OMNI CIVIL LIBERTIES/SURVEILLANCE NEWSLETTER #6, JULY
22, 2013, for a CULTURE OF PEACE AND
JUSTICE. Compiled by
Dick Bennett. (#1 Jan.
28, 2008; #2 Jan. 22, 2011; #3 Oct. 25, 2011; #4 Jan. 31, 2012; #5 June 9, 2013).
My blog: War
Department/Peace Department
My Newsletters:
For an informed and resistant citizenry. See: CIA, FBI, Drones, National Security
State , NSA, Top Secret,
Intelligence Industry Complex, Imperialism, Fascism, and more.
Index:
Visit OMNI’s Library.
The multifarious methods of oppression employed by
an imperial state would fill an encyclopedia.
One general method is the control of language, and one sub-set covers
rhetorical devices. A specific figure is
euphemism, a powerful way of hiding
folly and depravity. For example, our
government has rebranded US
state assassination as “high value targeting.” Dick
"I
refuse to live in a country like this, and I'm not leaving"
Michael Moore
Michael Moore
Contents of #3
Oct. 25, 2011
Patriot
Act, Cyber Surveillance
Books
Fuchs on Internet
Landau on Wiretapping
McCoy on Empire
Fuchs,
et al., Internet and Surveillance
Mass
Surveillance and False Positives
Databases
on Everybody Legislation
IPhone
Records
New
Photo Tech
Lt.
Dan Choi
Contents of #4 Jan. 31, 2012
Obama’s
State of the Union Speech
Spying
Boon to Corporations vs. Privacy
ACLU:
FBI Mapping US
Space
Surveillance
NSA
Warrantless Surveillance
Muslims
Demand End of Surveillance
Here is the link to all OMNI newsletters: http://www.omnicenter.org/newsletter-archive/
Contents of #5 June 9, 2013
Warrantless
Spying: Contact Pryor and Boozman
Lockshin, Credo Action
Friday, BORDC
Massive
National Security Agency Spying
Massive
Surveillance State
NSA
Lying, Has Our Emails
Bromwich,
Secret Surveillance of All Communications in US
Cybersecurity
Act vs. Privacy
Take
Action to Defund the Massive NSA Spy Center
in Utah
Kuzmarov,
Modernizing Repression
McCoy,
Policing the Empire
Huggins,
Political Policing Latin America
Contents #6
Ellsberg,
Join ACLU Action
Petition
to President Obama
Jimmy
Carter, US Democracy
SNOWDEN
Greenwald,
Edward Snowden
Majority
Would Prosecute Snowden, Pew
Research Center
William
Blum on Snowden, NSA History, CIA, Whistleblower
Philip Agee (Anti-Empire Report #118)
Greenwald,
Lack of FISA Oversight
Sign
Petitions on Snowden, NSA, FISA
The Nation, Snowden vs. Surveillance Net
and End of Privacy
Lindorff,
Not China But US is the Great Hacker
Snyder,
“Maincore”: US Martial Law Detainee List
Harris,
The Rise of the America’s Surveillance
State
Surveillance
Cameras
Greenwald,
Future Surveillance
Solomon,
Effective Resistance
New York Times Reports on
Surveillance. For example, Lichtblau (NYT), Data-Gathering Law Widened. ADG (7-6-13) 1A.
Ellsberg Says: Put A Stop To
Indiscriminate Spying On Americans
To Daniel Ellsberg,
the well-known whistleblower and lifelong advocate for freedom who leaked the
“Pentagon Papers” 40 years ago, “there has not been in American history a more important leak than
Edward Snowden’s release of NSA material.”
Snowden’s disclosure
publicly revealed that, under provisions of the Patriot
Act (Section 215) and the Foreign Intelligence
Surveillance Act (FISA Section 702), the National Security Agency (NSA) has direct access to the
systems of Microsoft, Google, Facebook, Apple and other major U.S. internet
companies.
The information collected includes search history, email, video
and voice chat, videos, photos, social networking details, and more. The
government has also been secretly tracking the calls of customers from all the
major telecommunications companies—to whom they spoke, from where and for how
long—going back seven years.
In an email this week to ACLU supporters, Ellsberg noted:
I’ve seen firsthand how the
consequences of [this] kind of government abuse threaten our most fundamental
liberties…we may find ourselves in a dangerous situation in which average
citizens, along with Congresspersons, journalists and their sources, even
judges, are watched around the clock and afraid to dissent. The core fixtures
of our democracy—the right to protest, the right to live freely in the pursuit
of life, liberty, and happiness without government intrusion—could be weakened
beyond repair.
We simply can’t afford to do
nothing. We have no choice but to act now.
Over 30,000 ACLU supporters have already
spoken out against these spying programs. Join their calls for change.
Demand
that President Obama end the secret surveillance state by calling for the
repeal of section 215 of the Patriot Act and section 702 of FISA.
