“Domestically, they’re pulling together all the data about
virtually every U.S. citizen in the country and assembling that information, building communities that you have
relationships with, and knowledge about you; what your activities are; what you’re doing. So the government is
accumulating that kind of information about every individual person and it’s a very dangerous
Former NSA Head Exposes Agency's True
Published on Apr 30, 2015
William Binney, a legendary NSA mathematician developed the revolutionary logic and
architecture that is now used to spy on everybody in the world. When the NSA decided to use his programs on US
citizens he became one of the biggest whistleblowers in the history of the NSA. He started the debate and the
avalanche of understanding in regards to illegal surveillance, and is revealing inside knowledge on some of the
biggest government secrets to date.
Help us spread the word about the liberty movement, we're reaching millions help us reach millions more. we all
want liberty. Find the free live feed at http://www.infowars.com/watch-alex-jo...
Ex-NSA Analysts on Their Top-Secret
Two former National Security Agency analysts talk about when they discovered the agency
was collecting more data on American citizens.
'NSA owns entire network anywhere in
- Whistleblower William Binney -
Published on Jul 4, 2014
NSA global reach is omnipresent. The US intelligence controls the entire cyber network
across the globe, violating individual piracy by storing endless data on its increasingly enlarged servers,
former NSA crypto-mathematician, William Binney, told RT.
The Ultimate Goal Of The NSA Is Total
At least 80% of all audio calls, not just metadata, are
recorded and stored in the US, says whistleblower William Binney – that's a 'totalitarian
by Antony Loewenstein
William Binney is one of the highest-level whistleblowers
to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but
resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.
On 5 July he spoke at a conference in London organised by the Centre for
Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama
“At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US
to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in
the US. The NSA lies about what it stores.”
The NSA will soon be able to collect 966
exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the
beginning of humankind until 2003 amount to only five exabytes.
Binney, who featured in a 2012 short film by
Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government
“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some
Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect
contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out
but fear retribution and exile, not unlike Snowden himself, who is likely to remain there
for some time.
Unlike Snowden, Binney didn’t take any documents with him when he left the NSA. He now says that hard evidence
of illegal spying would have been invaluable. The latest Snowden leaks, featured in the Washington Post, detail
private conversations of average Americans with no connection to extremism.
It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their
daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism
but inside the US it has stopped zero attacks.”
The lack of official oversight is one of Binney’s key concerns, particularly of the
secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the
surveillance scheme's constitutionality.
“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to
consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can
double that globally.”
A Fisa court in 2010 allowed the NSA to spy on 193 countries around the world,
plus the World Bank, though there’s evidence that
even the nations the US isn’t supposed to monitor – Five Eyes allies Britain, Canada, Australia and New
Zealand – aren’t immune from being spied on. It’s why encryption is today so essential to transmit information
Binney recently told the German NSA inquiry
committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US
society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked
the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over
The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The
Pew Research Centre released a report this month,
Digital Life in 2025, that predicted worsening state control and censorship,
reduced public trust, and increased commercialisation of every aspect of web culture.
It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of
Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy
it is for governments and corporations to capture our personal information without us even realising.
Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of
this money is
wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a
killing from the gross exaggeration of fear that permeates the public domain.
Wikileaks understands this reality better than most. Founder Julian Assange and
investigative editor Sarah Harrison both
remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week,
where he continues to work, release leaks, and fight various
legal battles. He hopes to
resolve his predicament soon.
At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work
with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where
there’s technical assistance from people like Jacob Appelbaum.”
A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group
news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison
With 8m documents on its website after years of leaking, the
importance of publishing and maintaining source documents for the media, general public and court cases can’t be
under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”
evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney
said: “I call people who are covering up NSA crimes traitors”.
NSA Edward Snowden: 'I
don't want to live in a society that does these sort of things'
NSA - KNOWING ALL ABOUT US
Nightly News: Obama's NSA Close to Knowing All About Us
TECHNOCRACY - A form of government in
which scientists and technical experts are in control "technocracy was described as that society in which those
who govern justify themselves by appeal to technical experts who justify themselves by appeal to scientific
forms of knowledge"
The Roots of Technocracy with Expert Patrick M.
Breaking: NSA Gestapo Ban 1st Amendment, Confiscate
NSA data center employees surround Anthony Gucciardi and team to confiscate all cameras and
attempt to delete all footage. This special breaking report broadcast live on air covers the event with HD footage.
The National Security Agency was
well aware it was committing violations of surveillance rules, according to newly declassified documents. The NSA
self-reported the violations to a US intelligence court, and promised to enact new safety measures to prevent the
violations from recurring. Despite the acknowledgement, the NSA broke its own rules again in 2009, according to
FISA Court documents.These revelations come after similar ones in September that the NSA
broke its own rules and mislead the FISA Court regarding bulk data collection.
Mastering The Human
Who You Are – Collected information includes names, addresses, biometrics,
social media accounts .
What You Do – Travel history, communications, financial transactions and
movement of physical assets.
Who You Know – Relational information including family, friends, associates
Context – Contextual data such as demographics, politics, cultural norms
Acloser look at the
upcoming Jade Helm military exercise, specifically its “master the human domain” motto, reveals a larger agenda in
regards to domestic policy.
...“They’re building an infrastructure of tyranny,” stated Infowars David Knight.
“There’s a legal infrastructure with things like the NDAA, there’s a technical
infrastructure with things like the capability to do dragnet surveillance, and then of course there is going to be
a military and law enforcement infrastructure, and those are merging.”
