My Blog List

Thursday, March 28, 2013

Gangstalking Target Earth - Carnivore

Gangstalking Target: Earth

Gangstalking programs.

Those programs are using the 
codenames Echelon Program, Carnivore System, and Tempest
Systems. The Echeon Program is administered by the N.S.A. out 
Of Fort Meade, Maryland, and monitors all email and phone cells 
in the World. Carnivore System is administered by the N.S.A. out 
of Fort Meade, Maryland, and can download any computer system 
without being traced or otherwise known to the owner. Tempest 
Systems can decipher what is on any computer screen up to a 
quarter of a mile away. These programs are negatively impacting 
thousands of Americans and severely abusing their civil rights cn a 
daily basis. 

Based on my investigative work, which includes  from 
sources such ne active and former members ofthe Intelligence
Services (including the F.B.I., the C.I.A., the N.S.A. and Military
Intelligence [ed. note - The Octopus: The D.I.A. and Joint Chiefs and S.H.A.P.E.]), information from informants active in criminal 
enterprises, and, victim testimonies, I have come to the conclusion 
that thousands of victims have been targeted ... This conspiracy is far too active to be controlled or
operated by private enterprise whose goals are achieving financial
gain. These operations require extensive financing with no return 
on the investment. This programs operations are financed by 
illegal black operations, i.e., narcotics, prostitution, child kidnapping 
(children sell at covert auctions for up to $50,000 per 
child), human trafficking, gambling and other rackets.

Retired FBI Supervisor, Ted Gunderson

affiliation not provided to SSRN

School of Law, University of New England
December, 18 2011

Computer Law & Security Report, Vol. 20, No. 2, 2004 

Carnivore is a surveillance technology, a software program housed in a computer unit, which is installed by properly authorized FBI agents on a particular Internet Service Provider’s (ISP) network. The Carnivore software system is used together with a tap on the ISP’s network to “intercept, filter, seize and decipher digital communications on the Internet”. The system is described as a “specialized network analyzer” that works by “sniffing” a network and copying and storing a warranted subset of its traffic. In the FBI’s own words “Carnivore chews on all data on the network, but it only actually eats the information authorized by a court order”. This article, in two parts, provides an overview of the FBI’s Carnivore electronic surveillance system.

Number of Pages in PDF File: 14
Accepted Paper Series 

Date posted: December 19, 2011  

Suggested Citation

Nabbali, Talitha and Perry, Mark, Going for the Throat: Carnivore in an Echelon World - Part II (December, 18 2011). Computer Law & Security Report, Vol. 20, No. 2, 2004. Available at SSRN:

No comments:

Post a Comment