By EA.
Yes, thats right.
WASHINGTON--The FBI on Wednesday called for new legislation that would allow federal police to monitor the Internet for "illegal activity."
Immediately one thinks that they are wanting to do it, but in fact they have been doing it for more than 50 years. In fact, they are now trying to 'MAKE LEGAL' all that they have been doing against the people, and the constitution for years.
Proof you say?
Have you heard of Echelon? At the writing of the word Echelon, the "Echelon" systems recognizes the 'key' word and marks it. The writing of point is then analyzed further for various 'key' words. There upon whereby a Human will review the data for further orders from or at the NSA, or National Security Agency. The movie "Bourne Identity" and "Enemy of The State are both very accurate depiction's of NSA's capability's world wide in real time.
While details of methods and capabilities are highly sensitive and protected by special laws (e.g. 18 USC 798), gathering signals intelligence (SIGINT) is an acknowledged mission of the U.S. National Security Agency. As of August 2006, their web site had a FAQ page on the topic,[9] which states:
"NSA/CSS’s Signal Intelligence mission is to intercept and analyze foreign adversaries' communications signals, many of which are protected by codes and other complex countermeasures. We collect, process, and disseminate intelligence reports on foreign intelligence targets in response to intelligence requirements set at the highest levels of government. ... Foreign intelligence means information relating to the capabilities, intentions, and activities of foreign powers, organizations or persons."
Wikipedias definition of Data Mining:
"Data mining is the process of sorting through large amounts of data and picking out relevant information. It is usually used by business intelligence organizations, and financial analysts, but it is increasingly used in the sciences to extract information from the enormous data sets generated by modern experimental and observational methods. It has been described as "the nontrivial extraction of implicit, previously unknown, and potentially useful information from data"[1] and "the science of extracting useful information from large data sets or databases".[2] Data mining in relation to Enterprise Resource Planning is the statistical and logical analysis of large sets of transaction data, looking for patterns that can aid decision making. [3]"
"At the same time, that capability at any time could be turned around on the American people and no American would have any privacy left, such [is] the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology...
"I don't want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."
— Senator Frank Church, quoted in: ECHELON: America's Secret Global Surveillance Network
The truth is that the US Government since at least the 50's has been intercepting, monitoring, and more than likely manipulating all signals emanating from Humankind. All knowing. Any Ham operator will know this.
Its capabilities and political implications were investigated by a committee of the European Parliment during 2000 and 2001 with a report published in 2001.
If you take the time to read that document you will be very enlightened and we could stop here proving its existence, and it growth over time, it has been a black operation.
In his article Exposing the Global Surveillance Network in the #59 issue of CovertAction Quarterly (European mirror) Nicky Hagar writes:
"For 40 years, New Zealand's largest intelligence agency, the Government Communications Security Bureau (GCSB) the nation's equivalent of the US National Security Agency (NSA) had been helping its Western allies to spy on countries throughout the Pacific region ... The activities they [Hagar's sources] described made it possible to document, from the South Pacific, some alliance-wide systems and projects which have been kept secret elsewhere. Of these, by far the most important is ECHELON. Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world's telecommunications networks. ... It potentially affects every person communicating between (and sometimes within) countries anywhere in the world."
The ECHELON system was exposed in detail for the first time in 1996 in Nicky Hagar's book Secret Power. In Chapter 3 we read:
"All the text messages (written communications such as telexes, faxes, e-mail) intercepted at the Waihopai station are fed into these computers. This is an enormous mass of material -- literally all the business, government and personal messages that the station catches. The computers automatically search through everything as it arrives at the station.
"This is the work of the Dictionary program. It reads every word and number in every single incoming message and picks out all the ones containing target keywords and numbers. Thousands of simultaneous messages are read in 'real time' as they pour into the station, hour after hour, day after day, as the computer finds intelligence needles in the telecommunications haystack."
And the same is happening at the other satellite tracking stations run by the NSA -- in Australia (Geraldton), England (Morwenstow), the U.S. (Sugar Grove and Yakima) and other places. The spooks have the world covered, and consider themselves free to read anyone's email that they wish to. Should this be allowed to continue? Perhaps it can't be stopped. In that case the appropriate counter-measure is to use encryption as much as possible.
ECHELON: America's Secret Global Surveillance Network
The rate that computers have accelerated, and the fact that they had the physical characteristics of the hardware worked out from the 50's makes the imaginative picture much like many movies that 'just keep coming out'. They already have known all the things they know for some time now, and soon they are going to make their control Earth wide legal. They need to make their world take over legal, much like Hitler, in order for the jackboots to carry out the plan without being stoned to death as traitors. They are releasing hardened felons into the Police force in the US, and they will be going into the Military as well. Frightful thoughts there arent they? A felon force doing the grunt work the the Global Elite, they will be glad going into America to take her down, and then turn upon the third world for blood while the UN EU and African Union merge into one Military force with branches of regional dictators all bowing to the crossing point with the words UN on it.
Are you ready to do something about all of this? Just look at all the information on the long list of topics that is taking place in the world today. They want to kill us, reduce us from the Earth, especially the poor, disadvantaged, and lame. Look at even the word lame as what is used to define people with disabilities. They want us to die.
Intelligence Capabilities 2000 is one of a series of reports on the "Development of surveillance technology and risk of abuse of economic information." The following reports are in PDF format.
- Presentation of the four studies and Analysis: Data protection and human rights in the European Union and the role of the European Parliament.
- Encryption and cryptosystems in electronic surveillance: a survey of the technology assessment issues.
- The legality of the interception of electronic communications: a concise survey of the principal legal issues and instruments under international, European and national law.
- The perception of economic risks arising from the potential vulnerability of electronic commercial media to interception.
So dont be fooled, they have been doing this and other things for a very long time!!
Sources and Resources
- Final Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system), European Parliament Temporary Committee on the ECHELON Interception System, approved September 5, 2001 (~1 MB PDF file)
- A Dissent from the European Parliament Echelon Committee Report, minority report, July 4, 2001.
- Draft Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system), European Parliament Temporary Committee on the ECHELON Interception System, May 18, 2001 (780 kB PDF file)
- Secret Power - New Zealand's Role in the International Spy Network by Nicky Hager Published by Craig Potton Publishing, PO Box 555, Nelson, New Zealand First published 1996
- ECHELON: NSA's Global Electronic Interception @ JYA
- Interception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information - April 1999
- DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION
European Parliament (Scientific and Technical Options Assessment)
December 1999- Presentation and Analysis
- State of the art in COMINT
- Encryption and cryptosystems in electronic surveillance
- The legality of the interception of electronic communications
- The perception of economic risks
- The new space invaders - Spies in the sky Peter Goodspeed National Post Saturday, February 19, 2000 -- "This whole thing is so bizarrely powerful that the opportunity or temptation for abuse is fairly substantial," says Mr. Pike of the American Federation of Scientists. "How many people in your organization always obey the rules? "The notion that NSA or any other of these spy networks is the only large organization in human history in which everyone always obeys the rules just flies in the face of common sense," he says.
- SHH! UNCLE SAM IS LISTENING Jack Anderson and Douglas Cohn United Feature Syndicate November 16, 1999 -- According to John Pike, a military analyst at the Federation of American Scientists, "They are going to continue to gather anything they want to, but the wild card is what will be revealed in the report. We can assume that the NSA did not flat out break the law, but we can also assume that Barr won't be told much and the public will be told less" about Project Echelon.
- Critics Questioning NSA Reading Habits By Vernon Loeb Washington Post November 13, 1999; Page A03 -- Steven Aftergood, director of a research project on government secrecy at the independent Federation of American Scientists, said the controversy is a case study of the public's willingness to believe almost anything about the NSA.
- Trade Secrets : Is the U.S.'s most advanced surveillance system feeding economic intelligence to American businesses? Mother Jones November 1, 1999 "Since the NSA's collection capabilities are so grotesquely powerful, it's difficult to know what's going on over there," says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.
- THE EDGE WITH PAULA ZAHN FOX NEWS NETWORK October 21, 1999 -- Echelon is reportedly monitoring up to two million communications every hour of every day. John Pike "As long as the rules are conformed with, I think we're OK. The question is whether NSA's really obeying the rules."
- Automatically generating a topic description for text and searching and sorting text by topic using the same United States Patent 5,937,422 Nelson , et al. August 10, 1999 --- It is an object of the present invention to automatically generate a topic description for a document that may include words that do not appear in the document. Possible applications of the present invention include: post processing to improve machine transcription (e.g., machine recognition of speech, auto dictation, text conversion from an optical character reader, etc.), and multi-lingual processing (e.g., multi-lingual interface, automatic translation, etc.).
- New Navy-supported machine recognizes spoken words better than humans NAVY WIRE SERVICE (NWS) - November 1, 1999 -- In benchmark testing, USC's speech recognition system bested all existing computer systems and outperformed the keenest human ears.
- Machine Demonstrates Superhuman Speech Recognition Abilities University of Southern California News Service Release date: 9/30/99 -- The system can distinguished words in vast amounts of random "white" noise — noise with amplitude 1,000 times the strength of the target auditory signal. Human listeners can deal with only a fraction as much. And the system can pluck words from the background clutter of other voices — the hubbub heard in bus stations, theater lobbies and cocktail parties, for example. With just a minor adjustment, the system can identify different speakers of the same word with superhuman acuity.
No comments:
Post a Comment