Check Out Your Thinking

Several Signs That You Are A Slave To The Matrix

Filed in Matrix Articles by on July 18, 2016

matrix-big2From bibliotecapleyades.net

Today’s world is a strange place.

 We are inundated with signals from early on in life, encouraging each of us to walk a particular path, establishing blinders on us along the way to discourage us from looking for alternatives to what the herd is doing or thinking.

 Life is so complex that overtime, if we are paying attention, we realize that there are an infinite number of possibilities to what the human experience could be, and we come see that the world is on fire because individuals all too infrequently question why things are the way they are, failing to notice that their mindset or behavior needs adjustment in favor of more intelligent, common sensical, or sustainable patterns of existence.

 Not meant to be overtly critical of anyone’s lifestyle choices or personal situation, the following signs that you’re a slave to the Matrix are meant purely as an observational approach to helping you identify the areas of your life where you may be missing an opportunity to liberate yourself from someone else’s self-destructive design for your life.

  1. You pay taxes to people you’d like to see locked up in jail

    This is perhaps the biggest indicator that we are slaves to the Matrix. The traditional notion of slavery conjures up images of people in shackles forced to work on plantations to support rich plantation owners.

    The modern day version of this is forced taxation, where our incomes are automatically docked before we ever see the money, regardless of whether or not we approve of how the money is spent.

  2. You go to the doctor, but you’re still sick

    Modern medical care, for all of it’s scientific progress, has sadly become sick care, where we are rarely advised to eat well and tend to our mental and physical health, but instead are routinely advised to consume expensive medications and procedures that are pushed by the for-profit healthcare Matrix.

  3. You’ve picked Team Democrat or Team Republican and argue with your friends, family and co-workers about politics

    This is what the control strategy of divide and conquer looks like in our society.

     Both of the major parties are corrupt through and through, and independent candidates are not even allowed to participate in public debates.

     By believing in one of these parties and burning your personal energy on arguing with other ordinary people you are turning over your soul the Matrix, and doing your share in making sure that ‘we the people’ will never be united against corruption.

  4. You work hard doing something you hate to earn fiat dollars

    Work is important and money does pay the bills, however, so many people lose the best years of their lives doing things they hate, just for money.

     The truth about money today is that we do not have money, but instead, inflationary fiat currency that is privately owned and manipulated. Since it is still necessary to get by in this world, it is best that you get more value for your time by doing something you enjoy or by working with people you do not despise.

    It is easier than you may think to live on less money than we believe we need, we just have to be willing to go against the grain realize this.

  5. You’re willing to accrue personal debt to fund the acquisition of a consumer oriented lifestyle

    Each time a credit card is swiped it creates digits on the balance sheets of the banks that are most involved with the financial looting of the world today.

     These digits are then multiplied electronically by the fractional reserve system, which exponentially increases the power of these institutions.

     To participate in this, and by agreeing to pay this fake money back with interest, in order to maintain a certain lifestyle, is a strong indication that you are bound by one of the main tenets of the Matrix – consumerism.

  6. You converse with real people about the ongoing happenings of TV shows

    TV is the most potent tool used for mind control, and the ‘programming’ that is available, while certainly cool, fun, or entertaining is geared to reinforce certain behaviors amongst the masses.

     Dramatizing the ego’s importance, over sexualizing everything, glorifying violence, and teaching submissiveness to phony authority are the main features of modern TV.

     By taking what is happening onscreen and making it a part of your real life, you are doing your job of supporting the matrix’s desire to confuse us about the nature of reality, proving that something doesn’t have to actually happen in order for it to feel real to people.

  7. You don’t have anything to hide from total surveillance

    If it does not bother you that someone, somewhere, working for somebody is watching you, listening to your conversations, and monitoring your movements, then, you are a good slave to the Matrix.

     Invisible surveillance is an insidious form of thought control, and by using the logic of, ‘I have nothing to hide, therefore, it will do me no harm to be surveilled,’ then you are mindlessly admitting that you have an earthly master and are not of sovereign mind and body.

  8. You think the world would be safer if only governments had guns

    This is a violent world, and criminals engage in criminality against honest people at every level of society, including from within the government.

     Sure, in a perfect world, weapons wouldn’t be necessary for anyone but, sadly, our world is anything but perfect, and firearms are indeed a very effective form of protection against common criminals and abusive governments alike.

     The willingness to forego your right to self-defense is a sign that you’ve relegated personal responsibility to someone else. Having the masses abdicate personal responsibility is one of the most important aspects of controlling them.

     Welcome to the Matrix.

  9. You knowingly drink fluoridated water

    Of all the health debates taking place today, the topic of fluoridated water is the easiest to understand, for it is a toxic by-product of an industrial process… poison.

     Water is supposedly fluoridated to aid in dental health, which is debatable in itself, but if this were so, then the involuntary fluoridation of public water is a medication without your consent… a form of slavery. Knowing this and continuing to drink fluoridated water is a sign that you’re content with your slavery to the Matrix.

     Here are scientifically validated reasons to end public water fluoridation.

  10. You knowingly consume toxic poisons like MSG and Aspartame

    These two chemicals are widely known to be toxic to the human body.

     Knowing this and continuing to poison yourself with tasty, but chemical-laden processed foods is a sign that the Matrix has programmed you to place less value on your health and future than on your immediate gratification.

  11. You depend on the pharmaceutical industrial complex for the management of your own mental health

    The use of psychotropic medicines is rising rapidly in our society because people have been convinced that mental and emotional states can be classified as diseases, while the truth about natural mental health has been obfuscated by corporate media and a for-profit medical establishment.

     If you’re taking psychotropic medications, then you are under one of the most potent forms of mind control available. Part of this control is to convince you that you have no authority over your own mind.

     This is perhaps the matrix’s most terrible lie, and by willingly taking these psychotropic medications you are conforming to the worst kind of slavery, and inhibiting your natural mental and emotional responses to the life stressors that are signaling to you that you need to change your behavior and habits.

  12. You haven’t yet stopped watching your local and national news programming

    The mainstream news media is a tool of control and manipulation, and by continuing to support their ideas and world views by giving them your attention you are volunteering to be a slave to this not-so-subtle form of mental programming.

     Even the local news is scripted at the national level by agents of the handful of corporations tasked with shaping our opinions of events.

  13. You’re more concerned with televised sports or other mindless distractions than you are with the quality of your natural environment

    The Deepwater HorizonAlberta Tar Sands, the rise of Fracking, the sacrifice of the Amazon, and Fukushima are all life-changing events that will severely impact our future on planet earth.

     To be unconcerned with all of this while tuning into a never-ending stream of sports trivia and distraction-based living is a sign that your sense of self-preservation has been stolen and replaced with an impulsive tendency for triviality and escapism.

  14. You’re skeptical of any area of life that hasn’t been ‘proven’ or validated by modern science

    The very essence of science is the inquiry into the unknown, implying that until science can grasp something, it is unexplainable.

     By discrediting or ridiculing experiences that other people have, which yet evade scientific understanding, like near-death experiences, acupuncture, or the life changing effects of Ayahuasca, then you are slavishly reducing your understanding of the world to a narrow range of possibilities.

     The Matrix is made possible by the efforts of volunteer gatekeepers who are unwilling to think outside of the box.

  15. You’ve never questioned the popularized version of ancient history and the origins of our civilization

    There are many unanswered questions about the origins of the human race that point to a different version of human history than what is taught in school.

     Read ‘20 History Questions They Refuse to Answer in School‘ to discover some of the many ways in which our history has been hijacked.

     By never questioning what we’ve been told about our origin we are acquiescing to many of the imposed belief systems and narrow-banded views of human potential that the Matrix promotes.

  16. You haven’t yet realized that you are a spiritual being living a human experience

If you can relate to any of the items on this list, then the Matrix has you, and it is now your duty to engage more deeply in your liberation.

from:    http://howtoexitthematrix.com/2016/07/18/several-signs-that-you-are-a-slave-to-the-matrix/

More on Common Core

Common Core Education: Surveillance and Sexualization of Children

Common Core Student-1Makia Freeman, Contributor
Waking Times

Common core is the set of educational standards for American children funded by Bill Gates, the very same man who is pushing GMOs, vaccines and other New World Order (NWO) Agenda 21-style schemes. In another example of blatant doublespeak, the curricula are named “Common Core State Standards”, despite the fact they were forced onto the states with bribes, came top-down from the US Federal Government and were written by the international elite. Common Core first came onto the scene in 2009, after Obama took office, using money from the $350 million stimulus package. Common Core is another manifestation of a long-held dream of the NWO manipulators to replace the family with the State, a plan laid out in novels such as Brave New World by Aldous Huxley, which included reference to State hatcheries (i.e. State control of reproduction).

common-core-logo-hypnosis

Common Core: Of the Manipulators, By the Manipulators, For the Masses

Did you know Common Core is actually copyrighted? It’s a private set of standards. It’s of the manipulators (since it’s owned by them), written by the manipulators, but it’s for the masses – all the “common” people not wealthy enough to go rich schools where the future leaders of the New World Order will learn an entirely different curriculum … one which probably trains them to become creative thinkers rather than the “obedient workers” John D. Rockefeller wanted common Americans to become. Even the Common Core logo resembles something hypnotic and discordant.

Educator Dr. Duke Pesta has been working tirelessly to expose Common Core for what it really is ever since it was launched 7 years ago. In his presentation, Duke reveals how the Government is already pushing for “public boarding schools” to be open from 8am to 8pm, 365 days per year! He quotes 2 men who were at the forefront of American education, Horace Mann and John Dewey. The latter was an open communist:

“We are who engaged in the sacred cause of education are entitled to look upon all parents as having given hostages to our cause.” Horace Mann

“The children who know how to think for themselves spoil the harmony of the collective society …” – John Dewey

Is Common Core helping the school to replace the family as a surrogate parent? Is Common Core promoting the idea of collectivism, that the individual is subservient to the group, institution, system and State? It would appear so, but that’s not all it’s doing.

common-core-1-500x462Common Core: Minimally Exceptional

Common Core is now being used in 47 out of 50 US states – in almost all public schools – and even if your children are in private schools or homeschooled, as long as they want to go to university or college, they will have to pass SAT/ACT tests written by the same man (David Coleman) who wrote the main English components! Common Core is not designed for local autonomy; teachers have to strictly follow its guidelines, or risk having students do poorly on the test. Duke plays video clips of 3 key men who were involved in creating Common Core:

“It would be great if our education stuff worked (Common Core), but we’re not going to know for a decade.” – Bill Gates

“Teachers will teach towards the test; there is no force strong enough to prevent teachers from teaching towards the test” – David Coleman, chief architect of Common Core, who never taught in an elementary school and never edited a scholarly journal. He has now joined College Boards writing SAT and ACT tests.

“[Common Core meets a] minimal definition of college readiness” (i.e. not for STEM: Science, Technology, Engineering, Mathematics) – Jason Zimba, architect of Common Core mathematics, admitting “college ready” really meant ready for a non-selective community college

“Using Common Core math standards will put American students 2 years behind their international peers by the end of 8th grade, and further behind by the end of high school.” – Dr. James Milgram, who refused to sign off on the Common Core standards

To make matters worse, the Common Core assessments are meaningless tests, because the grading process is rigged (just like the votes in American elections)! Did you know that the people running Common Core advertised on Craigslist for temporary workers (at $9/hour) to grade papers? Then, these workers were told that they needed to mark papers to fit into a bell curve with standard deviations (a certain amount of 1s, 2s, 3s, 4s, 5s etc.) and “needed to learn to see more papers as a 3”. In others words, they had to fit the results into a predetermined spread and ignore the actual quality of the paper!

Common Core Surveillance

This is all bad enough, but hold on, because now it starts to get really Orwellian. Children are being spied upon more and more under Common Core. Some of the ways are stealthy, such as through devices like iPads, as this article suggests:

“Initially, in order to continue to be eligible for Obama’s “Race to the Top” federal funding, states were obligated to implement a Student Longitudinal Database System (SLDS), used to track students from preschool through college (P20-WIN). Some of us may recall the many reports about measuring 400 data points … could these one to one devices be another carefully disguised method of software-driven mass surveillance of students?”

” … all across America, more and more classrooms will be filled with children innocently using their iPads or other handheld devices. Children may be playing interactive educational games, doing interactive assignments, and writing stories that can be easily shared with the teacher and other students. These seemingly harmless activities are in fact being used to collect personal and private information without the parents’ consent or knowledge. Could that educational game be used to measure your child’s mental state? Could those interactive assignments involve morally ambiguous questions that can be used to create a psychological profile of your child? Could that shared story be used to predict violent behavior?”

This Truth in Media article states that:

“Perhaps even more alarming is the fact that data collection will also include critical appraisals of individuals with whom students have close family relationships. The Common Core program has been heavily scrutinized recently for the fact that its curriculum teaches young children to use emotionally charged language to manipulate others and teaches students how to become community organizers and experts of the U.N.’s agenda 21.”

Some of the Common Core surveillance is data mining, as this article explains:

“In this modern computer era, digital personal data is gold, currently being traded like currency … the CEO of Knewton explains how Education is today’s most data mined industry. He explains “the name of the game is data per user”. From Amazon or Netflix they get 1 data point per user per day. Google and Facebook 10 data points per user per day. In education, Knewton gets 5-10 million actionable data points per student per day! Apparently, every sentence of every passage in digital content has a data tag and they can tell how interested a child is in a certain topic, how difficult it was, etc., etc. Ten million data points a day! This data grab is a gold mine to companies that want to market and design products. For venture capitalists, Education is the new hot commodity.”

The NWO manipulators also have plans to introduce all sorts of devices into the classroom which intrude upon the basic privacy of children, including a “facial expression camera”, “posture analysis seat”, “pressure mouse” and “wireless skin conductance sensor”. See this report entitled Promoting Grit, Tenacity, and Perseverance: Critical Factors for Success in the 21st Century for more details (pg. 62).

Common Core Sexualization of Children

Introducing kids to sex, including sexual education, at too young of an age, can be confusing and detrimental. A core theme of the worldwide conspiracy is the increasing sexualization of children, which is being fueled by the NWO manipulators’ indulgence in widespread pedophilia. The article Colorado School Employing “Anti-Bias” Curriculum Has Parents Asking Questions highlights how a Common Core aligned school is teaching an anti-bias curriculum. Sounds good, but this means more tyrannical and freedom-destroying political correctness, coupled with sex ed to 4 year olds! As an aside, the organization promoting this is “Teaching Tolerance” which is aligned with the Southern Poverty Law Center – the same one which covers up the truth by falsely branding people anti-Semitic etc.

Children are being encouraged to have sex and be sexual at an early age, which may well be developmentally inappropriate and harmful, given that amount of emotional maturity that is necessary to be involved in a sexual relationship. Now it’s going one step further. Some American public schools under Common Core are already giving advanced forms of birth control to children without parental knowledge. According to Duke, under Common Core, schools now have legal capacity to take teenage girls off campus to an abortion clinic to get an abortion – without informing or consulting parents!

Conclusion: Common Core is a Tool of the NWO

The word “common” in common core really means “lowest common denominator”. Essentially, Common Core is a form of socialism, Marxism or communism that brings everyone down to an equal level. George W. Bush let Senator Teddy Kennedy write the “No Child Left Behind” Act, which had too many stupid high-stake tests, too much social ideology and propaganda being injected, too little local teacher control and too much federal intervention. Common Core is all this on steroids: the ESSA Act (Every Student Succeeds Act) enshrines Common Core at the federal level, and retroactively legalizes all the illegal things the Federal Government did to get it through.

The bottom line is this: if you want your child to have your values, don’t throw him or her away to the State. Avoid Common Core all you can! Homeschool or find a private school that doesn’t do Common Core curriculum.

from:    http://www.wakingtimes.com/2016/04/21/common-core-education-surveillance-sexualization-children/

So WHo’s Watching You?

New Billboards Film You, Then Use Your Mobile Phone To Follow You

BillboardsBy Jake Anderson

Recently, Anti-Media covered the revelation that Samsung transmits audio commands recorded by their Smart TVs to a third party company, which raises all sorts of red flags regarding encryption standards and, more importantly, people’s privacy in their own homes.

Last year, Anti-Media posted a list of surprising objects endowed with surveillance or data extraction capabilities — including the Statue of Liberty, mannequins, billboards, and more. The company Immersive Labs, for instance, creates software for digital billboards that allows them to watch your face and then tailor a specific ad based on your facial features.

On Monday, the next generation of corporate surveillance was deployed — a new kind of billboard that utilizes surveillance triangulation the likes of which we’ve never seen.

According to the article entitled “See That Billboard? It May See You,” Clear Channel Outdoor Americas has partnered with a bevy of tech and data companies, including AT&T, to combine billboard surveillance and location-based mobile data in order to study people’s travel patterns and shopping behaviors. The program, called Radar, will hit 11 major markets this coming Monday. Clear Channel plans on expanding Radar to the entire nation within a year.

Billboards equipped with cameras that track consumers is not new, but tracking drivers by aggregating data from both billboards and mobile phones simultaneously is an evolution in data mining.

Information gleaned from these new billboards will include the average age and gender of people who pass by, as well as the time and what stores they subsequently visit. The info collected from the billboards will then be paired with data from the third party companies for a one-two punch that will be very valuable to advertisers.

In essence, there is a tag-team effect: the billboards identify you, then the third party companies use your mobile phone to follow and track your consumer behavior.

For instance, PlaceIQ will use mobile apps to determine location data and consumer behavior. In an article for Adweek entitled “The Future of Auto Marketing Could Be a Little Creepy – Get ready for brands to follow you everywhere,” PlaceIQ CEO and co-founder Duncan McCall discussed another campaign “designed to target in-market car buyers, one that tracks people from the moment they begin contemplating making a purchase to the moment they leave their house and head to the dealer.”

Another third party company involved in Clear Channel Outdoor’s Radar billboard campaign, Placed, will use the tracked movements of the consumer to craft customized in-store ads. Placed uses mobile phones to verify shopper movements; they sell this data to stores, online retailers, and app developers.

Between the billboards and third party companies, it sounds as if the Radar program seeks to create a consumer environment where citizens can be publicly tracked — whether in their cars or after they have parked and are shopping (or simply taking a walk) — synchronously and in perpetuity.

Both PlaceIQ and Placed claim all the data they collect is anonymized.

Clear Channel Outdoor tested the new Radar system in Orlando, Florida recently, using a billboard advertisement for Toms Shoes.

Unsurprisingly, privacy advocates condemn the new campaign as yet another violation of consumer trust.

“People have no idea that they’re being tracked and targeted,” says Jeffrey Chester, executive director of the Center for Digital Democracy. “It is incredibly creepy, and it’s the most recent intrusion into our privacy.”

According to Amie Stepanovich of the Electronic Privacy Information Center, corporate surveillance is especially troubling because in many cases, it paves the way for government surveillance. As the top secret military agency DARPA advances complex new war weapons, many times it relies on private contractors to move the needle. The same goes for surveillance: in creating their consumer profiles, corporations essentially run a kind of societal beta test of surveillance programs from which the government can pick and choose.

Stepanovich describes it like this:

None of the information in question would be sharable if Internet and telecommunications companies encrypted it to protect privacy. In other words, it’s not a given that corporations must collect vast amounts of information from and about us. But failing to do so wouldn’t be good for business.

Here she is referring to metadata gathered online, but the same applies to analytics collected on the street. We’re entering an era in which surveillance is essentially ubiquitous. Concurrently, privacy advocates say new guidelines and ethical contracts need to be considered.

Already, judicial actions have made an impact. Last year the Federal Trade Commission settled charges against retail-tracking company Nomi Technologies, which was found to have misled consumers regarding their practice of gathering signals from shoppers’ mobile phones.

In the meantime, besides moving to Antarctica and relinquishing all technology, what can consumers and citizens do to protect themselves from intrusive data mining and surveillance?

The Electronic Frontier Foundation offers a comprehensive suite of free encryption tools and tutorials for protecting your online data, including information stored on mobile phones.

There are also techniques available for camouflaging yourself from surveillance cameras. Using makeup patterns called ‘computer vision dazzle’ (or CV dazzle), it is possible to fool the facial recognition algorithms of many surveillance systems.

from:    http://www.activistpost.com/2016/03/new-billboards-film-you-then-use-your-mobile-phone-to-follow-you.html

Turning Your Home into a Faraday Cage

Can This Material Protect Your Home From The NSA, Electromagnetic Radiation and EMP Attacks?

nsa-ops-centerBy Kevin Samson

There is nothing quite like the image of a tinfoil hat to get people chuckling over the paranoia of “the conspiracy theorist” who takes precautions against brain scanning and electronic mind control. But if one topic has gone from conspiracy theory to conspiracy fact, it is government surveillance. Even more than the “revelations” of Edward Snowden, it was the way the system came out against him, as well as the further rollout of surveillance-friendly legislation that has convinced many average people that indeed sometimes they are actually watching you.

Various solutions have been offered about how to protect your privacy while connected to the Internet or when using your mobile phone, but one new product holds the potential to protect you at the source: your home. It’s not quite tinfoil but it does claim to offer a physical shield against surveillance and attack.

Conductive Composites is a company based in Utah (home of the NSA’s mega data center interestingly), which makes small cases and enclosures for shielding electronics. The company claims that their lightweight material made by layering nickel on carbon could be scaled up and essentially turn your entire home into a Faraday cage capable of blocking efforts at snooping, while also offering protection from electromagnetic radiation and EMP attacks.

As Defense One explains, Faraday cages are in fact routinely used by the military and governments to secure their own sensitive locations:

Today, Faraday cages are all over the place. In 2013, as the College of Cardinals convened to elect a new Pope, the Vatican’s Sistine Chapel was converted into a Faraday cage so that news of the election couldn’t leak out, no matter how hard the paparazzi tried, and  how eager the cardinals were to tweet the proceedings. The military also uses Faraday cages for secure communications: Sensitive Compartmented Information Facilities or SCIFs are Faraday cages. You’ll need to be in one to access the Joint Worldwide Intelligence Communication System, or JWICS, the Defense Department’s top-secret internet.

The ongoing threat from EMP attacks, whether man-made or natural, is an additional concern that has become more grave as our society is now fundamentally dependent on computer systems.

Lightning strikes and other large electromagnetic pulse events—such as, say, a high-altitude nuclear explosion or geomagnetic storms caused by solar winds on a larger scale—can destroy electrical and electronic systems, inducing currents in conductors within them and overloading them. Just as generators create electricity by passing a wire through a magnetic field, a strong electromagnetic wave can create current within anything conductive it passes through. (Source)

This little device delivers turnkey Internet privacy and security (Ad)

A lightweight shielding material that is both flexible and scalable could be a key solution for those who wish to have the same level of security as our government and military.

A third area, which still remains somewhat controversial to the average person, is the health hazard of WiFi and other forms of electromagnetic radiation. Here, too, a flexible material that contains the properties of a Faraday cage could offer transportable protection for those who choose to shield themselves from pervasive signals.

The Conductive Composites website does show commercial-level production, but it remains to be seen how easy it will be for individuals to obtain these products – and at what cost. Interestingly, the company’s product page also lists paints, sealants, adhesives, concrete and wall paper, which suggests other protective applications.

This technology appears to be a positive step toward empowering those who have educated themselves about potential threats. Perhaps the largest hurdle, however, is to keep this type of technology legal. We have seen governments assert that the mere act of encryption should be made illegal; protecting yourself from drone surveillance has led to arrests; and sidestepping economic surveillance through technology such as Bitcoin is being viewed as potentially funding terrorism.

However, we also have learned that once technology is invented, those who demand freedom will always find a way to use it for their benefit.

H/T: ZenGardner.com

from:    http://www.activistpost.com/2015/10/material-protect-your-home-from-the-nsa-electromagnetic-radiation-and-emp-attacks.html

You ARE Being Watched!

Do You Know Who is Watching Your Private Life?

Waking Times

Infographic – Lack of privacy on the Internet and in the real world continues to grow. Many people are becoming aware that what they share on their social networks can find its way to the furthest reaches of the Web. But did you realize that your private life at home could also become public, without your knowledge or consent? Here’s how technologies such as Google Street View and government monitoring initiatives are starting to intrude on people’s personal lives.

whoswatchingyou

from:    http://www.wakingtimes.com/2015/09/07/do-you-know-who-is-watching-your-private-life/

 

Facebook Collecting Your Data

facebook

Facebook now harvesting the list of all the other websites you visit: total online surveillance is here

(NaturalNews) If you’re one of the millions of people who have a love/hate relationship with Facebook, there are now even more reasons for hating the immensely successful social media giant.

You probably know that Facebook collects and stores your personal data and preferences to form a profile that it uses to generate advertising content targeted directly at you. But did you know that Facebook also looks at all the other websites you visit and stores that data, too? Facebook also collects your online search data along with some of the details you give to retailers when you purchase something.

Facebook and the data brokers

Zuckerberg and his Facebook shareholders make huge amounts of money by partnering with what are known as “data brokers.”

Bruce Schneier, a data security expert, defines data brokers as entities which:

“collect demographic information: names, addresses, telephone numbers, e-mail addresses, gender, age, marital status, presence and ages of children in household, education level, profession, income level, political affiliation, cars driven, and information about homes and other property. They collect lists of things you’ve purchased, when you’ve purchased them, and how you paid for them. They keep track of deaths, divorces, and diseases in your family. They collect everything about what you do on the Internet.”

This information is used to target advertising to individuals, but many see it as an illegal invasion of privacy. One of the charges against Facebook is that it deliberately tries to hide the extent of its data mining. Very few people actually read the terms and conditions when they sign up to Facebook, and even those who do typically don’t have a real understanding of what the privacy policies actually mean.

A recent article posted by Phys.org explores the issue and observes:

Users of social media are generally unaware of how much of their fragmented personal data is collated from across social media sites–and even taken from the content of their free, web-hosted emails (e.g. Gmail)–and how this can be used to build detailed personal profiles.

“Opting out” is difficult and basically futile

Facebook claims that its users can opt out of its data-mining practices, but it’s difficult to do so, and, according to data security experts, it doesn’t make much difference if you do.

As a piece on the Sherbit Blog points out:

A ‘note’ on the ‘Facebook and Privacy’ page attempts to comfort users by insisting that “the process is designed so that no personal information is exchanged between Facebook and marketers (or the third parties those marketers work with).” But the truth of the situation is that the ‘data brokers’ already own your personal information–and their collaboration with the social network may allow them to assemble even more detailed profiles of your health and habits in the future.

The bottom line is that Facebook and the data brokers collect and store more personal information than the NSA does, and they make piles of money doing it.

A recent analysis conducted by the Belgian Privacy Commission concluded that these practices are in violation of European law, but it remains to be seen whether or not anyone will be able to curtail Facebook’s snooping practices.

Facebook claims that its data-mining activities make for a better user experience, but I doubt that very many people actually appreciate their spying. “Big Data” is increasingly expanding its reach into our personal lives, and it appears that the age of total online surveillance has arrived.

What many of once thought of as a fun, essentially harmless and amazingly useful social network has turned into a intrusive tracking monster of Orwellian proportions. The NSA has nothing on Mark Zuckerberg and Co., and unless there is a concerted global effort to reverse the trend, we can expect the ever-increasing monitoring of every detail of our lives.

Sources:

https://www.sherbit.io

http://www.law.kuleuven.be

http://phys.org/news

http://www.dailymail.co.uk

http://www.valuewalk.com

The End of NSA Spying? Really?

NSA

Has everybody gone stupid? The NSA has not stopped spying on Americans… and it never will, either

(NaturalNews) There are days I just shake my head in bewilderment at the astonishing, almost incomprehensible gullibility of mainstream Americans and the media that claims to be practicing intelligent journalism. When I see the Associated Press report things like, “The NSA had stopped gathering the records from phone companies hours before the deadline,” I’m almost paralyzed with disbelief.

That’s their story, though. And they apparently believe it. See Either way, no more NSA collection of US phone records. Read the story yourself if you need a really good laugh at an example of extreme gullibility in the media.

What’s so funny about that story? For starters, given that the NSA is a super secret organization with ZERO oversight and a history of repeatedly lying about what it’s really doing, how on Earth are we supposed to believe the NSA when it says it suddenly stopped spying on Americans’ phone calls because it “lost the authority” it never recognized in the first place?

Is the mainstream media really just taking the NSA’s word that it has stopped spying on everybody because it no longer has the “legal authority” to do so? There isn’t a single shred of evidence that the NSA has stopped any spying activities at all. Even more, the Associated Press has no way to verify whether anything has been halted. Trusting the NSA’s statement claiming it has halted its spying activities is about as gullible as trusting Iran’s statements on how it has halted its nuclear fuel enrichment program. Geesh… how hard is it for people to understand that governments lie by default?

Grow up, America. The NSA was spying on us all long before it ever had any legal authority to do so, and when the Director of National Intelligence James Clapper was asked under oath, at a United States Senate Select Committee on Intelligence, about whether the NSA was spying on Americans, he outright lied over and over again, claiming no such spying was taking place.

So now, suddenly, we’re supposed to believe the NSA isn’t spying on us all merely because it says so? Should we pull out our pinkies and do a pinky swear on it, too? Maybe we can be BFF as well?

The NSA recognizes no legal authority, period

It’s just incredible that anyone would think the NSA’s activities are bound by anything even resembling “legal authority.” The NSA does whatever the hell it wants. And why does it do that? Because it can. Because they’ve already gathered up all the records of U.S. Supreme Court judges and they have enough emails, phone calls, web surfing history and search engine history to blackmail practically everyone in Washington D.C. (and everywhere else, for that matter).

“However Congress resolves its impasse over government surveillance, this much is clear: The National Security Agency will ultimately be out of the business of collecting and storing Americans’ calling records,” says the Associated Press. Yeah, right. In your crack-induced fairytale, maybe. But in the real world of hardball politics and blackmail, any organization that has the power to keep collecting all these records will absolutely keep doing so unless and until it is physically forced to stop (i.e. shut off the power, confiscate the servers and close the buildings).

And that’s never gonna happen, folks. Not by a long shot. The spy apparatus is far too valuable to ever be shut down. At best, it will pretend to shut down long enough to shut up the public. But behind the scenes, every single spy server dedicated to this task will continue as normal, without interruption.

Sorry to have to say this so bluntly, but anyone who believes the government is going to voluntarily stop spying on the American people is a complete fool. The way these games are really played is far beyond any recognition of “legal authority.” For example, the NSA can simply take its entire spy operation, transfer the assets to an NSA shell company in the Cayman Islands (without actually moving the servers anywhere), rename it “NSB” and continue operations as normal… all while testifying before Congress that, “The NSA has halted all domestic surveillance operations.” Yep, it has! But NSB has resumed those operations, ha ha.

And if NSB is ever unveiled, they can move it all to “NSC” and so on. The spying never stops, folks. The only thing that changes is the name of the spy organizations conducting it. Does any intelligent person honestly think they’re going to voluntarily shut off all those billions of dollars in servers and storage facilities they built for this purpose? Ain’t gonna happen.

And the way you know this to be true is to ask yourself this question: If you were the director of the world’s most amazing intelligence gathering spy tool that operated utterly without any boundaries or limitations whatsoever, would YOU shut it down? Of course not. No one would. You’d use it precisely because it’s powerful. It’s the Ring of Power from the Lord of the Rings. Almost no human being has the moral integrity to voluntarily part with it. It’s so PRECIOUSSSSS…

True American heroes: Edward Snowden and Rand Paul

Despite the ongoing spy activities of the NSA, it’s worth mentioning something hugely important in all this.

There is only ONE Presidential candidate who has the courage to stand up against the surveillance state and demand an end to these illegal violations of Americans’ privacy. His name is Rand Paul.

As far as I can tell, Rand Paul is the only candidate who has a spine. While Jeb Bush and Hillary Clinton are both total spy state insiders, Rand Paul is risking not just his political career but even his own neck to take a stand against the surveillance state. That’s historic. It’s truly remarkable, and it may uniquely qualify Rand Paul to be the kind of serious reformer who can take on Washington and knock some heads around.

Edward Snowden is also, of course, the key hero in all this, and I strongly recommend you watch the documentary called Citizen Four to gain a better understanding of Snowden’s contributions to privacy and freedom in America. Edward Snowden has quite literally risked his life — and forfeited his own personal freedom — to blow the whistle on the illegal spying being conducted by the U.S. government on the citizens of America.

What should have happened immediately after Snowden’s shocking revelations was a nationwide movement of pissed off people marching in the streets against Orwellian government. But what really happened instead was a nationwide movement of apathetic sheeple turning on Oprah and munching down some Twinkies before injecting themselves with insulin. In other words, nobody gave a damn because they were too busy cowering in blind obedience and practicing cowardice and conformity.

And so they all are getting the government they deserve: an Orwellian spy state that enslaves them all. This is what they are begging for, after all, when they are so gullible that they’ll believe anything the government tells them. The same people who believe the NSA magically stopped spying on them must also believe the FDA protects the people, the DEA wants to eliminate the drug trade, and the CDC is trying to eradicate infectious disease.

Wake up and smell reality, folks. None of these entities give a damn about the People. They all exist for only one purpose: to expand and assert their own power by any means necessary. That’s the fundamental nature of organizational existence, and it’s precisely why Big Government keeps getting bigger, badder and more dangerous unless its power is somehow limited or halted by the People.

Hence the origins of the Bill of Rights in the first place, over two centuries ago.

We’ve been down this road before, of course. This isn’t the first rise of police state tyranny in the history of our world. And it certainly won’t be the last…

To De-Google or Not?

Google

How to avoid Google surveillance and protect your personal data

(NaturalNews) It all seemed rather innocent in the beginning. It certainly seemed convenient, and still is – maybe more so than ever, to be truthful. But if you haven’t noticed, slowly and gradually, during the past 17 years since its inception, Google has evolved from being a company which once merely provided Internet users with a free search engine and email to becoming an all-encompassing entity that monitors nearly everything you do.

And not only does Google snoop on you, it takes the personal information it has collected and sells it to corporations. Google also provides that information to intelligence agencies, such as the NSA.

A recent article penned by Derek Scally of The Irish Times explores the extent of Google’s tentacles into our private lives and offers some very useful advice on how to “de-Google” your life.

And why should you de-Google your life if you have “nothing to hide”?

From Scally’s article, which is titled “De-Google your life: it’s worth the hassle if you value your privacy”:

“For privacy campaigner Glenn Greenwald, the man who revealed Snowden’s mass surveillance claims against the National Security Agency, the most common response he hears on the road is what he calls the ‘I have nothing to hide’ argument. To this he has a simple answer.

‘Whenever I hear someone say “I have nothing to hide,” ‘ said Mr Greenwald in Berlin last year, ‘I always ask that person for their email password so I can read their messages. No one has ever taken me up on the offer.’ “

How to de-Google your life

Look for storage alternatives – Scally recommends not putting “all your digital eggs” in one basket. For example, he urges people to explore alternatives for storing emails, photos and cloud content. European-based services are preferable due to EU laws which protect privacy. German-based mailbox.org is one example of an alternative mail service that does not sell or give your data to corporate interests.

Change the way you search – Whenever you can, use an alternative search engine that doesn’t track your searches, such as DuckDuckGo.com or GoodGopher.com (GoodGopher is a new search engine described as “the world’s first privacy-protecting search engine that bans corporate propaganda and government disinfo”).

Block cookies – We’re told that cookies “improve the user experience,” but they also track everything you do online. Install a tracking blocker, such as Ghostery or DoNotTrackMe, into your browser. You can also download the privacyfix.com service from AVG, which helps you click the right privacy settings on your computer and the Internet services you currently use.

Find an alternative to Gmail – Scally admits that it’s “difficult” to give up Gmail and its 15GB of “free” storage, but he points out that even though you theoretically retain intellectual property rights to the content stored on Google, you also give the company a: “worldwide license to use, host, store, reproduce, modify . . . communicate, publish, publicly perform, publicly display and distribute such content.” Better to use a service such as the above-mentioned mailbox.org or Posteo. Another alternative is to encrypt your emails using PGP.

Stop using Google and Apple cloud services – Keeping your calendars and contacts synced on multiple devices without using the Google or Apple cloud services can also be difficult because, as Scally notes: The “big players deliberately tinker with file standards for their calendar and address-book offerings to make migration possible and keep you inside their golden cage.” This “devious and effective practice” is perhaps not easy to sidestep, but it’s probably worth the hassle. And as Scally says, “if you clear this hurdle, you’re home free.”

Smartphone alternatives – It’s possible to wipe your Android phone and install CyanogenMod, which uses the same OS, only without Google’s presence. However, installing it requires some technical skills. Another alternative is to invest in a Jolla smartphone. Jolla is a Finnish-made smartphone that uses an OS with “no corporate tentacles.” A team of Nokia designers left the company to introduce this product, which aside from offering privacy also has some very innovative features.

‘Stingray’ Spy Tech

NY Cops Used ‘Stingray’ Spy Tool 46 Times Without Warrant

The police department in Erie County, New York fought hard to prevent the New York Civil Liberties Union from obtaining records about its use of a controversial surveillance tool known as a stingray.

The reason why may be because of what the records show: that cops in that county, which includes the city of Buffalo, used the devices 47 times since 2010 but only once sought and obtained a court order to do so. That revelation contradicts what the county sheriff said last year when he asserted that the department only used the devices under “judicial review.”

In the single case in which police sought permission from a court, they asked for a court order rather than a warrant, which carries a higher burden of proof. And in their request, they mischaracterized the true nature of the tool.

“These records confirm some of the very worst fears about local law enforcement’s use of this expensive and intrusive surveillance equipment.”

The records, which the NYCLU published in a blog post today, also show that the county sheriff’s office signed a stringent gag order with the FBI to maintain secrecy about their stingray records. The department was told to withhold information about the devices in any documents filed with courts, such as affidavits and other documents describing how they obtained evidence in criminal cases. The department was even told that the FBI maintained the right to intervene in county prosecutions to request criminal cases be dismissed if there was a chance that a case might result in the disclosure of information about law enforcement’s use of stingrays.

“Stingrays are an advanced surveillance technology that can sweep up very private information, including information on innocent people,” NYCLU Western Region Director John Curr III said in a statement. “If the FBI can command the Sheriff’s Office to dismiss criminal cases to protect its secret stingrays, it is not clear how the $350,000 we are spending on stingray equipment is keeping the people of Buffalo safer.”

The revelations continue a trend in several states across the U.S. wherein law enforcement agencies have gone to great lengths to prevent the public from learning about their use of stingrays. The surveillance tool simulates a legitimate cell phone tower to trick mobile phones and other devices on a cellular network into connecting to the devices and revealing their location. Stingrays emit a signal that is stronger than the signal of other cell towers in the vicinity in order to force mobile phones and other devices to establish a connection with them and reveal their unique ID. Stingrays can then determine the direction from which the phone connected— a data point that can then be used to track the movement of the phone as it continuously connects to the fake tower.

Many police departments have signed non-disclosure agreements with the Harris Corporation, one of the leading makers of the devices, to prevent them from releasing records about the systems or discussing them. In Florida, the U.S. Marshals service went so far as to seize records about a local police department’s use of stingrays in order to prevent the American Civil Liberties Union from obtaining them. And many law enforcement agencies have deceived judges about their use of the devices in order to prevent defendants and the public from learning about how they’re being used.

Erie County similarly fought hard to prevent the NYCLU from obtaining these records but was ordered to turn them over by a court. The documents show that the sheriff’s office used stingrays at least 47 times between May 1, 2010 and October 3, 2014. The one time the department sought judicial approval was in October 2014, contrary to what Erie County Sheriff Tim Howard said in May, 2014: that the devices were used under “judicial review” in all criminal matters, implying that investigators always seek court approval before using them.

Not only this, but the records show that when the department did seek a court order, they identified the spy tool they planned to use as a pen register device, not a stingray or cell site simulator. The use of the term “pen register device” is controversial. Law enforcement agencies maintain that stingrays operate like pen registers and are not invasive, but this doesn’t paint the picture. Pen registers record the numbers dialed from a specific phone number, but stingrays are used primarily to track the location and movement of a device and can be much more invasive than pen registers. By describing the tool as a pen register device to the judge, the law enforcement agency was withholding information about the full capability of the device.

In fact, the public has yet to learn exactly how much these surveillance tools can really do, due to the secrecy around them. Recently, a federal agent admitted to a court that stingrays have the ability to disrupt cellular communications for any device in its vicinity, not just the ones targeted by law enforcement. And there are also stingray devices that have the ability to collect the content of phone calls, though U.S. law enforcement agencies have often insisted that the ones they use have this capability disabled.

Although there’s still much more the public should know about how and when law enforcement uses this invasive spying tool, it’s clear departments will continue to do everything in their power to keep the public, and judges, in the dark.

from:    http://www.wired.com/2015/04/ny-cops-used-stingray-spy-tool-46-times-without-warrant/

NSA Building Spy Center in Utah

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

Photo: Name Withheld; Digital Manipulation: Jesse Lenz

The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s the heart of Mormon country, where religious pioneers first arrived more than 160 years ago. They came to escape the rest of the world, to understand the mysterious words sent down from their god as revealed on buried golden plates, and to practice what has become known as “the principle,” marriage to multiple wives.

Today Bluffdale is home to one of the nation’s largest sects of polygamists, the Apostolic United Brethren, with upwards of 9,000 members. The brethren’s complex includes a chapel, a school, a sports field, and an archive. Membership has doubled since 1978—and the number of plural marriages has tripled—so the sect has recently been looking for ways to purchase more land and expand throughout the town.

But new pioneers have quietly begun moving into the area, secretive outsiders who say little and keep to themselves. Like the pious polygamists, they are focused on deciphering cryptic messages that only they have the power to understand. Just off Beef Hollow Road, less than a mile from brethren headquarters, thousands of hard-hatted construction workers in sweat-soaked T-shirts are laying the groundwork for the newcomers’ own temple and archive, a massive complex so large that it necessitated expanding the town’s boundaries. Once built, it will be more than five times the size of the US Capitol.

Rather than Bibles, prophets, and worshippers, this temple will be filled with servers, computer intelligence experts, and armed guards. And instead of listening for words flowing down from heaven, these newcomers will be secretly capturing, storing, and analyzing vast quantities of words and images hurtling through the world’s telecommunications networks. In the little town of Bluffdale, Big Love and Big Brother have become uneasy neighbors.

The NSA has become the largest, most covert, and potentially most intrusive intelligence agency ever.

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”

For the NSA, overflowing with tens of billions of dollars in post-9/11 budget awards, the cryptanalysis breakthrough came at a time of explosive growth, in size as well as in power. Established as an arm of the Department of Defense following Pearl Harbor, with the primary purpose of preventing another surprise assault, the NSA suffered a series of humiliations in the post-Cold War years. Caught offguard by an escalating series of terrorist attacks—the first World Trade Center bombing, the blowing up of US embassies in East Africa, the attack on the USS Cole in Yemen, and finally the devastation of 9/11—some began questioning the agency’s very reason for being. In response, the NSA has quietly been reborn. And while there is little indication that its actual effectiveness has improved—after all, despite numerous pieces of evidence and intelligence-gathering opportunities, it missed the near-disastrous attempted attacks by the underwear bomber on a flight to Detroit in 2009 and by the car bomber in Times Square in 2010—there is no doubt that it has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created.

In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever.

UTAH DATA CENTER

When construction is completed in 2013, the heavily fortified $2 billion facility in Bluffdale will encompass 1 million square feet.

Utah Data Center

1 Visitor control center

A $9.7 million facility for ensuring that only cleared personnel gain access.

2 Administration

Designated space for technical support and administrative personnel.

3 Data halls

Four 25,000-square-foot facilities house rows and rows of servers.

4 Backup generators and fuel tanks

Can power the center for at least three days.

5 Water storage and pumping

Able to pump 1.7 million gallons of liquid per day.

6 Chiller plant

About 60,000 tons of cooling equipment to keep servers from overheating.

7 Power substation

An electrical substation to meet the center’s estimated 65-megawatt demand.

8 Security

Video surveillance, intrusion detection, and other protection will cost more than $10 million.

Source: U.S. Army Corps of Engineers Conceptual Site plan

A swath of freezing fog blanketed Salt Lake City on the morning of January 6, 2011, mixing with a weeklong coating of heavy gray smog. Red air alerts, warning people to stay indoors unless absolutely necessary, had become almost daily occurrences, and the temperature was in the bone-chilling twenties. “What I smell and taste is like coal smoke,” complained one local blogger that day. At the city’s international airport, many inbound flights were delayed or diverted while outbound regional jets were grounded. But among those making it through the icy mist was a figure whose gray suit and tie made him almost disappear into the background. He was tall and thin, with the physique of an aging basketball player and dark caterpillar eyebrows beneath a shock of matching hair. Accompanied by a retinue of bodyguards, the man was NSA deputy director Chris Inglis, the agency’s highest-ranking civilian and the person who ran its worldwide day-to-day operations.

A short time later, Inglis arrived in Bluffdale at the site of the future data center, a flat, unpaved runway on a little-used part of Camp Williams, a National Guard training site. There, in a white tent set up for the occasion, Inglis joined Harvey Davis, the agency’s associate director for installations and logistics, and Utah senator Orrin Hatch, along with a few generals and politicians in a surreal ceremony. Standing in an odd wooden sandbox and holding gold-painted shovels, they made awkward jabs at the sand and thus officially broke ground on what the local media had simply dubbed “the spy center.” Hoping for some details on what was about to be built, reporters turned to one of the invited guests, Lane Beattie of the Salt Lake Chamber of Commerce. Did he have any idea of the purpose behind the new facility in his backyard? “Absolutely not,” he said with a self-conscious half laugh. “Nor do I want them spying on me.”

For his part, Inglis simply engaged in a bit of double-talk, emphasizing the least threatening aspect of the center: “It’s a state-of-the-art facility designed to support the intelligence community in its mission to, in turn, enable and protect the nation’s cybersecurity.” While cybersecurity will certainly be among the areas focused on in Bluffdale, what is collected, how it’s collected, and what is done with the material are far more important issues. Battling hackers makes for a nice cover—it’s easy to explain, and who could be against it? Then the reporters turned to Hatch, who proudly described the center as “a great tribute to Utah,” then added, “I can’t tell you a lot about what they’re going to be doing, because it’s highly classified.”

And then there was this anomaly: Although this was supposedly the official ground-breaking for the nation’s largest and most expensive cybersecurity project, no one from the Department of Homeland Security, the agency responsible for protecting civilian networks from cyberattack, spoke from the lectern. In fact, the official who’d originally introduced the data center, at a press conference in Salt Lake City in October 2009, had nothing to do with cybersecurity. It was Glenn A. Gaffney, deputy director of national intelligence for collection, a man who had spent almost his entire career at the CIA. As head of collection for the intelligence community, he managed the country’s human and electronic spies.

Within days, the tent and sandbox and gold shovels would be gone and Inglis and the generals would be replaced by some 10,000 construction workers. “We’ve been asked not to talk about the project,” Rob Moore, president of Big-D Construction, one of the three major contractors working on the project, told a local reporter. The plans for the center show an extensive security system: an elaborate $10 million antiterrorism protection program, including a fence designed to stop a 15,000-pound vehicle traveling 50 miles per hour, closed-circuit cameras, a biometric identification system, a vehicle inspection facility, and a visitor-control center.

Inside, the facility will consist of four 25,000-square-foot halls filled with servers, complete with raised floor space for cables and storage. In addition, there will be more than 900,000 square feet for technical support and administration. The entire site will be self-sustaining, with fuel tanks large enough to power the backup generators for three days in an emergency, water storage with the capability of pumping 1.7 million gallons of liquid per day, as well as a sewage system and massive air-conditioning system to keep all those servers cool. Electricity will come from the center’s own substation built by Rocky Mountain Power to satisfy the 65-megawatt power demand. Such a mammoth amount of energy comes with a mammoth price tag—about $40 million a year, according to one estimate.

Given the facility’s scale and the fact that a terabyte of data can now be stored on a flash drive the size of a man’s pinky, the potential amount of information that could be housed in Bluffdale is truly staggering. But so is the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies. As a result of this “expanding array of theater airborne and other sensor networks,” as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.)

It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.) In terms of scale, Eric Schmidt, Google’s former CEO, once estimated that the total of all human knowledge created from the dawn of man to 2003 totaled 5 exabytes. And the data flow shows no sign of slowing. In 2011 more than 2 billion of the world’s 6.9 billion people were connected to the Internet. By 2015, market research firm IDC estimates, there will be 2.7 billion users. Thus, the NSA’s need for a 1-million-square-foot data storehouse. Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text.

The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”

The NSA’S SPY NETWORK

Once it’s operational, the Utah Data Center will become, in effect, the NSA’s cloud. The center will be fed data collected by the agency’s eavesdropping satellites, overseas listening posts, and secret monitoring rooms in telecom facilities throughout the US. All that data will then be accessible to the NSA’s code breakers, data-miners, China analysts, counterterrorism specialists, and others working at its Fort Meade headquarters and around the world. Here’s how the data center appears to fit into the NSA’s global puzzle.—J.B.

SPY NETWORK

1 Geostationary satellites

Four satellites positioned around the globe monitor frequencies carrying everything from walkie-talkies and cell phones in Libya to radar systems in North Korea. Onboard software acts as the first filter in the collection process, targeting only key regions, countries, cities, and phone numbers or email.

2 Aerospace Data Facility, Buckley Air Force Base, Colorado

Intelligence collected from the geostationary satellites, as well as signals from other spacecraft and overseas listening posts, is relayed to this facility outside Denver. About 850 NSA employees track the satellites, transmit target information, and download the intelligence haul.

3 NSA Georgia, Fort Gordon, Augusta, Georgia

Focuses on intercepts from Europe, the Middle East, and North Africa. Codenamed Sweet Tea, the facility has been massively expanded and now consists of a 604,000-square-foot operations building for up to 4,000 intercept operators, analysts, and other specialists.

4 NSA Texas, Lackland Air Force Base, San Antonio

Focuses on intercepts from Latin America and, since 9/11, the Middle East and Europe. Some 2,000 workers staff the operation. The NSA recently completed a $100 million renovation on a mega-data center here—a backup storage facility for the Utah Data Center.

5 NSA Hawaii, Oahu

Focuses on intercepts from Asia. Built to house an aircraft assembly plant during World War II, the 250,000-square-foot bunker is nicknamed the Hole. Like the other NSA operations centers, it has since been expanded: Its 2,700 employees now do their work aboveground from a new 234,000-square-foot facility.

6 Domestic listening posts

The NSA has long been free to eavesdrop on international satellite communications. But after 9/11, it installed taps in US telecom “switches,” gaining access to domestic traffic. An ex-NSA official says there are 10 to 20 such installations.

7 Overseas listening posts

According to a knowledgeable intelligence source, the NSA has installed taps on at least a dozen of the major overseas communications links, each capable of eavesdropping on information passing by at a high data rate.

8 Utah Data Center, Bluffdale, Utah

At a million square feet, this $2 billion digital storage facility outside Salt Lake City will be the centerpiece of the NSA’s cloud-based data strategy and essential in its plans for decrypting previously uncrackable documents.

9 Multiprogram Research Facility, Oak Ridge, Tennessee

Some 300 scientists and computer engineers with top security clearance toil away here, building the world’s fastest supercomputers and working on cryptanalytic applications and other secret projects.

10 NSA headquarters, Fort Meade, Maryland

Analysts here will access material stored at Bluffdale to prepare reports and recommendations that are sent to policymakers. To handle the increased data load, the NSA is also building an $896 million supercomputer center here.

Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers of the NSA’s new center, they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program.

For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail. William Binney was a senior NSA crypto-mathematician largely responsible for automating the agency’s worldwide eavesdropping network. A tall man with strands of black hair across the front of his scalp and dark, determined eyes behind thick-rimmed glasses, the 68-year-old spent nearly four decades breaking codes and finding new ways to channel billions of private phone calls and email messages from around the world into the NSA’s bulging databases. As chief and one of the two cofounders of the agency’s Signals Intelligence Automation Research Center, Binney and his team designed much of the infrastructure that’s still likely used to intercept international and foreign communications.

to read the rest of the article and for more, go to:   http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1