NewsFollowUp.com

search

Obama

pictorial index

sitemap home
Privacy, Domestic Surveillance

 

= go to NFU page   mirror  II

 

Wikileaks Vault 7 Press Release

 

150 + Surveillance Schemes

Unit 8200 ... Israel's Spy /Blackmail op.

Five Eyes and Color Revolutions

Warrantless Surveillance of American Journalists, authorized by Bush ... FIRSTFRUITS

Electronic Frontier Foundation   "As part of its case, the EFF said it obtained documents from a former AT&T technician showing that the NSA is capable of monitoring all communications on AT&T's network ..."  more

 

What is Amdocs / Narus connection to Hayden / Bush / NSA phone records database?

WMR: Dec 2012, Senate delivers fatal end-of-term blow to Constitution   ...  Texas Republican Representative Lamar Smith's House Resolution 5949, the FISA Amendments Reauthorization Act of 2012. below

9/11 Truth, JFK assassination & Holocaust interactive spreadsheet ... below & Nazi era timeline

Trapwire

FBI Facial Recognition and Identification Initiative

Facebook, Twitter

US Senate report, Fusion Centers, DHS incompetence

 

William Binney, NSA Whistleblower

H.R. 3200/Division C/Title V/Subtitle C   Implantable Device

NSA requested warrantless wiretapping in Feb 2001

 

Darpa Wants You to Transcribe, and Instantly Recall, All of Your Conversations

The Fascism Effect of the 'War on Terror'-150+ surveillance schemes
Related topics:   Internet            'War on Terrorism'                Communications             Fear             Boycotts    page 1     2    3

Wikileaks Vault 7

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.

By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."

Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

 

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includesnumerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa".

Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below.

 

CIA 'hoarded' vulnerabilities ("zero days")

In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

"Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

'Cyberwar' programs are a serious proliferation risk

Cyber 'weapons' are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.

Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same 'weapons' against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'. Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport"

Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA's electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator's intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

"Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target's machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeatsPersonal Security ProductsDetecting and defeating PSPs andPSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM".

CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure.

 

Examples

 

The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero".

 

UMBRAGE

The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.

 

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

 

Frequently Asked Questions

 

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a "Cyberwar" review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

 

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, ...) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

 

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

 

Wiki pages

"Year Zero" contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

 

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

 

What is "Vault 7"

"Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks.

 

When was each part of "Vault 7" obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

 

Is each part of "Vault 7" from a different source?

Details on the other parts will be available at the time of publication.

 

What is the total size of "Vault 7"?

The series is the largest intelligence publication in history.

 

How did WikiLeaks obtain each part of "Vault 7"?

Sources trust WikiLeaks to not reveal information that might help identify them.

 

Isn't WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

 

Has WikiLeaks already 'mined' all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

 

Won't other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them

 

  

 

 
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  safe and free
  • AlexanderHiggins State-Of-The Art Long Distance Solar Surveillance Drone Unveiled, A new long distance solar-powered drone is unleashed boasting a tactical aerial sensor system that far exceeds anything in its class.
  • Senator Daniel Akaka (D-Hawaii).  Choicepoint and Acxiom companies are data aggregators.  Nuala O'Connor Kelly is head of privacy for Dept of Homeland Security. 
  • Alternet, Patriot II, details, search, government surveillance, spying
  • ArsTechnica Big Brother on a budget: How Internet surveillance got so cheap ... Many governments have invested heavily in packet inspection and related technologies, which allow them to build a picture of what passes through their networks and what comes in from beyond their borders.
  • Center for Democracy and Technology, domestic spying watch 
  • Center for a Legitimate Government    
  • Commercial Alert, protecting children from corporate predation
  • Cryptorights.org human rights for security workers. SF
  • Disinfo  New Surveillance Camera Can Search 36 Million Faces For Matches Per Second
  • Dissenter / FireDogLake Federal Judge’s Injunction Finds NDAA Is Worse Than Material Support Law
  • Echelon Watch discuss civil liberty threats
  • Electronic Privacy Information Center lawsuits, FBI, FOI  
  • Electronic Frontier Foundation working to protect civil and free speech
  • EndoftheAmericanDream 14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You
  • EFF Is Your Printer Spying on YOu
  • EFF  List of Printers Which Do or Do Not Display Tracking Dots, search terms: yellow tracking dots, printer models, output, Machine Identification Code Technology Project, forensic watermarking, dithering technique, blue light, microscope, Brother, Canon, Dell, Epson, Hewlett-Packard, Fuji, Xerox, IBM, Konica / Minolta, Kyocera, Lanier, Lexmark, Okidata, Panasonic, Ricoh, Savin, Samsung, Tektronix, Toshiba, color laser printers.
  • Buy Wayne Madsen's book Overthrow a Fascist Regime on $15 a Day.
  • Epic  Electronic Privacy Information Center
  • F-Secure, info on CD rootkits 
  • Eyeballing TIA
  • Freedom Scorecard, ACLU
  • Future of Freedom First Amendment Rights 
  • Global Issues.org
  • Google-Watch Google search engine is spyware
  • High Tech Billboards  domestic surveillance
  • Human Rights Watch briefing paper on MCIS
  • Internet Democracy Project enhance open participation, public accountability and hr of internet
  • KeepAmericaFree  Yes, Pres. Obama, The NDAA DOES Authorize Warrantless, No Due Process, Indefinite Military Detention by the Military of American Civilians
  • MediaFilter covert action quarterly
  • MediaRoots the Clark County Republican Party Central Committee of Nevada unanimously called for its appeal while legislators in Michigan are currently considering a bill that could virtually revoke the federal law in that state.
  • NoNAIS.com Protect Traditional Rights to Farm, stop RFID privicacy intrusion by Bush corporate America.
  • OpManning Free Bradley Manning
  • Privacy International Human rights group, watchdog on surveillance by govt/biz
  • Privacy  
  • PrivacyToday  news
  • Refuse & Resist the device formerly known as Carnivore,
  • Salon  Israeli art students, DEA, Amdocs searchable file
  • Smirking Chimp Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA
  • Southwest Research and Information Center  Energy, Environment research analysis. 
  • Total Information Awareness Resource Center
  • VeritasVirtualVengeance Righteous Negative Publicity and Black PR: Exposing the terrible truths to take down corrupt corporations.  Surveillance
  • White Dot find out how to free yourself from television.  PTZ point tilt, zoom
  • notes: Wayne Madsen Report ... cell phone  "The "echoing" is not limited to particular cell phone service providers or cell phone types. Customers of AT&T, Verizon, and T-Mobile are reporting the same problem with phones from Nokia, Samsung, Nokia, Motorola, and Ericsson.  ...  Technicians report that echos occur when there is not a complete connection or if there is a third party connection on the call. While echoing has been a minor problem in the past, the frequency of complaints is increasing and affecting journalists and political activists from Washington, DC to New York City and California to Texas.  ...  Government agencies are already able to remotely activate a cell phone and use the microphone to listen in on conversations. The only way to prevent this surveillance is to agree to "batteries out" conversations, something that is employed more and more among journalists while talking to sources as well as others concerned about high-tech snooping from "roving bugs." Similarly, removing the battery from a cell phone also disables the Global Positioning System and cell tower triangulation capabilities used by law enforcement and intelligence agencies to track the location of the user, according to U.S. intelligence sources."
  • Random Number Generation Backdoor to Encryption keys, NSA, NIST

 

  • 3-eye  imagery consultants, info
  • BBC George W Bush personally stopped an inquiry into a controversial programme to monitor the phone calls and e-mails of Americans, a top official has said. Attorney General Alberto Gonzales said internal investigators wanted to look at the role justice department lawyers had played in drafting the programme
  • Thought Crime legislation: hr1955.info

  • CERT Coordination Center net security, info, response
  • Cnet Tech News First, search Carnivore
  • CICenter Counterintelligence, NGO, UK
  • CNN, Technology
  • Earthdata sea
  • Earthdata International satellite images company
  • FAS Project on Government Security 
  • Freedom of Information Act
  • Global Security Foundation  Intelligence Resource 
  • History of the Internet  
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective
  • LawFare 
  • Legal News Search search
  • LexisNexis  online legal, news and business info services
  • LexisOne  The Resource for Small Law Firms.
  • Mountbatten Centre for International Studies
  • National Clearinghouse for Alcohol and Drug Information NCADI, info on alcohol, tobacco, and illicit drugs
  • National Cyber Security Alliance se
  • National Security Archive George Washington U. govt security research, FOI
  • Newsbits technews
  • Open Society Institute Internet policy, independent media, human rights
  • OS News Operating system news
  • PrivacyDigest privacy news
  • Privacy Marketing News UK, into privacy and relationship marketing.
  • Privacy & Security Law Report BNA
  • Project on Government Oversight exposing corruption, exploring solutions
  • Salaam.co.uk Big Brother in Britain, national id cards, high cost and hype. 
  • SearchSecurity news, consulting
  • Security Focus News Microsoft
  • Scientific Working Group on Friction Ridge Analysis fingerprinting, forensic id.
  • Slashdot
  • TechLawJournal news, analysis of legislation, litigation, regulation IT
  • Vera Institute of Justice prisoner rights, justice system innovation, links
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • Wired Magazine, search Poindexter, TIA, Total Information Awareness, IAO,
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973.[1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy.[2][3][4][5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture.[6]
  • WMR Army spying on soldiers' blogs according to leaked Army regulation During a time when the morale of US Army personnel is at an all-time low from a protracted war in Iraq and a de facto draft in the guise of a stop-loss program that keeps soldiers on active duty after their commitments expire, the Army is also spying on the personal blogs of its personnel. This surveillance program has been revealed in a leaked Army Regulation on Operations Security (AR-580-1). ... The regulation was issued almost a year ago, on April 19, 2007. It prohibits the publication of "critical or sensitive" information, a wide-open caveat that could include anything not deemed to be "classified" national security information. The regulation also covers information that has already been disclosed, or "compromised" as stated in the regulation.
  • Yahoo, Spyware new
  • ZDNet, UK news
  • RT.com Facebook snoops on people just like NSA – Belgian watchdog to court ... Facebook is spying on people in “the very same way” that the US’s National Security Agency (NSA) does, said the Belgian data protection watchdog at a court hearing where the social network stands accused of violating the privacy of internet users. “When it became known that the NSA was spying on people all around the world, everybody was upset. This actor [Facebook] is doing the very same thing, albeit in a different way,” said Frederic Debussere, a lawyer representing the Belgian privacy commission (BPC) at the Monday court hearing. The Belgian watchdog has filed a lawsuit against the social network, accusing it of breaching EU law and violating the privacy rights of internet users. The BPC issued a report in March, arguing that Facebook tracked everyone, even users who had logged-out and people who don’t even have a Facebook account at all, via the use of cookies and the ‘like’ or ‘share’ buttons which can be found on more than 13 million websites worldwide. more search terms: Paul Lefebvre, Dublin Ireland, Twitter spying, eavesdropping, EU's 28 privacy watchdogs,

  • Wikipedia The Disruptive Technology Office (DTO) is a funding agency within the United States Intelligence Community. It was until recently known as Advanced Research and Development Activity (ARDA).  ARDA was created in 1998 after the model of the Defense Advanced Research Projects Agency (DARPA) by theDirector of Central Intelligence and the Department of Defense, and took responsibility for funding some of DARPA's projects. ARDA evaluates proposals and funds speculative research, particularly in the fields of data mining, video processing, and quantum computing.  There has been speculation that the DTO is continuing research efforts started under the Total Information Awareness program (TIA) in DARPA's Information Awareness Office (IAO). Data-mining activities within the US Department of Defense are controversial and have met with public and congressional disapproval.  Although ARDA's budget is presumably classified as part of the intelligence budget, the New York Times quoted an unnamed former government official saying the agency spent about $100 million a year in 2003. The Associated Press reports that ARDA had a staff of only eight in 2004.  Headquartered at Fort George G. Meade in Maryland, site of the headquarters of the National Security Agency, ARDA/DTO has kept a low profile, quietly funding research of interest to the intelligence community.  In December 2007, DTO was folded into the newly created IARPA [1]. A move to a research park near the University of Maryland, College Park was announced at about the same time [2].

  • Wikipedia Real ID The REAL ID Act of 2005, Pub.L. 109-13, 119 Stat. 302, enacted May 11, 2005, was an Act of Congress that modified U.S. federal law pertaining to security, authentication, and issuance procedures standards for the state driver's licenses and identification (ID) cards, as well as various immigration issues pertaining to terrorism. The law set forth certain requirements for state driver's licenses and ID cards to be accepted by the federal government for "official purposes", as defined by the Secretary of Homeland Security. The Secretary of Homeland Security has currently defined "official purposes" as presenting state driver's licenses and identification cards for boarding commercially operated airline flights and entering federal buildings and nuclear power plants. The REAL ID Act implements the following: Title II of the act establishes new federal standards for state-issued driver licenses and non-driver identification cards. Changing visa limits for temporary workers, nurses, and Australian citizens. Funding some reports and pilot projects related to border security. Introducing rules covering "delivery bonds" (similar to bail bonds but for aliens who have been released pending hearings). Updating and tightening the laws on application for asylum and deportation of aliens for terrorist activity. Waiving laws that interfere with construction of physical barriers at the borders. As of April 2, 2008, all 50 states have either applied for extensions of the original May 11, 2008 compliance deadline or received unsolicited extensions.[4] As of October 2009, 25 states have approved either resolutions or binding legislation not to participate in the program, and with President Obama's selection of Janet Napolitano (a prominent critic of the program) to head the Department of Homeland Security, the future of the law remains uncertain,[5] and bills have been introduced into Congress to amend or repeal it.[6] The most recent of these, dubbed PASS ID, would eliminate many of the more burdensome technological requirements but still require states to meet federal standards in order to have their ID cards accepted by federal agencies. 

  • Wired Random numbers are critical for cryptography: for encryption keys, random authentication challenges, initialization vectors, nonces, key-agreement schemes, generating prime numbers and so on. Break the random-number generator, and most of the time you break the entire security system. Which is why you should worry about a new random-number standard that includes an algorithm that is slow, badly designed and just might contain a backdoor for the National Security Agency.
  • Wikipedia NAIS The National Animal Identification System, (NAIS) is a government-run program in the United States intended to extend government animal health surveillance by identifying and tracking specific animals. Administered at the federal level by the Animal and Plant Health Inspection Service, a branch of the United States Department of Agriculture, NAIS will also be overseen by state animal health boards. While the federal program is voluntary, money received by some states,[2] tribes, and non-profit entities from the USDA through cooperative agreements has been used to make parts or all of the program mandatory. Critics claim the system will put small farmers out of business, by requiring that farmers pay the cost of registration devices of between $1 and $20 for each animal. Large, corporate factory farms which are connected to vertically integrated, birth-to-death factory systems ID and pay by the herd (and not the individual animal), while small farmers must pay it for each animal.  Finally, fears persist about plans to make NAIS mandatory on the federal level, which would threaten the religious freedom of those who believe that making a “mark” is sinful, such as the Amish. The Amish also object to the use of electronic devices such as microchips.[24] If microchip implants were required, as has been proposed in a 2004 report by the United States Animal Health Association’s Committee on Livestock Identification, it would also violate the rights of those who believe that this practice is morally wrong.
  • PressTV U.S. companies are involved in providing technology that helps the Egyptian government to crack down on communications and monitor protestors on the Internet and mobile phones. ... A U.S. company appears to have sold Egypt technology to monitor Internet and mobile phone traffic that is possibly being used by the ruling regime to crack down on communications as protests erupt throughout the country. ...
    Boeing-owned, California-based company Narus sold Telecom Egypt, the state-run Internet service provider, "real-time traffic intelligence" equipment, more commonly known as Deep Packet Inspection (DPI) technology. Common Dreams ,,, HIGHLIGHTS
    The company is also known for creating "NarusInsight," a supercomputer system allegedly used by US' National Security Agency and other entities to perform mass surveillance and monitoring of public and corporate Internet communications in real time. Common Dreams ...
    Telecom Egypt, the nation's dominant phone and Internet service provider, is a state-run enterprise, which made it easy on Friday morning for authorities to pull the plug and plunge much of the nation into digital darkness. .... Narus provides Egypt Telecom with Deep Packet Inspection equipment (DPI), a content-filtering technology that allows network managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers on the information superhighway. ... "Anything that comes through (an Internet protocol network), we can record," Steve Bannerman, Narus' marketing vice president, once boasted to Wired about the service. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls.” ... Earlier this week, Secretary of State Hillary Clinton urged Egypt's government "not to prevent peaceful protests or block communications, including on social media.” Huffington Post .... FACTS & FIGURES Narus, now owned by Boeing, was founded in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and large corporate clients. ... In addition to Narus, there are a number of companies, including many others in the United States, that produce and traffic in similar spying and control technology: Zeugma Systems (Canada), Camiant (USA), Procera Networks (USA), Allot (Israel), Ixia (USA), Advanced IO (Canada) and Sandvine (Canada), among others. ... When commercial network operators use DPI, the privacy of Internet users is compromised. But in government hands, the use of DPI can crush dissent and lead to human rights violations. ... Virtually all internet access in Egypt is cut off as the government battles to contain the street protests that threaten to topple President Hosni Mubarak. Telegraph HJ/KA/DB... more search terms: Egypt, Elbaradai, Tunisia, Algeria, Tunisia, protest, regime change,
  • WMR  "January 30-February 1, 2009 -- Stellar Wind blows Democratic governors out of office  WMR has previously reported on the malfeasance of the U.S. Attorney for Northern Illinois, Patrick Fitzgerald, in his investigation of the 1993 World Trade Center bombing and the outing of CIA covert agent Valerie Plame Wilson. In the case of the 1993 attack, Fitzgerald sat on critical signals intelligence (SIGINT) evidence that would have tied the bombing to Osama bin Laden in exile in Sudan. Bin Laden remained a U.S. intelligence asset at the time of the World Trade Center bombing so Fitzgerald, following orders from Langley, simply failed to enter into evidence wiretaps communications between the Sudanese Mission to the United Nations in New York and the Sudanese Foreign Ministry in Khartoum that contained references to Bin Laden. In the outing of Plame, Fitzgerald refused to enter as evidence tapped phone calls of Vice President Dick Cheney's Chief of Staff I. Lewis "Scooter" Libby and others that would have proven the severe damage of Libby's actions to the covert counter-proliferation operation involving Plame and her Brewster Jennings & Associates cover firm. Fitzgerald's actions in covering up the World Trade Center link to Sudan and Bin Laden was so significant that Libby's New York Times interlocutor, Judith Miller, once asked this editor for my sources on the Sudanese wiretap story. I told her that one was well known, the late ABC News reporter John McWethy had reported on the Sudan UN mission wiretaps by the National Security Agency (NSA) in 1993. The other, a confidential source in Khartoum, remains confidential. McWethy died in a February 2008 skiing accident in Colorado.   full story
  • Wikipedia Stellar Wind Stellar Wind is the open secret code name for certain information collection activities performed by the United States' National Security Agency and revealed by Thomas M. Tamm to New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2] The program's activities involve data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1] There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[3] In March 2004, the Justice Department under Attorney General John Ashcroft ruled that the program was illegal. The day after the ruling, Ashcroft became critically ill with acute pancreatitis. President Bush sent White House counsel Alberto Gonzales and Chief of Staff Andrew Card, Jr. to Ashcroft's hospital bed, where Ashcroft lay semiconscious, to request that he sign a document reversing the Justice Department's ruling. However, Ashcroft was incapable of signing the document. Bush then reauthorized the operation, over formal Justice Department objections. Federal Bureau of Investigation (FBI) director Robert Mueller, Acting Attorney General James Comey, and many prominent members of the Justice Department were prepared to resign over the matter. Valerie Caproni the FBI general counsel, said, "From my perspective, there was a very real likelihood of a collapse of government." Bush subsequently reversed the authorization.[2] During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as "pizza cases" because many seemingly suspicious cases turned out to be food takeout orders. Approximately 99 percent of the cases led nowhere, but 1 percent bore fruit.[2] One of the known uses of these data were the creation of suspicious activity reports, or "SARS", about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Elliot Spitzer's use of prostitutes, even though he was not suspected of terrorist activities.[1] In March 2012 Wired Magazine published "The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)" talking about a new NSA facility and says "For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail." Naming the official William Binney a former NSA code breaker. Binney goes on to say that the NSA has highly secured rooms that tap into major switches, and satellite communications at AT&T and Verizon both.[4] The article suggests that the otherwise dispatched Stellar Wind is actually an active program.
  • WMR Bush / Clinton complicity in NSA illegal wiretapping.  A problem for Hillary? ...  1999 docs show NSA and Clinton White House hiding information about Foreign Intelligence Surveillance Act (FISA) compliance.  Illegal request for NSA wiretapping made in February 27, 2001 meeting ... Nacchio refused, then indicted for insider stock trading... 10th Circuit Court of Appeals, (they're all crooks?).  search terms: AT&T switching center, Folsom Street, San Francisco, 4ESS equipment, Mark Klein (whistleblower), see  HPSCI, Porter Goss, attorney client privilege, Executive Order 12333, all concerning hiding  documents referring to legality of NSA activities, ... and Wilma A. Lewis, Mark Nagle, Marina Utgoff Braswell, Electronic Privacy Information Center, (Civil No. 99-3197 PLF), information withheld from FOIA, domestic wiretapping  full story
  • Economist "Security experts reckon the latest technology can detect hostile intentions before something bad happens. Unless it is perfect, though, that may be bad in itself   ...   MONITORING surveillance cameras is tedious work. Even if you are concentrating, identifying suspicious behaviour is hard. Suppose a nondescript man descends to a subway platform several times over the course of a few days without getting on a train. Is that suspicious? Possibly. Is the average security guard going to notice? Probably not. A good example, then—if a fictional one—of why many people would like to develop intelligent computerised surveillance systems.   ...   The perceived need for such systems is stimulating the development of devices that can both recognise people and objects and also detect suspicious behaviour. Much of this technology remains, for the moment, in laboratories. But Charles Cohen, the boss of Cybernet Systems, a firm based in Ann Arbor, Michigan, which is working for America’s Army Research Laboratory, says behaviour-recognition systems are getting good, and are already deployed at some security checkpoints" 
  • According to Associated Press, the director of CIA's Open Source Intelligence, Doug Naquin, admitted the existence of a secret facility and a team of operatives for exclusive monitoring of social networks such as Facebook and Twitter. But I've found evidence pointing out that these online communities might actually have been created by CIA for data mining and COINTELPRO operations on the internet.   Hosted  FEMA Concentration Camp, Beech Grove,  Indiana YouTube & Google Map: Emerson Ave, Beech Grove, Indiana and lists Domestic Spying, FBI, AT&T page Prodigal email, im, text scanning Darpa
Domestic Spying News    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
ARPA, IARPA, Advanced Research and Development Activity Office     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  objects to CAPPS, no due process, easily circumvented.
  • Electronic Frontier Foundation working to protect civil and free speech  & lawsuit
  • EndoftheAmericanDream 14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You  
  • Epic  Electronic Privacy Information Center
  • TheRedPillGuide IARPA, wifi, IARPA’s Great Horned Owl Program: collecting intelligence ‘without anyone knowing you are there’  The GHO program was created in order to reduce the ability of the target “to counter [surveillance]” by creating, “Better, more efficient, quiet power sources and propulsion techniques [in order] to engineer the next generation UAVs for ISR [Intelligence Surveillance and Reconnaissance] mission applications.”
  • CDC Center for Disease Control and Prevention.
  • Dept of Health and Human Services.
  • PrivacyDigest privacy news
  • Softswitch.org  to develop universal communications solutions over packet-based voice, data and video.
  • TechDirt William Binney
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
 
  • Biowatch, detect biological warfare threats. fear Bush.
  • Dept of Health and Human Services.
  • Dept of Homeland Security domestic spying
  • IARPA Are you a scientist or engineer with a creative idea that you think could provide the nation with an overwhelming intelligence advantage? If so, consider joining IARPA as a Program Manager.
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Virage Inc Video analysis and contact extraction. Part of the Autonomy Group
 
Amdocs, Israel, Narus-Boeing  top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  and NSA lawsuit
  • Cryptome search Narus spy
  • DailyKOS EFF lawsuit, nationwide class action, AT&T Technician stepped forward to disclose installation of NSA equipment (Narus ST-6400)  in San Francisco trunk facility, NarusInsight
  • EFF State Secrets Act invoked on wiretapping lawsuit.  National Security Agency
  • Cryptome search Narus spy
  • DailyKOS EFF lawsuit, nationwide class action, AT&T Technician stepped forward to disclose installation of NSA equipment (Narus ST-6400)  in San Francisco trunk facility, NarusInsight
  • Earthrights International the power of law, people in defense of human rights
  • Moon of Alabama search terms: CDR, call detail records, usage behavior, mortgate data, credit card data, addresses, names, NSA took over Total Information Awareness Project, if you're against Bush are you a terrorist? Datamining, small groups, false tips, 
  • NoGW CIA
  • Scoop ISP, black box, NARUS, Model ST-6400, 
  • Notes, search terms: internet protocol Detail Record, analyzes data 'meaning' impeach bush
  • Serendipity: Timeline of CIA atrocities, School of the Americas, 
  • C/Net downloads
  • Findlaw NSA
  • Eric Umansky
  • Findlaw, Dean
  • Hoover's Narus
  • Liquid Matrix China asks Narus for tech to block VOIP calls.  
  • EFF State Secrets Act invoked on wiretapping lawsuit.  National Security Agency
  • TechDirt William Binney
  • Wired search Narus, Amdocs
  • Notes, search terms, EFF lawsuit against AT&T over their secret work with NSA, ST-6400, content triggers, Narus Insight, Ori Cohen, VDONet, JP Morgan Partners, Mayfied, NeoCarta, Presidio Venture Partners, Walden International, Intel, NTT Software, Sumisho Electronics, William P. Crowell, 
  • Schema-Root AIPAC, Weisman, search Rosen Franklin,
  • Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links
  • New York Times NSA executive order authorizing data mining of phone calls and file Dec 16, 2005
  • Wired  stepped forward to disclose installation of NSA equipment (Narus ST-6400)  in San Francisco trunk facility, NarusInsight
  • Notes, search terms: internet protocol Detail Record, analyzes data 'meaning', voice recognition, business cards, social network analysis,
  • Amdocs search Narus
  • American National Union Should Hayden be confirmed or court-martialed
  • Comverse and Information Clearing House Carl Cameron report  and see CALEA
  • Comverse CEO resigns amid options probe, MORE below
  • Center for Strategic and International 
  • Defense Tech Telcos Deny NSA Ties - and Allowed to Lie?
  • FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down.
  • Narus see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems.
  • Narus Partners see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems...more
  • Republicans who are against Bush spying are an irrelevant impotent and small group.
  • New York Times  NSA executive order authorizing data mining of phone calls and file Dec 16, 2005
  • Narus Board of Directors  Notes on Narus: Narus is a private company founded in 1997 by Ori Cohen, was  in charge of tech development for VDONet,  media streaming pioneer. It has venture funding from  investors including JP Morgan Partners, Mayfield, NeoCarta, Presidio Venture Partners, Walden International, Intel, NTT Software and Sumisho Electronics
  • WMR At first blush, the recent adoption by the House of Representatives of the Foreign Intelligence Surveillance Act Amendments Act, which gives telecommunications companies that illegally eavesdropped on the telephone conversations, faxes, text messages, and emails of Americans retroactive immunity from lawsuits from privacy-violated and aggrieved customers, would see to have little to do with the powerful American Israel Public Affairs Committee (AIPAC).  ...  However, the support for the bill by AIPAC's biggest boosters, including House Majority Leader Steny Hoyer of Maryland, whose sister, Bernice Manocherian, was an executive president of AIPAC, and Jane Harman, who was slated to become chair of the House Permanent Select Committee on Intelligence (HPSCI) but whose nomination was nixed by Speaker Nancy Pelosi after a Justice Department investigation of Harman's contacts with AIPAC  ....    To ensure a lock on the no retroactive lawsuit provisions, the man who became HPSCI chair, Sylvestre Reyes, supported the measure. He was joined by other AIPAC sure bets, including Brad Sherman (D-CA), Gary Ackerman (D-NY), Ellen Tauscher (D-CA), John Yarmuth (KY), Rahm Emanuel (D-IL), Jason Altmire (D-PA), and, for added measure Pelosi. full article
Apple, Iphone, Google Android     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • Mobiledia Court Allows Phone Searches Without Warrants   U.S. federal appeals court ruled certain forms of warrantless cell phone tracking do not violate Fourth Amendment laws, heating up the debate over consumer privacy on mobile devices   ...   The ruling covers an Indiana case where police officers tracked cell numbers of phones found at the scene of a drug bust. The judges in the appeal ruled that law enforcement's looking up the cell phone's number on the devices did not violate search and seizure laws.    ..   This ruling will likely be revisited, as an ongoing debate on how law enforcement treats mobile phone privacy in regards to criminal tracking and the Fourth Amendment heats up. Multiple cases are testing boundaries, and courts are issuing various rulings, drawing differing lines between what kinds of searches violate privacy protections.  more
  • WMR April 22-24, 2011 -- I-Phone, Android back doors are courtesy of the NSA.    ...   News reports that Apple's I-Phone and I-Pads, as well as Google's Android operating system-enabled phones can track a user's location, as well as Internet activities, is nothing new, according to a well-placed intelligence source. In fact, the Apple and Google "spy ware" is courtesy of a deal struck with the U.S. National Security Agency (NSA), which is the ultimate recipient of the location and web data being collected by Apple and Google.    ...   NSA's aggressive insistence that it have "back door" access to state-of-the-art commercial communications products was on display in the 1990s when Britain's Ministry of Defense discovered eight different back doors installed in Windows 98 and subsequent releases of the operating system. Microsoft is a long-time partner of the NSA in ensuring that its products are accessible by the American eavesdropping agency.    ...   Although Britain's Government Communications Headquarters is a signals intelligence (SIGINT) partner of the NSA, a "rainbow team" representing computer security experts, drawn from multiple British government agencies. discovered the NSA back doors while conducting a security evaluation of Britain's latest tank battlefield system. While back engineering the Microsoft source code at their research facility at Farnborough, the team discovered the eight NSA back doors.    ...   Microsoft threatened legal action against the British government for what the firm considered to be the illegal examination of its source code. However, after the British government claimed Crown immunity and threatened to leak the information about the NSA back doors to the media, Microsoft backed down. Britain removed the eight back doors and was able to secure its tank and other battlefield systems from the NSA.    ...   Apple and Google, like Microsoft, have remained quiet about the surveillance capabilities of their products. WMR's intelligence source stresses that the silence from Apple and google is being directed by the actual developer of the surveillance back doors, the NSA.    PakAlertPress
  • CNN  2012 Under Apple's patent, a traveler's phone would automatically send electronic identification to a TSA agent as soon as the traveler gets in line. While each traveler waits in line, TSA agents would examine the electronic ID at an electronic viewing station. Next, at the X-ray stations, a traveler's phone would confirm to security agents that the traveler's ID had already been checked. Throughout the process, the phone photo could be displayed on a screen for comparison with the traveler. Facial recognition software could be included in the process. (See details on Apple's proposal in the photo gallery above.) The patent documents offer a surprising number of details which open doors to key questions about the system, but Apple declined to discuss the patent. The TSA wouldn't comment either on the viability of Apple's plan. But other government officials, aviation authorities and longtime industry experts say Apple faces at least three high hurdles if they want to see this idea to fruition. Verification Several experts say a key question that must be answered is: How would you prove that the phone is yours? In other words, how would you prove that the e-passport is actually you? To get around this problem, future phones or electronic ID may require some form of biometric security function -- like fingerprint matching. In general, passports must be designed to be difficult to copy. Recent security changes to U.S. passports have included a hidden radio frequency identification chip to hinder counterfeiters. The chip includes the same data as the paper passport, a unique chip ID number, a digital version of the passport holder's photo "which will facilitate the use of face recognition technology at ports-of-entry," according to the State Department website.
  • EFF NSA Spying  The U.S. government with assistance from major telecommunications carriers including AT&T has engaged in a massive program of illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001.   ...   News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports plus a USA Today story in May 2006 and the statements of several members of Congress revealed that the NSA is also receiving wholesale copies of their telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution.    ...   The evidence also shows that the government did not act alone. EFF has obtained whistleblower evidence [PDF] from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed “this isn’t a wiretap it’s a country-tap.”
Appliance Surveillance     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • CDC Center for Disease Control and Prevention.

 

  • Biowatch, detect biological warfare threats. fear Bush.
  • Dept of Health and Human Services.
  • Dept of Homeland Security domestic spying
  • National Consumers Coalition  info on 'big brother', national ID card, govt spycams, supports global warming.org
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Virage Inc Video analysis and contact extraction. Part of the Autonomy Group
  • YouTube  CIA Director Promotes Surveillance, Endorses Bugging Home
  • Wired More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”  “Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computin
  • Wikipedia Laser printer tracking dots.....color and monochrome.... see Printer steganography is a type of steganography – "hiding data within data"[1] – produced by laser printers, including Brother, Canon, Dell, Epson, HP, IBM, Konica Minolta, Kyocera, Lanier, Lexmark, Ricoh, Toshiba and Xerox brand color laser printers,[2] where tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers and timestamps. Unlike many forms of steganography, the hidden information is not intended to be available from a computer file, but to allow serial number and time of printing to be determined by close examination of a printout. Color laser printers and copiers appear to be the type mostly involved, the measure being brought in during the 1990s by Xerox and other companies seeking to reassure governments that their printers wouldn't be used for forgery. The identification is by means of a watermark, often using yellow-on-white, embedded in the printout of each page, and in conjunction with other information can be used to identify the printer which was used to print any document originally produced on a wide range of popular printers. It has been reported that monochrome printers and copiers from major manufacturers also include the markings. It may be actual text, or a repeated pattern of dots throughout the page, more easily visible under blue light or with a magnifying glass, and is intended to produce minimal visible change to the printout, ideally being imperceptible to the naked eye. In 2005, the Electronic Frontier Foundation cracked the codes for Xerox DocuColor printers and published an online guide to their detection.[3] Most printers' codes have not been decoded, although the coding system framework and printer serial number encoding is the same on both DocuColor and the Epson Aculaser C1100/C1100N/A.
 
Auto Black Box     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • CDC Center for Disease Control and Prevention.
  • ComputerWorld When you are car shopping, how many times has a salesman pitched the 15 to 30 specific data elements constantly being collected by the car's black box as you drive?
  • TechDirt William Binney
  • Biowatch, detect biological warfare threats. fear Bush.
  • Dept of Health and Human Services.
  • Dept of Homeland Security domestic spying
  • National Consumers Coalition  info on 'big brother', national ID card, govt spycams, supports global warming.org
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Virage Inc Video analysis and contact extraction. Part of the Autonomy Group
  • ComputerWorld When you are car shopping, how many times has a salesman pitched the 15 to 30 specific data elements constantly being collected by the car's black box as you drive? Probably never, but there's electronic data everywhere and that includes your car collecting digital evidence which might turn into the star witness to testify against you. You may not think about or be aware of your vehicle's event data recorder (EDR), yet it is constantly recording evidence like a plane's "black box" and is being used after a crash to explain why it happened.   Way back in 2006, the National Highway Traffic Safety Administration (NHTSA) mandated that all new vehicles be equipped with EDR "black boxes" by the 2013 model year [PDF]. 85% of U.S. vehicles now have EDR devices that "must capture and preserve at least 15 types of crash data, including pre-crash speed, engine throttle, changes in forward velocity and airbag deployment times." Some capture 30 types of data.   What cars are equipped to narc on you? According to Crash Forensics, "As of 2011, GM vehicles as old as 1994 have accessible data, Ford vehicles as old as 2001 have accessible data, Chrysler vehicles as old as 2005 have accessible data, Toyota and Lexis vehicles as old as 2006 have accessible data, as well as some Isuzu, Fiat, Mitsubishi, Scion, Sterling, and Suzuki vehicles." You can also check this list [PDF] or this list [PDF] for vehicles with accessible EDRs.  Does that data about your driving belong to you or to insurance companies? It really depends where you have an accident since some courts have ruled the info belongs to the insurance companies and others have ruled the data belongs to drivers. As IEEE pointed out, "In the 37 states without EDR laws, there are no ground rules preventing insurance companies from obtaining the data-sometimes without the vehicle owner ever knowing that the data existed." John Tomaszewski, general counsel at TRUSTe, said "People should not relinquish their Fourth Amendment rights merely because of the location of their information." What about your right to plead the Fifth Amendment and not witness against yourself?
  • Chron ... Your office color laser printer adds yellow dots, too small for the average person to see, to every page. The dots form patterns which identify the printer make and model. Printer companies, at the request of the U.S. government, have added the dots as a way to trace documents back to the printer. The Electronic Freedom Foundation, an organization concerned with civil rights and technology, has investigated the use and nature of these yellow dots. .The yellow dot technology appears to apply only to color laser printers and copiers. Monochrome laser, LED and inkjet printers lack the yellow toner necessary to print the dots, and therefore do not produce these markings. In addition, because Xerox developed the yellow dot technology during the 1990s, this affects only those printers made since then. Experts have identified yellow dot marks on documents from many printer makes, including Xerox, Hewlett-Packard, Toshiba and Canon. At the time of publication, experts know of no other secret identifying marks in printed materials, although the possibility exists, according to the Electronic Freedom Foundation.
  • Instructables... how to enable visualization of tracking dots... three methods ... .
  • PCWorld ..
 
Automatic License Plate Recognition     top    MORE
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • DeathandTaxes
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • Wikipedia Automatic number plate recognition (ANPR;
  • Wikipedia Automatic number plate recognition (ANPR; see also other names below) is a mass surveillance method that uses optical character recognition on images to read vehicle registration plates. They can use existing closed-circuit television or road-rule enforcement cameras, or ones specifically designed for the task. They are used by various police forces and as a method of electronic toll collection on pay-per-use roads and cataloging the movements of traffic or individuals. ANPR can be used to store the images captured by the cameras as well as the text from the license plate, with some configurable to store a photograph of the driver. Systems commonly use infrared lighting to allow the camera to take the picture at any time of the day.[1][2] ANPR technology tends to be region-specific, owing to plate variation from place to place. Concerns about these systems have centered on privacy fears of government tracking citizens' movements, misidentification, high error rates, and increased government spending.
  • DeathandTaxes  NEWS License plate readers enhance Big Brother’s intrusive gaze By DJ Pangburn 51 days ago This month the ACLU has launched a nationwide effort to demand information from police departments and other authorities about automatic license plate readers (ALPRs), arguing that they violate privacy. Are ALPRs yet another eye of Big Brother or is the ACLU’s freedom of information request much ado about nothing? “ALPRs are cameras mounted on stationary objects (telephone poles, the underside of bridges, etc.) or on patrol cars,” writes the ACLU. “The cameras snap a photograph of every license plate that passes them by – capturing information on up to thousands of cars per minute. The devices convert each license plate number into machine-readable text and check them against agency-selected databases or manually-entered license plate numbers, providing an alert to a patrol officer whenever a match or ‘hit’ appears.” As with drone technology, no longer do the watchmen have to try to be everywhere at once—they are everywhere at once. According to the ACLU, “When the ALPR system captures an image of a car, it also meta-tags each file with the GPS location and the time and date showing where and when the photograph was snapped.” The ACLU notes that often And often, the photograph of the license plate is also stored in a database. “The system gathers this information on every car it comes in contact with, not simply those to which some flag or ‘hit’ was attached.”
 
Biosurveillance, Biowatch     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • AlexanderHiggins State-Of-The Art Long Distance Solar Surveillance Drone Unveiled, A new long distance solar-powered drone is unleashed boasting a tactical aerial sensor system that far exceeds anything in its class.
  • CDC Center for Disease Control and Prevention.
  • Dept of Health and Human Services.
  • PrivacyDigest privacy news
 
CALEA Communications Assistance for Law Enforcement Act    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • ZD Net  search: Communications Assistance for Law Enforcement Act.
  • VOIP wiretapping
  • Wired  Fed step up push to tap internet phone calls
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
 
  • CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department
  • Dept of Homeland Security domestic suveillance
  • IARPA Are you a scientist or engineer with a creative idea that you think could provide the nation with an overwhelming intelligence advantage? If so, consider joining IARPA as a Program Manager.
  • New York Times NSA executive order authorizing data mining of phone calls and file.
 
CAPPS, CAPPS II, Secure Flight   airline no-fly list    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • PrivacyDigest privacy news
  • TechDirt William Binney
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • ACLU  The proposed airline profiling program CAPPS II (for Computer Assisted Passenger Profiling System) was terminated in August 2004 and replaced by a similar program called Secure Flight. CAPPS II was a proposal to give the government a new role unprecedented in American life: running background checks on Americans who fly, and giving them a ""risk score."" Secretive, lacking due process protections for people who are unfairly tagged, and yet easy for terrorists to circumvent, this program once put in place will grow into a most un-American system of internal border controls.
  • Wikipedia CAPPS (Computer Aided Passenger Pre-screening System) systems rely on what is known as a Passenger Name Record, often abbreviated PNR. When a person books a plane ticket, certain identifying information is collected by the airline: full name, address, etc. This information is used to check against some data store (e.g., a TSA No-Fly list, the FBI ten most wanted fugitive list, etc.) and assign a terrorism "risk score" to that person. High risk scores require the airline to subject the person to extended baggage and/or personal screening, and to contact law enforcement if necessary.
Carnivore, DCS 1000, EtherPeek       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • PrivacyDigest privacy news
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973.[1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy.[2][3][4][5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture.[6]
 
Cell Site Tracking      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • PrivacyDigest privacy news
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • Wired Court OKs Warrantless Cell-Site Tracking BY DAVID KRAVETS EMAIL AUTHOR 09.07.10 6:33 PM A federal appeals court said Tuesday the government may obtain cell-site information that mobile phone carriers retain on their customers without a probable-cause warrant under the Fourth Amendment.  ...
  • Wired Court OKs Warrantless Cell-Site Tracking BY DAVID KRAVETS EMAIL AUTHOR 09.07.10 6:33 PM A federal appeals court said Tuesday the government may obtain cell-site information that mobile phone carriers retain on their customers without a probable-cause warrant under the Fourth Amendment.  ...   The decision by the 3rd U.S. Circuit Court of Appeals (.pdf) was not, however, an outright Obama administration victory. Lower courts, the three-judge panel wrote, could demand the government show probable cause — the warrant standard — before requiring carriers to release such data to the feds.    ...   The opinion does leaves the privacy issue in a legal limbo of sorts. The standard by which the government can access such records — which can be used in criminal prosecutions — is left to the whims of district court judges. Historical cell-site location information, which carriers usually retain for about 18 months, identifies the cell tower to which the customer was connected at the beginning of a call and at the end of the call.    ...   Lower courts across the country have issued conflicting rulings on the topic and will continue to do so without appellate guidance or congressional action. The Philadelphia-based court was the first appeals court to address the issue.    ...   The Obama administration argued a judge could force a carrier to produce cell-site data on a showing that the information was “relevant and material” to an investigation.   ...   But the appeals court, ruling in a narcotics case, said the Stored Communications Act, the law in question, was vague as to what standard was required.    ...   The court left open the possibility that it would revisit the case again and decide whether the constitution requires a warrant for the cell site data. The court said the statute itself could be interpreted as not requiring one.   ...   The judges did not directly address the constitutionality of the statute, said Kevin Bankston, a privacy lawyer with the Electronic Frontier Foundation, which weighed in on the case with a friend-of-the-court brief.
Census Bureau      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • PrivacyDigest privacy news
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • WMR By Wayne Madsen According to US Census Bureau documents, the U.S. Census Bureau shared confidential census data files with the Department of Homeland Security (DHS). Of particular interest to DHS were census files on U.S. citizens of Arab ancestry sorted by individual ZIP code tabulation areas. In a U.S. Census Bureau memo dated April 23, 2004, a senior systems analyst with the Population Division writes to DHS that "my superiors are now asking questions about the usage of the data, given the sensitivity of different data requests we have received about the Arab population." The Branch Officer of the DHS Customs and Border Protection Bureau's Container Security Division Operational Support and Oversight Branch responds to the Census Bureau concern by stating that the information on Americans of Arab ancestry is required for "U.S. Outbound operations; which include both cargo and passenger operations." The Branch Chief continues by stating, "at U.S. International airports, U.S. Customs posts signage informing various nationalities of the U.S. Customs regulations to report currency brought into the US upon entry. Current regulations require passengers bringing more than $10,000 into the U.S. to claim it on a currency entry declaration . . . My reason for asking for U.S. demographic data is to aid the Outbound Passenger Program Officer in identifying which language of signage, based on U.S. ethnic nationality population, would be best to post at the major International airports. Some cases this would identify multiple copies needed of a specific language sign versus other cities only one copy." more
CODIS Collect DNA from every arrest     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Wikipedia CODIS The Combined DNA Index System (CODIS) is a DNA database funded by the United States Federal Bureau of Investigation (FBI). It is a computer system that stores DNA profiles created by federal, state, and local crime laboratories in the United States, with the ability to search the database to assist in the identification of suspects in crimes
  • Wikipedia CODIS The Combined DNA Index System (CODIS) is a DNA database funded by the United States Federal Bureau of Investigation (FBI). It is a computer system that stores DNA profiles created by federal, state, and local crime laboratories in the United States, with the ability to search the database to assist in the identification of suspects in crimes. CODIS was an outgrowth of the Technical Working Group on DNA Analysis Methods (TWGDAM, now SWGDAM) which developed guidelines for standards of practice in the United States and Canadian crime laboratories as they began DNA testing in the late 1980s. TWGDAM was sponsored by the FBI Laboratory which hosted several scientific meetings a year at Quantico, Virginia, to accelerate development of laboratory guidelines and peer-reviewed papers to support forensic DNA testing which was, to some, an unproven forensic tool. TWGDAM completed a white paper in October 1989 which provided conceptual and operational concepts for a Combined DNA Index System to share DNA profiles among crime laboratories similarly to automated fingerprint identification which had become commonplace in law enforcement during the 1980s. The FBI Laboratory began a pilot project with six state and local crime laboratories to develop software to support each laboratory's DNA testing and allow sharing of DNA profiles with other crime laboratories. The DNA Identification Act of 1994 formally authorized the FBI to operate CODIS and set national standards for forensic DNA testing. The TWGDAM guidelines served as interim standards until recommendations were provided by a DNA Advisory Board required under the Act. Although the Act was passed in 1994, CODIS did not become fully operational until 1998.  The CODIS database originally was primarily used to collect DNA of convicted sex offenders. Over time, this has expanded. Currently all fifty states have mandatory DNA collection from certain felony offenses such as sexual assault and homicide, and 47 states collect DNA from all convicted felons. Other states have gone further in collecting DNA samples from juveniles and all suspects arrested. In California, as a result of Proposition 69 in 2004, all suspects arrested for a felony, as well as some individuals convicted of misdemeanors, will have their DNA collected starting in 2009. In addition to this, all members of the US Armed Services who are convicted at a Special court martial and above are ordered to provide DNA samples, even if their crime has no civilian equivalent (for example adultery). Currently, the ACLU is concerned with the increased use of collecting DNA from arrested suspects rather than DNA testing for convicted felons. Along with the ACLU, civil libertarians oppose the use of a DNA database for privacy concerns as well as possible institutionalized discrimination policies in collection.
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973.[1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy.[2][3][4][5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture.[6]
COFEE Computer Online Forensic Evidence Extractor      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • AlexanderHiggins State-Of-The Art Long Distance Solar Surveillance Drone Unveiled, A new long distance solar-powered drone is unleashed boasting a tactical aerial sensor system that far exceeds anything in its class.
  • Microsoft has developed a small plug-in device that investigators can use to quickly extract forensic data from computers that may have been used in crimes.  The COFEE, which stands for Computer Online Forensic Evidence Extractor, is a USB "thumb drive  Seattle Times  The device contains 150 commands that can dramatically cut the time it takes to gather digital evidence, which is becoming more important in real-world crime, as well as cybercrime. It can decrypt passwords and analyze a computer's Internet activity, as well as data stored in the computer. 
Controlled Drug Users       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • WMR The Drug Enforcement Agency says it does track prescriptions of so-called controlled substances — including some mood-altering medications — but not all prescriptions made in the United States." The issue is to what extent does the DEA track prescription drug users and what prompted the government to check on records pertaining to Cho Seung-hui, who was reported to have been treated for mental problems in the past? The Psychotropic Substances Act of 1978 added mind-altering drugs to the list of official Controlled Substances. Prescriptions for these controlled substances have a "DEA Number" used for tracking controlled substances. The Cho incident and the comments and quick retractions by "senior federal officials" indicate that there is a secret federal government capability to track controlled drug users.
DARPA, ARPA, IARPA, IPTO       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
 
  • ExtremeTech In 2008, DARPA, the US military’s elite group of pocket protector warriors, began soliciting the tech industry to develop technologies that would allow computers to sort through and index surveillance footage from the military’s fleet of drones, satellites, and miscellaneous other super secret spy cameras. This was all part of the Agency’s proposed Video Image Retrieval and Analysis Tool (VIRAT) that would be able to describe specific human activities in real-time. This automated index would allow for searchable queries (i.e. “how often did an adult male taller than six-foot get in a car in the early morning between November 1st and December 22nd in this compound in Abbottabad?”) or flag behavior such as when someone carries a large package towards a car on the side of a road in Basra, but walked away empty handed. And it appears that DARPA has had some success to this end. Earlier this week, the military released a mandated contract announcement describing how the VIRAT system will be deployed into various military-intelligence video archives and systems. The contract will be fulfilled by Lockheed Martin for an unspecified amount. We haven’t been given any detailed information on how this new technology works or how accurate it is, only that a belt-tightening defense industry is willing to invest in it.
  • Wikipedia IARPA Intelligence Advanced Research Projects Activity From Wikipedia, the free encyclopedia (Redirected from IARPA) The Intelligence Advanced Research Projects Activity (IARPA) is a United States research agency under the Director of National Intelligence's responsibility. In January 2008, Lisa Porter, an administrator at NASA with experience at DARPA, was appointed director[1] of the activity formed in 2006 from the National Security Agency's Disruptive Technology Office (DTO), the National Geospatial-Intelligence Agency’s National Technology Alliance and the Central Intelligence Agency’s Intelligence Technology Innovation Center.[2] Contents [hide] 1 Goals 2 Program offices 3 The Metaphor Program 4 See also 5 References 6 Further reading 7 External links [edit]Goals   ...   "IARPA's mission [is] to invest in high-risk/high-payoff research programs that have the potential to provide the United States with an overwhelming intelligence advantage over future adversaries." – FBI National Press Release, 2009[3] The Director of National Intelligence in a September 2006 speech stated that the goal of the agency[4] is to conduct research that Cuts across multiple IC agencies; Targets new opportunities that lie in the white spaces between agencies; Provides innovations that agencies avoid because of current business models; and Generates revolutionary capabilities that will surprise our adversaries and help us avoid being surprised. Program offices    ...   IARPA is divided into three program offices, Smart Collection, Incisive Analysis, and Safe & Secure Operations. The goal of the Office of Smart Collection is to "dramatically improve the value of collected data from all sources." The Office of Incisive Analysis exists to "maximize insight from the information we collect, in a timely fashion." IARPA's third division, the Office of Safe & Secure Operations, exists to "counter new capabilities implemented by our adversaries that would threaten our ability to operate freely and effectively in a networked world." [edit]The Metaphor Program    ...  The Metaphor Program is a two-phase project designed to first develop automated techniques for recognizing, defining and categorizing linguistic metaphors and then use that information to characterize differing cultural perspectives. The Program is headed by Heather McCallum-Bayliss. On May 2011, IARPA issued an open solicitation for private sector parties to participate in the Program
  • Wikipedia The Disruptive Technology Office (DTO) is a funding agency within the United States Intelligence Community. It was until recently known as Advanced Research and Development Activity (ARDA). ARDA was created in 1998 after the model of the Defense Advanced Research Projects Agency (DARPA) by the Director of Central Intelligence and the Department of Defense, and took responsibility for funding some of DARPA's projects. ARDA evaluates proposals and funds speculative research, particularly in the fields of data mining, video processing, and quantum computing. There has been speculation that the DTO is continuing research efforts started under the Total Information Awareness program (TIA) in DARPA's Information Awareness Office (IAO). Data-mining activities within the US Department of Defense are controversial and have met with public and congressional disapproval. Although ARDA's budget is presumably classified as part of the intelligence budget, the New York Times quoted an unnamed former government official saying the agency spent about $100 million a year in 2003. The Associated Press reports that ARDA had a staff of only eight in 2004. Headquartered at Fort George G. Meade in Maryland, site of the headquarters of the National Security Agency, ARDA/DTO has kept a low profile, quietly funding research of interest to the intelligence community. In December 2007, DTO was folded into the newly created IARPA  A move to a research park near the University of Maryland, College Park was announced at about the same time [2].
    • BICA: project to create "Biologically Inspired Cognitive Architectures"
    • Bootstrapped Learning: a project to bring about "instructable computing" by driving the creation of machine learning algorithms that are responsive to models of human-to-human instruction
    • LifeLog, an IPTO project "to trace the 'threads' of an individual's life in terms of events, states, and relationships" by creating "an ontology-based (sub)system that captures, stores, and makes accessible the flow of one person’s experience in and interactions with the world in order to support a broad spectrum of associates/assistants and other system capabilities."
    • FORESTER: a program to develop a helicopter-borne radar system that can detect soldiers and vehicles moving underneath folliage cover
    • VIRAT: analysis and storage of video surveillance data
    • Deep Green: U.S. Army battlefield decision-making support system
    • Heterogeneous Urban RSTA Team: aerial surveillance program designed to monitor cities with self-directed UAVs
    • High Productivity Computing Systems: project for developing a new generation of economically viable high productivity computing systems for national security and industry in the 2007 to 2010 timeframe

 

Data Mining for profit, Acxiom and Epsilon      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • ISP Planet news
  • PrivacyDigest privacy news
  • TheEconomic Collapse Blog  Data Mining: Big Corporations Are Gathering Every Shred Of Information About You That They Can And Selling It For Profit   When most people think of "Big Brother", they think of the FBI, the CIA, the NSA, the Department of Homeland Security and other shadowy government agencies.  
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.

 

  • TheEconomic Collapse Blog  Data Mining: Big Corporations Are Gathering Every Shred Of Information About You That They Can And Selling It For Profit   When most people think of "Big Brother", they think of the FBI, the CIA, the NSA, the Department of Homeland Security and other shadowy government agencies. Yes, they are definitely watching you, but so are many big corporations. In fact, there are some companies that are making tens of millions of dollars by gathering every shred of information about all of us that they can and selling it for profit to anyone willing to pay the price. It is called "data mining", and these data miners want to keep track of literally everything that you do. Most people know that basically everything that we do on the Internet is tracked, but data mining goes far beyond that. When you use a customer rewards card at the supermarket, the data miners know about it. When you pay for a purchase with a credit card or a debit card, the data miners know about it. Every time you buy a prescription drug, that information is sold to someone. Every time you apply for a loan, a whole host of organizations is notified. Information has become an extremely valuable commodity, and thanks to computers and the Internet it is easier to gather information than ever before. But that also means that our personal information is no longer "private", and this trend is only going to get worse in the years ahead.   ...   You have probably never even heard of many of these companies that are making millions of dollars selling your personal information. Acxiom and Epsilon are two of the biggest names in the industry, and most of the time they are selling your information to companies that want to sell you stuff.   Almost every single day, very personal information about you is being bought and sold without your permission and it is all perfectly legal. 
DHS       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • AlexanderHiggins State-Of-The Art Long Distance Solar Surveillance Drone Unveiled, A new long distance solar-powered drone is unleashed boasting a tactical aerial sensor system that far exceeds anything in its class.
  • Cnet Tech News First
  • ISP Planet news
  • PrivacyDigest privacy news
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • WMR EMAIL BLOCKING THROUGH CENSORWARE  By Wayne Madsen  U.S. intelligence agency officials, speaking on background, are reporting that the U.S. Department of Homeland Security (DHS), assisted by the Federal Bureau of Investigation (FBI), are intercepting and blocking email from and to selected individuals and organizations within the United States and around the world. Through the use of the same type of web filtering "censorware" employed by state security organizations in China, Saudi Arabia, and Iran, DHS and the FBI have entered into agreements with major Internet Service Providers to intercept and block email for "national security" purposes. 
  • Complete list of DHS monitoring keywords:  Department of Homeland Security (DHS) Federal Emergency Management Agency (FEMA) Coast Guard (USCG) Customs and Border Protection (CBP) Border Patrol Secret Service (USSS) National Operations Center (NOC) Homeland Defense Immigration Customs Enforcement (ICE) Agent Task Force Central Intelligence Agency (CIA) Fusion Center Drug Enforcement Agency (DEA) Secure Border Initiative (SBI) Federal Bureau of Investigation (FBI) Alcohol Tobacco and Firearms (ATF) U.S. Citizenship and Immigration Services (CIS) Federal Air Marshal Service (FAMS) Transportation Security Administration (TSA) Air Marshal Federal Aviation Administration (FAA) National Guard Red Cross United Nations (UN) Assassination Attack Domestic security Drill Exercise Cops Law enforcement Authorities Disaster assistance Disaster management DNDO (Domestic Nuclear Detection Office) National preparedness Mitigation Prevention Response Recovery Dirty bomb Domestic nuclear detection Emergency management Emergency response First responder Homeland security Maritime domain awareness (MDA) National preparedness initiative Militia Shooting Shots fired Evacuation Deaths Hostage Explosion (explosive) Police Disaster medical assistance team (DMAT) Organized crime Gangs National security State of emergency Security Breach Threat Standoff SWAT Screening Lockdown Bomb (squad or threat) Crash Looting Riot Emergency Landing Pipe bomb Incident Facility Hazmat Nuclear Chemical spill Suspicious package/device Toxic National laboratory Nuclear facility Nuclear threat Cloud Plume Radiation Radioactive Leak Biological infection (or event) Chemical Chemical burn Biological Epidemic Hazardous Hazardous material incident Industrial spill Infection Powder (white) Gas Spillover Anthrax Blister agent Chemical agent Exposure Burn Nerve agent Ricin Sarin North Korea Outbreak Contamination Exposure Virus Evacuation Bacteria Recall Ebola Food Poisoning Foot and Mouth (FMD) H5N1 Avian Flu Salmonella Small Pox Plague Human to human Human to Animal Influenza Center for Disease Control (CDC) Drug Administration (FDA) Public Health Toxic Agro Terror Tuberculosis (TB) Agriculture Listeria Symptoms Mutation Resistant Antiviral Wave Pandemic Infection Water/air borne Sick Swine Pork Strain Quarantine H1N1 Vaccine Tamiflu Norvo Virus Epidemic World Health Organization (WHO) (and components) Viral Hemorrhagic Fever E. Coli Infrastructure security Airport CIKR (Critical Infrastructure & Key Resources) AMTRAK Collapse Computer infrastructure Communications infrastructure Telecommunications Critical infrastructure National infrastructure Metro WMATA Airplane (and derivatives) Chemical fire Subway BART MARTA Port Authority NBIC (National Biosurveillance Integration Center) Transportation security Grid Power Smart Body scanner Electric Failure or outage Black out Brown out Port Dock Bridge Cancelled Delays Service disruption Power lines Drug cartel Violence Gang Drug Narcotics Cocaine Marijuana Heroin Border Mexico Cartel Southwest Juarez Sinaloa Tijuana Torreon Yuma Tucson Decapitated U.S. Consulate Consular El Paso Fort Hancock San Diego Ciudad Juarez Nogales Sonora Colombia Mara salvatrucha MS13 or MS-13 Drug war Mexican army Methamphetamine Cartel de Golfo Gulf Cartel La Familia Reynosa Nuevo Leon Narcos Narco banners (Spanish equivalents) Los Zetas Shootout Execution Gunfight Trafficking Kidnap Calderon Reyosa Bust Tamaulipas Meth Lab Drug trade Illegal immigrants Smuggling (smugglers) Matamoros Michoacana Guzman Arellano-Felix Beltran-Leyva Barrio Azteca Artistic Assassins Mexicles New Federation Terrorism Al Qaeda (all spellings) Terror Attack Iraq Afghanistan Iran Pakistan Agro Environmental terrorist Eco terrorism Conventional weapon Target Weapons grade Dirty bomb Enriched Nuclear Chemical weapon Biological weapon Ammonium nitrate Improvised explosive device IED (Improvised Explosive Device) Abu Sayyaf Hamas FARC (Armed Revolutionary Forces Colombia) IRA (Irish Republican Army) ETA (Euskadi ta Askatasuna) Basque Separatists Hezbollah Tamil Tigers PLF (Palestine Liberation Front) PLO (Palestine Liberation Organization Car bomb Jihad Taliban Weapons cache Suicide bomber Suicide attack Suspicious substance AQAP (AL Qaeda Arabian Peninsula) AQIM (Al Qaeda in the Islamic Maghreb) TTP (Tehrik-i-Taliban Pakistan) Yemen Pirates Extremism Somalia Nigeria Radicals Al-Shabaab Home grown Plot Nationalist Recruitment Fundamentalism Islamist Emergency Hurricane Tornado Twister Tsunami Earthquake Tremor Flood Storm Crest Temblor Extreme weather Forest fire Brush fire Ice Stranded/Stuck Help Hail Wildfire Tsunami Warning Center Magnitude Avalanche Typhoon Shelter-in-place Disaster Snow Blizzard Sleet Mud slide or Mudslide Erosion Power outage Brown out Warning Watch Lightening Aid Relief Closure Interstate Burst Emergency Broadcast System Cyber security Botnet DDOS (dedicated denial of service) Denial of service Malware Virus Trojan Keylogger Cyber Command 2600 Spammer Phishing Rootkit Phreaking Cain and abel Brute forcing Mysql injection Cyber attack Cyber terror Hacker China Conficker Worm Scammers Social media
Digital TV       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
 
 
There is a connection between NSA phone records database , Amdocs and 9/11.
DNA databases       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
 
Drones & Balloons, HART / HURT      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Wikipedia The Heterogeneous Aerial Reconnaissance Team (HART) -- formerly known as the "Heterogeneous Urban RSTA Team (HURT)" -- program was an aerial surveillance project funded by the Information Processing Technology Office (which was merged into the Wikipedia Information Innovation Office) of the Defense Advanced Research Projects Agency with program managers John Bay and Michael Pagels. The purpose of the program was to develop systems that could provide continuous, real-time, three-dimensional surveillance of large urbanized areas, using unmanned aerial vehicles. The project team was led by Northrop Grumman corporation, and involved several other academic and corporate researchers.The unique features of the HART program are that it developed systems to "decouple soldiers from flight control" -- that is, the UAVs automatically pilot themselves—taking care of flight control, collision prevention, and camera/sensor control automatically. When the drones notice suspicious activity, they notify the person with the HART control panel so that they can monitor the situation. Another feature of HART was to design handheld devices, to display surveillance video to small unit leaders in the field (as opposed to only being available to officers/agents in a control room). A third significant feature is that troops can request surveillance in an area, and a set of drones will automatically come over and take care of it themselves—all the soldiers have to do is ask for it, and then they can forget about it.
and also see Totse Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA Remember FBI wiretaps of Martin Luther King, 

What are connections between Amdocs, Narus (Semantic Traffic Analysis) and NSA phone records database?  Tony Snow, Carl Cameron, FoxNews report on Israeli art students removed?  Why?

Drug Testing       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
DSL Internet Service  top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Echelon       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Einstein, Network Infrastructure, Deep Packet Inspection
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • RipoffReport Certifion   Certifion Corporation - Locate America ripoff company made additional charges of $60+ to my credit card without my permission Internet *Editor's Suggestions on how to get your money back into your bank account!
  • notes: Accurint, ChoicePoint's Autotrack or LexisNexis
  • GlobalResearch  Under the rubric of cybersecurity, the Obama administration is moving forward with a Bush regime program to screen state computer traffic on private-sector networks, including those connecting people to the Internet, The Washington Post revealed July 3.
  • Certifion
  • Entersect a subsidiary of Certifion,
  • LocatePlus  claims it maintains 12 billion records about 98 percent of Americans.
  • Washington Post
  • notes Despite protests to the contrary by securocrats, like other Bush and Obama “cybersecurity” initiatives the Einstein program is a backdoor for pervasive state surveillance. Government Computer News reported in December 2008 that Marc Rotenberg, the executive director of the Electronic Privacy Information Center (EPIC) said that “the misuse or exposure of sensitive data from such a program [Einstein] could undermine the security arguments for surveillance.”
  • WMR "... WMR has learned from government sources that the Bush administration has authorized massive surveillance of the Internet using as cover a cyber-security multi-billion dollar project called the "Einstein" program.  ...   Billed as a cyber-security intrusion detection system for federal computer systems and networks, WMR has been told that the actual intent of Einstein is to initially monitor the email and web surfing activities of federal employees and contractors and not in protecting government computer systems from intrusion by outsiders.   ...  In February 2008, President Bush signed a directive that designated the National Security Agency (NSA) as the central administrator for the federal government's computer and network security.   ...   Although Einstein is primarily a program under the aegis of the Computer Emergency Readiness Team (US-CERT) of the National Cyber Security Division of the Homeland Security Department, WMR has learned that it has the personal support of Director of National Intelligence (DNI) Mike McConnell, a former NSA director. Einstein is advertised as merely conducting traffic analysis within the dot (.) gov and dot (.) mil domains, including data packet lengths, protocols, source and destination IP addresses, source and destination ports, time stamp information, and autonomous system numbers. However, WMR has learned that Einstein will also bore down into the text of email and analyze message content. In fact, most of the classified budget allotted to Einstein is being used for collecting information from the text of messages and not the header data." full story ... more search terms: PINWHEEL, PINWALE, GCSB, New Zealand, private sector surveillance, black projects, .com, .edu, .int, .gov, .mil, FCC, black budgets, Vodaphone, cellular phone eavesdropping, Greece, locked field, trap door, sub system,
  • GlobalResearch Called the “flagship system” in the national security state’s cyber defense arsenal, The Wall Street Journal reports that Einstein is “designed to protect the U.S. government’s computer networks from cyberspies.” In addition to cost overruns and mismanagement by outsourced contractors, the system “is being stymied by technical limitations and privacy concerns.” According to the Journal, Einstein is being developed in three stages: Einstein 1: Monitors Internet traffic flowing in and out of federal civilian networks. Detects abnormalities that might be cyber attacks. Is unable to block attacks. Einstein 2: In addition to looking for abnormalities, detects viruses and other indicators of attacks based on signatures of known incidents, and alerts analysts immediately. Also can’t block  attacks. Einstein 3: Under development. Based on technology developed for a National Security Agency program called Tutelage, it detects and deflects security breaches. Its filtering technology can read the content of email and other communications. (Siobhan Gorman, “Troubles Plague Cyberspy Defense,” The Wall Street Journal, July 3, 2009)
Electronic Passport, top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Notes: search terms, carrier-grade networks, NetDiscovery, IP-based, intelligent infrastructure services, IP security and compliance management, NarusSecure, monitoring, VOIP, IMS, IPTV, real-time traffic insight, NarusInsight, 
Email Surveillance, top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Notes: search terms, carrier-grade networks, NetDiscovery, IP-based, intelligent infrastructure services, IP security and compliance management, NarusSecure, monitoring, VOIP, IMS, IPTV, real-time traffic insight, NarusInsight, 
Entersect       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • RipoffReport Certifion   Certifion Corporation - Locate America ripoff company made additional charges of $60+ to my credit card without my permission Internet *Editor's Suggestions on how to get your money back into your bank account!
  • notes: Accurint, ChoicePoint's Autotrack or LexisNexis
  • Certifion
  • Dept of Homeland Security  domestic spying
  • Entersect a subsidiary of Certifion,
  • FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down.
  • LocatePlus  claims it maintains 12 billion records about 98 percent of Americans.
  • Washington Post
  • WayneMadsenReport An April 2, 2008 article in The Washington Post by Robert O'Harrow that reported on the expansion of intelligence "fusion centers" around the country that are compiling personal information on Americans from a CIA database called "Proton," the FBI, police departments, and private data mining firms referred to a little-known private data company called Entersect, which is routinely tapped by Maryland law enforcement and homeland security entities.  ...  The Post article stated that Entersect has 12 billion files on 98 percent of Americans. Entersect is headquartered in Santa Ana, California and is a subsidiary of Certifion Corporation, which is, in turn, a wholly-owned subsidiary of LocatePlus Holdings Corporation. LocatePlus' other subsidiaries are LocatePlus Corp., Dataphant, Inc. (which acquired Voice Power Technology, Inc.), and Metrigenics, Inc., a biometrics firm.
  • WMR  NSA / Trailblazer   More high-level fraud at NSA uncovered    January 18-19, 2012 --   WMR's sources at the National Security Agency (NSA) have reported more high-level fraud at the agency that now combines signals intelligence and cyber-warfare functions under one officer, Army General Keith Alexander, the NSA director and commander of the U.S. Cyber Command.    ...   When Alexander's predecessor at NSA, Air Force General Michael Hayden, was shopping for his own replacement, Alexander was the Deputy Chief of Staff for G-2 for the U.S. Army. Alexander would only take the job, according to our sources who were embedded in the Director of NSA's office, if Dr. James Heath became the senior science adviser to Alexander at NSA.    ...   There was only one problem. Heath had his own company, Object Sciences Corporation, a firm which was intimately involved with tracking "Al Qaeda" operatives prior to the 9/11 attacks. Object Sciences provided deep data mining services to the Army's Land Information Warfare Agency's and Defense Intelligence Agency's ABLE DANGER and its affiliated DORHAWK GALLEY data mining programs.    ...   At the same time, Hayden had shown favoritism to Science Applications International Corporation (SAIC) in awarding the firm, as prime contractor, the over one billion dollar signals intelligence overhaul program known as TRAILBLAZER. Hayden hired William Black, a former NSA official who had retired and went to work for SAIC, as his Deputy Director at NSA. The issue with Heath was solved when SAIC purchased Object Sciences, providing a handsome profit to Heath prior to his taking the science adviser position under his friend Alexander. Black eventually returned to SAIC from his stint as NSA deputy director.    ...   The following press release was issued on May 12, 2005: "Science Applications International Corp. has completed its acquisition of Object Sciences Corp., the company announced today. Terms of the deal were not disclosed . . . OSC's involvement in reshaping how intelligence surveillance and reconnaissance information is processed and analyzed has provided critical assistance to combat forces in specific theaters, such as Iraq and Korea, as well as the war on global terrorism in general, SAIC said."    ...   Alexander took over as NSA director on August 1, 2005, a few months after the SAIC-OSC deal. Heath then became Alexander's chief science adviser.     ...   Another former SAIC principal who, like Black, transitioned from SAIC to NSA and back again to SAIC was Sam Visner. After joining NSA from SAIC, Visner was the senior acquisition manager for NSA and was key to the award of the TRAILBLAZERcontract to SAIC. A less expensive signals intelligence re-engineering solution code-named THIN THREAD, was rejected by NSA in favor of the TRAILBLAZER, which was later canceled after SAIC pocketed hundreds of millions of dollars.    ...   Hayden went on to become the first deputy Director of National Intelligence and, ultimately, the CIA director. He now works with former Homeland Security Secretary Michael Chertoff at Chertoff Group. His pet project, TRAILBLAZER, was canceled due to cost overruns and failed deliveries and was replaced by another reported contractor boondoggle called TURBULENCE. A number of senior NSA, Justice Department, and congressional officials were harassed and one, Thomas Drake, prosecuted for revealing the corruption. Those coming under NSA and FBI scrutiny, all subjected to harassment and threat of prosecution, included, in addition to Drake, Justice Department prosecutor Thomas Tamm, House Intelligence Committee budget specialist Diane Roark, NSA officials William Binney, Kirk Wiebe, and Ed Loomis, and others, never mentioned in press accounts, who were interviewed by WMR.    ...   One former NSA official who was terminated and then placed under NSA Security and FBI surveillance after reporting through proper channels fraud, waste, and abuse with TRAILBLAZER and associated contracts, told WMR, "we are not whistleblowers but witnesses to major crimes committed by NSA and contractors."    ...   Among the spin-offs of TRAILBLAZERwas the unconstitutional STELLAR WIND program that permitted NSA to engage in wholesale warrantless wiretapping of phone calls, emails, and faxes, particularly journalists and elected political leaders.    ...   Hayden, who has become a national security adviser to Mitt Romney and would be assured a top-level job in a Romney administration, perhaps National Security Adviser, is also involved with a subscription web service called LIGNet, or "Langley Intelligence Group Network" as a "LIGNet adviser." WMR has been told by intelligence community insiders that LIGNet is an operational security (OPSEC) problem because a wealth of borderline classified information appears on the web site.    ...   Some of the LIGNet information makes what was released in the WikiLeaks Department of State cable release pale in comparison. As for charges that Private First Class Bradley Manning was responsible for downloading over a quarter million classified cables from the Secret Internet Protocol Router Network (SIPRNet), a former senior NSA official told WMR: "That is impossible. All SIPRNet drives are non-writable for CDs and as far as thumb drives are concerned, install one and security alarms are immediately set off."
EZPass       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • AP Yahoo story below
  • MotorAuthority  Kapsch has a ten-year agreement in place to provide transponders for 22 electronic toll systems across the United States. Kapsch’s latest patent filing is for a transponder equipped with a multi-function camera system, for the purpose of verifying the number of occupants within a vehicle. In other words, future Kapsch transponders may have the ability to monitor the inside of your car.
  • FBI
  • FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down.
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • MotorAuthority  Automated toll transponder systems, like EZ Pass used in the Northeast, make life easier for those who commute on toll roads, across bridges and through tunnels. Despite initial paranoia over the devices’ ability to track your speed from one point to another, no tickets have ever been issued to motorists who arrived at a toll plaza early, courtesy of a heavy right foot. With that in mind, there are two ways to look at the latest advance in transponder systems: it’s either no big deal, or it’s the stuff of an Oliver-Stone-film-induced nightmare. Kapsch TrafficCom AG is an Austrian company that manufactures transponders for programs such as EZ Pass. In fact, Kapsch has a ten-year agreement in place to provide transponders for 22 electronic toll systems across the United States. Kapsch’s latest patent filing is for a transponder equipped with a multi-function camera system, for the purpose of verifying the number of occupants within a vehicle. In other words, future Kapsch transponders may have the ability to monitor the inside of your car.
Facial Recognition, NGI      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • AP Yahoo story below
  • RT reported on the FBI’s ramped up efforts to implement a vast state-of-the-art face recognition project across the entire country, a system that has so far cost the Federal Bureau of Investigation at least $1 billion and has involved no fewer than seven years’ worth of development. Defense contractors Lockheed Martin were awarded the contract in 2008 and with that were tasked with creating the Next Generation Identification (NGI) program, an intelligence infrastructure that the FBI insisted must be able to identify subjects in public databases, conduct automated surveillance and track personal movement from place-to-place.
FBI Tracking Devices      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Ifixit We partnered with Wired to bring you a peek inside an FBI car-tracking device. The device is similar to the one Yasir Afifi found underneath his car.
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • AP Yahoo story below
  • TechDirt William Binney
  • FBI
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • Ifixit We partnered with Wired to bring you a peek inside an FBI car-tracking device. The device is similar to the one Yasir Afifi found underneath his car. If you're curious where this one came from, Wired has posted a writeup about Kathy Thomas, the woman who found this tracker under her car. They've also posted a video of Kyle doing the teardown.   ...  The device comprises of a GPS unit for receiving the car's position, an RF transmitter for relaying your location to the interested authority (aka the FBI), and a set of sweet D-cell batteries that power the whole enchilada. But we didn't stop there, of course. Read on to find out exactly what components make this secretive device tick.    ...   Disclaimer: We love the FBI. We've worked with them on several occasions to fight crime and locate criminals. We've helped them with instructions on gaining entry into certain devices. We have nothing against them, and we hope they don't come after us for publishing this teardown.
FBI, CIA Surveillance      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • FBI
  • FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down.
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
FDIC Bank Transaction Surveillance    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • FBI
  • FDIC
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • FDIC The FDIC has prescribed in its regulations, Section 326, Subpart B- Procedures for Monitoring Bank Secrecy Act Compliance (12 CFR Part 326.8) a requirement that depository institutions establish and maintain procedures reasonably designed to assure and monitor the compliance with the BSA and the implementing regulations 31 CFR 103. The FDIC monitors compliance with the BSA-related regulations by conducting on-site examinations of every FDIC-supervised depository institutions. BSA compliance is a safety and soundness issue due to the reputational, regulatory, legal, and financial risk exposure to the bank for being involved in money laundering schemes or willfully violating the BSA statute. Civil money penalties and regulatory enforcement actions may be imposed for noncompliance with money laundering regulations which can endanger capital and earnings. Furthermore, banks may be criminally prosecuted for willful violations of money laundering statutes, which could ultimately lead to termination of FDIC insurance.
  • Wikipedia The Bank Secrecy Act of 1970 (or BSA, or otherwise known as the Currency and Foreign Transactions Reporting Act) requires financial institutions in the United States to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, and file reports of cash purchases of these negotiable instruments of more than $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. Many banks will no longer sell negotiable instruments when they are purchased with cash, requiring the purchase to be withdrawn from an account at that institution. The BSA was originally passed by the Congress of the United States in 1970, and amended several times since then, including provisions in title III of the USA PATRIOT Act. (See 31 USC 5311-5330 and 31 CFR Chapter X.) The BSA is sometimes referred to as an "anti-money laundering" law ("AML") or jointly as “BSA/AML”. [1]
FEMA secret databases, Main Core, Pinwale    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Earthrights International the power of law, people in defense of human rights  We document human rights and environmental abuses in countries where few other organizations can safely operate. We expose and publicize earth rights abuses through campaigns, reports and articles.
  • FBI
  • FEMA
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • Wikipedia  Main Core is the code name of a database maintained since the 1980s by the federal government of the United States. Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database's name derives from the fact that it contains "copies of the 'main core' or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community." The Main Core database is believed to have originated with the Federal Emergency Management Agency (FEMA) in 1982, following Ronald Reagan's Continuity of Operations plan outlined in the National Security Directive (NSD) 69 / National Security Decision Directive (NSDD) 55, entitled "Enduring National Leadership," implemented on September 14, 1982. As of 2008 there are reportedly eight million Americans listed in the database as possible threats, often for trivial reasons, whom the government may choose to track, question, or detain in a time of crisis. The existence of the database was first reported on in May 2008 by Christopher Ketcham and in July 2008 by Tim Shorrock.
  • WMR has now learned details of the Bush surveillance plan that so upset the Justice Department that there could have been a mass exodus in March 2004. In the 1980s, the Federal Emergency Management Agency (FEMA), then run by one of Ronald Reagan's cronies from California, former California National Guard commander Gen. Louis Giuffrida, managed to obtain from the FBI a list of some 12,000 names contained in the FBI's domestic intelligence files. When FBI Director William Webster learned that Giuffrida had used the list as a basis to create a database of 100,000 American citizens who were considered threats to national security, he demanded that Giuffrida return the list and all copies to the FBI. The list contained the names of individuals opposed to U.S. policies in Central America, tax protesters, and people known as survivalists.    ...   However, FEMA did not return all of the copies of its lists to the FBI. In the 1980s, White House official Oliver North, working with FEMA, developed a "continuity of government" contingency plan called REX-84, or "Readiness Exercise 1984," that would have instituted plans to round up and intern hundreds of thousands of American citizens in the event martial law was declared. Then-Attorney General William French Smith formally protested the existence of the North-Giuffrida plan to National Security Adviser Robert McFarlane. ...   FEMA, unknown to Congress, the Justice Department, and other agencies, continued to maintain its database of Americans at its underground bunker in Mount Pony in Culpepper, Virginia. After FEMA closed the Mount Pony facility, the database was moved to another secret FEMA facility.   ...   According to our well-informed sources, Card and Gonzales were trying to get Justice's approval on the reinstatement of the old FEMA plan to target American citizens with warrantless surveillance and possible incarceration pursuant to unconstitutional presidential fiat.   ...   What occurred in Ashcroft's hospital room on March 10, 2004, was a replay of 1984. Then, it was Webster and Smith who opposed North and Giuffrida on maintaining a secret database of U.S. citizens. In March 2004, it was Ashcroft, Comey, and FBI Director Robert Mueller who opposed Card's and Gonzales' illegal targeting of American citizens.    ...   After 9/11, the Bush White House used FEMA's secret and illegal database of American citizens, code-named Main Core, to target American citizens with electronic and other surveillance. FEMA's database had increased in size with the addition of raw telecommunications intercept data on American citizens obtained from the National Security Agency (NSA). Records obtained from NSA by Freedom of Information Act requests indicate that the NSA's General Counsel's office was objecting as early as 1999 to attempts by outside "consumers" of its intelligence to obtain access to raw intercept data from NSA databases.
 
FirstFruits, Warrantless Surveillance of American Journalists       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  and NSA lawsuit
  • Arstechnica  evesdropping on American Journalists, for data mining,.
  • Electronic Frontier Foundation working to protect civil and free speech
  • Big Brother and the ministry of Homeland Security
  • DailyKOS
  • Insider Magazine reprint Madsen  Bill Gertz of The Washington Times features prominently in the database. Before Hayden's reign and during the Clinton administration, Gertz was often leaked classified documents by anti-Clinton intelligence officials in an attempt to demonstrate that collusion between the administration and China was hurting U.S. national security.
  • Arstechnica  evesdropping on American Journalists, for data mining,.
  • notes: WMR has learned from additional National Security Agency (NSA) sources that this editor's (Madsen) communications -- cell phone, e-mail, text messages, and faxes -- are under a full digital interception order by the NSA. Previously, I was informed by NSA sources that a "full digital" surveillance package was authorized on all my communications.  ...   It is becoming apparent that the "Eyes Only"/compartmented code word program authorized by President George W. Bush and Vice President Dick Cheney in the wake of the 9/11 attacks included warrantless surveillance of American journalists and their sources. WMR exposed the existence of a database containing journalist surveillance data that was code-named "FIRSTFRUITS" before the code name was changed after our disclosure.
  • What is Tearerism ?
  • Summary
  • NSA listening to private conversations of  Americans, data mining, blackmail? ABCNews , Senate Intelligence Committee, Jay Rockefeller investigating. 
  • FIRSTFRUITS NSA wiretaps of American Journalists, program revealed by Wayne Madsen, name of program then changed.  WMR  Higher Than Top Secret
  • Daily Newscaster Martial Law Training, Indianapolis --- June, 2008
  • Neil Entwistle, 911, FAA, NORAD, Ptech, foreknowledge of 911 communication systems role in 911, convicted of murder, questionable trial, proceedings.
 
  • ABCNews
  • Dept of Homeland Security  domestic spying
  • FBI
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • Whitehouse  Bush
  • Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • UPI  file  In order that the database did not violate United States Signals Intelligence Directive (USSID) 18, which specifies that the names of "U.S. persons" are to be deleted through a process known as minimization, the names of subject journalists were blanked out. However, in a violation of USSID 18, certain high level users could unlock the database field through a super-user status and view the "phantom names" of the journalists in question. Some of the "source" information in FIRSTFRUITS was classified—an indication that some of the articles in database were not obtained through open source means. In fact, NSA insiders report that the communications monitoring tasking system known as ECHELON is being used more frequently for purely political eavesdropping having nothing to do with national security or counter terrorism.
  • WMR  August 18, 2008 -- NSA continues surveillance of journalists; WMR editor subject of espionage investigation  ...  On May 10, 2005, WMR reported on the existence of a highly-classified database at the National Security Agency (NSA), formerly code-named "FIRSTFRUITS," that monitored journalists who reported on the activities of the eavesdropping agency, as well as other intelligence matters. A few weeks later, according to an executive-level source at the NSA, and confirmed by a related source within NSA's "Q" Directorate, the Directorate for Security and Counterintelligence, this editor has been a subject of a national security investigation since June 2005 that remains ongoing. The investigation of this editor is classified at the level SECRET/COMINT (NOFORN). COMINT is "Communications Intelligence" and NOFORN denotes "Not Releasable to Foreign Nationals/Governments/Non-US Citizens."   ...   According to National Security Agency/Central Security Service Policy 1-27, dated March 20, 2006 and signed by NSA Chief of Staff Deborah Bonanni, the investigation of the public disclosure of the unconstitutional and illegal FIRSTFRUITS surveillance system would be coordinated by the NSA, Department of Defense, Director of National Intelligence, and the Department of Justice.
  • WMR  Higher Than Top Secret  "One of the most classified surveillance programs in the Bush administration was so limited in access only very few individuals, including President George W. Bush, Vice President Dick Cheney, Cheney Chief of Staff David Addington, CIA director Michael Hayden, FBI director Robert Mueller, then-White House Chief of Staff Andrew Card, and three successive Attorneys General -- John Ashcroft, Alberto Gonzales, and Michael Mukasey -- know of its existence.  ...   Known by a code word, sometimes abbreviated, following the classification TOP SECRET - EYES ONLY and which was contained on some files that Gonzales took home with him and kept in an unsecured manner against Justice Department regulations, the warrantless National Security Agency (NSA) surveillance program was so beyond legality that acting Attorney General James Comey refused to re-certify it upon its expiration in March 2004. There is a strong possibility that the code word program was connected to the NSA surveillance program aimed at tracking down leaks of classified information to the media from government sources. The leak tracking program was code named FIRSTFRUITS. Due the program's revelations by WMR, NSA has renamed the operation with a new code word. Previously, WMR learned from an informed source that part of the domestic surveillance system may have also involved a Federal Emergency Management Agency (FEMA) database of suspect Americans. The database is called Main Core. "
  • DailyKOS "Apparently, they've also been spying on other members of the government who may have been potential whistleblowers, journalists and even members of Congress. ... NSA spied on its own employees, other U.S. intelligence personnel, and their journalist and congressional contacts. WMR has learned that the National Security Agency (NSA), on the orders of the Bush administration, eavesdropped on the private conversations and e-mail of its own employees, employees of other U.S. intelligence agencies -- including the CIA and DIA -- and their contacts in the media, Congress, and oversight agencies and offices. ... The journalist surveillance program, code named "Firstfruits," was part of a Director of Central Intelligence (DCI) program that was maintained at least until October 2004 and was authorized by then-DCI Porter Goss. Firstfruits was authorized as part of a DCI "Countering Denial and Deception" program responsible to an entity known as the Foreign Denial and Deception Committee (FDDC). Since the intelligence community's reorganization, the DCI has been replaced by the Director of National Intelligence headed by John Negroponte and his deputy, former NSA director Gen. Michael Hayden."
  •  Wired blog  "Inside Operation Highlander: the NSA's Wiretapping of Americans Abroad  ...   A top secret NSA wiretapping facility in Georgia accused of spying on Americans illegally was hastily staffed with inexperienced reservists in the months following September 11, where they worked under conflicting orders and with little supervision, according to three former workers at the spy complex.   ...    "Nobody knew exactly what the heck we were doing," said a former translator for the project, code named Highlander, who spoke on condition of anonymity. "We were figuring out the rules as we were going along."   ...   Former Army Reserve linguist Adrienne Kinne, who worked at the facility at Fort Gordon, won new attention this week for her year-old claim that she and her group intercepted and transcribed satellite phone calls of American civilians in the Middle East for the National Security Agency. Senate intelligence committee chair Jay Rockefeller (D-W.Va.) opened a probe into the alleged abuses after ABC News reported on them Thursday." Oct 2008
Garden Plot, Blog Tracking, Database Theft  top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*

Go to Bush / Obama warrantless surveillance of American Journalists...program: FirstFruits

  • Garden Plot  Summary
  • Wikipedia  Operation Garden Plot, also known as The Department of Defense Civil Disturbance Plan (18 USC 1385 Posse Comitatus Act) is a general U.S. Army and National Guard plan to respond to major domestic civil disturbances within the United States. The plan was developed in response to the civil disorders of the 1960s and is now under the control of the U.S. Northern Command (NORTHCOM). It provides Federal military and law enforcement assistance to local governments during times of major civil disturbances.  (inluding 9/11)
  • WMR has learned that the thefts of personal data from corporations and government agencies, most of which were accomplished by stealing computer hard drive devices, is more than coincidental. Intelligence sources report that many of the large scale thefts are part of a well-planned covert intelligence operation to obtain data on hundreds of millions of people in order to accomplish what former Defense Advanced Research Projects Agency (DARPA) official John Poindexter was not able to bring about through his defunct (but secretly restored) Total Information Awareness (TIA) system   more below
  • TechDirt William Binney
  • Neil Entwistle, 911, FAA, NORAD, Ptech

 

  • WMR  has been reporting on the covert U.S. intelligence operation to steal personal data to populate the databases of a renewed Total Information Awareness surveillance system. Even the Transportation Security Administration (TSA) has not been immune to this covert operation. A computer hard drive containing the Social Security Numbers, dates of birth, and financial information on 100,000 employees of TSA who worked for the agency between January 2002 and August 2005 was stolen from a secure area within the TSA headquarters in Arlington, Virginia.    The theft of personal information over the past few years has included personal information on millions of Americans, Britons, Canadians, and Australians (four of the five members of the secret UKUSA signals intelligence sharing alliance). Some of the funding for the joint National Security Agency-Department of Homeland Security "black bag" project, according to our sources, is laundered through classified contracts at the Department of Energy.   wmr
  • Wikipedia The Operation Garden Plot is a map of the U.S. Army and the National Guard of the United States to respond to major disasters in civil society within the United States. The plan was developed in the 1960s to respond to civil disorder and is now under the control of Northern Command ( NORTHCOM ). It allows the military to help U.S. federal law enforcement to assist local governments in the States of the United States for public order problems. Operation Garden Plot was implemented to provide military assistance to civil authorities during the attacks of September 11, 2001 in New York triggering the operation Noble Eagle Protection airspace. The Pentagon has also developed this project to restore public order during the 1992 riots in Los Angeles . "The monitoring of these missions on national security should be provided by the NGB (National Guard Bureau) based on the model" Garden Plot "to which National Guard units are trained and equipped to support our missions to the civil authorities Crowd control problems and maintaining public order. " 1
  • AngelBabe43 Operation Cable Splicer and Garden Plot are the two sub programs which will be implemented once the Rex 84 program is initiated for its proper purpose. Garden Plot is the program to control the population. Cable Splicer is the program for an orderly takeover of the state and local governments by the federal government. FEMA is the executive arm of the coming police state and thus will head up all operations. The Presidential Executive Orders already listed on the Federal Register also are part of the legal framework for this operation.
  • WMR has been investigating a covert operation involving active duty and reserve U.S. military personnel who infiltrate anti-war groups in the United States, particularly Iraq and Afghanistan veterans groups opposed to the Bush administration's war policies.  The move by the Bush administration appears to be a resurrection of Operation Garden Plot, a 1960s program that saw the use of National Guard units to quell civil disturbances in the United States, in addition to the infiltration of anti-war groups by National Guard and Reserve intelligence personnel.  
  • WMR On April 11, 2002, Major General (ret.) Richard Alexander, the executive director of the National Guard Association of the United States, tipped his hand on Garden Plot when he testified before the Senate Appropriations Committee on Homeland Defense. Alexander stated, "Oversight of these homeland security missions should be provided by the National Guard Bureau based on the long-standing Garden Plot model in which National Guard units are trained and equipped to support civil authorities in crowd control and civil disturbance missions."  The governing directive for Garden Plot is Department of Defense Civil Disturbance Plan 55-2, Garden Plot. The Air Force implements Garden Plot in United States Air Force Civil Disturbance Plan 55-2, Garden Plot, dated July 11, 1984, while the Army implements Garden Plot with Department of the Army (DA) Civil Disturbance Plan - GARDEN PLOT, dated March 1, 1984.  Acting in coordination with the FBI's Domestic Counter-Intelligence Program (COINTELPRO), military intelligence agents infiltrated anti-war groups like the Vietnam Veterans Against the War (VVAW).  

 

Geographic Information Systems GIS,      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
GPS Location Technology       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Health Information Systems       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • History of the Internet DARPA
  • Tetradyne Jeffrey Engel, M.D. State Epidemiologist NC DHHS, Division of Public health  Presentation – NC initiatives Homeland Security Presidential Directive-21 October 18,, 2007 Calls on the federal DHHS to "establish an operational national epidemiologic surveillance system for human health, with international connectivity where appropriate,
  • Tetradyne Biosurveillance:: Big Brother or Homeland Security? Jeffrey Engel, M.D. State Epidemiologist NC DHS, Division of Public health  Presentation – NC initiatives Homeland Security Presidential Directive-21 October 18,, 2007 Calls on the federal DHS to "establish an operational national epidemiologic surveillance system for human health, with international connectivity where appropriate, that is predicated on State, regional, and community-level capabilities and creates a networked system to allow for two-way information flow between and among Federal, State, and local government public health authorities and clinical health care providers." Key Terms Operational: organizational expertise and resources that produce real information products as early as possible National: emphasis is on the national picture and reflects a gap in nationwide perspective International connectivity: this national picture should look toward early detection and characterization of external threats to human health that could be imported Predicated on…build first on what exists and establish current capabilities
Infragard   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Inslaw, PROMIS       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Earthrights International the power of law, people in defense of human rights  We document human rights and environmental abuses in countries where few other organizations can safely operate. We expose and publicize earth rights abuses through campaigns, reports and articles.
  • Space Today Satellite wars,
  • Space Daily
  • TechDirt William Binney
  • Wikipedia Inslaw, Inc. is a small, Washington, D.C.-based, information technology company. In the mid-1970s, Inslaw developed for the United States Department of Justice a highly efficient, people-tracking, software program known as: Prosecutor's Management Information System (Promis). Inslaw's principal owners, William Anthony Hamilton and his wife, Nancy Burke Hamilton, later sued the United States Government (acting as principal to the Department of Justice) for not complying with the terms of the Promis contract and for refusing to pay for an enhanced version of Promis once delivered. This allegation of software piracy led to three trials in separate federal courts and two congressional hearings. During ensuing investigations, the Department of Justice was accused of deliberately attempting to drive Inslaw into Chapter 7 liquidation; and of distributing and selling stolen software for covert intelligence operations of foreign governments such as Canada, Israel, Singapore, Iraq, Egypt, and Jordan; and of becoming directly involved in murder. Later developments implied that derivative versions of Enhanced Promis sold on the black market may have become the high-tech tools of worldwide terrorists such as Osama Bin Laden and international money launderers and thieves. more
Insurance Inspection, satellite       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Internet,  Traffic Analysis, ISP  top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*

 

 

  • CBS down
  • C/Net downloads, spyware
  • Findlaw, Dean
  • History of the Internet DARPA
  • Info / Law, Harvard Blog filtering, modes of internet regulation: code, law, markets, and social norms  LINKS
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective 
  • MSNBC  VOIP Blocking
  • Narus Bill Crowell,  past positions have included President and Chief Executive Officer of Cylink, a leading provider of e-business security solutions as well as a series of senior positions at the National Security Agency, including Deputy Director of Operations and Deputy Director of the Agency
  • New York Times NSA executive order authorizing data mining of phone calls and file Dec 16, 2005
  • OpenNet Initiative, search Narus
  • Notes: search terms, carrier-grade networks, NetDiscovery, IP-based, intelligent infrastructure services, IP security and compliance management, NarusSecure, monitoring, VOIP, IMS, IPTV, real-time traffic insight, NarusInsight, 
  • Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links
  • Skype VOIP blocking
  • USA Today NSA has massive database of Americans' phone calls
  • Vonage search VOIP blocking
  • Wired News, Mark Klein, "Whistleblower Outs NSA Spy Room  ... Klein's job eventually included connecting internet circuits to a splitting cabinet that led to the secret room. During the course of that work, he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego."
  • Are Republicans who oppose Bush warrantless spying  irrelevant and impotent?
  • Center for Strategic and International
  • Comda Ltd. Israel
  • ComSign, Israel
  • FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down.
  • Narus Partners see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems...more
  • Republicans who are against Bush warrantless spying are an irrelevant impotent.
  • Defense Tech Telcos Deny NSA Ties - and Allowed to Lie?
  • Mathaba search content based billing, VOIP  blocking
  • Narus see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems.
  • Narus / Verisign  IP lawful intercept
  • NICE, Shami, Shamir, Oz, Cohen, Huberman,  Menkes, Shaul, Zaltzman, Eidelman, Gorev, Ginat ...
  • Verisign Sclavos, Evan, Korzenliewski, Lin, Balogh, Haddad, McLaughlin, Ulam, Bidzos, Chenevich, 
  • Verso Technologies Inc, VOIP Blocking

 

  • PressTV U.S. companies are involved in providing technology that helps the Egyptian government to crack down on communications and monitor protestors on the Internet and mobile phones. ... A U.S. company appears to have sold Egypt technology to monitor Internet and mobile phone traffic that is possibly being used by the ruling regime to crack down on communications as protests erupt throughout the country. ...
    Boeing-owned, California-based company Narus sold Telecom Egypt, the state-run Internet service provider, "real-time traffic intelligence" equipment, more commonly known as Deep Packet Inspection (DPI) technology. Common Dreams ,,, HIGHLIGHTS
    The company is also known for creating "NarusInsight," a supercomputer system allegedly used by US' National Security Agency and other entities to perform mass surveillance and monitoring of public and corporate Internet communications in real time. Common Dreams ...
    Telecom Egypt, the nation's dominant phone and Internet service provider, is a state-run enterprise, which made it easy on Friday morning for authorities to pull the plug and plunge much of the nation into digital darkness. .... Narus provides Egypt Telecom with Deep Packet Inspection equipment (DPI), a content-filtering technology that allows network managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers on the information superhighway. ... "Anything that comes through (an Internet protocol network), we can record," Steve Bannerman, Narus' marketing vice president, once boasted to Wired about the service. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls.” ... Earlier this week, Secretary of State Hillary Clinton urged Egypt's government "not to prevent peaceful protests or block communications, including on social media.” Huffington Post .... FACTS & FIGURES Narus, now owned by Boeing, was founded in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and large corporate clients. ... In addition to Narus, there are a number of companies, including many others in the United States, that produce and traffic in similar spying and control technology: Zeugma Systems (Canada), Camiant (USA), Procera Networks (USA), Allot (Israel), Ixia (USA), AdvancedIO (Canada) and Sandvine (Canada), among others. ... When commercial network operators use DPI, the privacy of Internet users is compromised. But in government hands, the use of DPI can crush dissent and lead to human rights violations. ... Virtually all internet access in Egypt is cut off as the government battles to contain the street protests that threaten to topple President Hosni Mubarak. Telegraph HJ/KA/DB... more search terms: Egypt, Elbaradai, Tunisia, Algeria, Tunisia, protest, regime change,
Israel / Mossad   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • WMR  A list of 90 contract security guards at the U.S. embassy in San Jose, Costa Rica, all employees of the U.S. private security firm EOD Technology, Inc. (EODT) of Lenoir City, Tennessee, was being maintained by a suspected leader of a Mossad cell operating in the Central American nation.   ...   In an e-mail to WMR, a spokesperson for EODT stated: "EOD Technology, Inc. has a longstanding and strict practice of not providing or confirming any information about its employees, customers or contracts, and will not in this case." Although WMR already decided not to publish the list of the contract security guards, which we obtained from our Latin American intelligence sources, EODT reinforced the sensitivity of the information by stating, "We would hope that you consider the ramifications of releasing individual names in this context, as it may endanger them."   ...   In addition to the 90 security guards, the Mossad cell in San Jose maintained information on the vehicles used to transport State Department and other personnel to and from the U.S. embassy to the San Jose international airport, as well as the alternating routes used by the vehicles. Over the past two months the Mossad cell has vanished from their known front businesses in San Jose, which included a Krav Maga (Israeli self defense) instructor school, a restaurant, and a bar.     ...   According to leaked State Department cables, distributed by WikiLeaks, Israeli private security firms and Israeli security consultants operating in Latin America are considered suspect by U.S. diplomats in the region. Among those highly suspect by the State Department is retired Israeli Defense Force Major General Yisrael Ziv who heads the Israeli security company Global CST .    ...   In a cable dated December 17, 2009, U.S. ambassador to Panama Barbara Stephenson raised the issue of Ziv's work for the Panamanian government with Panama's president Ricardo Martinelli. The cable stated: more   In WMR's January 4 report, it was revealed that the Mossad cell in Costa Rica had recruited double agents inside the Shining Path. Coupled with the attempt by Global CST to sell classified Colombian documents to the FARC and the Israelis' dealings with the Shining Path of Peru, it appears that the Israeli gambit is to sign multi-million dollar security contracts with countries like Colombia and Peru and then offer to sell classified Colombian and Peruvian counter-insurgency information on the FARC and Shining Path to those very groups.   ...   Israeli security firms have also been active in Africa. Ziv and Global CST, which had also hired former Foreign Minister Shlomo Ben Ami and Tel Aviv police commissioner David Tzur, were involved in providing security support for Guinean leader Captain Moussa Dadis Camara, who seized power in a December 2008 coup d'etat. The Israeli services were provided in contravention of a U.N. military embargo on Guinea. Global CST has also provided services to Togo, Equatorial Guinea, Gabon, and Nigeria.  more

Liberty Alliance Project   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • History of the Internet DARPA
  • ISP Planet news
  • Wikipedia  The Liberty Alliance was formed in September 2001 by approximately 30 organizations to establish open standards, guidelines and best practices for identity management. Today it has a global membership of more than 150 organizations, including technology vendors, consumer-facing companies,
  • Security Focus News Microsoft
  • SecureLab Computer security news and consulting
  • USA Today NSA has massive database of Americans' phone calls
  • Wikipedia  The Liberty Alliance was formed in September 2001 by approximately 30 organizations to establish open standards, guidelines and best practices for identity management. Today it has a global membership of more than 150 organizations, including technology vendors, consumer-facing companies, educational organizations and governments from around the world, as well as hundreds of additional organizations that participate in Liberty's various open community Special Interest Groups (SIGs). It has released Frameworks that address Federation (since contributed to OASIS for the SAML standard), Identity Assurance, Identity Governance, and Identity Web Services, as various services applications. It has also been active in privacy and policy issues relative to identity. As of 2006, the Liberty Alliance has tracked well over one billion Liberty-enabled identities and devices in fields as diverse as defense & law enforcement to telecommunications to egovernment. Management Board members include AOL, British Telecom, Computer Associates (CA), Fidelity Investments, Intel, Internet Society (ISOC), Novell, Nippon Telegraph and Telephone (NTT), Oracle Corporation and Sun Microsystems. As of June 2009, the work of the Liberty Alliance is transitioning to the Kantara Initiative.
MATRIX  Multi-State Anti-Terrorism Information Database, NCTC top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • OccupyCorporatism American has quickly grown into a big brother control and surveillance nation. Internet Service Providers (ISP) will begin the biggest civilian surveillance operation in history. On July 12, 2012, your ISP will be watching your movements on the internet. They will profile your activity and report to the Motion Picture Association of American (MPAA), Recording Industry Association of America (RIAAA) and National Security Agency (NSA) under direction of the Obama administration. Their goal: to penalize as many internet users as it takes to justify their infringement on our right to freedom of information.   ...   A facility in Utah has been built to assist the NSA and CIA in spying more efficiently on Americans. Every mode of communication (i.e. text messages, emails, phone calls, internet activity, etc . . . ) will be recorded, deciphered and filed for use at the distraction of the US government.   ...   Department of Justice Attorney General Eric Holder has signed new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.
Microsoft Explorer   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Rupert Murdoch   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Wikipedia Murdochgate The News International phone-hacking scandal — dubbed "Hackgate", "Rupertgate", or "Murdochgate" by the press — is an ongoing controversy involving the defunct News of the World and other British newspapers published by News International, a subsidiary of News Corporation. Employees of the newspaper were accused of engaging in phone hacking, police bribery, and exercising improper influence in the pursuit of publishing stories. Investigations conducted from 2005–2007 concluded that the paper's phone hacking activities were limited to celebrities, politicians and members of the British Royal Family. In July 2011, it was revealed that the phones of murdered schoolgirl Milly Dowler, relatives of deceased British soldiers, and victims of the 7/7 London bombings were also accessed, resulting in a public outcry against News Corporation and owner Rupert Murdoch. Advertiser boycotts contributed to the closure of the News of the World on 10 July, ending 168 years of publication.[1] Continued public pressure later forced News Corporation to cancel its proposed takeover of the British telecommunications company BSkyB. British prime minister David Cameron announced on 6 July 2011, that a public inquiry would look into the affair after police investigations had ended. On 13 July 2011, Cameron named Lord Justice Leveson as chairman of the inquiry, with a remit to look into phone hacking and police bribery by the News of the World, while a separate inquiry would consider the culture and ethics of the wider British media.[2] He also said the Press Complaints Commission would be replaced "entirely".[1] The inquiries led to several high-profile resignations, including Dow Jones chief executive Les Hinton; News International legal manager Tom Crone; and chief executive Rebekah Brooks. The commissioner of London's Metropolitan Police Service, Sir Paul Stephenson, also resigned his post. Former News of the World managing editor Andy Coulson, former executive editor Neil Wallis, and Brooks were all arrested. Murdoch and his son, James, were summoned to give evidence before the Leveson Inquiry.
  • WMR July 14-15, 2011 -- Murdoch intelligence-gathering network extended to U.S. Congress   ...   U.S. Congressional sources have confirmed to WMR that the U.S. Capitol Police and other congressional officials shared sensitive information on members of Congress with Rupert Murdoch's media outlets in Washington, including Fox News, in a manner similar to the situation in the United Kingdom where reporters for Murdoch's now-defunct News of the World bribed British law enforcement officials for sensitive information on public officials and private citizens.     ....   Representative Peter King (R-NY) has already leveled charges that News of the World reporters tried to bribe U.S. law enforcement officials for phone records and transcripts of wiretaps of victims of the 9/11 attack. King did not elaborate on why law enforcement would have found it necessary, in the first place, to wiretap the conversations of 9/11 victims and their surviving next-of-kin.    ...   On March 28, 2007, WMR first reported the relationship between the newly-appointed U.S. Senate Sergeant-at-Arms Terrance Gainer, who was formerly the chief of the U.S. Capitol Police, and Fox News in three highly-publicized incidents involving only Democratic members of the U.S. Senate and House of Representatives. The three incidents involved Fox News receiving information directly from Gainer on incidents involving then-Representative Cynthia McKinney (D-GA), then-Representative Patrick Kennedy (D-RI), and an aide to Senator Jim Webb (D-VA).    ...   After a highly-publicized scuffle involving McKinney and an aggressive U.S. Capitol Police officer, one in which McKinney was physically assaulted by the officer, Fox News was the first to report the incident. The media hype resulting from the incident resulted in a criminal referral to the US Attorney for the District of Columbia. Shortly after Gainer resigned as chief and his being appointed by Senate Democratic Majority Leader Harry Reid, Representative Kennedy was involved in a minor automobile accident on Capitol Hill. Again, Fox News was the first to receive the information about the incident and Gainer stated publicly that Kennedy should have been given a sobriety test by the Capitol cops.    ...   The third incident involved Phillip Thompson, the executive assistant to Virginia Democratic Senator Jim Webb, who was arrested by the Capitol Police at the Russell Senate Office Building for carrying a loaded pistol allegedly given to him by Webb. The Capitol Police enforced a DC law in force at the time that prohibited anyone other than law enforcement officers from carrying weapons in the District. Webb said he has a license to carry a concealed weapon in Virginia and Thompson, an ex-Marine, inadvertently carried the weapon into the building after dropping Webb off at the airport. WMR's March 2007 report stated: "Details of the [Thompson] incident were leaked by the cops to Fox News and other neo-con outlets." WMR also reported that the leaks by US Capitol Police and Sergeant-at-Arms staff also occurred in the cases of McKinney and Kennedy.    ...    Gainer is a long-time Republican who unsuccessfully challenged incumbent Richard M. Daley, Jr. as the Republican candidate for Cook County (Illinois) State's Attorney in 1988. Gainer got his start in law enforcement as a rookie Chicago cop in 1968 where he helped put down riots at the Democratic National Convention, a melee that saw Chicago cops clubbing anti-Vietnam War protesters.    ...   As U.S. Senate Sergeant-at-Arms, Gainer is responsible for the installation and maintenance of the Senate's telecommunications networks and computer and other equipment, including those that handle Senators' e-mail, phone calls, faxes, Blackberry tweets, and photocopies of documents.    ...   Some members of Congress have indicated the investigation of Murdoch's News Corporation's information-gathering practices warrant a full-scale investigation in the United States. Senator Jay Rockefeller (D-WV) told CNN, "My bet is we'll find some criminal stuff . . . This is going to be a huge issue." Rockefeller said he may launch his own investigation. Perhaps he might want to start with the Senate's Sergeant-at-Arms and ask Harry Reid why he chose to appoint Gainer, a Republican, to the post after evidence surfaced that tied Gainer to leaks of law enforcement information to Fox News.    ...    In Britain, law enforcement officials, including royal guards, reportedly asked the News of the World for money in exchange for personal information about the Royal family, including Queen Elizabeth II, Prince Philip, Prince Charles, Duchess of Cornwall Camilla, Duchess of Cambridge Catherine, and others. While he was Chancellor of the Exchequer and Prime Minister, Gordon Brown was also subjected to private communication surveillance by private detectives who had a close relationship with law enforcement agencies, including Scotland Yard. 
NIST / NSA integration   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • SANS  2012 NIST Issues (Flawed) Draft Updates to Cybersecurity Guides (July 30, 2012) The National Institute of Standards and Technology (NIST) has issued updated versions of two publications aimed at helping federal agencies and private organizations protect their networks from attacks, intrusions, and malware infections. The Guide to Intrusion Detection and Prevention Systems and the Guide to Malware Incident Prevention and Handling for Desktop and Laptops have been updated to incorporate current best practices in cybersecurity. NIST is accepting public comment on the documents through August 31, 2012. The intrusion detection publication was originally released in February 2007 and has not been updated since then.   and NSA  NSA Director Asks Defcon Attendees to Help Defend Cyberspace (July 27 & 29, 2012) Speaking at the Defcon hacker conference, General Keith Alexander, who heads both the National Security Agency (NSA) and the US Cyber Command, asked attendees for help securing cyberspace. Alexander told those present that "In this room right here is the talent our nation needs to secure cyberspace," and spoke about the "superb" program called Defcon Kids, which guides kids in the direction of white-hat hacking. Alexander also told his audience that the NSA does not compile dossiers on US citizens. However, a former NSA employee speaking on a panel at the same conference said that the NSA does collect information about US citizens' email messages, tweets, online searches and other information.
  • Epic  New NIST/NSA Revelations Less than three weeks after the White House announced a controversial initiative to secure the nation's electronic communications with government-approved cryptography, newly released documents raise serious questions about the process that gave rise to the administration's proposal. The documents, released by the National Institute of Standards and Technology (NIST) in response to a Freedom of Information Act lawsuit, suggest that the super-secret National Security Agency (NSA) dominates the process of establishing security standards for civilian computer systems in contravention of the intent of legislation Congress enacted in 1987.    ...   The released material concerns the development of the Digital Signature Standard (DSS), a cryptographic method for authenticating the identity of the sender of an electronic communication and for authenticating the integrity of the data in that communication. NIST publicly proposed the DSS in August 1991 and initially made no mention of any NSA role in developing the standard, which was intended for use in unclassified, civilian communications systems. NIST finally conceded that NSA had, in fact, developed the technology after Computer Professionals for Social Responsibility (CPSR) filed suit against the agency for withholding relevant documents. The proposed DSS was widely criticized within the computer industry for its perceived weak security and inferiority to an existing authentication technology known as the RSA algorithm. Many observers have speculated that the RSA technique was disfavored by NSA because it was, in fact, more secure than the NSA-proposed algorithm and because the RSA technique could also be used to encrypt data very securely. ...   The newly-disclosed documents -- released in heavily censored form at the insistence of NSA -- suggest that NSA was not merely involved in the development process, but dominated it. NIST and NSA worked together on the DSS through an intra-agency Technical Working Group (TWG). The documents suggest that the NIST-NSA relationship was contentious, with NSA insisting upon secrecy throughout the deliberations. A NIST report dated January 31, 1990, states that    ...   The members of the TWG acknowledged that the efforts expended to date in the determination of a public key algorithm which would be publicly known have not been successful. It's increasingly evident that it is difficult, if not impossible, to reconcile the concerns and requirements of NSA, NIST and the general public through using this approach. more
  • OpinionMaker Q-Group WMR  WMR's intelligence sources report that the National Security Agency's "Q Group," the directorate responsible for overall security for NSA, is actively investigating and harassing NSA employees who have reported on senior officials at the sprawling intelligence agency, which now includes the new U.S. Cyber Command, of engaging in adulterous trysts with subordinates and possessing improper sexual material, including child pornography. WMR has previously reported on the improper activities of the Q Group, which has become a virtual uncontrolled FBI within the NSA. Q continues to protect NSA senior officials who engage in and promote a culture of sexual exploitation of junior employees at the intelligence agency. Q Group has also misused NSA psychologists and psychiatrists to deem anyone who charges senior officials of the agency with sexual misconduct or harassment unfit to hold a security clearance for reasons of mental impairment.
  • Wikipedia  NSA call database  The United States' National Security Agency (NSA) maintains a database containing hundreds of billions of records of telephone calls made by U.S. citizens from the four largest telephone carriers in the United States: AT&T, SBC, BellSouth (all three now called AT&T), and Verizon.[1] The existence of this database and the NSA program that compiled it was unknown to the general public until USA Today broke the story on May 10, 2006.[1] It is estimated that the database contains over 1.9 trillion call-detail records.[2] According to Bloomberg News, the effort began approximately seven months before the September 11, 2001 attacks.[3] The records include detailed call information (caller, receiver, date/time of call, length of call, etc.) for use in traffic analysis and social network analysis, but do not include audio information or transcripts of the content of the phone calls. The database's existence has prompted fierce objections. It is often viewed as an illegal warrantless search and a violation of the pen register provisions of the Foreign Intelligence Surveillance Act and (in some cases) the Fourth Amendment of the United States Constitution. The George W. Bush administration neither confirmed nor denied the existence of the domestic call record database. This contrasts with a related NSA controversy concerning warrantless surveillance of selected telephone calls; in that case they did confirm the existence of the program of debated legality. The program's code name is Stellar wind.[4] Similar programs exist or are planned in other countries, including Sweden (Titan traffic database) and Great Britain (Interception Modernisation Programme)The most relevant U.S. Supreme Court case is Smith v. Maryland.[48] In that case, the Court addressed pen registers, which are mechanical devices that record the numbers dialed on a telephone; a pen register does not record call contents. The Court ruled that pen registers are not covered by the Fourth Amendment: "The installation and use of a pen register, [...] was not a 'search,' and no warrant was required." More generally, "This Court consistently has held that a person has no legitimate expectation of privacy in information he [...] voluntarily turns over to third parties."
 
NSA, Domestic phone records database,  NFU pages index
  • Issues to research
  • How is the internet and phone system tapped?   Narus
  • Are there ties between the recent NSA warrantless wiretapping and the old 'Israeli art students' revelations?  How does Comverse Infosys (Verint), Amdocs, Telrad, Israel fit?
  • How does it all tie back to 9/11?  FoxNews, Carl Cameron, Israeli art students?
  • What lawsuits are now pending? 
  • What are administrative subpoenas, National Security letters?
  • William T. Crowell, Narus Board of Directors, was Deputy Director of Operations of NSA.
  • Wired News, Mark Klein, Whistleblower Outs NSA Spy Room  ...more 
  • Israeli companies dominate phone billing and firewall markets
  • News

 

National Security Agency  NSA   top       and go to Amdocs
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  lawsuit, wiretap without a warrant on U.S. soil.  and NSA lawsuit
  • Center for Constitutional Rights New York, letter to Senate Intelligence Committee,
  • CommonDreams search terms: lawsuit, AT&T, submitted under seal, illegal electronic surveillance, Negroponte, Lt. General Keith Alexander (director of NSA), state secrets privilege used to deny info on NSA, phone and internet records turned over illegally without a warrant or suspicion of wrongdoing. class action, 
  • CommonDreams "In a 72-page written ruling (.pdf), U.S. District Court Chief Judge Vaughn Walker rejected the government's argument that merely allowing the case to proceed would cause critical harm to U.S. national security.
  • Constant Pated, blog Narus STA-6400, state secrets, prove Bush broke the law.
  • John Conyers
  • CounterPunch, Bush wiretaps to identify whistleblowers. 
  • Dailykos Narus ST-6400
  • Detroit Free Press "U.S. District Judge Anna Diggs Taylor declared the administration's secret spying program unconstitutional and blocked the government from intercepting calls into this country from abroad that might involve terrorists without getting warrants from the Foreign Intelligence Surveillance Court.
  • Electronic Frontier Foundation working to protect civil and free speech, search AT&T lawsuit
  • Huffington Post NSA, amdocs, Hayden and Hayden "the sudden resignation of Goss as the Foggo sex scandal comes creeping centerwise provided the Department of Defense its best-yet opportunity to finally seize its long-time intelligence and covert operations rival for itself"
  • Indymedia
  • The Nation History and structure of global telegraphic surveillance 
  • NSAWatch formerly EchelonWatch, resources, surveillance networks, documents.
  • OpEdNews "Amdocs, Hayden, CIA, phone records, database, billing data, Israeli-based company, 9/11, students, Bobby Ray Inman, AT&T, BellSouth, Verizon, legality of surveillance, Sen. Spector
  • RawStory
  • Salon  Israeli art students, DEA, Amdocs searchable file
  • TimesOnline.UK "A report in the newspaper USA Today, which claimed that since the 9/11 attacks the National Security Agency (NSA) has secretly collected the records of billions of domestic calls, also cast doubt on the confirmation prospects for General Michael Hayden, Mr Bush’s choice to head the CIA"
  • TomPaine search: Bush's NSA Spying Defense
  • Wayne Madsen Report, exclusive1
  • Wired News, Mark Klein, "Whistleblower Outs NSA Spy Room  ... Klein's job eventually included connecting internet circuits to a splitting cabinet that led to the secret room. During the course of that work, he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego."
  • BBC George W Bush personally stopped an inquiry into a controversial programme to monitor the phone calls and e-mails of Americans, a top official has said. Attorney General Alberto Gonzales said internal investigators wanted to look at the role justice department lawyers had played in drafting the programme
  • Findlaw, Dean, Bush's impeachability..
  • search terms: Amdocs, Hayden, CIA, phone records, database, billing data, Israeli-based company,
  • Use NSA data to mine all of Karl Rove's phone calls....right....
  • search terms: Hayden was architect of Bush's domestic spying program. The Federal Intelligence Security Act (FISA) is prohibited in monitoring people inside the U.S. without express permission of a federal judge.  Nixon era controls.  2005 Bush issued executive order undermining FISA.  
  • State secrets privilege defense says a lawsuit must be dismissed if it can't be litigated without the risk of exposing military secrets.  But there is political fallout from this.
  • How does all this tie back to Israel spying: Jonathon Pollard, Pentagon, Douglas Feith, Mega
  • Jurist, legal news and research, Bush used argument that warrantless was implicitly authorized by the resolution for the Authorization for the Use of Military Force in Afghanistan, but....more
  • Rense All US Phone Call Records And Billing Done In Israel - Part 2 Carl Cameron Investigates FoxNews.com 12-13-1
  • Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links
  • Yahoo, BellSouth denies working with NSA.  Included in $200 billion lawsuit
  • Wikipedia
  • go to Amdocs
  • search internet: Tony Snow, FoxNews, Carl Cameron, Israeli Art Students.
  • also see Jonathan Pollard.com
  • Are Republicans who oppose Bush warrantless spying are an irrelevant impotent group?
  • AT&T lawsuit $200 billion
  • Amdocs  Israel, phone records database, Hayden
  • BellSouth
  • Cato Institute
  • Defense Tech Telcos Deny NSA Ties - and Allowed to Lie?
  • FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down.
  • GOP search
  • GOP Insight search
  • Haaretz search
  • Heritage.org "....this critical counterterrorism effort isn't intrusive, illegal or unnecessary...?  commentary.  see Smith v. Maryland 1979
  • IARPA Are you a scientist or engineer with a creative idea that you think could provide the nation with an overwhelming intelligence advantage? If so, consider joining IARPA as a Program Manager.. 
  • Markle Foundation
  • MiddleEast Info  discussion
  • Middle East Intelligence Bulletin  Daniel Pipes
  • Narus Semantic Traffic Analysis
  • Narus & Amdocs more below
  • Narus Board of Directors: William T. Crowell (DARPA, Markle Foundation, Cylink, Deputy Director of Operations NSA, Presidents Export Council on Encryption.  Also Yogen K. Dalal (Mayfield Fund), Andrew Kau (Walden International), Greg Oslan (CNET Inc, AT&T),  Tony Pantuso ( NeoCarta, GE), Shahan D. Soghikian (JP Morgan Partners).
  • National Institute for Public Policy, Iran policy
  • New York Times NSA executive order authorizing data mining of phone calls and file.
  • TMCnet  Amdocs, Israeli Business Arena Via Thomson Dialog NewsEdge,
  • Topix Amdocs DOX page
  • US-Israel.org
  • US News & World Report , Gergen rebuttal to "The Israel Lobby and U.S. Foreign Policy"
  • NSA 
  • Verizon
  • Walden Media, Walden International, Walden Israel Ventures II, Walden VC II, Ambex
  • Whitehouse  Bush
 
Summary of NSA issues
  • BusinessInsider NSA Whistleblower Details How The NSA Has Spied On US Citizens Since 9/11 ...  National Security Agency whistleblower NYTIMESWilliam Binney explains how the secretive agency run its pervasive domestic spying apparatus in a new piece by Laura Poitras in The New York Times. Binney—one of the best mathematicians and code breakers in NSA history—worked for the Defense Department's foreign signals intelligence agency for 32 years before resigning in late 2001 because he "could not stay after the NSA began purposefully violating the Constitution." In a short video called "The Program," Binney explains how the agency took part of one of the programs he built and started using it to spy on virtually every U.S. citizen without warrants under the code-name Stellar Wind. Binney details how the top-secret surveillance program, the scope of which has never been made public, can track electronic activities—phone calls, emails, banking and travel records, social media—and map them to collect "all the attributes that any individual has" in every type of activity and build a profile based on that data. "So that now I can pull your entire life together from all those domains and map it out and show your entire life over time," Binney says. The 8-minute video, adapted from an ongoing project by Poitras that is to be released in 2013, has footage of the construction of the NSA's $2 billion data storage facility in Bluffdale, Utah, which Binney says "has the capacity to store 100 years worth of the world's electronic communications." The purpose of the program, according to Binney, is "to be able to monitor what people are doing" and who they are doing it with. "The danger here is that we fall into a totalitarian state," Binney says. "This is something the KGB, the Stasi or the Gestapo would have loved to have had." Poitras, who has been detained and questioned more than 40 times at U.S. airports, has been working on a trilogy of films about post-9/11 America.
  • ABC News  Exclusive: Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted; Senate Demanding Answers By BRIAN ROSS, VIC WALTER, and ANNA SCHECTER Oct. 9, 2008— Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. The chairman of the Senate Intelligence Committee, Jay Rockefeller (D-WV), called the allegations "extremely disturbing" and said the committee has begun its own examination. "We have requested all relevant information from the Bush Administration," Rockefeller said Thursday. "The Committee will take whatever action is necessary." continued below
  • New York Times  and file   A  senior government official, granted anonymity to speak for publication about the classified program, confirmed on Friday that the security agency (NSA) had access to records of most telephone calls in the United States. The official said the call records were used for the limited purpose of identifying regular contacts of "known bad guys." The official would not discuss the details of the program, including the identity of companies involved.  lawsuit  (EFFsuit) see Amdocs / Narus 
  • New York Times  and file In 2004, more than 80 percent of the 463 billion domestic calls made in the United States were local, according to the Federal Communications Commission. Verizon said yesterday that "phone companies do not even make records of local calls in most cases because the vast majority of customers are not billed per call for local calls.".    but see Narus 
  • New York Times Because federal law protects the privacy of phone records in the absence of warrants, companies providing such records could face legal action. Yesterday in Manhattan, a class-action suit filed against Verizon after the USA Today article appeared was expanded to include BellSouth and AT&T as defendants, The Associated Press reported. It asked $200 billion in damages.
  • ACLU "The American Civil Liberties Union today strongly condemned a new proposal drafted by Senate Judiciary Committee Chairman Arlen Specter (R-PA) that embraces the president’s claims of inherent power to secretly wiretap Americans without meaningful checks. Also today, the organization renewed its request to the Justice Department’s Inspector General to open an investigation into the involvement of the department in the warrantless spying on Americans by the National Security Agency  ....  Specter’s new draft would replace a bill he had previously introduced, S.2453, the National Security Surveillance Act of 2006. The new version would pardon the president for authorizing the warrantless wiretapping of Americans, in violation of current criminal and intelligence laws. Specifically, the new bill would amend the Foreign Intelligence Surveillance Act (FISA) and the criminal code by allowing wiretapping at the direction of the president outside of those existing laws. This move would create a retroactive exception to criminal liability when warrantless wiretapping is done at the president’s direction under a claim of inherent authority."
  • ACLU v. NSA lawsuit:  "The ACLU is suing the National Security Agency for violating the U.S. Constitution. The illegal NSA spying program authorized by President Bush just after September 11, 2001, allows the NSA to intercept vast quantities of the international telephone and Internet communications of innocent Americans without court approval.  Without a system of checks and balances, the government can monitor any phone call or e-mail they want, and they can collect and disseminate any data they find however they like. Just knowing that the government is spying without cause on innocent Americans sends a chilling message to all of us that our conversations are not our own.  The NSA's warrantless surveillance must end and checks and balances be restored."
  • Information Clearing House on Fox News (Carl Cameron) investigative report and Eric Umansky BellSouth subcontracts with an Israeli company known as Amdocs to handle its billing, as do several other U.S. phone companies. In 2001, U.S. intelligence officials were on record as saying that the information that Amdocs handled was so valuable that a great deal could be learned if sophisticated data-mining techniques were used against that information -- Brit?    Information Clearing House  search Amdocs, Israeli art students.
  •  
  • Information Clearing House Fox News has learned that the N.S.A has held numerous classified conferences to warn the F.B.I. and C.I.A. how Amdocs records could be used. At one NSA briefing, a diagram by the Argon national lab was used to show that if the phone records are not secure, major security breaches are possible.
  • see Amdocs / Narus  relationship
  • Information Clearing House, Carl Cameron report:  Comverse works closely with the Israeli government, and under special programs, gets reimbursed for up to 50 percent of its research and development costs by the Israeli Ministry of Industry and Trade. But investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying through Comverse is considered career suicide.
  • Wired Blog:  One of the questions to emerge in press analysis of Wednesday's court hearing in the EFF's case against AT&T is whether the company might be legally immunized if the attorney general wrote a secret letter authorizing the alleged internet wiretaps.  Declan McCullagh at CNET News.com parsed the AT&T lawyer's oral arguments carefully, and concluded that the company may have received certification from the Justice Department under this section of Title 18 U.S.C. 2511
  • London's 7/7 where Visor Consulting headed up by the ex-spokesman of Scotland Yard Peter Power was conducting drills of a terrorist attack at the exact locations at the exact times where Verint Systems (Comverse) was running security and hasn't released the videos from inside the tube,
  • CommonDreams "FBI Plans New Net-Tapping Push"  search terms: new legislation that would require ISP's to create wiretapping hubs for police surveillance...introduced by Sen. Mike DeWine, Ohio Republican, CALEA
  • CommonDreams "In a 72-page written ruling (.pdf), U.S. District Court Chief Judge Vaughn Walker rejected the government's argument that merely allowing the case to proceed would cause critical harm to U.S. national security.  search terms: Case 3:06-cv-00672-VRW  Document 308, Northern District of California, Tash Hepting et al Plaintiffs,v AT&T CORPORATION, et al Defendants.  AT&T Inc., violate First and Fourth Amendments to the Constitution, by illegally intercepting, disclosing, divulging and/or using plaintiffs' communications.  collaborating with the National Security Agency NSA in a massive warrantless surveillance program.  Section 109 of FISA, Section 802 of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, Section 705 of Title VII of the Communications Act of 1934, Section 201 of Title II of the ECPA, Seciton 201 of the Stored Commications Act, California Unfair Competition Law, Mark Klein, J. Scott Marcus, state secrets privilege, Negroponte, Alexander, 
  •      Click on pic to go to NFU Internet page
  • NSA ISP data mining, Narus   source:  Scoop  Are We Paranoid Enough Yet?  utunga.blogspot.com On 26 Jan 2006 I wrote:   Particularly scary is that the Patriot act gives the feds the right to basically march up to every ISP in the country and install special 'black boxes' [doing] God only knows what and the ISP's cannot even mention this fact publicly let alone not comply... ********* Now we have confirmation from a whistleblower that this is exactly what they've been doing.

    "I learned that the person whom the NSA interviewed for the secret job was the person working to install equipment in this room," Klein wrote. "The regular technician work force was not allowed in the room." .. he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego."While doing my job, I learned that fiber optic cables from the secret room were tapping into the Worldnet (AT&T's internet service) circuits by splitting off a portion of the light signal," Klein wrote.The split circuits included traffic from peering links connecting to other internet backbone providers, meaning that AT&T was also diverting traffic routed from its network to or from other domestic and international providers, according to Klein's statement.The secret room also included data-mining equipment called a Narus STA 6400... "  And what can we find out about the Narus 6400? Well the google cache appeared busted on the subject but the preview gives us this one sentence..

    Fully configured, the Model 6400 captures application-layer usage details via NARUS Semantic Traffic Analysis (STA) on up to six full-duplex 100 BaseTADVERTISEMENT (Update: Dailykos has since published an artice All About NSA's and AT&T's Big Brother Machine, the Narus 6400 which fills out a lot of the details).  In my opinion the key words here are "Semantic Traffic Analysis".   As I wrote previously:  Many people think ECHELON simply targets 'keywords'. However, based on patents filed by various government agencies you can assume it is *much* more sophisticated than that, for instance rudimentary 'language recognition' patents as well as 'topic classification' patents. The topic classification patent is especially interesting, because, if they are able to create a map of all the types of people / types of conversations that people have, then they can more easily filter out the 'Jana's having a baby!' conversations and zero in on the 'lets organize a march' conversation of radicals and other undesirables - oh, yeah, and [those] "terrorists" and "drug dealers" - the only problem here is that to find the largest number of these in the most cost effective way all they would need to do is walk down the hall start arresting people.. The words semantic analysis are used somewhat differently in the patents I mention than in the technical specs for the Naurus 6400, but forgive me for assuming that the NSA has technology that is more advanced (by a small margin and in the same direction) than what is available to the general public.

    ********* I guess this casts the Google action in preventing DOJ into their data centers in a quite different light. As I said previously, this isn't about reading the query log - this was always about the right to install a room of 'black servers' right in the middle of the google data center. Google's actions in standing up to that are all the more laudable.  ********* Just to be crystal clear on this; at this time what we now have is clear evidence of (sophisticated) *monitoring and analysis* of internet and phone traffic - something we pretty much knew for a long time.  Thats very scary (and illegal, in my opinion), but its certainly better than actual direct government censorship of content on the internet ('chilling effects' on free speech aside).  On the pessimistic side, however, direct (but covert) censorship is probably the next obvious step once you have the right hardware installed in the key data centers.

    It may be that if you want to actually directly censor and block information all you need to do is control the choke points - which means ISP's (like AT&T) and not the search engines (like Google). However, it could well be that a more sophisticated (and probably more practical) form of censorship is to control the search engines. Certainly the Chinese found that controlling the search engine content was more effective (and subtle) form of censorship than outright blocks on entire search engines or particular websites.

    My suspicion (OK, its a total guess) is that, in the States at least, the NSA and other parts of the state/non-state military-technological apparatus are probably experimenting with the censorship of certain specifc pieces of information even right now. A good place for them to start might be, for instance, information about themselves, their methods and what they plan to do next.

    At this time I'm pretty sure that direct censorship or control of political discourse on the internet is something that organisations such as the NSA wouldn't consider themselves able to do. Despite all their technology and hardware, the number of bits to flip and the sheer volume of content to mechanically 'understand' and filter makes that effectively impossible. It can be argued that have achieved a high degree of success in the mass media - ask someone who's actually lived in the states for a few years and I'm sure you'll see what i mean - but its still too hard for them to control the discourse of 'blogosphere' directly at this stage - but you just wait and see.. as soon as they believe they can do this - they will. Furthermore, if 'they' are smart they won't give any indication that this is their next step until they are ready to go.  "The internet" may be the last truly free bastion of political free speech in the States at ths time.. and if that were to be closed down via a more sophisticated version of 'the chinese firewall" .. well God help us all.

  • Wikipedia Clipper Chip  The Clipper chip was a chipset that was developed and promoted by the U.S. National Security Agency[1] as an encryption device to be adopted by telecommunications companies for voice transmission. It was announced in 1993 and by 1996 was entirely defunct.    The Clipper chip used a data encryption algorithm called Skipjack[1] to transmit information and the Diffie-Hellman key exchange-algorithm to distribute the cryptokeys between the peers. Skipjack was invented by the National Security Agency of the U.S. Government; this algorithm was initially classified SECRET, which prevented it from being subjected to peer review from the encryption research community. The government did state that it used an 80-bit key, that the algorithm was symmetric, and that it was similar to the DES algorithm. The Skipjack algorithm was declassified and published by NSA on June 24, 1998. The initial cost of the chips was said to be $16 (unprogrammed) or $26 (programmed), with its logic designed by Mykotronx, and fabricated by VLSI Technology, Inc.[citation needed] But the heart of the concept was key escrow. In the factory, any new telephone or other device with a Clipper chip would be given a "cryptographic key", that would then be provided to the government in "escrow". If government agencies "established their authority" to listen to a communication, then the key would be given to those government agencies, who could then decrypt all data transmitted by that particular telephone. The newly formed Electronic Frontier Foundation preferred the term "key surrender" to emphasize what they alleged was really occurring.[citation needed]ENDS
  • NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider
    The Register  NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider ....   By Lewis Page • , 8th July 2010 09:20 GMT    ...   The US National Security Agency (NSA) is embarking on a secret domestic surveillance project dubbed "Perfect Citizen", intended to monitor and protect important national infrastructure such as power grids and transport systems.    ...   The Wall Street Journal, citing unnamed government and industry sources, says that the NSA has awarded a "black" (classified) $100m contract to defence contractor Raytheon which will see secret monitoring equipment installed within US networks deemed to be of national importance.    ...   According to the WSJ, Perfect Citizen has caused some disquiet among those in the know. It could be seen as the NSA - a military combat support agency whose focus is supposed to be on external threats - carrying out massive automated surveillance of American companies and citizens. The paper quotes an internal Raytheon email as saying that "Perfect Citizen is Big Brother".    ...   The stated purpose of the project is to get a clear idea of the level of threat facing American infrastructure IT. Many older systems, designed in the pre-network world, have since been hooked up to the internet for ease of use and maintenance. It is feared by some in the US intelligence / defence community that unfriendly powers and organizations are already engaged in probing these systems with a view to learning how to attack them.    ...   The NSA's Perfect Citizen equipment would be designed to flag up unusual network events indicating an impending cyber attack, according to the WSJ's sources.    ...   "You've got to instrument the network to know what's going on, so you have situational awareness to take action," an unnamed military source told the paper.    ...   Many of the networks that the NSA would wish to place Perfect Citizen equipment on are privately owned, however, and some could also potentially carry information offering scope for "mission creep" outside an infrastructure-security context. For instance, full access to power company systems might allow the NSA to work out whether anyone was at home at a given address. Transport and telecoms information would also make for a potential bonanza for intrusive monitoring.    ...   The full scope of the project remains to be determined, according to the WSJ report, with no certainty as yet on which companies or types of companies would be asked to cooperate - or how much information the NSA would get access to.    ...   The NSA - whose boss has now also been confirmed as head of the Pentagon's uniformed Cyber Command - apparently got the job by default, as it is considered the only US agency with enough network and cyber savvy to take the task on.    ... The Reg has contacted Raytheon and the NSA for comment on Perfect Citizen, but thus far has not received any reply. ®
Open BSD FBI Backdoor  top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ArsTechnica FBI accused of planting backdoor in OpenBSD IPSEC stack  ... In an e-mail sent to BSD project leader Theo de Raadt, former NETSEC CTO Gregory Perry has claimed that NETSEC developers helped the FBI plant "a number of backdoors" in the OpenBSD cryptographic framework approximately a decade ago.   ...  Perry says that his nondisclosure agreement with the FBI has expired, allowing him to finally bring the issue to the attention of OpenBSD developers. Perry also suggests that knowledge of the FBI's backdoors played a role in DARPA's decision to withdraw millions of dollars of grant funding from OpenBSD in 2003.   ...   "I wanted to make you aware of the fact that the FBI implemented a number of backdoors and side channel key leaking mechanisms into the OCF, for the express purpose of monitoring the site to site VPN encryption system implemented by EOUSA, the parent organization to the FBI," wrote Perry. "This is also probably the reason why you lost your DARPA funding, they more than likely caught wind of the fact that those backdoors were present and didn't want to create any derivative products based upon the same."   ...  The e-mail became public when de Raadt forwarded it to the OpenBSD mailing list on Tuesday, with the intention of encouraging concerned parties to conduct code audits. To avoid entanglement in the alleged conspiracy, de Raadt says that he won't be pursuing the matter himself. Several developers have begun the process of auditing the OpenBSD IPSEC stack in order to determine if Perry's claims are true.
Patriot Act       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*

  • Click on pic to go to NFU Internet page
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973.[1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy.[2][3][4][5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture.[6]
 
 
 
 
Police Departments tracking protesters, Pre-crime Surveillance, Mobile Backscatter Vans, Sneek & Peek Search Warrants      top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Common Dreams Police depts tracking local protesters
  • EndoftheAmericanDream Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same "pornoscanner" technology currently being utilized by the TSA at U.S. airports....
  • Cnet Tech News First
  • Earthrights International the power of law, people in defense of human rights  We document human rights and environmental abuses in countries where few other organizations can safely operate. We expose and publicize earth rights abuses through campaigns, reports and articles.
  • National Security Agency 
RFID Technology       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • eWeek
  • EETimes
  • Intelnet news from 500 sources automated  
  • InfoWorld  for IT Managers
  • Internet News  for IT Managers
  • RFID, remotely storing and retrieving info from product stickers, tags, via radio signals.
  • Axalto, BearingPoint, Infineon, Supercom, passport chips contracts.  ICAO, Enhanced Border Security Act
  • Wikpedia, definition, info
Restroom taping       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • EndoftheAmericanDream 14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973.[1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy.[2][3][4][5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture.[6]
Road Sensors, Red Light Cameras, Speed Traps       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
Satellites       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • FAS, Federation of American Scientists Project on Government Secrecy.
  • Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog
  • Cnet Tech News First
  • Wikipedia, National Geospatial Intelligence Agency
  • search Beaulieu, Arctic Slope Regional Corp, Chenega Corp, ANSCA, NIMA, no bid contracts, roads in Alaska.
  • American Federation of Government Employees, Bush gave no-bid contracts for mapping project to Native Indian contractors.  (Union busting)
Search engines       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Google Desktop Search automatically reads and records locally Outlook e-mail, also saves copies of web pages, chat conversations in AOL IM, and finds Word Powerpoint and Excel files on your computer.  Google says it has no access.   But its multi-user  capabilities reveal security flaws. 
  • Wikipedia, National Geospatial Intelligence Agency
Stoplight Cameras       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Wikipedia, National Geospatial Intelligence Agency
Synchronization, Knowledge Management and Intelligence Fusion       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Code Pink under surveillance by SKMIF,     
  • Schema-Root military intelligence, news feeds
  • Sen. Joe Dunn, tracking California National Guard spying on citizens
  • Veterans for Peace
  • San Jose Mercury News
  • SignOnSanDiego search
  • notes: National Guard Bureau investigating if SKMIF spied on citizens, protesters.  similar to Viet Nam era surveillance?
  • National Guard Bureau search legal division.
  • Synchronization, Knowledge Management and Intelligence Fusion unit.  Schwarzenegger
SWIFT,  Society for Worldwide Interbank Financial Telecommunication        top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU, National ID card,
  • EPIC  Electronic Privacy Information Center, National ID card,
  • Privacy International, Swift violated European and Asian data protection rules, fishing expedition, not a legally authorized investigation, 
  •  
  • Council of Europe, Strasbourg, 
  • San Jose Mercury News
  • European Union, Stras
  • Financial Times, SWIFT, bank transaction data mining,  "Tens of thousands of electronic searches have been conducted under a secret US programme to monitor global financial transfers for signs of terrorist activity" more search terms: Stuart Levy (under-secretary for terrorism and financial intelligence, US Treasury), SWIFT (Society for Worldwide Interbank Financial Telecommunication),  Bush used International Emergency Economic Powers Act to gain access to the data. 
  • People's Party, largest and most influential bloc in the European Parliament,  demand compensation, Swift did not seek approval from European authorities.
  • Wikipedia SWIFT, Terrorist Finance Tracking Program
  • CIA
  • FBI 
  • New York Times
  • Senate Republicans support warrantless wiretaps of international financial transactions.
  • SWIFT Society for Worldwide Interbank Financial Telecommunication, Brussels,
  • Terrorist Finance Tracking Program
TALON, Threat and Local Observation Notice       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  •  
  • Wikipedia, National Geospatial Intelligence Agency
  • Washington Post "TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead."  TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead."  ...   In 2006, authorities quietly launched Railhead, a project worth as much as $500 million over five years, to improve TIDE and eventually replace it and some related systems with technology that would significantly expand their capabilities.   ...  After more than a year and about $100 million, the Railhead project has become the focus of criticism from some counterterrorism analysts and contractors, who have said it does not provide the search capabilities they expected and appears to be behind schedule. One lawmaker has taken up those questions and publicly asked for an investigation by the inspector general of the Office of the Director of National Intelligence, saying his congressional staff has information from a contractor whistle-blower that shows the project is on the "brink of collapse," possibly threatening national security.
Telecommunications Companies, ISP, Speech Recognition, Wifi, VOIP  top 
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU  and NSA lawsuit
  • Electronic Frontier Foundation working to protect civil and free speech  & lawsuit
  • EndoftheAmericanDream 14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You  
  • Salon  Israeli art students, DEA, Amdocs searchable file
  • TheRedPillGuide IARPA, wifi, IARPA’s Great Horned Owl Program: collecting intelligence ‘without anyone knowing you are there’  The GHO program was created in order to reduce the ability of the target “to counter [surveillance]” by creating, “Better, more efficient, quiet power sources and propulsion techniques [in order] to engineer the next generation UAVs for ISR [Intelligence Surveillance and Reconnaissance] mission applications.”
  • AlexanderHiggins State-Of-The Art Long Distance Solar Surveillance Drone Unveiled, A new long distance solar-powered drone is unleashed boasting a tactical aerial sensor system that far exceeds anything in its class.
  • Earthrights International the power of law, people in defense of human rights  We document human rights and environmental abuses in countries where few other organizations can safely operate. We expose and publicize earth rights abuses through campaigns, reports and articles.
  • Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective
  • GovExec 
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
  • EFF NSA Spying  The U.S. government with assistance from major telecommunications carriers including AT&T has engaged in a massive program of illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001.   ...   News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports plus a USA Today story in May 2006 and the statements of several members of Congress revealed that the NSA is also receiving wholesale copies of their telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution.    ...   The evidence also shows that the government did not act alone. EFF has obtained whistleblower evidence [PDF] from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed “this isn’t a wiretap it’s a country-tap.”
  • WMR  February 25-26, 2010 -- UPDATED -- NSA threatened Qwest CEO with repercussions if he didn't cut a surveillance deal   ...   WMR has learned from sources who worked in senior positions for the telecommunications company Qwest that its former Chairman and CEO Joseph Nacchio was threatened with retaliation after he refused to participate in an unconstitutional and illegal National Security Agency (NSA) wiretapping program after he met with NSA officials on February 27, 2001, some six months before the 9/11 attacks. Nacchio refused to turn over customer records without a court order -- something NSA did not possess at the time it made its request.    ...   After Nacchio refused NSA's request on the grounds that it was illegal, sources close to Nacchio reported his legal problems with the Department of Justice and the Securities and Exchange Commission began in earnest. First, Qwest lost out on several lucrative federal government contracts and second, Nacchio was indicted and convicted in 2007 of 19 counts of insider stock trading. Nacchio was sentenced to six years the Schuykill federal prison camp in Minersville, Pennsylvania where he is now assigned prisoner number 33973-013.    ...   In January, US District Judge Marcia Krieger of the 10th Circuit Court in Denver denied Nacchio's motion for a new trial. Krieger was nominated for the federal bench by President George W. Bush on September 10, 2001. The September 10 date is significant -- it was then clear that Nacchio was not going to be a player in the NSA and FBI illegal surveillance programs and it was the day before the Bush administration would sweep aside the First and Fourth Amendments to the Constitution in the wake of the 9/11 attacks. Qwest is headquartered in Denver.
  • DigitallyMediatedSurveillance Ohm asserts that we should focus on individual harms stemming from surveillance and recognize that technological, economic, and ethical forces all point towards a “storm of unprecedented, invasive ISP monitoring” (4). He maintains that ISPs oversell their ability to anonymize collected data, that providers’ claims of needing to more deeply inspect content are suspect, and that we should distrust suggestions that users and ISPs have entered consensual agreements around DPI-based surveillance. To determine the risk of individual harms stemming from surveillance, ISPs and regulators should adopt a three-step process that asks how sensitive is the information at risk, whether there there been harmful breaches in the past and if so, requires policymakers to make predictions about the future. ...   Critically, “anonymity cannot effectively address the harm to the sense of repose. The harm comes from the fear that one is being watched. It can result in self-censorship. It is not the kind of harm that is easily offset by hypertechnical arguments about encryption and one-way hash functions” (49). Thus, novel surveillance systems like DPI must be (largely) restricted to preventing hacking and viral outbreaks and traditional monitoring systems that cannot capture personal information relied upon for network management. Most importantly, Ohm argues that privacy, freedom, liberty, and autonomy must be introduced into the otherwise technocratic discussions of network neutrality and management to ensure that ISPs’ networks facilitate these key democratic values.
  • WMR In 2006, it was revealed that AT&T had permitted NSA to have a direct link to its switching center's 4ESS equipment at its Folsom Street, San Francisco facility to conduct massive warrantless surveillance of long distance and international phone calls, as well as e-mail. Mark Klein, a retired AT&T technician stated that similar systems had been installed at AT&T centers in Seattle, San Jose, Los Angeles, and San Diego. The Bush administration responded to several lawsuits against the program by invoking the draconian State Secrets Privilege.
  • GovExec  2006 Yes, eBay, the online auction house. Not because its members sell state secrets, but because of a company that eBay purchased last year -- Skype.   ...  Skype is an online service that lets people converse through their computers. Its 75 million users place voice calls over the Internet. The calls sound clear. They're free, because phone carriers aren't used. And because of the Internet's diffused architecture and its facility for privacy, Skypesters' identities, their locations, and the substance of their conversations can be undetectable. This is not what the NSA's worldwide eavesdroppers want to hear.   ...   Skype and other widely used Internet communications devices, including e-mail, threaten the NSA's ability to gather intelligence and to do so legally. For more than four years, without warrants and by order of President Bush, the agency has hunted for terrorists by intercepting communications between people in the United States and people abroad possibly connected to terrorism.

 

Terahertz Spectroscopy       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Wikipedia Typically, the terahertz pulses are generated by an ultrashort pulsed laser and last only a few picoseconds. A single pulse can contain frequency components covering the whole terahertz range from 0.05 to 4 THz. For detection, the electrical field of the terahertz pulse is sampled and digitized, conceptually similar to the way an audio card transforms electrical voltage levels in an audio signal into numbers that describe the audio waveform. In THz-TDS, the electrical field of the THz pulse interacts in the detector with a much-shorter laser pulse (e.g. 0.1 picoseconds) in a way that produces an electrical signal that is proportional to the electric field of the THz pulse at the time the laser pulse gates the detector on. By repeating this procedure and varying the timing of the gating laser pulse, it is possible to scan the THz pulse and construct its electric field as a function of time. Subsequently, a Fourier transform is used to extract the frequency spectrum from the time-domain data. [edit]Advantages of THz radiation THz radiation has several distinct advantages over other forms of spectroscopy: many materials are transparent to THz, THz radiation is safe for biological tissues because it is non-ionizing (unlike for example X-rays), and images formed with terahertz radiation can have relatively good resolution (less than 1 mm). Also, many interesting materials have unique spectral fingerprints in the terahertz range, which means that terahertz radiation can be used to identify them. Examples which have been demonstrated include several different types of explosives, polymorphic forms of many compounds used as Active Pharmaceutical Ingredients (API) in commercial medications as well as several illegal narcotic substances. Since many materials are transparent to THz radiation, these items of interest can be observed through visually opaque intervening layers, such as packaging and clothing. Though not strictly a spectroscopic technique, the ultrashort width of the THz radiation pulses allows for measurements (e.g., thickness, density, defect location) on difficult to probe materials (e.g., foam). The measurement capability shares many similarities to that observed with pulsed ultrasonic systems. Reflections from buried interfaces and defects can be found and precisely imaged. THz measurements are non-contact however.
Traffic Stop, drug sniffing  dogs       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Wikipedia, National Geospatial Intelligence Agency
TRAPWIRE       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First
  • Wikipedia, National Geospatial Intelligence Agency
US-VISIT, FISC, FISA       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • National Network for Immigrant and Refugee Rights
  • U.S. English
  • National Immigrants' Rights Project
  • Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973.[1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy.[2][3][4][5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture.[6]
Utilities monitoring     top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • AP  White House Tracking Bug
  • DailyMail The CIA wants to spy on you through your TV: Agency director says it will 'transform' surveillance Devices connected to internet leak information CIA director says
  • CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department
  • Dept of Homeland Security ID all immigrants, potential terrorists?
  • Fox
  • US Info search: collect biometric data on foreigners
  • DailyMail  The CIA wants to spy on you through your TV: Agency director says it will 'transform' surveillance Devices connected to internet leak information CIA director says these gadgets will 'transform clandestine tradecraft' Spies could watch thousands via supercomputers People 'bug' their own homes with web-connected devices By ROB WAUGH PUBLISHED: 08:20 EST, 16 March 2012 | UPDATED: 08:55 EST, 16 March 2012   ...  When people download a film from Netflix to a flatscreen, or turn on web radio, they could be alerting unwanted watchers to exactly what they are doing and where they are. Spies will no longer have to plant bugs in your home - the rise of 'connected' gadgets controlled by apps will mean that people 'bug' their own homes, says CIA director David Petraeus. The CIA claims it will be able to 'read' these devices via the internet - and perhaps even via radio waves from outside the home.
White House, 'web tracking bug', Executive Order 12333       top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • AP  White House Tracking Bug
  • Earthrights International the power of law, people in defense of human rights  We document human rights and environmental abuses in countries where few other organizations can safely operate. We expose and publicize earth rights abuses through campaigns, reports and articles.
  • CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department
  • Dept of Homeland Security ID all immigrants, potential terrorists?
  • Fox
  • US Info search: collect biometric data on foreigners
  • Wikipedia Executive Order 12333,  On December 4, 1981 President Ronald Reagan signed Executive Order 12333, an Executive Order intended to extend powers and responsibilities of US intelligence agencies and direct the leaders of U.S. federal agencies to co-operate fully with CIA requests for information. This executive order was entitled United States Intelligence Activities. It was amended by Executive Order 13355: Strengthened Management of the Intelligence Community, on August 27, 2004. On July 30, 2008, President Bush issued Executive Order 13470 amending Executive Order 12333 to strengthen the role of the DNI.  Part 2.11 of this executive order reiterates a proscription on US intelligence agencies sponsoring or carrying out an assassination. It reads:[5] No person employed by or acting on behalf of the United States Government shall engage in, or conspire to engage in, assassination. Previously, EO 11905 (Gerald Ford) had banned political assassinations and EO 12036 (Jimmy Carter) had further banned indirect U.S. involvement in assassinations. As early as 1998, this proscription against assassination was reinterpreted, and relaxed, for targets who are classified by the United States as connected to terrorism.
 
Smile - You're on Candid Cable Surveillance Camera!  http://www.tbrnews.org/Archives/a2734.htm  The Voice of the White House  Washington, D.C., August 10, 2007: “How do they watch you? Let me count the ways. With the new surveillance law being voted in by a weak-kneed Congress, the useless AG, Gonzales can now listen to any conversation or read any email without a court order. I have several additional comments to be made on this subject. Let’ s consider a means by which you can be spied on without a warrant. The first is by using your very own television set to listen to you. Sounds fantastic? Another nutty blog idea? Think again. Here I am quoting from an in-house memorandum: ‘The methodology of using a commercial television set connected to a cable network system being used as a transmitter as well as a receive, allowing other parties to hear conversations conducted in the vicinity of the set utilizes the medium of a digital oscillator installed in television sets. This use is only for a set itself connected to a cable system. The additional use of a cable box connected to the television set is the only means by which the set can be used to listen to nearby conversations because these boxes are designed to feed back information through the cable system. This feedback makes it possible for a subscriber to cable to use his telephone to call the cable company for the inclusion of a special program to the subscriber’s system. The cable company is automatically able to ascertain the telephone number from the call and using that information, send the desired program to the television set via their network and the box. The subscriber code of the subscriber matches the data on the subscriber’s box. This makes the use of the box as an instrument of clandestine surveillance possible.. It is then possible for such information to be fed into other channels, including investigative ones. The use by private parties of the cable system to obtain clandestine information in this manner would be difficult if not impossible but the NSA and FBI techniques in other electronic surveillance matters are more than sufficient to ensure electronic eavesdropping. ••••••••••••

 

 WMR How 9/11 began the process of a massive grab by the government of personal data.  January 28-30, 2011
With the neo-fascist Republican Party now in charge of the House of Representatives, there is proposed data retention legislation that would give the FBI virtual unfettered access to stored Internet transactional data from a variety of service providers with or without a criminal predicate. Democrats like Debbie Wasserman-Shultz from Florida also support the proposed mandatory data retention legislation. Government "fishing expeditions" for personal data had its beginning in the weeks after 9/11. This hunger for personal data has culminated in a massive $1.5 billion National Security Agency data warehouse now under construction at Camp Williams in Utah.

Although NSA insists that it will have few analysts at its new data warehouse, the NSA Utah Data Center, the government's grab for Internet user data clearly shows intent by NSA to conduct more sophisticated forms of data mining, extraction, and analysis than NSA and other federal agencies sought in the weeks and months after 9/11. JetBlue provided passenger data to a firm called Torch Concepts, a defense contractor based in Huntsville, Alabama, that had major plans to apply military- and intelligence-level data analysis programs to the American public. American and Delta Airlines had rejected requests for their passenger data by Torch.

Torch's conclusions were that poorer people who did not live in their homes for a long period of time time posed a greater terrorist risk (passenger stability indicator) than wealthier long-term homeowners.

The Census Bureau is also vulnerable to seeing its massive databases acquired by NSA Utah for data mining purposes. This editor previously reported on the value of U.S. Census data to intelligence analysts in 2004:

HOMELAND SECURITY MINES CENSUS DATA FILES

Possible Violation of Federal Law

By Wayne Madsen

According to US Census Bureau documents, the U.S. Census Bureau shared confidential census data files with the Department of Homeland Security (DHS). Of particular interest to DHS were census files on U.S. citizens of Arab ancestry sorted by individual ZIP code tabulation areas. In a U.S. Census Bureau memo dated April 23, 2004, a senior systems analyst with the Population Division writes to DHS that "my superiors are now asking questions about the usage of the data, given the sensitivity of different data requests we have received about the Arab population."

The Branch Officer of the DHS Customs and Border Protection Bureau's Container Security Division Operational Support and Oversight Branch responds to the Census Bureau concern by stating that the information on Americans of Arab ancestry is required for "U.S. Outbound operations; which include both cargo and passenger operations." The Branch Chief continues by stating, "at U.S. International airports, U.S. Customs posts signage informing various nationalities of the U.S. Customs regulations to report currency brought into the US upon entry. Current regulations require passengers bringing more than $10,000 into the U.S. to claim it on a currency entry declaration . . . My reason for asking for U.S. demographic data is to aid the Outbound Passenger Program Officer in identifying which language of signage, based on U.S. ethnic nationality population, would be best to post at the major International airports. Some cases this would identify multiple copies needed of a specific language sign versus other cities only one copy."

The Branch Chief then assures Census, "the data obtained from Census was used only for the above purpose and subsequently has been purged from my files!" Although the Branch Chief's name was blocked out in the released documents, the names of two DHS officials involved in the Census data request, Jerome A. Walfish and Mark S. Ziner, were not redacted.

Privacy experts point out that the reasoning given by DHS for obtaining the Arab ancestry files has some major flaws. One, is why someone involved with Outbound operations would be concerned with entry currency declarations. Another is why DHS requested data files on Arab ancestry populations in New England that include a number of second, third, and fourth generation Maronite Christian Lebanese whose language is English and would, therefore, not require airport signage written in Arabic.

The confidentiality of U.S. Census data is established in federal law. Title 13 U.S.C. Section 9, states that U.S. census data is confidential. In addition, Title 13, U.S.C. Section 9 (a) (a) states that non-employees of the Census Bureau must take an "oath of non disclosure," and must be special sworn status (SSS) officers if they are from another department or agency. There is no indication that DHS personnel who viewed the confidential Census records were special sworn status officers of the Census Bureau.

DHS was particularly interested in a 2000 Census file denoting the "population of Arab ancestry" from all places in the United States with 10,000 or more population. The information would be helpful in the possible targeting by DHS of cities with large percentages of Arab-American citizens, particularly Dearborn, Michigan with a 30.01 percent Arab-American population; Bailey's Crossroads, Virginia, 0.69 percent; Hamtramck, Michigan, 9.39 percent; Dearborn Heights, Michigan, 7.86 percent; Bridgeview, Illinois, 7.18; Tyson's Corner, Virginia, 6.53 percent; and Lackawanna, New York, 5.83. Lackawanna is home to the "Lackawanna Six," six Yemeni-Americans who were convicted of aiding Al Qaeda. There were allegations of U.S. Justice Department prosecutorial misconduct in the case against the six, mainly that the government threatened to indefinitely jail the six in a military detention facility unless they voluntarily pleaded guilty to terrorism charges.

In addition, DHS was provided with very detailed Arab-American demographic data from the states of Massachusetts, Rhode Island, and New Hampshire, and the commonwealth territory of Puerto Rico. In the case of New Hampshire, the census data yielded some very definitive information on Arab-Americans broken down by ZIP codes into small towns and cities. In the case of Nashua, New Hampshire, the combined ZIP codes of 03060,03062, 03063, and 03064 indicates the presence of 269 Lebanese-Americans. This community of Maronite Christian Catholics includes some of New Hampshire's best-known politicians and their families, including current Republican Senator John E. Sununu and his three children and former Nashua Mayor Brenda Elias.

In the case of Salem, New Hampshire (ZIP code 03079), the 594 Lebanese Americans include former New Hampshire Republican Governor and chief of staff to former President George H. W. Bush, John H. Sununu, the father of Senator Sununu. In Bedford (ZIP code 03110), the 44 Lebanese-Americans in the town include members of the Sununu family. In the case of Dover (ZIP Code 03820), the Lebanese-American community includes Bill Shaheen, the husband of former Democratic Governor Jeanne Shaheen, and their three children. Jeanne Shaheen is currently the national co-chair of Senator John Kerry's presidential campaign.*

DHS also obtained specific breakdowns of Iraqi-Americans and Palestinian-Americans. In certain towns, where their respective populations are low, it would not be difficult for DHS to ascertain the identities of the individuals by family unit. Such are the cases with the Iraqi-American populations of the Massachusetts towns of Longmeadow (7 people), Andover (8 people), Cambridge (6 people), Chelsea (8 people), and East Providence, Rhode Island (5 people). The same situation applies to Palestinian-Americans in the census records where the breakdown shows 5 members of that ancestry in Springfield, Massachusetts and 3 in Londonderry, New Hampshire.

* Shaheen is now the senior Senator from New Hampshire.

 

 

 

 
anonymous
This administration likes to write memos to itself, justifying the most horrendous acts. Wars of aggression, torture, assassination, the destruction of 800 years of our common law heritage (habeas corpus), and 250 years of American law in the body of our Constitution.

Some of these are public. Two more have recently come partially into the light.

The first is an awareness of some kind of communication surveillance. Currently some groups believe that this is limited to the data mining of so called pen register information. But, pen register data does not require a warrant for access. This data is composed of basic information about individual calls like date, time, length, and number called. There is no need for the NSA to collect this data either. All most all billing of American phone calls is done by an Israeli company called Amdocs. This data would be most cheaply and conveniently purchased directly from Amdocs.

NSA also has the legal "right" to collect basic email data without a warrant as well. This includes the information in the email header including but not limited to sender, recipients, data, time, length, attachment names, etc. The legal precedent for the NSAs gathering of basic email data without a warrant was actually based on its existing "right" to pen register data.

So this current debacle is over something more than pen register data. For around two decades, academic publication of much optical computing theory and technology has been suppressed by our government. The suppression of academic information is nothing new. I specifically recall that during the 1970's our government prevented the publication of biomedical research because the research referred to unapproved uses of FDA cleared drugs.

Specialized optical units and array processors will massively increase the parallel processing capacities of the real time capacity required to effectively provide voice recognition capabilities on a large scale. The NSA has been rumored to have these capacities for some time. It is much more likely that the contents of the phone calls themselves are being monitored and data mined. Otherwise, there would be no furor over this whole issue.

The other significant Constitutional attack that is presently coming into the light is about a program of warrant-less sneak and peek searches of Muslim owned homes, businesses and property. These illicit searches are reputed to center around searches for radioactive material. At first 100 such searches were said to have taken place, but more recent reports have upped that number to over 500.

It is clear that this tyrant president will not accept any limitations on his power. Even though the law is clear, his minions tout the line that his war powers are unlimited. Our entire legal and societal heritage as well as our way of life is under viscious attack from our own leaders.

 

Wired   Appeals Court Allows Classified Evidence in Spy Case By David Kravets February 27, 2009 | 3:49:39 PMCategories: Surveillance A federal appeals court dealt a blow to the Obama administration Friday when it refused to block a judge from admitting top secret evidence in a lawsuit weighing whether a U.S. president may bypass Congress, as President George W. Bush did, and establish a program of eavesdropping on Americans without warrants.

The legal brouhaha concerns U.S. District Judge Vaughn Walker's decision in January to admit as evidence a classified document allegedly showing that two American lawyers for a now-defunct Saudi charity were electronically eavesdropped on without warrants by the Bush administration in 2004. The lawyers — Wendell Belew and Asim Ghafoor — sued the Bush administration after the U.S. Treasury Department accidentally released the top secret memo to them.

The courts had ordered the document, which has never been made public, returned and removed from the case after the Bush administration declared it a state secret. The document's admission to the case is central for the two former lawyers of the Al-Haramain Islamic Foundation charity to acquire legal standing so they may challenge the constitutionality of the warrantless-eavesdropping program Bush publicly acknowledged in 2005.

Absent intervention from the U.S. Supreme Court, the one-line decision (.pdf) by the 9th U.S. Circuit Court of Appeals means the lawyers' case is the only lawsuit likely to litigate the merits of a challenge to Bush's secret eavesdropping program adopted in the aftermath of the Sept. 11 terror attacks.

"We're trying to establish a legal precedent: A rule that the president must comply with legislation passed by Congress," said Jon Eisenberg, the attorney for the two lawyers. "The president is not above the law. This case is important to establish a legal precedent."

The lawyers' suit looked all but dead in July when they were initially blocked from using the document to prove they were spied on. They were forced to return it to the government after it was declared a state secret.

But last month, Walker said the document could be used in the case because there was sufficient, anecdotal evidence unrelated to the document that suggests the lawyers for the Al-Haramain charity were spied upon. Without the document, the lawyers didn't have a case.

The Bush and the Obama administration's said the document's use in the trial was a threat to national security. The document at issue isn't likely to ever become public.  Walker's Jan. 5 order only allows lawyers in the case to view it, and they are forbidden to publicly discuss its contents.

Bush acknowledged the existence of the so-called Terror Surveillance Program in 2005. It authorized the NSA to intercept, without warrants, international communications to or from the United States that the government reasonably believed involved a member or agent of al-Qaeda, or affiliated terrorist organization. Congress authorized such spying activity in July.

The Electronic Frontier Foundation claims the TSP went further, and accuses the nations' telecommunication companies of funneling all electronic communications to the National Security Agency without warrants. However, as part of the spy bill approved in July, the government immunized the telcos from lawsuits accusing them of being complicit with the Bush administration.

The Obama administration on Thursday urged Judge Walker, the same judge in the Al-Haramain case, to dismiss the EFF's challenge to the immunity legislation. Walker's decision is pending. The U.S. government had designated Al-Haramain a terror organization.  The Justice Department declined comment.

 

free hit counter javascript

Warrantless searches by FBI
WASHINGTON - The FBI secretly sought information last year on 3,501 U.S. citizens and legal residents from their banks and credit card, telephone and Internet companies without a court's approval, the Justice Department said Friday.

It was the first time the Bush administration has publicly disclosed how often it uses the administrative subpoena known as a National Security Letter, which allows the executive branch of government to obtain records about people in terrorism and espionage investigations without a judge's approval or a grand jury subpoena.  Friday's disclosure was mandated as part of the renewal of the Patriot Act, the administration's sweeping anti-terror law.

The FBI delivered a total of 9,254 NSLs relating to 3,501 people in 2005, according to a report submitted late Friday to Democratic and Republican leaders in the House and Senate. In some cases, the bureau demanded information about one person from several companies.

The numbers from previous years remain classified, officials said.  The department also reported it received a secret court's approval for 155 warrants to examine business records last year under a Patriot Act provision that includes library records. However, Attorney General Alberto Gonzales has said the department has never used the provision to ask for library records.

The number was a significant jump over past use of the warrant for business records. A year ago, Gonzales told Congress there had been 35 warrants approved between November 2003 and April 2005.  The spike is expected to be temporary, however, because the Patriot Act renewal that President Bush signed in March made it easier for authorities to obtain subscriber information on telephone numbers captured through certain wiretaps.

The Foreign Intelligence Surveillance Court, the same panel that signs off on applications for business records warrants, also approved 2,072 special warrants last year for secret wiretaps and searches of suspected terrorists and spies. The record number is more than twice as many as were issued in 2000, the last full year before the terrorist attacks of Sept. 11, 2001.

The FBI security letters have been the subject of legal battles in two federal courts because, until the Patriot Act changes, recipients were barred from telling anyone about them.  Ann Beeson, the associate legal counsel for the American Civil Liberties Union, said the report to Congress "confirms our fear all along that National Security Letters are being used to get the records of thousands of innocent Americans without court approval."  The number disclosed Friday excludes requests for subscriber information, an exception written into the law. It was unclear how many FBI letters were not counted for that reason.

Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted
Exclusive: Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted; Senate Demanding Answers By BRIAN ROSS, VIC WALTER, and ANNA SCHECTER Oct. 9, 2008— Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. The chairman of the Senate Intelligence Committee, Jay Rockefeller (D-WV), called the allegations "extremely disturbing" and said the committee has begun its own examination. "We have requested all relevant information from the Bush Administration," Rockefeller said Thursday. "The Committee will take whatever action is necessary." "These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones," said Adrienne Kinne, a 31-year old US Army Reserves Arab linguist assigned to a special military program at the NSA's Back Hall at Fort Gordon from November 2001 to 2003. Kinne described the contents of the calls as "personal, private things with Americans who are not in any way, shape or form associated with anything to do with terrorism." WATCH Kinne discuss why it was 'awkward' listening to her fellow Americans. She said US military officers, American journalists and American aid workers were routinely intercepted and "collected on" as they called their offices or homes in the United States. Watch "World News Tonight with Charles Gibson" and "Nightline" for more of Brian Ross' exclusive report. Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad's Green Zone from late 2003 to November 2007. "Calling home to the United States, talking to their spouses, sometimes their girlfriends, sometimes one phone call following another," said Faulk. WATCH Faulk discuss what a day on the job was like listening to Americans. The accounts of the two former intercept operators, who have never met and did not know of the other's allegations, provide the first inside look at the day to day operations of the huge and controversial US terrorist surveillance program. "There is a constant check to make sure that our civil liberties of our citizens are treated with respect," said President Bush at a news conference this past February. But the accounts of the two whistleblowers, which could not be independently corroborated, raise serious questions about how much respect is accorded those Americans whose conversations are intercepted in the name of fighting terrorism. US Soldier's 'Phone Sex' Intercepted, Shared Faulk says he and others in his section of the NSA facility at Fort Gordon routinely shared salacious or tantalizing phone calls that had been intercepted, alerting office mates to certain time codes of "cuts" that were available on each operator's computer. "Hey, check this out," Faulk says he would be told, "there's good phone sex or there's some pillow talk, pull up this call, it's really funny, go check it out. It would be some colonel making pillow talk and we would say, 'Wow, this was crazy'," Faulk told ABC News. Faulk said he joined in to listen, and talk about it during breaks in Back Hall's "smoke pit," but ended up feeling badly about his actions. "I feel that it was something that the people should not have done. Including me," he said. In testimony before Congress, then-NSA director Gen. Michael Hayden, now director of the CIA, said private conversations of Americans are not intercepted. "It's not for the heck of it. We are narrowly focused and drilled on protecting the nation against al Qaeda and those organizations who are affiliated with it," Gen. Hayden testified. He was asked by Senator Orrin Hatch (R-UT), "Are you just doing this because you just want to pry into people's lives?" "No, sir," General Hayden replied. Asked for comment about the ABC News report and accounts of intimate and private phone calls of military officers being passed around, a US intelligence official said "all employees of the US government" should expect that their telephone conversations could be monitored as part of an effort to safeguard security and "information assurance." "They certainly didn't consent to having interceptions of their telephone sex conversations being passed around like some type of fraternity game," said Jonathon Turley, a constitutional law professor at George Washington University who has testified before Congress on the country's warrantless surveillance program. "This story is to surveillance law what Abu Ghraib was to prison law," Turley said. Listening to Aid Workers NSA awarded Adrienne Kinne a NSA Joint Service Achievement Medal in 2003 at the same time she says she was listening to hundreds of private conversations between Americans, including many from the International Red Cross and Doctors without Borders. "We knew they were working for these aid organizations," Kinne told ABC News. "They were identified in our systems as 'belongs to the International Red Cross' and all these other organizations. And yet, instead of blocking these phone numbers we continued to collect on them," she told ABC News. WATCH Kinne describe how listening to aid workers was part of the job. A spokesman for Doctors Without Borders, Michael Goldfarb, said: "The abuse of humanitarian action through intelligence gathering for military or political objectives, threatens the ability to assist populations and undermines the safety of humanitarian aid workers." Both Kinne and Faulk said their military commanders rebuffed questions about listening in to the private conversations of Americans talking to Americans. "It was just always, that , you know, your job is not to question. Your job is to collect and pass on the information," Kinne said. Some times, Kinne and Faulk said, the intercepts helped identify possible terror planning in Iraq and saved American lives. "IED's were disarmed before they exploded, that people who were intending to harm US forces were captured ahead of time," Faulk said. NSA job evaluation forms show he regularly received high marks for job performance. Faulk left his job as a newspaper reporter in Pittsburgh to join the Navy after 9/11. Kinne says the success stories underscored for her the waste of time spent listening to innocent Americans, instead of looking for the terrorist needle in the haystack. "By casting the net so wide and continuing to collect on Americans and aid organizations, it's almost like they're making the haystack bigger and it's harder to find that piece of information that might actually be useful to somebody," she said. "You're actually hurting our ability to effectively protect our national security." The NSA: "The Shadow Factory" Both former intercept operators came forward at first to speak with investigative journalist Jim Bamford for a book on the NSA, "The Shadow Factory," to be published next week. "It's extremely rare," said Bamford, who has written two previous books on the NSA, including the landmark "Puzzle Palace" which first revealed the existence of the super secret spy agency. "Both of them felt that what they were doing was illegal and improper, and immoral, and it shouldn't be done, and that's what forces whistleblowers." WATCH Bamford describe how the NSA missed signals leading up to 9/11. A spokesman for General Hayden, Mark Mansfield, said: "At NSA, the law was followed assiduously. The notion that General Hayden sanctioned or tolerated illegalities of any sort is ridiculous on its face."
NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider
The Register  NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider ....   By Lewis Page • , 8th July 2010 09:20 GMT    ...   The US National Security Agency (NSA) is embarking on a secret domestic surveillance project dubbed "Perfect Citizen", intended to monitor and protect important national infrastructure such as power grids and transport systems.    ...   The Wall Street Journal, citing unnamed government and industry sources, says that the NSA has awarded a "black" (classified) $100m contract to defence contractor Raytheon which will see secret monitoring equipment installed within US networks deemed to be of national importance.    ...   According to the WSJ, Perfect Citizen has caused some disquiet among those in the know. It could be seen as the NSA - a military combat support agency whose focus is supposed to be on external threats - carrying out massive automated surveillance of American companies and citizens. The paper quotes an internal Raytheon email as saying that "Perfect Citizen is Big Brother".    ...   The stated purpose of the project is to get a clear idea of the level of threat facing American infrastructure IT. Many older systems, designed in the pre-network world, have since been hooked up to the internet for ease of use and maintenance. It is feared by some in the US intelligence / defence community that unfriendly powers and organizations are already engaged in probing these systems with a view to learning how to attack them.    ...   The NSA's Perfect Citizen equipment would be designed to flag up unusual network events indicating an impending cyber attack, according to the WSJ's sources.    ...   "You've got to instrument the network to know what's going on, so you have situational awareness to take action," an unnamed military source told the paper.    ...   Many of the networks that the NSA would wish to place Perfect Citizen equipment on are privately owned, however, and some could also potentially carry information offering scope for "mission creep" outside an infrastructure-security context. For instance, full access to power company systems might allow the NSA to work out whether anyone was at home at a given address. Transport and telecoms information would also make for a potential bonanza for intrusive monitoring.    ...   The full scope of the project remains to be determined, according to the WSJ report, with no certainty as yet on which companies or types of companies would be asked to cooperate - or how much information the NSA would get access to.    ...   The NSA - whose boss has now also been confirmed as head of the Pentagon's uniformed Cyber Command - apparently got the job by default, as it is considered the only US agency with enough network and cyber savvy to take the task on.    ... The Reg has contacted Raytheon and the NSA for comment on Perfect Citizen, but thus far has not received any reply. ®
Electronic Frontier Foundation  
AP SAN FRANCISCO - The Justice Department said Friday it was moving to dismiss a federal lawsuit challenging the Bush administration's secretive domestic wiretapping program.   The lawsuit, brought by the Internet privacy group, Electronic Frontier Foundation, does not include the government.  Instead, it names AT&T, which the San Francisco-based group accuses of colluding with the National Security Agency to make communications on AT&T networks available to the spy agency without warrants.

The government, in a filing here late Friday, said the lawsuit threatens to expose government and military secrets and therefore should be tossed. The administration added that its bid to intervene in the case should not be viewed as a concession that the allegations are true.  As part of its case, the EFF said it obtained documents from a former AT&T technician showing that the NSA is capable of monitoring all communications on AT&T's network, and those documents are under seal. The former technician said the documents detail secret NSA spying rooms and electronic surveillance equipment in AT&T facilities.

Next month, U.S. District Judge Vaughn Walker will hold a hearing on whether they should be divulged publicly.  President Bush confirmed in December that the NSA has been conducting the surveillance when calls and e-mails, in which at least one party is outside the United States, are thought to involve al-Qaida terrorists.  In congressional hearings earlier this month, Attorney General Alberto Gonzales suggested the president could order the NSA to listen in on purely domestic calls without first obtaining a warrant from a secret court established nearly 30 years ago to consider such issues.

Gonzales said the administration, assuming the conversation related to al-Qaida, would have to determine if the surveillance were crucial to the nation's fight against terrorism, as authorized by Congress following the Sept. 11 attacks.  The EFF lawsuit, alleging AT&T violated U.S. law and its customers' privacy, seeks to stop the surveillance program.  The San Antonio-based telecommunications giant said it follows all applicable laws.

 

 

60 Minutes on NSA corruption and incompetence. Report follows WMR report by six years   May 24, 2011 -- WayneMadsenReport
CBS "60 Minutes" reported on May 22 on former National Security Agency (NSA) official Thomas Drake's charges of high-level corruption and incompetence within the eavesdropping agency.

WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J. Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer Diane Roark, Justice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by Jane Mayer fails to mention this important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli espionage in the United States, it's "see no evil, hear no evil, say no evil."

NSA and selling the nation's prized secrets to contractors

June 1, 2005

On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.

CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.

In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.

But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.

NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.

CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.

Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.

When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.

According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO HALF HEALYMINK LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT.

A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA) GALLEYMAN GALLEYPROOF JAGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II, III, and KL TEXTA SPOT

In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

 

Terahertz Spectroscopy
Wikipedia Typically, the terahertz pulses are generated by an ultrashort pulsed laser and last only a few picoseconds. A single pulse can contain frequency components covering the whole terahertz range from 0.05 to 4 THz. For detection, the electrical field of the terahertz pulse is sampled and digitized, conceptually similar to the way an audio card transforms electrical voltage levels in an audio signal into numbers that describe the audio waveform. In THz-TDS, the electrical field of the THz pulse interacts in the detector with a much-shorter laser pulse (e.g. 0.1 picoseconds) in a way that produces an electrical signal that is proportional to the electric field of the THz pulse at the time the laser pulse gates the detector on. By repeating this procedure and varying the timing of the gating laser pulse, it is possible to scan the THz pulse and construct its electric field as a function of time. Subsequently, a Fourier transform is used to extract the frequency spectrum from the time-domain data. [edit]Advantages of THz radiation THz radiation has several distinct advantages over other forms of spectroscopy: many materials are transparent to THz, THz radiation is safe for biological tissues because it is non-ionizing (unlike for example X-rays), and images formed with terahertz radiation can have relatively good resolution (less than 1 mm). Also, many interesting materials have unique spectral fingerprints in the terahertz range, which means that terahertz radiation can be used to identify them. Examples which have been demonstrated include several different types of explosives, polymorphic forms of many compounds used as Active Pharmaceutical Ingredients (API) in commercial medications as well as several illegal narcotic substances. Since many materials are transparent to THz radiation, these items of interest can be observed through visually opaque intervening layers, such as packaging and clothing. Though not strictly a spectroscopic technique, the ultrashort width of the THz radiation pulses allows for measurements (e.g., thickness, density, defect location) on difficult to probe materials (e.g., foam). The measurement capability shares many similarities to that observed with pulsed ultrasonic systems. Reflections from buried interfaces and defects can be found and precisely imaged. THz measurements are non-contact however.
Prodigal
Cherie Anderson runs a travel company in southern California, and she’s convinced the federal government is reading her emails. But she’s all right with that. “I assume it's part of the Patriot Act and I really don't mind,” she says. “I figure I'm probably boring them to death.” It's likely Anderson is not alone in her concerns that the government may be monitoring what Americans say, write, and read. And now there may be even more to worry about: a newly revealed security research project called PRODIGAL -- the Proactive Discovery of Insider Threats Using Graph Analysis and Learning -- which has been built to scan IMs, texts and emails . . . and can read approximately a quarter billion of them a day.

“Every time someone logs on or off, sends an email or text, touches a file or plugs in a USB key, these records are collected within the organization,” David Bader, a professor at the Georgia Tech School of Computational Science and Engineering and a principal investigator on the project, told FoxNews.com. PRODIGAL scans those records for behavior -- emails to unusual recipients, certain words cropping up, files transferred from unexpected servers -- that changes over time as an employee "goes rogue." The system was developed at Georgia Tech in conjunction with the Defense Advanced Research Projects Agency (DARPA), the Army's secretive research arm that works on everything from flying cars to robotic exoskeletons. Initially, PRODIGAL will scan only the communications of military volunteers and people who work in federal agencies. But the very existence of such a project is sure to unnerve citizens like Anderson. Is the government reading my emails? Are they already monitoring me? "Some people say it's one step further toward a police state," said Anthony Howard, a book author and security expert who has consulted for the Department of Homeland Security. But Bader and other experts are quick to dismiss the idea that PRODIGAL could be used to monitor everyone in America. The scans work only on internal systems, they say -- not across the entire Internet. And the experts say such a project is long overdue: by monitoring for "anomalies" and predicting extreme behavior, catastrophes can be prevented, such as a soldier in good mental health becoming homicidal or a government employee sharing key classified information. “Today, an analyst may receive tens of thousands of 'anomalies' per day, where an anomaly is an unexplained event,” Bader said. The new system is designed to aid analysts in processing those anomalies. And it's not alone. Bader equated the PRODIGAL system to Raytheon SureView, an internal scanning system that looks for suspicious activity and alerts federal agencies about possible threats. Another system is the Einstein project, which was developed after 9/11 and scans government employees for key words and links suspicious activity to National Security Agency databases. But PRODIGAL scans vastly more data than those systems: as much as a terabyte or more per day, what Georgia Tech described as "massive data sets." PRODIGAL is part of an existing DARPA security project called Anomaly Detection at Multiple Scales (ADAMS), which was announced earlier this year. Details about how ADAMS works are not widely known; Georgia Tech's recent announcement is one of the first reports to explain how these detection engines work.

According to Bader, PRODIGAL uses complex "graph-processing" algorithms to analyze threats and piece together a jigsaw puzzle of communications. The system then ranks the unusual activity before feeding the most suspicious threats to agents. Cyber-security expert Joseph Steinberg, CEO of Green Armor Solutions, said ADAMS is unique in that it scans through a massive stream of data. He says the new project, which will take about two years to develop and will cost $9 million, will be more effective at analyzing threats and determining if they are valid. But the issue is not the scanning technology itself; it’s how the information is interpreted -- and whether it ultimately helps at all, Howard told FoxNews.com. "Since there is no real data publicly available to substantiate that any of this technology is preventing terrorist attacks or strengthening our borders from within, [we can't] really say definitively that this technology is doing any good," he said. The challenge, he said, is that criminals and terrorists often use multiple channels of communication, some encrypted -- and know how to avoid existing detection systems. Nevertheless, PRODIGAL’s ability to scan reams of data is clearly the next step in tracking unusual activity, and it’s guaranteed to raise a red flag for Anderson and others. "Since people tend to be imperfect, the data captured can easily be mishandled. Where does it end?" Howard said.

Read more: http://www.foxnews.com/scitech/2011/12/03/could-us-government-start-reading-your-emails/#ixzz1fUgqaOeA

 

WMR  NSA spying operation targeting journalists focused but massive
April 20-22, 2012 -- NSA spying operation targeting journalists focused but massive  National Security Agency (NSA) sources have reported the following to WMR: The NSA has conducted a targeted but massive surveillance operation against certain journalists who have routinely exposed NSA's illegal domestic communication surveillance program, code named STELLAR WIND.    ...   NSA has, for some time, kept tabs on journalists who wrote about the communication spying agency. In its embryonic stage, the journalist surveillance system, originally code-named FIRSTFRUITS, was basically a clipping service that provided NSA and CIA analysts with copies of newspaper, magazine, and Internet articles that mentioned one or both of the two agencies.    ...   Shortly after the September 11, 2001 attacks, Vice President Dick Cheney's legal counsel, David Addington, visited NSA headquarters at Fort Meade, Maryland with a list of individuals he wanted NSA to spy on and provide Cheney's office with transcripts of phone calls and e-mails. From that visit, STELLAR WIND was developed as an illegal surveillance system targeting journalists, members of Congress, and other "persons of interest" for the White House.    ...   In March 2004, Attorney General John Ashcroft ruled STELLAR WIND illegal but the next day he became critically ill with pancreatitis. When White House chief of staff Andrew Card and White House counsel Alberto Gonzales visited Ashcroft in his hospital room to demand he sign off on the program, Ashcroft deferred to his deputy James Comey and FBI director Robert Mueller who both refused to authorize the program. George W. Bush overruled Ashcroft, Comey, and Mueller and continued to authorize STELLAR WIND. President Obama has continued to authorize STELLAR WIND, according to NSA sources.    ...   Although STELLAR WIND continues to generally target journalists who write about intelligence and national security matters, NSA has concentrated its efforts on three journalists, in particular. They are New York Times' reporter and author of State of War James Risen, journalist and author of The Puzzle Palace and Body of Secrets James Bamford, and WMR editor Wayne Madsen. Risen continues to fight a grand jury subpoena to testify about his sources on Operation Merlin, a CIA program to deliver flawed nuclear design technology to Iran. Former CIA officer Jeffrey Sterling has been indicted and charged under the Espionage Act for revealing details of the program. Risen's subpoena was quashed by Judge Louise Brinkema of the U.S. District Court for the Eastern District of Virginia, but the Obama administration has appealed the decision to the U.S. Appeals Court for the Fourth Circuit in Richmond, Virginia and oral arguments in the case are scheduled for next month.    ...   NSA sources report: Wayne Madsen's e-mails and phone conversations back to 2002 are in the possession of the NSA. The phone calls range from those with his mother to those with government sources. All passwords to social networking websites, banks, phone companies, credit card companies, and his website, WayneMadsenReport, are held by the NSA. The data includes the list of his subscribers to WayneMadsenReport, as well.    ...   The same level of detailed data is maintained on Risen and Bamford.    ...   Personal observation: It is very clear that a number of individuals who contacted this editor over the past several years to pass on information were stymied at the last minute from maintaining contact. These individuals were willing to provide information on: the movement and temporary "loss" of nuclear weapons from Minot Air Force Base in North Dakota to Barksdale Air Force Base in Louisiana in 2007 coupled with the murder of Air Force special operation Captain John Frueh in Washington state; documents proving Canadian military involvement in torture of detainees in Afghanistan; information on the 2000 attack on the USS Cole in Aden harbor being a "false flag" attack; evidence that there were no human remains found at the crash site of United flight 93 in Shanksville, Pennsylvania; and evidence showing that Harvard virologist Dr. Don Wiley, who was investigating the initial anthrax attacks, was murdered in Memphis in November 2001.    ...   In all these cases, individuals who contacted this editor and were willing to provide information ceased contact after their initial phone calls, letters, and email.    ...   NSA also maintains mail covers on addresses of certain individuals in the event that contact is made via the U.S. Postal Service or private companies such as FedEx or DHL.    ...   FIRSTFRUITS, which is now known by a different cover name, contains, in addition to articles, complete transcripts of phone calls, e-mails, faxes, and letters, in addition to the numbers and names of all individuals who have been in contact with targeted journalists. In addition to the three high priority targets -- Risen, Bamford, and Madsen -- other journalists who are a subject of the NSA warrantless surveillance include Bill Gertz of The Washington Times, Eric Lichtblau and Scott Shane of The New York Times, Siobhan Gorman, formerly of The Baltimore Sun and now with The Wall Street Journal, and Seymour Hersh with The New Yorker.   ..   So far, the Obama administration has brought Espionage Act charges against six individuals for contact with the media. They are charged with providing classified information to journalists and "aiding the enemy."    ...   However, the Justice Department may take an even more draconian turn. This editor has heard from NSA insiders that there is a willingness by some quarters to charge two of the three key targeted journalists under the Espionage Act. Since Bamford and Madsen both once worked at NSA and both signed non-disclosure agreements -- Bamford in the 1960s and Madsen in the mid-1980s -- there has been talk of indicting them also for violations of the Espionage Act, along with their sources in the intelligence community.

 

RT Stratfor emails reveal secret, widespread TrapWire surveillance system
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous. Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it's the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation's ties are assumed to go deeper than even documented. The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing. Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails. On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning. Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site. According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be "analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.” In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces. What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf). “Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.” In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product “can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.” An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.” Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the "See Something, Say Something" program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well. In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the eleven months. News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.
FBI / BioMetric   Facial Recognition and Identification Initiative.pdf text and RT
Facial Recognition and Identification Initiatives Richard W. Vorder Bruegge Federal Bureau of Investigation 2 Image Technology in the Forefront • Unparalleled ease of capturing, storing, copying, and sharing images • Proliferation of surveillance cameras, expanding global media enterprises, and average citizens with mobile phone still and video camera capabilities • Unprecedented level of sharing images and videos via the internet and other advanced communication methods • Photographs and videos depicting victims, suspects, and eyewitnesses are becoming the subject of investigations Face: Forensic Discipline And Biometric 3 Biometrics Forensics • A measurable biological (anatomical and physiological) or behavioral characteristic used for identification – Facial Recognition (FR) - the automated searching of a facial image in a computer database, typically resulting in a group of facial images ranked by computer evaluated similarity computer- evaluated • Visible physical characteristics one can use for the purposes of measurements or comparisons that are collected after an event – Facial Identification (FI) - the manual examination of the differences and similarities between two facial images for the purpose of determining if they represent different persons or the same person Event 4 FI & FR Address Multiple Missions • Mission Areas: – Access control – Automated identity verification – Human identification – Screening – Surveillance – Law enforcement & national security investigations – Identity intelligence to understand intent 5 FBI Facial Use Cases • Identifying fugitives and missing persons in FR systems • Identifying unknown persons of interest from images (1:N) • Tracking subjects movements to/from critical events (e.g., 9/11) • Conducting automated surveillance at lookout locations (1:M, where 1<M<<N) • Identifying subjects in public datasets • Identifying subjects from images in seized systems • Verifying mug shots against National Criminal Information Center (NCIC) records (1:1) • Controlling access 6 Identifying Subjects from Images for 40 Years • The FBI’s Facial Recognition/Identification work is performed within the Forensic Audio, Video, and Image Analysis Unit (FAVIAU) • The FAVIAU is one of only a few accredited laboratories in the world that conducts examinations in the disciplines of video, image, and audio analysis The Biometric Center of Excellence (BCOE) is the Federal Bureau of Investigation’s (FBI) program for exploring and advancing the use of new and enhanced biometric technologies and capabilities for integration into operations 7 Driving New FBI Biometric Capabilities 8 Sponsoring Applied Research • Ongoing applied research, development, test & evaluation: – Universal Face & Iris Workstation – FBI Facial Collaboration-Facial Land marking/Facial Aging – Automated Face Detection and Recognition in Video – FI/FR of Twins (blemishes) – Obscuring Identity in Video – Repro Face (2D-3D-2D) – Facial Image and Camera Certification Process – Automated Retrieval of Scars, Marks, and Tattoos – Ear Recognition – Multiple Biometric Grand Challenge/Multiple Biometric Evaluation/ III Data Set Testing 9 Sponsoring Standards Development • Facial Identification Scientific Working Group (FISWG) • Sponsored by the BCOE and established in 2009 • Mission - “develop consensus standards, guidelines, and best practices for the discipline of image-based comparisons of human features” • Participants include federal, state, local, and international government agencies, as well as invited non-governmental organizations • Next meeting scheduled for November 15-18 in San Antonio, Texas • Visit www.FISWG.org Deepening FR Collaboration • Sponsored the International Face Collaboration Meeting – 5 foreign countries and 11 U.S. agencies participated • Participated in the FR workshop “From Bones to Bits” – 55 U.S. government and 47 contractor attendees • Sponsored the U.S. Government Facial Collaboration Meeting – 88 attendees representing numerous law enforcement, intelligence, and military agencies 10 Analyzing Legal And Privacy Concerns Tasks associated with this analysis include: • Identifying databases external to the FBI to which the FBI has legal access • Defining policy for both automated and human-tandem searching of databases and methods of how the images are used in searching and how they are destroyed or retained • Identifying privacy implications of applied research using images of human subjects 11 Developing Training Curriculum 12 Preparing for FR incorporation into Next Generation Identification (NGI) • The NGI system: – Incremental replacement of the current IAFIS – Improving current functionality and providing new functionality – Developing multimodal collection and search identification services  An upgrade to IAFIS – The FBI is developing an automated, interoperable multimodal biometric system 13 Enhanced ten print services 2011 Palmprints and latents 2012 Photos/Facial, scars, marks, and tattoos 2013 Iris 2014 13 Value Of the FBI-DMV Pilot Operational Results FR System Testing Identification of Follow-On Projects The BCOE-sponsored FR pilot program with NC DMV led to more than 700 leads including: • One federal fugitive apprehension • Six state fugitive apprehensions • One missing person resolution FACEMASK has also served as an opportunity for FBI analysts to operationally test a FR system and determine its strengths and weaknesses. This aids the FBI as it develops its own FR capability Due to this success, the FBI took advantage of an ongoing survey of U.S. DMVs and used it as an opportunity to identify other prospective state DMVs for follow-on projects Purpose Of The DMV Survey Initial Purpose • Collect DMV FR POC Information • Identify DMVs that have implemented FR systems Expanded Purpose • Gather data about FR vendors, state laws, and search protocol to help the FBI identify a DMV for a potential follow-on project • Technical systems information • Receptiveness to collaborating with the FBI • Various concerns and suggestions voiced by the DMVs and trends were recorded The FBI wanted to identify key FR POC in order to direct inquiring investigators and agencies. The original DMV survey focuses around contact information; however, with the success of the original pilot the purpose and scope of the data gathering effort changed. Potential FBI-DMV FR Pilot Expansion Active FR System NO FR System Unknown/No Response Key Takeaway: More than half of all state DMVs have FR systems. Their main goal is to detect and combat fraud Responses current as of (05/28/2010) 16 * * * * * * * * * * * * * * * * * * Permit Law Enforcement Access to Data * DMV Survey High Level Findings Specific Findings  The vast majority of states that have FR Systems use L1 Technologies Technology Vendors Legal Requirements Funding Knowledge  Many DMV image databases are maintained and searched by their vendors. This presents privacy issues that should be explored   Across the nation, there are widely varying legal requirements. To initiate searches, some DMVs require Memorandums of Understanding (MOU) while some just require the requesting agency to buy their vendor’s software  Due to a lack of funding, some states who had planned to develop FR systems had to delay or cancel their plans due to budgetary constraints  Many DMV POCs lacked technical knowledge about their systems and the legal issues involved in their use. Since most POCs were unable or unwilling to nominate alternative POCs, more in-depth research may be required before FBI collaboration can be considered (i.e., researching state laws that apply to the DMV’s FR system or interviewing a DMV’s vendor for more specific systems information)  Questions / Comments Contact Information: Richard Vorder Bruegge Email: Richard.VorderBruegge@ic.fbi.gov Additional Resources: www.BiometricCoE.gov Email: BiometricCoE@leo.gov
WMR GROUNDBREAKER   NSA and selling the nation's prized secrets to contractors
June 1, 2005

On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India.

CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.

In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.

But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States.

NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.

CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.

Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.

When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel.

According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee.

What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.

With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.

Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"

According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all [emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-operational administrative support functions originally specified in the GROUNDBREAKER contract.

The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.

The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms:

CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO HALF HEALYMINK LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT. A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:

ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA) GALLEYMAN GALLEYPROOF JAGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II, III, and KL TEXTA SPOT In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include

ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC

BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER

CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS

DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST

EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET

FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL

GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER

HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE

ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW

JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER

KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE

LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY

MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY

NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC

OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH

PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II

QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER

RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY

SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT

TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT

UMORPH, UNLIMITED

VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED

WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP

XVTUBA

YELLOWSTONE, YETLING

ZENTOOLS, ZIGZAG, and ZIRCON

 

 NSA establishing large Internet surveillance facility in Tennessee ... Multiprogram Research Facility    April  2012
Sources in the U.S. intelligence community report that the National Security Agency (NSA) is establishing a major Internet surveillance at the Oak Ridge National Laboratory in Tennessee that is dedicated to decrypting encoded communications, including file transfers, over the Internet and within private private networks such as those used by banks, foreign governments, and multinational corporations.

The new multi-structure NSA facility is called the Multiprogram Research Facility and will work in tandem with the massive NSA data center being built in Bluffdale, Utah on acreage that is part of the Camp Williams Utah National Guard base. The Utah center will store massive amounts of intercepted data and the Oak Ridge facility will rely on new generation supercomputers to decode encrypted data stored at the Bluffdale facility and that which is captured in real time from NSA's worldwide signals intelligence system.

The Oak Ridge center will also complement the NSA's High Performance Computing Center at Fort Meade, currently under construction and scheduled for completion in 2015. It is rumored that the building at Fort Meade will contain the world's fastest computer, the speed of which will be measured in Exa-FLOPs. A FLOP means FLoating point OPerations per Second and exa means a 1 followed by 19 zeros.

WMR was first alerted to the Oak Ridge facility when NSA began transferring personnel from its Fort Meade, Maryland headquarters to Oak Ridge. The NSA has, for the past decade, been spreading out its functions to facilities around the country, including at regional facilities at Fort Gordon, Georgia (NSA Georgia); San Antonio, Texas (NSA Texas); and Kunia, Hawaii (NSA Hawaii). The Utah and Tennessee facilities represent a further expansion of NSA's "Big Brother" surveillance network to additional regions of the United States.

And with the new NSA facility at Oak Ridge comes the expansion of the Obama administration's already-massive counter-intelligence (anti-whistle blowing) operations into Tennessee. The FBI field office in Knoxville, working with NSA's Q Group, have been active in ensuring that NSA employees and contractors refrain from discussing the new Oak Ridge center with uncleared individuals, including members of the media.

 

WMR What's behind all the personal data thefts?
June 17, 2006 (UPDATED) -- What's behind all the personal data thefts? Populating the surveillance databases specified by John Poindexter's Total Information Awareness (TIA) system? WMR has learned that the thefts of personal data from corporations and government agencies, most of which were accomplished by stealing computer hard drive devices, is more than coincidental. Intelligence sources report that many of the large scale thefts are part of a well-planned covert intelligence operation to obtain data on hundreds of millions of people in order to accomplish what former Defense Advanced Research Projects Agency (DARPA) official John Poindexter was not able to bring about through his defunct (but secretly restored) Total Information Awareness (TIA) system -- the population of intelligence and surveillance databases with files on the financial, medical, employment, telecommunications, and other sensitive data of Americans and foreigners. Much of the new TIA work is being conducted under the umbrella of the National Security Agency and Department of Homeland Security Advanced Research Projects Agency.    ...   A number of computer security experts have said the recent rash of data thefts is unprecedented in scope, method, and frequency. Some claim that the thefts appear to be coordinated and targeted at specific data types.    ...   The physical theft of personal data is unprecedented in the history of computer security in the United States. Intelligence sources reveal massive data theft is part of a plan to populate U.S. surveillance databases.   The following is a compilation of the recent reported data thefts (not all may be related to the data gathering operation):

Date Number of persons affected Type of data Method Nebraska Treasurer's Office June 2006 300,000 SSNs, DOBs Hacking Minnesota Department of Revenue June 2006 2,400 taxpayers/48,000 businesses SSNs, other personal data Physical theft Allstate, Huntsville, AL June 2006 Unknown Insurance info Physical theft Department of the Navy June 2006 28,000 SSNs, DOBs Leak Department of Agriculture June 2006 26,000 SSNs, DOBs Hacking ING Bank June 2006 13,000 SSNs, financial data Physical theft University of Alabama - Birmingham June 2006 9,800 SSNs, medical data Physical theft VISA USA June 2006 possibly millions financial data Leak Federal Trade Commission June 2006 1,100 FTC employees SSNs, DOBs Physical theft Denver Election Commission June 2006 150,000 Voter's records Physical theft Oregon Dept. of Revenue June 2006 2,200 Tax records Trojan horse Union Pacific Railroad June 2006 30,000 SSNs, DOBs Physical theft KDDI Telco, Japan June 2006 4,000,000 Phone numbers, DOBs Leaked Minnesota State Auditor June 2006 493 state employees SSNs, DOBs Physical theft Humana Medicare Program June 2006 17,000 SSNs, DOBs,Medical info Poss. compromise Hanford Nuclear Reservation June 2006 4,000 SSNs, DOBs Physical theft Royal Ahold (Giant, Tops, Stop & Shop supermarkets) June 2006 Unknown number SSNs, DOBs Physical theft Buckeye Community Health Plan (Ohio) June 2006 72,000 SSNs, medical data Physical theft Internal Revenue Service June 2006 291 IRS employees SSNs, fingerprints, DOBs Physical theft YMCA Rhode Island May 2006 65,000 SSNs, DOBs Physical theft Equifax May 2006 2,500 SSNs, DOBs Physical theft University of Delaware May 2006 1,076 SSNs, DOBs Hacking Sacred Heart University May 2006 unknown SSNs, DOBs Hacking Mercantile Potomac Bank May 2006 48,000 SSNs, account data Physical theft Florida International University May 2006 thousands SSNs, DOBs Hacking American Red Cross, Texas May 2006 unknown DOBs, medical information Physical theft University of Kentucky May 2006 6,500 SSNs, DOBs Physical theft Miami University of Ohio May 2006 851 SSNs, DOBs Loss of hardware American Institute of CPAs May 2006 330,000 SSNs, DOBs Loss of hardware Texas Guaranteed Student Loan Corp. May 2006 1,300,000 SSNs, DOBs Loss of hardware University of Ohio Hudson Health Center May 2006 60,000 SSNs, medical data Hacking Humana Medicare Program May 2006 250 Medicare applicants Paper applications Physical theft Wells Fargo Bank May 2006 unknown SSNs, account data Physical theft Dept. of Veterans Affairs May 2006 28,700,000 SSNs, medical information Physical theft Columbus Bank & Trust May 2006 2,000 Credit card data Physical theft University of Ohio Apr 2006 137,000 SSNs, DOBs Hacking Purdue Engineering School Apr 2006 1,351 SSNs, DOBs Hacking Department of Defense Apr 2006 14,000 SSNs, DOBs Hacking Aetna Apr 2006 38,000 SSNs, other data Physical theft Morgan Stanley, Clydesdale Bank (UK), Master Card Apr 2006 2,000 Credit card data Hacking University of Texas McCombs Business School Apr 2006 197,000 SSNs, DOBs Hacking Fraser Health Authority, Br. Columbia Apr 2006 thousands SINs, DOBs Physical theft University of Alaska Fairbanks Apr 2006 38,941 SSNs, DOBs Hacking Ohio Secretary of State Apr 2006 7,700,000 voters SSNs "Leak" on CDs Iron Mountain, Inc. Apr 2006 17,000 Long Island Railroad employees and retirees, Bronx VA Hospital SSNs, other data Physical theft American Red Cross Mar 2006 8,000 SSNs, DOBs Physical theft American International Group (AIG) Mar 2006 930,000 SSNs, medical information Physical theft U.S. Marine Corps Mar 2006 207,000 SSNs, DOBs Physical theft Georgia Technology Authority Mar 2006 570,000 SSNs, DOBs Hacking Vermont State Colleges Mar 2006 14,000 SSNs, credit data Physical theft Verizon Mar 2006 significant number SSNs, other data Physical theft Hewlett-Packard/Fidelity Investments Mar 2006 196,000 SSNs, other data Physical theft Ernst & Young Mar 2006 thousands of records on IBM employees SSNs, DOBs Physical theft Medco Health Solutions Mar 2006 4600 SSNs, DOBs Physical theft Hotels.com Feb 2006 243,000 Credit card information Physical theft Choice Point Feb 2006 150,000 Subscriber data Leak Georgetown University Feb 2006 41,000 elderly DC residents SSNs, DOBs Hacking Metropolitan College (Denver) Feb 2006 93,000 SSNs, DOBs Physical theft Olympic Funding Chicago Feb. 2006 unknown SSNs, financial data Physical theft Ernst & Young Feb. 2006 unknown SSNs, financial data Physical theft Deloitte & Touche Feb. 2006 9,000 McAfee employees SSNs, financial data Physical theft PriceWaterhouseCoopers Feb. 2006 4,000 SSNs, health data Physical theft Mount St. Mary's Hospital (NY) Feb. 2006 unknown SSNs, health data Physical theft US Department of Agriculture Feb. 2006 350,000 SSNs, DOBs Leak Providence Home Services Jan. 2006 365,000 SSNs, medical data Physical theft State of Hawaii Jan. 2006 40,000 state employees plus family members SSNs, DOBs Physical theft Ameriprise Financial, Inc. Jan. 2006 226,000 SSNs, financial data Physical theft People's Bank Jan. 2006 90,000 SSNs, financial data Physical theft Atlantis Resorts (Bahamas) Jan. 2006 55,000 SSNs, credit data Physical theft California National Guard Jan. 2006 hundreds of Guardsmen SSNs, other data Physical theft University of Washington Medical Ctr. Jan. 2006 1,600 SSNs, medical data Physical theft Marriott Dec. 2005 206,000 SSNs, credit data Physical theft Ford Motors Dec. 2005 70,000 SSNs, DOBs Physical theft LaSalle Bank/ABN Amro Mortgage Dec.2005 2,000,000 SSNs, financial data Lost/recovered First Trust Bank Dec.2005 thousands SSNs, financial data Physical theft ING Bank Dec. 2005 8,500 SSNs, financial data Physical theft TransUnion Nov. 2005 3,623 credit data Physical theft Safeway Nov. 2005 1,400 SSNs, DOBs Physical theft Keck School of Medicine (USC) Nov. 2005 50,000 SSNs, DOBs Physical theft Univ. of Tennessee Medical Center Oct. 2005 3,800 SSNs, medical data Physical theft Wilcox Memorial Hospital Oct. 2005 130,000 SSNs, DOBs Physical theft National Nuclear Safety Administration Sep 2005 1,500 SSNs, DOBs Hacking Children's Health Council (Palo Alto) Sep. 2005 6,000 SSNs, medical data Physical theft North Fork Bank Sep. 2005 9,000 SSNs, financial data Physical theft Kent State University Sep. 2005 100,000 SSNs, DOBs Physical theft J. P Morgan Chase Aug.2005 unknown SSNs, financial data Physical theft Arizona Biodyne (Blue Cross/Blue Shield) Jul 2005 57,000 SSNs, medical data Physical theft City National Bank (LA) Jul 2005 unknown SSNs, financial data Physical theft Federal Deposit Insurance Corp. Jun 2005 6,000 SSNs, DOBs Physical theft American Red Cross, Texas Jun 2005 unknown DOBs, medical information Physical theft Motorola Jun 2005 unknown financial, call data Physical theft U.S. Department of Justice/Omega Travel Jun 2005 80,000 travel, credit data Physical theft Cleveland State University Jun 2005 44,000 SSNs, DOBs Physical theft California Dept. of Health Services May 2005 21,600 SSNs, medical data Physical theft Colorado State Health Department May 2005 1,600 families SSNs, medical data Physical theft Lexis-Nexis May 2005 310,000 Phone records Hacking Bank of America, Wachovia, Commerce Bancorp, PNC Bank NA May 2005 676,000 Bank account information Hacking Valdosta State May 2005 40,000 SSNs, DOBs Hacking MCI April 2005 16,500 SSNs, employment data Physical theft Georgia Southern Univ. April 2005 thousands SSNs, credit card Hacking San Jose Medical Group April 2005 185,000 SSNs, medical data Physical theft Iron Mountain, Inc. Mar 2005 600,000 Time Warner employees SSNs, financial data Physical theft University of California, Berkeley Mar 2005 100,000 SSNs, DOBs Physical theft Ameritrade Feb. 2005 200,000 SSNs, financial data Physical theft Bank of America Feb. 2005 1,200,000 Federal employees SSNs, credit data Physical theft Australian High Tech Crime Center Feb. 2005 3,500 financial data, law enforcement data Loss

PatentlyApple Apple Wins Surprising Anti-Big Brother Surveillance Patent
One of the most surprising patents ever to be granted to Apple has been made public today by the US Patent and Trademark Office. It is one of the most interesting patents that I have ever read. It reads like a science fiction novel borrowing from George Orwell's 1949 book titled "Nineteen Eighty-Four." It also has shades of the 1982 movie the "Blade Runner," where the Master Cloner invents a method of implanting false memories into clones so as to provide them with a confident self-image. It also borrows from the movie "The Matrix," where fooling the bots of your presence was an everyday means of survival. Apple's patent is about saving your online identity from what they describe as the "Little Brothers Dataveillance." It's about a method of assisting users to keep their personal information hidden in a Cyberworld that is constantly building a profile on them. It appears that Apple will be able to "save us" from these Little Brothers in the future and it looks as though they're going to execute this via your iCloud ID. Today's report is deliberately lengthy so that you don't miss a detail of Apple's very important anti-big brother surveillance patent. This is really wild stuff. more
National Security letter,  Administrative subpoena   color coding airline passengers    top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • Cnet Tech News First, search Carnivore
  • Findlaw, Dean
  • Jurist, legal news and research, University of Pittsburg
  • PrivacyDigest privacy news
  • Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.
 
National ID Card   top
PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • ACLU, National ID card,
  • EPIC  Electronic Privacy Information Center, National ID card,
  • NoNAIS.com Protect Traditional Rights to Farm, stop RFID privicacy intrusion by Bush corporate America.
  • Privacy.org
  • Association of Motor Vehicle Administrators
  • Security Focus News Microsoft
  • National Conference of State Legislatures
  • International Biometric Group
  • National Intelligence Reform Act, requires drivers license standardization.
RT PIPS
License plate scanners let police patrol anyone, anytime Published: 30 October, 2012, 00:49 TAGS: CrimeUSAPoliceSecurity (AFP Photo / Mario Tama) Are you made uneasy by the soaring number of surveillance cameras being installed in big cities across the US? If so, don’t take solace in your sedan: cops are using cameras to collect intelligence on cars, even when no crimes are being committed. License plate scanners are nothing new for law enforcement, but more and more agencies across the US are relying on the technology as equipment becomes more affordable. As the cost of being able to catch a glimpse at every automobile in town drops day by day, though, the odds of being surveilled for simply riding around town is doing just the opposite. A recent post published on the PrivacySOS.org blog directs viewers to a YouTube video produced by PIPS Technology, the self-described world leader in automated license plate recognition, or ALPR, technology. PIPS’ devices are deployed in police cruisers across the US, and in Little Rock, Arkansas, for example, cops say the equipment is well worth the $18,000-per-unit price tag. But while PIPS may be touting their product as something of a must-have for police agencies, the manufacturer is staying silent when it comes to discussing the blatant privacy violations it commits every second its in use. "(It) can scan the mall parking lot in a matter of minutes," Sergeant Brian Dedrick, of the North Little Rock Police Department tells Arkansas Matters of his ALPR scanner. "We couldn't even do that three years go." Sgt. Dedrick is right — ALPRs allow law enforcement to do something that was unheard of only a few years ago. Lieutenant Christopher Morgon of the Long Beach Police Department in Southern California is one of a few cops interviewed by PIPS in their latest advertisement video picked up by the blog, and he agrees that license-plate scanners let his agency do something that was once unheard of. Before adding ALPR technology to cruisers, cops there could only manually dial-in around 150 license plates in a single shift. By equipping patrol cars with high-tech software and a slew of surveillance cameras, though, Lt. Morgon says today the department does a lot more than that. “If you dedicated your day to driving around and putting your vehicle in a place where there’s lots of cars, you could read anywhere from 5 to 10,000 plates in that same shift,” Lt. Morgon says, adding that a single cop car can collect data from upwards of three surveillance cameras simultaneously. Ten thousand plates scanned each day in a single car can put a lot of data in the Long Beach PD’s database, but is all that info used to track down suspects? Lt. Morgon explains in the advert that patrol cars pick up intelligence on every automobile within sight and logs their location and information without ever needing reasonable cause to suspect the driver has committed a crime. “Its catching cars that are parked on the side of the road three lanes over. The old technology never would have done that,” the officer says in the advertisement. “The cameras will catch things you didn’t see, cars you wouldn’t have run, and the beauty of it is that it runs everything,”Lt. Morgon tells the PIPS camera crew. “It doesn’t care whose driving, it doesn’t care what the vehicle looks like. All it sees is a license plate.” While that much is true, it only takes an office a single click of the mouse to input that data into a server and see who owns that car and, presumably, where they are at that given moment. According to Arkansas Matter, at least once police car used in Little Rock records “the exact time and location of every license plate scanned, for up to three years.” In California, Jon Campbell of LA Weekly writes, “The location and photo information is uploaded to a central database, then retained for years — in case it's needed for a subsequent investigation.” As of this past June, Campbell adds, the Los Angeles Police Department itself had around 120 cameras, with the local Sheriff’s Department expected to soon have a total of nearly 300 themselves. In Long Beach, officers plan to have around 45 cameras in all in the coming months — all cameras that are connected to the same servers allowing officers to share intelligence across the state, and lenses don't have to be afixed to cruisers either, but can be installed anywhere in the city. Rita Sklar, the director of the local American Civil Liberties Union chapter, tells Arkansas Matters, "I don't think I have a problem” with the scanner themselves. It’s the sharing of information and how easily it can be connected to individuals, not just automobiles that raise concerns. "It's just one chink in the wall of privacy," she says. The International Association of Chiefs of Police (IACP) defends the scanners, though, and notes that while the technology practically commits clean-cut privacy violations, there’s one little step — that single mouse click — that keeps them in the clear: “A license plate number identifies a specific vehicle, not a specific person,” the IACP notes in their official scanner guidelines. “Although a license plate number may be linked or otherwise associated with an identifiable person, this potential can only be realized through a distinct, separate step (e.g., an inquiry to a Secretary of State or Department of Motor Vehicles data system). Absent this extra step, the license plate number and the time and location data attached to it arenot personally identifying. Thus, even though LPR systems automate the collection of license plate numbers, it is the investigative process that identifies individuals.” “That's a real stretch. But it is a powerful legal assertion,” PrivacySOS notes. “By arguing that license plate reader data isn't personally identifiable, IACP is implicitly saying that it mustn't be protected as seriously as does personal information about us that doesn't require clicking a mouse — the ‘distinct, separate step.’” “That's relevant in the real world because it means officers can collect, retain and share this very sensitive information with virtually no restrictions.” In Long Beach, Lt. Morgon believes that the department has raked in around $3 million in traffic ticket fines after using ALPR scanners for only three years. The LAPD has so far invested $1.8 million on the cameras — and have used them to log more than 160 million data points.
RT    Skype  ... didn't wait for a court order to hand over personal info on 16-year-old Dutch boy
Say goodbye to online service providers protecting the identities of their users. With just a bit of begging, a Texas-based intelligence firm succeeded in convincing Skype to send over sensitive account data pertaining to a teenage WikiLeaks fan. Reports out of Amsterdam this week suggest that Microsoft-owned Skype didn’t wait for a court order or warrant with a judge’s signature before it handed over the personal info of a 16-year-old Dutch boy. The youngster was suspected of being involved in Operation Payback, an Anonymous-endorsed initiative that targeted the servers of PayPal, Visa, Mastercard and others after those companies blocked WikiLeaks from receiving online payment backs in December 2010. When hacktivists responded to the blockade by overflowing the servers of those sites with distributed denial-of-service (DDoS) attacks, PayPal asked Dallas, Texas’ iSIGHT Partners Inc., a self-described“global cyber intelligence firm,” to investigate. It appears that iSIGHT didn’t have deals with just PayPal either. Skype is also a client of the online private eye, and they reached out to the chat company for assistance. Normally the court would enter the equation here and write out a warrant to try and track down that information, but the initial report by Brenno de Winter of Nu.nl reveals that investigators skipped that step. According to English-language transcription of Winter’s account, “the police file notes that Skype handed over the suspect's personal information, such as his user name, real name, e-mail addresses and the home address used for payment.” While that in it of itself isn’t all that unusual, Winter writes that Skype sent over that information voluntarily,“without a court order, as would usually be required.” Joep Gommers, the senior director of global research from iSIGHT, defended the action to Winter, admitting, "On occasion, we share our research findings with relevant law enforcement parties as a public service, just as you would report what appeared to be a crime that you witnessed in your neighborhood.” In emails obtained by Winter, Gommers bragged of his findings to Dutch authorities, writing after he first received assistance from Skype, "Hey, I will have login information soon – but not yet." Skype doesn’t stand by the move, though, and says any virtual handshake between one of their staffers and iSIGHT doesn’t fit with the company’s practices when it terms to protecting private user info. “It is our policy not to provide customer data unless we are served with valid request from legal authorities, or when legally required to do so, or in the event of a threat to physical safety,” Skype said in a statement to Nu.nl. Commenting to Slate, a representative for the chat service noted that it has worked with iSIGHT in the past to “combat spam and malware,” but acknowledged “it appears that some information may have been inappropriately passed on to Dutch authorities without our knowledge.” more
RT  Everyone in US under virtual surveillance
'Everyone in US under virtual surveillance' - NSA whistleblower Get short URL  email story to a friend print version Published: 04 December, 2012, 18:01 TAGS: CrimeInterviewHuman rightsInternet,Information Technology,Gayane ChichakyanFBICourtHacking Screenshot from YouTube user RussiaToday (96.8Mb)embed video The FBI has the e-mails of nearly all US citizens, including congressional members, according to NSA whistleblower William Binney. Speaking to RT he warned that the government can use information against anyone it wants. One of the best mathematicians and code breakers in NSA history resigned in 2001 because he no longer wanted to be associated with alleged violations of the constitution.  He asserts, that the FBI has access to this data due to a powerful device Naris. This year Binney received the Callaway award. The annual award was established to recognize those, who stand out for constitutional rights and American values at great risk to their personal or professional lives. RT: In light of the Petraeus/Allen scandal while the public is so focused on the details of their family drama one may argue that the real scandal in this whole story is the power, the reach of the surveillance state. I mean if we take General Allen – thousands of his personal e-mails have been sifted through private correspondence. It’s not like any of those men was planning an attack on America. Does the scandal prove the notion that there is no such thing as privacy in a surveillance state? William Binney: Yes, that’s what I’ve been basically saying for quite some time, is that the FBI has access to the data collected, which is basically the e-mails of virtually everybody in the country. And the FBI has access to it. All the congressional members are on the surveillance too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything they’ve done for the last 10 years at least. RT: And it’s not just about those, who could be planning, who could be a threat to national security, but also those, who could be just… WB: It’s everybody. The Naris device if it takes in the entire line, so it takes in all the data. In fact they advertised they can process the lines at session rates, which means 10 gigabit lines. I forgot the name of the device (it’s not the Naris) – the other one does it at 10 gigabits. That’s why the building Buffdale, because they have to have more storage, because they can’t figure out what’s important, so they are just storing everything there. So, e-mails are going to be stored there for the future, but right now stored in different places around the country. But it is being collected – and the FBI has access to it.  RT: You mean it’s being collected in bulk without even requesting providers? WB:Yes. RT: Then what about Google, you know, releasing this biannual transparency report and saying that the government’s demands for personal data is at an all-time high and for all of those requesting the US, Google says they complied with the government’s demands 90% of the time. But they are still saying that they are making the request, it’s not like it’s all being funneled into that storage. What do you say to that? WB: I would assume, that it’s just simply another source for the same data they are already collecting. My line is in declarations in a court about the 18-T facility in San Francisco, that documented the NSA room inside that AST&T facility, where they had Naris devices to collect data off the fiber optic lines inside the United States. So, that’s kind of a powerful device, that would collect everything it was being sent. It could collect on the order over one hundred billion one thousand character e-mails a day. One device.  RT: You say they sift through billions of e-mails. I wonder how do they prioritize? How do they filter it?  WB: I don’t think they are filtering it. They are just storing it. I think it’s just a matter of selecting when they want it. So, if they want to target you, they would take your attributes, go into that database and pull out all your data.  RT: Were you on the target list? WB: Oh, sure! I believe I’ve been on it for quite a few years. So I keep telling them everything I think of them in my e-mail. So that when they want to read it they’ll understand what I think of them.  RT: Do you think we all should leave messages for the NSA mail box? WB: Sure!  RT: You blew the whistle on the agency when George W. Bush was the President. With President Obama in office, in your opinion, has anything changed at the agency – in the surveillance program? In what direction is this administration moving? WB: The change is it’s getting worse. They are doing more. He is supporting the building of the Buffdale facility, which is over two billion dollars they are spending on storage room for data. That means that they are collecting a lot more now and need more storage for it. That facility by my calculations that I submitted to the court for the electronic frontiers foundation against NSA would hold on the order of 5 zettabytes of data. Just that current storage capacity is being advertised on the web that you can buy. And that’s not talking about what they have in the near future.  RT: What are they going to do with all of that? Ok, they are storing something. Why should anybody be concerned? WB: If you ever get on the enemies list, like Petraeus did or… for whatever reason, than you can be drained into that surveillance.  RT: Do you think they would… General Petraeus, who was idolized by the same administration? Or General Allen? WB: There are certainly some questions, that have to be asked, like why would they target it (to begin with)? What law were they breaking? RT:In case of General Petraeus one would argue that there could have been security breaches. Something like that. But with General Allen  – I don’t quite understand, because when they were looking into his private e-mails to this woman. WB: That’s the whole point. I am not sure what the internal politics is… That’s part of the program. This government doesn’t want things in the public. It’s not a transparent government. Whatever the reason or the motivation was, I don’t really know, but I certainly think, that there was something going on in the background, that made them target those fellows. Otherwise why would they be doing it? There is no crime there. RT: It seems that the public is divided between those, who think that the government surveillance program violates their civil liberties, and those, who say: “I’ve nothing to hide. So, why should I care?” What do you say to those, who think that it shouldnt concern them.  WB: The problem is if they think they are not doing anything that’s wrong, they don’t get to define that. The central government does, the central government defines what is right and wrong and whether or not they target you. So, it’s not up to the individuals. Even if they think they are doing something wrong, if their position on something is against what the administration has, then they could easily become a target.  RT: Tell me about the most outrageous thing that you came across during your work at the NSA. WB: The violations of the constitution and any number of laws that existed at the time. That was the part that I could not be associated with. That’s why I left. They were building social networks on who is communicating and with whom inside this country. So that the entire social network of everybody, of every US citizen was being compiled overtime. So, they are taking from one company alone roughly 320 million records a day. That’s probably accumulated probably close to 20 trillion over the years. The original program that we put together to handle this to be able to identify terrorists anywhere in the world and alert anyone that they were in jeopardy. We would have been able to do that by encrypting everybody’s communications except those, who were targets. So, in essence you would protect their identities and the information about them until you could develop probable cause, and once you showed your probable cause, then you could do a decrypt and target them. And we could do that and isolate those people all alone. It wasn’t a problem at all. There was no difficulty in that. RT: It sounds very difficult and very complicated. Easier to take everything in and… WB: No. It’s easier to use the graphing techniques, if you will, for the relationships for the world to filter out data, so that you don’t have to handle all that data. And it doesn’t burden you with a lot more information to look at, than you really need to solve the problem. RT: Do you think that the agency doesn’t have the filters now? WB: No. RT: You have received the Callaway award for civic courage. Congratulations! On the website and in the press release it says: “It is awarded to those, who stand out for constitutional rights and American values at great risk to their personal or professional lives.” Under the code of spy ethics (I don’t know if there is such a thing) your former colleagues, they probably look upon you as a traitor. How do you look back at them? WB: That’s pretty easy. They are violating the foundation of this entire country. Why this entire government was formed? It’s founded with the constitution and the rights were given to the people in the country under that constitution. They are in violation of that. And under executive order 13526, section 1.7 (governing classification) – you can not classify information to just cover up a crime, which this is- and that was signed by President Obama. Also President Bush signed it earlier executive order, a very similar one. If any of this comes into Supreme court and they rule it unconstitutional, then the entire house of cards of the government falls.  RT: What are the chances of that? What are the odds? WB: The government is doing the best they can to try to keep it out of court. And, of course, we are trying to do the best we can to get into court. So, we decided it deserves a ruling from the Supreme court. Ultimately the court is supposed to protect the constitution. All these people in the government take an oath to defend the constitution. And they are not living up to the oath of office.               RT: Thank you for this interview. WB: You are welcome.


WMR  Senate delivers fatal end-of-term blow to Constitution   ...  Texas Republican Representative Lamar Smith's House Resolution 5949, the FISA Amendments Reauthorization Act of 2012.
December 28-31, 2012 -- Senate delivers fatal end-of-term blow to Constitution In one of the final acts of the 112th Congress, the U.S. Senate dealt a fatal blow to the U.S. Constitution by passing President Obama's National Defense Authorization Act for 2013, which contains the same illegal detention of U.S. citizens as its 2012 predecessor, and defeating amendments to and enacting Texas Republican Representative Lamar Smith's House Resolution 5949, the FISA Amendments Reauthorization Act of 2012. HR 5949 keeps the warrantless surveillance authority imposed by the Bush-Cheney administration under the FISA Amendments Act of 2008 -- the National Security Agency's operation STELLAR WIND -- in place. With the Obama administration forcing through the reauthorization of STELLAR WIND, illegal wiretapping by NSA of American citizens' phone calls, emails, faxes, telexes, social networking instant messages (IMs) and short message services (SMSs), Voice-Over-IP (VOIP), and files contained in cloud storage can now be called Obama's illegal surveillance program. Obama was required by NSA to seek STELLAR WIND's reauthorization because NSA requires congressional cover for the launching of the most massive eavesdropping and storage program in the history of the world. NSA will soon be storing every form of electronic communication sent and received by U.S. citizens at its $1.5 billion Utah Data Center located within the Camp Williams Utah National Guard base near Bluffdale, Utah. The NSA will be combining its signals intelligence functions as NSA/Central Security Service with its computer intelligence and information functions as part of its U.S. Cyber Command responsibilities under the aegis of a program known as the Community Comprehensive National Cybersecurity Initiative Data Center that will deploy the NSA's follow-on to its follow-on to its post-9/11 data mining program, the Novel Intelligence from Massive Data (NIMD). With its new powers granted by Congress, NSA has become the most intrusive intelligence agency in the world today. A few senators attempted to seek amendments to the HR 5949, but no no avail. A substitution to the House bill offered by Senator Patrick Leahy (D-VT) and the Senate President pro tem, failed with a vote of 38 for to 52 against with 10 not voting. Other amendments introduced by Senators Ran Paul (R-KY), Jeff Merkley (D-OR), and Ron Wyden (D-OR) were rejected by the Senate. The Paul amendment would have ensured that Fourth Amendments rights were protected under the re-authorization, Merkley's amendment would have required the Attorney General to disclose Foreign Intelligence Surveillance Court significant  interpretations of the eavesdropping statute, and the Wyden amendment would have required an privacy impact report on the effects of the act. The Democratic ringmaster for the "No" votes on the amendments was Senate Intelligence Committee Chair Dianne Feinstein (D-CA). Also voting no were the "senator from NSA" Barbara Mikulski (D-MD), Claire McCaskill (D-MO), the senator from the CIA and co-founder of Capital Cellular Corporation and major investor in NEXTEL Mark Warner (D-VA),* the Bilderberg man Jay Rockefeller (D-WV)♣, Kay Hagan (D-NC), Secretary of State-select John Kerry (D-MA), Mary Landrieu (D-LA), and the outgoing Ben Nelson (D-NE).  Paul's "motherhood" amendment on Fourth Amendment protections only received the support  of Max Baucus (D-MT), Mark Begich (D-AK), Maria Cantwell (D-WA), Dean Heller (R-NV), Mike Lee (R-UT), Debbie Stabenow (D-MI), Jon Tester (D-MT), Tom Udall (D-NM), Jim Webb (R-VA), and Wyden. In the end, STELLAR WIND reauthorization passed the Senate with a vote of 73 for, 23 against, and 4 not voting. Three of the 23 no votes were Republicans: Lee, Paul, and Lisa Murkowski of Alaska. Among the Democrats voting no were Leahy, newly-appointed Brian Schatz (D-HI), both senators from Oregon, New Mexico, Montana, Vermont, and Washington, and Mark Begich (AK), Sherrod Brown (OH), Dick Durbin (D-IL), Chris Coons (DE), Al Franken (MN), Bob Menendez (NJ), Mark Udall (CO), Dan Akaka (HI),and Tom Harkin (IA). The Congress folded like a two-dollar suitcase in giving NSA congressional cover to begin amassing a yottabyte of personal data at its Utah Data Center. A yottabyte is one septillion bytes of data. The NSA will sweep and store in Utah AT&T's DAYTONA database of caller information, itself one of the world's largest databases, and the firm's 312 terabyte HAWKEYE database, containing every domestic telephone communication from 2001. A large Microsoft facility that handles 10 billion Hotmail messages per day and located near NSA Texas in San Antonio, will feed its take directly into the Utah center. All the signals intelligence (SIGINT) intercepts from NSA and its second, third, and fourth party intelligence sharing partners around the world and contained in the massive OCEANARIUM SIGINT database, which is associated with a central repository of phone number database called ANCHORY/MAUI, will also be stored in Utah. Smaller SIGINT databases called CULTWEAVE and PROTON will also feed into the monster system in Utah. The CREST database automatically translates foreign language intercepts and provides the data to operators in English. The AGILITY database, which stores intercepted voice communications, and PINWALE, which contains intercepted faxes and e-mail, will also be stored in Utah. Another voice intercept database called NUCLEON will also be streamed into the Utah Data Center. A high-capacity/high-speed vacuum cleaner once called SHARKFIN and renamed RC-10, sweeps up all-source communications intelligence (COMINT) from a variety of communication methods and systems. SIGINT analysis tools like PATHFINDER allow operators to drill down on surveillance targets. Exchange of data for human operators is handled by automated message handling systems such as one codenamed MESSIAH. SIGINT targeting and reporting systems called SKYWRITER, SEMESTER, and There is one NSA system with the cover name FASCIA that is hauntingly close in name to the word "fasces," the root word for fascism. Under the UK-USA agreement that for over 65 years has seen the sharing of intercepted civilian communications between "First Party" NSA (OSCAR), and "Second Parties" -- Britain's Government Communications Headquarters (GCHQ) (ALPHA), Canada's Communications Security Establishment (CSE) (UNIFORM), Australia's Defense Signals Directorate (DSD) (ECHO), and New Zealand's Government Communications Security Bureau (GCSB) (INDIA) -- the allied SIGINT partners have moved into stored data surveillance, including financial information, consumer profiling data, and stored personal computer files. All these agencies will have their hooks into the Utah Data Center and the privacy of Americans' personal data will be routinely violated by foreign intelligence operators on duty in Cheltenham, England; Leitrim, Ontario; Waihopi, New Zealand; and Geraldton and Canberra, Australia. But access to the most private data of Americans will note merely be accessible to the English-speaking First and Second Parties. It has been revealed that during the Cold War and its aftermath the First and Second Parties also shared intelligence between themselves and non-English speaking "Third Parties." Such intelligence was classified with the designator DRUID and was shared with third parties, countries with NATO or defense treaty relationships with the United States, with SIGINT Exchange Designators of DIKTER (Norway), SETTEE (South Korea), DYNAMO (Denmark), RICHTER (Germany), and ISHTAR (Japan). Other intelligence was shared between First and Second Parties and "Fourth Parties" that were mainly neutral or special category partners. Such Fourth Party intelligence partners had sharing designators like JAEGER (Austria). Other SIGINT Exchange Designators with Third and Fourth Parties were ARCA, FRONTO, NECTAR, SARDINE, KAMPUS, PROTEIN, SEABOOT, DIVERSITY, KEYRUT, PYLON, MUSKET, RORIPA, and THESPIS. These designators covered the sharing of SIGINT with such nations as France, Thailand, Sweden, the Netherlands, Switzerland, Finland, Turkey, the People's Republic of China, Spain, Portugal, and Italy. There is every indication that these SIGINT agreements continue and now extend to stored data -- phone calls and Internet transactions -- in addition to real-time intercepts. In what should be of concern to every American, Canadian, Briton, Dane, Norwegian, Japanese, Italian, and others, intelligence operators sitting in data fusion centers in Paris (Alliance Base where French, British, German, Canadian, and Australian intelligence analysts comb through databases containing massive amounts of personal data); Cheltenham; Fort Meade, Maryland; the new $1 billion NSA Middle East and North Africa intercept and analysis facility, codenamed SWEET TEA, near Leburda, Georgia; Buckley Air Force Base, Colorado; Canberra; Ottawa; Kunia Camp, Oahu; and the Utah Data Center will be to call up electronic dossiers on everyone with a digital footprint anywhere in the world without regard to national boundaries, court oversight, or data protection and privacy laws.   ------------- * It was a technical adviser to then Virginia Governor Mark Warner who revealed that Warner urged his staff to engage in cell phone "batteries out" conversations when they were talking about sensitive topics. Warner's support for STELLAR WIND powers and his past knowledge of NSA's capabilities to use cell phones turned off but with batteries still installed indicates that he was in on, and may have even profited from, NSA's cellular phone technical capabilities. ♣ NSA director and Cyber Command chief General Keith Alexander has attended the last few Bilderberg meetings.
 
WMR July 30-31. 2015 -- NSA requested warrantless wiretapping in February 2001 Officials of the National Security Agency requested warrantless wiretapping from the chairman of the President's National Security Telecommunications Advisory Council (NSTAC) at a meeting at NSA headquarters on February 27, 2001, seven months before the 9/11 attack. This stunning revelation was made by the former NSTAC chairman, Joseph Nacchio, who cited court documents from the government's retaliatory 2005 case against him for insider trading. Nacchio made his remarks at a Newsmaker press conference at the National Press Club on July 29. In response to NSA's request, Nacchio asked the agency representatives if they had a Foreign Intelligence Surveillance Court warrant. The reply was no. Nacchio then asked them if they had presidential executive authority. The answer was again no. Although Nacchio also served as chairman and CEO of Qwest Communications, his refusal to provide NSA with warrantless wiretapping of Qwest lines was made more significant in his role as NSTAC chairman. Other NSTAC members quickly followed suit in rejecting NSA's request. They included AT&T, SBC Communications, Sprint, Bell South, Verizon, WorldCom, and others. The Bush administration retaliated against Nacchio by indicting him for insider trading in 2005, five days before the expiration of the statute of limitations. Rather than try Nacchio in the Southern District of New York, where the alleged trades were made, or the Northern District of New Jersey, where Nacchio resided, the Department of Justice went judge shopping and decided to indict in Denver, the location of Qwest's corporate headquarters. George Nottingham, the judge chosen was in a blackmailable position. Joseph Nacchio at National Press Club. Nacchio is the former CEO of Qwest who refused NSA request to spy on Americans. [Photo courtesy of Noel St. John] After trying Nacchio, Nottingham resigned after he was accused of obstruction of justice involving prostitutes and strippers. It was clear that NSA, which operates a large signals intelligence processing center in Aurora, near Denver, was aware that Nottingham had personal problems that could be exploited by Justice Department prosecutors. And that is exactly what happened when Nottingham disallowed Nacchio's defense team's evidence of NSA's attempt to get Nacchio to break the law in 2001 by permitting unlawful intercepts. The NSA wanted to make Nacchio an example for all the other telecommunications CEOs. As a result, the Bush administration discovered that its warrantless program code named STELLAR WIND had the full support of the CEOs who fell in line after 9/11. An unnamed U.S. intelligence agency also requested Nacchio to have Qwest's European subsidiary hire certain employees for unspecified purposes. As a result of Edward Snowden's revelations, it is now known that NSA's and its British counterpart's Operation SOCIALIST, implanted engineers into Belgacom's switches in Brussels to conduct illegal wiretapping. Bacchio served six years at the federal penitentiary in Schuykill, Pennsylvania. He was released in 2013. Nacchio maintains his innocence and says that he was selected for prosecution by a Justice Department willing to retaliate for his refusal to follow NSA's orders. Nacchio also cited court records showing that he was lured to NSA in February 2001 to supposedly meet with General Michael Hayden, NSA's director. Hayden never showed for the meeting as it was a ruse to get Nacchio into one of NSA's top secret rooms called a SCIF.The meeting started out with a conversations about GROUNDBREAKER, a new signals intelligence infrastructure, which, along with TRAILBLAZER, were major pet projects of Hayden. Both systems also disregarded the U,S, Constitution and NSA's own regulations against eavesdropping on U.S. citizens. NSA insiders charged Hayden with his own "insider trading" by awarding lucrative contracts to his favorite firm, SAIC, in return for a cushy job after his retirement from the Air Force. Hayden is now a business partner of Michael Chertoff, the former Homeland Security Secretary. Nacchio criticized the government's prosecutori regime. He said that 98 percent of all federal indictments are plea bargained out.Of the two percent that go to trial, the governmrent has a 95 percent win rate, which is greater than those of the USSR and Nazi Germany.

 

H.R. 3200/Division C/Title V/Subtitle C   Implantable Device

H.R. 3200/Division C/Title V/Subtitle C
H.R. 3200‎ | Division C‎ | Title V
Subtitle B
—School-Based Health Clinics
America’s Affordable Health Choices Act of 2009
Division C - Public Health and Workforce Development
Title V - Other Provisions
Subtitle C - National Medical Device Registry Subtitle D—
Grants for Comprehensive Programs to Provide Education
to Nurses and Create a Pipeline to Nursing

==SUBTITLE C — NATIONAL MEDICAL DEVICE REGISTRY==
[edit]SEC. 2521. NATIONAL MEDICAL DEVICE REGISTRY.
(a) Registry.—
(1) In General.—
Section 519 of the Federal Food, Drug, and Cosmetic Act (21 U.S.C. 360i) is amended—
(A) by redesignating subsection (g) as subsection (h); and
(B) by inserting after subsection (f) the following:


``National Medical Device Registry
``(g) (1) The Secretary shall establish a national medical device registry (in this subsection referred to as the ‘registry’) to facilitate analysis of postmarket safety and outcomes data on each device that—
``(A) is or has been used in or on a patient; and
``(B) is—
``(i) a class III device; or
``(ii) a class II device that is implantable, life-supporting, or life-sustaining.
``(2) In developing the registry, the Secretary shall, in consultation with the Commissioner of Food and Drugs, the Administrator of the Centers for Medicare & Medicaid Services, the head of the Office of the National Coordinator for Health Information Technology, and the Secretary of Veterans Affairs, determine the best methods for—
``(A) including in the registry, in a manner consistent with subsection (f), appropriate information to identify each device described in paragraph (1) by type, model, and serial number or other unique identifier;
``(B) validating methods for analyzing patient safety and outcomes data from multiple sources and for linking such data with the information included in the registry as described in subparagraph (A), including, to the extent feasible, use of—
``(i) data provided to the Secretary under other provisions of this chapter; and
``(ii) information from public and private sources identified under paragraph (3);
``(C) integrating the activities described in this subsection with—
``(i) activities under paragraph (3) of section 505(k) (relating to active postmarket risk identification);
``(ii) activities under paragraph (4) of section 505(k) (relating to advanced analysis of drug safety data); and
``(iii) other postmarket device surveillance activities of the Secretary authorized by this chapter; and
``(D) providing public access to the data and analysis collected or developed through the registry in a manner and form that protects patient privacy and proprietary information and is comprehensive, useful, and not misleading to patients, physicians, and scientists.
``(3)(A) To facilitate analyses of postmarket safety and patient outcomes for devices described in paragraph (1), the Secretary shall, in collaboration with public, academic, and private entities, develop methods to—
``(i) obtain access to disparate sources of patient safety and outcomes data, including—
``(I) Federal health-related electronic data (such as data from the Medicare program under title XVIII of the Social Security Act or from the health systems of the Department of Veterans Affairs);
``(II) private sector health-related electronic data (such as pharmaceutical purchase data and health insurance claims data); and
``(III) other data as the Secretary deems necessary to permit postmarket assessment of device safety and effectiveness; and
``(ii) link data obtained under clause (i) with information in the registry.
``(B) In this paragraph, the term ‘data’ refers to information respecting a device described in paragraph (1), including claims data, patient survey data, standardized analytic files that allow for the pooling and analysis of data from disparate data environments, electronic health records, and any other data deemed appropriate by the Secretary.
``(4) Not later than 36 months after the date of the enactment of this subsection, the Secretary shall promulgate regulations for establishment and operation of the registry under paragraph (1). Such regulations—
``(A)(i) in the case of devices that are described in paragraph (1) and sold on or after the date of the enactment of this subsection, shall require manufacturers of such devices to submit information to the registry, including, for each such device, the type, model, and serial number or, if required under subsection (f), other unique device identifier; and
``(ii) in the case of devices that are described in paragraph (1) and sold before such date, may require manufacturers of such devices to submit such information to the registry, if deemed necessary by the Secretary to protect the public health;
``(B) shall establish procedures—
``(i) to permit linkage of information submitted pursuant to subparagraph (A) with patient safety and outcomes data obtained under paragraph (3); and
``(ii) to permit analyses of linked data;
``(C) may require device manufacturers to submit such other information as is necessary to facilitate postmarket assessments of device safety and effectiveness and notification of device risks;
``(D) shall establish requirements for regular and timely reports to the Secretary, which shall be included in the registry, concerning adverse event trends, adverse event patterns, incidence and prevalence of adverse events, and other information the Secretary determines appropriate, which may include data on comparative safety and outcomes trends; and
``(E) shall establish procedures to permit public access to the information in the registry in a manner and form that protects patient privacy and proprietary information and is comprehensive, useful, and not misleading to patients, physicians, and scientists.
``(5) To carry out this subsection, there are authorized to be appropriated such sums as may be necessary for fiscal years 2010 and 2011.´´.


(2) Effective Date.—
The Secretary of Health and Human Services shall establish and begin implementation of the registry under section 519(g) of the Federal Food, Drug, and Cosmetic Act, as added by paragraph (1), by not later than the date that is 36 months after the date of the enactment of this Act, without regard to whether or not final regulations to establish and operate the registry have been promulgated by such date.
(3) Conforming Amendment.—
Section 303(f)(1)(B)(ii) of the Federal Food, Drug, and Cosmetic Act (21 U.S.C. 333(f)(1)(B)(ii)) is amended by striking ``519(g)´´ and inserting ``519(h)´´.
(b) Electronic Exchange and Use in Certified Electronic Health Records of Unique Device Identifiers.—
(1) Recommendations.—
The HIT Policy Committee established under section 3002 of the Public Health Service Act (42 U.S.C. 300jj–12) shall recommend to the head of the Office of the National Coordinator for Health Information Technology standards, implementation specifications, and certification criteria for the electronic exchange and use in certified electronic health records of a unique device identifier for each device described in section 519(g)(1) of the Federal Food, Drug, and Cosmetic Act, as added by subsection (a).
(2) Standards, Implementation Criteria, and Certification Criteria.—
The Secretary of the Health Human Services, acting through the head of the Office of the National Coordinator for Health Information Technology, shall adopt standards, implementation specifications, and certification criteria for the electronic exchange and use in certified electronic health records of a unique device identifier for each device described in paragraph (1), if such an identifier is required by section 519(f) of the Federal Food, Drug, and Cosmetic Act (21 U.S.C. 360i(f)) for the device.

 

Wired    Darpa Wants You to Transcribe, and Instantly Recall, All of Your Conversations

BY ROBERT BECKHUSEN
Navy information technicians aboard the U.S.S. George H.W. Bush on Jan. 17, 2013. Photo: Navy
The Pentagon’s blue-sky researchers are funding a project that uses crowdsourcing to improve how machines analyze our speech. Even more radical: Darpa wants to make systems so accurate, you’ll be able to easily record, transcribe and recall all the conversations you ever have.
Analyzing speech and improving speech-to-text machines has been a hobby horse for Darpa in recent years. But this takes it a step further, in exploring the ways crowdsourcing can make it possible for our speech to be recorded and stored forever. But it’s not just about better recordings of what you say. It’ll lead to more recorded conversations, quickly transcribed and then stored in perpetuity — like a Twitter feed or e-mail archive for everyday speech. Imagine living in a world where every errant utterance you make is preserved forever.
University of Texas computer scientist Matt Lease has studied crowdsourcing for years, including for an earlier Darpa project called Effective Affordable Reusable Speech-to-text, or EARS, which sought to boost the accuracy of automated transcription machines. His work has also attracted enough attention for Darpa to award him a $300,000 award over two years to study the new project, called “Blending Crowdsourcing with Automation for Fast, Cheap, and Accurate Analysis of Spontaneous Speech.” The project envisions a world that is both radically transparent and a little freaky.
The idea is that business meetings or even conversations with your friends and family could be stored in archives and easily searched. The stored recordings could be held in servers, owned either by individuals or their employers. Lease is still playing with the idea — one with huge implications for how we interact.
“In their call, what [Darpa] really talked about were different areas of science where they would like to see advancements in certain problems that they see,” Lease told Danger Room at his Austin office. “So I responded talking about what I saw as this very big both need and opportunity to really make conversational speech more accessible, more part of our permanent record instead of being so ephemeral, and really trying to imagine what this world would look like if we really could capture all these conversations and make use of them effectively going forward.”
How? The answer, Lease says, is in widespread use of recording technologies like smartphones, cameras and audio recorders — a kind of “democratizing force of everyday people recording and sharing their daily lives and experiences through their conversations.” But the trick to making the concept functional and searchable, says Lease, is blending automated voice analysis machines with large numbers of human analysts through crowdsourcing. That could be through involving people “strategically,” to clean up transcripts where machines made a mistake. Darpa’s older EARS project relied entirely on automation, which has its drawbacks.
“Like other AI, it can only go so far, which is based on what the state-of-the-art methodology can do,” Lease says. “So what was exciting to me is thinking about going back to some of that work and now taking advantage of crowdsourcing and applying that into the mix.”
Crowdsourcing is all about harnessing distributed networks of people — crowds — to do tasks better and more efficiently than individuals or machines. Recently, that’s meant harnessing large numbers of people to build digital maps, raising funds for a film project at Kickstarter, or doing odd-jobs at Amazon Mechanical Turk — one system being studied as part of the project. Darpa has also taken an interest in crowdsourcing as a way to analyze vast volumes of intelligence data, and Darpa’s sibling in the intelligence community, Iarpa, has researched crowdsourcing as a way to find the best intelligence predictions.
But a few problems have to be overcome before crowdsourcing can be used to analyze speech. According to Lease, both crowdsourcing and automated systems for analyzing and transcribing speech are — by themselves — pretty weak. Audio transcripts written by humans are very accurate, but they take time to produce, and the labor is too expensive when applied on a large enough scale.
Meanwhile, automated systems are not very accurate, and require humans to copy-edit the result: adding missing punctuation marks, capitalization, and correcting for verbal disfluencies — those little noises we make when filling gaps in our speech, like “um” or “ah.” We don’t always finish our words when we talk. (But our brains are really good at not noticing it.) We change phrases mid-thought, or mistakenly begin a sentence by saying one word, only to quickly correct ourselves by switching to another word. Background noise — which has plagued voice recognition machines — can also interfere with the quality. All in all, this kind of conversational, casual speech plays havoc with our automated machines, the result being a sort of unintelligible word salad.
“There’s a linguistic sense in that conversational speech is quite different than text,” Lease says. “So we really need to think about how we make this form of our language, which is so natural to us in speech, something that is accessible to us when it’s written down, in a way that it may not naturally be.”
It also raises some thorny legal and social questions about privacy. For one, there is an issue with “respecting the privacy rights of multiple people involved,” Lease says. One solution, for a business conference that’s storing and transcribing everything said by the participants, could be a mutual agreement between all parties. He adds that technical issues when it comes to archiving recorded speech are still open questions, but people could potentially hold their cell phone conversations on remote servers; or on individual, privately-held servers.
The other problem is figuring how out how to search massive amounts of transcribed speech, like how search engines such as Google use complex algorithms to match and optimize search queries with results that are likely to be relevant. Fast and cheap web analytics — judging what people type and matching it up to what they click — is one way to do it. Studying focus groups are more precise, but expensive. A third way, Lease suggests, is using more crowdsourcing as a sort of a “middle-ground” between the two methods.
But it’s unknown how the research will be applied to the military. Lease wouldn’t speculate, and it’s still very much a basic research project. Though if it’s similar to EARS at all, then it may not be too difficult to figure out. A 2003 memorandum from the Congressional Research Service described EARS as focusing on speech picked up from broadcasts and telephone conversations, “as well as extract clues about the identity of speakers” for “the military, intelligence and law enforcement communities.” Though Lease didn’t mention automatically recognizing voices. But the research may not have to go that far — if we’re going to be recording ourselv

FT.com Unit 8200: Israel’s cyber spy agency

Unit 8200 Cyber Spy ... or shmone matayim as it’s called in Hebrew, is the equivalent of America’s National Security Agency and the largest single military unit in the Israel Defence Forces....a group of 43 serving and former 8200 reservists revealed what they said were coercive spying tactics being used on innocent Palestinians, including the collection of embarrassing sexual, financial or other information. One of the unit 8200whistle-blowers, in a statement released along with the letter, described his “moment of shock” when watching The Lives of Others, the 2006 film about the Stasi’s pervasive spying in East Germany. search terms: cutting-edge snooping and hacking skills into jobs in Israel, Silicon Valley or Boston’s high-tech corridor, ... Magshimim, funded by the Israeli state, Rashi Foundation, entry ticket via Israeli military service, high tech security state, designed to protect companies, banks and governments from the growing “dark web” of hackers, fraudsters and snoopers — topped $6bn, exceeding Israeli exports of military hardware for the first time. ... The project combines an office park — whose tenants include Deutsche Telekom, IBM, Oracle, Lockheed Martin, EMC and PayPal — with Beer Sheva’s Ben-Gurion University and its Cyber Security Research Centre ... Team 8, a self-described cyber security “foundry” aimed at providing know-how for start-ups, was launched by former 8200 officers in Tel Aviv earlier this year, attracting Google’s Eric Schmidt as an investor. Isaac Herzog, head of the centre-left Zionist Union party, played up his past service in 8200 when campaigning to unseat Binyamin Netanyahu as prime minister in the recent election.

WMR/Strategic-Culture Five Eyes and Color Revolutions

Wayne MADSEN | 26.05.2015 | 00:00
 

A recent release of Edward Snowden-provided classified PowerPoint presentation from the National Security Agency (NSA) provides a rather detailed description of how the FIVE EYES signals intelligence alliance of the United States, Britain, Canada, Australia, and New Zealand has conspired with the promoters of social media-based revolutions, such as the «Arab Spring», to bring about the collapse of democratically-elected or otherwise stable governments. However, the PowerPoint slides were partially redacted in key areas by the dubious censors of First Look Media, financed by e-Bay founder and multi-billionaire Pierre Omidyar.

The PowerPoint slides illustrate how, in November 2011, the NSA; Canada’s Communications Security Establishment (CSE), now Communications Security Establishment Canada (CSEC), the Defense Signals Directorate (DSD) of Australia, now the Australian Signals Directorate (ASD); New Zealand’s Government Communications Security Bureau (GCSB); and Britain’s Government Communications Headquarters (GCHQ) developed a method for not only monitoring but taking control of cell phone and social media networks used for socio-political uprisings. The program, known as «Synergizing Network Analysis Tradecraft», was developed by the FIVE EYES’s Network Tradecraft Advancement Team or «NTAT».

The efforts of the NTAT were directed against single devices where «voice and data services interact». These devices include smart phones and other portable data and voice devices. By November 2011, the Arab Spring uprisings were in full swing, with the governments of Tunisia’s Zine El Abidine Ben Ali, Egypt’s Hosni Mubarak, and Libya’s Muammar Qaddafi having been overthrown, and anti-government rioting breaking out in Syria, Yemen, Oman, and Morocco. The FIVE EYES met in a workshop to discuss how a classified operation code-named IRRITANT HORN could be used in future «Arab Springs», only in «different countries». The signals intelligence experts formulated plans to use the lessons learned in the Arab Spring to target servers in «non-5 Eyes countries» for such exploitation as «man-in-the-middle» or MITM operations and the «harvesting» of data «at rest» and «in transit». A related mobile network exploitation operation was code-named CRAFTY SHACK.

The slides show that among the countries where mobile application servers were targeted by the FIVE EYES were France, Cuba, Senegal, Morocco, Switzerland, Bahamas, and Russia. The information targeted by the Western signals intelligence partners included «geolocation and network ownership information for each IP address» that consisted of «network owner name, carrier name, ASN (advanced service network), continent, country, region, city, latitude and longitude, and any other related details». Not of interest to FIVE EYES were such applications as Google, mobile banking, and iTunes.

It is noteworthy that according to one TOP SECRET/SI [Special Intelligence] PowerPoint slide, a FIVE EYES system code-named EONBLUE was used to target Blackberry users in Saudi Arabia. Out of all the countries where Arab Spring demonstrations began, it was Saudi Arabia that acted swiftly to put down its street protests by brutal force. The FIVE EYES interest in Saudi Arabia mobile communications during the IRRITANT HORN operations may indicate that there was a dual purpose to such surveillance. NSA and its partners, in an act of «offensive information warfare», may have steered protesters in Egypt, Libya, Syria, and other countries to anti-government uprisings through MITM operations while tipping off the authorities in Saudi Arabia about plans to stage anti-government demonstrations in that country.

 

Another FIVE EYES operation targeted Samsung, Nokia, and other mobile telecommunications users of the Warid-Congo mobile network in the Republic of Congo. CSE boasted in one PowerPoint slide that it had «a list of the most popular smartphones for Warid Congo customers and their international mobile subscriber identity (IMSI) numbers». IMSIs are assigned to every GSM user. Warid, which is owned by Sheikh Nahayan bin Mubarak Al Nahayan, the Minister of Culture, Youth, and Social Development of the United Arab Emirates and which is based in Abu Dhabi, also provides mobile services in Uganda, the Republic of Georgia, Ivory Coast, and Pakistan. 

The interest of the FIVE EYES in fomenting a social media-based uprising in the Republic of Congo is interesting. The country has been led since 1997 by the authoritarian president Denis Sassou-Nguesso who is considered firmly in the pro-French camp. The Congo Republic is a major oil-producer in the region and the Anglophone FIVE EYES alliance would certainly be interested in replacing the authoritarian president with one more aligned with the United States and Britain. The targeting of Congo provides more proof that the NSA military and civilian analysts, who spend long hours on watch, are devoting themselves and their careers more to the bottom lines of U.S. and British oil companies than to U.S. national security.

Just four months after the FIVE EYES meeting of the NTAT, a partly-social media mass protest did break out in the Talangai district of Brazzaville, the Congolese capital. A March 26, 2012 dispatch from the U.S. embassy in Brazzaville stated: «Protestors are discontent with the Government of the Republic of the Congo’s handling of indemnity payments to people who lost their homes in the March 4 explosions at the Regiment Blinde munitions depot. Embassy sources reported hearing gun shots at the site of the protest on Marien Ngouabi Avenue, near the Talangai Market. The protesters are expected to march to the Presidential Palace. U.S. citizens are advised to avoid the Talangai district and the area surrounding the Presidential Palace throughout the day». The embassy appeared to know the plans of the protesters, possibly with the help of intelligence provided by both IRRITANT HORN and CRAFTY SHACK. 

In January 2012, just two months after the NTAT meeting, anti-government protests broke out in Senegal, another country targeted by IRRITANT HORN/CRAFTY SHACK, after President Abdoulaye Wade, a supporter Muammar Qaddafi’s «United States of Africa», announced he would run for a third term. The then-State Department spokesperson, Victoria Nuland of «Euromaidan» infamy, urged the 85-year old Wade to pass power to «the next generation». Wade was defeated for re-election the month after the outbreak of violent riots in Dakar, the Senegalese capital. Soros’s OSI and the International Crisis Group, which is also heavily-bankrolled by Soros, provided significant support to both the Brazzaville and Dakar protests.

The PowerPoint slides also describe how a Chinese mobile web browser was discovered by a GCHQ analyst to «leak» IMSI; MSISDNs (Mobile Station International Subscriber Directory Numbers) that are linked to SIM cards; International Mobile Station Equipment Identities (IMEIs) unique to every mobile device and used for, among other things, tracking stolen or «jail broken» phones; and other device-specific information. 

Although partially redacted, the latest disclosure of NSA material confirms the nexus between FIVE EYES signals intelligence surveillance and active measures in support of the overthrow of governments in the Middle East and elsewhere. The information verifies a convergence between the «color revolution» activities of George Soros’s Open Society Institute (OSI) network and the U.S. National Endowment for Democracy (NED) and the surveillance activities of the FIVE EYES partners. 

There is also an obvious correlation between the U.S. Agency for International Development’s (USAID’s) «fake Twitter» operation in Cuba, known as «Zun Zuneo», and IRRITANT HORN. Zun Zuneo or «Proyecto ZZ», was aimed at forming «smart mobs» across Cuba to protest against the Cuban government and seek its overthrow in a «Cuban Spring». It is important to note that IRRITANT HORN targeted Cuba in its mobile and social media surveillance and MITM operations.

Zun Zuneo used two contractors in Costa Rica, Contractor Creative Associates International and Mobile Accord of Denver. The firms obtained 400,000 CubaCel mobile telephone numbers, which now appears to have come the FIVE EYES’s IRRITANT HORN program, and began sending Cubans Twitter-like text messages, purportedly originating in Spain. Zun Zuneo also involved a front company in the Cayman Islands, MovilChat, which used a Cayman Islands bank account to covertly fund the Zun Zuneo caper. USAID funding for Zun Zuneo was secretly diverted from an unknown USAID project in Pakistan. The bank account used by USAID and MovilChat was maintained at the Cayman Islands branch of the Bermuda-based Bank of N.T. Butterfield & Son Ltd. The Carlyle Group, along with the Canadian Imperial Bank of Commerce (CIBC), are significant shareholders of the bank.

 

USAID has used technology similar to Zun Zuneo to mobilize «smart mobs» in Moldova, the Philippines, and Ukraine. The May 1, 2014, anti-government mass protests in Cambodia also appears to have been prompted by a USAID/CIA «smart mob» Twitter-like operation. By honing their «network tradecraft» in the Arab countries and Cuba, the FIVE EYES were well-prepared to support the Maidan Square uprising in Kiev in early 2014. The IRRITANT HORN project reveals that there is not much space between the operations of Soros’s and Nuland’s «democracy manipulators» and the social media surveillance eavesdroppers of the FIVE EYES alliance.

Interactive 9/11, JFK & Holocaust Spreadsheet

Google Custom Search Engine ... Link 9/11 Truth, JFK assassination, Holocaust hoax & ISIS ...... home

No main stream media sites including Wikipedia are searched on this custom search page .... only websites dedicated to exposing the truth about 9/11, JFK assassination and the Holocaust hoax. This may include 'gatekeeper' sites such as 911Truth.org, Architects & Engineers for 9/11 Truth.org, Chomsky etc....by 'gatekeeper' we mean websites who never mention Israel, UK or Saudi Arabia as complicit in the 'inside job' attack. The roots of 9/11 go back to the Jewish Bolshevik revolution, Zionist/Nazi Germany (chronology below), the Holocaust hoax (treachery to spur emigration to Palestine) ... Google restricts results to 10 pages (100 items)

MS Excel Sort & Filter 2000 rows, 12 columns

Yes to 'no planes', Israel nuked the WTC, the Holocaust(timeline below) is a hoax, the Mossad / LBJ assassinated John Kennedy & ISIS=Hitler.

Interactive Spreadsheet - 9/11 Truth, JFK assassination, Holocaust revision & ISIS

 

 

Trump / Clinton 9/11 Truth Timeline

 

Nazi Era Timeline

 

 

free hit counter javascript

 

Google Analytics