PETITION
TO PRESIDENT OBAMA TO INCREASE TRANSPARENCY BY ENDING WARRANTLESS INTERNET
WIRETAPS PERMITTED IN THE PATRIOT ACT SECTION 215 AND FISA SECTION 702.
JUNE
22, 2013
To Daniel Ellsberg,
the well-known whistleblower and lifelong advocate for freedom who leaked the
“Pentagon Papers” 40 years ago, “there has not been in American history a more important leak than
Edward Snowden’s release of NSA material.”
Snowden’s disclosure
publicly revealed that, under provisions of the Patriot
Act (Section 215) and the Foreign Intelligence
Surveillance Act (FISA Section 702), the National Security Agency (NSA) has direct access to the
systems of Microsoft, Google, Facebook, Apple and other major U.S. internet
companies.
The information collected includes search history, email, video
and voice chat, videos, photos, social networking details, and more. The
government has also been secretly tracking the calls of customers from all the
major telecommunications companies—to whom they spoke, from where and for how
long—going back seven years.
We
Citizens ask President Obama to reduce secret surveillance by calling for the
repeal of section 215 of the Patriot Act and section 702 of FISA.
NAME (PRINT)
ADDRESS
FOCUS | Jimmy Carter: US "Has No
Functioning Democracy"
Alberto Riva, International Business Times
Riva reports: "Former U.S. president Jimmy Carter is so concerned about the NSA spying scandal that he thinks it has essentially resulted in a suspension of American democracy." [from SonnySan Juan ]
–D]
READ MORE
Alberto Riva, International Business Times
Riva reports: "Former U.S. president Jimmy Carter is so concerned about the NSA spying scandal that he thinks it has essentially resulted in a suspension of American democracy." [from Sonny
READ MORE
S
N O W D E N
Reader Supported News | 09 June 13
BREAKER | Edward Snowden: The Whistleblower Behind Revelations
of NSA Surveillance
Glenn Greenwald, Ewen MacAskill, Laura Poitras, Guardian UK
Excerpt: "The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA."
READ MORE http://readersupportednews.org/news-section2/318-66/17852-breaker-edward-snowden-the-whistleblower-behind-revelations-of-nsa-surveillance
Glenn Greenwald, Ewen MacAskill, Laura Poitras, Guardian UK
Excerpt: "The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA."
READ MORE http://readersupportednews.org/news-section2/318-66/17852-breaker-edward-snowden-the-whistleblower-behind-revelations-of-nsa-surveillance
|
The public
is divided over whether the leak of classified information about NSA phone
and internet surveillance serves the public interest. But a majority says
that former government contractor Edward Snowden should be criminally
prosecuted. Young people are more likely than other age groups to think that
the NSA leak serves the public interest.
The Anti-Empire Report #118 by
William Blum
www.killinghope.org (June 26 2013) Official website of the author, historian, and Edward Snowden In the course of his professional life in the world of national security Edward Snowden must have gone through numerous probing interviews, lie detector examinations, and exceedingly detailed background checks, as well as filling out endless forms carefully designed to catch any kind of falsehood or inconsistency. The Washington Post (June 10) reported that "several officials said the CIA will now undoubtedly begin reviewing the process by which Snowden may have been hired, seeking to determine whether there were any missed signs that he might one day betray national secrets". Yes, there was a sign they missed - Edward Snowden had something inside him shaped like a conscience, just waiting for a cause. It was the same with me. I went to work at the State Department, planning to become a Foreign Service Officer, with the best - the most patriotic - of intentions, going to do my best to slay the beast of the International Communist Conspiracy. But then the horror, on a daily basis, of what the So what is a poor Eavesdropping on the planet The above is the title of an essay that I wrote in 2000 that appeared as a chapter in my book Rogue State: A Guide to the World's Only Superpower (2002). Here are some excerpts that may help to put the current revelations surrounding Edward Snowden into perspective ... Can people in the 21st century imagine a greater invasion of privacy on all of earth, in all of history? If so, they merely have to wait for technology to catch up with their imagination. Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex ... satellite transmissions, fiber-optic communications traffic, microwave links ... voice, text, images ... captured by satellites continuously orbiting the earth, then processed by high-powered computers ... if it runs on electromagnetic energy, NSA is there, with high high tech. Twenty-four hours a day. Perhaps billions of messages sucked up each day. No one escapes. Not presidents, prime ministers, the UN Secretary-General, the pope, the Queen of England, embassies, transnational corporation CEOs, friend, foe, your Aunt Lena ... if God has a phone, it's being monitored ... maybe your dog isn't being tapped. The oceans will not protect you. American submarines have been attaching tapping pods to deep underwater cables for decades. Under a system codenamed ECHELON, launched in the 1970s, the NSA and its junior partners in Apart from specifically-targeted individuals and institutions, the ECHELON system works by indiscriminately intercepting huge quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. Every intercepted message - all the embassy cables, the business deals, the sex talk, the birthday greetings - is searched for keywords, which could be anything the searchers think might be of interest. All it takes to flag a communication is for one of the parties to use a couple or so of the key words in the ECHELON "dictionary" - "He lives in a lovely old white house on Bush Street, right near me. I can shoot over there in two minutes". Within limitations, computers can "listen" to telephone calls and recognize when keywords are spoken. Those calls are extracted and recorded separately, to be listened to in full by humans. The list of specific targets at any given time is undoubtedly wide ranging, at one point including the likes of Amnesty International and Christian Aid. ECHELON is carried out without official acknowledgment of its existence, let alone any democratic oversight or public or legislative debate as to whether it serves a decent purpose. The extensiveness of the ECHELON global network is a product of decades of intense Cold War activity. Yet with the end of the Cold War, its budget - far from being greatly reduced - was increased, and the network has grown in both power and reach; yet another piece of evidence that the Cold War was not a battle against something called "the international communist conspiracy". The European Parliament in the late 1990s began to wake up to this intrusion into the continent's affairs. The parliament's Civil Liberties Committee commissioned a report, which appeared in 1998 and recommended a variety of measures for dealing with the increasing power of the technologies of surveillance. It bluntly advised: "The European Parliament should reject proposals from the Despite these concerns the German security experts discovered several years ago that ECHELON was engaged in heavy commercial spying in In 1994, Thomson SA, located in Paris, and Airbus Industrie, based in German industry has complained that it is in a particularly vulnerable position because the government forbids its security services from conducting similar industrial espionage. "German politicians still support the rather naive idea that political allies should not spy on each other's businesses. The Americans and the British do not have such illusions", said journalist Udo Ulfkotte, a specialist in European industrial espionage, in 1999. That same year, In their quest to gain access to more and more private information, the NSA, the FBI, and other components of the The For decades, beginning in the 1950s, the Swiss company Crypto AG sold the world's most sophisticated and secure encryption technology. The firm staked its reputation and the security concerns of its clients on its neutrality in the Cold War or any other war. The purchasing nations, some 120 of them - including prime In 1986, because of US public statements concerning the La Belle disco bombing in In September 1999 it was revealed that NSA had arranged with Microsoft to insert special "keys" into Windows software, in all versions from 95-OSR2 onwards. An American computer scientist, Andrew Fernandez of Cryptonym in In February 2000, it was disclosed that the Strategic Affairs Delegation (DAS), the intelligence arm of the French Defense Ministry, had prepared a report in 1999 which also asserted that NSA had helped to install secret programs in Microsoft software. According to the DAS report, "it would seem that the creation of Microsoft was largely supported, not least financially, by the NSA, and that IBM was made to accept the [Microsoft] MS-DOS operating system by the same administration". The report stated that there had been a "strong suspicion of a lack of security fed by insistent rumors about the existence of spy programs on Microsoft, and by the presence of NSA personnel in Bill Gates' development teams". The Pentagon, said the report, was Microsoft's biggest client in the world. Recent years have seen disclosures that in the countdown to their invasion of It's as if the American national security establishment feels that it has an inalienable right to listen in; as if there had been a constitutional amendment, applicable to the entire world, stating that "Congress shall make no law abridging the freedom of the government to intercept the personal communications of anyone". And the Fourth Amendment had been changed to read: "Persons shall be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, except in cases of national security, real or alleged". {2} The leading whistleblower of all time: Philip Agee Before there was Edward Snowden, William Binney and Thomas Drake ... before there was Bradley Manning, Sibel Edmonds and Jesselyn Radack ... there was Philip Agee. What Agee revealed is still the most startling and important information about Philip Agee spent twelve years (1957 to 1969) as a CIA case officer, most of it in Under CIA manipulation, direction and, usually, their payroll, were past and present presidents of Agee's goal in naming all these individuals, quite simply, was to make it as difficult as he could for the CIA to continue doing its dirty work. A common Agency tactic was writing editorials and phoney news stories to be knowingly published by Latin American media with no indication of the CIA authorship or CIA payment to the media. The propaganda value of such a "news" item might be multiplied by being picked up by other CIA stations in Wooing the working class came in for special treatment. Labor organizations by the dozen, sometimes hardly more than names on stationery, were created, altered, combined, liquidated, and new ones created again, in an almost frenzied attempt to find the right combination to compete with existing left-oriented unions and take national leadership away from them. In 1975 these revelations were new and shocking; for many readers it was the first hint that American foreign policy was not quite what their high-school textbooks had told them nor what the New York Times had reported. "As complete an account of spy work as is likely to be published anywhere, an authentic account of how an ordinary American or British 'case officer' operates ... All of it ... presented with deadly accuracy", wrote Miles Copeland, a former CIA station chief, and ardent foe of Agee. (There's no former CIA officer more hated by members of the intelligence establishment than Agee; no one's even close; due in part to his traveling to In contrast to Agee, WikiLeaks withheld the names of hundreds of informants from the nearly 400,000 In 1969, Agee resigned from the CIA (and colleagues who "long ago ceased to believe in what they are doing"). While on the run from the CIA as he was writing Inside the Company - at times literally running for his life - Agee was expelled from, or refused admittance to Notes {1} To read about my State Department and other adventures, see my book West-Bloc Dissident: A Cold war Memoir (2002) {2} See Rogue State: A Guide to the World's Only Superpower, chapter 21, for the notes for the above. Any part of this report may be disseminated without permission, provided attribution to William Blum as author and a link to this website are given. Books by William Blum America's Deadliest Export: Democracy: The Truth About US Foreign Policy and Everything Else Killing Hope: US Military and CIA Interventions Since World War Two Rogue State: A Guide to the World's Only Superpower Freeing the World to Death: Essays on the American Empire Read more at http://williamblum.org/about/ To rescue an old man from the clutches of the capitalist imperialist meanies:http://williamblum.org/about/ Send comments, typos found, money, love notes, hate mail, death threats, letter bombs, and anthrax to bblum6@aol.com www.killinghope.org/bblum6/aer118.html https://billtotten.wordpress.com/ http://www.ashisuto.co.jp |
Reader Supported
News | 19 June 13
Glenn Greenwald | Documents Reveal Lack of
FISA Court Oversight
Glenn Greenwald, Guardian UK
Greenwald writes: "Top secret documents obtained by the Guardian illustrate what the Fisa court actually does - and does not do - when purporting to engage in 'oversight' over the NSA's domestic spying."
READ MORE
Glenn Greenwald, Guardian UK
Greenwald writes: "Top secret documents obtained by the Guardian illustrate what the Fisa court actually does - and does not do - when purporting to engage in 'oversight' over the NSA's domestic spying."
READ MORE
SIGN PETITIONS
Secret FISA Court Out of
Control – Makes Violently Anti-Constitutional Decision Giving up ALL Your Phone
Records http://daviddilworth.com/pol/secret-fisa-court-out-of-control-makes-violently-anti-constitutional-decision-giving-up-all-your-phone-records/
Today,
EPIC joined a coalition of over 100 civil liberties organizations and Internet companies
todemand that Congress initiate a full-scale
investigation into the National Security Agency's surveillance programs. In the
letter sent to Congress this morning, the coalition emphasized the need for
public transparency and an end to dragnet surveillance: "This type of
blanket data collection by the government strikes at bedrock American values of
freedom and privacy." EPIC is also leading apetition to the NSA to suspend its program of
collecting information on all individuals in the United States . EPIC intends to
renew its request to the Agency every week until the NSA responds. For more
information see EPIC: NSA Petition.
EPIC,
joined by leading privacy experts including James Bamford, Whitfield Diffie,
and Bruce Schneier, has petitioned the National Security Agency to suspend
its domestic surveillance programpending public comment. EPIC's
petition states "NSA's collection of domestic communications contravenes
the First and Fourth Amendments to the United States Constitution, and violates
several federal privacy laws, including the Privacy Act of 1974, and the
Foreign Intelligence Surveillance Act of 1978 as amended." EPIC's petition
further states that NSA’s domestic surveillance "substantively affects the
public to a degree sufficient to implicate the policy interests" that
require public comment, and that "NSA's collection of domestic
communications absent the opportunity for public comment is unlawful."
EPIC intends to renew its request each week until the NSA responds. For more
information and to join EPIC’s petition, see: EPIC: NSA Petition.
In
a letter to Federal Communications Commission Chairwoman
Mignon Clyburn, EPIC urged the FCC to determine whether Verizon violated the
Communications Act when it released consumer call detail information to the
National Security Agency. In response to an unprecedented Foreign Intelligence
Surveillance Court order which focused on solely domestic communications,
Verizon released telephone customer information to the NSA, including telephone
numbers and time and call duration. Congress explicitly charged the Commission
with investigating unauthorized disclosures of consumer call detail
information. EPIC's letter stated that Verizon violated legal protections for
consumer phone records when it disclosed consumer information in response to a
facially invalid order. For more information, see EPIC: Foreign Intelligence Surveillance Act, EPIC: Clapper v. Amnesty Int'l, and EPIC: USA Patriot Act.
Dave Lindorff, Op-Ed,
NationofChange, June 24, 2013: Edward Snowden’s revelations
also exposed the
2.64 GB (17%)
of 15 GB used
Last account
activity: 4 hours ago
Details
|
|
People (13)
Show details
Ads
Online, Accredited, Top Ranked.
Apply Now! Next Classes Start Soon.
Earn your Associate Degree as a Veterinary Technician
at home.
Doctor of Ministry Degree Online Get Free Info - It's
Fast & Easy!
No Clinicals - 12 Months - $8,500.
Get Your Nursing Degree Online Now!
Finish in 12 Months. AACSB Accred.
Become CPA Eligible. Free Brochure!
With a Concentration in PR. 100% Online @
We've Been Doing This Since 1996.
200,000+ Served. Try Us 100% Free!
