Monday, July 22, 2013

SURVEILLANCE NEWSLETTER #6

OMNI CIVIL LIBERTIES/SURVEILLANCE NEWSLETTER #6, JULY 22, 2013, for a CULTURE OF PEACE AND JUSTICE.  Compiled by Dick Bennett.  (#1 Jan. 28, 2008; #2 Jan. 22, 2011; #3 Oct. 25, 2011; #4 Jan. 31, 2012; #5 June 9, 2013). 

My blog:   War Department/Peace Department
My Newsletters:
For an informed and resistant citizenry.   See: CIA, FBI, Drones, National Security State, NSA, Top Secret, Intelligence Industry Complex, Imperialism, Fascism, and more.
Index:
Visit OMNI’s Library.

The multifarious methods of oppression employed by an imperial state would fill an encyclopedia.  One general method is the control of language, and one sub-set covers rhetorical devices.  A specific figure is euphemism, a powerful way of hiding folly and depravity.  For example, our government has rebranded US state assassination as “high value targeting.”   Dick


"I refuse to live in a country like this, and I'm not leaving"
Michael Moore

 




Contents of #3  Oct. 25, 2011
Arkansas Police Cell Phone Surveillance
Patriot Act, Cyber Surveillance
Books
   Fuchs on Internet
   Landau on Wiretapping
   McCoy on Empire
Fuchs, et al., Internet and Surveillance
Mass Surveillance and False Positives
Databases on Everybody Legislation
IPhone Records
New Photo Tech
Lt. Dan Choi

Contents of #4 Jan. 31, 2012
Obama’s State of the Union Speech
Spying Boon to Corporations vs. Privacy
ACLU: FBI Mapping US
Space Surveillance
NSA Warrantless Surveillance
Muslims Demand End of Surveillance

Here is the link to all OMNI newsletters:  http://www.omnicenter.org/newsletter-archive/  


Contents of #5 June 9, 2013
Warrantless Spying: Contact Pryor and Boozman
   Lockshin, Credo Action
   Friday, BORDC
Massive National Security Agency Spying
Massive Surveillance State
NSA Lying, Has Our Emails
Bromwich, Secret Surveillance of All Communications in US
Cybersecurity Act vs. Privacy
Baldwin, Protection from NSA
Take Action to Defund the Massive NSA Spy Center in Utah
Kuzmarov, Modernizing Repression
McCoy, Policing the Empire
Huggins, Political Policing Latin America

Contents #6
Ellsberg, Join ACLU Action
Petition to President Obama
Jimmy Carter, US Democracy

SNOWDEN
Greenwald, Edward Snowden
Majority Would Prosecute Snowden, Pew Research Center
William Blum on Snowden, NSA History, CIA, Whistleblower   
      Philip Agee (Anti-Empire Report #118)  
Greenwald, Lack of FISA Oversight
Sign Petitions on Snowden, NSA, FISA
The Nation, Snowden vs. Surveillance Net and End of Privacy

Lindorff, Not China But US is the Great Hacker
Snyder, “Maincore”: US Martial Law Detainee List
Harris, The Rise of the America’s Surveillance State
Surveillance Cameras
Greenwald, Future Surveillance
Solomon, Effective Resistance
New York Times Reports on Surveillance.  For example,    Lichtblau (NYT), Data-Gathering Law Widened.  ADG (7-6-13) 1A.







Ellsberg Says: Put A Stop To Indiscriminate Spying On Americans

To Daniel Ellsberg, the well-known whistleblower and lifelong advocate for freedom who leaked the “Pentagon Papers” 40 years ago, “there has not been in American history a more important leak than Edward Snowden’s release of NSA material.”
Snowden’s disclosure publicly revealed that, under provisions of the Patriot Act (Section 215) and the Foreign Intelligence Surveillance Act (FISA Section 702), the National Security Agency (NSA) has direct access to the systems of Microsoft, Google, Facebook, Apple and other major U.S. internet companies.
The information collected includes search history, email, video and voice chat, videos, photos, social networking details, and more. The government has also been secretly tracking the calls of customers from all the major telecommunications companies—to whom they spoke, from where and for how long—going back seven years.
In an email this week to ACLU supporters, Ellsberg noted:
I’ve seen firsthand how the consequences of [this] kind of government abuse threaten our most fundamental liberties…we may find ourselves in a dangerous situation in which average citizens, along with Congresspersons, journalists and their sources, even judges, are watched around the clock and afraid to dissent. The core fixtures of our democracy—the right to protest, the right to live freely in the pursuit of life, liberty, and happiness without government intrusion—could be weakened beyond repair.
We simply can’t afford to do nothing. We have no choice but to act now.
Over 30,000 ACLU supporters have already spoken out against these spying programs. Join their calls for change.
Demand that President Obama end the secret surveillance state by calling for the repeal of section 215 of the Patriot Act and section 702 of FISA.

PETITION TO PRESIDENT OBAMA TO INCREASE TRANSPARENCY BY ENDING WARRANTLESS INTERNET WIRETAPS PERMITTED IN THE PATRIOT ACT SECTION 215 AND FISA SECTION 702.
JUNE 22, 2013
To Daniel Ellsberg, the well-known whistleblower and lifelong advocate for freedom who leaked the “Pentagon Papers” 40 years ago, “there has not been in American history a more important leak than Edward Snowden’s release of NSA material.”
Snowden’s disclosure publicly revealed that, under provisions of the Patriot Act (Section 215) and the Foreign Intelligence Surveillance Act (FISA Section 702), the National Security Agency (NSA) has direct access to the systems of Microsoft, Google, Facebook, Apple and other major U.S. internet companies.
The information collected includes search history, email, video and voice chat, videos, photos, social networking details, and more. The government has also been secretly tracking the calls of customers from all the major telecommunications companies—to whom they spoke, from where and for how long—going back seven years.
We Citizens ask President Obama to reduce secret surveillance by calling for the repeal of section 215 of the Patriot Act and section 702 of FISA.

NAME (PRINT)          ADDRESS


FOCUS | Jimmy Carter: US "Has No Functioning Democracy"
Former U.S. President Jimmy Carter. (photo: Reuters)
Alberto Riva, International Business Times
Riva reports: "Former U.S. president Jimmy Carter is so concerned about the NSA spying scandal that he thinks it has essentially resulted in a suspension of American democracy."   [from Sonny San Juan] –D]
READ MORE


S N O W D E N 

Reader Supported News | 09 June 13
BREAKER | Edward Snowden: The Whistleblower Behind Revelations of NSA Surveillance 
Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. (photo: Guardian UK)
Glenn Greenwald, Ewen MacAskill, Laura Poitras, Guardian UK
Excerpt: "The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA." 
READ MORE  
http://readersupportednews.org/news-section2/318-66/17852-breaker-edward-snowden-the-whistleblower-behind-revelations-of-nsa-surveillance


June 20, 2013


Twitter
Tumblr

The public is divided over whether the leak of classified information about NSA phone and internet surveillance serves the public interest. But a majority says that former government contractor Edward Snowden should be criminally prosecuted. Young people are more likely than other age groups to think that the NSA leak serves the public interest.


The Anti-Empire Report #118 by William Blum
www.killinghope.org (June 26 2013)

Official website of the author, historian, and US foreign policy critic.

Edward Snowden


In the course of his professional life in the world of national security Edward Snowden must have gone through numerous probing interviews, lie detector examinations, and exceedingly detailed background checks, as well as filling out endless forms carefully designed to catch any kind of falsehood or inconsistency. The Washington Post (June 10) reported that "several officials said the CIA will now undoubtedly begin reviewing the process by which Snowden may have been hired, seeking to determine whether there were any missed signs that he might one day betray national secrets".

Yes, there was a sign they missed - Edward Snowden had something inside him shaped like a
conscience, just waiting for a cause.

It was the same with me. I went to work at the State Department, planning to become a Foreign Service Officer, with the best - the most patriotic - of intentions, going to do my best to slay the beast of the International Communist Conspiracy. But then the horror, on a daily basis, of what the United States was doing to the people of Vietnam was brought home to me in every form of media; it was making me sick at heart. My conscience had found its cause, and nothing that I could have been asked in a pre-employment interview would have alerted my interrogators of the possible danger I posed because I didn't know of the danger myself. No questioning of my friends and relatives could have turned up the slightest hint of the radical anti-war activist I was to become. My friends and relatives were to be as surprised as I was to be. There was simply no way for the State Department security office to know that I should not be hired and given a Secret Clearance. {1}

So what is a poor National Security State to do? Well, they might consider behaving themselves. Stop doing all the terrible things that grieve people like me and Edward Snowden and Bradley Manning and so many others. Stop the bombings, the invasions, the endless wars, the torture, the sanctions, the overthrows, the support of dictatorships, the unmitigated support of Israel; stop all the things that make the United States so hated, that create all the anti-American terrorists, that compel the National Security State - in pure self defense - to spy on the entire world.

Eavesdropping on the planet

The above is the title of an essay that I wrote in 2000 that appeared as a chapter in my book Rogue State: A Guide to the World's Only Superpower
(2002). Here are some excerpts that may help to put the current revelations surrounding Edward Snowden into perspective ...

Can people in the 21st century imagine a greater invasion of privacy on all of earth, in all of history? If so, they merely have to wait for technology to catch up with their imagination.

Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex ... satellite transmissions, fiber-optic communications traffic, microwave links ... voice, text, images ... captured by satellites continuously orbiting the earth, then processed by high-powered computers ... if it runs on electromagnetic energy, NSA is there, with high high tech. Twenty-four hours a day. Perhaps billions of messages sucked up each day. No one escapes. Not presidents, prime ministers, the UN Secretary-General, the pope, the Queen of England, embassies, transnational corporation CEOs, friend, foe, your Aunt Lena ... if God has a phone, it's being monitored ... maybe your dog isn't being tapped. The oceans will not protect you. American submarines have been attaching tapping pods to deep underwater cables for decades.

Under a system codenamed ECHELON, launched in the 1970s, the NSA and its junior partners in Britain, Australia, New Zealand, and Canada operate a network of massive, highly automated interception stations, covering the globe amongst them. Any of the partners can ask any of the others to intercept its own domestic communications. It can then truthfully say it does not spy on its own citizens.

Apart from specifically-targeted individuals and institutions, the ECHELON system works by indiscriminately intercepting huge quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. Every intercepted message - all the embassy cables, the business deals, the sex talk, the birthday greetings - is searched for keywords, which could be anything the searchers think might be of interest. All it takes to flag a communication is for one of the parties to use a couple or so of the key words in the ECHELON "dictionary" - "He lives in a lovely old white house on Bush Street, right near me. I can shoot over there in two minutes". Within limitations, computers can "listen" to telephone calls and recognize when keywords are spoken. Those calls are extracted and recorded separately, to be listened to in full by humans. The list of specific targets at any given time is undoubtedly wide ranging, at one point including the  likes of Amnesty International and Christian Aid.

ECHELON is carried out without official acknowledgment of its existence, let alone any democratic oversight or public or legislative debate as to whether it serves a decent purpose. The extensiveness of the ECHELON global network is a product of decades of intense Cold War activity. Yet with the end of the Cold War, its budget - far from being greatly reduced - was increased, and the network has grown in both power and reach; yet another piece of evidence that the Cold War was not a battle against something called "the international communist conspiracy".

The European Parliament in the late 1990s began to wake up to this intrusion into the continent's affairs. The parliament's Civil Liberties Committee commissioned a report, which appeared in 1998 and recommended a variety of measures for dealing with the increasing power of the technologies of surveillance. It bluntly advised: "The European Parliament should reject proposals from the United States for making private messages via the global communications network [Internet] accessible to US intelligence agencies". The report denounced Britain's role as a double-agent, spying on its own European partners.

Despite these concerns the US has continued to expand ECHELON surveillance in Europe, partly because of heightened interest in commercial espionage - to uncover industrial information that would provide American corporations with an advantage over foreign rivals.

German security experts discovered several years ago that ECHELON was engaged in heavy commercial spying in Europe. Victims included such German firms as the wind generator manufacturer Enercon. In 1998, Enercon developed what it thought was a secret invention, enabling it to generate electricity from wind power at a far cheaper rate than before. However, when the company tried to market its invention in the United States, it was confronted by its American rival, Kenetech, which announced that it had already patented a near-identical development. Kenetech then brought a court order against Enercon to ban the sale of its equipment in the US. In a rare public disclosure, an NSA employee, who refused to be named, agreed to appear in silhouette on German television to reveal how he had stolen Enercon's secrets by tapping the telephone and computer link lines that ran between Enercon's research laboratory and its production unit some twelve miles away. Detailed plans of the compa ny's invention were then passed on to Kenetech.

In 1994, Thomson SA, located in Paris, and Airbus Industrie, based in Blagnac Cedex, France, also lost lucrative contracts, snatched away by American rivals aided by information covertly collected by NSA and CIA. The same agencies also eavesdropped on Japanese representatives during negotiations with the United States in 1995 over auto parts trade.

German industry has complained that it is in a particularly vulnerable position because the government forbids its security services from conducting similar industrial espionage. "German politicians still support the rather naive idea that political allies should not spy on each other's businesses. The Americans and the British do not have such illusions", said journalist Udo Ulfkotte, a specialist in European industrial espionage, in 1999.

That same year, Germany demanded that the United States recall three CIA operatives for their activities in Germany involving economic espionage. The news report stated that the Germans "have long been suspicious of the eavesdropping capabilities of the enormous US radar and communications complex at Bad Aibling, near Munich", which is in fact an NSA intercept station. "The Americans tell us it is used solely to monitor communications by potential enemies, but how can we be entirely sure that they are not picking up pieces of information that we think should remain completely secret?" asked a senior German official. Japanese officials most likely have been told a similar story by Washington about the more than a dozen signals intelligence bases which Japan has allowed to be located on its territory.

In their quest to gain access to more and more private information, the NSA, the FBI, and other components of the US national security establishment have been engaged for years in a campaign to require American telecommunications manufacturers and carriers to design their equipment and networks to optimize the authorities' wiretapping ability. Some industry insiders say they believe that some US machines approved for export contain NSA "back doors" (also called "trap doors").

The United States has been trying to persuade European Union countries as well to allow it "back-door" access to encryption programs, claiming that this was to serve the needs of law-enforcement agencies. However, a report released by the European Parliament in May 1999 asserted that Washington's plans for controlling encryption software in Europe had nothing to do with law enforcement and everything to do with US industrial espionage. The NSA has also dispatched FBI agents on break-in missions to snatch code books from foreign facilities in the United States, and CIA officers to recruit foreign communications clerks abroad and buy their code secrets, according to veteran intelligence officials.

For decades, beginning in the 1950s, the Swiss company Crypto AG sold the world's most sophisticated and secure encryption technology. The firm staked its reputation and the security concerns of its clients on its neutrality in the Cold War or any other war. The purchasing nations, some 120 of them - including prime US intelligence targets such as Iran, Iraq, Libya and Yugoslavia - confident that their communications were protected, sent messages from their capitals to their embassies, military missions, trade offices, and espionage dens around the world, via telex, radio, and fax. And all the while, because of a secret agreement between the company and NSA, these governments might as well have been hand delivering the messages to Washington, uncoded. For their Crypto AG machines had been rigged before being sold to them, so that when they used them the random encryption key could be automatically and clandestinely transmitted along with the enciphered message. NSA analysts  could read  the messages as easily as they could the morning newspaper.

In 1986, because of US public statements concerning the La Belle disco bombing in West Berlin, the Libyans began to suspect that something was rotten with Crypto AG's machines and switched to another Swiss firm, Gretag Data Systems AG. But it appears that NSA had that base covered as well. In 1992, after a series of suspicious circumstances over the previous few years, Iran came to a conclusion similar to Libya's, and arrested a Crypto AG employee who was in Iran on a business trip. He was eventually ransomed, but the incident became well known and the scam began to unravel in earnest.

In September 1999 it was revealed that NSA had arranged with Microsoft to insert special "keys" into Windows software, in all versions from 95-OSR2 onwards. An American computer scientist, Andrew Fernandez of Cryptonym in North Carolina, had disassembled parts of the Windows instruction code and found the smoking gun - Microsoft's developers had failed to remove the debugging symbols used to test this software before they released it. Inside the code were the labels for two keys. One was called "KEY". The other was called "NSAKEY". Fernandez presented his finding at a conference at which some Windows developers were also in attendance. The developers did not deny that the NSA key was built into their software, but they refused to talk about what the key did, or why it had been put there without users' knowledge. Fernandez says that NSA's "back door" in the world's most commonly used operating system makes it "orders of magnitude easier for the US government to access your computer".

In February 2000, it was disclosed that the Strategic Affairs Delegation (DAS), the intelligence arm of the French Defense Ministry, had prepared a report in 1999 which also asserted that NSA had helped to install secret programs in Microsoft software. According to the DAS report, "it would seem that the creation of Microsoft was largely supported, not least financially, by the NSA, and that IBM was made to accept the [Microsoft] MS-DOS operating system by the same administration". The report stated that there had been a "strong suspicion of a lack of security fed by insistent rumors about the existence of spy programs on Microsoft, and by the presence of NSA personnel in Bill Gates' development teams". The Pentagon, said the report, was Microsoft's biggest client in the world.

Recent years have seen disclosures that in the countdown to their invasion of Iraq in 2003, the United States had listened in on UN Secretary-General Kofi Annan, UN weapons inspectors in Iraq, and all the members of the UN Security Council during a period when they were deliberating about what action to take in Iraq.

It's as if the American national security establishment feels that it has an inalienable right to listen in; as if there had been a constitutional amendment, applicable to the entire world, stating that "Congress shall make no law abridging the freedom of the government to intercept the personal communications of anyone". And the Fourth Amendment had been changed to read: "Persons shall be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, except in cases of national security, real or alleged". {2}

The leading whistleblower of all time: Philip Agee


Before there was Edward Snowden, William Binney and Thomas Drake ... before there was Bradley Manning, Sibel Edmonds and Jesselyn Radack ... there was Philip Agee. What Agee revealed is still the most startling and important information about US foreign policy that any American government whistleblower has ever revealed.

Philip Agee spent twelve years (1957 to 1969) as a CIA case officer, most of it in Latin America. His first book, Inside the Company: CIA Diary, published in 1974 - a pioneering work on the Agency's methods and their devastating consequences - appeared in about thirty languages around the world and was a best seller in many countries; it included a 23-page appendix with the names of hundreds of undercover Agency operatives and organizations.

Under CIA manipulation, direction and, usually, their payroll, were past and present presidents of Mexico, Colombia, Uruguay, and Costa Rica, "our minister of labor", "our vice-president", "my police", journalists, labor leaders, student leaders, diplomats, and many others. If the Agency wished to disseminate anti-communist propaganda, cause dissension in leftist ranks, or have Communist embassy personnel expelled, it need only prepare some phoney documents, present them to the appropriate government ministers and journalists, and - presto! - instant scandal.

Agee's goal in naming all these individuals, quite simply, was to make it as difficult as he could for the CIA to continue doing its dirty work.

A common Agency tactic was writing editorials and phoney news stories to be knowingly published by Latin American media with no indication of the CIA authorship or CIA payment to the media. The propaganda value of such a "news" item might be multiplied by being picked up by other CIA stations in Latin America who would disseminate it through a CIA-owned news agency or a CIA-owned radio station. Some of these stories made their way back to the United States to be read or heard by unknowing North Americans.

Wooing the working class came in for special treatment. Labor organizations by the dozen, sometimes hardly more than names on stationery, were created, altered, combined, liquidated, and new ones created again, in an almost frenzied attempt to find the right combination to compete with existing left-oriented unions and take national leadership away from them.

In 1975 these revelations were new and shocking; for many readers it was the first hint that American foreign policy was not quite what their high-school textbooks had told them nor what the New York Times had reported.

"As complete an account of spy work as is likely to be published anywhere, an authentic account of how an ordinary American or British 'case officer' operates ... All of it ... presented with deadly accuracy", wrote Miles Copeland, a former CIA station chief, and ardent foe of Agee. (There's no former CIA officer more hated by members of the intelligence establishment than Agee; no one's even close; due in part to his traveling to Cuba and having long-term contact with Cuban intelligence.)

In contrast to Agee, WikiLeaks withheld the names of hundreds of informants from the nearly 400,000 Iraq war documents it released.

In 1969, Agee resigned from the CIA (and colleagues who "long ago ceased to believe in what they are doing").

While on the run from the CIA as he was writing Inside the Company - at times literally running for his life - Agee was expelled from, or refused admittance to Italy, Britain, France, West Germany, the Netherlands, and Norway. (West Germany eventually gave him asylum because his wife was a leading ballerina in the country.) Agee's account of his period on the run can be found detailed in his book On the Run (1987). It's an exciting read.

Notes

{1} To read about my State Department and other adventures, see my book West-Bloc Dissident: A Cold war Memoir (2002)

{2} See Rogue State: A Guide to the World's Only Superpower, chapter 21, for the notes for the above.

Any part of this report may be disseminated without permission, provided attribution to William Blum as author and a link to this website are given.

Books by William Blum

America's Deadliest Export: Democracy: The Truth About US Foreign Policy and Everything Else

Killing Hope: US Military and CIA Interventions Since World War Two

Rogue State: A Guide to the World's Only Superpower

Freeing the World to Death: Essays on the American Empire

Read more at http://williamblum.org/about/

To rescue an old man from the clutches of the capitalist imperialist meanies:http://williamblum.org/about/

Send comments, typos found, money, love notes, hate mail, death threats, letter bombs, and anthrax to bblum6@aol.com
www.killinghope.org/bblum6/aer118.html
https://billtotten.wordpress.com/
http://www.ashisuto.co.jp



Reader Supported News | 19 June 13

Glenn Greenwald | Documents Reveal Lack of FISA Court Oversight 
President Obama has tried to assure us that the FISA court is monitoring the NSA, but documents reveal otherwise. (photo: Reuters) Glenn Greenwald,
Guardian UK 
Greenwald writes: "Top secret documents obtained by the Guardian illustrate what the Fisa court actually does - and does not do - when purporting to engage in 'oversight' over the NSA's domestic spying." 
READ MORE

SIGN PETITIONS
lease sign the below petitions: Stop Watching US & call your reps.https://call.stopwatching.us/
by Government Accountability Project on June 14, 2013 ( The Whistleblogger / 2013 )
Secret FISA Court Out of Control – Makes Violently Anti-Constitutional Decision Giving up ALL Your Phone Records http://daviddilworth.com/pol/secret-fisa-court-out-of-control-makes-violently-anti-constitutional-decision-giving-up-all-your-phone-records/
Today, EPIC joined a coalition of over 100 civil liberties organizations and Internet companies todemand that Congress initiate a full-scale investigation into the National Security Agency's surveillance programs. In the letter sent to Congress this morning, the coalition emphasized the need for public transparency and an end to dragnet surveillance: "This type of blanket data collection by the government strikes at bedrock American values of freedom and privacy." EPIC is also leading apetition to the NSA to suspend its program of collecting information on all individuals in the United States. EPIC intends to renew its request to the Agency every week until the NSA responds. For more information see EPIC: NSA Petition.
EPIC, joined by leading privacy experts including James Bamford, Whitfield Diffie, and Bruce Schneier, has petitioned the National Security Agency to suspend its domestic surveillance programpending public comment. EPIC's petition states "NSA's collection of domestic communications contravenes the First and Fourth Amendments to the United States Constitution, and violates several federal privacy laws, including the Privacy Act of 1974, and the Foreign Intelligence Surveillance Act of 1978 as amended." EPIC's petition further states that NSA’s domestic surveillance "substantively affects the public to a degree sufficient to implicate the policy interests" that require public comment, and that "NSA's collection of domestic communications absent the opportunity for public comment is unlawful." EPIC intends to renew its request each week until the NSA responds. For more information and to join EPIC’s petition, see: EPIC: NSA Petition.
In a letter to Federal Communications Commission Chairwoman Mignon Clyburn, EPIC urged the FCC to determine whether Verizon violated the Communications Act when it released consumer call detail information to the National Security Agency. In response to an unprecedented Foreign Intelligence Surveillance Court order which focused on solely domestic communications, Verizon released telephone customer information to the NSA, including telephone numbers and time and call duration. Congress explicitly charged the Commission with investigating unauthorized disclosures of consumer call detail information. EPIC's letter stated that Verizon violated legal protections for consumer phone records when it disclosed consumer information in response to a facially invalid order. For more information, see EPIC: Foreign Intelligence Surveillance ActEPIC: Clapper v. Amnesty Int'l, and EPIC: USA Patriot Act.


Dave Lindorff, Op-Ed, NationofChange, June 24, 2013: Edward Snowden’s revelations also exposed the U.S. as a hypocrite in accusing China of criminally hacking into U.S. corporate and government computers. It turns out that the U.S. itself is the biggest official hacker, with a massive campaign run out of the NSA, of hacking into Chinese, Hong Kong, Iranian and other countries’ computer systems and of actually engaging in a kind of undeclared computer warfare against rival states by which this country is not, officially, at war.
READ  |  DISCUSS  |  SHARE


America's Surveillance Net - TheNation

Jonathan Schell - TheNation 
June 19, 2013 | This article appeared in the July 8-15, 2013 edition of The Nation. 
America's Surveillance Net 
There is a revolution afoot—one that is being carried out by the government against the fundamental law of the land.
 


 

 

A school of fish swims peacefully in the ocean. Out of sight, a net is spread beneath it. At the edges of the net is a circle of fishing boats. Suddenly, the fishermen yank up the edges of the net, and in an instant the calm, open ocean becomes a boiling caldron, an exitless, rapidly shrinking prison in which the fish thrash in vain for freedom and life. 

Increasingly, the American people are like this school of fish in the moments before the net is pulled up. The net in question is of course the Internet and associated instruments of data collection, and the fishermen are corporations and the government. That is, to use the more common metaphor, we have come to live alongside the machinery of a turnkey tyranny. As we now know, thanks to the courageous whistleblower Edward Snowden, the National Security Agency has been secretly ordering Verizon to sweep up and hand over all the metadata from the phone calls of millions of its customers: phone numbers, duration of calls, routing information and sometimes the location of the callers. Thanks to Snowden, we also know that unknown volumes of like information are being extracted from Internet and computer companies, including Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. 

The first thing to note about these data is that a mere generation ago, they did not exist. They are a new power in our midst, flowing from new technology, waiting to be picked up; and power, as always, creates temptation, especially for the already powerful. Our cellphones track our whereabouts. Our communications pass through centralized servers and are saved and kept for a potential eternity in storage banks, from which they can be recovered and examined. Our purchases and contacts and illnesses and entertainments are tracked and agglomerated. If we are arrested, even our DNA can be taken and stored by the state. Today, alongside each one of us, there exists a second, electronic self, created in part by us, in part by others. This other self has become de facto public property, owned chiefly by immense data-crunching corporations, which use it for commercial purposes. Now government is reaching its hand into those corporations for its own purposes, creating a brand-new domain of the state-corporate complex. 

Surveillance of people on this scale turns basic liberties—above all the Fourth Amendment, which protects citizens against unreasonable search and seizure—into a dead letter. Government officials, it is true, assure us that they will never pull the edges of the net tight. They tell us that although they could know everything about us, they won’t decide to. They’ll let the information sit unexamined in the electronic vaults. But history, whether of our country or others, teaches that only a fool would place faith in such assurances. What one president refrains from doing the next will do; what is left undone in peacetime is done when a crisis comes. 

The executive branch offers a similar assurance about its claimed right to kill American and foreign citizens at its sole discretion. But to accept such assurances as the guarantee of basic liberties would be to throw away bedrock principles of our constitutional order. If there is any single political idea that deserves to be called quintessentially American, it is the principle that government power must be balanced and checked by other government power, which is why federal power is balanced by state power and is itself divided into three branches. 

The officials—most notably President Obama—have assured us that this system is intact, that the surveillance programs are “under very strict supervision by all three branches of government,” in Obama’s words. But the briefest examination of the record rebuts the claim...
 

 

More: http://www.thenation.com/article/174889/americas-surveillance-net#axzz2XBLcJHyq 



f


More

1 of 26,797
 
 

Print all
In new window

] 17 most sophisticated agencies in the world.......

[forwarded by Sonny San Juan  --D]
1:03 PM (7 hours ago)


Sent: Saturday, July 20, 2013 11:21 AM
Subject: ] 17 most sophisticated agencies in the world.......

These 17 Agencies Make Up The Most Sophisticated Spy Network In The World

Paul Szoldra May 11, 2013, 6:27 AM225,03513

digg

Zero Dark Thirty
The U.S. intelligence community is vast, composed of 17 distinct organizations each operating under its own shroud of secrecy.
Oversight of these agencies generally falls to the Department of Defense or Congress, leaving the average citizen with precious little knowledge of how they operate.
Funded by largely classified budgets, it's difficult to assess how much the U.S. annually spends on these clandestine operations, but one 2012 estimate pegs the cost at about $75 billion.
The following slides highlight the expansive reach of the U.S. intelligence community.

The Central Intelligence Agency spies on foreign governments and organizes covert ops.

The Central Intelligence Agency spies on foreign governments and organizes covert ops.
The CIA is the most well-known U.S. spying agency, formed by the passage of the National Security Act of 1947. The agency has its roots with the Office of Strategic Services (OSS) that operated during World War II.
Headquarters: Langley, Va.
Mission: CIA collects, analyzes, and disseminates intelligence gathered on foreign nations. This comes through signals and human intelligence sources.
Budget: Classified. On their website, the CIA states, "neither the number of employees nor the size of the Agency's budget can, at present, be publicly disclosed. A common misconception is that the Agency has an unlimited budget, which is far from true."
There have been some slips, however. In 2005, a CIA deputy director inadvertently revealed the annual intelligence budget was $44 billion.

The National Security Agency was once so secretive it was jokingly called 'No Such Agency.'

The National Security Agency was once so secretive it was jokingly called 'No Such Agency.'
NSA Headquarters at Fort Meade, Maryland
The NSA was established in 1952 with a mission primarily dedicated to code breaking, after the Allies' success in cracking German and Japanese codes during World War II. For a long time, the NSA, which operates under the Dept. of Defense, was not even recognized by the government, commonly referred to as "No Such Agency."
Headquarters: Fort Meade, Md.
Mission: The main functions of the NSA are signals intelligence — intercepting and processing foreign communications, cryptology — cracking codes, and information assurance. IA is, put simply: preventing foreign hackers from getting secret information.
Budget: Classified. Some estimate the NSA is actually the largest intelligence organization in the world — three times the size of the CIA. The headquarters alone takes up 6.3 million square feet — around the same size as the Pentagon — with 112 acres of parking spaces, reports the Washington Post.

The Defense Intelligence Agency works to understand what foreign militaries will do before they do it.

The Defense Intelligence Agency works to understand what foreign militaries will do before they do it.
The DIA was established in 1961 with the goal of sharing information collected by the major military intelligence outfits (such as Army or Marine Corps Intelligence). More recently, the DIA has been expanding its overseas spy network to collect first-hand intelligence.
Headquarters: Washington, D.C.
Mission: The DIA serves as the lead intelligence agency for the Dept. of Defense, coordinating analysis and collection of intelligence on foreign militaries, in addition to surveillance and reconnaissance operations. The DIA is the common link between military and national intelligence agencies.
Budget: Classified. The DIA does not reveal budget information, although they do say they have more than 16,500 men and women working for them and are under DoD and congressional oversight.

The State Department's Bureau of Intelligence and Research provides diplomats the necessary tools for effective foreign policy.

The State Department's Bureau of Intelligence and Research provides diplomats the necessary tools for effective foreign policy.
REUTERS/Lucas Jackson
The State Department's Bureau of Intelligence and Research (INR) has ties to the Office of Strategic Services from World War II, but was transferred to State after the war. INR now reports directlyto the Secretary of State, harnessing intelligence from all sources and offering independent analysis of global events and real-time insight.
Headquarters: Washington, D.C.
Mission: This agency serves as the Secretary of State's primary advisor on intelligence matters, and gives support to other policymakers, ambassadors, and embassy staff.
Budget: $49 million in 2007, according to documents obtained by FAS.

Air Force Intelligence provides reconnaissance for US ground troops.

Air Force Intelligence provides reconnaissance for US ground troops.
Formerly known as the Air Intelligence Agency, the agency is now known as the Air Force ISR — Intelligence, Surveillance, Reconnaissance. Air Force intelligence was established in 1948 to get information to troops on the ground, and most recently, the ISR has collected that intelligence from aerial drones.
Headquarters: Lackland Air Force Base, Texas
Mission: Air Force ISR collects and analyzes intelligence on foreign nations and hostile forces, both in and out of combat zones. They also conduct electronic and photographic surveillance, and provide weather and mapping data to troops in the field.
Budget: Unknown. The budget of ISR apparently falls under the Air Force's Operation & Maintenance budget, which includes other areas outside of the agency's scope such as flying operations and logistics. That number for 2012, however, was just over $46 million.

The FBI's National Security Branch oversees counterterrorism and intelligence gathering.

The FBI's National Security Branch oversees counterterrorism and intelligence gathering.
The Federal Bureau of Investigation's National Security Branch (NSB) was established in 2005, combining resources that include counterterrorism, counter-intelligence, weapons of mass destruction, and intelligence under a single FBI leader.
Headquarters: Washington, D.C.
Mission: Formed after 9/11 and the Iraq WMD commission — when intelligence agencies were not sharing data with each other — the NSB integrates intel on national security and criminal threats from a variety of sources that are often intertwined in order to protect U.S. interests.
Budget: Total FBI budget was approximately $8.1 billion in 2012, which included an increase of $119 million "to enhance our counterterrorism, computer intrusions, and other programs," according to their website.

Army Intelligence and Security Command offers essential intel to troops on the battlefield.

Army Intelligence and Security Command offers essential intel to troops on the battlefield.
Army intelligence has been around since spies worked for the Continental Army in 1775, but the U.S. Army's Intelligence and Security Command (INSCOM) was established in 1977 to become the major unifying command of army intelligence.
Headquarters: Fort Belvoir, Va.
Mission: INSCOM provides commanders on the ground with information they may need on the battlefield: intercepted enemy radio communications, maps, ground imagery, and information on force structure and numbers.
Budget: Unknown. The total military intelligence budget was $21.5 billion in 2012.

The Department of Energy, Office of Intelligence and Counterintelligence gathers information on foreign nuclear weapons.

The Department of Energy, Office of Intelligence and Counterintelligence gathers information on foreign nuclear weapons.
Surprisingly, the Energy Department even has an intelligence service. The Office of Intelligence and Counterintelligence focuses on technical intelligence on nuclear weapons and nonproliferation, nuclear energy (especially foreign), and energy security.
Headquarters: Washington, D.C.
Mission: The Dept. of Energy doesn't have the ability to conduct foreign intelligence, instead relying on information passed to them by other agencies (such as the CIA or NSA). If it involves weapons of mass destruction, the DoE offers up the analytical expertise.
Budget: Unknown. Like other government budgets, the intelligence activity is not specifically mentioned, although it may fall under "Atomic Energy Defense Activities" which had a total budget of more than $16 billion in 2012.

Coast Guard Intelligence provides information on maritime security and homeland defense.

Coast Guard Intelligence provides information on maritime security and homeland defense.
Alaskan Coast Guard members pictured in a 2009 exercise
Coast Guard Intelligence (CGI) was formed in 1915 and now falls under the Dept. of Homeland Security, providing information on maritime and port security, search and rescue, and counter-narcotics.
Headquarters: Washington, D.C.
Mission: Although CGI is technically an intelligence agency, its primary mission is as an investigative arm of the Coast Guard. CGI special agents "conduct criminal, counterintelligence and personnel security investigations within the Coast Guard's area of responsibility," with the majority being criminal offenses violating military law, according to the Coast Guard's official website. However, the Coast Guard does have specialists conducting analysis and collection of intelligence.
Budget: Unknown. Like the Army, the budget has some overlap, although the 2014 budget request includes $60 million for C4ISR systems, an acronym for Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance.
CGI headquarters is relatively small, only employing about 280.

The Treasury's Office of Intelligence and Analysis collects terrorism and financial intelligence.

The Treasury's Office of Intelligence and Analysis collects terrorism and financial intelligence.
The Office of Intelligence and Analysis is fairly new, established in 2004 by the Intelligence Authorization Act. OIA's focus is mainly on providing information to combat terrorism and illicit financial transactions.
Headquarters: Washington, D.C.
Mission: OIA safeguards the U.S. financial system "against illicit use and combating rogue nations, terrorist facilitators, weapons of mass destruction proliferators, money launderers, drug kingpins, and other national security threats," according to DNI.
Budget: Around $340 million.

The Drug Enforcement Administration hunts down illegal drugs.

The Drug Enforcement Administration hunts down illegal drugs.
The DEA has been gathering intelligence for anti-drug operations since its establishment in 1973. The agency collects and provides intelligence to other law enforcement agencies and helps with investigations.
Headquarters: El Paso, Texas
Mission: DEA assists local and federal law enforcement in conducting major drug investigations, along with developing "information that leads to seizures and arrests, and provid[ing] policy makers with drug trend information upon which programmatic decisions can be based," according to their website.
Budget: $2 billion (total DEA budget in 2013)

The Marine Corps Intelligence Activity monitors the Corp's battlefields.

The Marine Corps Intelligence Activity monitors the Corp's battlefields.
Like Army intelligence, the Marine Corps provides their own agency to collect and analyze information for troops on the ground. This includes map making, radio intercepts, human intelligence, and counter-intelligence.
Headquarters: Quantico, Va.
Mission: The primary function of Marine IA is to give tactical and operational intelligence to battlefield commanders. They also serve as the "go-to" unit for the Commandant of the Marine Corps on understanding intel.
Budget: Unknown. The total military intelligence budget was $21.5 billion in 2012.

The National Geospatial-Intelligence Agency provides advanced mapping for military forces.

The National Geospatial-Intelligence Agency provides advanced mapping for military forces.
Digital Globe
Having its roots from the 1972 formation of the Defense Mapping Agency and formerly known as NIMA, the agency was renamed the National Geospatial-Intelligence Agency in 2003. The agency has the task of collecting and understanding Earth's physical and man-made attributes. Using advanced imagery (mainly from satellites), it was NGA watching Osama bin Laden's compound in Pakistan.
Headquarters: Ft. Belvoir, Va.
Mission: NGA employs cartographers and analysts that collect and generate information about the Earth. This data is used in navigation, national security, military operations, and humanitarian aid efforts.
Budget: Classified. NGA employs approximately 14,500 government civilians.

The National Reconnaissance Office is responsible for America's spy satellites.

The National Reconnaissance Office is responsible for America's spy satellites.
CREDIT: NASA Marshall Space Flight Center
While the NGA is responsible for gaining information from satellite data, the National Reconnaissance Office — created secretly in 1961 and not acknowledged until 1992 — is in charge with satellite design, building, launch, and maintenance.
Headquarters: Chantilly, Va.
Mission: NRO gives its mission as "innovative overhead intelligence systems for national security." Simply put, the NRO provides their "customers" at the CIA, DoD, and elsewhere with technologically advanced spy satellites.
Budget: Classified.

The Office of Naval Intelligence provides information on the world's oceans to sailors everywhere.

The Office of Naval Intelligence provides information on the world's oceans to sailors everywhere.
The Office of Naval Intelligence was established in 1882 for "the purpose of collecting and recording naval information" that could be useful in war and peace. Like other military intelligence services, ONI gives maritime commanders information they need on foreign forces.
Headquarters: Washington, D.C.
Mission: ONI gathers intelligence and moves it rapidly to decision makers. "We produce maritime intelligence on weapons and technology proliferation and smuggling and illicit maritime activities that directly supports the U.S. Navy, joint war fighters and national decision makers and agencies," according to their website.
Budget: Unknown. The total military intelligence budget was $21.5 billion in 2012.

The Department of Homeland Security Office of Intelligence and Analysis looks for information on any potential threats to the US.

The Department of Homeland Security Office of Intelligence and Analysis looks for information on any potential threats to the US.
The DHS Office of Intelligence and Analysis works primarily on homeland threats — collecting and analyzing information, and sharing intelligence with local and federal law enforcement through the use of "fusion centers."
Headquarters: Washington, D.C.
Mission: They work on four main areas: understanding threats through analysis, collecting information relevant to homeland security, sharing that information with the agencies that need it, and managing the homeland security enterprise, according to DNI.
Budget: Classified. In a Congressional Research Service report, it was noted that "DNI does not publicly disclose details about the intelligence budget, but ... reported that the aggregate amount appropriated to the [national intelligence program] for FY2009 was $49.8 billion."

The Office of the Director of National Intelligence is where all the intelligence should come together for delivery to the president.

The Office of the Director of National Intelligence is where all the intelligence should come together for delivery to the president.
Established in 2004, the Office of the Director of National Intelligence (ODNI) manages the efforts of the entire U.S. intelligence community. Director James R. Clapper serves as the principal advisor to the president as well as the National Security and Homeland Security Councils.
Headquarters: Washington, D.C.
Mission: The DNI has two main missions: to lead intelligence integration, and "forge an intelligence community that delivers the most insightful intelligence possible."
Budget: The specifics of the office itself are unknown, but the total aggregate amount for the national intelligence program is more than $48 billion.

BONUS: The 'intelligence state' has been expanding drastically since 9/11.

BONUS: The 'intelligence state' has been expanding drastically since 9/11.
The U.S. intelligence community is officially made of 17 organizations, but there is even more to the story.
A groundbreaking investigation from the Washington Post found some rather daunting figures:
— 1,271 government organizations and 1,931 private companies are working on intelligence, counterterrorism, or homeland security in the U.S.
— Just the NSA alone is contracting with more than 250 companies on intelligence work, including big names like Northrop Grumman and SAIC.
— Many intelligence agencies are doing redundant work, such as 51 federal and military organizations that track the flow of money in and out of terror networks.
— One reason why those intelligence budgets are classified: millions of dollars in so-called "ghost money" given to foreign governments.

You've seen all the intelligence agencies in the U.S.

You've seen all the intelligence agencies in the U.S.

NOW check out the most elite special forces in the American military >

YouTube - Videos from this email
Click here to Reply, Reply to all, or Forward
2.64 GB (17%) of 15 GB used
©2013 Google - Terms & Privacy
Last account activity: 4 hours ago
Details

People (13)
Sonny San Juan

philcsc@sbcglobal.net
Show details
Ads
Online, Accredited, Top Ranked. Apply Now! Next Classes Start Soon.
Earn your Associate Degree as a Veterinary Technician at home.
Doctor of Ministry Degree Online Get Free Info - It's Fast & Easy!
No Clinicals - 12 Months - $8,500. Get Your Nursing Degree Online Now!
Finish in 12 Months. AACSB Accred. Become CPA Eligible. Free Brochure!
With a Concentration in PR. 100% Online @ Kent State. Brochure.
We've Been Doing This Since 1996. 200,000+ Served. Try Us 100% Free!
Get Help Finding Degree Info. If You Qualify Grants May be Available

GOOGLE SEARCH: SURVEILLANCE NET, END OF PRIVACY, JULY 5, 2013

1.                             The End of Privacy: The Attack on Personal Rights at Home, at Work ...

www.amazon.com/The-End-Privacy-Personal-On-Line/.../031226318X
o                                                       
The End of Privacy and over one million other books are available for Amazon Kindle..... In today's "surveillance society," Congress has refused to regulate .... We've heard about movies like "Enemy of the State" and "The Net" and we've ...

2.                             One Nation Under Surveillance

www.onenationundersurveillance.net/
o                                                       
national security, privacy, intelligence. ... have been dominated by fights over warrantless electronic surveillance and CCTV; ... Introduction: The End of Privacy.

3.                             NYPD expands surveillance net to fight crime as well as terrorism ...

news.yahoo.com/nypd-expands-surveillance-net-fight-crime-well-terrori...
o                                                       
Jun 21, 2013 - NYPD expands surveillance net to fight crime as well as terrorism ....such a system is tantamount to an end run around the Fourth Amendment. ... Cityprivacy guidelines require the NYPD to destroy surveillance video after 30 ...

4.                             The End of Privacy: How Total Surveillance Is Becoming a Reality ... - Page 159 - Google Books Result

books.google.com/books?isbn=1459604202
Reginald Whitaker - 2010 - Computers
The search capacities of the Net hardly exhaust the technological basis forsurveillance of Net activities. Among the more interesting cyber-surveillance ...

5.                             One Nation Under Surveillance: A New Social Contract to Defend ...

www.academia.edu/.../One_Nation_Under_Surveillance_A_New_Social...
o                                                       
OneNationUnderSurveillance.net 00-Chesterman-Prelims.indd iii 8/30/2010 ... SPi Contents Abbreviations Introduction: The End of Privacy PART I. THEORY 1.

6.                             Christopher Soghoian

www.dubfire.net/
o                                                       
Home page of Christopher Soghoian, security and privacy researcher. ... chris@soghoian.net (personal) ... service providers play in facilitating law enforcementsurveillance of their customers. ... Unpublished Draft; An End to Privacy Theater:

7.                             Encryption Works: How to Protect Your Privacy in the Age of NSA ...

https://pressfreedomfoundation.org/.../encryption-works-how-protect-yo...
o                                                       
3 days ago - True end-to-end encryption means that the service provider cannot look at your ... Laura Poitras broke the NSA dragnet surveillance stories, a lot more information .... Users of riseup.net's Jabber service can chat with users of ...

8.                             Geolocation Privacy and Surveillance Act - Wikipedia, the free ...

en.wikipedia.org/wiki/Geolocation_Privacy_and_Surveillance_Act
o                                                       
Knotts and the contentious Electronic Communications Privacy Act of 1986. ... to theft, and for the purpose of tracking stolen merchandise; As a personal safety net for ... to receive explicit consent from the end-user before tracking their location.

9.                             List of films featuring surveillance - Wikipedia, the free encyclopedia

en.wikipedia.org/wiki/List_of_films_featuring_surveillance
o                                                       
There is a body of films that feature surveillance as a theme or as a plot arc. ...technology to break in but are unaware of being under surveillance themselves. ..... By using this site, you agree to the Terms of Use and Privacy Policy. ... The End of Violence ... The Net. The Net 2.0. The Osterman Weekend. The Parallax View.

10.                         David Lyon - The Surveillance Studies Centre

www.sscqueens.org/davidlyon
o                                                       
o                                                       
Surveillance is always a means to an end, whether that end is influence, ...Surveillance, Privacy, and the Globalization of Personal Information: .... "The net, the self, and the future: Manuel Castells' The Information Age", Prometheus, 3, 2000.



The State Department's Bureau of Intelligence and Research provides diplomats the necessary tools for effective foreign policy.

The State Department's Bureau of Intelligence and Research provides diplomats the necessary tools for effective foreign policy.
REUTERS/Lucas Jackson
The State Department's Bureau of Intelligence and Research (INR) has ties to the Office of Strategic Services from World War II, but was transferred to State after the war. INR now reports directlyto the Secretary of State, harnessing intelligence from all sources and offering independent analysis of global events and real-time insight.
Headquarters: Washington, D.C.
Mission: This agency serves as the Secretary of State's primary advisor on intelligence matters, and gives support to other policymakers, ambassadors, and embassy staff.
Budget: $49 million in 2007, according to documents obtained by FAS.

Air Force Intelligence provides reconnaissance for US ground troops.

Air Force Intelligence provides reconnaissance for US ground troops.
Formerly known as the Air Intelligence Agency, the agency is now known as the Air Force ISR — Intelligence, Surveillance, Reconnaissance. Air Force intelligence was established in 1948 to get information to troops on the ground, and most recently, the ISR has collected that intelligence from aerial drones.
Headquarters: Lackland Air Force Base, Texas
Mission: Air Force ISR collects and analyzes intelligence on foreign nations and hostile forces, both in and out of combat zones. They also conduct electronic and photographic surveillance, and provide weather and mapping data to troops in the field.
Budget: Unknown. The budget of ISR apparently falls under the Air Force's Operation & Maintenance budget, which includes other areas outside of the agency's scope such as flying operations and logistics. That number for 2012, however, was just over $46 million.

The FBI's National Security Branch oversees counterterrorism and intelligence gathering.

The FBI's National Security Branch oversees counterterrorism and intelligence gathering.
The Federal Bureau of Investigation's National Security Branch (NSB) was established in 2005, combining resources that include counterterrorism, counter-intelligence, weapons of mass destruction, and intelligence under a single FBI leader.
Headquarters: Washington, D.C.
Mission: Formed after 9/11 and the Iraq WMD commission — when intelligence agencies were not sharing data with each other — the NSB integrates intel on national security and criminal threats from a variety of sources that are often intertwined in order to protect U.S. interests.
Budget: Total FBI budget was approximately $8.1 billion in 2012, which included an increase of $119 million "to enhance our counterterrorism, computer intrusions, and other programs," according to their website.

Army Intelligence and Security Command offers essential intel to troops on the battlefield.

Army Intelligence and Security Command offers essential intel to troops on the battlefield.
Army intelligence has been around since spies worked for the Continental Army in 1775, but the U.S. Army's Intelligence and Security Command (INSCOM) was established in 1977 to become the major unifying command of army intelligence.
Headquarters: Fort Belvoir, Va.
Mission: INSCOM provides commanders on the ground with information they may need on the battlefield: intercepted enemy radio communications, maps, ground imagery, and information on force structure and numbers.
Budget: Unknown. The total military intelligence budget was $21.5 billion in 2012.

The Department of Energy, Office of Intelligence and Counterintelligence gathers information on foreign nuclear weapons.

The Department of Energy, Office of Intelligence and Counterintelligence gathers information on foreign nuclear weapons.
Surprisingly, the Energy Department even has an intelligence service. The Office of Intelligence and Counterintelligence focuses on technical intelligence on nuclear weapons and nonproliferation, nuclear energy (especially foreign), and energy security.
Headquarters: Washington, D.C.
Mission: The Dept. of Energy doesn't have the ability to conduct foreign intelligence, instead relying on information passed to them by other agencies (such as the CIA or NSA). If it involves weapons of mass destruction, the DoE offers up the analytical expertise.
Budget: Unknown. Like other government budgets, the intelligence activity is not specifically mentioned, although it may fall under "Atomic Energy Defense Activities" which had a total budget of more than $16 billion in 2012.

Coast Guard Intelligence provides information on maritime security and homeland defense.

Coast Guard Intelligence provides information on maritime security and homeland defense.
Alaskan Coast Guard members pictured in a 2009 exercise
Coast Guard Intelligence (CGI) was formed in 1915 and now falls under the Dept. of Homeland Security, providing information on maritime and port security, search and rescue, and counter-narcotics.
Headquarters: Washington, D.C.
Mission: Although CGI is technically an intelligence agency, its primary mission is as an investigative arm of the Coast Guard. CGI special agents "conduct criminal, counterintelligence and personnel security investigations within the Coast Guard's area of responsibility," with the majority being criminal offenses violating military law, according to the Coast Guard's official website. However, the Coast Guard does have specialists conducting analysis and collection of intelligence.
Budget: Unknown. Like the Army, the budget has some overlap, although the 2014 budget request includes $60 million for C4ISR systems, an acronym for Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance.
CGI headquarters is relatively small, only employing about 280.

The Treasury's Office of Intelligence and Analysis collects terrorism and financial intelligence.

The Treasury's Office of Intelligence and Analysis collects terrorism and financial intelligence.
The Office of Intelligence and Analysis is fairly new, established in 2004 by the Intelligence Authorization Act. OIA's focus is mainly on providing information to combat terrorism and illicit financial transactions.
Headquarters: Washington, D.C.
Mission: OIA safeguards the U.S. financial system "against illicit use and combating rogue nations, terrorist facilitators, weapons of mass destruction proliferators, money launderers, drug kingpins, and other national security threats," according to DNI.
Budget: Around $340 million.

The Drug Enforcement Administration hunts down illegal drugs.

The Drug Enforcement Administration hunts down illegal drugs.
The DEA has been gathering intelligence for anti-drug operations since its establishment in 1973. The agency collects and provides intelligence to other law enforcement agencies and helps with investigations.
Headquarters: El Paso, Texas
Mission: DEA assists local and federal law enforcement in conducting major drug investigations, along with developing "information that leads to seizures and arrests, and provid[ing] policy makers with drug trend information upon which programmatic decisions can be based," according to their website.
Budget: $2 billion (total DEA budget in 2013)

The Marine Corps Intelligence Activity monitors the Corp's battlefields.

The Marine Corps Intelligence Activity monitors the Corp's battlefields.
Like Army intelligence, the Marine Corps provides their own agency to collect and analyze information for troops on the ground. This includes map making, radio intercepts, human intelligence, and counter-intelligence.
Headquarters: Quantico, Va.
Mission: The primary function of Marine IA is to give tactical and operational intelligence to battlefield commanders. They also serve as the "go-to" unit for the Commandant of the Marine Corps on understanding intel.
Budget: Unknown. The total military intelligence budget was $21.5 billion in 2012.

The National Geospatial-Intelligence Agency provides advanced mapping for military forces.

The National Geospatial-Intelligence Agency provides advanced mapping for military forces.
Digital Globe
Having its roots from the 1972 formation of the Defense Mapping Agency and formerly known as NIMA, the agency was renamed the National Geospatial-Intelligence Agency in 2003. The agency has the task of collecting and understanding Earth's physical and man-made attributes. Using advanced imagery (mainly from satellites), it was NGA watching Osama bin Laden's compound in Pakistan.
Headquarters: Ft. Belvoir, Va.
Mission: NGA employs cartographers and analysts that collect and generate information about the Earth. This data is used in navigation, national security, military operations, and humanitarian aid efforts.
Budget: Classified. NGA employs approximately 14,500 government civilians.

The National Reconnaissance Office is responsible for America's spy satellites.

The National Reconnaissance Office is responsible for America's spy satellites.
CREDIT: NASA Marshall Space Flight Center
While the NGA is responsible for gaining information from satellite data, the National Reconnaissance Office — created secretly in 1961 and not acknowledged until 1992 — is in charge with satellite design, building, launch, and maintenance.
Headquarters: Chantilly, Va.
Mission: NRO gives its mission as "innovative overhead intelligence systems for national security." Simply put, the NRO provides their "customers" at the CIA, DoD, and elsewhere with technologically advanced spy satellites.
Budget: Classified.

The Office of Naval Intelligence provides information on the world's oceans to sailors everywhere.

The Office of Naval Intelligence provides information on the world's oceans to sailors everywhere.
The Office of Naval Intelligence was established in 1882 for "the purpose of collecting and recording naval information" that could be useful in war and peace. Like other military intelligence services, ONI gives maritime commanders information they need on foreign forces.
Headquarters: Washington, D.C.
Mission: ONI gathers intelligence and moves it rapidly to decision makers. "We produce maritime intelligence on weapons and technology proliferation and smuggling and illicit maritime activities that directly supports the U.S. Navy, joint war fighters and national decision makers and agencies," according to their website.
Budget: Unknown. The total military intelligence budget was $21.5 billion in 2012.

The Department of Homeland Security Office of Intelligence and Analysis looks for information on any potential threats to the US.

The Department of Homeland Security Office of Intelligence and Analysis looks for information on any potential threats to the US.
The DHS Office of Intelligence and Analysis works primarily on homeland threats — collecting and analyzing information, and sharing intelligence with local and federal law enforcement through the use of "fusion centers."
Headquarters: Washington, D.C.
Mission: They work on four main areas: understanding threats through analysis, collecting information relevant to homeland security, sharing that information with the agencies that need it, and managing the homeland security enterprise, according to DNI.
Budget: Classified. In a Congressional Research Service report, it was noted that "DNI does not publicly disclose details about the intelligence budget, but ... reported that the aggregate amount appropriated to the [national intelligence program] for FY2009 was $49.8 billion."

The Office of the Director of National Intelligence is where all the intelligence should come together for delivery to the president.

The Office of the Director of National Intelligence is where all the intelligence should come together for delivery to the president.
Established in 2004, the Office of the Director of National Intelligence (ODNI) manages the efforts of the entire U.S. intelligence community. Director James R. Clapper serves as the principal advisor to the president as well as the National Security and Homeland Security Councils.
Headquarters: Washington, D.C.
Mission: The DNI has two main missions: to lead intelligence integration, and "forge an intelligence community that delivers the most insightful intelligence possible."
Budget: The specifics of the office itself are unknown, but the total aggregate amount for the national intelligence program is more than $48 billion.

BONUS: The 'intelligence state' has been expanding drastically since 9/11.

BONUS: The 'intelligence state' has been expanding drastically since 9/11.
The U.S. intelligence community is officially made of 17 organizations, but there is even more to the story.
A groundbreaking investigation from the Washington Post found some rather daunting figures:
— 1,271 government organizations and 1,931 private companies are working on intelligence, counterterrorism, or homeland security in the U.S.
— Just the NSA alone is contracting with more than 250 companies on intelligence work, including big names like Northrop Grumman and SAIC.
— Many intelligence agencies are doing redundant work, such as 51 federal and military organizations that track the flow of money in and out of terror networks.
— One reason why those intelligence budgets are classified: millions of dollars in so-called "ghost money" given to foreign governments.

You've seen all the intelligence agencies in the U.S.

You've seen all the intelligence agencies in the U.S.

NOW check out the most elite special forces in the American military >

YouTube - Videos from this email
Click here to Reply, Reply to all, or Forward
2.64 GB (17%) of 15 GB used
©2013 Google - Terms & Privacy
Last account activity: 4 hours ago
Details


Having its roots from the 1972 formation of the Defense Mapping Agency and formerly known as NIMA, the agency was renamed the National Geospatial-Intelligence Agency in 2003. The agency has the task of collecting and understanding Earth's physical and man-made attributes. Using advanced imagery (mainly from satellites), it was NGA watching Osama bin Laden's compound in Pakistan.
Headquarters: Ft. Belvoir, Va.
Mission: NGA employs cartographers and analysts that collect and generate information about the Earth. This data is used in navigation, national security, military operations, and humanitarian aid efforts.
Budget: Classified. NGA employs approximately 14,500 government civilians.

The National Reconnaissance Office is responsible for America's spy satellites.

The National Reconnaissance Office is responsible for America's spy satellites.
CREDIT: NASA Marshall Space Flight Center
While the NGA is responsible for gaining information from satellite data, the National Reconnaissance Office — created secretly in 1961 and not acknowledged until 1992 — is in charge with satellite design, building, launch, and maintenance.
Headquarters: Chantilly, Va.
Mission: NRO gives its mission as "innovative overhead intelligence systems for national security." Simply put, the NRO provides their "customers" at the CIA, DoD, and elsewhere with technologically advanced spy satellites.
Budget: Classified.

The Office of Naval Intelligence provides information on the world's oceans to sailors everywhere.

The Office of Naval Intelligence provides information on the world's oceans to sailors everywhere.
The Office of Naval Intelligence was established in 1882 for "the purpose of collecting and recording naval information" that could be useful in war and peace. Like other military intelligence services, ONI gives maritime commanders information they need on foreign forces.
Headquarters: Washington, D.C.
Mission: ONI gathers intelligence and moves it rapidly to decision makers. "We produce maritime intelligence on weapons and technology proliferation and smuggling and illicit maritime activities that directly supports the U.S. Navy, joint war fighters and national decision makers and agencies," according to their website.
Budget: Unknown. The total military intelligence budget was $21.5 billion in 2012.

The Department of Homeland Security Office of Intelligence and Analysis looks for information on any potential threats to the US.

The Department of Homeland Security Office of Intelligence and Analysis looks for information on any potential threats to the US.
The DHS Office of Intelligence and Analysis works primarily on homeland threats — collecting and analyzing information, and sharing intelligence with local and federal law enforcement through the use of "fusion centers."
Headquarters: Washington, D.C.
Mission: They work on four main areas: understanding threats through analysis, collecting information relevant to homeland security, sharing that information with the agencies that need it, and managing the homeland security enterprise, according to DNI.
Budget: Classified. In a Congressional Research Service report, it was noted that "DNI does not publicly disclose details about the intelligence budget, but ... reported that the aggregate amount appropriated to the [national intelligence program] for FY2009 was $49.8 billion."

The Office of the Director of National Intelligence is where all the intelligence should come together for delivery to the president.

The Office of the Director of National Intelligence is where all the intelligence should come together for delivery to the president.
Established in 2004, the Office of the Director of National Intelligence (ODNI) manages the efforts of the entire U.S. intelligence community. Director James R. Clapper serves as the principal advisor to the president as well as the National Security and Homeland Security Councils.
Headquarters: Washington, D.C.
Mission: The DNI has two main missions: to lead intelligence integration, and "forge an intelligence community that delivers the most insightful intelligence possible."
Budget: The specifics of the office itself are unknown, but the total aggregate amount for the national intelligence program is more than $48 billion.

BONUS: The 'intelligence state' has been expanding drastically since 9/11.

BONUS: The 'intelligence state' has been expanding drastically since 9/11.
The U.S. intelligence community is officially made of 17 organizations, but there is even more to the story.
A groundbreaking investigation from the Washington Post found some rather daunting figures:
— 1,271 government organizations and 1,931 private companies are working on intelligence, counterterrorism, or homeland security in the U.S.
— Just the NSA alone is contracting with more than 250 companies on intelligence work, including big names like Northrop Grumman and SAIC.
— Many intelligence agencies are doing redundant work, such as 51 federal and military organizations that track the flow of money in and out of terror networks.
— One reason why those intelligence budgets are classified: millions of dollars in so-called "ghost money" given to foreign governments.

You've seen all the intelligence agencies in the U.S.

You've seen all the intelligence agencies in the U.S.

NOW check out the most elite special forces in the American military >

YouTube - Videos from this email






Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law By Michael Snyder

June 15, 2013 "Information Clearing House - Are you on the list?  Are you one of the millions of Americans that have been designated a threat to national security by the U.S. government?  Will you be subject to detention when martial law is imposed during a major national emergency?  As you will see below, there is actually a list that contains the names of at least 8 million Americans known as Main Core that the U.S. intelligence community has been compiling since the 1980s.  A recent article on Washington’s Blog quoted a couple of old magazine articles that mentioned this program, and I was intrigued because I didn’t know what it was.  So I decided to look into Main Core, and what I found out was absolutely stunning – especially in light of what Edward Snowden has just revealed to the world.  It turns out that the U.S. government is not just gathering information on all of us.  The truth is that the U.S. government has used this information to create a list of threats to national security that the government would potentially watch, question or even detain during a national crisis.  If you have ever been publicly critical of the government, there is a very good chance that you are on that list.
The following is how Wikipedia describes Main Core…
Main Core is the code name of a database maintained since the 1980s by the federal government of the United States. Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database’s name derives from the fact that it contains “copies of the ‘main core’ or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community.”
It was Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core.  At the time, the shocking information that he revealed did not get that much attention.  That is quite a shame, because it should have sent shockwaves across the nation…
According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.
Of course, federal law is somewhat vague as to what might constitute a “national emergency.” Executive orders issued over the last three decades define it as a “natural disaster, military attack, [or] technological or other emergency,” while Department of Defense documents include eventualities like “riots, acts of violence, insurrections, unlawful obstructions or assemblages, [and] disorder prejudicial to public law and order.” According to one news report, even “national opposition to U.S. military invasion abroad” could be a trigger.
So if that list contained 8 million names all the way back in 2008, how big might it be today?
That is a very frightening thing to think about.
Later on in 2008, Tim Shorrock of Salon.com also reported on Main Core…
Dating back to the 1980s and known to government insiders as “Main Core,” the database reportedly collects and stores — without warrants or court orders — the names and detailed data of Americans considered to be threats to national security. According to several former U.S. government officials with extensive knowledge of intelligence operations, Main Core in its current incarnation apparently contains a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies. One former intelligence official described Main Core as “an emergency internal security database system” designed for use by the military in the event of a national catastrophe, a suspension of the Constitution or the imposition of martial law.
So why didn’t this information get more attention at the time?
Well, if Obama had lost the 2008 election it might have.  But Obama won in 2008 and the liberal media assumed that he would end many of the abuses that were happening under Bush.  Of course that has not happened at all.  In fact, Obama has steadily moved the police state agenda ahead aggressively.  Edward Snowden has just made that abundantly clear to the entire world.
After 2008, it is unclear exactly what happened to Main Core.  Did it expand, change names, merge with other programs or get superseded by a new program?  It appears extremely unlikely that it simply faded away.  In light of what we have just learned about NSA snooping, someone should ask our politicians some very hard questions about Main Core.  According toChristopher Ketchum, the exact kind of NSA snooping that Edward Snowden has just described was being used to feed data into the Main Core database…
A host of publicly disclosed programs, sources say, now supply data to Main Core. Most notable are the NSA domestic surveillance programs, initiated in the wake of 9/11, typically referred to in press reports as “warrantless wiretapping.” In March, a front-page article in the Wall Street Journal shed further light onto the extraordinarily invasive scope of the NSA efforts: According to the Journal, the government can now electronically monitor “huge volumes of records of domestic e-mails and Internet searches, as well as bank transfers, credit card transactions, travel, and telephone records.” Authorities employ “sophisticated software programs” to sift through the data, searching for “suspicious patterns.” In effect, the program is a mass catalog of the private lives of Americans. And it’s notable that the article hints at the possibility of programs like Main Core. “The [NSA] effort also ties into data from an ad-hoc collection of so-called black programs whose existence is undisclosed,” the Journal reported, quoting unnamed officials. “Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach.”
The following information seems to be fair game for collection without a warrant: the e-mail addresses you send to and receive from, and the subject lines of those messages; the phone numbers you dial, the numbers that dial in to your line, and the durations of the calls; the Internet sites you visit and the keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards. All of this information is archived on government supercomputers and, according to sources, also fed into the Main Core database.
This stuff is absolutely chilling.
And there have been hints that such a list still exists today.
For example, the testimony of an anonymous government insider that was recently posted on shtfplan.com alluded to such a list…
“We know all this already,” I stated. He looked at me, giving me a look like I’ve never seen, and actually pushed his finger into my chest. “You don’t know jack,” he said, “this is bigger than you can imagine, bigger than anyone can imagine. This administration is collecting names of sources, whistle blowers and their families, names of media sources and everybody they talk to and have talked to, and they already have a huge list. If you’re not working for MSNBC or CNN, you’re probably on that list. If you are a website owner with a brisk readership and a conservative bent, you’re on that list. It’s a political dissident list, not an enemy threat list,” he stated.
What in the world is happening to America?
What in the world are we turning into?
As I mentioned in a previous article, the NSA gathers 2.1 million gigabytes of data on all of us every single hour.  The NSA is currently constructing a 2 billion dollar data center out in Utah to store all of this data.
If you are disturbed by all of this, now is the time to stand up and say something.  If this crisis blows over and people forget about all of this stuff again, the Big Brother surveillance grid that is being constructed all around us will just continue to grow and continue to become even more oppressive.
America is dying right in front of your eyes and time is running out.  Please stand up and be counted while you still can.
This article was originally published at American Dream

Main Core - Big Brother






In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Information Clearing House has no affiliation whatsoever with the originator of this article nor is Information ClearingHouse endorsed or sponsored by the originator.)


ShaneHarris.com
Bottom of Form
The Watchers
Go to latest news
The Watchers
Praise for The Watchers:
“It uses smart technical analysis and crisp writing to put the reader inside the room with the watchers and to help better understand the mind-set that gave rise to the modern surveillance state…an insightful glimpse into how Washington works and how ideas are marketed and sold in the back rooms of power, whether the product being peddled is widgets or a radical model for intelligence gathering”–The New York Times
“A vivid, well-reported and intellectually sophisticated account of the surveillance state in the wake of the attacks on September 11th 2001.”–The Economist, Best Books of 2010
“A painstaking account…tells readers more than they could have learned from the mainstream media at the time of the events.”–Associated Press
The Watchers reads like a thriller, and the story is sadly on the mark in describing our limited oversight of the government’s surveillance powers.”–Gregory F. Treverton, Director, Center for Global Risk and Security, Rand Corporation
“This is an astonishingly detailed, well-researched narrative.”–James Mann, Author of Rise of the Vulcans
[Harris] has turned what could have been the driest of policy studies into a riveting yarn of skulduggery and betrayal.”–San Francisco Chronicle
A “timely and admirably balanced account…informative and dramatic narrative…” –Publishers Weekly
“Harris displays an exquisite understanding of the intricacies of his topic and a remarkable sensitivity to the genuine concerns of the watchers and their critics. …A sharply written, wise analysis of the complex mashup of electronic sleuthing, law, policy and culture.”–Kirkus Reviews
“What’s either most reassuring or most unnerving about The Watchers is that the men and women it depicts don’t appear to have hidden agendas. For them, technology and not ideology is the overriding concern, a matter of leveling the playing field and harnessing the Internet into one unlimited search engine.”–Los Angeles Times
“Harris sifts through a confusing array of acronyms, fascinating characters, and chilling operations to offer an absorbing look at modern spying technology and how it impacts average Americans.”–Booklist
Using exclusive access to key government insiders, Shane Harris chronicles the rise of America’s surveillance state over the past 25 years and highlights a dangerous paradox: Our government’s strategy has made it harder to catch terrorists and easier to spy on the rest of us.
In 1983, Admiral John Poindexter, President Reagan’s National Security Advisor, realized that the U.S. might have prevented the terrorist massacre of 241 Marines in Beirut, if intelligence agencies could have analyzed in real time the data they had on the attackers. Poindexter poured technical know-how and government funds into his dream–a system that would sift reams of information for signs of terrorist activity. Decades later, that elusive dream still captivates Washington. After 9/11, Poindexter returned to government with a controversial program, called Total Information Awareness, to detect the next attack. Today it has evolved into a secretly funded operation that can gather a trove of personal information on every American and millions of others worldwide.
Despite billions of dollars spent on this quest since the Reagan era, we still can’t discern future threats in the vast data cloud that surrounds us all. But the government can now spy on its citizens with an ease that was impossible-and illegal-just a few years ago. Drawing on unprecedented access to the people who pioneered this high-tech spycraft, Harris shows how it has moved from the province of right-wing technocrats into the mainstream, becoming a cornerstone of the Obama administration’s war on terror.
Harris puts us behind the scenes where twenty-first-century spycraft was born. We witness Poindexter quietly working from the private sector to get government to buy in to his programs in the early nineties. We see an Army major agonize as he carries out an order to delete the vast database he’s gathered on possible terror cells-and on thousands of innocent Americans-months before 9/11. We follow National Security Agency Director Mike Hayden as he persuades the Bush administration to secretly monitor Americans based on a flawed interpretation of the law. And we see Poindexter return to government with a seemingly implausible idea: that the authorities can collect data about citizens and at the same time protect their privacy. After Congress publicly bans the Total Information Awareness program in 2003, we watch as it secretly becomes a “black program” at the NSA, then engaged in a massive surveillance of Americans’ phone calls and e-mails.
When the next crisis comes, our government will inevitably crack down on civil liberties, but it will be no better able to identify new dangers. This is the outcome of a dream first hatched almost three decades ago, and The Watchers is an engrossing, unnerving wake-up call.
Join The Watchers on Facebook.
Go to top
June 20, 2013
I talked with Terry Gross about surveillance, data mining, and the recent revelations of NSA intelligence programs. Listen here.
August 23, 2012
My op-ed in today’s New York Times looks at a decade of secret government surveillance and why we’re still powerless against it.
June 9, 2011
I’m happy to report that The Watchers won this year’s Bernstein Award for excellence in journalism! This is a huge thrill, and I’m honored to be included in such fine company of past winners and finalists. You can read more about the award here. And here’s a write up of the evening ceremony, which was held this week at the New York Public Library.
January 25, 2011
The Watchers is on sale today in paperback. You can pick up a copy in your favorite bookstore or online. It’s got a nifty new cover, as well as a new afterword on the Christmas Day bombing attempt. That event occurred as the hardcover was going to press, so we couldn’t work it in. I’m glad it’s in the new version, because it ties up the theme of the whole book very nicely.


SURVEILLANCE CAMERAS
BIG BROTHER IS ALWAYS WATCHING!
 This is amazing, but also a little freaky. No more hiding in a crowd.

This picture was taken with a camera 70,000 x 30,000 pixels (2100 MegaPixels) that can identify any face in a multitude.  
These cameras are not sold to the public and are being installed in strategic locations. (This one is in Canada). Imagine what this means...  both police and the FBI have it.
Place the cursor in the multitude and left double click a couple times. Or enlarge the picture with the mouse wheel.
The more you click or move the wheel, the closer the people will appear. Amazing!!There are thousands of persons and yet one can spot and recognize any face.

RSN Godot Logo
Reader Supported News | 30 June 13

FOCUS | Greenwald With a Look at the Next NSA Bombshell 
Emma Roller, Slate Magazine
Roller reports: "Greenwald said the Guardian is planning to publish a document showing that new technology allows the National Security Agency to direct one billion cell phone calls every day into its data repositories."
READ MORE  
 http://readersupportednews.org/news-section2/318-66/18178-focus-greenwald-with-a-look-at-the-next-nsa-bombshell-


Norman Solomon, Norman Solomon's Blog: More than outrage, the American people must work to use the power of the electorate to fight against the government's growing invasion into our lives.


NEW YORK TIMES REPORTS ON SURVEILLANCE
New York Times
Monday, July 22, 2013

Times Topics

·                                 WORLD
·                                 U.S.
·                                 N.Y. / REGION
·                                 BUSINESS
·                                 TECHNOLOGY
·                                 SCIENCE
·                                 HEALTH
·                                 SPORTS
·                                 OPINION
·                                 ARTS
·                                 STYLE
·                                 TRAVEL
·                                 JOBS
·                                 REAL ESTATE
·                                 AUTOS

National Security Agency

News about the National Security Agency, including commentary and archival articles published in The New York Times.
RELATED: Wiretapping | FISA

Highlights From the Archives

E-Mail Surveillance Renews Concerns in Congress
By JAMES RISEN and ERIC LICHTBLAU
Intercepts of Americans’ phone calls and e-mail messages are broader than previously acknowledged, officials said.
June 17, 2009USNEWS
Officials Say U.S. Wiretaps Exceeded Law
By ERIC LICHTBLAU and JAMES RISEN
There was an “overcollection” of domestic e-mails and calls of Americans by the N.S.A., officials said.
April 16, 2009USNEWS
Spying Program May Be Tested by Terror Case
By ADAM LIPTAK
The case of two men convicted of supporting terrorism is central in a push to challenge an eavesdropping program.
August 26, 2007USNEWS
Role of Telecom Firms in Wiretaps Is Confirmed
By ERIC LICHTBLAU
The Bush administration has said for the first time that American telecommunications companies played a crucial role in domestic eavesdropping.
August 24, 2007WASHINGTONNEWS
Bush Signs Law to Widen Reach for Wiretapping
By JAMES RISEN
People familiar with the law said that it provided a legal framework for surveillance without warrants.
August 6, 2007WASHINGTONNEWS
White House Is Subpoenaed on Wiretapping
By JAMES RISEN
The Senate Judiciary Committee sent subpoenas to the White House, the vice president’s office and the Justice Department, setting the stage for a showdown.
June 28, 2007WASHINGTONNEWS

ARTICLES ABOUT THE U.S. NATIONAL SECURITY AGENCY

Newest First | Oldest First
Page: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Next >>
Surveillance Court Renews Order for Phone Call Data
By SCOTT SHANE
The Foreign Intelligence Surveillance Court has approved a new order for collection of bulk data on phone calls in the United States.
July 20, 2013, Saturday
N.S.A. Imposes Rules to Protect Secret Data Stored on Its Networks
N.S.A. Imposes Rules to Protect Secret Data Stored on Its Networks
By DAVID E. SANGER and ERIC SCHMITT
The new mission formalizes America’s use of a class of weapons that the Obama administration has rarely discussed in public.
July 19, 2013, Friday
Yes We Can to Yes We Scan
Yes We Can to Yes We Scan
By JULIET LAPIDOS
Three versions of Shepard Fairey’s “HOPE” poster show growing disaffection with government.
July 18, 2013, Thursday
Guardian Journalist to Write Book on Surveillance
By JULIE BOSMAN
The journalist Glenn Greenwald, who first reported on the documents leaked by Edward J. Snowden, has a deal with Metropolitan Books.
July 18, 2013, Thursday
Bipartisan Backlash Grows Against Domestic Surveillance
Bipartisan Backlash Grows Against Domestic Surveillance
By JAMES RISEN
Lawmakers from both parties called for the collection of the private data of millions of Americans to be scaled back.
July 18, 2013, Thursday
British Agency Is Cleared of Illegal Data Gathering
By STEPHEN CASTLE
The Government Communications Headquarters had been accused of accessing information from an American surveillance program.
July 18, 2013, Thursday
Merkel Urges Europe to Tighten Internet Safeguards
Merkel Urges Europe to Tighten Internet Safeguards
By MELISSA EDDY and JAMES KANTER
The remarks by Germany’s chancellor, Angela Merkel, reflected the anger in Europe over accounts of government surveillance by the United States National Security Agency, leaked by Edward J. Snowden.
July 16, 2013, Tuesday
N.S.A. Leaks Revive Push in Russia to Control Net
By ANDREW E. KRAMER
Even before Edward J. Snowden arrived in a Moscow airport, Russia had been pressing for greater access to social networking and e-mail data.
July 15, 2013, Monday
Nations Buying as Hackers Sell Flaws in Computer Code
Nations Buying as Hackers Sell Flaws in Computer Code
By NICOLE PERLROTH and DAVID E. SANGER
Governments pay hundreds of thousands of dollars to learn about and exploit weaknesses in the computer systems of foreign adversaries.
July 14, 2013, Sunday
Russian Officials Say They Didn’t Receive an Asylum Request From Snowden
Russian Officials Say They Didn’t Receive an Asylum Request From Snowden
By DAVID M. HERSZENHORN
Senior Kremlin officials said Russia’s Federal Migration Service had not yet received a formal appeal for asylum from Edward J. Snowden, the former intelligence contractor.
July 14, 2013, Sunday
SEARCH 660 ARTICLES ABOUT THE U.S. NATIONAL SECURITY AGENCY:
  
Page: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Next >>

Headlines Around the Web

What's This?
THE BIG PICTURE
JULY 21, 2013

America No Longer Has a Functioning Judicial System

THE WASHINGTON POST
JULY 21, 2013

NSA growth fueled by need to target terrorists

MASHABLE!
JULY 21, 2013

Let Snowden Fly: Indiegogo Campaign Hopes to Fund Whistleblower's Trip to Venezuela

CRIMPROF BLOG
JULY 21, 2013

"The NSA Admits It Analyzes More People's Data Than Previously Revealed"

GIZMODO
JULY 21, 2013

Millions Of Cell Phones Could Be Vulnerable To This SIM Card Hack

Multimedia

Snowden Makes Appeal From Airport
Video of Edward J. Snowden with international rights activists in Moscow on Friday was posted on the Russian news site Life News.
An Offer of Asylum for Snowden
Venezuelans weigh in on the implications of the invitation by President Nicolás Maduro to Edward J. Snowden, the American fugitive.
Obama on Edward J. Snowden
The president commented on the United States' request to extradite the former National Security Agency computer technician at a news conference in Dakar, Senegal, on Thursday.
N.S.A. Chief Testfies on Surveillance
At a House Intelligence Committee hearing on Tuesday, Gen. Keith B. Alexander described how American surveillance programs helped thwart dozens of terror plots.
Take That, Big Brother!
Edward J. Snowden’s disclosure that the United States government is collecting phone and Internet records kick-started a wave of creative commentary on government surveillance.
Why Surveillance Draws Little Outcry
Daniel J. Solove, a privacy expert and professor of law at George Washington University, discusses the public response — or lack thereof — to recent disclosures about government eavesdropping.
Reaction to the N.S.A. Leak
The Times’s Mark Mazzetti on how a low-level contractor was able to leak vast amounts of classified information, and the reaction it caused in Washington.
Reaction to the Snowden Leak
The Times’s Mark Mazzetti on how a low-level contractor was able to leak vast amounts of classified information, and the reaction it caused in Washington.
Protecting Your Privacy
The Times’s Nicole Perlroth outlines ways in which you can protect your privacy against the National Security Agency’s Prism program.
Obama on Surveillance, Then and Now
As a senator, Barack Obama was a critic of the Bush administration, saying it cast a “false choice” between liberty and security. As he engages in his own surveillance efforts, he has spoken of finding a balance.

Related Article

Bush Lets U.S. Spy on Callers Without Courts
By JAMES RISEN and ERIC LICHTBLAU
Under a presidential order signed in 2002, the National Security Agency has spied on hundreds of people inside the U.S. (Dec. 16, 2005)

Documents

National Security Agency Documents
Documents regarding domestic spying, including the Foreign Intelligence Surveillance Act of 1978 (FISA).



Contents of #3  Oct. 25, 2011
Arkansas Police Cell Phone Surveillance
Patriot Act, Cyber Surveillance
Books
   Fuchs on Internet
   Landau on Wiretapping
   McCoy on Empire
Fuchs, et al., Internet and Surveillance
Mass Surveillance and False Positives
Databases on Everybody Legislation
IPhone Records
New Photo Tech
Lt. Dan Choi

Contents of #4 Jan. 31, 2012
Obama’s State of the Union Speech
Spying Boon to Corporations vs. Privacy
ACLU: FBI Mapping US
Space Surveillance
NSA Warrantless Surveillance
Muslims Demand End of Surveillance


END SURVEILLANCE NEWSLETTER #6

No comments: