Tag Archives: surveillance

CIA’s Pakistan drone strikes carried out by regular US air force personnel

CIA’s Pakistan drone strikes carried out by regular US air force personnel

“Brandon Bryant, a former US Predator operator, told the film he decided to speak out after senior officials in the Obama administration gave a briefing last year in which they said they wanted to “transfer” control of the CIA’s secret drones programme to the military.

Bryant said this was disingenuous because it was widely known in military circles that the US air force was already involved.

‘There is a lie hidden within that truth. And the lie is that it’s always been the air force that has flown those missions. The CIA might be the customer but the air force has always flown it. A CIA label is just an excuse to not have to give up any information. That is all it has ever been.'”

 

Advertisements
Tagged , , , , , , , , , , , , , , , , , , , , , , , ,

The NSA’s secret role in the U.S. assassination program

The NSA’s secret role in the U.S. assassination program

“In one tactic, the NSA ‘geolocates’ the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have ‘absolutely’ been killed as a result of the NSA’s increasing reliance on the surveillance tactic.”

Tagged , , , , , , , , , , , , , , , , , , , ,

The NSA is Even Spying on Computers That Aren’t Online

Swampland

A computer doesn’t need to be online for the National Security Agency to take a peek.

The spy agency has managed to sneak surveillance software onto almost 100,000 computers worldwide, and is even able to use computers that aren’t connected to the Internet for spying and cyberattacks, the New York Times reports. The NSA relies on secret channels of radio waves that are transmitted from tiny circuits and USB cards implanted by NSA-friendly spies or manufacturers to snoop on offline computers.

The NSA targets include units of the Chinese army, Russian military networks, systems used by the Mexican police and drug cartels, European Union trade institutions, as well as U.S. partners like Saudi Arabia, India and Pakistan, the Times reports, in the latest details to emerge from former NSA contractor Edward Snowden’s leaks.

The spying agency said it does not use implantation software or its radio frequency technology inside…

View original post 32 more words

Tagged , , , , , , , , ,

Calif. Senate Urges Congress To Revisit Vote On NSA Surveillance

CBS Los Angeles

LOS ANGELES (CBSLA.com) — A new piece of legislation is seeking to protect Californians from the U.S. National Security Agency (NSA).

KNX 1070’s Margaret Carrero reports the California State Senate has voted overwhelmingly to approve Senate Bill 828. [cbs-audio url=”http://cbsla.files.wordpress.com/2014/01/ca-spying-bill-1-mca.mp3″ size=”” download=”” name=”State Senate Introduces Bill That Would Prevent Calif. From Aiding NSA ” artist=”Margaret Carrero”]

Passed in a bipartisan 31-1 vote on Monday, Senate Bill 828 bans state agencies, officials and corporations from giving any material support, participation or assistance to any federal agency to collect electronic or metadata — including emails and text messages — of any person unless a warrant is issued that specifically describes the person, place and thing to be searched or seized.

Sen. Ted Lieu, who joint-authored SB 828 with Sen. Joel Anderson (R-San Diego), said the legislation comes in response to recent revelations of the NSA’s “massive phone and internet records collection program on Americans.”

View original post 198 more words

Tagged , , , , , ,

How does the US mark unidentified men in Pakistan and Yemen as drone targets?

How does the US mark unidentified men in Pakistan and Yemen as drone targets?

“The government apparently calls such attacks signature strikes because the targets are identified based on intelligence “signatures” that suggest involvement in terror plots or militant activity.”

Tagged , , , , , , , , , , , , , , , , , , , , ,
%d bloggers like this: