CISPA and Echelon and even Private Drone worries

Cyber Intelligence Sharing and Protection Act

(CISPA) is loved by FACEBOOK to spy on its account holders ::
“…CISPA has garnered favor from corporations and lobbying groups such as Microsoft, Facebook and the United States Chamber of Commerce, which look on it as a simple and effective means of sharing important cyber threat information with the government.[4]…”


Flight of the drones   =  Australian RADIO Audio

BBC Listeners ALREADY know ::
“….“Sniffing” devices are thought to have been installed in key internet routing centres to catch addressing information from the packets of data passing through.…”
“…..Data beamed along fibre-optic networks is not thought to be safe either. The NSA has reportedly developed devices that can tap optical undersea cables.

These deep water cables have replaced satellites as the main way that data travels between continents. One cable can carry tens of thousands of phone calls at once. One fibre-tap was discovered in 1982, but many others are thought to be in existence.

The recently published European Parliament report on Echelon played down some of the wilder claims for the network’s eavesdropping abilities and said it can tap a “limited” proportion of net traffic, radio communications and cable transmissions…”

“…One method of interception is to place equipment at locations where fiber optic communications are switched. For the Internet, much of the switching occurs at relatively few sites. There have been reports of one such intercept site, Room 641A, in the United States….”

“…According to various sources, ECHELON also routinely intercepts Internet transmissions. The organization allegedly has installed numerous “sniffer” devices. These “sniffers” collect information from data packets as they traverse the Internet via several key junctions. It also uses search software to scan for web sites that may be of interest. (6)

Furthermore, it is believed that ECHELON has even used special underwater devices which tap into cables that carry phone calls across the seas. According to published reports, American divers were able to install surveillance devices on to the underwater cables. One of these taps was discovered in 1982, but other devices apparently continued to function
undetected. (7) …”

“….The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELONDictionary”) that will prompt the computers to flag the message for recording and transcribing for future analysis.

Intelligence analysts at each of the respective “listening stations” maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept.

But apart from directing their ears towards terrorists and rogue states, ECHELON is also being used for purposes well outside its original mission. The regular discovery of domestic surveillance targeted at American civilians for reasons of “unpopular” political affiliation or for no probable cause at all in violation of the First, Fourth and Fifth Amendments of the Constitution – are consistently impeded by very elaborate and complex legal arguments and privilege claims by the intelligence agencies and the US government…”
“….”Echelon” intercepts more than 3 billion communications everyday, including telephone calls, Email messages, Internet downloads and satellite transmissions. “The Echelon system gathers all of these transmissions indiscriminately, then distills the information that is most heavily desired through artificial intelligence programs. Some sources have claimed that Echelon sifts through an estimated 90 per cent of all Internet traffic,” according to”

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s