Tag Archives: surveillance

Nowhere To Hide: Facebook Goes Beyond ‘Facial Recognition’ To Track You

facebook-privacy

(RINF) – Terrifying new research shows Facebook’s ambitions to track users has gone far beyond the company’s ‘old’ technology that recognises users faces, which in itself poses a dizzying array of privacy concerns.

The new development, dubbed Pose Invariant PErson Recognition (PIPER), gathers information about your clothing, hairstyles and body shapes and currently holds a 83% accuracy rate, already incredibly high and is expected to increase even further.

Yann LeCun, head of artificial intelligence at Facebook explained how it works:

“There are a lot of cues we use. People have characteristic aspects, even if you look at them from the back. For example, you can recognise Mark Zuckerberg very easily, because he always wears a gray T-shirt.”

In an effort to ease fears over the invasive technology, Facebook denied plans to integrate it onto their site.

Ari Entin, a Facebook spokesman told the media:

“This is so far, experimental, long-term research. I don’t think this is something that we would see any time soon.”

The networking giant are right to thread lightly as they have a history of violating privacy laws. In 2012 the company was ordered to destroy its facial recognition database in Germany after authorities deemed it was in violation of German law. In 2015 Facebook was sued by Carlo Licata who claimed he and others had their rights violated under the Biometric Information Privacy Act (BIPA).

Despite the denials by Facebook that their new technology will not be used, when is the last time a tech company  – one that can only survive financially by collecting information about its users and then selling that information, invested in highly invasive software that it did not use it for profit?


Mick Meaney is the founder and editor of RINF Alternative News , founded in 2004 as a response to increasing levels of media distortions and lies.

United Stasi Of America Through The Echelon Prism

NSA Eye - Listen

Signals collection has a long secretive and enigmatic history. The very definition of espionage implies spying, most closely associated with foreign sources. Since the Echelon network, the unified function of data retrieval became a given during the cold war. With the revelation of Prism, advances in sophisticated electronic devices and software algorithms provide a major leap. The article, Is PRISM the US version of Echelon?, sums up the evolution. “With this kind of setup and ambition to capture and evaluate private conversations (well, not so private now), makes Echelon that much more believable, and that PRISM is a reflection of the infamous project, but focused solely on the US.”

Bankwatch takes a sanguine attitude towards Why PRISM? ECHELON has been around since 1948 supported by US, UK, Canada, Australia. At the same time, the publication references the capacities of the original analogue technology.

“The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON Dictionary) that will prompt the computers to flag the message for recording and transcribing for future analysis. Intelligence analysts at each of the respective listening stations maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept.”

This machinery of electronic snooping has no instinctive restraint on the subject or content, when the technocratic engineers are left to design the next level of the “All Seeing Eye”. The notion that the Prism program is shocking certainly does not conform to the even increasing capacity of surveillance society that has already discarded the presumption of privacy.

The Wall Street Journal forecasts the total integration of data because Technology Emboldened the NSA, to capture all that is digital.

“At a 2009 conference on so-called cloud computing, an NSA official said the agency was developing a new system by linking its various databases and using Hadoop software to analyze them, according to comments reported by the trade publication InformationWeek.

The system would hold “essentially every kind of data there is,” said Randy Garrett, who was then director of technology for the NSA’s integrated intelligence program. “The object is to do things that were essentially impossible before.”

Nonetheless, the Director of National Intelligence issues fact sheet on PRISM in response to leaks, wants you to accept that the government is adhering to stature authority and protecting vital national security interests. “While focusing on the letter of the law and the government’s good intentions, Clapper dodges any mention of how much information (or what kind) is actually collected with the PRISM program.”

OK, only a blood brother operative of the intelligence community will challenge the proposition that the collection of electronic information is the main function of their Skynet self-aware artificial intelligence system. The true debate is whether the data collected is destined for use against targeted American citizens, for nefarious purposes.

Mashable attempts to explain the methodology of PRISM: Does the NSA Really Get Direct Access to Your Data?, and how the “so called” judicial review function of FISA Court approval is processed.

“For Ashkan Soltani, an independent privacy researcher and technologist, this is “a process for submitting [Section] 702 requests and getting responses in a machine-readable form.”

The 41-page PRISM Powerpoint presentation “could be seen as a business development deck indicating all the various providers that they currently have ‘relationships with,'” he told Mashable.

The system is “basically a data-ingestion API,” he said.

Soltani speculated that based on what we know now, PRISM is a “streamlined way” to submit Section 702 orders to the companies for them to review the requests, and it gives the NSA the ability to handle and process the response “in an automated fashion,” just like an app like TripIt, which automatically parses information from your flight reservations.”

According to the American Dream, the terminator assignment is being assembled. The disturbing use of a database maintained since the 1980s by the federal government, Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law, is the ultimate application of the individual dossiers that are generated from signals collection.

“Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database’s name derives from the fact that it contains “copies of the ‘main core’ or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community.”

Looking through the historic prism and behavioral pattern of the shadow government agencies, the lack of dramatic public outrage seems to be the only consistent factor out of the denial denizens that love to salute the flag, while willingly forfeiting their bill of right protections. This regretful conduct is seen in the example from, “Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core. At the time, the shocking information that he revealed did not get that much attention. That is quite a shame, because it should have sent shockwaves across the nation…”

Now we are all supposed to empathize with the hysteria of the political careerist class over the disclosures of Edward Snowden. The bipartisan spots of the carnivore leopards never change. When John Boehner Calls Snowden a Traitor, he speaks for much of the establishment and equates loyalty to the state as the very definition of nationalism.

Again, the chronicle of the military-industrial-intelligence-complex is replete with treasonous deeds against the constitutional republic. Remember the Carnivore system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications? Maybe your memory goes back to the archetype whistleblower. None other than the iconic Daniel Ellsberg speaks out on the current scandal in the Guardian letter, Edward Snowden: saving us from the United Stasi of America.

“In 1975, Senator Frank Church spoke of the National Security Agency in these terms:

“I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.”

The dangerous prospect of which he warned was that America’s intelligence gathering capability – which is today beyond any comparison with what existed in his pre-digital era – “at any time could be turned around on the American people and no American would have any privacy left.”

That has now happened. That is what Snowden has exposed, with official, secret documents. The NSA, FBI and CIA have, with the new digital technology, surveillance powers over our own citizens that the Stasi – the secret police in the former “democratic republic” of East Germany – could scarcely have dreamed of. Snowden reveals that the so-called intelligence community has become the United Stasi of America.”

Yes, Virginia our great founding fathers came from not only this old dominion, but had a state of mind that fought the revolutionary war against tyranny. The United Stasi of America is the definitive meaning of the evil empire that protects the globalist criminals that control the political apparatus, known as the federal government.

The echelon network of subversion and espying is but a rung on a ladder of a coercive control. The prism of deception is the false reality your controllers use to relinquish your will to oppose the repression. The secret intelligence agencies only serve their own bureaucratic interests as they obey their master operative superiors.

The disinformation culture is the permanent realism and the snitch society is an essential requirement necessary to keep the imperium in power. With the Americanization of domestic terrorists, Tea Party activists and the Patriotic Truth movement are in the sights of totalitarian gangsters.

Is there any doubt that the NSA, FBI and CIA act as if they are above the law and unaccountable? The great divide between legitimate authority and clandestine oppression is narrow and fragile. The essential question is who is the true enemy? As the surveillance technology perfects their reach and assimilates the application of their data assets, the military option under martial law intensifies. No one is safe. Big Brother has become the impending Terminator.

The Stasi Skynet engulfs everyone. There is no way out of the matrix as long as the globalists operate their spy network. The system is designed to eliminate any and all dissent. Overload the data collectors by intensifying the practice of liberty at every opportunity.

“It is beyond Orwellian, and it provides further evidence of the extent to which basic democratic rights are being surrendered in secret to the demands of unaccountable intelligence agencies.” – Jameel Jaffer


SARTRE is the pen name of James Hall, a reformed, former political operative. This pundit’s formal instruction in History, Philosophy and Political Science served as training for activism, on the staff of several politicians and in many campaigns. A believer in authentic Public Service, independent business interests were pursued in the private sector. As a small business owner and entrepreneur, several successful ventures expanded opportunities for customers and employees. Speculation in markets, and international business investments, allowed for extensive travel and a world view for commerce. He is retired and lives with his wife in a rural community. “Populism” best describes the approach to SARTRE’s perspective on Politics. Realities, suggest that American Values can be restored with an appreciation of “Pragmatic Anarchism.” Reforms will require an Existential approach. “Ideas Move the World,” and SARTRE’S intent is to stir the conscience of those who desire to bring back a common sense, moral and traditional value culture for America. Not seeking fame nor fortune, SARTRE’s only goal is to ask the questions that few will dare … Having refused the invites of an academic career because of the hypocrisy of elite’s, the search for TRUTH is the challenge that is made to all readers. It starts within yourself and is achieved only with your sincere desire to face Reality. So who is SARTRE? He is really an ordinary man just like you, who invites you to join in on this journey. Visit his website at http://batr.org.

Defeating Drones: How To Build A Thermal Evasion Suit (VIDEO)

snakebite3

This article was written by Brandon Smith and the included video was a joint project between Oath Keepers and Alt-Market

Asymmetric tactics rely on the idea of fighting smarter, rather than fighting directly, against a larger or more technologically advanced aggressor. It means turning your opponent’s strengths into weaknesses.

For instance, if your opponent relies on the superiority of his tanks and armor, make him fight in the mountains where his armor is useless. If he relies on air superiority, make him sift through a thick canopy where his eye in the sky sees nothing, or make it dangerous for him to land and refuel such vehicles at all. If he relies on body armor for safety, make him fight uphill so that the extra weight wears him down. If his surveillance and security techniques are a little too sensitive and effective, create constant false positives, until he can no longer trust his own alert systems. And, if most of his weaponry and soldiers are heavily reliant on a particular piece of technology, make that technology useless in the field. Force your opponent to fight on fairer ground, where the man with the most skill and intelligence prevails rather than the man with the most million dollar toys.

There is no such thing as fool proof combat technology. There is a way to trick or defeat or survive ANY weapon and any enemy. Period.

Drones and thermal vision have been held up to the common citizenry for years as the end-all-be-all of combat and surveillance technology. I can’t tell you how many times I’ve heard the claim that no one can hide from thermal imaging and that predator drones herald the end of free resistance to tyranny. I find this assertion to be rather absurd, considering militaries across the globe have already developed their own thermal evasion suits (which means it IS possible to hide from thermal vision) and drones seem to kill more innocent bystanders than actual enemy combatants. I will admit that thermal vision use is skyrocketing amongst military and police across the board, and this is because it is indeed effective to a point.

Thermal imaging and drones in the hands of a corrupt establishment make a couple of things very difficult for any resistance – First, you might be able to hide, but you won’t be able to move freely without risk, especially in groups. Second, you might be able to act defensively, but never offensively. Advancing on an objective protected by thermal surveillance would be extremely difficult. Constantly being on the defensive takes the initiative away from those who want to fight back against tyranny. Without the ability to go on the offensive, you will inevitably lose. Hiding in a hole in the mountains for the rest of your life is not an option if you want your children and their children to experience liberty.

Today’s combat reality is that of the digitized battlefield. All modern military units now rely on full spectrum surveillance, computer models, and real time data. Thermal vision is a cornerstone of this model because it is currently the best way to identify potential threats before they can act, rather than after they act. Unfortunately, there is no doubt this kind of surveillance power will be misused, and the spread of drones for domestic applications proves that the establishment’s intention is to utilize thermal against the population, rather than in defense of the population. Therefore, thermal vision must be negated if people are to remain free. We might not be able to fight against misused drones directly, but we can make their primary advantage useless. Here is how it is possible to remove thermal vision as a threat, and thus nullify the primary strength of the drones (and other weapons) in our skies:

Thermal Vision And Drone Misconceptions

Now that you know it is more than possible for civilians to obtain thermal evasion, lets go over some of the most common misconceptions about thermal imaging and drone technology.

Building a suit that hides a person from thermal imaging is impossible?

Clearly, this is false, as we have shown in the video above. Add to this the fact that military units field their own thermal evasion suits (multi-spectral camouflage) for special purposes, and I think we’ve permanently buried the ludicrous assumption that a thermal evasion suit is a fruitless endeavor. Most existing suits, including those used by governments, boast a thermal reduction rating of 60% to 80%. It is important to recognize that there is currently no organization or company offering thermal evasion suits for widespread use by civilians. We have given the public free access to information on building their own suits if they wish, and we are offering professionally made suits for sale with a thermal reduction rating of 90% or more at Snakebite Tactical.

We made no attempt to hide “heat spots” within the tests in the above video. We want to make it clear that this is a 90% effective suit, which is more than enough for almost any application. Achieving 100% reduction at distances of 10 ft to 10 yards in a wearable suit is very difficult, and a person would still need to practice proper field craft in order to remain unseen. However, we believe our suit design more than meets the standards of currently issued military grade suits; suits which are not available to the public anyway.

Thermal imaging sees through walls?

This is movie-land nonsense. A thermal imager can see the heat you emit through a very thin wall if you are leaning against it, but remove your body from contact with the surface and the heat signature will disappear. Thermal imagers have a difficult time identifying stationary people through leaves and the branches of trees, let alone walls. As long as you are not in contact with the item, your heat will not be seen through the item.

Thermal vision sees through forests?

No. Not a chance. In fact, if your only goal is to hide, then a thick forest is the absolute best place to be if thermal surveillance is in use, even without a suit. If your plan is to advance on an objective, then the situation changes, but if you are a lone individual that just doesn’t want to be found, staying in the woods and dense terrain away from people who might rat you out is your best bet. Apply a thermal suit to the scenario and now your are fully mobile without fear of detection.

You will never see a drone coming, so having a suit is meaningless anyway?

Gotta love this kind of fuzzy logic. The claim apparently assumes that drones simply fly miles above the Earth silently raining hellfire missiles down on random heat signatures on the ground without identification. This is not how drones operate.

Drones are mainly used as OVERWATCH for teams of men already on the ground. A drone might see your signature when you are not wearing a suit, but a drone pilot will not waste ordinance on you until you are identified as a viable target. Most of the successful strikes you see in the news and on YouTube are targets that were already lazed by a team on the ground (this is something the DoD rarely mentions, because they want to retain the mystic surrounding drones). The drone is then sent in to attack the target that the team identified. When a military unit comes into contact with an enemy, a drone may be sent in to observe and identify targets. This is a situation where thermal evasion is essential. If those targets throw on thermal evasion gear, the drone becomes a useless platform. If you are under threat by drones and ground opponents, you can leave the area at will without being traced, or you can advance and attack your aggressor without being betrayed by your own heat signature. Your suit does not need to be worn at all times in order to be useful.

I don’t need a thermal evasion suit, I can just buy a thermal blanket or tarp at a fraction of the cost?

The first and most obvious advantage to a thermal evasion suit is that it CAN BE WORN. There is no existing tarp or thermal blanket system that can be worn against the human body and still hide that body from thermal imaging. All of these items conduct heat which can be seen almost as soon as you touch them. If a heat reflecting tarp was a practical working solution to thermal imaging, then you would see hundreds if not thousands of videos on the web proving their effectiveness and governments would not be keeping their own suits such a secret. The reality is, these items are only useful if you plan to stretch them out above you without physical contact, and stay in one place without moving. They are highly defensive in nature and severely limited in their application.

We have developed the very first thermal evasion system available to the public that can be worn for long periods of time and that also provides effective visual camouflage. Our suit works as a ghillie as well as a thermal evasion tool, meaning, it works in thermal, and in visible light. A thermal cloak offers near total 360 degree coverage against thermal imaging devices in the air and on the ground while the person is also mobile. Meaning, instead of constantly hiding from the enemy and being on the defensive (a losing strategy), you can advance on the enemy if you wish without detection. There is no comparison whatsoever in the level of application between a thermal blanket and a thermal suit.

This does not mean a suit solves all your problems. If you walk through an open field and start break-dancing, someone will see you. A thermal suit does not necessarily hide blatant movement by the wearer. You still need to follow proper field craft methods including the use of cover and concealment. Add to this the thermal reduction properties of the suit, and you are much less likely to be detected, even under heightened scrutiny.

I don’t need a thermal suit, I can just hide in the city amongst the crowds and blend in?

I’m sure there are situations when operating in a city might be called for, but frankly, the idea is extraordinarily ill conceived when one considers the surveillance grids being put in place in most major metropolitan areas. Thermal is not your worst enemy in the city. Try CCTV networks with facial and biometric recognition. Try numerous possible collaborators and quislings in a city environment (known for more passive and subservient populations permanently attached to the establishment umbilical cord) who might point the finger at you. The city is a BAD place to be under almost any circumstance that results in crisis and lost liberty, and probably the worst place to be if you are trying to avoid observation and surveillance.

That said, watch almost any police chopper thermal footage in a city and tell me the person being chased was better off without a thermal suit. Imagine you are being chased for simply being a proponent of liberty. Imagine that one day you wake up in the middle of your home city a designated criminal. Would you rather have a thermal evasion suit, or, do you plan to outrun the chopper?

Mud will hide your heat signature?

No, it will not. At least not for more than a minute, and it better be some thick friggin’ mud. Despite what Arnold Schwarzenegger may have taught you, heat transfers through mud just as it does through most other materials.

Drones will find you with LIDAR if they can’t see you with thermal vision?

LIDAR is a form of laser based radar which is bounced off surfaces to create a 3D map of a large area. I’m not sure exactly where the idea came from that drones use LIDAR for personnel detection, but this is simply not so, at least not currently. LIDAR is being tested by the DoD and private contractors for personnel detection using GROUND based 360 degree units, and the effective range of these experimental units is rather limited. Aerial LIDAR is used for mapping of terrain. The complexity of ground based objects (think in terms of millions of objects in any given field of view) makes personnel tracking from the air all but impossible. Ground based LIDAR also requires a recognizable human shape at close range in order to “alert” on an intruder, which means the ThermTac suit (which removes normal human shape) would only HELP in preventing detection. From my research as of 2015, LIDAR for surveillance often suffers from numerous false positives, which means it is a very weak system for tracking personnel. Thermal vision is a far greater threat than LIDAR.

Even if you have a suit that blocks your body heat, you can still be tracked by your footprints?

Under perfect conditions and the use of a sensitive thermal imager on the ground, your footprints MIGHT be visible using a ground based unit right after you imprint them, but it is still unlikely you will be found. Quick thermal imprints (caused by footsteps) disappear within seconds, and are difficult if not impossible to pick out from any distance beyond a few yards. Rubber and plastic soled shoes do not in most cases transfer very much heat into the ground, and the theory that crushed grass releases more heat in thermal imaging is utter nonsense. Too many ideas about thermal imaging are drawn from television and movies, which greatly embellish the capabilities of such devices. If footprints were an effective way to track people using thermal, then Search and Rescue units (many have access to excellent thermal devices) would have numerous examples of this along with numerous success stories (these examples do not exist).

One legitimate danger involving footprints occurs when a very large number of people (small groups are not an issue) travel together in single file. This constant imprinting on the same path by multiple footfalls can indeed leave a residual trail that can be found several minutes later, enough time to be tracked by a thermal imager.

Thermal evasion suits will help terrorists?

As stated in the video, the world’s worst terrorist groups are often trained by our own governments and covert intelligence agencies. If covert agencies have access to thermal evasion techniques, then it only follows that so do the people they train. I have no doubt that we will be accused of aiding terrorists by releasing this information, because that is really the only recourse the establishment has to try to stop the use and spread of thermal cloaks (or they will claim that the suit is a scam and doesn’t actually work. Of course, people will be able to test this for themselves). They will have to try to shame people into refusing to adopt thermal evasion as a means of defense. Trust me, I’ve seen this kind of propaganda used against people merely for talking about methods that MIGHT work. Read any military forum where someone discusses thermal evasion, and invariably a dozen henpecking statists will ask them if they are “with ISIS or Al-Qaeda” to shut them up.

Self-defense is an inborn right, not a privilege granted by arbitrary authority. You do not need permission to obtain means of defense against a threat, even if that threat has thermal imaging at his disposal and a license from the state to kill you. Our thermal suit design is a culmination of three years of tireless effort.  We believe the information belongs in the hands of the citizenry, not only in the hands of governments and those they train. The greater threat to the common good is a lack of knowledge that makes free people weak and vulnerable. The goal of this project is to remove a clear weakness in the American people. If you are not informed, and not prepared, then you will never be secure. Some people would have you believe that thermal imaging and drones are for your safety. We say YOU are the only person that can be trusted to provide for your own safety. If anything, thermal eyes and lurking drones present a more intense danger to you and your freedom than any terrorists they are supposedly intended to fight against.

For more information on thermal evasion, check out some of our essays at Snakebite Tactical.

If you would like to support the publishing of articles like the one you have just read, or support further projects like our ThermTac thermal suit project, visit our donations page here.  We greatly appreciate your patronage.

Brandon Smith is the founder of the Alternative Market Project, an organization designed to help you find like-minded activists and preppers in your local area so that you can network and construct communities for barter and mutual aid. Join www.Alt-Market.com today and learn what it means to step away from the unstable mainstream system and build something better. You can contact Brandon Smith at: [email protected].

Second Anniversary Of Edward Snowden’s NSA Spying Revelations

Snowden-WhereAreWeNow__Twitter-Europe

A June 6, 2013 London Guardian article first revealed lawless NSA spying. It was just the beginning of much more to come.

Information supplied by Edward Snowden showed the NSA spies secretly and unconstitutionally on its citizens and residents – besides overstepping its authority abroad.

He connected important dots for millions. He explained spying in America is pervasive. Constitutional rights no longer matter.

Anything goes remains official policy. The NSA, FBI, CIA, DEA and Homeland Security systematically operate by their own rules.

Snowden said “I really want the focus to be on (the documents he revealed) which I hope will trigger among citizens around the globe what kind of world we want to live in.”

Enactment of the USA Freedom Act (the renamed Patriot Act) did little to change things. US spy agencies continue trampling on Bill of Rights protections.

They compromise due process, habeas rights, free expression, assembly and association, and protection from unreasonable searches and seizures.

Big Brother spying continues unabated. Meaningful change remains elusive. Mass surveillance goes on in ways few Americans realize.

Section 702 of the FISA Amendments Act is one of many unconstitutional tools. It’s unaddressed by Congress and the White House. Major media ignore it.

The NSA uses it to justify mass collection of phone calls and emails directly from communications providers.

Ostensibly used for foreign spying, it collects meta-data communications of Americans unrelated to national security.

It’s done without court authorized warrants. It collects large portions of Internet traffic directly from its providers – unconstitutionally and in violation of international human rights laws.

Microsoft, Yahoo, Google, Facebook, Skype, YouTube, Apple, and major telecommunications companies are complicit in spying on their customers.

The USA Freedom Act changed little. Judicial oversight is entirely absent. Congressional members are told little about what goes on.

Intelligence community officials largely stonewall them. Spying monitors friends and foes alike. It’s about control.

It’s for political and economic advantage. It’s to be one up on foreign competitors.

It’s for information used advantageously in trade, geopolitical, and military relations.

Domestic spying is longstanding. It’s got nothing to do with protecting national security. Not a single new millennium act of terrorism occurred on US soil – nor were any foiled.

Claims otherwise were false. 9/11 remains the mother of all Big Lies. It had nothing to do with Osama bin Laden or crazed Arabs. It had everything to do with scaremongering the public to support America’s imperial agenda.

The so-called “war on terror” is war OF terror on the American people and others wrongfully targeted worldwide. Washington needs enemies to justify its rogue policies. Fear-mongering creates them.

So-called bad guys are largely Muslims, Russians, Chinese, North Koreans, others not in lockstep with US policies, and ordinary people wanting respect for their fundamental rights.

Authority granted under the 1981 Executive Order 12333 remains deeply troubling. It’s used to justify recording 100% of foreign countries’ telephone calls.

Its loophole-ridden provisions let the NSA:

• “Collect, including through clandestine means), process, analyze, produce, and disseminate signals intelligence information and data for foreign intelligence and counterintelligence purposes to support national and departmental missions;

• Act as the National Manager for National Security Systems as established in law and policy, and in this capacity be responsible to the Secretary of Defense and to the Director, National Intelligence; (and)

• Prescribe security regulations covering operating practices, including the transmission, handling, and distribution of signals intelligence and communications security material within and among the elements under control of the Director of the National Security Agency, and exercise the necessary supervisory control to ensure compliance with the regulations.”

On July 31, 2008, EO 12333 was amended to:

• “Align (it) with the Intelligence Reform and Terrorism Prevention Act of 2004;

• Implement additional recommendations of the 9/11 and WMD Commissions; (and)

• Further integrate the Intelligence Community and clarify and strengthen the role of DNI as the head of the Community; Maintain or strengthen privacy and civil liberties protections.”

By law,  NSA’s mission is limited to monitoring, collecting and analyzing foreign communications. It way oversteps by mass spying at home and abroad on the phony pretext of protecting national security.

Snowden revealed vital information everyone needs to know. “I don’t want to live in a world where there’s no privacy and therefore no room for intellectual exploration and creativity,” he said.

Nor should anyone tolerate Big Brother intrusiveness.


Stephen Lendman lives in Chicago and can be reached at [email protected]. His new book is titled “How Wall Street Fleeces America: Privatized Banking, Government Collusion and Class War”. www.claritypress.com/Lendman.html Visit his blog site at www.sjlendman.blogspot.com.

Unconstitutional Mass FBI Aerial Surveillance

 fbi surveillance plane

Free and open societies don’t spy on their citizens. They don’t invent phony threats as justification.

America is a belligerent nation waging endless wars of aggression against invented enemies. Fear-mongering is rife. It’s done to rape, ravage and destroy one country after another.

It’s a tactic used to scare people to believe they’re safer by sacrificing fundamental freedoms. Mass surveillance is a defining rogue state characteristic.

Post-9/11, government-usurped authority turned America into a police state. Big Brother watches everyone. Tuesday Senate passage of the USA Freedom Act (the renamed Patriot Act) changed little.

Government intrusion into the private lives of its citizens remains largely unchanged. The only good news is that USAF slightly rolled back its intrusiveness instead of giving spy agencies more powers.

History shows restrictions imposed are easily circumvented or ignored. A separate article discusses systematic FBI misuse of Patriot Act authority.

Bureau secrecy and cover-up make it impossible to know the full extent of its lawlessness. It operates ad libitum with minimum oversight and accountability.

One example is its mass surveillance of US citizens by drones and other aircraft. On June 2, AP reported “(s)cores of low-flying planes circling American cities…”

“They’re “part of a civilian air force operated by the FBI and obscured behind fictitious companies…”

It’s not secret. It’s been reported before. In July 2013, the agency admitted using drones for domestic surveillance numerous times without court authorized warrants or other forms of oversight.

At the time, deputy director Stephen D. Kelly said “(t)he FBI uses UAVs in very limited circumstances to conduct surveillance when there is a specific operational need.”

“Since late 2006, the FBI has conducted surveillance using UAVs in eight criminal cases and two national security cases.”

Former FBI director Robert Meuller admitted spying on US citizens with no “operational guidelines.”

Warrantless spying by any means threatens everyone. No probable cause is needed. No restraints are imposed. Constitutional protections are circumvented.

Once a program is established, it takes on a life of its own. In the last decade, FBI aerial spying expanded to “civilian air force” level.

In April alone, AP identified at least 50 FBI aircraft conducting more than 100 flights over urban and rural areas in 11 states.

It cited a 2009 budget document indicating 115 planes, including 90 Cessna aircraft.

FBI aerial spying is longstanding. Today, drones and other aircraft are equipped with high-tech cameras for close-up visual surveillance as well as technology able to monitor thousands of cell phones – a blatant breach of privacy.

According to Senate Judiciary Committee chairman Charles Grassley (R. IA):

“It’s important that federal law enforcement personnel have the tools they need to find and catch criminals.”

“But whenever an operation may also monitor the activities of Americans who are not the intended target, we must make darn sure that safeguards are in place to protect the civil liberties of innocent Americans.”

No safeguards whatever exist – nor does Congress back up high-minded rhetoric with effective policies protecting the public from abusive government practices.

Rogue agencies like the FBI, NSA, CIA, DEA and Homeland Security operate by their own rules – easily circumventing weak and ineffective restraints on their authority.

Congressional inaction effectively rubber-stamps them. It permits unaccountable police state practices no free society would tolerate.

AP learned the FBI uses at least 13 fake companies to conceal its activities – including FVX Research, KQM Aviation, NBR Aviation and PXW Services.

ACLU policy analyst Jay Stanley called its flights significant if they’re “maintaining a fleet of aircraft whose purpose is to circle over American cities, especially with” today’s sophisticated surveillance technology.

Details the FBI confirmed concur with published reports since at least 2003 about suspicious-looking planes overflying US cities being government ones.

The Drug Enforcement Agency (DEA) and US Marshals Service have their own aerial surveillance programs using sophisticated technology, much like the FBI’s.

Basic information about these programs are secret. Heavily redacted Justice Department Inspector General documents alone inadequately explain what the public has a right to know.

They’re spied on – by the FBI, NSA, CIA, DEA, Homeland Security and other rogue government agencies, especially post-9/11.

Spies “R” us defines US policy. America is a total surveillance society unfit to live in. Big Brother watches everyone intrusively – in blatant breach of fundamental constitutional protections.

Fabricated national security threats justify the unjustifiable. The so-called “war on terror” is phony. The war OF terror by Washington on its citizens is real.

Unconstitutional spying today in America is pervasive. It’s institutionalized. Privacy rights no longer matter. Fundamental freedoms are being trampled. They’re disappearing in plain sight.


Stephen Lendman lives in Chicago and can be reached at [email protected]. His new book is titled “How Wall Street Fleeces America: Privatized Banking, Government Collusion and Class War”. www.claritypress.com/Lendman.html Visit his blog site at www.sjlendman.blogspot.com.

 

Are UK Police Now Behaving Like Intelligence Agencies? (VIDEO)

City_of_London_Police_Van

The overreaching surveillance state in the U.S. certainly takes most of the headlines, but the UK is every bit on par if not worse.  A recent report, responded to below by Steve Jolly of NOCCTV, indicates that there have been 700,000 police requests to access private communications in the UK over a two-year period – which amounts to a request every 2 minutes.  And these requests are almost never denied; in fact, they have a 96% approval rate. This surely can’t purely be to “thwart terrorism.”


RT

Visit http://www.no-cctv.org.uk/

NSA Spying: Is A Bad Deal Better Than No Deal?

The National Security Agency (NSA) headquarters in Fort Meade, Maryland. Among other forms of intelligence-gathering, the NSA secretly collects the phone records of millions of Americans, using data provided by telecom firms AT&T, Verizon and BellSouth. Photograph: NSA/Getty Images

The National Security Agency (NSA) headquarters in Fort Meade, Maryland. Among other forms of intelligence-gathering, the NSA secretly collects the phone records of millions of Americans, using data provided by telecom firms AT&T, Verizon and BellSouth. Photograph: NSA/Getty Images

The symbolic step taken to go from Patriot Act provisions to Freedom Act regulations is insignificant in the effort to protect privacy.

If anyone believed that letting three Patriot Act provisions expire meant real change in the way the NSA spies on millions of innocent people, we have now learned that it didn’t change anything. In fact, the changes were so meaningless that US President, Barack Obama, has signed the so-called US Freedom Act into law almost immediately.

According to the AP, Obama has now stamped his signature on the bill after the US Senate voted in favor of replacing parts of the Patriot Act with the new legislation that had been already approved by the US House of Representatives.

The only significant changes worth mentioning is that it will be the telecommunications companies the ones in charge of holding the information they capture from users as supposed to the NSA itself. In theory, the NSA will now need to get a warrant before it can request the telephone records from users as supposed to simply vaccumming all data from telecommunication company servers.

Privacy concerns still remain as for many people it is hard to believe that the NSA will simply disconnect itself from databases to which it has been connected since at least the 1990s.

Since its inception, the NSA has been responsible for the unconstitutional mass collection of personal data in a supposed effort to protec the US Homeland from potential terror attacks. Spying programs ran by the NSA have existed since before 9/11, the trigger event that served as the poster excuse to push for unprecedented abuses to long-held constitutional rights.

After lying about the true extend of its spying operations, the NSA has been accused by Edward Snowden and other whistleblowers of using advanced techology to spy snoop on millions of people in the United States and abroad. Snowden, who was a subcontractor of the NSA quietly collected data and documentation which he later leaked to various media outlets.

Snowden’s revelations showed how the NSA and its partners in crime in Europe  collected inumerable records from people who had no link whatsoever with terrorist organizations. Intelligence agencies used programs such as PRISM and XKeyscore to illegally sweep and collect information from internet and telephone users, including metadata as well as  the content of the messages and conversations.

Unde provisions contained in the Patriot Act, the US government, through the NSA and other spy agencies was allowed to violate the US Constitution and the Bill of Rights under the excuse that only massive spy programs such as the ones revealed by Snowden would be able to keep America and the world safe from Islamic extremists who sought to harm the western world. Incidentally, more terror attacks have occurred since 9/11 than at any other time before that faithful day despite the existence of the massive spying programs.

Section 215 of the Patriot Act, which expired last Sunday at midnight allowed the US government to access personal information of every citizen under the sponsorship of the Foreign Intelligence Surveillance Act (FISA). Since its inception, the FISA Court has given the intelligence community the the power to demand a judicial investigation and authorized the monitoring, physically and electronically, and the gathering of information on people who “may be linked to terrorism or espionage against the United States”.

No one other than the members of the intelligence community and the Court itself are allowed to access and scrutinized any documents related to FISA requests, which makes it impossible to have independent verification that such a link to terrorism truly exists.

Under the new rules contained in the US Freedom Act, the NSA is still able to use all information collected previous to the expiration of the three Patriot Act provisions that allowed the umlimited collection of data. According to AP, “the legislation will revive most of the programs the Senate had allowed to lapse”. Meanwhile, John Boehner said that he applauded the Senate “for renewing our nation’s foreign intelligence capabilities, and I’m pleased this measure will now head to the president’s desk for his signature.”

Indeed, the approval of the US Freedom Act is nothing else than a bad deal which still allows the NSA to spy without limits.


Luis R. Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news. Read more about Luis.

FBI Flying Covert Planes Using Fake Companies Over At Least 11 States Monitoring Citizens! (VIDEO)

Using-Fake-Corporations-the-FBI-has-Built-its-Own-Air-Force-Inside-the-US-and-You-are-the-Target

Have you been targeted?

Sometimes I just want to scream from the top of my lungs about the atrocities that surround us on a daily basis… well today is one of those days! This morning as I rolled out of bed I awake to the blare of the Christian radio station buzzing in the background, “don’t be alarmed at the FBI aircrafts in your skies, they are only there to collect video and cell phone data.” The voice then happily stammered while playing the next tune.

Since when did it become acceptable to promote our government breaking the law on open airwaves in such a satisfactory manner as if what they were doing was legal? No court approved the FBI’s usage of these aircrafts, yet they did as they pleased and monitored anyone and everyone they deemed necessary.

In fact according to The Associated Press 11 states were identified in the surveillance flights conducted by the FBI:

— Arizona: Glendale, Maricopa, Mesa, Phoenix, Scottsdale, Tempe.

— California: Anaheim, Rancho Cordova, Richmond, Sacramento, San     Diego, Spring Valley.

— Florida: Cape Coral.

— Illinois: Chicago.

— Maryland: Baltimore, Columbia.

— Massachusetts: Boston, Brockton.

— Minnesota: Minneapolis.

— Rhode Island: Providence.

— Texas: Arlington, Dallas, Houston, Plano.

— Virginia: Arlington, Fairfax, Garrisonville, Springfield.

— Washington: Seattle, Tacoma.

— Washington, D.C.

fbi Surveillance

But wait it gets WORSE!!! Here is the breaking report…

 Some flight patterns were also noted by independent journalist Sam Richards, here are some of those: 

 Screen%20Shot%202015-06-03%20at%2010_56_43%20AM

Screen shot

WOW! This Covert FBI Drill Makes Jade Helm Look Like a Walk In the Park! It’s Gone from Bad to Worse! 

For More Information See:

http://www.abc15.com/news/region-phoenix-metro/central-phoenix/fbi-behind-mysterious-surveillance-aircraft-over-us-cities

http://ktar.com/22/1838941/FBI-surveillance-crafts-buzz-Phoenix-dozens-of-other-US-cities

http://www.mintpressnews.com/department-of-justice-flying-secret-airplane-fleet-over-american-cities/205971/


Lisa Haven is an independent Christian news analysis and one of the top contributors on www.BeforeItsNews.com. She is also author of www.LisaHavenNews.net and runs her own youtube channel (Lisa Haven) with tens-of-thousands of views per day. Digging deep and finding truth is what she lives for. Her passion is to spread truth no matter where it lies. She covers everything from martial law, to FEMA camps, to end time bible prophecy, to government documents and much more! Before launching her journalism career, she wrote many bible studies and lead women ministries for a number of years. She will also complete her ministry degree at International School of Ministry this year.

America In Trouble! Read Before Banned -George Orwellian Nightmare Now Coming True (VIDEO)

big brother watching you

Many in our culture are aware of the term ‘Orwellian.’ It is often used as a metaphor to describe the ever-increasing global fascist surveillance state that is taking place in our world today. However, what many fail to understand is just where the term Orwellian originated. In 1949 author George Orwell (pseudonym of Eric Blair) composed a fiction book predicting the nightmarish future of the year 1984. The book portrays an elite ruling class who bans all individualism and thought and uses a “tele screen” to control and monitor the masses who are highly oppressed and brainwashed to do their bidding.

Today we are living George Orwell’s nightmare! As I write this the NSA is compiling data against reporters like me. In fact, this post will put me on a one-way ticket to the ‘red list’—a list of dissidents who oppose their tyrannical rule and will one day be “vanquished.” Not only that but our television (telescreens), appliances, computers and even street lights have become data collection devices monitoring everything we say and do. Nothing is private anymore! The elite ruling class, known as the Illuminati, has their tentacles in every aspect of our lives, and George Orwell knew it was coming!!

Unfortunately things are about to get rocky as his horrifying nightmare unfolds…

“He who controls the past controls the future. He who controls the present controls the past.” —George Orwell, 1984


Lisa Haven is an independent Christian news analysis and one of the top contributors on www.BeforeItsNews.com. She is also author of www.LisaHavenNews.net and runs her own youtube channel (Lisa Haven) with tens-of-thousands of views per day. Digging deep and finding truth is what she lives for. Her passion is to spread truth no matter where it lies. She covers everything from martial law, to FEMA camps, to end time bible prophecy, to government documents and much more! Before launching her journalism career, she wrote many bible studies and lead women ministries for a number of years. She will also complete her ministry degree at International School of Ministry this year.

The Senate’s Patriot Act Betrayal

nsa surveillance

Watching the DC establishment respond to Senator Rand Paul’s efforts to sunset important aspects of the Patriot Act is like peeling back the skin of a decaying onion to expose the rot. Members of the Senate all take an oath to defend and protect the U.S. Constitution. Well those “public servants” who are doing their perfected “Potomac Two Step” would have the public believe that next week’s vote on some version of the House passed USA Freedom Act will halt the NSA from their systematic violation of 4th Amendment protections.

As expected the disinformation from the corporatist media, USA Today misleads as expected.

“The Senate voted 77-17 to advance a bill that would end the National Security Agency’s controversial bulk collection of the phone data of millions of Americans not suspected of any terrorist activity.”

As any sincere and knowledgeable spectator to the national tragedy and transition into a police state understands that bucking the establishment carries a very heavy price.

Sentiments expressed by Rand Paul that ‘I’m not going to take it anymore’, should be a cry and rally point for any American who has an ounce of courage and guts to confront and challenge the Federal monster, bent upon controlling each and every honest citizen.

“This is a debate over the Bill of Rights,” he said. “This is a debate over the Fourth Amendment. This is a debate over your right to be left alone.”

Retaliation against opposition to the totalitarian authoritarianism regime that is being constructed is par for the course. Conceding the outcome from this dust up, Rand Paul says Freedom Act will ‘Ultimately Pass’.

“It’s hard for me to have trust in the people who we are giving great power to,” Paul said, adding he plans to offer some amendments.

No matter the final resolution, the fight to make a national issue out of the universal violation of individual communications is both necessary and desirable.

When Senator Ted Cruz states: “The USA Freedom Act is the right policy approach. It protects the civil liberties of every American. It ends the federal government’s bulk collection of phone metadata from law abiding citizens and at the same time ensures that we maintain the tools that are needed to target violent terrorists and prevents acts of terrorists”, he demonstrates his significant departure from that of Senator Paul.

The lack of merits in a transition from The Patriot Act is now USA Freedom Act was recently discussed in an Inherent Autonomy essay. Supporting GOP office holders who are ignorant of the true nature of constitutional protections and civil liberties has been a hallmark of why Republicans will never right this ship of state.

RINO’s, NeoCons and country club Republicans are not reliable patriots. Phony and expedient Democrats, who purport to be defenders of liberty, mostly are opportunists. The governance political class will never allow a Rand Paul, individual liberty proponent to gain real power.

An example on how the toxic sausage is ground out, cited in the National Journal illustrates how dissent is not tolerated by the power brokers.

“Paul encountered procedural resistance as he rose to speak on the Senate floor earlier Sunday, as a disagreement broke out between him and Sen. John McCain, Sen. Dan Coats, and presiding Sen. Chuck Grassley over whether time for debate had ended. During a brief break to figure out the disagreement, a clearly frustrated Paul could be overheard telling a floor aide the time-keeping was incorrect: “That’s a lie … it was not 23 minutes … that is inaccurate.”

Paul, finally allowed to speak, began raising his voice to passionately make his case that the Patriot Act allows unconstitutional surveillance on law-abiding Americans.

“Get warrants on people we have suspicion on!” Paul yelled. “Quit wasting time on innocent American people.”

Essentially, federal elected representatives, only stand for defending government dominance; and treat constituents as irritants and obstacles.

Review the actual voting list from the U.S. Senate on Cloture on the Motion to Proceed (Upon Reconsideration Motion to Invoke Cloture on the Motion to Proceed to H.R. 2048 )

Grouped By Vote Position

YEAs —77

Alexander (R-TN)Ayotte (R-NH)

Baldwin (D-WI)

Bennet (D-CO)

Blumenthal (D-CT)

Booker (D-NJ)

Boozman (R-AR)

Boxer (D-CA)

Brown (D-OH)

Burr (R-NC)

Cantwell (D-WA)

Capito (R-WV)

Cardin (D-MD)

Carper (D-DE)

Casey (D-PA)

Cassidy (R-LA)

Cochran (R-MS)

Coons (D-DE)

Corker (R-TN)

Cornyn (R-TX)

Cruz (R-TX)

Daines (R-MT)

Donnelly (D-IN)

Durbin (D-IL)

Feinstein (D-CA)

Flake (R-AZ)

 

 

Franken (D-MN)Gardner (R-CO)

Gillibrand (D-NY)

Hatch (R-UT)

Heinrich (D-NM)

Heitkamp (D-ND)

Heller (R-NV)

Hirono (D-HI)

Hoeven (R-ND)

Inhofe (R-OK)

Isakson (R-GA)

Johnson (R-WI)

Kaine (D-VA)

King (I-ME)

Kirk (R-IL)

Klobuchar (D-MN)

Lankford (R-OK)

Leahy (D-VT)

Lee (R-UT)

Manchin (D-WV)

Markey (D-MA)

McCain (R-AZ)

McCaskill (D-MO)

McConnell (R-KY)

Merkley (D-OR)

Mikulski (D-MD)

Murkowski (R-AK)Murphy (D-CT)

Nelson (D-FL)

Perdue (R-GA)

Peters (D-MI)

Portman (R-OH)

Reed (D-RI)

Reid (D-NV)

Rounds (R-SD)

Sanders (I-VT)

Schumer (D-NY)

Scott (R-SC)

Shaheen (D-NH)

Stabenow (D-MI)

Sullivan (R-AK)

Tester (D-MT)

Tillis (R-NC)

Toomey (R-PA)

Udall (D-NM)

Vitter (R-LA)

Warner (D-VA)

Warren (D-MA)

Whitehouse (D-RI)

Wicker (R-MS)

Wyden (D-OR)

 

NAYs —17

Barrasso (R-WY)Blunt (R-MO)

Coats (R-IN)

Collins (R-ME)

Cotton (R-AR)

Crapo (R-ID)

Ernst (R-IA)Fischer (R-NE)

Grassley (R-IA)

Moran (R-KS)

Paul (R-KY)

Risch (R-ID)

Roberts (R-KS)Rubio (R-FL)

Sessions (R-AL)

Shelby (R-AL)

Thune (R-SD)

Not Voting – 6

Enzi (R-WY)Graham (R-SC) Menendez (D-NJ)Murray (D-WA) Sasse (R-NE)Schatz (D-HI)

Where are the supposed Democrat civil libertarians? Evidence of earnest concern for the Bill of Rights is lacking on both sides of the aisle, but is glaringly apparent that Senator Paul’s arguments are not heard by the loyal opposition. This kind of a voting record indicates that bipartisan solutions to defend the Constitution are merely an academic exercise and have very few actual supporters in the august debating society.

Yet, this reality does not prevent the media from spinning that The Patriot Act Just Made Rand Paul GOP Enemy No. 1.

“I don’t stand with Rand,” Republican Sen. Mark Kirk told The Daily Beast, flipping Paul’s campaign slogan. “I disagree with him. I think we should not allow the program to be interrupted.”

 Compare this attitude with the sentiment that Paul registers that crystallizes the issue,

“We should not be debating modifying an illegal program,” Paul wrote in an Op-Ed for TIME on Saturday. “We should simply end this illegal program.”

Those Republican hawks that place their allegiance in a dying international empire over a living and hallowed Bill of Right principles are the true betrayers of the Republic.

The political class refuses to face the harm and folly that the bogus War of Terror has fashioned since the premeditated, deliberated and orchestrated false flag culture of a fictitious homeland security society has instituted.

This is the real and comprehensive national debate that needs to be conducted.

The Fourth Amendment, NSA and Metadata essay cites examples where the surveillance agency has altered their proper foreign sleuthing mission with a substitute domestic emphasis that is not only against common law but also diminishes their effectiveness in enhancing legitimate national security.

With all the whining and fear mongering in curtailing the NSA collection system, it becomes obvious that the military-industrial-security-complex has reason to frighten the public with claims of imminent terrorist attacks on domestic soil.

Living in an open border culture hardly induces or advances actual security.

A country that places faith in the likes of a dubious CIA Director over the 4th Amendment is a country doomed to succumb to tyranny of our own bureaucratic scoundrels. The WSJ reports:

“CIA Director John Brennan, in an interview aired Sunday morning on CBS, said the expiration of government-surveillance programs could make the country less safe from a terrorist attack, and he blamed “political grandstanding” in the Senate for the current legislative standoff.

Mr. Brennan said the programs “really have helped stop attacks,” although he didn’t cite specific incidents. “The tools that the government has used over the last dozen years to keep this country safe are integral to making sure that we’re able to stop terrorists in their tracks.”

If the record was so laudable, the chaos in the Middle East might have been avoided and those infamous weapons of mass destruction might have been found in the possession of legions of American occupying troops conducting a military campaign for the New World Order.

This is reason enough to monitor, record and store Meta data, so American citizens that advocate the freedoms and liberty can be intimated and dissuaded from opposing the political order.

Rand Paul may not be perfect, but he has demonstrated that one person can make a difference. Raising awareness and forcing the Senate to take an unpleasant vote might be the extent of what is possible in a legislative body that has little accountability.

When some devious arrangement with the House on some version of the USA Freedom Act is reached, the end result is that the NSA will still have access to electronic communications. Only a full repeal of the Patriot Act can restore the provisions of the 4th Amendment.


SARTRE is the pen name of James Hall, a reformed, former political operative. This pundit’s formal instruction in History, Philosophy and Political Science served as training for activism, on the staff of several politicians and in many campaigns. A believer in authentic Public Service, independent business interests were pursued in the private sector. As a small business owner and entrepreneur, several successful ventures expanded opportunities for customers and employees. Speculation in markets, and international business investments, allowed for extensive travel and a world view for commerce. He is retired and lives with his wife in a rural community. “Populism” best describes the approach to SARTRE’s perspective on Politics. Realities, suggest that American Values can be restored with an appreciation of “Pragmatic Anarchism.” Reforms will require an Existential approach. “Ideas Move the World,” and SARTRE’S intent is to stir the conscience of those who desire to bring back a common sense, moral and traditional value culture for America. Not seeking fame nor fortune, SARTRE’s only goal is to ask the questions that few will dare … Having refused the invites of an academic career because of the hypocrisy of elite’s, the search for TRUTH is the challenge that is made to all readers. It starts within yourself and is achieved only with your sincere desire to face Reality. So who is SARTRE? He is really an ordinary man just like you, who invites you to join in on this journey. Visit his website at http://batr.org.

Yea For Surveillance

big brother surveillance
By: The Real Agenda |

The US Senate voted against a bill whose purpose was to end the collection of telephone data of millions of citizens.

This practice has been carried out by the National Security Agency (NSA) over decades, but has only been notices fairly recently, after whistleblowers like Edward Snowden and others came forward with documents and testimony about the illegal and unconstitutional practices that until then had been done in secret.

With 57 votes against 42 in favor, the Senate blocked the proposed legislation known as the “US Freedom Act”, which would have prohibited the mass collection of telephone data and modified the Patriot Act.

The Patriot Act is the legislation passed after the terrorist attacks of September 11th, which allows the US goverment to, among other things, hunt and kill American citizens at home and abroad without any regard for the rule of law.

If its approval had succeeded, the US Freedom Act would have amended Section 215 of the Patriot Act, which covers the collection of telephone data of millions of citizens without ties to terrorism, but in turn it had renewed the validity of the whole law including this and other changes until 2019.

The US Freedom Act was passed last week in the US House of Representatives with bipartisan support of 338 votes in favor and 88 against only to die at the hands of some US senators who voted against the legislation.

Incidentally, many of the legislators who voted against the proposal have more than questionable ties to the surveillance industry and many of them have received political contributions from those very same corporations.

However, from the moment it was approved in the House of Representatives, security experts warned that the US Freedom Act would have a much graeter difficulty to advance in the Senate, where the leader of the Republican Party, Mitch McConnell, has always opposed changing the Patriot Act.

After blocking the US Freedom Act, the Senate passed a vote on a two-month extension of the Patriot Act, as it is scheduled to expire on June 1.

“The extension of two months is in the best interest to achieve a result that will convince the Senate, the House and the president,” said McConnell.


Luis R. Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news. Read more about Luis.

Appeals Court Strikes Down Bulk NSA Phone Spying

nsa

On June 11, 2013, the ACLU challenged “the constitutionality of the National Security Agency’s mass collection of Americans’ phone records (ACLU v. Clapper).”

It argued that doing so violates Fourth and First Amendment rights, saying:

“Because the NSA’s aggregation of metadata constitutes an invasion of privacy and an unreasonable search, it is unconstitutional under the Fourth Amendment.”

“The call-tracking program also violates the First Amendment, because it vacuums up sensitive information about associational and expressive activity.”

NSA claims authorization under the Patriot Act’s Section 215 – the so-called “business records” provision.

It permits warrantless searches without probable cause. It violates fundamental First Amendment rights. It does so by mandating secrecy.

It prohibits targeted subjects from telling others what’s happening to them. It compromises free expression, assembly and association.

It authorizes the FBI to investigate anyone based on what they say, write, or do with regard to groups they belong to or associate with.

It violates Fourth and Fifth Amendment protections by not telling targeted subjects their privacy was compromised.

It subverts fundamental freedoms for contrived, exaggerated, or nonexistent security reasons.

At the time of its suit, the ACLU said “(w)hatever Section 215’s ‘relevance’ requirement might allow, it does not permit the government to cast a seven-year dragnet sweeping up every phone call made or received by Americans.”

The 1978 Foreign Intelligence Surveillance Act (FISA) authorized surveillance relating to “foreign intelligence information” between “foreign powers” and “agents of foreign powers.”

It restricts spying on US citizens and residents to those engaged in espionage in America and territory under US control.

No longer. Today anything goes. America is a total surveillance society. Obama officials claim no authority can challenge them. Governing this way is called tyranny.

The US Second Circuit Court of Appeals agreed. It held Section 215 of the USA Patriot Act doesn’t permit bulk collection of Americans’ phone records. A three-judge panel ruled unanimously – overturning a lower court decision.

The Obama administration argued that the ACLU lacked “standing” to challenge NSA surveillance practices, and Congress “precluded” judicial review except by the secret Foreign Intelligence Surveillance Court most often only hearing government arguments.

The appeals court rejected this reasoning, saying:

“If the government is correct, it could use Section 215 to collect and store in bulk any other existing metadata available anywhere in the private sector, including metadata associated with financial records, medical records, and electronic communications (including e‐mail and social media information) relating to all Americans.”

“Such expansive development of government repositories of formerly private records would be an unprecedented contraction of the privacy expectations of all Americans.”

ACLU staff attorney Alex Abdo called the ruling “a resounding victory for the rule of law.”

“For years, the government secretly spied on millions of innocent Americans based on a shockingly broad interpretation of its authority.”

“The court rightly rejected the government’s theory that it may stockpile information on all of us in case that information proves useful in the future.”

“Mass surveillance does not make us any safer, and it is fundamentally incompatible with the privacy necessary in a free society.”

ACLU deputy legal director/lead counsel in the case Jameel Jaffer explained:

“This ruling focuses on the phone-records program, but it has far broader significance, because the same defective legal theory that underlies this program underlies many of the government’s other mass-surveillance programs.”

“The ruling warrants a reconsideration of all of those programs, and it underscores once again the need for truly systemic reform.”

Electronic Frontier Foundation (EFF) executive director Cindy Cohn called the ruling “a great and welcome decision and ought to make Congress pause to consider whether the small changes contained in the USA Freedom Act are enough.”

”The 2nd Circuit rejected on multiple grounds the government’s radical reinterpretation of Section 215 that underpinned its secret shift to mass seizure and search of Americans’ telephone records.”

“While the court did not reach the constitutional issues, it certainly noted the serious problems with blindly embracing the third-party doctrine – the claim that you lose all constitutional privacy protections whenever a third-party, like your phone company, has sensitive information about your actions.”

EFF’s legislative analyst Mark Jaycox added:

“Now that a court of appeal has rejected the government’s arguments supporting its secret shift to mass surveillance, we look forward to other courts – including the Ninth Circuit in EFF’s Smith v. Obama case – rejecting mass surveillance as well.”

“With the deadline to reauthorize section 215 looming, we also call on Congress to both expressly adopt the interpretation of the law given by the court and to take further steps to rein in the NSA and reform the Foreign Intelligence Surveillance Court.”

One court victory doesn’t mean overall triumph. The right-wing Supreme Court may have final say – or Congress able to legislatively circumvent High Court or other judicial rulings with no administration opposition by either party.

US governance serves powerful entrenched interests at the expense of popular ones. It’s fundamentally anti-democratic, anti-freedom.

Odds strongly favor no change in business as usual. Sacrificing precious liberties for greater security assures losing both.


Stephen Lendman lives in Chicago and can be reached at [email protected]. His new book is titled “How Wall Street Fleeces America: Privatized Banking, Government Collusion and Class War”. www.claritypress.com/Lendman.html Visit his blog site at www.sjlendman.blogspot.com.

France Nears Approval Of Surveillance State Measures

france-surveillance
By: The Real Agenda –

Installing tracking devices in cars, bugging of private places or, if deemed necessary, the entry into homes, will also be allowed with an administrative authorization, without intervention of judges.

The French National Assembly will vote on Tuesday on the controversial law that would allow wiretapping and cyber spying on any ‘suspicious citizen’ without judicial control.

The law, whose justification was “fears of new attacks in France”, would legalize the access to private data by the secret services without the need to show proof of any person’s relation to a crime or even the intent to commit a crime.

For the government, it is a “necessary” law that protects individual rights. For specialists and citizens’ associations, it is a “liberticidal” law, that is supported by all main political forces.

If apporved, the new law will allow the French secret services to intercept communications, access networks and databases and to compel operators to provide the metadata of people in real time. Additionally, secret services may also access the contents of conversations or messages.

To do this, the law provides that spies can be alerted automatically of suspicious activity by communications companies, search engines or black box networks to warn of behaviors that should be monitored. Also, law enforcement will have access to the algorithms in such practices. In sum, the technology and communication companies have merged with the French government into a massive and powerful Surveillance State.

The new law would also allow the secret services to use systems called IMSI Catcher, by which spyware can capture and record all data from phones or computers of alleged suspects, but that indiscriminately also sweeps everyone else’s communications, no matter how disconnected they are from the alleged suspect.

Installing tracking devices in cars, bugging of private places or, if deemed necessary, the entry into homes, will also be allowed with an administrative authorization, without intervention of judges.

Among the reasons provided by the French government to allow for the commission of such a wide array of spying practices is the supposed usefulness of a massive surveillance state in the prevention of terrorism, organized crime or “collective violence”, the dangers for “national independence, national defense or territorial integrity” through the potential interference of foreigners in the economic, industrial or scientific interests” of France.

Requests for the use of the spying practices cited above may be ordered by the ministries of Defense, Interior, Economy and Justice, which are members of a so-called National Commission for Control of Information Techniques composed by two deputies, two senators, two members of the State Council, two judges and a computer expert. These people will forward all requests to the French Prime Minister who will have the power to authorize the execution of the spying.

In case of emergency, spies can act immediately and report after action. The premise that law enforcement may act first and ask questions later is common to most pieces of legislation approved by Western governments in the name of keeping their citizens safe.

The project, approved by the Cabinet in March, has been defended in the Assembly by the head of the government, Manuel Valls, who pointed at all times to the jihadist attacks in January as an excuse to give himself unlimited spying power. Valls has said that the police have avoided another half dozen attacks, although he has shown no proof to validate such statement.

For Valls, “in special situations, special laws are needed.” According to him, the new law that enables government agencies to violate all existing privacy laws still maintains respect for individual rights and freedoms.

But not everyone is as sure as Valls about the consequences of the unlimited surveillance power of the French government. For example, the Ombudsman for the Rights of France, Jacques Toubon, has issued a statement expressing his “reserves” about giving the secret services the powers that the new law now provides.

The same feeling has come from dozens of associations of citizens, the union of the judiciary and a few deputies who have announced their vote against or who have abstained from voting.

According to the president of the National Consultative Committee on the Rights of Man, Christine Lazerges, the law runs the risk of falling into “a generalized, undifferentiated surveillance.” There is a risk, she says, of “endangering the rule of law by draconian drift”.

Associations such as the Red Square, 24 hours to 1984, Amnesty International and Reporters Without Borders have launched several initiatives to protest and warn the public.

But the negative reactions to the approval of the law has not stopped there. Dozens of MPs received calls from citizens who wanted to express their disapproval and even Valls received a document with 119,000 signatures opposing the law. Furthermore, a company dedicated to computer data storage has threatened to leave France.

In reaction to massive popular opposition and while facing a lot of criticism and doubts, President Francois Hollande, in an unprecedented move, has said he will send the law to the Constitutional Court for consideration.


Luis R. Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news. Read more about Luis.

Snowden Documents Reveal How NSA Converts Conversations Into Searchable Text

nsa conversation intercept

Most people realize that emails and other digital communications they once considered private can now become part of their permanent record.

But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either.

Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.

The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.

Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest.

 

Continue reading at The Intercept.

April EBOM: RATS!

rats-cover-Keith Perkins

MHB has admittedly not had an “EBOM” in several months. The April 2015 Electronic Book of the Month is RATS! Your Guide to Protecting Yourself Against Snitches, Informers, Informants, Agents Provocateurs, Narcs, Finks, and Similar Vermin by Claire Wolfe. (H/t to Professor Darrell Hamamoto for bringing the document to our attention.)

This short, valuable guide is something that every citizen will probably need at some point in their lives. The volume may be downloaded by right-cliking here.

From the first pages of RATS!

This book is for you if …

You are a non-violent person engaged in any activity that may be controversial, illegal, or merely “sensitive” or unconventional. These days, anything out of the ordinary can make you a target.

Some people who could use this book:

Anti-war or environmental activists
Recreational drug users
Participants in the underground economy or anybody who
does business in cash
Critics of local or national powers-that-be
Anyone whose profession involves “sensitive” information or
activities
Gun owners or dealers
Third-party or “fringe” political activists
Hobbyists who work with dangerous materials
Photographers/videographers
Religious dissidents
People with offshore or unconventional investments
(including perfectly legitimate ones)

It doesn’t matter where you fall in the political spectrum or even if you’re apolitical. If police might target you or your activities, you need to understand how snitches could mess up your life.

This book is NOT for you if …

You aim to commit violence against innocent people. In that case, reporting on you isn’t snitching, it’s self defense.

What exactly is a snitch?

There are a lot of different types of snitches. We could write an encyclopedia defining them. But we’re going to keep this simple.

For purposes of the book, a snitch is anybody who inserts him-or herself into your non-violent activities on behalf of government. “Government” may mean local cops. It could also mean the FBI, the Department of Homeland Security, or a host of other state or federal agencies. It’s absolutely mind-boggling how many seemingly innocuous agencies these days have arrest powers, armed enforcers — and snitches employed in sneaky sting operations. And thousands of them use snitches.

There are two common categories of snitch you need to lookout for:

The infiltrator/agent provocateur. This is someone (often a professional) who is inserted into a group for an active purpose, such as disrupting the group, or worst, talking formerly innocent (or at least formerly non-violent) people into committing crimes in order to bust them. Agents provocateurs may, among other things, try to turn nonviolent protest into violent action, thus discrediting movements, giving excuses for crackdowns, and giving more publicity and power to government agencies.

The informer/informant. This snitch is often a legitimate member of a group or social circle who continues to be active while giving information to the police. This person may be acting under duress (to save his own skin after being arrested, for instance). This person may be hoping the cops will pay with money, drugs, or ongoing criminal immunity for her dubious “services.” While this person isn’t necessarily a professional agent provocateur, he may nevertheless try to talk friends into committing crimes so he can get more credibility or rewards from his police handlers.

These aren’t the only types of snitches. For example, there’s also what we’ll call the “accidental snitch” — though idiot snitch might be more appropriate. This is the person who simply can’t keep her mouth shut about illegal or controversial activities. Cops love these guys! They don’t even have to threaten them, pay them, hire them, train them, or gain any leverage over them. They just sit back and listen to them reveal secrets.

Then there’s the type of snitch the British call a grass and old American gangsters might have called a stool pigeon. This is a person who blabs to cops or other government agents after you (and probably he) have already been arrested. This person isn’t going to interfere with your activities; that’s already been done. He’s “only” going to give sworn affidavits and courtroom testimony against you, justifying it as a means of saving his own skin. There’s not much you can do about this person. By the time you learn one of your former friends is a “stoolie,” it’s too late.

There are vengeance snitches — people who turn on friends and associates after having a falling out or not getting their way. There are jailhouse snitches — either deliberately planted in your cell after you’ve been arrested or just opportunists who happen to be there and are willing to share whatever you say (or make up lies about things you said).

Each and every one of these people is a betrayer of friendship and trust. All of them are just plain rats — and they’re as welcome in the company of good people as rats are in a pantry.

To keep things simple we’re going to call them all snitches — though we’ll differentiate when we need to help you look out for specific problems.


Professor James F. Tracy is an Associate Professor of Media Studies at Florida Atlantic University. James Tracy’s work on media history, politics and culture has appeared in a wide variety of academic journals, edited volumes, and alternative news and opinion outlets. James is editor of Union for Democratic Communication’s Journal Democratic Communiqué and a contributor to Project Censored’s forthcoming publication Censored 2013: The Top Censored Stories and Media Analysis of 2011-2012. Additional writings and information are accessible at memoryholeblog.com.

McConnell Introduces Bill To Reauthorize Patriot Act Until 2020

Senate Majority Leader Mitch McConnell(Photo by Win McNamee/Getty Images)

Senate Majority Leader Mitch McConnell(Photo by Win McNamee/Getty Images)

By: Dustin Volz | National Journal

The move may thwart any attempt to reform the NSA’s mass-surveillance authorities.

Senate Majority Leader Mitch McConnell introduced a bill Tuesday night that would reauthorize a controversial surveillance authority of the Patriot Act until 2020, a push that comes just as a group of bipartisan lawmakers is preparing a last-minute push to rein in the government’s mass-spying powers.

A McConnell aide said the majority leader is beginning a process to put the bill on the Senate calendar but said that the chamber will not take the measure up this week. That process, known as Rule 14, would bypass the traditional committee process. Senate Intelligence Chairman Richard Burr is a cosponsor.

Under the bill, Section 215 of the post-9/11 Patriot Act would be extended until December 31, 2020. The core provision, which the National Security Agency uses to justify its bulk collection of U.S. phone records, is currently due to expire on June 1.

The bill appears to be an attempt to thwart efforts to rein in the National Security Agency’s expansive surveillance powers, which came under intense scrutiny nearly two years ago after the disclosures spurred by former NSA contractor Edward Snowden. A bipartisan group of lawmakers were expected to reintroduce on Wednesday a comprehensive surveillance-reform bill that would have effectively ended the NSA’s dragnet of Americans’ call data.

It is possible the bill is being introduced as a backup in case the Senate is unable to agree on a reform bill prior to June 1. But given McConnell’s defense of the intelligence community, that option may be unlikely. The Kentucky Republican led an effort to vote down an NSA-reform package during the lame-duck Senate last year, whipping most of his caucus against the Democratic-backed measure on grounds it could help terrorists kill Americans.

Patrick Leahy, the top Democrat on the Senate Judiciary Committee and a chief backer of surveillance reform, quickly blasted McConnell’s maneuver and vowed to oppose any bill that reauthorized Section 215 without “meaningful reforms.”

“Republican leaders should be working across the aisle on legislation that protects both our national security and Americans’ privacy rights, but instead they are trying to quietly pass a straight reauthorization of the bulk-collection program that has been proven ineffective and unnecessary,” Leahy said in a statement. “And more, they are attempting to do so without the committee process that the majority leader has promised for important legislation. Thistone-deaf attempt to pave the way for five and a half more years of unchecked surveillance will not succeed.”

Privacy advocates also immediately assailed McConnell’s bill.

“The Senate majority leader’s bill makes no attempt to protect Americans’ privacy or reform ongoing NSA surveillance programs that do not provide any tangible benefit to national security,” said Harley Geiger, senior counsel at the Center for Democracy & Technology. “For Americans concerned about government intrusion in their lives, the bill is a kick in the stomach.”

Original article: http://www.nationaljournal.com/tech/mcconnell-introduces-bill-to-reauthorize-patriot-act-until-2020-20150421

 

 

Stingray Technology: Why You Should Know About This Secret Case (VIDEO)

surveillance

What is Stingray technology – how is it used – and why is everyone trying to keep it a secret? Shahid Buttar, Bill of Rights Defense Committee (BORDC) joins Thom Hartman. All across America – law enforcement agencies are using a special technology to collect information from your cell phones.


The Big Picture