Gangstalking Target: Earth
Gangstalking programs.
Those programs are using the
codenames Echelon Program, Carnivore System, and Tempest
Systems. The Echeon Program is administered by the N.S.A. out
Of Fort Meade, Maryland, and monitors all email and phone cells
in the World. Carnivore System is administered by the N.S.A. out
of Fort Meade, Maryland, and can download any computer system
without being traced or otherwise known to the owner. Tempest
Systems can decipher what is on any computer screen up to a
quarter of a mile away. These programs are negatively impacting
thousands of Americans and severely abusing their civil rights cn a
daily basis.
Based on my investigative work, which includes from
sources such ne active and former members ofthe Intelligence
Services (including the F.B.I., the C.I.A., the N.S.A. and Military
Intelligence [ed. note - The Octopus: The D.I.A. and Joint Chiefs and S.H.A.P.E.]), information from informants active in criminal
enterprises, and, victim testimonies, I have come to the conclusion
that thousands of victims have been targeted ... This conspiracy is far too active to be controlled or
operated by private enterprise whose goals are achieving financial
gain. These operations require extensive financing with no return
on the investment. This programs operations are financed by
illegal black operations, i.e., narcotics, prostitution, child kidnapping
(children sell at covert auctions for up to $50,000 per
child), human trafficking, gambling and other rackets.
Retired FBI Supervisor, Ted Gunderson
School of Law, University of New England
December, 18 2011
Computer Law & Security Report, Vol. 20, No. 2, 2004
Abstract:
Carnivore is a surveillance technology, a software program
housed in a computer unit, which is installed by properly authorized FBI agents
on a particular Internet Service Provider’s (ISP) network. The Carnivore
software system is used together with a tap on the ISP’s network to
“intercept, filter, seize and decipher digital communications on the Internet”.
The system is described as a “specialized network analyzer” that works by
“sniffing” a network and copying and storing a warranted subset of its traffic.
In the FBI’s own words “Carnivore chews on all data on the network, but it only
actually eats the information authorized by a court order”. This article, in
two parts, provides an overview of the FBI’s Carnivore electronic surveillance
system.
Number of Pages in PDF File: 14
Accepted Paper Series
Date posted: December 19, 2011
Suggested Citation
Nabbali, Talitha and Perry, Mark, Going for the Throat:
Carnivore in an Echelon World - Part II (December, 18 2011). Computer Law &
Security Report, Vol. 20, No. 2, 2004. Available at SSRN:
http://ssrn.com/abstract=1974304
No comments:
Post a Comment