegas have begun using “Intellistreets” light fixtures capable of recording conversations. The device has received increased scrutiny since 2011 when their “Homeland Security” application, which shouts government messages from a loudspeaker system, was widely revealed to the public.

Other audio recording devices like the ShotSpotter microphones, allegedly used to analyze the location of gun shots, have been found to record conversations of unsuspecting city residents.

Despite the federal government’s constant justification of throwing away civil liberties in the name of fighting terrorism, which kills less Americans than bee stings, continued NSA revelations show that the federal government’s continued surveillance system build-up is aimed at everyday Americans, not foreign Al Qaeda admittedly supported by the U.S. government in Syria.

<p  style=” margin: 12px auto 6px auto; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none; display: block;”>   <a title=”View “Port Security Video Surveillance System with Wireless Mesh Network” –
Seattle on Scribd” href=”http://www.scribd.com/doc/183600279″  style=”text-decoration: underline;” >“Port Security Video Surveillance System with Wireless Mesh Network” –
Seattle</a></p>

——-

Anthony Gucciardi is the acting Editor and Founder of alternative news website Storyleak.com. He is also a news media personality and analyst who has been featured on top news, radio, and television organizations including Drudge Report, Michael Savage’s Savage Nation, Coast to Coast AM, and RT.

Mikael is an accomplished writer and lead features writer at Storyleak whose articles have been featured on sites such as the Drudge Report and others. During his time at Examiner.com, he was frequently ranked the number one political writer.

This article was posted: Tuesday, November 12, 2013 at 12:54 pm

Advertisements

Snowden: A Manifesto for the Truth

From:  http://meriksson.net/snowden-a-manifesto-for-the-truth

This article by Edward Snowden was published today in Der Spiegel. Since I could not find a translation online, I decided to publish one (suggestions for improvements are welcome). I previously published the full text in German.

In a very short time, the world has learned much about unaccountable secret agencies and about sometimes illegal surveillance programs. Sometimes the agencies even deliberately try to hide their surveillance of high officials or the public. While the NSA and GCHQ seem to be the worst offenders – this is what the currently available documents suggest – we must not forget that mass surveillance is a global problem in need of global solutions.

Such programs are not only a threat to privacy, they also threaten freedom of speech and open societies. The existence of spy technology should not determine policy. We have a moral duty to ensure that our laws and values limit monitoring programs and protect human rights.

Society can only understand and control these problems through an open, respectful and informed debate. At first, some governments feeling embarrassed by the revelations of mass surveillance initiated an unprecedented campaign of persecution to supress this debate. They intimidated journalists and criminalized publishing the truth. At this point, the public was not yet able to evaluate the benefits of the revelations. They relied on their governments to decide correctly.

Today we know that this was a mistake and that such action does not serve the public interest. The debate which they wanted to prevent will now take place in countries around the world. And instead of doing harm, the societal benefits of this new public knowledge is now clear, since reforms are now proposed in the form of increased oversight and new legislation.

Citizens have to fight suppression of information on matters of vital public importance. To tell the truth is not a crime.

This text was written by Edward Snowden on November 1, 2013 in Moscow. It was sent to SPIEGEL staff over an encrypted channel.

 

XKeyscore: Instrument of Mass Surveillance

Stephen Lendman
August 3, 2013

stasi20

Evidence mounts. America crossed the line. It operates lawlessly. It reflects police state ruthlessness. Big Brother’s real. It’s not fiction. It watches everyone.

It’s about control, espionage and intimidation. It targets fundamental freedoms. It has nothing to do with national security. America’s only threats are ones it invents. It does so for political advantage.

On July 31, London’s Guardian headlined “XKeyscore: NSA tool collects ‘nearly everything a user does on the Internet.’ ”

It “gives ‘widest reading’ collection of online data. NSA analysts require no prior authorizations for searches.” They sweep up “emails, social media and browsing history.”

Every keystroke enters a database. NSA training materials call XKeyscore its “widest-reaching” online intelligence gathering tool. Agency officials call it their Digital Network Intelligence (DNI).

It collects “nearly everything a typical user does on the internet.” Virtually nothing escapes scrutiny.

London’s Guardian used classified information. It’s sourced from a February 2008 presentation. It’s about meta-data mining. It’s chilling. It’s worst than previously thought.

It explains what Edward Snowden meant, saying:

“I, sitting at my desk, (can) wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email” address.

At the time, US officials scoffed. House Republican Permanent Select Committee on Intelligence chairman Mike Rogers said:

“He’s lying. It’s impossible for him to do what he was saying he could do.”

According to Guardian contributor Glenn Greenwald:

XKeyscore lets analysts “mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search.”

“The request is not reviewed by a court or any NSA personnel before it is processed.”

Agency personnel use XKeyscore and other systems for “real-time” interception of personal online activity.

US statutes require FISA warrants when targeting a “US person.” It doesn’t matter. NSA operates extrajudicially. XKeyscore permits doing so with technological ease.

It lets analysts search meta-data, emails, and other online activity. They can do it with “no known email account (a ‘selector’) in NSA parlance) associated with the individual being targeted.”

“Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.”

A December 2012 slide titled “plug-ins” explains easily accessed information fields.

They include “every email address seen in a session by both username and domain, every phone number seen in a session (eg address book entries or signature block), and user activity.”

It includes webmail, usernames, buddylists, and machine specific cookies, etc.

According to Snowden, XKeyscore lets analysts conduct “searches within bodies of emails, webpages and documents.”

They can access “To, From, CC, BCC, (and) ‘Contact Us’ pages on websites.” Analysts can monitor anyone. They can read and save their personal communications.

Doing so simply requires “clicking a few simple pull-down menus designed to provide both legal and targeting justifications.”

Virtually nothing online escapes scrutiny. Fourth Amendment rights don’t matter. Privacy no longer exists.

Amounts of information collected are “staggeringly large.” One – two billion records are added daily. Information gathered is so voluminous, it can only be stored for three to five days. Meta-data is kept 30 days.

NSA solves the problem by “creat(ing) a multi-tiered system that allows analysts to store ‘interesting’ content in other databases.” One’s called Pinwale. It stores information up to five years.

In 2012, over 40 billion records were collected and stored monthly. Americans are lawlessly monitored. Warrant authorization isn’t gotten.

NSA lied telling the Guardian:

Its “activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.”

“XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.”

“Allegations of widespread, unchecked analyst access to NSA collection data are simply not true.”

“Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks.”

“In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”

“Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.”

“These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”

It bears repeating. NSA operates extrajudicially. It’s an out-of-control agency. Rule of law principles don’t matter.

At issue is control, espionage and intimidation. Fundamental freedoms are targeted. Claiming national security priorities doesn’t wash. It’s one of many big lies. They mask police state lawlessness.

Greenwald’s article was published the same day the White House released heavily redacted NSA “bulk collection program” reports and a FISA court order. It included domestic telephone call monitoring procedures.

Obama officials lied. They claim surveillance isn’t authorized without demonstrable suspicions. Monitoring, they say, is subject to FISA court oversight.

It’s virtually rubber stamp. It’s a kangaroo court. It’s illegitimate. It authorizes virtually all requests. It operates extrajudicially. It’s been around for 35 years. No case ever went to the Supreme Court.

It’s findings are secret. A single judge signs surveillance orders. Challenges are virtually impossible. Police state justice is assured.

Things are getting worse, not better. Freedom’s disappearing in plain sight. Congress and federal courts are co-conspirators. They’re in lockstep with lawless surveillance.

Congressional committee hearings reflect show, not tell. Senators and House member criticisms ring hollow. Legislation prohibiting lawless spying could stop it. Nothing with teeth is planned.

Director of National Intelligence James Clapper committed perjury. He lied to Congress. He was caught red-handed. He said NSA doesn’t spy on Americans.

Clear evidence proves otherwise. Holding him accountable won’t follow. It never does. It won’t this time. Congress approves lawlessness. So do federal courts.

Big Brother is official policy. Political Washington supports it. Claims otherwise don’t wash.

A Final Comment

August 4 is 1984 Day. Nationwide rallies are planned. Thousands are expected to participate. “Big Brothers has seen enough,” they say.

Sustained public pressure’s essential. Congressional inaction demands it. On July 31, the Electronic Frontier Foundation (EFF) headlined “Huge Global Coalition Stands Against Unchecked Surveillance.”

Over 100 organizations endorsed 13 protect human rights principles. Doing so challenges lawless spying. They advise “on how surveillance laws should respect the law, due process, and include public oversight and transparency.”

Privacy matters. It’s time legislation with teeth assures it. According to EFF’s Danny O’Brien:

“It’s time to restore human rights to their place at the very heart of the surveillance debate.”

