The CSE is a part of the 5-Eyes with the NSA. The big secret that they are not talking about with the CSE is the advanced technology of Echelon and Signals Intelligence along with the true nature of what the PRISM data mining program really is. The eventual plan is to have everyone hooked up to a computer to monitor their thoughts and be able to "data-mine" them. It is a form of thought policing that extends far beyond telecommunications and the internet. To learn more about this, see here, here and here.
If you are a targeted person, they are recording your whole life. Eventually, the plan is to record everyone's life. That is why they are building giant data centers like the one in Utah, they are using big data with sophisticated artificial intelligence and data mining software so they can predict the future just like in the movie Minority Report. The massive data centers in Utah are for data mining purposes so they can look for statistically significant patterns in the data. They want to have everyone "hooked up" so they can monitor all human thought patterns and hunt for what they deem as "irregular" thoughts or what they believe falls out of their categories of normality. In other words, they have set up a bell curve, and anyone who falls outside of this will be seen as suspicious. Right now, they are able to set alerts on your thoughts the same way they can on phone calls, emails, search terms etc. See here for more about the inevitable problems of technology. See here for more about the DARPA A.I Control Grid.
If you are a targeted person, they are recording your whole life. Eventually, the plan is to record everyone's life. That is why they are building giant data centers like the one in Utah, they are using big data with sophisticated artificial intelligence and data mining software so they can predict the future just like in the movie Minority Report. The massive data centers in Utah are for data mining purposes so they can look for statistically significant patterns in the data. They want to have everyone "hooked up" so they can monitor all human thought patterns and hunt for what they deem as "irregular" thoughts or what they believe falls out of their categories of normality. In other words, they have set up a bell curve, and anyone who falls outside of this will be seen as suspicious. Right now, they are able to set alerts on your thoughts the same way they can on phone calls, emails, search terms etc. See here for more about the inevitable problems of technology. See here for more about the DARPA A.I Control Grid.
As far as Echelon and Signals Intelligence, it's important to realize that Signals Intelligence covers everything from intercepting signals to surveillance and electronic warfare. Please see earth-penetrating tomography, Interferometry, also Earth's Field NMR, Nuclear Magnetic Resonance, and Electron Paramagnetic Resonance. One part of the secret of Echelon is leaking electrical emanations which is a part of the TEMPEST program and is categorized under RADIATION intelligence. It is classified. All natural things give out radio waves, that includes you.
See this video and this video for an example using a computer. (See here, where the physicist Dr. John Morgan says 2 minutes and 10 seconds into the video, that all natural things emit radio waves. Watch this video with Michael Persinger where he talks about how light and photons can be measured. Also, take notice in this video when the physicist mentions that the brain "radiates" radio.)
The imagers they use are multi-purpose, the imaging transmitters target locations, areas and living animals with directed energy. There are passive and active modes, the active mode requires the transmission of signals into the target where passive mode allows imaging with illumination occurring by other means like spying through leaking electrical emanations, including unintentional radio or electrical signals, sounds, and vibrations.
Essentially, this technology can be used with nanotechnology for holography and nanoparticle imaging. (See here and here for examples of holography, here for more about nanoparticle imaging and here for more about molecular imaging.)
But that's not all, it can also be used for synthetic telepathy. Light can be measured, (photons,) minds can be read, thoughts can be sent. If you can think a thought, you can send it. Just like writing an email with your mind. Zuckerberg is saying it here, he's just not telling you the whole story. See here for another article with Mark Zuckerberg referring to synthetic telepathy. See here for a Cisco ad that talks about this technology. Also, see this TedTalk video for another example. This technology can be used between humans that are hooked up to computers, (human to human) or by a computer to a human.
When used in conjunction with nanotechnology they have access to your vital signs, the ability to read your EEG and your brain states, look out of your eyes and hear out of your ears. (See this old clip of a scientist looking out of a cat's eyes. What they have now is even more advanced.) They can hack into your brain the same way they do with your computer. They can also alter and affect your behavior. (See here and here.) They can track you anywhere on the planet and hurt or maim you in a plausibly deniable way from a remote location. They can shoot you and your family with space-based weapons. See here for more about electronic warfare. See here for more about microwave weaponry.
See this video and this video for an example using a computer. (See here, where the physicist Dr. John Morgan says 2 minutes and 10 seconds into the video, that all natural things emit radio waves. Watch this video with Michael Persinger where he talks about how light and photons can be measured. Also, take notice in this video when the physicist mentions that the brain "radiates" radio.)
What You Are:
1. The Body Electric: Electromagnetism And The Foundation Of Life
2. Electromagnetism and Life
3. You are an Antenna
2. Electromagnetism and Life
3. You are an Antenna
The imagers they use are multi-purpose, the imaging transmitters target locations, areas and living animals with directed energy. There are passive and active modes, the active mode requires the transmission of signals into the target where passive mode allows imaging with illumination occurring by other means like spying through leaking electrical emanations, including unintentional radio or electrical signals, sounds, and vibrations.
Essentially, this technology can be used with nanotechnology for holography and nanoparticle imaging. (See here and here for examples of holography, here for more about nanoparticle imaging and here for more about molecular imaging.)
But that's not all, it can also be used for synthetic telepathy. Light can be measured, (photons,) minds can be read, thoughts can be sent. If you can think a thought, you can send it. Just like writing an email with your mind. Zuckerberg is saying it here, he's just not telling you the whole story. See here for another article with Mark Zuckerberg referring to synthetic telepathy. See here for a Cisco ad that talks about this technology. Also, see this TedTalk video for another example. This technology can be used between humans that are hooked up to computers, (human to human) or by a computer to a human.
When used in conjunction with nanotechnology they have access to your vital signs, the ability to read your EEG and your brain states, look out of your eyes and hear out of your ears. (See this old clip of a scientist looking out of a cat's eyes. What they have now is even more advanced.) They can hack into your brain the same way they do with your computer. They can also alter and affect your behavior. (See here and here.) They can track you anywhere on the planet and hurt or maim you in a plausibly deniable way from a remote location. They can shoot you and your family with space-based weapons. See here for more about electronic warfare. See here for more about microwave weaponry.
Remember, YOU PAY FOR ALL OF THIS! That is so important to remember, these losers work for you! Don't ever forget that, they are using your money to enslave you. Demand transparency, do not settle for anything less. Demand that your government starts being honest with you. Honesty and the democratizing of this technology scares the absolute crap out of these people. Do you know why? Because they know they will be lynched. The foundation of Canada will be called into question and they know this. Why are you so scared of them? They are your employees.
============================================================================
By Keith Jones
On the basis of secret government directives, Canada’s national security apparatus is conducting mass surveillance of Canadians parallel to, if not directly patterned after, the domestic spying operations of the U.S. National Security Agency (NSA).
On the basis of secret government directives, Canada’s national security apparatus is conducting mass surveillance of Canadians parallel to, if not directly patterned after, the domestic spying operations of the U.S. National Security Agency (NSA).
Communications Security Establishment (CSE), the NSA’s Canadian counterpart and longstanding partner, has been scrutinizing the metadata of Canadians’ electronic communications since at least 2005.
Moreover, the NSA routinely provides Canada’s security agencies with intelligence on Canadians and CSE reciprocates by providing U.S. intelligence officials with information about people living in the U.S. This arrangement allows both agencies to circumvent legal bans on warrantless surveillance of their own citizenry’s communications.
It was “common” for NSA “to pass on information about Canadians,” Wayne Easter, Canada’s Solicitor-General in 2002-3, told the Toronto Star this week. As Solicitor-General, Easter was responsible for overseeing the operations of the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP).
The extent and scope of CSE’s spying and who is being targeted and why are all zealously guarded state secrets. The CSE functions under secret directives issued by the Minister of Defence—directives whose very existence is unknown to parliamentarians, let alone the public at large.
The Canadian government has responded to any slight or partial lifting of the veil on CSE activities with a campaign of disinformation, dissembling and lies. This campaign has even been facilitated by the supposed opposition parties, like the left-wing New Democratic Party, and of course, the corporate media; they have made no more than tepid calls for greater transparency about the CSC’s spying.
The Globe and Mail reported that in November 2011, former Defence Minister Peter MacKay signed a secret directive authorizing the CSE to continue its “mining” of the metadata of Canadians’ telephone and internet communications. (As I point out above, it is much worse than phone calls and internet communications.) The Globe said the program had been first authorized by Bill Graham, Defence Minister in Paul Martin’s Liberal government, in 2005, that is six years earlier.
MacKay, like U.S. President Barack Obama, responded to this revelation of massive state spying by flatly denying that CSE is “targeting” Canadians or violating constitutional prohibitions on warrantless surveillance of their communications. This lie is predicated on the drawing of a spurious distinction between the metadata created by any electronic communication and the rest of the communication and on the transparently false claim that such information is innocuous.
According to the Globe, a briefing prepared for MacKay in 2011, presumably by CSE or lawyers within his department, declared, “Metadata is information associated with a telecommunication … And not a communication.”
In fact metadata—which includes such information as the source, destination, and duration of a telephone call—is intrinsic to any electronic communication. By systematically gathering and analyzing such metadata, the U.S. and Canadian national-security apparatuses can rapidly build up detailed profiles of targeted individuals and groups, including identifying everything from their associates, to where they work, bank, and shop, and what websites they visit.
In the course of his efforts to cover-up the scope and purpose of CSE’s metadata mining, MacKay did make one revealing admission. In response to a question about the mass surveillance of Canadians’ communications, MacKay told Parliament, “I have a heads-up for the member … This is something that has been happening for years.”
Government sources, many of them unnamed, sought, meanwhile, to refute the Globe ’s claim that there had been serious questions within the state apparatus about the constitutionality of the CSE’s “metadata” mining of Canadians’ communications. In its report, the Globe said that in 2008 the then CSE Commissioner—that is the head of the government-appointed “watchdog” charged with ensuring the agency does not go beyond its legal mandate—had cautioned that the program could be violating Canadians constitutional rights and, because of his concerns, the metadata mining program was suspended for more than a year.
Sources from within the government and CSE dispute this. They say that the questions raised by Charles Gonthier—a former, now deceased former Supreme Court Justice—concerned only a small part of a much larger program, that only this part of the metadata mining program was ever suspended, and then only very briefly.
The current CSE Commissioner has publicly defended the mass surveillance and claimed that his predecessor likewise believed that the CSE has every right to spy on Canadian’s electronic communications. In an e-mailed statement to the Toronto Star, Ryan Foreman, a spokesman for CSE Commissioner Robert Decary, said, “The commissioner never questioned the legality of CSE’s metadata activities.”
MacKay and the government have also sought to shield CSE’s actions from public scrutiny by insisting that it is solely devoted to gathering foreign intelligence and, as MacKay told Parliament, “is specifically prohibited from looking at the information of Canadians.” This is an obvious falsehood and not just because warrantless metadata mining is a form of spying.
CSE’s government mandate stipulates—as MacKay well knows since he has been the minister responsible for overseeing its work for the past seven years—that it “provide technical and operational assistance” to CSIS, the RCMP and other domestic security-intelligence and law enforcement agencies “in the performance of their lawful duties.” Furthermore, CSE can seek authorization from the Defence Minister to capture and read the communications of Canadians who are in some way connected to its foreign intelligence targets. As the Toronto Star ’s Thomas Walkom has observed, “In 2011-12, the last year for which figures are available, eight such ministerial authorizations—all of unknown size and scope—were in play.”
While vigorously defending CSE’s metadata spying, the government has been anxious to put on a record that CSE does not have access to the NSA’s PRISM Program and has not been using it as a means of monitoring Canadians’ communications. Under PRISM, NSA agents are able to directly access the servers of the most important U.S. based internet companies, including Microsoft, Apple, Google, and Facebook.
The government’s claims concerning the CSE and PRISM are not credible. The CSE has been a close partner of the NSA, sharing intelligence information with it on a daily basis, for more than six decades.
Britain, which like Canada, is part of the “Five Eyes”—a consortium formed in the late 1940s by the NSA, CSE, and the signals communications agencies of Great Britain, Australia, and New Zealand to jointly monitor global communications—has already said that it obtained intelligence about Britons through PRISM.
The NSA and CSE, as the spurious distinction they have made between electronic communications’ metadata and rest of the communications illustrates, can and do create pretexts and mechanisms to illegally circumvent constitutional prohibitions.
Last but not least, whatever the validity of MacKay’s denial about spying on Canadians through PRISM, it only concerned CSE. As Easter’s comments cited above demonstrate, Canada’s security agencies have long been the recipients of intelligence on Canadians from the NSA as part of longstanding Canada-U.S. intelligence-sharing agreements and partnerships.
The CSE is part of a growing state within the state whose operations are hidden from the public. Most Canadians had never heard of the CSE and even now they know very little about its activities. When former Defence Minister MacKay renewed by secret ministerial order CSE’s authorization to spy on Canadians’ electronic communications in November 2011 he issued six other secret ministerial directives to CSE—none of whose subject let alone contents has been publicly revealed.
As in the United States, Canada’s elite has used the so-called war on terror to justify Canada’s participation in a series of imperialist wars, massively expand the national-security apparatus, and adopt laws that attack core democratic rights.