80 Years of Domestic and International Spying-Original Content

With all of the commotion stirred up lately by whistle blower Edward Snowden, this is a good time to review documents released by the US government concerning programs used to spy on the public. While Mr.Snowden did reveal the PRISM program, the US has had programs and facilities for decades that are used to collect private information. As times passes, the programs grow and become ever more invasive. Because of the lack of repercussions, the government is even more emboldened to peer into our secrets and store them for future use against us.
The first document I looked at is entitled "Legal Standards for the Intelligence Community in Conducting Electronic Surveillance." This is a report submitted to Congress in February, 2000. The opening paragraph states " Electronic surveillance is conducted by elements of the Intelligence Community for foreign intelligence and foreign counterintelligence purposes. Because of its potential intrusiveness and the implications for the privacy of United States persons, such surveillance is subject to strict regulation by statute, and Executive Order, and close scrutiny. The applicable legal standards for the collection, retention, or dissemination of information concerning U.S. persons reflect a careful balancing between the needs of the government for such intelligence and the protection of the rights of U.S. persons, consistent with the reasonableness standard of the Fourth Amendment, as determined by factual circumstance." Well now, that makes me feel better. The reader should keep in mind that the fourth amendment protects us from UNREASONABLE searches. The surveillance being strictly regulated by statute, Executive Order, and close scrutiny makes me feel great too. The document goes on to discuss the statutes and regulations governing information collected , and that Intelligence Agencies may request assistance from foreign governments in the collection of that information.
ESCHELON is a project and system that originates in 1971. This system is operated by five nations: Australia, the United States, the United Kingdom, Canada, and New Zealand. These countries work together in accordance with an agreement between the US and the UK in 1947. ESCHELON sifts through the majority of information passed through the internet and phone lines. Once information is gathered, it is sent to processing centers in Denver, Colorado(US), Menwith Hill, England, Australia, and Germany. There is a computer system that information is filtered through called DICTIONARY that searches for keywords. While the United States has refused to comment on the program, two reports have been released which were commissioned by the European Parliament about it.
The first of these reports, entitled "An Appraisal of Technologies of Political Control," stated that ESCHELON is designed for primarily non-military targets, and gleans information from virtually every country. It is divided into seven sections. Here are direct quotes from the report about the section topics.

(i) The role and function of the technology of political control;

(ii) Recent trends and innovations (including the implications of globalization, militarization of police equipment, convergence of control systems deployed worldwide and the implications of increasing technology and decision drift);

(iii) Developments in surveillance technology (including the emergence of new forms of local, national and international communications interceptions networks and the creation of human recognition and tracking devices);

(iv) Innovations in crowd control weapons (including the evolution of a 2nd. generation of so called 'less-lethal weapons' from nuclear labs in the USA).

(v) The emergence of prisoner control as a privatized industry, whilst state prisons face increasing pressure to substitute technology for staff in cost cutting exercises and the social and political implications of replacing policies of rehabilitation with strategies of human warehousing.

(v) The use of science and technology to devise new efficient mark-free interrogation and torture technologies and their proliferation from the US & Europe.

(vi) The implications of vertical and horizontal proliferation of this technology and the need for an adequate political response by the EU, to ensure it neither threatens civil liberties in Europe, nor reaches the hands of tyrants.

The second report, "Interception Capabilities 2000" reveals that Comint organizations have intercepted communication internationally for more than 80 years. Comint is also known as ESCHELON. The program intercepts satellite communications, long distance communications from space, undersea communications using submarines, and the internet. Over 120 satellites are used to collect intelligence. It has been widely known that technology companies are required to install "back doors" for the intelligence community. The report affirms this, saying "This report identifies a previously unknown international organization - "ILETS" - which has, without parliamentary or public discussion or awareness, put in place contentious plans to require manufacturers and operators of new communications systems to build in monitoring capacity for use by national security or law enforcement organizations (section 5).
The implications of this information should frighten every reader to their core. Before Edward Snowden revealed PRISM, there were already massive programs in place violating humanity. We are being invaded, spied upon, categorized, herded, tortured, and imprisoned. All the while the average citizen is kept occupied by sensational stories and distractions of the media. I will continue to write about these topics. It is up to you, the reader to spread the information. Until next time...

Views: 162

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by scotty michele brown on August 10, 2013 at 8:37pm

Vince - Thank you for the compliment. I am in the company of far better researchers and writers. I hope that I am able to add a piece or two of the puzzle that the bloggers at 12160 are putting together.

Comment by scotty michele brown on July 30, 2013 at 1:54am

@ optix - So far the two blogs I have submitted to Activist Post have gotten quite a few views. One has 38 views and the other has 54 views. Thank you again for the advice. The blogs are linked back to 12160, so that is good too.

Comment by scotty michele brown on July 30, 2013 at 1:50am

@optix = I did as you suggested and submitted two of my blogs to Activist post. This was the reply:  Excellent, thank you very much for sending. I'll add this to our forum, then share to social media and include in our nightly newsletter that goes out to 15,000+ subscribers. I would also invite you to join the forum -- it's free and you can post whatever you'd like: http://www.activistpost.com/p/forum_08.html

Comment by scotty michele brown on July 28, 2013 at 6:54pm

Thank you guys. I will try your advice later tonight. Appreciate the nice words of encouragement. I will submit another blog in a day or two with the same type of content.

Comment by Nobody Will Observe on July 28, 2013 at 5:00pm

read it :)

Comment by suzie on July 28, 2013 at 4:19pm
I like your articles .. Keep it up ..your talented
I just tweeted it out there to the world .. Don't worry its out there !!!
Comment by scotty michele brown on July 28, 2013 at 3:11pm

I wish I could figure out the key to getting people to read my blogs. They are well researched, and contain information that people in the truth movement should know. No fluff or hyperbole here. Decent attention span is required though...

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

tjdavis favorited Doc Vega's blog post Are We Really in a Simulation?
7 hours ago
tjdavis posted a photo
7 hours ago
tjdavis posted a video

Ken Kesey: Oregon’s countercultural icon | Oregon Experience

Ken Kesey (1935 - 2001) is one of the best-known authors to ever emerge from Oregon. He wrote his two most-acclaimed novels, “One Flew Over the Cuckoo's Nest...
7 hours ago
Doc Vega posted a blog post

Are We Really in a Simulation?

 How many times did you hear the theory as you grew up that everyone had an exact double somewhere…See More
11 hours ago
Doc Vega posted a blog post

We're on That Road

Just another confusing dayThe news always makes it that wayIf you believe in what they sayAll you…See More
yesterday
Sandy posted a video
Tuesday
tjdavis favorited Sandy's discussion North Dakota's cloud seeding program draws interest from around the world. Opponents want to end it
Tuesday
tjdavis posted a blog post
Tuesday
Sandy posted a photo
Monday
Sandy posted a video

✂️ RFK exposes Bill Gates

49 seconds · Clipped by painkillerZ100 · Original video "RFK Jr | PorcFest 2023" by Greg Fernandez Jr
Monday
cheeki kea commented on Doc Vega's blog post The Redondo Trench, UAP’s, and EMP Triangles
"I don't see why they need aliens to reverse engineer anything when they could just reacquaint…"
Sunday
cheeki kea posted a photo
Sunday
cheeki kea commented on tjdavis's photo
Thumbnail

Solutions

"Sound the warning bell."
Sunday
tjdavis posted a photo
Sunday
Doc Vega posted blog posts
Saturday
tjdavis posted videos
Saturday
Doc Vega commented on Doc Vega's blog post Too Brainwashed to Use Common Sense
"cheeki kea Good points and thorough evidence of the sophisticated psychological attacks upon the…"
Saturday
Sandy posted a status
Saturday
Sandy posted a discussion
Saturday
Doc Vega posted a blog post

Beyond Our Control

Beyond Our Control No one is in my constellationA perpetual state of alienationNo false sense of…See More
Friday

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted