Still unknown to the average American, is a program that has been ongoing for almost a decade. The NSA (National Security Agency aka No Such Agency), has been actively partnering with GCHQ (the U.K.’s equivalent of the NSA) in the collection and sharing of civilian meta data and other communications.
Yes, you read that right.. The NSA spies on U.K. citizens and shares that data with GCHQ and then the GCHQ collects data on American Citizens and shares that with the NSA!
This program has been going on silently in the background since around 2010.
It is estimated that 850,000 NSA employees and contractors with top security clearance have had access to the GCHQ database.
Britain’s spy agency GCHQ has secretly gained access to the network of cables which carry the world’s phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).
The sheer scale of the agency’s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.
The Edward Snowden releases really shed some light into this partnership, yet the average person has never even heard of this, many have no idea such projects and agencies even exist. The truth is that most of us are constantly getting our data collected by secretive agencies that have little to no oversight or accountability.
GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.
This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user’s access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.
The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called “the largest programme of suspicionless surveillance in human history”.
Please keep in mind that this article was posted back in 2013, one can only assume that this partnership has only strengthened and that the amount of Data being collected must be unfathomable.
And the scale of the programme is constantly increasing as more cables are tapped and GCHQ data storage facilities in the UK and abroad are expanded with the aim of processing terabits (thousands of gigabits) of data at a time.
For the 2 billion users of the world-wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.
The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.
The best part? Is that telecom companies are willingly giving this type of access and control to your data, in fact, they are being paid quite handsomely for their efforts and have secured agreements to not have their company names made public. If they do not cooperate? They are forced to. Unaccountable agencies are able to exert very heavy pressure on these telecom companies if they do not comply. Coercion? Governments never do that right? HA!
The idea that we have any kind of real privacy is kind of a joke when you take into account how many programs like these are ongoing that we frankly have no knowledge of. These massive government agencies are allowed to operate largely without accountability. The average American is still ignorant to the fact that there are massive data collection programs going on right under their noses. When you have situations like these, and you have international agreements between spy agencies like the ones we are seeing, it is almost guaranteed that there will be abuses.
I wonder how long it will take before some black hat hacker on the dark web gets his hands on some of the CIA’s Vault7 and Vault8 programs and starts hacking into these massive centralized databases. Can you imagine the damage that could be done?
I am bringing this topic up because over the last few weeks there has been this massive push to declassify intelligence committee memo’s concerning the criminal actions of the FBI, DOJ, and the State Department collection of intelligence on American Citizens. I want people to understand exactly the kind of monster we are dealing with here. Sure, the FISA court was supposedly set up to protect American Citizens, however, what about the instances where data is collected at large and catalogued in a system that is accessible to the intelligence community and to private contractors? What happens to your privacy then? How hard is it to get identifying information unmasked? What happens when someone like Susan Rice decides that any data collected on you can be unmasked and used without ever actually going to the FISA court for a warrant?
The revelations that the FBI/DOJ lied to the FISA court to obtain warrants to spy on President Trump and his associates was absolutely earth shattering, however, they also raised questions about the ethics of the people holding the keys to these massive spy programs. At what point does a citizen or corporations right to privacy die in the name of “National Security”. Why are these massive spy programs allowed to operate with almost no control or oversight by our elected officials? Don’t they realize that our elected representatives are actively being spied on as well?
I wonder how long it will take the globalist cabal deep state agents to realize that such spy programs are a double edged sword, and that nothing they do can be truly kept secret. How long will it take them to realize that the White Hats are taking over and will use these same systems against them?
Many people will be interested to know that such intelligence gathering programs have been used and in the works since at least the late 1970’s. I am going to share with you now a series of links and videos that detail some of these programs.
Those that are never held accountable for their actions have no problem killing innocent people to cover up their misdeeds.