5G AND BEYOND - COMMUNICATIONS - INFORMATION

  • 0 comments

I promise to work toward enforcing existing law and new laws to protect cyberspace privacy and GPS parity a manner that will not harm us nor compromise our government's obligation to maintain the security of our online communications and infrastructure. 

2 pounds platinum -- That's how much each 10G installation might require within two years, to stop jamming of USA and allies GPS superiority -- if not, experts imply, the devils we don't admit we know [as opposed to the devils we already know] would assuredly come to dominate continuous GPS monitoring and remote control functions through the back doors of our appliances, devices and vehicles.

Ridiculous maybe you say.  But if we don't accept the 5G and then potentially 10G increased radiation from our own, they imply, we'd acquiesce to eventually be subjected to higher radiation from a nation state who doesn't adhere to our language, law and customs - - or worse yet, be subjected to an internationally metastasized cabal of disparate money master elite who don't care about anyone's nation, language, law, customs, or even their own long-range survival.  And the further one sticks one's head in the sand the less it will hurt I suppose.

Maybe there should be a treaty, even a United Nations treaty, or a behind the scenes step back, in order to mutually govern microwave damage capability -- because after all, the constitutions of our state, federal and allies exist to protect us from them all operating to protect us in secret.

How we got where we are today.

According to the Fourth Amendment, the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

But based on reports of the number of domestic phone calls recorded by the National Security Agency, one would think the government must have probable cause to suspect millions of us of threatening national security.  One American program, code-named “Boundless Informant,” as well as similar programs of other nation states, involves the monitoring and recording of phone calls and Internet communications while allowing users to select a country on a map and view the meta data volume and select details about the collections against that country.  Among the most disturbing disclosures found within reams of whislteblower revelations over the past decade, has been the surrender by major telecommunications companies of the otherwise private phone records of millions of Americans — none of whom was, as required by the Constitution, suspected of committing any sort of crime.

According to a court order labeled “TOP SECRET,” federal judge Roger Vinson ordered Verizon to turn over the phone records of millions of its U.S. customers to the NSA.  The order, issued by the U.S. Foreign Intelligence Surveillance Court and leaked on the Internet by The Guardian, compelled Verizon to provide these records on an “ongoing daily basis” and to hand over to the domestic spy agency “an electronic copy” of “all call detail records created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls.”  This information includes the phone numbers involved, the electronic identity of the device, the calling card numbers (if any) used in making the calls, and the time and duration of the call.  In other words, millions of innocent Americans have had their call records shared with a federal spy agency in open and hostile defiance of the Fourth Amendment’s guarantee of the right of the people to be free from such unreasonable searches and seizures. But even if the reasonableness threshold is crossed, there must be a warrant and suspicion of commission of or intent to commit a crime. Neither the NSA nor Verizon has asserted that even one of the millions whose phone records were seized fits that description.

All information is being automatically recorded and stored on each of us.

It is classed as “metadata,” or transactional information, rather than communications, and so does not require individual warrants to access.  Perhaps the most disturbing take-away from the leaks of the secret court documents ordering Verizon to hand over customer call logs and other data to a federal surveillance agency is the fact that the government considers the protections of the Fourth Amendment to be nothing more than a “parchment barrier” that is easily torn through. The lawyers for the Obama, Bush and Clinton administrations before it, apparently regarded the Constitution as advisory at best.  This of course to maintain parity or superiority to other nation states' telecommunication and GPS monitoring programs.  

Privacy is a basic human right.

As reported by the Washington Post, under a program formerly called  PRISM, the NSA and the FBI “tap directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.”  One document in the Snowden revelations indicated that PRISM was “the number one source of raw intelligence used for NSA analytic reports” -- so invasive that the NSA and the FBI “quite literally can watch your ideas form as you type.”  Most of these requests by the government are made under the authority of the Foreign Intelligence Surveillance Act (FISA).  Not surprisingly, when the government asks the special surveillance court to approve their snooping, judges most always give them the go-ahead.

Another program named “XKeyscore,” monitors and records every e-mail written by every American, again without a warrant and without probable cause, in direct defiance of the Fourth Amendment.  XKeyscore covers nearly everything a typical user does on the internet,’ including the content of emails, websites visited and searches, as well as their metadata. Analysts can use XKeyscore and other NSA systems to obtain ongoing ‘real-time’ interception of an individual’s internet activity.  Another program, named "DNI Presenter" is used to read stored emails, and the content of Facebook private messages. Analysts also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.  Of course, there is no doubt that mobile phone conversations are being robotically recorded.  It is not only possible for our federal government, and governments of other nation states depending upon their ability to dominate microwave bandwidths, to listen to your conversations using the microphone in your cell phone and watch you while you sit in your own home on your own computer, but they do so very easily.

Details of surveillance conducted under the Boundless Informant program provided by the website Cryptome are illuminating and incriminating.  There is no excuse for this type of unconstitutional sanctioned surveillance, particularly when the global intelligence community has grown so enormous that bad apple private contractors regularly use inside information to wrongfully scheme against us or our neighbors.  International hedge funds for instance, hire intelligence agents by increasing their salaries, in order to set up those they wish to take down, when unethical profit is their only true consideration.      

One unwarranted wiretap, one unwarranted seizure of a phone record, one search of records of an individual’s digital communications, one remote GPS interference with a vehicle, is one too many.  If we are a Republic of laws, then the supreme constitutional law of the land must be adhered to. The standard is not whether or not the spies or their bosses think the violations are keeping us safe.  The standard is the Constitution — for every issue, on every occasion, with no exceptions.  Anything less than that is a prescription for tyranny, manifest injustice and obliteration of the Constitution.

I promise to work toward enforcing existing law and new laws to protect our cyberspace privacy and GPS parity a manner that will not harm us nor compromise our government's obligation to maintain the security of our online communications and infrastructure. 

Share this:


Be the first to comment


Follow Us