Tag Archives: surveillance

Government Wants RFID Tracking Chips Implanted In Welfare Recipients

RFID-chip
By: Mac Slavo | SHTFplan.com –

Implantable RFID tracking chips. You know, to stop terrorism.

And to keep tabs on all the welfare queens, in order to keep tax dollars accountable.

There will be other rationales, too.

But really, governments just want to do all the spying they can within their power – and right now, technology offers more power than ever before to carry out universal surveillance, track and trace every person and every thing and put civil rights in the backseat where they belong.

The latest proposal from a politician in the Finnish government seems like a near-future dystopic film, but may not be far reality.

It’s not much of a stretch to imagine that the U.S., Britain or other governments in Europe would do this too, if they could get away with it.

In fact, an RFID chipped population could only be years away.

Sputnik News reports:

A politician from Finland’s conservative Finns Party suggested implanting welfare recipients with satellite-tracking chips following news that some recipients continued receiving payments after leaving the country to join ISIL.

A member of Finland’s right-wing Finns Party, Pasi Maenranta, has suggested implanting all recipients of government assistance with satellite-tracked chips if they choose to leave the country.

Maenranta made the proposal after Finnish media revealed that some recipients of government assistance continued to receive payments after leaving the country to join ISIL in Syria and Iraq.

“The law should be changed: To receive payments from Kela [the Social Insurance Institution], one has to tell exact data about your location using your personal code, read by a satellite. It is also possible to implant electronic chips to all going abroad, who for example receive medical welfare from Kela,” Maenranta wrote on his Facebook page.

It is true that Western governments essentially created ISIS, by agitating angry Muslims with continued aggression, while at the same time funding the “new al Qaeda” extremist group via the misguided efforts to arm and bankroll “Libyan rebels” and “Syrian rebels.”

Really, the Pentagon and NATO have been building up our own enemy, and using its horrendous violence to frighten the public back into the War on Terror.

Under the new twist, Muslim immigration to the West has been increased, and Western governments have been subsidizing future jihadists, too. Many are on the government dole, until and even after, they decide to leave and join ISIS/ISIL.

Meanwhile, normal struggling citizens who accept government assistance might be tracked via an implanted chips… betraying all the rights governments in “free countries” are supposed to protect. They might not be doing anything wrong at all, but now they are under constant watch.

But as George W. Bush famously said, “they hate us for our freedoms,” right?

Windows 10 Can Collect Your Data For Gov’t Agencies – What To Do (VIDEO)

windows 10 spying

By: Heather Callaghan | Activist Post

Windows 10 OS – the ultimate Big Brother?

Of the 14+ million people who have recently installed Microsoft’s new Windows 10, there haven’t been many complaints until now.

The system is said to run more efficiently, but apparently someone only recently read the tome of a service agreement. Let’s just say that Windows 10 goes above and beyond good service and makes sure that you are being a good citizen. Who is the one really getting the upgrade, here?

Yes, it is implicitly stated that whoever installs the program is agreeing to be watched and that Windows 10 can and will aid and abet law enforcement and other government agencies – should it deem that you are doing something illegal.

BGR found this part of the agreement particularly interesting:

Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to: 1.comply with applicable law or respond to valid legal process, including from law enforcement or other government agencies; 2.protect our customers, for example to prevent spam or attempts to defraud users of the services, or to help prevent the loss of life or serious injury of anyone;

[…]

…however, if we receive information indicating that someone is using our services to traffic in stolen intellectual or physical property of Microsoft, we will not inspect a customer’s private content ourselves, but we may refer the matter to law enforcement.

From Mirror UK

…Microsoft has admitted it collects key information on Windows users, recording the searches they make with Bing, requests spoken to the voice assistant Cortana and even “your typed and handwritten words”.

The tech giant also said it could rifle through a variety of private and personal places.

European Digital Rights Organisation said that Microsoft had given itself broad rights and would sell your data to third parties. Tech bloggers are upset that the defaults are set for automatic intrusion, as they know how many people will skip through the download without thinking – and give all of their information away. Microsoft responded in a statement claiming that it does not sell, and it “does not collect personal information without your consent.” (source)

Do you want to revoke that consent? Watch this video and follow the steps laid out in this article:

You can opt out. You start by going into Settings, then Privacy. Consider getting rid of Cortana – the voice-activated assistant. More instructions here.

Investment Watch Blog claims that this user agreement can land you in jail – mainly for its categorization using IP addresses. “Going to any website on the Internet is illegal because the web server must absolutely share it’s files with your computer so you can access that website. Anyways, since someone had your IP address before, and verse visa, if that someone had done anything illegal you’ll be the one to suffer all legal and law breaking consequences when you’re caught,” the writer explains. The person goes on to wonder about the implications of viewing Internet pornography, creating content and the files that Windows itself downloads to PCs.

Recently, we learned that private companies color code your home for police and track all the people coming through your house – even pizza delivery guys. You can be flagged for something you didn’t even know your friend had done in the past. Congress discussed social media sites reporting you to the authorities. In the same week it was admitted that federal agencies like the IRS could have access to opened email and social media messages. Unfortunately, most people have completely accepted the absurd lack of privacy – but can you really accept this colonoscopic amount of scrutiny? Why would they collect information for non-use? In other words, what will happen when all that private information is put to use?

Microsoft, as you know, is in the care of billionaire Bill Gates. When he is not busy gifting the world with spyware, his groups are busy beta-testing remote controlled sterilization on women in third world countries or forcing GMO rice on an unwilling Philippines with his buddies, the Rockefellers. But a depopulation fanatic wouldn’t want to paint everyone guilty, right?

Revelations like this, will hopefully prompt people to look gift horses in the mouth, instead of blindly allowing themselves to be the ones upgraded. Why do people not question that there is virtually a monopoly (or two) on the world’s computer operating systems?

Read service agreement:
https://www.microsoft.com/en-gb/servicesagreement/default.aspx

Image source


Heather Callaghan is a natural health blogger and food freedom activist. You can see her work at NaturalBlaze.com and ActivistPost.com. Like at Facebook.

Kuwait Mandates DNA Database For All Residents

 dna-kuwait

By: Brandon Turbeville | Activist Post

Never a country known for its human rights and civil liberties, Kuwait is now attempting to take the lead in the Gulf for the country most integrated with the technological control grid and biometric surveillance state. This is because the small nation recently announced the passage of a law that mandates every person residing in Kuwait must submit to a DNA sample that will be stored in a massive database upon penalty of fines and jail time.

Kuwait has 1.3 million citizens that will be subject to the law but its 2.9 million foreign residents are subject as well. Any person who refuses to submit to the DNA tests and data mining operation will be subject to $33,000 in fines and up to one year in prison. Any person who provides a fake sample will face up to seven years.

StopFriskDNATest_1

Kuwait passed this law conveniently after an Islamic State (and thus NATO-directed) bombing of a Shiite mosque on June 26. The law is being justified as a way to make it easier for law enforcement to track down criminals and terrorists after the attacks have been committed. Thus, the incident stands as another Problem-Reaction-Solution-style terrorist attack justifying an even more totalitarian police state response.

“We have approved the DNA testing law and approved the additional funding. We are prepared to approve anything needed to boost security measures in the country,” independent MP Jamal Al Omar said.

Kuwait now stands as the only country in the world that makes DNA tests and participation in a DNA database compulsory. But is it just the first? After all, many countries including England, Australia, Sweden, and the United States maintain stored databases of the DNA of convicted criminals with the United States maintaining a database of the DNA of even those who have merely been arrested but not convicted. In addition, the U.S. database also maintains the DNA of missing persons and their families. Now, with the exception of Kuwait, the United States maintains the world’s largest DNA database.

The growing number of countries building, maintaining, and subsequently mandating various forms of biometric identification and biometric databases is not only concerning, it is becoming the norm. In 2012, India launched a nationwide program involving the allocation of a Unique Identification Number (UID) to every single one of its 1.2 billion residents. Each of the numbers are tied to the biometric data of the recipient using three different forms of information – fingerprints, iris scans, and pictures of the face. All ten digits of the hand will be recorded, and both eyes are scanned.

The Japanese have had a mandatory national UID system in place since 2002, under the Basic Resident Register (BRR) program. Under the BRR, each individual must provide their name, birthdate, gender, and physical address to municipal governments who, in turn, issue the citizen a UID. However, an update to the initiative, called My Number Bill, was introduced in February 2012 that streamlined the information sharing process between government tax, social security, and emergency mitigation agencies. This was merely the next phase toward the goal of the Japanese government to centralize already-collected information about each one of its citizens and to expand this program to contain even more data. The information collected on Japanese citizens under their current system is fed into a nationwide computer database known as the Juki-net, which is made up of 3,200 municipal governments. The Juki-net serves as the common data sharing database between the municipal governments and, to some extent, the central government.

Israel also has a mandatory biometrics program. As Justin Lee writes for BiometricUpdate.com,

Initially passed by the Knesset in December 2009, the Biometric Database Law mandates the collection of fingerprints and facial images from all Israeli residents, as well as integrating these biometric details in domestic ID cards and national passports.

The legislation also called for the creation of a biometric government database for the purpose of managing access control, identification of individuals and to help law enforcement officials locate criminal suspects. The law is intended to curb identity theft, as well as the loss, theft and destruction of the current blue ID cards issued by the Interior Ministry.

In a report submitted to the Prime Minister’s Office and to the Knesset Chairman, Erdan emphasized the importance of implementing the biometric system and said the transition would be gradual.

“Smart biometric records that cannot be faked […] will lead to the full protection of the identity of Israeli citizens,” Erdan told Channel 10. “It will provide a balance between our duty to ensure the security of citizens and our duty to protect their privacy. We will promote a gradual transition to mandatory biometric documentation.”

The first phase of the biometric identification system was implemented in June 2013, and since then, some 640,000 people have volunteered to submit their biometric details to the database, said Erdan.

While most of the data collection and database storage via biometrics in the United States is rolled out under the auspices of greater convenience, concepts such as biometric programs for food stamp recipients, and employee tagging are gaining traction, indicating that the push for the eventual mandating of participation in such programs is clearly not far off.

Kuwait may be the first in terms of mandating DNA database participation in the world, but it is only first. Kuwait simply stands as the latest country to make a step forward in the international game of leap frog toward a global surveillance state, technological control grid, and total prison planet.


Brandon Turbeville is an author out of Florence, South Carolina. He has a Bachelor’s Degree from Francis Marion University and is the author of six books, Codex Alimentarius — The End of Health Freedom, 7 Real Conspiracies, Five Sense Solutions and Dispatches From a Dissident, volume 1 and volume 2, and The Road to Damascus: The Anglo-American Assault on Syria. Turbeville has published over 500 articles dealing on a wide variety of subjects including health, economics, government corruption, and civil liberties. Brandon Turbeville’s podcast Truth on The Tracks can be found every Monday night 9 pm EST at UCYTV. He is available for radio and TV interviews. Please contact activistpost (at) gmail.com.

Leaked Documents Show FBI, DEA, And Army Can Control Your Computer

Jamaica Slum Standoff
By: Carey Wedler | AntiMedia

Leaked emails from an Italian-based hacking company reveal that government agencies engage in surveillance more invasive than previously thought, spending millions of dollars on spyware and malware software to accomplish their questionable goals. Tellingly, their use of the product places them squarely in the same category as other repressive regimes around the world.

After hackers ironically hacked Hacking Team, a Milan-based company that sells strictly to governments, hundreds of gigabytes of emails and financial records were leaked. The emails show that the FBI, DEA, and U.S. Army all purchased software that enables them to view suspects’ photos, emails, listen to and record their conversations, and activate the cameras on their computers, among other things.

While this may seem like old news, the most controversial revelation was the government’s purchases of “Remote Control Systems.” The FBI, DEA, and U.S. Army, courtesy of Hacking Team, possess the capability to take control of a suspect’s computer screen. The technology is so invasive that even the DEA, known for its violative surveillance policies, had reservations about purchasing it.

According to documents obtained by The Intercept, an internal request to purchase RCS was denied by DEA management in 2011 because it was “too controversial.” By 2012, however, the DEA had resolved its concerns, likely spending a similar amount to the $773,226.64 (plus thousands in maintenance fees) the FBI invested in its own set of software.

Hacking Team was so committed to business with these American agencies that it concocted codenames to refer to them. As The Intercept summarizes,

Hacking Team refers to its U.S. clients by code names. The FBI unit is ‘Phoebe’…the DEA is ‘Katie,’  and the CIA, which appears to have sampled, but not bought Remote Control System, is ‘Marianne.’”

Hacking Team has been sharply criticized for its sale of RCS to oppressive regimes around the world. From Sudan to Bahrain, Hacking Team seeks business opportunities with rulers that target political activists, journalists, and political opponents—putting the American government agencies that employ the same technology—and often have the same objectives— in questionable company.

Aside from RCS, one of the more contentious revelations is the company’s hard sell that it can bypass encryption, a capability the FBI has openly desired since phone companies made encryption a default setting last year. According to one company newsletter, Hacking Team offers “technologies to ACCESS THE DATA…IN CLEARTEXT, BEFORE it gets encrypted by the device and sent to the network and AFTER it is received from the network and decrypted by the device itself. Actually, THIS IS precisely WHAT WE DO.

The FBI did seek warrants to use Hacking Team technology in a handful of cases, but apparently uses a different platform for “critical” investigations. What the FBI really wanted from the Italian firm, according to leaked emails, was “more ability to go after users of Tor, the anonymizing web browser.” Such users accounted for 60% of the FBI’s use of Hacking Team products.

Regardless of how the technology is used, the FBI has encountered skepticism from lawmakers. Sen. Chuck Grassley, R-Iowa, asked the director of the FBI for “more specific information about the FBI’s current use of spyware,” in order for the Senate Judiciary Committee to investigate “serious privacy concerns.

In spite of these legitimate concerns, the technology is permeating other levels of government. Largely because of aggressive marketing by Hacking Team, District Attorney offices around the country are eager to use the software. From San Bernadino to Manhattan, government lawyers have expressed strong interest in using the company’s products for investigations, suggesting a dangerous permeation of unconstitutional surveillance into an already decaying justice system.

Whether or not the government agencies who have purchased the software use it extensively or not is, at this point, irrelevant. That such bureaus and government officials have so much as the desire to use it–in some cases, in spite of a clear understanding of its controversial nature—is cause enough for concern.

Meanwhile, Hacking Team has remained ambivalent. Company spokesperson Eric Rabe said, “we do not disclose the names or locations of our clients” and “we cannot comment on the validity of documents purportedly from our company.”

More telling of the company’s rationalization of perpetuating authoritarianism in the name of profit, however, is a quote from Giancarlo Russo, the company’s chief operating officer. In a 2013 email, he wrote,

If you buy a Ferrari… they can teach you how to drive. They cannot grant you will be the winner of the race…If Beretta sell [sic] you a gun, the most peculiar and sophisticated one, they can teach how to use it. They can not grant you are going to shoot your target properly on the field.

Editor’s note: An earlier version of this article referred to Hacking Team as “Hacking Tools.” The error has since been corrected.

Exposed: Establishment-Funded ‘Security Network’ Spying On Users

DARPA_Big_Data

By: Thomas James | Acclaimed News

An experiment by a Swedish researcher reveals that an online network used to ensure secure Internet communications may itself be under surveillance. Tor is free open source software and a popular open network used to anonymize communications on the Internet.

In 2013 it received more than $1,800,00 in funding from the US government and previous sponsors include; Google, The Ford Foundation and DARPA.

Tor stands for The Onion Router and was originally developed by the U.S. Naval Research Laboratory. In 2002, the Electronic Frontier Foundation took up and developed the project to provide a free means of ensuring the privacy of Internet users. The number of Tor users is estimated to be 2.5 million each day.

Internet security researchers have suspected for a while that security and intelligence agencies might have set up their own nodes to “sniff” or read data as it is routed through the Tor network.

To test this, the researcher known only by the pseudonym “Chloe”, set up an experiment with a honeypot. This was essentially a fake domain name with multiple logins. She then used different nodes to log in, and then waited for a month for any signs that the nodes were being used to steal the login information.

She found that seven of the 1400 nodes she had tested were used to steal passwords and log in. As of now, though the bad nodes have been reported to Tor, they are still in operation.

Chloe also came to the startling conclusion that as a consequence of the data sniffing by some exit nodes, Tor users might actually be drawing attention to their own sites, rather then ensuring their privacy.

She said:

“[The project] BADONIONS is really simple, it works like this: you download a list of all the Tor exit nodes and then you use the Stem API to connect to every exit node out there and login to a website over HTTP.

“If an exit node is sniffing the traffic he will see my login and now when he has my password he probably will do something bad with my account, or sell it, I don’t know. So here’s the catch.

“Every exit node has its unique password and because BADONIONS saves every login I can go back and check if a password has been used more than once, and if that’s the case I can simply look up which exit node that used that password,” wrote Chloe when she set up the experiment in April.”

Chloe also added:

“The results are not so surprising, but what is most surprising about this is that two nodes with the ‘guard’-flag had logged in twice. Also, none of these nodes has been flagged even though I reported them to Tor.

“We can see that there’s passive MITM [man-in-the-middle attack] going on in the Tor network. This is done by setting up a fully functional and trustworthy exit node and start sniffing.

“We can also see that nodes that have been running so long that they have earned the ‘Guard’-flag also sniff traffic. We can also see that not all uses the logins but rather just visiting the website, this indicates that they are sniffing but does not use the provided logins. So by using Tor you are drawing attention to your site.”


Acclaimed News was established to present counter-views to corporate media news.

French Spying Double Standard

 French President Francois Hollande leads a meeting about new WikiLeaks allegations of U.S. spying on French presidents. Charles Platiau/Pool EPA/Landov


French President Francois Hollande leads a meeting about new WikiLeaks allegations of U.S. spying on French presidents.
Charles Platiau/Pool EPA/Landov

No one likes to be the subject of surveillance, but the fact is that we all are. But France is a special case, as was Germany a few months ago. Neither of these two Eurpean countries enjoys being snooped on by the NSA, but they do exercise their own power to spy with unlimited might on their own citizens.

After leaked documents revealed that the United States had spied on German Chancellor, Angela Merkel, and after the US denied such practice in a categorical way, we now know that the NSA also spied on the last three French presidentes. This, of course has also been denied by the US presidente, Barack Obama.

The French were not pleased after they learned they had been, as a government, spied on by the US, however, the very own French Parliament, with the collaboration of Prime Minister Manuel Valls, now has thrown its support behind a new spying bill that has no legal limits whatsoever.

The initiative to allow full spying capabilities on anyone and without judicial controls was presented and promoted by Valls himself two months ago and the French Parliament gave the green light to establish the same kind of spying practices seen in Police States such as the United States to be used indiscrimnately.

The justification for giving the French government a blank check on surveillance without any kind of oversight is the same that other governments have given since 9/11: “National Security and the need to protect the Homeland”.

The controversial French law enables massive telephone and cyber tracking of data without judicial control now that the National Assembly approved amendments to favor the proposal which politicians in France say is “essential” to the government, but suicidal to its detractors, which include various human rights organizations.

The debate coincided with the scandal emerged after the confirmation that the highest French leaders, including the last three presidents have been spied on by the American National Security Agency (NSA).

Critics compared the law to the US Patriot Act, which after 9/11expanded the powers of the intelligence agencies in that country. In a move that is consider insufficient to protect civil liberties, President François Hollande had announced he would send the legal text for review to the Constitutional Court.

According to the new law, born shortly after the jihadist attacks last January in Paris, telecom operators, search engines and social networks must install a kind of black box for any suspicious behavior. The data obtained will be automatically transmitted to the information services for analysis. This is the same type of system implemented in the United States, where telecom companies serve as data collectors for the NSA -many say they are completely controlled by the NSA- which in turn vacuums all the data from their servers to snif it all of it.

French agents, hitherto are not covered by the law in many of its practices, may use systems called Imsi Catcher. With them, they can capture and record data from phones or computers of alleged suspects without a warrant and of all who may be connected or not to that suspect. They may also be used, now legally, to bug private places or to attach markers to track cars. The agentes may eve enter private homes if they see fit.

At the last moment, the Assembly removed a clause introduced last week by the socialists which would have given the legal basis for spies to snoop on foreigners visiting France with only the authorization of the Prime Minister.

Applications for espionage practices can be carried out by the ministers of Defense, Economy, Finance, Justice and Interior. The requests will be sent to a National Control Commission for Information Technology composed by four MPs, two members of the State Council, two judges and a computer expert. If these members do not see any objections, the Commission will send requests to the prime minister, who will then rubber stamp the requests.


Michael T. Snyder is a graduate of the McIntire School of Commerce at the University of Virginia and has a law degree and an LLM from the University of Florida Law School. He is an attorney that has worked for some of the largest and most prominent law firms in Washington D.C. and who now spends his time researching and writing and trying to wake the American people up. You can follow his work on The Economic Collapse blog, End of the American Dream and The Truth Wins. His new novel entitled “The Beginning Of The End” is now available on Amazon.com.

Nowhere To Hide: Facebook Goes Beyond ‘Facial Recognition’ To Track You

facebook-privacy

(RINF) – Terrifying new research shows Facebook’s ambitions to track users has gone far beyond the company’s ‘old’ technology that recognises users faces, which in itself poses a dizzying array of privacy concerns.

The new development, dubbed Pose Invariant PErson Recognition (PIPER), gathers information about your clothing, hairstyles and body shapes and currently holds a 83% accuracy rate, already incredibly high and is expected to increase even further.

Yann LeCun, head of artificial intelligence at Facebook explained how it works:

“There are a lot of cues we use. People have characteristic aspects, even if you look at them from the back. For example, you can recognise Mark Zuckerberg very easily, because he always wears a gray T-shirt.”

In an effort to ease fears over the invasive technology, Facebook denied plans to integrate it onto their site.

Ari Entin, a Facebook spokesman told the media:

“This is so far, experimental, long-term research. I don’t think this is something that we would see any time soon.”

The networking giant are right to thread lightly as they have a history of violating privacy laws. In 2012 the company was ordered to destroy its facial recognition database in Germany after authorities deemed it was in violation of German law. In 2015 Facebook was sued by Carlo Licata who claimed he and others had their rights violated under the Biometric Information Privacy Act (BIPA).

Despite the denials by Facebook that their new technology will not be used, when is the last time a tech company  – one that can only survive financially by collecting information about its users and then selling that information, invested in highly invasive software that it did not use it for profit?


Mick Meaney is the founder and editor of RINF Alternative News , founded in 2004 as a response to increasing levels of media distortions and lies.

United Stasi Of America Through The Echelon Prism

NSA Eye - Listen

Signals collection has a long secretive and enigmatic history. The very definition of espionage implies spying, most closely associated with foreign sources. Since the Echelon network, the unified function of data retrieval became a given during the cold war. With the revelation of Prism, advances in sophisticated electronic devices and software algorithms provide a major leap. The article, Is PRISM the US version of Echelon?, sums up the evolution. “With this kind of setup and ambition to capture and evaluate private conversations (well, not so private now), makes Echelon that much more believable, and that PRISM is a reflection of the infamous project, but focused solely on the US.”

Bankwatch takes a sanguine attitude towards Why PRISM? ECHELON has been around since 1948 supported by US, UK, Canada, Australia. At the same time, the publication references the capacities of the original analogue technology.

“The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON Dictionary) that will prompt the computers to flag the message for recording and transcribing for future analysis. Intelligence analysts at each of the respective listening stations maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept.”

This machinery of electronic snooping has no instinctive restraint on the subject or content, when the technocratic engineers are left to design the next level of the “All Seeing Eye”. The notion that the Prism program is shocking certainly does not conform to the even increasing capacity of surveillance society that has already discarded the presumption of privacy.

The Wall Street Journal forecasts the total integration of data because Technology Emboldened the NSA, to capture all that is digital.

“At a 2009 conference on so-called cloud computing, an NSA official said the agency was developing a new system by linking its various databases and using Hadoop software to analyze them, according to comments reported by the trade publication InformationWeek.

The system would hold “essentially every kind of data there is,” said Randy Garrett, who was then director of technology for the NSA’s integrated intelligence program. “The object is to do things that were essentially impossible before.”

Nonetheless, the Director of National Intelligence issues fact sheet on PRISM in response to leaks, wants you to accept that the government is adhering to stature authority and protecting vital national security interests. “While focusing on the letter of the law and the government’s good intentions, Clapper dodges any mention of how much information (or what kind) is actually collected with the PRISM program.”

OK, only a blood brother operative of the intelligence community will challenge the proposition that the collection of electronic information is the main function of their Skynet self-aware artificial intelligence system. The true debate is whether the data collected is destined for use against targeted American citizens, for nefarious purposes.

Mashable attempts to explain the methodology of PRISM: Does the NSA Really Get Direct Access to Your Data?, and how the “so called” judicial review function of FISA Court approval is processed.

“For Ashkan Soltani, an independent privacy researcher and technologist, this is “a process for submitting [Section] 702 requests and getting responses in a machine-readable form.”

The 41-page PRISM Powerpoint presentation “could be seen as a business development deck indicating all the various providers that they currently have ‘relationships with,'” he told Mashable.

The system is “basically a data-ingestion API,” he said.

Soltani speculated that based on what we know now, PRISM is a “streamlined way” to submit Section 702 orders to the companies for them to review the requests, and it gives the NSA the ability to handle and process the response “in an automated fashion,” just like an app like TripIt, which automatically parses information from your flight reservations.”

According to the American Dream, the terminator assignment is being assembled. The disturbing use of a database maintained since the 1980s by the federal government, Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law, is the ultimate application of the individual dossiers that are generated from signals collection.

“Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database’s name derives from the fact that it contains “copies of the ‘main core’ or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community.”

Looking through the historic prism and behavioral pattern of the shadow government agencies, the lack of dramatic public outrage seems to be the only consistent factor out of the denial denizens that love to salute the flag, while willingly forfeiting their bill of right protections. This regretful conduct is seen in the example from, “Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core. At the time, the shocking information that he revealed did not get that much attention. That is quite a shame, because it should have sent shockwaves across the nation…”

Now we are all supposed to empathize with the hysteria of the political careerist class over the disclosures of Edward Snowden. The bipartisan spots of the carnivore leopards never change. When John Boehner Calls Snowden a Traitor, he speaks for much of the establishment and equates loyalty to the state as the very definition of nationalism.

Again, the chronicle of the military-industrial-intelligence-complex is replete with treasonous deeds against the constitutional republic. Remember the Carnivore system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications? Maybe your memory goes back to the archetype whistleblower. None other than the iconic Daniel Ellsberg speaks out on the current scandal in the Guardian letter, Edward Snowden: saving us from the United Stasi of America.

“In 1975, Senator Frank Church spoke of the National Security Agency in these terms:

“I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.”

The dangerous prospect of which he warned was that America’s intelligence gathering capability – which is today beyond any comparison with what existed in his pre-digital era – “at any time could be turned around on the American people and no American would have any privacy left.”

That has now happened. That is what Snowden has exposed, with official, secret documents. The NSA, FBI and CIA have, with the new digital technology, surveillance powers over our own citizens that the Stasi – the secret police in the former “democratic republic” of East Germany – could scarcely have dreamed of. Snowden reveals that the so-called intelligence community has become the United Stasi of America.”

Yes, Virginia our great founding fathers came from not only this old dominion, but had a state of mind that fought the revolutionary war against tyranny. The United Stasi of America is the definitive meaning of the evil empire that protects the globalist criminals that control the political apparatus, known as the federal government.

The echelon network of subversion and espying is but a rung on a ladder of a coercive control. The prism of deception is the false reality your controllers use to relinquish your will to oppose the repression. The secret intelligence agencies only serve their own bureaucratic interests as they obey their master operative superiors.

The disinformation culture is the permanent realism and the snitch society is an essential requirement necessary to keep the imperium in power. With the Americanization of domestic terrorists, Tea Party activists and the Patriotic Truth movement are in the sights of totalitarian gangsters.

Is there any doubt that the NSA, FBI and CIA act as if they are above the law and unaccountable? The great divide between legitimate authority and clandestine oppression is narrow and fragile. The essential question is who is the true enemy? As the surveillance technology perfects their reach and assimilates the application of their data assets, the military option under martial law intensifies. No one is safe. Big Brother has become the impending Terminator.

The Stasi Skynet engulfs everyone. There is no way out of the matrix as long as the globalists operate their spy network. The system is designed to eliminate any and all dissent. Overload the data collectors by intensifying the practice of liberty at every opportunity.

“It is beyond Orwellian, and it provides further evidence of the extent to which basic democratic rights are being surrendered in secret to the demands of unaccountable intelligence agencies.” – Jameel Jaffer


SARTRE is the pen name of James Hall, a reformed, former political operative. This pundit’s formal instruction in History, Philosophy and Political Science served as training for activism, on the staff of several politicians and in many campaigns. A believer in authentic Public Service, independent business interests were pursued in the private sector. As a small business owner and entrepreneur, several successful ventures expanded opportunities for customers and employees. Speculation in markets, and international business investments, allowed for extensive travel and a world view for commerce. He is retired and lives with his wife in a rural community. “Populism” best describes the approach to SARTRE’s perspective on Politics. Realities, suggest that American Values can be restored with an appreciation of “Pragmatic Anarchism.” Reforms will require an Existential approach. “Ideas Move the World,” and SARTRE’S intent is to stir the conscience of those who desire to bring back a common sense, moral and traditional value culture for America. Not seeking fame nor fortune, SARTRE’s only goal is to ask the questions that few will dare … Having refused the invites of an academic career because of the hypocrisy of elite’s, the search for TRUTH is the challenge that is made to all readers. It starts within yourself and is achieved only with your sincere desire to face Reality. So who is SARTRE? He is really an ordinary man just like you, who invites you to join in on this journey. Visit his website at http://batr.org.

Defeating Drones: How To Build A Thermal Evasion Suit (VIDEO)

snakebite3

This article was written by Brandon Smith and the included video was a joint project between Oath Keepers and Alt-Market

Asymmetric tactics rely on the idea of fighting smarter, rather than fighting directly, against a larger or more technologically advanced aggressor. It means turning your opponent’s strengths into weaknesses.

For instance, if your opponent relies on the superiority of his tanks and armor, make him fight in the mountains where his armor is useless. If he relies on air superiority, make him sift through a thick canopy where his eye in the sky sees nothing, or make it dangerous for him to land and refuel such vehicles at all. If he relies on body armor for safety, make him fight uphill so that the extra weight wears him down. If his surveillance and security techniques are a little too sensitive and effective, create constant false positives, until he can no longer trust his own alert systems. And, if most of his weaponry and soldiers are heavily reliant on a particular piece of technology, make that technology useless in the field. Force your opponent to fight on fairer ground, where the man with the most skill and intelligence prevails rather than the man with the most million dollar toys.

There is no such thing as fool proof combat technology. There is a way to trick or defeat or survive ANY weapon and any enemy. Period.

Drones and thermal vision have been held up to the common citizenry for years as the end-all-be-all of combat and surveillance technology. I can’t tell you how many times I’ve heard the claim that no one can hide from thermal imaging and that predator drones herald the end of free resistance to tyranny. I find this assertion to be rather absurd, considering militaries across the globe have already developed their own thermal evasion suits (which means it IS possible to hide from thermal vision) and drones seem to kill more innocent bystanders than actual enemy combatants. I will admit that thermal vision use is skyrocketing amongst military and police across the board, and this is because it is indeed effective to a point.

Thermal imaging and drones in the hands of a corrupt establishment make a couple of things very difficult for any resistance – First, you might be able to hide, but you won’t be able to move freely without risk, especially in groups. Second, you might be able to act defensively, but never offensively. Advancing on an objective protected by thermal surveillance would be extremely difficult. Constantly being on the defensive takes the initiative away from those who want to fight back against tyranny. Without the ability to go on the offensive, you will inevitably lose. Hiding in a hole in the mountains for the rest of your life is not an option if you want your children and their children to experience liberty.

Today’s combat reality is that of the digitized battlefield. All modern military units now rely on full spectrum surveillance, computer models, and real time data. Thermal vision is a cornerstone of this model because it is currently the best way to identify potential threats before they can act, rather than after they act. Unfortunately, there is no doubt this kind of surveillance power will be misused, and the spread of drones for domestic applications proves that the establishment’s intention is to utilize thermal against the population, rather than in defense of the population. Therefore, thermal vision must be negated if people are to remain free. We might not be able to fight against misused drones directly, but we can make their primary advantage useless. Here is how it is possible to remove thermal vision as a threat, and thus nullify the primary strength of the drones (and other weapons) in our skies:

Thermal Vision And Drone Misconceptions

Now that you know it is more than possible for civilians to obtain thermal evasion, lets go over some of the most common misconceptions about thermal imaging and drone technology.

Building a suit that hides a person from thermal imaging is impossible?

Clearly, this is false, as we have shown in the video above. Add to this the fact that military units field their own thermal evasion suits (multi-spectral camouflage) for special purposes, and I think we’ve permanently buried the ludicrous assumption that a thermal evasion suit is a fruitless endeavor. Most existing suits, including those used by governments, boast a thermal reduction rating of 60% to 80%. It is important to recognize that there is currently no organization or company offering thermal evasion suits for widespread use by civilians. We have given the public free access to information on building their own suits if they wish, and we are offering professionally made suits for sale with a thermal reduction rating of 90% or more at Snakebite Tactical.

We made no attempt to hide “heat spots” within the tests in the above video. We want to make it clear that this is a 90% effective suit, which is more than enough for almost any application. Achieving 100% reduction at distances of 10 ft to 10 yards in a wearable suit is very difficult, and a person would still need to practice proper field craft in order to remain unseen. However, we believe our suit design more than meets the standards of currently issued military grade suits; suits which are not available to the public anyway.

Thermal imaging sees through walls?

This is movie-land nonsense. A thermal imager can see the heat you emit through a very thin wall if you are leaning against it, but remove your body from contact with the surface and the heat signature will disappear. Thermal imagers have a difficult time identifying stationary people through leaves and the branches of trees, let alone walls. As long as you are not in contact with the item, your heat will not be seen through the item.

Thermal vision sees through forests?

No. Not a chance. In fact, if your only goal is to hide, then a thick forest is the absolute best place to be if thermal surveillance is in use, even without a suit. If your plan is to advance on an objective, then the situation changes, but if you are a lone individual that just doesn’t want to be found, staying in the woods and dense terrain away from people who might rat you out is your best bet. Apply a thermal suit to the scenario and now your are fully mobile without fear of detection.

You will never see a drone coming, so having a suit is meaningless anyway?

Gotta love this kind of fuzzy logic. The claim apparently assumes that drones simply fly miles above the Earth silently raining hellfire missiles down on random heat signatures on the ground without identification. This is not how drones operate.

Drones are mainly used as OVERWATCH for teams of men already on the ground. A drone might see your signature when you are not wearing a suit, but a drone pilot will not waste ordinance on you until you are identified as a viable target. Most of the successful strikes you see in the news and on YouTube are targets that were already lazed by a team on the ground (this is something the DoD rarely mentions, because they want to retain the mystic surrounding drones). The drone is then sent in to attack the target that the team identified. When a military unit comes into contact with an enemy, a drone may be sent in to observe and identify targets. This is a situation where thermal evasion is essential. If those targets throw on thermal evasion gear, the drone becomes a useless platform. If you are under threat by drones and ground opponents, you can leave the area at will without being traced, or you can advance and attack your aggressor without being betrayed by your own heat signature. Your suit does not need to be worn at all times in order to be useful.

I don’t need a thermal evasion suit, I can just buy a thermal blanket or tarp at a fraction of the cost?

The first and most obvious advantage to a thermal evasion suit is that it CAN BE WORN. There is no existing tarp or thermal blanket system that can be worn against the human body and still hide that body from thermal imaging. All of these items conduct heat which can be seen almost as soon as you touch them. If a heat reflecting tarp was a practical working solution to thermal imaging, then you would see hundreds if not thousands of videos on the web proving their effectiveness and governments would not be keeping their own suits such a secret. The reality is, these items are only useful if you plan to stretch them out above you without physical contact, and stay in one place without moving. They are highly defensive in nature and severely limited in their application.

We have developed the very first thermal evasion system available to the public that can be worn for long periods of time and that also provides effective visual camouflage. Our suit works as a ghillie as well as a thermal evasion tool, meaning, it works in thermal, and in visible light. A thermal cloak offers near total 360 degree coverage against thermal imaging devices in the air and on the ground while the person is also mobile. Meaning, instead of constantly hiding from the enemy and being on the defensive (a losing strategy), you can advance on the enemy if you wish without detection. There is no comparison whatsoever in the level of application between a thermal blanket and a thermal suit.

This does not mean a suit solves all your problems. If you walk through an open field and start break-dancing, someone will see you. A thermal suit does not necessarily hide blatant movement by the wearer. You still need to follow proper field craft methods including the use of cover and concealment. Add to this the thermal reduction properties of the suit, and you are much less likely to be detected, even under heightened scrutiny.

I don’t need a thermal suit, I can just hide in the city amongst the crowds and blend in?

I’m sure there are situations when operating in a city might be called for, but frankly, the idea is extraordinarily ill conceived when one considers the surveillance grids being put in place in most major metropolitan areas. Thermal is not your worst enemy in the city. Try CCTV networks with facial and biometric recognition. Try numerous possible collaborators and quislings in a city environment (known for more passive and subservient populations permanently attached to the establishment umbilical cord) who might point the finger at you. The city is a BAD place to be under almost any circumstance that results in crisis and lost liberty, and probably the worst place to be if you are trying to avoid observation and surveillance.

That said, watch almost any police chopper thermal footage in a city and tell me the person being chased was better off without a thermal suit. Imagine you are being chased for simply being a proponent of liberty. Imagine that one day you wake up in the middle of your home city a designated criminal. Would you rather have a thermal evasion suit, or, do you plan to outrun the chopper?

Mud will hide your heat signature?

No, it will not. At least not for more than a minute, and it better be some thick friggin’ mud. Despite what Arnold Schwarzenegger may have taught you, heat transfers through mud just as it does through most other materials.

Drones will find you with LIDAR if they can’t see you with thermal vision?

LIDAR is a form of laser based radar which is bounced off surfaces to create a 3D map of a large area. I’m not sure exactly where the idea came from that drones use LIDAR for personnel detection, but this is simply not so, at least not currently. LIDAR is being tested by the DoD and private contractors for personnel detection using GROUND based 360 degree units, and the effective range of these experimental units is rather limited. Aerial LIDAR is used for mapping of terrain. The complexity of ground based objects (think in terms of millions of objects in any given field of view) makes personnel tracking from the air all but impossible. Ground based LIDAR also requires a recognizable human shape at close range in order to “alert” on an intruder, which means the ThermTac suit (which removes normal human shape) would only HELP in preventing detection. From my research as of 2015, LIDAR for surveillance often suffers from numerous false positives, which means it is a very weak system for tracking personnel. Thermal vision is a far greater threat than LIDAR.

Even if you have a suit that blocks your body heat, you can still be tracked by your footprints?

Under perfect conditions and the use of a sensitive thermal imager on the ground, your footprints MIGHT be visible using a ground based unit right after you imprint them, but it is still unlikely you will be found. Quick thermal imprints (caused by footsteps) disappear within seconds, and are difficult if not impossible to pick out from any distance beyond a few yards. Rubber and plastic soled shoes do not in most cases transfer very much heat into the ground, and the theory that crushed grass releases more heat in thermal imaging is utter nonsense. Too many ideas about thermal imaging are drawn from television and movies, which greatly embellish the capabilities of such devices. If footprints were an effective way to track people using thermal, then Search and Rescue units (many have access to excellent thermal devices) would have numerous examples of this along with numerous success stories (these examples do not exist).

One legitimate danger involving footprints occurs when a very large number of people (small groups are not an issue) travel together in single file. This constant imprinting on the same path by multiple footfalls can indeed leave a residual trail that can be found several minutes later, enough time to be tracked by a thermal imager.

Thermal evasion suits will help terrorists?

As stated in the video, the world’s worst terrorist groups are often trained by our own governments and covert intelligence agencies. If covert agencies have access to thermal evasion techniques, then it only follows that so do the people they train. I have no doubt that we will be accused of aiding terrorists by releasing this information, because that is really the only recourse the establishment has to try to stop the use and spread of thermal cloaks (or they will claim that the suit is a scam and doesn’t actually work. Of course, people will be able to test this for themselves). They will have to try to shame people into refusing to adopt thermal evasion as a means of defense. Trust me, I’ve seen this kind of propaganda used against people merely for talking about methods that MIGHT work. Read any military forum where someone discusses thermal evasion, and invariably a dozen henpecking statists will ask them if they are “with ISIS or Al-Qaeda” to shut them up.

Self-defense is an inborn right, not a privilege granted by arbitrary authority. You do not need permission to obtain means of defense against a threat, even if that threat has thermal imaging at his disposal and a license from the state to kill you. Our thermal suit design is a culmination of three years of tireless effort.  We believe the information belongs in the hands of the citizenry, not only in the hands of governments and those they train. The greater threat to the common good is a lack of knowledge that makes free people weak and vulnerable. The goal of this project is to remove a clear weakness in the American people. If you are not informed, and not prepared, then you will never be secure. Some people would have you believe that thermal imaging and drones are for your safety. We say YOU are the only person that can be trusted to provide for your own safety. If anything, thermal eyes and lurking drones present a more intense danger to you and your freedom than any terrorists they are supposedly intended to fight against.

For more information on thermal evasion, check out some of our essays at Snakebite Tactical.

If you would like to support the publishing of articles like the one you have just read, or support further projects like our ThermTac thermal suit project, visit our donations page here.  We greatly appreciate your patronage.

Brandon Smith is the founder of the Alternative Market Project, an organization designed to help you find like-minded activists and preppers in your local area so that you can network and construct communities for barter and mutual aid. Join www.Alt-Market.com today and learn what it means to step away from the unstable mainstream system and build something better. You can contact Brandon Smith at: [email protected].

Second Anniversary Of Edward Snowden’s NSA Spying Revelations

Snowden-WhereAreWeNow__Twitter-Europe

A June 6, 2013 London Guardian article first revealed lawless NSA spying. It was just the beginning of much more to come.

Information supplied by Edward Snowden showed the NSA spies secretly and unconstitutionally on its citizens and residents – besides overstepping its authority abroad.

He connected important dots for millions. He explained spying in America is pervasive. Constitutional rights no longer matter.

Anything goes remains official policy. The NSA, FBI, CIA, DEA and Homeland Security systematically operate by their own rules.

Snowden said “I really want the focus to be on (the documents he revealed) which I hope will trigger among citizens around the globe what kind of world we want to live in.”

Enactment of the USA Freedom Act (the renamed Patriot Act) did little to change things. US spy agencies continue trampling on Bill of Rights protections.

They compromise due process, habeas rights, free expression, assembly and association, and protection from unreasonable searches and seizures.

Big Brother spying continues unabated. Meaningful change remains elusive. Mass surveillance goes on in ways few Americans realize.

Section 702 of the FISA Amendments Act is one of many unconstitutional tools. It’s unaddressed by Congress and the White House. Major media ignore it.

The NSA uses it to justify mass collection of phone calls and emails directly from communications providers.

Ostensibly used for foreign spying, it collects meta-data communications of Americans unrelated to national security.

It’s done without court authorized warrants. It collects large portions of Internet traffic directly from its providers – unconstitutionally and in violation of international human rights laws.

Microsoft, Yahoo, Google, Facebook, Skype, YouTube, Apple, and major telecommunications companies are complicit in spying on their customers.

The USA Freedom Act changed little. Judicial oversight is entirely absent. Congressional members are told little about what goes on.

Intelligence community officials largely stonewall them. Spying monitors friends and foes alike. It’s about control.

It’s for political and economic advantage. It’s to be one up on foreign competitors.

It’s for information used advantageously in trade, geopolitical, and military relations.

Domestic spying is longstanding. It’s got nothing to do with protecting national security. Not a single new millennium act of terrorism occurred on US soil – nor were any foiled.

Claims otherwise were false. 9/11 remains the mother of all Big Lies. It had nothing to do with Osama bin Laden or crazed Arabs. It had everything to do with scaremongering the public to support America’s imperial agenda.

The so-called “war on terror” is war OF terror on the American people and others wrongfully targeted worldwide. Washington needs enemies to justify its rogue policies. Fear-mongering creates them.

So-called bad guys are largely Muslims, Russians, Chinese, North Koreans, others not in lockstep with US policies, and ordinary people wanting respect for their fundamental rights.

Authority granted under the 1981 Executive Order 12333 remains deeply troubling. It’s used to justify recording 100% of foreign countries’ telephone calls.

Its loophole-ridden provisions let the NSA:

• “Collect, including through clandestine means), process, analyze, produce, and disseminate signals intelligence information and data for foreign intelligence and counterintelligence purposes to support national and departmental missions;

• Act as the National Manager for National Security Systems as established in law and policy, and in this capacity be responsible to the Secretary of Defense and to the Director, National Intelligence; (and)

• Prescribe security regulations covering operating practices, including the transmission, handling, and distribution of signals intelligence and communications security material within and among the elements under control of the Director of the National Security Agency, and exercise the necessary supervisory control to ensure compliance with the regulations.”

On July 31, 2008, EO 12333 was amended to:

• “Align (it) with the Intelligence Reform and Terrorism Prevention Act of 2004;

• Implement additional recommendations of the 9/11 and WMD Commissions; (and)

• Further integrate the Intelligence Community and clarify and strengthen the role of DNI as the head of the Community; Maintain or strengthen privacy and civil liberties protections.”

By law,  NSA’s mission is limited to monitoring, collecting and analyzing foreign communications. It way oversteps by mass spying at home and abroad on the phony pretext of protecting national security.

Snowden revealed vital information everyone needs to know. “I don’t want to live in a world where there’s no privacy and therefore no room for intellectual exploration and creativity,” he said.

Nor should anyone tolerate Big Brother intrusiveness.


Stephen Lendman lives in Chicago and can be reached at [email protected]. His new book is titled “How Wall Street Fleeces America: Privatized Banking, Government Collusion and Class War”. www.claritypress.com/Lendman.html Visit his blog site at www.sjlendman.blogspot.com.

Unconstitutional Mass FBI Aerial Surveillance

 fbi surveillance plane

Free and open societies don’t spy on their citizens. They don’t invent phony threats as justification.

America is a belligerent nation waging endless wars of aggression against invented enemies. Fear-mongering is rife. It’s done to rape, ravage and destroy one country after another.

It’s a tactic used to scare people to believe they’re safer by sacrificing fundamental freedoms. Mass surveillance is a defining rogue state characteristic.

Post-9/11, government-usurped authority turned America into a police state. Big Brother watches everyone. Tuesday Senate passage of the USA Freedom Act (the renamed Patriot Act) changed little.

Government intrusion into the private lives of its citizens remains largely unchanged. The only good news is that USAF slightly rolled back its intrusiveness instead of giving spy agencies more powers.

History shows restrictions imposed are easily circumvented or ignored. A separate article discusses systematic FBI misuse of Patriot Act authority.

Bureau secrecy and cover-up make it impossible to know the full extent of its lawlessness. It operates ad libitum with minimum oversight and accountability.

One example is its mass surveillance of US citizens by drones and other aircraft. On June 2, AP reported “(s)cores of low-flying planes circling American cities…”

“They’re “part of a civilian air force operated by the FBI and obscured behind fictitious companies…”

It’s not secret. It’s been reported before. In July 2013, the agency admitted using drones for domestic surveillance numerous times without court authorized warrants or other forms of oversight.

At the time, deputy director Stephen D. Kelly said “(t)he FBI uses UAVs in very limited circumstances to conduct surveillance when there is a specific operational need.”

“Since late 2006, the FBI has conducted surveillance using UAVs in eight criminal cases and two national security cases.”

Former FBI director Robert Meuller admitted spying on US citizens with no “operational guidelines.”

Warrantless spying by any means threatens everyone. No probable cause is needed. No restraints are imposed. Constitutional protections are circumvented.

Once a program is established, it takes on a life of its own. In the last decade, FBI aerial spying expanded to “civilian air force” level.

In April alone, AP identified at least 50 FBI aircraft conducting more than 100 flights over urban and rural areas in 11 states.

It cited a 2009 budget document indicating 115 planes, including 90 Cessna aircraft.

FBI aerial spying is longstanding. Today, drones and other aircraft are equipped with high-tech cameras for close-up visual surveillance as well as technology able to monitor thousands of cell phones – a blatant breach of privacy.

According to Senate Judiciary Committee chairman Charles Grassley (R. IA):

“It’s important that federal law enforcement personnel have the tools they need to find and catch criminals.”

“But whenever an operation may also monitor the activities of Americans who are not the intended target, we must make darn sure that safeguards are in place to protect the civil liberties of innocent Americans.”

No safeguards whatever exist – nor does Congress back up high-minded rhetoric with effective policies protecting the public from abusive government practices.

Rogue agencies like the FBI, NSA, CIA, DEA and Homeland Security operate by their own rules – easily circumventing weak and ineffective restraints on their authority.

Congressional inaction effectively rubber-stamps them. It permits unaccountable police state practices no free society would tolerate.

AP learned the FBI uses at least 13 fake companies to conceal its activities – including FVX Research, KQM Aviation, NBR Aviation and PXW Services.

ACLU policy analyst Jay Stanley called its flights significant if they’re “maintaining a fleet of aircraft whose purpose is to circle over American cities, especially with” today’s sophisticated surveillance technology.

Details the FBI confirmed concur with published reports since at least 2003 about suspicious-looking planes overflying US cities being government ones.

The Drug Enforcement Agency (DEA) and US Marshals Service have their own aerial surveillance programs using sophisticated technology, much like the FBI’s.

Basic information about these programs are secret. Heavily redacted Justice Department Inspector General documents alone inadequately explain what the public has a right to know.

They’re spied on – by the FBI, NSA, CIA, DEA, Homeland Security and other rogue government agencies, especially post-9/11.

Spies “R” us defines US policy. America is a total surveillance society unfit to live in. Big Brother watches everyone intrusively – in blatant breach of fundamental constitutional protections.

Fabricated national security threats justify the unjustifiable. The so-called “war on terror” is phony. The war OF terror by Washington on its citizens is real.

Unconstitutional spying today in America is pervasive. It’s institutionalized. Privacy rights no longer matter. Fundamental freedoms are being trampled. They’re disappearing in plain sight.


Stephen Lendman lives in Chicago and can be reached at [email protected]. His new book is titled “How Wall Street Fleeces America: Privatized Banking, Government Collusion and Class War”. www.claritypress.com/Lendman.html Visit his blog site at www.sjlendman.blogspot.com.

 

Are UK Police Now Behaving Like Intelligence Agencies? (VIDEO)

City_of_London_Police_Van

The overreaching surveillance state in the U.S. certainly takes most of the headlines, but the UK is every bit on par if not worse.  A recent report, responded to below by Steve Jolly of NOCCTV, indicates that there have been 700,000 police requests to access private communications in the UK over a two-year period – which amounts to a request every 2 minutes.  And these requests are almost never denied; in fact, they have a 96% approval rate. This surely can’t purely be to “thwart terrorism.”


RT

Visit http://www.no-cctv.org.uk/

NSA Spying: Is A Bad Deal Better Than No Deal?

The National Security Agency (NSA) headquarters in Fort Meade, Maryland. Among other forms of intelligence-gathering, the NSA secretly collects the phone records of millions of Americans, using data provided by telecom firms AT&T, Verizon and BellSouth. Photograph: NSA/Getty Images

The National Security Agency (NSA) headquarters in Fort Meade, Maryland. Among other forms of intelligence-gathering, the NSA secretly collects the phone records of millions of Americans, using data provided by telecom firms AT&T, Verizon and BellSouth. Photograph: NSA/Getty Images

The symbolic step taken to go from Patriot Act provisions to Freedom Act regulations is insignificant in the effort to protect privacy.

If anyone believed that letting three Patriot Act provisions expire meant real change in the way the NSA spies on millions of innocent people, we have now learned that it didn’t change anything. In fact, the changes were so meaningless that US President, Barack Obama, has signed the so-called US Freedom Act into law almost immediately.

According to the AP, Obama has now stamped his signature on the bill after the US Senate voted in favor of replacing parts of the Patriot Act with the new legislation that had been already approved by the US House of Representatives.

The only significant changes worth mentioning is that it will be the telecommunications companies the ones in charge of holding the information they capture from users as supposed to the NSA itself. In theory, the NSA will now need to get a warrant before it can request the telephone records from users as supposed to simply vaccumming all data from telecommunication company servers.

Privacy concerns still remain as for many people it is hard to believe that the NSA will simply disconnect itself from databases to which it has been connected since at least the 1990s.

Since its inception, the NSA has been responsible for the unconstitutional mass collection of personal data in a supposed effort to protec the US Homeland from potential terror attacks. Spying programs ran by the NSA have existed since before 9/11, the trigger event that served as the poster excuse to push for unprecedented abuses to long-held constitutional rights.

After lying about the true extend of its spying operations, the NSA has been accused by Edward Snowden and other whistleblowers of using advanced techology to spy snoop on millions of people in the United States and abroad. Snowden, who was a subcontractor of the NSA quietly collected data and documentation which he later leaked to various media outlets.

Snowden’s revelations showed how the NSA and its partners in crime in Europe  collected inumerable records from people who had no link whatsoever with terrorist organizations. Intelligence agencies used programs such as PRISM and XKeyscore to illegally sweep and collect information from internet and telephone users, including metadata as well as  the content of the messages and conversations.

Unde provisions contained in the Patriot Act, the US government, through the NSA and other spy agencies was allowed to violate the US Constitution and the Bill of Rights under the excuse that only massive spy programs such as the ones revealed by Snowden would be able to keep America and the world safe from Islamic extremists who sought to harm the western world. Incidentally, more terror attacks have occurred since 9/11 than at any other time before that faithful day despite the existence of the massive spying programs.

Section 215 of the Patriot Act, which expired last Sunday at midnight allowed the US government to access personal information of every citizen under the sponsorship of the Foreign Intelligence Surveillance Act (FISA). Since its inception, the FISA Court has given the intelligence community the the power to demand a judicial investigation and authorized the monitoring, physically and electronically, and the gathering of information on people who “may be linked to terrorism or espionage against the United States”.

No one other than the members of the intelligence community and the Court itself are allowed to access and scrutinized any documents related to FISA requests, which makes it impossible to have independent verification that such a link to terrorism truly exists.

Under the new rules contained in the US Freedom Act, the NSA is still able to use all information collected previous to the expiration of the three Patriot Act provisions that allowed the umlimited collection of data. According to AP, “the legislation will revive most of the programs the Senate had allowed to lapse”. Meanwhile, John Boehner said that he applauded the Senate “for renewing our nation’s foreign intelligence capabilities, and I’m pleased this measure will now head to the president’s desk for his signature.”

Indeed, the approval of the US Freedom Act is nothing else than a bad deal which still allows the NSA to spy without limits.


Luis R. Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news. Read more about Luis.

FBI Flying Covert Planes Using Fake Companies Over At Least 11 States Monitoring Citizens! (VIDEO)

Using-Fake-Corporations-the-FBI-has-Built-its-Own-Air-Force-Inside-the-US-and-You-are-the-Target

Have you been targeted?

Sometimes I just want to scream from the top of my lungs about the atrocities that surround us on a daily basis… well today is one of those days! This morning as I rolled out of bed I awake to the blare of the Christian radio station buzzing in the background, “don’t be alarmed at the FBI aircrafts in your skies, they are only there to collect video and cell phone data.” The voice then happily stammered while playing the next tune.

Since when did it become acceptable to promote our government breaking the law on open airwaves in such a satisfactory manner as if what they were doing was legal? No court approved the FBI’s usage of these aircrafts, yet they did as they pleased and monitored anyone and everyone they deemed necessary.

In fact according to The Associated Press 11 states were identified in the surveillance flights conducted by the FBI:

— Arizona: Glendale, Maricopa, Mesa, Phoenix, Scottsdale, Tempe.

— California: Anaheim, Rancho Cordova, Richmond, Sacramento, San     Diego, Spring Valley.

— Florida: Cape Coral.

— Illinois: Chicago.

— Maryland: Baltimore, Columbia.

— Massachusetts: Boston, Brockton.

— Minnesota: Minneapolis.

— Rhode Island: Providence.

— Texas: Arlington, Dallas, Houston, Plano.

— Virginia: Arlington, Fairfax, Garrisonville, Springfield.

— Washington: Seattle, Tacoma.

— Washington, D.C.

fbi Surveillance

But wait it gets WORSE!!! Here is the breaking report…

 Some flight patterns were also noted by independent journalist Sam Richards, here are some of those: 

 Screen%20Shot%202015-06-03%20at%2010_56_43%20AM

Screen shot

WOW! This Covert FBI Drill Makes Jade Helm Look Like a Walk In the Park! It’s Gone from Bad to Worse! 

For More Information See:

http://www.abc15.com/news/region-phoenix-metro/central-phoenix/fbi-behind-mysterious-surveillance-aircraft-over-us-cities

http://ktar.com/22/1838941/FBI-surveillance-crafts-buzz-Phoenix-dozens-of-other-US-cities

http://www.mintpressnews.com/department-of-justice-flying-secret-airplane-fleet-over-american-cities/205971/


Lisa Haven is an independent Christian news analysis and one of the top contributors on www.BeforeItsNews.com. She is also author of www.LisaHavenNews.net and runs her own youtube channel (Lisa Haven) with tens-of-thousands of views per day. Digging deep and finding truth is what she lives for. Her passion is to spread truth no matter where it lies. She covers everything from martial law, to FEMA camps, to end time bible prophecy, to government documents and much more! Before launching her journalism career, she wrote many bible studies and lead women ministries for a number of years. She will also complete her ministry degree at International School of Ministry this year.

America In Trouble! Read Before Banned -George Orwellian Nightmare Now Coming True (VIDEO)

big brother watching you

Many in our culture are aware of the term ‘Orwellian.’ It is often used as a metaphor to describe the ever-increasing global fascist surveillance state that is taking place in our world today. However, what many fail to understand is just where the term Orwellian originated. In 1949 author George Orwell (pseudonym of Eric Blair) composed a fiction book predicting the nightmarish future of the year 1984. The book portrays an elite ruling class who bans all individualism and thought and uses a “tele screen” to control and monitor the masses who are highly oppressed and brainwashed to do their bidding.

Today we are living George Orwell’s nightmare! As I write this the NSA is compiling data against reporters like me. In fact, this post will put me on a one-way ticket to the ‘red list’—a list of dissidents who oppose their tyrannical rule and will one day be “vanquished.” Not only that but our television (telescreens), appliances, computers and even street lights have become data collection devices monitoring everything we say and do. Nothing is private anymore! The elite ruling class, known as the Illuminati, has their tentacles in every aspect of our lives, and George Orwell knew it was coming!!

Unfortunately things are about to get rocky as his horrifying nightmare unfolds…

“He who controls the past controls the future. He who controls the present controls the past.” —George Orwell, 1984


Lisa Haven is an independent Christian news analysis and one of the top contributors on www.BeforeItsNews.com. She is also author of www.LisaHavenNews.net and runs her own youtube channel (Lisa Haven) with tens-of-thousands of views per day. Digging deep and finding truth is what she lives for. Her passion is to spread truth no matter where it lies. She covers everything from martial law, to FEMA camps, to end time bible prophecy, to government documents and much more! Before launching her journalism career, she wrote many bible studies and lead women ministries for a number of years. She will also complete her ministry degree at International School of Ministry this year.

The Senate’s Patriot Act Betrayal

nsa surveillance

Watching the DC establishment respond to Senator Rand Paul’s efforts to sunset important aspects of the Patriot Act is like peeling back the skin of a decaying onion to expose the rot. Members of the Senate all take an oath to defend and protect the U.S. Constitution. Well those “public servants” who are doing their perfected “Potomac Two Step” would have the public believe that next week’s vote on some version of the House passed USA Freedom Act will halt the NSA from their systematic violation of 4th Amendment protections.

As expected the disinformation from the corporatist media, USA Today misleads as expected.

“The Senate voted 77-17 to advance a bill that would end the National Security Agency’s controversial bulk collection of the phone data of millions of Americans not suspected of any terrorist activity.”

As any sincere and knowledgeable spectator to the national tragedy and transition into a police state understands that bucking the establishment carries a very heavy price.

Sentiments expressed by Rand Paul that ‘I’m not going to take it anymore’, should be a cry and rally point for any American who has an ounce of courage and guts to confront and challenge the Federal monster, bent upon controlling each and every honest citizen.

“This is a debate over the Bill of Rights,” he said. “This is a debate over the Fourth Amendment. This is a debate over your right to be left alone.”

Retaliation against opposition to the totalitarian authoritarianism regime that is being constructed is par for the course. Conceding the outcome from this dust up, Rand Paul says Freedom Act will ‘Ultimately Pass’.

“It’s hard for me to have trust in the people who we are giving great power to,” Paul said, adding he plans to offer some amendments.

No matter the final resolution, the fight to make a national issue out of the universal violation of individual communications is both necessary and desirable.

When Senator Ted Cruz states: “The USA Freedom Act is the right policy approach. It protects the civil liberties of every American. It ends the federal government’s bulk collection of phone metadata from law abiding citizens and at the same time ensures that we maintain the tools that are needed to target violent terrorists and prevents acts of terrorists”, he demonstrates his significant departure from that of Senator Paul.

The lack of merits in a transition from The Patriot Act is now USA Freedom Act was recently discussed in an Inherent Autonomy essay. Supporting GOP office holders who are ignorant of the true nature of constitutional protections and civil liberties has been a hallmark of why Republicans will never right this ship of state.

RINO’s, NeoCons and country club Republicans are not reliable patriots. Phony and expedient Democrats, who purport to be defenders of liberty, mostly are opportunists. The governance political class will never allow a Rand Paul, individual liberty proponent to gain real power.

An example on how the toxic sausage is ground out, cited in the National Journal illustrates how dissent is not tolerated by the power brokers.

“Paul encountered procedural resistance as he rose to speak on the Senate floor earlier Sunday, as a disagreement broke out between him and Sen. John McCain, Sen. Dan Coats, and presiding Sen. Chuck Grassley over whether time for debate had ended. During a brief break to figure out the disagreement, a clearly frustrated Paul could be overheard telling a floor aide the time-keeping was incorrect: “That’s a lie … it was not 23 minutes … that is inaccurate.”

Paul, finally allowed to speak, began raising his voice to passionately make his case that the Patriot Act allows unconstitutional surveillance on law-abiding Americans.

