The NSA,CIA’S IBM Nazi Super Computer AKA The Beast And Snowden Prism / RDIF / GMO /Geo engineering Truth Note
July 20, 2013 at 2:47am
https://www.facebook.com/notes/zakaos-breedlove-ewing/the-nsacias-ibm-nazi-super-computer-aka-the-beast-and-snowden-prism-rdif-gmo-geo/487393101344198
In this note I will continue to update it with articles about the Nazi IBM Super computer the Beast and the Edward Snowden articles , NSA scandals , GMO and the H.A.A.RP. weather weapon . One major thing we all need to understand is the NSA is the CIA and this organization brought over thousand of Nazi war criminals to America after WW2 . These vile inhuman beings were given jobs at Nasa and many many other secret black programs sponsored by the American government and the CIA after WW2 . I wanted to make a note to help people see what I see and understand what is truly happening in the world today .
IBM made the Nazi hole punch machine system that was the sole reason for the Hebrew people to be tattooed after they were put into concentration camps . It was the Nazis way of keeping track of the victims in a more accurate way as these victims were all reduced to a number on the arm . Today IBM is responsible for making the same form of stalking / tracking technology and it is called the RDIF ( Radio Identifier Frequency ) chip . Here in Tx they are trying to force students to ware a RDIF badge around there neck in school so they can be tracked while in school and also use this RDIF badge to get food and books ext .The fact is this chip in the badge never goes off and can be easily hacked and tracked at any time from any place . Another alarming fact is this RDIF chip is very toxic and it is all ways putting out micro waves that can give you cancer and a lot of other illnesses while destroying your immune system .
Recently The Obama administration has introduced a bill that would force all American people on food stamps to get a RDIF chip in the hand or arm if they want to get food . Do you know what it says in the Bible about the Beast and the last days of evil on Earth . I for one do not believe in all of what the Bible says but know there is truth in all things ? I know also there is 98 percent of Gods sons life missing from the pages of a book about God and the son .This is also the same book that is changed by the hands of ego centric power hungry men every year to suit the need of control over the people . If you do know what I am talking about truly , then no need to say how evil the Obama administration truly is and how much we are being lied to every day and have been lied to for a very long time .
The CIA / NSA / Nazis have a super computer named The Beast and the sole purpose of this machine is world control , information and domination . This means all the information about you and every one you know is funneled threw the NSA Prism whore program into The Nazi Beast profiling file based in Germany . The reason why I want people to understand why it is so important about what is tacking place with the Snowden case is he has reviled the German and NSA / CIA data whore ( Prism ) programs link and the truth that they are spying on the world and keeping track of everything and everyone . This is the finale clue we all need to see the big picture so we can truly understand America is being run by Nazi Free Mason Occultist and Nazi corporations seeking one thing just as they all ways have . That thing is the same as the evil super computer The Beast , they have built with the help of IBM and American stolen money . World power and absolute control over everything and every one . They are even trying to control the weather and ultimately earth . This is what they are doing with H.A.A.R.P. and GMO ( control over the food of the world ) and geoengineering . When you get a clear picture of how Monsanto is basically poisoning the Earth and the people who eat GMO food you can clearly see that the Nazi eugenics is being practiced on the world as I write this and you read this .