“Widespread government spying on communications interferes with citizens’ ability to enjoy a private life, and to freely express themselves – basic rights we all have.”

“But the mass metadata collected in the US surveillance program, for example, makes it extraordinarily easy for the government to track what groups we associate with and why we might contact them.”

“These principles announced today represent a global consensus that modern surveillance has gone too far and must be restrained.”

Organizations involved represent over 40 nations. “International human rights law binds every country across the globe to a basic respect for freedom of expression and personal privacy,” said EFF’s Katitza Rodriguez.”

“The pervasiveness of surveillance makes standing up for our digital rights more important than ever.”

“And we need those rights to survive in a digital world, where any state can spy on us all, in more detail than ever before.”

“We know that surveillance laws need to be transparent and proportionate, with judicial oversight, and that surveillance should only be used when absolutely necessary.”

“Everything we’ve heard about the NSA programs indicate that they fall far outside these international human rights principles.”

Operating this way assures tyranny. It’s practically full-blown. Police states operate this way. America’s by far the worst.

Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net.

This article was posted: Saturday, August 3, 2013 at 10:06 am

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

• XKeyscore gives ‘widest-reaching’ collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
NSA’s XKeyscore program – read one of the presentations

theguardian.com, Wednesday 31 July 2013 08.56 EDT

XKeyscore map

One presentation claims the XKeyscore program covers ‘nearly everything a typical user does on the internet’

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst’s ability to query the databases at any time.

KS1 

The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSA parlance) associated with the individual being targeted.

Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”

The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.

A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.

Email monitoring

In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual’s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

KS2 

KS3edit2 

The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, “communications that transit the United States and communications that terminate in the United States”.

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

KS4 

Chats, browsing history and other internet activity

Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.

An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.

KS55edit 

An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.

KS6 

Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.

KS7 

As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.

KS8 

The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.

KS9 

The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.

William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20tn transactions about US citizens with other US citizens”, an estimate, he said, that “only was involving phone calls and emails”. A 2010 Washington Post article reported that “every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.”

The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”

To solve this problem, the NSA has created a multi-tiered system that allows analysts to store “interesting” content in other databases, such as one named Pinwale which can store material for up to five years.

It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.

KS10 

In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.

KS11 

Legal v technical restrictions

While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA’s foreign targets.

The ACLU’s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans’ communications without individualized warrants.

“The government doesn’t need to ‘target’ Americans in order to collect huge volumes of their communications,” said Jaffer. “The government inevitably sweeps up the communications of many Americans” when targeting foreign nationals for surveillance.

An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.

KS12 

In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.

Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. “It’s very rare to be questioned on our searches,” Snowden told the Guardian in June, “and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification’.”

In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.

Acknowledging what he called “a number of compliance problems”, Clapper attributed them to “human error” or “highly sophisticated technology issues” rather than “bad faith”.

However, Wyden said on the Senate floor on Tuesday: “These violations are more serious than those stated by the intelligence community, and are troubling.”

In a statement to the Guardian, the NSA said: “NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.

“XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.

“Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”

“Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

“These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”

Police, Firefighters Ordered Not To Speak About Michael Hastings Crash

LAPD refuses to release police report to journalists

Paul Joseph Watson
Infowars.com
July 9, 2013

Police and firefighters in Los Angeles have been ordered not to speak to the media about the deadly crash involving Rolling Stone journalist Michael Hastings, fueling speculation that some form of cover-up could be underway.

San Diego 6 journalist Kimberly Dvorak says she was unable to obtain the police report concerning the crash despite the fact that the LAPD already ruled out “foul play” days after the incident.

A gag order has also been placed on cops and firefighters who both responded to and investigated the crash, which occurred in the early hours of June 18 in the Hancock Park neighborhood of Los Angeles.

“When you go to the LA police department and you go to the fire department….they all said they couldn’t comment and some of them said they were told not to comment on this story,” said Dvorak.

The journalist added that she talked to “military personnel” who commented that the inferno which consumed Hastings’ Mercedes was an extremely hot fire that “is not something you normally see with a car like this,” and that Mercedes itself was waiting to hear from the LAPD but has not been contacted.

Dvorak also noted that the engine from Hastings’ vehicle was found 150 feet behind the car, contradicting testimony from two university physics professors who said that “the engine would go with the forward velocity of the (vehicle).”

