3.8.2018 96 percent of survey respondents that have video surveillance systems installed on their campuses say these systems frequently (58 percent) or sometimes (38 percent) provide evidence for investigations. Four in five say their security cameras frequently (24 percent) or sometimes (56 percent) prevent crime, and 86 percent say these systems frequently (50 percent) or sometimes (36 percent) help their departments monitor their campus during other situations when safety or security issues could arise. Nearly three out of four respondents (74 percent) say their video surveillance systems frequently or sometimes act as force multipliers.
6.7.17 4.37 Whistle blower, who now has Immunity from prosecution, Dennis Montgomery, is suing James Comey alleging Mass Cover-up of surveillance and invasion of privacy of 20 thousand+ U.S. Citizens, including Donald Trump beginning Two Years ago.
5.30.2017 "If we find something useful, we socialize it with them," he says — with "them" being his bosses, the armed forces (the Army, Navy, Air Force, Marines, and Coast Guard), and ultimately the Department of Homeland Security, the Department of State, CIA, FBI, NSA, and other relevant federal agencies.
3.24.2017 Montgomery left the NSA and CIA with 47 hard drives and over 600 million pages of information much of which is classified. He sought to come forward legally as a whistleblower to appropriate government entities, including congressional intelligence committees, to expose that the spy agencies were engaged for years in systematic illegal surveillance on prominent Americans, including the chief justice of the Supreme Court, other justices, 156 judges, prominent businessmen such as Donald Trump, and even yours truly.
3.7.2017 “The CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.” — WikiLeaks
Stasi Tactics – Zersetzung
11.22.2016 The aim of the Zersetzung was to ‘switch off’ the group by rendering it ineffective, with an interim goal of hindering any positive media or public exposure. The usual ways to switch groups off were to:
Create conflict between members – particularly useful subjects for sowing discord were those of a philosophical or political nature, money and personal (sexual) relations;
Hinder and sabotage activities by the use of one or more infiltrators, who would agree to do tasks, but not get round to doing them, lose materials and equipment, repeatedly request changes and further edits of materials to slow down production, attempt to divert the group into more harmless activities etc;
Isolate the groups from other activists, eg by spreading rumours regarding unacceptable behaviour and political views etc.
12.19.2014 24:32 Did you know that any time a police officer pulls you over or responds to your 9-1-1 call, he or she is using a pre-crime algorithm which assigns you a color-coded threat score based not just on your criminal background but on everything including "flagged" purchases and all your social media posts which may include any comments that may be construed as "offensive?" The officer will receive your color coding — red, yellow or green — before he or she ever even sees you based on factors you are not allowed to see or question. Guilty until proven innocent just got thrown completely out the window. Welcome to the modern era of big data and thought crime in Police State, U.S.A. Unfortunately, the path we are following does not lead to freedom, liberty or individual self-worth. It is a collective future. A fascist future. A corporatist future. A Sci-Tech dictatorship. A transcendent vision of perfectionism. In fact, call it whatever you want. Just don't be deceived into believing any of it is ultimately in your interest.
8.5.2013 While there are suggestions that elements of the program may be legal, there is obvious concern on the part of those running the program—a concern that has not prevented them from going ahead with the collecting and using of covertly gathered data—that the surveillance effort may not be entirely kosher. We know this to be true because, according to documents reviewed by Reuters, DEA agents are specifically instructed never to reveal nor discuss the existence and utilization of SOD provided data and to further “omit the SOD’s involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use 'normal investigative techniques to recreate the information provided by SOD.'"
7.15.2011 Thirty-four of the 78 councils in England contacted by the Daily Mail admitted having the watch lists and five more are planning to introduce them this year. The total will be higher because there are more than 350 councils in England.
8.24.2010 The subject person becomes property of the vendor. The vendor will always monitor its secret gadgets like the ear piece (spy ware that’s implantable in ears). Russians become translators and operators for the ear piece, camera and robotic system. The Russian immigrants or Soviet Émigré have taken advantage of the Public-Private Partnerships and commit bias motivated crimes on US soil.
1976 HEARINGS BEFORE SUBCOMMITTEE ON INTELLIGENCE AND THE RIGHTS OF AMERICANS OF TESELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE NINETY-FOURTH CONGRESS SECOND SESSION ON S. 3197 THE FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1976