150+ methods listed -- US Gov / Big Brother

NewsFollowUp.com search Obama pictorial index sitemap home Privacy, Domestic Surveillance UPDATED

News for the 99%

...... Refresh F5...archive home

50th Anniversary of JFK assassination "Event of a Lifetime" at the Fess Parker Double Tree Inn. JFKSantaBarbara.

NFU MOST ACTIVE PA Warrantless Surveillance of American Journalists, Go to Alphabetic list authorized by Bush ... FIRSTFRUITS Academic Freedom "As part of its case, the EFF said Conference Electronic Frontier Foundation Trapwire it obtained documents from a former AT&T technician showing that the Obama Death List NSA is capable of monitoring all communications on AT&T's network FBI Facial Recognition and Identification Rothschild Timeline ..." more Initiative Bush / Clinton Body Count What is Amdocs / Narus connection to Hayden / Bush / NSA phone records database? = go to NFU page py Types of Surveillance Advanced Research and Development Activity Facial Recognition Facebook, Israel, Jewish co. Operations Security (AR 580-1) Office TIA replacement. FDIC Bank Transaction Surveillance Police Departments tracking protesters, NSA Administrative subpoena p.2 Federal ID , database compilation on 'terrorists' and Amdocs, Israel Telecom Immunity FEMA secret databases, civilians Apple, Iphone, Android Google and Anti-Big Firstfruits media wiretap surveillance Perfect Citizen domestic surveillance, NSA Brother Surveillance Patent FISC Foreign Intelligence Surveillance Court wmr wiretap American citizens appliance surveillance remotely turn on cameras FISA Foreign Intelligence Surveillance Act PreCrime surveillance, body language Army, spying on blogs NSA, GCHQ, CSE, GCSB, and DSD Printer Tracking dots and below Automobile, Black Boxes, NTSB Fusion Centers, Entersect PROMIS, Inslaw, FEMA, Main Core Automatic License Plate Recognition, Garden plot antiwar group surveillance Q-Group NSA, harassing informers Avatar Identity Program, DHS Geographic Information Systems GIS Real ID Federal ID Behavior Recognition, DARPA GPS, Location Technology Red Light Cameras Blog Tracking FBI GROUNDBREAKER Eagle Alliance, outsourcing, Restroom taping Biosurveillance, Biowatch, Biometrics NSA RFID Tech product tags, wireless transmissions Biometric cataloging Google Road Sensors CALEA Communications Assistance for Law HART / HURT aerial surveillance Satellites, National Geospatial . Enforcement Act Highlander , Operation Highlander NSA wiretaps on Search engines CAPPS, CAPPS II, Secure Flight, color coding airline Americans abroad. Speed Traps passengers Infragard Infrastructure security Squad car scanners to database , DCS 1000, EtherPeek Information Processing Techniques Office DARPA Sneak and Peak search warrant Cell Phone, wiretapping, mic remote activation Insurance Inspection, satellite Stoplight Cameras Cell-Site Tracking Warantless Israel, Amdocs illegal NSA surveillance program Census bureau more Israel , ... Amdocs US Telephone Billing Systems Streetlight cameras Clipper Chip NSA Israel Art Students, 9/11 and more SWIFT, Society for Worldwide Interbank Financial CODIS, collect DNA every federal arrest Israel, Mossad Telecommunication Covert U.S. intelligence operation to steal personal ISP surveillance, profit Telecommunications Co's data, TIA wmr wmr Garden Plot Liberty Alliance Project Televison sets, cable tv COFEE Computer Online Forensic Evidence Main Core database of American Citizens TIA Total Information and Awareness Office Extractor MATRIX Multistate Anti-Terrorism Information Synchronization, Knowledge Management and Controlled Drug Users, DEA Exchange Intelligence Fusion Schwarzenegger Credit Card / Personal Information Databases Microsoft, IE Explorer, cookies, surf tracking, SSL Talon Cubic Corporation Bots, Spies Television, HDTV DARPA Defense Advanced Research Project Agency, Mobile Backscatter Vans Terahertz Spectroscopy IPTO, BICA, LifeLog, Forester, Virat, RSTA Multiprogram Research Facility TIDE, Terrorist Identities Datamart Environment" or Data mining for profit, Acxiom and Epsilon Murdoch, Rupert phone hacking, Israel, Rebecca "TIDE" and "Railhead." Deep Packet Inspection Brooks Trailblazer / NSA DHS DHS monitoring keywords NAIS National Animal Identification System TRAPWIRE suspicious pattern, face recognition

http://www.newsfollowup.com/dom_spy_agncy2.htm[5/28/2014 5:47:55 PM] 150+ methods listed -- US Gov Surveillance / Big Brother

