"In every way that matters, the separation
government and corporations is nonexistent,
and this is
especially true when it comes to
national security and
the surveillance state"
Glenn Greenwald, With Liberty and Justice for
1979 Smith v. Maryland, 442 US
Telephone company, at police request, installed at its central
offices a pen register to record the numbers dialed from the telephone at
A pen register, or dialed number recorder (DNR), is
an electronic device that records all numbers called from a particular
The term now includes any device or program that
performs similar functions to an original pen register, including programs
monitoring the Internet.
Petitioner moved to suppress "all fruits
derived from" the pen register.
The Maryland trial court denied this
motion, holding that the warrantless installation of the pen register did not
violate the Fourth Amendment.
Petitioner was convicted, and the Maryland
Court of Appeals affirmed.
Held: The installation and use of the pen
register was not a "search" within the meaning of the Fourth Amendment, and
hence no warrant was required.
March 22, 2000
Mark Lombardi is found dead by
hanging in his apartment shortly before an exposition. Found drawings are
Mark Lombardi began in the early 1990s researching the many
scandals of the time, including the BCCI scandal, the Harken Energy scandal,
and the Savings and Loan
He noted info about the scandals on note cards and then
arranged the note cards into a framework of social network analysis which he
penciled as a diagram or bubble flow chart.
Lombardi called his diagrams Narrative
He added research into Houston S&L scandal -
which Pete Brewton alleged the Bush family, CIA associates and Mafia were
involved - Iran Contra scandal and Adnan Khashoggi.
In 1999 Lombardi
drew "George W. Bush, Harken Energy, and Jackson Stephens, ca 197990"
shows connections between James Bath, the Bush and bin Laden families, and
business deals in Texas and around the world.
2010 Swedish-born scholar and activist Lisbet Rausing publishes a
widely-circulated essay in the journal openDemocracy arguing for open
access to scholarly articles.
She specifically mentioned JSTOR:
"It is equally problematic that JSTOR, the splendid 1997 database of
most twentieth-century scholarly articles in the social sciences and
humanities, is off-limits for the public.
Look at JSTOR (if you can).
There you find the evidence-based, source-critical foundations of
sociology, anthropology, geography, history, philosophy, classics, Oriental
studies, theology, musicology, history of science and so on.
all closed to the public."
"Not long after this, George Soros Open
Society Foundations attempted to join forces with Rausing's Arcadia
Fund to make JSTOR widely available to the public, and Swartz kept
up with these efforts." - Noam Scheiber
Analysts are told they can trace contacts of Americans as long as they
cite a foreign intelligence justification.
The National Security Agency has been exploiting huge collections of
data to create sophisticated graphs of Americans social connections to identify
associates, locations at certain times, traveling companions and other
The agency is authorized to conduct "large-scale
graph analysis on very large sets of communications metadata without having to
check foreignness" of every e-mail address, phone number or other
The agency augments the communications data with material
from public, commercial and other sources, including bank codes, insurance
information, Facebook profiles, passenger manifests, voter registration rolls,
GPS location information, as well as property records and unspecified tax data,
according to the documents.
There is no restrictions on the use of
"enrichment" data, and several former senior
administration officials said the agency drew on it for both Americans and
The Justice Department and the
Pentagon decided it was
permissible to create contact chains using Americans' "metadata," which
includes the timing, location and other details of calls and e-mails.
The agency, citing Smith v. Maryland, 442 US 735, claims it is
not required to seek warrants from the Foreign Intelligence Surveillance
Smith v. Maryland Does Not Permit Mass
Phone and e-mail logs allow analysts to identify
associates, detect movement in time, acquire clues to affiliations, pick up
sensitive information, calls to
Charles, late-night extramarital partners or
exchanges with a
"Metadata can be very revealing.
number someone just dialed or the location of the person's cellphone is going
to allow assembly of a picture of what someone is up to.
digital equivalent of tailing a suspect." - Orin S. Kerr
The policy - Defense
Supplemental Procedures Governing Communications Metadata Analysis - was
authorized by Defense Secretary Robert M. Gates and
Attorney General Michael B.
"Sigint Management Directive 424", stated the
Supreme Court ruled
metadata was not constitutionally protected and allowed
Analysts, using metadata "without regard to the nationality
or location of the communicants" acquired the conversations of foreign
politicians, business figures or activists and anyone else in the
One of the main tools used for chaining phone numbers and e-mail
addresses has the code name Mainway.
Vast amounts of data flow
daily from fiber-optic cables, corporate partners and foreign computer networks
that have been hacked.
"Better Person Centric Analysis" describes
how the agency looks for 94 "entity types," including phone numbers, e-mail
addresses and IP addresses.
The NSA correlates 164 "relationship types"
to build social networks and
what the agency calls "community of interest" profiles, using queries like
"travelsWith, hasFather, sentForumMessage, employs."
January 11, 2013
Aaron Swartz is found dead from hanging in his apartment in New
Aaron was accused by the US government of
infiltrating computers for the release of copyrighted academic articles and
could have been sentenced to 35 years in prison.
At 14 Aaron coauthored
of RSS (Really Simple Syndication).
"The idea of sharing culture,
knowledge and information was from that very moment present in the actions of
the young Aaron, who combined a great passion for freedom with a refined
expertise for the development of collaborative network solutions." -
Sérgio Amadeu da Silveira
The federal indictment states
matter-of-factly that "Swartz intended to distribute a significant portion of
The only real evidence of a motive or plan that
prosecutors disclosed was a document written in July 2008 called the
"Guerilla Open Access Manifesto."
Swartz began that widely
reported post by arguing that, "Information is power. But like all power,
there are those who want to keep it for themselves."
systems have been endorsed by the National Security Agency, signifying that
they are permeable to intrusions by the
These operations will deny, degrade, disrupt,
destroy, or deceive an adversary.
Cyberspace offensive operations
ensure friendly freedom of action in cyberspace while denying that same freedom
to our adversaries.
We will enhance our capabilities to conduct
electronic systems attack,
interdiction and attack, network attack, and
Targets include the adversary's terrestrial, airborne,
and space networks, electronic attack and network attack systems, and the
As an adversary becomes more dependent on cyberspace,
cyberspace offensive operations have the potential to produce greater effects."
- Air Force Cyber Command
"CYBERCOM will reach initial operating
capability (IOC) not later than October 2009 and full operating capability
(FOC) not later than October 2010.
Ostensibly launched to protect
military networks against malicious cyberattacks, CYBERCOM's offensive nature
is underlined by its role as STRATCOM's operational cyber wing.
addition to a defensive brief to "harden" the "dot-mil" domain, the Pentagon
plan calls for an offensive capacity, one that will deploy cyber weapons
against imperialism's adversaries.
One of ten
Unified Combatant Commands, STRATCOM is the successor organization to Strategic
Air Command (SAC).
Charged with space operations (military satellites),
information warfare, missile defense, global command and control, intelligence,
surveillance and reconnaissance (ISR), as well as global strike and strategic
deterrence (America's first-strike nuclear arsenal),
it should be apparent that designating CYBERCOM a STRATCOM branch all but
aggressive posture." - Tom Burghardt July 1, 2009
This web site is not a commercial web site and
is presented for educational purposes only.
This website defines a
new perspective with which to engage reality to which its author adheres. The
author feels that the falsification of reality outside personal experience has
forged a populace unable to discern propaganda from reality
and that this has been done purposefully by an international corporate cartel
through their agents who wish to foist a corrupt version of reality on the
human race. Religious intolerance occurs when any group refuses to tolerate
religious practices, religious beliefs or persons due to their religious
ideology. This web site marks the founding of a system of philosophy named The
Truth of the Way of the Lumière Infinie - a rational gnostic mystery
religion based on reason which requires no leap of faith, accepts no tithes,
has no supreme leader, no church buildings and in which each and every
individual is encouraged to develop a personal relation with the Creator and
Sustainer through the pursuit of the knowledge of reality in the hope of curing
the spiritual corruption that has enveloped the human spirit. The tenets of the
Truth of the Way of the Lumière Infinie are spelled out in detail on
this web site by the author. Violent acts against individuals due to their
religious beliefs in America is considered a "hate crime."
This web site
in no way condones violence. To the contrary the intent here is to reduce the
violence that is already occurring due to the international corporate cartels
desire to control the human race. The international corporate cartel already
controls the world economic system, corporate media worldwide, the global
industrial military entertainment complex and is responsible for the collapse
of morals, the elevation of self-centered behavior and the destruction of
global ecosystems. Civilization is based on coöperation. Coöperation
does not occur at the point of
American social mores and values have declined precipitously
over the last century as the corrupt international cartel has garnered more and
more power. This power rests in the ability to deceive the populace in general
through corporate media by pressing emotional buttons which have been
preprogrammed into the population through prior corporate media psychological
operations. The results have been the destruction of the family and the
destruction of social structures that do not adhere to the corrupt
international elites vision of a perfect world. Through distraction and
coercion the direction of thought of the bulk of the population has been
directed toward solutions proposed by the corrupt international elite that
further consolidates their power and which further their purposes.
views and opinions presented on this web site are the views and opinions of
individual human men and women that, through their writings, showed the
capacity for intelligent, reasonable, rational, insightful and unpopular
thought. All factual information presented on this web site is believed to be
true and accurate and is presented as originally presented in print media which
may or may not have originally presented the facts truthfully.
Opinion and thoughts
have been adapted, edited, corrected, redacted, combined, added to, re-edited
and re-corrected as nearly all opinion and thought has been throughout time but
has been done so in the spirit of the original writer with the intent of making
his or her thoughts and opinions clearer and relevant to the reader in the
Fair Use Notice
This site may contain
copyrighted material the use of which has not always been specifically
authorized by the copyright owner. We are making such material available in our
efforts to advance understanding of criminal justice,
human rights, political,
economic, democratic, scientific, and social justice issues, etc. We believe
this constitutes a 'fair use' of any such copyrighted material as provided for
in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C.
Section 107, the material on this site is distributed without profit to those
who have expressed a prior interest in receiving the included information for
research and educational purposes. For more information see:
www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted
material from this site for purposes of your own that go beyond 'fair use', you
must obtain permission from the copyright owner.
© Lawrence Turner
All Rights Reserved