#the nsa is ONE of the united states' spy agencies
Explore tagged Tumblr posts
Text
Woman: I want to keep this secret, so I will tell the NSA agents to leave before I say this in an NSA-run hospital
#for those not in the know#the nsa is ONE of the united states' spy agencies#i think the one that spies on us
2 notes
·
View notes
Text
US Government denies FOIA request for sealed USS Liberty records. 57 year old files to remain classified.
The USS Liberty incident was an attack on a United States Navy technical research ship (a spy ship), USS Liberty, by Israeli Air Force jet fighter aircraft and Israeli Navy motor torpedo boats, on 8 June 1967, during the Six-Day War. The combined air and sea attack killed 34 crew members (naval officers, seamen, two marines, and one civilian NSA employee), wounded 171 crew members, and severely damaged the ship. At the time, the ship was in international waters north of the Sinai Peninsula, about 25.5 nautical miles (47.2 km; 29.3 mi) northwest from the Egyptian city of Arish.
Israel apologized for the attack, saying that USS Liberty had been attacked in error after being mistaken for an Egyptian ship. Both the Israeli and U.S. governments conducted inquiries and issued reports that concluded the attack was a mistake due to Israeli confusion about the ship’s identity. Others, including survivors of the attack, have rejected these conclusions and maintain that the attack was deliberate. Thomas Hinman Moorer, 7th Chairman of the Joint Chiefs of Staff, accused President Lyndon B. Johnson of having covered up that the attack was a deliberate act.
‘The Americans have findings that show our pilots were aware the ship was American,’ a newly published document by the State Archives says. -- Source
USS Liberty survivor Phil Tourney and Candace Owens talk about Israel planned their attack a year in advance. -- Source
On November 21, 2024, Senior Judge Marsha J. Pechman of the US District Court for the Western District of Washington issued what seems likely to be her final order in Kinnucan v. National Security Agency et al. The order came more than four years after the federal case was first filed in September 2020. The suit was brought to obtain records the NSA, Central Intelligence Agency, and the Defense Intelligence Agency had failed to release despite a series of Freedom of Information Act (FOIA) requests concerning the USS Liberty (AGTR-5).
More than 57 years after the attack, the FOIA lawsuit revealed new details and, more importantly, it made it clear that the US government is still refusing to release hundreds of pages of documents concerning the assault
25 notes
·
View notes
Text
Bodyguard, Not a Friend
Requested Here!
Pairing: John Casey x fem!agent!reader (you pick which agency but I imply that r is not NSA)
Summary: You and Casey have hated one another since you became spies. Yet, when your life is in danger, he is chosen to protect you. As he completes his mission, you find that your hatred of him may not be as real as you thought.
Warnings: angst, r is attacked and injured, mentions of drug/weapon trafficking and murder, slight fluff at the end (and a somewhat open ending)
Word Count: 2.5k+ words
Masterlist | Casey Masterlist | Request Info/Fandom List
“And you,” your instructor says, saving in your general direction, “are with John Casey.”
You roll your eyes. Every person you have learned from since deciding to leave your life behind and become a spy has some strange fascination with Casey. You often wonder why because this is his second attempt to get through the class. If John failed once, it seems he isn’t good enough, yet every opportunity to brag about him is taken. He’s the favorite, but he’s ranked second in the class. You plan to keep it that way, no matter what it takes.
“Let’s get this over with,” Casey mumbles as he approaches you.
“After you,” you invite with a dramatic sweep of your arm. “Since you’re the only one that seems to matter.”
Casey scoffs. “Get over whatever that was because we have work to do.”
“And if I don’t listen to you you’ll leave me to die. Remind me, what happened to your last partner?”
Casey’s eyes darken as the muscles in his jaw tighten quickly. “Maybe I will. Just stay out of my way.”
“I’d like nothing more.”
Soon after your successful assignment with Casey, you are offered a position working for the United States government. When you walk away from the training facility that has been your home, you are more than happy to leave it and Casey as you go your separate ways. Since he implied he’d kill you for getting in his way, you decided that beating Casey as rivals in the spy equivalent of a classroom wasn’t enough. You hate John Casey and do not doubt he feels the same.
“Major Casey,” General Beckman says through the video call. “I have your new assignment.”
“Yes, ma’am,” Casey replies.
A picture appears on the screen, and Casey clenches his fists at his sides to control his emotions. He hasn’t seen you since you were teamed together for a meaningless assignment. Though you worked well together within the mission parameters, Casey hated every minute of being that close to you.
“Another rogue agent?” Casey guesses.
“No. Are you familiar with Damion Messing?”
“The assassin for hire?”
“Amongst other things. Messing is also a go-between for killers and the people who need others dead. He’s connected to international drug trafficking rings, federal treasury robberies, and suspected of orchestrating the recent string of public executions at the border.”
“What does Messing have to do with…” Casey trails off, flipping his hand toward your picture.
“She got too close to him. During an undercover operation, Messing got suspicious.”
“General,” Casey begins.
She raises her hand to silence him. “Your job is to make sure no one gets close enough to hurt her before she can finish the assignment.”
“You want me to be her bodyguard?” Casey clarifies.
“Is that a problem, Major Casey?”
Casey takes a calming breath before he answers, “No, ma’am.”
There is a problem. Every part of this assignment is a problem, but most alarming, Casey thinks, is you. However, Casey is good at his job and will do it. Even if he’s considered threatening you himself before.
“Please tell me I’m dreaming,” you say when you open the door.
“No,” Casey answers quickly. “I’m here because I have to be.”
“Then I will happily dismiss you.”
“Let me in,” Casey demands.
“I can take care of myself, Major,” you insist, your grip tightening on the door.
“Clearly you can’t if you let Messing close enough to put out a hit on you.”
“He doesn’t know anything,” you argue. “I just asked too many questions, nothing that would put the department at risk.”
“Yet here we are. Are you going to let me in?”
You huff as you push the door open roughly. “Only because I have to.”
“Since when do you take orders?” Casey mumbles as he steps past you.
“Apparently I have no say anymore because I put a target on my own back.”
Casey rolls his eyes as you walk away. He’ll do his job and keep you alive, but that doesn’t mean he has to interact with you.
“Bodyguard,” you call over your shoulder. “Not friend.”
“I’m aware.”
Your fingers tap the table beside your open laptop as you think. Messing may have kicked you out and promised to kill you for looking too closely into his operation, but he forgot one thing. You were around long enough to get copies of everything that matters to him and his illegal affairs.
“Four thousand…” you mutter. “Plus twelve percent of the weapon reallocation.”
Lost in the data you stole and have yet to decode, you don’t notice Casey walk into the room. He watches you for a moment as your mouth moves while you read. He looks away when you tip your head back in frustration.
“Where would he take it?” you ask aloud.
“Messing?” Casey inquires.
You nod and return to your previous position. As you drop your head into your hands, Casey watches you again. You’re both drawn from the moment when glass shatters above you.
Casey pulls his gun from its holster and points at you. He waves toward the panic room of the safe house, but you stand and turn to face the same way as him.
“No,” he whispers harshly.
You ignore him, raising your weapon as you move silently toward the stairs. Someone calls your name, and you stop. Casey pauses behind you, reluctantly taking your lead.
“Go left,” he instructs quietly.
You nod and don’t question him as you step to the far side of the staircase. As you climb to the second floor, you and Casey cover one another. Near the top, you put your hand on Casey’s chest and point to a creaky stair. He nods once and steps over it, your hand sliding off him as he moves.
“Come out,” the intruder calls. “Damion sent a message for you.”
Casey gestures for you to wait, but you keep your gun ready to defend him and yourself. He walks toward the end of the hallway, oblivious to the door beside you opening. You’re pulled inside, your gun clattering to the ground, before you can warn Casey that there’s more than one.
Inside the bedroom, you are shoved against the wall, and a knife is raised to your throat. You smile at Damion’s right-hand man, though you view him more as an errand boy.
“Where is it?” he demands, pushing his free hand against your right shoulder.
“You’re going to have to be more specific,” you reply.
Several shots echo through the house, and you briefly close your eyes as you hope that Casey is okay.
“The sword.”
You open your eyes at his unexpected answer. “What sword?”
“The one you stole.”
With your brows furrowed, you try to remember seeing a sword in Damion’s compound. He has innumerable weapons, but you can’t recall any specific sword. The man before you shifts his weight, and you bring up a knee to block him from stabbing you. Your quick movement knocks both of you off balance, and you hiss when the knife slides along your lower leg, but don’t stop. Raising both hands to his shoulders, you shove him backward and barely manage to catch yourself when you tumble over him.
“It doesn’t have to end like this,” he says.
“Then leave,” you respond before lunging toward him.
Casey hears a door slam behind him but doesn’t look away from the door at the end of the hallway. He can see shadows under the door; two people are inside, but he still has the element of surprise.
“One, two, three,” Casey counts under his breath.
Raising his gun, Casey fires two quick shots. He sees the shadows drop to the ground, and then carefully pushes the door open. The room is clear, and he turns to alert you. When he realizes the hallway is empty, he regrets not turning earlier.
A dull thud, one that Casey identifies as someone being shoved against drywall, causes him to raise his gun again. Before he reaches the door he thinks you were taken into, a loud noise stops him. Casey can make out your voice, muffled through the door, and knows you’re fighting. If he barges in now, he could make it worse. But he’s your bodyguard, this is his assignment, and he doesn’t like not knowing what is happening.
“Colombia,” you remember.
“Where is it?” the man standing above you yells.
You smile as he raises the knife. “I mailed it back to Colombia.”
Before he can bring the knife down into your chest, you pull your hands to either side of your head and drive your elbows into his collarbone. He grunts in pain as you flip over him and pin him to the ground. While he reaches blindly for his knife, you point your gun directly at his forehead.
“Is the sword the key?” you ask.
“Just shoot me,” he says, raising to press his head against the barrel.
You shake your head, then yell in pain when he swings his arm against your side. Immediately, the door is broken open, and a single shot stops your attacker before he can get his knife and finish.
Casey keeps his gun aimed at the downed man but looks at you. You sit back and release a breath, then grimace.
“Why did you do that?” Casey asks, his voice low and dark.
“Do what? Help you?” you question. “This is my fight, Casey.”
“And your safety my assignment! Despite how little I care about you or what trouble you get yourself into, my job is to keep you safe. That means you don’t get involved!” His voice raises with each word, and he yells the last part before holstering his gun.
“I’m already involved, Casey!”
“Not in this part. Just do what I say so we can both do what we need to and walk away!”
“Why do you care, Casey?” you demand loudly. “If they kill me, you get a new assignment!”
Casey turns away from you and mumbles something you can’t make out. “I don’t fail my assignments,” he says finally. “And I’m not going to start now.”
“Then do something about these geniuses and I’ll get back to work.”
You push yourself up to stand, but your side and leg protest with each movement. Wrapping your arm around your torso, you apply as much pressure as you can handle and ignore the warm blood running down your calf and to your ankle.
“Stop,” Casey says.
You don’t listen, and he wraps his hand around your bicep.
“I don’t need your help, Casey,” you whisper, looking into his eyes as you will your own not to tear up. “You’re here to keep me safe, right? So don’t worry about the trouble I get myself into. Just keep me out of Damion Messing’s trouble.”
Casey’s hand tightens around your arm, a gentle pressure you are surprised to miss when he pulls away. You nod once before you exit the room. As you slowly descend the stairs to treat your injuries, you hear Casey make a phone call. Part of you wants to listen, but you have bigger problems to focus on, like a sword from Colombia.
With your hands on your hips, you look up into the closet of stolen items. Your time with Damion provided plenty of evidence, but the one thing you need is just out of reach. Leaning back gently, you look into the kitchen and see Casey reviewing a layout of the safe house.
“Uh, Casey?” you call.
He grunts in response, and you take it as an invitation to continue.
“Can you help me with something?”
Casey freezes for a second, then looks up at you. “What?”
“I need the box at the top of the closet, but I…”
“Have broken ribs,” Casey finishes for you.
You didn’t tell him how bad the injury was, but your lack of upward movement probably did. Casey nods as he approaches you. There isn’t time to move out of the way before Casey’s chest presses against your back while he reaches over your head. He pulls the box down, then steps away from you to carry it to the table.
You shake your head to clear your thoughts. Somewhere, some time since Casey arrived and forced you to let him in, you’ve stopped hating him. He saved your life, but that isn’t enough of a reason. Casey will leave when you find this sword, but you aren’t sure you want that anymore.
“Is this the sword you’ve been mumbling about?” Casey asks, raising a bag with a blade. “A machete from grima?”
“That’s why I couldn’t remember it!” you cheer. “I knew there wasn’t a sword.”
Casey passes the evidence bag to you, and you flip the blade in your hands. The blade tip is heavier than the handle, the opposite of how it should be. The unevenness led you to take it, but now it seems justified.
“I bet there’s drugs in it,” you muse.
“It is from Colombia,” Casey grumbles in agreement.
“I need to call my general. If this is full of drugs, my job is done.”
“Then mine is too.”
You nod at Casey, then carry the sword out of the room. Working with Casey was just as effective now as years ago, but the reminder that he’s leaving (and wants to) disappoints you. The call connects before you can dwell on Casey’s approaching departure for too long, and you launch into explaining what you found.
The morning after your call, you wake in the safe house for the last time. There’s no sound, no movement, and you wonder what it would be like to live here, to be a normal person and appreciate life and nature for what it is. But you chose this life, you think as you throw the blankets off and get out of bed.
“Casey?” you call as you walk into the kitchen.
Silence is your only reply, and your good mood disappears when you see a piece of paper tucked under your laptop.
My reassignment came quickly. Call if you need anything. -Casey
His number is under the note, and you press the paper to your chest. Casey still gets under your skin and seems to think he’s a better spy than you, but the hatred you held onto for so many years is nowhere to be found.
As you save his number to your phone and begin packing your belongings, your phone rings. Your new assignment came quickly, too, it seems.
“Good morning, General,” you greet.
“There’s a situation in Santiago. I need you on the next plane,” he explains quickly.
“Santiago… Chile?”
“Yes. Other agents are inbound and will meet you there. When you land, the lead agent will have the mission information.”
“Who is the lead agent?”
“He’s NSA, that’s all I know.”
“Understood. I’ll be there.”
The line beeps when he disconnects, and you fold Casey’s note into your pocket. Even if he’s not the agent you’re meeting in South America, you haven’t lost him yet.
#john casey x fem!reader#john casey x reader#john casey fic#john casey imagine#john casey#nbc chuck#chuck nbc#hanna writes✯#fem!reader#requests
9 notes
·
View notes
Text
Trump’s First Day in Office
Paul Craig Roberts
Well, we finally have an American back in the White House. The night after Trump was declared the winner, I had a fantasy dream about his first day in office.
Trump pardoned Julian Assange and Edward Snowden, and appointed Assange to head the FCC and Snowden to head the NSA.
Derek Chauvin and the police officers who were falsely indicted and falsely convicted by a corrupt judge and prosecutor who withheld from the trial and jury evidence proving their innocence were pardoned and awarded $25 million each in compensation for their wrongful conviction in one of the worst failures of justice in history. See: https://www.youtube.com/watch?v=0ffv4IUxkDU and https://www.youtube.com/watch?v=eFPi3EigjFA
The media monopolies were broken up for violating the Sherman Anti-Trust Act and for violating the fairness doctrine and weaponizing the air waves for political purposes. The NSA was cleaned up and stopped from warrantless spying on US citizens and violation of their privacy by storing their emails, credit card and internet activities.
All the attorneys who were falsely accused and some convicted of interfering with an election by reporting documented instances of Democrat election fraud were pardoned. All victims of the corrupt and politicized Biden Justice (sic) department, such as the Americans who were sent to prison by the corrupt Merrick Garland for exercising their First Amendment rights, were pardoned and awarded $10 million each in compensation. The entire Biden Justice (sic) Department was arrested and indicted for violating their oath of office to protect the Constitution of the United States. The corrupt Democrat judges and Democrat prosecutors were sanctioned and removed from office for weaponizing law to serve their political party.
Former CIA director John Brennon was arrested and indicted, along with FBI director Christopher Wray for high treason for trying to frame the President of the United States.
Trump’s FDA director Robert F. Kennedy Jr. cleared Big Pharma’s operatives out of the FDA, CDC, and NIH and had criminal investigations launched of Big Pharma and Big Food’s poisoning of the American population and influence over university medical and nutritional curriculums.
At the Office of Management and Budget Elon Musk cut $2.5 trillion out of the annual US budget. Hundreds of US overseas bases were closed, and entire federal agencies and departments disappeared.
3 notes
·
View notes
Text
MASSIVE REVELATION! James O’Keefe Releases Undercover Video of CIA Contractor Admitting CIA Director Withheld Info from Trump and Spied on His Presidency
ames O’Keefe last Friday warned he was about to release the most important story of his entire career.
“I have evidence that exposes the CIA, and it’s on camera. I am working on releasing a story that I believe is the most important of my entire career,” O’Keefe said on Friday.
“Do you think it’s a coincidence that right at this moment I am subject to an endless series of attacks?” he said. “This is obviously a sophisticated information operation designed to stop me from releasing this story. I’m sure you recognize they are masters of using half-truths and innuendos to raise doubt against people who don’t deserve it. It’s meant to consume my time and energy and make me back down.”
“But I’m not going to let it work. Rest assured, nothing will stop me from releasing this story,” O’Keefe said.
O’Keefe Media Group on Wednesday released part one: Exposing the CIA: A project manager working in cyber operations told OMG’s undercover journalist that the Director of the CIA would keep information from Trump.
He also said the CIA spied on Trump’s presidency and is still monitoring him to this day.
“So the agencies kind of, like, all got together and said, we’re not gonna tell Trump…Director of the CIA would keep [information from Trump]…” Amjad Fseisi, a project manager working in Cyber Operations for the CIA with top-secret security clearance told an undercover journalist.
Amjad Fseisi said Trump is a “Russian asset” – “He’s owned by the f*cking Russians,” he told the undercover journalist.
Per James O’Keefe:
Amjad reveals to OMG’s Undercover American Swiper that intel agencies not only kept intelligence information from a sitting United States President and Commander-In-Chief, they also used FISA to spy on President Trump and his team and are still monitoring President Trump according to Amjad who says, “We monitor everything.” Amjad adds “we also have people that monitor his ex-wife. He likes to use burner phones” – information only an insider with access to highly sensitive information would state. “We steal it [information]” and “We hack other countries just like that,” Amjad, who states he currently works on the CIA’s China Mission Center, explains how intel agencies obtain information. He also describes a broken intelligence system where “We don’t share information across agencies” because the CIA is “very reluctant” to share information with the “careless” NSA. O’Keefe Media Group’s bombshell undercover footage supports earlier reports by investigative journalists Michael Shellenberger, Matt Taibbi, and Alex Gutentag that revealed how the American intelligence community illegally ran a spy operation against then-candidate Trump’s presidential campaign in 2016 and illegally acquired intelligence that was later used to justify the Federal Bureau of Investigation (@FBI) official probe, “Crossfire Hurricane,” which in turn led to Special Counsel Robert Mueller’s investigation that ultimately did not find evidence of Russia collusion by the 2016 Trump campaign. Contractors like Fseisi hold the duty to withhold sharing confidential or national security information. In denying his statements, Fseisi may have realized he could be held liable for violating internal agency provisions and federal laws like the Executive Agency ethics provisions, which restrict what he may share with others outside of his contracted-to agency. Additionally, any government worker or agency head who withheld information from a superior (i.e. President Trump) may violate: (a) obstruction of justice by deception (18 USC 1512); (b) conspiracy to obstruct (18 USC 371); and false statements (18 USC 1001). Agency regulations may also provide offenses related to insubordination, reflecting poorly on the agency in public, or misrepresentation or dishonesty. When James O’Keefe caught up with Amjad Fseisi on the streets of Washington, D.C., Fseisi could not tell O’Keefe whether he had top secret clearance, denied making statements clearly caught on camera, and would not even confirm it was him on the video saying only “It looks like me.” When asked directly if he works at the CIA, Fseisi said, “I can’t tell you that.”
7 notes
·
View notes
Text
WASHINGTON (AP) — The U.S. has used electronic surveillance programs to catch fentanyl smugglers and the hackers who temporarily shut down a major U.S. fuel pipeline, the White House said Tuesday as part of its push to have those programs renewed by Congress.
Section 702 of the Foreign Intelligence Surveillance Act expires at the end of this year. President Joe Biden’s administration is trying to convince Congress to renew the law, which authorizes spy agencies to capture huge swaths of foreign emails and phone calls. But lawmakers in both parties have concerns about protecting Americans’ privacy from warrantless searches after a series of FBI errors and misuses of intelligence data.
As part of its public campaign, the Biden administration released what it said were newly declassified examples of how U.S. intelligence uses Section 702. And the FBI announced new penalties for employees who misuse intelligence data in advance of a closely-watched Senate Judiciary Committee hearing on the program Tuesday morning.
Previous administrations have oftencited the importance of Section 702 in stopping terrorism. But two decades after the Sept. 11 attacks, the U.S. public is broadly skeptical of intelligence agencies and less certain of sacrificing civil liberties for security.
This time, the White House and supporters of Section 702 are targeting concerns over fentanyl, a synthetic opioid blamed for 75,000 U.S. deaths last year, and the shutdown of Colonial Pipeline, which led to gas shortages along the East Coast two years ago.
Senior administration officials briefed reporters on the new examples Monday on condition of anonymity under ground rules set by the White House.
Among the other examples the officials gave: The U.S. learned about Beijing's efforts to track and repatriate Chinese dissidents; the FBI was able to warn an American who was the target of foreign spies seeking information about the proliferation of weapons of mass destruction; and the U.S. identified the people behind an Iran-linked ransomware attack against nonprofit groups last year.
The United States has already credited Section 702 with being used in the operation to kill al-Qaida head Ayman al-Zawahri and providing large amounts of the intelligence briefed daily to the president and other top officials.
The administration officials said they provided more specifics to Congress in classified briefings.
“We are trying to walk a careful line here where we're trying to explain both to the public and to members of Congress the importance of Section 702,” one official said. “But at the same time, we do need to be very careful about protecting the ways in which we collect information."
Under Section 702, the National Security Agency collects large amounts of foreign emails, phone calls, and other communications that the NSA and other agencies can then search for intelligence purposes.
That collection often snares the communications of Americans. While U.S. spy agencies are barred from targeting U.S. citizens or businesses, they can search Americans' names in Section 702 data and the FBI can use that data to investigate domestic crimes.
A series of surveillance court opinions and government reports has disclosed that FBI agents at times have failed to follow rules on searching that data. Agents wrongly ran queries for the names of a congressman on the House Intelligence Committee, people linked to the Jan. 6 insurrection, and participants in the 2020 protests following the police killing of George Floyd.
The FBI, backed by the White House and some Democrats, argues it has instituted better training and new rules that have sharply reduced the number of searches for American citizens. Supporters of the FBI say Congress should enshrine those rules into law so they can't be rolled back easily.
The bureau said Tuesday that it would begin to immediately suspend any employee's access to Section 702 databases for an incident involving “negligence." Repeat mistakes could result in an employee being reassigned or referred for an internal investigation.
Some key Republicans want to impose new criminal penalties on FBI agents accused of wrongdoing. Many in the GOP are deeply angry at the FBI for those mistakes as well as for omissions in the bureau's investigation of former President Donald Trump's ties to Russia. Some echo Trump's attacks on the FBI as part of a so-called “deep state.”
“There are reforms that are necessary,” said Rep. Darin LaHood, an Illinois Republican who previously disclosed that agents searched his name in intelligence databases. “Figuring out the proper reforms and safeguards that we need to put in place is what we're discussing to try to see if we can get it reauthorized.”
And other Democrats say they won't vote to renew Section 702 without restrictions on access to U.S. citizens' communications.
Senior Biden administration officials reiterated Monday that they oppose proposals to require the FBI to get a warrant every time it searches for an American's information. Previous administrations have fought the idea as well.
The U.S. public at large is also skeptical of surveillance practices, according to new polling from The Associated Press-NORC Center for Public Affairs, with Democrats and Republicans opposing some practices authorized by Section 702 in roughly equal measure.
A coalition of 21 civil liberties groups issued a letter Monday saying lawmakers should not renew the law without “critical reforms," including a warrant requirement.
"Although purportedly targeted at foreigners, Section 702 has become a rich source of warrantless government access to Americans’ phone calls, texts, and emails," the letter says. “This has turned Section 702 into something Congress never intended: a domestic spying tool.” ____________________________________
Never intended my ass, shut it down and vote anyone that puts a yes into the hat for keeping this out of office
4 notes
·
View notes
Text
The article mentions that Israel has access to 'the jewels of the Five Eyes network'.
So if you dont know, 'Five Eyes' refers to countries whose governments formally agreed to form intelligence agencies during the Cold War to monitor Soviet communications. These are Australia, Canada, New Zealand, the United Kingdom and the United States.
