More Documents Leaked: Obama Collecting List of Political Dissidents

anonymous_zps317d77e8[1]By: Susanne Posel,  Occupy Corporatism:

According to a Department of Homeland Security (DHS) informant “this administration is collecting names of sources, whistle blowers and their families, names of media sources and everybody they talk to and have talked to, and they already have a huge list. If you’re not working for MSNBC or CNN, you’re probably on that list. If you are a website owner with a brisk readership and a conservative bent, you’re on that list. It’s a political dissident list, not an enemy threat list.”

The hacktivist group Anonymous has released 13 documents related to PRISM that are classified from federal agencies like the Department of Defense (DoD).

The documents show that the DoD and the National Security Agency (NSA) have been collecting data on Americans for years.

Under the NetOps Strategic Vision , the federal government has been monitoring the internet through corporations such as Microsoft, Yahoo, Google and others.

According to Anonymous: “NetOps will transform along with the Global Information Grid to dynamically support new warfighting, intelligence, and business processes and enable users to access and share trusted information in a timely manner. The future Global Information Grid will result in a richer Net-Centric information environment comprised of shared services and capabilities based on advanced technologies.”

The document goes to say: “It will be heavily reliant on end-to-end virtual networks to interconnect anyone, anywhere, at any time with any type of information through voice, video, images, or text. It will also be faced with greater security threats that NetOps must help address.”

The DoD is expanding the control over a division referred to as the Global Information Grid (GiG).

GiG is tasked with providing “a supportive information environment wherein every user can obtain the information needed, when and where it is needed, even in unanticipated situations.”

Indeed, it is clear that the NSA has had direct access to Google, Facebook, Twitter, Apple and other internet giants for years; amassing a gigantic database of information on the American public.

The NSA describes GiG to the public as an apparatus that provides “the National Command Authority (NCA), warfighters, DoD personnel, Intelligence Community, business, policy-makers, and non-DoD users with information superiority, decision superiority, and full-spectrum dominance.”

The leaked document provides more detailed information about GiG’s purpose: “The GIG includes all owned and leased communications and computing systems and services, software (including applications), data, security services, and other associated services necessary to achieve Information Superiority. It also includes National Security Systems as defined in section 5142 of the Clinger-Cohen Act of 1996. The GIG supports all Department of Defense, National Security, and related Intelligence Community missions and functions (strategic, operational, tactical, and business), in war and in peace. The GIG provides capabilities from all operating locations (bases, posts, camps, stations, facilities, mobile platforms, and deployed sites). The GIG provides interfaces to coalition, allied, and non-DoD users and systems.”

Internet users have their every move on the internet traced. This includes search history, emails, file transfers, live chats, etc . . .

In 2007, PRISM began data mining. Some sources say that PRISM actually extends as far back as 2003.

Their first collaboration was with Microsoft and conducted surveillance operations under the guise of searching for terrorist activity or cyber espionage.

Using automated algorithms , the NSA or other federal agencies can search for clues as to the next possible terrorist plot.

The NSA and the Federal Bureau of Investigations (FBI) have been acquiring “extracting audio, video, photographs, emails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.”

All of the tech corporations that have been used by the NSA, FBI and DoD in conjunction with sharing private user information to create the surveillance network grid are denying that they knew why the information was being requested of them.

Larry Page, co-founder of Google said that “we have not joined any program that would give the US government – or any other government – direct access to our servers. Indeed, the US government does not have direct access or a ‘back door’ to the information stored in our data centers. We had not heard of a program called Prism until yesterday.”

Page goes on to explain: “We provide user data to governments only in accordance with the law. Our legal team reviews each and every request, and frequently pushes back when requests are overly broad or don’t follow the correct process.”

Mark Zuckerberg replied: “Facebook is not and has never been part of any program to give the US or any other government direct access to our servers. We have never received a blanket request or court order from any government agency asking for information or metadata in bulk, like the one Verizon reportedly received. And if we did, we would fight it aggressively. We hadn’t even heard of Prism before yesterday.”

Interestingly, upon close inspection of the denials from tech corporations, it appears that they do not deny that it is possible that the information they provided to the federal government may have been used in surveillance programs or for such purposes.

Under PRISM, these same corporations that deny knowledge or involvement in surveillance operations on the American public are listed with their entry date into the program as outlined in the leaked documents.

• 2008 – Yahoo • 2009 – Google, Facebook, Paltalk • 2010 – Youtube • 2011 – Skype, AOL • 2012 – Apple

In response to the leak, President Obama came out to publically endorse PRISM because it promotes public safety and protects of civil liberties.

Obama said that this “modest encroachment on privacy . . . helps us prevent terrorist attacks.”

According to the president Americans must accept this “trade-off” that creates balance between privacy and safety. He said: “Nobody is listening to your telephone calls. That’s not what this program is about. In the abstract you can complain about Big Brother and how this is a potential program run amok, but when you actually look at the details, I think we’ve struck the right balance. There are trade-offs involved.

In defense of unnecessary government surveillance on all Americans, Obama said: “You can’t have 100 percent security and also then have 100 percent privacy and zero inconvenience. We’re going to have to make some choices as a society.

Simply put, Obama explained that “if the intelligence community actually wants to listen to a phone call, they’ve got to go back to a federal judge.”


See original article here:

8 Comments on More Documents Leaked: Obama Collecting List of Political Dissidents

  1. At some point, the story above was ‘secret’ – in that it wasn’t finished, and wouldn’t be released until it was. You make a baseless assertion.

  2. None of the ’13 documents’ listed at the link are classified. You can find them with a Google search. The quotes in the article are directly from Wikipedia, not any ‘leaked document’.

    Stop spreading fear. Then I suspect this comment won’t pass ‘moderation’ either, being that it states actual facts.

  3. In October 2009, Google registered over 9.6 BILLION searches (on Google) from the US alone. That works out to about 320 million searches a day, or about 7300 searches a MINUTE. Since 2009, I’m sure the number has gone up. Now, imagine collecting this data, and associating the particulars with an individual…and that’s just Google. Telephone calls? There are six billion cell phone calls made a day in the US. You think that there’s enough staffing in ‘government’ to even think about this? We’re talking about bailing an ocean with a Solo cup.

    This article is nothing but a rehash of the original Guardian article (who’s information has come under question, both after denials by the companies supposedly ‘involved’ and for the remarkable lack of any mention of Twitter) with some quotes lifted directly from DoD websites referring to the ‘GIG’ as some sinister organization in a paranoiac knee-jerk…while completely ignoring the facts. The DoD communicates on computer networks; NetOps is Network Operations – the reference to this communication, and the defense of this communication so that everyday spies can’t get the plans for building a nuke. The information grid they work on is called the GIG.

    If the authors want to work on improving government, perhaps they could focus on the deadlock in Congress, and how absolutely NOTHING has been done since the Tea Party came in. No gun control, no jobs agenda, no budget, nothing on climate change, no tax reform, no immigration reform, no hike in the minimum wage. Lots of hearings on ‘scandals’ like this nonsense. The NSA has been trying for ‘information awareness’ since 2002 – and all they can do is create piles of data that nobody can examine until there’s a clue what to look for – after the fact. Boston alone clearly indicates that.

    Let’s focus on the problems – not on a vague idea that someone may be listening in on your phone call to your grandma.

  4. “We’re going to have to make some choices as a society”.. Obama
    I choose privacy. Victoria

2 Trackbacks & Pingbacks

  1. lunette ray ban
  2. louis vuitton outlet store

Leave a Reply

Your email address will not be published.