+menu-


  • Category Archives American Secrets are Leaking
  • Who’s in NSA’S Secret Global Spy Ring?

    Who’s in NSA’S Secret Global Spy Ring?

    March 7, 2017 The NSA, it seems, isn’t the only spy agency hacking the world. Judging by a new, nearly 9,000-page trove of secrets from WikiLeaks, … Let’s add The CIA’s Global Spy Ring.

    WikiLeaks CIA files: The 6 biggest spying secrets revealed by the …

    www.independent.co.uk › Lifestyle › Tech › News

    2 days ago,  March 7, 2017  – WikiLeaks has released a HUGE set of files that it calls “YEAR ZERO” and … The MASSIVE set of documents – over 8000 pages in all – include a …

    —————————————————————————————–

    How big is NSA’S global Spy Ring? when you add the CIA? “HUGE-MASSIVE”

    Where would NSA and the CIA archive their “HUGE- MASSIVE” data base from their “HUGE-MASSIVE” Global  Top Secret Spy Ring?

    ————————————————————————————–

    JAN 19, 2014  JUST TO MAKE THAT PERFECTLY CLEAR, ON HOW MUCH DATA, THE NSA DATA CENTER COULD ARCHIVE FROM THEIR SECRET GLOBAL SPYING IN 70 YEARS.

    Behind My Back | NSA’s Gotta YOTTABYTE?

    www.behindmyback.org/2014/01/19/nsas-gotta-yottabyte/

    JAN 19, 20141 followed by 24 zeros THE NSA DATA CENTER IN UTAH WILL BE UP AND RUNNING BY THE END OF SEPTEMBER 2014… MUCH HAS BEEN WRITTEN ABOUT JUST HOW …

    WHAT’S A YOTTABTYE?
    A YOTTABYTE = 1,000 ZETTABYTES
    A ZETTABYTES = 1,000,000 EXABYTES
    1,000,000 EXABYTES = 1 BILLION PETTABYTES
    1 BILLION PETTABYTES = 1 TRILLION TERABYTES.

    FOR SOME SENSE OF SCALE, YOU WOULD NEED 400 TERABYTES TO HOLD ALL OF THE BOOKS EVER WRITTEN IN ANY LANGUAGE.

    —————————————————————————

    “MUCH” HAS BEEN WRITTEN ABOUT JUST HOW?

     NSA’S SECRET GLOBAL SPY RING COLLECTED ALL IT’S DATA

    EINSTEIN SAID, “IF YOU CAN’T EXPLAIN IT SIMPLY, YOU DON’T UNDERSTAND IT VERY WELL.

    ————————————————————————

    I’M NO GENIUS, BUT HERE GOES…

    I USED TO READ FICTION… I LOVED A GOOD “WHO DUNIT” MYSTERY  UNTIL JAN 26, 2011. WHEN I STARTED READING, RESEARCHING AND DOCUMENTING  FACTS ON THE U.S. GOVERNMENT.

    INDEED, IT  IS MUCH MORE OF A MYSTERY THAN ANY FICTION EVER WRITTEN. period.

     My website behindmyback.org went on line on Jan 29, 2013,  after I had documented for two years, that most of my business was being done by the government, behind closed doors.

    I LOVE HISTORY’S MYSTERIES AND INTRIGUE.

    FROM FRENCH INTRIGUER, TO PLOT, FROM ITALIAN INTRIGARE, TO PLOT, FROM LATIN INTRĪCĀRE, TO ENTANGLE….

    MY INTENT ON MY 885th COMMENT IS IS TO UNTANGLE AND INFORM FREEDOM AND PRIVACY LOVING AMERICAN CITIZENS HOW HUGE AND MASSIVE THE  ILLEGAL SPYING ON AMERICAN CITIZENS, BY NSA, CIA AND THE FBI  HAS BECOME AFTER 70 YEARS 1947-2017

    ——————————————————————

    JUNE 2013 Files leaked by Edward Snowdon  ” FIVES EYES IS PRISM “

    THE PRISM PROGRAM:  OUR #1 SOURCE OF RAW INTELLIGENCE

    ESTABLISHED IN 2007, THE TOP SECRET PRISM program has allowed us to closely track targeted individuals over time. Our ability to conduct live surveillance of search terms has given us important insights into their thoughts and intentions.

    WHERE PRISM’S PARTNERS  AT THE FBI DITU (DATA INTERCEPT TECHNOLOGY UNIT) extract information from the servers of nine major American internet companies: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. This important partnership gives us direct access to audio, video, photographs, e-mails, documents and connection logs for each of these systems.

    ————————————————————————————

    HOW BIG IS THE U.S. GOVERNMENT CYBERSPACE GLOBAL SPYING APPARATUS OF THE NATIONAL SECURITY AGENCY (NSA)?

