Page 221 - Elana Freeland - Under an Ionized Sky
P. 221
microphone.
Someone in your neighborhood may have a wideband radio receiver with spectrum display,
horizontal/vertical sync generator, multi-scan video monitor and a phased-array antenna with
68
shielded cables (like a radio telescope) and video taping equipment; or may have leased the
Trailblazer successor to ThinThread, a high-tech surveillance tool designed by NSA
whistleblower William Binney to intercept, anonymize, and graph metadata according to
relationships and patterns.
It was around 2003 when they started putting optical fibers coming into the U.S. through Y-connector Narus devices.
Basically these would duplicate the data coming across the Internet—one set of packets would go the normal route,
the other set would go to NSA facilities. There, they collect all the data coming in through fiber optics, reassemble all
the data packets into useable information—emails, file transfers, etc.—and then pass it along for storage. That means
they are taking all that data off the fiber optic lines at 20 main convergence points in the U.S., collecting almost all of
the Internet traffic passing through the U.S. This gets them pretty much control over the digital world. 69
Time cloaking programs make whole data systems disappear into “time holes”:
This cloak works using a wave phenomenon called the Talbot effect. Manipulating the timing of light pulses so that
the crest of one light wave interacts with the trough of another creates a zero light intensity—where the two signals
cancel each other out—in which data can be hidden. 70
Over Homeland neighborhoods, armed fifty-pound ShadowHawk helicopter drones (General
Atomics and Lockheed Martin, $300,000 each) are executing low fly-bys while in wireless
communication with whatever agency or corporation has been granted frequency command by
measures and signatures intelligence (MASINT). DHS “public safety” surveillance drones and
high-altitude killer drones—some remotely supervised, some programmed to be fully
autonomous—are making their rounds, as well.
. . .kill committee members from the National Security Agency, the Central Intelligence Agency, and the Department
of Defense act as the prosecution, judge and jury for “low-level” targets. The president, consulting his kill list, makes
the decision on “high-value” targets, including American citizens. 71
In every urban or rural neighborhood of the Homeland, MASINT is being collected and
72
collated as infrared peers through walls and ceilings. Thanks to the 1968 Wiretap Act amended
in 1986, wireless eavesdropping is not legally considered to be wiretapping. War is peace,
freedom is slavery, ignorance is strength. . .
73
Beyond Carnivore (the Digital Collection System) and FinSpy hacks of iPhones, there are
dirty tricks programs like:
• Financial Crimes Enforcement Network (FinCen);
• Trapwire surveillance network with facial recognition run by Abraxas (CIA) and
Mail Isolation Control and Tracking that photographs and records letters moving
through the federal post office;
• Kapsch TrafficCom in-car transponders armed with in- and out-facing mini-
cameras; 74
• FBI FANTOM tracking data in 3D patterns;
• Encoded Apple signals commanding wireless devices to disable recording