The National Security Agency was well aware it was committing violations of surveillance rules,
according to newly declassified documents. The NSA self-reported the violations to a US intelligence court, and
promised to enact new safety measures to prevent the violations from recurring. Despite the acknowledgement, the
NSA broke its own rules again in 2009, according to FISA Court documents. These revelations come after similar
ones in September that the NSA broke its own rules and mislead the FISA Court regarding bulk data collection.
RT's Ameera David has the reaction from the FISA Court that the NSA overstepped its boundaries and ignored
Fears Arrest and is Running Scared From NSA Scandal
Obama is so desperate to
brush aside the governments illegal NSA spying activity that he compared it to the actions of patriot Paul
Read more here: http://www.infowars.com/obama-justifi...
In a speech that was billed as an announcement of "reforms" to the NSA's mass spying practices, the
president argued that the US has a long history of defending liberty by conducting surveillance. Obama even
cited Paul Revere, in remarks clearly designed to justify government spying on its own citizens.
#Obama's justification for #NSA spying: "but Paul Revere did it first!"
— Paul Weiskel (@PWeiskel08) January 17, 2014
To virtually no one's surprise, the president's "reforms" will not stop NSA's mass spying, and this was
immediately evident in the opening remarks of Obama's speech when he attempted to argue that in times of
war, the US has always used surveillance to secure freedom.
"At the dawn of our Republic, a small, secret surveillance committee borne out of the "The Sons of Liberty"
was established in Boston." Obama stated. "The group's members included Paul Revere, and at night they
would patrol the streets, reporting back any signs that the British were preparing raids against America's
Note how in the first sentence, using incredibly Orwellian tactics, Obama has twisted the facts to link
spying to patriotism, and to suggest that the earliest American icons were engaged in the same sort of
activity as today's NSA.
Obama then went on to cite the Civil War, World War II, and the Cold War, arguing that "Throughout American
history, intelligence has helped secure our country and our freedoms."
The government's defense of constant
surveillance of the American public has reached a new level of absurdity
CEO Billionaires Defend NSA
The government's defense of constant surveillance of the American public reached a new
level of absurdity when Obama compared Paul Revere to the NSA. Now it's time for the corporate billionaires to
defend what their puppet Obama can't. Enter Bill Gates and Marc Andreesen to tell that we need to trust the NSA
and we're too stupid to understand the technology. William Binney, former Technical Director of the NSA
worldwide understood the technology and has been telling us that the NSA is breaking the law.
Glenn Greenwald "The Goal Of The U.S.
Government Is To Eliminate ALL Privacy Globally!"
- While the government initially claimed
that mass surveillance on Americans prevented more than 50 terror attacks, the NSA’s deputy director John Inglis
walked that position back all the way to saying that – at the most – one (1) plot
might have been disrupted by the bulk phone records collection alone. In
other words, the NSA can’t prove that stopped any terror attacks. The government
greatly exaggerated an alleged recent terror plot for political purposes (and promoted the fearmongering of serial liars). The argument that recent terror warnings
show that NSA spying is necessary is so weak that American counter-terrorism experts have slammed it as
- The feds are considering prosecuting the owner of a private email company –
who shut down his business rather than turning over records to the NSA – for refusing to fork over the
information and keep quiet. This is a little like trying to throw someone in jail because he’s died and is no
longer paying taxes
- Mass spying creates an easy mark for hackers. Indeed, the Pentagon now sees the collection of “big data” as a “national security threat” … but
the NSA is the biggest data collector on the planet, and thus provides a tempting mother lode of information for
NSA vs USA: Total surveillance zooms-in on
Ever evolving high-tech gadgets and the Internet have given Big
Brother a peep hole into the lives of everyday Americans. Now, without the hassle of planting bugs or breaking
and entering, the government can monitor virtually anything it wants.
Google & NSA Relationship Under Wraps
If the biggest internet company and the biggest
surveillance agency work together do you think we, the public, have a right to know? Well the courts don't
think so. Alyona talks to activist at the Electronic Frontier Foundation, Trevor Timm about the NSA and
Google's secret relationship.
Spying on Everyone: Craig B. Hulet Reports
Threatened with 35 Years in Prison, Warns of Developing Tyranny
Thomas Drake blew the whistle on a massive domestic information
gathering scheme and was called "an enemy of the state" (speech at Sam Adams Awards)
Telecom Insider: Everyone Is
Rob Dew speaks with Critical Infrastructure Consultant James Knox about the NSA and
how far they will go to spy on you.
History... The Origins of the U.S. Intelligence Community
& Why It Spies on Americans
Tonight, on History So it doesn't Repeat: We ask the question: Is America safer, now that we're
openly being spied on? We'll discover how to check our premises, and peer into the origins, form, and function
of the intelligence Community. By studying those who spy on us, we'll uncover the root-causes of the War on
Terror; and you will have the facts to help end it. Learning's the Answer, What's the Question? It's all coming
up next, on History So It Doesn't Repeat.
Exposing 'Five Eyes' Global Surveillance Cabal Big Brother
Description: Abby Martin takes a closer look at a recent NSA leak which links the US, UK,
Australia, Canada and New Zealand as an international intelligence partnership focused on surveillance of each
NSA Spying: False Hope vs. Real
(IMPORTANT - PLEASE SHARE)
In this special edition of The Boiling Frogs Post Eyeopener report, James introduces new members of the
irate minority to the problem, as well as the false hopes (and real solutions) that are available to
address that problem.
Description:This week on The Corbett Report we present a special audio and video edition of
the podcast/vodcast. This week we delve into the true history of the illegal NSA wiretap program and how it
connects to the bigger picture of government surveillance.
Documentation – CALEA and the Stellar Wind (video)
Begin watching the YouTube video version of this episode here.
Cryptome welcomes documents for publication that are prohibited by governments
worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use
technologies, national security, intelligence, and secret governance — open, sec
US agency would need a facility the size of Europe to store
physical copies of information it will hold
July 5, 2013
A stunning info-graphic put together by a German data
company reveals just how expansive the NSA’s data retention program has become.
In the wake of the Snowden revelations, eyes have been trained on the NSA and its almost completed new facility
in the Utah desert.
the NSA’s warrantless wiretapping program has grown in gargantuan proportions and now intercepts 1.7 billion US
electronic communications every single day. Those communications will soon all be funneled through the top secret $2 billion spy center, which the NSA has refused to provide Congress with details
Comparing the NSA to the East German Stasi, experts at Open Data City in Berlin, decided to visualize the scope of both spy agencies, to make
a point of how much further advanced the NSA is.
The shaded area on the left shows how much physical space the Stasi encompassed in Berlin, then compares the
space the NSA would need if it had physical copies of all the information it is capable of storing.
“They would have plenty of space with five zettabytes to store at least something on the order of 100 years
worth of the worldwide communications, phones and emails and stuff like that,” Binney asserts, “and then have
plenty of space left over to do any kind of parallel processing to try to break codes.”
Open Data City notes that a filing cabinet requires 0.4 m square, and can hold about 60 folders containing
roughly 30,000 pages of paper, which equates to somewhere in the region of 120 MB of data.
Given these facts, the Utah data center, if it were to store printed copies of all the information it can hold,
would consume about 17 million square kilometers of space. The shaded area in the image below shows you how much
space that is. It pretty much covers the entire continent of Europe.
In comparison, the Stasi Records Authority spanned a mere 200 kilometers at its facility in Berlin.
Consequently, the NSA can hold nearly 1 billion times more data than the Stasi could.
Of course, there is no need to worry, for the NSA vows that it only targets terrorists and extremists, just
liked the Stasi did.
Steve Watson is the London based writer and editor for Alex Jones’ Infowars.com, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of
Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from
Nottingham Trent University.
This article was posted: Friday, July 5, 2013 at 11:59 am
“Fascism should more appropriately be called Corporatism
because it is a merger of state and corporate power.” -Benito
Aaron Dykes & Alex Jones Infowars.com May 27, 2012
The takeover of the Internet
is literally a fascist partnership between Google, the NSA, US CYBERCOM and other key entities. In recent weeks, a
court refused todisclose the
links between Google and the NSA, but obviously it confirms the important
bleed over that has long been documented and exposed.
General Keith Alexander, head of both the NSA & CYBERCOM,
whomeets annually at Bilderberg with the likes of
Google’s Eric Schmidt, Microsoft’s Craig J. Mundie (and former CEO Bill Gates), Facebook’s founders & funders
and others, recentlytestified to the Senate Armed Services Committee about US CYBER COMMAND’s mission.
Gen. Alexander endorsed
theDepartment of Homeland Security’sBlueprint for a Cyber Secure Future, which he
helped write and give feedback on. “We welcome and supportnew
statutory authorities for DHS that would ensure this information sharing takes
place; an important reason why cyber legislation that promotes
this sharing is so important to the nation.”
Alexander further stated, “Foundational to [CYBERCOM's mission] is
theinformation sharing that must go on between the federal
government and private sector, and within the private sector, while
ensuring measures and oversight to protect privacy and preserve civil liberties.” Aside from the recognition of
civil liberties that is merely for public consumption, this is a stark admission of the massive data theft that has
been going on unchecked for sometime.
Such data mining, along with “identity-based access controls to services” (eerily
close to fellow Bilderberger Neelie Kroes, of the EU Commission, would supposedly allow the prevention and
detection of cyber crimes, hack attacks and any plans for “big” events like a (cyber) terror attack. To prepare for
such paralyzing and potentially catastrophic events, CYBERCOM has done what it does best–go on the
offensive. Information Week reports:
National Security Agency director and Cyber Command commander Gen. Keith
Alexander said in October that “the advantage is on the offense” regarding cyber, and that the government
should in some cases go after botnets and other malicious actors. Then, in November, the Defense Advanced
Research Projects Agency (DARPA) for the first time publicly discussed the
fact that it was doing research into offensive cyber capabilities.
Gen. Alexander further bragged about CYBERCOM’s first major tactical exercise,
dubbed “CYBER FLAG”, in which operators “engaged in realistic and intense simulated cyber combat against ‘live’
opposition.” Top brass at the Pentagon and numerous intelligence agencies, who are also involved in CYBERCOM
according to Alexander, also participated in the multi-day exercise. Alexander cautioned that “CYBER FLAG was no
mere drill, but a training exercise for those necessarily engaged in cyber operations now.” Wow.
US CYBERCOM, which is literally housed inside the National Security Agency (NSA),
has only been in existence for two years and only operational for a little over a year, yet is eager to expand its
powers in effort to guard the nation, its government agencies and peoples from cyber threats far and wide. Gen.
Alexander cited numerous attempts to bring down military networks and those of their contractors. Hackers groups
including Anonymous and LulzSec made 2011 the “Year of the Hacker,” Alexander told Congress, and things are clearly
just getting started. Stuxnet (admittedly launched jointly by the U.S. & Israel) and other incidents have made
The National Security
Agency is, by nature, an extreme example of thee-hoarder. And as the governmental organization
responsible for things like, say, gathering intelligence on such Persons of Interest asOsama bin Laden, that impulse makes
sense–though once you hear the specifics, it still seems pretty incredible. In a story aboutthe bin Laden mission, the NSA very
casually dropped a number: Every six hours, the agency collects as much data as is stored in the entire Library
That data includes transcripts of phone calls and in-house discussions, video
and audio surveillance, and a massive amount of photography. “The volume of data they’re pulling in is huge,”
said John V. Parachini, director of the Intelligence Policy Center at RAND.
Utah will be home to NSA’s
mega-surveillance program under the aegis of the formerly secret Comprehensive National Cyber-security
The NSA is not empowered to track down
Latvia hackers but to keep tabs on Americans who disagree with the government.
“Today’s groundbreaking for a $1.5 billion National Security Administration data
center is being billed as important in the short term for construction jobs and important in the long term for
Utah’s reputation as a technology center,” reportsDeseret News today.
“This will bring 5,000 to 10,000 new jobs during its construction and development
phase,” boasted Sen. Orrin Hatch, R-Utah. “Once completed, it will support 100 to 200 permanent high-paid
The new “data center” will probably function as the Department of Homeland
Security’s “Social Networking Monitoring Center,” an effort outed late last year by the Electronic Frontier
Foundation. TheEFF inititated a FIOA request and received documents revealing that the DHS vacuums up data and “items of interest” on
the American people.
The DHS used the system tomonitor social media networks during Barry Obama’s inauguration. “DHS collected a massive amount of data on
individuals and organizations explicitly tied” to the inauguration, according to thedocuments obtained
by the EFF.
The DHS-NSA collaboration to surveil the American people is part of National
Security Presidential Directive 54/Homeland Security Presidential Directive 23, signed by Bush in early 2008. “This
initiative created a series of classified programs with a total budget of approximately $30 billion. Many of these
programs remain secret and their activities are largely unknown to the public,” reportsPublic Intelligence.
The Comprehensive National Cybersecurity Initiative scheme is a textbook example
of fascism. CNCI is described as “an effort to encourage information sharing between the public and private sector
called ‘Project 12′,” in other words an effort by the government roll over the private sector.
PI “recently acquired the keyreport from the Project 12
meetings:Improving Protection of Privately Owned Critical Network
Infrastructure Through Public-Private Partnerships. This 35-page, For
Official Use Only report is a guide to creating public-private partnerships that facilitate the implementation of
‘actionable recommendations that [reflect] the reality of shared responsibility between the public and private
sectors with respect to securing the nation’s cyber assets, networks, systems, and functions’.”
Project 12 emphasizes the “promotion of public-private partnerships that legalize
and facilitate the flow of information between federal entities and private sector critical infrastructure, such as
telecommunications and transportation.”
So-called public-private partnerships are based on the economic model proposed by
Italy’s dictator, Benito Mussolini, the former radical socialist and the grand daddy of fascism.
“The ultimate goal of these partnerships” an analyst writes, “is not simply to
increase the flow of ‘threat information’ from government agencies to private industry, but to facilitate greater
‘information sharing’ between those companies and the federal government.”
Cyber-security is the next phase in the war on terror, in actuality a war on the
American people, or more specifically on American citizens who disagree with the government and threaten to
overturn the statist apple cart through political activism.
The Stasi-like apparatus to be built for the NSA and DHS by the death merchant
Raytheon’s Intelligence and Information Services division “would rely on a set of sensors deployed in computer
networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber
attack,” according to theWall Street Journal.
“The overall purpose of the [program] is our Government… feel[s] that they need to
insure the Public Sector is doing all they can to secure Infrastructure critical to our National
Security,”Tim Shorrock wrote
for CorpWatch last year.
As noted by the Wall Street Journal, the the program – known as Perfect Citizen
and described as theNSA’s perfect spying tool – will have major implications “beyond the critical infrastructure sector,” in other
words it will transcend so-called cybersecurity and engineered threats absurdly hyped by the government and its
Mockingbird propaganda asset, the corporate media.
In addition to suspect enemies of the state protesting against illegal and immoral
wars, the NSA has expended a vast amount of resources in its effort to surveil average Americans. “The NSA program
reaches into homes and businesses across the nation by amassing information about the calls of ordinary Americans —
most of whom aren’t suspected of any crime,”USA Today reported
USA Today misses the point. The idea is not to track down criminals and supposed
terrorists, but to track and trace the American people and keep tabs on their political activity. If need be, this
political activity can be “neutralized,” asJ. Edgar Hoover put
it when he described the FBI’s COINTELPRO, the illegal covert program to destabilize and render ineffective
political movements and on occasionassassinate their leaders.
Job One for government is to protect at all cost its monopoly on power. Osama bin
Dead and his gaggle of CIA trained patsies do not threaten the fascist partnership between the government and
multinational corporations – politically active citizens do.
FBI unit to spy on all
communications, including skype conversations
Steve Watson Infowars.com May 24, 2012
As if the government were not engaging in enough surveillance of law
abiding Americans already, two major developments just ensured that the snooping will increase
Firstly, the FBI is about to launch a huge new surveillance unit that will have
the ability to monitor all internet and wireless communications, including internet Skype conversations.
The incredibly Orwellian titled Domestic Communications Assistance Center, will
“assist” local, state, and federal law enforcement agencies in spying on the American people.
After reviewing a multitude of government documents and interviewing sources
involved with the FBI unit,Declan McCullagh of
“DCAC’s mandate is broad, covering everything from trying to intercept and
decode Skype conversations to building custom wiretap hardware or analyzing the gigabytes of data that a
wireless provider or social network might turn over in response to a court order. It’s also designed to serve
as a kind of surveillance help desk for state, local, and other federal police.”
McCullagh notes that the unit has been in the pipeline for years and that
spearheading it will be the FBI’s massive wiretapping project, which was allocated $54 million by a Senate
committee last month.
McCullagh has alsoextensively reported on the FBI’s push to make it law to require social-networks and providers of VoIP,
instant messaging, and Web e-mail to build in backdoors for government surveillance.
The Bureau is reportedly urging Internet and communications companies not to
oppose the move.
We want to “be able to obtain those communications,” FBI Director Robert Mueller
said last Wednesday. “What we’re looking at is some form of legislation that will assure that when we get the
appropriate court order that those individuals — individual companies are served with that order do have the
capability and the capacity to respond to that order.”
The second major development on the government surveillance front is that a Senate
Panel has voted this week to extend the government’s authority to engage in warrantless wiretapping.
The Senate Select Committee on Intelligence voted to extend through to June 2017
the 2008 provision of the Foreign Intelligence Surveillance Act (FISA).
The provision would allow the government to continue monitoring e-mails and phone
calls of those it considers to be “terrorism suspects.”
The American Civil Liberties Union has filed a lawsuit challenging the 2008
law, arguing that it allows dragnet surveillance that could pick up Americans’ communications. But many current
and former administration officials disagree, saying any collection of communications by Americans would be
incidental and subject to procedures to shield their identities.
In a joint statement, committee Chairman Dianne Feinstein (D-Calif.) and
ranking Republican Saxby Chambliss (Ga.) said the law’s provisions have provided necessary intelligence to
fight terrorism and understand adversaries’ intentions around the world. “These authorities cannot be allowed
to expire, and we urge quick action by the Senate and the House,” they said.
The FISA provision introduced in 2008 was merely a confirmation of activity that
government spy agencies, such as the NSA, have beenengaging in for years.
The ACLU recently released an infographic (below) detailing how the NSA’s
warrantless wiretapping program has grown in gargantuan proportions and now intercepts 1.7 billion US electronic
communications every single day. Those communications will soon all be funneled through thetop secret $2 billion spy center in the Utah
desert, which the NSA has refused to provide Congress
with details of.
Obama employs tried and true “gaslighting”
June 7, 2013
As much as we’d like to believe in president Obama’s
reassurances that nobody is listening to our phone calls, what we’ve gleaned from whistleblowers in the past tells
a very different story.
For instance, National Security Agency whistleblower William Binney, last year stated,
“Domestically, they’re pulling together all the data about virtually every U.S. citizen in the country and
assembling that information, building communities that you have relationships with, and knowledge about you;
what your activities are; what you’re doing. So the government is accumulating that kind of information about
every individual person and it’s a very dangerous process.”
Binney has direct insider knowledge, having worked for the NSA for a staggering 32 years as technical director.
Binney says he built the back-end for a program that has since been redirected towards the American people,
tracking and logging every citizen’s phone calls, texts, emails, Google searches, and even social network
The central hub for all recorded activities is said to be a data storage facility in Bluffdale, Utah with,
reportedly, the capacity to store 100 years worth of data.
The London Telegraph even produced a mini-documentary on the subject titled, “The Program (Stellar Wind),” a
project they introduced as follows: “Following 9/11, the National Security Agency began a top-secret surveillance
program to spy on U.S. Citizens without warrants.”
And again this year, an insider let slip yet another bombshell.
When the FBI began investigating bombing suspect Tamerlan Tsarnaev’s girlfriend Katherine Russell’s possible
involvement in the Boston Marathon bombing, a former FBI counterterrorism agent blurted out on CNN’s Erin Burnett
Show that the government has the capability to go back and find out exactly what was said in conversations.
Here’s the exchange between former FBI agent Tim Clemente and Burnett, courtesy of Glenn Greenwald:
BURNETT: Tim, is there any way, obviously, there is a voice mail they can try to get the phone companies to
give that up at this point. It’s not a voice mail. It’s just a conversation. There’s no way they actually can
find out what happened, right, unless she tells them?
CLEMENTE: “No, there is a way. We certainly have ways in national security investigations to find out
exactly what was said in that conversation. It’s not necessarily something that the FBI is going to
want to present in court, but it may help lead the investigation and/or lead to questioning of her. We
certainly can find that out.
BURNETT: “So they can actually get that? People are saying, look, that is incredible.
CLEMENTE: “No, welcome to America. All of that stuff is being captured as we speak whether we know it or
like it or not.”
Of course, Obama is just the current frontman, teleprompter-reading puppet. This form of invasive spying has
been ongoing since 9/11, started under Bush and merely passed on to Obama.
Plus, if he were to openly admit every American’s electronic data has, for a long time now, been monitored, it
would possibly put a rather large snag in their multi-billion dollar intelligence front. And besides, what’s a
president for if not to reassure everyone that everything is perfectly alright?
Obama employs tried and true “gaslighting” technique
“That’s not what this program is about,” Obama said. But according to William Binney, that’s exactly what it’s
about. Obama, in his official capacity, is engaged in desperate damage control and is employing a psychological
technique known as gaslighting, whose meaning derives from a 1938 stage play.
Gaslighting is when you’re told false information repeatedly, over and over again until you start to doubt your
own perceptions and memory and start believing what you’re being told.
For example, a person walks up to you and asks if you’re OK because you just took a spill. You’re sure you’ve
been standing upright the entire time, but the person insists you’ve just had a fall and persists in asking if
you’re OK until you concede that you must have fallen and finally thank the person who walked up to check on
Another form of this also occurs in George Orwell’s novel 1984 – which is highly recommended reading now more
than ever – when the lead character Winston, after a long bout of imprisonment and refusal to cooperate, began
writing the words, “Freedom is slavery,” and “two and two make five,” whereas prior to his enslavement he knew
these things to be contradictory or outright false.
