Welcome, Guest.
Please login or register.
Can you hear I mean tap me now?
Rotterdam NY...the people's voice    Rotterdam's Virtual Internet Community    United States Government  ›  Can you hear I mean tap me now? Moderators: Admin
Users Browsing Forum
No Members and 37 Guests

Can you hear I mean tap me now?  This thread currently has 38,622 views. |
43 Pages 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... » Recommend Thread
rpforpres
June 6, 2013, 4:24am Report to Moderator

Hero Member
Posts
3,891
Reputation
89.47%
Reputation Score
+17 / -2
Time Online
113 days 4 hours 29 minutes
Logged Offline
Private Message
Libertarian4life
June 6, 2013, 10:33am Report to Moderator

Hero Member
Posts
7,356
Reputation
50.00%
Reputation Score
+12 / -12
Time Online
119 days 21 hours 10 minutes
The whole point of forcing all communications from analog to digital was to
make it so all electronic communications could be more easily stored.

Anyone who thinks that every phone call, email, instant message or chat
room posting isn't collected and archived is ignorant.
Logged
Private Message Reply: 1 - 642
CICERO
June 6, 2013, 11:12am Report to Moderator

Hero Member
Posts
18,232
Reputation
68.00%
Reputation Score
+17 / -8
Time Online
702 days 15 hours 7 minutes
Quoted from Libertarian4life

Anyone who thinks that every phone call, email, instant message or chat
room posting isn't collected and archived is ignorant.


I wouldn't call it ignorant, I would call it tolerant.  Why the masses tolerate, who knows.


Logged Offline
Private Message Reply: 2 - 642
bumblethru
June 6, 2013, 12:47pm Report to Moderator
Hero Member
Posts
30,841
Reputation
78.26%
Reputation Score
+36 / -10
Time Online
412 days 18 hours 59 minutes
Quoted Text
Yes, Government Spooks May Be Listening

The Obama administration has been caught spying on the Verizon phone calls of tens of millions of Americans.

But the government has sought to “reassure” us that it is only tracking “metadata” such as the time and place of the calls, and not the actual content of the calls.

That claim is patently absurd.

The American government is in fact collecting and storing virtually every phone call, purchases, email, text message, internet searches, social media communications, health information, employment history, travel and student records, and virtually all other information of every American.

All U.S. intelligence agencies – including the CIA and NSA – are going to spy on Americans’ finances.  The IRS will be spying on Americans’ shopping records, travel, social interactions, health records and filesfrom other government investigators.

http://rinf.com/alt-news/break.....r-phone-calls/39691/


When the INSANE are running the ASYLUM
In individuals, insanity is rare; but in groups, parties, nations and epochs, it is the rule. -- Friedrich Nietzsche


“How fortunate for those in power that people never think.”
Adolph Hitler
Logged
Private Message Reply: 3 - 642
Madam X
June 6, 2013, 1:06pm Report to Moderator
Hero Member
Posts
3,190
Reputation
66.67%
Reputation Score
+8 / -4
Time Online
26 days 9 hours 21 minutes
You mean the government didn't really want to bring us a crystal clear tv picture? Next thing you will be telling me that Santa Claus is made up.
Seriously, if you stop watching those that you know bear watching, such as the 9/11 terrorists, the underwear bomber, and the Tsarnaev brothers, because you allegedly are stretched too thin, why would you keep on collecting all the data in the world? After a certain point, information becomes useless, do to the sheer volume, even with computers.
This is what East Germany was like. The government kept tabs on everybody all the time, in the name of safety, until the government became the thing that was the only danger.
I wish we could establish a new country, Cowardland, where all these fraidy-cat fools could move to to "be safe", and they could all live in government housing and eat what a politician tell them to, and turn over all their income to whomever the government deems needier or more deserving. See how they would like it. Sounds a lot like the former Soviet Union. They all wanted to come over here. Didn't they know they were already in paradise?
Logged Offline
Private Message Reply: 4 - 642
CICERO
June 6, 2013, 4:31pm Report to Moderator

Hero Member
Posts
18,232
Reputation
68.00%
Reputation Score
+17 / -8
Time Online
702 days 15 hours 7 minutes
Quoted from Madam X
.
This is what East Germany was like. The government kept tabs on everybody all the time, in the name of safety, until the government became the thing that was the only danger. Sounds a lot like the former Soviet Union. They all wanted to come over here. Didn't they know they were already in paradise?


