|
1979 Smith v. Maryland, 442 US
735
Telephone company, at police request, install on the central
switchboard a pen register to record numbers dialed from the telephone at
Smith's home.
A pen register, or dialed number recorder (DNR), is an
electronic device that records numbers called from a particular telephone line.
Petitioner moved to suppress "all fruits derived from" the pen
register.
The Maryland trial court denied this motion, holding that the
warrantless installation of the pen register did not violate the Fourth
Amendment.
Petitioner was convicted, and the Maryland Court of
Appeals affirmed.
Held: The installation and use of the pen
register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant
was required.
Legalese allows inclusion of any device or program that
performs similar functions to the original pen register, including
monitoring programs.
March 22,
2000 Mark Lombardi is
found dead by hanging in his apartment shortly before an exposition. Found
drawings are illigible.
Mark Lombardi began in the early 1990s
researching the BCCI scandal,
the Harken Energy scandal, and
the Savings and Loan
debacle.
He noted information about the scandals on 3 x 5 note cards
and arranged the note cards into a framework of social network analysis which
he penciled as a diagram or bubble flow chart.
Lombardi called his diagrams Narrative
Structures.
He added research into
Houston S&L scandal - which Pete Brewton alleged the
Bush family, CIA associates and Mafia were involved -
Iran Contra scandal and
Adnan Khashoggi.
In 1999 Lombardi drew
"George W. Bush, Harken Energy, and Jackson Stephens, ca 197990" shows
connections between James Bath, the Bush and bin Laden families, and business
deals in Texas and around the world.
June 2010
Swedish-born scholar and activist
Lisbet
Rausing publishes a widely-circulated essay in the journal
openDemocracy arguing for open access to scholarly articles.
She
specifically mentions JSTOR: "It is equally problematic that JSTOR, the
splendid 1997 database of most twentieth-century scholarly articles in the
social sciences and humanities, is off-limits for the public.
Look at
JSTOR (if you can).
There you find the evidence-based,
source-critical
foundations of sociology, anthropology,
geography,
history,
philosophy,
classics,
Oriental studies,
theology,
musicology,
history of technology and so on.
They are all closed to the public."
By the time of his death in
August 2019, Forbes estimated the net worth of Hans Anders Rausing, a Swedish
industrialist based in the UK, and his family to be $12 billion.
Hans
Rausing and his wife Märit Rausing had two daughters, Lisbet and Sigrid,
and one son, Hans Kristian Rausing.
"Not long after this,
George Soros Open Society
Foundations attempted to join forces with Rausing' Arcadia Fund to
make JSTOR widely available to the public, and Swartz kept up with these
efforts." - Noam Scheiber
[Noam Scheiber, Truman and Rhodes Scholar with
a master's degree in economics from Oxford University, is a
New York Times writer
and a former senior editor for The New
Republic.]
2011
Analysts are told they can
trace contacts of Americans as long as they cite a foreign intelligence
justification.
The NSA is exploiting huge collections of data to create
sophisticated graphs of Americans social connections to identify associates,
locations at certain times, traveling companions and other pertinent
information.
The agency is authorized to conduct "large-scale graph
analysis on very large sets of communications metadata without having to check
foreignness" of every e-mail address, phone number or other
identifier.
The agency augments the communications data with material
from public, commercial and other sources, including bank codes, insurance
information, Facebook profiles, passenger manifests, voter registration rolls,
GPS location information, as well as property records and unspecified tax data.
There is no restrictions on the use of "enrichment" data, and several
former senior Obama administration officials said the agency drew on it for
both Americans and foreigners.
The Justice Department and the
Pentagon decide it is
permissible to create contact chains using Americans' "metadata," which
includes the timing, location and other details of calls and e-mails.
The agency, citing Smith v. Maryland, 442 US 735,
claims it is not required to seek
warrants from the Foreign Intelligence Surveillance Court.
Smith v. Maryland Does Not Permit Mass
Surveillance
Phone and
e-mail logs allow
analysts to identify associates,
detect movement through time,
acquire affiliations, pick up sensitive information,
calls to Charles,
late-night extramarital partners
or exchanges with a
fellow plotter.
"Metadata can be very revealing.
Knowing the
number someone just dialed or the location of the person's cellphone is going
to allow assembly of a picture of what someone is up to.
It's the
digital equivalent of tailing a suspect." - Orin S. Kerr
The policy - Defense
Supplemental Procedures Governing Communications Metadata Analysis -
was authorized by Defense Secretary Robert M. Gates and
Attorney General Michael B.
Mukasey.
"Sigint Management Directive 424", stated the
Supreme Court ruled
metadata was not constitutionally protected and allowed
collection.
Analysts, using metadata "without regard to the nationality
or location of the communicants" acquire the conversations of foreign
politicians, business figures or activists and anyone else in the
chain.
One of the main tools used for chaining phone numbers and e-mail
addresses has the code name Mainway.
Vast amounts of data flow
daily from fiber-optic cables, corporate partners and foreign computer networks
that have been hacked.
"Better
Person Centric Analysis" describes how the agency looks for 94 "entity
types," including phone numbers, e-mail addresses and IP addresses.
The
NSA correlates 164 "relationship types" to
build social networks and
what the agency calls "community of interest" profiles, using queries like
"travelsWith, hasFather, sentForumMessage, employs."
January
11, 2013 Aaron Swartz is
found dead from hanging in his apartment in New York.
