HOW DO THEY SPY ON US?We’ve been aware that our government has engaged in warrantless wiretapping since the Bush Administration wheeled out the Patriot Act in the wake of 9_11. In fact, the foundational architecture for the entire Echelon program is much earlier than that. However it wasn’t until Edward Snowden stepped forward and unveiled the harrowing truths detailing the extent of abuse at the highest levels that this conversation was finally mainstreamed. Thus many revelations continue to overflow into the public eye. Revelations like the existence of the Five-Eyes Alliance.
The Five-Eyes Alliance was born under the umbrella of an international surveillance program called Echelon in the post World-War-Two world. This ultimately manifested in the creation of five separate intelligence gathering agencies around the world, including the U.S.’s National Security Agency (NSA), Communications Security Establishment Canada (CSEC), the UK’s Government Communications Headquarters (GCHQ), Australia’s Signals Intelligence Directorate (SID) and New Zealand’s Directorate of Defense Intelligence and Security (DDIS). Today, the Five-Eyes Alliance is a supranational intelligence organization that doesn’t answer to the laws of any of the countries it is based in, and is ultimately well beyond any legislation. One of the advantages of this system -for the intelligence community at least- is the ability to circumvent national law; the NSA doesn’t necessarily collect data from Americans if the courts say it is illegal to do so, but there is nothing stopping the NSA, legally speaking, from trading the same information gathered instead by GCHQ.
Echelon computer centers are located around the world, including Royal Air Force Menwith Hill near Harrogate, North Yorkshire England; Pine Gap, near Alice Springs in Australia, and HAARP. Echelon is composed of a vast network of listening posts and spherical ray domes, combined with extremely sophisticated computers, and composed of an enormous number of people, dishes and taps to capture every communication via internet, GSM, UMTS, land lines, TV and radio broadcasts, Satellite communications; private, military and diplomatic - and listen to every word. Computers analyze keywords, which if triggered are handled to human specialists. While most of these stations are staffed exclusively by CIA and NSA analysts, thousands upon thousands of private contractors are employed by NSA in a private fashion; organizations like Snowden’s former employer, Booz Allen Hamilton.
It was private contractors that both the NSA and GCHQ hired in efforts to plant agents into the online game World of Warcraft to spy on gamers. According to Russia Today:An NSA document from 2008 titled, “Exploiting Terrorist Use of Games & Virtual Environments” leaked by Edward Snowden, warns of the risk of leaving game communities under-monitored and described them as a “target-rich communications network,” where intelligence targets could, “hide in plain sight.”In a similar way, other high-traffic intersections of the internet such as facebook are subject to corrupt power abuses within a cyber security culture radically off course from any public good. In fact facebook users have helped program the new, cutting-edge Facial Recognition Software now being developed as yet another security feature in a vast ocean of security culture. It turns out that by “tagging” friends and acquaintances in photos uploaded to facebook, millions upon millions of facebook users worldwide have unknowingly participated in the creation of facial recognition software. Facebook also stands out as a prime example of the only thing that limits these programs and organizations, namely: Policy. Law has always been an art of Word Magic, which is another reason that Policy is technically separate from Law. Regardless of what is Legal, Policy is the only limitation to the corporate spy networks vying to kill the free internet at all cost. According to facebook’s privacy policies, photos you upload can be used in advertisements without compensation or consent unless you find out about it and opt out in writing.
Even more shocking still is the ability for surveillance agents to tap mobile devices even when no calls are being made, activating the microphone to listen in on whatever conversations are near the device. The small microphone in your cell phone can be cued with a feature called, “Hot Mic,” to listen in to conversations happening near physical proximity and thus ear shot of your wireless devices. The same can be done with the cameras in mobile devices, with a “Camera Capture,” feature, available exclusively at the offices of NSA. Now similar microphones and cameras are being installed in most new electronics, from dishwashers and microwaves to boom boxes and smoke detectors. Even your X-Box is spying on you.
GCHQ and NSA have actively spied on people in their own homes by tapping into web cams, laptop microphones, even your X-box. The program is called Optic Nerve, which collected photos and sound bytes from nearly 2 million Yahoo users. Much of the material was purportedly sexually explicit material, according to the London Guardian’s Spencer Ackerman and James Ball:"GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not." 
The walls have ears, and every NSA analyst is familiar with the X-KEYSCORE intelligence search engine, which collects every aspect of every person’s internet traffic, and enables activity deemed by analysts to be tagged, monitored, tracked and even attacked at the stroke of a key - the click of a mouse. And all of this is possible without a court. Any website traffic can be watched, any laptop can be followed, any Email can be read.
