The Snowden Dilemma – A Question of Consequence

I believe the NSA data collection is unconstitutional based on usurpation of the 4th Amendment.   So given that I’m torn on this guy’s action:  How do you lawfully report on the government engaging in unconstitutional secret conduct – without yourself violating the law, when revealing the government’s unlawful conduct is, itself, illegal?

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.  

Fourth Amendment To U.S. Constitution

The NSA defenders are essentially saying the “collection” of this data is only used to identify issues “after” an engagement is identified.   Meaning if they find a terrorist’s email address, or cell phone, they can access this NSA database of global phone calls, and global information collected to reference and trail the information historically. (more…)

NSA Whistleblower Revealed: 29-year-old Edward Snowden (Excellent Video Introduction/Explanation)

The Guardian UK –  The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell.

The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. “I have no intention of hiding who I am because I know I have done nothing wrong,” he said. (more…)

“I’m Your Huckleberry” – Zimmerman Case Research – Nervous Twitches…

My-oh-My,  how twitchy the politically dependent forces are at this very minute. It really is staggering how they view the potential sunlight to be deadly toward them. Like vampires watching a sunrise while hiding amid a diminishing shadow of protection, the desperation is palpable.

Orlando Courthouse

Obviously the media is “all in”, as witnessed by this picture of the Orlando Courthouse taken earlier today.  The alphabets, the race-based BGI dependents, and their co-dependent enablers, are literally coordinating talking points within their trailers and tents.

One of the frequent topics of conversation is how to keep the “new media” at bay, so the Legacy Media can continue their narrative advancement unabated; They need this trial desperately, and the finances driven from within it.

Today I had a conversation with a super-intelligent Wolverine debating whether or not to attend the first day post-trial press conference and ask the “questions” you guys want answers to. (more on that in later days) (more…)

The Political Dissident List – It’s About To Get Ugly -and- “I’m Your Huckleberry”….

……. [Excerpt From CFP]  The present administration is going after leakers, media sources, anyone and everyone who is even suspected of ‘betrayal.’ That’s what they call it, ‘betrayal.’…This administration considers anyone telling the truth about Benghazi, the IRS, hell, you name the issue, ‘betrayal,’” he said.

United States Cyber Command

“We know all this already,” I stated. He looked at me, giving me a look like I’ve never seen, and actually pushed his finger into my chest. “You don’t know jack,” he said, “this is bigger than you can imagine, bigger than anyone can imagine.  …. If you are a website owner with a brisk readership and a conservative bent, you’re on that list. It’s a political dissident list, not an enemy threat list,”…  (continue reading)

PRISM Denials: Tech Giants Say NSA Tapped Their Servers Without Their Knowledge – Hmmm ?

Either they provided the information, OR, the administration is accepting the NSA tapping into the massive computer servers that drive the internet.

Command CentralGUARDIAN UK – Two different versions of the PRISM scandal were emerging on Thursday with Silicon Valley executives denying all knowledge of the top secret program that gives the National Security Agency direct access to the internet giants’ servers.

The eavesdropping program is detailed in the form of PowerPoint slides in a leaked NSA document, seen and authenticated by the Guardian, which states that it is based on “legally-compelled collection” but operates with the “assistance of communications providers in the US.”

Each of the 41 slides in the document displays prominently the corporate logos of the tech companies claimed to be taking part in PRISM. (more…)

Wall Street Journal – NSA Tracking Credit Card Transactions, Also Has Access To Phone Records From AT&T And Sprint Along With Verizon…

fyi, an insider detail – We can secondarily confirm the information provided within this Wall Street Journal report. Those of you who have been with the Treehouse community since the beginning may remember a conversation thread about the “new age” credit cards that allow capability of RFID transmission. [symbols: ((( )))  and Ξ ]  One of our close friends actually quit his job in disgust over the use of his computer program -a central component to the RFID system- being used to embed internally into credit cards with the expressed intent on tracking user id, location, history etc.  He knew the potential risk several years ago, and sent a warning – we shared – it appears this is now coming to light.

United States Cyber CommandWASHINGTON (WSJ) —The National Security Agency’s monitoring of Americans includes customer records from the three major phone networks as well as emails and Web searches, and the agency also has cataloged credit-card transactions, said people familiar with the agency’s activities.

The disclosure this week of an order by a secret U.S. court for Verizon Communications Inc.’s phone records set off the latest public discussion of the program. But people familiar with the NSA’s operations said the initiative also encompasses phone-call data from AT&T Inc. and Sprint Nextel Corp., records from Internet-service providers and purchase information from credit-card providers.

(more…)