PDA

View Full Version : What's the deal with the NSA spying scandal?



vacuum
6th June 2013, 09:12 PM
Did they preemptively release the top secret document to get all this out in the open right now? Therefore, any further developments are "old news" and any new insane laws are "normal".

I feel ill from all these stories, but I'm wondering if that's the goal?


Maybe these slides were carefully crafted to basically reveal the truth in a careful and somewhat diluted manner, so that like a live vaccine resistance by the public is built up to it. Maybe this is part of the lead up to the Bilderberg meeting where they'll basically tell all the companies what the new direction is, and this news is probably directly laying the foundation for those discussions. No single company or group can then resist these new instructions, because "everyone's doing it". The CEOs at the meeting will then meet little resistance when the orders come down on the vice presidents and senior executives.

Maybe this whole powerpoint presentation isn't even what currently is, but it simply makes everyone think it's already totally done so that it becomes a self-fulfilling prophesy.

It just seems suspicious that there's a huge media blitz about this.


NSA, FBI secretly mining data from Internet firms...
'THEY QUITE LITERALLY CAN WATCH YOUR IDEAS AS YOU TYPE'... (http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_print.html)
Top secret PRISM program... (http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data)
MICROSOFTYAHOOGOOGLEYOUTUBEFACEBOOKSKYPEAPPLE... (http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data)
Obama administration collecting phone records of millions daily... (http://www.nytimes.com/2013/06/06/us/us-secretly-collecting-logs-of-business-calls.html?hp&_r=0)
Secret court order requires VERIZON to hand over ALL CALL DATA... (http://apnews.myway.com/article/20130606/DA6O4MG03.html)
White House: Critical tool against 'terrorist threats'... (http://www.guardian.co.uk/world/2013/jun/06/obama-administration-nsa-verizon-records)
Specifically targeted Americans, not foreigners... (http://www.forbes.com/sites/andygreenberg/2013/06/05/nsas-verizon-spying-order-specifically-targeted-americans-not-foreigners/)
'Homeland Security': Laptops, phones can be searched based on hunches... (http://washington.cbslocal.com/2013/06/05/dept-of-homeland-security-laptops-phones-can-be-searched-based-on-hunches)
NSA SEES ALL: Phone Sex, Banks, Emails... (http://www.theatlanticwire.com/politics/2013/06/nsa-spying-verizon-analysis/65963/)
CIA: We'll Spy on You Through Your Dishwasher... (http://www.wired.com/dangerroom/2012/03/petraeus-tv-remote/)
'1984' Published 64 Years Ago Today... (http://www.nationaljournal.com/tech/how-outraged-should-you-be-about-the-nsa-grabbing-your-phone-logs-20130606)

https://image.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/6/1370554726437/PRISM-slide-crop-001.jpg
THE INTERNET FROM HELL (http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data)

JohnQPublic
6th June 2013, 09:16 PM
The secret battle is breaking out into the open more and more...

vacuum
6th June 2013, 10:09 PM
Question: What's the best way to get hundreds of corporations, lawmakers, and the public to go along with the NSA having backdoor access to all large corporations internal data?

Answer: Make them think it's already done, totally finished, and has been running for years.


I personally think the idea here is to make everyone think it's already done and rolled out so that they can actually implement it and roll it out with complete cooperation of everyone.

Jewboo
6th June 2013, 10:16 PM
It just seems suspicious that there's a huge media blitz about this.



http://www.thebureauinvestigates.com/wp-content/uploads/2011/07/journalism-400x400.jpg
No "reporter" exposed this. This is being fed.

Jewboo
6th June 2013, 10:22 PM
http://www.infiniteunknown.net/wp-content/uploads/2011/01/NSA-Cyber-Security-Center.jpg

WHAT THE FUCK DID EVERYONE EXPECT THEM TO BE DOING HERE? (http://nsa.gov1.info/utah-data-center/)

:rolleyes: 2 billion-dollar one million square-foot new data facility in Utah

Horn
7th June 2013, 12:51 AM
USA NSA

Doc Holliday: It appears my hypocrisy knows no bounds.

madfranks
7th June 2013, 07:16 AM
http://www.infiniteunknown.net/wp-content/uploads/2011/01/NSA-Cyber-Security-Center.jpg

WHAT THE FUCK DID EVERYONE EXPECT THEM TO BE DOING HERE? (http://nsa.gov1.info/utah-data-center/)

:rolleyes: 2 billion-dollar one million square-foot new data facility in Utah

Holy shit, this is some of the scariest stuff I've seen in a long time!

http://nsa.gov1.info/data/collect-citizen-data.jpg


Your Data: If You Have Nothing to Hide, You Have Nothing to Fear

Our value is founded on a unique and deep understanding of risks, vulnerabilities, mitigations, and threats. Domestic Surveillance plays a vital role in our national security by maintaining a total information awareness of all domestic activities by using advanced data mining systems to "connect the dots" to identify suspicious patterns.

Why We Collect Your Data

Under the authority of Homeland Security Presidential Directive 6, which defines the integration and use of screening information to protect against terrorism, the NSA is authorized to collect and disseminate information about suspected foreign and domestic terrorists. In the past, this meant gathering information AFTER a target had been identified. This often led to missed intelligence and lost opportunities.

Horn
7th June 2013, 07:37 AM
Holy shit, this is some of the scariest stuff I've seen in a long time!


You've no other option but to worship the the Sun, and send solar flares knocking out skynet.


http://www.youtube.com/watch?v=uuAWWogyByY

madfranks
7th June 2013, 07:45 AM
Good Lord!


What if the mere act of collecting information could result in the identification of new targets? What if we could build a national data warehouse containing all available information about every person in the United States? Under the authority of the classified Homeland Security Directive 15 (U.S. Strategy and Policy in the War on Terror), we can.

General of Darkness
7th June 2013, 07:49 AM
Come one guys we were talking about AMDOCS and other companies for over a decade.

Remember this.


http://www.youtube.com/watch?v=JWpWc_suPWo

All US Phone Call Records
And Billing Done In Israel - Part 2
Carl Cameron Investigates FoxNews.com 12-13-1



BRIT HUME, HOST: Last time we reported on the approximately 60 Israelis who had been detained in connection with the Sept. 11 terrorism investigation. Carl Cameron reported that U.S. investigators suspect that some of these Israelis were spying on Arabs in this country, and may have turned up information on the planned terrorist attacks back in September that was not passed on. Tonight, in the second of four reports on spying by Israelis in the U.S., we learn about an Israeli-based private communications company, for whom a half-dozen of those 60 detained suspects worked. American investigators fear information generated by this firm may have fallen into the wrong hands and had the effect of impeded the Sept. 11 terror inquiry. Here's Carl Cameron's second report. (BEGIN VIDEOTAPE) CARL CAMERON, FOX NEWS CORRESPONDENT (voice-over): Fox News has learned that some American terrorist investigators fear certain suspects in the Sept. 11 attacks may have managed to stay ahead of them, by knowing who and when investigators are calling on the telephone. How? By obtaining and analyzing data that's generated every time someone in the U.S. makes a call. UNIDENTIFIED FEMALE: What city and state, please? CAMERON: Here's how the system works. Most directory assistance calls, and virtually all call records and billing in the U.S. are done for the phone companies by Amdocs Ltd., an Israeli-based private elecommunications company. Amdocs has contracts with the 25 biggest phone companies in America, and more worldwide. The White House and other secure government phone lines are protected, but it is virtually impossible to make a call on normal phones without generating an Amdocs record of it. In recent years, the FBI and other government agencies have investigated Amdocs more than once. The firm has repeatedly and adamantly denied any security breaches or wrongdoing. But sources tell Fox News that in 1999, the super secret national security agency, headquartered in northern Maryland, issued what's called a Top Secret sensitive compartmentalized information report, TS/SCI, warning that records of calls in the United States were getting into foreign hands - in Israel, in particular. Investigators don't believe calls are being listened to, but the data about who is calling whom and when is plenty valuable in itself. An internal Amdocs memo to senior company executives suggests just how Amdocs generated call records could be used. "Widespread data mining techniques and algorithms.... combining both the properties of the customer (e.g., credit rating) and properties of the specific 'behavior.'" Specific behavior, such as who the customers are calling. The Amdocs memo says the system should be used to prevent phone fraud. But U.S. counterintelligence analysts say it could also be used to spy through the phone system. Fox News has learned that the N.S.A has held numerous classified conferences to warn the F.B.I. and C.I.A. how Amdocs records could be used. At one NSA briefing, a diagram by the Argon national lab was used to show that if the phone records are not secure, major security breaches are possible. Another briefing document said, "It has become increasingly apparent that systems and networks are vulnerable.Such crimes always involve unauthorized persons, or persons who exceed their authorization...citing on exploitable vulnerabilities." Those vulnerabilities are growing, because according to another briefing, the U.S. relies too much on foreign companies like Amdocs for high-tech equipment and software. "Many factors have led to increased dependence on code developed overseas.... We buy rather than train or develop solutions." U.S. intelligence does not believe the Israeli government is involved in a misuse of information, and Amdocs insists that its data is secure. What U.S. government officials are worried about, however, is the possibility that Amdocs data could get into the wrong hands, particularly organized crime. And that would not be the first thing that such a thing has happened. Fox News has documents of a 1997 drug trafficking case in Los Angeles, in which telephone information, the type that Amdocs collects, was used to "completely compromise the communications of the FBI, the Secret Service, the DEO and the LAPD." We'll have that and a lot more in the days ahead - Brit. HUME: Carl, I want to take you back to your report last night on those 60 Israelis who were detained in the anti-terror investigation, and the suspicion that some investigators have that they may have picked up information on the 9/11 attacks ahead of time and not passed it on. There was a report, you'll recall, that the Mossad, the Israeli intelligence agency, did indeed send representatives to the U.S. to warn, just before 9/11, that a major terrorist attack was imminent. How does that leave room for the lack of a warning? CAMERON: I remember the report, Brit. We did it first internationally right here on your show on the 14th. What investigators are saying is that that warning from the Mossad was nonspecific and general, and they believe that it may have had something to do with the desire to protect what are called sources and methods in the intelligence community. The suspicion being, perhaps those sources and methods were taking place right here in the United States. The question came up in select intelligence committee on Capitol Hill today. They intend to look into what we reported last night, and specifically that possibility - Brit. HUME: So in other words, the problem wasn't lack of a warning, the problem was lack of useful details? CAMERON: Quantity of information. HUME: All right, Carl, thank you very much.

EE_
7th June 2013, 07:50 AM
You've no other option but to worship the the Sun, and send solar flares knocking out skynet.

http://www.theparentsanctuary.net/forums/images/smilies/old/praying.gif

General of Darkness
7th June 2013, 07:54 AM
Who the fuck do you think is pushing this and then SELLING the gear.


http://www.youtube.com/watch?v=JhS6B9U13aY

From their Skelators own mouth.


http://www.youtube.com/watch?v=roQKZA4GTD4

PROBLEM-REACTION-SOLUTION

Horn
7th June 2013, 09:21 AM
Who the fuck do you think is pushing this and then SELLING the gear.

Check these articles on the Near East's State Dept. Page.


American Jewish Committee Global Forum
Secretary Kerry (June 3): "The President of the U.S. and I share your unshakeable commitment to Israel’s security. … Central to Israel's founding is the belief that this State and the Jewish people must be able to control their own destiny." Full Text» (http://www.state.gov/secretary/remarks/2013/210236.htm)

London Eleven Plenary Meeting
Secretary Kerry (May 22): "The 11 of us are here because our countries have a profound stake in the serious crisis that is affecting the Syrian people, an equally great interest in a peaceful, prosperous Syria that we hope will soon be able to emerge again." Full Text» (http://www.state.gov/secretary/remarks/2013/05/209822.htm) More» (http://www.state.gov/r/pa/prs/ps/2013/05/209820.htm) Trip Page» (http://www.state.gov/secretary/travel/2013/t7/index.htm)


U.S. Policy Toward Iran
Under Secretary Sherman (May 15): "I want to use this opportunity to speak clearly about these challenges; to lay out the multi-vectored strategy we are pursuing to counter them; and to be clear about the consequential choices ahead for America and our allies." Full Text» (http://www.state.gov/p/us/rm/2013/202684.htm)


-http://www.state.gov/p/nea/

Ps. My headphones went off with that strange clicking noise when I had the page up, so I quoted the links here...

Jewboo
7th June 2013, 09:33 AM
Holy shit, this is some of the scariest stuff I've seen in a long time!



http://nsa.gov1.info/index_files/header.jpg

Click on their LINK (http://nsa.gov1.info/utah-data-center/) and the heading clearly says "Domestic Surveillance Directorate".

They didn't even attempt to suggest that it was only for foreign snooping. As in our face as it gets.




http://th250.photobucket.com/albums/gg274/orijonl/th_patriot_emoticon_flag_waving_sm_clr.gif DOMESTIC SURVEILLANCE

Horn
7th June 2013, 09:43 AM
http://nsa.gov1.info/index_files/header.jpg


Check the background Franks', its the battle ground I was speaking of in my Ozzfest post...

How you gonna reach out there, and touch that, Fantasize on flying a Sukhoi?

gunDriller
7th June 2013, 09:47 AM
http://www.whatsomewouldcalllies.com/thefinger/1.gif

http://4.bp.blogspot.com/_KcilgSnqTO8/SpDE4mNv-4I/AAAAAAAAzik/dfenBaOq3NY/s400/kid-flipping-bird.jpg

http://uncivilpeasants.files.wordpress.com/2012/11/kid-flipping-the-bird.png

do our darling legislators have a special category for people flipping them the bird ?

Jewboo
8th June 2013, 05:02 PM
Boundless Informant (http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining)

gunDriller
8th June 2013, 05:21 PM
is there a program you can use to see if a key-stroke logger has been put on your home computer ?

or any of the NSA-FBI-Mossad Bullshit-ware.

to protect against any of it, to detect it, to quarantine it.


if possible, to 'watch' it work, perhaps. it would be cool to make a Camtasia screen capture of a system diagnostic, of a home system that is being surveil'ed, especially if you can find the home port of the people trying to surveil your computer.

catch the Peeping Tom's at work.

PatColo
9th June 2013, 12:10 AM
http://www.infiniteunknown.net/wp-content/uploads/2011/01/NSA-Cyber-Security-Center.jpg

WHAT THE FUCK DID EVERYONE EXPECT THEM TO BE DOING HERE? (http://nsa.gov1.info/utah-data-center/)

:rolleyes: 2 billion-dollar one million square-foot new data facility in Utah

Story made 'local' (SLC UT) newscast a few years ago,

Israeli Terrorist Spying On NSA In Utah Posing As Art Students (http://www.youtube.com/watch?v=NSZaDEspq-M)
http://www.youtube.com/watch?v=NSZaDEspq-M

I never completely 'got' the whole israeli door-to-door "art student" (spy) phenom, as well as their "mall kiosk" thing in shopping malls across the country selling various trinkets. I don't understand how these "fronts" are such effective venues for spying... like, what kind of valuable intel are they gathering? Anyone?

