Author Archives: mhlcc

National Security Agency – Wikipedia

Posted: October 19, 2016 at 4:09 am

Not to be confused with NASA. National Security Agency

Seal of the National Security Agency

Flag of the National Security Agency

The National Security Agency (NSA) is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are American citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

MI-8 also operated the so-called “Black Chamber”.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USSMaddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET”, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[32] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[33] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[34] Senator Frank Church uncovered previously unknown activity,[34] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[35] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[36]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[34]

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[37][38]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[39] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[40] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[40] NSA employees must be retired for more than fifteen years to qualify for the memorial.[40]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[41]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[43]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004; it was late, over budget, and didn’t do what it was supposed to do. The government then raided the whistleblowers’ houses. One of them, Thomas Drake, was charged with violating 18 U.S.C.793(e) in 2010 in an unusual use of espionage law. He and his defenders claim that he was actually being persecuted for challenging the Trailblazer Project. In 2011, all ten original charges against Drake were dropped.[44][45]

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing them to map people’s movements and relationships in detail.[56] It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSAs surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

As of 2013[update], NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

The NSA maintains at least two watch centers:

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden’s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule”, where two system administrators are required to be present when one accesses certain sensitive information.[108] Snowden claims he suggested such a rule in 2009.[110]

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them it’s not clear describing everything bad they had heard about the test, the implication being that none of it is true.”[116] argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian”.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013[update] .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

On July 18, 2013, Greenwald said that Snowden held “detailed blueprints of how the NSA does what they do”, thereby sparking fresh controversy.[135]

Headquarters for the National Security Agency is located at 39632N 764617W / 39.10889N 76.77139W / 39.10889; -76.77139 in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20mi (32km) southwest of Baltimore,[136] and 25mi (40km) northeast of Washington, DC.[137] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[138][139] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[140]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[141] Built on 350 acres (140ha; 0.55sqmi)[142] of Ft. Meade’s 5,000 acres (2,000ha; 7.8sqmi),[143] the site has 1,300 buildings and an estimated 18,000 parking spaces.[137][144]

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[145] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[145] It contains 3,000,000 square feet (280,000m2), or more than 68 acres (28ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[145]

The facility has over 100 watchposts,[146] one of them being the visitor control center, a two-story area that serves as the entrance.[145] At the entrance, a white pentagonal structure,[147] visitor badges are issued to visitors and security clearances of employees are checked.[148] The visitor center includes a painting of the NSA seal.[147]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube”.[149] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[147] NSA headquarters has its own post office, fire department, and police force.[150][151][152]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[153]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[154]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[155] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[141] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[154]

One estimate put the potential for power consumption by the new Utah Data Center at US$40million per year.[156]

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army’s cryptographic operations.[157] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[158]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[158] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[159] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[158] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[160] The four NSA buildings became known as the “Big Four.”[160] The NSA director moved to 2B when it opened.[160]

On March 30, 2015, shortly before 9am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[161][162]

The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[163] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[164] In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[165]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[166] but her later revision does not.[167] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[168]

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[169]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[170] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[150] It cost $3.2billion and covers 227 acres (92ha; 0.355sqmi).[150] The center is 1,800,000 square feet (17ha; 0.065sqmi)[150] and initially uses 60 megawatts of electricity.[171]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54ha; 0.21sqmi) with 60 buildings and 40 parking garages.[150]Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[150]

As of 2012, NSA collected intelligence from four geostationary satellites.[156] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[156] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[156]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[172] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[153][156]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[173] It is expected to be operational by September 2013.[156]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[174] the latter expansion expected to be completed by 2015.[175]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[176] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[177] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[178] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[176]

Following the signing in 19461956[179] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[180] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[181] New Zealand.[182]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[183] Planned in 1954, and opened in 1960, the base covered 562 acres (227ha; 0.878sqmi) in 1999.[184]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[185]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[186] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[186]

Thailand is a “3rd party partner” of the NSA along with nine other nations.[187] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[188]

Read the original post:
National Security Agency – Wikipedia

Posted in NSA | Comments Off on National Security Agency – Wikipedia

Pumpkin Island – Private Islands Online

Posted: October 17, 2016 at 1:27 am

This little private island of only 15 acres is a quaint piece of paradise that offers a blissful escape from the stresses of modern day life and a chance to partake in pristine nature. The island has everything to make your stay in paradise a memorable one. In order to preserve the intimacy and authenticity of the island, the owners have created a small eco-friendly retreat, purposely limiting the number, with a select variety of self catering cottages to five, whilst accommodating up to 30 guests. There is a very unique feel to each of the comfortable, nature-inspired cottages, only a step away from the ocean’s edge. Each has a special name, colourful decor and a view of the Pacific Ocean. All cottages are self-contained and eco-friendly, powered by wind and sun, yet well appointed and charming. They have their own private bathrooms, with large decks overlooking seclusion and freedom, enjoying some of the most beautiful sunsets you will ever witness.

Take a swim at mid tide around the island’s own coral lagoon and see a multitude of colourful coral, giant clams and fish. Snorkelling equipment as well as glass bottom sea kayaks are provided for your use. *Professional diving or fishing tours can also be arranged. Picnic lunch can be taken on the coconut palm-shaded lawns behind the tropical thatched hut overlooking the beach. Silence is broken only by the rustle of palm leaves and the gentle sound of waves breaking on the reef, whilst sipping away at sundowners from the Lookout’s peaceful surroundings. Alternatively, arrange to have your evening ended with a beach bonfire and scrumptious marshmallows.

Fish for your own dinner within the shallow waters of the reef, or dine from our pre-order gourmet meals menu. Guests can self-cater or pre-order gourmet meals along with Australian wines, from the award winning Waterline Restaurant, at Keppel Bay Marina, Yeppoon. Meals and drinks are collected on the day of departure. The island will enchant all who choose Pumpkin Island for their self catering holidays in the Great Barrier Reef, Australia. Pumpkin Island is a playground for families young and old, utterly romantic for couples and a hoot for a group of friends.

There are numerous commercial flights available daily from Sydney, Melbourne and Brisbane into Rockhampton, Central Queensland. Upon your arrival at the Rockhampton Airport, it is a 45 minute trip by car to Yeppoon Harbour where a boat, a 45 minute boat journey, awaits to take you to Pumpkin Island. To assist in maintaining the pristine environment, there are no jetty facilities, with transfers ashore undertaken by way of a smaller vessel.

You can charter a private helicopter from Rockhampton Airport for a short forty-five-minute flight to Pumpkin Island. Alternatively, you could land your private helicopter on our helipad or sail in on your own boat.

Facilities nearby in Yeppoon – Within a 45 minute boat trip to the mainland from Pumpkin Island, you will find the nearby towns of Yeppoon, Emu Park, Byfields and Rockhampton; along with a selection of professionally designed golf courses, day spa’s, sailing clubs, scuba diving shops, adventure activity centre, award winning restaurants and visits to the surrounding islands and private gardens.

Continue reading here:

Pumpkin Island – Private Islands Online

Posted in Private Islands | Comments Off on Pumpkin Island – Private Islands Online

Superintelligence: paths, dangers, strategies | University …

Posted: at 1:26 am

Join Professor Nick Bostrom for a talk on his new book, Superintelligence: Paths, Dangers, Strategies, and for a journey that takes us to the frontiers of thinking about the human condition and the future of intelligent life. The human brain has some capabilities that the brains of other animals lack. It is to these distinctive capabilities that our species owes its dominant position. Other animals have stronger muscles or sharper claws, but we have cleverer brains. If machine brains one day come to surpass human brains in general intelligence, then this new superintelligence could become very powerful. As the fate of the gorillas now depends more on us humans than on the gorillas themselves, so the fate of our species then would come to depend on the actions of the machine superintelligence. But we have one advantage: we get to make the first move. Will it be possible to construct a seed AI or otherwise to engineer initial conditions so as to make an intelligence explosion survivable? How could one achieve a controlled detonation?

The book talk will be followed by a book signing and drinks reception.

Continued here:

Superintelligence: paths, dangers, strategies | University …

Posted in Superintelligence | Comments Off on Superintelligence: paths, dangers, strategies | University …

Razib Khan Blog Posts – The Unz Review

Posted: at 1:20 am

A friend asked me about population structure, and methods to ferret it out and classify it. So here is a quick survey on the major methods Im familiar with/utilize now and then. Ill go roughly in chronological order.

First, you have trees. These are pretty popular from macroevolutionary relationships, but on the population genetic scale (intraspecific, microevolutionary) youre mostly talking about representing distances between groups in a tree format. You saw this in History and Geography of Genes, where genetic distances in the form of Fst values (proportion of genetic variation unique to between two groups) were used as distance inputs.

A problem with trees is that they dont model gene flow, a major dynamic on a microevolutionary scale. Also, complex relationships can get elided in tree frameworks, and as you add more and more populations you often end up with an incomprehensible fan-like topology.

Then you have principle component analyses (PCA) and related methods (e.g., multidimensional scaling, which is very different in the sausage-making but generates a similar output). Like trees, this is a visualization of the variation, in this case on a two dimensional plot (please dont bring up three dimensional PCA, theres no such thing until holograms show up).

The problem with PCA is that different types of dynamics can lead to the same result. For example, someone who is an F1 of two distinct groups occupies the same position as a population which happens to occupy a genetic position between two groups. Additionally, by constraining the variation into two dimensions, one can mislead in terms of relationships. There are many dimensions, but operationally you focus on on two at a time.

A paper of interest, Population Structure and Eigenanalysis.

Next you have model-based clustering introduced in Jonathan Pritchards Inference of Population Structure Using Multilocus Genotype Data. There are many flavors of this, but they operate under the same framework. You have a model of population dynamics, and see how the genotype data can be explained by parameters of the model. Of particular interest is assignment to one of K populations, which can be combined to explain the variation in the data.

Unlike PCA these model-based methods are rather good at identifying people who are first generation mixes, as opposed to those from stabilized groups along a cline. But, they also produce artifacts, because they are quite sensitive to the input data, and lend themselves to cherry-picking.

Earlier I said that one problem with the tree methods is that they dont model gene flow. Joe Pickrells TreeMix does so. Like the original tree methods, and unlike PCA or unsupervised model-based clustering, you specify a set of populations. Then you compare the populations in terms of their genetic distance, and fit them to a tree, but add migration parameters to that tree where the fit between the tree and the data is the most tenuous fit.

All visualizations are deformations of reality. TreeMix attempts to mitigate this somewhat by introducing another representation, that of migration.

Next we have local ancestry methods. By local ancestry, basically we mean methods which can assign ancestry to particular regions of the genome. While tree methods measure differences across pooled populations, PCA and model-based methods compare genotypes between individuals (this is a simplification, but bear with me). Local ancestry methods, like RFMix, compare regions of the genome with each other.

Related to, but not exactly the same, as local ancestry methods are haplotype based methods. In particular, Im thinking of the FineStructure and its related methods. These leverage variation across the genome in terms of haplotypes, rather than just looking at genotypes. They also tend to benefit from phasing, for obvious methods. FineStructure and its relatives tend to need more marker density than model-based methods, which require more marker density than PCA, which requires more marker density that tree based methods. These haplotype based methods allow for correction of and accounting for forces such as genetic drift, which tend to skew results in other methods.

Finally, there is the AdmixTools framework which is good for testing very explicit hypotheses. While many of the above methods, such as TreeMix and unsupervised model-based clustering, explore an almost open-ended space of structure possibilities, the methods in AdmixTools exists in large part to test narrow delimited models. This goes to the fact that many of these methods are complementary, and you should use them together to arrive at a robust result. For example, if you are assigning populations for TreeMix, you should use PCA and model-based clustering to make sure that the populations are clear and distinct, and outliers are removed.

Theres a lot I left out, but many of the other methods are just twists on the ones above.

Continued here:
Razib Khan Blog Posts – The Unz Review

Posted in Gene Medicine | Comments Off on Razib Khan Blog Posts – The Unz Review

AJRCCM – Home (ATS Journals)

Posted: at 1:20 am

This site uses cookies to improve performance. If your browser does not accept cookies, you cannot view this site.

There are many reasons why a cookie could not be set correctly. Below are the most common reasons:

This site uses cookies to improve performance by remembering that you are logged in when you go from page to page. To provide access without cookies would require the site to create a new session for every page you visit, which slows the system down to an unacceptable level.

This site stores nothing other than an automatically generated session ID in the cookie; no other information is captured.

In general, only the information that you provide, or the choices you make while visiting a web site, can be stored in a cookie. For example, the site cannot determine your email name unless you choose to type it. Allowing a website to create a cookie does not give that or any other site access to the rest of your computer, and only the site that created the cookie can read it.

See original here:
AJRCCM – Home (ATS Journals)

Posted in Gene Medicine | Comments Off on AJRCCM – Home (ATS Journals)

Library – Transhuman- Shoud 1

Posted: at 1:19 am


The Transhuman Series

SHOUD 1 Featuring ADAMUS SAINT-GERMAIN, channeled by Geoffrey Hoppe

Presented to the Crimson Circle August 6, 2016

I Am that I Am, Adamus of Sovereign Domain.

Welcome to Shoud 1 of the Transhuman Series. Hm, take a good deep breath with it (taking a deep breath). Mm. Something different. Theres something different in the air, in the energy. You can sense it if you take a good deep breath and get out of your mind for a moment (slight pause). Something different. Well talk about that in just a moment, but

I had a few words to start out with, but theres this overwhelming aroma (Adamus sniffs and audience laughter) as I breathe in; an overwhelming aroma either of good French champagne on your breath (Adamus sniffs again) or something more pervasive. Could it be could it be real coffee? (audience says Yeah!) Sandra! Where is my coffee?!

LINDA: Adamus! I think its your time to walk over to the special Masters Club.

ADAMUS: Well, Im getting invited to

LINDA: Yes, you are! (audience applause)

ADAMUS: the human Masters Club. Thank you, my dear.

LINDA: We want you to see these beautiful creations that the Masters are doing. Yes.

ADAMUS: So well just walk on to the Masters Club.


ADAMUS: I think I might have prepared a little speech for this, but who knows? Who knows?

LINDA: Oh! Is it possible? You? A speech?!

ADAMUS: Mwah! A little kiss here before

LINDA: Oh. There we go.

ADAMUS: Oh, yes!

LINDA: Yeah, how about more? Yeah. Yeah.

ADAMUS: Mwah! (blowing kisses to various audience members) Yes. Yes.

LINDA: Yeah, yeah.

ADAMUS: Mwah! Air kiss.

LINDA: Dont miss out! Dont miss out!

ADAMUS: Mwah And a hug. Ah, dear old friend (they hug). Havent seen you in a while. Mm. Mm. And your beautiful daughter. Havent

LINDA: Shes gorgeous.

ADAMUS: Ill be with you in a moment.

LINDA: Yeah, no problem. No problem.

ADAMUS: Mwah! Ive got my kissing to oh.


ADAMUS: Oh. Mwah!

SHARON: Thank you.

LINDA: We dont want to interrupt anything.


LINDA: Okay.


LINDA: Here we go. Here we go.

ADAMUS: Okay. Thank you. Can you take my hand, please?

LINDA: Yes. Yes.

ADAMUS: Yes. Yes.

LINDA: I want to make sure that youre taking care of Geoffrey.


LINDA: Oh, wait, wait!


LINDA: Oh, did you see that? Did you see that? (points to painting of Tobias on the wall)

ADAMUS: Ah, Tobias.


ADAMUS: You never looked so good, Tobias


ADAMUS: as you do in that painting.

LINDA: Ohhh!

ADAMUS: Okay. Oh! So this is it?

LINDA: This is it.

ADAMUS: This is it, the Masters Club.

LINDA: Arent you proud? (he sighs deeply) Its an amazing beautiful creation.

ADAMUS: It is a beautiful creation. If you dont mind, Ill get my coffee and

LINDA: Haah! Whats this?

ADAMUS: and then thats Timothy (Adamus chuckles).

LINDA: Behind Timothy, with Timothy.

ADAMUS: Im going to be speaking from here for a moment (Timothy moves to a different seat). So. Yes, and my coffee, ladies.

LINDA: Ah! Barista trained!

ADAMUS: Already made? One

SANDRA: Yes, from the barista (Kerri).

ADAMUS: Oh, would you


ADAMUS: run that to the camera and show them how beautiful it looks with the thank you.

LINDA: Ohhh! Im not sure I have to go

ADAMUS: Thank you.

LINDA: to get this to the camera. Oh, my goodness. This is going to be this is tense. Okay, can you see inside this coffee cup?

ADAMUS: Lower it a bit and they can dip the camera.

LINDA: I dont think this can be done.

ADAMUS: Right into the coffee cup.

LINDA: Can you see it?

ADAMUS: There it is!

LINDA: Ohhh! They can see it. Wait! Wait! Ohhh! Look at that professional barista work! (its a shape of a heart in the coffee) Ohhh! You!

ADAMUS: Right here. So.

LINDA: You are so lucky.

ADAMUS: Thank you and thank you, beautiful ladies, for making me a real coffee. All of these years Ive endured this ahem other kind of coffee, less elegant coffee. But now, now and I know it was my wish and I asked Cauldre and Linda to make sure we got in a good coffee machine here in the Masters Club. If you dont mind (he takes a sip). Ahhh!

LINDA: Finally, satisfaction!

ADAMUS: Thank you. Thank you.


The Masters Club

ADAMUS: As the first Ascended Master into this club, into this human club, I would like to take this moment to invite all of the other Ascended Masters, both those who are embodied here on Earth and those who are in the other realms. I would like to invite them to come in, and Crash, could you be so kind just to open the door, or Timothy, open the door to let them in. Im only kidding. They dont need the door to come in (laughter). He fell for it. He fell for it.

Im going to ask them to come in and to join with all of you, those of you watching online, those of you here at the Crimson Circle Connection Center, to really ground these energies, to take a deep breath and to allow the energies to flow in between what you would call heaven and Earth, between the other realms and this human realm, and more than anything, in this moment, allowing all of the Ascended Masters to come in and to be with us to really meld into the and. Its not so much about heaven and Earth or this realm and that, its about the and, the many. And thats really what all of you are doing. Youre doing it in your personal lives; youre doing it right here at the Masters Club.

So lets take this moment in beautiful silence, which truly isnt silent, to invite in the Ascended Masters. Those who are here over fifteen hundred who are here embodied on this planet and all the ones who are in the other realms, who have their own Ascended Masters Club, but Im certain that it doesnt even compare to the energies of what you have here (pause), because here is something so special, such a history that is embedded into this wall. A history of your journey, your many, many lifetimes.

It was said before that the stones in the wall here represent all of Shaumbra, the many, many stones, and that is true. But it also represents all of your lifetimes, all of your experiences, for each and every one of you, all the stones here everything that youve been through, every experience, every hardship, every beautiful joyful moment right here on this wall.

Take a moment just to feel that. Its a memorial wall, in a way. Its not the Wailing Wall, indeed, and dont start putting little prayers in there. Its the wall of joy and the wall of being the transhuman.

And on the other wall, which well show later, but on the other wall on the opposite side of the room, what Cauldre has called the big crimson wall, on that wall represents the art of life and the act of life. Its a beautiful wall and its not just flat, because youre not just flat. It has dimension. It has character in it. It has artwork in it, infused in it by the artist who created it, but by each and every one of you. It shows the swirls of life, the texture of life, the anything-but-flatness of life, which for so many, and for those many who are living in the singular nature of life, their lives can be like a flat, almost colorless wall. But for those who go into the and, who allow the and, who allow, really, the embodiment of everything, this wall represents that beauty of and, of art, of potentials.

So we have the two walls, the Wall of Joy with your experiences, and the Wall of And, representing depth and representing truly the transhuman.

And then, of course, right in the middle of it we have the coffee machine and the kitchen, representing that very beautiful part of human life, to feed the body, to enjoy the sensual things of life itself. So here we have it.

And the last wall, the windows. The windows, which look out onto the world, which look out, giving such a perspective of reality. Thats what these four walls are really about. And when you stand here today, any time you come to visit, any time you just sit in this energy, whether its surrounded by other Shaumbra or maybe by yourself, feel now the connection that youve made between the other realms and this realm, the integration of the and, right here.

It may just be a small space on a small planet in a very big universe, but what it is and what it represents is bringing and to this Earth. The many, the all-ness, no longer a linear simplistic life.

Let’s take a good deep breath with that.

This day is as important, as historic, or maybe even more so, than the day we had at the Quantum Leap together, back in 2007 in September. And that was a day of saying we go off the scales. It may not show up in your life or human life right away, but the quotient of consciousness, the path of history changed on that day. It was called the Quantum Leap because we went into something else. Its taken a number of years for it to manifest, but here we are right now, this day of the and. This day of true embodiment on this planet is here.

Lets take a deep breath with that.


And dear Linda, if you would guide me back, and Sandra, would you bring my coffee for me?

LINDA: (giggles) Anyone else youd like?

ADAMUS: Shes yes, an escort.

Read the rest here:
Library – Transhuman- Shoud 1

Posted in Transhuman | Comments Off on Library – Transhuman- Shoud 1

Why Choose UnitedHealthcare? –

Posted: October 13, 2016 at 5:35 am

No individual applying for health coverage through the individual Marketplace will be discouraged from applying for benefits, turned down for coverage, or charged more premium because of health status, medical condition, mental illness claims experience, medical history, genetic information or health disability. In addition, no individual will be denied coverage based on race, color, religion, national origin, sex, sexual orientation, marital status, personal appearance, political affiliation or source of income.

References to UnitedHealthcare pertain to each individual company or other UnitedHealthcare affiliated companies. Dental and Vision products are administrated by related companies. Each company is a separate entity and is not responsible for another’s financial or contractual obligations. Administrative services are provided by United HealthCare Services, Inc.

Products and services offered are underwritten by Golden Rule Insurance Company, Oxford Health Insurance, Inc., UnitedHealthcare Life Insurance Company. In New Mexico, products and services offered are only underwritten by Golden Rule Insurance Company.

All products require separate applications. Separate policies or certificates are issued. Golden Rule Short Term Medical plans are medically underwritten. Related insurance products offered by either company may be medically underwritten see the product brochures and applications. Healthiest You is not an insurance product and is provided by HY Holdings, Inc., d/b/a Healthiest You. Travel Health Insurance and Pet Insurance are underwritten by different companies that are not related to the UnitedHealthcare family of companies. Product availability varies by state.


Read this article:

Why Choose UnitedHealthcare? –

Posted in Golden Rule | Comments Off on Why Choose UnitedHealthcare? –

Hurricane Matthew kills 269; tears through Haiti, Bahamas …

Posted: October 8, 2016 at 10:32 pm

At least 276 people have been killed so far in Haiti, the Dominican Republic and St. Vincent and the Grenadines, officials said, with the death toll expected to rise.

As the death toll rises and crucial infrastructure crumbles, hundreds of thousands have been displaced.

Mourad Wahba, the UN secretary-general’s deputy special representative for Haiti, described Matthew as the “largest humanitarian event” since the earthquake.

Four people died in the Dominican Republic, the country’s government said. Authorities there did not provide details about how they died.

In St. Vincent and the Grenadines, a teenage boy died in a landslide as he was cleaning a drain behind his house, the National Emergency Management Office said. He died Wednesday after storms from Matthew passed.

Hurricane Matthew made landfall in Haiti on Tuesday but the details of its devastating impact are slowly coming to light.

At least 1,580 homes have been flooded in the country, and about 3,215 families have been affected by the severe storm, the country’s Civil Protection Agency said.

More than 300,000 people are in shelters across the country, the United Nations said.

Aid agencies are finding that the impact has been far greater than expected.

Ariane Quentier, spokeswoman for the UN Stabilization Mission in Haiti, said: “What we are realizing, as we are going further … is that there’s been a lot of devastation and a lot of damage and probably a lot more than what we had initially assessed.”

This means the initial aid already sent to the country’s worst-affecetd areas in the west and south have fallen short of the need. Evacuation centers are overwhelmed and communities and workers have been forces to set up more and more makeshift shelters with what resources they have.

Haitian pastor Louis St. Germain said the storm sheared a wall off his house and tore roofs off many buildings in the area.

“The river has overflowed all around us,” St. Germain said. “It’s terrible … a total disaster.”

Southern Haiti was hit especially hard, where winds of 125 mph (200 kph) destroyed homes, flooded villages and cut off the island from the rest of the country.

National Route 2, which connects Port-au-Prince with Haiti’s southern peninsula, broke apart when the bridge collapsed, the country’s civil protection agency said.

In the wake of the storm, the Electoral Commission postponed the country’s presidential election, which had been scheduled for Sunday. A new date has not been set.

Tim Callaghan, assistance response team leader for the US Agency for International Development in Haiti, told CNN that much of the damage in Haiti’s hardest hit areas — the southwestern cities of Les Cayes and Jeremie — appeared to be structural, and not the result of heavy rainfall.

“The urgent need we’re focusing on right now is food, safe drinking water and … things like plastic sheeting, hygiene kits and so forth,” he said.

“We’re in the most critical phase to support people.”

Dominique Fevry-Gilliand, a spokeswoman for Oxfam Canada, said up to 80% of homes in the most affected areas were destroyed. There was also extensive damage to crops along swaths of southern Haiti.

“Most likely, in the next couple of weeks and months, one of the things they will have to deal with in that region is hunger,” she said.

Haiti was only just beginning the “development” phase to rebuild infrastructure following the 2010 earthquake that destroyed much of the country, said Ines Brill, the International Federation of Red Cross and Red Crescent Societies representative for Haiti.

“This is an emergency after an emergency, which makes things more complex than a typical disaster,” she told CNN.

The powerful hurricane passed over the Bahamas capital, Nassau, on Thursday afternoon.

While no injuries had been reported early on Friday morning, houses had suffered flood and wind damage and a number of roads were impassable due to collapsed trees and poles.

The country’s national emergency agency was telling people to stay indoors until an assessment could be made of the damage.

“One of the main roadways in front of Sandals (resort) has been blocked off by debris and fallen trees,” Nassau resident Denzil Sirra told CNN, adding his house had not been damaged.

“A lot of debris and fallen trees and damaged shrubs. No electricity right now. Still have running water.”

Officials said the hurricane caused flooding in southern and eastern coastal communities and structural damage to a number of resorts in Nassau.

CNN meteorologists said storm surges in the Bahamas reached as high as 15 feet, along with intense rains and damaging winds.

Hundreds of people had the roofs blown off their homes as Hurricane Matthew swept across the country, Cuban state media reported, while photos from the seaside town of Baracoa showed devastation in the severe storm’s wake.

More than 30 houses were washed away by the hurricane in the northeastern Cuban town, the site where Christopher Columbus first landed in the Americas, a resident in the town said.

No fatalities were reported as of Thursday evening, local time, as the seafront area of the town had been evacuated ahead of Matthew’s arrival.

“I cannot emphasize enough that everyone in our state must prepare now for a direct hit,” Florida Gov. Rick Scott said. “Having a plan in place could mean the difference between life and death.”

Patrick Oppmann reported from Cuba; Ray Sanchez, Holly Yan and Max Blau reported from Atlanta. CNN’s Deborah Bloom, Alexander Leininger, Alison Daye, Natalie Gallon and journalist Yvetot Gouin contributed.

Read more:

Hurricane Matthew kills 269; tears through Haiti, Bahamas …

Posted in Bahamas | Comments Off on Hurricane Matthew kills 269; tears through Haiti, Bahamas …

Trance Top 100 – Beatport

Posted: at 10:29 pm





































































































See more here:

Trance Top 100 – Beatport

Posted in Trance | Comments Off on Trance Top 100 – Beatport

Urban Dictionary: trance

Posted: at 10:29 pm

By far the best form of music that exists. A recent study showed that if a population is divided into musical preference, those who claim a strong allegiance to trance have the highest average IQ.

Trance is the music of the genius-generation.

Lotsa space for your liquids.

Lotsa space for your liquids.

Your favorite word on a white mug.

One side has the word, one side has the definition. Microwave and dishwasher safe. Lotsa space for your liquids.

Soft and offensive. Just like you.

Smooth, soft, slim fit American Apparel shirt. Custom printed. 100% fine jersey cotton, except for heather grey (90% cotton).

Can you define these popular missing words?

Trance is indisputably one of the most emotional genres that actually exists, because it is all self-interpretation. There are no instrumental or musical limits to trance, and rather than listening to some random guy screaming about his life, associating with a trance progression or hookline is much more deep, and much more personal.

Like other genres, trance has many subgenres, some of which have become very commercialised to the extent where the musical merit of some tracks must be questioned (eg. Flip’n’Fill, Scooter etc.)

At the higher end of the more uplifting, melodic (and relatively popular) styles of trance are DJs such as Tiesto, Armin van Buuren, and Ferry Corsten. These DJs in particular can make beautifully structured mixes their own music, and the music of others, building it into a euphoric collage which spans multiple energy levels, in order to provide the listener with peak/trough feelings, and carry them through numerous emotions and mental states.

The creation and spread of trance music is mainly down to machinery such as the Roland JP-8000 (providing the prominently manipulated supersaw wave), and experimental DJs such as Sasha & John Digweed.

I want to listen to a melodic, energetic form of music that emotionally affects my state of mind. Therefore, I will listen to trance.

Lotsa space for your liquids.

Lotsa space for your liquids.

Your favorite word on a white mug.

One side has the word, one side has the definition. Microwave and dishwasher safe. Lotsa space for your liquids.

Soft and offensive. Just like you.

Smooth, soft, slim fit American Apparel shirt. Custom printed. 100% fine jersey cotton, except for heather grey (90% cotton).

The most sublime, divine, advanced music genre known to man, representing a quantum leap in artistic creativity analogous to the development of the frontal lobe in the human brain. Having an IQ below 130 renders one incapable of apreciating, let alone enjoying trance. Being a connoisseur of trance bespeaks of extremely high intelligence and impeccable level of personal sophistication. On the other hand, those who despise trance can uniformly be characterized as primtive troglodytes, closer to ape than man.

OMFG, this Tunnel Trance Force compilation pwnz!

Lotsa space for your liquids.

Lotsa space for your liquids.

Your favorite word on a white mug.

One side has the word, one side has the definition. Microwave and dishwasher safe. Lotsa space for your liquids.

Soft and offensive. Just like you.

Smooth, soft, slim fit American Apparel shirt. Custom printed. 100% fine jersey cotton, except for heather grey (90% cotton).

To put it simply…The best music ever devolped. Uses a pulse pounding beat and uplifting, euophoric melodies. Trance music can be listened to under any circumstances: Getting pumped b4 a game, get wild at a club or party, speeding down the freeway, Chillin in a lounge, sleeping too, even trippin out…

The club exploded when Paul Oakenfold began spinnin.

Lotsa space for your liquids.

Lotsa space for your liquids.

Your favorite word on a white mug.

One side has the word, one side has the definition. Microwave and dishwasher safe. Lotsa space for your liquids.

Soft and offensive. Just like you.

Smooth, soft, slim fit American Apparel shirt. Custom printed. 100% fine jersey cotton, except for heather grey (90% cotton).

Trance has a strong influence from early Detroit techno, but tends to be more dramatic or “emotional” than the minimalism of earlier techno. Common elements in trance include heavy, compressed kick drums, dramatic sweeping pads, and cascading synth arpeggios.

As with any kind of music, there are a billion sub-classifications possible — hard trance, psytrance, acid trance, goa trance, etc. Trance has been one of the most popular forms of club music over the past few years, and has arguably produced more mainstream appeal (Oakenfold, Van Dyk, etc.) than most other electronic sub-genres.

“She spun a sick trance set in the big room last night; lots of distorted 909s and squelchy basslines, none of this shite that sounds like a car commercial.”

Lotsa space for your liquids.

Lotsa space for your liquids.

Your favorite word on a white mug.

One side has the word, one side has the definition. Microwave and dishwasher safe. Lotsa space for your liquids.

Soft and offensive. Just like you.

Smooth, soft, slim fit American Apparel shirt. Custom printed. 100% fine jersey cotton, except for heather grey (90% cotton).

The ultimate music for improving your concentration. Great for studying, writing papers, reading long books, ect. Has a great beat to drown out all distractions but no words to distract you.

Fuck the mozart effect, i’m gonna listen to some trance while I write my report.

Lotsa space for your liquids.

Lotsa space for your liquids.

Your favorite word on a white mug.

One side has the word, one side has the definition. Microwave and dishwasher safe. Lotsa space for your liquids.

Soft and offensive. Just like you.

Smooth, soft, slim fit American Apparel shirt. Custom printed. 100% fine jersey cotton, except for heather grey (90% cotton).

The mental state one is in after being hypnotized. The music genre was named after this mental state.

Donnie’s therapist put him in a hypnotic trance to examine his subconscious memories.

Lotsa space for your liquids.

Lotsa space for your liquids.

Your favorite word on a white mug.

One side has the word, one side has the definition. Microwave and dishwasher safe. Lotsa space for your liquids.

Soft and offensive. Just like you.

Smooth, soft, slim fit American Apparel shirt. Custom printed. 100% fine jersey cotton, except for heather grey (90% cotton).

Continue reading here:

Urban Dictionary: trance

Posted in Trance | Comments Off on Urban Dictionary: trance