Posts Tagged ‘privacy’

The Kassandra Project

In the newest installment of U.S. liberty deprivation chronicles, we learn that the fearless Bush-bot police state goon, Department of Homeland (in)Security Secretary Michael Chertoff, is scoffing at our elected congressional leaders who want to protect the U.S. Constitution and our fundamental right to privacy. If you need a source, here it is.

The Bush administration said yesterday that it plans to start using the nation’s most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea’s legal authority.

Homeland Security Secretary Michael Chertoff said his department will activate his department’s new domestic satellite surveillance office in stages, starting as soon as possible with traditional scientific and homeland security activities — such as tracking hurricane damage, monitoring climate change and creating terrain maps.

Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. The department has previously said the program will not intercept communications.

The DHS lied then, and the DHS is lying now. Internet and telephonic communications are routinely surveilled by our big brother in the sky, the NSA. They have a backdoor key into your Windows OS, they vacuum your private phone conversations and e-mails into their data-mining programs, and they scoff at your constitutionally protected right to privacy – all without a constitutionally required warrant. They wield an ax of information gathering power that you cannot fathom, but blithely assure you that there is no reason for concern.

“There is no basis to suggest that this process is in any way insufficient to protect the privacy and civil liberties of Americans,” Chertoff wrote to Reps. Bennie G. Thompson (D-Miss.) and Jane Harman (D-Calif.), chairmen of the House Homeland Security Committee and its intelligence subcommittee, respectively, in letters released yesterday.

“I think we’ve fully addressed anybody’s concerns,” Chertoff added in remarks last week to bloggers. “I think the way is now clear to stand it up and go warm on it.”

No Mikey, you haven’t addressed my concerns in the least. Your presumptive arrogance and unconstitutional Stasi-esque police state tactics instill great fear in my liberty-loving heart. You are a NAZI, you are a jack-booted thug, you are a little man with a high-ranking office, but in the end, you will be denied the ability to subvert the Law of the Land.

Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified (black budget ops). Congress barred Homeland Security from funding the office until its investigators could review the office’s operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate.

“I have had a firsthand experience with the trust-me theory of law from this administration,” said Harman, citing the 2005 disclosure of the National Security Agency‘s domestic spying program, which included warrantless eavesdropping on calls and e-mails between people in the United States and overseas. “I won’t make the same mistake. . . . I want to see the legal underpinnings for the whole program.”

Thompson called DHS’s release Thursday of the office’s procedures and a civil liberties impact assessment “a good start.” But, he said, “We still don’t know whether the NAO will pass constitutional muster since no legal framework has been provided.”

DHS officials said the demands are unwarranted. “The legal framework that governs the National Applications Office . . . is reflected in the Constitution, the U.S. Code and all other U.S. laws,” said DHS spokeswoman Laura Keehner. She said its operations will be subject to “robust,” structured legal scrutiny by multiple agencies.

DHS spokesowman Laura Keehner is a hired hack and full of the solid excrement that is expelled from a male cow. Your tax dollars pay for her rent, her car note, her groceries, and her D-size battery required clitoral sexual stimulation devices. She, like Uncle Mikey, ultimately answer to the little people. Hired executive agency hacks will wither away and be forgotten when they are no longer tolerable. Our goal as freedom lovers is to hasten their obsolescence.

Now it is 1984
Knock-knock at your front door
It’s the suede/denim secret police
They have come for your uncool niece

Come quietly to the camp
You’d look nice as a drawstring lamp
Don’t you worry, it’s only a shower
For your clothes here’s a pretty flower
~ Dead Kennedys “California Uber Alles”

Share Kassandra Project feed:Subscribe Kassandra Project

The Kassandra Project

, , , , , , ,

Advertisements

The Kassandra Project

Your Brain On Government Privacy Invasion

The following information was evidence provided in a civil suit against the federal government in the case Akwei v. NSA (92-0449). John St. Clair Akwei is a former National Security Agency employee and whistle-blower who exposed the use of neural monitoring to spy on individuals. The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies.

(Source)

How The National Security Agency (NSA) Illegally And Unconstitutionally Harasses Law-Abiding Americans Everyday. How, you ask? Quite simply, actually. It’s done by EMF or ELF Radio Waves, and a technology known as “Remote Neural Monitoring”. Haven’t you ever wondered about that ringing in your left ear? Well, here are the reason(s). And just why should the NSA do this, you ask? To silence any who who dare to speak out against them or any other agency, or the Government or simply to think for themselves, and “outside the box”, if you will. Think not? Then, read on……….

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960’s. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

NSA’s domestic electronic surveillance network

As of the early 1960’s the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs. With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare. Radio and Television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals Intelligence (SIGINT) mission.

Detecting EMF Fields in Humans for Surveillance.

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.” Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret. The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control. Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields. The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwatt electro-magnetic emissions from the brain. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.” Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain. NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level). EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control. Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. An example of EMF Brain Stimulation:

Brain Area Bioelectric Resonance Frequency Information Induced Through Modulation
Motor Control Cortex 10 HZ Motor Impulse Co-ordination
Auditory Cortex 15 HZ Sound which bypasses the ears
Visual Cortex 25 HZ Images in the brain, bypassing the eyes
Somatosensory Cortex 09 HZ Phantom Touch Sense
Thought Center 20 HZ Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived. The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years. The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere in the country. A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM Devices

a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send messages through the nervous system to affect their performance.
b) [Information missing from original]
c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment is on a network and is used for domestic intelligence operations, government security, and military base security, and in case of bioelectric warfare.

Spotters and Walk-Bys in Metropolitan Areas

a) Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.
b) Agents working out of offices can be in constant communication with Spotters who are keeping track of the NSA’s thousands of subjects in public.
c) NSA Agents in remote offices can instantly identify (using RNM) any individual spotted in public whom is in contact with surveillance subject.

Chemicals and Drugs into Residential Buildings with hidden NSA-lnstalled and maintained plastic plumbing lines.

a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharmapsychology.

Brief Overview of Proprietary U.S. Intelligence/Anti-Terrorist Equipment Mentioned.

Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.
EMF equipment that gathers information from PC circuit boards by deciphering RF emissions thereby gaining wireless modem-style entry into any personal computer in the country.
All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).
Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980’s.

“We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times: where there are no secrets from the government” ~ William O. Douglas (U.S. Supreme Court Justice)

Share Kassandra Project feed:Subscribe Kassandra Project

The Kassandra Project

, , , , , , , , ,

The Kassandra Project

all-seeing-eye.jpg

Here is yet another news article that details how the government is doing grave violence to the U.S. Constitution and individual liberty. By incrementally eroding your rights (i.e. the fundamental right to privacy), the government is breathing life into George W. Bush’s famous words – “[S]top throwing the Constitution in my face, it’s just a goddamned piece of paper! (source)

Intelligence centers run by states across the country have access to personal information about millions of Americans, including unlisted cellphone numbers, insurance claims, driver’s license photographs and credit reports, according to a document obtained by The Washington Post. One center also has access to top-secret data systems at the CIA, the document shows, though it’s not clear what information those systems contain.

Through MSM articles detailing the daily assault on your individual rights, the feds seek to reduce your expectation of privacy. Their agenda is deliberate, and rooted in Supreme Court jurisprudence. In Katz vs. United States, so long as an individual can justifiably expect that his conversation would remain private, his/her conversation is protected from “unreasonable search and seizure” by the Fourth Amendment.

As articulated in Katz, The Fourth Amendment has a subjective component. The individual must personally expect that his communications would remain private. By slow-dripping news stories detailing the government’s Fourth Amendment violations, you become accustomed to their snooping into your private affairs. By beating down your expectations of privacy, the government’s goal is to deprive you of any legal claim against their Big Brother intrusions.

The full frontal attack on the individual expectation of privacy has an aggregate effect in the long run. The continual bombardment on your individual rights, coupled with the media’s dutiful reporting on these violations, will numb you to your loss of liberty. It is your obligation to keep them in check.

Dozens of the organizations known as fusion centers were created after the Sept. 11, 2001, terrorist attacks to identify potential threats and improve the way information is shared.Though officials have publicly discussed the fusion centers’ importance to national security, they have generally declined to elaborate on the centers’ activities. But a document that lists resources used by the fusion centers shows how a dozen of the organizations in the northeastern United States rely far more on access to commercial and government databases than had previously been disclosed.

Since 9-11, the federal government has consistently relied on third-party contractors to do their dirty work (i.e., Haliburton, Blackwater, and Applied Research Associates, Inc.). Given that they are not formal government entities, it is difficult to hold the government accountable for their violations. One such company, Entersect, calls itself:

[t]he silent partner to municipal, county, state, and federal justice agencies who access our databases every day to locate subjects, develop background information, secure information from a cellular or unlisted number, and much more.

The state has an insatiable hunger for information about the serfs in its feudal pen. 9-11 was the predicate event that they desperately needed to justify surveillance of your communications and movements. When are we finally going to feel safe?

“There is never ever enough information when it comes to terrorism” said Maj. Steven G. O’Donnell, deputy superintendent of the Rhode Island State Police. “That’s what post-9/11 is about.”

Should we be concerned about the wide-spread abuse of civil liberties and privacy in the post-9/11 era? Let us see what the experts think.

“Fusion centers have grown, really, off the radar screen of public accountability,” said Jim Dempsey, vice president for public policy at the Center for Democracy and Technology, a nonpartisan watchdog group in the District. “Congress and the state legislatures need to get a handle over what is going on at all these fusion centers.”

From 2004 to 2007, state and local governments received $254 million from the Department of Homeland Security in support of the centers, which are also supported by employees of the FBI and other federal law enforcement agencies. In some cases, they work with the U.S. Northern Command, the Pentagon operation involved in homeland security.

Well at least somebody is making money off our fears. That will help to grow the economy and vault us out of the impending depression, right? Should we not question our government and their motives? Whenever men organize, collude, and conspire in positions of power, they surely must have the little people’s best interests at heart, I promise you.

Hilarious quote of the day:

I don’t want to suggest we are going to sit on the internet and watch what everyone does ~ Michael Chertoff (Secretary of Homeland Security)

Share Kassandra Project feed:Subscribe Kassandra Project

The Kassandra Project

, , , , , , , , , , , , , , ,