Aaron was
accused of infiltrating
computers for the release of copyrighted academic articles and could have been
sentenced to 35 years in prison.
At 14 Aaron coauthored RSS (Really
Simple Syndication).
"The idea of sharing culture, knowledge and
information was from that very moment present in the actions of the young
Aaron, who combined a great
passion for freedom with
a refined expertise for
the development of collaborative network solutions." - Sérgio Amadeu
da Silveira
The federal indictment states matter-of-factly that "Swartz
intended to distribute a significant portion of JSTOR' archive."
The only real evidence of a motive or plan that prosecutors disclosed
was a document written in July 2008 called the "Guerilla Open Access Manifesto."
Swartz began
that widely reported post by arguing that, "Information is power. But like
all power, there are those who
want to keep it for themselves."
"Cyberspace favors
offensive operations.
These operations will deny, degrade, disrupt, and
deceive an adversary.
Cyberspace offensive operations ensure friendly
freedom of action in cyberspace while denying that same freedom to our
adversaries.
We will enhance our capabilities to conduct electronic
systems attack, electromagnetic systems
interdiction, network attack, and
infrastructure attack operations.
Targets include
the adversary's terrestrial, airborne, and space
networks, electronic
network attack systems, and
the adversary
itself.
As an adversary becomes dependent on cyberspace, offensive
operations have the potential to produce greater effects." -
Air Force Cyber
Command
"CYBERCOM will reach initial operating capability not later
than October 2009 and full operating capability not later than October
2010.
Ostensibly launched to protect military networks against malicious
cyberattacks, CYBERCOM's offensive nature is underlined by its role as
STRATCOM's operational
cyber wing.
In addition to a defensive hardening of the "dot-mil"
domain, the Pentagon plan calls for an offensive capacity, one that will deploy
cyber weapons against the adversaries of
neofeudalism/neoliberism/neoconservatism.
One of ten
Unified Combatant Commands,
STRATCOM is the
successor organization to
Strategic Air Command.
Charged with
military satellites,
information
warfare, strategic
deterrence, global command and
control, intelligence,
surveillance and
reconnaissance, it should be apparent that designating CYBERCOM a STRATCOM
branch all but guarantees an
aggressive posture." -
Tom Burghardt July 1, 2009
|
|
|
This web site is not a commercial web site and
is presented for educational purposes only.
This website defines a
new perspective with which to engage reality to which its author adheres. The
author feels that the falsification of reality outside personal experience has
forged a populace unable to discern propaganda from reality
and that this has been done purposefully by an international corporate cartel
through their agents who wish to foist a corrupt version of reality on the
human race. Religious intolerance occurs when any group refuses to tolerate
religious practices, religious beliefs or persons due to their religious
ideology. This web site marks the founding of a system of philosophy named The
Truth of the Way of the Lumière Infinie - a rational gnostic mystery
religion based on reason which requires no leap of faith, accepts no tithes,
has no supreme leader, no church buildings and in which each and every
individual is encouraged to develop a personal relation with the Creator and
Sustainer through the pursuit of the knowledge of reality in the hope of curing
the spiritual corruption that has enveloped the human spirit. The tenets of the
Truth of the Way of the Lumière Infinie are spelled out in detail on
this web site by the author. Violent acts against individuals due to their
religious beliefs in America is considered a "hate crime."
This web site
in no way condones violence. To the contrary the intent here is to reduce the
violence that is already occurring due to the international corporate cartels
desire to control the human race. The international corporate cartel already
controls the world economic system, corporate media worldwide, the global
industrial military entertainment complex and is responsible for the collapse
of morals, the elevation of self-centered behavior and the destruction of
global ecosystems. Civilization is based on coöperation. Coöperation
does not occur at the point of a
gun.
American social mores and values have declined precipitously
over the last century as the corrupt international cartel has garnered more and
more power. This power rests in the ability to deceive the populace in general
through corporate media by pressing emotional buttons which have been
preprogrammed into the population through prior corporate media psychological
operations. The results have been the destruction of the family and the
destruction of social structures that do not adhere to the corrupt
international elites vision of a perfect world. Through distraction and
coercion the direction of thought of the bulk of the population has been
directed toward solutions proposed by the corrupt international elite that
further consolidates their power and which further their purposes.
All
views and opinions presented on this web site are the views and opinions of
individual human men and women that, through their writings, showed the
capacity for intelligent, reasonable, rational, insightful and unpopular
thought. All factual information presented on this web site is believed to be
true and accurate and is presented as originally presented in print media which
may or may not have originally presented the facts truthfully.
Opinion and thoughts
have been adapted, edited, corrected, redacted, combined, added to, re-edited
and re-corrected as nearly all opinion and thought has been throughout time but
has been done so in the spirit of the original writer with the intent of making
his or her thoughts and opinions clearer and relevant to the reader in the
present time.
Fair Use Notice
This site may contain
copyrighted material the use of which has not always been specifically
authorized by the copyright owner. We are making such material available in our
efforts to advance understanding of criminal justice,
human rights, political,
economic, democratic, scientific, and social justice issues, etc. We believe
this constitutes a 'fair use' of any such copyrighted material as provided for
in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C.
Section 107, the material on this site is distributed without profit to those
who have expressed a prior interest in receiving the included information for
research and educational purposes. For more information see:
www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted
material from this site for purposes of your own that go beyond 'fair use', you
must obtain permission from the copyright owner. |
Copyright
© Lawrence Turner All Rights Reserved |