PART 2
According to an article in the American technology magazine "Wired" from
>> April 2012, two Israeli companies ? which the magazine describes as
>> having close connections to the Israeli security community ? conduct
>> bugging and wiretapping for the NSA
>> <http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/all/1>.
>>
>> Verint, which took over its parent company Comverse Technology earlier
>> this year, is responsible for tapping the communication lines of the
>> American telephone giant Verizon, according to a past Verizon employee
>> sited by James Bamford in Wired. Neither Verint nor Verizon commented on
>> the matter.
>>
>> Natus, which was acquired in 2010 by the American company Boeing,
>> supplied the software and hardware used at AT&T wiretapping rooms,
>> according to whistleblower Mark Klein, who revealed the information in
>> 2004. Klein, a past technician at AT&T who filed a suit against the
>> company for spying on its customers, revealed a "secret room" in the
>> company's San Fransisco office, where the NSA collected data on American
>> citizens' telephone calls and Internet surfing.
>>
>> <https://www.eff.org/document/drake-declaration-support-plaintiffs-motion>
>> Klein's claims were reinforced by former NSA employee Thomas Drake who
>> <http://publicintelligence.net/binney-nsa-declaration/> testified that
>> the agency uses a program produced by Narus to save the personal
>> electrical communications of AT&T customers. [also see:
>>
http://www.nbcnews.com/id/26315908/ for interview with Mark Klein]
>>
>> Both Verint and Narus have ties to the Israeli intelligence agency and
>> the Israel Defense Forces intelligence-gathering unit 8200. Hanan Gefen,
>> a former commander of the 8200 unit,
>> <http://www.forbes.com/2007/02/07/israel-military-unit-ventures-biz-cx_gk_0208israel.html>
>> told Forbes magazine in 2007 that Comverse's technology, which was
>> formerly the parent company of Verint and merged with it this year, was
>> directly influenced by the technology of 8200. Ori Cohen, one of the
>> founders of Narus,
>> <http://money.cnn.com/magazines/fortune/fortune_archive/2001/10/15/311567/>
>> told Fortune magazine in 2001 that his partners had done technology work
>> for the Israeli intelligence. [...]
>>
>> (17) Postal Service is in the snooping business too: mail is monitored, &
>> sometimes copied
>>
>> Date: Thu, 4 Jul 2013 11:09:29 -0700 (PDT) From: Archer Frey
>> <
[email protected]>
>> Subject: Postal Service also in snooping business
>>
>> Dear Friends of Liberty,
>> Happy Fourth of July.
>> Isn't it nice to find out that the government of limited delegated powers
>> is recoding your every piece of mail? And, that some (in most cases)
>> lawyer cum politician now appointed Federal judge says that it is OK to
>> do so. These are the self same judges that gain their living out of the
>> proceeds of the IRS. Al Capon of recent fame can tell you a lot about
>> taxes.
>> Also Mr. Bush says its OK in an emergency. Problem is in the California
>> government almost every piece of legislation purports to have an
>> emergency component.
>> How many surveillance data bases are you on? See
>>
http://en.wikipedia.org/wiki/Surveillance for an exhasting description.
>> Oh well, enjoy the fire works,
>> Archer
>>
>>
http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.html?pagewanted=all&_r=0>>
>> U.S. Postal Service Logging All Mail for Law Enforcement
>>
>> Brendan Bannon for The New York Times
>>
>> Leslie James Pickering, the owner of a bookstore in Buffalo, was targeted
>> by a tracking program from the United States Postal Service.
>>
>> By RON NIXON
>>
>> Published: July 3, 2013
>>
>> WASHINGTON ? Leslie James Pickering noticed something odd in his mail
>> last September: a handwritten card, apparently delivered by mistake, with
>> instructions for postal workers to pay special attention to the letters
>> and packages sent to his home.
>>
>> ?Show all mail to supv? ? supervisor ? ?for copying prior to going out on
>> the street,? read the card. It included Mr. Pickering?s name, address and
>> the type of mail that needed to be monitored. The word ?confidential? was
>> highlighted in green.
>>
>> ?It was a bit of a shock to see it,? said Mr. Pickering, who with his
>> wife owns a small bookstore in Buffalo. More than a decade ago, he was a
>> spokesman for the Earth Liberation Front, a radical environmental group
>> labeled eco-terrorists by the Federal Bureau of Investigation. Postal
>> officials subsequently confirmed they were indeed tracking Mr. Pickering?s
>> mail but told him nothing else.
