NSA Insider: You Are the Target: “They’re Pulling Together All the Data About Virtually Every U.S. Citizen in the Country”

Few Americans would believe that the government has the technological capability and wherewithal to monitor, track, log, and analyze the everyday activities of American citizens. The idea that the National Security Agency, an organization responsible the collection and analysis of foreign communications and foreign signals intelligenc, would operate on US soil to turn the surveillance apparatus on the people they are tasked with protecting has up until now been reserved for conspiracy theorists and Hollywood movies.

It turns out that it’s not a conspiracy, and not only does the NSA operate within the borders of the United States, they are assembling detailed dossiers on every single one of us. William Binney, an NSA whistleblower who recently resigned his post at the NSA over its illegal domestic surveillance programs, notes that the agency is engaged in implementing a total surveillance net over America with the help of private businesses like internet and telecom companies – and their target is YOU.

“Domestically, they’re pulling together all the data about virtually every U.S. citizen in the country and assembling that information, building communities that you have relationships with, and knowledge about you; what your activities are; what you’re doing.

So the government is accumulating that kind of information about every individual person and it’s a very dangerous process.

…from one company alone… they were sending, according to my estimate… I reckon there were between 10 and 12 [companies] that were participating… that one company was providing 320 million average logs per day since 2001.”

Everything You Do Is Monitored. The NSA’s technological capabilities far surpass anything that has ever existed. Not only is the NSA now building a massive surveillance facility in Utah capable of monitoring and logging multiple yottabytes (1 Trillion Terabytes of information) of data like emails, cell phone communications, text messages, shopping records and social network interactions, there are over fifty fusion centers across the United States where data is processed on a local or regional level

Full Article Here

Advertisement

The Insects Are Watching: The Future of Government Surveillance Technology

In June of 2011, the US military admitted to having drone technology so sophisticated that it could be the size of a bug.

In what is referred to as the “microaviary” on Wright-Patterson Air Force Base, drones are in development and design to replicate the flight patterns of moths, hawks and other air-borne creatures of the natural world.

Greg Parker, aerospace engineer, explains: “We’re looking at how you hide in plain sight” for the purpose of carrying out espionage or kill missions.

Cessna-sized Predator drones, used to carry out unmanned attacks, are known around the world. The US Pentagon has an estimated 7,000 aerial drones in their arsenal.

In 2011, the Pentagon requested $5 billion for drones from Congress by the year 2030.

Their investigative technology is now moving toward “spy flies” equipped with sensors and mircocameras to detect enemies and nuclear weapons.

Read Full Story Here

Homeland Security Manual Lists Government Key Words For Monitoring Social Media

Ever complain on Facebook that you were feeling “sick?” Told your friends to “watch” a certain TV show? Left a comment on a media website about government “pork?”

If you did any of those things, or tweeted about your recent vacation in “Mexico” or a shopping trip to “Target,” the Department of Homeland Security may have noticed.

In the latest revelation of how the federal government is monitoring social media and online news outlets, the Electronic Privacy Information Center has posted online a 2011 Department of Homeland Security manual that includes hundreds of key words (such as those above) and search terms used to detect possible terrorism, unfolding natural disasters and public health threats. The center, a privacy watchdog group, filed a Freedom of Information Act request and then sued to obtain the release of the documents.

The 39-page “Analyst’s Desktop Binder” used by the department’s National Operations Center includes no-brainer words like “”attack,” “epidemic” and “Al Qaeda” (with various spellings). But the list also includes words that can be interpreted as either menacing or innocent depending on the context, such as “exercise,” “drill,” “wave,” “initiative,” “relief” and “organization.”

Read more Here