December 31, 2012
Last week, the Senate approved to renew the Foreign Intelligence Surveillance Act (FISA) program whereby the US government is authorized to spy on emails and phone calls of suspected terrorists (allegedly not American citizens) without court-ordered warrants.
The Congress supports the use of FISA for another 5 years. To appease the general public, Congress added an amendment to FISA that requires the government to reveal whether or not American citizens were surveilled during operations or perhaps mixed-up in foreign intelligence interceptions. However, this amendment was disregarded and voted down.
Both the Senate Intelligence Committee and the Obama administration stressed that total secrecy must be maintained for the sake of national security.
Using al-Qaeda as the excuse for FISA, House Representative Lamar Smith championed the renewal with other House members in tow.
Al-Qaeda has been used by the US to create many disturbances, fake revolutions and false flag attacks. The latest is the recruitment, training and assembly of the Free Syrian Army which are coordinated on CIA-controlled bases in Turkey, and sent over the Syrian border to be monitored by al-Qaeda for the benefit of the US government.
Using deniable assets from the prison in Guantanamo Bay, the establishment of al-Qaeda forces for the sake of engaging Gaddafi’s forces was funded by the US government with designs to set up an Islamic emirate to be “sow a scare in Europe.”
In February of 2012, in an interview with Greta Van Susteren, Clinton admitted that the US trained the MEK in Afghanistan when the US was engaged in using the terrorist faction against the Russians. The MEK became the CIA-controlled faction known as al-Qaeda. Clinton said: “When the Soviet Union invaded Afghanistan we had this brilliant idea that we were gonna come to Pakistan and create a force of Mujahideen, equip them with stinger missiles, and everything else and go after the Soviets in Afghanistan.” This is the creation of al-Qaeda.
Clinton goes on to say: “We were successful. We said ‘great’; and we left Afghanistan . . . Leaving these trained people who were fanatical in Afghanistan and Pakistan. Leaving them well armed and creating a mess at the time we didn’t recognize. When you look back today, the people we are fighting today, we were supporting in the fight against the Soviets.”
Laying the groundwork for the coming war with Iran are the Communist infiltrators such as Patrick Clawson, who are supporting the Zionist agenda by coercing US elected officials to stand behind their takeover of the Middle East.
Also in 2012, Clinton removed the PMOI-MEK from the designated terrorist groups list to free the faction to do the bidding of the Zionist regime and facilitate the crisis initiation that Patrick Clawson spoke about last week.
A State Department statement revealed that: “The secretary of state has decided, consistent with the law, to revoke the designation of the Mujahedeen-e-Khalq (MEK) and its aliases as a Foreign Terrorist Organization (FTO) under the Immigration and Nationality Act and to delist the MEK as a Specially Designated Global Terrorist under Executive Order 13224.”
MEK is supported by the US government; as well as select members of Congress, former heads of the FBI and CIA, former US cabinet secretaries and politicians from Democrat and Republican parties.
Clinton explained her decision to remove the PMOI-MEK from the terrorist list as “a correct decision which sets aside a serious obstacle on the path of the Iranian people and Resistance to achieve democracy in Iran.”
House Representatives Dan Lungren and Trey Gowdy said that FISA is “critical to the protection of the American people” and “intelligence is the lifeblood of our ability to defend ourselves.”
Senator Patrick Leahy was responsible for a drafted replacement for the Electronic Communications Privacy Act (ECPA) that was meant to replace the 180 – day rule within the ECPA that gives law enforcement agencies the freedom to simply subpoena (i.e. request) a warrant to gain lawful access to private citizen’s emails older than 6 months. The subpoena would be sufficed in lieu of obtaining an actual warrant. As of now, a police department can claim – without being subject to proof – that a particular email is an imperative to an investigation and can gain access to that information without having to seek judicial means.
The change to the ECPA was never made. Instead, Leahy rewrote the bill to say that law enforcement no longer needed a warrant at all and could access any electronic information required to conduct their investigation by simply claiming its relevance.
The National Security Agency (NSA) has expanded its surveillance powers through support of the Congress. FISA is just the icing on the cake. According to the National Security Investigations and Prosecutions report for 2012: “an authorization targeting ‘al Qaeda’ — which is a non-U.S. person located abroad—could allow the government to wiretap any telephone that it believes will yield information from or about al Qaeda, either because the telephone is registered to a person whom the government believes is affiliated with al Qaeda, or because the government believes that the person communicates with others who are affiliated with al Qaeda, regardless of the location of the telephone.”
While the American public focus on the NSA, the National Counterterrorism Center (NCTC) has been given access to all governmental databases, intelligence on all citizens in the US. The information is retained for years without review and stored in case there is ever suspicion or a US citizen is under “reasonable belief” that they are connected to terroristic activity.
The NCTC is allowed to analyze and obtain copies of information on US citizens including:
• Flight records
• Americans hosting foreign-exchange students
• Casino records
• Behavior patterns
New guidelines for the NCTC with regard to access, retention, use and dissemination of surveillance data stored on Americans are shared under the guise of domestic terrorism. In the name of national security this data is retained and used against Americans whether living within the domestic US or abroad.
Those “appropriate entities” that will be conferred with regarding surveillance intelligence gathered on Americans will be at the discretion of the NCTC. Those could be local law enforcement, federal agencies or foreign intelligence communities that work with the US government to determine what “constitutes terrorism information.”