posted on May, 26 2008 @ 03:26 PM
Regarding the monitoring of ATS...It would be STUPID for Homeland Security,
DIA, NSA or CIA and other domestic & foreign 3 and 4 letter agencies NOT to.
It doesn't matter that if what's on this forum is BS or not....
or if it's mostly overblown...it's the Patterns of Traffic and Opinion
that COUNT not what is actually said.
Inter-related with monitoring of forums like ATS, Rense.com, CoastToCoastAM, etc.
is the Echelon System which is TASKED by the NSA (National Security Agency)
to Specifically monitor unencrypted (or weakly encrypted) international
communications including phone calls, faxes, emails, file transfers
or anything that can be interpreted and determined have certain related
keywords within a defined set of parameters call "Dictionaries".
Canada, USA, New Zealand, Australia and the United Kingdom have all agreed
to use both automated methods and live-personnel to intercept, monitor and
interpret KNOWN and TARGETED personal, business, embassy and government
communications that are indexed, correlated and then compiled
into REQUESTS that are forwarded to the requesting agencies
SigInt (Signals Intelligence) operations.
All partner countries in Echelon (since the 1960's and 1970's)
monitor ALL targeted communications within their relevant geographic area
but any data that fulfills the "Dictionary" requirements of another partner
is forwarded without analysis to the requesting partner.
These Dictionaries contain varied terms such as "Nuclear Bomb",
"Radiological Device", "Covert Operation" or any other relevant or desired term
and any NEARBY text or voice data will be Voice/Text Recognized and targeted
for further interception and "Data Traffic Analysis".
For example, if all of a sudden, 400 messages are being sent from
Los Alamos Labs to The Sciences Department in a Beijing University,
then THAT traffic pattern is a RELEVANT interception target.
It's NOT the content of the emails that are important but rather
the data traffic pattern that is a powerful indicator that something
is up and should be looked into.
And using very powerful, grid-based datamining software from Oracle
and Computer Associates, various text terms, traffic patterns
and non-local facts can be inter-related and correlated to form
time-based patterns of traffic or patterns of actions that
are then graphed as animations on large screens down in
"The Dungeon" at Ft. Meade.
If a Stinger-type missile purchase was made in Syria from Iran
on Feb 22 and then a known arms dealer sent 3 pallets of "Smalls Arms"
to Amsterdam on Feb 23 and then 200 email messages were "Chattered"
between New York and a London Mosque during the week of Feb 24 to 28
then those "correlated" facts can be graphed and further targeted
for covert action or sent to Interpol or other relevant agencies
for further action.
The NSA people are expert at DATAMINING where you use the signals
gathering power of the Echelon system to gather all sorts of communciations
that are then FILTERED by "Dictionaires" and then each partners' requests
are "Pattern Searched" by automated Data Digger programs (i.e. Neural Nets,
Boolean Logic Trees, Wildcard Text Searches and even Date/Time loggers)
to see if there are consistent patterns in dates, times, locations, people
or places that when grouped together form a possible "Target of Opportunity"
for further analysis by SigInt agents, political analysts, translators,
or other personnel that could further glean nuggets of information gold
from the vast sea of daily personal, business and government international