Page 221 - Elana Freeland - Under an Ionized Sky
P. 221

microphone.
                   Someone in your neighborhood may have a wideband radio receiver with spectrum display,
               horizontal/vertical  sync  generator,  multi-scan  video  monitor  and  a  phased-array  antenna  with
                                                                                   68
               shielded cables (like a radio telescope) and video taping equipment;  or may have leased the
               Trailblazer  successor  to  ThinThread,  a  high-tech  surveillance  tool  designed  by  NSA
               whistleblower  William  Binney  to  intercept,  anonymize,  and  graph  metadata  according  to
               relationships and patterns.

                     It was around 2003 when they started putting optical fibers coming into the U.S. through Y-connector Narus devices.
                     Basically these would duplicate the data coming across the Internet—one set of packets would go the normal route,
                     the other set would go to NSA facilities. There, they collect all the data coming in through fiber optics, reassemble all
                     the data packets into useable information—emails, file transfers, etc.—and then pass it along for storage. That means
                     they are taking all that data off the fiber optic lines at 20 main convergence points in the U.S., collecting almost all of
                     the Internet traffic passing through the U.S. This gets them pretty much control over the digital world. 69

                   Time cloaking programs make whole data systems disappear into “time holes”:


                     This cloak works using a wave phenomenon called the Talbot effect. Manipulating the timing of light pulses so that
                     the crest of one light wave interacts with the trough of another creates a zero light intensity—where the two signals
                     cancel each other out—in which data can be hidden. 70


                   Over Homeland neighborhoods, armed fifty-pound ShadowHawk helicopter drones (General
               Atomics  and  Lockheed  Martin,  $300,000  each)  are  executing  low  fly-bys  while  in  wireless
               communication with whatever agency or corporation has been granted frequency command by
               measures and signatures intelligence (MASINT). DHS “public safety” surveillance drones and
               high-altitude  killer  drones—some  remotely  supervised,  some  programmed  to  be  fully
               autonomous—are making their rounds, as well.

                     . . .kill committee members from the National Security Agency, the Central Intelligence Agency, and the Department
                     of Defense act as the prosecution, judge and jury for “low-level” targets. The president, consulting his kill list, makes
                     the decision on “high-value” targets, including American citizens. 71

                   In  every  urban  or  rural  neighborhood  of  the  Homeland,  MASINT  is  being  collected  and
                                                                                                  72
               collated as infrared peers through walls and ceilings. Thanks to the 1968 Wiretap Act  amended
               in  1986,  wireless  eavesdropping  is  not  legally  considered  to  be  wiretapping.  War  is  peace,
               freedom is slavery, ignorance is strength. . .
                                                                                                  73
                   Beyond Carnivore (the Digital Collection System) and FinSpy hacks of iPhones,  there are
               dirty tricks programs like:


                     • ​Financial Crimes Enforcement Network (FinCen);
                     • ​Trapwire  surveillance  network  with  facial  recognition  run  by  Abraxas  (CIA)  and
                       Mail  Isolation  Control  and  Tracking  that  photographs  and  records  letters  moving
                       through the federal post office;

                     • ​Kapsch  TrafficCom  in-car  transponders  armed  with  in-  and  out-facing  mini-
                       cameras; 74
                     • ​FBI FANTOM tracking data in 3D patterns;
                     • ​Encoded  Apple  signals  commanding  wireless  devices  to  disable  recording
   216   217   218   219   220   221   222   223   224   225   226