Pages

2012-03-28

Homeland Security Manual Lists Government Key Words For Monitoring Social Media, News

 Vatic  Note:  Remember, Huffington post was just purchased by a neocon/lib so whatever they are saying, its what the bankers want us to believe, so the question becomes "why" and how does it benefit them.  After reading this, I believe its to convince us that we are always and each of us under surveillance and that way, they can make us our own policeman in our heads and not resist or rebel since BIG BROTHER IS WATCHING.  Now why do they want us to think that?  Because there is no way, they can collect all that data and have it mean something, or be useful in someway to them.  It was the first observation of the experts when Pointdexter, the general first brought up doing this under Bush Sr.  It was sh*tcanned because it would not work.

So the only other way to make it work, is to convince us they have the ability to do this and have it mean something in "real time" and real time is the key.  In order to stop some action by those who would rebel, they would need to receive and sort and analyze and determine action and do so in real time sufficient to stop whatever it is that is planned. Not possible to do with trillions of pieces of unrelated data.  So this is how they choose to make us fearful enough not to act.  It will work on the gutless sheep  but not on the courageous patriot who would rather die than live as they have planned for us.  The last blog of today, shows what we can look forward to if they succeed.

The Satanists are coming out of the closet, folks, so time to step up to the plate and do something about it. As the last blog of the day will show, They are half  way to their goal as outlined .  They are already drugging our children with TSA feeling up their sexual parts of their bodies.  They are arresting  5 year olds for school  yard fighting, proving they are helpless. The movie will show you the rest of their plan as they dare you to do something about it.  Notice all the teens today, wearing "GOTHIC" skull and bones clothing?  Chains and tatoos?  Its social engineering.  Ipods full of violence, murder, mayhem, choas???  This is sold to our children as normal.

We  are in deep doodoo if we allow our children to be stolen from us and their innocence compromised. GET RID OF YOUR TV AND IPODS.  Your world war II parents would never have allowed any of this and that is why we grew up safe and secure.  You need to give that same gift to your children until they can care for themselves. Normal life will educate them,  we don't need the sicko pervert inbred useless feeders doing it.  THIS IS YOUR NWO, HOW DO YOU LIKE IT SO FAR??? 

http://www.huffingtonpost.com/2012/02/24/homeland-security-manual_n_1299908.html


Date: 2012-02-24

                                                                 
Ever complain on Facebook that you were feeling "sick?" Told your friends to "watch" a certain TV show? Left a comment on a media website about government "pork?"

If you did any of those things, or tweeted about your recent vacation in "Mexico" or a shopping trip to "Target," the Department of Homeland Security may have noticed.

In the latest revelation of how the federal government is monitoring social media and online news outlets, the Electronic Privacy Information Center has posted online a 2011 Department of Homeland Security manual that includes hundreds of key words (such as those above) and search terms used to detect possible terrorism, unfolding natural disasters and public health threats. The center, a privacy watchdog group, filed a Freedom of Information Act request and then sued to obtain the release of the documents.

The 39-page "Analyst's Desktop Binder" used by the department's National Operations Center includes no-brainer words like ""attack," "epidemic" and "Al Qaeda" (with various spellings). But the list also includes words that can be interpreted as either menacing or innocent depending on the context, such as "exercise," "drill," "wave," "initiative," "relief" and "organization."


These terms and others are "broad, vague and ambiguous" and include "vast amounts of First Amendment protected speech that is entirely unrelated to the Department of Homeland Security mission to protect the public against terrorism and disasters," stated the Electronic Privacy Information Center in letter to the House Homeland Security Subcommittee on Counterterrorism and Intelligence.

The manual was released by the center a week after Homeland Security officials were grilled at a House hearing over other documents obtained through a Freedom of Information Act lawsuit that revealed analysts were scrutinizing online comments that "reflect adversely" on the federal government. Mary Ellen Callahan, the chief privacy officer for the Department of Homeland Security, and Richard Chavez, director for the National Operations Center, testified that the released documents were outdated and that social media was monitored strictly to provide situational awareness and not to police disparaging opinions about the federal government. On Friday, Homeland Security officials stuck by that testimony.

A senior Homeland Security official who spoke to The Huffington Post on Friday on condition of anonymity said the testimony of agency officials last week remains "accurate" and the manual "is a starting point, not the endgame" in maintaining situational awareness of natural and man-made threats. The official denied Electronic Privacy Information Center's charge that the government is monitoring dissent. The manual's instruction that analysts should identify "media reports that reflect adversely on DHS and response activities" was not aimed at silencing criticism but at spotting and addressing problems, she added.

Still, the agency agrees that the manual's language is vague and in need of updating. For instance, under terrorism watchwords, the manual lists "Hamas" and "Hezbollah" but also the "Palestinian Liberation Organization." The PLO was once considered a terrorist organization by the U.S. government but now that it has a diplomatic mission in Washington and its leader, Mahmoud Abbas, has met with presidents Bush and Obama, the inclusion of this term could be deemed questionable.

"To ensure clarity, as part of ... routine compliance review, DHS will review the language contained in all materials to clearly and accurately convey the parameters and intention of the program," agency spokesman Matthew Chandler told HuffPost.

The Huffington Post was given a sample of the social media nuggets and news reports picked up by Homeland Security analysts by using its watchword list. An internal report circulated by the agency on Feb. 17 to top officials indicated it had collected reports about everything from hotels in Nigeria increasing security as the terrorist group Boko Haram regroups to the arrest of a Bakersfield, Calif., teen in connection with a bomb plot. Other reports covered subjects including a multi-vehicle crash that resulted in the closing of I-85 in North Carolina, a norovirus outbreak at George Washington University, a suspicious package at an Alabama courthouse and an evacuation of a school in New York City's Bronx boroughas a result of an unknown substance.



Read the Homeland Security manual here:

The Official List – Using these words online will put you in the crosshairs Big Brother’s multi-billion dollar spy machine

Domestic Security

Assassination
Attack
Domestic security
Drill
Exercise
Cops
Law enforcement
Authorities
Disaster assistance
Disaster management
DNDO (Domestic Nuclear
Detection Office)
National preparedness
Mitigation
Prevention
Response
Recovery
Dirty bomb
Domestic nuclear detection
Emergency management
Emergency response
First responder
Homeland security
Maritime domain awareness
(MDA)
National preparedness
initiative
Militia
Shooting
Shots fired
Evacuation
Deaths
Hostage
Explosion (explosive)
Police
Disaster medical assistance
team (DMAT)
Organized crime
Gangs
National security
State of emergency
Security
Breach
Threat
Standoff
SWAT
Screening
Lockdown
Bomb (squad or threat)
Crash
Looting
Riot
Emergency Landing
Pipe bomb
Incident
Facility

HAZMAT & Nuclear

Hazmat
Nuclear
Chemical spill
Suspicious package/device
Toxic
National laboratory
Nuclear facility
Nuclear threat
Cloud
Plume
Radiation
Radioactive
Leak
Biological infection (or
event)
Chemical
Chemical burn
Biological
Epidemic
Hazardous
Hazardous material incident
Industrial spill
Infection
Powder (white)
Gas
Spillover
Anthrax
Blister agent
Chemical agent
Exposure
Burn
Nerve agent
Ricin
Sarin
North Korea

Health Concern + H1N1

Outbreak
Contamination
Exposure
Virus
Evacuation
Bacteria
Recall
Ebola
Food Poisoning
Foot and Mouth (FMD)
H5N1
Avian
Flu
Strain
Quarantine
H1N1
Vaccine
Salmonella
Small Pox
Plague
Human to human
Human to Animal
Influenza
Center for Disease Control
(CDC)
Drug Administration (FDA)
Public Health
Toxic
Agro Terror
Tuberculosis (TB)
Tamiflu
Norvo Virus
Epidemic
Agriculture
Listeria
Symptoms
Mutation
Resistant
Antiviral
Wave
Pandemic
Infection
Water/air borne
Sick
Swine
Pork World Health Organization
(WHO) (and components)
Viral Hemorrhagic Fever
E. Coli

Infrastructure Security

Infrastructure security
Airport
CIKR (Critical Infrastructure
& Key Resources)
AMTRAK
Collapse
Computer infrastructure
Communications
infrastructure
Telecommunications
Critical infrastructure
National infrastructure
Metro
WMATA
Airplane (and derivatives)
Chemical fire
Subway
BART
MARTA
Port Authority
NBIC (National
Biosurveillance Integration
Center)
Transportation security
Grid
Power
Smart
Body scanner
Electric
Failure or outage
Black out
Brown out
Port
Dock
Bridge
Cancelled
Delays
Service disruption
Power lines

Southwest Border Violence

Drug cartel
Violence
Gang
Drug
Narcotics
Cocaine
Marijuana
Heroin
Border
Mexico
Cartel
Southwest
Juarez
Sinaloa
Tijuana
Torreon
Yuma
Tucson
Decapitated
U.S. Consulate
Consular
El Paso
Fort Hancock
San Diego
Ciudad Juarez
Nogales
Sonora
Colombia
Mara salvatrucha
MS13 or MS-13
Drug war
Mexican army
Methamphetamine
Cartel de Golfo
Gulf Cartel
La Familia
Reynosa
Nuevo Leon
Narcos
Narco banners (Spanish
equivalents)
Los Zetas
Shootout
Execution
Gunfight
Trafficking
Kidnap
Calderon
Reyosa
Bust
Tamaulipas
Meth Lab
Drug trade
Illegal immigrants
Smuggling (smugglers)
Matamoros
Michoacana
Guzman
Arellano-Felix
Beltran-Leyva
Barrio Azteca
Artistic Assassins
Mexicles
New Federation

Terrorism

Terrorism
Al Qaeda (all spellings)
Terror
Attack
Iraq
Afghanistan
Iran
Pakistan
Agro
Environmental terrorist
Eco terrorism
Conventional weapon
Target
Weapons grade
Dirty bomb
Enriched
Nuclear
Chemical weapon
Biological weapon
Ammonium nitrate
Improvised explosive device
IED (Improvised Explosive
Device)
Abu Sayyaf
Hamas
FARC (Armed Revolutionary
Forces Colombia)
IRA (Irish Republican Army)
ETA (Euskadi ta Askatasuna)
Basque Separatists
Hezbollah
Tamil Tigers
PLF (Palestine Liberation
Front)
PLO (Palestine Liberation
Organization
Car bomb
Jihad
Taliban
Weapons cache
Suicide bomber
Suicide attack
Suspicious substance
AQAP (AL Qaeda Arabian
Peninsula)
AQIM (Al Qaeda in the
Islamic Maghreb)
TTP (Tehrik-i-Taliban
Pakistan)
Yemen
Pirates
Extremism
Somalia
Nigeria
Radicals
Al-Shabaab
Home grown
Plot
Nationalist
Recruitment
Fundamentalism
Islamist

Weather/Disaster/Emergency

Emergency
Hurricane
Tornado
Twister
Tsunami
Earthquake
Tremor
Flood
Storm
Crest
Temblor
Extreme weather
Forest fire
Brush fire
Ice
Stranded/Stuck
Help
Hail
Wildfire
Tsunami Warning Center
Magnitude
Avalanche
Typhoon
Shelter-in-place
Disaster
Snow
Blizzard
Sleet
Mud slide or Mudslide
Erosion
Power outage
Brown out
Warning
Watch
Lightening
Aid
Relief
Closure
Interstate
Burst
Emergency Broadcast System

Cyber Security

Cyber security
Botnet
DDOS (dedicated denial of
service)
Denial of service
Malware
Virus
Trojan
Keylogger
Cyber Command
2600
Spammer
Phishing
Rootkit
Phreaking
Cain and abel
Brute forcing
Mysql injection
Cyber attack
Cyber terror
Hacker
China
Conficker
Worm
Scammers
Social media
Read the Department of Homeland Security Media Monitoring Desktop Reference


The article is reproduced in accordance with Section 107 of title 17 of the Copyright Law of the United States relating to fair-use and is for the purposes of criticism, comment, news reporting, teaching, scholarship, and research.

2 comments:

  1. Hello, again. I have been reading about this Facebook/Twitter/employment cozying up and it cannot bode well. I have a dilemma. As hard as may be to believe this, I really do not have a facebook or Twitter account, never once put any of my info on them, because of this. FACEBOOK???? The very name should make you wonder....and then we find out that the CIA is/has been using the site to spy on all who are on there. So, in all honesty, I have never been on there. So what do I do if my employer demands my facebook/twitter accounts and passwords? I don't have any! And with almost everyone accounted for on these spy sites, it is not credible that I haven't signed up. It makes me look like the only nail not hammered down, and in this age of conformity, not a good sign. Do you have any suggestions?

    ReplyDelete
  2. first of all, how old are you? that can be your out. If over 50, then just say you have no idea how to navigate those sites and thus you are not interested in doing so.

    If they say you have to then you will have to have the courage to take your stand. Why would a legit employer fire you for not doing facebook or twitter??? They wouldn't, so that means that employer is not legit. Jobs are coming back to America because slave labor is pathetic on quality and productivity.

    There are no more productive people in the world than Americans, so the employer has to be owned by the bad guys and you would not want to work for someone like that. tell them OK, you will try and then begin looking for another job.

    ReplyDelete

Vatic Clerk Tips: After 7 days, all comments to an article go into the moderation queue for approval which happens at least once a day. Please be patient.

Be respectful in your comments, keeping in mind that these discussions will become the Zeitgeist of our time that future database archeologists will discover. Make your comments worthy and on the founding father's level in their respectfulness, reasoning, and sound argumentation. Prove we weren't all idiots in our day and age. Comments that advocate sedition or violence are not encouraged. Racist, ad hominem, and troll-baiting comments might never see the light of day.