Get Help Finding Degree Info. If
You Qualify Grants May be Available
GOOGLE
SEARCH: SURVEILLANCE NET, END OF PRIVACY, JULY 5, 2013
1.
The End of
Privacy: The Attack on Personal
Rights at Home, at Work ...
www.amazon.com/The-End-Privacy-Personal-On-Line/.../031226318X
The End of Privacy and over one million
other books are available for Amazon Kindle..... In today's "surveillance society,"
Congress has refused to regulate .... We've heard about
movies like "Enemy of the State" and "The Net" and
we've ...
2.
One
Nation Under Surveillance
www.onenationundersurveillance.net/
national security, privacy,
intelligence. ... have been dominated
by fights over warrantless electronic surveillance and CCTV; ... Introduction: The End of
Privacy.
3.
NYPD expands surveillance net to fight crime as well as terrorism ...
news.yahoo.com/nypd-expands-surveillance-net-fight-crime-well-terrori...
Jun 21, 2013 - NYPD expands surveillance net to fight crime as
well as terrorism ....such a system is
tantamount to an end run around the
Fourth Amendment. ... Cityprivacy guidelines require
the NYPD to destroy surveillance video after 30 ...
4.
The End of Privacy: How Total Surveillance Is Becoming a Reality ... - Page 159 - Google Books
Result
books.google.com/books?isbn=1459604202
Reginald Whitaker - 2010 - Computers
The search capacities of the Net hardly exhaust the
technological basis forsurveillance of Net activities. Among
the more interesting cyber-surveillance ...
5.
One Nation Under Surveillance: A New Social Contract to Defend ...
www.academia.edu/.../One_Nation_Under_Surveillance_A_New_Social...
OneNationUnderSurveillance.net 00-Chesterman-Prelims.indd
iii 8/30/2010 ... SPi Contents
Abbreviations Introduction: The End of
Privacy PART I. THEORY 1.
6.
Christopher
Soghoian
www.dubfire.net/
Home page of Christopher Soghoian,
security and privacy researcher. ... chris@soghoian.net (personal) ... service providers
play in facilitating law enforcementsurveillance of their customers. ... Unpublished Draft;
An End to Privacy Theater:
7.
Encryption Works: How to Protect Your Privacy in the Age of NSA ...
https://pressfreedomfoundation.org/.../encryption-works-how-protect-yo...
3 days ago - True end-to-end encryption means
that the service provider cannot look at your ... Laura Poitras broke
the NSA dragnet surveillance stories, a lot more
information .... Users of riseup.net's Jabber service
can chat with users of ...
8.
Geolocation Privacy and Surveillance Act - Wikipedia, the free ...
en.wikipedia.org/wiki/Geolocation_Privacy_and_Surveillance_Act
Knotts and the contentious
Electronic Communications Privacy Act of 1986. ... to theft, and for the
purpose of tracking stolen merchandise; As a personal safety net for ... to receive explicit
consent from the end-user before
tracking their location.
9.
List of films featuring surveillance - Wikipedia, the free encyclopedia
en.wikipedia.org/wiki/List_of_films_featuring_surveillance
There is a body of films that
feature surveillance as a theme or as a
plot arc. ...technology to break
in but are unaware of being under surveillance themselves. ..... By using this site,
you agree to the Terms of Use and Privacy Policy. ... The End of Violence ... The Net. The Net 2.0. The Osterman
Weekend. The Parallax View.
10.
David
Lyon - The Surveillance Studies Centre
www.sscqueens.org/davidlyon
Surveillance is always a means to
an end, whether that end is influence, ...Surveillance, Privacy, and the
Globalization of Personal Information: .... "The net, the self, and the
future: Manuel Castells' The Information Age", Prometheus, 3, 2000.
|
|||||||||||||||||||||
|
The State Department's Bureau of Intelligence
and Research provides diplomats the necessary tools for effective foreign
policy.
REUTERS/Lucas
The State Department's Bureau
of Intelligence and Research (INR) has ties to the Office of Strategic Services from World War II, but was
transferred to State after the war. INR now reports directlyto the
Secretary of State, harnessing intelligence from all sources and offering
independent analysis of global events and real-time insight.
Headquarters:
Budget: $49 million in 2007, according to documents obtained by FAS.
Air Force Intelligence provides reconnaissance
for
|
|
Click here to Reply, Reply to all, or Forward
|
2.64 GB (17%) of 15 GB used
Last account
activity: 4 hours ago
Details
Having its roots from the 1972 formation of the Defense Mapping Agency and
formerly known as NIMA,
the agency was renamed the National Geospatial-Intelligence Agency in 2003. The agency has the task of collecting and
understanding Earth's physical and man-made attributes. Using advanced imagery
(mainly from satellites), it was NGA watching Osama bin Laden's compound in Pakistan .
Headquarters: Ft.
Belvoir , Va.
Budget: Classified. NGA employs approximately 14,500
government civilians.
The National Reconnaissance Office is responsible for America 's spy
satellites.
CREDIT: NASA
Marshall Space Flight Center
While the NGA is responsible for gaining information from
satellite data, the National Reconnaissance Office — created secretly in 1961 and
not acknowledged until
1992 — is in charge with satellite design, building, launch, and maintenance.
Headquarters: Chantilly ,
Va.
Budget: Classified.
The Office of Naval Intelligence provides information on the world's oceans to sailors everywhere.
The Office of Naval Intelligence was established in 1882 for "the purpose of collecting
and recording naval information" that could be useful in war and peace.
Like other military intelligence services, ONI gives maritime commanders
information they need on foreign forces.
Headquarters: Washington ,
D.C.
The Department of Homeland Security Office of Intelligence and Analysis
looks for information on any potential threats to the US .
The DHS Office of Intelligence and Analysis works primarily
on homeland threats — collecting and analyzing
information, and sharing intelligence with local and federal law enforcement
through the use of "fusion centers."
Headquarters: Washington ,
D.C.
Budget: Classified. In a Congressional Research
Service report, it was noted that "DNI does
not publicly disclose details
about the intelligence budget, but ... reported
that the aggregate amount appropriated to the [national intelligence program]
for FY2009 was $49.8 billion."
The Office of the Director of National Intelligence is where all the intelligence should come together for delivery to the president.
Established in 2004, the Office of the
Director of National Intelligence (ODNI) manages the efforts of the entire U.S.
intelligence community. Director James R. Clapper serves as the principal advisor to the
president as well as the National Security and Homeland Security Councils.
Headquarters: Washington ,
D.C.
Mission: The DNI has two main missions:
to lead intelligence integration, and "forge an intelligence community
that delivers the most insightful intelligence possible."
Budget: The specifics of the office itself are
unknown, but the total aggregate amount for the national intelligence program
is more than $48 billion.
BONUS: The 'intelligence state' has been expanding drastically since 9/11.
The U.S.
intelligence community is officially made of 17 organizations, but there is
even more to the story.
— 1,271 government organizations and 1,931 private companies
are working on intelligence, counterterrorism, or homeland security in the U.S.
— Just the NSA alone is contracting with more than 250
companies on intelligence work, including big names like Northrop Grumman and
SAIC.
— Many intelligence agencies are doing redundant work, such
as 51 federal and military organizations that track the flow of money in and
out of terror networks.
— One reason why those intelligence budgets are classified:
millions of dollars in so-called "ghost money" given to foreign governments.
You've seen all the intelligence agencies in the U.S.
NOW check out the most elite special forces in the American military >
YouTube - Videos from this email
Main
Core: A List Of Millions Of Americans That Will Be Subject To Detention
During Martial Law By Michael Snyder June 15, 2013 "Information Clearing House - Are you on the list? Are you one of the millions of Americans that have been designated a threat to national security by the The following is how Wikipedia describes Main Core… Main Core is the code name of a database maintained since the 1980s by the federal government of the It was Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core. At the time, the shocking information that he revealed did not get that much attention. That is quite a shame, because it should have sent shockwaves across the nation… According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention. Of course, federal law is somewhat vague as to what might constitute a “national emergency.” Executive orders issued over the last three decades define it as a “natural disaster, military attack, [or] technological or other emergency,” while Department of Defense documents include eventualities like “riots, acts of violence, insurrections, unlawful obstructions or assemblages, [and] disorder prejudicial to public law and order.” According to one news report, even “national opposition to So if that list contained 8 million names all the way back in 2008, how big might it be today? That is a very frightening thing to think about. Later on in 2008, Tim Shorrock of Salon.com also reported on Main Core… Dating back to the 1980s and known to government insiders as “Main Core,” the database reportedly collects and stores — without warrants or court orders — the names and detailed data of Americans considered to be threats to national security. According to several former U.S. government officials with extensive knowledge of intelligence operations, Main Core in its current incarnation apparently contains a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies. One former intelligence official described Main Core as “an emergency internal security database system” designed for use by the military in the event of a national catastrophe, a suspension of the Constitution or the imposition of martial law. So why didn’t this information get more attention at the time? Well, if Obama had lost the 2008 election it might have. But Obama won in 2008 and the liberal media assumed that he would end many of the abuses that were happening under Bush. Of course that has not happened at all. In fact, Obama has steadily moved the police state agenda ahead aggressively. Edward Snowden has just made that abundantly clear to the entire world. After 2008, it is unclear exactly what happened to Main Core. Did it expand, change names, merge with other programs or get superseded by a new program? It appears extremely unlikely that it simply faded away. In light of what we have just learned about NSA snooping, someone should ask our politicians some very hard questions about Main Core. According toChristopher Ketchum, the exact kind of NSA snooping that Edward Snowden has just described was being used to feed data into the Main Core database… A host of publicly disclosed programs, sources say, now supply data to Main Core. Most notable are the NSA domestic surveillance programs, initiated in the wake of 9/11, typically referred to in press reports as “warrantless wiretapping.” In March, a front-page article in the Wall Street Journal shed further light onto the extraordinarily invasive scope of the NSA efforts: According to the Journal, the government can now electronically monitor “huge volumes of records of domestic e-mails and Internet searches, as well as bank transfers, credit card transactions, travel, and telephone records.” Authorities employ “sophisticated software programs” to sift through the data, searching for “suspicious patterns.” In effect, the program is a mass catalog of the private lives of Americans. And it’s notable that the article hints at the possibility of programs like Main Core. “The [NSA] effort also ties into data from an ad-hoc collection of so-called black programs whose existence is undisclosed,” the Journal reported, quoting unnamed officials. “Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach.” The following information seems to be fair game for collection without a warrant: the e-mail addresses you send to and receive from, and the subject lines of those messages; the phone numbers you dial, the numbers that dial in to your line, and the durations of the calls; the Internet sites you visit and the keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards. All of this information is archived on government supercomputers and, according to sources, also fed into the Main Core database. This stuff is absolutely chilling. And there have been hints that such a list still exists today. For example, the testimony of an anonymous government insider that was recently posted on shtfplan.com alluded to such a list… “We know all this already,” I stated. He looked at me, giving me a look like I’ve never seen, and actually pushed his finger into my chest. “You don’t know jack,” he said, “this is bigger than you can imagine, bigger than anyone can imagine. This administration is collecting names of sources, whistle blowers and their families, names of media sources and everybody they talk to and have talked to, and they already have a huge list. If you’re not working for MSNBC or CNN, you’re probably on that list. If you are a website owner with a brisk readership and a conservative bent, you’re on that list. It’s a political dissident list, not an enemy threat list,” he stated. What in the world is happening to What in the world are we turning into? As I mentioned in a previous article, the NSA gathers 2.1 million gigabytes of data on all of us every single hour. The NSA is currently constructing a 2 billion dollar data center out in If you are disturbed by all of this, now is the time to stand up and say something. If this crisis blows over and people forget about all of this stuff again, the Big Brother surveillance grid that is being constructed all around us will just continue to grow and continue to become even more oppressive. This article was originally published at American Dream |
|
In accordance with Title 17
U.S.C. Section 107, this material is distributed without profit to those who
have expressed a prior interest in receiving the included information for
research and educational purposes. Information Clearing House has no
affiliation whatsoever with the originator of this article nor is Information
ClearingHouse endorsed or sponsored by the originator.)
The
Watchers
Praise
for The Watchers:
“It uses smart technical analysis and crisp writing to put the
reader inside the room with the watchers and to help better understand the
mind-set that gave rise to the modern surveillance state…an insightful
glimpse into how Washington works and how ideas are marketed and sold in the
back rooms of power, whether the product being peddled is widgets or a
radical model for intelligence gathering”–The New York Times
“A vivid, well-reported and intellectually sophisticated
account of the surveillance state in the wake of the attacks on September
11th 2001.”–The Economist, Best Books of 2010
“A painstaking account…tells readers more than they could have
learned from the mainstream media at the time of the events.”–Associated
Press
“The
Watchers reads like a thriller, and the story is sadly on the mark in
describing our limited oversight of the government’s surveillance
powers.”–Gregory F. Treverton, Director, Center for Global Risk and Security,
Rand Corporation
“This is an astonishingly detailed, well-researched
narrative.”–James Mann, Author of Rise of the Vulcans
“[Harris] has turned what could have been the driest of policy
studies into a riveting yarn of skulduggery and betrayal.”–
A “timely and admirably balanced account…informative and
dramatic narrative…” –Publishers Weekly
“Harris displays an exquisite understanding of the intricacies
of his topic and a remarkable sensitivity to the genuine concerns of the
watchers and their critics. …A sharply written, wise analysis of the complex
mashup of electronic sleuthing, law, policy and culture.”–Kirkus Reviews
“What’s either most reassuring or most unnerving about The
Watchers is that the men and women it depicts don’t appear to have hidden
agendas. For them, technology and not ideology is the overriding concern, a
matter of leveling the playing field and harnessing the Internet into one
unlimited search engine.”–
“Harris sifts through a confusing array of acronyms,
fascinating characters, and chilling operations to offer an absorbing look at
modern spying technology and how it impacts average Americans.”–Booklist
Using exclusive access
to key government insiders, Shane Harris chronicles the rise of America’s
surveillance state over the past 25 years and highlights a dangerous paradox:
Our government’s strategy has made it harder to catch terrorists and easier
to spy on the rest of us.
In 1983, Admiral John Poindexter, President Reagan’s National
Security Advisor, realized that the
Despite billions of dollars spent on this quest since the
Reagan era, we still can’t discern future threats in the vast data cloud that
surrounds us all. But the government can now spy on its citizens with an ease
that was impossible-and illegal-just a few years ago. Drawing on unprecedented
access to the people who pioneered this high-tech spycraft, Harris shows how
it has moved from the province of right-wing technocrats into the mainstream,
becoming a cornerstone of the Obama administration’s war on terror.
Harris puts us behind the scenes where twenty-first-century
spycraft was born. We witness Poindexter quietly working from the private
sector to get government to buy in to his programs in the early nineties. We
see an Army major agonize as he carries out an order to delete the vast database
he’s gathered on possible terror cells-and on thousands of innocent
Americans-months before 9/11. We follow National Security Agency Director
Mike Hayden as he persuades the Bush administration to secretly monitor
Americans based on a flawed interpretation of the law. And we see Poindexter
return to government with a seemingly implausible idea: that the authorities
can collect data about citizens and at the same time protect their privacy.
After Congress publicly bans the Total Information Awareness program in 2003,
we watch as it secretly becomes a “black program” at the NSA, then engaged in
a massive surveillance of Americans’ phone calls and e-mails.
When the next crisis comes, our government will inevitably
crack down on civil liberties, but it will be no better able to identify new
dangers. This is the outcome of a dream first hatched almost three decades
ago, and The
Watchers is an engrossing,
unnerving wake-up call.
June 20, 2013
I talked with Terry Gross about surveillance, data mining, and
the recent revelations of NSA intelligence programs. Listen here.
August 23, 2012
My op-ed in today’s New
York Times looks at a decade of secret
government surveillance and why we’re still powerless against it.
June 9, 2011
I’m happy to report that The Watchers won this year’s Bernstein
Award for excellence in journalism! This is a huge thrill, and I’m honored to
be included in such fine company of past winners and finalists. You can read
more about the award here.
And here’s a write up of the evening ceremony,
which was held this week at the New York Public Library.
January 25, 2011
The Watchers is on sale today in paperback. You can pick up a
copy in your favorite bookstore or online. It’s got a nifty new cover, as
well as a new afterword on the Christmas Day bombing attempt. That event
occurred as the hardcover was going to press, so we couldn’t work it in. I’m
glad it’s in the new version, because it ties up the theme of the whole book
very nicely.
SURVEILLANCE CAMERAS
BIG BROTHER IS ALWAYS WATCHING!
This
is amazing, but also a little freaky. No more hiding in a crowd.
This picture was taken with a camera
70,000 x 30,000 pixels (2100 MegaPixels) that can identify any face in a
multitude.
These cameras are not sold to the public and are being installed in strategic locations. (This one is in
Place the cursor in the multitude and
left double click a couple times. Or enlarge the picture with the mouse
wheel.
The more you click or move the wheel, the closer the people will appear. Amazing!!There are thousands of persons and yet one can spot and recognize any face.
Reader Supported
News | 30 June 13
FOCUS | Greenwald With a
Look at the Next NSA Bombshell
Emma Roller, Slate Magazine Roller reports: "Greenwald said the Guardian is planning to publish a document showing that new technology allows the National Security Agency to direct one billion cell phone calls every day into its data repositories." READ MORE http://readersupportednews.org/news-section2/318-66/18178-focus-greenwald-with-a-look-at-the-next-nsa-bombshell-
Norman Solomon, Norman Solomon's Blog: More than outrage, the American
people must work to use the power of the electorate to fight against the
government's growing invasion into our lives.
NEW
YORK TIMES REPORTS ON SURVEILLANCE
Monday, July 22, 2013
Times Topics
·
WORLD
National Security
Agency
News about the National Security
Agency, including commentary and archival articles published in The New York
Times.
RELATED: Wiretapping | FISA
Highlights From the Archives
E-Mail Surveillance Renews Concerns in Congress
By
JAMES RISEN and ERIC LICHTBLAU
Intercepts of
Americans’ phone calls and e-mail messages are broader than previously
acknowledged, officials said.
June 17, 2009USNEWS
Officials Say U.S. Wiretaps Exceeded Law
By
ERIC LICHTBLAU and JAMES RISEN
There was an
“overcollection” of domestic e-mails and calls of Americans by the N.S.A.,
officials said.
April 16, 2009USNEWS
Spying Program May Be Tested by Terror Case
By
ADAM LIPTAK
The case of two men
convicted of supporting terrorism is central in a push to challenge an
eavesdropping program.
August 26, 2007USNEWS
Role of Telecom Firms in Wiretaps Is Confirmed
By
ERIC LICHTBLAU
The Bush
administration has said for the first time that American telecommunications
companies played a crucial role in domestic eavesdropping.
August 24, 2007WASHINGTONNEWS
Bush Signs Law to Widen Reach for Wiretapping
By
JAMES RISEN
People familiar
with the law said that it provided a legal framework for surveillance without
warrants.
August 6, 2007WASHINGTONNEWS
White House Is Subpoenaed on Wiretapping
By
JAMES RISEN
The Senate
Judiciary Committee sent subpoenas to the White House, the vice president’s
office and the Justice Department, setting the stage for a showdown.
June 28, 2007WASHINGTONNEWS
ARTICLES ABOUT THE
|
No comments:
Post a Comment