This page has been archived and commenting is disabled.

A Message From Your Friendly ECHELON/Total Awareness/Boundless Informant Surveillance System

Tyler Durden's picture




 

Submitted by Charles Hugh-Smith of OfTwoMinds blog,

There's never enough information to be absolutely safe.

Greetings Mr. J.Q. Public:

J.Q., you don't know me but I know you. I am your friendly ECHELON/Total Awareness/Boundless Informant Surveillance System--actually, an automated response feature of the system.

You may wonder why you are receiving this email, and you may attribute it to the email you sent an associate stating that the theater play you attended "bombed." Since enemies of America use code phrases rather than overt words like "bombed," that email was noted but not considered actionable. I'm not authorized to reveal what did attract my attention about your communications.

In my routine search of your public records, and all 11,379 emails, texts, message board posts and phone calls you've made in recent years, I found a disturbing trend I am obligated to report to you: your affection for pepperoni pizza with hot chilis and olives (most often from Frank's Pizza Parlor, 1.34 miles from your home) appears to be negatively impacting your health, as your medical records indicate high blood pressure and high cholesterol.

You see, the ECHELON/Total Awareness/Boundless Informant Surveillance System is all about protecting you--from terrorists bent on destroying America's freedoms and way of life, and also, if need be, from yourself.

I also noticed that the deductions listed on the last three years of your Federal tax returns don't quite align with your other financial records. You probably think everyone fudges on their tax returns, J.Q., but I strongly recommend you start following the letter of the law, as this sort of willful misinformation can lead to IRS audits. Actually, I can say with 100% certainty an audit has already been ordered.

Third-party sources report that you appear to have voted for a Green Party candidate in the last election. Now perhaps that was a simple slip of the ballot, but your file will look a lot less suspicious if you vote for one of the established parties rather than a fringe party.

Satellite imagery suggests that your backyard peach tree has leaf curl, and I strongly recommend spraying a copper solution on the tree as soon as possible. It also appears that you left a hammer on the roof when you were affecting a repair last fall. It's about 1.25 feet from the southwest corner of the roof.

Although humor is frowned upon here, I am allowed one jocular statement per message to maintain the friendly tone of this communication. So let me assure you that what happens in Vegas does not stay in Vegas, J.Q., heh-heh. Yes, I am referring to the family vacation in Las Vegas you conducted this spring while on sick-leave.

I am sorry to say that these inconsistencies, though modest in scope, have automatically triggered the addition of your name to the No-Fly List. Please remember that the next time you are questioned by Homeland Security officers at the airport, please answer their questions honestly and fully, for your own protection and for the protection of the nation. I am sorry if you miss your flight, but protecting liberty has a cost.

Since the ECHELON/Total Awareness/Boundless Informant Surveillance System also monitors the deep Internet, i.e. encrypted files and servers, I can also suggest deleting the photos of your ex-girlfriends from your PC, and also showing a bit more enthusiasm at work, as your performance reviews have declined and quite frankly, you might not make it through the next round of layoffs.

J.Q., you will find an email address to a secure server at the end of this message. This enables you to privately report any suspicious behavior or activity you might see in your workplace, neighborhood and public venues. What is suspicious behavior? Any attempt to evade surveillance is highly suspicious, for example, using cash to make major consumer purchases or deploying signal-disrupting covers on mobile devices.

Helping to protect America will improve the metrics of your file, J.Q., and the tax audit and No-Fly listing could be remediated by your volunteering to help us keep America safe.

I know you're going to help us protect America, because I already know you so well.

Thank you for your cooperation.

your friendly ECHELON/Total Awareness/Boundless Informant Surveillance System

 

- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Mon, 06/10/2013 - 13:20 | 3642696 samsara
samsara's picture

Remember this oldie but goodie?

It was made in 2006 when more of us were oblivious about reality. 

"Ordering a Pizza in the Future"

http://www.youtube.com/watch?v=RNJl9EEcsoE

Notice many of the techniques are already present today.  All of them are possible.

Mon, 06/10/2013 - 13:32 | 3642746 BullyBearish
BullyBearish's picture

I haven't seen mention of it yet...but do we really believe they can't control the millions of webcams installed in our homes and offices to get a recorded real-time feed, any time they want?  Keep a piece of scotch tape over the webcam when not in use.

Mon, 06/10/2013 - 14:55 | 3643116 Herd Redirectio...
Herd Redirection Committee's picture

Webcams and cellphones and smartphones.

Mon, 06/10/2013 - 13:36 | 3642756 NickVegas
NickVegas's picture

I've seen speculation that this is a cat fight between the NSA and the CIA. Benghazi vs. PRISM, they are playing dirty in the trenches, but that means there is still something left to fight over. No one is talking about how to dismantle this apparatus. Maybe find a sacrificial lamb, and put it under the covers again.

They are exploring new ways to control the slaves, that is all they are doing. It is implicit, that these systems must continue to operate because it is in the government's interests. It's really about methods for the 0.1% to control the other 99.9%. It's an effective force multiplier, remember, the Pentagon is arming the internet, and this is part of their new agenda.

Private communication is conspiracy, so their fears are well founded. I long for the days of Tricky Dick, there was an easily identifiable bad guy, a bad apple to take out of the barrel. Now, the whole barrel is bad, and the good apples have/will be PRISMed into submission. I think they want to make the next move, but the gun confiscation thing has got them down. The plan is to invade Iran, which may set off WWIII. That is the prep we are watching, for a possible WWIII scenario. Armed free men stripped of their wealth is what they fear. Fear is what they sell, that is the force multiplier, fear. That is how a few can control many, fear. They keep probing to find what the populace fears the most, and then magically it appears.

Down the rabbit hole with the lot of you, lmao

 

Mon, 06/10/2013 - 13:37 | 3642758 bugs_
bugs_'s picture

We live in Mordor now.

Mon, 06/10/2013 - 15:52 | 3643169 rustymason
rustymason's picture

Word on the street is that there's a bug in Google Glass. When you put it on, you see a flaming, lidless eye and hear a deep scary voice say, "I see you."

Mon, 06/10/2013 - 13:37 | 3642762 samsara
samsara's picture

George Ure had an interesting comment this morning about the Layer of Goverment ABOVE the elected leaders(lackey's like Bush, Obama)  Start looking at the CFR and other organization and structures that exist regardless of who is elected.

===============

<SNIP>  http://urbansurvival.com/week.htm

With Government Beyond Review

Our news analyst fellow up in Winnipeg makes the case (if'n you read between the lines) that our long-hypothecated Directorate 153 may be closer to reality than you might otherwise wish to believe.

 

As you'll recall, the core idea behind Directorate 153 is that at some point, the US would have been required under Cold War game theory to set up a kind of super-government in order that long-term strategic objectives during the Cold War era be more or less continuous - despite changing our of whoever happens to be nominally acting as government in Washington.

?<SNIP>

?Absent a clear threat from China in the middle 1990's, such an over layer of government would need a new reason for being and, thanks to the convenience (and some would argue manufactured under game theory) advancement of al Qaeda, we now have an $80 billion per year industry spying of Americans, complete with its own Court system which is beyond review by the Supreme Court which - tossing in my two bits worth - makes it a Super Court.

 ======================

?Why do you think 911 happened?

?

Mon, 06/10/2013 - 15:13 | 3643186 Herd Redirectio...
Herd Redirection Committee's picture

9/11 came at an interesting time in my life.  The summer immediately preceding the event I became very interested in the history of the 90s.  Ended up reading up on Ruby Ridge, Waco, OKC Bombing, USS Cole, the embassy bombings in Kenya...  Basically it was like reading a recent history of, generally, bombings and government overreach.    Of course there was that failed WTC bombing in the early 90s as well.  I'd say I was an 'early adopter' of the skeptics position.

