This blog is the continuation of The Stark Raving Viking blog. The author of all the posts here is Steven G. Erickson a.k.a blogger Vikingas. Keywords: Human Rights Watch China USA World Civil Judicial prosecutorial attorney Judge misconduct brutality police action Connecticut Politics State Martial Law US Constitution
Tuesday, March 27, 2012
Prostitution and Government, always present
The below story and picture cut and pasted [from here]
It'll soon be legal to pay for sex in Ontario brothels
10 hrs ago
The Nevada of the North? The top court in the Canadian province of Ontario issued a ruling today that legalized brothels and also allows prostitutes to have security staff. In its ruling, the court said prostitution is a dangerous profession in which risk is increased by laws preventing sex workers from working in groups in one location with security and other staff. Beginning next year, prostitutes will be allowed to work in brothels, and starting April 25, they can begin hiring bodyguards. One provision left in place is a law barring public communication for purposes of prostitution (picking up a prostitute on the street).
Use the letter below to forbid smart meter installation (or modify the letter to demand the meter be removed).
From: Energy Customer's Name Street Address City State Zip
To: Energy Provider Street Address City State Zip
Date of letter
NOTICE OF NO CONSENT TO TRESPASS AND SURVEILLANCE, NOTICE OF LIABILITY
Dear (Energy Provider) and all agents, officers, employees, contractors and interested parties,
If you intend to install a "Smart Meter" or any activity monitoring device at the above address, you and all other parties are hereby denied consent for installation and use of all such devices on the above property. Installation and use of any activity monitoring device is hereby refused and prohibited. Informed consent is legally required for installation of any surveillance device and any device that will collect and transmit private and personal data to undisclosed and unauthorized parties for undisclosed and unauthorized purposes. Authorization for sharing of personal and private information may only be given by the originator and subject of that information. That authorization is hereby denied and refused with regard to the above property and all its occupants. "Smart Meters" and digital meters violate the law and cause endangerment to residents by the following factors: 1. They individually identify electrical devices inside the home and record when they are operated causing invasion of privacy. 2. They monitor household activity and occupancy in violation of rights and domestic security. 3. They transmit wireless signals which may be intercepted by unauthorized and unknown parties. Those signals can be used to monitor behavior and occupancy and they can be used by criminals to aid criminal activity against the occupants. 4. Data about occupant's daily habits and activities are collected, recorded and stored in permanent databases which are accessed by parties not authorized or invited to know and share that private data by those who's activities were recorded. 5. Those with access to the smart meter databases can review a permanent history of household activities complete with calendar and time-of-day metrics to gain a highly invasive and detailed view of the lives of the occupants. 6. Those databases may be shared with, or fall into the hands of criminals, blackmailers, corrupt law enforcement, private hackers of wireless transmissions, power company employees, and other unidentified parties who may act against the interests of the occupants under metered surveillance. 7. "Smart Meters" are, by definition, surveillance devices which violate Federal and State wiretapping laws by recording and storing databases of private and personal activities and behaviors without the consent or knowledge of those people who are monitored. 8. It is possible for example, with analysis of certain "Smart Meter" data, for unauthorized and distant parties to determine medical conditions, sexual activities, physical locations of persons within the home, vacancy patterns and personal information and habits of the occupants. 9. Your company has not adequately disclosed the particular recording and transmission capabilities of the smart meter, or the extent of the data that will be recorded, stored and shared, or the purposes to which the data will and will not be put. 10. Electromagnetic and Radio Frequency energy contamination from smart meters exceeds allowable safe and healthful limits for domestic environments as determined by the EPA and other scientific programs.
I forbid, refuse and deny consent of any installation and use of any monitoring, eavesdropping, and surveillance devices on my property, my place of residence and my place of occupancy. That applies to and includes "Smart Meters" and activity monitoring devices of any and all kinds. Any attempt to install any such device directed at me, other occupants, my property or residence will constitute trespass, stalking, wiretapping and unlawful surveillance and endangerment of health and safety, all prohibited and punishable by law through criminal and civil complaints. All persons, government agencies and private organizations responsible for installing or operating monitoring devices directed at or recording my activities, which I have not specifically authorized in writing, will be fully liable for a fee of $100,000.00 for any violations, intrusions, harm or negative consequences caused or made possible by those devices whether those negative consequences are provided by "law" or not.
This is legal notice. After this delivery the liabilities listed above may not be denied or avoided by parties named and implied in this notice. Civil Servant immunities and protections do not apply to the installation of smart meters due to the criminal violations they represent.
Notice to principal is notice to agent and notice to agent is notice to principal. All rights reserved.
* * * *
Alex Jones reports out of Brattleboro, Vermont?
Text with video: Alex Jones is putting out the word for the need for independent reporters. He has a contest. Thousands can be won. This video is not an official entry. Youtube could go down at anytime. Blogger blogs which is also google who I call "Gobble". So, I love you, liveleak.
There has to be alternative independent media. Liveleak.com and other sources are key. Even if we have to make our own printing presses, let's get the word out on the street. F U international corporations and banks. You have stolen enough and taken enough blood. It is now payback time.
Thursday, March 8, 2012 Police Facebook Gang out to steal your home? (2 comments) If you have a car, the police want to steal it. If you have a spouse or significant other, police in the US want to break up your relationship. If you have a kids, they want to take them. If you have a house, they want it. If you don't have a criminal record, they want to change that and put you in prison. If you make a police misconduct complaint, the police want you dead.
Tuesday, March 6, 2012 Organized Crime can Order USDOJ to shut down an FBI Investigation Will those who obtain the below knowledge want to say STFU Israel about Iran? Will citizens want to obtain representation for their taxation after listening to the below videos? Will those who listen to the below videos want to stop the warring, spying, torture, rape, robbing, and murder that is being funded using our money and is perpetrated by our international corporate and banking owners?
Tuesday, February 21, 2012 Press Passes for the Masses? (5 comments) Sites like this one should be supported. If sites like this one issued press passes, it might be good for the sites, and good for citizens like me. 40 bucks might be a good figure. I have no money now, and don't have a job, but would scrape up forty dollars from somewhere to again have a press pass.
Rock legend Dave Mustaine joins Alex Jones for a rare and exclusive in-depth interview during which he discusses a wide range of never before explored issues. Dave talks about the early days in Metallica and Megadeth on the 30-year anniversary of the two bands that defined the metal scene. He also discusses his debilitating neck injury, Megadeth's latest release "13″, as well as previous releases like "Endgame" (a reference to the Alex Jones film) and "Peace Sells".
It is not Whether the Internet will be Censored, It is When
Is Gobble or Google?
I figure that blogger, google, youtube, and the whole NSA family of government spy on you products will run their course. Almost nothing is really free. Those who were committed to providing honest services for a fee, even a reasonable fee, most of them were put out of business. If trillions of your tax dollars are being used, the "Free Stuff" you are getting really isn't free. We paid to be enslaved.
If smart toasters, smart washers, and smart lighting hearing sounds is hooked up to the internet, how far will the CIA and their international corporate and banker sponsors go? You need not even have a computer in the house to be spied on. "Free WiFi" can be provided through your smart meter through any outlet or electrical connection. Low voltage communication can share the same wires as high voltage with new ways to separate out the signals, although this technology is far from new, your house is being set up to spy on you 24/7.
Looking for alternatives to "gobble" aka google, youtube, blogger, and their other products is to diversify. Use other video upload and blogging sites. Start actually meeting people and don't use any electronic means or communications for, or at meetings. That would have to drive your lazy, local domestic spies really nuts.
If I find a way to pay for it, I have college students and others willing to stand in front of my camera to help me report news. I have a number of people raring to go to shoot an independent film. Sharing videos and files hand to hand might be a modern reality if thing continue. Hell, if I had to, I would build, and man my own printing press. Let's not let them beat us. The elites can all go to hell for all I care.
RT's main YouTube channel was suspended for about eight hours, returning online about 2 p.m. Moscow time (10:00 GMT). YouTube chalked up to the temporary blackout to a "technical mistake."
During the temporary suspension, anyone who attempted to access RT's main YouTube channel was greeted with a startling message:
"This channel has been suspended due to multiple or severe violations of YouTube's policy against spam, scans, and commercially deceptive content."
During the temporary blackout, all of the content on our main YouTube channel was inaccessible. RT's YouTube account manager has confirmed it was the YouTube team's mistake, and they have since apologized for the incident.
RT's web promotion chief particularly stressed RT has not violated YouTube's terms of service in any way, shape or form.
"There have been no copyright or community guideline violations on our part which could result in this kind of measures," he said.
RT is the most popular of all the news broadcasters present on YouTube, having racked up about 700 million views and 275 thousand subscribers since the channel's inception.
