Skip to content

Americans Buying the Brooklyn Bridge on NSA, FBI “Protecting” Them

The NSA is only collecting “metadata,” they are only collecting phone call “records.” They aren’t “listening in on you,” etc., etc., etc.

Just repeat that as many times as you can, just as your heavenly Rulers and their media stenographers want you to. But, as those with more than a 2-second attention span have already known for years, yes, they are listening in on you. They are reading your emails. And they are up to no good. If you want to believe otherwise, you are just very naive, and perhaps ignorant of history.

As an NSA whistleblower revealed during the Bush administration years, according to an ABC News story,

Faulk says he and others in his section of the NSA facility at Fort Gordon routinely shared salacious or tantalizing phone calls that had been intercepted, alerting office mates to certain time codes of “cuts” that were available on each operator’s computer.

“Hey, check this out,” Faulk says he would be told, “there’s good phone sex or there’s some pillow talk, pull up this call, it’s really funny, go check it out. It would be some colonel making pillow talk and we would say, ‘Wow, this was crazy’,” Faulk told ABC News.

And more recently Dan Froomkin of The Intercept detailed how the NSA and other agencies can use speech-to-text technology to transcribe content of phone calls to readable, searchable text.

Experts in speech recognition say that in the last decade or so, the pace of technological improvement has been explosive. As information storage became cheaper and more efficient, technology companies were able to store massive amounts of voice data on their servers, allowing them to continually update and improve the models. Enormous processors, tuned as “deep neural networks” that detect patterns like human brains do, produce much cleaner transcripts.

Voice communications can be collected by the NSA whether they are being sent by regular phone lines, over cellular networks, or through voice-over-internet services. Previously released documents from the Snowden archive describe enormous efforts by the NSA during the last decade to get access to voice-over-internet content like Skype calls, for instance. And other documents in the archive chronicle the agency’s adjustment to the fact that an increasingly large percentage of conversations, even those that start as landline or mobile calls, end up as digitized packets flying through the same fiber-optic cables that the NSA taps so effectively for other data and voice communications.

So yes, they can and are listening in on phone calls as well as recording them for storage, and reading emails too, according to this CNET article:

Documents that came to light in a different EFF lawsuit provide some insight into how the spy agency vacuums up data from telecommunications companies. Mark Klein, who worked as an AT&T technician for over 22 years, disclosed in 2006 (PDF) that he witnessed domestic voice and Internet traffic being surreptitiously “diverted” through a “splitter cabinet” to secure room 641A in one of the company’s San Francisco facilities. The room was accessible only to NSA-cleared technicians.

AT&T and other telecommunications companies that allow the NSA to tap into their fiber links receive absolute immunity from civil liability or criminal prosecution, thanks to a law that Congress enacted in 2008 and renewed in 2012. It’s a series of amendments to the Foreign Intelligence Surveillance Act, also known as the FISA Amendments Act.

In fact, as Glenn Greenwald detailed here, with XKeyscore the NSA collects “nearly everything a user does on the Internet.”

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

And we also know that they have infiltrated game services such as Xbox Live, and not only eavesdropping on gamers’ chats, but intentionally intervening and recruiting informants. The Guardian notes,

If properly exploited, games could produce vast amounts of intelligence, according to the NSA document. They could be used as a window for hacking attacks, to build pictures of people’s social networks through “buddylists and interaction”, to make approaches by undercover agents, and to obtain target identifiers (such as profile photos), geolocation, and collection of communications.

Given that gaming consoles often include voice headsets, video cameras, and other identifiers, the potential for joining together biometric information with activities was also an exciting one.

But the documents contain no indication that the surveillance ever foiled any terrorist plots, nor is there any clear evidence that terror groups were using the virtual communities to communicate as the intelligence agencies predicted.

And this other article by Greenwald details how the U.K.’s NSA equivalent, GCHQ, infiltrates the Internet to manipulate, deceive and destroy reputations, having absolutely nothing to do with terrorism. The article notes that the GCHQ introduced these schemes to the NSA.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Now that the Obama DHS has the power to exploit any “emergency” as an excuse to seize control over private phone and Internet systems, we can trust the government to keep us safe, can’t we?

The truth is, this is all about control.

The TSA is a further example of how it is all about control and power-wielding and having nothing to do with preventing terrorism or protecting the people. The TSA has even most recently shown just how utterly useless they are in thwarting terrorists attacks, when TSA agents couldn’t detect prohibited items 95% of the time in a recent covert test.

The real reason for TSA criminal molesting, raping and radiation-emitting porno-scanners is for “security theater,” and to remind the people of how subservient they must be to the State. And, as Naomi Wolf wrote in the Guardian, the U.S. government and other totalitarian regimes use sexual humiliation as a political tool to control the people.

So, the TSA is not for “transportation security” — it is a bunch of sickos getting off on sexually molesting innocent people, while acting on behalf of the Regime’s power lusts.

And neither is the DHS about “homeland security,” nor the NSA about “national security.”

The truth is, it is ultimately about suppressing political dissent, and to enable the gangsters and hoodlums of society to legally commit crimes against others, including blackmail, theft and worse, and get away with it.

As Washington’s Blog pointed out, and in a follow-up, the NSA already has been blackmailing top government officials. So, of course they can blackmail you if they want to.

I’m sure that those readers from the Soviet Union know exactly what I’m talking about.

And Rand Paul says we should hire 1,000 more FBI agents? No, Rand, fire ALL the existing FBI agents and abolish that agency along with all the aforementioned, as FBI is just as useless and dangerous as those other agencies.

You see, for those who think that getting rid of these agencies is crazy, that is because millions of people have been bamboozled into believing the propaganda which promotes the national security state. This is the same FBI that intentionally infiltrates Muslim mosques and purposely motivates young Muslim males to want to commit “jihad” against America, and the FBI provides all the materials and sets the patsies up, just to say that they thwarted an attack (that they the FBI themselves concocted!). Only government bureaucrats think this way. And only totalitarians do these crazy things.

But regarding the blackmail, as investigative intelligence journalist Ronald Kessler wrote, citing a typical example in corrupt gangster Washington, involving the early FBI Reichsführer J. Edgar Hoover,

“The moment [Hoover] would get something on a senator,” said William Sullivan, who became the number three official in the bureau under Hoover, “he’d send one of the errand boys up and advise the senator that ‘we’re in the course of an investigation, and we by chance happened to come up with this data on your daughter. But we wanted you to know this. We realize you’d want to know it.’ Well, Jesus, what does that tell the senator? From that time on, the senator’s right in his pocket.”

While the Washington warmongers continue to provoke foreigners with their wars, interventions, invasions and occupations — all unconstitutional and immoral, of course — they are hysterically fear mongering to bamboozle the public into accepting continuation of growing police state totalitarianism in Amerika.

After all, as Jacob Hornberger has pointed out several times, the Islamic terrorists aren’t bombing and attacking Switzerland and the Swiss people. That is because the Swiss don’t start wars of aggression against these Muslim countries, the Swiss don’t send drones over to bomb the Muslims and murder their innocent civilians. And the Swiss aren’t sending their military to invade and occupy Iraq or Afghanistan, or setting up Swiss military bases in Saudi Arabia or Kuwait.

The real answer to our national security is to stop all the wars of aggression, invasions, interventions and occupations, stop provoking foreigners to want to attack Americans, abroad and in America. Yes, that is what actually will make us safer: our bureaucrats ending their criminal invasions and trespasses overseas, not turning America into Nazi Germany and the Soviet Union.

Published inUncategorized