HIghlighting the absence of skid marks on the road, Dvorak said she was inclined to surmise that the car either malfunctioned or “there was something on the car that allowed that to trigger and blow up,” noting that Mercedes denied their vehicle could have exploded in the manner seen in the incident that killed Hastings.

Dvorak also mentioned two separate academic studies out of the University of Washington and the University of California, San Diego which both detail how modern cars can easily be hacked and remote controlled, a premise also raised by former counter-terror czar Richard Clarke, who told the Huffington Post that the fatal crash of Hastings’ Mercedes C250 Coupe was “consistent with a car cyber attack.”

As we previously reported, questions surrounding Hastings’ untimely death have emerged primarily because the journalist was working on “the biggest story yet” about the CIA before he was killed.

The writer also sent out an email 15 hours before his car crash stating he was “onto a big story” and needed “to go off the rada[r] for a bit.”

According to colleagues, Hastings was “incredibly tense and very worried, and was concerned that the government was looking in on his material,” and also a “nervous wreck” in response to the surveillance of journalists revealed by the AP phone tapping scandal and the NSA PRISM scandal.

After Wikileaks reported that Hastings had contacted them a few hours before his death complaining that he was under FBI investigation, other friends confirmed that the journalist was “very paranoid” about the feds watching him.

Another close friend of Hastings, Staff Sergeant Joseph Biggs, told Fox News that Hastings “drove like a grandma” and that it was totally out of character for him to be speeding in the early hours of the morning.

Hastings had made numerous powerful enemies as a result of his exposure of Gen. Stanley A. McChrystal in 2010, receiving several death threats in the process.

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

This article was posted: Tuesday, July 9, 2013 at 5:49 am

Snowden Claims: NSA Ties Put German Intelligence in Tight Spot

The German foreign intelligence service knew more about the activities of the NSA in Germany than previously known. “They’re in bed together,” Edward Snowden claims in an interview in SPIEGEL. The whistleblower also lodges fresh allegations against the British.

For weeks now, officials at intelligence services around the world have been in suspense as one leak after another from whistleblower Edward Snowden has been published. Be it America’s National Security Agency, Britain’s GCHQ or systems like Prism or Tempora, he has been leaking scandalous information about international spying agencies. In an interview published by SPIEGEL in its latest issue, Snowden provides additional details, describing the closeness between the US and German intelligence services as well as Britain’s acquisitiveness when it comes to collecting data.

In Germany, reports of the United States’ vast espionage activities have surprised and upset many, including politicians. But Snowden isn’t buying the innocence of leading German politicians and government figures, who say that they were entirely unaware of the spying programs. On the contrary, the NSA people are “in bed together with the Germans,” the whistleblower told American cryptography expert Jacob Appelbaum and documentary filmmaker Laura Poitras in an interview conducted with the help of encrypted emails shortly before Snowden became a globally recognized name.

Snowden describes the intelligence services partnerships in detail. The NSA even has a special department for such cooperation, the Foreign Affairs Directorate, he says. He also exposes a noteworthy detail about how government decision-makers are protected by these programs. The partnerships are organized in a way so that authorities in other countries can “insulate their political leaders from the backlash” in the event it becomes public “how grievously they’re violating global privacy,” the former NSA employee says.

Intensive Cooperation with Germany

SPIEGEL reporting also indicates that cooperation between the NSA and Germany’s foreign intelligence service, the BND, is more intensive than previously known. The NSA, for example, provides “analysis tools” for the BND to monitor signals from foreign data streams that travel through Germany. Among the BND’s focuses are the Middle East route through which data packets from crisis regions travel.

BND head Gerhard Schindler confirmed the partnership during a recent meeting with members of the German parliament’s control committee for intelligence issues.

But it’s not just the BND’s activities that are the focus of the interview with Snowden.

The 30-year-old also provides new details about Britain’s Government Communications Headquarters (GCHQ). He says that Britain’s Tempora system is the signal intelligence community’s first “full-take Internet buffer,” meaning that it saves all of the data passing through the country.

Data Remains Buffered for Three Days

The scope of this “full take” system is vast. According to Snowden and Britain’s Guardian newspaper, Tempora stores communications data for up to 30 days and saves all content for up to three days in a so-called Internet buffer. “It snarfs everything in a rolling buffer to allow retroactive investigation without missing a single bit,” Snowden says.

Asked if it is possible to get around this total surveillance of all Internet communication, he says: “As a general rule, so long as you have any choice at all, you should never route through or peer with the UK under any circumstances.”

In other words, Snowden says, one can only prevent GCHQ from accessing their data if they do not send any information through British Internet lines or servers. However, German Internet experts believe this would be almost impossible in practice.

Metadata Provide Orientation in Sea of Data

The attempt to conduct total data retention is noteworthy because most of the leaks so far in the spying scandal have pertained to so-called metadata. In the interview, Snowden reiterates just how important metadata — which can include telephone numbers, IP addresses and connection times, for example — really are. “In most cases, content isn’t as valuable as metadata,” Snowden says.Those in possession of metadata can determine who has communicated with whom. And using the metadata, they can determine which data sets and communications content they would like to take a closer look at. “The metadata tells you what out of their data stream you actually want,” Snowden says.

It is becoming increasingly clear to recognize the way in which surveillance programs from the NSA and GCHQ — including Prism, Tempora and Boundless Informant — cooperate. The metadata provides analysts with tips on which communications and content might be interesting. Then, Snowden says, with the touch of a button they can then retrieve or permanently collect the full content of communications that have already been stored for a specific person or group, or they can collect future communications. But a person can also be “selected for targeting based on, for example, your Facebook or webmail content.”

jok/cis/dsl

 

Shock Video Shows Police Forcibly Drawing Blood

Paul Joseph Watson
Infowars.com
June 28, 2013

Shock video out of Georgia shows police strapping down citizens accused of drunk driving before using a needle forcibly draw blood as the victim screams, “what country is this?”

The policy of police obtaining a warrant to draw blood from those merely suspected of being drunk at a DUI checkpoint or a routine traffic stop has been in place for years across many states, but to actually see it in action is disturbing.

The clip shows individuals being strapped down on a padded table at the Gwinnett County jail. Even those who show no resistance whatsoever are forcibly restrained and have their heads pressed down by an officer using his elbow.

“We all are American citizens and you guys have me strapped to a table like I’m in Guantanamo f***ing Bay,” complains another victim of the blood draw.

Mike Choroski, the man seen screaming “what country is this” as officers hold him down and take his blood without consent, is still awaiting trial, claiming that he is not guilty and there was no accident involving his vehicle.

“I’m a taxpaying American who refused something….I refused to do this….what happened to me in that room was unnessesary and nobody should have to do that,” said Choroski.

“Holding down and forcing somebody to submit to this is really intrusive in terms of that level of invasive procedure into someone’s body is ridiculous for investigating a misdemeanour,” Attorney David Boyle told Fox 5 Atlanta, describing the forced blood draws as an “unreasonable search” under the 4th Amendment.

Despite the fact that citizens can lose their drivers license for a year if they refuse a standard breathlyser test, cops can then get a warrant to forcibly draw blood, “for every DUI stop, even if there’s no accident or injury.”

In Gwinnett County, Georgia police have carried out more than 100 forced blood draws since January.

“I’m stunned, I did not know that this was legal, I did not know they could take your blood without your consent,” said a Fox 5 anchor in response to the clip, opining that the process was a violation of the 4th Amendment.

Georgia is one of numerous states that enforce “no refusal” checkpoints where police can forcibly draw blood. In 2005, the Supreme Court ruled that it is not unconstitutional for the state to hold down Americans and forcefully withdraw blood. A January 2013 ruling affirmed that a warrant must be obtained for the process, although police could dispense with the warrant requirement in an “emergency”.

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

GCHQ intercepted foreign politicians’ communications at G20 summits

UK news | The Guardian

GCHQ composite

Documents uncovered by the NSA whistleblower, Edward Snowden, reveal surveillance of G20 delegates’ emails and BlackBerrys. Photograph: Guardian

Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.

There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls “ground-breaking intelligence capabilities” to intercept the communications of visiting delegations.

This included:

•  Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates’ use of computers;

• Penetrating the security on delegates’ BlackBerrys to monitor their email messages and phone calls;

• Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit;

• Targeting the Turkish finance minister and possibly 15 others in his party;

•  Receiving reports from an NSA attempt to eavesdrop on the Russian leader, Dmitry Medvedev, as his phone calls passed through satellite links to Moscow.

The documents suggest that the operation was sanctioned in principle at a senior level in the government of the then prime minister, Gordon Brown, and that intelligence, including briefings for visiting delegates, was passed to British ministers.