    Simply? “HUGE- MASSIVE”

    THE HISTORY OF TOP SECRET ILLEGAL SPYING 1947-2017

    FOR  70 YEARS, THIS SECRET POST-WAR ALLIANCE OF FIVE ENGLISH-SPEAKING COUNTRIES HAS BEEN BUILDING A GLOBAL SURVEILLANCE INFRASTRUCTURE TO “MASTER THE INTERNET” AND SPY ON THE WORLD’S COMMUNICATIONS.

    THE USE OF UNDERHAND MACHINATIONS OR DECEITFUL STRATAGEMS, ILLEGALLY SPYING ON AMERICAN CITIZENS.

    1947 CODE NAME “FIVE EYES” FOR PRISIM

    1952  CODE NAME IN “SHAMROCK” FOR NSA

     AND EVEN A  CODE NAMED “FAMILY JEWELS”

    Are there any other NSA surveillance alliances?

    2007, THE TOP SECRET PRISM program

    THE FBI DITU (DATA INTERCEPT TECHNOLOGY UNIT)

    YES INDEED, in addition to the Five Eyes alliance, a number of other surveillance partnerships do exist:

    HOW BIG IS THE U.S. GOVERNMENT CYBERSPACE GLOBAL SPYING APPARATUS OF THE NATIONAL SECURITY AGENCY (NSA)?

    SIMPLY? “HUGE- MASSIVE”

    EXPANDED FROM FIVE EYES TO NINE EYES TO FOURTEEN EYES, TO AS MANY AS 41 EYES.

    9 Eyes: the Five Eyes, with the addition of Denmark, France, the Netherlands and Norway;

    14 Eyes: the 9 Eyes, with the addition of Germany, Belgium, Italy, Spain and Sweden;

    41 Eyes: all of the above, with the addition of the allied coalition in Afghanistan; 

    Tier B countries with which the Five Eyes have “focused cooperation” on computer network exploitation, including Austria, Belgium, Czech Republic, Denmark, Germany, Greece, Hungry, Iceland, Italy, Japan, Luxembourg, Netherland, Norway, Poland, Portugal, South Korea, Spain, Sweden, Switzerland and Turkey;

    Hmmm? CLUB OF BERNE: 17 MEMBERS INCLUDING PRIMARILY EUROPEAN STATES; THE US IS NOT A MEMBER;

    THE COUNTER TERRORIST GROUP: A WIDER MEMBERSHIP THAN THE 17 EUROPEAN STATES THAT MAKE UP THE CLUB OF BERNE, AND INCLUDES THE US;

    —————————————————————————————–

    Mar 11, 2017 added for clarity.

    THE CLUB DE BERNE is an intelligence sharing forum between the intelligence services of the 28 states of the European Union (EU), Norway and Switzerland, named after the city of Bern. IT IS AN INSTITUTION BASED ON VOLUNTARY EXCHANGE OF SECRETS, experience and views as well as discussing problems.[1][2] The Club has existed since 1971

    ———————————————————————————

    NATO Special Committee: made up of the heads of the security services of NATO member countries.

    ——————————————————————————–

    AND  THE EVERLASTING SPYING ON EVERYONE, BY THE UNITED STATES GOVERNMENT’S NSA, CIA, FBI AND ITS GLOBAL VOLUNTARY EXCHANGE OF SECRETS INTELLIGENCE SHARING, THE GLOBAL  SPYING NETWORK  HAS GONE ON FOR SEVENTY (70)  YEARS LEGALLY OR ILLEGALLY.

    ——————————————————————-

    WHAT IS THE FIVE EYES?

    THE FIVE EYES ALLIANCE IS A SECRETIVE, GLOBAL SURVEILLANCE ARRANGEMENT OF STATES COMPRISED OF THE UNITED STATES NATIONAL SECURITY AGENCY (NSA), THE UNITED KINGDOM’S GOVERNMENT COMMUNICATIONS HEADQUARTERS(GCHQ), CANADA’S COMMUNICATIONS SECURITY ESTABLISHMENT CANADA (CSEC), THE AUSTRALIAN SIGNALS DIRECTORATE (ASD), AND NEW ZEALAND’S GOVERNMENT COMMUNICATIONS SECURITY BUREAU (GCSB).

    BEGINNING IN 1946, AN ALLIANCE OF FIVE ENGLISH-SPEAKING COUNTRIES (THE US, THE  UK, AUSTRALIA, CANADA AND NEW ZEALAND) developed a series of  bilateral agreements over more than a decade that became known as the UKUSA agreement, establishing the Five Eyes alliance for the purpose of sharing intelligence, primarily signals intelligence (SIGINT).

    FOR ALMOST 70 YEARS, THIS SECRET POST-WAR ALLIANCE OF FIVE ENGLISH-SPEAKING COUNTRIES HAS BEEN BUILDING A GLOBAL SURVEILLANCE INFRASTRUCTURE TO “MASTER THE INTERNET” AND SPY ON THE WORLD’S COMMUNICATIONS.

    ———————————————————————-

    WHAT DOES THE FIVE EYES, (AKA PRISM) AGREEMENT SAY?

    Despite being nearly 70 years old, very little is known about the alliance and the agreements that bind them. While the existence of the agreement has been noted in history books and references are often made to it as part of reporting on the intelligence agencies, there is little knowledge or understanding outside the services themselves of exactly what the arrangement comprises.

    Even within the governments of the respective countries, which the intelligence agencies are meant to serve, there has historically been little appreciation for the extent of the arrangement. In fact, it is so secretive that the Australian prime minister reportedly wasn’t informed of its existence until 1973 and no government officially acknowledged the arrangement by name until 1999. Few documents have been released detailing the Five Eyes surveillance arrangement. To read the documents available, click here for the National Archives and here for the NSA’s release of the UKUSA Agreement.

    Here’s what we do know: under the agreement interception, collection, acquisition, analysis, and decryption is conducted by each of the State parties in their respective parts of the globe, and all intelligence information is shared by default. The agreement is wide in scope and establishes jointly-run operations centres where operatives from multiple intelligence agencies of the Five Eyes States work alongside each other.

    Further, tasks are divided between SIGINT agencies, ensuring that the Five Eyes alliance is far more than a set of principles of collaboration. The level of cooperation under the agreement is so complete that the national product is often indistinguishable.

    WHAT’S THE EXTENT OF FIVE EYES COLLABORATION?

    Together the Five Eyes collaborated and developed specific technical programmes of collection and analysis. One senior member of Britain’s intelligence community said “WHEN YOU GET A GCHQ PASS IT GIVES YOU ACCESS TO THE NSA TOO. YOU CAN WALK INTO THE NSA AND FIND GCHQ STAFF HOLDING SENIOR MANAGEMENT POSITIONS, AND VICE VERSA. When the NSA has a piece of intelligence, it will very often ask GCHQ for a second opinion. There have been ups and downs over the years, of course. But in general, the NSA and GCHQ are extremely close allies. They rely on each other.”

    The close relationship between the five States is also evidenced by documents recently released by Edward Snowden. Almost all of the documents include the classification

    “TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL”

    or “TOP SECRET//COMINT//REL TO USA, FVEY.”

    THESE CLASSIFICATION MARKINGS INDICATE THE MATERIAL IS TOP-SECRET COMMUNICATIONS INTELLIGENCE (AKA SIGINT) MATERIAL THAT CAN BE RELEASED TO THE US, AUSTRALIA, CANADA, UNITED KINGDOM AND NEW ZEALAND.

    THE PURPOSE OF THE REL TO IS TO IDENTIFY CLASSIFIED INFORMATION THAT A PARTY HAS PREDETERMINED TO BE RELEASABLE (OR HAS ALREADY BEEN RELEASED) THROUGH ESTABLISHED FOREIGN DISCLOSURE PROCEDURES AND CHANNELS, TO A FOREIGN COUNTRY OR INTERNATIONAL ORGANISATION.

    The level of co-operation under the UKUSA agreement is so complete that “the national product is often indistinguishable.”

    Another former British spy has said THAT “[C]OOPERATION BETWEEN THE TWO COUNTRIES, PARTICULARLY, IN SIGINT, IS SO CLOSE THAT IT BECOMES VERY DIFFICULT TO KNOW WHO IS DOING WHAT […] IT’S JUST ORGANIZATIONAL MESS.”

    Despite rumours of a “no-spy pact”, there is no prohibition on intelligence-gathering by Five Eyes States on the citizens or residents of other Five Eyes States, although there is a general understanding that citizens will not be directly targeted and where communications are incidentally intercepted there will be an effort to minimize the use and analysis of such communications by the intercepting State.

    ———————————————————————————

    WHO’S IN NSA’S SECRET GLOBAL SPY RING?

    HOW BIG IS NSA’S GLOBAL SPY RING?

    SIMPLY?  “HUGE-MASSIVE”

    WHERE DOES NSA STORE ITS “HUGE” COLLECTION OF SECRET GLOBAL SPYING, NO WORRIES,  REMEMBER, THE NSA YOTTABYTE DATA CENTER IN UTAH WAS UP AND RUNNING THE END OF SEPTEMBER 2014.

    A former British spy has said THAT “COOPERATION BETWEEN THE TWO COUNTRIES, PARTICULARLY, IN SIGINT, IS SO CLOSE

    THAT IT BECOMES VERY DIFFICULT TO KNOW WHO IS DOING WHAT …

    ———————————————————————————–

    2013 WIKILEAKS NSA FILES – 2017 WIKILEAKS CIA FILES:  

    WA DC IS IN A DITHER, WHO HAS ACCESS TO U.S.TOP SECRET INTELLIGENCE? WHO’S HACKING? WHO’S LEAKING AMERICAS TOP SECRETS TO THE NEWS PAPERS, THAT THREATEN HOMELAND SECURITY…. INSIDE JOB?  WA DC MUST STOP THE LEAKING?

    INDEED, ALL THINGS CONSIDERED FROM 1947 TO DATE MAR 10, 2017, IT DOES BECOMES VERY DIFFICULT TO KNOW WHO’S DOING WHAT WITH GLOBAL TOP SECRET INTELLIGENCE …

    2013? Are there any other National Security Agency (NSA) SURVEILLANCE ALLIANCES?

    2017  THE CENTRAL INTELLEGENCE AGENCY (CIA) …….

    WikiLeaks CIA files: The 6 biggest spying secrets revealed by the …

    www.independent.co.uk › Lifestyle › Tech › News

    2 days ago – WikiLeaks has released a “HUGE” set of files that it calls “YEAR ZERO” and … The “MASSIVE”  set of documents – over 8000 pages in all – include a …

    ————————————————————————–

     WikiLeaks has released a huge set of files that it calls “Year Zero” which marks  THE 6 BIGGEST SPYING SECRETS REVEALED BY THE RELEASE OF ‘VAULT 7’

    The MASSIVE set of documents – over 8,000 pages in all – include a host of hacking secrets that could embarrass intelligence agencies and the US government, as well as undermining spying efforts across the world.

    ———————————————————————————-

    FORTUNATELY FOR AMERICAN CITIZENS PRIVACY INTERNATIONAL HAS HAD THEIR EYES ON THE GLOBAL “HUGE-MASSIVE TOP SECRET SPYING NETWORK.

    ————————————————————————————-

    The Five Eyes | Privacy International

    https://www.privacyinternational.org/node/51

    One senior member of Britain’s intelligence community said “When you get a GCHQ … Club of Berne: 17 members including primarily European States; the US is …

    Few documents have been released detailing the Five Eyes surveillance arrangement. To read the documents available, click here for the National Archives and here for the NSA’s release of the UKUSA Agreement.

    Here’s what we do know: under the agreement interception, collection, acquisition, analysis, and decryption is conducted by each of the State parties in their respective parts of the globe, and all intelligence information is shared by default. The agreement is wide in scope and establishes jointly-run operations centres where operatives from multiple intelligence agencies of the Five Eyes States work alongside each other.

    A former British spy has said THAT “COOPERATION BETWEEN THE TWO COUNTRIES, PARTICULARLY, IN SIGINT, IS SO CLOSE

    Mar 11, 2017 The bottom line

    IT BECOMES VERY DIFFICULT TO KNOW WHO IS DOING WHAT …

    ———————————————————————————

    Albert Einstein also said,“Never regard study as a duty but as an enviable opportunity to learn to know the liberating influence of beauty in the realm of the spirit for your own personal joy and to the profit of the community to which your later works belong.”

    Einstein is referring to ones ‘legacy’ and its intended future recipients as being willfully purposed to benefit them on their journey through this gift of life given to us by God” R. Alan Wood

    Indeed..


  • Obama’s Infrastructure “The Fast Act”

    (a) SHORT TITLE.—This Act may be cited as the ”Fixing America’s Surface Transportation Act” or the ”FAST Act”.

    TALL ORDERS, this is a 490 page document

    WITH ALL THE  DEMOCRAT’S BELLS AND WHISTLES EMBEDDED

    Elaine Chao sworn in as transportation secretary – The Washington Post

    www.washingtonpost.com/…sworn-in…transportation…/3d12bd26-e80b-11e6-903d-9b…

    Jan 31, 2017 – Elaine Chao was sworn in as transportation secretary by Vice … STORY: Trump transportation secretary pick Elaine Chao confirmed in Senate, …

    ——————————————————————————
    I’m sure somebody in the Trump Administration  is reading it….
    TO FIND OUT WHAT’S IN IT.
    ———————————————————————-
    I did not read the full report.
     BUT, I DID READ ENOUGH TO RED FLAG PARTS! (below)
    ————————————————————————

    Fixing America’s Surface Transportation Act or the FAST Act – FHWA …

    https://www.fhwa.dot.gov/fastact/

    On December 4, 2015, President Obama signed the Fixing America’s Surface Transportation (FAST) Act (Pub. L. No. 114-94) into law

    ——————————————————————————
    THE DEMOCRAT’S FACT SHEET AND THE DEMOCRAT’S  FUNDING
    HOW MANY AMERICAN TAXPAYERS DOLLARS HAVE THEY SPENT SINCE ENACTMENT?
    HOW MUCH HAVE THEY GOT STASHED?

    Sec. 1402. Highway Trust Fund transparency and accountability.

    Sec. 1403. Additional deposits into Highway Trust Fund.

    Apportionment – FAST Act Fact Sheets – FHWA | Federal Highway …

    https://www.fhwa.dot.gov/fastact/factsheets/apportionmentfs.cfm

    Total funding for Federal-aid highway formula programs. 

    THE FAST ACT AUTHORIZES A TOTAL COMBINED AMOUNT ($39.7 BILLION IN FY 2016, $40.5 BILLION IN FY 2017, …

    ———————————————————————

    JUST ASKING? JUST SAYING…

    HOW MANY TIMES HAVE AMERICAN TAXPAYERS BEEN TAKEN BY THE GRANTED?

    —————————————————————————–

    Surface Transportation Block Grant Program – FAST Act Fact Sheets …

    https://www.fhwa.dot.gov/fastact/factsheets/stbgfs.cfm

    [FAST Act § 1109(a)].

    THE STBG PROMOTES FLEXIBILITY IN STATE AND LOCAL TRANSPORTATION DECISIONS AND PROVIDES FLEXIBLE FUNDING TO BEST ADDRESS STATE AND LOCAL …

    —————————————————————————

    RED FLAGS?
    THE  DEMOCRAT’S BELLS AND WHISTLES EMBEDDED
    —————————————————————-
    TAKEN BY THE GRANTED UNDER SEC. 79002?
    ————————————————————

    SEC. 79002. REALLOCATION OF FUNDS.

    TITLE LXXX—CHILD SUPPORT ASSISTANCE

    Sec. 80001. Requests for consumer reports by State or local child support

     enforcement agencies

    TITLE LXXVIII—TENANT INCOME VERIFICATION RELIEF

    Sec. 78001. Reviews of family incomes.

    TITLE LXXIX—HOUSING ASSISTANCE EFFICIENCY

    Sec. 79001. Authority to administer rental assistance

    Sec. 32101. Revocation or denial of passport in case of certain unpaid taxes.

    Sec. 75001. Exception to annual privacy notice requirement under the Gramm-Leach-Bliley Act

    Sec. 1409. Milk products.

    Sec. 24303. Vehicle event data recorder study.

    Sec. 1301. Satisfaction of requirements for certain historic sites

    Sec. 1302. Clarification of transportation environmental authorities.

    Sec. 41009. Funding for governance, oversight, and processing of environmental reviews and permits.

    Sec. 1415. Administrative provisions to encourage pollinator habitat and forage on transportation rights-of-way.

    Sec. 5512. Access to National Driver Register.

    Sec. 1413. National electric vehicle charging and hydrogen, propane, and natural gas fueling corridors.

    Sec. 1414. Repeat offender criteria.

    TITLE XLIII—PAYMENTS TO CERTIFIED STATES AND INDIAN TRIBES

    Sec. 43001. Payments from Abandoned Mine Reclamation Fund

    ———————————————————————–

    [PDF]FAST Act – Congress.gov

    https://www.congress.gov/114/bills/hr22/BILLS-114hr22enr.pdf

    SECTION 1. SHORT TITLE; TABLE OF CONTENTS.

    (a) SHORT TITLE.—This Act may be cited as the ‘‘Fixing Amer-

    ica’s Surface Transportation Act’’ or the ‘‘FAST Act’’.

    (b) TABLE OF CONTENTS.—

    The table of contents for this Act is as follows:

    1. R. 22 (A 490 page report

    Subtitle C—Acceleration of Project Delivery

    Sec. 1301. Satisfaction of requirements for certain historic sites

    Sec. 1302. Clarification of transportation environmental authorities.

    Sec. 1303. Treatment of certain bridges under preservation requirements.

    Sec. 5512. Access to National Driver Register.

    PART I—DRIVER PRIVACY ACT OF 2015

    Sec. 24301. Short title.

    Sec. 24302. Limitations on data retrieval from vehicle event data recorders.

    Sec. 24303. Vehicle event data recorder study.

    TITLE XXXII—OFFSETS

    Subtitle A—Tax Provisions

    Sec. 32101. Revocation or denial of passport in case of certain unpaid taxes.

    Sec. 41007. Litigation, judicial review, and savings provision.

    Sec. 41008. Reports.

