You may be reading this article in the privacy of your own home, but somewhere in a National Security Agency control center your every move is being tracked. What time you logged on this morning, the web site you visited, how long you stayed and even what you said in the comments section – all of it – has been cataloged and possibly even flagged for suspicious activity.
Several years ago, to the disbelief of many, we discussed the tracking and archiving capabilities of advanced monitoring systems being implemented by the government. We noted that everything you do on a daily basis is being tracked.
Since then, the government has further expanded their capabilities. In fact, their ability to monitor Americans has increased to such an extent that they’ve built a data center so massive that it can store over a yottabyte of information; that’s 1 trillion terrabytes, or about 100 trillion high definition DVD’s worth of information. The NSA’s new data center is such a game changer, that it prompted one whistle blower to come forward:
Domestically, they’re pulling together all the data about virtually every U.S. citizen in the country and assembling that information, building communities that you have relationships with, and knowledge about you; what your activities are; what you’re doing.
We’re talking about every digital data bit in existence here. If it crosses an internet pipeline (and that includes your phone calls), it’s being logged.
Many Americans may not realize this, but nothing that you do on your cell phone or on the Internet will ever be private again. According to the Washington Post, the NSA intercepts and stores an astounding amount of information every single day…
Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.
But even the Washington Post may not have been aware of the full scope of the surveillance. In fact, National Security Agency whistleblower William Binney claims that the NSA has collected “20 trillion transactions” involving U.S. citizens…
In fact, I would suggest that they’ve assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens.
What’s even more frightening is not that they can log and cross reference this information, but that they have the ability to monitor these data flows in real-time.
What does this mean?
As noted by Liberty Blitzkrieg, it means that all digital communications – that includes phone calls, text messages, emails and even live internet chat – are being actively monitored and captured, and they can be recalled at the push of a button.
This isn’t some new and emerging technology; it’s happening right here and now.
It’s not just a theory. It’s fact. It has been confirmed time and again, most recently by former counter intelligence FBI agent Tim Clemente:
On the National Security side of the house we have assets. There’s lots of assets at our disposal throughout the intelligence community. And also, not just domestically but overseas. Those assets allow us to gain information and intelligence on things that we can’t use ordinarily in a criminal investigation, but are used for major terrorism investigations or counter-intelligence investigations.
I’m talking about all digital communications are… there’s a way to look at digital communications in the past. I can’t go into detail of how that’s done or what’s done.
I can tell you that no digital communication is secure. These digital communications will be found out, the conversation will be known.
What’s more is that they are not logging this information just for the heck of it. They are using advanced algorithmic systems to cross-reference all of this information in such a way that they can easily connect the dots to determine everything from your purchasing habits to who you hung out with at the local watering hole yesterday evening.
And before you say, ‘well at least they don’t know what I was talking about when hanging out with friends last night’, understand that in all likelihood you have a personal monitoring device right in your pocket or purse. Should an interested party have reason to do so, they can easily activate the microphone and camera on your cell phone without your knowledge, so everything you say in confidence during a private conversation can be listened to by a third-party without your knowledge. This covert listening technology has been available to the FBI and other agencies for at least a decade.
The real question is, why does the government need these capabilities? They’ll argue that it’s to protect America from terrorists. But considering that that we’re talking about the real-time, 24/7 surveillance of every single citizen in this country, one has to wonder whether there is an ulterior motive.
Couple this with the massive ramp up in the militarization of domestic police forces across the United States, and the only answer that makes sense is that elements within the U.S. government are pursuing a strategy that aims to completely lock this country down and move it from a Republic in which an individual is free to do as they please without interference from the State, to a tyrannical regime where our every move and conversation is monitored to ensure our actions are not subversive to the control infrastructure.
In due course this fairly passive surveillance may well be utilized to identify “domestic terrorists” as broadly defined by the Patriot Act. Once an individual or group has been marked as extremist, the next order of business will be to detain them “legally” under the National Defense Authorization Act, which allows the government to seize an American citizen and hold them indefinitely without charge or trial.
Of course, they’d never do such a thing and something like that would require massive prison camps to be a viable strategy. And we all know those don’t exist. They’re also not stocking up billions of rounds of ammunition.
Click here to subscribe: Join over one million monthly readers and receive breaking news, strategies, ideas and commentary.
Please Spread The Word And Share This Post
Mac Slavo Views:
Read by 10,347 people Date: May 8th, 2013 Website:www.SHTFplan.com
Copyright Information: Copyright SHTFplan and Mac Slavo. This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to www.shtfplan.com. Please contact us for permission to reproduce this content in other media formats.
The content on this site is provided as general information only. The ideas expressed on this site are solely the opinions of the author(s) and do not necessarily represent the opinions of sponsors or firms affiliated with the author(s). The author may or may not have a financial interest in any company or advertiser referenced. Any action taken as a result of information, analysis, or advertisement on this site is ultimately the responsibility of the reader.
SHTFplan is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.