#SIGINT USSR
Explore tagged Tumblr posts
nnn-lll-nnn · 1 month ago
Text
EFFICACY TESTING / L;4 TESTING...
#0-_)#&")_-#-$&$-$&$-_-#:"-#:':$/$)"&#+'-#(_&)#_/#&(_-#-$-&'//'/'/'/'/'/'/'/'/'/'/'/:/'/'/'//'&2-$-_+_-#+-_/#(_-$
-$"(&#kJK-$)'- lpop NMRN&3!_;#)'+#)'-#(&")#&$("&#($+@($+(#&$+#($&#(#*-#($;(#&$-$&$!$&(#&$(#&$)#&$($-
</>
NULL EINS SECHS VIER DREI SIEBEN ACHT NEUN NULL EINS NULL ZWEI SECHS SECHS SECHS SECHS SECHS SECHS SECHS SECHS SECHS SECHS ACHT NEUN NULL EINS FÜNF EINS VIER SIEBEN FÜNF NEUN NEUN NEUN NEUN DREI
/BREAK/
$-&)
</>(unorganized format runback dtn)$-_+$:$::::::://///
</>
.-- .... .. - . -... .-.. .- -.-. -.- -... .-.. .- -.-. -.- -... .-.. .- -.-. -.- .-- .... .. - . .-- .... .. - . .-- .... .. - . .-- .... .. - . -... .-.. .- -.-. -.- .-- .... .. - . -... .-.. .- -.-. -.- .-- .... .. - . .-- .... .. - . .-- .... .. - . .-- .... .. - . / -....- -....- -....- / . -. -.. / - . ... - .. -. --. .-.-.- .-.-.- .-.-.-
+#-"#(&"(#&"($-#-#
K-$)
</>
KKA : FIRING...
KKA:3/:$-#'')#-";_?-#
J($+_)
</>
Solid box, solid box...
1-1, 1-2, we're gonna fly outbound for a moment.
</>
#/$&")$-$(-##&&#-#&$(#-$(#&$?#-_)#+$&#($+(#&$(#&$($&_--_-_-_-_-_/////
</>
SOVIET SIGINT ::
МИХАИЛ
ЖЕНЯ
ИВАН
ИВАН КРАТКИЙ
АННА
ЖЕНЯ
Ш-")'&# УРА#/#/-
</>
0 notes
usafphantom2 · 3 months ago
Text
Tumblr media
Blackbird pilot recalls the mission where a Soviet MiG-25 Foxbat fired a missile at his SR-71
Soviet MiG-25 pilot tells why Foxbats were not able to fire a single missile at SR-71 Blackbird Mach 3 spy planes
The Soviet MiG-25
The “holy grail” of the soviet air defense system: shooting down a Blackbird
Missile fired at an SR-71
MiG-25 at risk of being shot down by its missile
What happened to the missile fired by the MiG-25 at the SR-71?
The Soviet MiG-25
The Soviet MiG-25 (NATO code-name “Foxbat”) was a high-speed interceptor and reconnaissance aircraft. The aircraft entered service in 1970 and has a top speed of Mach 2.83, powerful radar, and could carry up to four air-to-air missiles.
The MiG-25’s capabilities were not discovered until 1976 when Viktor Belenko, a Soviet MiG-25 pilot, defected to Japan. Subsequent analysis revealed a simple-yet-functional design with vacuum-tube electronics, two massive turbojet engines, and sparing use of advanced materials such as titanium.
Tumblr media
CLICK HERE to see The Aviation Geek Club contributor Linda Sheffield’s T-shirt designs! Linda has a personal relationship with the SR-71 because her father Butch Sheffield flew the Blackbird from test flight in 1965 until 1973. Butch’s Granddaughter’s Lisa Burroughs and Susan Miller are graphic designers. They designed most of the merchandise that is for sale on Threadless. A percentage of the profits go to Flight Test Museum at Edwards Air Force Base. This nonprofit charity is personal to the Sheffield family because they are raising money to house SR-71, #955. This was the first Blackbird that Butch Sheffield flew on Oct. 4, 1965.
A capable interceptor, the MiG-25 was widely exported by the Soviet Union. This aircraft could outrun any fighter in the air, and indeed any military aircraft other than the SR-71 Blackbird.
Loaded with two R-40 missiles (NATO reporting name AA-6 ‘Acrid’), the Foxbat could reach 78,000 feet, but with its full complement of four missiles, it was limited to 68,900 feet. By contrast the Habu flew at cruise speeds above Mach 3 at over 80,000 feet.
The “holy grail” of the soviet air defense system: shooting down a Blackbird
Nevertheless, once an SR-71 Blackbird flown by Col. Darrel Cobb was fired on by a MiG-25, as Cobb himself recalls in this interview given to his son Chris;
Col. Cobb’s SR-71 Blackbird fired on by a MiG-25.
‘Operational missions.
‘First let me assure you; we never broke President Eisenhower’s promise to cease overflying the Soviet Union. We remained over international water – 12 mi offshore.
‘All of my operational flying was from Kadena, Okinawa. Area of interest was Vietnam; Korea; Vladivostok, USSR; China. Later, we flew transatlantic & return from Seymour Johnson, NC supporting the Israel Arab war. After I left the program, the SR flew from Mildenhall, England & Bodo, Norway.
‘We already touched on missions against Vietnam & the only night mission.
‘Today let’s cover “north missions.”
Tumblr media
This print is available in multiple sizes from AircraftProfilePrints.com – CLICK HERE TO GET YOURS. Dawn at 80.000ft – SR-71 Blackbird
‘Take off, refuel & head into the Sea of Japan; between Japan & south Korea. Accelerated to operational speed – 3.20. Head directly at Vladivostok. headquarters of USSR air defense; and test/r & d of new radar & intercept development. 2200 mph guaranteed to light up all the radar & intercept systems they had.
‘A MiG-25 interceptor squadron was based just outside of Vladivostok. The “holy grail” of the soviet air defense system was to shoot down an SR-71.
‘Turn north up the Sea of Japan & make a U-turn back down the USSR coast (12 mi offshore) with ELINT & SIGINT recorders going full bore. Photo cameras looking oblique into the USSR, updating the interceptor air order of battle. Head south east till past Vladivostok then turn slightly left then right to cross Korea at the DMZ. Photo cameras updating N. Korea force readiness to resume hostilities against S. Korea.
Missile fired at an SR-71
‘Continue down the yellow sea coast of China. All sensors evaluating China’s threat to Taiwan. Turn left- decel & land at Kadena. I flew this profile several times during the 4 years I flew ops missions. One of these got very, very thrilling. Southbound, passing Vladivostok, Reg (my RSO) announced;
‘”We’ve got a fighter locked on – it’s gotta be a MiG-25″
‘”Our DEF [Defensive Electronic Gear, DEF. It Provided ground-to-air and air-to-air missile protection. Still Classified. Def systems were labeled DEF A,B,C,E and G. Later modifications to the DEF Systems resulted in DEF A2, C2, H and M systems. Nearing retirement of the SR-71, a programmable DEF labeled A2C could defeat all known threats to the Blackbirds] is blanketing all beautifully.”
Tumblr media
‘”Oops – he just fired – – we’ve got a missile locked on”
‘”Our def has shifted to its missile magic”
‘”There – lock’s broken. Missile’s back in search”
‘”That’s weird – sounds like the missile’s locked on – but not locked on us”
‘”He’s gone – coming up on the “s” turn to the DMZ.”’
Fast forward to late 1976 Col. Cobb retired from the Air Force.
MiG-25 at risk of being shot down by its missile
Cobb continues;
‘I’m retired! Learning that retirement means no days off; no vacation; no holidays; big pay cut.
‘I find the aircraft TV channel & history channel. Lots & lots of SR-71 films. I avidly watch at every opportunity. In my den, glued to the TV & today’s SR-71 show, & who do I see comparing the MiG-25 with the SR-71??
Tumblr media
‘You’re right – – Lt Victor Belenko!
‘He was totally gobsmacked; his MiG-25 burned up the engines getting to Mach 3 yet the SR’s cruise speed was greater than 3.0.
‘Belenko is the one who said that the Holy Grail of soviet air defense was to shoot down an SR.
‘He told of how they would pre-position ahead of the SR’s radar track and had to zoom up to get a lock on & fire their missile.
‘Belenko stressed how quickly & precisely they had to perform because the window of opportunity was so very short.
‘Their target was traveling at 3600 ft/sec. Faster than a speeding bullet.
