Beware: You Are Being Monitored

  • 2 Replies

0 Members and 1 Guest are viewing this topic.


Offline the leveller

  • Global Moderator
  • *****
  • 4128
  • +75/-0
Beware: You Are Being Monitored
« on: June 13, 2013, 11:46:31 PM »
Beware: You Are Being Monitored!

Posted: 12 Jun 2013 01:43 PM PDT

Beware: You Are Being Monitored!

By Julio Severo

By far, the biggest scandal this week is the revelation by a former CIA analyst showing how the US intelligence has been monitoring in Facebook, Google, Apple, Microsoft, Skype and other internet channels extensively used by the world population.

Edward Snowden
The man responsible for the most serious denunciations is Edward Snowden, who leaked the data on the US government espionage on the citizens around world. It was the biggest leak in the US history.
If Snowden had revealed his secrets directly to the public, they would have seen him as crazy or an adherent of conspiracy theories. A paranoid thinking today there is some kind of government imagined by George Orwell in his work ?1984.?

Nevertheless, everything that he leaked not was published, because the newspapers that he sought were ?careful? to filter and limit the denunciations, in order not to draw the US government?s wrath.

The excuse for the aggressive surveillance by the US is the war against terror, which should limit itself to the ideology responsible for the 9/11 attack. This attack was motivated exclusively by the Islamic ideology.

But instead of focusing on that ideology, the US government has bowed down before Muslims. It seems to be, since 9/11, obsessed by the Islamic promotion around the world.The terrorist attack 12 years ago was the best thing that has already happened to Islam, which is now spreading as a wildfire.

The war against terror, which should focus on Islamists, has become a terror war for the non-Islamic world.

I understand the reasons for the US government to turn away from the necessary focus. Saudi Arabia, Turkey and other Islamic nations are the origin of significant investments in the western countries, especially America.

While the populations of those countries live mostly in poverty, their leaders accumulate money in western banks, especially in American banks. They are also great shareholders in great American and European companies.

Therefore, Americans and Europeans are always in a hurry to support the fights of their Islamic investors. If Saudi Arabia and Turkey oppose Syria, America will accompany their investors? desires, although this means for America direct support for al-Qaida and the systematic slaughter of Syrian Christians.

America cannot turn against their investors. The money of the oppressors is more important than the blood of the oppressed ones

Most of the terrorists who attacked America on 9/11 were Muslims from Saudi Arabia and, according to information that I received from my friend Don Hank, they had received visas for America through a CIA agent.

CIA, which has been monitoring the whole world, grants visas to terrorists, and does the rest of the world have to pay for its ?negligence??

It is a fact that the current US administration is engaged, since its beginning, in the espionage of pro-life and conservative groups. I have myself been under such surveillance, in a case that became headline on WND, in this link:
Everything that I do is to fight the gay and abortion agenda. And I carry out my ministry in a time when the top US foreign policy priority is to promote the gay, abortion and Islamic agenda.

What would the US government be willing to do on behalf of such politics? I don?t know. But the fact is that when you are using the services of Facebook, Google, Apple and Microsoft, you are not alone. It is now proven that the US intelligence is watching you and recording your stances on abortion, homosexuality and possibly even if you oppose the Islamic ideology.

Could these intrusive records be used against Christians opposed to the world government? God knows.

The tragedy is that people like me and you can be monitored by the US government, but Islamists not. Small wonder: the current White House occupier has a totally Islamic name: Barack Hussein Obama.

True to his ideology, Obama chose a Muslim as a CIA director.

The nation founded by persecuted Christians today serves the biggest persecutors of Christians. Islamists believe that, with Obama in the White House, their prayers were heard.

I believe that our prayers are also being heard. Since the Old Testament times, the people of God pray according God?s will. And the Bible makes clear that it is the will of God to frustrate the plans of the nations: ?The LORD brings the counsel of the nations to nothing; He makes the plans of the peoples of no effect.? (Psalms 33:10 NKJV)

Is it a coincidence that plans of CIA and other US agencies of espionage against innocent citizens around the world are being exposed and frustrated? It is an answer to many prayers. Let us pray for Edward Snowden, for him to have an encounter with Christ.

Let us also pray for God to rise up similar men in Brazil, able to expose for the public the most sinister plans of the Brazilian government.

There is Somebody bigger, above America, watching and monitoring. Somebody that one day will make them give an account for their exemption for the Islamic ideology, and their active intrusive roles in the lives and activities of conservative Christians. Somebody that will make them give an account because instead of using their power to protect the weak and oppressed, they chose to side with their wicked investors, who oppress innocent Christian populations.

There is a minority, a remnant who truly follows Christ, in the US who laments over the wicked direction that their nation has chosen to follow. It is because of these supplications directed to the Almighty God that we see the most secret and impious plans of the most powerful nation in the world being repeatedly frustrated.

We need to join our prayers to the supplications of the American remnant, because the homosexualist, abortion and Islamic politics of the US government are speeding up the establishment of the Antichrist?s world government and putting innocent citizens around the world under the spying eyes of that government.

Portuguese version of this article: Cuidado: Voc? est? sendo monitorado pela na??o mais poderosa do mundo!

Source: Julio Severo in English:

Recommended Reading:

Homeland Security surveillance detected on Julio Severo website

United States: between Gayland and Mohammedland

To follow Julio Severo in Twitter and Facebook: Twitter: Facebook:


the watcher

  • Guest
Re: Beware: You Are Being Monitored-Snowden Update-Part 1
« Reply #1 on: July 14, 2013, 09:34:17 PM »
> Sent: July 13, 2013Subject: [shamireaders] Peter Myers update on Snowden
>> Snowden: NSA taps Internet Backbone. Fisa court a "parallel supreme
>> court" violating US Constitution
>> (1) Snowden: NSA taps Internet Backbone - emails, searches, phone calls,
>> credit cards
>> (2) NSA taps China internet data, universities, phones - Snowden
>> (3) Britain's GCHQ sucks up global data to share with NSA - Snowden
>> (4) Patriot Act & secret Fisa court allow NSA to spy on everyone without
>> a warrant
>> (5) & (6) Fisa court has become a "parallel supreme court", beyond
>> Congress, violating the US Constitution
>> (7) UKUSA Pact's "Five Eyes" surveillance spans US, UK, Canada,
>> Australia, NZ
>> (8) UK 'biggest spy' among the Five Eyes
>> (9) Five Eyes partners swap data, to get around restrictions
>> (10) Intelligence agencies subcontract out surveillance to foreign
>> partners
>> (11) Australia's four surveillance stations - NSA documents published by
>> O Globo (Brazil)
>> (12) DHS is allowed to search laptops, cell phones etc without having to
>> give a reason
>> (13) Your Smart Meter may be Spying On You
>> (14) NSA relies on Israeli encryption software
>> (15) Shady companies with ties to Israel wiretap the U.S. for the NSA -
>> James Bamford
>> (16) Israeli companies Verint and Narus conduct bugging and wiretapping
>> for the NSA
>> (17) Postal Service is in the snooping business too: mail is monitored, &
>> sometimes copied
>> (18) NSA has inserted code into Android OS, with Google compliance
>> (19) NSA key inside Windows: NSA access has been built into Windows from
>> 1995 on
>> (20) NSA wrote the security software for Windows Vista
>> (21) US media ignore Israeli connection to NSA tapping
>> (22) Zionists in on the Plot - Brother Nathanael
>> (1) Snowden: NSA taps Internet Backbone - emails, searches, phone calls,
>> credit cards
>> Ex-CIA techie Edward Snowden: I am the NSA PRISM deepthroat
>> US gov's super-web snoop system whistleblower flees to Hong Kong
>> By Jasper Hamill, 10th June 2013
>> A former CIA technician has broken cover to reveal himself as the mole
>> who leaked information about PRISM - the US government's massive web
>> surveillance programme.
>> Edward Snowden, 29, outed himself as the source of revelations that the
>> National Security Agency (NSA) has tapped up American internet giants for
>> data on foreigners' online activities. He made the claims during
>> interviews with the Guardian.
>> Snowden told the newspaper: "The NSA has built an infrastructure that
>> allows it to intercept almost everything. With this capability, the vast
>> majority of human communications are automatically ingested without
>> targeting. If I wanted to see your emails or your wife's phone, all I
>> have to do is use intercepts. I can get your emails, passwords, phone
>> records, credit cards.
>> "I don't want to live in a society that does these sort of things ? I do
>> not want to live in a world where everything I do and say is recorded.
>> That is not something I am willing to support or live under."
>> The US Foreign Intelligence Surveillance Act forces internet giants, such
>> as Google and Facebook, to share their users' data with government agents
>> and forbids those companies from talking about it. Both aforementioned
>> cloud-powered companies denied over the weekend that they allow US spooks
>> direct access to their systems. It was further alleged over the weekend
>> that the NSA PRISM project shared some of its gathered data with
>> Britain's eavesdropping nerve centre, GCHQ, although the British
>> government denies any suggestion that data was obtained unlawfully.
>> Snowden maintained network security for the CIA and, until he leaked
>> files detailing the NSA programme, was employed by ?strategy and
>> technology consulting? firm Booz Allen Hamilton, which is understood to
>> serve as a contractor for the US National Security Agency (NSA). Snowden
>> is now on the run and hiding out at a hotel in Hong Kong, where he hopes
>> to apply for asylum in Iceland in a bid to avoid the wrath of the
>> American government.
>> "I don't want public attention because I don't want the story to be about
>> me. I want it to be about what the US government is doing," he said.
>> "I really want the focus to be on these documents and the debate which I
>> hope this will trigger among citizens around the globe about what kind of
>> world we want to live in."
>> He added: "My sole motive is to inform the public as to that which is
>> done in their name and that which is done against them."
>> He now fears for his life, warning: "If they want to get you, over time
>> they will."
>> The extent of the NSA's surveillance was revealed last Wednesday, when it
>> emerged that a secret US court issued an order requiring mobile network
>> Verizon to hand over metadata on millions of US citizens' phone calls,
>> although no actual phone recordings were obtained.
>> This was followed by the exposure of PRISM, a scheme which allowed spies
>> to request access to information on non-Americans from the servers of
>> nine of the world's biggest internet companies.
>> Although the companies named in the leaked documents, including
>> Microsoft, Facebook and Google, deny giving NSA agents automatic access
>> to their data, the Guardian reported that PRISM allows spies to intercept
>> email and instant messaging conversations, tap audio and video on Skype
>> calls, and to snoop on various other forms of web-based communication.
>> Such surveillance is entirely possible, with or without the internet
>> giants' help, at the network level by tapping into the US's internet
>> backbone. [...]
>> (2) NSA taps China internet data, universities, phones - Snowden
>> U.S. Hacked China Universities, Mobile Phones, Snowden Tells China Press
>> Kenneth Rapoza, Contributor
>> 6/22/2013 @ 4:11PM
>> HONG KONG - 2013: The United States government hacked into Chinese mobile
>> phone companies to collect text messages and spied on the Tsinghua
>> University, troubled National Security Agency contractor Edward Snowden
>> told South China Morning Post in a series of articles posted on line this
>> Saturday.
>> Tsinghua in Beijing is one of China?s biggest research institutions.
>> Snowden said it was the victim of numerous hacks, including a recent one
>> in January 2013. He did not say what the spy agencies were looking for.
>> Snowden said the information he shared on the Tsinghua University attacks
>> was evidence of NSA hacking because the specific details of external and
>> internal internet protocol addresses could only have been obtained by a
>> foreign security breach, or with physical access to the computers. He
>> said U.S. spy agencies have been watching China and Hong Kong for years.
>> In Beijing, Tsinghua University is home to one of China?s six major
>> backbone networks, the China Education and Research Network (CERNET) from
>> where internet data from millions of Chinese citizens could be mined. The
>> network was the country?s first internet backbone network and has evolved
>> into the world?s largest national research hub. [...]
>> (3) Britain's GCHQ sucks up global data to share with NSA - Snowden
>> Snowden Reveals How GCHQ in Britain Soaks Up Mass Internet Data
>> GCHQ Surveillance: The Power of Britain's Data Vacuum
>> By Christian St?cker
>> Britain's intelligence service stores millions of bits of online data in
>> Internet buffers. In SPIEGEL, Edward Snowden explains GCHQ's "full take"
>> approach. All data that travels through the UK is captured.
>> In an interview published in the latest edition of SPIEGEL, National
>> Security Agency whistleblower Edward Snowden reports on how America's NSA
>> intelligence service works together with Germany's federal intelligence
>> agency, the BND, more intensively than previously known.
>> He also provides an in-depth account of the surveillance operations of
>> the NSA and its British counterpart, the Government Communications
>> Headquarters (GCHQ). Britain's Tempora system is the signal intelligence
>> community's first "full-take Internet buffer," Snowden said in an
>> interview.
>> The scope of this "full take" system is vast. According to the
>> whistleblower and Britain's Guardian newspaper, Tempora stores
>> communications data for up to 30 days and saves the content of those
>> messages for up to three days, in a so-called Internet buffer. "It snarfs
>> everything, in a rolling buffer to allow retroactive investigation
>> without missing a single bit," Snowden said. If you send a single data
>> packet, he further explains, "and it routes through the UK, we get it."
>> Asked if it is possible to get around this total surveillance of all
>> Internet communication, he said: "As a general rule, so long as you have
>> any choice at all, you should never route through or peer with the UK
>> under any circumstances."
>> But is that a realistic scenario? Can one really escape the British data
>> vaccuum cleaner by channelling one's own Internet data parcels through
>> lines that are out of reach of British security authorities?
>> "There is no way that you as an ordinary Internet user can say: I want my
>> data to be routed this or that way," said Philipp Blank of German
>> telecommunications company Deutsche Telekom. Klaus Landedfeld, a board
>> member in charge of infrastructure and networks at the German Internet
>> industry association Eco, agreed. "You've got no influence over that as
>> the end-user." Theoretically, one could try to influence the data flow by
>> changing one's telecommunications provider -- "not every undersea cable
>> runs via Great Britain." But the providers constantly change the cables
>> they send their customers' data through, he added.
>> In addition, many of the most important services for private Internet
>> users are based in the United States. "You can't get around the American
>> companies," said Landefeld. Anyone using Facebook, Google, Microsoft
>> services, Skype, AOL services or Yahoo could be an open book for the NSA
>> thanks to its Prism spying program, should the organization be interested
>> in taking a look. [...]
>> (4) Patriot Act & secret Fisa court allow NSA to spy on everyone without
>> a warrant
>> The top secret rules that allow NSA to use US data without a warrant
>> Fisa court submissions show broad scope of procedures governing NSA's
>> surveillance of Americans' communication
>> Glenn Greenwald and James Ball
>>, Friday 21 June 2013 08.59 AEST
>> Top secret documents submitted to the court that oversees surveillance by
>> US intelligence agencies show the judges have signed off on broad orders
>> which allow the NSA to make use of information "inadvertently" collected
>> from domestic US communications without a warrant.
>> The Guardian is publishing in full two documents submitted to the secret
>> Foreign Intelligence Surveillance Court (known as the Fisa court), signed
>> by Attorney General Eric Holder and stamped 29 July 2009. They detail the
>> procedures the NSA is required to follow to target "non-US persons" under
>> its foreign intelligence powers and what the agency does to minimize data
>> collected on US citizens and residents in the course of that
>> surveillance.
>> The documents show that even under authorities governing the collection
>> of foreign intelligence from foreign targets, US communications can still
>> be collected, retained and used.
>> The procedures cover only part of the NSA's surveillance of domestic US
>> communications. The bulk collection of domestic call records, as first
>> revealed by the Guardian earlier this month, takes place under rolling
>> court orders issued on the basis of a legal interpretation of a different
>> authority, section 215 of the Patriot Act.
>> The Fisa court's oversight role has been referenced many times by Barack
>> Obama and senior intelligence officials as they have sought to reassure
>> the public about surveillance, but the procedures approved by the court
>> have never before been publicly disclosed.
>> The top secret documents published today detail the circumstances in
>> which data collected on US persons under the foreign intelligence
>> authority must be destroyed, extensive steps analysts must take to try to
>> check targets are outside the US, and reveals how US call records are
>> used to help remove US citizens and residents from data collection.
>> However, alongside those provisions, the Fisa court-approved policies
>> allow the NSA to:
>> ? Keep data that could potentially contain details of US persons for up
>> to five years;
>> ? Retain and make use of "inadvertently acquired" domestic communications
>> if they contain usable intelligence, information on criminal activity,
>> threat of harm to people or property, are encrypted, or are believed to
>> contain any information relevant to cybersecurity;
>> ? Preserve "foreign intelligence information" contained within
>> attorney-client communications;
>> ? Access the content of communications gathered from "U.S. based
>> machine" or phone numbers in order to establish if targets are located
>> in the US, for the purposes of ceasing further surveillance.
>> The broad scope of the court orders, and the nature of the procedures set
>> out in the documents, appear to clash with assurances from President
>> Obama and senior intelligence officials that the NSA could not access
>> Americans' call or email information without warrants.
>> The documents also show that discretion as to who is actually targeted
>> under the NSA's foreign surveillance powers lies directly with its own
>> analysts, without recourse to courts or superiors ? though a percentage
>> of targeting decisions are reviewed by internal audit teams on a regular
>> basis. ...
>> Section 702 of the Fisa Amendments Act (FAA), which was renewed for five
>> years last December, is the authority under which the NSA is allowed to
>> collect large-scale data, including foreign communications and also
>> communications between the US and other countries, provided the target is
>> overseas.
>> FAA warrants are issued by the Fisa court for up to 12 months at a time,
>> and authorise the collection of bulk information ? some of which can
>> include communications of US citizens, or people inside the US. To
>> intentionally target either of those groups requires an individual
>> warrant. [...]
>> (5) Fisa court has become a "parallel supreme court", beyond Congress,
>> violating the US Constitution
>> From: "Sadanand, Nanjundiah (Physics Earth Sciences)"
>> <[email protected]> Date: Wed, 10 Jul 2013 13:27:28 -0400
>> Even Le Carr?'s latest fiction can't do justice to Snowden
>> Whistleblower and writer both finger the enemy as their own side. But the
>> full horror of truth always outdoes the imagination
>> Simon Jenkins
>> The Guardian, Wednesday 10 July 2013 06.00 AEST
>> Shocked, or not shocked? The chasm widens. The New York Times this week
>> carried a story from a whistleblower close to Washington's foreign
>> intelligence surveillance court, known as the Fisa court ? a secret body
>> set up in 1978 to monitor federal phone taps. It now gives legal cover to
>> intelligence trawling of millions of individuals, at home and abroad.
>> The recent revelations by another whistleblower, Edward Snowden, accused
>> the court of breaking the fourth amendment to the US constitution. This
>> entitles Americans "to be secure in their persons, houses, papers and
>> effects, against unreasonable searches and seizures". The operative word,
>> as so often, is unreasonable.
>> The new leak alleges that more than a dozen new "rulings" have been
>> passed by Fisa, declaring categories of data-scooping that were within
>> the "special needs" of security, and thus no different from
>> breath-testing or body-searching at airports. NSA operations such as
>> Prism, Tempora and Boundless Informant ? many in collusion with Britain's
>> GCHQ ? used covert access to Google, Apple and Facebook to go where they
>> pleased. They could cite not just terrorism but espionage, matters of
>> interest to a foreign power, cyber-attacks and "weapons of mass
>> destruction".
>> These judgments, all in secret, confirmed the gist of Snowden's
>> evidence ? and validated his motive. The reason why a previously loyal
>> ex-soldier broke cover was not to aid an enemy. It was to inform a
>> friend, his own country. He was simply outraged by the lies told to
>> Congress by his bosses about NSA operations. As Harvard's Stephen Walt
>> said, Snowden was performing a public service in drawing attention to a
>> "poorly supervised and probably unconstitutional" activity.
>> The New York Times pointed out that the Fisa court had become a "parallel
>> supreme court". It catered to a mirror universe beyond the reach of
>> Congress or normal courts, servicing a new and burgeoning realm of
>> government and private securocrats. When asked about this world, NSA
>> bosses merely said they could not "jeopardise American security".
>> (6) Fisa court has become a "parallel supreme court", beyond Congress,
>> violating the US Constitution
>> In Secret, Court Vastly Broadens Powers of N.S.A.
>> Published: July 6, 2013
>> WASHINGTON ? In more than a dozen classified rulings, the nation?s
>> surveillance court has created a secret body of law giving the National
>> Security Agency the power to amass vast collections of data on Americans
>> while pursuing not only terrorism suspects, but also people possibly
>> involved in nuclear proliferation, espionage and cyberattacks, officials
>> say.
>> The rulings, some nearly 100 pages long, reveal that the court has taken
>> on a much more expansive role by regularly assessing broad constitutional
>> questions and establishing important judicial precedents, with almost no
>> public scrutiny, according to current and former officials familiar with
>> the court?s classified decisions.
>> The 11-member Foreign Intelligence Surveillance Court, known as the FISA
>> court, was once mostly focused on approving case-by-case wiretapping
>> orders. But since major changes in legislation and greater judicial
>> oversight of intelligence operations were instituted six years ago, it
>> has quietly become almost a parallel Supreme Court, serving as the
>> ultimate arbiter on surveillance issues and delivering opinions that will
>> most likely shape intelligence practices for years to come, the officials
>> said.
>> Last month, a former National Security Agency contractor, Edward J.
>> Snowden, leaked a classified order from the FISA court, which authorized
>> the collection of all phone-tracing data from Verizon business customers.
>> But the court?s still-secret decisions go far beyond any single
>> surveillance order, the officials said.
>> ?We?ve seen a growing body of law from the court,? a former intelligence
>> official said. ?What you have is a common law that develops where the
>> court is issuing orders involving particular types of surveillance,
>> particular types of targets.?
>> In one of the court?s most important decisions, the judges have expanded
>> the use in terrorism cases of a legal principle known as the ?special
>> needs? doctrine and carved out an exception to the Fourth Amendment?s
>> requirement of a warrant for searches and seizures, the officials said.
>> [...]
>> (7) UKUSA Pact's "Five Eyes" surveillance spans US, UK, Canada,
>> Australia, NZ
>> AUSCANNZUKUS is a naval Command, Control, Communications and Computers
>> (C4) interoperability organization involving the Anglosphere nations of
>> Australia, Canada, New Zealand, the United Kingdom, and the United
>> States. The acronym is also used as security caveat in the UKUSA
>> Community, where it is also known as "Five Eyes". ...
>> This page was last modified on 15 June 2013 at 06:56. ==
>> UKUSA Agreement
>> The United Kingdom ? United States of America Agreement (UKUSA, is a
>> multilateral agreement for cooperation in signals intelligence among the
>> United Kingdom, the United States, Canada, Australia, and New Zealand.
>> The alliance of intelligence operations is also known as Five Eyes. It
>> was first signed in March 1946 by the United Kingdom and the United
>> States and later extended to encompass the three Commonwealth realms of
>> Canada, Australia and New Zealand. The UKUSA Agreement was a follow-up of
>> the 1943 BRUSA Agreement, the World War II agreement on cooperation over
>> intelligence matters.[3] This was a secret treaty, allegedly so secret
>> that it was kept secret from the Australian Prime Ministers until 1973.
>> [...] The UKUSA alliance is often associated with the ECHELON system;
>> however, processed intelligence is reliant on multiple sources of
>> information and the intelligence shared is not restricted to signals
>> intelligence. ...
>> This page was last modified on 8 July 2013 at 18:21.
>> (8) UK 'biggest spy' among the Five Eyes
>> AP June 22, 2013 5:18AM
>> Documents reveal that UK spying operations may be even more extensive
>> than in the US.
>> BRITISH spies are running an online eavesdropping operation bigger than
>> any member of the espionage alliance 'the Five Eyes'.
>> The Guardian cited British intelligence memos leaked by former National
>> Security Agency contractor Edward Snowden to claim that UK spies were
>> tapping into the world's network of fibre optic cables to deliver the
>> "biggest internet access" of any member of the Five Eyes - the name given
>> to the espionage alliance composed of the United States, Britain, Canada,
>> Australia, and New Zealand.
>> That access could in theory expose a huge chunk of the world's everyday
>> communications - including the content of people's emails, calls, and
>> more - to scrutiny from British spies and their American allies. ...
>> The paper quoted Mr Snowden, the leaker, as saying that the surveillance
>> was "not just a US problem. The UK has a huge dog in this fight ... They
>> (GCHQ) are worse than the US"
>> (9) Five Eyes partners swap data, to get around restrictions
>> Is 'The Five Eyes Alliance' Conspiring to Spy on You?
>> The dire threat of surveillance agencies working together to keep an eye
>> on one another's citizens
>> JUN 25 2013, 7:45 AM ET
>> Did you know that the United States, Canada, Britain, Australia, and New
>> Zealand participate together in an electronic eavesdropping cooperative
>> called "The Five Eyes Alliance"? Or that Britain "has secretly gained
>> access to the network of cables which carry the world's phone calls and
>> internet traffic and has started to process vast streams of sensitive
>> personal information which it is sharing with its American partner, the
>> National Security Agency"? That's big news, right! ...
>> Say you're the NSA. By law, there are certain sorts of spying you're not
>> lawfully allowed to do on Americans. (And agency rules constraining you
>> too.) But wait. Allied countries have different laws and surveillance
>> rules. If there are times when America's spy agency has an easier time
>> spying on Brits, and times when Britain's spying agency has an easier
>> time spying on Americans, it's easy to see where the incentives lead. Put
>> bluntly, intelligence agencies have an incentive to make themselves
>> complicit in foreign governments spying on their own citizens. ...
>> (10) Intelligence agencies subcontract out surveillance to foreign
>> partners
>> NSA leaks: US and Britain team up on mass surveillance
>> Latest revelations from Edward Snowden show that the state risks crossing
>> ever more ethical and legal boundaries
>> Peter Beaumont
>> The Observer, Sunday 23 June 2013 04.44 AEST
>> Twelve years ago, in an almost forgotten report, the European parliament
>> completed its investigations into a long-suspected western intelligence
>> partnership dedicated to global signals interception on a vast scale.
>> Evidence had been taken from spies and politicians, telecommunications
>> experts and journalists. In stark terms the report detailed a decades-old
>> arrangement which had seen the US and the UK at first ? later joined by
>> Canada, New Zealand and Australia to make up the the so-called "Five
>> Eyes" ? collaborating to access satellites, transatlantic fibre-optic
>> cables and radio signals on a vast scale.
>> This secretive (and consistently denied) co-operation was itself the
>> product of a mutual agreement stretching back to the first world war,
>> expanded in the second, and finally ratified in 1948 in the so-called
>> UKUSA agreement.
>> The problem for the authors of the Brussels report was that it had based
>> its analysis on scattered clues and inferences. "It is only natural," its
>> authors asserted ruefully, "that secret services do not disclose details
>> of their work ? The existence of such a system thus needs to be proved by
>> gathering as many clues as possible, thereby building up a convincing
>> body of evidence."
>> Despite the limitations of such detective work, the parliamentarians came
>> to a deeply troubling conclusion: the "Five Eyes" were accessing the
>> fibre-optic cables running under the Atlantic.
>> Not only that, the report concluded tentatively, but it was the UK
>> specifically among the five partners ? and GCHQ in particular ? which it
>> suspected had been given primary responsibility for intercepting that
>> traffic.
>> "The practical implication," the report surmised, "is that communications
>> can be intercepted at acceptable cost only at the terminals of the
>> underwater cables which land on their territory.
>> "Essentially they can only tap incoming or outgoing cable communications.
>> In other words, their access to cable communications in Europe is
>> restricted to the territory of the United Kingdom."
>> That GCHQ was at the very heart of secret efforts to tap into the
>> internet and cable-carried telephony was finally confirmed in the most
>> dramatic terms on Friday by the latest batch of documents to be leaked by
>> former US National Security Agency contractor Edward Snowden, who is now
>> being sought by the US government for alleged theft and breaches of the
>> Espionage Act.
>> Those documents, published by the Guardian, not only describe the UK's
>> lead role in tapping the cables carrying global internet traffic ?
>> enjoying the "biggest internet access" of the Five Eyes ? but its efforts
>> to suck up ever-larger amounts of global data to share with its partners,
>> and principally with the US. ...
>> Like Chakrabarti, Bailin suspects that intelligence agencies are
>> subcontracting out surveillance to foreign partners. "The reality is that
>> Ripa is incredibly complex and full of legal loopholes that permit this
>> kind of thing. The real question is whether the act is actually fit for
>> purpose when you are dealing with interception like this."
>> The European parliament's thesis has been confirmed by the Guardian's
>> revelations. Now the legal and ethical scrutiny can begin in earnest.
>> (11) Australia's four surveillance stations - NSA documents published by
>> O Globo (Brazil)
>> Snowden reveals Australia's link to US surveillance program
>> By Valerie Benguiat
>> Jul 9, 2013
>> American whistle-blower Edward Snowden has disclosed information on
>> Australia's' involvement with the US NSA intelligence and surveillance
>> program.
>> The collection program, codenamed X-Keyscore, reportedly "processes all
>> signals before they are shunted off to various "'production lines' that
>> deal with specific issues", according to the University of Pennsylvania
>> Law School.
>> UPenn adds that X-Keyscore is part of the NSA RAGTIME, a domestic
>> counter-terrorism information collection operation, to which 50 companies
>> provide data to.
>> According to The Sydney Morning Herald, Snowden released documents that
>> identified four facilities in Australia that are part of the US National
>> Security Agency surveillance program.
>> The documents were published by the Brazilian newspaper O Globo, and
>> point to four joint Australian-US facilities that are allegedly
>> supporting the US NSA programs: Pine Gap, the Australian Defense
>> Satellite Communications station, the Shoal Bay Receiving Station, and
>> the naval communications station HMAS Harman.
>> According to The Canberra Times, the communication station HMAS Harman
>> has been labeled as "the new black vault," and is one of the few visible
>> manifestations of Australia's deep involvement in mass surveillance and
>> intelligence collection operations such as the US National Security
>> Agency's PRISM program.
>> The news portal reported that Australian officers admitted to giving
>> information to the US as an act of reciprocity for the intelligence that
>> the US shares with Australia. Some of the information that Australia
>> admits to receiving relates to North Korea's military threats, Australian
>> citizens fighting in Syria, and missile acquisition attempts by Iran.
>> Australia, US, Canada, New Zealand and the UK form part of the
>> intelligence group informally known as the "five eyes." According to The
>> Guardian, the objective of the five eyes is to allow governments to
>> gather and share information on each others' citizens, circumventing "the
>> prohibition against gathering data on their own citizens."
>> The Australian Department of Defense Intelligence and Security published
>> in its website that the country "benefits immeasurably from the Defense
>> Signals Directorate?s partnership" with Canada, the UK, New Zealand and
>> the US. ...
>> (12) DHS is allowed to search laptops, cell phones etc without having to
>> give a reason
>> DHS defends suspicionless searches of laptops and cell phones
>> June 06, 2013 17:42
>> Reuters / Hyungwon Kang
>> The United States government doesn?t need a reason to seize and search
>> the cell phones, laptops and other electronic devices of Americans
>> entering the country, according to a Department of Homeland Security
>> document provided to the press this week.
>> The DHS has long insisted that border agents and immigration officers are
>> allowed to collect the electronics of US citizens crossing into the
>> country without reason or cause, but a December 2011 document made public
>> this week once and for all shines a light on a sparsely discussed
>> security-measure that has attracted the attention of privacy advocates
>> and others who?ve equated the practice as a constitutional violation. ...
>> Now with the full 23-page paper in their possession ? albeit a version
>> that?s seen a fair share of redactions ? the AP and ACLU have published
>> the document in order to expose a post-9/11 policy that has remained
>> intact under President Barack Obama, but to little discussion. ...
>> (13) Your Smart Meter may be Spying On You
>> Is Your Smart Meter Spying On You?
>> Posted on June 25, 2013 by WashingtonsBlog
>> [...] NBC News reports:
>> Researchers examining the privacy implications of smart-meter technology
>> found that one German provider?s devices contained vulnerabilities that
>> allowed them to snoop on unencrypted data to determine whether or not the
>> homeowners were home.
>> After signing up with the German smart-meter firm Discovergy, the
>> researchers detected that the company?s devices transmitted unencrypted
>> data from the home devices back to the company?s servers over an insecure
>> link. The researchers, Dario Carluccio and Stephan Brinkhaus, intercepted
>> the supposedly confidential and sensitive information, and, based on the
>> fingerprint of power usage, were able to tell not only whether or not the
>> homeowners were home, away or even sleeping, but also what movie they
>> were watching on TV.
>> Network World points out:
>> At the last Chaos Communication Congress in Germany, researchers
>> presented ?Smart Hacking For Privacy? and demonstrated that detailed
>> smart meter data can show what TV shows you watch, scan for
>> copyright-protected DVD movies you watch, and other privacy intrusive
>> details.
>> Network World also notes:
>> Smart meters provide highly detailed energy-use data. The info can be
>> used by police to find and to bust indoor pot farms, by insurance
>> companies to determine health care premiums, and by criminals to
>> determine if you own high-dollar appliances and when is the best time to
>> steal them. And that?s only the tip of the potential privacy invasion
>> iceberg. ***
>> In central Ohio, police file at least 60 subpoenas each month for
>> energy-use records of people suspected in indoor marijuana growing
>> operations, reported the Columbus Dispatch. Most of the houses with
>> indoor pot growing operations are reportedly in quiet neighborhoods
>> without much traffic. DEA agent Anthony Marotta said the subpoena is only
>> one tool used to catch ?grow house? operators. Police get a tip about
>> suspicious activity, but if undercover officers don?t discover anything
>> illegal during a stake out, then utility consumption records can be
>> sought. ?How else can I get an indicator to get probable cause if I can?t
>> see anything?? Marotta said to reporter Dean Narciso. *** [...]
>> Lockheed Martin general manager of Energy and Cyber Services said the
>> smart grid could include as many as 440 million new hackable points by
>> the end of 2015, reported Computerworld.
>> The New York Times writes:
>> [...] With data from thousands or millions of smart meters, researchers
>> could design tools to measure how many times a day a refrigerator door
>> was opened, relevant to dietary and obesity research, or sleep patterns,
>> relevant to a wide range of health research, he wrote.
>> National Geographic notes:
>> ?It?s not hard to imagine a divorce lawyer subpoenaing this information,
>> an insurance company interpreting the data in a way that allows it to
>> penalize customers, or criminals intercepting the information to plan a
>> burglary,? the private nonprofit Electronic Frontier Foundation noted in
>> a blog post about smart meters. ***
>> The European Union?s data protection watchdog warned earlier this year
>> that smart meters, while bringing significant potential benefits, also
>> could be used track whether families ?are away on holiday or at work, if
>> someone uses a specific medical device or a baby-monitor, how they like
>> to spend their free time and so on.? The European Data Protection
>> Supervisor urged that member states provide the public with more
>> information on how the data is being handled. [...]
>> Note: Several utilities ? including Pacific Gas & Electric ? allow you to
>> opt out of the smart meter program. If you insist, they will remove the
>> smart meter from your home.
>> (14) NSA relies on Israeli encryption software
>> Date: Mon, 10 Jun 2013 05:21:54 +0900 From: chris lancenet
>> <[email protected]>
>> The most critical computer and communication networks used by the U.S.
>> government and military are secured by encryption software written by an
>> Israeli "code breaker" tied to an Israeli state-run scientific
>> institution.
>> The National Security Agency (NSA), the U.S. intelligence agency with the
>> mandate to protect government and military computer networks and provide
>> secure communications for all branches of the U.S. government uses
>> security software written by an Israeli code breaker whose home office is
>> located at the Weizmann Institute in Israel.
>> A Bedford, Massachusetts-based company called RSA Security, Inc. issued a
>> press release on March 28, 2006, which revealed that the NSA would be
>> using its security software:
>> "U.S. Department of Defense Agency Selects RSA Security Encryption
>> Software" was the headline of the company's press release which announced
>> that the National Security Agency had selected its encryption software to
>> be used in the agency's "classified communications project."
>> RSA stands for the names of the founders of the company: Ronald L.
>> Rivest, Adi Shamir, and Leonard M. Adleman. Adi Shamir, the lead
>> theoretician, is an Israeli citizen and a professor at the Weizmann
>> Institute, a scientific institution tied to the Israeli defense
>> establishment.
>> "My main area of research is cryptography - making and breaking codes,"
>> Shamir's webpage at the Weizmann Institute says. "It is motivated by the
>> explosive growth of computer networks and wireless communication. Without
>> cryptographic protection, confidential information can be exposed to
>> eavesdroppers, modified by hackers, or forged by criminals."
>> The NSA/Central Security Service defines itself as America's cryptologic
>> organization, which "coordinates, directs, and performs highly
>> specialized activities to protect U.S. government information systems and
>> produce foreign signals intelligence information."
>> The fact that the federal intelligence agency responsible for protecting
>> the most critical computer systems and communications networks used by
>> all branches of the U.S. government and military is using Israeli-made
>> encryption software should come as no surprise. The RSA press release is
>> just the icing on the cake; the keys to the most critical computer
>> networks in the United States have long been held in Israeli hands.
>> AFP inquired with the NSA about its use of Israeli-made security software
>> for classified communications projects and asked why such outsourcing was
>> not seen as a national security threat. Why is "America's cryptologic
>> organization" using Israeli encryption codes?
>> NSA spokesman Ken White said that the agency is "researching" the matter
>> and would respond in the coming week.
>> American Free Press has previously revealed that scores of "security
>> software" companies - spawned and funded by the Mossad, the Israeli
>> military intelligence agency - have proliferated in the United States.
>> The "security" software products of many of these usually short-lived
>> Israeli-run companies have been integrated into the computer products
>> which are provided to the U.S. government by leading suppliers such as
>> Unisys.
>> Unisys integrated Israeli security software, provided by the Israel-based
>> Check Point Software Technologies and Eurekify, into its own software, so
>> that Israeli software, written by Mossad-linked companies, now "secures"
>> the most sensitive computers in the U.S. government and commercial
>> sector.
>> The Mossad-spawned computer security firms typically have a main office
>> based in the U.S. while their research and development is done in Israel.
>> The Mossad start-up firms usually have short lives before they are
>> acquired for exaggerated sums of money by a larger company, enriching
>> their Israeli owners in the process and integrating the Israeli directors
>> and their Mossad-produced software into the parent company.
>> RSA, for example, an older security software company, acquired an
>> Israeli-run security software company, named Cyota, at the end of 2005
>> for $145 million.
>> In January 2005, Cyota, "the leading provider of online security and
>> anti-fraud solutions for financial institutions" had announced that
>> "security expert" Amit Yoran, had joined the company's board of
>> directors. Prior to becoming a director at Cyota, Yoran, a 34-year old
>> Israeli, had already been the national "Cyber Czar," having served as
>> director of the Department of Homeland Security's National Cyber Security
>> Division.
>> Yoran had been appointed "Cyber Czar" at age 32 by President George W.
>> Bush in September 2003.
>> Before joining DHS, Yoran had been vice president for worldwide managed
>> security services at Symantec. Prior to that, he had been the founder,
>> president and CEO of Riptech, Inc., an information security management
>> and monitoring firm, which Symantec acquired in 2002 for $145 million.
>> Yoran and his brother Naftali Elad Yoran are graduates of the U.S.
>> Military Academy at Westpoint. Elad graduated in 1991 and Amit in 1993.
>> Along with their brother Dov, the Yoran brothers are key players in the
>> security software market. Amit has also held critical positions in the
>> U.S. government overseeing computer security for the very systems that
>> apparently failed on 9/11.
>> Before founding Riptech in 1998, Yoran directed the
>> vulnerability-assessment program within the computer emergency response
>> team at the US Department of Defense. Yoran previously served as an
>> officer in the United States Air Force as the Director of Vulnerability
>> Programs for the Department of Defense's Computer Emergency Response Team
>> and in support of the Assistant Secretary of Defense's Office.
>> In June 2005, Yoran joined the board of directors of Guardium, Inc.,
>> another Mossad-spawned "provider of database security solutions" based in
>> Waltham, Massachusetts.
>> Guardium is linked with Ptech, an apparent Mossad "cut out" computer
>> security company linked with the 9/11 attacks.
>> Ptech, a computer software company in Quincy, Mass., was supposedly a
>> small start-up company founded by a Lebanese Muslim and funded by a Saudi
>> millionaire. Yet Ptech's clients included all the key federal
>> governmental agencies, including the U.S. Army, the U.S. Air Force, the
>> U.S. Naval Air Command, Congress, the Department of Energy, the Federal
>> Aviation Administration, the Internal Revenue Service, NATO, the Federal
>> Bureau of Investigation, the Secret Service and even the White House.
>> The marketing manager at Ptech, Inc. when the company started in the
>> mid-1990s, however, was not a Muslim or an Arab, but an American Jewish
>> lawyer named Michael S. Goff who had suddenly quit his law firm for no
>> apparent reason and joined the Arab-run start-up company.
>> Goff was the company's information systems manager and had
>> single-handedly managed the company's marketing and "all procurement" of
>> software, systems and peripherals. He also trained the employees. Goff
>> was obviously the key person at Ptech.
>> In the wake of 9/11, during the Citizens' Commission hearings in New
>> York, Indira Singh, a consultant who had worked on a Defense Advanced
>> Research Project, pointed to Ptech and MITRE Corp. being involved in
>> computer "interoperability issues" between the FAA and NORAD. At this
>> time Ptech's ties to Arabs was the focus, and Goff was out of the
>> picture.
>> "Ptech was with MITRE Corporation in the basement of the FAA for two
>> years prior to 9/11," Singh said. "Their specific job is to look at
>> interoperability issues the FAA had with NORAD and the Air Force in the
>> case of an emergency. If anyone was in a position to know that the FAA -
>> that there was a window of opportunity or to insert software or to change
>> anything - it would have been Ptech along with MITRE."
>> The Mossad-run Guardium company is linked with Ptech through Goff
>> Communications, the Holliston, Mass.-based public relations firm
>> previously run by Michael S. Goff and his wife Marcia, which represents
>> Guardium. Since being exposed in AFP in 2005, however, Michael's name no
>> longer appears on the company website.
>> Photo: Amit Yoran, the Israeli "Cyber Security Czar" appointed by
>> President George W. Bush in 2003. Yoran has held various positions since
>> the 1990s in which he oversaw computer security for the Dept. of Defense
>> computers.
>> Although he and his brother reportedly grew up in Pound Ridge, New York
>> during the 1970s and 1980s, the heads of the Jewish community told AFP
>> that they had never heard of him. One said that she had conducted a
>> survey of the Jews living in the small village of Pound Ridge in the
>> 1970s and she would have remembered if a wealthy Israeli family named
>> Yoran had been found.
>> Why did the locals in Pound Ridge NOT remember the Yorans?
>> Probably because they were NOT in Pound Ridge - but in Israel. The Pound
>> Ridge address was used to give the appearance that the Yorans were
>> Americans. I spoke with Elad and he has a distinctive Israeli accent -
>> not what you would expect for a guy who grew up in a posh Yankee village.
>> So, who are the Yorans? Who are their parents and why did they come to
>> the United States? To raise a couple high-level moles to infiltrate the
>> most sensitive U.S. computer networks? How could they have lived for 20
>> years in Pound Ridge and NOT be remembered.
>> (15) Shady companies with ties to Israel wiretap the U.S. for the NSA -
>> James Bamford
>> Date: Mon, 10 Jun 2013 05:21:54 +0900 From: chris lancenet
>> <[email protected]>
>> Shady Companies With Ties to Israel Wiretap the U.S. for the NSA
>> By James Bamford
>> 04.03.126:30 AM
>> Army General Keith Alexander, the director of the NSA, is having a busy
>> year ? hopping around the country, cutting ribbons at secret bases and
>> bringing to life the agency?s greatly expanded eavesdropping network.
>> In January he dedicated the new $358 million CAPT Joseph J. Rochefort
>> Building at NSA Hawaii, and in March he unveiled the 604,000-square-foot
>> John Whitelaw Building at NSA Georgia.
>> Designed to house about 4,000 earphone-clad intercept operators, analysts
>> and other specialists, many of them employed by private contractors, it
>> will have a 2,800-square-foot fitness center open 24/7, 47 conference
>> rooms and VTCs, and ?22 caves,? according to an NSA brochure from the
>> event. No television news cameras were allowed within two miles of the
>> ceremony.
>> Overseas, Menwith Hill, the NSA?s giant satellite listening post in
>> Yorkshire, England that sports 33 giant dome-covered eavesdropping
>> dishes, is also undergoing a multi-million-dollar expansion, with $68
>> million alone being spent on a generator plant to provide power for new
>> supercomputers. And the number of people employed on the base, many of
>> them employees of Lockheed Martin and Northrop Grumman, is due to
>> increase from 1,800 to 2,500 in 2015, according to a study done in
>> Britain. Closer to home, in May, Fort Meade will close its 27-hole golf
>> course to make room for a massive $2 billion, 1.8-million-square-foot
>> expansion of the NSA?s headquarters, including a cybercommand complex and
>> a new supercomputer center expected to cost nearly $1 billion.
>> The climax, however, will be the opening next year of the NSA?s mammoth
>> 1-million-square-foot, $2 billion Utah Data Center. The centerpiece in
>> the agency?s decade-long building boom, it will be the ?cloud? where the
>> trillions of millions of intercepted phone calls, e-mails, and data
>> trails will reside, to be scrutinized by distant analysts over highly
>> encrypted fiber-optic links.
>> Despite the post-9/11 warrantless wiretapping of Americans, the NSA says
>> that citizens should trust it not to abuse its growing power and that it
>> takes the Constitution and the nation?s privacy laws seriously.
>> But one of the agency?s biggest secrets is just how careless it is with
>> that ocean of very private and very personal communications, much of it
>> to and from Americans. Increasingly, obscure and questionable
>> contractors ? not government employees ? install the taps, run the agency?s
>> eavesdropping infrastructure, and do the listening and analysis. [...]
>> (16) Israeli companies Verint and Narus conduct bugging and wiretapping
>> for the NSA
>> From: "Sadanand, Nanjundiah (Physics Earth Sciences)"
>> <[email protected]> Date: Tue, 11 Jun 2013 09:34:05 -0400 Subject:
>> Israeli connections to NSA
>> Haaretz, 8 June 2013.
>> What was the Israeli involvement in collecting U.S. communications intel
>> for NSA?
>> Were Israeli companies Verint and Narus the ones that collected
>> information from the U.S. communications network for the National
>> Security Agency?
>> What was the Israeli involvement in collecting U.S. communications intel
>> for NSA?
>> Israeli high-tech firms Verint and Narus have had connections with U.S.
>> companies and Israeli intelligence in the past, and ties between the
>> countries' intelligence agencies remain strong.
>> By TheMarker, Haaretz, The Associated Press and Reuters | Jun.08, 2013 |
>> 12:41 PM | 18
>> The question arises amid controversy over revelations that the NSA has
>> been collecting the phone records of hundreds of millions of Americans
>> every day, creating a database through which it can learn whether terror
>> suspects have been in contact with people in the United States. It also
>> was disclosed this week that the NSA has been gathering all Internet
>> usage - audio, video, photographs, emails and searches - from nine major
>> U.S. Internet providers, including Microsoft and Google, in hopes of
>> detecting suspicious behavior that begins overseas.
>> According to an article in the

« Last Edit: July 14, 2013, 09:49:26 PM by the watcher »


the watcher

  • Guest
Re: Beware: You Are Being Monitored-Snowden Update-Part 2
« Reply #2 on: July 14, 2013, 09:47:37 PM »
According to an article in the American technology magazine "Wired" from
>> April 2012, two Israeli companies ? which the magazine describes as
>> having close connections to the Israeli security community ? conduct
>> bugging and wiretapping for the NSA
>> <>.
>> Verint, which took over its parent company Comverse Technology earlier
>> this year, is responsible for tapping the communication lines of the
>> American telephone giant Verizon, according to a past Verizon employee
>> sited by James Bamford in Wired. Neither Verint nor Verizon commented on
>> the matter.
>> Natus, which was acquired in 2010 by the American company Boeing,
>> supplied the software and hardware used at AT&T wiretapping rooms,
>> according to whistleblower Mark Klein, who revealed the information in
>> 2004. Klein, a past technician at AT&T who filed a suit against the
>> company for spying on its customers, revealed a "secret room" in the
>> company's San Fransisco office, where the NSA collected data on American
>> citizens' telephone calls and Internet surfing.
>> <>
>> Klein's claims were reinforced by former NSA employee Thomas Drake who
>> <> testified that
>> the agency uses a program produced by Narus to save the personal
>> electrical communications of AT&T customers. [also see:
>> for interview with Mark Klein]
>> Both Verint and Narus have ties to the Israeli intelligence agency and
>> the Israel Defense Forces intelligence-gathering unit 8200. Hanan Gefen,
>> a former commander of the 8200 unit,
>> <>
>> told Forbes magazine in 2007 that Comverse's technology, which was
>> formerly the parent company of Verint and merged with it this year, was
>> directly influenced by the technology of 8200. Ori Cohen, one of the
>> founders of Narus,
>> <>
>> told Fortune magazine in 2001 that his partners had done technology work
>> for the Israeli intelligence. [...]
>> (17) Postal Service is in the snooping business too: mail is monitored, &
>> sometimes copied
>> Date: Thu, 4 Jul 2013 11:09:29 -0700 (PDT) From: Archer Frey
>> <[email protected]>
>> Subject: Postal Service also in snooping business
>> Dear Friends of Liberty,
>> Happy Fourth of July.
>> Isn't it nice to find out that the government of limited delegated powers
>> is recoding your every piece of mail? And, that some (in most cases)
>> lawyer cum politician now appointed Federal judge says that it is OK to
>> do so. These are the self same judges that gain their living out of the
>> proceeds of the IRS. Al Capon of recent fame can tell you a lot about
>> taxes.
>> Also Mr. Bush says its OK in an emergency. Problem is in the California
>> government almost every piece of legislation purports to have an
>> emergency component.
>> How many surveillance data bases are you on? See
>> for an exhasting description.
>> Oh well, enjoy the fire works,
>> Archer
>> U.S. Postal Service Logging All Mail for Law Enforcement
>> Brendan Bannon for The New York Times
>> Leslie James Pickering, the owner of a bookstore in Buffalo, was targeted
>> by a tracking program from the United States Postal Service.
>> Published: July 3, 2013
>> WASHINGTON ? Leslie James Pickering noticed something odd in his mail
>> last September: a handwritten card, apparently delivered by mistake, with
>> instructions for postal workers to pay special attention to the letters
>> and packages sent to his home.
>> ?Show all mail to supv? ? supervisor ? ?for copying prior to going out on
>> the street,? read the card. It included Mr. Pickering?s name, address and
>> the type of mail that needed to be monitored. The word ?confidential? was
>> highlighted in green.
>> ?It was a bit of a shock to see it,? said Mr. Pickering, who with his
>> wife owns a small bookstore in Buffalo. More than a decade ago, he was a
>> spokesman for the Earth Liberation Front, a radical environmental group
>> labeled eco-terrorists by the Federal Bureau of Investigation. Postal
>> officials subsequently confirmed they were indeed tracking Mr. Pickering?s
>> mail but told him nothing else.
>> As the world focuses on the high-tech spying of the National Security
>> Agency, the misplaced card offers a rare glimpse inside the seemingly
>> low-tech but prevalent snooping of the United States Postal Service.
>> Mr. Pickering was targeted by a longtime surveillance system called mail
>> covers, a forerunner of a vastly more expansive effort, the Mail
>> Isolation Control and Tracking program, in which Postal Service computers
>> photograph the exterior of every piece of paper mail that is processed in
>> the United States ? about 160 billion pieces last year. It is not known
>> how long the government saves the images.
>> Together, the two programs show that postal mail is subject to the same
>> kind of scrutiny that the National Security Agency has given to telephone
>> calls and e-mail. [...]
>> This article has been revised to reflect the following correction:
>> Correction: July 3, 2013
>> An earlier version of this article misstated the Justice Department
>> position once held by Mark Rasch. He started a computer crimes unit in
>> the criminal division?s fraud section, but he was not the head of its
>> computer crimes unit, which was created after his departure.
>> (18) NSA has inserted code into Android OS, with Google compliance
>> The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All
>> Smartphones
>> Submitted by Tyler Durden on 07/09/2013 20:34 -0400
>> Over a decade ago, it was discovered that the NSA embedded backdoor
>> access into Windows 95, and likely into virtually all other subsequent
>> internet connected, desktop-based operating systems. However, with the
>> passage of time, more and more people went "mobile", and as a result the
>> NSA had to adapt. And adapt they have: as Bloomberg reports, "The NSA is
>> quietly writing code for Google?s Android OS."
>> Is it ironic that the same "don't be evil" Google which went to such
>> great lengths in the aftermath of the Snowden scandal to wash its hands
>> of snooping on its customers and even filed a request with the secretive
>> FISA court asking permission to disclose more information about the
>> government?s data requests, is embedding NSA code into its mobile
>> operating system, which according to IDC runs on three-quarters of all
>> smartphones shipped in the first quarter? Yes, yes it is.
>> Google spokeswoman Gina Scigliano confirms that the company has already
>> inserted some of the NSA?s programming in Android OS. "All Android code
>> and contributors are publicly available for review at
>>" Scigliano says, declining to comment further.
>> From Bloomberg:
>> Through its open-source Android project, Google has agreed to incorporate
>> code, first developed by the agency in 2011, into future versions of its
>> mobile operating system, which according to market researcher IDC runs on
>> three-quarters of the smartphones shipped globally in the first quarter.
>> NSA officials say their code, known as Security Enhancements for Android,
>> isolates apps to prevent hackers and marketers from gaining access to
>> personal or corporate data stored on a device. Eventually all new phones,
>> tablets, televisions, cars, and other devices that rely on Android will
>> include NSA code, agency spokeswoman Vanee? Vines said in an e-mailed
>> statement. NSA researcher Stephen Smalley, who works on the program,
>> says, ?Our goal is to raise the bar in the security of commodity mobile
>> devices.? See, there's no need to worry: the reason the NSA is generously
>> providing the source code for every Google-based smartphone is for your
>> own security. Oh but it's open-sourced, so someone else will intercept
>> any and all attempts at malice. We forgot.
>> The story continues:
>> In a 2011 presentation obtained by Bloomberg Businessweek, Smalley listed
>> among the benefits of the program that it?s ?normally invisible to
>> users.? The program?s top goal, according to that presentation: ?Improve
>> our understanding of Android security.? [...]
>> Apple appears to be immune from this unprecedented breach of customer
>> loyalty, if only for now, although open-sourced Linux may not be as
>> lucky:
>> ?Apple (AAPL) does not accept source code from any government agencies
>> for any of our operating systems or other products,? says Kristin Huguet,
>> a spokeswoman for the company. It?s not known if any other proprietary
>> operating systems are using NSA code. SE for Android is an offshoot of a
>> long-running NSA project called Security-Enhanced Linux. That code was
>> integrated a decade ago into the main version of the open-source
>> operating system, the server platform of choice for Internet leaders
>> including Google, Facebook (FB), and Yahoo! (YHOO). Jeff Zemlin, the
>> executive director of the Linux Foundation, says the NSA didn?t add any
>> obvious means of eavesdropping. ?This code was peer-reviewed by a lot of
>> people,? he says. [..]
>> (19) NSA key inside Windows: NSA access has been built into Windows from
>> 1995 on
>> How NSA access was built into Windows
>> Duncan Campbell
>> 04.09.1999
>> Careless mistake reveals subversion of Windows by NSA.
>> A CARELESS mistake by Microsoft programmers has revealed that special
>> access codes prepared by the US National Security Agency have been
>> secretly built into Windows. The NSA access system is built into every
>> version of the Windows operating system now in use, except early releases
>> of Windows 95 (and its predecessors). The discovery comes close on the
>> heels of the revelations earlier this year that another US software
>> giant, Lotus, had built an NSA "help information" trapdoor into its Notes
>> system, and that security functions on other software systems had been
>> deliberately crippled.
>> The first discovery of the new NSA access system was made two years ago
>> by British researcher Dr Nicko van Someren. But it was only a few weeks
>> ago when a second researcher rediscovered the access system. With it, he
>> found the evidence linking it to NSA.
>> Computer security specialists have been aware for two years that unusual
>> features are contained inside a standard Windows software "driver" used
>> for security and encryption functions. The driver, called ADVAPI.DLL,
>> enables and controls a range of security functions. If you use Windows,
>> you will find it in the C:\Windows\system directory of your computer.
>> Anzeige
>> ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only
>> run cryptographic functions that the US governments allows Microsoft to
>> export. That information is bad enough news, from a European point of
>> view. Now, it turns out that ADVAPI will run special programmes inserted
>> and controlled by NSA. As yet, no-one knows what these programmes are, or
>> what they do.
>> Dr Nicko van Someren reported at last year's Crypto 98 conference that he
>> had disassembled the ADVADPI driver. He found it contained two different
>> keys. One was used by Microsoft to control the cryptographic functions
>> enabled in Windows, in compliance with US export regulations. But the
>> reason for building in a second key, or who owned it, remained a mystery.
>> A second key
>> Two weeks ago, a US security company came up with conclusive evidence
>> that the second key belongs to NSA. Like Dr van Someren, Andrew
>> Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina,
>> had been probing the presence and significance of the two keys. Then he
>> checked the latest Service Pack release for Windows NT4, Service Pack 5.
>> He found that Microsoft's developers had failed to remove or "strip" the
>> debugging symbols used to test this software before they released it.
>> Inside the code were the labels for the two keys. One was called "KEY".
>> The other was called "NSAKEY".
>> Fernandes reported his re-discovery of the two CAPI keys, and their
>> secret meaning, to "Advances in Cryptology, Crypto'99" conference held in
>> Santa Barbara. According to those present at the conference, Windows
>> developers attending the conference did not deny that the "NSA" key was
>> built into their software. But they refused to talk about what the key
>> did, or why it had been put there without users' knowledge.
>> A third key?!
>> But according to two witnesses attending the conference, even Microsoft's
>> top crypto programmers were astonished to learn that the version of
>> ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys.
>> Brian LaMachia, head of CAPI development at Microsoft was "stunned" to
>> learn of these discoveries, by outsiders. The latest discovery by Dr van
>> Someren is based on advanced search methods which test and report on the
>> "entropy" of programming code.
>> Within the Microsoft organisation, access to Windows source code is said
>> to be highly compartmentalized, making it easy for modifications to be
>> inserted without the knowledge of even the respective product managers.
>> Researchers are divided about whether the NSA key could be intended to
>> let US government users of Windows run classified cryptosystems on their
>> machines or whether it is intended to open up anyone's and everyone's
>> Windows computer to intelligence gathering techniques deployed by NSA's
>> burgeoning corps of "information warriors".
>> According to Fernandez of Cryptonym, the result of having the secret key
>> inside your Windows operating system "is that it is tremendously easier
>> for the NSA to load unauthorized security services on all copies of
>> Microsoft Windows, and once these security services are loaded, they can
>> effectively compromise your entire operating system". The NSA key is
>> contained inside all versions of Windows from Windows 95 OSR2 onwards.
>> "For non-American IT managers relying on Windows NT to operate highly
>> secure data centres, this find is worrying", he added. "The US government
>> is currently making it as difficult as possible for "strong" crypto to be
>> used outside of the US. That they have also installed a cryptographic
>> back-door in the world's most abundant operating system should send a
>> strong message to foreign IT managers".
>> "How is an IT manager to feel when they learn that in every copy of
>> Windows sold, Microsoft has a 'back door' for NSA - making it orders of
>> magnitude easier for the US government to access your computer?" he
>> asked.
>> Can the loophole be turned round against the snoopers?
>> Dr van Someren feels that the primary purpose of the NSA key inside
>> Windows may be for legitimate US government use. But he says that there
>> cannot be a legitimate explanation for the third key in Windows 2000
>> CAPI. "It looks more fishy", he said.
>> Fernandez believes that NSA's built-in loophole can be turned round
>> against the snoopers. The NSA key inside CAPI can be replaced by your own
>> key, and used to sign cryptographic security modules from overseas or
>> unauthorised third parties, unapproved by Microsoft or the NSA. This is
>> exactly what the US government has been trying to prevent. A
>> demonstration "how to do it" program that replaces the NSA key can be
>> found on Cryptonym's website.
>> According to one leading US cryptographer, the IT world should be
>> thankful that the subversion of Windows by NSA has come to light before
>> the arrival of CPUs that handles encrypted instruction sets. These would
>> make the type of discoveries made this month impossible. "Had the
>> next-generation CPU's with encrypted instruction sets already been
>> deployed, we would have never found out about NSAKEY."
>> (20) NSA wrote the security software for Windows Vista
>> For Windows Vista Security, Microsoft Called in Pros
>> By Alec Klein and Ellen Nakashima
>> Washington Post Staff Writers
>> Tuesday, January 9, 2007
>> When Microsoft introduces its long-awaited Windows Vista operating system
>> this month, it will have an unlikely partner to thank for making its
>> flagship product safe and secure for millions of computer users across
>> the world: the National Security Agency.
>> For the first time, the giant software maker is acknowledging the help of
>> the secretive agency, better known for eavesdropping on foreign officials
>> and, more recently, U.S. citizens as part of the Bush administration's
>> effort to combat terrorism. The agency said it has helped in the
>> development of the security of Microsoft's new operating system -- the
>> brains of a computer -- to protect it from worms, Trojan horses and other
>> insidious computer attackers.
>> "Our intention is to help everyone with security," Tony W. Sager, the
>> NSA's chief of vulnerability analysis and operations group, said
>> yesterday. [...]
>> Microsoft said this is not the first time it has sought help from the
>> NSA. For about four years, Microsoft has tapped the spy agency for
>> security expertise in reviewing its operating systems, including the
>> Windows XP consumer version and the Windows Server 2003 for corporate
>> customers.
>> With hundreds of thousands of Defense Department employees using
>> Microsoft's software, the NSA realizes that it's in its own interest to
>> make the product as secure as possible. "It's partly a recognition that
>> this is a commercial world," Sager said. "Our customers have spoken."
>> [...]
>> (21) US media ignore Israeli connection to NSA tapping
>> From: "Archer Frey" <[email protected]>
>> Subject: Fwd: Israel and the NSA Scandal
>> Date: Thu, 04 Jul 2013 14:00:18 +1000
>> Israel and the NSA Scandal
>> June 19, 2013
>> Kevin MacDonald
>> Steve Sailer has an article on the tie-in between Israeli high tech firms
>> and the NSA spying on American citizens (?Does Israel Have a Backdoor to
>> US Intelligence??). It?s always seemed very suspicious that Amdocs, an
>> Israeli firm, was responsible for billing for US phone companies, and
>> that two Israeli firms, Narus and Verint, are involved in wiretapping
>> AT&T and Verizon for the NSA. It?s also not surprising that, as noted by
>> James Bamford in his April 2012 article for Wired, someone with close
>> connections to Israel secretly gave software designed by NSA to Israel:
>> ?the advanced analytical and data mining software the NSA had developed
>> for both its worldwide and international eavesdropping operations was
>> secretly passed to Israel by a mid-level employee, apparently with close
>> connections to the country.? Bamford?s source describes him as ?a very
>> strong supporter of Israel.?
>> This is likely yet another example of a long list of American Jews who
>> are credibly believed to have spied for Israel, including pretty much the
>> entire roster of prominent neocons (Perle, Wolfowitz, Stephen Bryen,
>> Douglas Feith, and Michael Ledeen; see here, p. 47ff)?none of whom, with
>> the exception of Jonathan Pollard, have been convicted, and many of whom,
>> like the person mentioned here, have never been indicted. And given this
>> long list, it is certainly reasonable to think that Israel is using its
>> connections with the NSA to mine US data for its own purposes. In fact,
>> it would be silly to think otherwise.
>> The NYTimes, The Washington Post, and the LATimes have completely ignored
>> the Israeli connection, and you certainly won?t hear about it on FOX
>> news. So, as often happens, one must read Israeli papers. Haaretz (but
>> not neocon The Jerusalem Post) has several articles on the Israeli
>> connection. On the PRISM program that collects data from companies like
>> Google, Facebook, Microsoft and AOL:
>> The data, gathered by the U.S. National Security Agency?s PRISM
>> surveillance program, came from email accounts, Internet chats, browsing
>> and search histories. The aim was to amass a database through which the
>> NSA could learn whether terror suspects had been in contact with people
>> in the United States.
>> In contrast to similar cases revealed in the past, the program involved
>> thorough and continuous collection of data, even when no particular
>> person or communications had aroused the authorities? suspicions. ?
>> Behind the scenes are a host of Israeli companies that have almost
>> certainly taken part in the program as suppliers of technology. They may
>> yet find themselves in the maelstrom, warns Nimrod Kozlovski, head of Tel
>> Aviv University?s program for cyber studies.
>> ?The exposure of PRISM underscores the feeling that communications
>> networks and Internet companies have become the main tool for governments
>> to gather information,? he says. ?It is critical for the United States at
>> all times to put a wall of separation between the government and
>> commercial enterprises in order to quiet concerns that it has secret
>> relationships with these companies.?
>> The concern is not just that the local government is spying on its
>> citizens but that the manufacturers themselves have the ability to spy
>> from afar.
>> Telecommunications systems almost always feature components that can be
>> operated remotely so that software can be updated and routine maintenance
>> chores can be conducted. ? But these same systems can be used to
>> penetrate the user country?s communications network as well. With the
>> United States at the center of the world?s Internet traffic that problem
>> is magnified. (?In U.S. snooping affair, Israeli firms at risk ?)
>> Right. It?s quite possible that Gen. Keith Alexander is telling the truth
>> when he says that the NSA is not mining these data on American citizens,
>> but there?s nothing to stop the Israelis from doing so. The assumption
>> must be that Israel has access to American?s emails and internet
>> usage?very useful for all kinds of reasons, including providing
>> ammunition for those who would destroy anti-Zionists, providing insider
>> information in financial transactions, stealing technology, etc. When
>> someone like Gen. David Petraeus, who had been targeted by the ADL for
>> his statements on Israel, is suddenly compromised by leaked emails to his
>> mistress, it?s not surprising that people are wondering at the
>> involvement of the Lobby.
>> The Haaretz article continues:
>> Israeli companies are particularly vulnerable to such suspicions [of
>> spying] because they have such close ties to the country?s security
>> establishment.
>> ?Graduates of the IDF?s technology units and those who have worked in
>> other security bodies have created business opportunities for themselves
>> based in no small part on their previous employment,? said Udi Shani, a
>> former Defense Ministry director general, at the Herzliya Conference last
>> March.
>> That?s one way to say it. But it?s also quite reasonable that the MOSSAD
>> decided to allow its programmers to use the technology created for MOSSAD?s
>> Unit 8200 and then set up companies that would be able to secure foreign
>> contracts which would be impossible for MOSSAD itself to secure for
>> obvious reasons. Indeed, ?Hanan Gefen, a former commander of the unit,
>> told Forbes magazine in 2007 that Comverse?s technology was directly
>> influenced by the technology of 8200.?
>> MOSSAD doesn?t seem too worried about its technology falling into the
>> hands of its ex-employees. In other words, these companies are likely to
>> be MOSSAD operations in all but name.
>> And in the U.S., because of the power of the Israel Lobby, there would be
>> no outcry in the media, from politicians, or even from the defense
>> establishment when an Israeli company is awarded a contract to do the
>> spying for the NSA. James Petras says as much:
>> The domestic spy apparatus operates with impunity because of its network
>> of powerful domestic and overseas allies. The entire bi-partisan
>> Congressional leadership is privy to and complicit with its operations.
>> Related branches of government, like the Internal Revenue Service,
>> cooperate in providing information and pursuing targeted political groups
>> and individuals. Israel is a key overseas ally of the National Security
>> Agency, as has been documented in the Israeli press (Haaretz, June 8,
>> 2013). Two Israeli high tech firms (Verint and Narus) with ties to the
>> Israeli secret police (MOSSAD), have provided the spy software for the
>> NSA and this, of course, has opened a window for Israeli spying in the US
>> against Americans opposed to the Zionist state. The writer and critic,
>> Steve Lendman points out that Israeli spymasters via their software
>> ?front companies? have long had the ability to ?steal proprietary
>> commercial and industrial data? with impunity . And because of the power
>> and influence of the Presidents of the 52 Major American Jewish
>> organizations, Justice Department officials have ordered dozens of
>> Israeli espionage cases to be dropped. The tight Israeli ties to the US
>> spy apparatus serves to prevent deeper scrutiny into its operation and
>> political goals ? at a very high price in terms of the security of US
>> citizens. In recent years two incidents stand out: Israeli security
>> ?experts? were contracted to advise the Pennsylvania Department of
>> Homeland Security in their investigation and ?Stasi-like? repression of
>> government critics and environmental activists (compared to ?al Queda
>> terrorists? by the Israelis) ? the discovery of which forced the
>> resignation of OHS Director James Powers in 2010. In 2003, New Jersey
>> governor, Jim McGreevy appointed his lover, an Israeli government
>> operative and former IDF officer, to head that state?s ?Homeland Security
>> Department and later resigned, denouncing the Israeli, Golan Cipel, for
>> blackmail in late 2004. These examples are a small sample illustrating
>> the depth and scope of Israeli police state tactics intersecting in US
>> domestic repression.
>> From hearing media accounts of NSA spying, the only data on Americans
>> that are collected are the times of phone calls and the identities of the
>> parties in the phone call. But, as noted above, the data collected go
>> well beyond that to include ?email accounts, Internet chats, browsing and
>> search histories.? Another Israeli company mentioned in the Haaretz
>> article with very broad-based spying capabilities is NICE, yet another
>> Israeli company with close ties to the Israeli government. NICE ?has
>> technology that is used to monitor some 1.5 billion people. In a brochure
>> published by the company itself, it describes how its system can analyze
>> conversations (including technology to make transcripts of phone calls),
>> and gather and analyze data from public sites. With these tools it can
>> build an intelligence file from millions of communications.? NICE?s
>> website describes itself:
>> NICE solutions capture interactions, transactions and video surveillance
>> from multiple sources, including telephones, CCTV video feed, emergency
>> services radio communications, emails, chat, social media, and more.
>> In other words, pretty much all communications can be monitored and, if
>> you represent a threat to the people with access to these operations, you
>> must assume that you are being monitored. (I know of no evidence that the
>> NSA employs NICE.) Although the company claims that its operations are
>> aimed at ?customers, criminals and terrorists, or fraudsters,? it?s not
>> at all far-fetched to be suspicious that the information obtained could
>> be used in a very wide range of operations, including insider information
>> on financial affairs. Sailer suggests that fear of having conversations
>> recorded may account for the concentration of elites in urban centers
>> like Washington, DC and New York, and he pointedly links to his previous
>> article on Jewish wealth, implying that insider information is a key to
>> Jewish wealth. However, even voice conversations are susceptible to NICE?s
>> technology. And the other side of the coin is that it would not be at all
>> surprising to learn that Jewish trading networks are privy to information
>> obtained by companies like NICE.
>> The situation with the NSA is yet another example of what it means to
>> have a Jewish elite in the U.S.: Jewish spies who deliver vital computer
>> programs to Israel are not indicted. And despite a long history of
>> aggressive spying against the U.S., the NSA hires Israeli firms to do its
>> data collection, with nary a word heard in Congress or the media about
>> the obvious problems that presents.
>> It?s good to be king.
>> (22) Zionists in on the Plot - Brother Nathanael
>> Edward Snowden?When Truth Becomes Treason
>> By Brother Nathanael Kapner
>> June 14, 2013 @ 1:05 am
>> All the usual suspects are sharpening their teeth on America?s newest
>> whistleblower, Edward Snowden.
>> Whoever Ed Snowden really is pales in comparison to his message?that
>> privacy and liberty in this disintegrating Republic are now virtually
>> GONE.
>> Mr. Snowden hasn?t really said anything NEW?some are even suggesting he
>> was set up?but at the very least he has brazenly and boldly quantified -
>> right there on the main stream media - what many of us have realized for
>> years?that we have been, and are being, illegally surveilled 24/7/365.
>> [Clip: ?Any analyst at anytime can target anyone at any selector
>> anywhere. But I sitting at my desk certainly had the authorities to
>> wiretap anyone from you, or your accountant, to a federal judge, to even
>> the president.?]
>> It didn?t take long for those who ?hate our freedoms? to sink their fangs
>> into the future of this young man.
>> America?s most hated woman, Jewish Senator Dianne Feinstein, head of the
>> Senate Intelligence Committee, joined Mike Rogers this past Sunday to
>> announce her black-hearted and hypocritical wish to ?prosecute? Edward
>> Snowden.
>> [Clip: ?Is it fair to say that both of you believe that this
>> investigation should be pursued, and the source, if found, should be
>> prosecuted.? ?I absolutely think they should be prosecuted.?
>> ?You too Senator Feinstein?? ?I do.?]
>> The very next day, Feinstein?who?s hell-bent on trashing the 2nd
>> Amendment?had the audacity to tell reporters that Snowden has committed
>> an ?act of treason??soon echoed by John Boehner, who using Feinstein?s
>> playbook, defended their commonly-held malevolence with the over worn
>> script: ?We?re keeping American?s safe.?
>> [Clip: ?Now to my exclusive interview with house speaker John Boehner, he
>> began our interview with some tough words for Edward Snowden.? ?He?s a
>> traitor. The president outlined last week that these were important
>> national security programs to help keep Americans safe.? ?It?s called
>> protecting America.?]
>> The hacks on Capitol Hill just love this slogan.
>> Why? Because ?keeping American?s safe? allows them to commit their own
>> crimes IN SECRET?all in the name of SECURITY for the ?homeland.?
>> [Clip: ?We need to understand that in secrecy, the government has taken
>> laws that we have written and enacted to protect us, and it has used
>> those laws to destroy our personal dignity, and expose our inner most
>> thoughts and behavior to the whims of government bureaucrats.?]
>> Speaking of political hags?I mean, hacks?the DNC?s Jewish chairwoman,
>> Deborah Wasserman Schultz, dug her own claws deep into Snowden, calling
>> him a ?coward? who should be ?extradited, arrested, and prosecuted.?
>> [Clip: ?He should be extradited, arrested, and prosecuted. I mean that?s
>> exactly what should happen to him.?]
>> Ron Paul expressed legitimate concern that Obama might send a drone after
>> Snowden?just one more morbid episode of Obama?s warrantless
>> assassinations of US citizens.
>> [Clip: ?Where do you think he is right now? Are you worried about that??
>> ?I have no idea. Yeah, I?m worried about somebody in our government might
>> kill him with a cruise missile or a drone missile. I mean we live in a
>> bad time where American citizens don?t even have rights and that they can
>> be killed.?]
>> But the message AND the messenger are ALWAYS attacked by THOSE whose
>> reputations are endangered: the policy-makers and actors who Snowdon AND
>> Greenwald exposed. The COVER is off.
>> [Clip: ?We heard a lot of push-back from National Security people saying
>> ?well this is nothing new, this has been going on for some time, nothing
>> to see here, move along?? Now we?re hearing it?s gut-wrenching that it?s
>> a threat to American National Security. Which is it Glen??
>> ?It?s neither of those. The reality is is that US Government officials
>> for many decades now and certainly over the last 10 years have been
>> abusing their secrecy power to shield from the American public not
>> programs that are designed to keep America safe and not prevent
>> disclosures that would help the terrorists, but to conceal their own
>> actions from the people they?re supposed to be democratically
>> accountable.?]
>> And who specifically stands to have their reputations ruined?
>> The same ones who pushed the ?war on terror? hoax which was the primary
>> tool to assault our privacy and freedoms.
>> One of the most rabid campaigners for America?s illegal war on Iraq,
>> Richard Haass, Jewish president of the Council on Foreign Relations, was
>> tabbed on Morning Joe to refute Greenwald?s defense of Snowden.
>> [Clip: ?The law was broken by one person who was Mr. Snowden.
>> Whistleblowers are people who uncover wrongdoing within their say
>> agencies or organizations. This is not wrongdoing, this is US policy.
>> This is not a whistleblower, this is someone who is going to make the
>> United States I believe less safe.?]
>> Bull. In both the Zazi and Headling terrorist blockings that Feinstein
>> and Rogers keep on citing, neither data mining nor Prism had anything to
>> do with preventing their plots, but rather by conventional intelligence
>> methods employed NOT by America but by Britain.
>> The smears continue by the Jewish vultures.
>> Alleged adulterer, Jeffrey Toobin, Jewish legal analyst for CNN, after
>> writing in the The New Yorker that Snowden was a ?grandiose narcissist
>> who deserves to be thrown in prison,? had the gall to label the actions
>> of Mr. Snowden a ?disgrace.?
>> [Clip: ?Stealing documents from the NSA and then turning them over to
>> Glen Greenwald is simply not the American way and I think it?s a
>> disgrace.?]
>> Not the ?American way??
>> Blowing the whistle on those who defraud Americans of their freedoms goes
>> back to the days when British tea was tossed into the Boston Harbor?long
>> before Toobin and his ilk ever made it to America?s shores. He?s got a
>> lot of nerve defining for Gentiles what the ?American way? is all about..
>> Thank God there are a few notable Christians like Judge Napolitano and
>> Ron Paul?who?defying the Jewish smears?hail Snowden NOT as a traitor,
>> coward, felon, or disgrace? BUT as an American HERO.
>> [Clip: ?I would describe this man as an American Hero, as a person
>> willing to risk life, limb, and liberty in order to expose to the
>> American people one of the most extraordinary violations of the American
>> principles, value judgments, and the constitution itself in all of our
>> history.?]
>> When truth is labeled as treason, either our country is headed for ruin
>> or it?s a wakeup call for Americans to begin cleaning house.
>> [Clip: ?You are a supporter of Edward Snowden and his actions. Why??
>> ?Well, from what I hear and what he?s done. I mean he?s done a great
>> service because he?s telling the truth and this is what we are starved
>> for. The American people are starved for the truth. And when you have
>> dictatorship or an authoritarian government, truth becomes treasonous. I
>> think the president ought to send him a thank-you letter because he? the
>> President ran on transparency, and we?re getting a lot of transparency
>> now.?]
>> Indeed. The ?transparency? we?re finally getting is from those who the
>> Jews want to put behind bars?whose civil disobedience is a mark of true
>> patriots?who really care about saving fallen America.
>> --
>> Peter Myers
>> 381 Goodwood Rd
>> Childers Qld 4660
>> Australia
>> ph. in Australia: 07 41262296
>> from overseas: +61 7 41262296
>> website:
>> Skype video: petermyersaus . By prior arrangement only, after discussions
>> by email.

« Last Edit: July 14, 2013, 09:52:14 PM by the watcher »

Share this topic...
In a forum
In a site/blog

SMF spam blocked by CleanTalk