RT has a long-running relationship with YouTube and Google, and its channels are part of YouTube's Premium Partnership program. This is the first such incident in the history of our close partnership.
In 2007, RT became the first Russian media outlet to open its channel on YouTube. In 2009, RT pioneered the use of YouTube's Content ID program in Russia.
YouTube's director of video partnerships Patrick Walker had previously lauded his company's relationship with RT.
"RT is our trump card, one of the, if not the biggest news provider on YouTube worldwide," he told the MIPCOM 2011 conference.
The blackout sparked frenzy among RT viewers around the world attempting to access the channel and provoked speculation it had been intentionally taken down.
Viewers speculated that everything from censorship to a hacker attack could have been behind the incident. Some of them said this is "ACTA in action", while others focused on the timing, which coincided with an NYPD crackdown on an OWS protest in New York which was being covered by the channel.
I would love to work with the individuals who Max Keiser talks to below. I don't need to be paid much. I have a passport and will go anywhere.
-stevengerickson At yahoo.com
Text with below video:
Max Keiser and co-host, Stacy Herbert, discuss ripping out client eyeballs and losing millions for a free breakfast; maggots of risk and plastic financial apartheid. In the second half of the show Max talks to filmmakers William Gagan and Geoff Shively about their crowd funded journey to Syria and ‘fake’ activists and, with the introduction of anti-free speech laws in Chicago, the filmmakers discuss the small drone helicopters they have acquired for reporting on the Nato summit.
* * * *
Those who are successful raising money to cover independent news, shoot documentaries, and independent film?
Should Bush be arrested for being a war criminal and crimes against humanity?
What about Free Speech, a Free Press, the economy, and our youth not be unnecessarily harmed and killed?
Above video shot by Documentary Producer Francis C. P. Knize. Steven G. Erickson's appearance with Phil Donahue in above video was due to arrangements and backing of Francis C. P. Knize, lead for our team at the event. Footage was shot at the 2008 NCMR Free Press Event, Minneapolis, Minnesota.
Homeland Security tracking/fining Hunters who have GPS, Cellphones, and 2 way radios?
Robert De Niro, The Deer Hunter movie by askmen.com
Regardless of what you think of hunting, should authorities be out tracking people who have cellphones, GPS, or two way radios on them if they are not already a target of an investigation? If vegetarians wanted to track those who ate at steak houses so the patrons of the restaurant were fined, arrested, and had to appear in court, would that be okay with you? Should golf be legal for married men who should be spending time with their families on weekends? Should any of us be allowed, when not at work, not have to stay home and watch government sponsored television, eating cheese doodles on our couches? I am trying to get some of you to understand the big picture. Regardless of whether you agree with someone else's free speech, or one's recreation, do you agree that we the people in America should continue to have Constitutional rights?
I talked with a deer hunter who traveled 8 hours to hunt with his friends. A goon squad of authorities went out into the woods, surrounded them, and they now have to appear in court. They were going to get nailed for something, regardless of whether they did anything illegal, or not. I have been hearing of these type of operations, more and more.
Do police use your On-Star to eavesdrop on conversations in your vehicle? Is your GPS device and Smart Phone used to alert police if you run a stop sign or are going even a few miles over the speed limit? Are these devices used to monitor you to see who you associate with? Do police use the video camera and microphone on your Smart Phone to spy on you even when the device is off?
Should men who save money all year round to spend one weekend together, get criminal records, and maybe ruined for life, just for enjoying recreation that is supposed to be legal in America? Should these men lose their children, families, home, and job? Women do hunt, I am not being sexist, talking about a guys weekend out together. Are authorities out to give all average Americans criminal records, so we aren't only debt slaves, but we have to report to a probation officers, and not dare engage in Free Speech or in activities where we might meet out in areas where police can't listen to our conversations and monitor our activities?
Welcome to the new America, comrade. Silence signifies acceptance.
CIA director David Petraeus has said that the rise of new "smart" gadgets means that Americans are effectively bugging their own homes, saving US spy agencies a job when it identifies any "persons of interest".
Speaking at a summit for In-Q-Tel, the CIA's technology investment operation, Petraeus made the comments when discussing new technologies which aim to add processors and web connections to previously 'dumb' home appliances such as fridges, ovens and lighting systems.
Wired reports the details via its Danger Room Blog:
"'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft."
"Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said.