‘He described in detail how precise the post firing breakaway had to be executed to avoid getting shot down by their own missile; talking as though they found this out the “hard way.”’
Cobb Concludes;
‘Man talk about intense attention – – I’m quickly mentally replaying that tape from the inter-phone – –
‘”We’ve got a fighter locked on – it’s gotta be a Mig-25″
Tumblr media
‘”Our DEF is blanketing all beautifully.”
‘”Oops – he just fired – – we’ve got a missile locked on”
‘”Our def has shifted to its missile magic”
‘”There – lock’s broken. Missile’s back in search.
‘”That’s weird – sounds like the missile’s locked on – but not locked on us.”’
What happened to the missile fired by the MiG-25 at the SR-71?
What happened to the missile fired by the MiG-25? Could it have locked onto the Foxbat itself? Could the SR-71 DEF have deceived it? We’ll never know.
However, we can assume that given that SR-71 had a cruise speed faster than the top speed of the MiG-25’s Acrid missiles, the Blackbird simply outran the AA-6. There was no chance a Foxbat could conduct a tail-chase interception of an SR-71 (the MiG-25 couldn’t carry out a head-on intercept of a Blackbird too: in fact, the Foxbat’s radar and fire control system was not sophisticated enough to solve the problems of a head-on intercept at closing speeds that would exceed Mach 5).
Be sure to check out Linda Sheffield Miller (Col Richard (Butch) Sheffield’s daughter, Col. Sheffield was an SR-71 Reconnaissance Systems Officer) Twitter X Page Habubrats SR-71, Instagram Page SR71Habubrats and Facebook Page Born into the Wilde Blue Yonder Habubrats for awesome Blackbird’s photos and stories.
@Habubrats71 via X
27 notes · View notes
darkmaga-returns · 16 days ago
Text
This was during a conversation with Judge Nap in which Scott got a lot of things very right. Unfortunately he got one important thing factually wrong, and it’s important to understand this. The factually incorrect statement was about how Jonathan Pollard got out of jail and relocated to Israel. The whole video is worth listening to, especially what Scott has to say about Trump vis a vis Netanyahu, but here’s a partial transcript of the part about Pollard, with my corrections and comments.
Is Israel an ally of the United States? No. Let me remind people that in the 1980s there was a guy named Jonathan Pollard. He was an American intelligence analyst and he was directed by Israeli intelligence, by an Israeli intelligence officer in the Embassy of Israel in Washington DC, to basically steal the crown jewels of American intelligence. It's the "Bible" that has all of the frequencies that we collect upon in the Sigint world. These are frequencies that are developed over years, painstakingly. If the enemy finds out that we know what a frequency is, they change it. Then it's no good. This is the "Bible." That said, this is what each frequency did, how it's encrypted, how we've defeated the encryption--the whole works. Scores of American lives were lost gathering this information. I just want to remind, this is the Cold War when we had C-130s get brought down over Armenia [over the Armenian SSR]. They were doing a Sigint track. We had other aircraft go down collecting this data.
This deserves a comment. It illustrates how crazy we were during the Cold War. The Armenian SSR was part of the USSR. We were flying C-130s over parts of the USSR to provoke responses that could tell us something about Soviet Sigint. Have you ever heard of the Soviets doing that to the US? Me neither.
0 notes
okb-hpolitburo · 4 years ago
Photo
Tumblr media
An unknown war artist's sketch of one of Marshal Romanov's countless Centaur-like Cossack Avtomat Cavalry units, one of OKB-H's most fearsome and effective units. These highly secret Cossacks, stationed in Meytrograd with the highest honour of being Marshal Romanov’s Imperial Guard, charged with defending the Crown Empress Edelweiß and all her possessions both at home and further afield. They particularly served with distinction during the Counter-Revolutionary Regency Period in the aftermath of General Secretary Brezhnev’s death, where a Junta formed by Brezhnev’s cronies was ultimately defeated by a united coalition led by both Marshal Romanov with OKB-H and KGB Chief Yuri Andropov with the KGB, thereby establishing Andropov’s rule over the USSR and granting Romanov further influence. The great woolly cap typical of all Cossacks serves a unique purpose on these units. They protect an otherwise uncovered advanced E.R.I.K.O. 5 Class Electronic Humint/Sigint Battle Data Recording System, an extremely advanced form of hardware unique only to the Soviets and as integral to the operations of an Avtomat as the human brain, except it also has infinite memory storage depending on the type of unit and the total reliability of a black box recorder, to which it serves a similar function. Before you ask, that is not the Flag used by the Confederate States of America during the American Civil War, but rather a variation of the traditional Russian Naval Jack. Another testament to Romanov's Tsarist leanings. #nemisis #avtomat #centaur #cossack #cavalry #imperialrussianarmy #russianempire #spear #flagpole #shashka #russiannavaljack #romanov #edelweiß #nemisisedelweiß #marshalromanov #godsavethetsar #tunguskakhanate #digitaldrawing #digitalillustration #digitalart #characterart #characterdesign #comicart #graphicart #graphicdesign #meytrograd #tunguskakhanate #alternatehistory #ussr https://www.instagram.com/p/CLT-I-EnMz2/?igshid=upqi2mu0qw3y
1 note · View note
richard77posts · 4 years ago
Text
In my FREE books for example in the “President Roosevelt Years” you can read about how his military intell people (SIGINT) knew the Japanese were headed to Pearl Harbor, but they did not tell the General and Admiral in Hawaii. In my JFK book you can learn about Lee Oswald being who was working for the CIA or ONI when he went to USSR and after he returned to the US. And you can learn the evidence that points to the CIA and the Joint Chiefs of Staff as being who plotted Kennedy's assassination and the cover up. The trigger pullers were most likely anti-Castro Cubans with their North American mafia associates. In my book about the Nixon Years you can learn how closely he was tied to the North American mafia and learn that General Alexander Haig Jr. was most likely the real deep throat. You can also in this book learn about the Nixon Administration running a death squad in Latin America that pretended to be working as a counter drugs operation. In my book about Bill Clinton's role in trafficking in cocaine and launder money with the CIA you can read about how CIA trafficking in opium during the Vietnam War continued from Latin America. In my book about 9/11 you will get a chance to use your common sense to question more.
Here is a list of my free US History books.  I focus on CIA’s political warfare, CIA’s assassination of elected foreign leaders, I focus on CIA’s political warfare and US war crimes.   1610 to 1933
Some Unpopular History of the United States The FDR Years  1933 to 1945 Some Unpopular History of the United States The Truman Years  Apr. 1945 to Jan. 1953 Some Unpopular History of the United States The Eisenhower Years Jan. 1953 to Jan. 1961 Some Unpopular History of the United States
JFK Years & the Assassination Cover-up Some Unpopular History of the United States The Lyndon Johnson Years - Nov. 1963 to Dec. 1968
Some Unpopular History of the United States The Nixon Years   1969 to Aug 9, 1874
Some Unpopular History of the United States
The Ford Years – Aug. 9, 1974 to Jan. 20, 1977
Some Unpopular History of the United States
  9/11 Hard Evidence
 “Bill Clinton is guilty of trafficking in cocaine and launder money with the CIA in order to illegally fund the Contras”    86 pages. (You can think, Hillary as well)
 The CIA’s Shaping US History, operation Mockingbird
Some Unpopular History of the United States
 Papers:  
  The Unjust Bombings of the Serbs in Bosnia by the US and NATO - 1992 to 1999   10 pages
 TWA 800 cover up linked to CIA use of Afghani terrorists  12 pages The Unjust Bombings of the Serbs in Bosnia by the US and NATO - 1992 to 1999   10 pages
 Send me an email at [email protected] and I will reply with books for free or For sale at Amazon Kindle books (then search for the titles)
  We are in a war on science.    
1 note · View note
argumate · 4 years ago
Text
zvaigzdelasas said: Damn whoever said that they only had AKs sounds silly! It’s almost like that’s an obvious exaggeration meant to illustrate a point!
so what point is it illustrating, then?
your original post said that “the soviet union was scared to meaningfully help it's allies” and this was disputed with reference to North Vietnam, which you screenshotted on the basis that the USSR only provided “shitty old kalashnikovs” and not, say, half a billion dollars a year in military aid each year including jet fighters and missile batteries.
now you might say actually it was the will of the Vietnamese people that allowed them to successfully resist US aggression, no weapons will fight the war for you (as witnessed by the US having more advanced weapons and still losing!) but that’s just a rhetorical flourish unrelated to your original assertion that the USSR did not meaningfully help its allies.