We are now very much in Winston’s shoes, as we are expected to digest everything the president spews from on
high, unquestionably and without contemplation or hesitation.
Verizon is being forced by the government to disclose telephone
records of all of its customers. Those of us who want our call records to be private are being forced to
reveal them to the government. We can’t keep them private even if we want to. What is wrong with the government
spying on us in this way?
Murray Rothbard has made a clear and correct libertarian case against any compulsory speech. As I
understand this, our thoughts are our own. They are private. Our imaginings are our own. Our fantasies are our own.
We can imagine the most heinous crimes and plan them out in our minds if we wish. We can have any sexual fantasies
we wish to have. We can indulge in as many hateful, malevolent and spiteful thoughts as we wish. We can have
private saintly wishes, fond hopes, mistaken views, ill-formed ideas, flashes of genius, communications with God or
with the devil, atheistic thoughts, artistic ideas, or superstitions. I hardly scratch the range of what we can
think. It is that vast. If it is illegitimate, in the libertarian world explained by Rothbard, to use force against
a non-aggressor, then no one has a right to make us talk or to make us reveal our thoughts because our thoughts are
not aggressions. That’s one argument.
Here’s a second argument. If force is allowable to be used on people’s thoughts, two kinds of results will rise
in frequency. First, people will be forced to reveal thoughts that they don’t want revealed because they consider
them damaging to themselves or others. People simply could not get along with one another if what people thought of
each other or knew about each other were revealed or could be revealed or were made to be revealed. Society would
break down. Second, people will be forced not to reveal thoughts that they want to be revealed, such as new ideas
that go against conventional wisdom. Think of the suppression and persecution of Galileo. Both kinds of results
cause costs to the person and society. The right to think and speak and the concomitant right to think and not
speak limit these two costs.
Free speech extends to related activities. If you have a right to speak or not to speak, then you have a right
to commit your thoughts to paper and keep the paper private. You have a right to communicate your thoughts to
others and keep that contact private. Speech extends to joint communications with others and to the making of joint
plans. It extends to using various means of communication, such as paper and electronic devices. These actions are
natural extensions of free speech and the same libertarian-law reasoning applies.
You can privately conspire by yourself or with others (plan) to build the most marvelous energy-saving device,
or you can privately conspire (plan) to dope a horse in a horse race. The latter cannot be a crime because you
haven’t actually doped the horse. Furthermore, you can change your mind and not dope that horse. Neither one of
these private plans, for good or ill, invades the rights of others. Both are exercises of one’s rights. Yes, it is
no crime to plan a crime, by this reasoning. To say otherwise opens up the Pandora’s Box of controlling all speech
(and associated behavior) in the name of preventing crime and of finding people guilty of thought crimes, as
opposed to actual crimes. This is rank totalitarianism. The government engages in this via conspiracy laws.
Verizon is an intermediary. The government is essentially making you and me send them a record of our calls.
I’ve made three arguments against this, all of them viewing this as going against free speech and as an invasion of
First, under libertarian law reasoning, making you reveal your records when you have committed no crime is an
aggression and illegitimate. Second, if such aggression is permitted, it results in two serious costs, which are
associated with revealing speech that people want kept private and suppressing speech that people want made widely
known. Third, such aggression is part and parcel of a totalitarian mindset that, by extension, attempts to control
speech as a preventive measure and find people guilty of thought crimes that have aggressed against nobody.
What the government is doing to Verizon’s customers is wrong for these reasons.
The government argues that it’s going to use the data to catch terrorists or potential terrorists who intend to
violate rights of innocent people. The government is for sure invading our free speech rights against the slim
possibility that terrorists will invade our lives. Which of these is a greater threat to us? Our own government’s
totalitarian moves in the past 10 years or potential terrorists who are being encouraged by our own government’s
Can any rights ever be secured by a government that believes it is proper for it to invade some or many rights
in order to secure others? Isn’t this yet another Pandora’s Box? Isn’t a government with this kind of power wide
open to invading any rights it pleases?
The National Security Agency has obtained direct
access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret
document obtained by the Guardian.
The NSA access is part of a previously undisclosed program called PRISM, which allows officials to
collect material including search history, the content of emails, file transfers and live chats, the
The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation –
classified as top secret with no distribution to foreign allies – which was apparently used to train
intelligence operatives on the capabilities of the program. The document claims “collection directly from
the servers” of major US service providers.
Madsen’s report breaking US spying on Europe killed by
October 30, 2013
Long before NSA contractor Edward Snowden’s revelations
regarding German Chancellor Angela Merkel emerged, investigative journalist and former NSA technician Wayne Madsen
had relayed key intel based on information obtained through confidential sources outlining the NSA’s secret
backroom deals with several European countries.
For 12 years, Madsen worked with the NSA and witnessed firsthand how Americans’ private data got pilfered,
sifted through and logged on a daily basis. He has since taken up post as one of the most influential muckraker
journalists of our time, working to shed light on the surveillance state’s piecemeal deconstruction of the
Constitution, as well as expose corruption of the beltway elite.
More recently, Madsen’s name was in the news, ironically, when it was cut from the news.
Following the hailstorm of media attention generated by
Snowden’s PRISM leaks, Madsen said he felt obliged to speak out after seeing world leader after world leader feign
incredulity at the NSA spying news.
In a 2013 Guardian article
published in late June, Madsen revealed to Observer writer Jamie Doward, that, according to his research and
sources, the U.S. was engaged in secret backroom deals with at least six European Union member states,
including Germany, and that leaders, such as German Chancellor Merkel, would have been well aware of this.
Madsen said the countries had “formal second and third party status” under signal intelligence (sigint)
agreements that compels them to hand over data, including mobile phone and internet information to the NSA if
Under international intelligence agreements, confirmed by declassified documents, nations are
categorised by the US according to their trust level. The US is first party while the UK, Canada, Australia and
New Zealand enjoy second party relationships. Germany and France have third party relationships.
“I can’t understand how Angela Merkel can keep a straight face – demanding assurances from Obama and the UK – while Germany has entered into those exact
relationships,” Madsen told PrivacySurgeon.org’s Simon Davies back in June.
“She’s acting like inspector Reynaud in Casablanca: ‘I’m shocked – shocked – to find gambling going on
London’s prestigious newspaper drummed out both an online and a print version of the scoop, both of which underwent cutting room floor executions, but
not before dozens of news outlets had already latched onto the story and either reprinted or reported on it.
Now, reports that the German Chancellor’s phone may have been tapped have once again surfaced, and right on cue
Germany is pretending they know nothing.
But exposing collusion on international spy networks is just a run-of-the-mill occurrence for Madsen, who’s been
at it for longer than two decades.
In 1999, Madsen revealed what “may be the greatest intelligence scam of the century: For
decades, the US has routinely intercepted and deciphered top secret encrypted messages of 120 countries.”
In 2009, he shed light on the NSA’s “Q group,” a counter-intelligence security group comprised of
about 1,000 agents working with the FBI and local law enforcement to prosecute and harass journalists and
federal whistleblowers, especially those working to tie the federal government to the attacks of 9/11.
His information came from leaked documents uncovered in 2005 regarding a program known as “Firstfruits,” which detailed how, during the Bush administration,
the NSA “eavesdropped on the private conversations and e-mail of its own employees, employees of other U.S.
intelligence agencies — including the CIA and DIA — and their contacts in the media, Congress, and oversight
agencies and offices.”
In 2008, sources told Madsen that one of the alleged customers of “DC Madam” Deborah Jeane Palfrey, who ran an
upscale escort service in Washington DC for thirty years, was possibly former Vice President Dick Cheney, a
statement Palfrey could neither deny nor confirm. Following Madsen’s bombshell, Palfrey “committed suicide,” mere months after telling the Alex Jones Show, and others,
that she would never kill herself.
In an article published at the time, Madsen highlighted the case of investigative journalist
Jack Anderson, whose reportage was a detrimental nuisance to the Nixon Administration. In describing discussions
over how the pesky columnist could be assassinated, Madsen mentioned that “Staging an automobile accident in
which Anderson would be incinerated was also an option,” a scenario mirroring what we may have seen played out
earlier this year when Rolling Stone journalist Michael Hastings’ Merecedes burst into flames after crashing into a tree.
On yesterday’s Alex Jones Show, Alex asked what the next big NSA spying revelation would be. Madsen answered
that we should soon learn that the phones of high profile figures, such as the Pope, Nelson Mandela and the Dalai
Lama, were also tapped, further leading the public to feel helpless under the barrage of assaults against their
Indeed, the suppression of Madsen’s information, only to have it surface months later, shows the extent to which
the establishment watches the independent media and carefully controls much of what goes out in print.
In other words, Madsen’s the real deal.
This article was posted: Wednesday, October 30, 2013 at 12:38 pm
Not only does the NSA snoop your personal communications,
the agency also excels at infecting computer networks with malicious software.
Recently discovered Snowden information reveals the NSA infected more than 50,000
computer networks worldwide with malware, the Dutch news outlet NRC.nl reports.
Edward Snowden, the former NSA analyst roundly excoriated by government as a dangerous leaker, has revealed that
more than 50,000 computer networks worldwide have been infected.
A management presentation shows how the surveillance agency uses “Computer Network Exploitation” (CNE) in more
than 50,000 locations. “CNE is the secret infiltration of computer systems achieved by installing malware,
malicious software,” reports the Dutch website, NRC.nl.
The NSA has a special department dedicated to malicious hacking. Tailored Access Operation, or TAO, has more
than a thousand hackers hired to go after targeted networks.
In August, the Washington Post reported that TAO had installed an estimated 20,000 “implants”
beginning in 2008 and by the middle of last year the number had jumped to 50,000. The implants act as “sleeper
cells” that are controlled at will.
“Computer hacks are relatively inexpensive and provide the NSA with opportunities to obtain information that
they otherwise would not have access to,” write Floor Boon, Steven Derix and Huib Modderkolk. “The NSA-presentation
shows their CNE-operations in countries such as Venezuela and Brazil. The malware installed in these countries can
remain active for years without being detected.”
NSA referred inquiries about the revelations to the U.S. government. A government spokesperson said the
disclosure of classified information endangers U.S. national security.
This article was posted: Saturday, November 23, 2013 at 11:22 am
One of the few rights which we thought the government still respects is the the 3rd Amendment, which prohibits
the government forcing people to house troops:
No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time
of war, but in a manner to be prescribed by law.
But security expert Jacob Appelbaum notes that the NSA may be digitally violating the 3rd
By way of background, this week Appelbaum was the main force behind an expose in Spiegel – and gave a must-watch talk – on the NSA’s systemic offensive programs to commandeer
computers and computer systems, phone connections and phone systems, and communications networks of all
Appelbaum shows that the NSA has literally taken over our computer and our phones, physically intercepting laptop shipments
and installing bugware before themselves shipping the laptop on to the consumer, installing special hardware
that overcomes all privacy attempts, including “air gaps” (i.e. keep a computer unplugged from the Internet).
Appelbaum also notes that spyware can suck up a lot of system resources on a computer or smartphone.
And he says this is the digital equivalent of soldiers being stationed in our houses against our will:
The parallel might not be as far-fetched as it may seem at
The NSA itself says that it’s in the middle of a
massive cyber war. As such, malware, physical spying devices and offensive internet workarounds are literally
the main troops in the NSA’s offensive cyber army.
Quartering meant that Colonial Americans had:
- No control over when the British troops came and went
- No say in what resources they consumed
- And no privacy even in their own castles
Similarly, mass NSA spying means that modern day Americans have:
- No control over when military presence comes or goes from our computer and phones (NSA is part of the
Department of Defense)
- No say in what resources the spies suck up (remember, Applebaum says that spying can use a lot of resources
and harm performance)
- And no privacy even in the deepest inner sanctuary of our electronic home base
Colonial Americans lost the quiet use and enjoyment of their homes. Modern Americans are losing the quiet use
and enjoyment of our digital homes because the NSA is stationing digital “troops” inside our computers and
Just as the Colonists’ homes were no longer theirs … our computers and phones are no longer
This article was posted: Wednesday, January 1, 2014 at 6:21 am
Officials in the legislative, judicial and executive branches of government all say
that the mass surveillance on Americans is unnecessary:
3 Senators with top secret clearance “have reviewed this surveillance extensively and have
seen no evidence that the bulk collection of Americans’ phone records has provided any
intelligence of valuethat could not have been gathered through less intrusive means”
A member of the White House review panel on NSA surveillance said he was “absolutely” surprised when he
discovered the agency’s lack of evidence that the bulk collection of telephone call records had thwarted any
terrorist attacks.“It was, ‘Huh, hello? What are we doing here?’” said Geoffrey Stone, a University of Chicago
“That was stunning. That was the ballgame,” said one congressional intelligence official, who asked not to
be publicly identified. “It flies in the face of everything that they have tossed at us.”
The conclusions of the panel’s reports were at direct odds with public statements by President Barack Obama
and U.S. intelligence officials.
Indeed, the NSA itself no longer claims that its mass spying program has stopped terror attacks or
saved lives. Instead, intelligence spokesmen themselves now claim that mass spying is just an “insurance policy” to give “peace of mind”.
And while the NSA claims that disclosure of its spying programs hurts America’s security, that’s what
authoritarians always say. For example:
When leakers disclosed that the FBI was conducting mass spying on – and smearing – anti-war Americans,
attorney general John Mitchell said that the leaks would “endanger” the lives of government agents
Germans under Hitler denounced their neighbors and friends not
because they genuinely believed them to be a security threat, but because they expected to selfishly benefit
from doing so, both financially, socially and psychologically via a pavlovian need to be rewarded by their
masters for their obedience. At the height of its influence around one in seven of the East German population
was an informant for the Stasi. As in Nazi Germany, the creation of an informant system was wholly centered
around identifying political dissidents and those with grievances against the state, and had little or nothing
to do with genuine security concerns.
Assembly Bill 351, commonly called the California
Liberty Preservation Act, has been signed into law by Governor Jerry Brown making it statewide policy to refuse
compliance with federal attempts to enforce "indefinite detention" made famous by the National Defense
Authorization Act of 2012 (NDAA). What began as a marginal issue with little legislative support has unified
Californians of all persuasions and brought attention to the proper role the people and their states play in a
constitutional republic. http://blog.tenthamendmentcenter.com/... http://tenthamendmentcenter.com/
Infowars Invades Utah 'Big Brother' Criminal Spy
Alex's incredible bombshell interview with Anthony Gucciardi from the NSA Data Center in Utah
where they were confronted by NSA guards who immediately violate their 1st Amendment rights and confiscated
[[DONATE TO ALEX JONES]] $5 or $10 A week. WE NEED YOU! http://www.infowars.com/donate/
The Rally Against Mass Surveillance with Ben
Alex is joined by Ben Doernberg the head of
Rally.stopwatching.us to discuss their new video fighting back against the Federal Government and NSA spying on
private citizens. https://optin.stopwatching.us/
The NSA is spying on everyone's personal communications. It's operating without any meaningful oversight.
SEND YOUR LINKS TO email@example.com
Upload your video to YOUTUBE and Two Other Online Video Websites
Read more here http://www.infowars.com/inf...
With an imperious hatred for the Bill of Rights, both the NSA and the TSA are moving quickly to destroy our
republic and our country.
It is time for you to reassert your right to free speech and our new contest will allow you to do just that.
One entry will receive a cash prize of $10,000 for the best video that mocks or scorns suppression of free speech
by either the TSA, the NSA or both.
The top entries will be posted on Infowars.com and Prisonplanet.com.
We'll air excerpts on the Alex Jones Show and the Infowars Nightly News.
Please read the requirements carefully.
Send entries to: firstname.lastname@example.org
How to Nullify the NSA (and every other tyrannical
Hardly a week goes by that we aren't faced with some new outrageous piece of legislation from the increasingly
tyrannical government. But once these bills have been passed, what can we actually do about them? What if stopping
this legislation was as simple as saying "no"? Join us this week on The Corbett Report as we explore the
nullification solution, a long-repressed piece of political history that offers us a way out.
No Water = No NSA Data Center. #NullifyNSA campaign
"I freed a thousand slaves; I
could have freed a thousand more, if only they knew they were slaves."
Only the vigilant can maintain their liberties, and only those who
are constantly and intelligently on the spot can hope to govern themselves effectively by democratic
"A society, most of whose members spend a great part of their time,
not on the spot, not here and now and in their calculable future, but somewhere else, in the irrelevant other
worlds of sport and soap opera, of mythology and metaphysical fantasy, will find it hard to resist the
encroachments of those who would manipulate and control it.”