Digital TV, Interactive Narus / Amdocs / Boeing links, ISP, Semantic Traffic more DNA Databases, insurance cherry picking Analysis Universities selling student personal data to credit card Drones, Balloons National Applications Organization co's. Drug Testing National Cyber Security Division, HSARPA wmr USDA Satellite farm surveillance DSL Service USSID 18 NSA William Binney, FISA 2012 Echelon NSA Agency US-VISIT fingerprinting foreign visitors Einstein cyber-security intrusion detection system National Security letter Utah, Camp Williams data mining Electronic Passports NCTC National Counter Terrorism Center Utilities monitoring, Appliance surveillance Email Surveillance, Google NGI Next Generation Identification, facial recognition Video Analysis and Content Extraction Email Blocking, DHS, FBI NSA Administrative subpoena NSA Voice Grid Nation, VoiceGrid speech recognition Entersect, Certifion, LocatePlus, Multilateration NIST and NSA integration White House Executive Order 12333 internal surveillance Northcom, Northern Command Wifi see through walls capabilities of the NSA, CIA, and FBI wmr National ID Card, drivers license X-ray, airports EZPass, toll road systems tracking, surveillance, yes Open BSD FBI backdoor, operating system FBI tracking devices

Related topics: Internet 'War on Terrorism' Communications Fear Boycotts page 1 2 3

PROGRESSIVE REFERENCE CONSERVATIVE 1%* ACLU safe and free 3-eye imagery consultants, info Senator Daniel Akaka (D-Hawaii). Choicepoint and BBC George W Bush personally stopped an inquiry Acxiom companies are data aggregators. Nuala into a controversial programme to monitor the phone O'Connor Kelly is head of privacy for Dept of calls and e-mails of Americans, a top official has said. Homeland Security. Attorney General Alberto Gonzales said internal Alternet, Patriot II, details, search, government investigators wanted to look at the role justice surveillance, spying department lawyers had played in drafting the video programme ArsTechnica Big Brother on a budget: How Internet Ron Paul names neocons video surveillance got so cheap ... Many governments have ------invested heavily in packet inspection and related Thought Crime legislation: hr1955.info Albright College, Patriot Act technologies, which allow them to build a picture of what passes through their networks and what comes CERT Coordination Center net security, info, response Arlington Institute, John Peterson, Dave Snowden, in from beyond their borders. Cnet Tech News First, search Carnivore ASP Solutions, internet monitoring and surveillance, Center for Democracy and Technology, domestic CICenter Counterintelligence, NGO, UK Basis Technology, Asian, Middle East, EU intelligence gathering from unstructured text, spying watch CNN, Technology , major intelligence contractor, Center for a Legitimate Government Earthdata sea first fruit, monitor journalists, Commercial Alert, protecting children from corporate Earthdata International satellite images company BrightPlanet, search Sioux Falls, data mining, works predation FAS Project on Government Security with Lockheed Martin, Factiva, Cryptorights.org human rights for security workers. Freedom of Information Act SF Carnivore, Cato also known as DCS1000, Etherpeek Global Security Foundation Intelligence Resource Disinfo New Surveillance Camera Can Search 36 Chartered Institute of Marketing, UK, info resource History of the Internet Million Faces For Matches Per Second for marketing / sales. Service, News. Jurist University of Pittsburg, School of Law, Primary Dissenter / FireDogLake Federal Judge’s Injunction sources. Global perspective Finds NDAA Is Worse Than Material Support Law LawFare Echelon Watch discuss civil liberty threats Legal News Search search Electronic Privacy Information Center lawsuits, FBI, FOI LexisNexis online legal, news and business info services Electronic Frontier Foundation working to protect civil and free speech LexisOne The Resource for Small Law Firms. EndoftheAmericanDream 14 Incredibly Creepy Mountbatten Centre for International Studies Surveillance Technologies That Big Brother Will Be National Clearinghouse for Alcohol and Drug FEMA Using To Spy On You Information NCADI, info on alcohol, tobacco, and Concentration Camp, Beech Grove, EFF Is Your Printer Spying on YOu illicit drugs Indiana YouTube EFF List of Printers Which Do or Do Not Display National Cyber Security Alliance se Tracking Dots, search terms: yellow tracking dots, National Security Archive George Washington U. govt printer models, output, Machine Identification Code security research, FOI Technology Project, forensic watermarking, dithering Newsbits technews

http://www.newsfollowup.com/dom_spy_agncy2.htm[5/28/2014 5:47:55 PM] 150+ methods listed -- US Gov Surveillance / Big Brother

technique, blue light, microscope, Brother, Canon, Open Society Institute Internet policy, independent , Epson, Hewlett-Packard, Fuji, Xerox, IBM, media, human rights Konica / Minolta, Kyocera, Lanier, Lexmark, OS News Operating system news Okidata, Panasonic, Ricoh, Savin, Samsung, PrivacyDigest privacy news enlarge for full map or Tektronix, Toshiba, color laser printers. Privacy Marketing News UK, into privacy and go to Google map and enter: Emerson Ave, relationship marketing. Beech Grove, Indiana Privacy & Security Law Report BNA CAMERA AP “Israeli spying” story an “Urban Myth” Project on Government Oversight exposing corruption, according to Justice Department exploring solutions CIA Central Intelligence Agency Salaam.co.uk Big Brother in Britain, Cognitive Edge, Singapore, RAHS, data mining, national id cards, high cost and hype. medical info, raw surveillance data mining. SearchSecurity news, consulting Convera, video, image, audio search, multiple Security Focus News Microsoft languages, Scientific Working Group on Friction Ridge Analysis Cybersecurity Enhancement Act Buy Wayne Madsen's book fingerprinting, forensic id. DARPA Defense Advanced Research Projects Overthrow a Fascist Regime on $15 a Day. Slashdot Agency Epic Electronic Privacy Information Center TechLawJournal news, analysis of legislation, litigation, Dept of Homeland Security domestic spying F-Secure, info on CD rootkits regulation IT EZPass, E-Z Pass, E-ZPass, E-Z Pass, who really has Eyeballing TIA Vera Institute of Justice prisoner rights, justice system access to this information? Freedom Scorecard, ACLU innovation, links Factiva, Dow Jones company, gathers open source Future of Freedom First Amendment Rights Wikipedia NSA , warrantless news, Global Issues.org wiretapping, administrative subpoena, National Security ECHELON, US, Australia, New Zealand, UK, see Google-Watch Google search engine is spyware letter. Israel, High Tech Billboards domestic surveillance Wired Magazine, search Poindexter, TIA, Total Federal Bureau Of Investigation Information Awareness, IAO, Human Rights Watch briefing paper on MCIS FBI, Carnivore, Diagnostic Tool FBI Wikipedia MKUltra Project MKUltra, or MK-Ultra, Internet Democracy Project enhance open FreeRepublic.com News by keyword was a covert, illegal human research program into participation, public accountability and hr of internet Global Security.org behavioral modification run by the Central Intelligence KeepAmericaFree Yes, Pres. Obama, The NDAA Agency's (CIA) Office of Scientific Intelligence. The DOES Authorize Warrantless, No Due Process, program began in the early 1950s, was officially Indefinite Military Detention by the Military of sanctioned in 1953, was reduced in scope in 1964, American Civilians further curtailed in 1967 and finally halted in 1973. 1] MediaFilter covert action quarterly The program used unwitting U.S. and Canadian citizens CBS News FB MediaRoots the Clark County Republican Party as its test subjects, which led to controversy regarding Government Executive, Poindexter... Whitehouse Central Committee of Nevada unanimously called for its legitimacy. 2] 3] 4] 5] MKUltra involved the use of support. its appeal while legislators in are currently many methodologies to manipulate people's individual Klinx, deep web content, considering a bill that could virtually revoke the mental states and alter brain functions, including the Infragard FBI federal law in that state. surreptitious administration of drugs (especially LSD) Institute for Intergovernmental Research serving law NoNAIS.com Protect Traditional Rights to Farm, stop and other chemicals, hypnosis, sensory deprivation, enforcement, justice community RFID privicacy intrusion by Bush corporate America. isolation, verbal and sexual abuse, as well as various OpManning Free Bradley Manning forms of torture. 6] Justice Dept Patriot Act Privacy International Human rights group, watchdog WMR Army spying on soldiers' blogs Lockheed Martin US personal database, defense contractor, Bush on surveillance by govt/biz according to leaked Army regulation During a time Privacy when the morale of US Army personnel is at an all- Microsoft, Security Bulletins: Microsoft PrivacyToday news time low from a protracted war in and a de facto Microsoft Refuse & Resist the device formerly known as draft in the guise of a stop-loss program that keeps National Intelligence Council CIA Carnivore, soldiers on active duty after their commitments expire, National Communications System, US Threat Salon Israeli art students, DEA, Amdocs searchable the Army is also spying on the personal blogs of its Advisory file personnel. This surveillance program has been revealed National Consumers Coalition info on 'big brother', Smirking Chimp Suspicious Activities Involving in a leaked Army Regulation on Operations Security national ID card, govt spycams, supports global Israeli Art Students at DEA Facilities by DEA (AR-580-1). ... The regulation was issued almost a year warming.org ago, on April 19, 2007. It prohibits the publication of Southwest Research and Information Center Energy, National Infrastructure Protection Center net threat "critical or sensitive" information, a wide-open caveat Environment research analysis. assessment, warning, response, US that could include anything not deemed to be Total Information Awareness Resource Center National Strategy to Secure Cyberspace Whitehouse, "classified" national security information. The Bush, Cheney, 'war on terrorism' VeritasVirtualVengeance Righteous Negative regulation also covers information that has already been New York Times NSA executive order authorizing Publicity and Black PR: Exposing the terrible truths disclosed, or "compromised" as stated in the regulation. data mining of phone calls and file. to take down corrupt corporations. Surveillance Yahoo, Spyware new White Dot find out how to free yourself from Office of Total Information Awareness television. PTZ point tilt, zoom Patriot Act compliance software, Attus Tech ZDNet, UK news notes: Wayne Madsen Report ... cell phone "The Phoenix Global Intelligence Systems, globalization "echoing" is not limited to particular cell phone technologists, unrestrained by nationality, service providers or cell phone types. Customers of Presearch, Inc. mass data surveillance AT&T, Verizon, and T-Mobile are reporting the same PrivacyExchange privacy protection resource, problem with phones from Nokia, Samsung, Nokia, sponsored by Equifax, AE, Guardent, systran etc... Motorola, and Ericsson. ... Technicians report that Risk Assessment and Horizon Scanning (RAHS) echos occur when there is not a complete connection Saffron Technology, Inc. mass data surveillance, or if there is a third party connection on the call. Securius.com defending cyberspace security While echoing has been a minor problem in the past, the frequency of complaints is increasing and Seisint Inc MATRIX database, controlling company. affecting journalists and political activists from SYNTEC, Inc, Poindexter, Senior Vice President, Washington, DC to and California to mass data surveillance, . ... Government agencies are already able to Technology Transfer Information Center TTIC remotely activate a cell phone and use the microphone Terrorists Threat Integration Center, TTIC

http://www.newsfollowup.com/dom_spy_agncy2.htm[5/28/2014 5:47:55 PM] 150+ methods listed -- US Gov Surveillance / Big Brother

to listen in on conversations. The only way to prevent U.S. Departmant of State, Consular Affairs US- this surveillance is to agree to "batteries out" VISIT, info conversations, something that is employed more and Virage Inc Video analysis and contact extraction. Part more among journalists while talking to sources as of the Autonomy Group well as others concerned about high-tech snooping from "roving bugs." Similarly, removing the battery from a cell phone also disables the Global Positioning System and cell tower triangulation capabilities used by law enforcement and intelligence agencies to track the location of the user, according to U.S. intelligence sources." Random Number Generation Backdoor to Encryption keys, NSA, NIST

Wikipedia The Disruptive Technology Office (DTO) is a funding agency within the Intelligence Community. It was until recently known as Advanced Research and Development Activity (ARDA). ARDA was created in 1998 after the model of the Defense Advanced Research Projects Agency (DARPA) by theDirector of Central Intelligence and the Department of Defense, and took responsibility for funding some of DARPA's projects. ARDA evaluates proposals and funds speculative research, particularly in the fields of data mining, video processing, and quantum computing. There has been speculation that the DTO is continuing research efforts started under the Total Information Awareness program (TIA) in DARPA's Information Awareness Office (IAO). Data-mining activities within the US Department of Defense are controversial and have met with public and congressional disapproval. Although ARDA's budget is presumably classified as part of the intelligence budget, quoted an unnamed former government official saying the agency spent about $100 million a year in 2003. The Associated Press reports that ARDA had a staff of only eight in 2004. Headquartered at Fort George G. Meade in Maryland, site of the headquarters of the National Security Agency, ARDA/DTO has kept a low profile, quietly funding research of interest to the intelligence community. In December 2007, DTO was folded into the newly created IARPA 1] . A move to a research park near the University of Maryland, College Park was announced at about the same time 2] . Wikipedia Real ID The REAL ID Act of 2005, Pub.L. 109-13, 119 Stat. 302, enacted May 11, 2005, was an Act of Congress that modified U.S. federal law pertaining to security, authentication, and issuance procedures standards for the state driver's licenses and identification (ID) cards, as well as various immigration issues pertaining to terrorism. The law set forth certain requirements for state driver's licenses and ID cards to be accepted by the federal government for "official purposes", as defined by the Secretary of Homeland Security. The Secretary of Homeland Security has currently defined "official purposes" as presenting state driver's licenses and identification cards for boarding commercially operated airline flights and entering federal buildings and nuclear power plants. The REAL ID Act implements the following: Title II of the act establishes new federal standards for state-issued driver licenses and non-driver identification cards. Changing visa limits for temporary workers, nurses, and Australian citizens. Funding some reports and pilot projects related to border security. Introducing rules covering "delivery bonds" (similar to bail bonds but for aliens who have been released pending hearings). Updating and tightening the laws on application for asylum and deportation of aliens for terrorist activity. Waiving laws that interfere with construction of physical barriers at the borders. As of April 2, 2008, all 50 states have either applied for extensions of the original May 11, 2008 compliance deadline or received unsolicited extensions. 4] As of October 2009, 25 states have approved either resolutions or binding legislation not to participate in the program, and with President Obama's selection of Janet Napolitano (a prominent critic of the program) to head the Department of Homeland Security, the future of the law remains uncertain, 5] and bills have been introduced into Congress to amend or repeal it. 6] The most recent of these, dubbed PASS ID, would eliminate many of the more burdensome technological requirements but still require states to meet federal standards in order to have their ID cards accepted by federal agencies. Wired Random numbers are critical for : for encryption keys, random authentication challenges, initialization vectors, nonces, key-agreement schemes, generating prime numbers and so on. Break the random-number generator, and most of the time you break the entire security system. Which is why you should worry about a new random- number standard that includes an algorithm that is slow, badly designed and just might contain a backdoor for the National Security Agency. Wikipedia NAIS The National Animal Identification System, (NAIS) is a government-run program in the United States intended to extend government animal health surveillance by identifying and tracking specific animals. Administered at the federal level by the Animal and Plant Health Inspection Service, a branch of the United States Department of Agriculture, NAIS will also be overseen by state animal health boards. While the federal program is voluntary, money received by some states, 2] tribes, and non-profit entities from the USDA through cooperative agreements has been used to make parts or all of the program mandatory. Critics claim the system will put small farmers out of business, by requiring that farmers pay the cost of registration devices of between $1 and $20 for each animal. Large, corporate factory farms which are connected to vertically integrated, birth-to-death factory systems ID and pay by the herd (and not the individual animal), while small farmers must pay it for each animal. Finally, fears persist about plans to make NAIS mandatory on the federal level, which would threaten the religious freedom of those who believe that making a “mark” is sinful, such as the Amish. The Amish also object to the use of electronic devices such as microchips. 24] If microchip implants were required, as has been proposed in a 2004 report by the United States Animal Health Association’s Committee on Livestock Identification, it would also violate the rights of those who believe that this practice is morally wrong. PressTV U.S. companies are involved in providing technology that helps the Egyptian government to crack down on communications and monitor protestors on the Internet and mobile phones. ... A U.S. company appears to have sold Egypt technology to monitor Internet and mobile phone traffic that is possibly being used by the ruling regime to crack down on communications as protests erupt throughout the country. ... Boeing-owned, California-based company Narus sold Telecom Egypt, the state-run Internet service provider, "real-time traffic intelligence" equipment, more commonly known as Deep Packet Inspection (DPI) technology. Common Dreams ,,, HIGHLIGHTS The company is also known for creating "NarusInsight," a supercomputer system allegedly used by US' National Security Agency and other entities to perform and monitoring of public and corporate Internet communications in real time. Common Dreams ... Telecom Egypt, the nation's dominant phone and Internet service provider, is a state-run enterprise, which made it easy on Friday morning for authorities to pull the plug and plunge much of the nation into digital darkness. .... Narus provides Egypt Telecom with Deep Packet Inspection equipment (DPI), a content-filtering technology that allows network managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers on the information superhighway. ... "Anything that comes through (an Internet protocol network), we can record," Steve Bannerman, Narus' marketing vice president, once boasted to Wired about the service. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls.” ... Earlier this week, Secretary of State Hillary Clinton urged Egypt's government "not to prevent peaceful protests or block communications, including on social media.” Huffington Post .... FACTS & FIGURES Narus, now owned by Boeing, was founded in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and large corporate clients. ... In addition to Narus, there are a number of companies, including many others in the United States, that produce and traffic in similar spying and control technology: Zeugma Systems (Canada), Camiant (USA), Procera Networks (USA), Allot (Israel), Ixia (USA), Advanced IO (Canada) and Sandvine (Canada), among others. ... When commercial network operators use DPI, the privacy of Internet users is compromised. But in government hands, the use of DPI can crush dissent and lead to human rights violations. ... Virtually all internet access in Egypt is cut off as the government battles to contain the street protests that threaten to topple President Hosni Mubarak. Telegraph HJ/KA/DB... more search terms: Egypt, Elbaradai, Tunisia, Algeria, Tunisia, protest, regime change, WMR "January 30-February 1, 2009 -- Stellar Wind blows Democratic governors out of office WMR has previously reported on the malfeasance of the U.S. Attorney for Northern Illinois, Patrick Fitzgerald, in his investigation of the 1993 World Trade Center bombing and the outing of CIA covert agent Valerie Plame Wilson. In the case of the 1993 attack, Fitzgerald sat on critical (SIGINT) evidence that would have tied the bombing to Osama bin Laden in exile in Sudan. Bin Laden remained a U.S.

http://www.newsfollowup.com/dom_spy_agncy2.htm[5/28/2014 5:47:55 PM] 150+ methods listed -- US Gov Surveillance / Big Brother

intelligence asset at the time of the World Trade Center bombing so Fitzgerald, following orders from Langley, simply failed to enter into evidence wiretaps communications between the Sudanese Mission to the United Nations in New York and the Sudanese Foreign Ministry in Khartoum that contained references to Bin Laden. In the outing of Plame, Fitzgerald refused to enter as evidence tapped phone calls of Vice President Dick Cheney's Chief of Staff I. Lewis "Scooter" Libby and others that would have proven the severe damage of Libby's actions to the covert counter-proliferation operation involving Plame and her Brewster Jennings & Associates cover firm. Fitzgerald's actions in covering up the World Trade Center link to Sudan and Bin Laden was so significant that Libby's New York Times interlocutor, Judith Miller, once asked this editor for my sources on the Sudanese wiretap story. I told her that one was well known, the late ABC News reporter John McWethy had reported on the Sudan UN mission wiretaps by the National Security Agency (NSA) in 1993. The other, a confidential source in Khartoum, remains confidential. McWethy died in a February 2008 skiing accident in Colorado. full story Wikipedia Stellar Wind Stellar Wind is the open secret code name for certain information collection activities performed by the United States' National Security Agency and revealed by Thomas M. Tamm to New York Times reporters and Eric Lichtblau. 1] The operation was approved by President George W. Bush shortly after the in 2001. 2] The program's activities involve data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity. 1] There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants. 3] In March 2004, the Justice Department under Attorney General John Ashcroft ruled that the program was illegal. The day after the ruling, Ashcroft became critically ill with acute pancreatitis. President Bush sent White House counsel Alberto Gonzales and Chief of Staff Andrew Card, Jr. to Ashcroft's hospital bed, where Ashcroft lay semiconscious, to request that he sign a document reversing the Justice Department's ruling. However, Ashcroft was incapable of signing the document. Bush then reauthorized the operation, over formal Justice Department objections. Federal Bureau of Investigation (FBI) director Robert Mueller, Acting Attorney General James Comey, and many prominent members of the Justice Department were prepared to resign over the matter. Valerie Caproni the FBI general counsel, said, "From my perspective, there was a very real likelihood of a collapse of government." Bush subsequently reversed the authorization. 2] During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as "pizza cases" because many seemingly suspicious cases turned out to be food takeout orders. Approximately 99 percent of the cases led nowhere, but 1 percent bore fruit. 2] One of the known uses of these data were the creation of suspicious activity reports, or "SARS", about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Elliot Spitzer's use of prostitutes, even though he was not suspected of terrorist activities. 1] In March 2012 Wired Magazine published "The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)" talking about a new NSA facility and says "For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail." Naming the official William Binney a former NSA code breaker. Binney goes on to say that the NSA has highly secured rooms that tap into major switches, and satellite communications at AT&T and Verizon both. 4] The article suggests that the otherwise dispatched Stellar Wind is actually an active program. WMR Bush / Clinton complicity in NSA illegal wiretapping. A problem for Hillary? ... 1999 docs show NSA and Clinton White House hiding information about Foreign Intelligence Surveillance Act (FISA) compliance. Illegal request for NSA wiretapping made in February 27, 2001 meeting ... Nacchio refused, then indicted for insider stock trading... 10th Circuit Court of Appeals, (they're all crooks?). search terms: AT&T switching center, Folsom Street, San Francisco, 4ESS equipment, (), see HPSCI, Porter Goss, attorney client privilege, Executive Order 12333, all concerning hiding documents referring to legality of NSA activities, ... and Wilma A. Lewis, Mark

Nagle, Marina Utgoff Braswell, Electronic Privacy Information Center, (Civil No. 99-3197 PLF), information withheld from FOIA, domestic wiretapping full story

Economist "Security experts reckon the latest technology can detect hostile intentions before something bad happens. Unless it is perfect, though, that may be bad in itself ... MONITORING surveillance cameras is tedious work. Even if you are concentrating, identifying suspicious behaviour is hard. Suppose a nondescript man descends to a subway platform several times over the course of a few days without getting on a train. Is that suspicious? Possibly. Is the average security guard going to notice? Probably not. A good example, then—if a fictional one—of why many people would like to develop intelligent computerised surveillance systems. ... The perceived need for such systems is stimulating the development of devices that can both recognise people and objects and also detect suspicious behaviour. Much of this technology remains, for the moment, in laboratories. But Charles Cohen, the boss of Cybernet Systems, a firm based in Ann Arbor, Michigan, which is working for America’s Army Research Laboratory, says behaviour-recognition systems are getting good, and are already deployed at some security checkpoints" According to Associated Press, the director of CIA's Open Source Intelligence, Doug Naquin, admitted the existence of a secret facility and a team of operatives for exclusive monitoring of social networks such as Facebook and Twitter. But I've found evidence pointing out that these online

communities might actually have been created by CIA for data mining and COINTELPRO operations on the internet. Hosted FEMA Concentration Camp, Beech Grove, Indiana YouTube & Google Map: Emerson Ave, Beech Grove, Indiana and lists Domestic Spying, FBI, AT&T page Prodigal email, im, text scanning Darpa

Domestic Spying News top

PROGRESSIVE REFERENCE CONSERVATIVE 1%* 9/11 Citizens Watch challenging the official story of Guardian.UK weblogs ABC News Disney 9/11 Global News Headlines, GreenPeace mail list American Zionist Information Network 911Dosier.co.uk last update 2004. Global Witness Corruption watchdog CDI Center for Defense Information headlines ACLU Internet Democracy Project ACLU, EPIC, CPSR DARPA Defense Advanced Research Projects Agency AfroCubaWeb Israeli actions in the Americas NSAWatch formerly EchelonWatch, resources, Defence-data.com The Agonist surveillance networks, documents. Defence-Aerospace American Free Press The Truth about 9/11, Israel... Pacific News, Pacific Pulse, Dept of Defense News transcripts, search Muqtada al- American Friends Service Committee search Project Censored undercovered news Sadr. Chalabi, Najaf, Anti-Imperialist News Service and archives, books Rocky Mountain News World news Defense Tech Telcos Deny NSA Ties - and Allowed to Big Class Action New class actions, search, info People for the American Way Lie? Center for Science in the Public Interest Privacy Watch, Cotse.net Internet Privacy Website, Family.org, Dobson Center for CooperativeResearch Civil liberty watchdog Homeland Security NCS Threat Advisory Civil Liberties Digest, Pacific News News, Pacific Salon Israeli art students, DEA, Amdocs searchable IT Security Encyclopedia of Computer Security News file Jihad Unspun war on terrorism, Bush CounterPunch Ashcroft turned down request to search Total Information Awareness Resource Center Institute for Advanced Strategic & Political Studies and Moussaoui computer World Socialist Web Site search Hebrew site Center for Democracy and Technology, domestic ZDNet, UK news National Communications System, US Threat Advisory spying watch .. NewsMax

http://www.newsfollowup.com/dom_spy_agncy2.htm[5/28/2014 5:47:55 PM] 150+ methods listed -- US Gov Surveillance / Big Brother

Center for Democratic Communications National .Reference Mathaba search content based billing, VOIP blocking Lawyers Guild CBS down New York Times NSA executive order authorizing data CICenter Counterintelligence, NGO, UK C/Net downloads, spyware mining of phone calls and file Dec 16, 2005 ClassActionAmerica Freedom of Information Center Univ of Missouri, North Carolina Consortium of Internet Service Coalition for Global Solidarity News links news Providers legislation page Common Cause Soft Money issues, govt watchdog Findlaw, Dean Online Republican Activist Consortium News watchdog Info / Law, Harvard Blog filtering, modes of internet Political USA Chicago sun-times Consumer Action covering banking, credit, privacy, regulation: code, law, markets, and social norms PR Newswire business news distribution insurance, HMO's. in English, Chinese, and Spanish. LINKS Regulatory News Converge Digest Consumers Union consumer advocate, watchdog, IT-Analysis internet news analysis, research Senate Republican Conference news Legal News Search search Washington Times CorpWatch, news, Holding corporations accountable LexisNexis online legal, news and business info U.S. Department of Justice Civil Rights Division Cryptorights.org human rights for security workers. services U.S. Commission on Civil Rights Chairperson of the SF MSNBC VOIP Blocking Commission on Civil Rights Earthrights International the power of law, people in OpenNet Initiative, search Narus Washington Institute for Near East Policy US defense of human rights Privacy Digest, news ZOA press releases Electronic Frontier Foundation working to protect PrivacyToday news civil and free speech Rumormill News Enduring Freedoms, pressroom, Reporters Without Science Daily news Borders Silicon Valley blog news, Good Morning Silicon EndoftheAmericanDream 14 Incredibly Creepy Valley Surveillance Technologies That Big Brother Will Be Using To Spy On You USA Today NSA has massive database of Americans' phone calls FAS Secrecy News Wired News, FattyBoomBatty, news, Echelon, Big Brother FindLaw News Freedom of Information Center Univ of Missouri, news Free Expression Network Government Accountability Project News, Green Party News circulator

ARPA, IARPA, Advanced Research and Development Activity Office top PROGRESSIVE REFERENCE CONSERVATIVE 1%* ACLU objects to CDC Center for Disease Control and Prevention. Biowatch, CAPPS, no due process, Dept of Health and Human Services. detect biological easily circumvented. PrivacyDigest privacy news warfare threats. Electronic Frontier Softswitch.org to develop universal communications solutions over packet-based voice, data and video. fear Bush. Foundation working to TechDirt William Binney Dept of Health protect civil and free and Human Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter. speech & lawsuit Services. EndoftheAmericanDream Dept of 14 Incredibly Creepy Homeland Surveillance Security Technologies That Big domestic spying Brother Will Be Using New York To Spy On You Times NSA Epic Electronic Privacy executive order Information Center authorizing data mining of phone calls and file. Virage Inc Video analysis and contact extraction. Part of the Autonomy Group

Amdocs, Israel, Narus-Boeing top PROGRESSIVE REFERENCE CONSERVATIVE 1%* ACLU and NSA lawsuit C/Net downloads Amdocs search Narus Cryptome search Narus spy Findlaw NSA American National Union Should Hayden be confirmed DailyKOS EFF lawsuit, nationwide class action, Eric Umansky or court-martialed AT&T Technician stepped forward to disclose Findlaw, Dean Comverse and Information Clearing House Carl installation of NSA equipment (Narus ST-6400) in Hoover's Narus Cameron report and see CALEA San Francisco trunk facility, NarusInsight Liquid Matrix China asks Narus for tech to block Comverse CEO resigns amid options probe, MORE EFF State Secrets Act invoked on wiretapping VOIP calls. below lawsuit. National Security Agency EFF State Secrets Act invoked on wiretapping Center for Strategic and International Cryptome search Narus spy lawsuit. National Security Agency Defense Tech Telcos Deny NSA Ties - and Allowed to DailyKOS EFF lawsuit, nationwide class action, TechDirt William Binney Lie? AT&T Technician stepped forward to disclose Wired search Narus, Amdocs FCC, won't investigate warrantless wiretapping because installation of NSA equipment (Narus ST-6400) in

http://www.newsfollowup.com/dom_spy_agncy2.htm[5/28/2014 5:47:55 PM] 150+ methods listed -- US Gov Surveillance / Big Brother

Notes, search terms, EFF lawsuit against AT&T Bush effectively used the State Secrets defense to shut San Francisco trunk facility, NarusInsight over their secret work with NSA, ST-6400, content them down. Moon of Alabama search terms: CDR, call detail triggers, Narus Insight, Ori Cohen, VDONet, JP Narus see Pen-Link, Man-tech, Verisign, Datacraft, records, usage behavior, mortgate data, credit card Morgan Partners, Mayfied, NeoCarta, Presidio Giza Systems. data, addresses, names, NSA took over Total Venture Partners, Walden International, Intel, NTT Narus Partners see Pen-Link, Man-tech, Verisign, Information Awareness Project, if you're against Bush Software, Sumisho Electronics, William P. Crowell, Datacraft, Giza Systems...more are you a terrorist? Datamining, small groups, false Schema-Root AIPAC, Weisman, search Rosen Republicans who are against Bush spying are an tips, Franklin, irrelevant impotent and small group. NoGW CIA Schneier search terms: Operation Shamrock, FISA, New York Times NSA executive order authorizing Scoop ISP, black box, NARUS, Model ST-6400, FISC, and:legal links data mining of phone calls and file Dec 16, 2005 Notes, search terms: internet protocol Detail Record, New York Times NSA executive order authorizing Narus Board of Directors Notes on Narus: Narus is a analyzes data 'meaning' impeach bush data mining of phone calls and file Dec 16, 2005 private company founded in 1997 by Ori Cohen, was Serendipity: Timeline of CIA atrocities, School of the Wired stepped forward to disclose installation of in charge of tech development for VDONet, media Americas, NSA equipment (Narus ST-6400) in San Francisco streaming pioneer. It has venture funding from trunk facility, NarusInsight investors including JP Morgan Partners, Mayfield, NeoCarta, Presidio Venture Partners, Walden Notes, search terms: internet protocol Detail Record, International, Intel, NTT Software and Sumisho analyzes data 'meaning', voice recognition, business Electronics cards, social network analysis,

WMR At first blush, the recent adoption by the House of Representatives of the Foreign Intelligence Surveillance Act Amendments Act, which gives telecommunications companies that illegally eavesdropped on the telephone conversations, faxes, text messages, and emails of Americans retroactive immunity from lawsuits from privacy-violated and aggrieved customers, would see to have little to do with the powerful American Israel Public Affairs Committee (AIPAC). ... However, the support for the bill by AIPAC's biggest boosters, including House Majority Leader Steny Hoyer of Maryland, whose sister, Bernice Manocherian, was an executive president of AIPAC, and Jane Harman, who was slated to become chair of the House Permanent Select Committee on Intelligence (HPSCI) but whose nomination was nixed by Speaker Nancy Pelosi after a Justice Department investigation of Harman's contacts with AIPAC .... To ensure a lock on the no retroactive lawsuit provisions, the man who became HPSCI chair, Sylvestre Reyes, supported the measure. He was joined by other AIPAC sure bets, including Brad Sherman (D-CA), Gary Ackerman (D-NY), Ellen Tauscher (D-CA), John Yarmuth (KY), Rahm Emanuel (D-IL), Jason Altmire (D-PA), and, for added measure Pelosi. full article

Apple, Iphone, Google Android top PROGRESSIVE REFERENCE CONSERVATIVE 1%* ACLU and NSA lawsuit Jurist University of Pittsburg, School of Law, AP NSA U.S. domestic wiretaps, using unnamed Electronic Frontier Foundation working to protect Primary sources. Global perspective American telecommunications companies..file civil and free speech & lawsuit Wikipedia NSA National Security Agency, AT&T lawsuit $200 billion Salon Israeli art students, DEA, Amdocs searchable warrantless wiretapping, administrative subpoena, CAMERA AP “Israeli spying” story an “Urban Myth” file National Security letter. according to Justice Department Dept of Homeland Security domestic spying Microsoft Seattle Times COFEE

Mobiledia Court Allows Phone Searches Without Warrants U.S. federal appeals court ruled certain forms of warrantless cell phone tracking do not violate Fourth Amendment laws, heating up the debate over consumer privacy on mobile devices ... The ruling covers an Indiana case where police officers tracked cell numbers of phones found at the scene of a drug bust. The judges in the appeal ruled that law enforcement's looking up the cell phone's number on the devices did not violate search and seizure laws. .. This ruling will likely be revisited, as an ongoing debate on how law enforcement treats mobile phone privacy in regards to criminal tracking and the Fourth Amendment heats up. Multiple cases are testing boundaries, and courts are issuing various rulings, drawing differing lines between what kinds of searches violate privacy protections. more

WMR April 22-24, 2011 -- I-Phone, Android back doors are courtesy of the NSA. ... News reports that Apple's I-Phone and I-Pads, as well as Google's Android operating system-enabled phones can track a user's location, as well as Internet activities, is nothing new, according to a well-placed intelligence source. In fact, the Apple and Google "spy ware" is courtesy of a deal struck with the U.S. National Security Agency (NSA), which is the ultimate recipient of the location and web data being collected by Apple and Google. ... NSA's aggressive insistence that it have "back door" access to state-of-the-art commercial communications products was on display in the 1990s when Britain's Ministry of Defense discovered eight different back doors installed in Windows 98 and subsequent releases of the operating system. Microsoft is a long-time partner of the NSA in ensuring that its products are accessible by the American eavesdropping agency. ... Although Britain's Government Communications Headquarters is a signals intelligence (SIGINT) partner of the NSA, a "rainbow team" representing computer security experts, drawn from multiple British government agencies. discovered the NSA back doors while conducting a security evaluation of Britain's latest tank battlefield system. While back engineering the Microsoft source code at their research facility at Farnborough, the team discovered the eight NSA back doors. ... Microsoft threatened legal action against the British government for what the firm considered to be the illegal examination of its source code. However, after the British government claimed Crown immunity and threatened to leak the information about the NSA back doors to the media, Microsoft backed down. Britain removed the eight back doors and was able to secure its tank and other battlefield systems from the NSA. ... Apple and Google, like Microsoft, have remained quiet about the surveillance capabilities of their products. WMR's intelligence source stresses that the silence from Apple and google is being directed by the actual developer of the surveillance back doors, the NSA. PakAlertPress CNN 2012 Under Apple's patent, a traveler's phone would automatically send electronic identification to a TSA agent as soon as the traveler gets in line. While each traveler waits in line, TSA agents would examine the electronic ID at an electronic viewing station. Next, at the X-ray stations, a traveler's phone would confirm to security agents that the traveler's ID had already been checked. Throughout the process, the phone photo could be displayed on a screen for comparison with the traveler. Facial recognition software could be included in the process. (See details on Apple's proposal in the photo gallery above.) The patent documents offer a surprising number of details which open doors to key questions about the system