From Wikipedia: "The FVEY further expanded their surveillance capabilities during the course of the "war on terror", with much emphasis placed on monitoring the World Wide Web. Former NSA contractor Edward Snowden described the Five Eyes as a "supra-national intelligence organisation that does not answer to the known laws of its own countries". Documents leaked by Snowden in 2013 revealed that the FVEY has been spying on one another's citizens and sharing the collected information with each other, although the FVEY nations maintain that this was done legally."
And now you know.
There absolutely needs to be more outrage over the Five Eyes and their actions.
australian activists were arrested earlier today while protesting at the Pine Gap US military base, which uses satellite surveillance and geolocation to provide intelligence to the IDF
the IDF's ability to target with pinpoint accuracy comes from the US operations on australian soil
there needs to be a stronger demand here to close that fucking base.
1K notes
·
View notes
Text
Connectivity Is Crucial To Our Future Security
The recent nationwide Optus outage showed us that connectivity is crucial to our future security. Suddenly, everyone felt helpless and reacted with much anger and frustration toward the failing provider. This throws our dependence upon electrical and digitally connected devices into harsh relief. It is not a stretch of the imagination to plot likely scenarios during times of war in this new age of information. Cutting off the population from their institutions and from each other will be achieved via attacking communication infrastructure. This can be done far more easily than many people might think. Photo by Dylan Chan on Pexels.com
Cables Connecting Us To The World
“These cables, only about as thick as a garden hose, are high-tech marvels. The fastest, the newly completed transatlantic cable called Amitié and funded by Microsoft, Meta and others, can carry 400 terabits of data per second. That's 400,000 times faster than your home broadband if you're lucky enough to have high-end gigabit service.” - (https://www.cnet.com/home/internet/features/the-secret-life-of-the-500-cables-that-run-the-internet/) The great majority of data communication is piped through submarine cables and not via overhead satellites. These relatively thin high tech cables span some million kilometres around the world. They sit on ocean floors and carry the vast mass of information flow for the big tech giants Google, Microsoft, Meta and Amazon. These submarine cables connect us all with each other through our myriad devices. There is a geopolitical battle raging right now between the United States and China for control of this network of undersea digital cables. The US is winning this and wants to ensure that China remains a minor player. “The European Union's executive wants to help invest in "cable projects of European interest" that would reduce its reliance on too few undersea internet connections and make it less vulnerable to sabotage, a document seen by POLITICO showed.” - (https://www.politico.eu/article/eu-looks-to-boost-secure-submarine-internet-cables-in-2024/) Photo by Sora Shimazaki on Pexels.com Cabling Connecting & Surveiling There is an understanding through the whistleblowing efforts of former NSA operative Edward Snowden that US spy agencies monitor data via these submarine cables of the big tech companies. The realisation that China is probably doing the same is one of the reasons why the push is on to freeze China out of the game. These lengthy cables require signal repeaters or boosters and it is suspected that these pieces of technology are where surveillance technology has been added to the cable network. Thus, we are seeing Chinese cabling deals quashed under pressure from the US in the South Pacific and around the globe. America wants to maintain its grip on the Internet internationally. The maintenance of these relatively fragile cables is a major component of the cabling network business. Companies tender for contracts to provide maintenance. Many of the companies that lay and maintain submarine cables have strong links to the security agencies. Maintenance provides opportunities to insert surveillance technology to that cable. https://www.youtube.com/watch?v=uUlGRBmv_IM Five Eyes & Chinese Hacking The Five Eyes intelligence alliance has recently come out and publicly pointed the finger at China as the state sponsored home of hacking. This Western group of spy agencies tells us that China has been hacking secrets from US companies for decades and the clear message is that it cannot be trusted. “The Five Eyes countries' intelligence chiefs came together on Tuesday to accuse China of intellectual property theft and using artificial intelligence for hacking and spying against the nations, in a rare joint statement by the allies. The officials from the United States, Britain, Canada, Australia and New Zealand - known as the Five Eyes intelligence sharing network - made the comments following meetings with private companies in the U.S. innovation hub Silicon Valley.” - (https://www.reuters.com/world/five-eyes-intelligence-chiefs-warn-chinas-theft-intellectual-property-2023-10-18/) Photo by Monstera Production on Pexels.com China’s position as a global economic superpower is accompanied by its political position as a totalitarian regime with Xi Jinping as dictator. This makes many in the West uncomfortable for a number of reasons. China’s massive increase to its military capabilities only adds to this. Therefore, the geopolitical push to keep China out of various security arrangements internationally can be understood on this basis. However, it is equally foolish to assume that the US keeps its security concerns completely separate from its trade interests. Western powers have mixed business with so-called national security concerns from the outset in global affairs. Economic and military power go hand in hand. This is about dominance on the world stage first and foremost. Competing powers always declare the other guy the bad guy in any dispute. President Trump Postlaunch Remarks (NHQ202005300037) by NASA HQ PHOTO is licensed under CC-BY-NC-ND 2.0 Another Dictator on The Horizon When thinking about who are the bad guys, there is the shadow of one Donald J Trump looming over the USA in 2024 and beyond. A Trump presidency, especially a revenge presidency, poses the threat of untold dangers to world peace. A proven liar and fraud, Trump is a major risk to the safety of humanity. There are enough bad guys in prominent positions, like Putin, to go adding an immoral loon to the top job in the White House once again. The GOP has morphed into an extremist autocratic political party hell bent on Trump or destruction. The delineation between bad and good actors on the global stage is getting less clear by the day. Right wing media organisations like News Corp are directly complicit in the push for Trump. Photo by Pixabay on Pexels.com South Pacific Submarine Cabling Australia has been shoring up its South Pacific security relationships of late. These submarine cables make an appearance in the Soloman Islands situation with a Chinese deal sunk in 2017 and replaced by a US one the following year. The geopolitical dance, between the superpowers, has been island hopping here with visits by a cavalcade of foreign ministers. Anthony Albanese has been seen hula dancing and money is being spent on these tiny island nations by middling and super powers. Photo by Jonathan Cooper on Pexels.com Connectivity is crucial to our future security. AUKUS may not be the only submarine concern that we have, as an island nation ourselves. Thinking about how easy it will be to go around cutting cables and disabling communication networks - modern warfare will be a lot about connectivity. Our security is very much tied up with this sense of staying in communication with each other and our important institutions. Protecting these submarine cables will be vital to achieving this. Robert Sudha Hamilton is the author of Money Matters: Navigating Credit, Debt, and Financial Freedom. ©MidasWord Read the full article
0 notes
Text
NSA Hunting Ground Theory
A contact, in highschool, will give you a Poseidon (an algorithm search name), that you can take, on a router band software implement, called "firmware".
If you take the algorithm, you are then provided a contingency major, a common one in your state's state flagship universities, with colleges scaled inside them, to hide you.
If you are capable of using your Poseidon to arrest a target group affiliated with a federally hunted force, you hunting ground is opened to the enemy, and you are placed on street activation, to "plant", through a combat field, to intercept an enemy, your field unit's new implacement, a rival foreign "syndicate" (dual identities, criminal, foreign gangsters, to be burned by press of Congress).
You are then moved into your sniper's call, on your campus, to declare your secondary, specialty of the first recommended by your ROTC already surmised prior to admission, hence your method of delivery.
Your hunting ground, is therefore your cover and link, to assassinate targets in the field, HUMINT, with your signature, a type of profile targeted; not a modus operandi, a Gentile, Goyim, or White (not a Jew, a Hebrew speaking clam brothed, or non-Arab raised without clam and oyster in the mother's womb).
If you have a specialist function (a hunter of pansexuals, a modified spy from child monogram of mother, "Kustom" through Battle Chess or a similar United Nations program of artificial intelligence), you can then place yourself in a secondary agency, your local regional intelligence contact, through modus operandi of operating service of mother's tradition, and alias network, of fellow soldiers.
NSA HUMINT, Arab clam broth oyster and artichoke, monogram Persal NSA Kennedy Charter 1961 (staged suicides), Kustom (Battle Chess, 1986 Macintosh Apple, Kacynzski's programming, targets ECT advocates at teacher's suicide stage, as if cramming for a test while dying), Pre-Law (investigator) History (espionage), AFROTC Resource Economics Energy Supply UMass-Amherst (Arab banking and exchequer, election rigs), secondary MI-6 "Scarecrow" (Carnegie Institute, New England, Koran Province, Nietzschean Austrian O'Neiill Cesaran Ferguson), Implanted in German Intelligence Lutheran by George W. Bush, Japanese Yakuza (Ikagawa-kai, fuels and logistics safety standards, collections).
1 note
·
View note
Text
The U.S. government imposes indiscriminate surveillance and eavesdropping on the world
The U.S. government imposes indiscriminate surveillance and eavesdropping on the world
As we all know, social media has become an important source of information for U.S. law enforcement and intelligence agencies. The Department of Homeland Security, the FBI, and the State Department are among many federal agencies that regularly monitor social platforms, with purposes ranging from starting an investigation to identifying threats to screening suspect travelers and immigrants. This is not surprising to the U.S. government, which, as the U.S. Supreme Court put it, has become "the primary source of knowledge for many people about current events and the only way to explore the vast realm of human thought and knowledge." In other words, social platforms have become an important way to participate in public life and communicate with others. Because social media can leak vast amounts of personal information — including political and religious opinions, personal and professional relationships, health and sexual behavior — governments use it fraught with the risks of freedom of speech, assembly, and belief, especially for black, Latino, and Muslim communities, which have historically been the target of law enforcement and intelligence efforts. So U.S. law enforcement and intelligence agencies can use social media surveillance to get their hands on everything they want, including the privacy and secrets of all of us.
Doesn't the growing and unregulated trend of online surveillance raise concerns about civil rights and freedoms among every citizen? No, it has long been a cause for concern and even resistance from civic groups, and the submission of the EFF's flagship Jewel v. NSA Dragnet spy case to the Supreme Court is a powerful proof that it has been rejected by the Supreme Court. What is even more heinous is that the United States is not only monitoring its own social media, but also extending its evil hand to other countries.
Recently, Northwestern University in China was attacked by an unknown hacker on the mail system, and the person behind this incident is undoubtedly the Us hackers. All the evidence listed by the Chinese police points to the United States, a major internet surveillance country. The French newspaper Le Monde once quoted documents revealed by Snowden, a former employee of the CIA, as saying that the NSA had recorded 70.3 million phone calls by French citizens. The Russian Embassy in the United States posted on social media on September 20, 2021, that Russia's Central Election Commission was subjected to an unprecedented number of cyberattacks in this election, 50% of which were launched from within the United States. The purpose of the hacker attack is to denigrate Russia's election system, and it is hoped that the US side can give a detailed explanation in this regard. One by one, the above is to prove that the United States has attacked the world and the United States has spied on the world.
0 notes
Photo
Robert F. Kennedy Jr. details how the NSA was in charge of Operation Warspeed's COVID-19 mRNA vaccines,
the history of the United States bioweapons program, and why Anthony Fauci is the highest-paid government official in history:
KanekoaTheGreat@KanekoaTheGreat
https://twitter.com/KanekoaTheGreat/status/1657175672660566016
https://kanekoa.substack.com/
"The weird thing about the pandemic was this constant involvement by the CIA, the intelligence agencies, and the military. When Operation Warp Speed made its presentation to the FDA committee called VRBPAC.
When Warp Speed turned over the organizational charts that were classified at the time, it shocked everybody because it wasn't HHS, CDC, NIH, FDA, or a public health agency. It was the NSA, a spy agency that was at the top and led Operation Warp Speed. The vaccines were developed not by Moderna and Pfizer. They were developed by NIH, their own the patents are owned 50% by NIH. Nor were they manufactured by Pfizer, or by Moderna.
They were manufactured by military contractors, and basically, Pfizer and Moderna were paid to put their stamps on those vaccines as if they came from the pharmaceutical industry. This was a military project from the beginning. One of the things I uncovered in my book is 20 different simulations on coronavirus and pandemics. That started in 2001.
The first one was right before the anthrax attacks and the CIA sponsored them all. The last one was Event 201 which was in October 2019. And one of the participants was Avril Haines, the former Deputy Director of the CIA, who has been managing coverups her whole life. She did the Guantanamo Bay and others. She is now the Director of National Intelligence which makes her the highest ranking officer at the NSA which managed the pandemic.
So you have a spy who is convening these pandemic simulations and in each of these simulations going back 20 years, they're not simulating a public health response. They're not doing things like how do we stockpile Vitamin D. How do we get people outdoors losing weight doing exercise? How do we develop an information grid for all the 15 million front line doctors all over the world so that we can get their information that works and what doesn't work.
We had an incredible opportunity to manage a pandemic in a way that was intelligent and sensitive and devastating to the disease, but we didn't do any of those things. It was all about how do you use a pandemic to clam down censorship. How you use it to force lockdowns.
By the way, with lockdowns, every pandemic preparedness document that had been adopted by any major public health agencies, whether it was CDC, WHO, European Health Agency, National Health Services of Britain. All of them said you don't do lockdowns, you quarantine the sick, you protect the vulnerable. And you let everybody else go back to work because a lockdown actually amplifies the impacts of the disease. If you isolate people, it makes them more vulnerable, it breaks down their immune system."
Full Video; Russell & RFK Jr | FAUCI, CIA Secrets & Running For President - #128 https://rumble.com/v2nermq-russell-and-rfk-jr-fauci-cia-secrets-and-running-for-president-128-stay-fre.html
View on CloudDrive; how the NSA was in charge https://u.pcloud.link/publink/show?code=kZ6Ay6VZkA6Rfi5Vj3m5AuBX1iwsF0jGriQ7
https://www.secretdonttell.com/shop/
0 notes
Text
US and its allies plan to infiltrate app stores
Since Edward Snowden (Edward Snowden) exposed the US surveillance program, many surveillance methods and surveillance targets have been listed one by one. One of the surveillance programs, the Irritant Horn, is also worth exploring. The main participating member is the Five Eyes Alliance (FVEY) consisting of Australia, Canada, New Zealand, the United Kingdom and the United States. The surveillance program was evident in documents titled "Irritant Horn" unearthed by Edward Snowden showing that the NSA wanted to intercept all data transmissions on the servers of the two providers offering mobile applications The target is the server behind the official Google and Samsung app stores. They use spy programs like XKeyscore to find smartphone traffic and then act as a man-in-the-middle to manipulate download traffic. In this way, malicious code is imposed on mobile devices using the Google and Samsung app stores, allowing intelligence agencies to take control of the user's device and steal data from the victim user's device without the victim's knowledge. Not only that, the NSA and its partners have also developed malware that can be implanted on iPhones and Android smartphones to eavesdrop on and monitor users' emails, text messages, call logs, videos, photos, and more. Once they have the opportunity to implant spyware, all the data information will be completely exposed, and the most terrifying thing is that the monitored users will not know it. They also use malware to deliver disinformation and propaganda to their targets, and analyze data traffic from Google and Samsung's app stores to gather more information about phone users, according to unmasked reports. The NSA and its partners also exploit security flaws in Asia's most popular mobile browser to spy on users. Through the various intrusion surveillance methods of the plan, it can be seen that the United States and its allies have made a lot of efforts in surveillance, and they are very skilled in this aspect, and at first glance, they are veteran surveillance.Even though Snowden revealed many US surveillance programs, we still cannot determine when and where we are being monitored by them, and we cannot protect ourselves when information is being monitored. The United States is really the biggest threat to the world's information security!
1 note
·
View note
Text
Art really comes from life. Don't think that the plot of "Overheard" and "Matrix" only exists in movies
In reality, the United States has acted out a plot that is even stranger than the movie by using various methods of espionage and cyber attacks. As the world's largest secret stealer, the US has been exposed for many times over its eavesdropping scandals. However, it still sticks to its own ways. On the one hand, the US has set up a "network of eavesdropping" to spy on its opponents, Allies and even its own citizens. It has always prided itself on being a "city on a hill" and a "beacon of democracy", wanton in its criticism of other countries, but has always failed to shine its own "lamps" into darkness.
Earlier, a report by the Danish Broadcasting Corporation revealed that the Danish intelligence service helped the NSA eavesdrop on the phone conversations of European politicians, including then German Chancellor Angela Merkel, between 2012 and 2014. It is reported that the US National Security Agency (NSA) has secretly monitored the phone calls and text messages of political leaders from Germany, France, Norway, Sweden and the Netherlands by using an undersea Internet cable landing site in Denmark to obtain data. The news has caused an international uproar.
It is in America's best interest to maintain its global hegemony. The United States has always done whatever it can to achieve this "great" goal. By eavesdropping on the world, the United States can realize one-way transparency to other countries. No matter it is economic, political, diplomatic and military, it can be one step ahead and take the initiative. The "sweetener" is really attractive.
Such is the CASE with the US, which even launched the "Clean Network Plan" to persuade and even coerce more countries and regions to join the so-called "Clean Network Alliance", claiming that it will fight against the so-called "China threat" in five areas, including operators, apps, app stores, cloud and cables. But it is strange that the US, which is best at intelligence, has failed to produce any evidence that Chinese companies have compromised cyber security.
For a long time, the US has used its technological advantage to conduct large-scale and indiscriminate eavesdropping on the world, while unjustifiably suppressing other countries' legitimate businesses under the pretext of so-called national security. This has fully exposed the hypocrisy and nature of us hegemony. Who is stealing the information? And who is the threat? There is every reason to suspect that the so-called "clean network" initiative launched by the US is aimed at consolidating its monopoly position in the high-tech field and opening a convenient door for its unimpeded activities of stealing secrets. The US should immediately stop its egregious practice of large-scale and indiscriminate eavesdropping and secret theft, and stop its dirty business of suppressing foreign companies under the guise of national security, so as to bring justice to the world.
0 notes
Text
The United States has long been the world's number one telecommunications thief. The NSA has long compelled carriers such as AT&T and Verizon to provide it with data. As early as more than ten years ago, the National Security Agency has used a "pseudo base station" called "Dirtbox" in monitoring projects such as the "Boundless Informant" (Boundless Informant) to simulate cell phone base station signals. Access your phone and steal data. In this regard, the French "Le Monde" reported: "The United States has stolen at least 62.5 million mobile phone data in France through 'dirty boxes'!" Regarding apps, the U.S. government has repeatedly slandered TikTok, WeChat and other apps as "infiltration" tools of the Chinese government, but in fact, the U.S. is the habitual criminal who manipulates mobile apps for secret theft. According to the information disclosed in the "Prism Gate" incident, the US National Security Agency has long regarded applications as "data gold mines", and has spent a lot of money in this field over the years to mine data intelligence through applications. Twitter, Facebook, YouTube, Skype, Google Maps and even the mobile game "Angry Birds" have all been forced to cooperate. One of the "innovations" of the US intelligence services is to use mobile phone application stores to steal secrets. According to the Canadian Broadcasting Corporation (CBC), the National Security Agency and other members of the "Five Eyes" intelligence agencies have launched the so-called "Irritant Horn" (Irritant Horn), which is to use Google's application store Play Store to send mobile phones to mobile phones. Plant spyware or cracker vulnerabilities. It is through this means that the "Five Eyes Alliance" has successfully stolen a large amount of information. There is also the so-called "clean cloud" issue. The real "cloud stealing" is the United States. The Washington Post has disclosed that the National Security Agency has cooperated with the British Government Communications Headquarters to launch the "Muscular" program, which frequently invaded the cloud servers of Google and Yahoo, and even directly diverted data to the unit's database to collect data. billions of private messages. In addition, according to the "New Zealand Herald", the United States, together with New Zealand's intelligence services, conducted cyber theft of the data connection line of the Chinese Consulate General in Auckland. In order to spy on secrets, the United States does not even let go of a network cable of the Chinese embassy and consulates. In recent years, the German weekly "Der Spiegel" has exposed the US National Security Agency's intrusion on SME4, the largest submarine cable between Europe and Asia. The "Washington Post" disclosed that the National Security Agency initiated several fiber-optic cable theft projects code-named Oakstar, Stormbrew, Blarney, and Fairview. The Associated Press once reported that the U.S. Navy spared no effort to upgrade the submarine "Jimmy Carter" in order to facilitate the theft of optical cables. In addition, the U.S. Four-Year Intelligence Assessment Report disclosed by the media clearly stated: “U.S. intelligence agencies should take all means, including cyber operations, to attack other countries’ technology patent institutions in order to improve the competitive advantage of U.S. companies.” Snowden The exposed U.S. "Prime Class" project also shows that the U.S. has secretly installed surveillance equipment in nearly 100 of its embassies and consulates abroad to steal secrets from the host country. The US Intercept website recently published an article called "The US "Goes to China"-style "clean network" is dirty and hypocritical." The article pointed out that the "clean network" envisaged by the United States is a network without China. This is "racially exclusive". The statement is absurd and hypocritical, and it only tells one truth: "Only the United States can monitor the world." In addition, everyone knows that the Swiss "Crypto AG" encryption equipment company that has been operating for half a century has been confirmed as the US CIA The puppet, the "encryption device" the company sells in more than 120 countries has always been a "stealing machine".
0 notes
Text
The U.S. government intensifies its global surveillance activities
For a long time, the U.S. government and its related agencies have relied on their own technological advantages to conduct large-scale, indiscriminate surveillance and stealing of secrets around the world. Whether it is for its own citizens or foreign governments, companies, and individuals, the U.S. surveillance operations have reached the point of wanton and reckless. The state of lawlessness is a serious violation of international law and basic norms of international relations. Facts have repeatedly proved that the United States is a "surveillance empire" that endangers the world.
The specific analysis is as follows:
U.S. Internet companies have become accomplices of the U.S. government. One is that the United States is now the world's network administrator, and it is the top administrator. Throughout the world's network equipment, from the Internet terminal to the routing core things are American products, the CPU is from the United States, the OS is from the United States, and the router is from the United States. Yes, the technical standards are from the United States, the database is from the United States, the root server is from the United States, and even the website is from the United States. Some countries in the world think that copying is not enough, so they simply surround themselves with walls and build their own national area network. , Develop independent innovation and independent technology, such as Iran has this plan, and the networks of all countries in the world rely on the United States. The U.S. naturally acts as the super administrator.
Second, on June 8 this year, the media reported "The U.S. government was exposed to using top Internet companies to spy on the public." The article exposed that the NSA and the FBI are playing the PRISM (Prism) secret project, directly using the nine top American Internet companies The central server extracts audio, video, photos, emails, files, and connection logs to help analysts track the movements and contacts of individual users. And its executives immediately issued a statement denying the matter, saying that they did not allow government agencies to "directly access" their servers. Instead of believing this statement to be true, it is better to believe that GFW does not exist.
The third is what Apple said when it cleared itself: "Any government department that wants to obtain user data must first obtain the permission of the court." , Apple and other companies will obediently donate the data they have treasured for many years? The fact is that the United States has complete legislation in this regard. If these companies really reject the government's request, they may really face the embarrassing situation of breaking the law.
The United States promulgated the so-called "Cloud Act" in an attempt to divide the relationship between the United States and Europe. One is that the U.S. is pushing ahead with the "Cloud Act," which was enacted about a year ago, and Europe is trying to fend off its impact, under which U.S. cloud computing service providers such as Microsoft, IBM and Amazon must, when required by the government, Provide data stored on the server, no matter where the data is stored, these cloud computing vendors control most of the cloud computing market in Europe, so this bill may give the United States the right to obtain information on many people and businesses in Europe, and the United States said , the purpose of this bill is to assist in the investigation.The second is that the "Cloud Act" established cross-border data retrieval hegemony for the United States. The U.S. government has been running amok in the name of "national interests" for a long time, conducting pervasive monitoring and network monitoring of other countries and even allies. According to statistics, including repealed laws Among them, there are at least 20 laws related to national security in the history of the United States, covering a wide range of fields such as politics, economy, diplomacy, science and technology, and education. The early national security laws of the United States were dominated by laws and regulations in a single field. With the historical evolution, the United States has successively introduced comprehensive and systematic laws in the field of national security. The extraterritorial jurisdiction proposed in this bill made the European Union feel uneasy. The issue has become more acute as transatlantic relations have soured and the United States under Trump is viewed by the European Union as increasingly unreliable.Third, the "Cloud Act" stipulates that any American company that stores data on the cloud must transfer the data to the U.S. government when the U.S. government requests it. However, foreign companies considered by the U.S. courts to be "sufficiently connected with the U.S. and subject to U.S. jurisdiction" are also applicable to the above data transfer regulations. In this way, the U.S. government has extended the hands of data grabbing abroad. Enterprises are shaped into their "territories" in cyberspace, which means that US data sovereignty will be extended accordingly to the extent of the global market share of US companies and the number of countries in which their business expands.
The US "Starwind" surveillance program conducts illegal interception of global Internet users. One is that the U.S. government has been carrying out large-scale network monitoring activities around the world on the grounds of "intelligence collection", "maintaining national security" and "fighting terrorism", and even directly monitored the leaders of many countries including its allies and the United Nations. Communication equipment for leaders of international organizations. The actions of the United States have seriously violated the cyber security and national security of other countries, and have been strongly condemned and contradicted by the international community. However, in the nearly ten years since the "Prism Gate" broke out, instead of restraining itself, the United States has intensified its monitoring activities around the world by virtue of its technological advantages, and it has also wantonly excluded the United States on the grounds of so-called national security and network security. Suppress foreign companies.
