Conspiracy Planet

CONSPIRACY PLANET

THE ALTERNATIVE NEWS & HISTORY NETWORK

YOUR ANTIDOTE TO GOVERNMENT-MEDIA PROPAGANDA

There's No "Theory" in Criminal Conspiracy

Tuesday, October 21, 2014
almartinraw.com conspiracydigest.com newimprovedmemoirs.com insiderintelligence.com
uridowbenko.com conspiracydigest.com newimprovedart.com


Home | Criminal Government Channel
Channels
#1 Public Enemy
9-11: Conspiracy
9-11: Coverup
9-11: Crime
9-11: Enemy Within
9-11: Unanswered Questions
9-11: Who Benefits?
Abortion Industry/ Human Organ Trade
AIDS
Al Martin
Alan Cantwell
Astrology
Avian Flu/ Anthrax Scam
Bad Law, Bad Judges
Beyond the Beyond
Bilderbergers
Biowarfare
Bush/ Clinton Crime Family
Celebrity Conspiracy
Chemtrails
Cheney/Halliburton Fraud
CIA (Criminals In Action)
CIA Drug Trafficking
CIA-Bush-Nazis
Cops Gone Wild
Corporate-Govt Fraud
Criminal Government
Crop Circle Mystery
Culture (sic)
Cyber Warfare
DoJ (sic)
Drone Wars
Dyncorp Crimes
Enron Money Laundry
FDA-Big Pharma Fraud-Conspiracy
Federal Reserve Scam
Fraud (Financial)
Fraud (Military)
Globalism
GMO-Genetic Engineering/ Genetically Modified Food
Google Frauds, Scams & Conspiracy
Google Lawsuit Archives
Gulf Oil Disaster
Guns/Control
Happy News
History Recovered
Humor
Illuminati
Income Tax Slavery
Iran-Contra
Iraq (Nam)
Israel/ Zionism
Japan Nuclear Disaster
Jewish Heroes
Julian Robertson Lawsuit Archives
Killer Spooks
Media Liars
Media Whores
Michael Riconosciuto
Military Guinea Pigs
Military Tech
Mind Control
Moon Landing Scam
National ID Cards/ Microchips/ RFID
Native American
New World Order
Osama bin Scapegoat
Pentagon Fraud
Phony "Conservatives"
Phony "Progressives"
Phony Global War on Terror (GWOT)
Phony Religion
Phony War on Drugs
Phony War on 'Terrorism'
Princess Diana: Murder-Coverup
Prison/ Slave Labor Industry
PsyOps
Resist War
Ron Paul
Schwarzenegger
Suppressed Science
TSA: Govt Sex Offenders
UFO Disclosure
US Police State
USA PATRIOT Act (Treason)
Vaccination Scam
Voodoo Science
Vote Fraud
War on Gold
Weather Warfare
Whistleblower: James Casbolt
Whistleblower: Oswald LeWinter
Whistleblower: Rodney Stich
Whistleblower: Sue Arrigo, M.D.
News   Links   Forum  

Meet PRISM/US-984XN:US Govt's Internet Spy Program  (continued)
    by ZERO HEDGE

Meet PRISM/US-984XN:US Govt's Internet Spy Program "

The secrecy is so deep we expect even the president himself may not know about it (but he does).

"The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who know about PRISM were bound by oaths of office to hold their tongues."

Of course, PRISM is from the government, and it is here to help you. But the question is why are some of the biggest private companies explicitly collaborating with what is now the biggest exposed spying operation in history, companies which include such household names as Microsoft Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple.

Yes, everyone's beloved Apple was added in October 2012: the NSA knows all about your music playlist, not to mention has a database of all your iMessages.

In other words, all those newly minted people known as corporations are in on it, but not: dear debt serf. It's a small club, and there is a multimillion liquid net-worth cutoff... and you are not in it.
From WaPo:

"An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA's Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President's Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, "NSA reporting increasingly relies on PRISM" as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.

"That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.

"The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple. PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war.

"...the PRISM program appears more nearly to resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over exponential growth in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques.

Spying on US citizens is "incidental"... kinda like killing thousands of women and children in drone raids is "collateral damage":

"Even when the system works just as advertised, with no American singled out for targeting, the NSA routinely collects a great deal of American content. That is described as 'incidental,' and it is inherent in contact chaining, one of the basic tools of the trade. To collect on a suspected spy or foreign terrorist means, at minimum, that everyone in the suspect's inbox or outbox is swept in. Intelligence analysts are typically taught to chain through contacts two "hops" out from their target, which increases "incidental collection" exponentially. The same math explains the aphorism, from the John Guare play, that no one is more than "six degrees of separation" from any other person.

This is how the big corporations sleep at night:

"Formally, in exchange for immunity from lawsuits, companies like Yahoo and AOL are obliged to accept a 'directive' from the attorney general and the director of national intelligence to open their servers to the FBI's Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA. In 2008, Congress gave the Justice Department authority to for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company -- to comply."

"In practice, there is room for a company to maneuver, delay or resist. When a clandestine intelligence program meets a highly regulated industry, said a lawyer with experience in bridging the gaps, neither side wants to risk a public fight. The engineering problems are so immense, in systems of such complexity and frequent change, that the FBI and NSA would be hard pressed to build in back doors without active help from each company.

Some "do lots of evil" by their customers. They just don't disclose it:

"'Google cares deeply about the security of our users' data,' a company spokesman said. 'We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government 'back door' into our systems, but Google does not have a 'back door' for the government to access private user data."

Time to kill that Facebook profile - or be accidentally killed for being "of a terroristy persuasion" based on some NSA algo:

"There has been 'continued exponential growth in tasking to Facebook and Skype,' according to the 41 PRISM slides. With a few clicks and an affirmation that the subject is believed to be engaged in terrorism, espionage or nuclear proliferation, an analyst obtains full access to Facebook's 'extensive search and surveillance capabilities against the variety of online social networking services."

And some more charts:

Introducing the program

A slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved.

* Monitoring a target's communication

This diagram shows how the bulk of the world's electronic communications move through companies based in the United States.

Providers and data

The PRISM program collects a wide range of data from the nine companies, although the details vary by provider.

In retrospect, it is sad what a farce this country has become: artificial market, centrally-planned economy, pervasive spying on the people, a tax collector that target political enemies, an administration that openly lies under oath.

If we didn't know better we would say this was 1955 Stalingrad, although Stalingrad at the height of totalitarianism was for amateurs.

This is next level shit: "Firsthand experience with these systems, and horror at their capabilities, is what drove a career intelligence officer to provide PowerPoint slides about PRISM and supporting materials to The Washington Post in order to expose what he believes to be a gross intrusion on privacy.

"'They quite literally can watch your ideas form as you type,' the officer said."

ORIGINALLY PUBLISHED
http://www.zerohedge.com/news/2013-06-06/meet-prism-us-984xn-us-governments-internet-espionage-super-operation


Other Top Stories

Johns Hopkins Scientist:Flu Vaccines Are Worthless by SYLVIA BOOTH HUBBARD
CIA Spy:Sandy Hook/Boston Bombing Were False Flags by FELLOWSHIP OF MINDS
Returning to the ZOG (Zionist Occupied Government) by WAYNE MADSEN
The Secret History of KGB Goon Vlad Putin by WILLIAM F. JASPER
Drone Clip Shows Massive Size Of Hong Kong Protest by ZERO HEDGE
Insane Sen. McCain Needs PTSD Psycho Rehab by WAYNE MADSEN
Reviews
Book: AIDS &The Doctors of Death by Alan Cantwell
Book: All Tomorrows Parties by William Gibson
Book: 'Bible Fraud' by Tony Bushby
Book: 'Bushwhacked' by Uri Dowbenko
Book: 'Conspirators' by Al Martin
Book: Death in the Air by Leonard Horowitz
Book: 'Future War' by John Alexander
Book: Healing Codes for the Biological Apocalypse
Book: 'Judaism's Strange Gods'
Book: 'Not In His Image' by John Lash
Book: Not in His Image/ Video: Avatar
Book: 'Paperclip Dolls' by Annie McKenna
Book: 'Rule by Secrecy' by Jim Marrs
Book: Rulers of Evil by Tupper Saussy
Book: 'Secret Weapons' by Ted Schwarz
Book: Thanks for the Memories
Book: 'The Templars and the Assassins'
Book: 'Windswept House' by Malachi Martin
Book:'Defrauding America'by Rodney Stich
Books:'The Lexus & The Olive Tree by Tom Friedman
Video: 'Arlington Road'
Video: 'Avatar'
Video: 'Collateral Damage'
Video: 'Confidence'
Video: 'Fight Club'
Video: Passion of the Christ
Video: 'The Manchurian Candidate'
Video: Traffic
Videos: AntiTrust
Videos: 'The Patriot'
Wanted: Gen-X Spooks



Click Here!
Click Here!
Click Here!
 
 

Copyright ©2013 Conspiracy Planet; All Rights Reserved