There is a trinity, so to speak, of programs used by NSA on this front. The first is called TURMOIL which is known as a passive signal intelligence interception and collections system. Next comes something called TURBINE, which instead of inspecting information the way Turmoil does, TURBINE instead injects information to orchestrate attacks.
The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010, according to a Wednesday report. And at times the agency pretended to be Facebook to install its malware.
Plugging TURMOIL and TURBINE together is a third program called Q-FIRE, which programmatically automates attacks on individuals based on internet traffic. Q-FIRE uses TURMOIL to watch, TURBINE to attack, and does so automatically, without the assistance of a human analyst. Q-FIRE also compromises everyone’s router and directs through them to beat the speed of light as a race condition to localize attacks worldwide.
Next are the Quantum Series of programs, which determine whether your computer is vulnerable enough to break in to, and if so does so:
- Quantum Theory - is an arsenal of exploits, specifically implants that die after 30 days.
- Quantum Nation - commandeers your computer to see if you have host based intrusion detection systems like Tripwire or Aide to detect the presence of hackers.
- Quantum Bot - hijacks Internet Relay Chat bots (IRC). Interestingly, this program has the potential to stop a lot of bot net attacks, but the NSA have decided to maintain those capabilities.
- Quantum Copper - is seen as perhaps the scariest of the Quantum series because it can corrupt file downloads. Copper can interfere with Transmission Control Protocol/Internet Protocol (TCP/IP) which provides communication between separate internet devices. Copper could create the Great Firewall of China for the entire planet. Copper could kill every anonymity system that exists by forcing them to reset automatically, just like China does.
- Quantum Insertion - is a Quantum version of what is known as the Man-on-The-Side attack, to insert information packets by posing as the target website. Notably, you can block Insertion if Transport Layer Security (TLS) is present on your system.
To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook.
The federal agency performed what is known as a “man-on-the-side” attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user’s computer and extracted data from their hard drive.
Facebook said it had no knowledge of the NSA”s TURBINE program, according to the National Journal.
The NSA is capable of installing different kinds of malware, each capable of performing different tasks. According to the report, certain malware can:
- Use a computer’s microphone to record audio
- Use a computer’s webcam to take photos
- Record a computer’s Internet browsing history
- Record login details and passwords use for Web services
- Log users’ keystrokes
- Extract data from flash drives when they are plugged into infected computers
- Block users from accessing certain websites
- Corrupt files that computers attempt to download 
The NSA has fifteen years of data retention, but sometimes jobs are just too difficult for them. In such situations, NSA turns to the United Kingdom’s GCHQ, which is home to the extremely powerful Tempora Program. Malicious hackers, criminals, racketeers, pirates and bad governments operate like thieves who want to break in. A skilled thief always checks the doors of potential targets prior to breaking in, and chooses the door with the fewest locks, or the easiest locks to pick. Unfortunately, Government approved and unregulated dragnet surveillance systems are designed for at-scale exploitation to conduct fishing crusades instead of targeted attacks. Even major corporations like AT&T and Apple willingly install secret computer gear designed to spy on internet traffic. If you’ve ever thought that you have nothing to hide, therefore no reason to care, or you’ve pondered that there’s no way they’ll ever find you because you don’t think you’re interesting, think again; Systems like the Marina System should serve as a sobering reminder to the contrary. It stores webcam photos, contacts, emails, and more, and then links everyone you know and interact with together to create a fingerprint that is unique to you and your internet/worldwide presence. Therefore, you cannot hide from these programs and believing that you won’t be found is a fallacy.In light of all of this, the reason Edward Snowden stepped forward had more to do with how public perception is managed by means of public relations.
In a recent interview posted by BenSwann.com:He [Edward Snowden] states that his “breaking point” was “seeing Director of National Intelligence, James Clapper, directly lie under oath to Congress” denying the existence of a domestic spying programs while under questioning in March of last year. Mr. Snowden goes on to state that, “The public had a right to know about these programs. The public had a right to know that which the government is doing in its name, and that which the government is doing against the public”
Jacob Appelbaum tells us that these systems exist in part because we have been kept intentionally vulnerable for the benefit of major corporations to sabotage other companies.