Hello, I am a current JPMorgan Chase employee. This is an open letter to all commissioners and regulators. I am emailing you today b/c I know of insider information that will be damning at best for JPMorgan Chase. I have decided to play the role of whistleblower b/c I no longer have faith and belief that what we are doing for society is bringing value to people. I am now under the opinion that we are actually putting hard working Americans unaware of what lays ahead at extreme market risk. This risk is unnecessary and will lead to wide-scale market collapse if not handled properly. With the release of Mr. Smith’s open letter to Goldman, I too would like to set the record straight for JPM as well. I have seen the disruptive behavior of superiors and no longer can say that I look up to employees at the ED/MD level here at JPM. Their smug exuberance and arrogance permeates the air just as pungently as rotting vegetables. They all know too well of the backdoor crony connections they share intimately with elected officials and with other institutions. It is apparent in everything they do, from the meager attempts to manipulate LIBOR, therefore controlling how almost all derivatives are priced to the inherit and fraudulent commodities manipulation. They too may have one day stood for something in the past in the client-employee relationship. Does anyone in today’s market really care about the protection of their client? From the ruthless and scandalous treatment of MF Global client asset funds to the excessive bonuses paid by companies with burgeoning liabilities. Yes, we at JPMorgan that are in the know are fearful of a cascading credit event being triggered in Greece as they have hidden derivatives in excess of $1 Trillion USD. We at JPMorgan own enough of these through counterparty risk and outright prop trading that our entire IB EDG space could be annihilated within a few short days. The last ten years has been market by inflexion point after inflexion point with the most notable coming in 2008 after the acquisition of Bear.
I wish to remain anonymous as of now as fear of termination mounts from what I am about to reveal. Robert Gottlieb is not my real name; however he is a trader that is involved in a lawsuit for manipulative trading while working with JPMorgan Chase. He was acquired during our Bear Stearns acquisition and is known to be the notorious person shorting in the silver future market from his trading space, along with Blythe Masters, his IB Global boss. However, with that said, we are manipulating the silver futures market and playing a smaller (but still massively manipulative) role in manipulating the gold futures market. We have a little over a 25% (give or take a percentage) position in the short market for silver futures and by your definition this denotes a larger position than for speculative purposes or for hedging and is beyond the line of manipulation.
On a side note, I do not work directly with accounts that would have been directly impacted by the MF Global fiasco but I have heard through other colleagues that we have involvement in the hiding of client assets from MF Global. This is another fraudulent effort on our part and constitutes theft. I urge you to forward that part of the investigation on to the respective authorities.
There is something else that you may find strange. During month-end December, we were all told by our managers that this was going to be a dismal year in terms of earnings and that we should not expect any bonuses or pay raises. Then come mid-late January it is made known that everyone received a pay raise and/or bonus, which is interesting b/c just a few weeks ago we were told that this was not likely and expected to be paid nothing in addition to base salary. January is right around the time we started increasing our short positions quite significantly again and this most recent crash in gold and silver during Bernanke’s speech on February 29th is of notable importance, as we along with 4 other major institutions, orchestrated the violent $100 drop in Gold and subsequent drops in silver.
As regulators of the free people of this country, I ask you to uphold the most important job in the world right now. That job is judge and overseer of all that is justice in the most sensitive of commodity markets. There are many middle-income people that invest in the physical assets of silver, gold, as well as mining stocks that are being financially impacted in a negative way b/c of our unscrupulous shorts in the precious metals commodity sector. If you read the COT with intent you will find that commercials (even though we have no business being in the commercial sector, which should be reserved for companies that truly produce the metal) are net short by a long shot in not only silver, but gold.
It is rather surprising that what should be well known liabilities on our balance sheet have not erupted into wider scale scrutinization. I call all honest and courageous JPMorgan employees to step up and fight the cronyism and wide-scale manipulation by reporting the truth. We are only helping reality come to light therefore allowing a real valuation of our banking industry which will give investors a chance to properly adjust without being totally wiped out. I will be contacting a lawyer shortly about this matter, as I believe no other whistleblower at JPMorgan has come forward yet. Our deepest secrets lie within the hands of honest employees and can be revealed through honest regulators that are willing to take a look inside one of America’s best kept secrets. Please do not allow this to turn into another Enron.
More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.
Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”
All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.
“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”
Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.