Thanks for you time and enjoy the links please because they prove everything I just spoke of . Spread the word . To see exactly how the NSA / CIA’s Nazi Free Mason Prism stalker spy program works visit the end of the note for full lay out and details ……Please feel free to copy the note and make your own …………….. One Love
Snowden: NSA is ‘in bed with the Germans’http://rt.com/news/snowden-nsa-cooperate-germany-755/
Snowden reveals HAARP’s Global Assassination Agenda
http://beforeitsnews.com/alternative/2013/07/snowden-on-haarp-chemtrails-cfr-and-global-depopulation-2709328.html
The CIA and The Nazis
http://www.youtube.com/watch?v=J3wuT5lnVm8
Peter Levenda: Secret Space Program Conference Amsterdam 2011
Topic: Sinister forces, Paper clip, Nazi to NASA Secret Space Program, JFK and the Cold War”From Peenemunde to Paperclip, from Nazis to NASA the Secret Space Program and the Cold War.” Peter will focus on the Nazi space scientists, their UFO designs, Operation Paperclip, and the strange connections between the UFO phenomenon of 1947 and the Jim Garrison investigation into the JFK assassination in 1967. 03 Apr 2011 sinisterforces.infoBio: Peter Levenda is a native of the Bronx, New York, and has been investigating and writing about the connections that exist between politics, religion and history since the 1970s. His first book, Unholy Alliance: A History of Nazi Involvement with the Occult, was published in 1994 and bears a foreword by Norman Mailer. Since then, he has published Sinister Forces: A Grimoire of American Political Witchcraft, a three-volume magnum opus that searches for the meaning behind some of the most famous historical events in American history, from the Salem witchcraft trials to Jonestown, from Operation Paperclip to the weaponizing of the paranormal, from the serial killer phenomenon to the Manson Family and beyond, and exposes some of the strangest aspects of American political assassinations and their relation to a shadowy — yet well-documented — group known as “The Nine”. His research has taken him to Chile during the Pinochet regime to investigate Nazi war criminals, to China, India, all over Southeast Asia, and throughout Europe and Latin America. His work has been praised by Paul Krassner, Jim Hougan, Dick Russell, Jim Marrs, Whitley Strieber, Katherine Neville, and many others. He has appeared numerous times in television documentaries on the influence of occult beliefs on the development of the Nazi Party: on the History Channel, the National Geographic Channel, TNT, Discovery, etc.
Partners in Crime-IBM and Nazi Germany.m4v
The Nazi Eugenics Program Never Stopped
Obamacare – RFID Chip – HR 3962
RFID CHIP IMPLANT ENFORCED on March 23rd 2013 – 12/31/2017 ( Full Movie )
Spychips: How Major Corporations and Government Plan to Track Your Every Purchase and Watch Your Every Move [Paperback]
Spychips: How Major Corporations and Government Plan to Track Your Every Purchase and Watch Your Every Move
IBM: RFID Chips and Nazi Punch Cards
IBM and the Nazis
http://www.youtube.com/watch?v=yefdIdLIf1Q
Christian Family Refuses Mandatory RFID Chip at Texas School
The Beast,” a supercomputer in Belgium, is Being Used to Track Every Human Being on Earth-Fiction!
http://www.truthorfiction.com/rumors/b/beastofbelgium.htm
The Beast
http://nickguarino.com/index.php/uncategorized/the-beast/
World record: German supercomputer simulates quantum computer
http://phys.org/news189231849.html
Euro supercomputer has Nazi-Era ideology
http://unitednationsoffilm.com/euro-supercomputer-linked-to-nazi-era-ideology/
NWO computer is the mark of the beast
CASE 163 – The B.E.A.S.T super computer
http://theagecases.blogspot.com/2010/11/case-163-beast-super-computer.html
The Beast – The Ultimate Super Computer
http://www.beyondthehaze.com/142/the-beast-the-ultimate-super-computer/
The Report from Iron Mountain A Blueprint for Tyranny 360p
NASA WAR ON HUMANITY DOCUMENT FOUND ON NASA SITE – Nazi Bio Terrorism – MAKE VIRAL NOW !!!
This is an actual NASA document retrieved from NASA’s website created July 2001 (PRE-9-11) that outlines how War HAS BEEN DECLARED AGAINST HUMANITY! Bare in mind the videos which clearly show NASA’s Name ON MORGELLONS Samples! With each upload we learn more about who “THEY” are! See the Morgellons US Patent video recently uploaded here for specifics including Names, Koelle, Seagraves and Hogness. We MUST BUILD THE CASE to EXPOSE this Crime in Process and ALERT all Americans to the Truth. We MUST find the right persons to file appropriate charges against ALL responsible PERSONS & Corporations & BRING THEM TO JUSTICE! If we FAIL, we do not have long, especially given this has been going on for well over 11 years. Operation Paper Clip is when the CIA brought the Nazi war criminals to America and gave them jobs at many organizations such as Nasa and new lives alongside many unsuspecting Americans . Now there evil seeds destroy America from with in even today with Bio terrorism , political control and manipulation of the mind and general public while remaining hidden , protected and employed by the CIA and many other shadow Free Mason occultist organizations ..
THE NASA NAZIS
Nazi ufo secrets from “The Knights Templar” full
Psywar – Full Documentary
Nutricide – Criminalizing Natural Health, Vitamins, and Herbs
Silent Weapons For Quiet Wars
America’s Nazi Secret
In Lies We Trust – CIA, Nazis, Hollywood, Bio terror (FULL) – YouTube-1.flv
The Report from Iron Mountain A Blueprint for Tyranny 360p
David Wilcock: The Source Field Investigations — Full Video!
The court of the pine cone represents the Pineal Gland @ Vatican ::::
https://www.facebook.com/medi/set/?set=a.574723385872880.1073741857.512723758739510&type=3
Evil Scientology, CIA, Miviludes, child abuse & ritual sacrifices, Dutroux & Government, Satanists
Cell Tower Microwave Radiation Presentation by Magda Havas
The Report from Iron Mountain A Blueprint for Tyranny 360p
Scientist Proves DNA Can Be Reprogrammed by Words and Frequencies
http://www.collective-evolution.com/2011/09/02/scientist-prove-dna-can-be-reprogrammed-by-words-and-frequencies/
Chemtrail Patents: Bernard Eastlund Patent
http://chemtrailsplanet.net/2013/06/09/chemtrail-patents-bernard-eastlund-patent-4686605/
NASA’s Daytime Dynamo Experiment Deploys Lithium to Study Global Ionospheric Communications Disruptions
http://www.universetoday.com/103087/nasas-daytime-dynamo-experiment-deploys-lithium-to-study-global-ionospheric-communications-disruptions/
From Chemtrails to Pseudo-Life. The Dark Agenda of Synthetic Biology (FULL LENGTH VIDEO).wmv
Seeds Of Death – Full Movie
WARNING!!! HEK 293 Aborted
Human Fetal Cells in Your Food, Vaccines & Cosmetics & GMO/Poison
https://www.youtube.com/watch?v=ySdG3c4aWac
The World According to Monsanto (FULL LENGTH)
http://www.youtube.com/watch?v=N6_DbVdVo-k
Silent Sound Weapons AKA Gang Stalking Weapons
https://www.facebook.com/media/set/?set=a.594254823919736.1073741918.512723758739510&type=3
Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering – Film
Frey Microwave Hearing – Beam Voices Into Your Auditory Cortex ::::
What in the World Are They Spraying? (Full Length)
Silent Sound Weapons AKA Gang Stalking Weapons Photo Album
https://www.facebook.com/media/set/?set=a.594254823919736.1073741918.512723758739510&type=3
What HAARP Is.. And Everything Its Used For.. Full HAARP Documentary
(MUST SEE) NANO micro chips Proofs of Mind Control MK ULTRA RFiD implants
Silent Sound Mind Control Explained
Mind Control – Induced States of Consciousness – Patent 5356368 Monroe & MKULTRA
BrainGate lets your brain control the computer
Brain Gate is a program that allows a computer to read your brain waves and make them able to be read into words ext . This technology can be used to steal your thoughts or put thoughts in to your head via ELF or micro waves thew cell phones or wireless devices ext . If the super computer The Beast has this program and it is in the hands of the crazy Nazi Free Mason Occultist . Do you know the ramifications of what they are or could do to the human minds with this technology .
Literal Smart Dust Opens Brain-Computer Pathway to “Spy on Your Brain”
Listening is not enough, Obama committed 100 million into this. Dust heads .
http://worldtruth.tv/insane-cases-of-genetic-engineering/
How the NSA Gives Private Contractors Control of the Surveillance State
70% of the intelligence budget goes to private contractors
http://www.brasschecktv.com/videos/the-surveillance-state/how-the-nsa-gives-private-contractors-control-of-the-surveillance-state.html
No Thy Enemy – Nazi Free Mason Bloodlines Ext .Charts ::::
https://www.facebook.com/media/set/?set=a.579954238683128.1073741873.512723758739510&type=3
This is how the Nazi Free Mason NSA / CIA Stalker Program PRISM Works ( Thanks Snowden )
https://fbcdn-sphotos-b-a.akamaihd.net/hphotos-ak-ash3/t1.0-9/196478_487408931342615_1070159568_n.jpg” alt=”Introducing the program
A slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved.
The program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables.
This note indicates that the program is the number one source of raw intelligence used for NSA analytic reports.
The seal of
Special Source Operations, the NSA term for alliances with trusted U.S. companies.
Tag PhotoAdd LocationEdit” />
Introducing the program A slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved. The program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables. This note indicates that the program is the number one source of raw intelligence used for NSA analytic reports. The seal of Special Source Operations, the NSA term for alliances with trusted U.S. companies. Tag PhotoAdd LocationEdit
https://scontent-a-sjc.xx.fbcdn.net/hphotos-ash3/t1.0-9/1070013_487408994675942_849270655_n.jpg” alt=”Monitoring a target’s communication
This diagram shows how the bulk of the world’s electronic communications move through companies based in the United States.
Tag PhotoAdd LocationEdit” />
Monitoring a target’s communication This diagram shows how the bulk of the world’s electronic communications move through companies based in the United States. Tag PhotoAdd LocationEdit
https://fbcdn-sphotos-g-a.akamaihd.net/hphotos-ak-ash2/t1.0-9/1002111_487409041342604_2087258672_n.jpg” alt=”Each target is assigned a case notation
The PRISM case notation format reflects the availability, confirmed by The Post’s reporting, of real-time surveillance as well as stored content.
Depending on the provider, the NSA may receive live notifications when a target logs on or sends an e-mail, or may monitor a voice, text or voice chat as it happens (noted on the first slide as "Surveillance").
Searching the PRISM database
On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM’s counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected "incidentally" during surveillance of those targets.” />
Each target is assigned a case notation The PRISM case notation format reflects the availability, confirmed by The Post’s reporting, of real-time surveillance as well as stored content. Depending on the provider, the NSA may receive live notifications when a target logs on or sends an e-mail, or may monitor a voice, text or voice chat as it happens (noted on the first slide as “Surveillance”). Searching the PRISM database On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM’s counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected “incidentally” during surveillance of those targets.
https://scontent-b-sjc.xx.fbcdn.net/hphotos-frc3/t1.0-9/1005984_487409118009263_1391740243_n.jpg” alt=”Providers and data
The PRISM program collects a wide range of data from the nine companies, although the details vary by provider.” />
Providers and data The PRISM program collects a wide range of data from the nine companies, although the details vary by provider.
https://scontent-b-sjc.xx.fbcdn.net/hphotos-frc3/t1.0-9/969943_487409171342591_495220778_n.jpg” alt=”Acquiring data from a new target
This slide describes what happens when an NSA analyst "tasks" the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the "selectors," or search terms. The supervisor must endorse the analyst’s "reasonable belief," defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection.
The FBI uses government equipment on private company property to retrieve matching information from a participating company, such as Microsoft or Yahoo and pass it without further review to the NSA.
For stored communications, but not for live surveillance, the FBI consults its own databases to make sure the selectors do not match known Americans.
This is where data enters NSA systems, described more fully on the next slide.
The Foreign Intelligence Surveillance Court does not review any individual collection request.
See the inner workings of the NSA’s top secret spy program »
Analyzing information collected from private companies
After communications information is acquired, the data are processed and analyzed by specialized systems that handle voice, text, video and "digital network information" that includes the locations and unique device signatures of targets.” />
Acquiring data from a new target This slide describes what happens when an NSA analyst “tasks” the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the “selectors,” or search terms. The supervisor must endorse the analyst’s “reasonable belief,” defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection. The FBI uses government equipment on private company property to retrieve matching information from a participating company, such as Microsoft or Yahoo and pass it without further review to the NSA. For stored communications, but not for live surveillance, the FBI consults its own databases to make sure the selectors do not match known Americans. This is where data enters NSA systems, described more fully on the next slide. The Foreign Intelligence Surveillance Court does not review any individual collection request. See the inner workings of the NSA’s top secret spy program » Analyzing information collected from private companies After communications information is acquired, the data are processed and analyzed by specialized systems that handle voice, text, video and “digital network information” that includes the locations and unique device signatures of targets.
https://fbcdn-sphotos-b-a.akamaihd.net/hphotos-ak-prn1/t1.0-9/1012198_487409314675910_1324046352_n.jpg” alt=”From the FBI’s interception unit on the premises of private companies, the information is passed to one or more "customers" at the NSA, CIA or FBI.
PRINTAURA automates the traffic flow. SCISSORS and Protocol Exploitation sort data types for analysis in NUCLEON (voice), PINWALE (video), MAINWAY (call records) and MARINA (Internet records).
The systems identified as FALLOUT and CONVEYANCE appear to be a final layer of filtering to reduce the intake of information about Americans.” />
From the FBI’s interception unit on the premises of private companies, the information is passed to one or more “customers” at the NSA, CIA or FBI. PRINTAURA automates the traffic flow. SCISSORS and Protocol Exploitation sort data types for analysis in NUCLEON (voice), PINWALE (video), MAINWAY (call records) and MARINA (Internet records). The systems identified as FALLOUT and CONVEYANCE appear to be a final layer of filtering to reduce the intake of information about Americans.
https://scontent-b-sjc.xx.fbcdn.net/hphotos-frc3/t1.0-9/992945_487409404675901_230418066_n.jpg” alt=”NSA slides explain the PRISM data-collection program
Published: June 6, 2013, Updated June 29, 2013
The top-secret PRISM program allows the U.S. intelligence community to gain access from nine Internet companies to a wide range of digital information, including e-mails and stored data, on foreign targets operating outside the United States. The program is court-approved but does not require individual warrants. Instead, it operates under a broader authorization from federal judges who oversee the use of the Foreign Intelligence Surveillance Act (FISA). Some documents describing the program were first released by The Washington Post on June 6. The newly released documents below give additional details about how the program operates, including the levels of review and supervisory control at the NSA and FBI. The documents also show how the program interacts with the Internet companies. These slides, annotated by The Post, represent a selection from the overall document, and certain portions are redacted. Read related article.
New slides published June 29
Acquiring data from a new target
This slide describes what happens when an NSA analyst "tasks" the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the "selectors," or search terms. The supervisor must endorse the analyst’s "reasonable belief," defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection.
The FBI uses government equipment on private company property to retrieve matching information from a participating company, such as Microsoft or Yahoo and pass it without further review to the NSA.
For stored communications, but not for live surveillance, the FBI consults its own databases to make sure the selectors do not match known Americans.
This is where data enters NSA systems, described more fully on the next slide.
The Foreign Intelligence Surveillance Court does not review any individual collection request.
See the inner workings of the NSA’s top secret spy program »
Analyzing information collected from private companies
After communications information is acquired, the data are processed and analyzed by specialized systems that handle voice, text, video and "digital network information" that includes the locations and unique device signatures of targets.
From the FBI’s interception unit on the premises of private companies, the information is passed to one or more "customers" at the NSA, CIA or FBI.
PRINTAURA automates the traffic flow. SCISSORS and Protocol Exploitation sort data types for analysis in NUCLEON (voice), PINWALE (video), MAINWAY (call records) and MARINA (Internet records).
The systems identified as FALLOUT and CONVEYANCE appear to be a final layer of filtering to reduce the intake of information about Americans.
Each target is assigned a case notation
The PRISM case notation format reflects the availability, confirmed by The Post’s reporting, of real-time surveillance as well as stored content.
Depending on the provider, the NSA may receive live notifications when a target logs on or sends an e-mail, or may monitor a voice, text or voice chat as it happens (noted on the first slide as "Surveillance").
Searching the PRISM database
On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM’s counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected "incidentally" during surveillance of those targets.
Original slides published June 6
Introducing the program
A slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved.
The program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables.
This note indicates that the program is the number one source of raw intelligence used for NSA analytic reports.
The seal of
Special Source Operations, the NSA term for alliances with trusted U.S. companies.
Monitoring a target’s communication
This diagram shows how the bulk of the world’s electronic communications move through companies based in the United States.
Providers and data
The PRISM program collects a wide range of data from the nine companies, although the details vary by provider.” />
NSA slides explain the PRISM data-collection program Published: June 6, 2013, Updated June 29, 2013 The top-secret PRISM program allows the U.S. intelligence community to gain access from nine Internet companies to a wide range of digital information, including e-mails and stored data, on foreign targets operating outside the United States. The program is court-approved but does not require individual warrants. Instead, it operates under a broader authorization from federal judges who oversee the use of the Foreign Intelligence Surveillance Act (FISA). Some documents describing the program were first released by The Washington Post on June 6. The newly released documents below give additional details about how the program operates, including the levels of review and supervisory control at the NSA and FBI. The documents also show how the program interacts with the Internet companies. These slides, annotated by The Post, represent a selection from the overall document, and certain portions are redacted. Read related article. New slides published June 29 Acquiring data from a new target This slide describes what happens when an NSA analyst “tasks” the PRISM system for information about a new surveillance target. The request to add a new target is passed automatically to a supervisor who reviews the “selectors,” or search terms. The supervisor must endorse the analyst’s “reasonable belief,” defined as 51 percent confidence, that the specified target is a foreign national who is overseas at the time of collection. The FBI uses government equipment on private company property to retrieve matching information from a participating company, such as Microsoft or Yahoo and pass it without further review to the NSA. For stored communications, but not for live surveillance, the FBI consults its own databases to make sure the selectors do not match known Americans. This is where data enters NSA systems, described more fully on the next slide. The Foreign Intelligence Surveillance Court does not review any individual collection request. See the inner workings of the NSA’s top secret spy program » Analyzing information collected from private companies After communications information is acquired, the data are processed and analyzed by specialized systems that handle voice, text, video and “digital network information” that includes the locations and unique device signatures of targets. From the FBI’s interception unit on the premises of private companies, the information is passed to one or more “customers” at the NSA, CIA or FBI. PRINTAURA automates the traffic flow. SCISSORS and Protocol Exploitation sort data types for analysis in NUCLEON (voice), PINWALE (video), MAINWAY (call records) and MARINA (Internet records). The systems identified as FALLOUT and CONVEYANCE appear to be a final layer of filtering to reduce the intake of information about Americans. Each target is assigned a case notation The PRISM case notation format reflects the availability, confirmed by The Post’s reporting, of real-time surveillance as well as stored content. Depending on the provider, the NSA may receive live notifications when a target logs on or sends an e-mail, or may monitor a voice, text or voice chat as it happens (noted on the first slide as “Surveillance”). Searching the PRISM database On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM’s counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected “incidentally” during surveillance of those targets. Original slides published June 6 Introducing the program A slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved. The program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables. This note indicates that the program is the number one source of raw intelligence used for NSA analytic reports. The seal of Special Source Operations, the NSA term for alliances with trusted U.S. companies. Monitoring a target’s communication This diagram shows how the bulk of the world’s electronic communications move through companies based in the United States. Providers and data The PRISM program collects a wide range of data from the nine companies, although the details vary by provider.
https://scontent-a-sjc.xx.fbcdn.net/hphotos-ash3/t1.0-9/1005190_487409561342552_888986138_n.jpg” alt=”Searching the PRISM database
On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM’s counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected "incidentally" during surveillance of those targets.
Tag PhotoAdd LocationEdit” />
Searching the PRISM database On April 5, according to this slide, there were 117,675 active surveillance targets in PRISM’s counterterrorism database. The slide does not show how many other Internet users, and among them how many Americans, have their communications collected “incidentally” during surveillance of those targets. Tag PhotoAdd LocationEdit
Filed under: Daily Posts Tagged: Nazi war criminals, Snowden Prism