“Get warrants on people we have suspicion on!” Paul yelled. “Quit wasting time on innocent American people.”

Essentially, federal elected representatives, only stand for defending government dominance; and treat constituents as irritants and obstacles.

Review the actual voting list from the U.S. Senate on Cloture on the Motion to Proceed (Upon Reconsideration Motion to Invoke Cloture on the Motion to Proceed to H.R. 2048 )

Grouped By Vote Position

YEAs —77

Alexander (R-TN)Ayotte (R-NH)

Baldwin (D-WI)

Bennet (D-CO)

Blumenthal (D-CT)

Booker (D-NJ)

Boozman (R-AR)

Boxer (D-CA)

Brown (D-OH)

Burr (R-NC)

Cantwell (D-WA)

Capito (R-WV)

Cardin (D-MD)

Carper (D-DE)

Casey (D-PA)

Cassidy (R-LA)

Cochran (R-MS)

Coons (D-DE)

Corker (R-TN)

Cornyn (R-TX)

Cruz (R-TX)

Daines (R-MT)

Donnelly (D-IN)

Durbin (D-IL)

Feinstein (D-CA)

Flake (R-AZ)

 

 

Franken (D-MN)Gardner (R-CO)

Gillibrand (D-NY)

Hatch (R-UT)

Heinrich (D-NM)

Heitkamp (D-ND)

Heller (R-NV)

Hirono (D-HI)

Hoeven (R-ND)

Inhofe (R-OK)

Isakson (R-GA)

Johnson (R-WI)

Kaine (D-VA)

King (I-ME)

Kirk (R-IL)

Klobuchar (D-MN)

Lankford (R-OK)

Leahy (D-VT)

Lee (R-UT)

Manchin (D-WV)

Markey (D-MA)

McCain (R-AZ)

McCaskill (D-MO)

McConnell (R-KY)

Merkley (D-OR)

Mikulski (D-MD)

Murkowski (R-AK)Murphy (D-CT)

Nelson (D-FL)

Perdue (R-GA)

Peters (D-MI)

Portman (R-OH)

Reed (D-RI)

Reid (D-NV)

Rounds (R-SD)

Sanders (I-VT)

Schumer (D-NY)

Scott (R-SC)

Shaheen (D-NH)

Stabenow (D-MI)

Sullivan (R-AK)

Tester (D-MT)

Tillis (R-NC)

Toomey (R-PA)

Udall (D-NM)

Vitter (R-LA)

Warner (D-VA)

Warren (D-MA)

Whitehouse (D-RI)

Wicker (R-MS)

Wyden (D-OR)

 

NAYs —17

Barrasso (R-WY)Blunt (R-MO)

Coats (R-IN)

Collins (R-ME)

Cotton (R-AR)

Crapo (R-ID)

Ernst (R-IA)Fischer (R-NE)

Grassley (R-IA)

Moran (R-KS)

Paul (R-KY)

Risch (R-ID)

Roberts (R-KS)Rubio (R-FL)

Sessions (R-AL)

Shelby (R-AL)

Thune (R-SD)

Not Voting – 6

Enzi (R-WY)Graham (R-SC) Menendez (D-NJ)Murray (D-WA) Sasse (R-NE)Schatz (D-HI)

Where are the supposed Democrat civil libertarians? Evidence of earnest concern for the Bill of Rights is lacking on both sides of the aisle, but is glaringly apparent that Senator Paul’s arguments are not heard by the loyal opposition. This kind of a voting record indicates that bipartisan solutions to defend the Constitution are merely an academic exercise and have very few actual supporters in the august debating society.

Yet, this reality does not prevent the media from spinning that The Patriot Act Just Made Rand Paul GOP Enemy No. 1.

“I don’t stand with Rand,” Republican Sen. Mark Kirk told The Daily Beast, flipping Paul’s campaign slogan. “I disagree with him. I think we should not allow the program to be interrupted.”

 Compare this attitude with the sentiment that Paul registers that crystallizes the issue,

“We should not be debating modifying an illegal program,” Paul wrote in an Op-Ed for TIME on Saturday. “We should simply end this illegal program.”

Those Republican hawks that place their allegiance in a dying international empire over a living and hallowed Bill of Right principles are the true betrayers of the Republic.

The political class refuses to face the harm and folly that the bogus War of Terror has fashioned since the premeditated, deliberated and orchestrated false flag culture of a fictitious homeland security society has instituted.

This is the real and comprehensive national debate that needs to be conducted.

The Fourth Amendment, NSA and Metadata essay cites examples where the surveillance agency has altered their proper foreign sleuthing mission with a substitute domestic emphasis that is not only against common law but also diminishes their effectiveness in enhancing legitimate national security.

With all the whining and fear mongering in curtailing the NSA collection system, it becomes obvious that the military-industrial-security-complex has reason to frighten the public with claims of imminent terrorist attacks on domestic soil.

Living in an open border culture hardly induces or advances actual security.

A country that places faith in the likes of a dubious CIA Director over the 4th Amendment is a country doomed to succumb to tyranny of our own bureaucratic scoundrels. The WSJ reports:

“CIA Director John Brennan, in an interview aired Sunday morning on CBS, said the expiration of government-surveillance programs could make the country less safe from a terrorist attack, and he blamed “political grandstanding” in the Senate for the current legislative standoff.

Mr. Brennan said the programs “really have helped stop attacks,” although he didn’t cite specific incidents. “The tools that the government has used over the last dozen years to keep this country safe are integral to making sure that we’re able to stop terrorists in their tracks.”

If the record was so laudable, the chaos in the Middle East might have been avoided and those infamous weapons of mass destruction might have been found in the possession of legions of American occupying troops conducting a military campaign for the New World Order.

This is reason enough to monitor, record and store Meta data, so American citizens that advocate the freedoms and liberty can be intimated and dissuaded from opposing the political order.

Rand Paul may not be perfect, but he has demonstrated that one person can make a difference. Raising awareness and forcing the Senate to take an unpleasant vote might be the extent of what is possible in a legislative body that has little accountability.

When some devious arrangement with the House on some version of the USA Freedom Act is reached, the end result is that the NSA will still have access to electronic communications. Only a full repeal of the Patriot Act can restore the provisions of the 4th Amendment.


SARTRE is the pen name of James Hall, a reformed, former political operative. This pundit’s formal instruction in History, Philosophy and Political Science served as training for activism, on the staff of several politicians and in many campaigns. A believer in authentic Public Service, independent business interests were pursued in the private sector. As a small business owner and entrepreneur, several successful ventures expanded opportunities for customers and employees. Speculation in markets, and international business investments, allowed for extensive travel and a world view for commerce. He is retired and lives with his wife in a rural community. “Populism” best describes the approach to SARTRE’s perspective on Politics. Realities, suggest that American Values can be restored with an appreciation of “Pragmatic Anarchism.” Reforms will require an Existential approach. “Ideas Move the World,” and SARTRE’S intent is to stir the conscience of those who desire to bring back a common sense, moral and traditional value culture for America. Not seeking fame nor fortune, SARTRE’s only goal is to ask the questions that few will dare … Having refused the invites of an academic career because of the hypocrisy of elite’s, the search for TRUTH is the challenge that is made to all readers. It starts within yourself and is achieved only with your sincere desire to face Reality. So who is SARTRE? He is really an ordinary man just like you, who invites you to join in on this journey. Visit his website at http://batr.org.

Yea For Surveillance

big brother surveillance
By: The Real Agenda |

The US Senate voted against a bill whose purpose was to end the collection of telephone data of millions of citizens.

This practice has been carried out by the National Security Agency (NSA) over decades, but has only been notices fairly recently, after whistleblowers like Edward Snowden and others came forward with documents and testimony about the illegal and unconstitutional practices that until then had been done in secret.

With 57 votes against 42 in favor, the Senate blocked the proposed legislation known as the “US Freedom Act”, which would have prohibited the mass collection of telephone data and modified the Patriot Act.

The Patriot Act is the legislation passed after the terrorist attacks of September 11th, which allows the US goverment to, among other things, hunt and kill American citizens at home and abroad without any regard for the rule of law.

If its approval had succeeded, the US Freedom Act would have amended Section 215 of the Patriot Act, which covers the collection of telephone data of millions of citizens without ties to terrorism, but in turn it had renewed the validity of the whole law including this and other changes until 2019.

The US Freedom Act was passed last week in the US House of Representatives with bipartisan support of 338 votes in favor and 88 against only to die at the hands of some US senators who voted against the legislation.

Incidentally, many of the legislators who voted against the proposal have more than questionable ties to the surveillance industry and many of them have received political contributions from those very same corporations.

However, from the moment it was approved in the House of Representatives, security experts warned that the US Freedom Act would have a much graeter difficulty to advance in the Senate, where the leader of the Republican Party, Mitch McConnell, has always opposed changing the Patriot Act.

After blocking the US Freedom Act, the Senate passed a vote on a two-month extension of the Patriot Act, as it is scheduled to expire on June 1.

“The extension of two months is in the best interest to achieve a result that will convince the Senate, the House and the president,” said McConnell.


Luis R. Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news. Read more about Luis.