>>
>> As the world focuses on the high-tech spying of the National Security
>> Agency, the misplaced card offers a rare glimpse inside the seemingly
>> low-tech but prevalent snooping of the United States Postal Service.
>>
>> Mr. Pickering was targeted by a longtime surveillance system called mail
>> covers, a forerunner of a vastly more expansive effort, the Mail
>> Isolation Control and Tracking program, in which Postal Service computers
>> photograph the exterior of every piece of paper mail that is processed in
>> the United States ? about 160 billion pieces last year. It is not known
>> how long the government saves the images.
>>
>> Together, the two programs show that postal mail is subject to the same
>> kind of scrutiny that the National Security Agency has given to telephone
>> calls and e-mail. [...]
>>
>> This article has been revised to reflect the following correction:
>>
>> Correction: July 3, 2013
>>
>> An earlier version of this article misstated the Justice Department
>> position once held by Mark Rasch. He started a computer crimes unit in
>> the criminal division?s fraud section, but he was not the head of its
>> computer crimes unit, which was created after his departure.
>>
>> (18) NSA has inserted code into Android OS, with Google compliance
>>
>>
http://www.zerohedge.com/news/2013-07-09/nsa-has-inserted-its-code-android-os-bugging-three-quarters-all-smartphones>>
>> The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All
>> Smartphones
>>
>> Submitted by Tyler Durden on 07/09/2013 20:34 -0400
>>
>> Over a decade ago, it was discovered that the NSA embedded backdoor
>> access into Windows 95, and likely into virtually all other subsequent
>> internet connected, desktop-based operating systems. However, with the
>> passage of time, more and more people went "mobile", and as a result the
>> NSA had to adapt. And adapt they have: as Bloomberg reports, "The NSA is
>> quietly writing code for Google?s Android OS."
>>
>> Is it ironic that the same "don't be evil" Google which went to such
>> great lengths in the aftermath of the Snowden scandal to wash its hands
>> of snooping on its customers and even filed a request with the secretive
>> FISA court asking permission to disclose more information about the
>> government?s data requests, is embedding NSA code into its mobile
>> operating system, which according to IDC runs on three-quarters of all
>> smartphones shipped in the first quarter? Yes, yes it is.
>>
>> Google spokeswoman Gina Scigliano confirms that the company has already
>> inserted some of the NSA?s programming in Android OS. "All Android code
>> and contributors are publicly available for review at
>> source.android.com." Scigliano says, declining to comment further.
>>
>> From Bloomberg:
>>
>> Through its open-source Android project, Google has agreed to incorporate
>> code, first developed by the agency in 2011, into future versions of its
>> mobile operating system, which according to market researcher IDC runs on
>> three-quarters of the smartphones shipped globally in the first quarter.
>> NSA officials say their code, known as Security Enhancements for Android,
>> isolates apps to prevent hackers and marketers from gaining access to
>> personal or corporate data stored on a device. Eventually all new phones,
>> tablets, televisions, cars, and other devices that rely on Android will
>> include NSA code, agency spokeswoman Vanee? Vines said in an e-mailed
>> statement. NSA researcher Stephen Smalley, who works on the program,
>> says, ?Our goal is to raise the bar in the security of commodity mobile
>> devices.? See, there's no need to worry: the reason the NSA is generously
>> providing the source code for every Google-based smartphone is for your
>> own security. Oh but it's open-sourced, so someone else will intercept
>> any and all attempts at malice. We forgot.
>>
>> The story continues:
>>
>> In a 2011 presentation obtained by Bloomberg Businessweek, Smalley listed
>> among the benefits of the program that it?s ?normally invisible to
>> users.? The program?s top goal, according to that presentation: ?Improve
>> our understanding of Android security.? [...]
