"In every way that matters, the separation
government and corporations is nonexistent,
and this is
especially true when it comes to
national security and
the surveillance state"
Glenn Greenwald, With Liberty and Justice for
1979 Smith v. Maryland, 442 US
Telephone company, at police request, installed at its central
offices a pen register to record the numbers dialed from the telephone at
A pen register, or dialed number recorder (DNR), is
an electronic device that records all numbers called from a particular
The term now includes any device or program that
performs similar functions to an original pen register, including programs
monitoring the Internet.
Petitioner moved to suppress "all fruits
derived from" the pen register.
The Maryland trial court denied this
motion, holding that the warrantless installation of the pen register did not
violate the Fourth Amendment.
Petitioner was convicted, and the Maryland
Court of Appeals affirmed.
Held: The installation and use of the pen
register was not a "search" within the meaning of the Fourth Amendment, and
hence no warrant was required.
Analysts are told they can trace contacts of Americans as long as they
cite a foreign intelligence justification.
The National Security Agency has been exploiting huge collections of
data to create sophisticated graphs of Americans social connections to identify
associates, locations at certain times, traveling companions and other
The agency is authorized to conduct "large-scale
graph analysis on very large sets of communications metadata without having to
check foreignness" of every e-mail address, phone number or other
The agency augments the communications data with material
from public, commercial and other sources, including bank codes, insurance
information, Facebook profiles, passenger manifests, voter registration rolls,
GPS location information, as well as property records and unspecified tax data,
according to the documents.
There is no restrictions on the use of
"enrichment" data, and several former senior
administration officials said the agency drew on it for both Americans and
The Justice Department and the
Pentagon decided it was
permissible to create contact chains using Americans' "metadata," which
includes the timing, location and other details of calls and e-mails.
The agency, citing Smith v. Maryland, 442 US 735, claims it is
not required to seek warrants from the Foreign Intelligence Surveillance
Smith v. Maryland Does Not Permit Mass
Phone and e-mail logs allow analysts to identify
associates, detect movement in time, acquire clues to affiliations, pick up
sensitive information, calls to
Charles, late-night extramarital partners or
exchanges with a
"Metadata can be very revealing.
number someone just dialed or the location of the person's cellphone is going
to allow assembly of a picture of what someone is up to.
digital equivalent of tailing a suspect." - Orin S. Kerr
The policy - Defense
Supplemental Procedures Governing Communications Metadata Analysis - was
authorized by Defense Secretary Robert M. Gates and
Attorney General Michael B.
"Sigint Management Directive 424", stated the
Supreme Court ruled metadata
was not constitutionally protected and allowed collection.
using metadata "without regard to the nationality or location of the
communicants" acquired the conversations of foreign politicians, business
figures or activists and anyone else in the chain.
One of the main tools
used for chaining phone numbers and e-mail addresses has the code name
Vast amounts of data flow daily from fiber-optic
cables, corporate partners and foreign computer networks that have been
"Better Person Centric Analysis" describes how the agency
looks for 94 "entity types," including phone numbers, e-mail addresses and IP
The NSA correlates 164 "relationship types" to
build social networks and
what the agency calls "community of interest" profiles, using queries like
"travelsWith, hasFather, sentForumMessage, employs."
"All software systems have been endorsed by the
National Security Agency, signifying that they are permeable to intrusions by
These operations will deny, degrade, disrupt,
destroy, or deceive an adversary.
Cyberspace offensive operations
ensure friendly freedom of action in cyberspace while denying that same freedom
to our adversaries.
We will enhance our capabilities to conduct
electronic systems attack,
interdiction and attack, network attack, and
Targets include the adversary's terrestrial, airborne,
and space networks, electronic attack and network attack systems, and the
As an adversary becomes more dependent on cyberspace,
cyberspace offensive operations have the potential to produce greater effects."
- Air Force Cyber Command
"CYBERCOM will reach initial operating
capability (IOC) not later than October 2009 and full operating capability
(FOC) not later than October 2010.
Ostensibly launched to protect
military networks against malicious cyberattacks, CYBERCOM's offensive nature
is underlined by its role as STRATCOM's operational cyber wing.
addition to a defensive brief to "harden" the "dot-mil" domain, the Pentagon
plan calls for an offensive capacity, one that will deploy cyber weapons
against imperialism's adversaries.
One of ten
Unified Combatant Commands, STRATCOM is the successor organization to Strategic
Air Command (SAC).
Charged with space operations (military satellites),
information warfare, missile defense, global command and control, intelligence,
surveillance and reconnaissance (ISR), as well as global strike and strategic
deterrence (America's first-strike nuclear arsenal),
it should be apparent that designating CYBERCOM a STRATCOM branch all but
guarantees an aggressive posture." - Tom Burghardt July 1, 2009
This web site is not a commercial web site and
is presented for educational purposes only.
This website defines a
new perspective with which to engage reality to which its author adheres. The
author feels that the falsification of reality outside personal experience has
forged a populace unable to discern propaganda from reality
and that this has been done purposefully by an international corporate cartel
through their agents who wish to foist a corrupt version of reality on the
human race. Religious intolerance occurs when any group refuses to tolerate
religious practices, religious beliefs or persons due to their religious
ideology. This web site marks the founding of a system of philosophy named The
Truth of the Way of the Lumière Infinie - a rational gnostic mystery
religion based on reason which requires no leap of faith, accepts no tithes,
has no supreme leader, no church buildings and in which each and every
individual is encouraged to develop a personal relation with the Creator and
Sustainer through the pursuit of the knowledge of reality in the hope of curing
the spiritual corruption that has enveloped the human spirit. The tenets of the
Truth of the Way of the Lumière Infinie are spelled out in detail on
this web site by the author. Violent acts against individuals due to their
religious beliefs in America is considered a "hate crime."
This web site
in no way condones violence. To the contrary the intent here is to reduce the
violence that is already occurring due to the international corporate cartels
desire to control the human race. The international corporate cartel already
controls the world economic system, corporate media worldwide, the global
industrial military entertainment complex and is responsible for the collapse
of morals, the elevation of self-centered behavior and the destruction of
global ecosystems. Civilization is based on coöperation. Coöperation
does not occur at the point of a gun.
American social mores and values
have declined precipitously over the last century as the corrupt international
cartel has garnered more and more power. This power rests in the ability to
deceive the populace in general through corporate media by pressing emotional
buttons which have been preprogrammed into the population through prior
corporate media psychological operations. The results have been the destruction
of the family and the destruction of social structures that do not adhere to
the corrupt international elites vision of a perfect world. Through distraction
and coercion the direction of thought of the bulk of the population has been
directed toward solutions proposed by the corrupt international elite that
further consolidates their power and which further their purposes.
views and opinions presented on this web site are the views and opinions of
individual human men and women that, through their writings, showed the
capacity for intelligent, reasonable, rational, insightful and unpopular
thought. All factual information presented on this web site is believed to be
true and accurate and is presented as originally presented in print media which
may or may not have originally presented the facts truthfully.
Opinion and thoughts
have been adapted, edited, corrected, redacted, combined, added to, re-edited
and re-corrected as nearly all opinion and thought has been throughout time but
has been done so in the spirit of the original writer with the intent of making
his or her thoughts and opinions clearer and relevant to the reader in the
Fair Use Notice
This site may contain
copyrighted material the use of which has not always been specifically
authorized by the copyright owner. We are making such material available in our
efforts to advance understanding of criminal justice,
human rights, political,
economic, democratic, scientific, and social justice issues, etc. We believe
this constitutes a 'fair use' of any such copyrighted material as provided for
in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C.
Section 107, the material on this site is distributed without profit to those
who have expressed a prior interest in receiving the included information for
research and educational purposes. For more information see:
www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted
material from this site for purposes of your own that go beyond 'fair use', you
must obtain permission from the copyright owner.
© Lawrence Turner
All Rights Reserved