background preloader

The NSA's Secret Role in the U.S. Assassination Program

The NSA's Secret Role in the U.S. Assassination Program
Credit: Kirsty Wigglesworth/Associated Press. The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere. His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. “They might have been terrorists,” he says. Related:  NSA

NSA pays tech companies millions to engineer backdoors into encryption protocols (NaturalNews) There is a saying that says, when it comes to government, they've got you coming and going. No truer words are spoken when the subject comes to serial invasions of your privacy. Not only is the National Security Agency monitoring your every electronic communication, but the agency is paying your tech company and Internet service provider to hack you as well. According to Britain's The Guardian newspaper, which broke the story of massive NSA spying earlier this year: U.S. and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. If need be, the use of 'brute force' to break encryption In other words, those little privacy spiels that social media and tech companies put on their sites to "assure you" that your privacy is "guaranteed" - are lies.

Smart Lights: New LEDS Allow NSA To Spy On Your Every Movement Galactic Connection UFO | Ascension | Conspiracy | Spirituality Smart Lights: New LEDS Allow NSA To Spy On Your Every Movement Fri, July 4, 2014 Like this: Like Loading... Related : 2014, Conspiracy, Cabal, and Government, Science and Technology Comments are closed. RSS feed for this post (comments) Previous Post« A “Phone Call” with SaLuSa Next Post‘Right to be forgotten’ is just latest of West’s delusions » Calotropis Theme designed by itx Warning: stripslashes() expects parameter 1 to be string, array given in /home/renoman/public_html/galacticconnection.com/wp-content/plugins/frame-webstore-shopping-cart-toolbar/framewebstore.php on line 79 %d bloggers like this: Snowden leak: NSA plans to infect ‘millions’ of computers (Thanks to Cheryl for a head’s up on potential virus bombardment!-A.M.)Published time: March 12, 2014 17:22 Edited time: March 13, 2014 08:34 The Threat Operations Center inside the National Security Agency (NSA) (AFP Photo) Yet more previously secret surveillance operations waged by the United States National Security Agency were made public Wednesday morning thanks to leaked documents supplied by former NSA contractor Edward Snowden. The files — published first by The Intercept this week and dissected over the course of a 3,000-word article attributed to journalists Glenn Greenwald and Ryan Gallagher — bring to light a number of previously unreported programs undertaken by the secretive US spy agency, including operations that have given the NSA the potential to infect millions of computers around the world by relying on malicious software that’s sent to targets through surreptitious means. NSA presentation from theintercept.com Related

How the NSA's Domestic Spying Program Works The NSA’s domestic spying program, known in official government documents as the “President’s Surveillance Program,” ("The Program") was implemented by President George W. Bush shortly after the attacks on September 11, 2001. The US Government still considers the Program officially classified, but a tremendous amount of information has been exposed by various whistleblowers, admitted to by government officials during Congressional hearings and with public statements, and reported on in investigations by major newspaper across the country. Our NSA Domestic Spying Timeline has a full list of important dates, events, and reports, but we also want to explain—to the extent we understand it—the full scope of the Program and how the government has implemented it. In the weeks after 9/11, President Bush authorized the National Security Agency (NSA) to conduct a range of surveillance activities inside the United States, which had been barred by law and agency policy for decades.

NSA Cyber War Will Use Internet of Things as Weapons Platform; Your Home is the Battlefield Old-Thinker News | January 19, 2015 By Daniel Taylor “World War III is a guerrilla information war with no division between military and civilian participation.” – Marshall McLuhan, Culture is Our Business, 1970 New Snowden documents recently revealed that the NSA is getting ready for future digital wars as the agency postures itself in an aggressive manner towards the world. “The Five Eyes Alliance“, a cooperation between United States, Canada, Britain, Australia, and New Zealand, is working hard to develop these weapons of Cyber Warfare. So called “D” weapons, as reported by Der Spiegel, will paralyze computer networks and infrastructure that they monitor. The Der Spiegel report does not mention the wider issue of the expanding network of everyday objects and appliances that are connected to the internet. Consumer appliances are now becoming activated and “smart.” Think the idea of your appliances spying on you is crazy? Related July 14, 2011 In "Old-Thinker News Reports" October 19, 2014

Domestic Surveillance Techniques - Our Data Collection Program Surveillance Techniques: How Your Data Becomes Our Data In 2001, NSA published the secret "Transition 2001" report defining our strategy for the 21st century. No longer could we simply access analog communications using conventional means, the new digital world of globally-networked encrypted communications required a dramatic change to our surveillance strategy: NSA would need to "live on the network". We've turned our nation's Internet and telecommunications companies into collection partners by installing filters in their facilities, serving them with secret court orders, building back doors into their software and acquiring keys to break their encryption. Our Domestic Intercept Stations NSA technicians have installed intercept stations at key junction points, or switches, throughout the country. View a sample route that internet data traverses from a home in Toronto to the San Francisco Art Institute passing through several NSA intercept stations. Bulk Collection of U.S.

Police Using Biometrics on Americans Without Consent in Unaccountable Database By Aaron Dykes Facial recognition and biometric databases have been a reality in technology for decades, and have been used overseas by the military to assist in occupying potentially hostile populations in places like Iraq and Afghanistan. Populations there not only face the possibility of becoming a statistical civilian casualty, but are processed and tagged like cattle as well. Now, that paradigm is coming home to roost – as spy agencies like the NSA have long planned. Biometrics are designed for use in mass populations here in America and throughout the Western world, not just war-torn locales. According to the NY Times: Facial recognition software, which American military and intelligence agencies used for years in Iraq and Afghanistan to identify potential terrorists, is being eagerly adopted by dozens of police departments around the country to pursue drug dealers, prostitutes and other conventional criminal suspects. The potential for abuse is obvious. The New York Times Mr.

Is The NSA Really Ending Its Mass Surveillance Program? By Joshua Krause Over two years after Edward Snowden blew the whistle on the NSA, the secretive agency is finally making some changes. They’re putting an end to the mass metadata surveillance of telephone communications, due to the implementation of the USA Freedom Act. However, the agency’s surveillance dragnet hasn’t been neutered. Other Critics of the NSA, however, view the USA Freedom Act as an expansion of the NSA’s powers, rather than a hindrance. See Andrew Napolitano’s take on the USA Freedom Act This little device delivers turnkey Internet privacy and security (Ad)

Life in the Electronic Concentration Camp: The Surveillance State Is Alive and Well By John Whitehead “Big Brother in the form of an increasingly powerful government and in an increasingly powerful private sector will pile the records high with reasons why privacy should give way to national security, to law and order […] and the like.” ― William O. Douglas, Supreme Court Justice Bottle up the champagne, pack away the noisemakers, and toss out the party hats. There is no cause for celebration. We have secured no major victories against tyranny. We have achieved no great feat in pushing back against government overreach. For all intents and purposes, the National Security Agency has supposedly ceased its bulk collection of metadata from Americans’ phone calls, but read the fine print: nothing is going to change. You cannot restrain the NSA. You cannot reform the NSA. You cannot put an end to the NSA’s “technotyranny.” It has mastered the art of stealth maneuvers and end-runs around the Constitution. This, of course, is no end at all. That, of course, is the point.

"Skynet" is real, and it could flag you as a terrorist It may not be quite the self-aware computer network that takes over millions of computers and machines, but "Skynet" is real. Documents published by The Intercept, leaked by NSA whistleblower Edward Snowden, confirm that the Skynet program exists -- at least in name only. Its name comes from the intelligent computer defense system in the "Terminator" films, which later destroys most of humanity in a nuclear apocalypse. The National Security Agency program analyzes location and metadata from phone records to detect potentially suspicious patterns, according to the publication. In one example, it was used to identify people that act as couriers between al-Qaeda leadership. (This may have been the program that helped identify Osama bin Laden's courier, leading to his targeted killing in Pakistan by US forces in 2011.) More than 55 million cell records collected from major Pakistani telecom companies were fed into the Skynet system to determine targets of interest, the document said.

Related: