Pages

Wednesday, December 22, 2010

[MedicalConspiracies] Being surveilled

SMILE;-)))))
Bruce Chesley
Truth is a terrible cross to bear.
Tyranny, like hell, is not easily conquered. - Thomas Paine
The more corrupt the state, the more numerous the laws - Tacitus
Treason for $$$$.  ALL "pro 2A" orgs.
 
 
From: "Jim Welch"

Date: Tue, 21 Dec 2010 19:38:03 -0800

The Stasi were mere pikers compared with the capabilities of the U.S. Government.

Here is an article from Wikepedia.  Go to the link provide so you can link to all the reference sources in the article.

The more I learn about this mass surveillance of America the more I become convinced we can be sure of one thing.  This site you are now reading this on has a very high probability of being monitored, and anyone who receives this information probably has a file compiled on them by our government.  After all, Big Brother would logically follow the e-mail trail to anyone we might communicate with in the assumption "birds of a feather" etc. and hard drives have a lot of room to add data.

Here is part of the Wikepedia article I just read that led me to this conclusion.

Jim Welch

source: http://en.wikipedia.org/wiki/Mass_surveillance

The
Communications Assistance for Law Enforcement Act (CALEA)
requires that all U.S. telecommunications companies modify their equipment to allow easy wiretapping of telephone, VoIP, and broadband internet traffic.[28][29][30]
Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems such as Carnivore, ECHELON, and NarusInsight to intercept and analyze the immense amount of data that traverses the Internet and telephone system every day.[31]
The Total Information Awareness program, of the Information Awareness Office, designed numerous technologies to be used to perform mass surveillance. Examples include advanced speech-to-text programs (so that phone conversations can be monitored en-masse by a computer, instead of requiring human operators to listen to them), social network analysis software to monitor groups of people and their interactions with each other, and "Human identification at a distance" software which allows computers to identify people on surveillance cameras by their facial features and gait (the way they walk). The program was later renamed "Terrorism Information Awareness", after a negative public reaction.
The Electronic Frontier Foundation has an ongoing lawsuit (Hepting v. AT&T) against the telecom giant AT&T for its assistance of the U.S. government in monitoring the communications of millions of American citizens. It has managed thus far to keep the proceedings open. Recently the documents, exposed by a whistleblower who previously worked for AT&T, showing schematics of the massive data mining system were made public.[32][33]
The FBI developed the computer programs "Magic Lantern" and CIPAV, which they can remotely install on a computer system, in order to monitor a person's computer activity.[34]
In 1999 two models of mandatory data retention were suggested for the US: What IP address was assigned to a customer at a specific time. In the second model, "which is closer to what Europe adopted", telephone numbers dialed, contents of Web pages visited, and recipients of e-mail messages must be retained by the ISP for an unspecified amount of time.[35][36]
The Internet Stopping Adults Facilitating the Exploitation of Today's Youth (SAFETY) Act of 2009 also known as H.R. 1076 and S.436 would require providers of "electronic communication or remote computing services" to "retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user."[37]

[edit] Intelligence apparatus to monitor Americans

Since September 2001, a vast domestic intelligence apparatus has been built to collect information using FBI, local police, state homeland security offices and military criminal investigators. The intelligence apparatus collects, analyzes and stores information about thousands of American citizens, many of whom have not been accused of any wrongdoing. Every state and local law enforcement agency is to feed information to federal authorities to support the work of the FBI.<Washington Post, 2010 Dec. 20, "Top Secret America, A Washington Post Investigation: Monitoring America," http://projects.washingtonpost.com/top-secret-america/articles/monitoring-america/</ref>

[edit] Telephones

In early 2006, USA Today reported that several major telephone companies were cooperating illegally with the National Security Agency to monitor the phone records of U.S. citizens, and storing them in a large database known as the NSA call database. This report came on the heels of allegations that the U.S. government had been conducting electronic surveillance of domestic telephone calls without warrants.[38]
Law enforcement and intelligence services in the United States possess technology to remotely activate the microphones in cell phones in order to listen to conversations that take place nearby the person who holds the phone.[39][40]
U.S. federal agents regularly use mobile phones to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone.[41][42]

[edit] Surveillance cameras

Traffic cameras
, which were meant to help enforce traffic laws at intersections, have also sparked some controversy, due to their use by law enforcement agencies for purposes unrelated to traffic violations.[43]
The Department of Homeland Security is funding networks of surveillance cameras in cities and towns as part of its efforts to combat terrorism.[44] In February 2009, Cambridge, MA rejected the cameras due to privacy concerns.[45]

[edit] Data mining

The NSA has been gathering information on financial records, internet surfing habits, and monitoring e-mails. They have also performed extensive surveillance on social networks such as Myspace.[46]
The FBI collected nearly all hotel, airline, rental car, gift shop, and casino records in Las Vegas during the last two weeks of 2003. The FBI requested all electronic data of hundreds of thousands of people based on a very general lead for the Las Vegas New Year's celebration. The Senior VP of The Mirage went on record with PBS' Frontline describing the first time they were requested to help in the mass collection of personal information.[47]

[edit] Infiltration of activist groups

The NYPD infiltrated and compiled dossiers on protest groups (most of whom were doing nothing illegal) before the 2004 Republican National Convention, leading to over 1,800 arrests and subsequent fingerprinting.[48]

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.