A briefing paper dated 20 January 2009 records advice given by GCHQ officials to their director, Sir Iain Lobban, who was planning to meet the then foreign secretary, David Miliband. The officials summarised Brown’s aims for the meeting of G20 heads of state due to begin on 2 April, which was attempting to deal with the economic aftermath of the 2008 banking crisis. The briefing paper added: “The GCHQ intent is to ensure that intelligence relevant to HMG’s desired outcomes for its presidency of the G20 reaches customers at the right time and in a form which allows them to make full use of it.” Two documents explicitly refer to the intelligence product being passed to “ministers”.

GCHQ ragout 1 One of the GCHQ documents. Photograph: Guardian According to the material seen by the Guardian, GCHQ generated this product by attacking both the computers and the telephones of delegates.

One document refers to a tactic which was “used a lot in recent UK conference, eg G20”. The tactic, which is identified by an internal codeword which the Guardian is not revealing, is defined in an internal glossary as “active collection against an email account that acquires mail messages without removing them from the remote server”. A PowerPoint slide explains that this means “reading people’s email before/as they do”.

The same document also refers to GCHQ, MI6 and others setting up internet cafes which “were able to extract key logging info, providing creds for delegates, meaning we have sustained intelligence options against them even after conference has finished”. This appears to be a reference to acquiring delegates’ online login details.

Another document summarises a sustained campaign to penetrate South African computers, recording that they gained access to the network of their foreign ministry, “investigated phone lines used by High Commission in London” and “retrieved documents including briefings for South African delegates to G20 and G8 meetings”. (South Africa is a member of the G20 group and has observer status at G8 meetings.)

GCHQ Ragout 2 Another excerpt from the GCHQ documents. Photograph: Guardian A detailed report records the efforts of the NSA’s intercept specialists at Menwith Hill in North Yorkshire to target and decode encrypted phone calls from London to Moscow which were made by the Russian president, Dmitry Medvedev, and other Russian delegates.

Other documents record apparently successful efforts to penetrate the security of BlackBerry smartphones: “New converged events capabilities against BlackBerry provided advance copies of G20 briefings to ministers … Diplomatic targets from all nations have an MO of using smartphones. Exploited this use at the G20 meetings last year.”

The operation appears to have run for at least six months. One document records that in March 2009 – the month before the heads of state meeting – GCHQ was working on an official requirement to “deliver a live dynamically updating graph of telephony call records for target G20 delegates … and continuing until G20 (2 April).”

Another document records that when G20 finance ministers met in London in September, GCHQ again took advantage of the occasion to spy on delegates, identifying the Turkish finance minister, Mehmet Simsek, as a target and listing 15 other junior ministers and officials in his delegation as “possible targets”. As with the other G20 spying, there is no suggestion that Simsek and his party were involved in any kind of criminal offence. The document explicitly records a political objective – “to establish Turkey’s position on agreements from the April London summit” and their “willingness (or not) to co-operate with the rest of the G20 nations”.

The September meeting of finance ministers was also the subject of a new technique to provide a live report on any telephone call made by delegates and to display all of the activity on a graphic which was projected on to the 15-sq-metre video wall of GCHQ’s operations centre as well as on to the screens of 45 specialist analysts who were monitoring the delegates.

“For the first time, analysts had a live picture of who was talking to who that updated constantly and automatically,” according to an internal review.

A second review implies that the analysts’ findings were being relayed rapidly to British representatives in the G20 meetings, a negotiating advantage of which their allies and opposite numbers may not have been aware: “In a live situation such as this, intelligence received may be used to influence events on the ground taking place just minutes or hours later. This means that it is not sufficient to mine call records afterwards – real-time tip-off is essential.”

In the week after the September meeting, a group of analysts sent an internal message to the GCHQ section which had organised this live monitoring: “Thank you very much for getting the application ready for the G20 finance meeting last weekend … The call records activity pilot was very successful and was well received as a current indicator of delegate activity …

“It proved useful to note which nation delegation was active during the moments before, during and after the summit. All in all, a very successful weekend with the delegation telephony plot.”

Facebook and Microsoft get government OK to make broader surveillance revelations post-Edward Snowden leaks

Google and the other giants had together pressured the Obama administration to let them talk more about national security orders.