JohnQPublic
9th June 2013, 08:32 AM
NSA, the secret AT&T spy room, 2 Israeli companies, and loss of American privacy (http://jonrappoport.wordpress.com/2013/06/09/nsa-the-secret-att-spy-room-and-2-israeli-companies/)


"...“So what would happen would be the communications on the cables would come into the building, and then the cable would go to this thing called a splitter box, which was a box that had something that was similar to a prism, a glass prism.

“And the prism was shaped like a prism, and the light signals would come in, and they’d be split by the prism. And one copy of the light signal would go off to where it was supposed to be going in the telecom system, and the other half, this new cloned copy of the cables, would actually go one floor below to NSA’s secret room. .."

"...In James Bamford’s 2008 interview, he mentions two Israeli companies, Narus and Verint, that almost nobody knew about. They played a key role in developing and selling the technology that allowed NSA to deploy its PRISM spying program..."

gunDriller
9th June 2013, 10:07 AM
I never completely 'got' the whole israeli door-to-door "art student" (spy) phenom, as well as their "mall kiosk" thing in shopping malls across the country selling various trinkets. I don't understand how these "fronts" are such effective venues for spying... like, what kind of valuable intel are they gathering? Anyone?


they do seem to be fixated on the 'art student' theme.

"hey you there, why are you painting that nuclear reactor ?"

"don't mind me, i'm just an Israeli art student. how do you like my drawing of the nuclear reactor with the Star of David on it ?"

PatColo
9th June 2013, 04:18 PM
http://www.youtube.com/watch?v=cThHtnvPVis"don't mind me, i'm just an Israeli art student. how do you like my drawing of the nuclear reactor with the Star of David on it ?"

reminds me of Shlomo's Simon's drawrings,

http://www.youtube.com/watch?v=cThHtnvPVis

http://www.youtube.com/watch?v=cThHtnvPVis

vacuum
9th June 2013, 04:38 PM
After seeing the guy's interview, it seems pretty legit.

If so, he had perfect timing. Right after the spying on the Associated Press scandal to ensure it would get blown open, and right during the first day of Bilderberg to change the game right when they were about to discuss their previously well-laid plans.

Serpo
9th June 2013, 05:18 PM
Story made 'local' (SLC UT) newscast a few years ago,

Israeli Terrorist Spying On NSA In Utah Posing As Art Students (http://www.youtube.com/watch?v=NSZaDEspq-M)


http://www.youtube.com/watch?v=NSZaDEspq-M

I never completely 'got' the whole israeli door-to-door "art student" (spy) phenom, as well as their "mall kiosk" thing in shopping malls across the country selling various trinkets. I don't understand how these "fronts" are such effective venues for spying... like, what kind of valuable intel are they gathering? Anyone?

To really stupid people ,everything is intelligence.

sirgonzo420
9th June 2013, 05:50 PM
Story made 'local' (SLC UT) newscast a few years ago,

Israeli Terrorist Spying On NSA In Utah Posing As Art Students (http://www.youtube.com/watch?v=NSZaDEspq-M)


http://www.youtube.com/watch?v=NSZaDEspq-M

I never completely 'got' the whole israeli door-to-door "art student" (spy) phenom, as well as their "mall kiosk" thing in shopping malls across the country selling various trinkets. I don't understand how these "fronts" are such effective venues for spying... like, what kind of valuable intel are they gathering? Anyone?

I don't think the actual spying necessarily takes place in shopping malls. Don't get me wrong, I know for a fact that mossad agents operate mall kiosks in America - I have literally seen them and heard them with my own eyes and ears. However, I think they are just using the mall gigs as "covers", so they will have some quasi-plausible reason for being in the country. Perhaps it helps them get work visas or something. Student visa for "art students".

The last time I saw them at the mall they were selling Dead Sea beauty products.... the brand name was... get this: "Seacret".... get it? "Seacret", like "Dead Sea" and "secret mission". lol

I think their real "work" happens when they *aren't* "working" at the malls. Perhaps they are networking with others and setting up Boston-type events.

vacuum
9th June 2013, 06:02 PM
I don't think the actual spying necessarily takes place in shopping malls. Don't get me wrong, I know for a fact that mossad agents operate mall kiosks in America - I have literally seen them and heard them with my own eyes and ears. However, I think they are just using the mall gigs as "covers", so they will have some quasi-plausible reason for being in the country. Perhaps it helps them get work visas or something. Student visa for "art students".

The last time I saw them at the mall they were selling Dead Sea beauty products.... the brand name was... get this: "Seacret".... get it? "Seacret", like "Dead Sea" and "secret mission". lol

I think their real "work" happens when they *aren't* "working" at the malls. Perhaps they are networking with others and setting up Boston-type events.

Also, probably 50% of it is just training them. It's not sending back the data that's valuable, it's sending back trained spies that's valuable.

Also, probably obfuscating the real spies. "Is this a real spy or just another art student spy?"

PatColo
10th June 2013, 04:25 PM
What was the Israeli involvement in collecting U.S. communications intel for NSA? (http://www.haaretz.com/news/diplomacy-defense/how-was-israel-involved-in-collecting-u-s-communications-intel-for-nsa-1.528529)


http://theuglytruth.files.wordpress.com/2013/05/netanyahuobama.jpg?w=620&h=387

Israeli high-tech firms Verint and Narus have had connections with U.S. companies and Israeli intelligence in the past, and ties between the countries’ intelligence agencies remain strong.

Haaretz

Were Israeli companies Verint and Narus the ones that collected information from the U.S. communications network for the National Security Agency?

more: http://www.haaretz.com/news/diplomacy-defense/how-was-israel-involved-in-collecting-u-s-communications-intel-for-nsa-1.528529

also, from S. Lendman:


Israeli Involvement in NSA Spying Stephen Lendman June 11, 2013
Warrantless dragnet spying is lawless.
by Stephen Lendman (http://www.mycatbirdseat.com/author/stephen-lendman) (http://mycatbirdseat.com/2013/06/39484-israeli-involvement-in-nsa-spying/alexander/)
http://mycatbirdseat.com/wp-content/uploads/2013/06/alexander.jpeg

Cybersecurity Law Is No Threat To Privacy: NSA Chief Gen. Alexander


(http://mycatbirdseat.com/2013/06/39484-israeli-involvement-in-nsa-spying/alexander/)

(http://mycatbirdseat.com/2013/06/39484-israeli-involvement-in-nsa-spying/alexander/) It doesn't surprise. On June 8, Haaretz (http://www.haaretz.com/news/diplomacy-defense/how-was-israel-involved-in-collecting-u-s-communications-intel-for-nsa-1.528529) headlined "What was the Israeli involvement in collecting US communications intel for NSA?" More on that below.

On April 3, 2012, James Bamford (http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/all/1) headlined "Shady Companies with Ties to Israel Wiretap for US for the NSA."

more: http://mycatbirdseat.com/2013/06/39484-israeli-involvement-in-nsa-spying/

PatColo
10th June 2013, 04:35 PM
Obama’s NSA Spy Op Revealed! (http://www.realjewnews.com/?p=825) # 21 (http://www.realjewnews.com/?p=825#comments)
June 9, 2013


http://www.youtube.com/watch?v=JTDLaqLZ9Rc

http://www.youtube.com/watch?v=JTDLaqLZ9Rc

Shami-Amourae
10th June 2013, 08:27 PM
http://www.youtube.com/watch?v=U9gqIPJgN_E

JohnQPublic
11th June 2013, 12:19 PM
FaceBook Changes "Privacy" Features Once More (http://www.zerohedge.com/news/2013-06-11/facebook-changes-privacy-features-once-more)
5003

JohnQPublic
11th June 2013, 12:53 PM
Notice when Apple joined the program. It looks like Steve Jobs had to die before Apple joined. Maybe he said something like, "...over my dead body..." when they first asked.




