► Show Top 10 Hot Links

Posts Tagged ‘NSA’

Why Did NSA Surveillance Fail To Stop Nidal Hasan? Because MUSLIMS are exempt from scrutiny!

by 1389AD ( 94 Comments › )
Filed under government, Islamic Terrorism, Leftist-Islamic Alliance, Multiculturalism, Political Correctness at June 17th, 2013 - 9:25 am

Blame political correct multiculturalism – and the Muslim Brotherhood moles who have thoroughly infested the federal government. NSA dragnet surveillance wouldn’t have stopped 9-11-01 either. Before the attack, clues were abundant and readily available, but nobody acted upon them. Remember the “failure to connect the dots”?

On YouTube:

Published on Jun 14, 2013 by yazchat
Fort Hood attacker had online terror ties.
Fox News: America’s Newsroom
http://www.foxnews.com/on-air/americas-newsroom/index.html
Fox News Insider: The Official Live Blog of Fox News Channel
http://foxnewsinsider.com/
Fox News Live Wall Chat
http://foxnewsinsider.com/live-wall/
Fox News Tweets
https://twitter.com/FoxNews
Fox News
http://www.foxnews.com/

Don’t surf the web in the nude!

by 1389AD ( 80 Comments › )
Filed under Barack Obama, government at June 14th, 2013 - 9:00 am

PJM: Your computer is bugging your house

Homer Simpson naked and terrified in Treehouse of Horror III

The computer you are sitting at right now probably has a microphone. It probably also has a camera looking at you this moment. Is it sending sound and pictures from inside your house to the PRISM program at NSA?

Who knows? But one thing is for sure — the technology is sitting there, on your desk. Welcome to Winston’s world.

Yesterday we crossed a line. What once seemed kooky is now happening. I figured this would be a fight for a future generation, but it is ours. The frightening future has arrived.
[…]
But no war, no threat, no nothing justifies the National Security Agency obtaining a direct pipeline to the Skype chats of every American. What possible justification is there for the government watching granddad talk to his grandkids in real time back in Laurel, Maryland?
More here.

Think it can’t happen? It already has.

Obama with huge ears: 'As for the Verizon records...It's not like we're listening in or anything'

John Sexton on Breitbart asks: What if it is not just metadata the NSA is collecting?

The claim being made in public right now is that the NSA used section 215 of the Patriot Act to collect metadata on phone calls. However there is some evidence that the NSA is actually recording the content of phone calls.

Last week I published a clip of actor Shia LaBeouf claiming, on the Jay Leno show, that an FBI consultant on the movie Eagle Eye had played him a 2 year old clip of a private phone conversation. I noted at the time that this claim had to be taken with a grain of salt given that LaBeouf was on TV to promote a film about government monitoring of communications. But given that secret information sometimes leaks to Hollywood before the rest of us, it seemed worth mentioning.

But LaBeouf is not the only person who has made this claim about the NSA having access to private calls. Just last month former FBI counter-terrorism expert Tim Clemente appeared on the Erin Burnett show on CNN to discuss the Boston marathon bombing. The discussion turned to the possibility of charges against Tsarnaev’s wife. Burnett wondered if it would be possible to prove complicity given that there would be no way to know what they talked about on the phone. Here’s the exchange (audio is faint so you may need to turn it up)…
More here.

But that’s not all.

Even the most innocent, commonplace snapshots that you take with your smartphone can contain metadata that reveals personal information about your family.

“Smart appliances” including electrical meters, automotive systems such as OnStar, and other devices with embedded computers can be used to collect and extract information about your activities.

How about making sure that the politically disfavored classes will freeze in the dark? Bureaucrat-controlled thermostats are on the way.

Nakedsecurity urges computer users to log out of their profiles when finished with their activities. And don’t have the computer store your passwords. If you’re afraid you’ll forget a password and lock yourself out, you can always write your passwords on a piece of paper and lock it up in a safe that you own.

Then there’s Google Glass (h/t: Gramfan). Dry Bones shows how the device will work in the real world. Just what we need, another tool for cyberstalkers and government snoops!

Dry Bones takes on Google Glass

Nudists beware: Spy drones can see what you’re wearing (or not wearing) from 17500 feet.

Living in a rural area won’t keep you safe from totalitarian spying. Twitchy has the story on that:

Room for one more scandal? Senators probe EPA’s leak of farmers’ personal info

Having so many different Obama administration scandals demanding the public’s attention all at once almost works in the administration’s favor; before the full implications of one scandal sink in, another one erupts. While the NSA has managed to bump the IRS from the headlines this week, it’s worth noting that the Environmental Protection Agency is busy doing its part to erode what’s left of the public’s trust in the government.

The Free Beacon reported this week that 24 senators signed a letter demanding to know why the EPA leaked the personal information of more than 80,000 farms, includes names, phone numbers and personal addresses, to left-wing environmental groups like Earth Justice, the Pew Charitable Trust and the Natural Resources Defense Council. Ten states caught sending the personal data recalled it for redaction and then resent it; Montana and Nebraska, however, ended up mistakenly resending the personal information.

Much more here.

The Conversation Prism - 2010
The Conversation Prism (2010 version) by Brian Solis and JESS3:
The grabbermint is watching and collecting it all

We stay tuned.

NSA’s Data-Mining program Prism

by Phantom Ace ( 93 Comments › )
Filed under Barack Obama, Communism, Democratic Party, Fascism, Liberal Fascism, Progressives, Socialism, Tranzis at June 7th, 2013 - 7:00 am

prism

As news continues to break about the NSA keeping everyone’s cell phone records, it turns out that was the tip of the Iceberg. The NSA has a Data-Mining program called PRISM that collects everything a person does online. It gathers data from every ISP or Social media server and stores them. This clearly goes beyond anti-terror efforts and its actually quite scary what is going.

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track one target or trace a whole network of associates, according to a top-secret document obtained by The Washington Post.

The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.

Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.”

PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority.

[….]

That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.

The technology companies, which knowingly participate in PRISM operations, include most of the dominant global players of Silicon Valley, according to the document. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war.

This information was gathered for Data-Mining and I have a theory. The Obama Regime used the data collected and gave it to OFA help with their re-election. If the data was really used for anti-terrorism, then how come Major Hassan or the Tsarnaev Brothers were not caught. I am convince that PRISM and the IRS audits of Right leaning groups are interconnected and was where OFA got their information.

I am just speculating, so do not take my theory as gospel. Reagrdless, this amount of Government Data-Mining should be chilling to any American.

Obama Regime plans more online snooping

by Phantom Ace ( 6 Comments › )
Filed under Fascism, Liberal Fascism, Progressives, Special Report at March 22nd, 2013 - 9:30 am

cybersecurity

Seeing what OFA was able to accomplish through data mining, I would not be surprise if it was the blueprint for something more sinister. Well something more sinister is being done. Under the pretext of fighting Cyber attacks, the Obama regime has issued an executive order the NSA will begin monitoring emails and web traffic from defense and financial institutions.

The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of the country’s private, civilian-run infrastructure.

As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Web surfing scanned as a precaution against cyber attacks.

Under last month’s White House executive order on cybersecurity, the scans will be driven by classified information provided by U.S. intelligence agencies — including data from the National Security Agency (NSA) — on new or especially serious espionage threats and other hacking attempts. U.S. spy chiefs said on March 12 that cyber attacks have supplanted terrorism as the top threat to the country.

The Department of Homeland Security will gather the secret data and pass it to a small group of telecommunication companies and cyber security providers that have employees holding security clearances, government and industry officials said. Those companies will then offer to process email and other Internet transmissions for critical infrastructure customers that choose to participate in the program.

[….]

The issue of scanning everything headed to a utility or a bank still has civil liberties implications, even if each company is a voluntary participant.

Lee Tien, a senior staff attorney with the nonprofit Electronic Frontier Foundation, said that the executive order did not weaken existing privacy laws, but any time a machine acting on classified information is processing private communications, it raises questions about the possibility of secret extra functions that are unlikely to be answered definitively.

“You have to wonder what else that box does,” Tien said.

This is the police state the Left once derided against.