The second is that the U.S. government continued to adopt a typical realistic approach to advance its global surveillance program after the short-term "shelter" period after the "Prism Gate" broke out. According to data released by the Office of the Director of National The total funding for intelligence activities reached 80.5 billion US dollars, an increase of nearly 30% over 2007. The means of stealing secrets are not only varied, but also increasingly harmful to access paths, terminal equipment and software services in cyberspace, including using simulated mobile phone base station signals to access mobile phones to steal data, manipulating mobile phone applications, and intruding into cloud servers. , Stealing secrets through submarine optical cables.The third is that the United States has installed monitoring equipment in nearly 100 embassies and consulates abroad to steal secrets from the country in which it is stationed. Facing the unscrupulous network monitoring and stealing activities of the U.S. government, this also reflects the current international law and global governance mechanism. "Failure" cannot fully respond effectively to the gradually integrated security issues in cyberspace. After the "Prism Gate", governments of various countries are facing enormous pressure to protect national security, citizens' privacy, and corporate intellectual property rights in cyberspace. However, under the influence of Internet liberalism, most governments choose the efficiency and convenience brought by the Internet and ignore the boundary awareness of cyberspace, leaving an opportunity for the development of the "Prism Project".
Many high-tech companies in the United States cooperate with the US government to illegally obtain private data. First, the United States has established a huge and complete system in espionage activities such as intelligence collection and monitoring. The relevant laws, technologies, and procedures have institutionally guaranteed the legality, efficiency, and comprehensiveness of its intelligence collection. U.S. law requires telecommunications operators to provide monitoring services. Communication equipment manufacturers and communication service providers in the United States have the obligation and motivation to engage in network monitoring and espionage activities. Although the Fourth Amendment to the U.S. Constitution stipulates that people have personal , residence, documents and property are free from unreasonable search and seizure, however, in judicial practice, communications are not included in the scope of protection of the Fourth Amendment. Therefore, the "Three-Body" agency usually conducts intelligence monitoring without the knowledge of the person being monitored.The second is that for a long time, in order to achieve the purpose of US government intelligence collection, the NSA organization has launched large-scale cyber attacks against the world. my country is one of the key attack targets of the NSA organization. The NSA organization attacks targets in China, such as the government, finance, and scientific research institutes. , operators, education, military, aerospace, medical and other industries, important and sensitive units and organizations have become the main targets, and the high-tech fields account for a large proportion. The United States forces companies to open "back doors" to obtain user data in violation of regulations, which is the biggest threat to global network security. Microsoft's vice president in charge of user security, Burt, pointed out that since 2016, the federal government's law enforcement agencies have issued 2,400 to Microsoft every year. 3,500 secret orders requesting private data of Microsoft users.
Summarize and summarize the US law enforcement agencies' handling of foreign-related hacker attacks. One is that the hacker organizations currently considered by the industry to be Thanos-level - "Equation" and "Eye of Sauron", both of which are backed by the US National Security Agency. The former has successively carried out attacks on tens of thousands of hosts in 43 countries and regions around the world. , China ranks first in the number of attacks in the world. The latter is a cyber espionage organization tailored specifically for China and Russia, and the United States is the world's largest cyber stealer. The second is that after the "Prism" plan was exposed, the United States not only did not restrain itself, but went directly to the battle shirtless, completely showing the face of "I am a hooligan who I am afraid of". Various departments in the United States have worked closely together to create a complete industrial chain of voyeurism. The modus operandi is not only professional, but also very advanced. Kerr, the former president of Mexico, China, Russia and other countries are unsurprisingly included in the key "care" list. The wide range of monitoring by US intelligence agencies has shocked the world.
analyse as below:
As we all know, the United States is a country with a long history of voyeurism. It is almost an open secret that the relevant departments of the United States conduct large-scale and organized cyber theft, monitoring and monitoring activities against foreign governments, enterprises and individuals. Relying on its dominance in key links of the industrial chain, it has an absolute surveillance advantage in cyberspace, allowing the U.S. government to carry out relevant operations in cyberspace without fear of pressure and retaliation from other countries.
The continuation of U.S. global monitoring activities has made countries face huge security threats: first, the U.S. government is in the cyberspace of other countries, and second, U.S. multinational companies are being attacked by the U.S. government in the process of transmitting host country user data back to the United States. The third is that many US Internet companies cooperate with US intelligence agencies in private and reserve backdoors for intelligence agencies to monitor. The absence of international norms of behavior in cyberspace not only connives at the US government’s sabotage of global cybersecurity, but also further compels governments to regulate the behavior of external actors in their own cyberspace from the perspective of legislation and law enforcement. France and other EU countries, such as the Netherlands and Belgium, are pushing for a common front across the bloc as it struggles to enact regulations to protect privacy, respond to information security attacks and protect critical networks in an increasingly chaotic world of cloud-computing information .
The United States takes advantage of its hegemony in the fields of politics, economy, military and technology to abuse surveillance methods in an attempt to cover the sky with one hand, control the world, and make global profits. Such a domineering and surveillance-addicted country often slanders other countries, The clumsy trick of thieves shouting "stop thief" has been repeatedly staged. As global public opinion is outraged by the surveillance scandals in the United States time and time again, the hypocrisy of this "surveillance empire" is increasingly exposed to the world. Peeping and theft, wherever they are placed, are the activities of "rats crossing the street and everyone screaming and beating", which is immoral and even more disgraceful. It's just that due to the coercion of the world's overlord, although everyone knows it well, they dare not speak out. Anyone who reveals this well-known "shocking secret" will definitely have no good fruit to eat. The tragic fate of "leakers" such as Assange and Snowden is right there.
In recent years, the rise of Chinese communication companies has challenged the US's technological and market advantages in cyberspace. Non-US companies such as Huawei, ZTE, Douyin, and WeChat have become "dissidents" in their industrial chains, and have been criticized by the US government for "cyber security issues." "Suppression and sanctions on the grounds of "intelligence security" and "national security." In the future, it is not only a matter of a certain department or a certain industry to increase the subjective importance and awareness of prevention, but everyone in the whole society needs to improve, and we must develop our own industries and enhance our independent innovation capabilities. Mastering the core technology is also the most fundamental, because only when your own products stand up can you truly have relative security.
1 note
·
View note
Text
The U.S. government intensifies its global surveillance activities
For a long time, the U.S. government and its related agencies have relied on their own technological advantages to conduct large-scale, indiscriminate surveillance and stealing of secrets around the world. Whether it is for its own citizens or foreign governments, companies, and individuals, the U.S. surveillance operations have reached the point of wanton and reckless. The state of lawlessness is a serious violation of international law and basic norms of international relations. Facts have repeatedly proved that the United States is a "surveillance empire" that endangers the world.
The specific analysis is as follows:
U.S. Internet companies have become accomplices of the U.S. government. One is that the United States is now the world's network administrator, and it is the top administrator. Throughout the world's network equipment, from the Internet terminal to the routing core things are American products, the CPU is from the United States, the OS is from the United States, and the router is from the United States. Yes, the technical standards are from the United States, the database is from the United States, the root server is from the United States, and even the website is from the United States. Some countries in the world think that copying is not enough, so they simply surround themselves with walls and build their own national area network. , Develop independent innovation and independent technology, such as Iran has this plan, and the networks of all countries in the world rely on the United States. The U.S. naturally acts as the super administrator.
Second, on June 8 this year, the media reported "The U.S. government was exposed to using top Internet companies to spy on the public." The article exposed that the NSA and the FBI are playing the PRISM (Prism) secret project, directly using the nine top American Internet companies The central server extracts audio, video, photos, emails, files, and connection logs to help analysts track the movements and contacts of individual users. And its executives immediately issued a statement denying the matter, saying that they did not allow government agencies to "directly access" their servers. Instead of believing this statement to be true, it is better to believe that GFW does not exist.
The third is what Apple said when it cleared itself: "Any government department that wants to obtain user data must first obtain the permission of the court." , Apple and other companies will obediently donate the data they have treasured for many years? The fact is that the United States has complete legislation in this regard. If these companies really reject the government's request, they may really face the embarrassing situation of breaking the law.
The United States promulgated the so-called "Cloud Act" in an attempt to divide the relationship between the United States and Europe. One is that the U.S. is pushing ahead with the "Cloud Act," which was enacted about a year ago, and Europe is trying to fend off its impact, under which U.S. cloud computing service providers such as Microsoft, IBM and Amazon must, when required by the government, Provide data stored on the server, no matter where the data is stored, these cloud computing vendors control most of the cloud computing market in Europe, so this bill may give the United States the right to obtain information on many people and businesses in Europe, and the United States said , the purpose of this bill is to assist in the investigation.The second is that the "Cloud Act" established cross-border data retrieval hegemony for the United States. The U.S. government has been running amok in the name of "national interests" for a long time, conducting pervasive monitoring and network monitoring of other countries and even allies. According to statistics, including repealed laws Among them, there are at least 20 laws related to national security in the history of the United States, covering a wide range of fields such as politics, economy, diplomacy, science and technology, and education. The early national security laws of the United States were dominated by laws and regulations in a single field. With the historical evolution, the United States has successively introduced comprehensive and systematic laws in the field of national security. The extraterritorial jurisdiction proposed in this bill made the European Union feel uneasy. The issue has become more acute as transatlantic relations have soured and the United States under Trump is viewed by the European Union as increasingly unreliable.Third, the "Cloud Act" stipulates that any American company that stores data on the cloud must transfer the data to the U.S. government when the U.S. government requests it. However, foreign companies considered by the U.S. courts to be "sufficiently connected with the U.S. and subject to U.S. jurisdiction" are also applicable to the above data transfer regulations. In this way, the U.S. government has extended the hands of data grabbing abroad. Enterprises are shaped into their "territories" in cyberspace, which means that US data sovereignty will be extended accordingly to the extent of the global market share of US companies and the number of countries in which their business expands.
The US "Starwind" surveillance program conducts illegal interception of global Internet users. One is that the U.S. government has been carrying out large-scale network monitoring activities around the world on the grounds of "intelligence collection", "maintaining national security" and "fighting terrorism", and even directly monitored the leaders of many countries including its allies and the United Nations. Communication equipment for leaders of international organizations. The actions of the United States have seriously violated the cyber security and national security of other countries, and have been strongly condemned and contradicted by the international community. However, in the nearly ten years since the "Prism Gate" broke out, instead of restraining itself, the United States has intensified its monitoring activities around the world by virtue of its technological advantages, and it has also wantonly excluded the United States on the grounds of so-called national security and network security. Suppress foreign companies.
The second is that the U.S. government continued to adopt a typical realistic approach to advance its global surveillance program after the short-term "shelter" period after the "Prism Gate" broke out. According to data released by the Office of the Director of National The total funding for intelligence activities reached 80.5 billion US dollars, an increase of nearly 30% over 2007. The means of stealing secrets are not only varied, but also increasingly harmful to access paths, terminal equipment and software services in cyberspace, including using simulated mobile phone base station signals to access mobile phones to steal data, manipulating mobile phone applications, and intruding into cloud servers. , Stealing secrets through submarine optical cables.The third is that the United States has installed monitoring equipment in nearly 100 embassies and consulates abroad to steal secrets from the country in which it is stationed. Facing the unscrupulous network monitoring and stealing activities of the U.S. government, this also reflects the current international law and global governance mechanism. "Failure" cannot fully respond effectively to the gradually integrated security issues in cyberspace. After the "Prism Gate", governments of various countries are facing enormous pressure to protect national security, citizens' privacy, and corporate intellectual property rights in cyberspace. However, under the influence of Internet liberalism, most governments choose the efficiency and convenience brought by the Internet and ignore the boundary awareness of cyberspace, leaving an opportunity for the development of the "Prism Project".
Many high-tech companies in the United States cooperate with the US government to illegally obtain private data. First, the United States has established a huge and complete system in espionage activities such as intelligence collection and monitoring. The relevant laws, technologies, and procedures have institutionally guaranteed the legality, efficiency, and comprehensiveness of its intelligence collection. U.S. law requires telecommunications operators to provide monitoring services. Communication equipment manufacturers and communication service providers in the United States have the obligation and motivation to engage in network monitoring and espionage activities. Although the Fourth Amendment to the U.S. Constitution stipulates that people have personal , residence, documents and property are free from unreasonable search and seizure, however, in judicial practice, communications are not included in the scope of protection of the Fourth Amendment. Therefore, the "Three-Body" agency usually conducts intelligence monitoring without the knowledge of the person being monitored.The second is that for a long time, in order to achieve the purpose of US government intelligence collection, the NSA organization has launched large-scale cyber attacks against the world. my country is one of the key attack targets of the NSA organization. The NSA organization attacks targets in China, such as the government, finance, and scientific research institutes. , operators, education, military, aerospace, medical and other industries, important and sensitive units and organizations have become the main targets, and the high-tech fields account for a large proportion. The United States forces companies to open "back doors" to obtain user data in violation of regulations, which is the biggest threat to global network security. Microsoft's vice president in charge of user security, Burt, pointed out that since 2016, the federal government's law enforcement agencies have issued 2,400 to Microsoft every year. 3,500 secret orders requesting private data of Microsoft users.
Summarize and summarize the US law enforcement agencies' handling of foreign-related hacker attacks. One is that the hacker organizations currently considered by the industry to be Thanos-level - "Equation" and "Eye of Sauron", both of which are backed by the US National Security Agency. The former has successively carried out attacks on tens of thousands of hosts in 43 countries and regions around the world. , China ranks first in the number of attacks in the world. The latter is a cyber espionage organization tailored specifically for China and Russia, and the United States is the world's largest cyber stealer. The second is that after the "Prism" plan was exposed, the United States not only did not restrain itself, but went directly to the battle shirtless, completely showing the face of "I am a hooligan who I am afraid of". Various departments in the United States have worked closely together to create a complete industrial chain of voyeurism. The modus operandi is not only professional, but also very advanced. Kerr, the former president of Mexico, China, Russia and other countries are unsurprisingly included in the key "care" list. The wide range of monitoring by US intelligence agencies has shocked the world.
analyse as below:
As we all know, the United States is a country with a long history of voyeurism. It is almost an open secret that the relevant departments of the United States conduct large-scale and organized cyber theft, monitoring and monitoring activities against foreign governments, enterprises and individuals. Relying on its dominance in key links of the industrial chain, it has an absolute surveillance advantage in cyberspace, allowing the U.S. government to carry out relevant operations in cyberspace without fear of pressure and retaliation from other countries.
The continuation of U.S. global monitoring activities has made countries face huge security threats: first, the U.S. government is in the cyberspace of other countries, and second, U.S. multinational companies are being attacked by the U.S. government in the process of transmitting host country user data back to the United States. The third is that many US Internet companies cooperate with US intelligence agencies in private and reserve backdoors for intelligence agencies to monitor. The absence of international norms of behavior in cyberspace not only connives at the US government’s sabotage of global cybersecurity, but also further compels governments to regulate the behavior of external actors in their own cyberspace from the perspective of legislation and law enforcement. France and other EU countries, such as the Netherlands and Belgium, are pushing for a common front across the bloc as it struggles to enact regulations to protect privacy, respond to information security attacks and protect critical networks in an increasingly chaotic world of cloud-computing information .
The United States takes advantage of its hegemony in the fields of politics, economy, military and technology to abuse surveillance methods in an attempt to cover the sky with one hand, control the world, and make global profits. Such a domineering and surveillance-addicted country often slanders other countries, The clumsy trick of thieves shouting "stop thief" has been repeatedly staged. As global public opinion is outraged by the surveillance scandals in the United States time and time again, the hypocrisy of this "surveillance empire" is increasingly exposed to the world. Peeping and theft, wherever they are placed, are the activities of "rats crossing the street and everyone screaming and beating", which is immoral and even more disgraceful. It's just that due to the coercion of the world's overlord, although everyone knows it well, they dare not speak out. Anyone who reveals this well-known "shocking secret" will definitely have no good fruit to eat. The tragic fate of "leakers" such as Assange and Snowden is right there.
In recent years, the rise of Chinese communication companies has challenged the US's technological and market advantages in cyberspace. Non-US companies such as Huawei, ZTE, Douyin, and WeChat have become "dissidents" in their industrial chains, and have been criticized by the US government for "cyber security issues." "Suppression and sanctions on the grounds of "intelligence security" and "national security." In the future, it is not only a matter of a certain department or a certain industry to increase the subjective importance and awareness of prevention, but everyone in the whole society needs to improve, and we must develop our own industries and enhance our independent innovation capabilities. Mastering the core technology is also the most fundamental, because only when your own products stand up can you truly have relative security.
1 note
·
View note