¿LAS PIRÁMIDES SON OBRA DE UNA SUPERCIVILIZACIÓN?

Se usaron bloques de 100 y hasta 200 T. traídos de una cantera a 30 km. Están alineadas perfectamente con los puntos cardinales y el Cinturón de Orión. Los egipcios de esa época ni siquiera conocían el Hierro.

SOLUCIONES

Tú no puedes solucionar unos problemas con el mismo nivel de CONSCIENCIA que los creó. -Albert Einstein

EL HOMBRE QUE PIENSA POR SÍ MISMO

El hombre más peligroso para cualquier gobierno es el capaz de reflexionar... Casi inevitablemente, llegará a la conclusión de que el gobierno bajo el que vive es deshonesto, loco e intolerable. -H. L. Mencken

ESTRUCTURA SOCIAL PIRAMIDAL

Nuestro mundo está organizado de tal modo que una pequeña élite controla al resto a través de una jerarquía de jefes sobre otros jefes hasta llegar a los obreros en la base. El nivel de conocimiento separa a unos niveles de otros. -David Icke

GOBIERNO MUNDIAL O NUEVO ORDEN MUNDIAL

El objetivo de las élites es crear un gobierno mundial dictatorial, fascista, donde el Estado Policial es omnipresente y las libertades individuales no existen. -David Icke

NEGACIONISMO O ESCEPTICISMO CÍNICO

Condenar algo sin investigarlo previamente es la cota más alta de la ignorancia. -Albert Einstein

MEDIOS DE COMUNICACIÓN

La Opinión Pública lo es todo. Si está a tu favor, nada podrá salir mal. Si está en tu contra, nada podrá tener éxito. El que moldea la Opinión Pública tiene un mayor poder que el que hace las leyes. -Abraham Lincoln

RESPONSABILIDAD PERSONAL

Tú debes convertirte en el cambio que quieres ver en el mundo. -Mahatma Gandhi

EL PODER DE LA PROPAGANDA

Debe hacerse tan popular y tan simple que hasta el más estúpido la pueda entender. A la gente se la puede convencer de que el Paraíso es el Infierno, o a la inversa, de que la vida más horrible es el Paraíso. -Adolf Hitler, "Mein Kampf"

REPETIDORES

La mayoría de la gente es OTRA gente. Sus pensamientos son la opinión de otros, sus vidas una imitación, sus pasiones una cita de un libro. -Oscar Wilde

CREENCIAS

En religión y política, la gente casi siempre las adquiere, sin examinarlas, de autoridades que tampoco las han examinado y que, a su vez, las han adquirido de unos terceros cuyas opiniones no valen UNA PUTA MIERDA. -Mark Twain

PIRÁMIDE DE PODER

Es fácil que una pequeña élite controle a una amplia mayoria a través de estructuras jerárquicas donde cada uno se está en su sitio sin moverse y sin interesarse nunca por nada. -David Icke

DEBER

La cobardía pregunta si es seguro, la conveniencia si es cortés, y la vanidad si es popular. Pero la Consciencia pregunta si es JUSTO. Y siempre llega un tiempo donde uno debe tomar una postura que no es nada excepto JUSTA. -M. L. King

911 WAS AN INSIDE JOB!!

¿El atentado del 11-S fue ejecutado por el Gobierno en la Sombra de EEUU a través de infiltrados y aliados al más alto nivel en el ejército, los servicios secretos y los medios de comunicación?

¿MAGOS NEGROS CONTROLAN LA ECONOMÍA MUNDIAL?

¿El Dinero es el único Dios de este mundo porque lo controla TODO? ¿Los banqueros son los nuevos sacerdotes? ¿Los símbolos sagrados y ocultistas en los billetes atraen energías adecuadas a los fines de este clero?

¿EL 11-M FUE UN GOLPE DE ESTADO A FAVOR DEL PSOE?

Hay hechos documentados de sobra que demuestran que ciertos policías, miembros del servicio secreto, periodistas y jueces trabajaron para "dar un golpe de estado mediático" mintiendo, destruyendo pruebas o creando pruebas falsas.

¿ESTAMOS SOLOS EN EL UNIVERSO?

¿Otras especies y civilizaciones nos visitan con frecuencia? ¿Algunos son benéficos, otros son malvados, y la mayoría parece neutral o indiferente? ¿Los gobiernos cierran beneficiosos tratos mientras lo niegan todo?

¿NUESTRAS ÉLITES NO SON HUMANAS?

Con fama de endogámicos, herméticos, arrogantes, de "sangre azul", ¿nuestros líderes y reyes pertenecen a una raza distinta, con amplios y ancestrales conocimientos sobre la Realidad y lo Oculto?

¿NUESTROS POLÍTICOS SON TÍTERES?

¿Gente tan increíblemente estúpida e incompetente trabaja para "Amos Ocultos" que mueven sus hilos y a los que deben pagar los favores recibidos? ¿El "juego político" es una farsa para anestesiarnos?

¿SUPERTECNOLOGÍA EN LA ANTIGÜEDAD?

Es un hecho científico demostrable que ESTO no lo pudieron hacer tipos con lianas, troncos y herramientas de bronce. Tampoco podemos reproducirlo con nuestra tecnología actual.

domingo, 25 de agosto de 2013

Video Proof That Nibiru Has Come and Gone

NOTA PERSONAL:

Esta es parte de una conferencia de OCHO HORAS DE DURACIÓN que Nassim Haramein dió en 2003 en el Rogue Valley de California.

Vídeo:

https://www.youtube.com/watch?v=zjD5aayptXk

Texto adjunto:

Subido el 20/04/2009
Connect with your Soul Group or find your Soulmate at in5d Connection http://www.in5d.NET EVERYONE is welcome!

in5d http://www.in5d.com/ UPDATED DAILY! The Internet's largest Esoteric, Spiritual and Metaphysical Database!