At the onset of the Vietnam War, US pilots had carte blanche over Vietnamese airspace. During the initial stages of the conflict, poorly equipped Vietnamese air defense forces were unable to shoot down high altitude US aircraft using World War II-vintage guns. When they asked for assistance, their chief ally, the Soviet Union, was initially apprehensive but eventually decided to supply S-75 Dvina (reporting name SA-2 Guideline) SAM systems. About 1000 Soviet specialists arrived Vietnam in April 1965.
does this not qualify as meaningful help? should they have sent fifty thousand ground troops as well? would there have been no difference in the outcome if the US had enjoyed unchallenged air superiority over Vietnam instead of losing three thousand aircraft in combat?
Some Russian sources give more specific numbers: Between 1953 and 1991, the hardware donated by the Soviet Union included 2,000 tanks, 1,700 APCs, 7,000 artillery guns, over 5,000 anti-aircraft guns, 158 surface-to-air missile launchers, 120 helicopters. During the war, the Soviets sent North Vietnam annual arms shipments worth $450 million. From July 1965 to the end of 1974, fighting in Vietnam was observed by some 6,500 officers and generals, as well as more than 4,500 soldiers and sergeants of the Soviet Armed Forces. In addition, Soviet military schools and academies began training Vietnamese soldiers—in all more than 10,000 military personnel.
The KGB had also helped develop the signals intelligence (SIGINT) capabilities of the North Vietnamese, through an operation known as Vostok (also known as Phương Đông, meaning "Orient" and named after the Vostok 1). The Vostok program was a counterintelligence and espionage program. These programs were pivotal in detecting and defeating CIA and South Vietnamese commando teams sent into North Vietnam, as they were detected and captured. The Soviets helped the Ministry of Public Security recruit foreigners within high-level diplomatic circles among the Western-allies of the US, under a clandestine program known as "B12,MM" which produced thousands of high-level documents for nearly a decade, including targets of B-52 strikes. In 1975, the SIGINT services had broken information from Western US-allies in Saigon, determining that the US would not intervene to save South Vietnam from collapse.
this sounds like more than meaningful help!
none of this undermines the role of the North Vietnamese themselves, any more than the Lend Lease program during WWII undermines the role of the Red Army, so why act like it didn’t happen, then try to equivocate with lmaospeak?
I mean the US forces were hamstrung by the shittiness of the M16 to the point that they would take any other rifle they could find, “the Vietnamese only had AKs lol”
16 notes · View notes
thecuntycuck-blog · 7 years ago
Text
         17                                        
           Oct 31 2017 22:58:00 (EST)                        Anonymous                                                ID: grTMpzrL            147440171                                                
                       Why does Obama travel in advance of POTUS to foreign locations?
Why is this relevant?
Focus on the power of POTUS as it relates to the Marines.
How can MI be applied to prosecute bad actors and avoid corrupt agencies and judges?
Biggest drop on Pol.
Above is reason why the shills are sliding. In case you didn’t know, shills log and send new info back to ASF for instruction. They use a 5 prong pre packaged injection (one post auto generates four more at random designated times). Common drive of posts they all tap into. Since they misjudged the influence of the MSM they are aggressively looking to censor throughout major platforms in exchange for CIA slush funds and WW access for expansion of said networks. Everything they do has been forecasted and prepared for.                    
answers
Why does Obama travel in advance of POTUS to foreign locations?
(SPECULATION) To cover his tracks; he's being sent by his handlers to personally remind foreign entities what they should be doing and what will happen if they don't.
(SPECULATION) Obama is actually doing what the Democrats accused Trump of doing when meeting with foreign leaders post election.  Only Obama is out of office now, so that would be a violation of the Hatch Act.
He would know he must communicate in person, otherwise it will be known and gathered by SIGINT by the NSA.
One reason to set up the narrative he wants pushed regarding the trip, also he wants to find an opportunity to have Trump assassinated.
To know first hand exactly where POTUS goes while in Asia,   attempting to determine how much he actually knows, depending on who he talks to and where he visits.
Why is this relevant?
Obama is usurping the President. Treason.
Focus on the power of POTUS as it relates to the Marines.
Marine Corp is subject to Posse Comitatus (PC) under DoD regulations. POTUS can disregard PC via the Insurrection Act during times of disaster/unrest.
He can assign their duties as he sees fit.
Posse Comitatus Act only re: Army/AF. Marines not subject to PCA.
How can MI be applied to prosecute bad actors and avoid corrupt agencies and judges?
Military Tribunals.
Why did Mueller meet POTUS 1-day prior to FBI announcement if Mueller COULD NOT be offered director due to prev term limits rule?
THEORY: Pres. Trump was interviewing Mueller to be his special prosecutor as he promised on the campaign trail.
Why is Pelosi begging for a new special counsel?
She finally realized that she is in deep trouble because Mueller isn't "their guy" and the inquiry is beginning to touch on areas in which she and others may be implicated in very serious crimes.
What is Pelosi’s net worth?
$120 Million
How was this obtained given salary as career official?
22 years of corruption. Just one action: She steered over $1 Billion in subsidies to a light rail project benefiting a Democratic donor. Pelosi's husband was a major investor in his company. http://freebeacon.com/politics/pelosi-subsidies-benefit-husbands-investment-in-dem-mega-donors-company/
Why is Pelosi’s memory going?
A trick used to hope that they won't prosecute her or use it as a defense.
Could it protect against prosecution?
-Though not typically a defense by itself, amnesia or dementia is a factor courts can consider when determining whether someone is competent to stand trial (Mental fitness) -Yes; Mental Ability plea. You cant punish a invalid or mental insane case.
What is the Mayo Clinic?
According to wiki, The Mayo Clinic is a nonprofit medical practice and medical research group based in Rochester, Minnesota. It employs more than 4,500 physicians and scientists and 57,100 allied health staff. The practice specializes in treating difficult cases through tertiary care. It spends over $660 million a year on research. However, some speculate it may participate in organ harvesting.
Who sits on the BOD there?
Barbara Bush, Dick Cheney, Cokie Roberts, Jeffery W Bolton, Eric Schmidt, Walter Mondale, Ursula Burns (direct Obama connection), Alan Mulally (direct Obama connection)
What if John M's surgery was fake?
If fake, he's setting himself up to avoid prosecution and/or testifying anywhere.
Why would this occur?
In order to preclude criminal culpability in court, i.e., Mental fitness issue
What could this prevent potentially?
Prosecution
SUMMARY
Obama traveled in advance of POTUS to foreign locations. Focus on the power of POTUS as it relates to the Marines. Military Intel can be applied to prosecute bad actors and avoid corrupt agencies and judges. Mueller met POTUS 1 day prior to FBI announcement, but COULD NOT be offered director due to prev term limits rule. Pelosi is begging for a new special counsel.
Look at Pelosi's net worth. This couldn't be obtained given salary as career official. Pelosi's memory is going. It could protect against prosecution. Look at the Mayo Clinic. The Board of Directors are corrupt. John M's surgery was fake. This could prevent prosecution.
>>147443190
https://archive.4plebs.org/pol/thread/147433975/#q147443190
Why do D’s want to control the black pop?
Keep them voting D --As it is the perfect victim population that is very sensitive to perceived threats and very predictable in how they will respond as long as you have some lenses to focus that rage. -That victim group is used as a proxy to attack normal Americans, without the DNC doing so directly.
Why do they intentionally keep poor and in need?
Keep them voting D
Aggression, depression, and disaffection can be bred into the controlled ghetto's to culture a human explosive.
Why do D’s project racism on a daily basis against R’s?
Keep them voting D
As unfortunately the cultural reaction is predictable. Rage, riots, deaths and chaos. D's NEED victims, as it is no use simply shouting fire you must also be the one opening the door you want them to go through
Why do black elected officials do the crazy talk on behalf of D’s?
So it's not a white (or a jew) D telling blacks how to vote.
Black officials stir up and focus injustice that they themselves provide and do not suffer. It allows events such as the NFL or BLM to occur with apparent spontaneity allowing political pressure to prevent police and destroy authority keeping the Dems to have access to drug trade and other trafficking routes needed by the CIA and FBI
How do D’s cover the historical facts of forming the confederacy, KKK, and oppose all things pro black re: legislation?
They tell the lie that the parties switched. -Through control of curriculum and textbooks, build the false history
Through being the majority of teachers and professors, propagandize and reinforce the propaganda all through a person's education -Through audio/visual media, countless movies and documentaries portraying a false history
Through "outreach" programs and party platform portray their own party as the protector and provider of the black population
What happens if D’s lose the slave grip on the black pop?
D's lose power forever -The Blacks, like Latinos will gravitate back towards the libertarian / right wing (like Ukrainians and Polish did when the USSR lost their hold over the Deep State USSR proxies)
Why do D’s, through the funding of the CIA, prop up and install Hollywood/media assets?
Another method of propaganda that gives them easy access to a large portion of the population.
You need control over the message at all times. Controlling the flow of all news and entertainment in an age of media gives ultimate control.
Politics is Downstream from Culture.  Hollywood,et al creates popular culture
Does this fall within Operation Mockingbird?
Yes
What were the historical advantages D’s gained by having MSM and famous people peddling narrative?
Control of propaganda and the narrative.
Who exposed the pedo network within H wood?
Ronan Farrow
Corey Feldman, though he did not name names until recently.
Rose McGowan recently
Robert Downy Jr. (as Himmmm on https://CrazyDaysandNights.net)
Amy Berg's documentary "An Open Secret"
Elle Magazine Article: Amy Berg Uncovered Hollywood's Worst Kept Sex Secret
Roseanne Barr
Pamela Anderson (via Julian Assange and WikiLeaks)
Justin Bieber
McKulley Kulken
SUMMARY
Democrats want to control the black population. They intentionally keep them poor and in need. Democrats project racism on a daily basis against Republicans. Black elected officials do the crazy talk on behalf of Democrats. Democrats cover the historical facts of forming the confederacy, KKK, and oppose all things pro black regarding legislation. What happens if Democrats lose the slave grip on the black pop. Democrats, through the funding of the CIA, prop up and install Hollywood/media assets. This does fall within Operation Mockingbird.
There are historical advantages that Democrats gained by having MSM and famous people peddling the narrative. Someone exposed the pedophile network within Hollywood.
extra answers
Why does Obama travel in advance of POTUS to foreign locations?
[Theory] Obama & Valerie work with local CIA rogue elements and patsy political operatives to promote malcontent and hinder State Dept diplomacy.
Acts as a “shadow government” to create conflict ex: call in “favors” from judges, as seen in Immigration Ban with judge from Hawaii. Money laundering as seen with Clinton Foundation.
"...effective September 1, 2017, US Passports were invalidated for travel into, on, or through North Korea." Implying that Obama either traveled to NK illegally, had Trump's approval, or did not travel on a US passport.
Why is this relevant?
Note that Sessions shut off 2 illegal and unconstitutional SLUSH FUNDS, one belonging to the DOJ, and another to the EPA. They were used under the BO admin for what?
EPA : How Jeff Sessions is Stopping the EPA's Slush Fund http://thehill.com/blogs/pundits-blog/energy-environment/347148-how-jeff-sessions-is-stopping-the-epas-slush-fund https://archive.is/ik5vs
DOJ: That Obama-Era 'Slush Fund' Funneling Billions To Leftist Groups? Sessions Just ENDED It. http://www.dailywire.com/news/17275/obama-era-slush-fund-funneling-cash-leftist-groups-amanda-prestigiacomo#exit-modal https://archive.is/XjB0R
It is relevant because it helps in making the case against him once other evidentiary facts are revealed. Also, other connections could be revealed depending on where Obama goes and who he talks to. Could reveal where other ties and connections lie.
Focus on the power of POTUS as it relates to the Marines.
Marines Are Commanded by Robert Neller.  Nellar answers to DOD Chief Mattis, also USMC ret.  Mattis answers to POTUS.  The center of power is Washngton D.C.  District of.Columbia is not a State.  Marines can and will protect the center of power.
As outlined in 10 U.S.C. § 5063 and as originally introduced under the National Security Act of 1947, three primary areas of responsibility for the Marine Corps are:
Seizure or defense of advanced naval bases and other land operations to support naval campaigns;
Development of tactics, technique, and equipment used by amphibious landing forces in coordination with the Army and Air Force; and
Such other duties as the President or Department of Defense may direct.
This last clause derives from similar language in the Congressional acts "For the Better Organization of the Marine Corps" of 1834, and "Establishing and Organizing a Marine Corps" of 1798. In 1951, the House of Representatives' Armed Services Committee called the clause "one of the most important statutory – and traditional – functions of the Marine Corps." It noted that the Corps has more often than not performed actions of a non-naval nature, including its famous actions in Tripoli, the War of 1812, Chapultepec, and numerous counter-insurgency and occupational duties.
https://en.wikipedia.org/wiki/United_States_Marine_Corps
How can MI be applied to prosecute bad actors and avoid corrupt agencies and judges? Why did Mueller meet POTUS 1-day prior to FBI announcement if Mueller COULD NOT be offered director due to prev term limits rule?
Robert Mueller was a former Special Prosecutor who worked on complex financial fraud cases with UK Intelligence’s Special Crimes / Major Crimes Unit. He worked on tracking international money laundering, specifically targeting the Chinese Pay to Play crimes in the 1990’s
Why is Pelosi begging for a new special counsel?
Pelosi and Frank were 4 of the largest money laundering conduits for the 2001-2008 subprime scandal, Pelosi also has been under investigation for major green card fraud, most of which was sponsored by major tech / DARPA backed tech oligarchs
What is Pelosi’s net worth? How was this obtained given salary as career official? Why is Pelosi’s memory going?
non compos mentis (not mentally capable)
Pelosi suffers brain freeze while questioning Trump's fitness to be President http://www.theamericanmirror.com/pelosi-suffers-brain-freeze-questioning-trumps-fitness-president/
Could it protect against prosecution?
non compos mentis (not mentally capable)
What is the Mayo Clinic?
A VIP hospital who works on Heads of State and anyone who can pay for a surgery which may not be legal under medical insurance / surgeon boards. This is important when working on foreign heads of state who may be legally not allowed to enter the USA.Add: Doc here, the Mayo clinic is revered as the world 'center' of surgical excellence. If you are a foreign billionaire this is where you would pay to go.
Who sits on the BOD there?
https://www.mayoclinic.org/about-mayo-clinic/governance/trustees
What if John M's surgery was fake?
Yes, without question. John is still working great on the Intelligence Committee. -Doc here.. I am not a neurosurgeon but his rapid recovery suggests that he didn't actually have anything significant done. As this trick applies to Pelosi, claim memory loss, dementia etc so they can’t testify.
Why would this occur?
NB - As Criminal Scandals Implicating McCain Unfold 'Declining' Health Has Become an Off-Broadway Production http://truepundit.com/as-criminal-scandals-implicating-mccain-unfold-declining-health-has-become-an-off-broadway-production/
What could this prevent potentially?
Jon would either be forced to admit the Congressional Intelligence Committee is compromised and by extension the CIA/NSA/FBI/DNI/NRO were also compromised since 1991 (which would have explained the large layoffs and retribution for the success in Yugoslavia by Russian/Chinese actors) or commit perjury.
SUMMARY >>147443190
ID:grTMpzrL Wed 01 Nov 2017 00:29:28
Why do D’s want to control the black pop?
Communists in 1940 theorized that the Blacks were the Ukrainians of USA. They lacked a way to infiltrate because nobody knew how Black Culture worked. Democrats always needed a useful idiot class to be their “Bohemian Majority” and be their Useful idiots to sway the Overton Window leftward.
Why do they intentionally keep poor and in need?
Dependency on the Government and in return they are controllable
Maslow's hierarchy of needs. If you are too busy worrying about basic needs, you don't think long term or in terms of moral parameters.
Why do D’s project racism on a daily basis against R’s?
-Alinsky "Rules for Radicals" 101: Project to deflect -Division is strategy for conquering a people. -Division can also lead to civil war/unrest -- from that "crisis" arises the "demand" for a new world government to "save" us.
Why do black elected officials do the crazy talk on behalf of D’s?
The Black Caucus are all bribed and paid off, which was the whole reason the Blacks were allowed into office under Rev. Al Sharpton’s Pac network, financed by the big Tobacco DNC interests circa 1990
How do D’s cover the historical facts of forming the confederacy, KKK, and oppose all things pro black re: legislation?
Most U.S.history textbooks in US public middle, high schools and universities have a liberal slant.  For example, the "Radical Republicans" of  the Reconstruction era are painted in a subtly negative light, so as to infer "40 acres and a mule" for slave restitution was a bad thing. Similarly most, but not all, public school teachers are of a liberal bent and their union PACs always endorse Democrats.  Public schools have thus become well-oiled propaganda machines breeding and ensuring massive liberal mindsets effectively indoctrinating the young people with propaganda and a mindset that is in harmony with the cabal's agenda.  Investigating the names of the editors of a textbook will reveal their political leanings and explain why the textbook is politicized.
What happens if D’s lose the slave grip on the black pop? Why do D’s, through the funding of the CIA, prop up and install Hollywood/media assets?
Only thing money can not control is spread of truth online. This combined with memetics, Streissand efect and the fact, that viral content can exponentially multiply, cause the truth to spread faster than any "fake news truth" can be spread on shill media.
Does this fall within Operation Mockingbird?
It's become very obvious that the media immediately calls up people like Al Sharpton to crow about grievances and accuse anyone who questions their narrative as being a racist bigot. Every single issue that can be twisted to condition the black population into thinking the "white mans system" is out to get them is employed by these "race-baiters" the media puts forth. It is obvious that it is coordinated.
What were the historical advantages D’s gained by having MSM and famous people peddling narrative?
Cult of Personality and Endorsement are circular references since the 1940’s and the “Camelot Presidency”. Without manipulating consumer preferences and consumption habits, it’s hard to gain the populations trust on tougher concepts like wealth destruction and tax hikes
Who exposed the pedo network within H wood?
Amy Berg, Director of "Open Secret" (2014) Oscar nominated for Deliver Us From Evil about an Irish priest pedophile for which she was Oscar nominated. Producers with the original Hollywood pedophile idea for the film were Gabe Hoffman (hedge fund mgr) and Michael Valentinas (entertainment lawyer) who said "I came up with the idea hearing Corey Feldman talk about what he'd been through," referring to Feldman's revelations in interviews that he and others had been sexually abused as child actors. source: http://www.elle.com/culture/movies-tv/news/a19842/true-
0 notes
millenialvoiceofpolitics · 7 years ago
Text
Is the National Security Agency Constitutional?
The Internet’s multiverse world exponentially grows and expands since the modern marvel’s invention in the 20th century. Although the Internet’s space isn’t tangible, governments around the would have created organizations, agencies, and programs to moderate the vastness of the Internet’s wide space. The National Security Agency, for example, is an intelligence agency funded by the American government that surveils all electronic activity in the United States—as well as the rest of the world. The NSA’s main mission is to have the “upper hand” with intelligence procured on the internet and other communication devices in order to protect American citizens from potential danger or harm. The NSA obtains information on the internet and its communication counterparts by working with a multitude of methods in order to gain a decision advantage for America and its allies. Although the NSA’s purpose is in good intention, the constitutionality of the NSA’s actions upon its citizens for the sake of national security is compromised. The NSA’s methods of data collection is a breach of American privacy protected by the Fourth Amendment, proving the NSA compromises a citizen’s privacy in regards to ensuring national security. In this research paper, the NSA’s privacy breaches will be discussed when considering American legislation, jurisprudence, as well as the “leaked” methods of data collection.
           The topic of American privacy compromised by the NSA has entered the public discussion of the NSA’s surveillance programs in 2013 when former NSA contractor Edward Snowden systematically downloaded thousands of NSA classified documents and uploaded them on websites such as WikiLeaks (Grimmelmann 261). Snowden’s leaked discoveries revealed the NSA’s actions that continuously breach American privacy. Additionally, Snowden’s leaks revealed NSA’s actions throughout the years of its existence, such as the NSA’s involvement with the Foreign Intelligence Surveillance Court (FISC) and the age-old Foreign Intelligence Surveillance Act (FISA). The NSA’s actions mandated by American legislation impedes over the right of privacy to American citizens in order to provide a better sense of security.
           First, it is necessary to explain how the NSA acquires surveillance information. The agency surveils all sources of electronic communication with Signal Intelligence (SIGINT) (Lin). Signals intelligence refers to information contained in electronic signals used by foreign targets of interest (Lin). The NSA uses SIGINT in bulk metadata and bulk data collection. Although these actions are protected by laws mandated by the federal government, they do not necessarily parallel the “end goal” of the NSA, to prevent danger from foreign powers (Lin). Rather, the mandate of collecting bulk data and metadata intelligence impedes over an American citizen’s right to privacy and unlawful searches guaranteed by the Fourth Amendment of the Constitution (Lin). Therefore, the NSA disregards all U.S. citizen’s privacy in order to promote security.  
           The National Security Agency originated its surveillance on foreign powers in order to promote American prowess and safety on the world stage. In 1978, the Cold War was at the peak on the tension between the United States and the USSR. In order to get an upper hand from the Soviets and their allies, the Foreign Intelligence Surveillance Act sought to power the NSA and other governmental branches to take advantage of new technologies and to engage in necessary foreign intelligence gathering, while preventing the foreign intelligence communities from engaging in sweeping surveillance of U.S. citizens (Donohue 141). Congress, concerned with the well-being and privacy of the American citizens, enacted multiple restrictions requiring surveillance targets only to be a foreign power with probable cause support a claim to survey, and heightened protection of U.S. citizens’ information (Donohue 141). Although FISA expanded gradually with physical searches, pen registers, and trace devices, the new authorities retained much of the structure that defined the statute (Donohue 141). The further legislation expanded the power of the NSA, permitting the NSA’s bulk collection of data and metadata through signal intelligence technology. Bulk data and metadata contradict the general approach Congress adopted in enacting FISA (Donohue 141). Therefore, the NSA’s actions are unlawful when considering a U.S. citizen right to privacy for the sake of national security.
           The mandate for further intelligence searches by the NSA based on bulk metadata was furthered in the 21st century. After the devastating terrorist attack on September 11th, 2001, Congress passed the Patriot Act with a controversial letter of this law known as “Section 215” (Beaudette 28). Section 215 expanded the ability of the government to collect business records for the purpose of investigating suspected terrorist activity (Beaudette 28). Although Section 215 was enacted with “foreign intelligence collection” in mind, it allowed the NSA to identify national security threats within the United States through citizen bulk metadata. (Beaudette pg. 28). Edward Snowden’s NSA leak provided Section 215’s legislation apparent in American society. On May 2006, the Foreign Intelligence Surveillance Court (FISC) approved an FBI application for an order, pursuant to 50 U.S.C. section 1861, a section of Section 215, which required Verizon to turn over all telephony metadata to the National Security Agency, and concluded with all major U.S. telecommunication providers handing over their telephone metadata as well (Donohue 759). Over the next seven years, the FISC issued orders renewing the bulk collection program thirty-four times (Donohue 759). Almost all of the data collected related to the activities of law-abiding citizens unrelated to subjects of any investigation (Donohue 760). Edward Snowden’s leak of this information was followed up by official documents from the government stating metadata collection is necessary for counterterrorism efforts and foreign intelligence, and does so in a legal and constitutional way (Donohue pg. 760). The telephony metadata collection process includes all communications routing information, except for the substantive content of communications, nor does it include the name, addresses, or financial information (Donohue 761). Although Snowden’s leaks did not reveal all of the classified information, the program’s main goal was revealed to the public. The NSA’s purpose and main goal is obtaining foreign intelligence and protecting against international terrorist threats both in the United States and overseas (Donohue 763). However important the purpose, the NSA’s bulk collection of telephony metadata embodies precisely what Congress sought to avoid by enacting the 1978 Foreign Intelligence Surveillance Act in the first place (Donohue 763). The program violates the spirit and letter of the law and gives rise to troubling rights guaranteed by the Constitution (Donohue 763). Therefore, the collection of bulk metadata mandated by the NSA impedes over a U.S. citizen’s right to privacy in regards to national security.  
           Although SIGINT spies on data from “targets” of interest, most of the data the NSA collects is not by specific targets, but in bulk collection. Bulk collection is defined in presidential policy directive (PPD-28) as “the authorized collections of large quantities of signals intelligence data, which, due to operational considerations, is acquired without the use of discriminants” (Lin). Although bulk intelligence makes the NSA’s objectives easier, the issue lies in the fact that “discriminant” is not precisely defined, leaving the NSA to interpret discriminants as whoever the agency desires (Lin). For example, all signals intelligence associated with “Pennsylvania” would be regarded as “targeted” because “Pennsylvania” was used to separate Pennsylvania traffic from other internet traffic (Lin). Therefore, all signals intelligence associated with Pennsylvania would be monitored (Lin). Bulk intelligence is an issue for the NSA because it is allowed to spy on any communications via the internet with authority mandated by law. Any search term regarding any location, foreign or in the country, can reveal anyone’s particular communications. The NSA’s actions of bulk collection of signals intelligence impede over any Americans right to privacy and is utilized for the NSA’s “easier” execution of providing security.