5005

Serpo
11th June 2013, 01:11 PM
Putin on NSA leak: Government surveillance shouldn’t break law Get short URL (http://rt.com/news/putin-rt-visit-broadcasting-center-530/)
Published time: June 11, 2013 14:53
Edited time: June 11, 2013 19:24
http://rt.com/files/news/1f/61/20/00/111_92_.si.jpgRussian President Vladimir Putin during his talk with Russia Today television channel's journalists and correspondents, June 11, 2013. (RT photo / Semyon Khorunzhy)



Share on tumblr (http://www.addthis.com/bookmark.php?v=300&winname=addthis&pub=unknown&source=tbx-300&lng=en-AU&s=tumblr&url=http%3A%2F%2Frt.com%2Fnews%2Fputin-rt-visit-broadcasting-center-530%2F&title=Putin%20on%20NSA%20leak%3A%20Government%20su rveillance%20shouldn%E2%80%99t%20break%20law%20%E2 %80%94%20RT%20News&ate=AT-undefined/-/-/51b77e2ba59255d0/2&frommenu=1&uid=51b77e2baac659e2&ufbl=1&ct=1&pre=http%3A%2F%2Fwww.drudgereport.com%2F&tt=0&captcha_provider=nucaptcha)



Tags
Putin (http://rt.com/tags/putin/), Russia (http://rt.com/tags/russia/)

Data surveillance is an acceptable measure if done within the law, Russia’s President Vladimir Putin told RT while visiting the channel in the capital.
“Such methods are in demand. But you can’t just listen to the phone call in Russia; you need a special order from court. This is how this should be done in civilized society while tackling terrorism with the use of any technical means. If it is in the framework of the law, then it’s ok. If not it is unacceptable,” Putin said answering the question of RT’s Editor-in-Chief Margarita Simonyan. Commenting on Obama’s statement (http://rt.com/usa/obama-surveillance-nsa-monitoring-385/) that “You can’t have 100 per cent security and 100 per cent privacy,” Putin disagreed, saying it is possible if done within the law.

Russia said it could consider the possibility (http://rt.com/news/russia-consider-asylum-snowden-517/) of granting political asylum to 29-year-old Edward Snowden, if such request is made. The ex-CIA worker disclosed the existence of PRISM, the National Security Agency’s (NSA) massive data-mining surveillance program, to The Guardian.

“If we receive such a request, we will consider it,” President Vladimir Putin's press secretary Dmitry Peskov said.
The whereabouts of whistleblower remain unknown after he checked out of a Hong Kong hotel. A day earlier Snowden revealed his identity to The Guardian newspaper.

‘Syria should have undertaken reform in due time’ Speaking about the conflict in Syria, the president said it was possible to avoid the civilian war by conducting reforms in due time.

“Syria as a country was rife for some kind of change. And the government of Syria should have felt that in due time and should have undertaken some reform,” Putin said. “Had they done that, what we’re seeing in Syria today would have never happened.”

However, he added, one should take into account that the entire Middle East is currently finding itself in a state of uncertainty and conflict – and it’s wrong to try and interfere from outside.
"From the outside some people think that if you bring the entire region in compliance with someone’s specific idea of democracy, things will settle down, and everything will be all right in that region. But that’s not true. Considering that region’s background history, culture, religion – you cannot interfere with it from the outside.”
Putin pointed out that the West is supporting some certain organizations that are fighting Assad in Syria, and they are countering "those very same groups" in Mali.


http://rt.com/files/news/1f/61/20/00/putin-rt.jpgVladimir Putin (RIA Novosti / Michael Klimentyev)


“Where is the logic in that?” he said. “Our Western counterparts often tell us that the Al-Nusra is one of the key organizations in the Syrian military opposition. But it has been dubbed terrorist by the US Department of State, and it doesn’t even hide its links to Al-Qaeda. So will you let this organization join the future government of Syria? Our Western counterparts say no. Are you going to just make them go away once you have victory in Syria? They don’t know. It’s totally unclear.”
Putin reminded that the quality of life in Libya was one of the highest in the region before the regime change.

“What do you have there now? There is a war of everybody against everybody among various tribes, there is war for resources, and, I’m afraid, if we go the same way in Syria, there will be same havoc in Syria that we’re now witnessing in Libya,” he concluded. “Isn’t that enough from what we’re seeing in Pakistan and Afghanistan right now, where there’re terrorists that are not controlled by anyone, except for terrorists?”

Speaking about mass demonstrations, the president stressed that the government should control protesters, “put them put them in the legislative field,” if they “violate the law.”

“This is what happening both in the US and in Russia,” Putin said.

“Russia doesn’t try to influence Occupy activists, yet foreign agents try to do this in Russia,” he said, referring to the Occupy movement that initially started from protests in New York and then spread worldwide.
‘No doubt’ Iran is abiding by NPT Iran should be entitled to pursue a non-military nuclear program, as long as it keeps in line with international law, the Russian President said.

Putin stressed he does not doubt that Iran is abiding by the treaty on nuclear arms non-proliferation.
“You don’t see proof of the contrary,” he said, also citing the recent IAEA report supporting his point.

That said, Iran should also take into account the concerns of the other countries in the region, as well as those of the international community, and refrain from threatening rhetoric, Putin believes.

Russia is willing to further cooperate with Iran, as long as it acts within the international mandates, the President said.

http://rt.com/files/news/1f/61/20/00/111_125_.jpgRussian President Vladimir Putin, center, during his talk with Russia Today television channel's journalists and correspondents, June 11, 2013. (RT photo / Semyon Khorunzhy)

Opposition should act in democratic way Speaking about mass demonstrations, the President said that “any opposition is good, right and helpful” if it acts within the law.

He admitted that if people are not satisfied with the laws, the opposition should aim to change them in “democratic way.”

In case demonstrators break the law, the government should control protesters, “put them put them in the legislative field.”

“This is what's happening both in the US and in Russia,” Putin said. “Though when we do that we are criticized, but when [United] States does, it is a norm. These are the so-called double standards,” he added.

Speaking about the United States and opposition movements, Putin stressed that it is not right that the State Department supports “opposition in Russia.”

“Russia doesn’t try to influence Occupy activists, yet foreign agents try to do this in Russia,” he said, referring to the Occupy movement that initially started from protests in New York and then spread worldwide.

‘Drones should be placed under control’ The use of drones is impossible to stop as combat tools are constantly improving, but their use should be controlled, the Russian President said.

“I doubt that it is possible to ban them all. But to place them under control, under certain laws is indeed possible, and necessary,” he said.

Putin believes the regulations of drone use should be worked out “to minimize – or, better, to nullify – accidental [civilian] deaths.”

It is, however, necessary to continue fighting terrorism, the President stressed.