The treasure was kept mostly in two wooden chests, and locked away in a bank vault: thousands of coins, jewelry and figurines, some around 2,600 years old. For decades it sat in the bank, unattended despite the historical and monetary value. Then, as a popular uprising erupted around the downtown bank last winter, someone entered the vault and made off with the trove.
Now, as Interpol searches for the collection on the illegal antiquities markets, questions are still being raised about the nature of the theft. One thing most seem to agree on: The heist was an inside job.
“I cannot say who did it,” said Ahmed Buzaian, an archaeology professor at Benghazi University, who was part of an outside group that investigated the crime scene. “But they knew exactly what was inside.”
Would you like to see me and other reporters show up where news is happening? Would you like to see video here? Would you like to see documentaries and independent films? We are working on projects now.
We the people should try to fix what is broken while we still have a prayer of doing so.
A weak economy and high debt levels are prompting more young adults to return to the family nest, a new survey shows. Perhaps surprisingly, most are happy with their living arrangements.
After graduating from Brown University in 2009 with a bachelor’s degree in comparative literature and completing a Fulbright scholarship in Brazil, Cassie Owens was left with a few dollars on her stipend and no job in sight. So, Ms. Owens returned home to her mother in Philadelphia.
“I moved back home pretty much for lack of money and prospects,” she says. Owens’s cousin, Evon Burton, who also returned home after graduating from Morehouse College in 2009, adds, “The choice is to go out and be in debt or to pursue your dreams and save up money at home, in a safe, stable environment.”
Owens and Burton are among the scores of so-called “boomerang kids,” young adults who move out of the family home for school or work and then return home. Unable to find well-paying work in a weak economy, escalating numbers of young adults – as many as 3 in 10 – are returning home to the family nest, resulting in the highest share of young adults living in multigenerational households since the 1950s, according to a Pew Research Center report released Thursday.
“The rise in the boomerang phenomenon illustrates the effect the recession and the weak economy are having on young adults,” says Kim Parker, a senior researcher at Pew and the author of the study. “Young adults were hit particularly hard in the job market and are having to delay reaching some basic financial milestones of adulthood because of this.”
Corporations want citizens who run small farms to be arrested. GMO food is killing livestock because it grows with bug poison in the "food". These corporations want us sterilized, they want us poisoned, they want us with cancer, they want to steal the rest of our wealth. When will we wake up in greater numbers? Get rid of [these people].
Maggots are Turf over Surf animal feed alternative
By Wendell Roelf, Reuters
STELLENBOSCH, South Africa (Reuters) - Families tucking into a Sunday dinner of roast chicken or pork may not relish the idea of animals fattened on maggots.
But one British entrepreneur in South Africa believes that maggots, the wriggling larvae of the common house fly (Musca Domestica), is a viable protein-rich alternative to make animal feed. A large part of the feed used today is fishmeal and depends on diminishing global fish stocks.
David Drew, managing director of AgriProtein Technologies, plans to set up in South Africa the world's first large-scale fully commercial factory producing "Magmeal", an organic and sustainable replacement for the fishmeal currently used to fatten up chickens and pigs.
"By 2050, at the current rates that we are using fishmeal, we will need two more planets' oceans to feed ourselves. The world's population is also expanding exponentially, with India and China helping drive poultry, beef and pork consumption," Drew told Reuters.
His existing test fly farm operates simply - flocks of flies contained in special containers lay eggs which turn into larvae after three days. Millions of teeming maggots are immersed in abattoir blood and feed on it to fatten up.
They are later washed and harvested when fully grown at around 12 mm, before being dried, milled and pelleted for animal feed.
"What's been helping us is the price of fishmeal is rising, it is a scarce resource. This is not some environmental tree-hugging nonsense, this is exactly as it is," Drew said at the Mariendahl experimental farm, about 45 km (27 miles) north of Cape Town where the maggot test factory is located.
He added AgriProtein wanted the fully commercialised maggot factory to be on line at the end of next year. The plant would consume 65,000 litres of blood a day, feeding 100 tonnes of maggots and producing 20 tonnes of "Magmeal".
International partners were being sought for the $8 million maggot factory, with a similar manufacturing facility planned for Germany afterwards, Drew said.
"We've done the proof of concept with the protein source where we've tested toxicity, meat quality... we actually have an (animal feed) product which is better than what we currently have," said Elsje Pieterse, an animal scientist at the University of Stellenbosch and one of the project's pioneers.
"Our fish sources are not renewable ... But this is much cheaper than fishmeal in the end, it is better protein source because it is healthier with no anti-nutrients," Pieterse said.
She added the product was totally renewable and natural, as maggots were known as nature's sweepers, able to vacuum up bacteria. Maggots have been used in some medical procedures to clean up infected or dead tissue from wounds.
AgriProtein Technologies was also conducting research for the Bill and Melinda Gates Foundation in using the wasp-like Black Soldier fly to clean up pit latrines in African slums.
The experiment is seen having multiple benefits: Black Soldier flies lay their eggs on human excrement, and their larvae feed off this, leaving an odourless residue that can be used for fertiliser. The larvae can also be commercialised as protein, in the same way as house fly maggots.
"The idea being that the small entrepreneur can make a third of his money off the municipality by cleaning up the shit in the slum, a third of his money from larvae and a third of his money from fertiliser," said Drew.
(Reporting by Wendell Roelf; Editing by Pascal Fletcher and Paul Casciato)
Well, it has been the $64,000 question for a couple of decades: Can NSA break something like PGP?
While there might be other black world technologies that could be up to the task (there’s no way to know), what we do know is that a practical quantum computing capability would be, for all intents and purposes, the master key.
I’m pretty confident that NSA has this capability and here’s why: IBM Breakthrough May Make Practical Quantum Computer 15 Years Away Instead of 50. There is no hard constant that one can point to when considering how much more advanced black world technologies are than what we think of as state of the art, but if IBM is 15 years away from building a useful quantum computer, it’s not a stretch to assume NSA has that capability already, or is close to having it.
Bamford lays out a narrative below about the “enormous breakthrough,” but, at the end of the day, it’s conventional computers. There’s no mention quantum computers, or even the far less “out there” photonic systems.
Is Bamford’s piece a limited hangout?
Maybe, but it makes for interesting reading in any event.
Note: For some reason, Bamford refers to Mark Klein as, “A whistle-blower,” without naming him. Because of Mark Klein, we know, for sure, that the mass intercepts are happening, how NSA is doing it, the equipment involved, etc. So, thanks, Mark Klein. Heroes have names on Cryptogon.
Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.
But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”
In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever.
The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”
According to Binney—who has maintained close contact with agency employees until a few years ago—the taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct “deep packet inspection,” examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.
The software, created by a company called Narus that’s now part of Boeing, is controlled remotely from NSA headquarters at Fort Meade in Maryland and searches US sources for target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases in email. Any communication that arouses suspicion, especially those to or from the million or so people on agency watch lists, are automatically copied or recorded and then transmitted to the NSA.
The scope of surveillance expands from there, Binney says. Once a name is entered into the Narus database, all phone calls and other communications to and from that person are automatically routed to the NSA’s recorders. “Anybody you want, route to a recorder,” Binney says. “If your number’s in there? Routed and gets recorded.” He adds, “The Narus device allows you to take it all.” And when Bluffdale is completed, whatever is collected will be routed there for storage and analysis.
According to Binney, one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex.
Verizon was also part of the program, Binney says, and that greatly expanded the volume of calls subject to the agency’s domestic eavesdropping. “That multiplies the call rate by at least a factor of five,” he says. “So you’re over a billion and a half calls a day.” (Spokespeople for Verizon and AT&T said their companies would not comment on matters of national security.)
After he left the NSA, Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything. “The whole idea was, how do you manage 20 terabytes of intercept a minute?” he says. “The way we proposed was to distinguish between things you want and things you don’t want.” Instead, he adds, “they’re storing everything they gather.” And the agency is gathering as much as it can.
Once the communications are intercepted and stored, the data-mining begins. “You can watch everybody all the time with data- mining,” Binney says. Everything a person does becomes charted on a graph, “financial transactions or travel or anything,” he says. Thus, as data like bookstore receipts, bank statements, and commuter toll records flow in, the NSA is able to paint a more and more detailed picture of someone’s life.
The NSA also has the ability to eavesdrop on phone calls directly and in real time. According to Adrienne J. Kinne, who worked both before and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the World Trade Center attacks “basically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.” Even journalists calling home from overseas were included. “A lot of time you could tell they were calling their families,” she says, “incredibly intimate, personal conversations.” Kinne found the act of eavesdropping on innocent fellow citizens personally distressing. “It’s almost like going through and finding somebody’s diary,” she says.
Sitting in a restaurant not far from NSA headquarters, the place where he spent nearly 40 years of his life, Binney held his thumb and forefinger close together. “We are, like, that far from a turnkey totalitarian state,” he says.
Meanwhile, over in Building 5300, the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems. The code-breaking effort was up and running.
The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”
* * * *
Would you like to see me and other reporters show up where news is happening? Would you like to see video here? Would you like to see documentaries and independent films? We are working on projects now.
We the people should try to fix what is broken while we still have a prayer of doing so.
Are the elite in the State of Connecticut out to kidnap babies born to poor citizens? Are federal tax dollars paying for this program? Do elites make money by abusing the poor? Is this a program to reduce, and abuse, the unwanted populations?
Children and Grand Children of Poor kidnapped for Federal Tax Dollars?
Text with video: Is there a quota for officially stealing children? Teen mothers can have their children stolen while they are at lock down birthing centers. Should those who pay US federal taxes be funding the break up of families and adopting out children? Should taxpayers pay for workers whose only job is to lie and kidnap children? [DCF Abuse] [The truth about organized crime, lawyers, and pro se litigation]
The story is about St. Agnes in West Hartford, Connecticut. If any citizens can be treated like this, we all can be treated like this. Does the state have the right just to show up, enter your house, confiscate your property, take possession of your body, make you go to court on more and more trivial excuses, and is there an agenda to break up families of the poor, those the elite want to abuse? How much is this mismanagement actually costing you? Should government workers be able to switch out a judge who makes a humane ruling for another judge who will rule for kidnapping and abuse? Is that state worker judge shopping? The woman in this story has had her grandson stolen. She was denied access to her 13 year old daughter.
Should grandparents be denied being able to be the caregivers of their own grandchildren? Should children literally be stolen out of their mother's arms, no paperwork, no hearing, and a child is officially kidnapped? [Unhappy Grammy speaks to me in another interview]
Imagine if 4 out 5 family members contract Lyme Disease and are too sick to function. Imagine 30 out of 50 homes in your neighborhood are infected with Lyme. Plum Island between Connecticut and Long Island is a Bio-weapons research laboratory. Soft body ticks from Africa were used to transfer the disease to hard body ticks and the disease is released from Connecticut and is now all over the US and out into the world. [more on the story]
What does Yale University have to do with the outbreak? Is Big Pharma about maximum profit and population control? Is the real Lyme Disease story being suppressed? What does that say about international corporate and bankster control of the mainstream media?
millions of us are being tracked as political targets. This data is used to figure out where you have been, where you might be going, and those most evil are tracking you in real time. If your number is up, is this why?
These are images of map generated entirely from GPS logs gathered by various versions of the Geoloqi sample application for iPhone and Android for the past 3.5 years. Once gathered, the data was run through a custom script that projects the GPS logs onto a 2D image plane. There is a little bit of logic to smooth out the lines and remove some (but not all) GPS noise.
How Many Data Points?
Approximately one GPS point was recorded every 2-6 seconds when I was moving, and these images represent about 2.5 million total GPS points. Collectively, they represent a data portrait of my life: everywhere I’ve been and the places I’ve been most frequently. The map is colored by year, so you can see how my footprint changes over the years, depending on where I live.
This is a map of everywhere I’ve been in Portland from 2008 to March 2012.
The long diagonal lines are airplane flights in and out of PDX. Some of the flights loop over the city when they take off.
To get data at this resolution, I had to bring back-up batteries with me and charge my phone whenever I could. I would manually turn the tracker on when I moved, and turn it off when I was at an indoor location for a long period of time. To get this level of accuracy results in a great deal of battery drain.
Some of the earlier images of the GPS maps started appearing in Wired online starting last year.
My fascination with GPS and data logging began at a relatively early age (around 10-12 years old, from 4th-6th grade). I recently found my stack of notepads from 3/29/1995 through 6/9/1997 where I logged my commute to school. I have mostly complete logs for the entire date range, including start time, end time, time traveled, who drove, and in what car. In addition, I used to take a highlighter
Why do This?
I’ve always found it interesting to take raw data and make it visible. Before GPS chips were available in smartphones, it was very difficult to get high resolution data like this. Ubiquitous provides a way to see over time what was formerly invisible data. It allows one to see over time. In each of these cases, I’ve been able to process the raw data to answer personal questions like “what time is best to leave the house in the morning for work?”. Best of all, it is private data that I own and can do with what I like.