Carl Herman/Washington’s Blog: National Security Whistleblower Interview: NSA spies on absolutely everything, will never stop, and will only expand

Re-posted in excerpt, with many thanks to Carl Herman, from Washington’s Blog. Please visit there for the full, excellent post. Also many thanks to Kerry Cassidy of Project Camelot for this 2013 interview of Mark Novitsky.

This is an enormously important article and video publishing the commentary and words of Mark Novitsky, NSA whistleblower, revealing the many ways in which illegal surveillance and invasion of privacy by big Intel has been accomplished. Especially important too are the sections in the interview exposing the use of weaponry, along with intrusive surveillance, for all those wrongfully targeted  and watchlisted individuals on the receiving end of illegal domestic harassment and surveillance, including with “Concealed Electronic Monitoring” (which translates to physical assault with radiation neuroweaponry, Remote Neural Monitoring, and RFIDs, as explored here in many posts, and a focus that will continue to be explored here). I hope to make a separate post about this video interview shortly as well.

National security whistleblower interview: NSA spies on absolutely everything, will never stop, and will only expand

Kerry Cassidy’s 2013 2-hour interview of Mark Novitsky:

Statement from Mark (to me via e-mail and published with his permission):

Tragically, I am a National Security whistleblower. With all due respect to crab fishermen, clearly without question, the world’s most dangerous vocation. MANY years ago (years PRE-SNOWDEN), I spoke with 60 Minutes Sr. Exec. Producer Bob Anderson about my former employer and MASSIVE USG contractor, Denver-based Tele Tech Holdings (TTEC) / Tele Tech Government Solutions. TTEC is an international IT/TeleCom/ECRM (Electronic Customer Relations Management) BPO (Business Process Outsourcer). I warned Congress, USG LE, and media that Tele Tech Holdings, a joint commercial (Verizon, Bank of America, United Healthcare, Ford Motor Company, Cisco, HP, Best Buy+++) and USG (DHS, FEMA, FBI, US Census+++), and of TTEC’s incontrovertible relationship not only to DARPA but based upon all available evidence (Congressional, Fed Court, FBI, SEC & public records) was a likely 1981 (Reagan) Executive Order 12333 entity.

I warned that in addition to serial Securities Law Violations and TTEC’s illegal/failed lawsuit directed at me that TTEC was STEALING, dealing, sharing, EXPLOITING assumed private, personal, confidential, proprietary customer information with MULTIPLE (Multi-Nat) 3rd Parties without the “commodity customers’” full understanding, informed knowledge or consent. It’s not a stretch to assume you are somewhere in a TTEC Dbase…. and it’s hard to opt out of something when you don’t know you have opted in! This is obviously FAR beyond any cognizable, reasonable, recognized LEGITIMATE “legal” framework.

I call TTEC the USG (ET AL) META-DATA MEGA MALL. Now we also talked about TTEC’s/DARPA’s involvement with AI/Artificial Intelligence which Stephen Hawking, Bill Gates, Elon Musk all recently described AI as the BIGGEST threat to humanity, a demon, and they wondered why more people weren’t concerned.

SO MUCH (despite the 60 Minutes Thomas Drake story) is still being hidden.

BTW: I was told by Bob Anderson that my story was “too complicated’ for 60 Minutes. This was the media (NYT, WAPO, AP, Bloomberg, etc.) consensus/excuse. “Too complicated” is subject to a broad interpretation. You might also want to ask why this technology was in large part developed to monitor/track global financial transactions and why by all appearances “we” are failing to do so! (HSBC is a UK Bank…not Swiss bank: Standard Poors)

While you were sleeping, the U.S. Congress enacted through the backdoor an “All Seeing Eye” surveillance bill that in large part repealed MUCH of the United States Bill of Rights. At the same time we are told we must fight constant wars overseas to establish democracies, liberty, freedom and provide for them a constitution against a force funded and materially supported by our own “allies.”

Speaking of Constitutions… they can have ours…we aren’t using it.

I believe the iconic George Orwell book 1984 was off by 3 years. I think it should have been called 1981 because that is when the 1981 Reagan Executive Order 12333 quietly and covertly established an ACTUAL BIG BROTHER/Military Industrial Surveillance Complex. And instead of Big Brother…we should really be afraid of our Big Pervy Uncle.

Just a suggestion… but perhaps if you all weren’t so busy and focused spying on US…you might start focusing on the bad guys. WE the people are NOT your most strategic target-rich environment. I offered you all my help on this. Now we have the so-called CISA (they removed the word “protection” associated to previous failed attempts at passage: CISPA – RIP Aaron Swartz) “Cybersecurity Information Sharing Act.” Instead, we should really call it what it is: “Corporate Immunity for Spying on Americans” backdoored into the Christmas omnibus spending bill. And if you had been paying attention, an event in San Bernardino, California seemed perfectly timed and executed to scare politicians and people into thinking (or not thinking) CISA was a good idea. Which, if you consider that and previous events like 9-11 (and here), Aurora Colorado, Fort Hood, Boston Marathon, Sandy Hook and some may say go back as far as Oklahoma City (XO 12333 1981!) went undetected.

Or what about focusing on the biggest data breach in US Government history: the Office of Personal Management Hack, despite the past OPM OIG’s specific warnings regarding inadequate, deficient security systems and protocols or how the TSA missed 90+% of threats when tested. Only in government do you acquire more money and power and less accountability for failing. That is like using the Hindenburg to promote airship travel.

I have documented evidence within Federal Court, Congressional, FBI FOIA-DOJ, SEC FOIA & OIG of being on the receiving end of Illegal, Malicious Domestic Surveillance and Harassment since March of 2002. Despite the documented and long ago warnings of massive and systemic targeting of innocent American citizens being in no way, shape or form associated to terrorism… unless you count being on the receiving end… it is IMPOSSIBLE to seek out help from government officials and the private sector because it is ILLEGAL.

Please visit Washington’s Blog for the whole excellent post as well as succeeding comments from viewers, the author, and Mark Novitsky.

Advertisements

One response to “Carl Herman/Washington’s Blog: National Security Whistleblower Interview: NSA spies on absolutely everything, will never stop, and will only expand

  1. I was implanted illegal with advance Technologies in California thru MRI or Cat scan. In 2012, I am an American Citizen. The agency or agencies have harassed me for over a year in a half 24/7 using ELF extra low frequency waves, and EMF waves. They have hacked into my brain with there technologies using EEG’S (electroencephalography) these crazy psychopaths have tried to alter memories yes (brain washing). They use overlapping to impersonate people’s live audio and thought audio. I can prove this agency or agencies are in fact attempting to steal U.S. Federal Government Fundings with there system simulators. They are using quantum computing systems, with ANN artificial neural networks, as well as other neural networks. The system this evil organization is using has mean different commands such as Normal, Regular, Reverse, and Opposite. With in side those commands are Truth on/off Distortion on/off Clarity on/off. With live thought and or audio they change the command settings with overlapping to change what a person is thinking or saying. They also have a whisper were the whisper is hidden from recordings, They use whisper to say outrageous statements, then overlap the receiving person of the whisper to a recorder. This gives an appearance that the overlapped person is thinking or saying something they only heard from the whisperer. Learning how this technology is being used you can clearly see the ones doing this are pure evil. They have been threatening, harassing, discriminating, Intimidating, cyberbullied, impersonating. Even violating my private parts with there nano and micro robotics. They intrude my body with this technology.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s