stacks



The Criminal NSA

Why Google made the NSA

Metastasized intelligence complex is ripe for abuse


"In every way that matters, the separation between

government and corporations is nonexistent,

and this is especially true when it comes to

national security and the surveillance state"

Glenn Greenwald, With Liberty and Justice for Some


NSA Creates Citizen Data Warehouse System

"The new Citizen Data Warehouse System (CDWS) will create a comprehensive database containing detailed information about each US citizen. Since the vast majority of all US credit card transactions will be fed through this new system, the depth of information will be unparalleled. Intelligent routing of citizen data throughout the interconnected computer systems of various federal agencies will provide citizens a new level of service from the federal government."

NSA Isn't Just Spying It's Also Undermining Internet Security

NSA director admits to misleading public on terror plots

NSA is more than just a spy network, it's global fascism


NSA Foils Basic Privacy Safeguards

"Omnipotent" hackers tied to NSA hid for 14 years

NSA Gathers Data on Social Connections of US Citizens

6 Whopping Government Misstatements About NSA Spying

The NSA is turning the internet into a total surveillance system

Report: NSA Mimics Google to Monitor "Target" Web Users

Confirmed: There Is No Real Oversight Of The NSA's Surveillance

NSA: A Bunch Of Intentional Abuses, Including Spying On Love Interests

NSA Actually Has A Program Called SKYNET


Light on Five Eyes Alliance



1979 Smith v. Maryland, 442 US 735

Telephone company, at police request, installed at its central offices a pen register to record the numbers dialed from the telephone at petitioner's home.

A pen register, or dialed number recorder (DNR), is an electronic device that records all numbers called from a particular telephone line.

The term now includes any device or program that performs similar functions to an original pen register, including programs monitoring the Internet.

Petitioner moved to suppress "all fruits derived from" the pen register.

The Maryland trial court denied this motion, holding that the warrantless installation of the pen register did not violate the Fourth Amendment.

Petitioner was convicted, and the Maryland Court of Appeals affirmed.

Held: The installation and use of the pen register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant was required.

2011

Analysts are told they can trace contacts of Americans as long as they cite a foreign intelligence justification.

The National Security Agency has been exploiting huge collections of data to create sophisticated graphs of Americans social connections to identify associates, locations at certain times, traveling companions and other pertinent information.

The agency is authorized to conduct "large-scale graph analysis on very large sets of communications metadata without having to check foreignness" of every e-mail address, phone number or other identifier.

The agency augments the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls, GPS location information, as well as property records and unspecified tax data, according to the documents.

There is no restrictions on the use of "enrichment" data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.

The Justice Department and the Pentagon decided it was permissible to create contact chains using Americans' "metadata," which includes the timing, location and other details of calls and e-mails.

The agency, citing Smith v. Maryland, 442 US 735, claims it is not required to seek warrants from the Foreign Intelligence Surveillance Court.

Smith v. Maryland Does Not Permit Mass Surveillance

Phone and e-mail logs allow analysts to identify associates, detect movement in time, acquire clues to affiliations, pick up sensitive information, calls to Charles, late-night extramarital partners or exchanges with a fellow plotter.

"Metadata can be very revealing.

Knowing the number someone just dialed or the location of the person's cellphone is going to allow assembly of a picture of what someone is up to.

It's the digital equivalent of tailing a suspect." - Orin S. Kerr






The policy - Defense Supplemental Procedures Governing Communications Metadata Analysis - was authorized by Defense Secretary Robert M. Gates and Attorney General Michael B. Mukasey.

"Sigint Management Directive 424", stated the Supreme Court ruled metadata was not constitutionally protected and allowed collection.

Analysts, using metadata "without regard to the nationality or location of the communicants" acquired the conversations of foreign politicians, business figures or activists and anyone else in the chain.

One of the main tools used for chaining phone numbers and e-mail addresses has the code name Mainway.

Vast amounts of data flow daily from fiber-optic cables, corporate partners and foreign computer networks that have been hacked.

"Better Person Centric Analysis" describes how the agency looks for 94 "entity types," including phone numbers, e-mail addresses and IP addresses.

The NSA correlates 164 "relationship types" to build social networks and what the agency calls "community of interest" profiles, using queries like "travelsWith, hasFather, sentForumMessage, employs."




covertly attached NSA meme

NSA Is a Servant of Corporate Power

NSA to open data analysis lab at NCSU

NSA Spying: It's About the Money, Honey

NSA Documents Suggest a Close Working
Relationship Between NSA, US Companies

Germany's Deep Coöperation with the NSA

Researchers Solve Juniper Backdoor Mystery


Snowden says NSA engages in industrial espionage

Cisco confirms NSA-linked zeroday targeted its firewalls for years

NSA's Bulk Collection of Phone Records Is Illegal, Appeals Court Says

57% Fear Government Will Use NSA Data to Harass Political Opponents

Popular Security Software Came Under Relentless NSA and GCHQ Attacks

William Binney: NSA Claim Not to Be Mining Content Is an "Outright Lie"

George W. Bush Made Retroactive NSA 'Fix' After Hospital Room Showdown

"Disreputable if Not Outright Illegal": The National Security Agency versus
Martin Luther King, Muhammad Ali, Art Buchwald, Frank Church, et al.

Guardian told to destroy NSA files for national security

How the NSA Helped Türkey Kill Kurdish Rebels




cyber terrorist

Cyber War as a Career Path

Global Privacy Control in Privacy Badger

Social Media in Strategic Communication

Is Windows 8 a Trojan horse for the NSA?

FOIA Documents Reveal DHS Social MediaMonitoring

EFF and ACLU Tell Federal Court Forensic Software Source Code Must Be Disclosed

"All software systems have been endorsed by the National Security Agency, signifying that they are permeable to intrusions by the US intelligence services."
Thierry Meyssan


Cybercrime: Overview of Federal Law

Army establishes Army Cyber Command

US spy operation that manipulates social media

Wanted: Cyber Warriors and Media Sanitizers

Offensive Cyber Operations in US Military Doctrine

FAS Website Blocked by US Cyber Command, Then Unblocked

Pentagon's Cyber Command seeks authority to expand its battlefield

Air Force ordered software to manage army of fake virtual people



"Cyberspace favors offensive operations.

These operations will deny, degrade, disrupt, destroy, or deceive an adversary.

Cyberspace offensive operations ensure friendly freedom of action in cyberspace while denying that same freedom to our adversaries.

We will enhance our capabilities to conduct electronic systems attack, electromagnetic systems interdiction and attack, network attack, and infrastructure attack operations.

Targets include the adversary's terrestrial, airborne, and space networks, electronic attack and network attack systems, and the adversary itself.

As an adversary becomes more dependent on cyberspace, cyberspace offensive operations have the potential to produce greater effects." - Air Force Cyber Command


"CYBERCOM will reach initial operating capability (IOC) not later than October 2009 and full operating capability (FOC) not later than October 2010.

Ostensibly launched to protect military networks against malicious cyberattacks, CYBERCOM's offensive nature is underlined by its role as STRATCOM's operational cyber wing.

In addition to a defensive brief to "harden" the "dot-mil" domain, the Pentagon plan calls for an offensive capacity, one that will deploy cyber weapons against imperialism's adversaries.

One of ten Unified Combatant Commands, STRATCOM is the successor organization to Strategic Air Command (SAC).

Charged with space operations (military satellites), information warfare, missile defense, global command and control, intelligence, surveillance and reconnaissance (ISR), as well as global strike and strategic deterrence (America's first-strike nuclear arsenal), it should be apparent that designating CYBERCOM a STRATCOM branch all but guarantees an aggressive posture." - Tom Burghardt July 1, 2009



XKEYSCORE

NSA Mimics Google

Experts Unmask 'Regin' Trojan as NSA Tool

Core Secrets: NSA Saboteurs in China and Germany

Russian researchers expose breakthrough US spying program

The Digital Arms Race: NSA Preps America for Future Battle

The Surveillance Engine: How the NSA Built Its Own Secret Google

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

What Exactly Are the Spy Agencies Actually DOING with their Bag of Dirty Tricks?




unique library index

This web site is not a commercial web site and is presented for educational purposes only.




This website defines a new perspective with which to engage reality to which its author adheres. The author feels that the falsification of reality outside personal experience has forged a populace unable to discern propaganda from reality and that this has been done purposefully by an international corporate cartel through their agents who wish to foist a corrupt version of reality on the human race. Religious intolerance occurs when any group refuses to tolerate religious practices, religious beliefs or persons due to their religious ideology. This web site marks the founding of a system of philosophy named The Truth of the Way of the Lumière Infinie - a rational gnostic mystery religion based on reason which requires no leap of faith, accepts no tithes, has no supreme leader, no church buildings and in which each and every individual is encouraged to develop a personal relation with the Creator and Sustainer through the pursuit of the knowledge of reality in the hope of curing the spiritual corruption that has enveloped the human spirit. The tenets of the Truth of the Way of the Lumière Infinie are spelled out in detail on this web site by the author. Violent acts against individuals due to their religious beliefs in America is considered a "hate crime."

This web site in no way condones violence. To the contrary the intent here is to reduce the violence that is already occurring due to the international corporate cartels desire to control the human race. The international corporate cartel already controls the world economic system, corporate media worldwide, the global industrial military entertainment complex and is responsible for the collapse of morals, the elevation of self-centered behavior and the destruction of global ecosystems. Civilization is based on coöperation. Coöperation does not occur at the point of a gun.

American social mores and values have declined precipitously over the last century as the corrupt international cartel has garnered more and more power. This power rests in the ability to deceive the populace in general through corporate media by pressing emotional buttons which have been preprogrammed into the population through prior corporate media psychological operations. The results have been the destruction of the family and the destruction of social structures that do not adhere to the corrupt international elites vision of a perfect world. Through distraction and coercion the direction of thought of the bulk of the population has been directed toward solutions proposed by the corrupt international elite that further consolidates their power and which further their purposes.

All views and opinions presented on this web site are the views and opinions of individual human men and women that, through their writings, showed the capacity for intelligent, reasonable, rational, insightful and unpopular thought. All factual information presented on this web site is believed to be true and accurate and is presented as originally presented in print media which may or may not have originally presented the facts truthfully. Opinion and thoughts have been adapted, edited, corrected, redacted, combined, added to, re-edited and re-corrected as nearly all opinion and thought has been throughout time but has been done so in the spirit of the original writer with the intent of making his or her thoughts and opinions clearer and relevant to the reader in the present time.


Fair Use Notice



This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, human rights, political, economic, democratic, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information see: www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.

Dedicated to the establishment of knowledge, truth, justice and a clear understanding of reality as the American way!
Copyright © Lawrence Turner
All Rights Reserved