Wiretaps said to sift all overseas contacts
Vast US effort seen on eavesdropping
By Charlie Savage, Globe Staff | December 23, 2005
WASHINGTON -- The National Security Agency, in carrying out President Bush's order to intercept the international phone calls and e-mails of Americans suspected of links to Al Qaeda, has probably been using computers to monitor all other Americans' international communications as well, according to specialists familiar with the workings of the NSA.
The Bush administration and the NSA have declined to provide details about the program the president authorized in 2001, but specialists said the agency serves as a vast data collection and sorting operation. It captures reams of data from satellites, fiberoptic lines, and Internet switching stations, and then uses a computer to check for names, numbers, and words that have been identified as suspicious.
''The whole idea of the NSA is intercepting huge streams of communications, taking in 2 million pieces of communications an hour," said James Bamford, the author of two books on the NSA, who was the first to reveal the inner workings of the secret agency.
''They have a capacity to listen to every overseas phone call," said Tom Blanton, director of the National Security Archive at George Washington University, which has obtained documents about the NSA using Freedom of Information Act requests.
Tom Flocco details evidence that he and many other alternative media people have been spied on:
“His malice may be concealed by deception, but his wickedness will be exposed in the assembly.” Proverbs 26:26
Evidence indicates Bush wire-tapped alternative media
Is Bush using warrant-less spying as a pretext to monitor U.S. “enemies” list?
by Tom Flocco
WASHINGTON—December 22, 2005—TomFlocco.com—There is evidence that President Bush’s executive order authorizing eavesdropping on phone conversations of U.S. citizens, monitoring email and gaining access to private computers while failing to follow the law requiring court-ordered warrants may amount to criminal activity.
Internet IP address logs from this writer’s computer firewall security system provide evidence that the Department of Defense (DOD) is conducting surveillance, since logs show DOD internet identification numbers during specific occasions while we conducted phone interviews with intelligence agents and sources, and also while reports were being word-processed for stories regarding White House crime family activities.
DOD intrusion attempts to monitor the contents of our computer, track key-strokes or install a surveillance device were listed in our firewall security log as “high-rated attacks” by the U.S. government, the circumstances about which this writer and other witnesses would be willing to testify if subpoenaed to appear before a grand jury or Congress.
In a move reminiscent of President Nixon’s secret “enemies list,” Mr. Bush’s domestic surveillance program raises questions whether he is employing the Defense Department to spy on Americans not only for the “War on Terror,” but also as a pretext to conduct warrant-less monitoring of political enemies, anti-war activists, whistleblowers and unfriendly alternative journalists without a paper trail—both inside and outside the USA.
Here's the rest of the article Bush Spied on Alt Media