>>
>> Apple appears to be immune from this unprecedented breach of customer
>> loyalty, if only for now, although open-sourced Linux may not be as
>> lucky:
>>
>> ?Apple (AAPL) does not accept source code from any government agencies
>> for any of our operating systems or other products,? says Kristin Huguet,
>> a spokeswoman for the company. It?s not known if any other proprietary
>> operating systems are using NSA code. SE for Android is an offshoot of a
>> long-running NSA project called Security-Enhanced Linux. That code was
>> integrated a decade ago into the main version of the open-source
>> operating system, the server platform of choice for Internet leaders
>> including Google, Facebook (FB), and Yahoo! (YHOO). Jeff Zemlin, the
>> executive director of the Linux Foundation, says the NSA didn?t add any
>> obvious means of eavesdropping. ?This code was peer-reviewed by a lot of
>> people,? he says. [..]
>>
>> (19) NSA key inside Windows: NSA access has been built into Windows from
>> 1995 on
>>
>>
http://www.heise.de/tp/artikel/5/5263/1.html>>
>> How NSA access was built into Windows
>>
>> Duncan Campbell
>>
>> 04.09.1999
>>
>> Careless mistake reveals subversion of Windows by NSA.
>>
>> A CARELESS mistake by Microsoft programmers has revealed that special
>> access codes prepared by the US National Security Agency have been
>> secretly built into Windows. The NSA access system is built into every
>> version of the Windows operating system now in use, except early releases
>> of Windows 95 (and its predecessors). The discovery comes close on the
>> heels of the revelations earlier this year that another US software
>> giant, Lotus, had built an NSA "help information" trapdoor into its Notes
>> system, and that security functions on other software systems had been
>> deliberately crippled.
>>
>> The first discovery of the new NSA access system was made two years ago
>> by British researcher Dr Nicko van Someren. But it was only a few weeks
>> ago when a second researcher rediscovered the access system. With it, he
>> found the evidence linking it to NSA.
>>
>> Computer security specialists have been aware for two years that unusual
>> features are contained inside a standard Windows software "driver" used
>> for security and encryption functions. The driver, called ADVAPI.DLL,
>> enables and controls a range of security functions. If you use Windows,
>> you will find it in the C:\Windows\system directory of your computer.
>>
>> Anzeige
>>
>> ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only
>> run cryptographic functions that the US governments allows Microsoft to
>> export. That information is bad enough news, from a European point of
>> view. Now, it turns out that ADVAPI will run special programmes inserted
>> and controlled by NSA. As yet, no-one knows what these programmes are, or
>> what they do.
>>
>> Dr Nicko van Someren reported at last year's Crypto 98 conference that he
>> had disassembled the ADVADPI driver. He found it contained two different
>> keys. One was used by Microsoft to control the cryptographic functions
>> enabled in Windows, in compliance with US export regulations. But the
>> reason for building in a second key, or who owned it, remained a mystery.
>>
>> A second key
>>
>> Two weeks ago, a US security company came up with conclusive evidence
>> that the second key belongs to NSA. Like Dr van Someren, Andrew
>> Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina,
>> had been probing the presence and significance of the two keys. Then he
>> checked the latest Service Pack release for Windows NT4, Service Pack 5.
>> He found that Microsoft's developers had failed to remove or "strip" the
>> debugging symbols used to test this software before they released it.
>> Inside the code were the labels for the two keys. One was called "KEY".
>> The other was called "NSAKEY".
>>
>> Fernandes reported his re-discovery of the two CAPI keys, and their
>> secret meaning, to "Advances in Cryptology, Crypto'99" conference held in
>> Santa Barbara. According to those present at the conference, Windows
>> developers attending the conference did not deny that the "NSA" key was
>> built into their software. But they refused to talk about what the key
>> did, or why it had been put there without users' knowledge.
>>
>> A third key?!
>>
>> But according to two witnesses attending the conference, even Microsoft's
>> top crypto programmers were astonished to learn that the version of
>> ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys.
>> Brian LaMachia, head of CAPI development at Microsoft was "stunned" to
>> learn of these discoveries, by outsiders. The latest discovery by Dr van
>> Someren is based on advanced search methods which test and report on the
>> "entropy" of programming code.
>>
>> Within the Microsoft organisation, access to Windows source code is said
>> to be highly compartmentalized, making it easy for modifications to be
>> inserted without the knowledge of even the respective product managers.
>>
>> Researchers are divided about whether the NSA key could be intended to
>> let US government users of Windows run classified cryptosystems on their
>> machines or whether it is intended to open up anyone's and everyone's
>> Windows computer to intelligence gathering techniques deployed by NSA's
>> burgeoning corps of "information warriors".
