The greatest WordPress.com site in all the land!

Archive for June, 2013

Into the Apocalypse…

June 14, 2013
————————————

Into the APOCALYPSE…
————————————

Editor:

Trillions of dollars, euros, yen, yuan and the expertise, talent, genius and brilliance of countless men and women over the past
decades have been squandered into constructing a fascist, military type spy and surveillance prison police state in America and
throughout the world.

Those trillions SHOULD have been spent on designing, building and constructing a Global Green World Order for Mankind.
Instead of driving around in gas-guzzling trucks and SUV’s (which are largely responsible for plunging us into the global emergency
of global climate change), we could have easily and efficiently transited into an alternative, free-energy, non-polluting transportation
economy.

Just this past May (May 9th to be exact), the world passed 400ppm (parts per million) of CO2 in the atmosphere.  We can now expect runaway global warming to the tune of a 5-12 degree farenheit increase in average temperatures by 2100- which is nothing short of “catastrophic” for human civilization and the biosphere.

Colorado, along with the entire Mid-west, is slated to turn into dust bowl, which will mean the END of the lucrative ski industry in this state.
As well, access the clean, fresh water will become the new “gold” of the 21st century.

For all intents and purposes, the world has now crossed the rubicon in regards to securing our future against the coming ravages of global climate change.

We are entering a new era where exploding population numbers, environmental disruption, resource shortages, economic implosion,
heightened insecurity and a proliferation of weapons worldwide (with the intent to use them) are literally plunging the human species
over the cliff into an Apocalypse of biblical proportions.

The threat of global climate change, in and of itself, could singlehandedly bring on the dreaded 4 horsemen of the Apocalypse of Revelations:
War, Famine, Pestilence and Death.  Billions will be facing extermination.

We’re not in Kansas anymore.

Craig Stevens
Colorado Springs, Colorado
USA

America Is Running the World’s Largest Terrorist Operation

 

Washington’s Blog
June 20, 2013

Chomsky: “Obama Is Running The Biggest Terrorist Operation That Exists”

Leading liberal Noam Chomsky  said yesterday:

The Obama administration is dedicated to increasing terrorism. In fact, it’s doing it all over the world.  Obama is running the biggest terrorist operation that exists, maybe in history:  the drone assassination campaigns, which are just part of it […] All of these operations, they are terror operations.

***

People hate the country that’s just terrorizing them.  That’s not a surprise. Just consider the way we react to acts of terror. That’s the way other people react to [American] acts of terror.

 

Chomsky is right.  Experts agrees that indiscriminate drone strikes are war crimes (more here andhere).

The U.S. is not only killing people whose identity it doesn’t even know (more), but it is also  killing children.  And it is using the justifiably-vilified Al Qaeda tactic of killing people attending funerals of those killed – and targeting people attempting to rescue people who have been injured by – ourprevious strikes.

Chomsky has previously extensively documented U.S. terrorism.  As Wikipedia notes:

Chomsky and Herman observed that terror was concentrated in the U.S. sphere of influence in the Third World, and documented terror carried out by U.S. client states in Latin America. They observed that of ten Latin American countries that had death squads, all were U.S. client states.

***

They concluded that the global rise in state terror was a result of U.S. foreign policy.

***

In 1991, a book edited by Alexander L. George [the Graham H. Stuart Professor of Political Science Emeritus at Stanford University] also argued that other Western powers sponsored terror in Third World countries. It concluded that the U.S. and its allies were the main supporters of terrorism throughout the world.

Indeed, the U.S. has created death squads in Latin America, Iraq and Syria.

The director of the National Security Agency under Ronald Reagan – Lt. General William Odom – noted:

Because the United States itself has a long record of supporting terrorists and using terrorist tactics, the slogans of today’s war on terrorism merely makes the United States look hypocritical to the rest of the world.

Odom also said:

By any measure the US has long used terrorism. In ‘78-79 the Senate was trying to pass a law against international terrorism – in every version they produced, the lawyers said the US would be in violation.

(audio here).

The Washington Post reported in 2010:

The United States has long been an exporter of terrorism, according to a secret CIA analysis released Wednesday by the Web site WikiLeaks.

The head and special agent in charge of the FBI’s Los Angeles office said that most terror attacks are committed by our CIA and FBI.

Some in the American military have intentionally tried  to “out-terrorize the terrorists”.

As Truthout notes:

Both [specialists Ethan McCord and Josh Stieber] say they saw their mission as a plan to “out-terrorize the terrorists,” in order to make the general populace more afraid of the Americans than they were of insurgent groups.

In the interview with [Scott] Horton, Horton pressed Stieber:

“… a fellow veteran of yours from the same battalion has said that you guys had a standard operating procedure, SOP, that said – and I guess this is a reaction to some EFP attacks on y’all’s Humvees and stuff that killed some guys – that from now on if a roadside bomb goes off, IED goes off, everyone who survives the attack get out and fire in all directions at anybody who happens to be nearby … that this was actually an order from above. Is that correct? Can you, you know, verify that?

Stieber answered:

“Yeah, it was an order that came from Kauzlarich himself, and it had the philosophy that, you know, as Finkel does describe in the book, that we were under pretty constant threat, and what he leaves out is the response to that threat. But the philosophy was that if each time one of these roadside bombs went off where you don’t know who set it … the way we were told to respond was to open fire on anyone in the area, with the philosophy that that would intimidate them, to be proactive in stopping people from making these bombs …”

Terrorism is defined as:

The use of violence and threats to intimidate or coerce, especially for political purposes.

So McCord and Stieber are correct: this constitutes terrorism by American forces in Iraq.

The U.S. has been directly supporting Al Qaeda and other terrorists and providing them arms, money and logistical support in SyriaLibya, MaliBosniaChechnyaIran, and many other countries … both before and after 9/11. And see this.

Torture – which the U.S. has liberally used during the last 10 years – has long been recognized as aform of terrorism.

Wikipedia notes:

Worldwide, 74% of countries that used torture on an administrative basis were U.S. client states, receiving military and other support to retain power.

Some Specific Examples …

The CIA admits that it hired Iranians in the 1950′s to pose as Communists and stage bombings in Iran in order to turn the country against its democratically-elected prime minister.

The former Italian Prime Minister, an Italian judge, and the former head of Italian counterintelligenceadmit that NATO, with the help of the Pentagon and CIA, carried out terror bombings in Italy and other European countries in the 1950s and blamed the communists, in order to rally people’s support for their governments in Europe in their fight against communism.

As one participant in this formerly-secret program stated: “You had to attack civilians, people, women, children, innocent people, unknown people far removed from any political game. The reason was quite simple. They were supposed to force these people, the Italian public, to turn to the state to ask for greater security” (and see this)(Italy and other European countries subject to the terror campaign had joined NATO before the bombings occurred).

As admitted by the U.S. government, recently declassified documents show that in the 1960′s, the American Joint Chiefs of Staff signed off on a plan to blow up AMERICAN airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. See the following ABC news reportthe official documents; and watch this interview with the former Washington Investigative Producer for ABC’s World News Tonight with Peter Jennings.

Nine months earlier, a false flag attack was discussed in order to justify an invasion of the Dominican Republic. Specifically, according to official State Department records, Under Secretary of State Chester Bowles wrote on June 3, 1961:

The Vice President [Lyndon Johnson], [Attorney General] Bob Kennedy, Secretary [of Defense Robert] McNamara, Dick Goodwin [who was Deputy Assistant Secretary of State for Inter-American Affairs], [head of the Joint Chiefs of Staff] General Lemnitzer, Wyn Coerr, and Ted Achilles were here. Bob McNamara and Lemnitzer stated that under the terms of the contingency paper, they were required to be prepared to move into the island on short order if required to do so, and this, in their opinion, called for substantially more troops that we had in the area. After some discussion we considered two more aircraft carriers, some destroyers, and 12,000 marines should be moved into a position some one hundred miles off the Dominican Republic shore…

The tone of the meeting was deeply disturbing. Bob Kennedy was clearly looking for an excuse to move in on the island. At one point he suggested, apparently seriously, that we might have to blow up the Consulate to provide the rationale.

His general approach, vigorously supported by Dick Goodwin, was that this was a bad government, that there was a strong chance that it might team up with Castro, and that it should be destroyed–with an excuse if possible, without one if necessary.

Rather to my surprise, Bob McNamara seemed to support this view …

The entire spirit of this meeting was profoundly distressing and worrisome, and I left at 8:00 p.m. with a feeling that this spirit which I had seen demonstrated on this occasion and others at the White House by those so close to the President constitutes a further danger of half-cocked action by people with almost no foreign policy experience, who are interested in action for action’s sake, and the devil take the highmost …

[At a subsequent meeting], Bob McNamara went along with their general view that our problem was not to prepare against an overt act by the Dominican Republic but rather to find an excuse for going into the country and upsetting it.

Department of Justice lawyer John Yoo suggested in 2005 that the US should go on the offensive against al-Qaeda, having “our intelligence agencies create a false terrorist organization. It could have its own websites, recruitment centers, training camps, and fundraising operations. It could launch fake terrorist operations and claim credit for real terrorist strikes, helping to sow confusion within al-Qaeda’s ranks, causing operatives to doubt others’ identities and to question the validity of communications.”

As Chris Floyd and many others have noted, this plan has gone live.

United Press International reported in June 2005:

U.S. intelligence officers are reporting that some of the insurgents in Iraq are using recent-model Beretta 92 pistols, but the pistols seem to have had their serial numbers erased. The numbers do not appear to have been physically removed; the pistols seem to have come off a production line without any serial numbers. Analysts suggest the lack of serial numbers indicates that the weapons were intended for intelligence operations or terrorist cells with substantial government backing. Analysts speculate that these guns are probably from either Mossad or the CIA. Analysts speculate that agent provocateurs may be using the untraceable weapons even as U.S. authorities use insurgent attacks against civilians as evidence of the illegitimacy of the resistance.

And there is substantial additional evidence of hanky panky in Iraq.

 

Related posts:

  1. Is America the World’s Largest Sponsor of Terrorism?
  2. Top Interrogation Experts Agree: Torture Doesn’t Work
  3. Experts Agree: War On Terror Is A Racket, CIA And Wall Street Are Financed By Global Drug Trade
  4. Interrogation Experts From Every Branch of the Military and Intelligence Agree: Torture DOESN’T Produce Useful Information
  5. G20 case reveals ‘largest ever’ police spy operation

Over 200 Million People Are In the Facial Recognition Database

Over 200 Million People Are In the Facial Recognition Database

 

You are probably participating in the facial recognition database whether you want to or not. Most likely, your visage is there to be easily identified, without your consent, even if you’ve never committed a crime.

BERLIN, GERMANY - A quadrocopter drone flown remotely by a participant and equipped with a video camera flies on the first day of the re:publica 2013 conferences on May 6, 2013 in Berlin, Germany. Re:publica, a three-day-event, brings together bloggers and digitial media professionals for a series of conferences on affecting social, political and economic change through the Internet. (Photo by Sean Gallup/Getty Images)

By Daisy Luther
Intellihub.com
June 17, 2013

Using the vague criteria of “law enforcement purposes”, the United States has more than 200 million Americans filed away in various facial recognition databases.  If you have a driver’s license or any other government photo ID, your face is probably one of them.

The Washington Post reported:

Law enforcement use of such facial searches is blurring the traditional boundaries between criminal and non-criminal databases, putting images of people never arrested in what amount to perpetual digital lineups. The most advanced systems allow police to run searches from laptop computers in their patrol cars and offer access to the FBI and other federal authorities.

Such open access has caused a backlash in some of the few states where there has been a public debate. As the databases grow larger and increasingly connected across jurisdictional boundaries, critics warn that authorities are developing what amounts to a national identification system — based on the distinct geography of each human face.

There is no way to “opt out” of this for privacy reasons if you intend to be a licensed driver in the United States. Have you noticed that now when you go to have a driver’s license picture, you aren’t allowed to smile?  That’s because it can throw off the ability of scanners to “recognize” you, because it changes the shape of your eyes and can also obscure your eye color.  For the same reason, you aren’t allowed to wear glasses, long bangs, or head coverings.  Your face is being catalogued for future identification purposes.

Only 13 states have not gone into full-out Big Brother mode with facial recognition…yet.  At this time, the states without the technology are Alaska, California, Wyoming, Arizona, Mississippi, Louisiana, Missouri, Michigan, Ohio, Virginia, Maryland,  Maine, and New Hampshire.  However, even though they don’t have the technology to readily identify residents, they still have millions of photos in their databases.

What’s more, it isn’t only our driver’s licenses that we have to worry about.  Another, even larger, database exists. The US State Department has a database with 230 million searchable images.  Anyone with a passport or an immigration visa may find themselves an unwilling participant in this database.   Here’s the breakdown of who has a photo database:

  • The State Department has about 15 million photos of passport or visa holders
  • The FBI has about15 million photos of people who have been arrested or convicted of crimes
  • The Department of Defense has about 6 million photos, mainly of Iraqis and Afghans
  • Various police agencies and states have at least 210 million driver’s license photos

This invasion of privacy is just another facet of the surveillance state, and should be no surprise considering the information Edward Snowden just shared about the over-reaching tentacles of the NSA into all of our communications. We are filing our identities with the government and they can identify us at will, without any requirement for probable cause.

The authorities that use this technology claim that the purpose of it is to make us safer, by helping to prevent identity fraud and to identify criminals.  However, what freedom are we giving up for this “safety” cloaked in benevolence? We are giving up the freedom of having the most elemental form of privacy – that of being able to go about our daily business without being watched and identified.  And once you’re identified, this connects to all sorts of other personal information that has been compiled: your address, your driving and criminal records, and potentially, whatever else that has been neatly filed away at your friendly neighborhood fusion center.

Think about it:  You’re walking the dog and you fail to scoop the poop – if there’s a surveillance camera in the area, it would be a simple matter, given the technology, for you to be identified. If you are attending a protest that might be considered “anti-government”, don’t expect to be anonymous.  A photo of the crowd could easily result in the identification of most of the participants.  Are you purchasing ammo, preparedness items, or books about a controversial topic?  Paying cash won’t buy you much in the way of privacy – your purchase will most likely be captured on the CCTV camera at the checkout stand, making you easily identifiable to anyone who might wish to track these kinds of  things.  What if a person with access to this technology uses it for personal, less than ethical reasons, like stalking an attractive women he saw on the street?  The potential for abuse is mind-boggling.

If you can’t leave your house without being identified, do you have any real freedom left, or are you just a resident in a very large cage?

*****

Daisy Luther is a freelance writer and editor.  Her website, The Organic Prepper, offers information on healthy prepping, including premium nutritional choices, general wellness and non-tech solutions. You can follow Daisy on Facebook and Twitter, and you can email her at daisy@theorganicprepper.ca

Related Articles You Might Like:

All-in-one biometric tool combines facial, card and fingerprint scanning

Shuttle Computer HR70 biometric scanner

All-in-one biometric tool combines facial, card and fingerprint scanning

Facilities access is the first line of defense for most agencies. Keeping cyberspace clear of bad guys does little good if they can walk in the front door of the building and into the server room. So it’s essential to know who is where in today’s office buildings, schools, warehouses or labs. But implementing a robust and non-invasive biometric scanning system has always been both expensive and a bit of a technological chore.

Shuttle Computer Group is trying to make it easier and more affordable to lock down buildings using biometric controls with its HR70 all-in-one facial recognition hardware. In addition to scanning faces, the HR70 has an optional contactless card reader that could work with Personal Identity Verification and Common Access Cards, and it even has a fingerprint reader that does not require contact with the screen.

“More and more companies are using security devices for employee access, time stamping and verification of employee location in case of an emergency, but high cost has been prohibitive,” said Marty Lash, director, sales and marketing, Shuttle Computer Group.  “Now Shuttle has an affordable, all-in-one product, making it easier for integrators to develop a customized solution for any security installation.”

Designed for commercial, industrial or institutional systems, Shuttle will make a software development kit and an application programming interface available so integrators can use the HR70 as a basis for electronic access control systems using facial recognition, optional card reading and/or fingerprint identification. Programmers can use one, two or all three devices together to determine security access levels.

Shuttle’s HR 70 features a seven-inch LCD touch-screen panel with two 2.0 megapixel, 720p high-definition cameras. It is powered by an Intel Celeron 847 17W CPU for fast search-and-match results through large databases.

Using the USB 3.0, RS232 and two-way RS485 communications support, programmers can create dynamic actions like opening doors, lifting garages, sliding bolts, releasing locks and other actions based on facial, fingerprint or card recognition, with almost instantaneous results. And because these devices are connected to a network, they can be remotely monitored from a central location, and security personnel can view access in real time.

The HR70 will be available in mid-July through ASI, Ingram, Ma Labs and Synnex, and it comes with a standard three-year limited warranty. Pricing will be announced at that time, but company officials told GCN that they expect the kit will be available for less than $1,500 per unit.

About the Author

John Breeden II directs the GCN Lab. Follow him on Twitter: @GCNLabGuys.

Skynet to Launch October, 2013

Sunday, June 16, 2013

Skynet to Launch October, 2013

 

Jack Mullen
Activist Post

Business Insider published an article about the NSA data center being constructed in Bluffdale, Utah. The facility, being roughly 1 million square feet, will house a computing and data harvesting and long term data storage facility to be operational by October 2013. (Source)

The stated purpose of the facility is to “listen and decode all foreign communications of interest to the security of the United States.” But in light of the recent revelations of NSA whistleblower Edward Snowden, the data center under construction in Utah is far more likely a tool of the United States Government (and its global masters) to collect unimaginable amounts of data on Americans and eventually every human on earth.

In fact, as far back as the mid nineteen eighties, the NSA and other intelligences agencies created and controlled a secret computer monitoring operation in New Zealand and elsewhere called project ECHELON.

Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world’s telecommunications networks. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed primarily for non-military targets: governments, organizations, businesses, and individuals in virtually every country. It potentially affects every person communicating between (and sometimes within) countries anywhere in the world.[*]

With this so-called leak from Snowden, the public is now aware of something that has been going on for decades and, by now, would have already compiled billions of records about hundreds of millions of people in the America and the world.

In fact this ‘leak’ really doesn’t provide a lot of new information, since we already knew “The ECHELON system is not designed to eavesdrop on a particular individual’s e-mail or fax link. Rather, the system works by indiscriminately intercepting very large quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. A chain of secret interception facilities has been established around the world to tap into all the major components of the international telecommunications networks. Some monitor communications satellites, others land-based communications networks, and others radio communications. ECHELON links together all these facilities, providing the US and its allies with the ability to intercept a large proportion of the communications on the planet.”

 

But what we do learn from the media’s focus on this “new shocking revelation” is that the technology of secret, off-the-record, underground intelligence operations working for either a breakaway civilization, living side by side with earth’s existing civilizations, or operated as a spook operation serving a multinational global elite seeking to control and rule the world, is far more advanced than previously believed. Moreover, it would seem likely this new “leak” is just another bit of predictive programming designed to alert the world something even bigger is already in the works.

The data center, at a cost of $2 billion (but much higher, based on the cost of the technology already created to make this possible) is probably the outward tip of an iceberg to introduce and indoctrinate the public to something even worse than the news that every bit of human communication and knowledge is and has been recorded for decades.

In terms of data storage, some publications suggest the data center will house digital storage capacities on the order of YottaBytes which is a number so large it is incomprehensible to the human mind. A Yottabyte is one septillion bytes or 10 to the 24th power bytes. Enough storage, indeed, to record and keep every single bit of human digital information; every phone call, text message, Internet chat, Email, song, word spoken, every book, bank account, all financial data, patents, stolen intellectual property, and more. With this amount of storage and more on the way, as the “law of accelerating returns” turns out denser and faster memory, the entire real-time movie of mankind can be recorded, analyzed and used, for what – only the gods know.

“Cyberdyne Systems” 2013

 
At the center of the data center will be one of the world’s most powerful computers ever built (at least as far as we art told). The so-called, and named with a wink to triangle-worshipping cults, ‘Titan Supercomputer’ will come alive and for the first time operate at the speed necessary and with the memory required to become conscious.

According to Ray Kurzweil, the geek poster boy of transhumanism, in his 1999 prophecy and transhumanistic bible entitled When Computers Exceed Human Intelligence: The Age of Spiritual Machines, the above average human brain operates or process approximately 20 million billion calculations per second, in other words 20,000 trillion calculations per second.

In the article linked below, the NSA Supercomputer Titan, coincidentally is advertised to operate at 20,000 trillion calculations per second. Furthermore, Kurzweil explains that in addition to computing power, a human-like sentient computer would also have to have at least as much memory as the current state-of-the-art human being, which he calculates to be about 1 million billion bits or a 1000 trillion bits: and since a byte is 8 bits and kilobyte is 1024 bytes, that works out to approximately 122 terabytes or 122,000 gigabytes.

According to the article above, the memory available to Titan is on the order of at least 5 Zettabytes or 5 trillion gigabytes, which is enough memory to incorporate 41 MILLION HUMAN BRAINS.

According to the original Terminator movie timeline, Skynet’s technology was built and began deployment in 1994 (no doubt an Orwell wink, as a Terminator robot is sent back to 1984 to stop the birth of JC – not Jesus Christ, but John Connor), and on August 4, 1997 the machine went online. Learning geometrically, the machine became sentient at 2:14 AM, 25 days later on August 29, 1997.

The new real-life NSA supercomputer, called Titan, is named after a race of gods created from descendants of Earth and Uranus, hybrids, immortal, of great strength of body and mind and rulers of Earth; it was the Titan Prometheus who created man from clay and theft of fire.

The Titan Supercomputer, with enough computing power and infallible memory to become sentient, will come online in October, 2013 and, like “Skynet”, will it begin to learn? With the brain capacity of 41 million human minds and all of the data and information about billions of human beings – this “machine” could become quite powerful very quickly. With connections to satellites and every major power and command center on earth and the knowledge base of nearly every human mind in the written history of mankind – all written knowledge: we can only imagine the possibilities.

Human Epitaph

 
Kurzweil, the lead public futurist barking for the technocratic elite, predicts the next evolution on earth will be the machine. In his vision, mankind morphs into a machine, leaving his ephemeral human vessel behind, a biological consciousness welded into machine performance on a quest for immortality and a chance to become a god.

According to Kurzweil, the current human biological evolutionary path to knowledge is bottlenecked by brain speed limits and memory capacity: “The brain’s weakness is the extraordinarily slow speed of its computing medium, a limitation that computers do no share with us. For this reason, DNA-based evolution will eventually have to be abandoned.” *

With the arrival of Titan, the latest and greatest model of a co-evolving machine-based life, the technology now exists to eradicate all human privacy. This is a very big event in human history, one that would require a book to explore, but I am going to venture a few reasons why it will become the bifurcation point in the race of the man versus the machine.

Privacy also includes privacy of thought; technology permitting direct measure and prediction of thought is now being successfully deployed. [*]

Privacy is a uniquely human idea and experience and I would argue necessary for human evolution and growth as a species of individuals seeking an individual experience with paths to personal growth, sprirtualism and self actualization.

Without privacy, what is a individual? He or she is a forgone conclusion, a worker bee, a drone or, using a Star Trek analogy, a Borg. Without privacy, human development, personality, strengths, appearance and characteristics will become uniform and monotonous. Without privacy, there will eventually be no concept of private property and its accumulation toward expressions of sudden knowledge bursts and improvement via repeated struggle of human minds seeking to solve problems benefiting the individual and species.

Without private property, there can be no Liberty by definition. Liberty is the freedom of will to choose and do individual things, think individual thoughts and express oneself individually, concomitantly where news and knowledge of these expressions is always derivative, never before the fact.

Without privacy, I would argue much of mankind will make his last act of individualism and choose not to live, because privacy is the oneness, the aloneness that defines the “I” in “I am alive”.

Mankind 2.0

 

Kurzweil and other futurists, god wannabees, technocrats, and wealth-dense psychopaths all know and anticipate an end for human beings in our present form. They anticipate a grand culling where those who will not conform and ‘transform’ will lose the will to live in a world of intellectual and physical inferiority; in a world without the privacy necessary to trigger a far stronger, intelligent and self evolving human individual.

The technocrats expect ‘standard’ wetware human beings to become drones, slaves, relegated to the toy closest of wealthy gods looking for interesting gifts for their children. But I think humanity is still possessed of something the gods of the machine have failed to recognize in their haste to end the individual and build a collective hive minded, data sharing, alpha Borg.

Quantum Minds and Spiritual Entanglements

 
The human brain, impossibly slow and working with junior-sized memory, is still not fully understood and, surprisingly to the machine metaphysicians, is still able to solve problems apparently impossible within a purely analytical, algorithm-based paradigm of brain-mind operation. Many scientists and philosophers find the idea that a computer could be conscious, just by doing what they do now only faster and with more memory, wishful thinking bordering on insane.

Thinkers such as John Searle have made arguments that Artificial Intelligence is only a “ useful tool in the study of mind” and no matter how quickly, or massively parallel, these “Strong Calculators” perform algorithms and mathematical calculations – without the ability to ever ‘understand‘ they can only simulate the operation of the mind.

Summarizing Searle and others such as John McCarthy, the inventor of the term Artificial Intelligence:

mental states are biological phenomena. Consciousness, intentionality, subjectivity and mental causation are all a part of our biological life history, along with growth, reproduction, the secretion of bile, and digestion. [*]

Another scientist and writer versed in multiple disciplines is Roger Penrose, English mathematical physicist, recreational mathematician and philosopher. Starting with Gödel’s incompleteness theorem and working through some advanced mathematics, Penrose concludes the human mind is not a Turing Machine because, if it were, the mind would be hobbled by Gödelian limitations.[*]

Penrose postulates that since Gödelian impossible problems require an infinite number of calculations, the human mind goes around this “Gödelian Bottleneck” using quantum computing, a method of solving problems of the type requiring a large number, or even an infinite number of calculations. Quantum computers, that have been already built using human DNA as the processor, instantly distill a large number of calculations into a result by “actually turning an infinite time into a finite time”[**]

Beyond the abstract arguments couched in obscurity of abstruse mathematics is the question of life from a spiritual point of view. The idea that human beings are more than a meat sack benefiting from an evolved, 3 pound, wet-working, DNA based, sugar-powered parallel processor. Many people see the human body as the seat of a soul, a higher being condensed into a suitable shell, enjoying a spectacularly human experience as part of an immortal sequence of an infinite number of lifetimes.

The evidence of what Lawrence LeShan called the “Clairvoyant Reality” and “Transpsychic Reality” seems to indicate the human mind is also connected to a higher order of consciousness, something connecting all life, perhaps all life in the Universe. Dr. LeShan and others have used altered states of consciousness to discover information and to affect changes in our reality including healing of others through psychic connections, that cannot be explained using models based on algorithms and Turing machines.

Humans possess a DNA-based genetic blueprint capable of storing massive amounts of data, at least 700 Terabytes per gram of DNA is the current estimate. Additionally, the human brain appears to contain a light-sensitive receiver capable of detecting light even in total darkness, the Pineal gland. The Pineal gland structure and the structure of DNA suggest that both may have properties of a receiving antenna, capable of receiving and transmitting electromagnetic information.

These discoveries and the lack of information about how that brain/mind organ actually works, mean that the human evolution/spiritual path my have yet much to reveal. Perhaps expanded consciousness and more directed use of dormant DNA will lead to a biological human 2.0, given time.

Collectivism’s Final Frontier 

 
Kurzweil makes the claim that machines have characteristics which make them superior to humans along a number of dimensions. One of the primary attributes of machine intelligences is their ability to quickly share and clone information (data).

Machines, according to Kurzweil would only require one working unit to populate their entire kind – a single machine life-form could then clone and copy data to others; instantly the new machines would have access to all the knowledge of their ancestor. “Machines can readily share all of their accumulated knowledge, so only one machine has to do the learning”. [*] Humans on the other hand must learn via a slow and arduous process and, at the same time, suffer the loss of memory and incorporate detriments of an aging body.

The advantages of instantly sharing, copying and cloning information among artificially intelligent entities are, however, inconsistent with individuality and novelty. Humans beings are individuals, experiencing an individual life; contributing to the collective lives of others only as required for optimum survival of the individual and hence the species. Individuals are required to produce and populate the species and distinctive characteristics evolve by natural selection and the nature of the spawned individual, which introduces novelty and unexpected consequences and the uniqueness of an individuals experience.

Data sharing, cloning and copying are schematic code for uniformity and a singular experience. Creating life based on sharing and copying are consistent with Collectivism, a paradigm used to conform and transform individuality into uniformity and consistent with the known consequences of generational incest.

Kurzweil and global elite expecting to somehow “breakaway” from their humanity and merge with the machine resulting in both immortality and access to infinite knowledge must also understand it is the nature of collectivism to reduce complexity in the pursuit uniformity. Collectivism favors the collectors; any systems involving sentient life must also include a hierarchy of interests with rules of survival dictating use of resources. Kurzweil and company may find themselves trapped in their own collective, prisoners of immortality and numbed down by monotony.

In the words of the Borg: We are the Borg. Lower your shields and surrender your ships. We will add your biological and technological distinctiveness to our own. Your culture will adapt to service us. Resistance is futile.”[*]

Revolution 2.0 

 

For those of us that want to remain human it is important to value privacy, property and the resulting Liberty. We are now in the upward knee of an approaching singularity which has been telegraphed for centuries and soon will change the very nature of being human.

Now is the time self-actualized, spiritually enlightened individuals demand and, if necessary, fight to remain private beings, living and growing and experiencing our unique and distinctive private lives.

It is time to erase and reboot the techno-civilization that is exponentially accelerating toward collectivism’s final frontier; take down systems designed to destroy privacy, collect data and redistribute self-responsibility.

For humans a life of self-responsibility is the means to remain human. We are individuals and as such responsible for and benefit from our uniqueness and the resulting control over destiny.

We are not a means to some other’s ends, but rather an end in ourselves.

Sources:
http://terminator.wikia.com/wiki/Skynet
http://www.businessinsider.com/pictures-of-the-nsas-utah-data-center-2013-6
http://cryptome.org/jya/echelon.htm
http://www.nbcnews.com/technology/google-search-basically-reads-your-mind-now-775019
http://articles.timesofindia.indiatimes.com/2013-05-16/computing/39309615_1_amit-singhal-google-voice-search
http://www.jeffpolachek.com/mind-control/mc-research-docs/199-government-technology-to-read-your-thoughts-and-implant-new-ones
http://www.cs.bham.ac.uk/research/projects/cogaff/sloman.searle.85.text
http://www.flint.umich.edu/~simoncu/380/searle.htm
http://www.sciencedaily.com/releases/2007/03/070321093451.htm
** http://arxiv.org/ftp/quant-ph/papers/0512/0512248.pdf
http://www.wired.com/wiredscience/2013/01/dna-data-storage-2/
http://www.hark.com/clips/nfsndxsfnt-we-will-add-your-biological-and-technological-distinctiveness-to-our-own

Books mentioned : http://www.amazon.com/The-Age-Spiritual-Machines-Intelligence/dp/0140282025/ref=sr_1_1?ie=UTF8&qid=1371308603&sr=8-1&keywords=age+of+spiritual+machines
http://www.amazon.com/The-Emperors-New-Mind-Concerning/dp/0192861980/ref=sr_1_1?ie=UTF8&qid=1371309801&sr=8-1&keywords=the+emperors+new+mind
http://www.amazon.com/The-Medium-Mystic-Physicist-Paranormal/dp/1581152736
http://www.amazon.com/The-Singularity-Is-Near-Transcend/dp/0143037889/ref=sr_1_2?ie=UTF8&qid=1371308638&sr=8-2&keywords=age+of+spiritual+machines
http://www.amazon.com/Three-Pound-Universe-Judith-Hooper/dp/0874776503/ref=sr_1_1?ie=UTF8&qid=1371308681&sr=8-1&keywords=3+pound+universe

Movie References: http://www.amazon.com/The-Terminator/dp/B00153ZC8Q/ref=sr_1_1?ie=UTF8&qid=1371309924&sr=8-1&keywords=terminator

Jack Mullen has been a businessman for more than 25 years, owning 3 radio stations, several technology based companies and a resource development company.

NSA Copies All Internet Data, Creates Dossiers on Every User

J.P. Hicks
Blog Tips

The Associated Press dropped a bombshell report yesterday that claims the NSA’s secret Internet spy program Prism is just a small part of a much more “expansive and intrusive” digital spying effort.

According to the AP, the NSA copies ALL INTERNET traffic in and out of the United States for analysis by hoovering all data that passes through fiber lines.

“Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light,” AP reports.

Prism was originally thought to be a program to force Internet companies to hand over private user data to the government. But it turns out that Prism is actually a filtering tool to “make sense of the cacophony of the Internet’s raw feed…Prism takes large beams of data and helps the government find discrete, manageable strands of information.”

 
 
It then manages those strands of data by creating dossiers on every Internet user, providing the government with “names, addresses, conversation histories and entire archives of email inboxes.”
 
And, of course, all of this data is collected and kept on innocent people without a warrant or any probable cause.
 
This explosive report comes the same day that the NSA held a classified briefing for members of Congress where they admit to listening to phone calls within the United States without a warrant.
 
CNET reports:

Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed “simply based on an analyst deciding that.”

If the NSA wants “to listen to the phone,” an analyst’s decision is sufficient, without any other legal authorization required, Nadler said he learned. “I was rather startled,” said Nadler, an attorney and congressman who serves on the House Judiciary committee.

 
Nadler told CNET that the “same legal standards that apply to phone calls also apply to e-mail messages, text messages, and instant messages.” 
 
In other words, the NSA claims the authority to listen to any call or read any email based on the whims of an analyst, not a court order based on probable cause.

This is precisely the power Edward Snowden, as an analyst working for the private NSA contract Booz Allen Hamilton, claimed to have in his interview with The Guardian.

 
All of these recent revelations seem to confirm the worst fears of civil liberties groups. The American government is indeed listening to our phone calls and reading our emails without a warrant and little to no oversight to how this information is accessed or used.
 
What’s even worse, they’re building dossiers on all Americans to be tapped whenever one of the hundreds of thousands of analysts decides to, and all of it occurs in secret.
 
This is perhaps the most egregious breach of the public’s trust in the history of the United States.  The government operates with complete secrecy while knowing all private information about its citizens.

Weren’t we supposed to have a transparent government with individual privacy for citizens? 

http://www.guardian.co.uk/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video

J.P. Hicks is an entrepreneur, info-activist, pro blogger, editor of BlogTips.com and author of Secrets to Making Money with a Free Blog. Follow @ Twitter, or like on Facebook.

– See more at: http://www.blogtips.com/2013/06/nsa-copies-all-internet-data-creates.html#sthash.5jYHhdeD.dpuf

PRISM Is Just Part Of A Much Larger, Scarier Government NSA Surveillance Program

PRISM Is Just Part Of A Much Larger, Scarier Government Surveillance Program

 
 
 
nsa-spying-logo

In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.

Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world’s largest software company and, at the time, largest email provider.

The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.

Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate.

Inside Microsoft, some called it “Hoovering” — not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI director, who gathered dirt on countless Americans.

This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency program that seizes records from Internet companies. As laws changed and technology improved, the government and industry moved toward a streamlined, electronic process, which required less time from the companies and provided the government data in a more standard format.

The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe.

But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort.

Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet’s backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.

Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information.

The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president’s daily briefing. Prism makes sense of the cacophony of the Internet’s raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.

Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism’s success.

The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far.

The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.

NSA Scandal Goes Global: British Government Spied on G20 Delegates

Published on Monday, June 17, 2013 by Common Dreams

NSA Scandal Goes Global: British Government Spied on G20 Delegates

More leaks from NSA Whistleblower Edward Snowden show that government spying is not limited to the United States

– Sarah Lazare, staff writer

New revelations exposed Sunday show that British government hosts of the 2009 G20 summit spied on the internet and phone communications of foreign delegates and politicians and went so far as luring officials to fake internet cafes where their email and computer use was monitored.

(Photo: NSA Whistle Blower Edward Snowden/ABC News) The latest developments, exposed by NSA whistleblower Edward Snowden and reported by The Guardian, comes as the G8 summit launches its first day of meetings, again hosted by the British government.

Britain’s Government Communications Headquarters (GCHQ)—a close ally of the NSA—is coming under widespread criticism as the NSA spying scandal goes global.

The Guardian reveals broad and extensive spying on the 2009 G20 delegates, focusing on those from Turkey and South Africa, including:

• Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates’ use of computers;

• Penetrating the security on delegates’ BlackBerrys to monitor their email messages and phone calls;

• Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit;

• Targeting the Turkish finance minister and possibly 15 others in his party;

•  Receiving reports from an NSA attempt to eavesdrop on the Russian leader, Dmitry Medvedev, as his phone calls passed through satellite links to Moscow.

President Obama has vowed to fiercely defend NSA spying to global superpowers at the upcoming summit. While the Obama Administration has received some blowback from European Union politicians, including last week’s note of concern about the NSA Prism spying program, the latest revelation shows the the spying scandal beyond the U.S. government extends.

NSA’s Largest Spy Center in Utah

NSA Is Building America’s Largest Spy Center

 

 

“The former NSA official (Wm. Binney in December 2012)
held his thumb and forefinger close together: ‘We are that far
from a turnkey totalitarian state.’”

– James Bamford, Author, The Shadow Factory (NSA)


Above:  1 million square feet is needed for the Utah Data Center now
under construction for the National Security Agency in Bluffdale, Utah,
south of Salt Lake City. Expected operational date is September 2013.
Photo: Name withheld; digital manipulation by Jesse Lenz for Wired.com.
Below:  NSA construction of Utah Data Center on March 20, 2012.
Image © 2012 by Ravell Call, Deseret News.


NSA was created by a TOP SECRET memorandum signed by
U. S. President Harry S. Truman on November 4, 1952.


Headquarters for the National Security Agency is at Fort George G. Meade,
Maryland, about 15 mi (24 km) southwest of Baltimore, where
some 18,000 people work. See: http://www.nsa.gov/.

 

Reprinted June 7, 2013 – Given the current abuse by the NSA and U. S. government in spying on most of the United States, monitoring phone calls and digital communications, Earthfiles is reprinting Linda Moulton Howe’s March 30, 2012, interview with James Bamford, the only author to write three books about the National Security Agency (NSA) that was set up in secrecy on November 4, 1952, and outside Congressional oversight by the Harry Truman Administration.

James Bamford discusses the NSA’s expansion into the Utah Data Center in Fall 2013, that will be the largest spy facility known in world history. Is the United States now a totalitarian state pretending to be a red, blue and white “democracy”?

“For the first time since Watergate and the other scandals of the Nixon Administration, the NSA has turned its surveillance apparatus on the United States and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls whether they originate within the country or overseas.”

– James Bamford, Author, The Puzzle Palace and The Shadow Factory about NSA

 

Original March 30, 2012  Washington, D. C. – V. James Bamford was born on September 15, 1946, in Natick, Massachusetts. He was drafted into the U. S. Navy during the Vietnam war from 1964 to 1967, where “I was a low level paper shuffler in Navy intelligence, but not a formal analyst.” Using the G. I. bill, he went on to study law at Suffolk University Law School in Boston, Massachusetts. Upon graduation, he decided rather than be a lawyer, he wanted to write and the subject he was most provoked about was the super secret National Security Agency. James managed to get a book contract with Houghton Mifflin publishers and after more than five years of hard work in libraries studying obscure government documents and manuscript collections left by deceased NSA employees, filing Freedom of Information Act requests and searching for news about construction contracts that led to more information about the “No Such Agency,” James Bamford’s first groundbreaking book, The Puzzle Palace: A Report On NSA, America’s Most Secret Agency, was released in 1982.

In addition to describing the role of the NSA and explaining how it was organized, the book exposed details of a massive eavesdropping operation Operation Shamrock that included monitoring American telegrams and phone calls without warrants from the 1950s to 1975, which was illegal. According to security expert Bruce Schneier, Bamford’s book was popular with NSA employees because “the agency’s secrecy prevents its employees from knowing much about their own history.”

Before The Puzzle Palace’s publication, the Reagan administration claimed that unclassified source documents were released to Bamford in error and threatened him with legal action if he did not return 250 pages of documents he had obtained through FOIA requests. Bamford refused to turn over the documents and published the book as planned. After Bamford’s refusal, NSA classification rules were revised to allow documents to be re-classified and NSA agents were sent to libraries to remove previously declassified documents that Bamford had found and used in his book.

New York Times Washington bureau reporter Eric Lichtblau described The Puzzle Palace as “the benchmark study of the N. S. A. that first pulled back the curtain to provide a glint of unwanted sunlight on the place.”

Now 66-years-old and author of two more books about the National Security Agency – Body of Secrets © 2002 and The Shadow Factory © 2008 – on March 15, 2012, James Bamford released in Wired.com another revelation about the NSA entitled, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”  Bamford wrote, “For the first time since Watergate and the other scandals of the Nixon Administration, the NSA has turned its surveillance apparatus on the United States and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls whether they originate within the country or overseas.”

Bamford’s Wired article set off an internet buzz and was discussed on March 20, 2012, during a House Armed Services Subcommittee on Emerging Threats and Capabilities that had before them NSA’s Director, General Keith Alexander. Adding more buzz to James Bamford’s Wired.com article about his agency’s gigantic expansion into a new Utah Data Center in Bluffdale, Utah, General Alexander told the subcommittee:  “The NSA is not authorized to do warrantless wiretapping nor do we have the equipment in the United States to collect that kind of information.”

The next day on March 21, 2012, James Bamford wrote another Wired.com article that countered General Alexander under the headline, “NSA Chief Denies Domestic Spying, But Whistleblowers Say Otherwise.” On March 25th, I talked with James Bamford at his London  home about the insider source he had for the alarming details about the million-square-foot  Utah Data Center now under construction scheduled for operation in September 2013, that will have the ability to capture and store “all forms of communication, including the complete contents of private emails, cell phone calls, Google searches as well as all sorts of personal data trails such as parking receipts, travel itineraries, bookstore purchases and other digital information.”


Interview:
Play MP3 interview.

James Bamford, Author, The Puzzle Palace © 1982; Body of Secrets ©  2002; The Shadow Factory © 2008, Washington, D. C. and London, England:  “One of the people I interviewed for the Wired.com article was William Binney. He had been the architect of the NSA’s worldwide eavesdropping operation. He was also in charge of automating the worldwide eavesdropping operation. He told me in very clear language how the NSA was intercepting the communications of Americans.

IN FACT, YOU DESCRIBE IN YOUR WIRED ARTICLE WHEN HE IS TALKING TO YOU AND HELD HIS THUMB AND FOREFINGER CLOSE TOGETHER AND SAID, ‘WE ARE THAT FAR FROM A TURNKEY TOTALITARIAN STATE.’  COULD YOU TALK ABOUT WHO HE IS, WHY HE LEFT THE NSA AND HOW HE CAME TO TELL YOU THIS?

[ Editor’s Note:  Totalitarianism is a political system where the State does not recognize any limits to its authority and works to regulate and control every aspect of public and private life. The concept of totalitarianism was first developed by Italian fascists in the 1920s, Nazi Germany in the 1930s and Soviet Communism for most of the 20th Century.]

William Binney worked at NSA for almost forty years. He is a crypto mathematician making and breaking codes. His job at NSA in the late 1990s and during the 2000s, he was deputy chief of the organization at NSA that was responsible basically for eavesdropping all around the world. And he was the technical director. He was the one who helped create the system that made that possible.

And he was also the founder and co-director of an organization known as the Signals Intelligence Automated Research Center, SIARC. That organization was responsible for taking the worldwide eavesdropping network and automating it so that information could be picked up automatically and sent back to NSA. But he left in disgust in late 2001 after discovering that the  system he developed was now being used to eavesdrop on American citizens without a warrant, which is illegal. And so Bill Binney did the honorable thing, which was not taking part in it and leaving the agency. He said, “The NSA violated the Constitution setting it up. But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.”

Then he was quiet for many years about this and then finally decided when I was doing  this article for Wired.com to explain the system and how it worked.

SO HE IS A PERSON WHO CERTAINLY WOULD HAVE INSIDE KNOWLEDGE WHEN HE SAID WE ARE CLOSE TO A ‘TURNKEY TOTALITARIAN STATE.’  HOW HAS THIS HAPPENED?

Well, this happened because after 9/11, the Bush Administration decided to weaken the laws and go around the laws and to begin turning NSA’s giant ear that was always focused outward since the abuses of the Nixon Administration and turn it inward. That was all done illegally and secretly by the Bush Administration until December 2005 when The New York Times made a revelation about the abuse.

And then after that, some of the reforms were put back into place, but they were in much weaker form then they were originally. Today there is still no real accountability for NSA. They are not called before Congress and asked questions about how they do their work; how many people are targeted; how many Americans are there targeted? So the American public is just left without any knowledge about this agency and how it does its work and whether the NSA is obeying the laws.

If you look at NSA’s history – I wrote three books about the NSA over the past thirty years – much of its history has been involved with illegal eavesdropping on American citizens. The NSA was formed in 1952 and until 1975, during that entire period of time, NSA was illegally eavesdropping on American communications. They were reading every telegram that came into the United States or went out of the United States or through the United States during that entire period in an operation called OPERATION SHAMROCK. Again, without any warrants, not a single warrant.

The NSA was also eavesdropping on telephone calls of anti-war protesters and so forth – again without a warrant. That was until 1975. And then there was this period from 1975 – or actually 1978 when the Foreign Intelligence Surveillance Court was created (FISA court). Then again in 2011, the Bush Administration turned NSA’s eavesdropping on American citizens and then the Congress changed the law to weaken the protections that were put in place in 1975 to 1978.

So for probably half of its history, NSA was doing illegal spying on United States citizens and the American public has to wonder what this agency is and it’s never had more power than it has today because of the technological capabilities given to it.

 

NSA Director Gen. Keith Alexander Contradicts
James Bamford In Congressional Subcommittee


General Keith Alexander, Director, National Security
Agency (NSA), Fort Meade, Maryland.

YOUR MARCH 15, 2012, WIRED.COM ARTICLE PROVOKED THE HOUSE ARMED SERVICES SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES . THEY HELD A CONGRESSIONAL SUBCOMMITTEE HEARING ON MARCH 20TH. BEFORE THEM WAS GENERAL KEITH ALEXANDER, WHO IS NSA’S CURRENT DIRECTOR, ON THE TOPIC OF EAVESDROPPING ON AMERICANS PROVOKED BY YOUR ARTICLE. ALEXANDER TOLD THE SUBCOMMITTEE THIS QUOTE:  ‘THE NSA IS NOT AUTHORIZED TO DO WARRANTLESS WIRETAPPING, NOR DO WE HAVE THE EQUIPMENT IN THE UNITED STATES TO COLLECT THAT KIND OF INFORMATION.’

VARIOUS MEDIA THEN PICKED UP ON THAT SAYING GENERAL ALEXANDER WAS DENYING EVERYTHING THAT YOU HAD SAID IN YOUR WIRED ARTICLE. WHAT IS YOUR RESPONSE TO WHAT GENERAL ALEXANDER IS SAYING IN HIS DENIALS?

Obviously the NSA has the capability to eavesdrop on  Americans in the United States because that’s the whole idea that they were involved in the warrantless eavesdropping in the United States.

HAS MR. BINNEY PROVIDED YOU WITH HARD EVIDENCE FROM HIS WORK THERE?

Well, he worked there for 40 years and he was in charge of the automation of that system, so the documents are all TOP SECRET. He’s not going to bring out documents and hand me documents. I interviewed him for the article.

 

USSID 18 – Above Top Secret “NSA Dictionary”

ISN’T IT TRUE THAT THE NATIONAL SECURITY AGENCY HAS ITS OWN DEFINITION OF WORDS THAT IT REFERS TO?

Yes. NSA has its own internal guidelines about how it does its eavesdropping. It’s a very thick and highly classified document. It’s classified above TOP SECRET and it’s called USSID 18 and that stands for United States Signals Intelligence Directive 18. In that, it has definitions of what words mean and one of the words that is defined is ‘intercept,’  which is the key word that we’re talking about here and was talked about at the Congressional subcommittee (hearing with General Alexander on March 20, 2012).

NSA defines intercept – not the way a normal person would think of it as capturing a communication as it goes through the air. With NSA, capturing communications as they go through the air, or through a fiber optic cable or however it’s being transmitted – that’s not intercepting communications – that does not count for NSA. So, they are intercepting hundreds of thousands or millions and billions of communications. Yet, technically, the NSA is not intercepting any communications (in NSA’s specific and deceptive word usage). Capturing and storing in Utah is not technically intercepting the communications. It’s only intercepted once that information has been processed and turned into a form that is understandable by a human being. In other words, into a report, a document.

So you can have a great deal of communications in there and you can have General Alexander say that none of that has been intercepted, but the phraseology of that term and the definition of that term and whether you are defining it as Webster defines it – or you define it the way USSID 18 defines it.

USING WORDS BASICALLY TO MANIPULATE AND HIDE BEHIND THEIR OWN DEFINITIONS. IT’S AS IF YOU WERE DESCRIBING AN ALICE IN WONDERLAND WORLD WHERE UP IS DOWN, DOWN IS UP.

 

What NSA Retaliation Do Whistleblowers Face?

“These were just really everyday, average, ordinary Americans
who happened to be in the Middle East, in our area of intercept
and happened to be making these phone calls on satellite phones.
The calls were personal, private things with Americans, who are not
in any way, shape or form associated with anything to do with terrorism.”

– Adrienne Kinne, 31-year old U.S. Army Reserves Arab
linguist assigned to a special military program at the NSA’s Back Hall,
Fort Gordon, Augusta, Georgia, from November 2001 to 2003.
[ Fort Gordon is home of U. S.Army Signal Corps and Signal Center.]

You also have to understand that William Binney is facing a long prison sentence for coming out and saying what he said. And it’s not just Bill Binney – there are numerous other whistleblowers that have come out.

I interviewed a woman who was one of the intercept operators down in Georgia where NSA does a great deal of eavesdropping from. Her name is Adrienne Kinne and she told how she was directed to eavesdrop on Americans and was required to record those conversations and transcribe them. When she protested saying, ‘We should not be doing this,’ she was told to go back and keep doing it. She finally sent a letter to the Senate Foreign Intelligence Committee and nobody did anything. She finally told me because nobody else would take any action.


NSA Whistleblower Adrienne Kinne, October 9, 2008,
ABC Nightline by Brian Ross.

Click here for ABC News Interview with
NSA Whistleblower Adrienne Kinne.

Another intercept operator, David Faulk told me the same thing that confirmed everything that Adrienne Kinne said.


NSA Whistleblower Adrienne David Murfee Faulk,
October 9, 2008, ABC Nightline by Brian Ross.

Click here for ABC News Interview with
NSA Whistleblower David Murfee Faulk
.

These are people I would like to see – Bill Binney, Adrienne Kinne and David Faulk and others – put on a panel, sworn in under oath and give their testimony. And I would like to see at another table the NSA answer some of these charges. That’s never happened. I think that’s one way the American public can start finding out what is really going on.

IT IS AS IF THERE IS THE NATIONAL SECURITY AGENCY – AND THEN THERE IS THE REST OF THE UNITED STATES.

NSA is unique in this country, the most unique agency I think that has ever been created in this country. NSA was not created by an act of Congress. The NSA was created by a TOP SECRET memorandum signed by President Harry Truman in 1952. Even the contents of that memorandum were secret for decades until I wrote The Puzzle Palace © 1982 and managed to get a copy of the classified memo. [ Editor’s Note:  Not reprinted in book, but summarized on Pages 1 and 2 of Chapter 1, Birth (of NSA).]


The Puzzle Palace: A Report On NSA, America’s Most Secret
Agency © 1982 by V. James Bamford. Pages 1 – 2, Chapter 1.

 

There were only a couple of people in Congress who were ever allowed to know that this agency was created in the first place. Even its name was TOP SECRET for much of the first decade (1952 to 1962). The joke has always been that NSA stands for ‘No Such Agency’ or ‘Never Say Anything.’ So it’s an agency that has existed and lived in total secrecy for its entire existence – secrecy that is protected largely by law and secrecy that is very rarely breached.

 

U. S. Close to Being A Totalitarian State?

IF WILLIAM BINNEY IS RIGHT ABOUT THE UNITED STATES BEING SO TO BEING A TOTALITARIAN STATE, WHERE HAS CONGRESS BEEN THROUGHOUT ALL THIS? HOW HAS THIS HAPPENED?

The problem is that Congress did fall flat on its face in terms of  accountability – or keeping the NSA accountable. That’s the danger out there and that’s the danger that Bill Binney talked about. And when Binney talked about a ‘turnkey totalitarian state,’ he doesn’t mean we are necessarily a totalitarian state right now. He means that the infrastructure is there and he was the one who helped build a lot of that infrastructure. It’s ready to go. All that needs to be done is turning the key and that’s what he is worried about.

DO YOU THINK THAT WILLIAM BINNEY IS SAFE? OR IS THERE GOING TO BE NSA RETALIATION AGAINST HIM?

I don’t know. He certainly has a lot of courage because he’s the first senior NSA official involved in such intimate work with NSA’s eavesdropping activities. He was the very first to come out and speak as candidly as he has.

BUT HE REALLY IS A PATRIOT. IF HE DOESN’T SPEAK OUT, THEN JUST LIKE A LOBSTER IN A POT WITH THE WATER COMING UP TO A BOIL, IT’S WHAT IS HAPPENING IN THE UNITED STATES.

Right, exactly. He may give other people courage to come out and speak also.”

 

NSA’s Stellar Wind

Stellar Wind is the leaked secret code name for certain information collection activities performed by the National Security Agency (NSA) and revealed by Thomas M. Tamm to The New York Times reporters James Risen and Eric Lichtblau in 2006 to 2007. The operation was approved by President George W. Bush shortly after the September 1, 2001. The goals for Stellar Wind:
data mining the gigantic database of American citizens communications, including e-mail, phone conversations, financial transactions, and internet activity.

Wikipedia:  “There were internal disputes within the Justice Department about the legality of the program, because data is collected from eavesdropping on large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants. In March 2004, the Justice Department under Attorney General John Ashcroft ruled that the program was illegal. The day after the ruling, Ashcroft became critically ill with acute pancreatitis. President Bush sent White House counsel Alberto Gonzales and Chief of Staff Andrew Card Jr. to Ashcroft’s hospital bed, where Ashcroft lay semiconscious, to request that he sign a document reversing the Justice Department’s illegal ruling.

“However, Ashcroft was incapable of signing the document. Bush then reauthorized the operation, over formal Justice Department objections. Federal Bureau of Investigation (FBI) director Robert Mueller, Acting Attorney General James Comey, and many prominent members of the Justice Department were prepared to resign over the matter. Valerie Capron, the FBI general counsel, said, ‘From my perspective, there was a very real likelihood of a collapse of government.’  Bush subsequently reversed the authorization.”

NSA insider whistleblower Thomas Tamm said the whole operation violated the Constitution and FBI insiders said that only about 1% of the NSA’s vast eavesdropping on Americans resulted in any useful information. One of the unexpected consequences of Stellar Wind was in “suspicious activity reports, or SARS,” about people suspected of terrorist activities. One of those SARS reports concerned former New York Governor Elliott Spitzer’s use of prostitutes, which had nothing to do with terrorism, but brought the Governor’s political career to an end.

 

Why Did Obama Perpetuate
Bush’s Anti-Constitution Laws?

HAVE YOU BEEN SURPRISED THAT THE OBAMA ADMINISTRATION HAS  PERPETUATED THE BUSH LAWS THAT SEEM TO NOW GUT THE BILL OF RIGHTS IN MANY WAYS?

I was surprised because when Obama was in the Senate and running for President, he said he would vote to prohibit this kind of activity, he said he would filibuster against granting this kind of authority to the intelligence agencies. And he also said he would vote against giving immunity to the telecom companies for their illegal activities.

Then when push came to shove  when it actually came time to vote, he did the exact opposite. He voted in favor of the legislation easing the restrictions on NSA. And he voted in favor of the legislation granting immunity not only to criminal activity, but even to lawsuits from citizens over the illegal telecom eavesdropping activities with NSA.

So Obama did the exact opposite of what he said he was going to do. From then on, I’ve never really been surprised at his lack of desire to intervene in terms of NSA activities.

DO YOU THINK THAT THE NSA SHOWED PRESIDENT BARACK OBAMA SOMETHING THAT SCARED HIM INTO SORT OF COMPLIANCE?

No, I just think it’s the way the political system works here. There’s nobody to the left challenging Pres. Obama. Everybody who is challenging him is to the right. So in order to win voters,  he takes the left of center people – the liberals, the people who were originally the people backing him –  for granted because they have nobody else to vote for.

So he has no incentive to satisfy their desires because they are taken for granted. Instead, he is going after people on the right. To go after people on the right, he’s doing the actions we just discussed: voting in favor of granting more leeway to NSA. Giving immunity to the telecom companies.

HAVE YOU RECEIVED ANY THREATS DURING THE BUSH OR OBAMA ADMINISTRATIONS?

No, I’ve never received any threats any time except when I was doing The Puzzle Palace, my first book on NSA. The Reagan Administration did threaten me with prosecution if I went ahead with publishing the book, but I went ahead and published it anyway. They threatened me even though I never worked for the agency. The Reagan Administration went to a great extent to try to prevent me from  doing the book.

DO YOU THINK THAT WILLIAM BINNEY IS SAFE? OR  IS THERE GOING TO BE RETALIATION AGAINST HIM?

Well, I don’t know. He certainly has a lot of courage because he is the first senior official  – and I’ve been writing on NSA for 30 years now – and he is the very first senior NSA official involved in such intimate work with NSA’s eavesdropping activities – the very first to come out and speak as candidly as he has.

And like I said, his colleague Tom Drake, who Binney worked with at NSA and who he knows very well – was charged a few years ago with exactly that – 10 felony counts for espionage for basically giving away UNCLASSIFIED information to a newspaper –  information that the government itself had released over the years in various forms.

And then you also have to take into consideration that the Obama Administration has made a determined effort to go after whistleblowers. They’ve gone after  more whistleblowers than all the other prior administrations combined. I think in all the other administrations put together, there are only two or three cases at the most where people had been gone after for blowing the whistle  on government activity where they had actually been prosecuted.

But the Obama Administration has already gone after six. So given those statistics,  it shows how brave it is for someone like Bill Binney  and also Adrienne Kinne and  other people I interviewed. These people could have gone and said, ‘Look, don’t use my name. I want to be a confidential source.’

But then that would have been less credible in terms of writing about that information. People could say, ‘Oh, he just made that up.’ So they (NSA whistleblowers) were determined that this information be believed and credible, so they allowed me to put their names on it. That puts them in jeopardy – and could possibly put them in great jeopardy – with this Administration going after whistleblowers the way they do.

WHAT WOULD IT TAKE TO HAVE A FULL CONGRESSIONAL HEARING ABOUT AND WITH THE NSA AND ABOUT THE OVERBEARING  ROLE OF INTELLIGENCE AGENCIES NOW IN THE UNITED STATES?

Well, it wouldn’t take much. All you have to do is call the Senate Intelligence Committee or one of the committees call the NSA Director to ask him questions.  What would probably happen at that point – and this has happened before in the mid-1970s – there was a committee member who called the Director of NSA to answer questions about the methods of NSA eavesdropping.

He refused to answer those questions – not the director, but one of his employees  – refused to answer those questions. So then the White House – this was under President Gerald Ford – intervened and prevented that testimony from going ahead in a Congressional hearing.

But the government could not stop the Congressional committee from calling private citizens, however, or private companies, so the committee did call a number of telecommunication companies  and they did admit that they were cooperating secretly with the NSA in eavesdropping on American citizens.

So there is precedent for doing this and it’s been over 35 years since then, so I think it’s time again that they bring more accountability like they did and try to call these NSA people before a Congressional  open committee.

 

New CIA Director, Gen. David Patraeus,
Enthusiastic About Using Smart Technologies
to Spy On Americans

ANOTHER AMERICAN GOVERNMENT EMPLOYEE WHO SEEMS ENTHUSIASTIC NOW ABOUT USING SMART PHONES AND APPLIANCES IN HOMES, OFFICES AND CARS TO SPY ON AMERICANS IS  GENERAL DAVID PETRAEUS. HE IS THE CIA DIRECTOR AND IN MARCH 2012, HE TOLD AN IN-Q-TEL CONFERENCE THAT HOUSEHOLD APPLIANCES WILL BE USED TO SPY ON AMERICANS:

CIA Director, General David Patraeus, March 15, 2012, speaking at In-Q-Tel Conference, March 18-22, 2012, Mirage Hotel, Las Vegas, Nevada:  “Items of interest will be located, identified, monitored and remotely-controlled through technologies such as radio frequency identification, sensor networks, tiny embedded servers, and energy harvesters – all connected to the next generation internet using abundant, low cost and high powered computing. It’s going to change our notions of identity and secrecy.”

THE CIA WAS GIVEN MORE LEEWAY TO SPY THROUGH SMART APPLIANCES IN ADDITION TO COMPUTERS BECAUSE OF CHANGES IN THAT 2008 FOREIGN INTELLIGENCE SURVEILLANCE ACT (FISA). AND  COURT DECISIONS ABOUT THE PATRIOT ACT RAISE THE QUESTION: WHY IS THE CIA TALKING NOW THROUGH GENERAL PETRAEUS AND OTHERS AS IF IT IS SPYING INSIDE THE UNITED STATES WHEN I THOUGHT IT WAS NOT SUPPOSED TO. I THOUGHT THAT WAS THE FBI’S JURISDICTION. BUT NOW IN ADDITION TO THE NSA ON ALL THINGS DIGITAL,  IT WOULD APPEAR THAT THE CIA IS JOINING IN TRYING TO COME THROUGH THE BACK DOOR OF SMART DEVICES?

Well, you raise a very good question. And I thought that news from General Petraeus was very eye-opening that the CIA would now be involved in monitoring people’s homes. If you turn on your kitchen light, that’s something now that the CIA will be able to determine. It will know when you are using the dishwasher. Once the technology switched from analog to digital in the last part of the last century in the 1990s and 1980s, that’s when all of this has been a boon for the intelligence community because they can more easily capture that information and make use of it – turn it to their own use.

So, it’s very dangerous. And again, these are the areas that don’t get any light shed on them by Congress. This Petraeus release turns out to be a slip of Petraeus saying this. This did not come out from any great Congressional investigation.  You have to worry about what is going on out there because Congress does not seem to be paying too much attention. Or when they do have hearings, they are all TOP SECRET  and nobody can ever know what is being said.

IF CONGRESS IS NOT OVERSEEING TO BE A REALITY CHECK, IS IT TOO LATE? ARE WE SLIPPING INTO A TOTALITARIAN STATE, AS MR. BINNEY SAID,  WHETHER PEOPLE REALIZE IT OR NOT?

Well, you know the ultimate people to blame here is the American public.  Who puts these people in office? Who keeps them in office? The buck does not really stop with the President. The buck stops with the voter. The voter puts the President in there. The voter can take that President out in the next election.

I think there is a tremendous amount of apathy and lack of knowledge because information is just not passed down to the grassroots from above. It takes somebody digging this out like me in writing books and doing articles. So it’s a situation that is not going to change unless the public gets angry and wants to do something about it. There’s no incentive for these military and intelligence people to change because  the system is ingrained. That’s the status quo and there is no benefit for them to change unless the public forces change through the ballot box.

IS IT POSSIBLE THAT THE NATIONAL SECURITY AGENCY CAN NO LONGER BE REINED IN BY ANYONE?

Theoretically, it could be reined in by a President. It could be reined in by a Congress. It could be reined in by the public if they get angry enough and demand something be done. When The New York Times broke the story that NSA was illegally eavesdropping  with warrantless surveillance in December 2005, then all of a sudden, there was some action in Congress.

 

Congress No Longer Buffer Between
American People and Military/Intel Matrix

DO YOU THINK IT’S FAIR TO SAY THAT ONE OF THE BIG PROBLEMS IN THE UNITED STATES RIGHT NOW IS THERE IS THE DEFENSE DEPARTMENT,  THE INTELLIGENCE AGENCIES, CORPORATIONS AND CONGRESS AND THOSE ALL SEEM TO BE BOUND TOGETHER  WITH SELF-INTEREST. AND THEN THERE IS THE U. S. CITIZENS WHO THINK THIS IS STILL A DEMOCRACY WHEN  IT IS NOT?

One of the other factors here that is really critical and had not come out before  is the fact that much of this eavesdropping that is being done is actually outsourced to private companies, not NSA itself. For example, the eavesdropping hardware and software being used to do all this interception from the telecom companies  is all from different private companies.

One of these private companies that does all the eavesdropping on Verizon, for example, the president of that company is now a fugitive. He was charged with dozens of counts of fraud by the FBI and two of his top officials were also charged and pled guilty to fraud. So you have private companies putting the taps in place that were run by crooks.

Then you have the actual people doing the wiretapping with earphones on. More and more, those are being outsourced to private companies like Boeing and Lockheed Martin and FAIC and other companies actually doing the interception, the eavesdropping. I think this is very important and appropriate for Congress to look into. Who is doing the eavesdropping? Who is listening to the listeners? I think that’s a key factor.

IT’S ALMOST AS IF ORWELL’S 1984 HAS ENGULFED THE UNITED STATES, BUT IT’S WORSE THAN ANYONE COULD EVER HAVE IMAGINED?

Orwell wrote his book in the 1940s. He had a lot of foresight, but I think he might have gotten the year wrong – maybe it was 2004 instead of 1984. Still a lot of the issues that he brought up in the book written as a warning to the American public about what could happen if you let a government  slide into totalitarianism. In his book, he describes Big Brother that watches everybody. This was before the creation of the internet and the creation of the NSA

So, it is interesting to read Orwell’s 1984 knowing what we know today about technology and the capability of the government to eavesdrop  on many of its citizens.”

 

See:  “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)”
© 2012 by James Bamford in March 15, 2012, Wired.com:
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/2/


More Information:

James Bamford’s three books about the National Security Agency are at Amazon.com:

– The Puzzle Palace © 1982.

– Body of Secrets © 2002.

– The Shadow Factory © 2008.

For further reports about U. S. government secrecy and misinformation, please see reports below from Earthfiles Archive.

• 01/27/2012 — 2012 NDAA Detention Statute “Unnecessary and Dangerous”
• 05/01/2009 — Part 1: April 2009 Chemistry Report about Nano-Thermitic Material Discovered in 9/11 World Trade Center Dust
• 05/01/2009 — Part 2: April 2009 Chemistry Report about Nano-Thermitic Material Discovered in 9/11 World Trade Center Dust
• 08/01/2008 — Part 1: Rise of Fourth Reich in America?
• 07/26/2008 — Part 1: Why No Military Response to Radar Unknown Headed to Bush Crawford Ranch on January 8, 2008?
• 11/20/2007 — Do Black Budget Trillions Support A Secret American Space Program?
• 09/14/2007 — Part 1: Psi Spies – True Story of America’s Psychic Warfare Program
• 10/06/2004 — Is NRC Making Terrorist Work Easier? Radioactive Material Sites On U. S. Government Website
• 07/17/2004 — Inside Job – Unmasking the 9/11 Conspiracies by Jim Marrs
• 09/11/2002 — Guards At Nuclear Power Plants “Under-manned, Under-equipped, Under-trained,” Says New Report
• 02/02/2002 — Ghosts of United Flight 93 Reported in Shanksville, Pennsylvania
• 10/06/2001 — Osama bin Laden and the Hezbollah
• 09/15/2001 — Who Is Osama bin Laden and What Does He Want?


Websites:

“The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),”
© 2012 by James Bamford in March 15, 2012, Wired.com:
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/2/

NSA Electronic Surveillance of Americans Without Warrants: 
http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy

NSA Trailblazer Project:  http://en.wikipedia.org/wiki/Trailblazer_Project

NSA:  http://en.wikipedia.org/wiki/National_Security_Agency

William Binney, Late 2001 NSA Whistleblower:
http://www.aclu.org/files/pages/fisainfographic3.pdf

Adrienne Kinne, 2008 NSA Whistleblower:  
http://abcnews.go.com/Blotter/story?id=5987804&page=1#.T3N1GngzL0d

David Murfee Faulk, 2008 NSA Whistleblower:
http://abcnews.go.com/Blotter/story?id=5987804&page=1#.T3N1GngzL0d

Thomas Drake, 2006 NSA Whistleblower, March 21, 2012, Democracy Now, Part 1:
http://therealnews.com/t2/component/hwdvideoshare/?task=viewvideo&video_id=73309

Thomas Drake, 2006 NSA Whistleblower, March 26, 2012, Democracy Now, Part 2:
http://www.democracynow.org/2012/3/26/part_2_former_nsa_employee_thomas

New York Times, April 15, 2010, “Former N.S.A. Official Is Charged in Leaks Case”:
http://www.nytimes.com/2010/04/16/us/16indict.html?_r=1

Thomas Andrews Drake, Wikipedia:  http://en.wikipedia.org/wiki/Thomas_Andrews_Drake

NSA’s Stellar Wind, Newsweek by Michael Isikoff, Dec. 12, 2008:  “The Fed Who Blew the Whistle”:  http://www.thedailybeast.com/newsweek/2008/12/12/the-fed-who-blew-the-whistle.html

Government Accountability Project:  NSA Warrentless Spying:
http://www.whistleblower.org/blog/42-2012/1851-jesselyn-radack-a-thomas-drake-discuss-nsa-warrentless-spying

NSA Stellar Wind:

Fort Gordon, Georgia:  http://en.wikipedia.org/wiki/Fort_Gordon

ACLU “NSA Unchained”:  http://www.aclu.org/files/pages/fisainfographic3.pdf

CIA Remarks by Director David H. Petraeus at In-W-Tel CEO Summit, March 2012:
https://www.cia.gov/news-information/speeches-testimony/2012-speeches-testimony/in-q-tel-summit-remarks.html

CIA:  http://en.wikipedia.org/wiki/Central_Intelligence_Agency

 

 

Contact With Extraterrestrial Super-Intelligence Seen As Potential Outcome Of The Coming Tech Singularity

Contact With Extraterrestrial Super-Intelligence Seen As Potential Outcome Of The Coming Tech Singularity

First, a post-Singularity civilization (or SAI) might quickly figure out how to communicate with extraterrestrials (either by receiving or transmitting). There may be a kind of cosmic internet that we’re oblivious to, but which only advanced civs might be able to detect (e.g. some kind of quantum communication scheme involving non-locality). Second, a kind of Prime Directive may be in effect — a galactic policy of non-interference in which ‘primitive’ civilizations are left alone. But instead of waiting for us to develop faster-than-light travel, an extraterrestrial civilization might be waiting for us to achieve and survive a Technological Singularity. Thirdly, and related to the last point, an alien civilization might also be waiting for us to reach the Singularity, at which time it will conduct a risk assessment to determine if our emerging SAI or post-Singularity civilization poses some kind of threat. If it doesn’t like what it sees, it could destroy us in an instant. Or it might just destroy us anyway, in an effort to enforce its galactic monopoly. This might actually be how berserker probes work; they sit idle in some location of the solar system, becoming active at the first sign of a pending Singularity.