The Russian president was visiting RT’s new Moscow broadcasting center, which opened last December. The 28,000 sq. m purpose-built facility is one of the biggest and best-equipped in the world.


http://rt.com/files/news/1f/61/20/00/111_119_.jpgRussian President Vladimir Putin, center, during his talk with Russia Today television channel's journalists and correspondents, June 11, 2013. (RT photo / Semyon Khorunzhy)

http://rt.com/news/putin-rt-visit-broadcasting-center-530/

Serpo
11th June 2013, 02:16 PM
Is This the REAL Reason for the Government Spying On Americans? http://www.realnewsreporter.com/wp-content/uploads/2013/06/cell-phone-spying-300x225.jpg Zero Hedge (http://www.zerohedge.com/contributed/2013-06-10/real-reason-government-spying-americans)
To understand the scope, extent and reason that the government spies on all Americans, you have to understand what has happened to our Constitutional form of government since 9/11.
State of Emergency The United States has been in a declared state of emergency from September 2001, to the present. Specifically, on September 11, 2001, the government declared a state of emergency. That declared state of emergency was formally put in writing (http://209.85.165.104/search?q=cache:7sIfEMO_tkoJ:www.law.cornell.edu/uscode/uscode50/usc_sec_50_00001621----000-notes.html+%22Consistent+with+section+202%28d%29+o f+the+National+Emergencies+Act+%2850+U.S.C.+1622%2 8d%29%29,+I+am+continuing+for+1+year+the+national+ emergency+I+declared+on+September+14,+2001,+in+Pro clamation+7463,+with+respect+to+the+terrorist+atta cks+at+the+World+Trade+Center+Rebuilding-Ground-Zero+,+New+York,+New+York,+the+Pentagon,+and+aboar d+United+Airlines+Business-Travel-Looks-Ahead-to-2008+flight+93,+and+the+continuing+and+immediate+t hreat+of+further+attacks+on+the+United+States.&hl=en&ct=clnk&cd=1&gl=us&client=firefox-a) on 9/14/2001:
A national emergency exists by reason of the terrorist attacks at the World Trade Center, New York, New York, and the Pentagon, and the continuing and immediate threat of further attacks on the United States.
NOW, THEREFORE, I, GEORGE W. BUSH, President of the United States of America, by virtue of the authority vested in me as President by the Constitution and the laws of the United States, I hereby declare that the national emergency has existed since September 11, 2001 . . .
That declared state of emergency has continued in full force and effect from 9/11 to the present. President Bush kept it in place, and President Obama has also.
For example, on September 9, 2011, President Obama declared (http://uscode.house.gov/download/pls/50C34.txt):
CONTINUATION OF NATIONAL EMERGENCY DECLARED BY PROC. NO. 7463
Notice of President of the United States, dated Sept. 9, 2011, 76 F.R. 56633, provided:
Consistent with section 202(d) of the National Emergencies Act, 50 U.S.C. 1622(d), I am continuing for 1 year the national emergency previously declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of
September 11, 2001, and the continuing and immediate threat of
further attacks on the United States.
Because the terrorist threat continues, the national emergency declared on September 14, 2001, and the powers and authorities adopted to deal with that emergency must continue in effect beyond September 14, 2011. Therefore, I am continuing in effect for an additional year the national emergency that was declared on September 14, 2001, with respect to the terrorist threat.
This notice shall be published in the Federal Register and
transmitted to the Congress.
The Washington Times wrote (http://web.archive.org/web/20010918184425/www.washtimes.com/national/20010918-1136.htm) on September 18, 2001:

Simply by proclaiming a national emergency on Friday, President Bush activated some 500 dormant legal provisions, including those allowing him to impose censorship and martial law.
The White House has kept substantial information concerning its presidential proclamations and directives hidden from Congress. For example, according to (http://niemanwatchdog.org/index.cfm?fuseaction=ask_this.view&askthisid=00321) Steven Aftergood of the Federation of American Scientists Project on Government Secrecy:

Of the 54 National Security Presidential Directives issued by the [George W.] Bush Administration to date, the titles of only about half have been publicly identified. There is descriptive material or actual text in the public domain for only about a third. In other words, there are dozens of undisclosed Presidential directives that define U.S. national security policy and task government agencies, but whose substance is unknown either to the public or, as a rule, to Congress.
Continuity of Government Continuity of Government (“COG”) measures were implemented on 9/11. For example, according to the 9/11 Commission Report, at page 38:

At 9:59, an Air Force lieutenant colonel working in the White House Military Office joined the conference and stated he had just talked to Deputy National Security Advisor Stephen Hadley. The White House requested (http://books.google.com/books?id=JufWziTyNnIC&pg=PA38&dq=%22The+White+House+requested+%281%29+the+implem entation+of+continuity+of+government+measures%22&ei=zM-vR-LqCKeGtgPl3pmIBg&sig=AIK2hH5iFOWGXrQfQi8WTDOQrHI)(1) (http://books.google.com/books?id=JufWziTyNnIC&pg=PA38&dq=%22The+White+House+requested+%281%29+the+implem entation+of+continuity+of+government+measures%22&ei=zM-vR-LqCKeGtgPl3pmIBg&sig=AIK2hH5iFOWGXrQfQi8WTDOQrHI) the implementation of continuity of government measures (http://books.google.com/books?id=JufWziTyNnIC&pg=PA38&dq=%22The+White+House+requested+%281%29+the+implem entation+of+continuity+of+government+measures%22&ei=zM-vR-LqCKeGtgPl3pmIBg&sig=AIK2hH5iFOWGXrQfQi8WTDOQrHI), (2) fighter escorts for Air Force One, and (3) a fighter combat air patrol over Washington, D.C.
Likewise, page 326 of the Report states:

The secretary of defense directed the nation’s armed forces to Defense Condition 3, an increased state of military readiness. For the first time in history, all nonemergency civilian aircraft in the United States were grounded, stranding tens of thousands of passengers across the country. Contingency plans for the continuity of government and the evacuation of leaders had been implemented. (http://books.google.com/books?id=JufWziTyNnIC&pg=PA326&dq=%22Contingency+plans+for+the+continuity+of+gove rnment+and+the+evacuation+of+leaders+had+been+impl emented%22&ei=F9CvR5TzAabutAORrZiABg&sig=bf8Cb56WVwmlBb-PxcWO4pW8POY)
The Washington Post notes (http://www.washingtonpost.com/ac2/wp-dyn/A42754-2002Jan26?language=printer) that Vice President Dick Cheney initiated the COG plan on 9/11:

From the bunker, Cheney officially implemented the emergency continuity of government orders . . .
(See also footnotes cited therein and this webpage (http://www.cooperativeresearch.org/context.jsp?item=a81cogexercises#a81cogexercises). )
CNN reported (http://archives.cnn.com/2002/US/03/01/bunker.government/index.html) that – 6 months later – the plans were still in place:

Because Bush has decided to leave the operation in place, agencies including the White House and top civilian Cabinet departments have rotated personnel involved, and are discussing ways to staff such a contingency operation under the assumption it will be in place indefinitely, this official said.
Similarly, the Washington Post reported (http://pqasb.pqarchiver.com/washingtonpost/access/109965333.html?dids=109965333:109965333&FMT=ABS&FMTS=ABS:FT&date=Mar+1%2C+2002&author=Barton+Gellman+and+Susan+Schmidt&pub=The+Washington+Post&edition=&startpage=A.01&desc=Shadow+Government+Is+at+Work+in+Secret) in March 2002 that “the shadow government has evolved into an indefinite precaution.” The same article goes on to state:

Assessment of terrorist risks persuaded the White House to remake the program as a permanent feature of ‘the new reality, based on what the threat looks like,’ a senior decisionmaker said.
As CBS pointed out (http://www.cbsnews.com/stories/2002/03/01/attack/main502530.shtml), virtually none of the Congressional leadership knew that the COG had been implemented or was still in existence as of March 2002:

Key congressional leaders say they didn’t know President Bush had established a “shadow government,” moving dozens of senior civilian managers to secret underground locations outside Washington to ensure that the federal government could survive a devastating terrorist attack on the nation’s capital, The Washington Post says in its Saturday editions.

Senate Majority Leader Thomas A. Daschle (D-S.D.) told the Post he had not been informed by the White House about the role, location or even the existence of the shadow government that the administration began to deploy the morning of the Sept. 11 hijackings.

An aide to House Minority Leader Richard A. Gephardt (D-Mo.) said he was also unaware of the administration’s move.

Among Congress’s GOP leadership, aides to House Speaker J. Dennis Hastert (Ill.), second in line to succeed the president if he became incapacitated, and to Senate Minority Leader Trent Lott (Miss.) said they were not sure whether they knew.

Aides to Sen. Robert C. Byrd (D-W. Va.) said he had not been told. As Senate president pro tempore, he is in line to become president after the House speaker.
Similarly, the above-cited CNN article states:

Senate Majority Leader Tom Daschle, D-South Dakota, said Friday he can’t say much about the plan.

“We have not been informed at all about the role of the shadow government or its whereabouts or what particular responsibilities they have and when they would kick in, but we look forward to work with the administration to get additional information on that.”
Indeed, the White House has specifically refused to share information about Continuity of Government plans with the Homeland Security Committee of the U.S. Congress, even though that Committee has proper security clearance to hear the full details of all COG plans.
Specifically, in the summer 2007, Congressman Peter DeFazio, on the Homeland Security Committee (and so with proper security access to be briefed on COG issues), inquired about continuity of government plans, and was refused access. Indeed, DeFazio told Congress that the entire Homeland Security Committee of the U.S. Congress has been denied access to the plans (http://www.youtube.com/watch?v=QdfjsS9Wqk8) by the White House.


http://www.realnewsreporter.com/?p=12512

Serpo
11th June 2013, 02:44 PM
Government Spying on Americans … and then Giving Info to Giant Corporations (http://www.infowars.com/government-spying-on-americans-and-then-giving-info-to-giant-corporations/)



http://www.infowars.com/wp-content/plugins/wp-print/images/printer_famfamfam.gif (http://www.infowars.com/government-spying-on-americans-and-then-giving-info-to-giant-corporations/print/)
http://static.infowars.com/2010/templateimages/youtube.png (http://www.youtube.com/user/TheAlexJonesChannel)
http://static.infowars.com/2010/templateimages/podcast.png (http://xml.nfowars.net/Alex.rss)

http://static.infowars.com/2010/templateimages/twitter.png (http://twitter.com/realalexjones)
http://static.infowars.com/2010/templateimages/facebook.png (http://www.facebook.com/AlexanderEmerickJones)
http://static.infowars.com/2010/templateimages/cart.png (http://www.infowarsshop.com/)




Washington’s Blog (http://www.washingtonsblog.com/2013/06/government-spying-on-americans-and-then-giving-info-to-giant-corporations.html)
June 11, 2013
You’ve heard that the government spies on all Americans.
But you might not know that the government shares some of that information with big corporations.
In addition, Reuters reported (http://www.reuters.com/article/2011/10/26/us-cybersecurity-banks-idUSTRE79P5E020111026) in 2011 that the NSA shares intelligence with Wall Street banks in the name of “battling hackers.”

The National Security Agency, a secretive arm of the U.S. military, has begun providing Wall Street banks with intelligence on foreign hackers, a sign of growing U.S. fears of financial sabotage.The assistance from the agency that conducts electronic spying overseas is part of an effort by American banks and other financial firms to get help from the U.S. military and private defense contractors to fend off cyber attacks, according to interviews with U.S. officials, security experts and defense industry executives.
The Federal Bureau of Investigation has also warned banks of particular threats amid concerns that hackers could potentially exploit security vulnerabilities to wreak havoc across global markets and cause economic mayhem.
***
NSA Director Keith Alexander, who runs the U.S. military’s cyber operations, told Reuters the agency is currently talking to financial firms about sharing electronic information on malicious software, possibly by expanding a pilot program through whichit offers similar data to the defense industry.
***
NSA, which has long been charged with protecting classified government networks from attack, is already working with Nasdaq to beef up its defenses after hackers infiltrated its computer systems last year and installed malicious software that allowed them to spy on the directors of publicly held companies.
***
The NSA’s work with Wall Street marks a milestone in the agency’s efforts to make its cyber intelligence available more broadly to the private sector.
***
Greater cooperation with industry became possible after a deal reached a year ago between the Pentagon and the Department of Homeland Security, allowing NSA to provide cyber expertise to other government agencies and certain private companies.
In March, PC Magazine noted (http://www.pcmag.com/article2/0,2817,2417197,00.asp):

“Right now, the ability to share real-time information is complicated and there are legal barriers. We have to overcome that,” Gen Keith B. Alexander, director of the National Security Agency and commander of U.S. Cyber Command, said during a Thursday appearance at Georgia Tech’s Cyber Security Symposium.
[Alexander has been pushing for the anti-privacy Internet bill known as "CISPA (https://www.eff.org/deeplinks/2013/04/us-house-representatives-shamefully-passes-cispa-internet-freedom-advocates)" to be passed.] “It allows the government to start working with industry and … discuss with each of these sector about the best approach,” he said.
CISPA would allow the NSA to more openly share data with corporations in the name of protecting against “cyber threats.” But that phrase is too squisy. As the Electronic Frontier Foundation notes: (https://www.eff.org/cybersecurity-bill-faq#agencies)

A “cybersecurity purpose” only means that a company has to think that a user is trying to harm its network. What does that mean, exactly? The definition is broad and vague. The definition allows purposes such as guarding against “improper” information modification, ensuring “timely” access to information or “preserving authorized restrictions on access…protecting…proprietary information” (i.e. DRM).
Moreover, as the ACLU notes (http://www.aclu.org/files/pdfs/privacy/fusioncenter_20071212.pdf), “Fusion Centers” – a hybrid of military, intelligence agency, police and private corporations set up in centers throughout the country (http://www.aclu.org/node/20415/), and run by the Department of Justice and Department of Homeland Security – allow big businesses like Boeing to get access to classified information which gives them an unfair advantage over smaller competitors:

Participation in fusion centers might give Boeing access to the trade secrets or security vulnerabilities of competing companies, or might give it an advantage in competing for government contracts. Expecting a Boeing analyst to distinguish between information that represents a security risk to Boeing and information that represents a business risk may be too much to ask.
A 2008 Department of Homeland Security Privacy Office review (http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_ia_slrfci.pdf) of fusion centers concluded that they presented risks to privacy because of ambiguous lines of authority, rules and oversight, the participation of the military and private sector, data mining, excessive secrecy, inaccurate or incomplete information and the dangers of mission creep.
The Senate Permanent Subcommittee on Investigations found (http://openchannel.nbcnews.com/_news/2012/10/02/14187433-homeland-security-fusion-centers-spy-on-citizens-produce-shoddy-work-report-says?lite) in 2012 that fusion centers spy on citizens, produce ‘shoddy’ work unrelated to terrorism or real threats:

“The Subcommittee investigation found that DHS-assigned detailees to the fusion centers forwarded ‘intelligence’ of uneven quality – oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism.”

Under the FBI’s Infraguard program, businesses sometimes receive intel even before elected officials (http://www.projectcensored.org/top-stories/articles/3-infragard-the-fbi-deputizes-business/).
Law enforcement agencies spy on protesters and then share the info – at taxpayer expense (http://www.counterpunch.org/2011/10/18/wall-street-firms-spy-on-protestors-in-tax-funded-center/) – with the giant Wall Street banks
And a security expert says that all Occupy Wall Street protesters had their cellphone information logged by the government (http://www.salon.com/2013/06/06/security_expert_all_occupiers_phones_were_logged/).
Alternet notes (http://www.alternet.org/how-our-massive-homeland-security-apparatus-does-bidding-big-banks):

Ironically, records indicate that corporate entities engaged in such public-private intelligence sharing partnerships were often the very same corporate entities criticized, and protested against, by the Occupy Wall Street movement as having undue influence in the functions of public government.
In essence, big banks and giant corporations are seen as being part of “critical infrastructure” and “key resources (http://www.dhs.gov/xlibrary/assets/nipp_srtltt_guide.pdf)” … so the government protects them. That creates a dynamic where the government will do quite a bit to protect the big boys against any real or imagined threats … whether from activists or even smaller competitors. (Remember that the government has completely propped up the big banks (http://www.washingtonsblog.com/2013/02/virtually-all-of-the-big-banks-profits-come-from-taxpayer-bailouts-and-subsidies.html), even though they went bankrupt due to stupid gambles (http://www.washingtonsblog.com/2013/01/12-of-the-13-big-banks-went-bust-and-the-government-lied-when-it-said-it-only-bailed-out-healthy-banks.html).)
And given that some millions of private contractors (http://abcnews.go.com/US/secret-history-nsa-contractors/story?id=19366914&singlePage=true#.UbZz79h32Sp) have clearance to view information gathered by spy agencies, and that information gained by the NSA by spying on Americans is being shared with agencies in other countries (http://www.guardian.co.uk/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-prism), at least some of the confidential information is undoubtedly leaking into private handseven without the government’s knowledge or consent.
As the ACLU noted (http://www.aclu.org/FilesPDFs/surveillance_report.pdf) in 2004:

There is a long and unfortunate history of cooperation between government security agencies and powerful corporations to deprive individuals of their privacy and other civil liberties, and any program that institutionalizes close, secretive ties between such organizations raises serious questions about the scope of its activities, now and in the future.
Indeed, the government has been affirmatively helping the big banks, giant oil companies and other large corporations cover up fraud (http://www.washingtonsblog.com/2011/04/japans-nuclear-melt-down-economic.html) and to go after critics. For example, Business Week reported (http://web.archive.org/web/20060615163032/http://www.businessweek.com/bwdaily/dnflash/may2006/nf20060523_2210.htm?campaign_id=rss_daily)on May 23, 2006:

President George W. Bush has bestowed on his intelligence czar, John Negroponte, broad authority, in the name of national security, to excuse publicly traded companies from their usual accounting and securities-disclosure obligations.
Reuters noted (http://www.reuters.com/article/idUSTRE60N1S220100124) in 2010:

U.S. securities regulators originally treated the New York Federal Reserve’s bid to keep secret many of the details of the American International Group bailout like a request to protect matters of national security, according to emails obtained by Reuters.
Wired reported (http://www.wired.com/threatlevel/2010/07/foia-filtered/) the same year:

The DHS issued a directive to employees in July 2009 requiring a wide range of public records requests to pass through political appointees for vetting. These included any requests dealing with a “controversial or sensitive subject” or pertaining to meetings involving prominent business leaders and elected officials. Requests from lawmakers, journalists, and activist and watchdog groups were also placed under this scrutiny.
In an effort to protect Bank of America from the threatened Wikileaks expose of wrongdoing – the Department of Justice told Bank of America (http://dailybail.com/home/how-attorney-general-eric-holder-colluded-with-bank-of-ameri.html) to a hire a specific hardball-playing law firm to assemble a team to take down WikiLeaks (and see this (http://www.salon.com/2011/02/15/hunton_williams_wikileaks_chamber/))
The government and big banks actually coordinated on the violent crackdown (http://www.washingtonsblog.com/2013/06/www.washingtonsblog.com/2012/12/government-and-big-banks-joined-forces-to-violently-crush-peaceful-protests.html) of the anti-big bank Occupy protest.
The government is also using anti-terrorism laws to keep people from learning what pollutants are in their own community, in order to protect the fracking, coal and other polluting industries. See this (http://www.usnews.com/news/articles/2012/02/02/documentary-filmmaker-josh-fox-arrested-at-fracking-hearing), this (http://www.citypaper.net/blogs/nakedcity/breaking_in_private_email_pas_homeland_security_ch ief_pledges_support_to_gas_drillers_warns_against_ groups_fomenting_dissent.html),this (http://www.pennlive.com/midstate/index.ssf/2010/09/post_122.html), this (http://www.huffingtonpost.com/2009/06/12/coal-ash-spills-too-dange_n_214739.html) and this (http://www.prospect.org/cs/articles?article=bushs_secret_government).
Investigating factory farming can get one labeled a terrorist (http://www.latimes.com/news/local/environment/la-me-gs-fbi-tracking-animal-videotapers-as-terrorists-20111229,0,5919114.story).
Infringing the copyright of a big corporation may also get labeled as a terrorist … and a swat team may be deployed to your house. See this (http://news.cnet.com/Terrorist-link-to-copyright-piracy-alleged/2100-1028_3-5722835.html), this (http://techliberation.com/2007/01/17/swat-teams-enforcing-copyright/), this (http://en.wikipedia.org/wiki/Controversial_invocations_of_the_USA_PATRIOT_Act#I nvestigating_copyright_infringement) and this (http://www.techdirt.com/articles/20100129/0630057974.shtml). As the executive director of the Information Society Project at Yale Law School notes (http://www.theatlantic.com/technology/archive/2012/02/enough-already-the-sopa-debate-ignores-how-much-copyright-protection-we-already-have/252742/#bio):

This administration … publishes a newsletter about its efforts with language that compares copyright infringement to terrorism.
In short, the “national security” apparatus has been hijacked to serve the needs of big business


http://www.infowars.com/government-spying-on-americans-and-then-giving-info-to-giant-corporations/ (http://www.washingtonsblog.com/2010/09/the-national-security-apparatus-has-been-hijacked-to-serve-the-needs-of-big-business.html)


http://yarpp.org/pixels/c6bb0b5b7ce803685f4ea949415b8bfd

gunDriller
11th June 2013, 03:00 PM
is Russia smart enough not to let Jews & Israel-first'ers run their phone system ?

PatColo
13th June 2013, 06:25 PM
cross posted this to another nsa thread too, several YT's, podcasts about this "scandal" :O harvested from Mami's blog:


James Corbett: NSA Spying: False Hope vs. Real Solutions (http://grizzom.blogspot.com/2013/06/james-corbett-nsa-spying-false-hope-vs.html)

http://www.youtube.com/watch?v=2jFZUL89IC4

http://www.youtube.com/watch?v=2jFZUL89IC4

In this special edition of The Boiling Frogs Post Eyeopener report, James introduces new members of the irate minority to the problem, as well as the false hopes (and real solutions) that are available to address that problem.

Posted by WHOOLI (http://www.blogger.com/profile/12745432266860223770) at 1:21 PM 1 comment: (http://www.blogger.com/comment.g?blogID=5440450620561193447&postID=9167371168319911187)


NSA leaks hint Microsoft may have lied about Skype security (http://grizzom.blogspot.com/2013/06/nsa-leaks-hint-microsoft-may-have-lied.html)


http://rt.com/files/news/1f/68/d0/00/microsoft.si.jpg



Have we all been screwed by Micro$oft yet again? (http://rt.com/usa/gallagher-nsa-microsoft-skype-653/)




Microsoft may have misled millions of Skype users around the world by making claims last year that have since been contradicted by intelligence leaked by former NSA contractor Edward Snowden. (RT News Report)

Posted by foon1e (http://www.blogger.com/profile/11620170404653771913) at 3:55 PM No comments: (http://www.blogger.com/comment.g?blogID=5440450620561193447&postID=8870868659180984013)

see 2nd hour:
Jeff Rense Radio Show - 2013.06.12 (http://grizzom.blogspot.com/2013/06/jeff-rense-radio-show-20130612.html)

http://www.rense.com/1.mpicons/thinlogo2color.gif (http://www.rense.com/)

Listen (http://www.talkshoe.com/resources/talkshoe/images/swf/lastEpisodePlayer.swf?fileUrl=http://k002.kiwi6.com/hotlink/8f5wre8wl2/rense.20130612.1of3.mp3) Download (http://k002.kiwi6.com/hotlink/8f5wre8wl2/rense.20130612.1of3.mp3) Hour 1 - Tim Rifat (http://mindovermatter.ru/) - World War Zion

Listen (http://www.talkshoe.com/resources/talkshoe/images/swf/lastEpisodePlayer.swf?fileUrl=http://k002.kiwi6.com/hotlink/wh3887dvpn/rense.20130612.2of3.mp3) Download (http://k002.kiwi6.com/hotlink/wh3887dvpn/rense.20130612.2of3.mp3) Hour 2 - DC Dave Martin (http://www.dcdave.com/) - FBI Killers & NSA Liars

Listen (http://www.talkshoe.com/resources/talkshoe/images/swf/lastEpisodePlayer.swf?fileUrl=http://k002.kiwi6.com/hotlink/9bjjwanjkl/rense.20130612.3of3.mp3) Download (http://k002.kiwi6.com/hotlink/9bjjwanjkl/rense.20130612.3of3.mp3) Hour 3 - Jim Marrs (http://www.jimmarrs.com/) - The View From Marrs

56k CF
Rense' site (http://rense.com/)
Posted by zapoper (http://www.blogger.com/profile/15726967138606494466) at 3:10 AM No comments: (http://www.blogger.com/comment.g?blogID=5440450620561193447&postID=4384736705730439343)


US spying scandals (http://grizzom.blogspot.com/2013/06/us-spying-scandals.html)

http://www.youtube.com/watch?v=yn5r91izP-k

http://www.youtube.com/watch?v=yn5r91izP-k

President Obama says US citizens are free to complain about what opponents call a big-brother style surveillance program, but that it's necessary to ward off terrorist attacks.

Posted by WHOOLI (http://www.blogger.com/profile/12745432266860223770) at 4:29 PM 1 comment: (http://www.blogger.com/comment.g?blogID=5440450620561193447&postID=6686015711042231738)


Scott Horton 2013.06.10 (http://grizzom.blogspot.com/2013/06/scott-horton-20130610.html)

http://www.freedomsphoenix.com/Uploads/Graphics/129/07/129-0726062642-scott-9.jpg (http://www.freedomsphoenix.com/Uploads/Graphics/129/07/129-0726062642-scott-9.jpg)
First interview 2013.06.07 Trevor Timm

Trevor Timm of the Electronic Frontier Foundation (https://www.eff.org/) discusses the recent leaks revealing wholesale NSA surveillance of Americans through Verizon phone logs and nine major internet companies; the NSA’s “51%” rule for determining whether a call is foreign and thus suitable for monitoring; and how the government twists the definition of words to avoid constitutional violations. (Duration: 32:18 — 7.4MB)



32k Download (http://dissentradio.com/radio/13_06_07_timmkpfk.mp3)

Second interview 2013.06.10 Ron Paul

Retired Congressman Ron Paul discusses the unsurprising revelations of massive government spying (http://original.antiwar.com/paul/2013/06/09/government-spying-should-we-be-shocked/) on Americans; why “truth is treason in an empire of lies;” the Republican leadership’s support for Obama’s spying programs; Rand Paul’s 4th Amendment Restoration Act and class action lawsuit; and the Ron Paul Institute for Peace and Prosperity. (Duration: 20:58 — 4.8MB)


No Agenda Global Radio (http://www.noagendastream.com/)
Scott Horton.org (http://scotthorton.org/)


32k Download (http://dissentradio.com/radio/13_06_10_paul.mp3)



Tuesday, June 11, 2013 Jeff Rense Radio Show - 2013.06.10 (http://grizzom.blogspot.com/2013/06/jeff-rense-radio-show-20130610.html)

http://www.rense.com/1.mpicons/thinlogo2color.gif (http://www.rense.com/)

Listen (http://www.talkshoe.com/resources/talkshoe/images/swf/lastEpisodePlayer.swf?fileUrl=http://k002.kiwi6.com/hotlink/5o9s0i538u/rense.20130610.1of3.mp3) Download (http://k002.kiwi6.com/hotlink/5o9s0i538u/rense.20130610.1of3.mp3) Hour 1 - Jonathan Emord (http://www.emord.com/) - NSA, PRISM & Our Loss Of Privacy


NSA, the secret AT&T spy room, and 2 Israeli companies (http://grizzom.blogspot.com/2013/06/nsa-secret-at-spy-room-and-2-israeli.html)

http://static2.businessinsider.com/image/50062e3669beddb87700002d/did-you-know-two-secretive-israeli-companies-reportedly-bugged-the-us-telecommunications-grid-for-the-nsa.jpg (http://static2.businessinsider.com/image/50062e3669beddb87700002d/did-you-know-two-secretive-israeli-companies-reportedly-bugged-the-us-telecommunications-grid-for-the-nsa.jpg)
Boom. Explosive revelations. The NSA is using telecom giants to spy on anybody and everybody, in a program called PRISM.

James Bamford explained that, in the 1990s, everything changed for NSA. Previously, they’d been able to intercept electronic communications by using big dishes to capture what was coming down to Earth from telecom satellites. But with the shift to fiber-optic cables, NSA was shut out. So they devised new methods.

For example, they set up a secret spy room at an AT&T office in San Francisco. NSA installed new equipment that enabled them to tap into the fiber-optic cables and suck up all traffic.

How Bamford describes this, in 2008, tells you exactly where the PRISM program came from:

“NSA began making these agreements with AT&T and other companies, and that in order to get access to the actual cables, they had to build these secret rooms in these buildings.

“So what would happen would be the communications on the cables would come into the building, and then the cable would go to this thing called a splitter box, which was a box that had something that was similar to a prism, a glass prism.

“And the prism was shaped like a prism, and the light signals would come in, and they’d be split by the prism. And one copy of the light signal would go off to where it was supposed to be going in the telecom system, and the other half, this new cloned copy of the cables, would actually go one floor below to NSA’s secret room.

“… And in the secret room was equipment by a private company called Narus, the very small company hardly anybody has ever heard of that created the hardware and the software to analyze these cables and then pick out the targets NSA is looking for and then forward the targeted communications onto NSA headquarters.”

In James Bamford’s 2008 interview, he mentions two Israeli companies, Narus and Verint, that almost nobody knew about. They played a key role in developing and selling the technology that allowed NSA to deploy its PRISM spying program

Read the rest here (https://jonrappoport.wordpress.com/2013/06/09/nsa-the-secret-att-spy-room-and-2-israeli-companies/)
Posted by Mami (http://www.blogger.com/profile/13298385482303078866) at 3:42 AM No comments: (http://www.blogger.com/comment.g?blogID=5440450620561193447&postID=3847376624703058960)


Israeli Involvement in NSA Spying (http://grizzom.blogspot.com/2013/06/israeli-involvement-in-nsa-spying_10.html)
Warrantless dragnet spying is lawless.
http://mycatbirdseat.com/wp-content/uploads/2013/06/Shady-companies-650x296.jpg (http://mycatbirdseat.com/wp-content/uploads/2013/06/Shady-companies-650x296.jpg)
Mossad's longstanding ties to Verint, Narus, and other Israeli surveillance technology companies assures it access to information they collect.
***Read article at MY CATBIRD SEAT*** (http://mycatbirdseat.com/2013/06/39484-israeli-involvement-in-nsa-spying/)



Obama's NSA Spy Op Revealed! (http://grizzom.blogspot.com/2013/06/obamas-nsa-spy-op-revealed.html)

http://www.youtube.com/watch?v=JTDLaqLZ9Rc

http://www.youtube.com/watch?v=JTDLaqLZ9Rc

How they already told us what they are doing. (http://www.youtube.com/watch?v=nHiFmAc7Yg8)

Posted by WHOOLI (http://www.blogger.com/profile/12745432266860223770) at 9:03 AM No comments: (http://www.blogger.com/comment.g?blogID=5440450620561193447&postID=637424641180967997)