A Glimpse Into NSA Monitoring Capabilities

NSA routing internet data thru Amsterdam to monitor U.S. websites and e-mail

Questions remain whether Bush admin approval of Verizon’s MCI takeover was quid pro quo for providing email-phone records to NSA for White House enemies list

Super-secret 5th generation Watercooled Cray computers used by NSA to tap into dial-up, DSL and high-speed broadband internet connections which have satellite voice recognition and keystroke monitoring capabilities

An internet routing plot plan verifying the exact travel of website data has revealed that stories and other communications e-mailed from a Pennsylvania computer to be posted at a server in Tulsa, Oklahoma are first routed into Denver / Colorado Springs and then across the Atlantic to Amsterdam, Holland, back through Denver and then to the hosting server in Tulsa.

The discovery was made by the webmaster for TomFlocco.com after becoming curious about the internet route taken by the data and the length of time it took to post a new story when the data only had to travel over the webmaster’s phone line across the state to the hosting server in Tulsa.

After contacting a U.S. intelligence source, we were told that Department of Justice (DoJ) investigators have identified an Israeli intelligence internet provider in Amsterdam as a co-conspirator with both the National Security Agency (NSA) and Verizon-MCI in the ongoing Bush administration spy intrusion into the private and personal lives of millions of Americans without their previous knowledge or permission.

Another federal agency official with long-time experience and impeccable credentials told us, “MCI is an NSA shadow company. Just remember that MCI equals NSA and you’ll always be correct in your research and investigation.”

On February 14, 2005, Verizon announced its intention to purchase MCI for $6.7 billion, after which the company became involved in a strained bidding war with Qwest Communications.

MCI investors sharply criticized the Verizon takeover which was recently finalized; but federal prosecutors probing NSA spying will have reason to subpoena Verizon regarding whether the Bush administration’s approval of Verizon’s MCI takeover had anything to do with the company’s willingness to provide private phone and email records to the NSA to spy on U.S. citizens.

U.S. intelligence sources within the Special Operations Group (SOG) are reporting that NSA computers have been downloading financial and personal files of all American citizens as a result of upgrades to the Echelon satellite network and software program which is part of the Prosecutor’s Management Information System (PROMIS).

SOG says the NSA has a “7-10 second lead time” which effectively affords the agency the opportunity to delay the release of currency, stock and bond sales transactions permitting a criminal advantage to agency officials and other high-level associates who game the system of the world’s financial markets to steal investment capital from both U.S. and foreign citizens throughout the world.

Personal phone service shut down after posting story

A TomFlocco.com phone call on Friday to Verizon seeking comment for this report on why the company provided personal phone records to the NSA without the knowledge or permission of its customers resulted in a “no comment” response from a Verizon spokesperson identifying herself only as Mrs. Singh: “We are not able to comment on whether we have cooperated with the NSA in this matter since this is a classified issue; but we’re confident that we are within the law. We are protecting your privacy but we cannot comment further.”

When we asked whether Verizon would deny helping the NSA to spy on Americans, Mrs. Singh’s response was “we cannot comment on that.”

We also asked to speak to the Verizon legal or security departments, or even the consumer public relations department for a comment; but we were told “We appreciate that this matter is causing concern among our customers but it will not be possible for you to speak to either group. We cannot comment on whether we cooperated with the NSA because it’s classified.”

Later that afternoon, wide news reports indicated that Verizon was sued for $5 billion for illegally providing phone numbers and records to the NSA without the knowledge or permission of Verizon customers.

On Saturday evening after the Friday call to Verizon, we posted a short new story, “Phone companies help NSA spy on personal computers for enemies list” in the IN BRIEF box at TomFlocco.com.

After the story was posted, our personal office hard-line telephone service with Verizon was shut down at about 1:30 am Sunday morning with that office line remaining out of service for over 23 hours before this story was posted online.

Internet IP address logs from this writer’s computer firewall security system provide evidence that the Department of Defense (DoD) is conducting surveillance, since logs show DoD internet identification numbers during specific occasions while we conducted phone interviews with intelligence agents and other sources, and also while reports were being researched and word processed for stories regarding White House crime family activities.

NSA spying on dial-up, high-speed internet e-mail and websites for ‘enemies list’

A U.S intelligence source wishing to remain anonymous but who has direct knowledge of the operations said U.S. cable internet corporations have joined the widely-reported telephone company operations to assist in compiling the largest database in history on American citizens while “using super-secret 5th generation Cray computers to tap into dial-up, DSL and high-speed broadband internet connections which have satellite voice recognition and keystroke monitoring capabilities.”

This is the first indication that the NSA is also monitoring websites and personal e-mail communications of American citizens without their knowledge or permission.

The government official said “the voice patterns and voice print recognition comes from the original Inslaw systems which are hooked up to E-Systems Dallas voice recognition software and linked over to the NSA.”

The long-time agent added that “part of the reason they are spying on Americans is to create an ‘enemies list’ of those critical of George W. Bush,” adding “the monitored phrases and words trigger networks of contacts between people around the country who are inter-related to other activists regarding issues such as the Iraq War, NSA spying, illegal immigration and critical reporters.”

The unnamed official also told us “the U.S. and foreign intelligence community has been using lead bags for the purpose of preventing satellite surveillance and physical reconnaissance ever since the Bush administration commenced a national spy program.”

On condition of anonymity, the source added, “driver’s licenses are already set up with chips for future use in capturing financial, medical and other personal and/or private records and information for use by the Bush administration and Congress to maximize tax compliance, national identification or for potential political purposes.”

NSA/Treadstone spy-death lists?

The Bush spy program enemies list “would be used to organize groups for internment camps—particularly the big camp being developed in northeast Yuma county, Arizona where most of the ‘problem patriots and activists’ would be housed if Mr. Bush is allowed to remain in power during another major terrorist or biological event,” said the unnamed federal agent.

An October 27, 2001 report in the Houston Chronicle confirmed the existence of secret surveillance lists, and that NSA lawyers ordered a massive shredding program of the names and phone numbers of innocent Americans in late October, 2001; but the NSA made copies of the unlawful list, according to two former U.S. officials.

Federal prosecutors will likely have interest in the fact that the NSA reportedly mailed the list to then Under Secretary of State and current White House Chief of Staff John Bolton who emailed the list to Treadstone Space #77 in Colorado.

“All political critics of the Bush or Clinton families have had their names, phone numbers and addresses stored by the NSA at Treadstone Space #71/77,” said national security expert Thomas Heneghan, who confirmed another federal agent’s assertion that the NSA is being assisted by MCI regarding the Bush administration spy operation on the American people.

“#77 is the Colorado division of # 71 in New York State which is also linked to secret FBI Division 5 operations connected to both the Bush and Clinton families without the knowledge of U.S. citizens,” added Heneghan.

The national security watchdog said “the Bush-Clinton crime families are planning a bird flu pandemic as an excuse for a temporary martial law government to cover up ongoing corruption and crimes committed against the American people.”

A flu pandemic would allow Mr. Bush to suspend constitutional rights and round up patriot critics on the NSA/Treadstone death-spy list where they could transport innocent U.S. citizens who are politically outspoken to internment camps in locations such as the one in Yuma county, referred to earlier by another federal agent.

Heneghan added that U.S. Senate Leader and GOP presidential candidate William Frist and House of Representatives Democratic Minority Leader Nancy Pelosi are both aware of the Treadstone death list and also the Bush administration spy operations conducted by the NSA—both overseas and in the United States.

Representative Rahm Emanuel (D-IL-5) was identified by Heneghan as “an Israeli intelligence operative in Congress who actually carries copies of the updated [NSA/Treadstone] death-spy list to his office each day,” raising questions as to whether alleged operatives loyal to foreign governments are only welcome in the U.S. House of Representatives.

1 comment to A Glimpse Into NSA Monitoring Capabilities

Leave a Reply

  

  

  


*

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

sharethis_button(); }?>