+menu-


Top Secret Documents Leaked?

In 2013, a top-secret order issued by the United States Foreign Intelligence Surveillance Court, which was later leaked to the media.

Was there a top-secret  order on Russia issued by the United States Foreign Intelligence Surveillance Court  before the 2016 election?

MARCH 6, 2017 THEY ARE ASKING IF THERE IS ANY EVIDENCE OF COLLUSION?

—————————————————————–

September 5, 2016
U.S. intelligence and law enforcement agencies are investigating what they see as a broad covert Russian operation in the United States to sow public distrust in the upcoming presidential election and in U.S. political institutions, intelligence and congressional officials said.The aim is to understand the scope and intent of the Russian campaign, which incorporates ­cyber-tools to hack systems used in the political process, enhancing Russia’s ability to spread disinformation.The effort to better understand Russia’s covert influence operations is being coordinated by James R. Clapper Jr., the director of national intelligence. “This is something of concern for the DNI,” said Charles Allen, a former longtime CIA officer who has been briefed on some of these issues. “It is being addressed.”———————————————————————

MARCH 6, 2017 THEY KEEP ASKING IF THERE IS ANY EVIDENCE OF COLLUSION?

Activities authorized by Section 702 are subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. They involve extensive procedures, specifically approved by the court, to ensure that only non-U.S. persons outside the U.S. are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about U.S. persons.

HAS  ANY ACQUISITION OR RETENTION  OF INCIDENTALLY ACQUIRED INFORMATION FROM RUSSIAN FOREIGN INTELLIGENCE SURVEILLANCE  BEEN LEAKED AND DISSEMINATED  TO TARGET A U.S. PERSON, DONALD J. TRUMP BEFORE AND AFTER ,  HE BECAME PRESIDENT OF THE UNITED STATES OF AMERICA?

—————————————————————–

Read it again….

Activities authorized by Section 702 are subject to oversight

by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress.

They involve extensive procedures, specifically approved by the court,

TO ENSURE THAT ONLY NON-U.S. PERSONS OUTSIDE THE U.S. ARE TARGETED,

AND THAT MINIMIZE THE ACQUISITION, RETENTION AND DISSEMINATION OF INCIDENTALLY ACQUIRED INFORMATION ABOUT U.S. PERSONS.

————————————————————

TO ENSURE OUTSIDE OF THE U.S.

ENSURE by definition, make certain that (something) shall occur or be the case. make certain of obtaining or providing (something). make sure that (a problem) shall not occur.

———————————————————————–

AND TO MINIMIZE INSIDE THE U.S.A.

MINIMIZE  by definition: reduce (something, especially something unwanted or unpleasant) to the smallest possible amount or degree. represent or estimate at less than the true value or importance.

———————————————————————-

ACTIVITIES AUTHORIZED BY SECTION 702

BY THE FOREIGN INTELLIGENCE SURVEILLANCE COURT

MUST ENSURE  THAT THE ACQUISITION OF  ACQUIRED INFORMATION IN FOREIGN WIRE TAPPING AND SPYING OUTSIDE THE  U.S. SHALL NOT BE RETAINED.

AND ENSURE ALL INCIDENTALLY ACQUIRED INFORMATION INSIDE THE U.S.  SHALL BE QUASHED AS OUTSIDE THEIR PURVIEW OF ACTIVITIES AUTHORIZED BY SECTION 702 .

QUASH by definition:reject or void, especially by legal procedure.

PURVIEW by definition: the body or enacting part of a statuteb : the limit, purpose, or scope of a statute., the range or limit of authority, competence, responsibility, concern, or intention.

———————————————————————

Top Secret Documents Leaked

(June 6, 2013). “US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program”. The Washington Post. Retrieved June 15,

In 2013, a top-secret order issued by the United States Foreign Intelligence Surveillance Court (FISC, also called the FISA Court), which was later leaked to the media from documents culled by Edward Snowden, required a subsidiary of Verizon to provide a daily, on-going feed of all call detail records – including those for domestic calls – to the NSA.

The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers’ telephone calls.[17][18]

A classified PowerPoint presentation leaked by Edward Snowden states that PRISM enables “collection directly from the servers” of Microsoft, Yahoo, Google, Facebook and other online companies.

ANY EVIDENCE OF COLLUSION?

Director of National Intelligence James Clapper tacitly admitted PRISM’s existence in a blog post last Thursday.

Jun 12, 2013 – Facebook CEO Mark Zuckerberg called media REPORTS ABOUT PRISM … This slide draws a distinction between NSA surveillance programs that collect … collects communications “directly from the servers” of U.S. Internet companies. … the government is willing to adopt permissive interpretations of the law.

————————————————————————-

Files leaked by Edward Snowdon 

PRISM IS FIVES EYES

The leaks of the secret, English-speaking club called Five Eyes, the  formal pact in which the United States, Britain, Canada, Australia and New Zealand tapped phones and spied on American Allies.

IN 2013 FIVES EYES WERE WIRE TAPPING, GERMANY, FRANCE, MEXICO, ITALY AND BRAZIL

GLOBAL ANGER OVER LEAKS OF U.S. WIRE TAPPING, SECRET SPYING? FROM PRISM,  THE SECRET CLUB  FIVES EYES? THE SPIES? THE LEAKS? THE LIES?

Revelations “LEAKS” of a covert U.S. Internet surveillance program, code-named Prism, caused outrage.

German Chancellor Angela Merkel  demanded an “immediate” clarification from President Barack Obama on a spying program.

——————————————————————-

U.S. ‘is not monitoring and will not monitor’ the chancellor, White House spokesman says.

—————————————————————————–

THE PRISM PROGRAM:  OUR #1 SOURCE OF RAW INTELLIGENCE

Established in 2007, the TOP SECRET PRISM program has allowed us to closely track targeted individuals over time. Our ability to conduct live surveillance of search terms has given us important insights into their thoughts and intentions.

Our partners at the FBI DITU (Data Intercept Technology Unit) extract information from the servers of nine major American internet companies: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. This important partnership gives us direct access to audio, video, photographs, e-mails, documents and connection logs for each of these systems.

———————————————————————————

The strongly worded statement by German Chancellor Angela Merkel’s spokesman suggests that Germany is not fully satisfied. It demanded an “immediate and comprehensive” clarification of U.S. surveillance practices.

——————————————————————-

JUNE 2013

James R. Clapper, Director of National Intelligence

DNI Statement on Activities Authorized Under Section 702 of FISA

The Guardian and The Washington Post articles (JUNE 6, 2013)  refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act.

Activities authorized by Section 702 are subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. They involve extensive procedures, specifically approved by the court, to ensure that only non-U.S. persons outside the U.S. are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about U.S. persons.
Section 702 was recently reauthorized by Congress after extensive hearings and debate.
Information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats.
The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.

James R. Clapper, Director of National Intelligence

—————————————————————————

U.S. ‘is not monitoring and will not monitor’ the chancellor, White House spokesman says.

——————————————————————————-

Merkel “made clear that she views such practices, if proven true, as completely unacceptable and condemns them unequivocally,” the statement read.

“Between close friends and partners, as Germany and the U.S. have been for decades, there should not be such monitoring of the communications of a government leader,” the statement read. “This would be a serious breach of trust. Such practices should be immediately stopped.”

————————————————————————-

During the cold war, THE FIVE EYES, The Five nations in which the United States, Britain, Canada, Australia and New Zealand tapped phones and, worked together to collect signals emanating from the Soviet Union, China, Middle Eastern states, the Far East and just about anywhere else of political interest.

———————————————————————–

IN 2013  IT WAS LEAKED THAT THE FIVES EYES,  UNITED STATES, BRITAIN, CANADA, AUSTRALIA AND NEW ZEALAND WERE TAPPING PHONES AND, WORKED TOGETHER TO COLLECT SIGNALS EMANATING FROM  OUR CLOSEST AMERICAN ALLIES, GERMANY, FRANCE, MEXICO, ITALY AND BRAZIL.

——————————————————————

Domestic Surveillance Techniques – Our Data Collection Program

https://nsa.gov1.info/surveillance/

How the Domestic Surveillance Directorate collects information about U.S. citizens. … View a sample route that internet data traverses from a home in Toronto to the … The PRISM Program: Our #1 Source of Raw Intelligence …. This global heat map assigns each nation a color code based on its surveillance intensity ranging …

———————————————————————

September 5, 2016
U.S. intelligence and law enforcement agencies are investigating what they see as a broad covert Russian operation in the United States to sow public distrust in the upcoming presidential election and in U.S. political institutions, intelligence and congressional officials said.The aim is to understand the scope and intent of the Russian campaign, which incorporates ­cyber-tools to hack systems used in the political process, enhancing Russia’s ability to spread disinformation.The effort to better understand Russia’s covert influence operations is being coordinated by James R. Clapper Jr., the director of national intelligence. “This is something of concern for the DNI,” said Charles Allen, a former longtime CIA officer who has been briefed on some of these issues.
“It is being addressed.”
—————————————————————

MARCH 6, 2017 AND, EVERYBODY IS STILL ASKING IF THERE IS ANY EVIDENCE OF COLLUSION?

—————————————————————————-

YOU WON’T FIND THIS ON THE LIBERAL PUBLIC NEWS MEDIA..

Oops… Secret Classified documents for “Operation Noble Eagle” a  Canadian and U.S. combined military defense plan were accidentally leaked.

The host of The National on Canada’s CBC, Peter Mansbridge,  called it awkward?

Canada accidentally leaked countermeasures for a ‘9/11-style’ attack …

www.businessinsider.com/canada-united-states-combined-defense-plan-2017-3

3 days ago – Canada’s CN Tower is seen in the background as Marine One … secret plans that outline Canada’s military response in the event of a terror attack. … the second-highest military commander in Canada, was suspended in …

Classified documents reveal Canada’s planned response to 9/11-style …

www.cbc.ca/news/politics/classified-military-operation-noble-eagle-1.4004551

3 days ago – Secret documents detailing Canada’s plans for responding to a Sept. … Classified documents reveal Canada’s planned response to 9/11-style attack. Briefing to top general includes scenario for shooting down hijacked airliner ..

The 2017 Canadian leaks that threaten U.S. and Canadian National security are, were accidental and awkward?

———————————————————–

The bottom line…

Send the intentional leaks that threaten U.S. national security  to CONGRESS.

Comments are closed.