So how can you protect yourself from the Orwellian totalitarian oblivion? For starters it is probably a good idea to take the Electronic Frontier Foundation’s advice and keep a sticker pasted over the webcam of your laptop. Whenever possible, use a shielded hardline, protect your WIFI, and keep an old telephone modem in your possession. Remember that the best way of communicating anonymously is by not communicating at all. Protect yourself from social and technical hacking. Be aware of Malware, Ransomware and Adware. Defend against what agents in the biz refer to as “Remote Access,” and “Interdiction.”
Total online anonymity can be achieved if you change your internet browsing habits by using encryption relay stations like Virtual Private Networks, proxies, TOR, Firefox web browser in private mode, using extra secure layers, and securing and encrypting computers to the maximum. Encrypt your data and anonymize your computers and the paths inside them, by changing the Media Access Control Addresses (MAC) of the individual parts of the computer by using programs like SMAC or TMAC.
And then there is the TOR Network. In the rhymes of Robert Foster, “The TOR Onion represents a Similé for Anonymity that works Considerably against Tyranny but its Abilities only work if all you all use it Consistently.” And if you’re not using TOR, run it and expand this free network trusted by journalists and whistleblowers alike.
But what about all the things you can’t do with TOR, like downloading files or streaming videos? Firefox is the next best thing, particularly because it is written and programmed by those who want to keep it free, and thus hosts a ton of sweet add-ons like these  :
- DoNoTrackMe - blocks trackers and shows you how many trackers it has blocked on the site you are visiting and does so with remarkable accuracy described by Seth Rosenblatt of CNET Editor’s review as the “finely honed katana” of “Internet-protecting add-ons.”
- TubeStop - Prevents advertisements from playing on youtube videos. Tubestop also prevents videos from automatically playing when your browser window access it
- Privacy Protector - removes all traces of your browsing history
- NoScript - stops all scripts from running, preventing malware and clickjacking attacks that work by injecting scripts into webpages that you don’t even know are there
- FoxyProxy - accesses blocked pages through slower proxy servers while maintaining your normal connection speed
- anonymouX - enables internet anonymity by routing signal through different IP-Addresses, similar to TOR
- Ghostery - enables you to see who is tracking your web browsing, and to block them
"For email, we can start by dropping Gmail, Outlook.com and Yahoo Mail (Yahoo sucks anyway). There are many useful alternatives, including Hushmail, BitMessage and Riseup, all of which encrypt your emails. Personally, I have started using Yandex Mail, which is a Russian company based in Moscow – if anyone’s safe from the NSA’s eyes, it’s gotta be them, surely. (To switch email providers without any fuss, you can read my post here.)”
We recommend using the free email client Thunderbird, the free program GnuPG and the free Thunderbird plugin Enigmail to set up your own encryption. Users who want to go this route, however, must be willing to do two things. First, they have to give up using email providers like Gmail directly from their Internet browsers. And second, they must be willing to spend a bit of time getting the encryption method set up and not be easily put off by some new terminology. Once the encryption system is set up, sending and receiving encrypted emails is easy. 
For those who don’t use encryption, emails are about as private as postcards. Their content can be intercepted and read by third parties, curious employees of the email provider, for instance, or intelligence analysts.What’s more, anyone with the password to a user’s email account, be it a hacker or a disgruntled ex, can read emails they find in this account. That’s why anyone who values their email privacy should use encryption. It’s just that most people don’t take the time.
Last but certainly not least, all these encryption and proxy methods are relatively obsolete if we’re running Operating Systems that are tied up with major technology companies that are in bed with the Five-Eyes Alliance/PRISM-Industrial Complex (Windows, Apple OS X, Google Chrome). Open-source alternatives, like Ubuntu, Debian, and the ever-popular GNU Linux, may seem like an inconvenience at first, but they’re absolutely essential if you’re serious about anonymity. The only hurdle is your own potential, since these Operating Systems are completely free of charge. The most popular name brands, hosting services and Email providers are “free” for very different reasons that open-source technology is Free, and the corporate world has default back-doors built into devices. The NSA is about as much a department of the Government as the Federal Reserve is. Corporations have been enthroned, and most of the NSA’s capabilities are used for the benefit of “National Interests” which translates to Corporate Profits.
On the political level are the noteworthy bills introduced by several US states to cut off water delivery to NSA sites, including Maryland, which remains to this day the home state of NSA’s Headquarters at Fort Meade. If passed, these bills would effectively shut down the NSA’s servers which require water feeds to prevent overheating.Whatever you do, above all else it is important to remember to Relax. Unclench your jaw, lower your shoulders, and accept that it is far worse than any of us could have ever imagined in our most terrible nightmares.
HOW MUCH DEEPER DOES THE RABBIT HOLE GO?
For every fact learned, we’re left with more questions than answers. We’re just now finding out about the NSA Howler Monkey implant chips with built in radio transmitters. We’re just now learning of the Bulldozer PCI Bus Hardware Implants. And for many, the CIA’s In-Q-Tel remains a mysterious subject.Perhaps most infuriating of all of Snowden’s revelations concerning the Draconian Surveillance Panopticon we see around us now, is the fact that it has never prevented a terrorist attack. If they have access to so much information, one might wonder how media event spectacles like Sandy Hook  and the Boston Bombing  were ever allowed to take place in the first place - unless these events were false flag events to justify further terror legislation and thus solidify more strength in the military industrial complex. There have already been extensive red flags and plenty of evidence of them. History can corroborate this, most notably from the 1993 World Trade Center bombing that was perpetrated by FBI agents conducting classified operations in New York City - many news outlets reported on the FBI’s involvement . The event didn’t create enough damage for them to pass the new terror legislation needed to bring the police state desired by the ruling class elites. Oklahoma city happened shortly thereafter, and the legislation was passed with little effort -legislation that was waiting for an event to be passed. Something similar happened with 9_11, probably most notably with the plans to invade Afghanistan that were drafted six weeks prior to 9_11. Now a new million-square-foot facility in the Utah desert set to begin operations this year will hold all the world’s information for the next hundred years. The real targets are activists, political enemies, ex girlfriends, but certainly not terrorists.
Because when you look around there really are no “terrorists,” at least insofar as the mainstream media would like you to believe as they hypnotically repeat the word again and again in print and on air. For the same reason the TSA has never prevented a terrorist attack. Terrorists are not Islamic boogie men hiding out in some cave beyond Timbuktu. More people die of peanut allergies than of Islamic terrorism. Christopher Titus put it most eloquently when he said:
"Let’s define ‘terrorist organization.’ A terrorist organization is an organization that makes you feel scared all the time and makes you change your behavior. What does CNN, Fox News, and MSNBC do all the time? That’s right. Wolf Blitzer? Terrorist. Glenn Beck? Terrorist. Nancy Grace? Terrorist."
The Military-Industrial Complex that carries out unconstitutional Wars, the Corporate Media Whores who justify those wars to John Q. Public, and the Bankers who fund both sides of every conflict all are Capital-Tee-Terrorists if there ever were any. They drop bombs on countries in peacetime, and send troops in times of war. Or as Abraham Lincoln put it, “The money powers prey upon the nation in times of peace, and conspire against it in times of adversity. It is more despotic than monarchy, more insolent than autocracy, more selfish than bureaucracy.”
Capital-Tee-Terrorists wear five-thousand-dollar suits, and use money and influence to divide the world against itself, for profit and power. They do this to extract resources and simultaneously emerge the rulers of us all by controlling the movement of resources and access to them. State Terrorism is the only kind of terrorism that ever produced mass casualties, be it false flag events or the wars they orchestrate. The “Terror War” is a war of terror, not on it. The “Drug War” is a war on Consciousness, not on inanimate objects. The “War on Cancer” declared also by Nixon, proposes to cure Cancer with other things that cause cancer (Chemo, Radiation and Surgery). There is a War on everything when you sit down and think about it. But the deadliest form of warfare we know of, could be termed Financial Terrorism. Rigging the game starves entire societies, forces indigenous people to move into cities, and creates waves of debt slaves. Waged unilaterally, the deadliest form of violence is and has always been poverty.
 What Are Your Options Now For Secure Mail? Most of these are paid services, unfortunately:
 Here are a few sites that won’t spy on you in a brilliantly titled articled called, “How To Get Out of Prism, and avoid NSA Spying:”
 How To Encrypt Emails:
 Western Spy Agencies build ‘Cyber Magicians’ to Manipulate Online Discourse:
 GCHQ Power Point Instruction - The Art of Deception: Training for a New Generation of Covert Operations:
 After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices.
 Whistleblower Exposes Fusion Centers:
 Robby Parker Interview - supposed recently bereaved father laughing prior to hyperventilating to get into character for the cameras at the Sandy Hook press conference:
 Truthseeker with Daniel Bushell - What You Aren’t Being Told about the Boston Bombing: http://www.youtube.com/watch?v=GcxmAunB4Ck
http://www.youtube.com/watch?v=lwiF20xvodo How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations:
 How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations: