![]() |
well, defense against the subversion of the constitution is what checks and balances is all about, but never mind that quibble.
I think the core of this problem is a fattening and softening of American attitudes, BY DESIGN, by those who can profit from it, either by increasing their wealth or their power or both. By having unrealistic attitudes like "protect me from everything at all times" "be afraid of _________" "with us or agin us" repeatedly and relentlessly promoted, it gives ideas like this traction. Someone(s) will say, I can provide that protection, just sign here, or rather, look away while I "protect you" and by "protect you" I mean agglomerate more power and money to myself. THEY'RE culpable for two reasons, simple greed for money and power, and by mistrusting the toughness (indeed, breeding it out of our attitudes) and resilience of regular, civilian citizens. |
Amen, brother V.
|
|
|
The Drug Enforcement Administration has been the recipient of multiple tips from the NSA. DEA officials in a highly secret office called the Special Operations Division are assigned to handle these incoming tips, according to Reuters. Tips from the NSA are added to a DEA database that includes “intelligence intercepts, wiretaps, informants and a massive database of telephone records.” This is problematic because it appears to break down the barrier between foreign counter-terrorism investigations and ordinary domestic criminal investigations.
On and on... |
...along that line, here is a story about bank robbers, the FBI, and "tower dumps"
http://arstechnica.com/tech-policy/2...hy-it-matters/ Ars Technica Nate Anderson 8/29/13 How “cell tower dumps” caught the High Country Bandits—and why it matters Fishing expeditions can pay dividends—but do they need a warrant? Quote:
Quote:
|
Quote:
|
Don't worry about it... that was just a product placement ad.
|
1 Attachment(s)
Here is a new program published today ... a program called "HEMISPHERE"
It's not just cell phones... it's every call that goes through an AT&T "switch" NY Times SCOTT SHANE and COLIN MOYNIHAN 9/1/13 Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s Quote:
NY Times 9/1/13 Synopsis of the Hemisphere Project Quote:
|
It's almost(?) getting boring to see one article after another about the ubiquitous abuses by the NSA.
The last time I remember such a drip, drip, drip of exposés were the Watergate crimes of Richard Nixon. This 4 page article is based on the documents provided by Edward J. Snowden, and describes the front-door, back-door, and digital methods that NSA is using to decipher every coded message and to collect and store any/every message that the NSA, itself, decides. The NSA apparently asked the news media to NOT PUBLISH this article because it exposed things they wanted kept secret. In this article, the Times tells why they have gone ahead with publication. NY Times NICOLE PERLROTH, JEFF LARSON and SCOTT SHANE September 5, 2013 N.S.A. Foils Much Internet Encryption Quote:
|
This is a link to a "sister" article in The Guardian.
It gives a somewhat different perspective, and different details The Guardian James Ball, Julian Borger and Glenn Greenwald 9/5/13 US and UK spy agencies defeat privacy and security on the internet Quote:
|
It's not just the NSA that is trying to break codes...
US "drone attacks" may be vunerable to false GPS location signals, video transmissions, flight controls, etc. Washington Post Craig Whitlock and Barton Gellman 9/3/13 U.S. documents detail al-Qaeda’s efforts to fight back against drones Quote:
|
http://www.cellar.org/images/editor/menupop.gif
Some Dwellars may remember this post....
Quote:
Washington Post Ellen Nakashima 9/8/13 Obama administration had restrictions on NSA reversed in 2011 Quote:
|
The Black Budget
Let's play the reallocation game! What would you do with $52.6 Billion a year that have demonstrably made us less free and likely less safe? Education, science research, space exploration, roads and bridges,...
|
The beat goes on...monotonously and sadly
This article refers to NSA's collection and use of emails, social media, etc., to link people to others, who travels with whom, where they go. Washington Post Ellen Nakashima 9/28/13 NSA said to be studying some Americans’ social connections using e-mail, call data Quote:
|
All times are GMT -5. The time now is 06:56 PM. |
Powered by: vBulletin Version 3.8.1
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.