The avid ROGS reader will note that not all hacks are created equal, and while national security is indeed an important and necessary function of our current state of law and justice-not all hacking targets are the same.
That, indeed, politics are behind every single hack. Also- that gang stalking is real, and not necessarily delusional, most of the time; and that all “electronic harassment and directed energy” claims are usually related to eavesdropping and other redirection, and communications systems n one way or another-that a lot of “cross talk” can be inferred from these dialogues.
And, I would like that one special reader to take note of this: while you might think your salary depends upon the will of international banking cartels, many American citizens whose rights and liberties that have been compromised by these schemes are taking notice of how “un-American” some of these inner circle politics are-and how the great American dream for some is itself a target, because politicized racial, sectarian, ethnocentric influences work at times with each other, but also, against each other.
So-while the NSA hack that targeted certain companies cell phone SIM cards once seemed like a good idea I ask you, the special reader if that is the case now-that such a company might in fact and practice deserve MORE protection now? Because if security is the goal, then I would imagine that all the sectarian and appalling partisanship within the “deep state” that we saw ‘then’ might take on new meaning ‘NOW.’
Like I said once upon a time-it seems that everything I write about today, get’s into the news shortly thereafter. And in the case of Senator Al Franken’s recent debacle, which I touched on here months before it happened, or the new fate of Russell Simmon’s, who I touched on here about a month ago is any indicator, you might want to get a manila envelope ready. My imaginary friends would appreciate it. And, I certainly am not complaining either, because like I said repeatedly-you come in through the front door, or go f@ck yourself.
AND-if you haven’t heard yet- this is the NSA’s Google:
The reach and potency of XKEYSCORE as a surveillance instrument is astonishing. The Guardian report noted that NSA itself refers to the program as its “widest reaching” system. In February of this year, The Intercept reported that NSA and GCHQ hacked into the internal network of Gemalto, the world’s largest provider of cell phone SIM cards, in order to steal millions of encryption keys used to protect the privacy of cell phone communication. XKEYSCORE played a vital role in the spies’ hacking by providing government hackers access to the email accounts of Gemalto employees.
Numerous key NSA partners, including Canada, New Zealand and the U.K., have access to the mass surveillance databases of XKEYSCORE. In March, the New Zealand Herald, in partnership with The Intercept, revealed that the New Zealand government used XKEYSCORE to spy on candidates for the position of World Trade Organization director general and also members of the Solomon Islands government.
These newly published documents demonstrate that collected communications not only include emails, chats and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.
Bulk collection and population surveillance
XKEYSCORE allows for incredibly broad surveillance of people based on perceived patterns of suspicious behavior. It is possible, for instance, to query the system to show the activities of people based on their location, nationality and websites visited. For instance, one slide displays the search “germansinpakistn,” showing an analyst querying XKEYSCORE for all individuals in Pakistan visiting specific German language message boards.
As sites like Twitter and Facebook become increasingly significant in the world’s day-to-day communications (a Pew study shows that 71 percent of online adults in the U.S. use Facebook), they become a critical source of surveillance data. Traffic from popular social media sites is described as “a great starting point” for tracking individuals, according to an XKEYSCORE presentation titled “Tracking Targets on Online Social Networks.”