Obama Prism

Embed Size (px)

Citation preview

  • 7/28/2019 Obama Prism

    1/4

    PresidentObamasDataHarvestingProgram:NSAasPollster,PRISMasMISObyJohnStantonIt

    is

    way

    too

    soon

    to

    bet

    the

    house

    fortune

    on

    the

    reliability

    of

    reports

    by

    the

    Washington

    Post

    (Washington,DC)andTheGuardian(UnitedKingdom)onPresidentObamasdataharvestingprogram,

    knownforthemomentasPRISM.

    With the hot pursuit of mainstream media reporters underway by the US Department of Justice

    (Associated Press, for example); a US CorporateState show trial of Bradley Manning, Julian

    Assange/Wikileaks (Obama has already stated they are guilty); the extraordinary cyberwar/hacking

    accusationsagainsttheChinesegovernment;andtheshrillsoundofcyberquackery fromtheDefense

    ScienceBoardanditslegionofsecuritycontractors,cautionallaroundistheorderoftheday.

    Indeed, the membership of President Obamas National Security Telecommunications Advisory

    Committee (NTSAC) reflects the closeproximityof thePresident to critical cyber/telecom/ISP leaders

    who likelygetadvancedwarningofthe incomingnukes.SomeoftheNSTACmembers includeVerizon

    BusinessGroup,Raytheon,AT&T,Vonage,Intelsat,Avaya,MicrosoftandLockheedMartin.Andtheydid

    not know that theirnetworks, switches, routers,andpacketswerebeing violated?Of interest is the

    presenceofFireEye,acybersecurityfirm.OneofFireEyesBoardmembers isRobertLentzwhohasan

    excellentDOD/NSApedigree.Roberthas servedasamemberof theboardofdirectors sinceMarch

    2010.HehasservedasthepresidentofCyberSecurityStrategiessinceOctober2009.Heservedasthe

    deputyassistantsecretaryofdefenseforcyber,identity,andinformationassuranceintheOfficeofthe

    Assistant SecretaryofDefense,Networks and Information Integration/Chief InformationOfficer from

    November

    2007

    to

    October

    2009.

    Since

    November

    2000,

    he

    has

    also

    served

    as

    the

    chief

    information

    security officer for the U.S. Department of Defense. He previously worked at theNational Security

    Agencyfrom1975to2000,whereheservedinthefirstNationalComputerSecurityCenter.

    TheUSnationalsecuritymachineryhasstatedtimeandagainthatthe InternetandWorldWideWeb

    are fair game for military information support operations (MISO) and that means shaping the

    consciousness of individuals, organizations and governments to the benefit of Americas national

    interests.Viewed inthismanner, it ispossibletoarguethatPRISMwouldhaveachillingeffectonnot

    only whistleblowers and their media handlers, but perhaps on practitioners of industrial espionage

    whethertheyareFrench,ChineseorIsraelis.

    Thecalculated

    pursuit

    of

    mainstream

    media

    by

    President

    Obama,

    the

    publicizing

    by

    the

    US

    corporate

    nationalsecuritymachineryofPRISM,StuxnetandthetakedownofBitCoinwebsites;andtheentryof

    CyberCommandintothedailylivesofAmericansseemstosuggestthataneworderisafoot,oratleast

    that the US Corporate State is trying to recover/wrest control of the US historicalcurrentfuture

    narrative from independent internal and foreign news/information sources. Obama seems to have

    takenUSpresidentialparanoiatonewlevels.

  • 7/28/2019 Obama Prism

    2/4

    President Obamas national security aides and political handlers appear to have adopted the John

    HaldemanJohnErlichmanphilosophyandpracticeofprotectingObama.AccordingtotheTelegraph,

    UK,ValiNasr,auniversityprofessorwhowasseconded in2009 toworkwithRichardHolbrooke,Mr

    Obama's specialenvoy toAfghanistan andPakistan, recordshisprofounddisillusionathowa "Berlin

    Wall" of domesticfocused adviserswas erected to protect MrObama. "The president had a truly

    disturbinghabit

    of

    funneling

    major

    foreign

    policy

    decisions

    through

    asmall

    cabal

    of

    relatively

    inexperiencedWhiteHouseadviserswhoseturfwasstrictlypolitics,"reportsTheTelegraph.

    IntelligenceAgenciesasPollstersWoulditsurpriseanyoneofsomeeagerObamaaidesdecidedtousedataminedthroughaprogramlike

    PRISM to figureoutwhatAmericancitizensare thinking?ForgetGallupandPew.With the thoughts,

    pictures, video, travel records and expenditures of tens of millions of Americans harvested and

    interpreted by variousmachine programs and human analysts in theNSA,CIA, andDIA,whoneeds

    commercialpollsters.Talkaboutsamplesize!AndthankstomanyUSCourtdecisions,datagatheringis

    largelylegal.

    Andwould itnotbeamatterofnationalsecurityforthePresidentoftheUnitedStatestoknowwhat

    AmericansarethinkingastheUSAremains inastateofemergencysince911.MoreovertheAmerican

    nation is still atwar andjust steps away from lightingup Iran, Syria and Iraq (again). For the global

    carnagetoproceedasplanned,theUSCorporateStatemustcontroltheflowofinformationasitdidin

    WorldWarII(19391945).

    Obama is theboss has a need for the info asDoctor Evil so eloquentlyput it themovieAustin

    Powers.PRISMdatamustbe inhishands,particularlygiven thatObamacan saywitha straight face

    civillibertiesimprovewiththistypeofsurveillance.USSenatorsmusthavetheinfotoo.Senatorslike

    DianeFeinstein,

    John

    McCain

    and

    Lindsey

    Graham

    are

    happy

    to

    be

    monitored

    and,

    well,

    why

    not

    all

    of

    us.All fourofthesecharactersknowthatAmericanswillcollectivelyshrugtheirshouldersand forget

    aboutthematterbyimmersingthemselvesinthecelebritybreakdownoftheday.

    PerhapsthemostunsettlingaspectofUSgovernmentdataharvestingandanalysisprogramsisthatthe

    all of the work is researched, developed, tested and deployed by forprofit companies like those

    belonging to NSTAC. According to the Defense Security Service (DSS), U.S. industry develops and

    producesthemajorityofournation'sdefensetechnologymuchofwhichisclassifiedandthusplaysa

    significantroleincreatingandprotectingtheinformationthatisvitaltoournation'ssecurityDSShas

    IndustrialSecurityoversightandassistanceresponsibilityforover13,000clearedfacilitiesparticipating

    in

    the

    National

    Industrial

    Security

    Program

    and

    estimates

    that

    there

    are

    over

    11

    million

    classified

    documents in thehandsofU.S. industry.DSS,alwaysunderstaffedbutextraordinarilydedicated,do

    theirbesttokeepUSindustrywithinatolerabledegreeofgreed.

  • 7/28/2019 Obama Prism

    3/4

    AllPRISMsareNotCreatedEqualEmail,voice,videocapturewouldseemtorelyonsomesortofreadmodulewithinaswitch.Analyzingit

    allseparatingwheatandchafewouldappeartorequiresomesortofautonomousmachinelanguage.

    PerhapssomeofthesePRISMsaretangentiallyrelatedtotheNSAsPRISM.

    OveratCryptome,adocumentfromtheUSDepartmentofHomelandSecurity(DHS)describesProtect,

    Respond, Inform,Secure,andMonitor (PRISM).According toDHSPRISM iscomposedof twoprimary

    components: Contora and ESRI ArcIMS. Additional and optional components include Message 911,

    Ensco Sentry, and Lunar Eye. These components have been tightly integrated into a single enduser

    applicationthatprovidesamessaging,alerting,georeferencedmapping,assettracking,CBRNsensing,

    andpublicwarningsystem.LunarEyeisaGPStrackingsuite.

    A USAF communications dictionary shortens ProgrammableReconfigurableIntegratedSwitch and

    MultiplextoPRISM.

    AlcatelLucents

    product

    PRISM/GORI

    manages

    SMS

    (text)

    messages.

    A

    sample

    of

    DODs

    DTIC

    search

    enginereturnswhenPRISM isenteredfollows: MITREsPRISM isasoftwareprogramusedtorequest

    intelligence collection on moving vehicles, aircraft, people and animals; PaRallel Inference SysteM

    PRISMa connectionist inference for developing machine language and autonomous network

    managementprograms;andRDTEBudgetNotePRISMtoMAJIICInteroperabilityAssessment:assessed

    that Planning Tool for Resource, Integration, Synchronization and Management (PRISM) and the

    interface to NATO MultiSensor AerospaceGround Joint ISR Interoperability Coalition (MAJIIC) was

    functional and ready for operations by demonstrating automated interoperability and exchange of

    intelligencerequirements.

    Whatsthe

    Big

    Deal?

    David Bromwich at the Huffington Post sums it up best, Even now, government aides are most

    concernedabout"themagnitudeoftheleak."Thequestionthattroublesthemisnot,Howdidwecome

    tothis?butrather,Shallweprosecutethewhistleblower?Thepatternissogallingandtedious,andits

    harmssoinvisibletoallbutafew,thatwemaybetemptedtorelaxandwaitforthenextelection.But

    remember again the language of the court order.On an ongoing daily basis. All call detail records.

    Includinglocaltelephonecalls.Thenextpresidentwillinheritthis.Nonames,norecordsofwords(not

    yet), no inculpating or exculpating evidence (just "signatures"), but still: these are outlines of the

    communicativebehaviorofupwardof amillionpersons,with similarly compellingordersout to the

    other telecoms. The aim is to capture by index thewhole of theU.S. population. The amazing and

    routineFISAorderisablindcommandfortheopeningofathousandeyes.Theplainestrebuketosuch

    procedurescomesfromthelanguageofthefourthamendmentitself.

    Therightofthepeopletobesecure intheirpersons,houses,papers,andeffects,againstunreasonablesearches and seizures, shall not be violated, and no Warrants shall issue, but uponprobable cause,supportedbyOathoraffirmation,andparticularlydescribingtheplacetobesearched,andthepersonsorthingstobeseized.

  • 7/28/2019 Obama Prism

    4/4

    By what right are the addressed envelopes of the spoken communications of 280 million citizens

    plucked fromtheairbygovernmentandfiledaway?Supportedbywhoseoathandwhataffirmation?

    Thereisasimpleforcetothewordsofthefourthamendmentafterall.Itsays:wedonotlivebysecret

    laws,andwewillnot abidebygeneralwarrants.And to the comfortofferedby senatorsChambliss,

    Graham,andFeinstein,whoaskustosleepwellandsleeplong,thereisasimplereply.Inwhatcountry

    dothey

    think

    they

    are

    living,

    and

    under

    what

    constitution?

    John Stanton isaVirginiabasedwriter specializing in national securitymatters.His latest book isCyberNoodles(cybersecurity),OrphanNukesandtheFailureoftheUSNationalSecurityState.Reachhimatcioran123@yahoo.com