Dating back to the 1980s and known to government insiders as “Main Core,” the database reportedly collects and stores — without warrants or court orders — the names and detailed data of Americans considered to be threats to national security. According to several former U.S. government officials with extensive knowledge of intelligence operations, Main Core in its current incarnation apparently contains a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies. One former intelligence official described Main Core as “an emergency internal security database system” designed for use by the military in the event of a national catastrophe, a suspension of the Constitution or the imposition of martial law. …
This stuff is absolutely chilling.
And there have been hints that such a list still exists today.
For example, the testimony of an anonymous government insider that was recently posted on shtfplan.com alluded to such a list…
“We know all this already,” I stated. He looked at me, giving me a look like I’ve never seen, and actually pushed his finger into my chest. “You don’t know jack,” he said, “this is bigger than you can imagine, bigger than anyone can imagine. This administration is collecting names of sources, whistle blowers and their families, names of media sources and everybody they talk to and have talked to, and they already have a huge list. If you’re not working for MSNBC or CNN, you’re probably on that list. If you are a website owner with a brisk readership and a conservative bent, you’re on that list. It’s a political dissident list, not an enemy threat list,” he stated….
They had to come up with a new database name to distinguish it from their database of CIA run fundamentalist islamic paramilitaries (Al Qaeda).
The U.S. House of Representatives voted again Thursday to allow the indefinite military detention of Americans, blocking an amendment that would have barred the possibility.
Congress wrote that authority into law in the National Defense Authorization Act two years ago, prompting outrage from civil libertarians on the left and right. President Barack Obama signed the measure, but insisted his administration would never use it.
Former French Foreign Minister Roland Dumas said that Britain had been preparing gunmen to invade Syria two years before the crisis there flared up in 2011.During a TV show, Dumas said ”I was in Britain two years ago, and I met British officials, some my friends…they admitted that they were up to something in Syria.”
”They even asked me to join them in my capacity as a foreign minister, but I declined,” he added.
He indicated that the plan of striking Syria had been prepared in advance long before the 2011 events, adding that the goal was to overthrow the Syrian government that considers Israel an enemy.
The TV show was dedicated to discussing the war in Syria.
French magazine: ‘Jihadists’ involvement in Syria much bigger than Afghanistan
The French magazine “Le Nouvel Observateur” quoted a senior French official as saying that the participation of French Jihadists in Syria is bigger that their involvement in Afghanistan war.
The French magazine said that the French intelligence verified the identities of 270 French nationals who are fighting in Syria, indicating that their return has become a major concern for the French interior ministry.
The magazine said that the number of European ‘Jihadists’ fighting in Syria ranges between 1,500 and 2,000, in addition to hundreds of Tunisians.
The NSA surveillance program that harvests everyone’s data can be very useful in building a terrorist profile. Thanks to data-mining, the authorities could be tipped off to an individual who makes telephone calls to a Muslim from Somalia. This person also regularly makes and receives phone calls from a convicted felon in the United States and is in Facebook communication with a Pakistani known to be interested in aviation. The subject also attended school with a close relative of a well-known Saudi arms dealer and has recently made purchases of fertilizer within the United States. Clearly, the metadata indicates this person warrants further investigation.
This person is me.
That’s just the tip of the iceberg when it comes to my suspicious metadata, I imagine. I’ll release more as the days progress, and I won’t even make you go to Hong Kong and look for a guy with a Rubik’s Cube. I have had run-ins with the authorities and have even received official notice of being a “scofflaw.” (True, though sadly, I seem to have lost the written evidence of being deemed an official scofflaw.)
This NSA surveillance story is amazing, and is thankfully shining a bright light on abuses and overreach within the government. Kind of funny that my earlier prediction turned out so completely wrong, thanks to Edward Snowden. Clearly, Snuggly has enough material for a year’s worth of cartoons.
Let Snuggly the Security Bear and I know what you think, and be sure to comment and share the cartoon.
The National Security Agency has acknowledged in a new classified briefing that it does not need court authorization to listen to domestic phone calls.
Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed “simply based on an analyst deciding that.”
If the NSA wants “to listen to the phone,” an analyst’s decision is sufficient, without any other legal authorization required, Nadler said he learned. “I was rather startled,” said Nadler, an attorney and congressman who serves on the House Judiciary committee…
Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said. [We documented Tuesday that the government is illegally spying on all Americans … and then giving the info to giant corporations.]
These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden ….
Makers of hardware and software, banks, Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some cases, the information gathered may be used not just to defend the nation but to help infiltrate computers of its adversaries.
Along with the NSA, the Central Intelligence Agency, the Federal Bureau of Investigation and branches of the U.S. military have agreements with such companies to gather data that might seem innocuous but could be highly useful in the hands of U.S. intelligence or cyber warfare units, according to the people, who have either worked for the government or are in companies that have these accords….
The information provided by Snowden also exposed a secret NSA program known as Blarney. As the program was described in the Washington Post (WPO), the agency gathers metadata on computers and devices that are used to send e-mails or browse the Internet through principal data routes, known as a backbone.
That metadata includes which version of the operating system, browser and Java software are being used on millions of devices around the world, information that U.S. spy agencies could use to infiltrate those computers or phones and spy on their users.
“It’s highly offensive information,” said Glenn Chisholm, the former chief information officer for Telstra Corp (TLS)., one of Australia’s largest telecommunications companies, contrasting it to defensive information used to protect computers rather than infiltrate them….
WARNING: The National Security Agency is likely recording and storing this communication as part of its unlawful spying programs on all Americans … and people worldwide. The people who created the NSA spying program say that this communication – and any responses – can and will be used against the American people at any time in the future should folks in government decide to go after us for political reasons. And private information in digital communications may be given to big companies by the government.
I put this in the “genocide/democide” category due to the utility of this program in carrying out an orderly extermination of “undesireables,” which would include pretty much everyone with an independent thought in his/her head. Dissolution of national boundaries (the “north american union” for instance) requires an erasure of the historical knowledge that gives rise to national identity. No wonder the secret government supported the khmer rouge experiment in cambodia. They want to start with a clean slate. A lobotomy of human history and civilization is what they’re preparing for. Why not? Obviously they can afford it as long as we believe their funny money has value. They’re only taking possession of what we’ve voluntarily given them by borrowing our entire economy into existence.