CSIA Foundation

Analyst's note:  Absolutely must read and carefully consider this stunning report.  Time is running out, as a nation we need to get this situation straighten out and working in our favor of the American citizen.  On could hope that changes to the law are coming to stop this invasion of privacy that is said to have been going on now for years. Will they insist on destruction of general data already "mined" on all Americans?  Considering the Obama administration lies, how are we going to know that both the data and the analysis is destroyed. 

If not for the loss of faith in the U.S. federal government under the Obama administration, I doubt this would have been made public.  Now that the American people and even the liberal media has been targeted, such action is NOT appreciated to say the least.  America has been lied to enough to get the hackles up as the Obama administration says one thing and then does exactly the opposite. Under Obama: Massive Scale of NSA & FBI Surveillance: 'Under This Logic, They Can Do Anything!'.  We also reported Obama's Persistent NEW Gov't Database Contains Data On EVERY American Unlike Any Ever See Before .... and so it now seems.  The real concern is that the data in question is, or can be, being used for political purposes.

All this is going on while we come closer to WW III.  We refuse to even acknowledge the reasonable search for the Islamic enemy on which we should be concentrating.  Islam is at war with us, but we fail to recognize the jihadist for what they are... our enemy. 

We try to Coexist with Islam.  Yet  'We Endure The Elements Of A Police State Here' in this United States.  It would be better if we followed this story line found in Let's call Islam Islam and learn why "A good Muslim according to us is a bad Muslim according to Islam."  Also learn why the concept of a "moderate" Muslim is NOT working out for America. Yes, political correctness continues to kill... For those who follow sharia law, a Muslim is either 100% sharia compliant or they are not. Those who do not accept all aspects of sharia law are considered apostates by other practicing Muslims.

Please read Almost unbelievable: See why it is time for We the People to stand up against enemies foreign and domestic ... please be sitting down as you do so.

Once again we see political correctness at work such that our media restricts itself from describing our Islamist jihadist enemy.  We have previously been told that when a jihadist attacks us here on our own military installations it is called "work-place violence." 

This situation is then followed by the U.S. Military telling our soldiers that Christians are to be considered more of an  "extremist threat" than the Muslim Brotherhood, al-Qaida, and KKK.  Evangelical Christian, Catholics and orthodox Jews are listed ahead of groups like the Muslim Brotherhood” as extremist threats.

Are you now ready to consider reading and acting on the following?

Obama a Muslim Brotherhood Plant

Team B II Wants Islamist Penetration of U.S. Government Investigated

Shariah: The Threat to America.

ALERT-There really is a Traitor our U.S. Whitehouse and more!

It would be good to also review Executive Power in Wartime :

[....] The First Amendment protects free speech and freedom of worship. It permits preaching even violence in the name of religion. But it does not guarantee that such speech will go undetected. Nor does it guarantee that evidence of it cannot be presented in a court when and if it is appropriate to charge that the speaker and those to whom he spoke understood this protected speech and took it as a call to unprotected action. This includes action that itself consists only of speech—such as an agreement to commit a crime, which is itself the crime of conspiracy.

The Fourth Amendment protects against unreasonable searches and seizures, and contains a separate warrant clause providing that warrants may issue only on a finding of probable cause. That does not mean that a search conducted for intelligence purposes requires a warrant, only that it be reasonable.

The Fifth and Sixth Amendments guarantee due process, counsel to those accused of crimes, and the right to confront witnesses, but their application is limited to trials occurring in Article III courts. How much process is due and what kind of evidence may be received and under what circumstances in other tribunals, such as military commissions, is an entirely different story.

The message lurking in the structure of the Constitution is that those acting lawfully under it deserve at least the benefit of the doubt when they act to protect the common good. That is not meant to be a statement or a suggestion of a jurisprudential standard, a standard of law; but it is meant as a prudential standard, a standard of civics and public discourse. This standard will help keep intact the system that we depend on to preserve the nation that Abraham Lincoln called the last, best hope of earth—words that are truer today than they were when he spoke them during another time of trouble.

We reported that DHS was Forced to Release List of Keywords Used to Monitor Social Networking Sites.  Some are suggesting, like in the Canada Free Press, that this is going very quickly to get a lot worse .... DHS insider: It’s about to get very ugly

[....] The present administration is going after leakers, media sources, anyone and everyone who is even suspected of ‘betrayal.’ That’s what they call it, ‘betrayal.’ [....] This administration considers anyone telling the truth about Benghazi, the IRS, hell, you name the issue, ‘betrayal,’” he said.

[....] This administration is collecting names of sources, whistle blowers and their families, names of media sources and everybody they talk to and have talked to, and they already have a huge list. If you’re not working for MSNBC or CNN, you’re probably on that list. If you are a website owner with a brisk readership and a conservative bent, you’re on that list. It’s a political dissident list, not an enemy threat list.

[....] “It means that there will be censorship under the color of authority of anyone in the U.S. who is attempting to expose what’s going on in our name. It’s about controlling any damning information from reaching epidemic proportions. It’s damage control to the extreme. It’s about the upcoming censorship of the internet in the name of national security. The plans are already in place. These latest reports about ‘spying eyes’ have turned this administration and others connected to it into something very, very dangerous. They feel cornered and threatened, and I’m hearing about some plans they have to shut down the flow of information that is implicating them of wrongdoing. Time is short,”

[....] “First, they intend to use the Justice Department to silence journalists like in the Rosen case, but they won’t stop there. They will use a host of national security policies, laws, letters, whatever to take out the bigger threats,” he stated.

Next, they will use some sort of excuse, an external threat, and I believe it will be a combination of the economic collapse and a Mid-East war that will begin in Syria to throttle the information that is accessible on the Internet. And you know what? People will believe it!”

[....] the DHS is co-ordinating efforts with other federal agencies to begin to threaten American citizens with incarceration for non-compliance. You know the old talk of color coded lists? Well, this is what they will be using. People exposing the truth about Benghazi, killing the U.S. Dollar, even those questioning Obama?s legal status and eligibility to be President are the current targets. And they’ve had five long years to get to this point. The ugly truth is that these policies and practices did not start under Obama, but long before. This is about the killing of our Constitutional Republic. The murder of our country and the stripping of our rights. While many have been preoccupied with one issue, few have seen the bigger issue. This is the ‘end game,’ for all the marbles,”

[....] “Please,” pleaded my source, “get this information out while you can. Tell people what I’m saying, that we don’t have much time, that after the latest exposure of spying, Obama, Jarrett, Axelrod, and others, including members of Congress, have put their plans into high gear. This is about the Marxist takeover of America. This is about our country being able to survive another July 4th holiday. This is about a world war about to break out that will kill millions of people, all because of the agenda of this administration.

“They are very dangerous and will do anything and everything to stop the onslaught of negative information that’s being reported by the main stream media. But only about one quarter of the real information is being reported. The other three quarters will be the game changer. But first, tell people what I’ve said. Let them know that more will follow but get this information out right now while the internet is still relatively free. Do it today.

Apparently "PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority." 

Here are related comments sent to me by a friend on this matter of phone records. 

"Most Americans would not see how getting Verizon "meta-data" on all American's phone calls is a problem for privacy. After all, they are NOT getting the content of the message. So what is the big deal?

The "meta-data" is the connection information.  Who is calling whom? for how long? From where to where" who is billed? What names are associated with what numbers?  Now you are beginning to see what can be understood from having this data.  Computers can quickly build a "community" of people with which you communicate.  Government now knows your friends and your friends' friends.  Feds will know which friends are you frequent and those you seldom call.  It will know when you use other phone lines by comparing "communities".

Can this lead to problems?  Sure. Suppose that friendly neighborhood mosque phones you soliciting a donation or to ask you to be quiet on Thursday evenings (after all metadata does not capture content) and suddenly your community includes a terrorist training center. Is it not also possible that the enemy could thus "seed" you into the system?

Remember that some have said everyone is connected within 6 degrees of separation.  It is highly likely that the friend of your brother's in-laws is a criminal or a terror suspect (tens of thousands on those watch lists).  Now your community includes people the Feds consider threats to the state Heaven forbid you might call church friends, or an actual Christian pastor who once spoke about the Constitution reverently ... you are clearly a person of interest now!

So actually from your "community connections" what will map out from this data is clearly of more use to the Feds than anything you might say; especially, if you are aware your lines might be tapped.  No, this wholesale access to all American phone calls will surely give a snapshot of more value than the message you share.  Further, if they should repeat this harvest again later they can spot your new friends.  Better be careful you do not pick up any new foreign friends, or communicate to any other "community" with suspicious ties. Clearly you were recruited!

Now lets get real. Do you think this system of collection is going to be any test for the truly evil "communities"?  Do you think there are no anonymous or single phones? Do you think people never use other phones, especially when they are about questionable communications? Do you think the occasional dangerous communication can not have a masked or anonymous routing? This harvest is most likely useful against the unprotected, unwary, citizen patriot --- not the organized terrorist or traitor-spy professional.

On the second article -- Now FBI wants back door to all software-- the FBI is notoriously behind in the cyber law, cyber crime area.  Its investment in technology is in the main reactionary and very limited. This naive demand that the entire IT industry open its products up so the FBI can play in them -- is laughable. 

No thinking software developer nor hardware engineer will give away their trade secrets and patent information so their work is transparent to all.  Would such a backdoor be hacked?  Dah, within hours if not minutes. 

If the FBI could do it, so will China, Russia, and Billy in the basement next door.  What idiot thought this FBI backdoor was a good idea?  It has to be one of those cyber-ignorant FBI administrators, that is who.  And we expect them to protect America. Double dah."

We've all recently learned that the U.S. mining data from 9 leading Internet firms; companies deny knowledge such that The Washington Post is reporting that 'THEY QUITE LITERALLY CAN WATCH YOUR IDEAS AS YOU TYPE'.  In fact back in September 2012, Wired reports in an article entitled CIA Chief: We’ll Spy on You Through Your Dishwasher .... the article starts of by reminding us that "More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches.[....]"



PRISM – Not just Verizon data collection – its analysis too, on you! 

From the Atlantic Wire we learn the following:

The National Security Agency’s warrant for metadata on every single Verizon call for three months is jaw-dropping in its scope. Except, well, the NSA’s surveillance of our communications is most likely much, much bigger than that. Technology has made it possible for the American government to spy on citizens to an extent East Germany could only dream of. Basically everything we say that can be traced digitally is being collected by the NSA. We’re supposed to trust that our government will be much better behaved, but they’re not, and the White House almost admits it. That doesn’t mean they’re admitting everything.

“On its face, the document suggests that the U.S. government regularly collects and stores all domestic telephone records,” The Week’s Marc Ambinder writes of Glenn Greenwald’s scoop last night. “My own understanding is that the NSA routinely collects millions of domestic-to-domestic phone records.

It does not do anything with them unless there is a need to search through them for lawful purposes.” Previous reporting from many outlets suggests that’s true. In 2006, USA Today‘s Leslie Cauley reported the NSA was secretly collecting call records with data from AT&T, Verizon, and BellSouth. A source told Cauley, “It’s the largest database ever assembled in the world” and that the NSA wanted “to create a database of every call ever made” within U.S. territory.

Likewise, in 2011, The New Yorker‘s Jane Mayer spoke to former NSA crypto-mathematician Bill Binney, who “believes that the agency now stores copies of all e-mails transmitted in America, in case the government wants to retrieve the details later.” He thinks the NSA wants all emails to be searchable, the same way we search with Google. “The agency reportedly has the capacity to intercept and download, every six hours, electronic communications equivalent to the contents of the Library of Congress,” Mayer said.

As Mark Rumold, a staff attorney at the Electronic Frontier Foundation, told The Atlantic Wire last night, ”This is confirmation of what we’ve long feared, that the NSA has been tracking the calling patterns of the entire country.” Update: In defending the program, California Sen. Dianne Feinstein seems to indicate that the court order is a regular, quarterly thing. “There is nothing new in this program. The fact of the matter is, that this was a routine three-month approval under seal that was leaked,” Feinstein said on Thursday.

And the NSA isn’t just collecting the things we say. It’s also tracking what we buy and where we go. In 2008, The Wall Street Journal‘s Siobhan Gorman reported that the NSA’s domestic data collection “have evolved to reach more broadly into data about people’s communications, travel and finances in the U.S. than the domestic surveillance programs brought to light since the 2001 terrorist attacks.” That means emails records, bank transfers, phone records, travel records.

As Ambinder explains, there’s a difference between collecting the call data, analyzing the data, and eavesdropping on the calls. The government’s talking points defend the program by noting the NSA might know the length and location of your phone calls, but at least they weren’t listening in. “On its face, the order reprinted in the article does not allow the Government to listen in on anyone’s telephone calls,” the talking points say.

The “senior government official” does not directly confirm the court order is real, but says that “Information of the sort described in the Guardian article has been a critical tool in protecting the nation from terrorist threats to the United States, as it allows counterterrorism personnel to discover whether known or suspected terrorists have been in contact with other persons who may be engaged in terrorist activities, particularly people located inside the United States.”

That sounds so noble. And the NSA would never abuse its awesome surveillance power, right? Wrong. In 2008, NSA workers told ABC News that they routinely eavesdropped on phone sex between troops serving overseas and their loved ones in America.

They listened in on both satellite phone calls and calls from the phone banks in Iraq’s Green Zone where soldiers call home. Former Navy Arab linguist, David Murfee Faulk described how a coworker would say, “Hey, check this out… there’s good phone sex or there’s some pillow talk, pull up this call, it’s really funny, go check it out.” Faulk explained they would gossip about the best calls during breaks. “It would be some colonel making pillow talk and we would say, ‘Wow, this was crazy.’”


Look at what the Washington Post just released:

Washington Post

Through a top-secret program authorized by federal judges working under the Foreign Intelligence Surveillance Act (FISA), the U.S. intelligence community can gain access to the servers of nine Internet companies for a wide range of digital data. Documents describing the previously undisclosed program, obtained by The Washington Post, show the breadth of U.S. electronic surveillance capabilities in the wake of a widely publicized controversy over warrantless wiretapping of U.S. domestic telephone communications in 2005. These slides, annotated by The Washington Post, represent a selection from the overall document, and certain portions are redacted. Read related article. [....]

  • 12th imam
  • 8 signs
  • 9/11
  • Absentee
  • absolutely
  • Achilles Heel
  • al-Awlaki
  • Al-Qaeda
  • Alinsky
  • Ammo
  • Amnesty
  • Awlaki
  • AWOL
  • Baby
  • Bailout
  • Bankrupt
  • Battle
  • Benghazi
  • bin Talal
  • Bio
  • Birth certificate
  • Black Panther
  • Budget
  • Bulb
  • CAIR
  • Caliph
  • Caliphate
  • Cartel
  • Census
  • China
  • Chinese
  • Christian
  • Cloward
  • Club-K
  • COIN
  • Condell
  • Constitution
  • Contractor
  • Conyers
  • Cordoba
  • Correctness
  • Corsi
  • Debt
  • Deficit
  • Deradicalization
  • Detention
  • Dhimmi
  • DHS Homeland
  • Dialog: East Coast - West Coast
  • Domestic
  • Earth
  • Economic
  • Economy
  • Egypt
  • Electoral College
  • Electromagnetic Pulse
  • eligibility
  • Executive Orders
  • Farrakhan
  • Fast and Furious
  • FBI
  • Federal Reserve
  • Food
  • Fraud
  • Gas
  • Gaubatz
  • Global
  • Global economy
  • Governor
  • Grover Norquist
  • Guardians
  • Gulen
  • Gun control
  • Hagmann
  • Hawala
  • Healthcare
  • Hezbollah
  • Hillsdale College
  • Hizb ut-Tahrir
  • HLF
  • Holy Land Foundation
  • Homegrown
  • homosexual
  • Immigration
  • Implant
  • Information Warfare
  • Iran
  • Iranian Revolutionary Guards
  • IslamBerg
  • Islamist
  • Jekyll
  • Jew
  • jihad
  • Libya
  • like to know
  • Mafia
  • Manipulating Perceptions
  • Marriage
  • Marxist
  • Mexico
  • Military
  • Missile
  • Moderate Muslim
  • Money laundering
  • Muslim Brotherhood
  • must read
  • Myrick
  • Nazi
  • net neutrality
  • Nuclear
  • Oath Keepers
  • oil
  • Open Society
  • Operation Fast and Furious
  • Panther
  • Patriot
  • PFLP
  • Phares
  • pitchfork
  • Policy
  • political correctness
  • Politicians
  • Power
  • Progressive
  • Rare earth minerals
  • Responsibility to Protect
  • Reza Kahlili
  • ROE
  • Root
  • Roy Beck
  • Rules of Engagement
  • Russia
  • Salafists
  • Schools
  • Scout
  • Semper Fidelis
  • sharia
  • Shoebat
  • Sibel
  • social justice
  • Social Security Number
  • Socialist
  • Soros
  • Spending
  • Spies
  • Strategic
  • Stuxnet
  • Submarine
  • Sunni
  • Super-sized
  • survival
  • SWAT
  • Taliban
  • Taqiyya
  • Tawfik
  • Tax
  • Team B II
  • Treason
  • troubling
  • Truth
  • TSA
  • Unemployment
  • Uplift
  • USMC
  • Vallely
  • Vieira
  • Vote
  • Voter fraud
  • War
  • Weather Underground
  • WMD
  • Zero