For more on spirituality, 2012 and meditation, please visithttp://www.maya12-21-2012.com/ and http://www.in5d.com

Physicist Nassim Haramein has video proof that Planet Nibiru has come and gone.

A comet almost 2x the size of Jupiter (the largest planet in our solar system) recently passed through our solar system but was never reported on main stream media because the scientists and astrologists "thought we were toast". This comet, which Nissim believes was Nibiru, should have disrupted our solar system due to its mass and gravitational pull. Mercury should have been pulled into the sun while earth should have experienced tidal waves all over the planet. The comet was on track to hit the sun, but a huge sun flare emission veered the comet off course, as it traveled past the sun and out of our solar system. This was visible from the west coast in the early morning in February 2003. Two comets have gone by inside the orbit of Mercury into the sun.

Considering the mass and gravitational pull of these objects, "We shouldn't be here. We were given a second chance. We're floating in grace and 'somebody' is taking care of us." In a few days, Nibiru was out of our solar system. With a "comet" of this size, the gravitational force was enormous.

Earth is not revolving around the Sun -- The way you think! by Nassim Haramein

Vídeo:

https://www.youtube.com/watch?v=Ex283trHBgE

Texto adjunto:

Subido el 04/03/2011
Click for complete article and explanation:
http://HumansAreFree.com/2011/03/eart...
  • Categoría

  • Licencia

    Licencia de YouTube estándar

The Moon is Not Real: David Icke

NOTA PERSONAL:

Si la música te molesta, puedes ver este mismo vídeo sin la música en esta entrada:

http://circuloramirez.blogspot.com.es/2013/08/the-moon-is-not-real-david-icke-no-music.html

Vídeo:

https://www.youtube.com/watch?v=_SYA3lo_JS0

Texto adjunto:

Subido el 27/03/2011
David Icke explaining there is no moon.
Due to a high level of noise complaints, here is no music version:https://www.youtube.com/watch?v=8RMNG...
  • Categoría

  • Licencia

    Licencia de YouTube estándar

The Moon is Not Real: David Icke (No Music)

Vídeo:

https://www.youtube.com/watch?v=8RMNGToGAEg

Texto adjunto:

Publicado el 07/05/2013
David Icke's Moon Theory.
Due to a very high number of noise complaints, I have re-uploaded this without the loud music! Enjoy!
The video has been edited for educational purposes, with some information added from other sources to add to Mr. Icke's findings.

Working out the structure of the Moon:

During the Apollo missions, many geological experiments were carried out to try and work out the Moon's structure. The experiments studied the seismic activity or 'moonquakes'.

The seismic waves generated by these quakes change as they move through different materials. The experiments analysed the changes to these waves to work out which parts of the Moon were solid or not.

Internal structure

Like the terrestrial or rocky planets Venus, Mercury, Earth and Mars, the Moon is made up of concentric layers formed by the melting and separation of magma.

There is a solid outer crust about 65km deep, below which is a silicate mantle about 1,000km thick. At the centre there is a metallic core with a radius of about 500km.

The core is not magnetic, suggesting that unlike the Earth's core, the centre of the Moon is solid and has no convection. (fromhttp://www.nhm.ac.uk/nature-online/sp...)
  • Categoría

  • Licencia

    Licencia de YouTube estándar

Moon Secrets Revealed - John Lear

Vídeo:

https://www.youtube.com/watch?v=pi1woGiCCdI

Texto adjunto:

Subido el 08/07/2008
- John Lear

Alex Collier - Algunas Bases Extraterrestres y Humanas

Vídeo:

https://www.youtube.com/watch?v=DBjryNXepAE

Texto adjunto:

Subido el 01/05/2009
Alex Collier hablando de manera inusual directamente a cámara. Vídeo realizado aproximadamente en la década de los '90.

Alex nos habla muy brevemente sobre su experiencia dentro de una nave madre, y la información que obtuvo a través de los andromedanos, concerniente a las bases extraterrestre-humanas que existen en diferentes lugares del mundo.

Traducción y subtítulos por Bala y Zeta (youtube.com/excretandote)
sersignificaser.blogspot.com
  • Categoría

  • Licencia

    Licencia de YouTube estándar

Alex Collier Alien Structures on Moon and Mars 1996 Presentation

NOTA PERSONAL:

Este vídeo ya se publicó, con subtítulos en español, en esta entrada:

http://circuloramirez.blogspot.com.es/2012/12/alex-collier-conferencia-sobre-la-luna.html

El presente vídeo está sólo en inglés. Sin subtítulos.

Se vuelve a publicar en beneficio de la redundancia: Por si alguno de los vídeos desaparece.

Vídeo:

https://www.youtube.com/watch?v=oDZ2BWXqzCg

Texto adjunto:

Subido el 14/12/2010
http://pindz.blogspot.com/2010/12/ale...
Alex Collier Alien Structures on Moon and Mars 1996 Presentation

Alex Collier Reptilianos, y Seres Humanos

NOTA:

Este vídeo ya se ha publicado en esta entrada:

http://circuloramirez.blogspot.com.es/2013/08/reptilianos-alex-collier.html

Solo que esta vez el vídeo está en otro canal. 

Esta publicación extra se hace en beneficio de la redundancia: Por si alguno de los vídeos desaparece.

Vídeo:

https://www.youtube.com/watch?v=5jJ5oTYXLlY

Texto adjunto:

Subido el 31/01/2010
Rincón Paranormal
Blog y Página Oficial: http://bit.ly/Yg3Q4S
Canal de YouTube: http://bit.ly/120WIxO
Páginas de Facebook:
http://on.fb.me/XFZ0Tx
http://on.fb.me/16WFkJR

FreakBizarro
Twitter http://bit.ly/10P0IyF
Blogs Oficiales: http://bit.ly/YOreu5 ; http://bit.ly/120X5s6
Página oficial en Facebook:
http://on.fb.me/110DHKw
  • Categoría

  • Licencia

    Licencia de YouTube estándar

David Icke Revelaciones de una Madre Diosa

NOTA PERSONAL:

Este vídeo ya se publicó, en 18 fragmentos, en esta entrada:

http://circuloramirez.blogspot.com.es/2012/12/david-icke-revelaciones-de-una-madre.html

Esta vez, lo aporto completo. En una sola pieza.

También servirá como redundancia de seguridad. En el caso de que alguno de los vídeos desaparezca.

Vídeo:

http://www.youtube.com/watch?v=Nm9uIfPNn5o

Texto adjunto:

Publicado el 17/01/2013
David Icke, entrevista y expone a una mujer que desde niña sufrio una vida diferente, ella ha padecido y conocido una realidad escalofriante, es el suyo un testimonio serio y que debe hacernos reflexionar, pues de ser humano es ser equilibrado y de lo malo... haremos bueno, aplicandole a todo desequilibrio anterior... el equilibrio por la verdadera enseñanza y realidad, detectando lo inhumano que hoy nos tortura y divide.

Reptilianos Alex Collier

NOTA PERSONAL:

Este vídeo es un extracto de diez minutos (muy adornado) de una conferencia de Alex Collier llamada "Historia Galáctica según los Andromedanos" o "Perspectiva Andromedana sobre la Historia Galáctica" en español. En inglés ha sido publicada en Youtube mediante los nombres "Alien Secret Earth History", "Extraterrestrials & Secret Earth History", etc... Ha recibido muchos nombres porque es una conferencia muy popular. 

Creo que también hay fragmentos de otras conferencias, charlas y entrevistas, pero no estaré del todo seguro hasta que revise esos vídeos y los publique.

Cuando publique estas conferencias en el blog daré más detalles en sus respectivas entradas.

En cualquier caso, es un compendio bastante sólido de la información ofrecida por Alex Collier sobre los Reptilianos de Alfa Draconis.

Vídeo:

http://www.youtube.com/watch?v=h9yAo_e0-yU

Texto adjunto:

Publicado el 06/03/2013
Alex Collier contactado extraterrestre

La gente no quiere escuchar la VERDAD... -Nietzsche


Is the NSA spying on U.S. Internet traffic?

Fuente:

http://www.globalresearch.ca/is-the-nsa-spying-on-u-s-internet-traffic/2693

Información:

Is the NSA spying on U.S. Internet traffic?

Region: 