>>
>> According to Fernandez of Cryptonym, the result of having the secret key
>> inside your Windows operating system "is that it is tremendously easier
>> for the NSA to load unauthorized security services on all copies of
>> Microsoft Windows, and once these security services are loaded, they can
>> effectively compromise your entire operating system". The NSA key is
>> contained inside all versions of Windows from Windows 95 OSR2 onwards.
>>
>> "For non-American IT managers relying on Windows NT to operate highly
>> secure data centres, this find is worrying", he added. "The US government
>> is currently making it as difficult as possible for "strong" crypto to be
>> used outside of the US. That they have also installed a cryptographic
>> back-door in the world's most abundant operating system should send a
>> strong message to foreign IT managers".
>>
>> "How is an IT manager to feel when they learn that in every copy of
>> Windows sold, Microsoft has a 'back door' for NSA - making it orders of
>> magnitude easier for the US government to access your computer?" he
>> asked.
>>
>> Can the loophole be turned round against the snoopers?
>>
>> Dr van Someren feels that the primary purpose of the NSA key inside
>> Windows may be for legitimate US government use. But he says that there
>> cannot be a legitimate explanation for the third key in Windows 2000
>> CAPI. "It looks more fishy", he said.
>>
>> Fernandez believes that NSA's built-in loophole can be turned round
>> against the snoopers. The NSA key inside CAPI can be replaced by your own
>> key, and used to sign cryptographic security modules from overseas or
>> unauthorised third parties, unapproved by Microsoft or the NSA. This is
>> exactly what the US government has been trying to prevent. A
>> demonstration "how to do it" program that replaces the NSA key can be
>> found on Cryptonym's website.
>>
>> According to one leading US cryptographer, the IT world should be
>> thankful that the subversion of Windows by NSA has come to light before
>> the arrival of CPUs that handles encrypted instruction sets. These would
>> make the type of discoveries made this month impossible. "Had the
>> next-generation CPU's with encrypted instruction sets already been
>> deployed, we would have never found out about NSAKEY."
>>
>> (20) NSA wrote the security software for Windows Vista
>>
>>
http://www.washingtonpost.com/wp-dyn/content/article/2007/01/08/AR2007010801352.html>>
>> For Windows Vista Security, Microsoft Called in Pros
>>
>> By Alec Klein and Ellen Nakashima
>>
>> Washington Post Staff Writers
>>
>> Tuesday, January 9, 2007
>>
>> When Microsoft introduces its long-awaited Windows Vista operating system
>> this month, it will have an unlikely partner to thank for making its
>> flagship product safe and secure for millions of computer users across
>> the world: the National Security Agency.
>>
>> For the first time, the giant software maker is acknowledging the help of
>> the secretive agency, better known for eavesdropping on foreign officials
>> and, more recently, U.S. citizens as part of the Bush administration's
>> effort to combat terrorism. The agency said it has helped in the
>> development of the security of Microsoft's new operating system -- the
>> brains of a computer -- to protect it from worms, Trojan horses and other
>> insidious computer attackers.
>>
>> "Our intention is to help everyone with security," Tony W. Sager, the
>> NSA's chief of vulnerability analysis and operations group, said
>> yesterday. [...]
>>
>> Microsoft said this is not the first time it has sought help from the
>> NSA. For about four years, Microsoft has tapped the spy agency for
>> security expertise in reviewing its operating systems, including the
>> Windows XP consumer version and the Windows Server 2003 for corporate
>> customers.
>>
>> With hundreds of thousands of Defense Department employees using
>> Microsoft's software, the NSA realizes that it's in its own interest to
>> make the product as secure as possible. "It's partly a recognition that
>> this is a commercial world," Sager said. "Our customers have spoken."
>> [...]
>>
>> (21) US media ignore Israeli connection to NSA tapping
>>
>> From: "Archer Frey" <
[email protected]>
>> Subject: Fwd: Israel and the NSA Scandal
>> Date: Thu, 04 Jul 2013 14:00:18 +1000
>>
>>
http://www.theoccidentalobserver.net/2013/06/israel-and-the-nsa-scandal/>>
>> Israel and the NSA Scandal
>>
>> June 19, 2013
>>
>> Kevin MacDonald
>>
>> Steve Sailer has an article on the tie-in between Israeli high tech firms
>> and the NSA spying on American citizens (?Does Israel Have a Backdoor to
>> US Intelligence??). It?s always seemed very suspicious that Amdocs, an
>> Israeli firm, was responsible for billing for US phone companies, and
>> that two Israeli firms, Narus and Verint, are involved in wiretapping
>> AT&T and Verizon for the NSA. It?s also not surprising that, as noted by
>> James Bamford in his April 2012 article for Wired, someone with close
>> connections to Israel secretly gave software designed by NSA to Israel:
>> ?the advanced analytical and data mining software the NSA had developed
>> for both its worldwide and international eavesdropping operations was
>> secretly passed to Israel by a mid-level employee, apparently with close
>> connections to the country.? Bamford?s source describes him as ?a very
>> strong supporter of Israel.?
>>
>> This is likely yet another example of a long list of American Jews who
>> are credibly believed to have spied for Israel, including pretty much the
>> entire roster of prominent neocons (Perle, Wolfowitz, Stephen Bryen,
>> Douglas Feith, and Michael Ledeen; see here, p. 47ff)?none of whom, with
>> the exception of Jonathan Pollard, have been convicted, and many of whom,
>> like the person mentioned here, have never been indicted. And given this
>> long list, it is certainly reasonable to think that Israel is using its
>> connections with the NSA to mine US data for its own purposes. In fact,
>> it would be silly to think otherwise.
>>
>> The NYTimes, The Washington Post, and the LATimes have completely ignored
>> the Israeli connection, and you certainly won?t hear about it on FOX
>> news. So, as often happens, one must read Israeli papers. Haaretz (but
>> not neocon The Jerusalem Post) has several articles on the Israeli
>> connection. On the PRISM program that collects data from companies like
>> Google, Facebook, Microsoft and AOL:
>>
>> The data, gathered by the U.S. National Security Agency?s PRISM
>> surveillance program, came from email accounts, Internet chats, browsing
>> and search histories. The aim was to amass a database through which the
>> NSA could learn whether terror suspects had been in contact with people
>> in the United States.
>>
>> In contrast to similar cases revealed in the past, the program involved
>> thorough and continuous collection of data, even when no particular
>> person or communications had aroused the authorities? suspicions. ?
>>
>> Behind the scenes are a host of Israeli companies that have almost
>> certainly taken part in the program as suppliers of technology. They may
>> yet find themselves in the maelstrom, warns Nimrod Kozlovski, head of Tel
>> Aviv University?s program for cyber studies.
>>
>> ?The exposure of PRISM underscores the feeling that communications
>> networks and Internet companies have become the main tool for governments
>> to gather information,? he says. ?It is critical for the United States at
>> all times to put a wall of separation between the government and
>> commercial enterprises in order to quiet concerns that it has secret
>> relationships with these companies.?
>>
>> The concern is not just that the local government is spying on its
>> citizens but that the manufacturers themselves have the ability to spy
>> from afar.
>>
>> Telecommunications systems almost always feature components that can be
>> operated remotely so that software can be updated and routine maintenance
>> chores can be conducted. ? But these same systems can be used to
>> penetrate the user country?s communications network as well. With the
>> United States at the center of the world?s Internet traffic that problem
>> is magnified. (?In U.S. snooping affair, Israeli firms at risk ?)
>>
>> Right. It?s quite possible that Gen. Keith Alexander is telling the truth
>> when he says that the NSA is not mining these data on American citizens,
>> but there?s nothing to stop the Israelis from doing so. The assumption
>> must be that Israel has access to American?s emails and internet
>> usage?very useful for all kinds of reasons, including providing
>> ammunition for those who would destroy anti-Zionists, providing insider
>> information in financial transactions, stealing technology, etc. When
>> someone like Gen. David Petraeus, who had been targeted by the ADL for
>> his statements on Israel, is suddenly compromised by leaked emails to his
>> mistress, it?s not surprising that people are wondering at the
>> involvement of the Lobby.
>>
>> The Haaretz article continues:
>>
>> Israeli companies are particularly vulnerable to such suspicions [of
>> spying] because they have such close ties to the country?s security
>> establishment.
>>
>> ?Graduates of the IDF?s technology units and those who have worked in
>> other security bodies have created business opportunities for themselves
>> based in no small part on their previous employment,? said Udi Shani, a
>> former Defense Ministry director general, at the Herzliya Conference last
>> March.
>>
>> That?s one way to say it. But it?s also quite reasonable that the MOSSAD
>> decided to allow its programmers to use the technology created for MOSSAD?s
>> Unit 8200 and then set up companies that would be able to secure foreign
>> contracts which would be impossible for MOSSAD itself to secure for
>> obvious reasons. Indeed, ?Hanan Gefen, a former commander of the unit,
>> told Forbes magazine in 2007 that Comverse?s technology was directly
>> influenced by the technology of 8200.?
>>
>> MOSSAD doesn?t seem too worried about its technology falling into the
>> hands of its ex-employees. In other words, these companies are likely to
>> be MOSSAD operations in all but name.
>>
>> And in the U.S., because of the power of the Israel Lobby, there would be
>> no outcry in the media, from politicians, or even from the defense
>> establishment when an Israeli company is awarded a contract to do the
>> spying for the NSA. James Petras says as much:
>>
>> The domestic spy apparatus operates with impunity because of its network
>> of powerful domestic and overseas allies. The entire bi-partisan
>> Congressional leadership is privy to and complicit with its operations.
>> Related branches of government, like the Internal Revenue Service,
>> cooperate in providing information and pursuing targeted political groups
>> and individuals. Israel is a key overseas ally of the National Security
>> Agency, as has been documented in the Israeli press (Haaretz, June 8,
>> 2013). Two Israeli high tech firms (Verint and Narus) with ties to the
>> Israeli secret police (MOSSAD), have provided the spy software for the
>> NSA and this, of course, has opened a window for Israeli spying in the US
>> against Americans opposed to the Zionist state. The writer and critic,
>> Steve Lendman points out that Israeli spymasters via their software
>> ?front companies? have long had the ability to ?steal proprietary
>> commercial and industrial data? with impunity . And because of the power
>> and influence of the Presidents of the 52 Major American Jewish
>> organizations, Justice Department officials have ordered dozens of
>> Israeli espionage cases to be dropped. The tight Israeli ties to the US
>> spy apparatus serves to prevent deeper scrutiny into its operation and
>> political goals ? at a very high price in terms of the security of US
>> citizens. In recent years two incidents stand out: Israeli security
>> ?experts? were contracted to advise the Pennsylvania Department of
>> Homeland Security in their investigation and ?Stasi-like? repression of
>> government critics and environmental activists (compared to ?al Queda
>> terrorists? by the Israelis) ? the discovery of which forced the
>> resignation of OHS Director James Powers in 2010. In 2003, New Jersey
>> governor, Jim McGreevy appointed his lover, an Israeli government
>> operative and former IDF officer, to head that state?s ?Homeland Security
>> Department and later resigned, denouncing the Israeli, Golan Cipel, for
>> blackmail in late 2004. These examples are a small sample illustrating
>> the depth and scope of Israeli police state tactics intersecting in US
>> domestic repression.
>>
>> From hearing media accounts of NSA spying, the only data on Americans
>> that are collected are the times of phone calls and the identities of the
>> parties in the phone call. But, as noted above, the data collected go
>> well beyond that to include ?email accounts, Internet chats, browsing and
>> search histories.? Another Israeli company mentioned in the Haaretz
>> article with very broad-based spying capabilities is NICE, yet another
>> Israeli company with close ties to the Israeli government. NICE ?has
>> technology that is used to monitor some 1.5 billion people. In a brochure
>> published by the company itself, it describes how its system can analyze
>> conversations (including technology to make transcripts of phone calls),
>> and gather and analyze data from public sites. With these tools it can
>> build an intelligence file from millions of communications.? NICE?s
>> website describes itself:
>>
>> NICE solutions capture interactions, transactions and video surveillance
>> from multiple sources, including telephones, CCTV video feed, emergency
>> services radio communications, emails, chat, social media, and more.
>>
>> In other words, pretty much all communications can be monitored and, if
>> you represent a threat to the people with access to these operations, you
>> must assume that you are being monitored. (I know of no evidence that the
>> NSA employs NICE.) Although the company claims that its operations are
>> aimed at ?customers, criminals and terrorists, or fraudsters,? it?s not
>> at all far-fetched to be suspicious that the information obtained could
>> be used in a very wide range of operations, including insider information
>> on financial affairs. Sailer suggests that fear of having conversations
>> recorded may account for the concentration of elites in urban centers
>> like Washington, DC and New York, and he pointedly links to his previous
>> article on Jewish wealth, implying that insider information is a key to
>> Jewish wealth. However, even voice conversations are susceptible to NICE?s
>> technology. And the other side of the coin is that it would not be at all
>> surprising to learn that Jewish trading networks are privy to information
>> obtained by companies like NICE.
>>
>> The situation with the NSA is yet another example of what it means to
>> have a Jewish elite in the U.S.: Jewish spies who deliver vital computer
>> programs to Israel are not indicted. And despite a long history of
>> aggressive spying against the U.S., the NSA hires Israeli firms to do its
>> data collection, with nary a word heard in Congress or the media about
>> the obvious problems that presents.
>>
>> It?s good to be king.
>>
>> (22) Zionists in on the Plot - Brother Nathanael
>>
>>
http://www.realjewnews.com/?p=826>>
>> Edward Snowden?When Truth Becomes Treason
>>
>> By Brother Nathanael Kapner
>>
>> June 14, 2013 @ 1:05 am
>>
>> All the usual suspects are sharpening their teeth on America?s newest
>> whistleblower, Edward Snowden.
>>
>> Whoever Ed Snowden really is pales in comparison to his message?that
>> privacy and liberty in this disintegrating Republic are now virtually
>> GONE.
>>
>> Mr. Snowden hasn?t really said anything NEW?some are even suggesting he
>> was set up?but at the very least he has brazenly and boldly quantified -
>> right there on the main stream media - what many of us have realized for
>> years?that we have been, and are being, illegally surveilled 24/7/365.
>>
>> [Clip: ?Any analyst at anytime can target anyone at any selector
>> anywhere. But I sitting at my desk certainly had the authorities to
>> wiretap anyone from you, or your accountant, to a federal judge, to even
>> the president.?]
>>
>> It didn?t take long for those who ?hate our freedoms? to sink their fangs
>> into the future of this young man.
>>
>> America?s most hated woman, Jewish Senator Dianne Feinstein, head of the
>> Senate Intelligence Committee, joined Mike Rogers this past Sunday to
>> announce her black-hearted and hypocritical wish to ?prosecute? Edward
>> Snowden.
>>
>> [Clip: ?Is it fair to say that both of you believe that this
>> investigation should be pursued, and the source, if found, should be
>> prosecuted.? ?I absolutely think they should be prosecuted.?
>>
>> ?You too Senator Feinstein?? ?I do.?]
>>
>> The very next day, Feinstein?who?s hell-bent on trashing the 2nd
>> Amendment?had the audacity to tell reporters that Snowden has committed
>> an ?act of treason??soon echoed by John Boehner, who using Feinstein?s
>> playbook, defended their commonly-held malevolence with the over worn
>> script: ?We?re keeping American?s safe.?
>>
>> [Clip: ?Now to my exclusive interview with house speaker John Boehner, he
>> began our interview with some tough words for Edward Snowden.? ?He?s a
>> traitor. The president outlined last week that these were important
>> national security programs to help keep Americans safe.? ?It?s called
>> protecting America.?]
>>
>> The hacks on Capitol Hill just love this slogan.
>>
>> Why? Because ?keeping American?s safe? allows them to commit their own
>> crimes IN SECRET?all in the name of SECURITY for the ?homeland.?
>>
>> [Clip: ?We need to understand that in secrecy, the government has taken
>> laws that we have written and enacted to protect us, and it has used
>> those laws to destroy our personal dignity, and expose our inner most
>> thoughts and behavior to the whims of government bureaucrats.?]
>>
>> Speaking of political hags?I mean, hacks?the DNC?s Jewish chairwoman,
>> Deborah Wasserman Schultz, dug her own claws deep into Snowden, calling
>> him a ?coward? who should be ?extradited, arrested, and prosecuted.?
>>
>> [Clip: ?He should be extradited, arrested, and prosecuted. I mean that?s
>> exactly what should happen to him.?]
>>
>> Ron Paul expressed legitimate concern that Obama might send a drone after
>> Snowden?just one more morbid episode of Obama?s warrantless
>> assassinations of US citizens.
>>
>> [Clip: ?Where do you think he is right now? Are you worried about that??
>> ?I have no idea. Yeah, I?m worried about somebody in our government might
>> kill him with a cruise missile or a drone missile. I mean we live in a
>> bad time where American citizens don?t even have rights and that they can
>> be killed.?]
>>
>> But the message AND the messenger are ALWAYS attacked by THOSE whose
>> reputations are endangered: the policy-makers and actors who Snowdon AND
>> Greenwald exposed. The COVER is off.
>>
>> [Clip: ?We heard a lot of push-back from National Security people saying
>> ?well this is nothing new, this has been going on for some time, nothing
>> to see here, move along?? Now we?re hearing it?s gut-wrenching that it?s
>> a threat to American National Security. Which is it Glen??
>>
>> ?It?s neither of those. The reality is is that US Government officials
>> for many decades now and certainly over the last 10 years have been
>> abusing their secrecy power to shield from the American public not
>> programs that are designed to keep America safe and not prevent
>> disclosures that would help the terrorists, but to conceal their own
>> actions from the people they?re supposed to be democratically
>> accountable.?]
>>
>> And who specifically stands to have their reputations ruined?
>>
>> The same ones who pushed the ?war on terror? hoax which was the primary
>> tool to assault our privacy and freedoms.
>>
>> One of the most rabid campaigners for America?s illegal war on Iraq,
>> Richard Haass, Jewish president of the Council on Foreign Relations, was
>> tabbed on Morning Joe to refute Greenwald?s defense of Snowden.
>>
>> [Clip: ?The law was broken by one person who was Mr. Snowden.
>> Whistleblowers are people who uncover wrongdoing within their say
>> agencies or organizations. This is not wrongdoing, this is US policy.
>> This is not a whistleblower, this is someone who is going to make the
>> United States I believe less safe.?]
>>
>> Bull. In both the Zazi and Headling terrorist blockings that Feinstein
>> and Rogers keep on citing, neither data mining nor Prism had anything to
>> do with preventing their plots, but rather by conventional intelligence
>> methods employed NOT by America but by Britain.
>>
>> The smears continue by the Jewish vultures.
>>
>> Alleged adulterer, Jeffrey Toobin, Jewish legal analyst for CNN, after
>> writing in the The New Yorker that Snowden was a ?grandiose narcissist
>> who deserves to be thrown in prison,? had the gall to label the actions
>> of Mr. Snowden a ?disgrace.?
>>
>> [Clip: ?Stealing documents from the NSA and then turning them over to
>> Glen Greenwald is simply not the American way and I think it?s a
>> disgrace.?]
>>
>> Not the ?American way??
>>
>> Blowing the whistle on those who defraud Americans of their freedoms goes
>> back to the days when British tea was tossed into the Boston Harbor?long
>> before Toobin and his ilk ever made it to America?s shores. He?s got a
>> lot of nerve defining for Gentiles what the ?American way? is all about..
>>
>> Thank God there are a few notable Christians like Judge Napolitano and
>> Ron Paul?who?defying the Jewish smears?hail Snowden NOT as a traitor,
>> coward, felon, or disgrace? BUT as an American HERO.
>>
>> [Clip: ?I would describe this man as an American Hero, as a person
>> willing to risk life, limb, and liberty in order to expose to the
>> American people one of the most extraordinary violations of the American
>> principles, value judgments, and the constitution itself in all of our
>> history.?]
>>
>> When truth is labeled as treason, either our country is headed for ruin
>> or it?s a wakeup call for Americans to begin cleaning house.
>>
>> [Clip: ?You are a supporter of Edward Snowden and his actions. Why??
>>
>> ?Well, from what I hear and what he?s done. I mean he?s done a great
>> service because he?s telling the truth and this is what we are starved
>> for. The American people are starved for the truth. And when you have
>> dictatorship or an authoritarian government, truth becomes treasonous. I
>> think the president ought to send him a thank-you letter because he? the
>> President ran on transparency, and we?re getting a lot of transparency
>> now.?]
>>
>> Indeed. The ?transparency? we?re finally getting is from those who the
>> Jews want to put behind bars?whose civil disobedience is a mark of true
>> patriots?who really care about saving fallen America.
>>
>> --
>> Peter Myers
>> 381 Goodwood Rd
>> Childers Qld 4660
>> Australia
>> ph. in Australia: 07 41262296
>> from overseas: +61 7 41262296
>> website:
http://mailstar.net/index.html>> Skype video: petermyersaus . By prior arrangement only, after discussions
>> by email.