By / NEW YORK DAILY NEWS

Saturday, June 15, 2013, 9:56 AM

SAN FRANCISCO — Facebook and Microsoft Corp. representatives said that after negotiations with national security officials their companies have been given permission to make new but still very limited revelations about government orders to turn over user data.

The announcements Friday night come at the end of a week when Facebook, Microsoft and Google, normally rivals, had jointly pressured the Obama administration to loosen their legal gag on national security orders.

RELATED: FEDS INVESTIGATING WHETHER NSA LEAKER EDWARD SNOWDEN HAS TIES TO CHINESE GOVERNMENT

Those actions came after Edward Snowden, a 29-year-old American who works as a contract employee at the National Security Agency, revealed to The Guardian newspaper the existence of secret surveillance programs that gathered Americans’ phone records and other data. The companies did not link their actions to Snowden’s leaks.

Ted Ullyot, Facebook’s general counsel, said in a statement that Facebook is only allowed to talk about total numbers and must give no specifics. But he said the permission it has received is still unprecedented, and the company was lobbying to reveal more.

RELATED: LEGAL SURVEILLANCE, WITH LIMITS

Using the new guidelines, Ullyot said Facebook received between 9,000 and 10,000 government requests from all government entities from local to federal in the last six months of 2012, Facebook received between 9,000 and 10,000 government requests from all government entities from local to federal in the last six months of 2012, on topics including missing children investigations, fugitive tracking and terrorist threats. The requests involved the accounts of between 18,000 and 19,000 Facebook users.

The companies were not allowed to make public how many orders they received from a particular agency or on a particular subject. But the numbers do include all national security related requests including those submitted via national security letters and under the Foreign Intelligence Surveillance Act, or FISA, which companies had not previously been allowed to reveal.

RELATED: NSA LEAKER EDWARD SNOWDEN’S ONLINE LIFE REVEALED

The companies remain barred from revealing whether they’ve actually received FISA requests, and can only say that any they’ve received are included in the total reported figures.

Microsoft released similar numbers for the same period, but downplayed how much they revealed.

RELATED: NSA HACKED INTO HONG KONG COMPUTERS: SNOWDEN

“We continue to believe that what we are permitted to publish continues to fall short of what is needed to help the community understand and debate these issues,” John Frank, Microsoft’s vice president and deputy general counsel said in a statement.

Frank said Microsoft received between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 accounts.

RELATED: SNOWDEN PUT ON NOTICE BY BRITAIN TO BLOCK HIS TRAVEL TO UK

Both attorneys emphasized in their statements that those affected by the orders represent a “tiny fraction” of their huge user bases.

Google did not release its own numbers, saying late Friday that it was waiting to be able to reveal more specific and meaningful information.

“We have always believed that it’s important to differentiate between different types of government requests,” Google said in a statement. “We already publish criminal requests separately from national security letters. Lumping the two categories together would be a step back for users. Our request to the government is clear: to be able to publish aggregate numbers of national security requests, including FISA disclosures, separately.”

Facebook repeated recent assurances that the company scrutinizes every government request, and works aggressively to protect users’ data. Facebook said it has a compliance rate of 79 percent on government requests.

“We frequently reject such requests outright, or require the government to substantially scale down its requests, or simply give the government much less data than it has requested,” Ullyot said.” And we respond only as required by law.”

Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law

Michael Snyder
American Dream
June 11, 2013

Are you on the list? Are you one of the millions of Americans that have been designated a threat to national security by the U.S. government? Will you be subject to detention when martial law is imposed during a major national emergency? As you will see below, there is actually a list that contains the names of at least 8 million Americans known as Main Core that the U.S. intelligence community has been compiling since the 1980s. A recent article on Washington’s Blog quoted a couple of old magazine articles that mentioned this program, and I was intrigued because I didn’t know what it was. So I decided to look into Main Core, and what I found out was absolutely stunning – especially in light of what Edward Snowden has just revealed to the world. It turns out that the U.S. government is not just gathering information on all of us. The truth is that the U.S. government has used this information to create a list of threats to national security that the government would potentially watch, question or even detain during a national crisis. If you have ever been publicly critical of the government, there is a very good chance that you are on that list.

The following is how Wikipedia describes Main Core…

Main Core is the code name of a database maintained since the 1980s by the federal government of the United States. Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database’s name derives from the fact that it contains “copies of the ‘main core’ or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community.”

