Over 16,529,763 people are on fubar.
What are you waiting for?

FBI listening to your cell; even if turned off; not just FBI Short NEWS video below Magic Lantern is keystroke logging software developed by the Federal Bureau of Investigation
Unlike previous keystroke logger programs used by the FBI, Magic Lantern can reportedly be installed remotely, via an e-mail attachment or "by exploiting common operating system vulnerabilities". It has been variously described as a virus and a Trojan horse. It is not known how the program might store or communicate the recorded keystrokes. =========================================



Carnivore is a name given to a system implemented by the Federal Bureau of Investigation that is analogous to wiretapping except in this case, e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that could monitor all of a target user's Internet traffic. Wired Magazine on Carnivore =========================================



ECHELON is a name used to describe a highly secretive world-wide signals intelligence and analysis network run by the UKUSA Community (otherwise described as the "Anglo-Saxon alliance") that has been reported by a number of sources including, in 2001, a committee of the European Parliament (EP report[1]). According to some sources ECHELON can capture radio and satellite communications, telephone calls, faxes, e-mails and other data streams nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. =========================================



Counterintelligence Field Activity (CIFA) is a US Department of Defense (DoD) agency whose size and budget are classified. It appears CIFA was created by a directive from the Secretary of Defense (Number 5105.67) on February 19, 2002. The Bush Administraton has broadly defended all of its domestic spying activities by stating that they are acting within the law as provided by the Constitution. Specifically, Article Two of the United States Constitution that suggests that the President has the chief responsibility to protect America from attack. In addition to Article Two, the President (and CIFA) may rely on Congress' specific Authorization for Use of Military Force Against Terrorists, (“AUMF”) and the War Powers Resolution as foundation, though many Congresspeople asked about this have stated that they do not support this interpretation, and that it was not their intention on signing the AUMF to give the Executive Branch the ability to conduct domestic spying outside of FISA. Since CIFA is associated with law enforcement, the USA Patriot Act and in particular, Patriot Act's Title II: Enhanced Surveillance Procedures and Patriot Act's Sec. 504, entitled "Coordination with law enforcement," that gave increased powers of surveillance to this DoD agency may support its actions in the gathering and distribution of information. =========================================



Oasis is the name of a piece of software developed by the United States Central Intelligence Agency (CIA) that converts audio signals such as cellphone calls and television and radio broadcasts into readable and searchable text. It is designed to intelligently analyze an audio signal such as a cellphone call in order to identify and label each speaker (Male 1, Male 2, Female 1, and so forth). Oasis is also able to intelligently reference terms, such as by linking "car bomb" with "terrorism". Oasis will eventually be able to recognize key languages such as Arabic and Chinese, as well as English. =========================================



The Communications Assistance for Law Enforcement Act (CALEA) is a controversial United States wiretapping law passed in 1994 (Pub. L. No. 103-414, 108 Stat. 4279). In its own words, the purpose of CALEA is: "To amend title 18, United States Code, to make clear a telecommunications carrier's duty to cooperate in the interception of communications for Law Enforcement purposes, and for other purposes." CALEA was passed on October 25, 1994 and came into force on January 1, 1995. =========================================



ANCHORY is the name of an American national security database collected by SIGINT on behalf of the NSA. Access to the database is provided on a need-to-know basis. The system was formerly known as the SIGINT Online Intelligence System. =========================================



----------------- Bulletin Message ----------------- From: bitch please. Date: Jan 24, 2007 3:27 PM I checked this out before reposting, and it's true. Here are some stories on the subject: http://yro.slashdot.org/article.pl?sid=06/12/02/0415209 http://blogs.abcnews.com/theblotter/2006/12/can_you_hear_me.html sent from jjblay:
Leave a comment!
html comments NOT enabled!
NOTE: If you post content that is offensive, adult, or NSFW (Not Safe For Work), your account will be deleted.[?]

giphy icon
blog.php' rendered in 0.0471 seconds on machine '190'.