Proudly Orwellian spooks’ logo may summon Cthulhu, warn alarmed Twitter folk
Some spook agencies like to hide their more ominous workings from the innocent public, protecting Joe Bloggs from thinking too much about the power and influence that can come with snooping on the world. But the US National Reconnaissance Office take a different approach.
Ready for launch? An Atlas 5 will blast off at just past 11PM, PST carrying an classified NRO payload (also cubesats) pic.twitter.com/ll7s0nCOPg
The NRO are totally embracing their menacing Big Brother persona and putting it out there for world+dog to see, having launched a bunch of satellites and a mysterious payload on a spacecraft yesterday – complete with the logo of a creepy octopus sucking the life out of our world.
The National Security Agency is reportedly collecting almost 5 billion cell phone records a day under a program that monitors and analyses highly personal data about the precise whereabouts of individuals, wherever they travel in the world.
Details of the giant database of location-tracking information, and the sophisticated ways in which the NSA uses the data to establish relationships between people, have been revealed by the Washington Post, which cited documents supplied by whistleblower Edward Snowden and intelligence officials.
The National Security Agency has grown in power since the 9-11 terrorist attacks. The secretive spy agency has faced scandals during two successive presidential administrations, first under President George W. Bush, and now under President Barack Obama. But the NSA’s bulk collection of Americans’ metadata began long before that, at the beginning of President Ronald Reagan’s administration. In 1981, Reagan signed Executive Order 12333, which mandates the duties and foreign intelligence collection abilities of the 17 intelligence agencies in the US. The order is the superior authority guiding intelligence operations, including the ability to function outside the confines of a warrant or a court order upon approval of the attorney general. RT’s Ameera David looks at how Executive Order 12333 has changed the face of government spying over the last three decades.
Fisa court judge who authorised massive tapping of metadata was hesitant but felt she could not stand in the way
A secret court order that authorised a massive trawl by the National Security Agency of Americans’ email and internet data was published for the first time on Monday night, among a trove of documents that also revealed a judge’s concern that the NSA “continuously” and “systematically” violated the limits placed on the program.
The order by the Fisa court, almost certainly its first ruling on the controversial program and published only in heavily redacted form, shows that it granted permisson for the trawl in part beacause of the type of devices used for the surveillance. Even the judge approving the spying called it a “novel use” of government authorities.
Another later court order found that what it called “systemic overcollection” had taken place.
“In the walls of the cubicle there were three orifices. To the right of the speakwrite, a small pneumatic tube for written messages, to the left, a larger one for newspapers; and in the side wall, within easy reach of Winston’s arm, a large oblong slit protected by a wire grating. This last was for the disposal of waste paper. Similar slits existed in thousands or tens of thousands throughout the building, not only in every room but at short intervals in every corridor. For some reason they were nicknamed memory holes. When one knew that any document was due for destruction, or even when one saw a scrap of waste paper lying about, it was an automatic action to lift the flap of the nearest memory hole and drop it in, whereupon it would be whirled away on a current of warm air to the enormous furnaces which were hidden somewhere in the recesses of the building.” - From George Orwell’s 1984
As many of you will recall, the protagonist in George Orwell’s classic novel 1984 (sales of the book exploded higher this past June following the Snowden revelations) was a man named Winston Smith who worked for the Ministry of Truth. One of his key functions was to revise old newspaper articles in order to make them consistent with the ever changing propaganda intentions of Big Brother.
Apparently 1984 really was an instruction manual, particularly for the Conservative Tory Party in the UK. Incredibly, not only did it go back and delete ten years of speeches from their website, they have taken the extra step to block their access via the Internet Archive. Compete and total desperation has set in across the pond…
¨The party has removed the archive from its public website, erasing records of speeches and press releases from 2000 until May 2010. The effect will be to remove any speeches and articles during the Tories’ modernisation period, including its commitment to spend the same as a Labour government.
In a remarkable step the party has also blocked access to the Internet Archive’s Wayback Machine, a US-based library that captures webpages for future generations, using a software robot that directs search engines not to access the pages.
The Intellistreets system has finally come to the corridors of Las Vegas. So what is Intellistreets?
On its website, the system is described as “the only wireless information and control network for sustainability, security and entertainment.” Even more amusing, the company that owns the Intellistreets system is rather appropriately called Illuminating Concepts. The best part is that city officials claim “right now our intention is not to have any cameras or recording device.”
This is far from the first time we have learned about the installation of devices that can record audio and video being surreptitiously put in public places. I covered this late last year with regard to how the Department of Homeland Security was using grants to fund the placement of such devices on buses in my piece: Public Buses Adding Microphones to Record Passenger Conversations.
Government documents obtained by Infowars expose massive DHS domestic spy grid designed to track citizens in real time through mega government databases.
Exclusive documents obtained by Infowars from an insider government source have revealed the true origin and nature of the highly secretive ‘mesh network’ spy grid that has garnered massive media attention due to the fact that the network’s strange downtown Seattle spy boxes can track the last 1,000 GPS locations of cellphone users. But as new documents reveal, the grid is far deeper than the media is telling you. The Seattle DHS spy system ultimately ties in with an enormous stealth database that acts as an intelligence hub for all of your personal data.
On page 55 of the “Port Security Video Surveillance System with Wireless Mesh Network” project document that we have obtained, a diagram reveals the system’s basic communication abilities in regards to the Port of Seattle that the DHS has refused to comment on despite funding with millions in taxpayer dollars: Continue reading »
Back in the 1990s, security researchers and privacy watchdogs were alarmed by government demands that hardware and software firms build “backdoors” into their products, the millions of personal computers and cell phones propelling communication flows along the now-quaint “information superhighway.”
Never mind that the same factory-installed kit that allowed secret state agencies to troll through private communications also served as a discrete portal for criminal gangs to loot your bank account or steal your identity.