It was Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core. At the time, the shocking information that he revealed did not get that much attention. That is quite a shame, because it should have sent shockwaves across the nation…

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.

Of course, federal law is somewhat vague as to what might constitute a “national emergency.” Executive orders issued over the last three decades define it as a “natural disaster, military attack, [or] technological or other emergency,” while Department of Defense documents include eventualities like “riots, acts of violence, insurrections, unlawful obstructions or assemblages, [and] disorder prejudicial to public law and order.” According to one news report, even “national opposition to U.S. military invasion abroad” could be a trigger.

So if that list contained 8 million names all the way back in 2008, how big might it be today?

That is a very frightening thing to think about.

Later on in 2008, Tim Shorrock of Salon.com also reported on Main Core…

Dating back to the 1980s and known to government insiders as “Main Core,” the database reportedly collects and stores — without warrants or court orders — the names and detailed data of Americans considered to be threats to national security. According to several former U.S. government officials with extensive knowledge of intelligence operations, Main Core in its current incarnation apparently contains a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies. One former intelligence official described Main Core as “an emergency internal security database system” designed for use by the military in the event of a national catastrophe, a suspension of the Constitution or the imposition of martial law.

So why didn’t this information get more attention at the time?

Well, if Obama had lost the 2008 election it might have. But Obama won in 2008 and the liberal media assumed that he would end many of the abuses that were happening under Bush. Of course that has not happened at all. In fact, Obama has steadily moved the police state agenda ahead aggressively. Edward Snowden has just made that abundantly clear to the entire world.

After 2008, it is unclear exactly what happened to Main Core. Did it expand, change names, merge with other programs or get superseded by a new program? It appears extremely unlikely that it simply faded away. In light of what we have just learned about NSA snooping, someone should ask our politicians some very hard questions about Main Core. According toChristopher Ketchum, the exact kind of NSA snooping that Edward Snowden has just described was being used to feed data into the Main Core database…

A host of publicly disclosed programs, sources say, now supply data to Main Core. Most notable are the NSA domestic surveillance programs, initiated in the wake of 9/11, typically referred to in press reports as “warrantless wiretapping.” In March, a front-page article in the Wall Street Journal shed further light onto the extraordinarily invasive scope of the NSA efforts: According to the Journal, the government can now electronically monitor “huge volumes of records of domestic e-mails and Internet searches, as well as bank transfers, credit card transactions, travel, and telephone records.” Authorities employ “sophisticated software programs” to sift through the data, searching for “suspicious patterns.” In effect, the program is a mass catalog of the private lives of Americans. And it’s notable that the article hints at the possibility of programs like Main Core. “The [NSA] effort also ties into data from an ad-hoc collection of so-called black programs whose existence is undisclosed,” the Journal reported, quoting unnamed officials. “Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach.”

The following information seems to be fair game for collection without a warrant: the e-mail addresses you send to and receive from, and the subject lines of those messages; the phone numbers you dial, the numbers that dial in to your line, and the durations of the calls; the Internet sites you visit and the keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards. All of this information is archived on government supercomputers and, according to sources, also fed into the Main Core database.

This stuff is absolutely chilling.

And there have been hints that such a list still exists today.

For example, the testimony of an anonymous government insider that was recently posted on shtfplan.com alluded to such a list…

“We know all this already,” I stated. He looked at me, giving me a look like I’ve never seen, and actually pushed his finger into my chest. “You don’t know jack,” he said, “this is bigger than you can imagine, bigger than anyone can imagine. This administration is collecting names of sources, whistle blowers and their families, names of media sources and everybody they talk to and have talked to, and they already have a huge list. If you’re not working for MSNBC or CNN, you’re probably on that list. If you are a website owner with a brisk readership and a conservative bent, you’re on that list. It’s a political dissident list, not an enemy threat list,” he stated.

What in the world is happening to America?

What in the world are we turning into?

As I mentioned in a previous article, the NSA gathers 2.1 million gigabytes of data on all of us every single hour. The NSA is currently constructing a 2 billion dollar data center out in Utah to store all of this data.

If you are disturbed by all of this, now is the time to stand up and say something. If this crisis blows over and people forget about all of this stuff again, the Big Brother surveillance grid that is being constructed all around us will just continue to grow and continue to become even more oppressive.

America is dying right in front of your eyes and time is running out. Please stand up and be counted while you still can.

%d bloggers like this: