USAs Globala Övervakning



Naturens Partis politiska ståndpunkt:



# Avveckla all övervakning och spionflyg på svenskt luftrum.



# Vi tillåter inte utländska makter eller att vår egen svenska regering, använder svenska medborgares personliga uppgifter genom FRA, eller andra personliga dataintrång, telefonavlyssning, mail, etc. Sverige ska inte användas som en värdlandsnation för internationella krig, som sedan utländska trupper automatiskt drar in Sverige i nästa stora krig som kommer mellan USA och Ryssland. Segraren utav dessa två länder kommer sedan troligtvis att starta ett krig med Kina, för att på detta sättet kontrollera hela världens militär, alla naturresurser och alla människor på egen hand, detta är kapitalismens slutmål.

Usas globala övervakning:



Global surveillance:

Global surveillance refers to the mass surveillance of entire populations across national borders. Its roots can be traced back to the middle of the 20th century, when the UK-USA Agreement was jointly enacted by the United Kingdom and the United States, which later expanded to Canada, Australia, and New Zealand to create the Five Eyes alliance. The alliance developed cooperation arrangements with several "third-party" nations. Eventually, this resulted in the establishment of a global surveillance network, code-named "ECHELON", in 1971.




Five Eyes: UK USA Agreement Lustre U.S.

USA Freedom Act FISA amendments EU

Data Retention Directive Data Protection Directive



Concepts: Mass surveillance, Culture of fear, Secure communication, SIGINT Call detail record, Surveillance issues in smart cities.



"Today, this global surveillance system continues to grow. It now collects so much digital detritus — e-mails, calls, text messages, cellphone location data and a catalog of computer viruses - that the N.S.A. is building a 1-million-square-foot facility in the Utah desert to store and process it."

— The New York Times(August 2012).



Mobile phone location tracking:

"Mobile phone tracking refers to the act of attaining the position and coordinates of a mobile phone. According to The Washington Post, the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. In the process of doing so, the NSA collects more than 5 billion records of phone locations on a daily basis. This enables NSA analysts to map cellphone owners’ relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths.


In order to decode private conversations, the NSA has cracked the most commonly used cellphone encryption technology, A5/1. According to a classified document leaked by Snowden, the agency can "process encrypted A5/1" even when it has not acquired an encryption key. In addition, the NSA uses various types of cellphone infrastructure, such as the links between carrier networks, to determine the location of a cellphone user tracked by Visitor Location Registers."




"The Försvarets radioanstalt (FRA) of Sweden (codenamed Sardines) has allowed the "Five Eyes" to access underwater cables in the Baltic Sea. On 5 December 2013, Sveriges Television (Swedish Television) revealed that the FRA has been conducting a clandestine surveillance operation targeting the internal politics of Russia. The operation was conducted on behalf of the NSA, which receives data handed over to it by the FRA."


Infiltration of anonymous networks:

"The Five Eyes have made repeated attempts to spy on Internet users communicating in secret via the anonymity network Tor. Several of their clandestine operations involve the implantation of malicious code into the computers of anonymous Tor users who visit infested websites. In some cases, the NSA and GCHQ have succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. In other cases, the NSA and the GCHQ were able to uncover the identity of these anonymous users.


Monitoring of hotel reservation systems:

Under the Royal Concierge surveillance program, Britain's GCHQ agency uses an automated monitoring system to infiltrate the reservation systems of at least 350 luxury hotels in many different parts of the world. Other related surveillance programs involve the wiretapping of room telephones and fax machines used in targeted hotels as well as the monitoring of computers hooked up to the hotel network.


Virtual reality surveillance:

The U.S. National Security Agency (NSA), the U.S. Central Intelligence Agency (CIA), and Britain's Government Communications Headquarters (GCHQ) have been conducting surveillance on the networks of many online games, including massively multiplayer online role-playing games (MMORPGs) such as World of Warcraft, as well as virtual worlds such as Second Life, and the Xbox gaming console."






Bild: The echelon system


The ECHELON system:

" Air Force Menwith Hill or more simply RAF Menwith Hill is a Royal Air Force station near Harrogate, North Yorkshire, England which provides communications and intelligence support services to the United Kingdom and the United States. The site contains an extensive satellite ground station and is a communications intercept and missile warning site and has been described as the largest electronic monitoring station in the world."





NSA, The National Security Agency:

"The National Security Agency (NSA) is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare. Although many of NSA's programs rely on "passive" electronic collection, the agency is authorized to accomplish its mission through active clandestine means, among which are physically bugging electronic systems and allegedly engaging in sabotage through subversive software. Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass "close surveillance, burglary, wiretapping, breaking and entering".


Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary. As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.


Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget, operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.


NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam war leaders or economic espionage. In 2013, the extent of some of the NSA's secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are American citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA's ability to surveil the domestic Internet traffic of foreign countries through "boomerang routing"."



Vietnam War:

"In the 1960s, the NSA played a key role in expanding America's commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.


A secret operation, code-named "MINARET", was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War."


Assassinate Fidel Castro:

"In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church revealed that the NSA, in collaboration with Britain's SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock. Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities. Senator Frank Church uncovered previously unknown activity, such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro."






"The Special Activities Division (SAD): is a division in the United States Central Intelligence Agency responsible for covert operations known as "special activities". Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.


Special Operations Group (SOG): is the department within SAD responsible for operations that include high threat military or covert operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the United States government may deny all knowledge.


Political Action Group (PAG): is responsible for covert activities related to political influence, psychological operations and economic warfare. The rapid development of technology has added cyberwarfare to their mission. Tactical units within SAD are also capable of carrying out covert political action while deployed in hostile and austere environments. A large covert operation usually has components that involve many, or all, of these categories, as well as paramilitary operations. Political and Influence covert operations are used to support U.S. foreign policy. Often overt support for one element of an insurgency would be counter-productive due to the impression it would have on the local population. In such cases, covert assistance allows the U.S. to assist without damaging these elements in the process. Many of the other activities (such as propaganda, economic and cyber) support the overall political effort. There have been issues in the past with attempts to influence the US media such as in Operation Mockingbird."





Naturens Parti är ett svenskt politiskt parti. Vi arbetar för att stoppa företagen som förstör våran gemensamma planet!


Genom att stoppa all handel med varor som producerats på regnskogsmark, tex: Sojabönor och nötkött från Brasilien, Ceylon te från Sri Lanka och palmolja från Borneo, så hinner vi rädda våra sista regnskogar!!


Naturens Parti är det politiska partiet som verkligen kämpar för att rädda planeten på riktigt, genom att stoppa företagens överproduktion. Vi har dom lösningarna som krävs för att stoppa miljöförstörningen och slöseriet med våra sista naturresurser, samt alla giftiga utsläpp som företagen orsakar på våran ömtåliga planet, varje dag!!!