And it will collapse the same way.  The people will overload the bureaucracies until they can no longer be sustained and it will collapse. (Cloward-Piven strategy) If millions of average Americans began making what sounded like terrorist threats on electronic communications, the system wouldn't be able respond to them without it breaking down.  People will start using the system against itself.  

Quoted Text
First proposed in 1966 and named after Columbia University sociologists Richard Andrew Cloward and Frances Fox Piven, the “Cloward-Piven Strategy” seeks to hasten the fall of capitalism by overloading the government bureaucracy with a flood of impossible demands, thus pushing society into crisis and economic collapse.


Logged Offline
Private Message Reply: 5 - 642
Henry
June 6, 2013, 6:49pm Report to Moderator

Hero Member
Posts
6,058
Reputation
85.00%
Reputation Score
+17 / -3
Time Online
2114 days 9 hours 31 minutes


"In the beginning of a change, the Patriot is a scarce man, brave, hated and scorned. When his cause succeeds, however, the timid join him, for then it costs nothing to be a Patriot."

Logged Offline
Private Message Reply: 6 - 642
Henry
June 6, 2013, 6:52pm Report to Moderator

Hero Member
Posts
6,058
Reputation
85.00%
Reputation Score
+17 / -3
Time Online
2114 days 9 hours 31 minutes


"In the beginning of a change, the Patriot is a scarce man, brave, hated and scorned. When his cause succeeds, however, the timid join him, for then it costs nothing to be a Patriot."

Logged Offline
Private Message Reply: 7 - 642
rpforpres
June 6, 2013, 8:15pm Report to Moderator

Hero Member
Posts
3,891
Reputation
89.47%
Reputation Score
+17 / -2
Time Online
113 days 4 hours 29 minutes
Logged Offline
Private Message Reply: 8 - 642
A Better Rotterdam
June 6, 2013, 10:36pm Report to Moderator

Hero Member
Posts
903
Reputation
60.00%
Reputation Score
+6 / -4
Time Online
38 days 7 hours 17 minutes
Reading this today was a huge disappointment, I never have trusted the two parties, but I did partially buy into the Obama act, voting for him in 08 not 12. While I shouldn't be suprised, I really did think that he had some basic morals and that he was a better person than Bush. Now, I can't in anyway defend any of these thoughts to myself. It's third party from here on out. Change to me now means, change the two party system, don't be suckered again.
Logged Offline
Private Message Reply: 9 - 642
Libertarian4life
June 7, 2013, 2:54am Report to Moderator

Hero Member
Posts
7,356
Reputation
50.00%
Reputation Score
+12 / -12
Time Online
119 days 21 hours 10 minutes
Quoted from Madam X

Seriously, if you stop watching those that you know bear watching, such as the 9/11 terrorists, the underwear bomber, and the Tsarnaev brothers, because you allegedly are stretched too thin, why would you keep on collecting all the data in the world? After a certain point, information becomes useless, do to the sheer volume, even with computers.


From the NSA.gov1.info homepage:

http://nsa.gov1.info/utah-data-center/

Utah Data Center



Background

The Utah Data Center, code-named Bumblehive, is the first Intelligence Community Comprehensive National Cyber-security Initiative (IC CNCI) data center designed to support the Intelligence Community's efforts to monitor, strengthen and protect the nation. NSA is the executive agent for the Office of the Director of National Intelligence (ODNI) and will be the lead agency at the center.

The steady rise in available computer power and the development of novel computer platforms will enable us to easily turn the huge volume of incoming data into an asset to be exploited, for the good of the nation.



The Utah Data Center is currently under construction and is expected to open in October 2013. Our 1.5 billion-dollar one million square-foot Bluffdale / Camp Williams facility will house a 100,000 sq-ft mission critical data center. The remaining 900,000 SF will be used for technical support and administrative space. Other supporting facilities include water treatment facilities, chiller plant, power substations, vehicle inspection facility, visitor control center, and sixty diesel-fueled emergency standby generators and fuel facility for a 3-day 100% power backup capability.

Utah Data Center Site Plan

The site plan below shows the location of the administration building, chiller plant, data halls, generators, fuel storage tanks, storage warehouse, power substations, visitor control center, and vehicle inspection facility. View the full-size Utah Data Center Site Plan


Utah Data Center Technical Specifications

Data Storage Capacity

The storage capacity of the Utah Data Center will be measured in "zettabytes". What exactly is a zettabyte? There are a thousand gigabytes in a terabyte; a thousand terabytes in a petabyte; a thousand petabytes in an exabyte; and a thousand exabytes in a zettabyte. Some of our employees like to refer to them as "alottabytes".


Domestic surveillance data we plan to process and store in the Utah Data Center.


Your Data: If You Have Nothing to Hide, You Have Nothing to Fear

Our value is founded on a unique and deep understanding of risks, vulnerabilities, mitigations, and threats. Domestic Surveillance plays a vital role in our national security by maintaining a total information awareness of all domestic activities by using advanced data mining systems to "connect the dots" to identify suspicious patterns.

Why We Collect Your Data

Under the authority of Homeland Security Presidential Directive 6, which defines the integration and use of screening information to protect against terrorism, the NSA is authorized to collect and disseminate information about suspected foreign and domestic terrorists. In the past, this meant gathering information AFTER a target had been identified. This often led to missed intelligence and lost opportunities.

But what if we could collect the information in advance, before the target was known? What if the mere act of collecting information could result in the identification of new targets? What if we could build a national data warehouse containing all available information about every person in the United States? Under the authority of the classified Homeland Security Directive 15 (U.S. Strategy and Policy in the War on Terror), we can.


NSA Utah Data Center - Data warehouse diagram

What Data We Collect

Every day, people leave a digital trail of electronic breadcrumbs as they go about their daily routine. They go to work using electronic fare cards; drive through intersections with traffic cameras; walk down the street past security cameras; surf the internet; pay for purchases with credit/debit cards; text or call their friends; and on and on.

There is no way to predict in advance which crucial piece of data will be the key to revealing a potential plot. The standard operating procedure for the Domestic Surveillance Directorate is to "collect all available information from all available sources all the time, every time, always".




For security reasons, it is unrealistic to expect a complete list of information we collect for our national citizen database. In the spirit of openness and transparency however, here is a partial list:

    internet searches
    websites visited
    emails sent and received

    social media activity (Facebook, Twitter, etc)
    blogging activity including posts read, written, and commented on - View our patent
   videos watched and/or uploaded online
    photos viewed and/or uploaded online

    music downloads
    mobile phone GPS-location data
    mobile phone apps downloaded
    phone call records - View our patent
    text messages sent and received
    online purchases and auction transactions

    bookstore receipts
    credit card/ debit card transactions
    bank statements
    cable television shows watched and recorded

    commuter toll records
    parking receipts
    electronic bus and subway passes / Smartpasses
    travel itineraries
    border crossings

    surveillance cameras
    medical information including diagnoses and treatments
    prescription drug purchases
    guns and ammunition sales
    educational records

    arrest records
    driver license information



Recently, it has come to our attention that some Citizens have expressed concern over the massive scope of data we collect. Americans are proudly independent; and we salute that.

Which is why, in a spirit of openness and transparency, we are releasing the following dataset that displays a related list of typical internet searches by the United States Government for a sample targeted website. You can see by this list how careful we are to redact any personally identifiable information. So rest assured, America, we have your back.
  
Compiled from official Statcounter reports related to the target website. None of the agencies above approved, endorsed, or authorized that website or our collection of their data.


How We Collect Your Data

For information on how we collect your data, including our PRISM program, visit Our Surveillance Strategy page on this website. For information about our new state-of-the-art Surveillance Data Center, visit our Utah Data Center information page.

How We Use Your Data

We treasure the U.S. Constitution and the rights it secures for all the people. In a world in which privacy has become illusory in so many areas of our lives, the Domestic Surveillance Directorate maintains the highest standards of integrity and lawful action. Your private data is safely secured using our custom database software called Cloudbase, which has fine-grained security to control access down to the cell level.

Threat Matrix Processing

Incoming transactional data is analyzed against a continually evolving threat matrix and is assigned an action code. The vast majority of these transactions are routed directly to a permanent static storage state. In fact, for most Americans, your data is never accessed or viewed by anyone within the US Government unless some future event triggers an inquiry. We work closely with our partners in the Intelligence Community to ensure that your stored data is released only as a result of a "national security" request.

Continuity of Government

Our strong commitment to keeping the Nation safe includes an important role in maintaining the Continuity of Government. Since the early 1980s, the federal government has used its secret Main Core database to track dissidents and watchlisted Americans in the event of a national emergency. The roots of the Domestic Surveillance Directorate can, in fact, be traced back to the early days of this program. We are proud to continue this tradition by sharing our data with the modern-day COG program. Learn more about this.


IARPA banner -Intelligence Advanced Research Projects Activity

Future Uses of Domestic Intelligence Data

In 2006, the Intelligence Advanced Research Projects Activity (IARPA) was created to invest in high-risk, high-payoff classified programs uniquely designed to provide research and technical capabilities for the Intelligence Community. IARPA-funded researchers are currently studying novel ways of processing and analyzing the explosive growth of domestic data.

    The Aladdin program seeks to extract intelligence information from the high volume of videos uploaded to the internet.

    The Babel program is developing agile and robust speech recognition technology that can provide effective search capability for analysts to efficiently process massive amounts of real-world recorded speech.

    The Knowledge Discovery and Dissemination (KDD) program will develop advanced analytic algorithms that can effectively draw inferences across multiple databases to allow the Intelligence Community to create virtual fusion centers enabling analysts to produce actionable intelligence.

    The Socio-cultural Content in Language (SCIL) Program will develop novel algorithms, techniques and technologies to uncover the social actions and characteristics of members of a group (ie; within discussion forums, online comment sections, social media, etc.) by examining the language used in relation to acceptable social and cultural norms.

    The Reynard Program starts from the premise that "real world" characteristics are reflected in "virtual world" behavior. The program seeks to identify behavioral indicators in online virtual worlds and "massively multiplayer online games" that are related to the real world characteristics of the users. Attributes of interest include gender, age, economic status, educational level, occupation, ideology or "world view", and physical geographic location.



Code-Breaking Supercomputer Platform
Titan supercomputer

In October 2012, the U.S. Department of Energy's (DOE) Oak Ridge National Laboratory launched the Titan Supercomputer, which is capable of churning through more than 20,000 trillion calculations each second or 20 petaflops. (1 petaflop = 1 quadrillion instructions per second).

Our Target: 256-bit AES

The Advanced Encryption Standard (AES) algorithm is used worldwide to encrypt electronic data on hard drives, email systems, and web browsers. The AES 256-bit encryption key is the standard for top-secret US government communications. Computer experts have estimated it would take longer than the age of the universe to break the code using a trial-and-error brute force attack with today's computing technology.

In 2004, the NSA launched a plan to use the Multiprogram Research Facility in Oak Ridge, Tennessee to build a classified supercomputer designed specifically for cryptanalysis targeting the AES algorithm. Recently, our classified NSA Oak Ridge facility made a stunning breakthrough that is leading us on a path towards building the first exaflop machine (1 quintillion instructions per second) by 2018. This will give us the capability to break the AES encryption key within an actionable time period and allow us to read and process stored encrypted domestic data as well as foreign diplomatic and military communications.


NSA Utah Data Center visitor control center Visitor Control Center

Construction Status

We're using a Critical Path Method (CPM) schedule to track the cost and resource data for over 26,000 activities. The project initially required over a million cubic yards of earthwork and nearly seven miles of new roadways. The massive twenty-building complex is being completed in three phases. The first phase was completed last Fall and includes the first of four data halls (Data Center Module DCM 1); the Administration Building; Data Center Loading and Storage; Chiller Plant #1 and storage tanks; Generator Plant #1 with fuel system storage; Visitor Control Center; Vehicle Cargo Inspection Facility; kennel; perimeter warehouse; and fire pump building.

The second phase, completed early in 2013 includes the second data hall (DCM 2) along with Generator Plant #2 with fuel system storage.

recent photo of NSA Utah data center 2013

The final phase is scheduled to be completed by October 2013 and includes the remaining two data halls (DCM 3 and 4); Generator Plants 3 and 4 with fuel system storage; and Chiller Plant #2 and storage tanks. Because of the national security implications of an on-time opening of this critical facility, the NSA has already begun the installation of classified equipment in the first two data halls (DCM 1 and 2).


NSA Utah Data Center ribbon cutting ceremony
Secret Ribbon Cutting Ceremony

We held a closed-press ribbon cutting ceremony and tour on May 30th, 2013 in celebration of the completion of the exterior building construction. We invited our most loyal partners at the local, state, and federal level who have had the vision and fortitude to enable us to build this powerful Intelligence Community data center "for the good of the Nation". We are on track to open in October!

This is a parody of nsa.gov and has not been approved, endorsed, or authorized by the National Security Agency or by any other U.S. Government agency.


So rest assured, America, we have your back.



Logged
Private Message Reply: 10 - 642
Libertarian4life
June 7, 2013, 2:59am Report to Moderator

Hero Member
Posts
7,356
Reputation
50.00%
Reputation Score
+12 / -12
Time Online
119 days 21 hours 10 minutes
There is no way to predict in advance which crucial piece of data will be the key to revealing a potential plot.

The standard operating procedure for the Domestic Surveillance Directorate is to "collect all available
information from all available sources all the time, every time, always"
Logged
Private Message Reply: 11 - 642
Henry
June 7, 2013, 6:46am Report to Moderator

Hero Member
Posts
6,058
Reputation
85.00%
Reputation Score
+17 / -3
Time Online
2114 days 9 hours 31 minutes
Quoted from A Better Rotterdam
Reading this today was a huge disappointment, I never have trusted the two parties, but I did partially buy into the Obama act, voting for him in 08 not 12. While I shouldn't be suprised, I really did think that he had some basic morals and that he was a better person than Bush. Now, I can't in anyway defend any of these thoughts to myself. It's third party from here on out. Change to me now means, change the two party system, don't be suckered again.


Yup I never trusted Obama but I hoped he would have repealed the Patriot Act like he said he would do, all his talk about how bad the Bush spying was and 4th amendment attacks were all BS. He simply expanded the powers he once railed against. While I love the idea of a 3rd party I don't even know if that will fix things anymore, you are already seeing mainstream politicians giving hints about 3rd party runs, its like they're trying to cover all the angles to keep real change out.


"In the beginning of a change, the Patriot is a scarce man, brave, hated and scorned. When his cause succeeds, however, the timid join him, for then it costs nothing to be a Patriot."

Logged Offline
Private Message Reply: 12 - 642
CICERO
June 7, 2013, 7:04am Report to Moderator

Hero Member
Posts
18,232
Reputation
68.00%
Reputation Score
+17 / -8
Time Online
702 days 15 hours 7 minutes
Quoted from Henry


Yup I never trusted Obama but I hoped he would have repealed the Patriot Act like he said he would do, all his talk about how bad the Bush spying was and 4th amendment attacks were all BS. He simply expanded the powers he once railed against. While I love the idea of a 3rd party I don't even know if that will fix things anymore, you are already seeing mainstream politicians giving hints about 3rd party runs, its like they're trying to cover all the angles to keep real change out.


It takes a long time for the people to realize it is the government beauracracies run by unelected beauracrats that run the government, and the people are merely observers, and their elected representatives help sell the charade.  Sure they get to choose between two candidates from the oligarch ever 2 and 4 years to give the illusion that the people are in control of these HUGE and POWERFUL institutions, but history shows us THE BEAURACRACY has the power.  


Logged Offline
Private Message Reply: 13 - 642
bumblethru
June 7, 2013, 8:46pm Report to Moderator
Hero Member
Posts
30,841
Reputation
78.26%
Reputation Score
+36 / -10
Time Online
412 days 18 hours 59 minutes


When the INSANE are running the ASYLUM
In individuals, insanity is rare; but in groups, parties, nations and epochs, it is the rule. -- Friedrich Nietzsche


“How fortunate for those in power that people never think.”
Adolph Hitler
Logged
Private Message Reply: 14 - 642
43 Pages 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... » Recommend Thread
|


Thread Rating
There is currently no rating for this thread