conducted mass interception of communications data from the world underwater
Under the program name Tempora, the GCHQ
developed the "ability to tap into and store huge volumes of data drawn from
fiber-optic cables for up to 30 days so that it can be sifted and analyzed,"
the Guardian reported, and the 'GCHQ and the NSA are consequently able to
access and process vast quantities of communications between entirely innocent
The intercepted data encompass all forms of online activity,
including "recordings of phone calls, the content of email messages, entries on
Facebook and the history of any internet user access to websites."
GCHQ's surveillance activities are every bit as comprehensive and
unaccountable-as the NSAs.
The sheer scale of the agency's ambition is
reflected in the titles of its two principal components: Mastering the Internet
and Global Telecoms Exploitation." - Glenn Greenwald
1979 Smith v. Maryland, 442 US
Telephone company, at police request, install on the central
switchboard a pen register to record numbers dialed from the telephone at
A pen register, or dialed number recorder (DNR), is an
electronic device that records numbers called from a particular telephone line.
Petitioner moved to suppress "all fruits derived from" the pen
The Maryland trial court denied this motion, holding that the
warrantless installation of the pen register did not violate the Fourth
Petitioner was convicted, and the Maryland Court of
Held: The installation and use of the pen
register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant
Legalese allows inclusion of any device or program that
performs similar functions to the original pen register, including
2000 Mark Lombardi is
found dead by hanging in his apartment shortly before an exposition. Found
drawings are illigible.
Mark Lombardi began in the early 1990s
researching the BCCI scandal,
the Harken Energy scandal, and
the Savings and Loan
He noted information about the scandals on 3 x 5 note cards
and arranged the note cards into a framework of social network analysis which
he penciled as a diagram or bubble flow chart.
Lombardi called his diagrams Narrative
He added research into
Houston S&L scandal - which Pete Brewton alleged the
Bush family, CIA associates and Mafia were involved -
Iran Contra scandal and
In 1999 Lombardi drew
"George W Bush, Harken Energy, and Jackson Stephens, ca 197990" shows
connections between James Bath, the Bush and bin Laden families, and business
deals in Texas and around the world.
Swedish-born scholar and activist
Rausing publishes a widely-circulated essay in the journal
openDemocracy arguing for open access to scholarly articles.
specifically mentions JSTOR: "It is equally problematic that JSTOR, the
splendid 1997 database of most twentieth-century scholarly articles in the
social sciences and humanities, is off-limits for the public.
JSTOR (if you can).
There you find the evidence-based,
foundations of sociology, anthropology,
history of technology and so on.
They are all closed to the public."
By the time of his death in
August 2019, Forbes estimated the net worth of Hans Anders Rausing, a Swedish
industrialist based in the UK, and his family to be $12 billion.
Rausing and his wife Märit Rausing had two daughters, Lisbet and Sigrid,
and one son, Hans Kristian Rausing.
"Not long after this,
George Soros Open Society
Foundations attempted to join forces with Rausing' Arcadia Fund to
make JSTOR widely available to the public, and Swartz kept up with these
efforts." - Noam Scheiber
[Noam Scheiber, Truman and Rhodes Scholar with
a master's degree in economics from Oxford University, is a
New York Times writer
and a former senior editor for The New
Analysts are told they can
trace contacts of Americans as long as they cite a foreign intelligence
The NSA is exploiting huge collections of data to create
sophisticated graphs of Americans social connections to identify associates,
locations at certain times, traveling companions and other pertinent
The agency is authorized to conduct "large-scale graph
analysis on very large sets of communications metadata without having to check
foreignness" of every e-mail address, phone number or other
The agency augments the communications data with material
from public, commercial and other sources, including bank codes, insurance
information, Facebook profiles, passenger manifests, voter registration rolls,
GPS location information, as well as property records and unspecified tax data.
There is no restrictions on the use of "enrichment" data, and several
former senior Obama administration officials said the agency drew on it for
both Americans and foreigners.
The Justice Department and the
Pentagon decide it is
permissible to create contact chains using Americans' "metadata," which
includes the timing, location and other details of calls and e-mails.
The agency, citing Smith v. Maryland, 442 US 735,
claims it is not required to seek
warrants from the Foreign Intelligence Surveillance Court.
Smith v. Maryland Does Not Permit Mass
e-mail logs allow
analysts to identify associates,
detect movement through time,
acquire affiliations, pick up sensitive information,
calls to Charles,
late-night extramarital partners
or exchanges with a
"Metadata can be very revealing.
number someone just dialed or the location of the person's cellphone is going
to allow assembly of a picture of what someone is up to.
digital equivalent of tailing a suspect." - Orin S. Kerr
The policy - Defense
Supplemental Procedures Governing Communications Metadata Analysis -
was authorized by Defense Secretary Robert M. Gates and
Attorney General Michael B.
"Sigint Management Directive 424", stated the
Supreme Court ruled
metadata was not constitutionally protected and allowed
Analysts, using metadata "without regard to the nationality
or location of the communicants" acquire the conversations of foreign
politicians, business figures or activists and anyone else in the
One of the main tools used for chaining phone numbers and e-mail
addresses has the code name Mainway.
Vast amounts of data flow
daily from fiber-optic cables, corporate partners and foreign computer networks
that have been hacked.
Person Centric Analysis" describes how the agency looks for 94 "entity
types," including phone numbers, e-mail addresses and IP addresses.
NSA correlates 164 "relationship types" to
build social networks and
what the agency calls "community of interest" profiles, using queries like
"travelsWith, hasFather, sentForumMessage, employs."
January 11, 2013
Aaron Swartz is found dead from
hanging in his apartment in New York.
accused of infiltrating
computers for the release of copyrighted academic articles and could have been
sentenced to 35 years in prison.
At 14 Aaron coauthored RSS (Really
"The idea of sharing culture, knowledge and
information was from that very moment present in the actions of the young
Aaron, who combined a great
passion for freedom with
a refined expertise for
the development of collaborative network solutions." - Sérgio Amadeu
The federal indictment states matter-of-factly that "Swartz
intended to distribute a significant portion of JSTOR' archive."
The only real evidence of a motive or plan that prosecutors disclosed
was a document written in July 2008 called the "Guerilla Open Access Manifesto."
that widely reported post by arguing that, "Information is power. But like
all power, there are those who
want to keep it for themselves."
These operations will deny, degrade, disrupt, and
deceive an adversary.
Cyberspace offensive operations ensure friendly
freedom of action in cyberspace while denying that same freedom to our
We will enhance our capabilities to conduct electronic
systems attack, electromagnetic systems
interdiction, network attack, and
infrastructure attack operations.
the adversary's terrestrial, airborne, and space
network attack systems, and
As an adversary becomes dependent on cyberspace, offensive
operations have the potential to produce greater effects." -
Air Force Cyber
"CYBERCOM will reach initial operating capability not later
than October 2009 and full operating capability not later than October
Ostensibly launched to protect military networks against malicious
cyberattacks, CYBERCOM's offensive nature is underlined by its role as
In addition to a defensive hardening of the "dot-mil"
domain, the Pentagon plan calls for an offensive capacity, one that will deploy
cyber weapons against the adversaries of
Unified Combatant Commands,
STRATCOM is the
successor organization to
Strategic Air Command.
deterrence, global command and
reconnaissance, it should be apparent that designating CYBERCOM a STRATCOM
branch all but guarantees an
aggressive posture." -
Tom Burghardt July 1, 2009
This web site is not a commercial web site and
is presented for educational purposes only.
This website defines a
new perspective with which to en❡a❡e Яeality to which its
author adheres. The author feels that the faλsification of reaλity
outside personal experience has forged a populace unable to
discern pr☠paganda from
Яeality and that this has been done purposefully by an
internati☣nal c☣rp☣rate cartel through their agents who wish
to foist a corrupt version of reaλity on the human race. Religi☯us
int☯lerance ☯ccurs when any group refuses to tolerate
religi☯us practices, religi☸us beliefs or persons due to their
religious ideology. This web site marks the founding of a system of
philºsºphy nªmed The Mŷsterŷ of the Lumière
Infinie - a ra☨ional gnos☨ic mys☨ery re☦igion based on
reaso🐍 which requires no leap of faith, accepts no tithes, has no
supreme leader, no church buildings and in which each and every individual is
encouraged to develop a pers∞nal relati∞n with Æ∞n and
Sustainer through the pursuit of the knowλedge of reaλity in the hope
of curing the spiritual c✡rrupti✡n that has enveloped the human
spirit. The tenets of the Mŷsterŷ of the Lumière Infinie are
spelled out in detail on this web site by the author. Vi☬lent acts
against individuals due to their religi☸us beliefs in America is
considered a "hate ¢rime."
This web site in no way
c☬nd☬nes vi☬lence. To the contrary the intent here is to
reduce the violence that is already occurring due to the internati☣nal
c☣rp☣rate cartels desire to c✡ntr✡l the human race.
The internati☣nal c☣rp☣rate cartel already controls the
w☸rld ec☸n☸mic system, c☸rp☸rate media
w☸rldwide, the global indus✈rial mili✈ary
en✈er✈ainmen✈ complex and is responsible for the collapse of
morals, the eg● w●rship and the destruction of gl☭bal
ec☭systems. Civilization is based on coöperation. Coöperation
with bi☣hazards at the point
of a gun.
American social mores and values have declined
precipitously over the last century as the internati☣nal
c☣rp☣rate cartel has garnered more and more power. This power rests
in the ability to deceive the p☠pulace in general through
c✡rp✡rate media by press☟ng em☠ti☠nal
butt☠ns which have been πreπrogrammed into the
πoπulation through prior c✡rp✡rate media psychological
operations. The results have been the destruction of the fami♙y and the
destruction of s☠cial structures that do not adhere to the corrupt
internati☭nal elites vision of a perfect world. Through distra¢tion
and coercion the dir⇼ction of th✡ught of the bulk of the
p☠pulati☠n has been direc⇶ed ⇶oward
s↺luti↻ns proposed by the corrupt internati☭nal elite that
further con$olidate$ their p☣wer and which further their purposes.
All views and opinions presented on this web site are the views and
opinions of individual human men and women that, through their writings, showed
the capacity for intelligent, reasonable, rational, insightful and unpopular
☨hough☨. All factual information presented on this web site is
believed to be true and accurate and is presented as originally presented in
print media which may or may not have originally presented the facts
truthfully. Øpinion and
☨hough☨s have been adapted, edited, corrected, redacted, combined,
added to, re-edited and re-corrected as nearly all opinion and
☨hough☨ has been throughout time but has been done so in the spirit
of the original writer with the intent of making his or her
☨hough☨s and opinions clearer and relevant to the reader in the
Fair Use Notice
This site may contain
copyrighted material the use of which has not always been specifically
authorized by the copyright owner. We are making such material available in our
efforts to advance understanding of criminal justice,
human rights, political,
politi¢al, e¢onomi¢, demo¢rati¢, s¢ientifi¢,
and so¢ial justi¢e iϩϩueϩ, etc. We believe this
constitutes a 'fair use' of any such copyrighted material as provided for in
section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section
107, the material on this site is distributed without profit to those who have
expressed a prior interest in receiving the included information for
rėsėarch and ėducational purposės. For more information
see: www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted
material from this site for purposes of your own that go beyond 'fair use', you
must obtain permission from the copyright owner.
© Lawrence Turner
All Rights Reserved