    Sec. 41009. Funding for governance, oversight, and processing of environmental

    reviews and permits.

    TITLE XLIII—PAYMENTS TO CERTIFIED STATES AND INDIAN TRIBES

    Sec. 43001. Payments from Abandoned Mine Reclamation Fund

     

    DIVISION F—ENERGY SECURITY

    Sec. 61001. Emergency preparedness for energy supply disruptions.

    Sec. 61002. Resolving environmental and grid reliability conflicts.

    Sec. 61003. Critical electric infrastructure security.

    Sec. 61004. Strategic Transformer Reserve.

    Sec. 61005. Energy security valuation

    TITLE LXXV—ELIMINATE PRIVACY NOTICE CONFUSION

    Sec. 75001. Exception to annual privacy notice requirement under the Gramm-Leach-Bliley Act

    TITLE LXXVIII—TENANT INCOME VERIFICATION RELIEF

    Sec. 78001. Reviews of family incomes.

    TITLE LXXIX—HOUSING ASSISTANCE EFFICIENCY

    Sec. 79001. Authority to administer rental assistance

    1. R. 22—10

    Sec. 79002. Reallocation of funds.

    TITLE LXXX—CHILD SUPPORT ASSISTANCE

    Sec. 80001. Requests for consumer reports by State or local child support

     enforcement agencies

    Subtitle E—General Provisions

    Sec. 5501. Delays in goods movement.

    Sec. 5502. Emergency route working group.

     Subtitle D—Miscellaneous

    Sec. 1401. Prohibition on the use of funds for automated traffic enforcement.

    Sec. 1402. Highway Trust Fund transparency and accountability.

    Sec. 1403. Additional deposits into Highway Trust Fund.

    Sec. 1404. Design standards.

    Sec. 1405. Justification reports for access points on the Interstate System.

    Sec. 1406. Performance period adjustment.

    Sec. 1407. Vehicle-to-infrastructure equipment.

    Sec. 1408. Federal share payable.

    Sec. 1409. Milk products.

    Sec. 1410. Interstate weight limits.

    Sec. 1411. Tolling; HOV facilities; Interstate reconstruction and rehabilitation.

    Sec. 1412. Projects for public safety relating to idling trains.

    Sec. 1413. National electric vehicle charging and hydrogen, propane, and natural gas fueling corridors.

    Sec. 1414. Repeat offender criteria.

    Sec. 1415. Administrative provisions to encourage pollinator habitat and forage on transportation rights-of-way.

    Sec. 1416. High priority corridors on National Highway System.

    Sec. 1417. Work zone and guard rail safety training.

    Sec. 1418. Consolidation of programs.

    Sec. 1419. Elimination or modification of certain reporting requirements.

    Sec. 1420. Flexibility for projects.

    Sec. 1421. Productive and timely expenditure of funds.

    Sec. 1422. Study on performance of bridges.

    ———————————————————–

    TITLE LXXV—ELIMINATE PRIVACY NOTICE CONFUSION

    Sec. 75001. Exception to annual privacy notice requirement under the Gramm-Leach-Bliley Act

    SO WHAT’S NEW ON WIKI LEAK?

    “YEAR ZERO”… 8000 PAGES

    IN 1954 THOSE IN POWER KNEW IT WAS JUST A MATTER OF TIME.


  • Top Secret Documents Leaked?

    In 2013, a top-secret order issued by the United States Foreign Intelligence Surveillance Court, which was later leaked to the media.

    Was there a top-secret  order on Russia issued by the United States Foreign Intelligence Surveillance Court  before the 2016 election?

    MARCH 6, 2017 THEY ARE ASKING IF THERE IS ANY EVIDENCE OF COLLUSION?

    —————————————————————–

    September 5, 2016
    U.S. intelligence and law enforcement agencies are investigating what they see as a broad covert Russian operation in the United States to sow public distrust in the upcoming presidential election and in U.S. political institutions, intelligence and congressional officials said.The aim is to understand the scope and intent of the Russian campaign, which incorporates ­cyber-tools to hack systems used in the political process, enhancing Russia’s ability to spread disinformation.The effort to better understand Russia’s covert influence operations is being coordinated by James R. Clapper Jr., the director of national intelligence. “This is something of concern for the DNI,” said Charles Allen, a former longtime CIA officer who has been briefed on some of these issues. “It is being addressed.”———————————————————————

    MARCH 6, 2017 THEY KEEP ASKING IF THERE IS ANY EVIDENCE OF COLLUSION?

    Activities authorized by Section 702 are subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. They involve extensive procedures, specifically approved by the court, to ensure that only non-U.S. persons outside the U.S. are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about U.S. persons.

    HAS  ANY ACQUISITION OR RETENTION  OF INCIDENTALLY ACQUIRED INFORMATION FROM RUSSIAN FOREIGN INTELLIGENCE SURVEILLANCE  BEEN LEAKED AND DISSEMINATED  TO TARGET A U.S. PERSON, DONALD J. TRUMP BEFORE AND AFTER ,  HE BECAME PRESIDENT OF THE UNITED STATES OF AMERICA?

    —————————————————————–

    Read it again….

    Activities authorized by Section 702 are subject to oversight

    by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress.

    They involve extensive procedures, specifically approved by the court,

    TO ENSURE THAT ONLY NON-U.S. PERSONS OUTSIDE THE U.S. ARE TARGETED,

    AND THAT MINIMIZE THE ACQUISITION, RETENTION AND DISSEMINATION OF INCIDENTALLY ACQUIRED INFORMATION ABOUT U.S. PERSONS.

    ————————————————————

    TO ENSURE OUTSIDE OF THE U.S.

    ENSURE by definition, make certain that (something) shall occur or be the case. make certain of obtaining or providing (something). make sure that (a problem) shall not occur.

    ———————————————————————–

    AND TO MINIMIZE INSIDE THE U.S.A.

    MINIMIZE  by definition: reduce (something, especially something unwanted or unpleasant) to the smallest possible amount or degree. represent or estimate at less than the true value or importance.

    ———————————————————————-

    ACTIVITIES AUTHORIZED BY SECTION 702

    BY THE FOREIGN INTELLIGENCE SURVEILLANCE COURT

    MUST ENSURE  THAT THE ACQUISITION OF  ACQUIRED INFORMATION IN FOREIGN WIRE TAPPING AND SPYING OUTSIDE THE  U.S. SHALL NOT BE RETAINED.

    AND ENSURE ALL INCIDENTALLY ACQUIRED INFORMATION INSIDE THE U.S.  SHALL BE QUASHED AS OUTSIDE THEIR PURVIEW OF ACTIVITIES AUTHORIZED BY SECTION 702 .

    QUASH by definition:reject or void, especially by legal procedure.

    PURVIEW by definition: the body or enacting part of a statuteb : the limit, purpose, or scope of a statute., the range or limit of authority, competence, responsibility, concern, or intention.

    ———————————————————————

    Top Secret Documents Leaked

    (June 6, 2013). “US Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program”. The Washington Post. Retrieved June 15,

    In 2013, a top-secret order issued by the United States Foreign Intelligence Surveillance Court (FISC, also called the FISA Court), which was later leaked to the media from documents culled by Edward Snowden, required a subsidiary of Verizon to provide a daily, on-going feed of all call detail records – including those for domestic calls – to the NSA.

    The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers’ telephone calls.[17][18]

    A classified PowerPoint presentation leaked by Edward Snowden states that PRISM enables “collection directly from the servers” of Microsoft, Yahoo, Google, Facebook and other online companies.

    ANY EVIDENCE OF COLLUSION?

    Director of National Intelligence James Clapper tacitly admitted PRISM’s existence in a blog post last Thursday.

    Jun 12, 2013 – Facebook CEO Mark Zuckerberg called media REPORTS ABOUT PRISM … This slide draws a distinction between NSA surveillance programs that collect … collects communications “directly from the servers” of U.S. Internet companies. … the government is willing to adopt permissive interpretations of the law.

    ————————————————————————-

    Files leaked by Edward Snowdon 

    PRISM IS FIVES EYES

    The leaks of the secret, English-speaking club called Five Eyes, the  formal pact in which the United States, Britain, Canada, Australia and New Zealand tapped phones and spied on American Allies.

    IN 2013 FIVES EYES WERE WIRE TAPPING, GERMANY, FRANCE, MEXICO, ITALY AND BRAZIL

    GLOBAL ANGER OVER LEAKS OF U.S. WIRE TAPPING, SECRET SPYING? FROM PRISM,  THE SECRET CLUB  FIVES EYES? THE SPIES? THE LEAKS? THE LIES?

    Revelations “LEAKS” of a covert U.S. Internet surveillance program, code-named Prism, caused outrage.

    German Chancellor Angela Merkel  demanded an “immediate” clarification from President Barack Obama on a spying program.

    ——————————————————————-

    U.S. ‘is not monitoring and will not monitor’ the chancellor, White House spokesman says.

    —————————————————————————–

    THE PRISM PROGRAM:  OUR #1 SOURCE OF RAW INTELLIGENCE

    Established in 2007, the TOP SECRET PRISM program has allowed us to closely track targeted individuals over time. Our ability to conduct live surveillance of search terms has given us important insights into their thoughts and intentions.

    Our partners at the FBI DITU (Data Intercept Technology Unit) extract information from the servers of nine major American internet companies: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. This important partnership gives us direct access to audio, video, photographs, e-mails, documents and connection logs for each of these systems.

    ———————————————————————————

    The strongly worded statement by German Chancellor Angela Merkel’s spokesman suggests that Germany is not fully satisfied. It demanded an “immediate and comprehensive” clarification of U.S. surveillance practices.

    ——————————————————————-

    JUNE 2013

    James R. Clapper, Director of National Intelligence

    DNI Statement on Activities Authorized Under Section 702 of FISA

    The Guardian and The Washington Post articles (JUNE 6, 2013)  refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act.

    Activities authorized by Section 702 are subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. They involve extensive procedures, specifically approved by the court, to ensure that only non-U.S. persons outside the U.S. are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about U.S. persons.
    Section 702 was recently reauthorized by Congress after extensive hearings and debate.
    Information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats.
    The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.

    James R. Clapper, Director of National Intelligence

    —————————————————————————

    U.S. ‘is not monitoring and will not monitor’ the chancellor, White House spokesman says.

    ——————————————————————————-

    Merkel “made clear that she views such practices, if proven true, as completely unacceptable and condemns them unequivocally,” the statement read.

    “Between close friends and partners, as Germany and the U.S. have been for decades, there should not be such monitoring of the communications of a government leader,” the statement read. “This would be a serious breach of trust. Such practices should be immediately stopped.”

    ————————————————————————-

    During the cold war, THE FIVE EYES, The Five nations in which the United States, Britain, Canada, Australia and New Zealand tapped phones and, worked together to collect signals emanating from the Soviet Union, China, Middle Eastern states, the Far East and just about anywhere else of political interest.

    ———————————————————————–

    IN 2013  IT WAS LEAKED THAT THE FIVES EYES,  UNITED STATES, BRITAIN, CANADA, AUSTRALIA AND NEW ZEALAND WERE TAPPING PHONES AND, WORKED TOGETHER TO COLLECT SIGNALS EMANATING FROM  OUR CLOSEST AMERICAN ALLIES, GERMANY, FRANCE, MEXICO, ITALY AND BRAZIL.

    ——————————————————————

    Domestic Surveillance Techniques – Our Data Collection Program

    https://nsa.gov1.info/surveillance/

    How the Domestic Surveillance Directorate collects information about U.S. citizens. … View a sample route that internet data traverses from a home in Toronto to the … The PRISM Program: Our #1 Source of Raw Intelligence …. This global heat map assigns each nation a color code based on its surveillance intensity ranging …

    ———————————————————————

    September 5, 2016
    U.S. intelligence and law enforcement agencies are investigating what they see as a broad covert Russian operation in the United States to sow public distrust in the upcoming presidential election and in U.S. political institutions, intelligence and congressional officials said.The aim is to understand the scope and intent of the Russian campaign, which incorporates ­cyber-tools to hack systems used in the political process, enhancing Russia’s ability to spread disinformation.The effort to better understand Russia’s covert influence operations is being coordinated by James R. Clapper Jr., the director of national intelligence. “This is something of concern for the DNI,” said Charles Allen, a former longtime CIA officer who has been briefed on some of these issues.
    “It is being addressed.”
    —————————————————————

    MARCH 6, 2017 AND, EVERYBODY IS STILL ASKING IF THERE IS ANY EVIDENCE OF COLLUSION?

    —————————————————————————-

    YOU WON’T FIND THIS ON THE LIBERAL PUBLIC NEWS MEDIA..

    Oops… Secret Classified documents for “Operation Noble Eagle” a  Canadian and U.S. combined military defense plan were accidentally leaked.

    The host of The National on Canada’s CBC, Peter Mansbridge,  called it awkward?

    Canada accidentally leaked countermeasures for a ‘9/11-style’ attack …

    www.businessinsider.com/canada-united-states-combined-defense-plan-2017-3

    3 days ago – Canada’s CN Tower is seen in the background as Marine One … secret plans that outline Canada’s military response in the event of a terror attack. … the second-highest military commander in Canada, was suspended in …

    Classified documents reveal Canada’s planned response to 9/11-style …

    www.cbc.ca/news/politics/classified-military-operation-noble-eagle-1.4004551

    3 days ago – Secret documents detailing Canada’s plans for responding to a Sept. … Classified documents reveal Canada’s planned response to 9/11-style attack. Briefing to top general includes scenario for shooting down hijacked airliner ..

    The 2017 Canadian leaks that threaten U.S. and Canadian National security are, were accidental and awkward?

    ———————————————————–

    The bottom line…

    Send the intentional leaks that threaten U.S. national security  to CONGRESS.