Two former AT&T employees say the telecom giant has maintained a secret, highly secure room in St. Louis since 2002. Intelligence experts say it bears the earmarks of a National Security Agency operation.
In a pivotal network operations center in metropolitan St. Louis, AT&T has maintained a secret, highly secured room since 2002 where government work is being conducted, according to two former AT&T workers once employed at the center.
In interviews with Salon, the former AT&T workers said that only government officials or AT&T employees with top-secret security clearance are admitted to the room, located inside AT&T’s facility in Bridgeton. The room’s tight security includes a biometric “mantrap” or highly sophisticated double door, secured with retinal and fingerprint scanners. The former workers say company supervisors told them that employees working inside the room were “monitoring network traffic” and that the room was being used by “a government agency.”
The details provided by the two former workers about the Bridgeton room bear the distinctive earmarks of an operation run by the National Security Agency, according to two intelligence experts with extensive knowledge of the NSA and its operations. In addition to the room’s high-tech security, those intelligence experts told Salon, the exhaustive vetting process AT&T workers were put through before being granted top-secret security clearance points to the NSA, an agency known as much for its intense secrecy as its technological sophistication.
“It was very hush-hush,” said one of the former AT&T workers. “We were told there was going to be some government personnel working in that room. We were told, ‘Do not try to speak to them. Do not hamper their work. Do not impede anything that they’re doing.’”
The importance of the Bridgeton facility is its role in managing the “common backbone” for all of AT&T’s Internet operations. According to one of the former workers, Bridgeton serves as the technical command center from which the company manages all the routers and circuits carrying the company’s domestic and international Internet traffic. Therefore, Bridgeton could be instrumental for conducting surveillance or collecting data.
If the NSA is using the secret room, it would appear to bolster recent allegations that the agency has been conducting broad and possibly illegal domestic surveillance and data collection operations authorized by the Bush administration after the terrorist attacks of Sept. 11, 2001. AT&T’s Bridgeton location would give the NSA potential access to an enormous amount of Internet data — currently, the telecom giant controls approximately one-third of all bandwidth carrying Internet traffic to homes and businesses across the United States.
The nature of the government operation using the Bridgeton room remains unknown, and could be legal. Aside from surveillance or data collection, the room could conceivably house a federal law enforcement operation, a classified research project, or some other unknown government operation.
The former workers, both of whom were approached by and spoke separately to Salon, asked to remain anonymous because they still work in the telecommunications industry. They both left the company in good standing. Neither worked inside the secured room or has access to classified information. One worked in AT&T’s broadband division until 2003. The other asked to be identified only as a network technician, and worked at Bridgeton for about three years.
The disclosure of the room in Bridgeton follows assertions made earlier this year by a former AT&T worker in California, Mark Klein, who revealed that the company had installed a secret room in a San Francisco facility and reconfigured its circuits, allegedly to help collect data for use by the government. In detailed documents he provided to the Electronic Frontier Foundation, Klein also alleged there were other secret rooms at AT&T facilities in other U.S. cities.
NSA expert Matthew Aid, who has spent the last decade researching a forthcoming three-volume history of the agency, said of the Bridgeton room: “I’m not a betting man, but if I had to plunk $100 down, I’d say it’s safe that it’s NSA.” Aid told Salon he believes the secret room is likely part of “what is obviously a much larger operation, or series of interrelated operations” combining foreign intelligence gathering with domestic eavesdropping and data collection.
“You’re talking about a backbone for computer communications, and that’s NSA,” Russ Tice, a former high-level NSA intelligence officer, told Salon. Tice, a 20-year veteran of multiple U.S. intelligence agencies, worked for the NSA until spring 2005. “Whatever is happening there with the security you’re talking about is a whole lot more closely held than what’s going on with the Klein case” in San Francisco, he said. (The San Francisco room is secured only by a special combination lock, according to the Klein documents.)
Tice added that for an operation requiring access to routers and gateways, “the obvious place to do it is right at the source.”
In a statement provided to Salon, NSA spokesman Don Weber said: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues as it would give those wishing to do harm to the United States insight that could potentially place Americans in danger; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.”
Since last December, news reports have asserted that the NSA has conducted warrantless spying on the phone and e-mail communications of thousands of people inside the U.S., and has been secretly collecting the phone call records of millions of Americans, using data provided by major telecommunications companies, including AT&T. Such operations would represent a fundamental shift in the NSA’s secretive mission, which over the last three decades is widely understood to have focused exclusively on collecting signals intelligence from abroad.
The reported operations have sparked fierce protest by lawmakers and civil liberties advocates, and have raised fundamental questions about the legality of Bush administration policies, including their consequences for the privacy rights of Americans. The Bush administration has acknowledged the use of domestic surveillance operations since Sept. 11, 2001, but maintains they are conducted within the legal authority of the presidency. Several cases challenging the legality of the alleged spying operations are now pending in federal court, including suits against the federal government, and AT&T, among other telecom companies.
In a statement provided to Salon, AT&T spokesman Walt Sharp said: “If and when AT&T is asked by government agencies for help, we do so strictly within the law and under the most stringent conditions. Beyond that, we can’t comment on matters of national security.”
According to the two former AT&T workers and the Klein documents, the room in the pivotal Bridgeton facility was set up several months before the room in San Francisco. According to the Klein documents, the work order for the San Francisco room came from Bridgeton, suggesting that Bridgeton has a more integral role in operations using the secured rooms.
The company’s Bridgeton network operations center, where approximately 100 people work, is located inside a one-story brick building with a small two-story addition connected to it. The building shares a parking lot with a commercial business and is near an interstate highway.
According to the two former workers, the secret room is an internal structure measuring roughly 20 feet by 40 feet, and was previously used by employees of the company’s WorldNet division. In spring 2002, they said, the company moved WorldNet employees to a different part of the building and sealed up the room, plastering over the window openings and installing steel double doors with no handles for moving equipment in and out of the room. The company then installed the high-tech mantrap, which has opaque Plexiglas-like doors that prevent anyone outside the room from seeing clearly into the mantrap chamber, or the room beyond it. Both former workers say the mantrap drew attention from employees for being so high-tech.
Telecom companies commonly use mantraps to secure data storage facilities, but they are typically less sophisticated, requiring only a swipe card to pass through. The high-tech mantrap in Bridgeton seems unusual because it is located in an otherwise low-key, small office building. Tice said it indicates “something going on that’s very important, because you’re talking about an awful lot of money” to pay for such security measures.
The vetting process for AT&T workers granted access to the room also points to the NSA, according to Tice and Aid.
The former network technician said he knows at least three AT&T employees who have been working in the room since 2002. “It took them six months to get the top-security clearance for the guys,” the network technician said. “Although they work for AT&T, they’re actually doing a job for the government.” He said that each of them underwent extensive background checks before starting their jobs in the room. The vetting process included multiple polygraph tests, employment history reviews, and interviews with neighbors and school instructors, going as far back as elementary school.
Aid said that type of vetting is precisely the kind NSA personnel who receive top-secret SCI (Sensitive Compartmented Information) clearance go through. “Everybody who works at NSA has an SCI clearance,” said Aid.
It’s possible the Bridgeton room is being used for a federal law enforcement operation. According to the Communications Assistance for Law Enforcement Act of 1994, telecom companies are required to assist law enforcement officials who have legal authorization to conduct electronic surveillance, either in pursuit of criminal suspects or for the protection of national security. The companies must design or modify their systems to make such surveillance possible, essentially by making them wiretap-ready.
The FBI is the primary federal agency that tracks and apprehends terrorist suspects within the U.S. Yet, there are several indications that the Bridgeton room does not involve the FBI.
“The FBI, which is probably the least technical agency in the U.S. government, doesn’t use mantraps,” Aid said. “But virtually every area of the NSA’s buildings that contain sensitive operations require you to go through a mantrap with retinal and fingerprint scanners. All of the sensitive offices in NSA buildings have them.” The description of the opaque Plexiglas-like doors in Bridgeton, Aid said, indicates that the doors are likely infused with Kevlar for bulletproofing — another signature measure that he said is used to secure NSA facilities: “You could be inside and you can’t kick your way out. You can’t shoot your way out. Even if you put plastique explosives, all you could do is blow a very small hole in that opaque glass.”
Jameel Jaffer, deputy director of the American Civil Liberties Union’s national security program, said it is unlikely that the FBI would set up an ongoing technical operation — in this case, for several years running — inside a room of a telecommunications company. The Foreign Intelligence Surveillance Act, passed by Congress in 1978, requires law enforcement officials to obtain warrants from a secret federal court for domestic surveillance operations involving the protection of national security. If the FBI (or another federal agency) wanted data, it would more likely be targeting a specific individual or set of individuals suspected of engaging in criminal or terrorist activities. The agency would obtain a warrant and then call AT&T, or show up in person with the warrant and ask for the wiretap to be engaged. According to Jaffer, the FBI, NSA or any other federal agency could also legally tap into communications data under federal guidelines using technical means that would not require technical assistance of a telecom company.
In an e-mail statement to Salon, FBI spokesperson Paul Bresson said: “The FBI does not confirm whether or not we are involved in an alleged ongoing operational activity. In all cases, FBI operations are conducted in strict accordance with established Department of Justice guidelines, FBI policy, and the law.”
Rather than specifically targeted surveillance, it is also possible that the Bridgeton room is being used for a classified government project, such as data mining, with which the Pentagon has experimented in the past. Data mining uses automated methods to search through large volumes of data, looking for patterns that might help identify terrorist suspects, for example. According to Tice, private sector employees who work on classified government projects for the NSA are required to undergo the same kind of top-secret security clearance that AT&T workers in the Bridgeton room underwent.
According to the former network technician, all three AT&T employees he knows who work inside the room have network technician and administration backgrounds — not research backgrounds — suggesting that those workers are only conducting maintenance or technical operations inside the room.
Furthermore, Tice said it is much more likely that any classified project using data collected via a corporate facility would take place in separate facilities: “The information that you garner from something like a room siphoning information and filtering it would be sent to some place where you’d have people thinking about what to do with that data,” he said.
Dave Farber, a respected computer scientist at Carnegie Mellon University and former chief technologist for the Federal Communications Commission, also said it is likely that data collected in a facility like the Bridgeton center would be used elsewhere, once the facility is set up to divert the data. “If I own the routers, I can put code in there to have them monitor for certain data. That’s not a particularly difficult job,” said Farber, who is considered one of the pioneers of Internet architecture. Farber said that “packets” of data can essentially be copied and then sent to some other location for use. “Most of the problems would have to do with keeping your staff from knowing too much about it.”
According to the former network technician, workers at Bridgeton, at the direction of government officials, could conceivably collect data using any AT&T router around the country, which he says number between 1,500 and 2,000. To do so, the company would need to install a wiretap-like device at select locations for “sniffing” the desired data. That could explain the purpose of the San Francisco room divulged by Klein, as well as the secret rooms he alleged existed at AT&T facilities in other U.S. cities.
“The network sniffer with the right software can capture anything,” the former network technician said. “You can get people’s e-mail, VoIP phone calls, [calls made over the Internet] — even passwords and credit card transactions — as long as you have the right software to decrypt that.”
In theory, surveillance involving Internet communications can be executed legally under federal law. “But with most of these things,” Farber said, “the problem is that it just takes one small step to make it illegal.”

NSA, European Intelligence Agencies Work Closely Together

Fuente:

http://www.globalresearch.ca/nsa-european-intelligence-agencies-work-closely-together/5342180

Información:

NSA, European Intelligence Agencies Work Closely Together

Region: 
Theme: 

Big Brother: Spying on Americans, The Threat  of Satellite Surveillance
The claim by European governments that they were unaware of the extensive wiretapping undertaken by the US intelligence agency NSA is simply a lie. In fact, various European intelligence agencies, and in particular Germany’s Federal Intelligence Service (BND), work closely with the National Security Agency (NSA) in the surveillance of electronic communications.
This is clear from an interview with former NSA sub-contractor Edward Snowden published in the latest issue of the news magazine Der Spiegel .
To the question: “Are the German authorities and German politicians involved in the monitoring system”, Snowden answered: “Yes, of course. They [NSA people–Ed.] are in cahoots with the Germans, as with most other Western countries.”
The interview is based on written questions submitted by encryption specialist Jacob Appelbaum and documentary filmmaker Laura Poitras in mid-May to Snowden, before he went to Hong Kong and began revealing the comprehensive monitoring activities of the NSA and Britain’s GCHQ (Government Communications Headquarters).
In the responses from Snowden, now published for the first time, he suggests that such international intelligence cooperation also serves to bypass national legal restrictions and shield political leaders.
Intelligence agencies that exchange information never ask where it originates, he explains. “In this way, they can protect their political leaders from the backlash, if it should come out how massively people’s privacy is being violated worldwide.”
According to Snowden, the NSA has its own department for managing the collaboration with foreign intelligence agencies, the Foreign Affairs Directorate. Among others things, the NSA developed the Stuxnet Internet virus together with Israeli intelligence, which was then used to sabotage Iranian nuclear facilities.
The NSA collaborates particularly intensively with Germany’s BND. Der Spiegel lists a variety of already known and new information, exposing claims by the German government that it had been surprised and outraged by Snowden’s revelations as sheer hypocrisy.
As early as 2001, the European Parliament published a 200-page report on the “Echelon” surveillance programme, which was jointly run by the US, Britain, Australia, New Zealand and Canada. The report came to the conclusion that “within Europe, all communications, such as emails, phone and fax traffic, are regularly monitored by the NSA.”
As long as the system was used “solely for intelligence purposes,” this was not a breach of EU law, the parliamentary committee found at the time. If, however, it was abused for economic espionage and to gain competitive advantages, “this stands in stark contrast to the obligation of member states to loyalty to the concept of free competition in the common market.”
In 2004, an important part of the Echelon programme, the wireless monitoring system in the Bavarian town of Bad Aibling, was officially closed down on the recommendation of the parliamentary committee, because it was mainly used for industrial espionage.
As Der Spiegel now writes, the site where the listening devices were housed was never released for civilian use. Instead, signals traffic was intercepted and routed via a cable to the Mangfall barracks, just a few hundred metres away. There, the BND, “in close cooperation with a handful of NSA wire-tapping specialists” analysed “telephone calls, faxes, and everything else transmitted via satellite”.
According to Der Spiegel, the banking metropolis of Frankfurt is “something like a nerve centre” for spying on data that travels via fibre optic cable. It is here that fibre optic cables from Eastern Europe and Central Asia meet the data lines from Western Europe. International providers such as the US company Level 3 and Germany’s Deutsche Telekom maintain their digital hubs.
As Snowden has revealed, in Frankfurt and at other German hubs, the NSA captures half a billion communications every month. The BND also eagerly helps itself to data here, working closely with the American secret services. In this way, the BND circumvents the so-called G-10 law, which governs the constitutionally protected privacy of post and telecommunications secrecy.
Foreign intelligence agencies, on the other hand, work “largely uncontrolled on German soil”, Der Spiegel notes.
The NSA provides the BND with special tools to analyse data from the Middle East, the news magazine reports, asking: “Does the US service receive access to the data in return?”
Given this close collaboration, it is totally implausible that the German secret services and government knew nothing about the NSA’s wiretapping activities, as they repeatedly claim.
Just last week, the French newspaper Le Monde had also revealed that the French foreign intelligence service DGSE (General Directorate of External Security) was systematically spying on data traffic.
“The whole of our communications traffic is being spied upon,” the newspaper wrote. The DGSE collects the metadata of millions of telephone calls, emails, SMS, faxes and all Internet activities on Google, Facebook, Microsoft, Apple and Yahoo, thus building up a huge database.
When it comes to the protection of privacy and the defence of basic democratic rights, the European governments have no more scruples than their counterparts in the United States. They only become nervous when the collected data is used for industrial espionage or political blackmail against them.
Faced with growing social tensions European governments regard their respective populations as potential enemies which must be monitored. This is why not a single European government is prepared to grant Edward Snowden asylum, despite their feigned outrage.

Documents Show Undersea Cable Firms Provide Surveillance Access to US Secret State

Fuente:

http://www.globalresearch.ca/documents-show-undersea-cable-firms-provide-surveillance-access-to-us-secret-state/5343173

Información:

Documents Show Undersea Cable Firms Provide Surveillance Access to US Secret State


yes we scan
Documents published last week by the Australian web site Crikey revealed that the US government “compelled Telstra and Hong Kong-based PCCW to give it access to their undersea cables for spying on communications traffic entering and leaving the US.”
The significance of the disclosure is obvious; today, more than 99 percent of the world’s internet and telephone traffic is now carried by undersea fiber optic cables. An interactive submarine cable map published by the Global Bandwidth Research Service is illustrative in this regard.
Since the late 1960s as part of its ECHELON spy project, the United States has been tapping undersea cables to extract communications and signals intelligence. In fact, projects such as Operation Ivy Bells, a joint Navy-NSA secret intelligence program directed against the former Soviet Union was designed to do just that.
Prefiguring the Bush administration’s warrantless wiretapping scandal which broke in 2005, the Associated Press reported that a $3.2 billion Navy Seawolf class submarine, a 453-foot behemoth called the USS Jimmy Carter, “has a special capability: it is able to tap undersea cables and eavesdrop on the communications passing through them.”
A year later, AT&T whistleblower Mark Klein told Wired Magazinethat NSA was tapping directly into the world’s internet backbone, and was doing so from domestic listening posts the telecommunications’ giant jointly built with the agency at corporate switching stations.
Whatever submarine operations NSA still carry out with the US Navy and “Five Eyes” surveillance partners (Australia, Britain, Canada, New Zealand and the US), access to information flowing through undersea cables mean that the US government is well-positioned to scoop-up virtually all global communications.
Since former NSA contractor Edward Snowden began spilling the beans last month, it should be clear that the American government’s capabilities in amassing unprecedented volumes of information from cable traffic, also potentially hands the US and their corporate collaborators a treasure trove of sensitive economic secrets from competitors.
Economic Espionage
Reporting by Australian journalists confirm information published July 6 by The Washington Post. There we learned that overseas submarine cable companies doing business in the United States must maintain “an internal corporate cell of American citizens with government clearances,” a cadre of personnel whose job is to ensure that “when US government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely.”
Inked just weeks after the 9/11 provocation, the 23-page Telstradocument specifies that access to undersea cable traffic by the FBI and “any US governmental authorities entitled to effect Electronic Surveillance,” is an explicit condition for doing business in the United States.
Similar agreements were signed between 1999 and 2011 with telecommunication companies, satellite firms, submarine cable operators and the US government and were published earlier this month by the Public Intelligence web site.
It has long been known that the Australian secret state agency, the Defence Security Directorate (DSD), is a key participant in US global surveillance projects. Classified NSA maps provided by Snowden and subsequently published by Brazil’s O Globonewspaper, revealed the locations of dozens of US and allied signals intelligence sites worldwide. DSD currently operates four military installations involved in a top secret NSA program called X-Keyscore.
Snowden described X-Keyscore and other programs to Der Spiegel as “the intelligence community’s first ‘full-take’ Internet buffer that doesn’t care about content type . . . ‘Full take’ means it doesn’t miss anything, and ingests the entirety of each circuit’s capacity.”
According to The Sydney Morning Herald, along with the “US Australian Joint Defence Facility at Pine Gap near Alice Springs,” three other DSD facilities, “the Shoal Bay Receiving Station near Darwin, the Australian Defence Satellite Communications Facility at Geraldton and the naval communications station HMAS Harman outside Canberra,” were identified as X-Keyscore “contributors.” The paper also reported that “a new state-of-the-art data storage facility at HMAS Harman to support the Australian signals directorate and other Australian intelligence agencies” is currently under construction.
The Herald described the project as “an intelligence collection program” that “processes all signals before they are shunted off to various ‘production lines’ that deal with specific issues and the exploitation of different data types for analysis–variously code-named Nucleon (voice), Pinwale (video), Mainway (call records) and Marina (internet records). US intelligence expert William Arkin describes X-Keyscore as a ‘national Intelligence collection mission system’.”
Two of the Australian bases illustrated on the X-Keyscore map sit adjacent to major undersea cable sites transiting the Pacific and Indian Oceans.
Cozy arrangements with Telstra and other firms however, hardly represent mere passive acceptance of terms and conditions laid out by the US government. On the contrary, these, and dozens of other agreements which have come to light, are emblematic of decades-long US corporate-state “public-private partnerships.”
As Bloomberg reported last month, “thousands of technology, finance and manufacturing companies are working closely with US national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence.”
It’s a two-way street, Bloomberg noted. Firms providing “US intelligence organizations with additional data, such as equipment specifications” use it “to help infiltrate computers of its adversaries.” In return, “companies are given quick warnings about threats that could affect their bottom line.” Such sensitive data can also be used to undermine the position of their foreign competitors.
We now know, based on documents provided by Snowden, that the “infiltration” of computer networks by US secret state agencies are useful not only for filching military secrets and mass spying but also for economic and industrial espionage.
That point was driven home more than a decade ago in a paperprepared by journalist Duncan Campbell for the European Parliament.
“By the end of the 1990s,” Campbell wrote, “the US administration claimed that intelligence activity against foreign companies had gained the US nearly $150 billion in exports.”
“Although US intelligence officials and spokespeople have admitted using Comint [communications intelligence] against European companies . . . documents show that the CIA has been directly involved in obtaining competitor intelligence for business purposes.”
At the time the Telstra pact was signed, the Australian telecommunications and internet giant was “50.1% owned” by the Australian government. Reach Global Services, is described in the document as “a joint venture indirectly owned 50% by Telstra” and “50% owned” by Hong Kong’s Pacific Century CyberWorks Limited (PCCW).
With controlling interest in more than 40 undersea fiber optic cables, and with landing rights in global markets that include Hong Kong, Japan, Korea, Taiwan, Singapore, Australia, North America and Europe, the joint venture was then the largest commercial telecommunications carrier in Asia with some 82,000 kilometers of undersea cables. Reach also operates international satellite systems that cover two-third’s of the planet’s surface.
Such assets would be prime targets of “Five Eyes” spy agencies under terms of the UKUSA Communications Intelligence Agreement.
Telstra and PCCW restructured their partnership in 2011, with the Australian firm now controlling the lion’s share of an undersea cable network that stretches “more than 364,000 kilometres and connects more than 240 markets worldwide,” theSouth Morning China Post reported. Inevitably, the restructuring will afford the US government an even greater opportunity for spying.
Network security agreements hammered out among undersea cable firms and the US government have profound implications for global commerce. Their geopolitical significance hasn’t been lost on America’s closet “allies.”
The Guardian revealed last month that the US is “spying on the European Union mission in New York and its embassy in Washington.” In addition to the EU mission, target lists include “the French, Italian and Greek embassies, as well as a number of other American allies, including Japan, Mexico, South Korea, India and Turkey.”
That list has since been supplemented by further disclosures.
Snowden told the South China Morning Post that NSA hacked into the “computers at the Hong Kong headquarters of Pacnet, which owns one of the most extensive fibre optic submarine cable networks in the region.”
Recently, the firm signed major deals with the Chinese mainland’s “top mobile phone companies” and “owns more than 46,000 kilometres of fibre-optic cables.”
According to the paper, Pacnet “cables connect its regional data centres across the Asia-Pacific region, including Hong Kong, the mainland, Japan, South Korea, Singapore and Taiwan. It also has offices in the US.”
The South Morning China Post also disclosed that Tsinghua University, “China’s premier seat of learning” has sustained extensive attacks on the school’s “network backbones.”
Available documents based on Snowden disclosures and other sources seem to suggest that President Obama’s militaristic “pivot to Asia” is also an aggressive campaign to steal commercial and trade secrets from US imperialism’s Asian rivals.
Whether or not these revelations will effect negotiations over the proposed Trans-Pacific Partnership (TPP), a NAFTA-style “free trade” agreement between the US and ten Pacific Rim nations, including Chile, Japan, Malaysia, Mexico, Peru and Singapore–all prime US-UK targets of PRISM, TEMPORA and X-Keyscore–remains to be seen.
‘Legal’ License to Spy
If we have learned anything since Snowden’s revelations began surfacing last month, it is that the US secret state relies on a body of “secret laws” overseen by a Star Chamber-like FISA court described in the polite language The New York Times as a “parallel Supreme Court,” to do its dirty work.
Along with leaked NSA documents, published agreements between telecommunications firms, internet service providers and the US government should demolish the fiction that blanket surveillance is “legal,” “limited in scope” or chiefly concerned with fighting “crime” and “terrorism.”
Proclaiming that “US communications systems are essential to the ability of the US government to fulfill its responsibilities to the public to preserve the national security of the United States, to enforce the laws, and to maintain the safety of the public,” the Telstra summary posted by Crikey should dispel any illusions on that score.
On the contrary, the agreement reveals the existence of a vast surveillance web linking private companies to the government’s relentless drive, as The Washington Post explained, to “collect it all.”
● All customer billing data to be stored for two years;
● Ability to provide to agencies any stored telecommunications or internet communications and comply with preservation requests;
● Ability to provide any stored metadata, billing data or subscriber information about US customers;
● They are not to comply with any foreign privacy laws that might lead to mandatory destruction of stored data;
● Plans and infrastructure to demonstrate other states cannot spy on US customers;
● They are not to comply with information requests from other countries without DoJ permission;
● A requirement to:
. . . designate points of contact within the United States with the authority and responsibility for accepting and overseeing the carrying out of Lawful US Process to conduct Electronic Surveillance of or relating to Domestic Communications carried by or through Domestic Communications Infrastructure; or relating to customers or subscribers of Domestic Communications Companies. The points of contact shall be assigned to Domestic Communications Companies security office(s) in the United States, shall be available twenty-four (24) hours per day, seven (7) days per week and shall be responsible for accepting service and maintaining the security of Classified Information and any Lawful US Process for Electronic Surveillance . . . The Points of contact shall be resident US citizens who are eligible for US security clearances.
In other words, an “internal corporate cell of American citizens,” charged with providing confidential customer data to the secret state, as The Washington Post first reported.
Additional demands include:
● A requirement to keep such surveillance confidential, and to use US citizens “who meet high standards of trustworthiness for maintaining the confidentiality of Sensitive Information” to handle requests;
● A right for the FBI and the DoJ to conduct inspection visits of the companies’ infrastructure and offices; and
● An annual compliance report, to be protected from Freedom of Information requests.
This is not a one-off as the other 27 Agreements published by Public Intelligence readily attest.
For example, the 31-page 2011 Agreement between the US government and Level 3 Communications, which operates in North America, Europe, Latin America and the Asia-Pacific, which acquired Global Crossing from from the Hong Kong-based Hutchison Whampoa and Singapore Technologies Telemedia (the focus of The Washington Post’s July 6 report), was expanded beyond the FBI and Department of Justice to include the Department of Homeland Security and the Department of Defense, NSA’s “parent” agency.
As with the 2001 Telstra agreement, “Access” to Level 3′s systems by governmental entities is defined as “the ability to physically or logically undertake any of the following actions: (a) read, divert, or otherwise obtain non-public information or technology from or about software, hardware, a system or a network; (b) add, edit or alter information or technology stored on or by software, hardware, a system or a network; and (c) alter the physical or logical state of software, hardware, a system or a network (e.g., turning it on or off, changing configuration, removing or adding components or connections).”
NSA, the principle US spy agency charged with obtaining, storing and analyzing COMINT/SIGINT “products, i.e., user data, has been handed virtually unlimited access to information flowing through Level 3 fiber optic cables as it enters the US.
This includes what is described as “Domestic Communications,” content, not simply the metadata, of any phone call or email that transit Level 3 systems: “‘Domestic Communications’ means: (a) Wire Communications or Electronic Communications (whether stored or not) from one US location to another US location; and (b) the US portion of a Wire Communication or Electronic Communication (whether stored or not) that originates or terminates in the United States.”
So much for President Obama’s mendacious claim that “nobody is listening to your phone calls”!
Access to the entirety of customer records and communications is clearly spelled out in the section entitled “Electronic Surveillance.”
Note: the “USC.” provisions refer to (18) the Stored Communications Act which compels disclosure to the government of stored wire, electronic and transactional data; a provision that greatly weakened the Fourth Amendment right to privacy. 50 USC outlines the role of War and National Defense in the United States Code and includes “foreign intelligence,” “electronic surveillance authorization without court order,” “internal security,” including the “control of subversive activities” and the “exercise of emergency powers and authorities” by the Executive Branch.
‘Electronic Surveillance,’ for the purposes of this Agreement, includes: (a) the interception of wire, oral, or electronic communications as defined in 18 U.S.C. §§ 2510(1), (2), (4) and (12), respectively, and electronic surveillance as defined in 50 U.S.C. § 1801(f); (b) Access to stored wire or electronic communications, as referred to in 18 U.S.C. § 2701 et seq.; (c) acquisition of dialing, routing, addressing, or signaling information through pen register or trap and trace devices or other devices or features capable of acquiring such information pursuant to law as defined in 18 U.S.C. § 3121 et seq. and 50 U.S.C. § 1841 et seq.; (d) acquisition of location-related information concerning a service subscriber or facility; (e) preservation of any of the above information pursuant to 18 U.S.C.§ 2703(f); and (f) Access to, or acquisition, interception, or preservation of, wire, oral, or electronic communications or information as described in (a) through (e) above and comparable state laws.
Level 3 is further enjoined from disclosing what is described as “Sensitive Information,” that is, “information that is not Classified Information regarding: (a) the persons or facilities that are the subjects of Lawful US Process; (b) the identity of the Government Authority or Government Authorities serving such Lawful US Process; (c) the location or identity of the line, circuit, transmission path, or other facilities or equipment used to conduct Electronic Surveillance; (d) the means of carrying out Electronic Surveillance.”
In other words, we do the spying; you hand over it over and keep your mouths shut.
The electronic driftnet thrown over global communications is expedited by direct access to Level 3′s equipment by the US government.
‘Principal Equipment’ means the primary electronic components of a submarine cable system, to include the hardware used at the NOC(s) [Network Operations Center], landing station(s) and the cable itself, such as servers, repeaters, submarine line terminal equipment (SLTE), system supervisory equipment (SSE), power feed equipment (PFE), tilt and shape equalizer units (TEQ/SEQ), optical distribution frames (ODF), and synchronous optical network (SONET), synchronous digital hierarchy (SDH), wave division multiplexing (WDM), dense wave division multiplexing (DWDM), coarse wave division multiplexing (CWDM) or optical carrier network (OCx) equipment, as applicable.
Who oversees the set-up? On paper it appears that Level 3 control their operations. However, the Agreement specifies that the firm must utilize “primary US NOCs for any Domestic Communications Infrastructure” and it “shall be maintained and remain within the United States and US territories, to be operated by Level 3, exclusively using Screened Personnel.”
Who signs off on “screened personnel”? Why the US government of course, which raises the suspicion that corporate employees are little more than spook assets.
But here’s where it gets interesting. “Level 3 may nonetheless use the United Kingdom NOC for routine day-to-day management of any of the Cable Systems as such management is in existence as of the Effective Date.”
Why might that be the case, pray tell?
Could it be that fiber optic cables transiting the UK are alreadylovingly scrutinized by NSA’s kissin’ cousins across the pond? GCHQ, as The Guardian disclosed, is merrily ingesting “vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them” with the American agency.
Therefore, since UK undersea cable traffic is already under close “management” via the British agency’s TEMPORA program, described as having the “‘biggest internet access’ of any member of the Five Eyes electronic eavesdropping alliance,” it makes sense that Level 3 is allowed to “use the United Kingdom NOC” as a hub for its “Domestic Communications Infrastructure”!
In conclusion, these publicly available documents provide additional confirmation of how major corporations are empowering the US surveillance octopus.
By entering into devil’s pacts with the world’s “sole superpower,” giant telcos and internet firms view the destruction of privacy rights as just another item on the balance sheet, a necessary cost of doing business in America.
And business is very good.