Resources and Input Policing, Borders, Drugs, Cartels and System Corruption
IN THIS SECTION TECH6 Comments Echelon Prism Tempest Carnivore --------------------------------------------------------------------------------------------------------------------------------- COMMENTS It is not the intention of this website to keep up with the latest of surveillance and human interference technology, but to indicate its significance in policing, national security and human rights. This is in terms of encouraging people to be aware of the subjects in general and to study further. The point is, there is available very high level of technology to spy on people in many different ways. As mentioned elsewhere, such technology can be good or bad depending on its intention and who is using it on whom. If you are fighting dangerous cartels, terrorists and tyrannical governments, it is likely good. If China, large corporations or government entities are doing it to control or retaliate against the general public, it is likely not good. CARNIVORE Wired dot com 1998 History FBI Hacking - Carnivore - The Short But Dramatic Life of Carnivore https //www wired com/2016/05/history-fbis-hacking/ Excerpt: The FBI’s first known computer surveillance tool was a traffic sniffer named Carnivore that got installed on network backbones—with the permission of internet service providers. The unfortunately named tool was custom-built to filter and copy metadata and/or the content of communications to and from a surveillance target. The government had already used it about 25 times, beginning in 1998, when the public finally learned about it in 2000 after Earthlink refused to let the FBI install the tool on its network. Earthlink feared the sniffer would give the feds unfettered access to all customer communications. A court battle and congressional hearing ensued, which sparked a fierce and divisive debate, making Carnivore the Apple/FBI case of its day. https //www wired com/2016/05/history-fbis-hacking/ Oregon State Hospital dot net Gunderson, Ted L: on website Oregon State Hospital (dot net): Brief description of Carnivore (4/26/2011) Excerpt: Carnivore is administered by the NSA out of Fort Meade, Maryland and can download any computer system without being traced or otherwise known by the owner http://www.oregonstatehospital.net/d/otherfiles/gunderson.pdf ECHELON “Echelon is an integrated global network of satellites and associated relays. It is the most powerful spy satellite network we know about. It is used to intercept ordinary emails, faxes, telexes, and telephone conversations throughout most of the world. It targets governments, organizations, businesses, and individuals, but it can affect almost anyone.” p. 12 --See Scarlet MccGwire below Resources listed on this page: BBC, Scarlett MccGwire (book), Wikipedia Wikipedia What is Echelon? https //en wikipedia org/wiki/ECHELON Excerpt: Echelon, originally a secret government code name, is a surveillance program (signals intelligence / SIGINT collection and analysis network) operated on behalf of the five signatory nations to the UKUSA Security Agreement[1]—Australia, Canada, New Zealand, the United Kingdom and the United States, also known as the Five Eyes.[2][3][4] The ECHELON program was created in the late 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, and was formally established in 1971.[5][6] By the end of the 20th century, the system referred to as "ECHELON" had allegedly evolved beyond its military and diplomatic origins, to also become "…a global system for the interception of private and commercial communications."[7] https //en wikipedia org/wiki/ECHELON BBC Echelon spy network revealed (1999) http //news bbc co uk/2/hi/503224 stm Excerpt: Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet. It sounds like science fiction, but it's true. Two of the chief protagonists - Britain and America - officially deny its existence. But the BBC has confirmation from the Australian Government that such a network really does exist and politicians on both sides of the Atlantic are calling for an inquiry….Linked to the NSA…Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism. http //news bbc co uk/2/hi/503224 stm Scarlett MccGwire’s book Surveillance: The Impact On Our Lives (2001) ISBN 9780739831724. Excerpts: Environmentalists: Spying and information interception by the FBI In 1992, a group of senior law-enforcement officers met at FBI headquarters in Washington, D.C., to devise a strategy for dealing with environmental activists. The group hit on a plan that has become increasingly popular among police forces throughout the world. The FBI subp[o]enaed (gave official written orders to supply documentation) 600 leading environmental activists regarding their telephone billing information. To most people, the information on a telephone bill is relatively unimportant: a few numbers, times, and dates. But to the FBI, it was a goldmine. By combining the calling information of all known activists, the authorities were able to build a vast tree involving tens of thousands of environmentalists. They could tell who worked with whom. They knew how the networks were formed and how they communicated. In a nutshell, the FBI was able to expose the intimate details of all the interrelationships within the environmental movement. The environmental strategy was not unique. That year, the phone records of more than a milliion people in the US were subp[o]enaed by law-enforcement agents. (pp. 42-43) Spying Satellite Numbers Unknown Most people have no idea of the number of government satellites orbiting the Earth, taking pictures of us and listening in on our telephone conversations. These are secret operations. We may be photographed and have all our electronic communications intercepted without even being aware that somewhere in space a satellite is passing overhead. (p. 11) Echelon and NSA Spying on and Intruding into Other Country’s Business Deals, Causing Lost Deals As of the time of this now-dated book: An important point about the new system [Echelon] is that, before Echelon, different countries and different stations knew what was being intercepted and to whom it was being sent. Now a tiny proportion of the messages are read locally. The rest are sent straight to the National Security Agency in the United States, which means that the other allies are no longer being kept fully informed. Until recently Echelon was a closely guarded secret. But some members of the New Zealand intelligence service became worried about the powerfulness of the system and feared that it was being abused by the countries running it, in particular the United States. in d1988, the British journalist Duncan Campbell revealed the existence of Echelon in an article in the New Statesman magazine. And in 1996, a book called Secret Power was published by New Zealand author Nicky Hagar, also revealing details of the Echelon system. in 1998, a British newspaper, the Sunday Times, discovered that the US was using information from Echelon to help US companies bid for contracts against competitors in other countries. The paper reported that the US run Menwith Hill interception station in North Yorkshire in Great Britain was monitoring information about business deals. It is alleged that the NSA has, through Echelon, intercepted conversations between the German company Volkswagen and General Motors. And the French have complained that their electronics company, Thompson CSF, lost a $1.4 million deal to supply Brazil with a radar system because the NSA intercepted details of the negotiations and passed them on to the US company Raytheon, which subsequently won the contract. The European company, AIrbus Industries, believes it lost a $1 billion contract to the US companies Boeing and McDonnell Douglas because of information intercepted by US surveillance systems. (pp. 13-14) PRISM Wikipedia: Prism (Surveillance Program) https //en wikipedia org/wiki/PRISM_(surveillance_program) Excerpt: PRISM is a clandestine[1] surveillance program under which the United States National Security Agency (NSA) collects internet communications from at least nine major US internet companies.[2][3][4] Since 2001 the United States government has increased its scope for such surveillance, and so this program was launched in 2007. PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[5][6] The PRISM program collects stored internet communications based on demands made to internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[7] The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[8][9] and to get data that is easier to handle, among other things.[10] PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[11][12] The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[13] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as "dangerous" and "criminal" activities.[14] The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between NSA's Special Source Operations division (SSO) and PRISM partners in the millions of dollars.[15] Documents indicate that PRISM is "the number one source of raw intelligence used for NSA analytic reports", and it accounts for 91% of the NSA's internet traffic acquired under FISA section 702 authority."[16][17] The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers' telephone calls.[18][19] https //en wikipedia org/wiki/PRISM_(surveillance_program) TEMPEST Wikipedia Tempest (codename) https //en wikipedia org/wiki/Tempest_(codename) Excerpt: TEMPEST is a National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and also how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC). The NSA methods for spying upon computer emissions are classified, but some of the protection standards have been released by either the NSA or the Department of Defense. Protecting equipment from spying is done with distance, shielding, filtering, and masking.[6] The TEMPEST standards mandate elements such as equipment distance from walls, amount of shielding in buildings and equipment, and distance separating wires carrying classified vs. unclassified materials,[5] filters on cables, and even distance and shielding between wires or equipment and building pipes. Noise can also protect information by masking the actual data. While much of TEMPEST is about leaking electromagnetic emanations, it also encompasses sounds and mechanical vibrations. For example, it is possible to log a user's keystrokes using the motion sensor inside smartphones. Compromising emissions are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed (side-channel attack), may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment. https //en wikipedia org/wiki/Tempest_(codename) Updates: 2021/09/30-editing; Tempest section updated 01/08/2017; Prism section updated 01/08/2017;
TECH SECTION Tech 1-DNA Evidence Gathering Tech2-Weapons: Tasers Tech3-Weapons: DEW, Frequency Weap. Tech4 Surveillance: Biometrics, Body Cameras Tech5-Surveillance: Stingrays Tech6-Surveillance: Echelon, PRISM, Tempest, Carnivore Tech7 Artificial Intelligence
Topics Topics