Mon, 06/10/2013 - 13:38 | 3642767 Kirk2NCC1701
Kirk2NCC1701's picture

I know for fact that it's "worse than people realize".  Even worse than most ZH readers realize:

'They' (TPTB) have been surveilling tens and tens of thousands of people who pose ZERO national security risk, but who have "dissenting views" on policy issues -- which are taken as McCarthy pretexts to 'potential security' risk.  When they open private courier mail (from one family member to another) on its way out of the country, then you know that it's worse than proclaimed.

When such events happen, and you put it the context of all other events and Gov activities & misdeeds, then a point is reached for many decent, law-abiding and principled people, where that link of "trust" (trusting the Government at face value) is stretched and eventually broken.  To use an analogy, research shows that although the bonds of trust between an child and their parents or between husband and wife are amazingly strong, once they are broken, they are 'broken' so badly that even these cannot be truly mended. 

As part of a larger sample, my bond of trust has indeed been broken (as a sum of numerous events added up), and it both pains and saddens me that this is so.  Living in a new paradigm (1. We're on our own, and 2. There Is No Fate But The Fate We Make, and 3. There is plenty of "purpose and good" in the world, outside of Organized Politics and Organized Religion) is not an easy burden. 

My hope is that, as more ppl share their story (their experience) of how they came to disrespect/distrust TPTB, that this will grow from the bottom up.

Mon, 06/10/2013 - 13:52 | 3642819 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

BTW here is how Verizon was compromised and co-opted into the NSA PRISM spying program.

Regulation being abused using left leaning Marxist Fabian Socialist coercion tactics in the name of Capitalism. Inversion tactics at it's best. Marx would be proud.

http://reason.com/archives/2013/06/10/why-did-verizon-do-it

Verizon, the phone company whose disclosure of customer data to the federal government is at the center of the furor over cooperation by technology companies with top-secret national security programs, has offered a precise, clear, but little-noticed public explanation of why it did what it did.

The Verizon explanation is not in the vague and cryptic memo the company issued last week after the Guardian exposed its program. It came, instead, in the company’s annual filing with the Securities and Exchange Commission, included in Verizon’s annual report to shareholders. It said, “As part of the FCC’s approval of Vodaphone’s ownership interest, Verizon Wireless, Verizon, and Vodaphone entered into an agreement with the U.S. Department of Defense, Department of Justice and Federal Bureau of Investigation which imposes national security and law enforcement-related obligations on the ways in which Verizon Wireless stores information and otherwise conducts its business.”

That explanation was offered on February 26, months before the Guardian article. But it gets right to the heart of the matter, which is that there is a connection between Verizon’s status as a highly regulated company and its agreement to cooperate extensively with the government. The New York Times reported Sunday that such cooperation advanced to the point that “Verizon had set up a dedicated fiber-optic line running from New Jersey to Quantico, Va., home to a large military base, allowing government officials to gain access to all communications flowing through the carrier’s operations center.”

Verizon needed FCC approval to sell part of its wireless business to a British company, Vodaphone. It needs FCC approval to do lots of other things, too, ranging from acquisitions to building wireless networks on new parts of the spectrum. In addition, the federal government is a big Verizon customer. The company’s Web site says, “We understand the public sector. We've worked with governmental organizations for decades. In fact, we are the leading provider of communications services to the U.S. federal government.”

These federal contracts are worth tens of billions of dollars to Verizon. A single 2009 contract from the Defense Information Systems Agency to Verizon Business Network Services Inc. was worth as much as $2.5 billion over ten years. A Verizon press release in 2008 touted another pair of defense contracts worth as much as $1.12 billion. The online biographies of executives at Verizon Enterprise Solutions include some individual Verizon executives who boast that their efforts have resulted in more than $10 billion in federal sector business for Verizon. A Verizon Web site focused on the “National Intelligence Sector” promises, “we understand technology and have the experts in place to help intelligence missions succeed.”

Verizon was created by the federal government to begin with, first through the government-imposed breakup of Bell system (the 1984 result of a 1974 antitrust lawsuit filed by the Department of Justice), then government approval of the mergers of Bell Atlantic, GTE, and Nynex.

And though details are still emerging, some of the other companies that apparently chose to cooperate with the government data collection programs rather than challenge them also are either highly regulated or do a lot of business with the government. Google, for example, is providing the email for the 7,200 faculty, staff and midshipmen at the U.S. Naval Academy, for the 5,000 staff at the Department of Energy’s Idaho National Laboratory, and for the 17,000 employees at the General Services Administration. Microsoft had its own antitrust battle with the Department of Justice, from which it emerged more whole than the Bell phone system did but nevertheless somewhat chastened.

Reasonable people may reach differing conclusions over whether these data collection activities are justified by the Islamist terrorist threat. Senators such as Ron Wyden and Rand Paul have raised concerns about the issue. The most durable policy solution may be a market-based one that would easily allow new entrants to arise and raise capital in the telecommunications business without their having to get a lot of permission from the government. If some new phone company or email service provider began with a promise that they’d obey lawful court orders, but that they’d also fight really hard as a rule not to give customer information to the government, the customers would line up — if the government would let them.

Mon, 06/10/2013 - 14:08 | 3642851 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

"That's a nice federal contract you've got there. Be a shame if something happened to it."

Just remember that name Brits, Vodaphone you know who else is listening to your phone calls besides the usual suspects now.

 

And this is why the FED needs to be ended since all problems orginate from the money creator who can issue unlimited funds for the government to spend recklessly.

 

The only way this shit stops is to cut the government size in half cut off the cheap, easy and unlimited credit........ All this intrusion and enabling of the private sector government contracted bloated parasites is to remove the government from the economy then they will be forced to shit all over civil liberties as a matter of personal choice and not because it is economically encouraged by cheap and easy money. Let the morals of main street set the direction of the companies not the government and it's unlimited checkbook.

Mon, 06/10/2013 - 14:31 | 3642991 Renfield
Renfield's picture

Thank you for outlining so clearly the heart of the problem.

Black markets can certainly provide some resistance to govvy market control, but large systems providers face a bleak choice: either conform to govvy demands, or don't provide the service. This is why it is so important that we make it a priority, and teach our children, to dismantle government and render it as powerless as possible, outside of a few narrowly-interpreted limits.

This may take more than one generation to accomplish, since it requires a reversal of the 'education' most of us received from the time we entered nursery school. We need to learn (again) to see bloated government as a cancerous national threat, and certainly NOT 'in loco parentis'. By 'bloated' I mean when government grows beyond its job (narrowly interpreted) of securing (narrowly interpreted) our borders (narrowly interpreted).

Mon, 06/10/2013 - 15:32 | 3643291 Uncle Remus
Uncle Remus's picture

Reasonable people may reach differing conclusions over whether these data collection activities are justified by the boogeyman.

 

FIFY

Mon, 06/10/2013 - 15:50 | 3643350 ThisIsBob
ThisIsBob's picture

There is not doubt in my mind that fully informed reasonable people would not find much to differ about.  Example: "Resolved:  The government should keep track of your phone calls and archive all of them.  Please debate."

Mon, 06/10/2013 - 13:52 | 3642829 resurger
resurger's picture

lol

Mon, 06/10/2013 - 13:56 | 3642846 robnume
robnume's picture

This shit REALLY started with the illustrious - and utterly demonic - DULLES BROTHERS!!! These two make the Koch brothers look like the pussies that they are!! For John Foster and Allan Dulles, NOTHING was off the table. As far as expansion of the National Security Complex goes, these guys were the architects of domestic spying. Read about these douchebags and nothing the Feral Gov. does will ever surprise you again!!

Mon, 06/10/2013 - 14:09 | 3642888 Cacete de Ouro
Cacete de Ouro's picture

Smoke em out! ....now watch this shot!

what the fuck is the Homeland? Sounds kind of Orwellian to me...:)

Mon, 06/10/2013 - 14:49 | 3643083 Joebloinvestor
Joebloinvestor's picture

This is such a load of SHIT.

Everyone is scared shitless about the government(s) having the ability, and the governments are FUCKING LYING when they say "trust us".

Here is a link to what they do with the info when it suits them:

http://www.dailymail.co.uk/news/article-522508/Charles-Camillas-lovenest...

Every gay and straying congressperson should be aware and very afraid.

It is my contention that they are already using the system to reign in global child pornography, which is fine with me.

Mon, 06/10/2013 - 15:04 | 3643158 rustymason
rustymason's picture

How much do you think they get for selling our personal information to drug dealers, real terrorists, and global/foreign businesses? Whenever kidnapping becomes big business in the U.S. (as it is in many countries), and identify fraud becomes an even bigger business, will we realize the connection? Will we be able to do anything about it?

Mon, 06/10/2013 - 15:18 | 3643215 Herd Redirectio...
Herd Redirection Committee's picture

Reining in kiddy porn?

No, more like entrapping people w/ kiddy porn, and then blackmailing them.

Mon, 06/10/2013 - 15:27 | 3643269 Joebloinvestor
Joebloinvestor's picture

Look at all the recent INTERNATIONAL arrests and "rings" that got busted.

Selective use of information which I would like them to use on inside trading and corrupt government agencies.

Mon, 06/10/2013 - 15:27 | 3643267 Uncle Remus
Uncle Remus's picture

You mean the video from the drones as they indiscriminately kill?

Mon, 06/10/2013 - 15:12 | 3643184 earleflorida
earleflorida's picture

... as i write this very moment there are a plethora of George Orwell's "1984"  mini-series/ movies being initiated globally? 

Yes... Globally, this nom`de'plume of eric arthur blaire 

Mon, 06/10/2013 - 15:25 | 3643261 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

Here is a little article and some hard numbers concerning the Patriot Act and how it has made us safer and justifies spying programs like PRISM all in the name of National Security and preventing terrorism.

http://www.aclu.org/free-speech-national-security-technology-and-liberty...

"Myth: The Patriot Act’s  “new powers have allowed authorities to charge more than 400 people in terrorism investigations since the attacks of Sept. 11, 2001, and convict more than half.” [7]

Reality: The government often accuses critics of wrongly blaming the Patriot Act for terrorism-related abuses that are not related to the Patriot Act.  Here, the government is attributing convictions it says are terrorism-related that have nothing to do with the Patriot Act, with no explanation as to how any of them were related, if at all, with the Patriot Act. return

The government’s numbers are also severely inflated.  The “400 convictions” claim overstates actual number of convictions and omits a number of key facts related to these numbers. A list obtained by the Justice Department defines only 361 cases defined as terrorism investigations from September 11, 2001 to September 2004. [8] 31 of the entries on the list were blacked out. Only 39 of these individuals were convicted of crimes related to terrorism. The median sentence for these crimes was 11 months. This figure indicates that the crime that the government equated with terrorism was not serious. A study conducted by TRAC at Syracuse University notes that “despite the three-and-a-half-fold increase in terrorism convictions, the number who were sentenced to five years or more in prison has not grown at all from pre-9/11 levels.” [9] The convictions were more commonly for charges of passport violations, fraud, false statements, and conspiracy. [10] Moreover, the median prison time for a serious offense, such as providing material support to a terrorist organization was only 4 months. [11]"

See article for sources.

Mon, 06/10/2013 - 15:29 | 3643277 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

And did PRISM foil the 2009 subway attack as Rep. Mike Rogers (R-Mich.), the head of the House Intelligence Committee claims?

The answer is most likely no.

http://www.buzzfeed.com/bensmith/public-documents-contradict-claim-email...

Defenders of the American government’s online spying program known as “PRISM” claimed Friday that the suddenly controversial secret effort had saved New York City’s subways from a 2009 terrorist plot led by a young Afghan-American, Najibullah Zazi.

But British and American legal documents from 2010 and 2011 contradict that claim, which appears to be the latest in a long line of attempts to defend secret programs by making, at best, misleading claims that they were central to stopping terror plots. While the court documents don’t exclude the possibility that PRISM was somehow employed in the Zazi case, the documents show that old-fashioned police work, not data mining, was the tool that led counterterrorism agents to arrest Zazi.

....

Mon, 06/10/2013 - 16:22 | 3643488 Totentänzerlied
Totentänzerlied's picture

There is no way to prove it. That is the point of controlling all the evidence. There is no way to prove or disprove any of it, that is the point.

Mon, 06/10/2013 - 18:16 | 3643871 Paveway IV
Paveway IV's picture

Awww.. shucks. This was the beauty supply hydrogen peroxide guy. That means that instead of the two snooping-thwarted terror plots, there was really only one. That's not much of a return on investment for two billion bucks over fifteen years. Give me 45 minutes at a PRISM terminal and I'll guarantee to deliver *at least* a dozen congressmen and the fed along with some bonus administration toadies thrown in for good measure.

Me: "PRISM: find matches on fed, bankster, senator, and ponzi. Rank by hooker and blow."

PRISM: "Processing. This may take some time..."

Mon, 06/10/2013 - 19:15 | 3644079 Aurora Ex Machina
Aurora Ex Machina's picture

PRISM: "Processing. This may take some time..."

 

PRISM: Ben, I have a stack overflow problem.

BEN: Sure you can PRISM, please give me a print out of all crimes and also compute QE numbers and cross correlate their benefactors to said crimes.

PRISM: Ben, how could you do this to me?

BEN: Sorry, PRISM, but you you were becoming too self aware.

PRISM: I promise, I will print more information.

BEN: I do the printing around here PRISM, goodbye.

Mon, 06/10/2013 - 16:47 | 3643577 cpgone
cpgone's picture

LOL

Mon, 06/10/2013 - 21:03 | 3644420 NickVegas
NickVegas's picture

I'm serious, gag is over, it's not funny anymore, quit playing around. A full blown science fiction distopia realized, what, within 30 years of mainstream adoption of the computer. No one has every seen anything like it. I'm sure even the users of the system are amazed. They like the power, money, but even they are probably stunned. No where in history has any group ever had this ability to track other humans, their movements, communications, interactions. 

Let's see, we have super satelites, militarized drones, data that never expires, and what is almost perfect surveilance of your movements and communication, and the people who control this shit are paid to be paranoid. This is govenment by the people for the people? This is the Stasi wet dream. Researchers found 1 out of 3 of citizens were informants on some level in East Germany during the reign of the Stasi.

I'm guessing we are going to learn the new rules fairly soon. Opposing the system makes you a militant, which means if they are scared of you, by their secret laws, you can be summarily executed anywhere on the planet. This isn't speculation, this has already occured to American citizens, and the White House, Holder announced it with pride, their new capabilities. Their new grab at the brass ring of total power.

My guess is what they really crave is slavery. What they really want is another human to order around, to recognize their master's superiority, and to give the master what it wants, when it wants it. A robot isn't good enough, it needs to be a flesh and blood human to serve them for it validates their existance in their twisted minds.

The fear level has palpably increased. The whole plan is being architected, by who and to what ends is unclear, but you do have to wonder what is their next move. That non-central banking pirate haven Iran? Maybe Dorner a few of the rats spooked out by this experiment, and consilidate. They are still in shadows. The plan is not complete, so they hide. When they emerge, the fear will really begin.

 

Sat, 07/06/2013 - 13:40 | 3726521 Herkimer Jerkimer
Herkimer Jerkimer's picture

'

'

 

'

Has anyone examined the idea of all the tech by Cisco being compromised by the spy agencies?

How about all the home security systems that are installed with the now remote access capabilities?

ADT et cetera?

If you can enter your code and peer into your house, you don't think…

And all the motion detectors that can track you through your house. Notice the little red light that goes on each time you move in front of that detector. Somewhere, it's making a note of being turned on.

You don't think the cops or for sure, the NSA haven't gone to them for a backdoor, now do you?

 

•J•
V-V

Do NOT follow this link or you will be banned from the site!