December 25, 2008
The Department of Homeland Security and the Pentagon want you to know they will soon be searching the internet in near real time for terrorists. Of course, since there are so few real terrorists posing a threat — that is to say, terrorists not run out of the Pentagon and the intelligence apparatus — we can assume they will not be looking for the cave-dwelling sort of terrorist.
|Former AT&T technician Mark Klein and internet expert Brian Reid explain how the NSA and government employ high-tech means to snoop on internet communication.|
“The Homeland Security Department may soon start scouring the Internet to find blogs and message boards that terrorists use to plan attacks,” reports USA Today. “The effort comes as researchers are seeing terrorists increasingly use the Internet to plan bombings, recruit members and spread propaganda. ‘Blogging and message boards have played a substantial role in allowing communication among those who would do the United States harm,’ the department said in a recent notice.”
Blogging and message boards also play a substantial role in allowing communication among diverse groups, organizations, and individuals opposed to the government.
It is an exhaustively documented fact that the FBI, the CIA (in violation of its charter), the NSA, the Department of Homeland Security, and the Pentagon primarily monitor antiwar and other activists groups, not al-Qaeda.
The Pentagon’s Threat and Local Observation Notice (TALON) was created to spy on antiwar groups and others, a fact revealed by the ACLU of Northern California in 2006. The Department of Defense and the CIA have been sending so-called National Security Letters to credit card and banking companies asking that they release personal information on Americans for years now. The NSA has collected and databased the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth. The NSA’s massive operation, according to Dana Perino, is “lawful, necessary and required for the pursuit of al-Qaeda and affiliated terrorists” or Quakers opposed to the invasion and occupation of Iraq.
In fact, the government has closely monitored and sabotaged activists for decades — from Black Chamber and the NSA’s Operation Shamrock in the late 40s and 50s to the CIA’s Operation Chaos and the FBI’s COINTELPRO in the 60s and 70s — so all of this is nothing new, just business as usual, albeit utilizing the latest technology.
In order to more effectively monitor your antiwar blog or one in defense of the Constitution and the Second Amendment, “Homeland Security officials are looking for companies to search the Internet for postings ‘in near to real-time which precede’ an attack,” or posting opposed to government policies or malfeasance. In order to impart a sense of urgency and create even more fear, Homeland Security officials want us to believe “terrorists can easily get materials and make an improvised-explosive device (IED).”
Homeland Security and the Pentagon are likely already searching blogs and internet sites in near real time and the Mockingbird corporate media is simply telling the American people about it now. It is simply another way to ramp up the paranoia and characterize the internet as a nefarious terrorist tool in need of regulation and outright censorship.