We know the technological competence of NASA, though they will miss the terrorists and criminals.
NASA
But you and me are easy meat to track.
Read the following .
“The following document comprises evidence for a lawsuit filed at the U.S. Courthouse in Washington, DC, by John St Clair Akwei against the National Security Agency, Ft George G. Meade, Maryland (Civil Action 92-0449), constitutes his knowledge of the NSA’s structure, national security activities proprietary technologies and covert operations to monitor individual citizens Ed.
THE NSA’S MISSION AND DOMESTIC INTELLIGENCE OPERATION
Blanket coverage of all electronic communications in the US and the world to ensure national security. The NSA at Ft Meade, Maryland has had the most advanced computers in the world since the early 1960s. NSA technology is developed and implemented in secret from private corporations, academia and the general public.
Signals Intelligence (SIGINT)
The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and track persons with the electrical currents in their bodies. Signals Intelligence is based on fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD [Department of Defence] developed proprietary advanced digital equipment which can remotely analyze all objects whether manmade or organic, that have electrical activity.
Domestic Intelligence (DOMINT)
The NSA has records on all US citizens. The NSA gathers information on US citizen who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent national security anti-terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.
Tracking individuals in the US is easily and cost-effectively implemented with NSA’s electronic surveillance network. This network (DOMINT) covers the entire US, involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously . Cost-effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. NSA personnel in the community usually have cover identities such as social workers, lawyers and business owners.
Individual Citizens Occasionally Targeted for Surveillance by Independently Operating NSA Personnel
NSA personnel can control the lives of hundreds of thousands of individuals in the US by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA DOMINT has the ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.
As of the early 1960s, the most advanced computers in the world were at the NSA, Ft Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the US by using advanced computers that use artificial intelligence to screen all communications, regardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the US is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented and kept secret in the same manner as other electronic warfare programs.
It taps communications within the US, though it will never admit it.
It also has an Operations arm that undertakes covert Operations ,including ‘wet ops’
Let us peep into the NSA.
NSA Premises.
”
Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.
But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”
For the NSA, overflowing with tens of billions of dollars in post-9/11 budget awards, the cryptanalysis breakthrough came at a time of explosive growth, in size as well as in power. Established as an arm of the Department of Defense following Pearl Harbor, with the primary purpose of preventing another surprise assault, the NSA suffered a series of humiliations in the post-Cold War years. Caught offguard by an escalating series of terrorist attacks—the first World Trade Center bombing, the blowing up of US embassies in East Africa, the attack on the USS Cole in Yemen, and finally the devastation of 9/11—some began questioning the agency’s very reason for being. In response, the NSA has quietly been reborn. And while there is little indication that its actual effectiveness has improved—after all, despite numerous pieces of evidence and intelligence-gathering opportunities, it missed the near-disastrous attempted attacks by the underwear bomber on a flight to Detroit in 2009 and by the car bomber in Times Square in 2010—there is no doubt that it has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created.
In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever.
….
For his part, Inglis simply engaged in a bit of double-talk, emphasizing the least threatening aspect of the center: “It’s a state-of-the-art facility designed to support the intelligence community in its mission to, in turn, enable and protect the nation’s cybersecurity.” While cybersecurity will certainly be among the areas focused on in Bluffdale, what is collected, how it’s collected, and what is done with the material are far more important issues. Battling hackers makes for a nice cover—it’s easy to explain, and who could be against it? Then the reporters turned to Hatch, who proudly described the center as “a great tribute to Utah,” then added, “I can’t tell you a lot about what they’re going to be doing, because it’s highly classified.”
And then there was this anomaly: Although this was supposedly the official ground-breaking for the nation’s largest and most expensive cybersecurity project, no one from the Department of Homeland Security, the agency responsible for protecting civilian networks from cyberattack, spoke from the lectern. In fact, the official who’d originally introduced the data center, at a press conference in Salt Lake City in October 2009, had nothing to do with cybersecurity. It was Glenn A. Gaffney, deputy director of national intelligence for collection, a man who had spent almost his entire career at the CIA. As head of collection for the intelligence community, he managed the country’s human and electronic spies.
Within days, the tent and sandbox and gold shovels would be gone and Inglis and the generals would be replaced by some 10,000 construction workers. “We’ve been asked not to talk about the project,” Rob Moore, president of Big-D Construction, one of the three major contractors working on the project, told a local reporter. The plans for the center show an extensive security system: an elaborate $10 million antiterrorism protection program, including a fence designed to stop a 15,000-pound vehicle traveling 50 miles per hour, closed-circuit cameras, a biometric identification system, a vehicle inspection facility, and a visitor-control center.
Inside, the facility will consist of four 25,000-square-foot halls filled with servers, complete with raised floor space for cables and storage. In addition, there will be more than 900,000 square feet for technical support and administration. The entire site will be self-sustaining, with fuel tanks large enough to power the backup generators for three days in an emergency, water storage with the capability of pumping 1.7 million gallons of liquid per day, as well as a sewage system and massive air-conditioning system to keep all those servers cool. Electricity will come from the center’s own substation built by Rocky Mountain Power to satisfy the 65-megawatt power demand. Such a mammoth amount of energy comes with a mammoth price tag—about $40 million a year, according to one estimate.
Records Regarding the Assassination of John F. Kennedy
Under the President John F. Kennedy Assassination Records Collection Act of 1992 (Public Law 102-526), NSA is required to review all records relating to the assassination and provide copies to the Assassination Records Review Board (ARRB). The Board, in turn, provides copies to the National Archives and Records Administration (NARA). NARA has over 170,000 records relating to the J.F.K. assassination of which only a small number originated with NSA. The documents listed are the ones released by NSA to date.
The documents marked with * and ** were released directly to NARA in 1993 by NSA prior to the formation of the ARRB. The documents preceded by ** were released under the FOIA in the late 1970’s/early 1980’s, and the copies of the documents appear as they were released to the FOIA requester(s) at that time. Documents released to NARA by the ARRB in August 1997 are indicated by #, documents released to NARA by the ARRB in January 1998 are indicated by ## and documents released to NARA by the ARRB in October 1998 are indicated by ###. XXXXX has been inserted in a title if a portion of the title was deleted prior to release.”
Follow the Link for detailed information on this Subject or any other like Korean War,Vietnam.
Scientists determined that mysterious signals received in 1957 were transmitted to Earth from an advanced alien civilization. Decades have passed while security analysts and dedicated cryptographers struggled to decipher the enigmatic messages from a completely unknown, distant alien culture.
Now, in 2011, the National Security Agency—one of the United States’ most secret intelligence gathering organizations—has released under protest (forced by order of a U.S. Federal Court judge) stunning information about intelligent life in the universe.
But as usual, the non-curious, inept, doltish mainstream media completely ignores it.
NSA analysts marvel at strange messages
Twenty-nine lengthy transmissions were received and verified as being “of extraterrestrial origin.” According to some in the intelligence community, this hot potato was given the highest priority and assigned to “goggle-eyed geeks” tasked to find out exactly what the enigmatic transmissions said.
Speculation among some of the NSA spooks about what the mysterious messages said allegedly ran the gambit from sarcastic guesses they were just some garbled alien radio commercials (an inside joke that drew nervous laughter from some of the analysts) to those that were convinced the messages—coded in some unknown mathematical progression—conveyed the basics of unlimited energy, star travel, or even time travel.
Allegedly, those that subscribe to the latter theories have absolutely nothing to support their belief.
NSA forms crack teams
According to researchers who have analyzed the document [available for your inspection as a downloadable PDF at the end of this article] an NSA specialist named Dr. Howard Campaigne was given the responsibility of choosing a cryptology team to work on cracking the alien messages.
The task was compartmentalized and many who worked at the NSA had no idea that such a project—or even the messages the team focused upon—existed.
The entire project was strictly enforced by secrecy and conducted under the auspices of the Official Secrets Act and all participants took National Security oaths.
Only those deemed crucial to the success of the undertaking were allowed access to the secret under the provisions of a well-defined need-to-know heirarchy.
1.What is the point in having world’s best listening post,NSA, when Elint is not used properly?
2.Typical governmental apathy in not letting the right hand know what the left does, and starting the blame game!
3.Once the information about the suspect has been received action should have been taken ,not withstanding his records and early back ground check.
4.Yet another instance of faith transcending National loyalty!What the apologists for Muslims are going to say who have been saying fingerprinting or profiling Muslims by Homeland Security/FBI is racist, on this issue?
Story:
By Jeremy Pelofsky and Adam Entous
WASHINGTON (Reuters) – U.S. intelligence agencies learned an Army psychiatrist contacted an Islamist sympathetic to al Qaeda and they relayed the information to authorities before the man allegedly went on a shooting spree that killed 13 people in Texas last week, U.S. officials said on Monday.
While the agencies were monitoring contacts by Anwar al-Awlaki, a fiery, anti-American cleric in Yemen who sympathized with al Qaeda, they came across some communications late last year with the shooting suspect, Major Nidal Malik Hasan, U.S. government officials said.
You must be logged in to post a comment.