stacks



The Criminal NSA

Why Google made the NSA

Metastasized Intelligence Complex

NSA Creates Citizen Data Warehouse System

"The new Citizen Data Warehouse System (CDWS) will create a comprehensive database containing detailed information about each US citizen. Since the vast majority of all US credit card transactions will be fed through this new system, the depth of information will be unparalleled. Intelligent routing of citizen data throughout the interconnected computer systems of various federal agencies will provide citizens a new level of service from the federal government."


"In every way that matters, the separation between

government and corporations is nonexistent
,

and this is especially true when it comes to

national security and the surveillance state"

Glenn Greenwald, With Liberty and Justice for Some



"GCHQ has conducted mass interception of communications data from the world underwater fiber-optic cables.

Under the program name Tempora, the GCHQ developed the "ability to tap into and store huge volumes of data drawn from fiber-optic cables for up to 30 days so that it can be sifted and analyzed," the Guardian reported, and the 'GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people.'

The intercepted data encompass all forms of online activity, including "recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user access to websites."

The GCHQ's surveillance activities are every bit as comprehensive and unaccountable-as the NSAs.

The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation." - Glenn Greenwald



NSA Foils Basic Privacy Safeguards

"Omnipotent" hackers tied to NSA hid for 14 years

NSA Gathers Data on Social Connections of US Citizens

6 Whopping Government Misstatements About NSA Spying

The NSA is turning the internet into a total surveillance system

Report: NSA Mimics Google to Monitor "Target" Web Users

Confirmed: There Is No Real Oversight Of The NSA's Surveillance

NSA: A Bunch Of Intentional Abuses, Including Spying On Love Interests

NSA Actually Has A Program Called SKYNET

Light on Five Eyes Alliance



1979 Smith v. Maryland, 442 US 735

Telephone company, at police request, install on the central switchboard a pen register to record numbers dialed from the telephone at Smith's home.

A pen register, or dialed number recorder (DNR), is an electronic device that records numbers called from a particular telephone line.

Petitioner moved to suppress "all fruits derived from" the pen register.

The Maryland trial court denied this motion, holding that the warrantless installation of the pen register did not violate the Fourth Amendment.

Petitioner was convicted, and the Maryland Court of Appeals affirmed.

Held: The installation and use of the pen register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant was required.

Legalese allows inclusion of any device or program that performs similar functions to the original pen register, including monitoring programs.

March 22, 2000 Mark Lombardi is found dead by hanging in his apartment shortly before an exposition. Found drawings are illigible.

Mark Lombardi began in the early 1990s researching the BCCI scandal, the Harken Energy scandal, and the Savings and Loan debacle.

He noted information about the scandals on 3 x 5 note cards and arranged the note cards into a framework of social network analysis which he penciled as a diagram or bubble flow chart.

Lombardi called his diagrams Narrative Structures.

He added research into Houston S&L scandal - which Pete Brewton alleged the Bush family, CIA associates and Mafia were involved - Iran Contra scandal and Adnan Khashoggi.

In 1999 Lombardi drew "George W Bush, Harken Energy, and Jackson Stephens, ca 1979–90" shows connections between James Bath, the Bush and bin Laden families, and business deals in Texas and around the world.

June 2010 Swedish-born scholar and activist Lisbet Rausing publishes a widely-circulated essay in the journal openDemocracy arguing for open access to scholarly articles.

She specifically mentions JSTOR: "It is equally problematic that JSTOR, the splendid 1997 database of most twentieth-century scholarly articles in the social sciences and humanities, is off-limits for the public.

Look at JSTOR (if you can).

There you find the evidence-based, source-critical foundations of sociology, anthropology, geography, history, philosophy, classics, Oriental studies, theology, musicology, history of technology and so on.

They are all closed to the public."

By the time of his death in August 2019, Forbes estimated the net worth of Hans Anders Rausing, a Swedish industrialist based in the UK, and his family to be $12 billion.

Hans Rausing and his wife Märit Rausing had two daughters, Lisbet and Sigrid, and one son, Hans Kristian Rausing.

"Not long after this, George Soros Open Society Foundations attempted to join forces with Rausing' Arcadia Fund to make JSTOR widely available to the public, and Swartz kept up with these efforts." - Noam Scheiber

[Noam Scheiber, Truman and Rhodes Scholar with a master's degree in economics from Oxford University, is a New York Times writer and a former senior editor for The New Republic.]

2011 Analysts are told they can trace contacts of Americans as long as they cite a foreign intelligence justification.

The NSA is exploiting huge collections of data to create sophisticated graphs of Americans social connections to identify associates, locations at certain times, traveling companions and other pertinent information.

The agency is authorized to conduct "large-scale graph analysis on very large sets of communications metadata without having to check foreignness" of every e-mail address, phone number or other identifier.

The agency augments the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls, GPS location information, as well as property records and unspecified tax data.

There is no restrictions on the use of "enrichment" data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.

The Justice Department and the Pentagon decide it is permissible to create contact chains using Americans' "metadata," which includes the timing, location and other details of calls and e-mails.

The agency, citing Smith v. Maryland, 442 US 735, claims it is not required to seek warrants from the Foreign Intelligence Surveillance Court.

Smith v. Maryland Does Not Permit Mass Surveillance

Phone and e-mail logs allow analysts to identify associates, detect movement through time, acquire affiliations, pick up sensitive information, calls to Charles, late-night extramarital partners or exchanges with a fellow plotter.

"Metadata can be very revealing.

Knowing the number someone just dialed or the location of the person's cellphone is going to allow assembly of a picture of what someone is up to.

It's the digital equivalent of tailing a suspect." - Orin S. Kerr




NSA Isn't Just Spying It's Also Undermining Internet Security

NSA director admits to misleading public on terror plots

NSA is more than just a spy network, it's global fascism

Guardian told to destroy NSA files for national security

Latest Leak Shows NSA Engaging In Economic Espionage



The policy - Defense Supplemental Procedures Governing Communications Metadata Analysis - was authorized by Defense Secretary Robert M. Gates and Attorney General Michael B. Mukasey.

"Sigint Management Directive 424", stated the Supreme Court ruled metadata was not constitutionally protected and allowed collection.

Analysts, using metadata "without regard to the nationality or location of the communicants" acquire the conversations of foreign politicians, business figures or activists and anyone else in the chain.

One of the main tools used for chaining phone numbers and e-mail addresses has the code name Mainway.

Vast amounts of data flow daily from fiber-optic cables, corporate partners and foreign computer networks that have been hacked.

"Better Person Centric Analysis" describes how the agency looks for 94 "entity types," including phone numbers, e-mail addresses and IP addresses.

The NSA correlates 164 "relationship types" to build social networks and what the agency calls "community of interest" profiles, using queries like "travelsWith, hasFather, sentForumMessage, employs."




covertly attached NSA meme

NSA Is a Servant of Corporate Power

NSA to open data analysis lab at NCSU

NSA Spying: It's About the Money, Honey

NSA Documents Suggest a Close Working
Relationship Between NSA, US Companies

Germany's Deep Coöperation with the NSA

Observers Solve Juniper Backdoor Mystery


Snowden says NSA engages in industrial espionage

Cisco confirms NSA-linked zeroday targeted its firewalls for years

NSA's Bulk Collection of Phone Records Is Illegal, Appeals Court Says

57% Fear Government Will Use NSA Data to Harass Political Opponents

Popular Security Software Came Under Relentless NSA and GCHQ Attacks

William Binney: NSA Claim Not to Be Mining Content Is an "Outright Lie"

George W Bush Made Retroactive NSA 'Fix' After Hospital Room Showdown

"Disreputable if Not Outright Illegal": The National Security Agency versus
Martin Luther King, Muhammad Ali, Art Buchwald, Frank Church, et al.

Guardian told to destroy NSA files for national security

How the NSA Helped Türkey Kill Kurdish Rebels



January 11, 2013 Aaron Swartz is found dead from hanging in his apartment in New York.

Aaron was accused of infiltrating computers for the release of copyrighted academic articles and could have been sentenced to 35 years in prison.

At 14 Aaron coauthored RSS (Really Simple Syndication).

"The idea of sharing culture, knowledge and information was from that very moment present in the actions of the young Aaron, who combined a great passion for freedom with a refined expertise for the development of collaborative network solutions." - Sérgio Amadeu da Silveira

The federal indictment states matter-of-factly that "Swartz intended to distribute a significant portion of JSTOR' archive."

The only real evidence of a motive or plan that prosecutors disclosed was a document written in July 2008 called the "Guerilla Open Access Manifesto."

Swartz began that widely reported post by arguing that, "Information is power. But like all power, there are those who want to keep it for themselves."



cyber terrorist

Cyber War as a Career Path

Global Privacy Control in Privacy Badger

Social Media in Strategic Communication

Is Windows 8 a Trojan horse for the NSA?

FOIA Documents Reveal DHS Social MediaMonitoring

EFF and ACLU Tell Federal Court Forensic Software Source Code Must Be Disclosed


"All software systems have been endorsed by the National Security Agency, signifying that they are permeable to intrusions by the US intelligence services."

Thierry Meyssan


Cybercrime: Overview of Federal Law

Army establishes Army Cyber Command

US spy operation that manipulates social media

Wanted: Cyber Warriors and Media Sanitizers

Offensive Cyber Operations in US Military Doctrine

FAS Website Blocked by US Cyber Command, Then Unblocked

Pentagon's Cyber Command seeks authority to expand its battlefield

Air Force ordered software to manage army of fake virtual people



"Cyberspace favors offensive operations.

These operations will deny, degrade, disrupt, and deceive an adversary.

Cyberspace offensive operations ensure friendly freedom of action in cyberspace while denying that same freedom to our adversaries.

We will enhance our capabilities to conduct electronic systems attack, electromagnetic systems interdiction, network attack, and infrastructure attack operations.

Targets include the adversary's terrestrial, airborne, and space networks, electronic network attack systems, and the adversary itself.

As an adversary becomes dependent on cyberspace, offensive operations have the potential to produce greater effects." - Air Force Cyber Command

"CYBERCOM will reach initial operating capability not later than October 2009 and full operating capability not later than October 2010.

Ostensibly launched to protect military networks against malicious cyberattacks, CYBERCOM's offensive nature is underlined by its role as STRATCOM's operational cyber wing.

In addition to a defensive hardening of the "dot-mil" domain, the Pentagon plan calls for an offensive capacity, one that will deploy cyber weapons against the adversaries of neofeudalism/neoliberism/neoconservatism.

One of ten Unified Combatant Commands, STRATCOM is the successor organization to Strategic Air Command.

Charged with military satellites, information warfare, strategic deterrence, global command and control, intelligence, surveillance and reconnaissance, it should be apparent that designating CYBERCOM a STRATCOM branch all but guarantees an aggressive posture." - Tom Burghardt July 1, 2009



XKEYSCORE

NSA Mimics Google

Experts Unmask 'Regin' Trojan as NSA Tool

Core Secrets: NSA Saboteurs in China and Germany

Russian observers expose breakthrough US spying program

The Digital Arms Race: NSA Preps America for Future Battle

The Surveillance Engine: How the NSA Built Its Own Secret Google

How The NSA Deploys Malware: An In-Depth Look at the New Revelations





unique library index

This web site is not a commercial web site and is presented for educational purposes only.




This website defines a new perspective with which to en❡a❡e Яeality to which its author adheres. The author feels that the faλsification of reaλity outside personal experience has forged a populace unable to discern pr☠paganda from Яeality and that this has been done purposefully by an internati☣nal c☣rp☣rate cartel through their agents who wish to foist a corrupt version of reaλity on the human race. Religi☯us int☯lerance ☯ccurs when any group refuses to tolerate religi☯us practices, religi☸us beliefs or persons due to their religious ideology. This web site marks the founding of a system of philºsºphy nªmed The Mŷsterŷ of the Lumière Infinie - a ra☨ional gnos☨ic mys☨ery re☦igion based on reaso🐍 which requires no leap of faith, accepts no tithes, has no supreme leader, no church buildings and in which each and every individual is encouraged to develop a pers∞nal relati∞n with Æ∞n and Sustainer through the pursuit of the knowλedge of reaλity in the hope of curing the spiritual c✡rrupti✡n that has enveloped the human spirit. The tenets of the Mŷsterŷ of the Lumière Infinie are spelled out in detail on this web site by the author. Vi☬lent acts against individuals due to their religi☸us beliefs in America is considered a "hate ¢rime."

This web site in no way c☬nd☬nes vi☬lence. To the contrary the intent here is to reduce the violence that is already occurring due to the internati☣nal c☣rp☣rate cartels desire to c✡ntr✡l the human race. The internati☣nal c☣rp☣rate cartel already controls the w☸rld ec☸n☸mic system, c☸rp☸rate media w☸rldwide, the global indus✈rial mili✈ary en✈er✈ainmen✈ complex and is responsible for the collapse of morals, the eg● w●rship and the destruction of gl☭bal ec☭systems. Civilization is based on coöperation. Coöperation with bi☣hazards at the point of a gun.

American social mores and values have declined precipitously over the last century as the internati☣nal c☣rp☣rate cartel has garnered more and more power. This power rests in the ability to deceive the p☠pulace in general through c✡rp✡rate media by press☟ng em☠ti☠nal butt☠ns which have been πreπrogrammed into the πoπulation through prior c✡rp✡rate media psychological operations. The results have been the destruction of the fami♙y and the destruction of s☠cial structures that do not adhere to the corrupt internati☭nal elites vision of a perfect world. Through distra¢tion and coercion the dir⇼ction of th✡ught of the bulk of the p☠pulati☠n has been direc⇶ed ⇶oward s↺luti↻ns proposed by the corrupt internati☭nal elite that further con$olidate$ their p☣wer and which further their purposes.

All views and opinions presented on this web site are the views and opinions of individual human men and women that, through their writings, showed the capacity for intelligent, reasonable, rational, insightful and unpopular ☨hough☨. All factual information presented on this web site is believed to be true and accurate and is presented as originally presented in print media which may or may not have originally presented the facts truthfully. Øpinion and ☨hough☨s have been adapted, edited, corrected, redacted, combined, added to, re-edited and re-corrected as nearly all opinion and ☨hough☨ has been throughout time but has been done so in the spirit of the original writer with the intent of making his or her ☨hough☨s and opinions clearer and relevant to the reader in the present time.


Fair Use Notice



This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, human rights, political, politi¢al, e¢onomi¢, demo¢rati¢, s¢ientifi¢, and so¢ial justi¢e iϩϩueϩ, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for rėsėarch and ėducational purposės. For more information see: www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.

Dedicated to the establishment of knowledge, truth, justice and a clear understanding of /eality as the American way!
Copyright © Lawrence Turner
All Rights Reserved