           Issues arise with bulk collection of signals intelligence and deal with the commonsense meaning of the term “bulk” collection and whether or not the process is “easier” in comparison to surveying an individual target’s data. According to a National Resource Council (NRC) study on PPD-28 argued that “if a significant portion of the data collected is not associated with NSA targets of interest, it is bulk collection, otherwise it is targeted (Lin). The study continued to conclude that no precise definition could define bulk collection and can be argued of what “significant” data should mean, whether that be 10%, 90%, or a number in between of the overall data collected (Lin). The term “collection” has two modern day definitions utilized by the NSA and raises the issue of the agency’s legitimacy of collecting data. Under one definition, collections occur when the electronic signal of communication is first captured (Lin). Conversely, the collection is deemed important in an environment in which different communications streams are interleaved on the same physical channel and occurs only when the signal has been processed to determine whether it is relevant to the purpose of collection (Lin). Under both definitions, however, all signals from bulk collection is received, interpreted, and acted upon based on the interpretation by the NSA. However, definition two encompasses more complexities into three steps: extraction of data into discrete data items from a communications channel, filtering the extracted data for items of interest, and storage of these items in a database controlled by the U.S. government (Lin). Although the NSA does not consistently survey bulk intelligence on a grand scheme, their ability to do so is a daunting reality, and is a breach of anyone’s privacy.
           Although the NSA’s goal is to prevent dangerous incidents from arising, the efficacy of preventing terrorism through counterintelligence generated from bulk surveillance can be discussed. Opponents to bulk data have argued that bulk collection of phone metadata authorized under Section 215 has been of minimal value. There has not been a single terrorist plot that was prevented due to the bulk information derived from the program (Lin). In other words, the Section 215 program has been proven unnecessary for thwarting any terrorist plot. However, the controversy arises at this instance, whether bulk surveillance is helpful to the NSA’s efforts in protecting its American people. According to the Privacy and Civil Liberties Oversight Board (PCLOB), “any particular technique or legal authority can be identified as the key component without which a terrorist plot would have succeeded. Intelligence-gathering tools can provide value in more indirect ways, by helping to advance investigations and focus efforts in ways that are sometimes difficult to measure” (Lin). However, the PCLOB has concluded that the Section 215 program has made no evidence to prove its alleged value to NSA counterintelligence (Lin). Other organizations such as the PCLOB argue that bulk surveillance results in information overload that makes it difficult for analysts to find the important information they need (Lin). These analysts argue that it is like finding a needle in a haystack in order to find necessary information from bulk surveillance (Lin). Consequently, the time needed to search for said needle can overwhelm analysts and is a great burden to overcome when finding the necessary information for counterintelligence. The NSA’s tool of bulk intelligence from SIGINT cannot be regarded as justified because it provides some value in protecting the nation from terrorism, and breaches an overwhelmingly wide amount of privacy with little to none security benefits. Therefore, the NSA’s actions breech privacy in order to provide security for the American people.
           The National Security Agency’s collection of bulk data and metadata is considered unconstitutional under the Fourth Amendment, proving the NSA’s breach of privacy in order to ensure security. According to this Amendment, citizens are guaranteed “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated” as well as “no warrants shall issue, but upon probable cause, supported by oath and affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” (Barnett pg. 4). As stated earlier, under Section 215, all telecommunication companies are required to submit all call detail records. This action mandated by the FISC can be generalized as a blanket seizure subject the private information of American citizens to the risk of searches and exposure, without their knowledge (Barnett 6). The seizure of one’s personal effects, including their telephone metadata, is utilized for evidence of criminality such as terrorism. Additionally, putting such information permanently in the hands of the government for future use is an abuse of power and is an invitation to restrict the liberties of American citizens whenever such restrictions become politically popular (Barnett 6). This trend has already been in practice since the Patriot Act’s passing in Congress in times of a national threat from terrorism.
           The constitutionality of data collected by the NSA can be justified by past Supreme Court cases. In 1967, the case of Katz v. United States concerned the power of law enforcement and a citizen’s right to privacy (Barnett 7). Katz was taken to the stand and testified against the government’s “bugging” of a phone conversation via a telephone booth (Barnett 7). He pleaded his innocence based on the Fourth Amendment’s protection of communications with a “reasonable expectation of privacy” (Barnett 7). In other words, people reasonably expect their conversations in a phone booth to be private, and their conversations cannot be wire-tapped by law enforcement without first obtaining a search warrant (Barnett 7). The Supreme Court ruled that Katz was entitled to his private conversations under the Fourth Amendment, stating that a warrant must be attained with probable cause of a crime (Barnett 7).
           Another case, Smith v. Maryland, can be argued for the NSA’s unlawful actions of search and seizure of citizen’s personal effects. In this case, Smith applied the “third-party doctrine,” which constitutes that individual phone users have no reasonable expectation of privacy in the records of their phone calls since the phone company itself has access to all the information (Barnett 8). Law enforcement agencies right to install a “pen register” on telephone accounts, which records and reports numbers called and duration of calls, but not the voice conversations without a warrant (Barnett 8). In this case, the police did not obtain a warrant to install the pen register, but they had the suspicion that Smith, the accused, engaged in illegal activity (Barnett 9). Therefore, the police were able to convict him for his crime without breaching the Fourth Amendment’s citizen’s right to the unlawful seizure of personal effects.
           Governmental institutions utilize judicial review to enact methods and procedures ensured as constitutional and legal. Specifically, the NSA uses both of Katz v. United States and Smith v. Maryland as evidence that upholds the constitutionality of data seizure (Barnett pg. 8). Under Smith and Katz, the FISC court reasoned that data collected is the very information in which Smith sustains, while consumers have no reasonable expectation of privacy under Katz (Barnett 8). Although logical on the surface, the FISC court’s interpretation of Smith has been misapplied. (Barnett 10). In Smith vs. Maryland, the pen register only spied on “third-party” business records, which was placed by the phone company on a particular person with reasonable suspicion of a crime committed. The Fourth Amendment was set in law to differentiate between a general warrant and a reasonable particularized search or seizure and is upheld in Smith on the basis that he committed a crime based on the preponderance of evidence (Barnett 12).  However, this is where discrepancy of the law lies. Although the NSA has a right to access telephony metadata records, The NSA data seizure is warranted with the premonition of all citizens being considered as criminals, without any suspicion that any citizen has done anything wrong (Barnett 9). Additionally, under Katz, the statement “reasonable expectation of privacy” draws private borders between anything privately owned, including, under the Fourth Amendment, “persons, houses, papers, and effects” (Barnett 13). Consequently, a U.S. citizen’s ownership of themselves and their things is a protected right from state power (Barnett 13). Under the Fourth Amendment, the NSA’s collection of bulk data and metadata is a modern-day equivalent of the general warrant that compromises the legality of the Fourth Amendment’s requirement of particularity in a lawful seizure of property from a law abiding citizen (Barnett 13). Therefore, the NSA’s actions are unconstitutional and is a breach of American privacy protected by the Fourth Amendment. The NSA’s actions breach American privacy to ensure security for its American people.
           The NSA and its supporters claim that data breaches of law abiding citizens is reasonable under the Fourth Amendment when considering national security. However, this rationale cannot justify the NSA’s seizure of American data and metadata for domestic law enforcement purposes (Barnett 17). Two legal models of constitutional powers can be applied when considering the NSA’s constitutionality. The domestic model empowers the government to protect the rights of citizens from being violated by other members of the community. The wartime model is designed to protect the rights of American citizens from being violated by foreign enemy powers (Barnett 17). Under the domestic model, the issue of national security cannot be argued when considering data seizures from the NSA (Barnett 17). The NSA’s collection of data for domestic law enforcement purposes assumes that the government polices its citizens in order to protect others who are also members of the American community (Barnett 18). If a citizen is accused of violating the rights of others, they deserve to be considered innocent until proven guilty before subject to punishment (Barnett 18). Consequently, it is important to protect civil liberties of people from those in law enforcement who could abuse their power to protect public safety (Barnett 18). Under the war model, the government utilizes its military to protect the rights of citizens from foreign powers, powers not protected under the Fourth Amendment (Barnett pg. 18). If foreign power has a presence within the United States, the enemy is hidden among the population, the means of war are turned against citizens themselves to identify an enemy within (Barnett 18). Therefore, civil liberties of all American citizens are compromised by NSA data breaches.  
           The Internet and modern communication devices such as telephones reinvented communication for the modern world today. Governments that plan to protect the rights of citizens from foreign powers have an upper hand when a mass communication device is monitored. The NSA is a perfect example of government-mandated power that monitors for threats against national security and has a justifiable reason for doing so. FISA, for example, permitted US surveillance on enemy foreign powers and targets in order to protect American citizens, with the right to a citizen’s privacy in mind. However, further legislation for greater surveillance for national security threats, such as the establishment of the FISC and the Patriot Act disregarded American citizens right to privacy constituted by the Fourth Amendment. These acts approved of NSA data collection, particularly bulk data and metadata collection, which, without a particularized probable cause, breaches the data of any, if not, all, American citizens. The constitutionality of these mandates can be considered through interpretation of the Fourth Amendment as well as past Supreme Court cases such as Katz v. United States and Smith v. Maryland. In all of these scenarios, data collection by the NSA is seized from the third party and an individual’s sole electronic communication without any regard to a citizen’s protected right to an unlawful search of personal belongings. These claims can be tested on both domestic and war models of constitutional powers given to the American government. Therefore, the NSA’s goal of maintaining security for its American people is a direct and blatant breach of a constitutional right to privacy for “the greater good” of national security. Not only does the NSA breach privacy, it relies on the data seized for its purpose, which alone, is hypocritical to America’s determination to serve the people. Instead, the NSA portrays America as the antithesis of a constitutional republic, a government controlled police state that has massive amounts of data for every citizen stored in a governmental facility. The actions of the NSA is unconstitutional because of its compromise to an individual’s privacy and should be taken to Congress to revise its original purpose of protecting Americans from foreign infringements.
WORKS CITED (MLA)
Barnett, Randy. "Why The Nsa Data Seizures Are Unconstitutional." Harvard Journal Of Law & Public Policy 38.1 (2015): 3-20. Business Source Elite. Web. 20 Nov. 2016.      
Beaudette Jr., Major Peter. "Compliance Without Credit: The National Security Agency And The  International Right To Privacy." Air Force Law Review 73.(2015): 25-59. Academic Search Complete. Web. 20 Nov. 2016.
Donohue, Laura K. "Bulk Metadata Collection: Statutory And Constitutional  Considerations." Harvard Journal Of Law & Public Policy 37.3 (2014): 757-900. Political Science Complete. Web. 18 Nov. 2016.
Grimmelmann, James. Internet Law: Cases and Problems. Lake Oswego, OR: Semaphore, 2016. Print.
Lin, Herbert. "Having A Conversation About Bulk Surveillance." Communications Of The ACM 59.2 (2016): 40-42. Business Source Elite. Web. 18 Nov. 2016.
0 notes
usafphantom2 · 1 year ago
Text
Tumblr media Tumblr media Tumblr media
Col. Cobb’s fired on by a Mig 25
Operational missions.
First let me assure you; we never broke President Eisenhower's promise to cease overflying the Soviet Union. We remained over international water - 12 mi offshore.
All of my operational flying was from Kadena, Okinawa. Area of interest was Vietnam; Korea; Vladivostok, USSR; China. Later, we flew transatlantic & return from Seymour Johnson, NC supporting the Israel Arab war. After I left the program, the SR flew from Mildenhall, England & Bodo, Norway.
We already touched on missions against Vietnam & the only night mission.
Today let's cover "north missions".
Take off, refuel & head into the Sea of Japan; between Japan & south Korea. Accelerated to operational speed - 3.20. Head directly at Vladivostok. headquarters of USSR air defense; and test/r & d of new radar & intercept development. 2200 mph guaranteed to light up all the radar & intercept systems they had.
A Mig-25 interceptor squadron was based just outside of Vladivostok the "holy grail" of the soviet air defense system was to shoot down an SR71.
Turn north up the Sea of Japan & make a U-turn back down the USSR coast (12 mi offshore) with ELINT & SIGINT recorders going full bore. Photo cameras looking oblique into the USSR , updating the interceptor air order of battle. Head south east till past Vladivostok then turn slightly left then right to cross Korea at the DMZ. Photo cameras updating N. Korea force readiness to resume hostilities against S. Korea.
Continue down the yellow sea coast of China. All sensors evaluating China's threat to Taiwan. Turn left- decell & land at Kadena. I flew this profile several times during the 4 years i flew ops missions. One of these got very, very thrilling. Southbound, passing Vladivostok, Reg (my RSO) announced
"We've got a fighter locked on - it's gotta be a Mig-25"
"Our DEF is blanketing all beautifully."
"Oops - he just fired - - we've got a missile locked on"
"Our def has shifted to its missile magic"
"There - lock's broken. Missile's back in search”
"That's weird - sounds like the missile's locked on - but not locked on us"
"he's gone - coming up on the "s" turn to the DMZ".
Fast forward to late 1976 Col.Cobb retired from the Air Force.
I'm retired! Learning that retirement means no days off; no vacation; no holidays; big pay cut.
I find the aircraft TV channel & history channel. Lots & lots of SR71 films. I avidly watch at every opportunity. In my den, glued to the TV & today's SR71 show, & who do I see comparing the mig-25 with the SR71??
You're right - - Lt Victor Belenko!
He was totally gobsmaked; his Mig-25 burned up the engines getting to Mach 3 yet the SR's cruise speed was greater than 3.0.
He's the one who said that the Holy Grail of soviet air defense was to shoot down an SR.
He told of how they would pre-position ahead of the SR's radar track and had to zoom up to get a lock on & fire their missile.
He stressed how quickly & precisely they had to perform because the window of opportunity was so very short.
Their target was traveling at 3600 ft/sec. Faster than a speeding bullet.
He described in detail how precise the post firing breakaway had to be executed to avoid getting shot down by their own missile; talking as though they found this out the "hard way".
Man talk about intense attention - - I'm quickly mentally replaying that tape from the inter-phone - -
"We've got a fighter locked on - it's gotta be a Mig-25" "Our DEF is blanketing all beautifully."
"Oops - he just fired - - we've got a missile locked on"
"Our def has shifted to its missile magic"
"There - lock's broken. Missile's back in search
"That's weird - sounds like the missile's locked on - but not locked on us"
(What did the missile lock onto? Could it have been the Mig-25 itself? – we’ll never know) Chris Cobb gave this article to myself Linda Sheffield this is the first time it’s been published. 1/24/24
@Habubrats71 via X
12 notes · View notes
usafphantom2 · 1 year ago
Text
Tumblr media
The MiG-25 Foxbat
In the late 1960s, the USSR revealed the existence of the aircraft that appeared to be the world’s deadliest fighter, the MiG-25 (NATO reporting name “Foxbat”). This aircraft could outrun any fighter in the air, and indeed any military aircraft other than the SR-71 Blackbird.
Tumblr media
SR-71 T-Shirts
CLICK HERE to see The Aviation Geek Club contributor Linda Sheffield’s T-shirt designs! Linda has a personal relationship with the SR-71 because her father Butch Sheffield flew the Blackbird from test flight in 1965 until 1973. Butch’s Granddaughter’s Lisa Burroughs and Susan Miller are graphic designers. They designed most of the merchandise that is for sale on Threadless. A percentage of the profits go to Flight Test Museum at Edwards Air Force Base. This nonprofit charity is personal to the Sheffield family because they are raising money to house SR-71, #955. This was the first Blackbird that Butch Sheffield flew on Oct. 4, 1965.
Loaded with two R-40 missiles (NATO reporting name AA-6 ‘Acrid’), the Foxbat could reach 78,000 feet, but with its full complement of four missiles, it was limited to 68,900 feet. By contrast the Habu flew at cruise speeds above Mach 3 at over 80,000 feet.
Nevertheless, once an SR-71 Blackbird flown by Col. Darrel Cobb was fired on by a MiG-25, as Cobb himself recalls in this interview given to his son Chris;
The “holy grail” of the soviet air defense system: shooting down an SR-71 Blackbird
Col. Cobb’s SR-71 Blackbird fired on by a MiG-25.
‘Operational missions.
‘First let me assure you; we never broke President Eisenhower’s promise to cease overflying the Soviet Union. We remained over international water – 12 mi offshore.
‘All of my operational flying was from Kadena, Okinawa. Area of interest was Vietnam; Korea; Vladivostok, USSR; China. Later, we flew transatlantic & return from Seymour Johnson, NC supporting the Israel Arab war. After I left the program, the SR flew from Mildenhall, England & Bodo, Norway.
‘We already touched on missions against Vietnam & the only night mission.
‘Today let’s cover “north missions.”
Tumblr media
SR-71 print
This print is available in multiple sizes from AircraftProfilePrints.com – CLICK HERE TO GET YOURS. SR-71A Blackbird 61-7972 “Skunkworks”
‘Take off, refuel & head into the Sea of Japan; between Japan & south Korea. Accelerated to operational speed – 3.20. Head directly at Vladivostok. headquarters of USSR air defense; and test/r & d of new radar & intercept development. 2200 mph guaranteed to light up all the radar & intercept systems they had.
‘A MiG-25 interceptor squadron was based just outside of Vladivostok. The “holy grail” of the soviet air defense system was to shoot down an SR-71.
‘Turn north up the Sea of Japan & make a U-turn back down the USSR coast (12 mi offshore) with ELINT & SIGINT recorders going full bore. Photo cameras looking oblique into the USSR, updating the interceptor air order of battle. Head south east till past Vladivostok then turn slightly left then right to cross Korea at the DMZ. Photo cameras updating N. Korea force readiness to resume hostilities against S. Korea.
SR-71 Blackbird fired on by a MiG-25
‘Continue down the yellow sea coast of China. All sensors evaluating China’s threat to Taiwan. Turn left- decel & land at Kadena. I flew this profile several times during the 4 years I flew ops missions. One of these got very, very thrilling. Southbound, passing Vladivostok, Reg (my RSO) announced;
‘”We’ve got a fighter locked on – it’s gotta be a MiG-25″
‘”Our DEF [Defensive Electronic Gear, DEF. It Provided ground-to-air and air-to-air missile protection. Still Classified. Def systems were labeled DEF A,B,C,E and G. Later modifications to the DEF Systems resulted in DEF A2, C2, H and M systems. Nearing retirement of the SR-71, a programmable DEF labeled A2C could defeat all known threats to the Blackbirds] is blanketing all beautifully.”
Tumblr media
Fedotov MiG-25RB altitude world record
‘”Oops – he just fired – – we’ve got a missile locked on”
‘”Our def has shifted to its missile magic”
‘”There – lock’s broken. Missile’s back in search”
‘”That’s weird – sounds like the missile’s locked on – but not locked on us”
‘”He’s gone – coming up on the “s” turn to the DMZ.”’
Fast forward to late 1976 Col. Cobb retired from the Air Force.
MiG-25 at risk of being shot down by its own missile
Cobb continues;
‘I’m retired! Learning that retirement means no days off; no vacation; no holidays; big pay cut.
‘I find the aircraft TV channel & history channel. Lots & lots of SR-71 films. I avidly watch at every opportunity. In my den, glued to the TV & today’s SR-71 show, & who do I see comparing the MiG-25 with the SR-71??
SR-71 pilot recalls that time his Blackbird flew so fast that he and his RSO landed at Kadena AB two hours before they took off from Beale AFB beating the sun
Tumblr media
‘You’re right – – Lt Victor Belenko!
‘He was totally gobsmacked; his MiG-25 burned up the engines getting to Mach 3 yet the SR’s cruise speed was greater than 3.0.
‘Belenko is the one who said that the Holy Grail of soviet air defense was to shoot down an SR.
‘He told of how they would pre-position ahead of the SR’s radar track and had to zoom up to get a lock on & fire their missile.
‘Belenko stressed how quickly & precisely they had to perform because the window of opportunity was so very short.
‘Their target was traveling at 3600 ft/sec. Faster than a speeding bullet.
‘He described in detail how precise the post firing breakaway had to be executed to avoid getting shot down by their own missile; talking as though they found this out the “hard way.”’
Cobb Concludes;
‘Man talk about intense attention – – I’m quickly mentally replaying that tape from the inter-phone – –
‘”We’ve got a fighter locked on – it’s gotta be a Mig-25″
MiG-25
Tumblr media
‘”Our DEF is blanketing all beautifully.”
‘”Oops – he just fired – – we’ve got a missile locked on”
‘”Our def has shifted to its missile magic”
‘”There – lock’s broken. Missile’s back in search.
‘”That’s weird – sounds like the missile’s locked on – but not locked on us.”’
What happened to the missile fired by the MiG-25 Foxbat at the SR-71 Blackbird?
What happened to the missile fired by the MiG-25? Could it have locked onto the Foxbat itself? Could the SR-71 DEF have deceived it? We’ll never know.
However, we can assume that given that SR-71 had a cruise speed faster than the top speed of the MiG-25’s Acrid missiles, the Blackbird simply outran the AA-6. There was no chance a Foxbat could conduct a tail-chase interception of an SR-71 (the MiG-25 couldn’t carry out a head-on intercept of a Blackbird too: in fact, the Foxbat’s radar and fire control system was not sophisticated enough to solve the problems of a head-on intercept at closing speeds that would exceed Mach 5).
Be sure to check out Linda Sheffield Miller (Col Richard (Butch) Sheffield’s daughter, Col. Sheffield was an SR-71 Reconnaissance Systems Officer) Twitter X Page Habubrats SR-71 and Facebook Page Born into the Wilde Blue Yonder for awesome Blackbird’s photos and stories.
This model is available in multiple sizes from AirModels – CLICK HERE TO GET YOURS.
Photo credit: Dmitriy Pichugin via Wikimedia and U.S. Air Force
@Habubrats71 via X
Linda Sheffield Miller
Grew up at Beale Air Force Base, California. I am a Habubrat. Graduated from North Dakota State University. Former Public School Substitute Teacher, (all subjects all grades). Member of the DAR (Daughters of the Revolutionary War). I am interested in History, especially the history of SR-71. Married, Mother of three wonderful daughters and four extremely handsome grandsons. I live near Washington, DC.
PREVIOUS « The story of when Clint Eastwood almost drowned after crashing in a US Navy Skyraider off the coast of Northern California
Leave a Comment
SHARE
PUBLISHED BY
Linda Sheffield Miller
TAGS:
AA-6 AcridLockheed SR-71 BlackbirdMiG-25MiG-25 FoxbatSoviet Air ForceSR-71U.S. Air Force
10 HOURS AGO
RELATED POST
The exercise where French Mystere IV and Super Mystere B2 fighters outmaneuvered and outclassed US Navy F-4 Phantom IIs
The exercise where French Mystere IV and Super Mystere B2 fighters outmaneuvered and outclassed US Navy F-4 Phantom IIs
Czech Air Force buys 24 F-35 Lightning II strike fighters to replace the JAS-39 Gripen fighter jets currently used by the service
Czech Air Force buys 24 F-35 Lightning II strike fighters to replace the JAS-39 Gripen fighter jets currently used by the service
RECENT POSTS
MILITARY AVIATION
The story of when Clint Eastwood almost drowned after crashing in a US Navy Skyraider off the coast of Northern California
The AD Skyraider The airplane that became the AD (later redesignated A-1) Skyraider evolved from… Read More
10 hours ago
AVIATION HISTORY
“Things don’t look rosy for our big cities:” Here’s what the Luftwaffe’s leadership thought of the B-17 after their first encounter with a captured Flying Fortress
The Boeing B-17 Flying Fortress The Boeing B-17 Flying Fortress design emphasized high altitude flight,… Read More
1 day ago
COLD WAR ERA
The Story of the Soviet Pilot who defected to Turkey flying a MiG-29 Fulcrum
The Soviet Pilot who defected to Turkey flying a MiG-29 Fulcrum The interesting clip in… Read More
1 day ago
COLD WAR ERA
The exercise where French Mystere IV and Super Mystere B2 fighters outmaneuvered and outclassed US Navy F-4 Phantom IIs
Roger Ball! He was the second of two children and born on 25 January 1940… Read More
2 days ago
AVIATION HISTORY
When Soviets tested the Tsar Bomba its shockwave was not only felt worldwide but also irradiated a USAF JKC-135A monitoring its detonation
Tsar Bomba On Oct. 30, 1961, the Soviet Union conducted a live test of the… Read More
2 days ago
F-14 TOMCAT
Capt Dale Snodgrass Wingman recalls when Snort F-14 Tomcat had a Close Call with an Iraqi SAM during Operation Desert Storm
Dale “Snort” Snodgrass’ After achieving his B.S. in Biology and successfully completing ROTC training, legendary… Read More
15 notes · View notes