NSA is a lawless, rogue agency that could not exist if it didn’t violate 4th Amendment law . . . and it has declared war on every American and more. See the following:
Source: “Lifting the Veil” by Timothy Silver:
“On June 6th 2013, it was revealed that Barack Obama oversaw the largest infringement of the Fourth Amendment in the history of the United States with the construction of a veritable surveillance state, capable of tracking the movements and communications of every American citizen. We now know that the NSA and United Kingdom counterpart GHCQ:
- Collect the domestic meta-data of both parties in a phone-call.109
- Set up fake internet cafes to steal data.110
- Have intercepted the phone calls of at least 35 world leaders, including allies such as German Chancellor Angela Merkel.111
- Can tap into the underwater fiber-optic cables that carry a majority of the world’s internet traffic.112
- Track communications within media institutions such as Al Jazeera.113
- Have ‘bugged’ the United Nations headquarters.114
- Have set up a financial database to track international banking and credit card transactions.115
- Collect and store over 200 million domestic and foreign text messages each day.116
- Collect and have real-time access to browsing history, email, and social media activity. To gain access, an analyst simply needs to fill out an on-screen form with a broad justification for the search that is not reviewed by any court or NSA personnel.117
“I, sitting at my desk, could wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”. – Edward Snowden
- Create maps of the social networks of United States citizens.118
- Have access to smartphone app data.119
- Use spies in embassies to collect data, often by setting up ‘listening stations’ on the roofs of buildings.120
- Use fake LinkedIn profiles and other doctored web pages to secretly install surveillance software in unwitting companies and individuals.121
- Track reservations at upscale hotels.122
- Have intercepted the talking-points of world leaders before meetings with
Barack Obama.123
- Can crack encryption codes on cellphones.124
- Have implanted software on over 100,000 computers worldwide allowing them to hack data without internet connection, using radio waves.125
- Have access to computers through fake wireless connections.126
- Monitor communications in online games such as World of Warcraft.127
- Intercept shipping deliveries and install back-door devices allowing access.128
- Have direct access to the data centers of Google, Yahoo and other major companies.129
- Covertly and overtly infiltrate United States and foreign IT industries to weaken or gain access to encryption, often by collaborating with software companies and internet service providers themselves. They are also, according to an internal document, “responsible for identifying, recruiting and running covert agents in the global telecommunications industry.”130
- Use “honey traps”, luring targets into compromising positions using sex.131
- Share raw intelligence data with Israel. Only official U.S. communications are affected, and there are no legal limits on the use of the data from Israel.132
- Spy on porn habits of activists to discredit them.133
Possibly the most shocking revelation was made on February 24, 2014. Internal documents show that the NSA is attempting to manipulate and control online discourse with “extreme tactics of deception and reputation-destruction.”134
The documents revealed a top-secret unit known as the Joint Threat Research Intelligence Unit, or JTRIG.
Two of the core self-identified purposes of JTRIG are to inject all sorts of false material onto the internet in an effort to discredit a target, and to use social sciences such as psychology to manipulate online discourse and activism in order to generate a desirable outcome. The unit posts false information on the internet and falsely attributes it to someone else, pretend to be a ‘victim’ of a target they want to discredit, and posts negative information on various forums. In some instances, to discredit a target, JTRIG sends out ‘false flag’ emails to family and friends.”-—–End quote.
Remember what Will Rodgers said about taking wooden nickels and what your Grandma told you about the difference between s#$t and shinola. And then ask yourself who benefits?
How am I and Bruce Doucette benefiting by saving the actual Constitution contract and enforcing it? ––– Except in the sense that all Americans benefit?
And how are the “federal corporations” benefiting? — By creating and enforcing false claims against everyone’s labor and property interests and generating trillions of dollars worth of credit for their own use in the process. By creating and controlling giant trust and pension funds for their own use, which they employ to undermine other corporations and secure controlling ownership interests in the Fortune 500 and virtually everything else, too.
Wake up! Daylight in the swamps!
__________________
L A W B R E A K E R S !
Obama et al. needs to arrested by the U.S. military and tried for treason! It is the duty of lesser officials under the doctrine of interposition to confront higher officials and bring them to justice.
__________________
(Ana: 186 Answers)
Posted 3/26/2016
Recent Comments