The police state brain trust – connected at the hip to the CIA – has merged with Homeland Security. “Science Applications International Corp. is joining the roster of companies involved in a program to protect U.S. infrastructure against cyber threats,” the UPI reports today. “SAIC said it has signed a memorandum of agreement with Homeland Security on joining the initiative. Northrop Grumman announced its participation earlier this week and that it is starting the security accreditation process which is required for the Homeland Security program.”
“SAIC… is the invisible hand behind a huge portion of the national security state – the one sector of the government whose funds are limitless and whose continued growth is assured every time a politician utters the word ‘terrorism,’” Donald L. Barlett and James B. Steele wrote for Vantiy Fairin 2007.
The shadowy intelligence contractor’s “past and present board members are a who’s who of vested military brass, high-level intelligence operatives and politicians,” writesPro Liberty. It shares a close relationship with the CIA and – along with Booz Hamilton and Lockheed Martin – dominates the private intelligence industry. Its largest customer is the NSA. SAIC’s relationship with the super-secret signals intelligence agency is described as symbiotic. It plays a key role in the war on terror and operates many of the Predator drones used in Iraq, Afghanistan, and Pakistan.
During the reign of the Bush neocons under the aegis of a manufactured war on terror, SAIC – along with AT&T, Booz Allen Hamilton, Lockheed Martin, Boeing, Verizon Communications, Northrop Grumman, L-3 Communications, CACI International and many others – fashioned the high-tech police state now going into place. It is estimated that “some 70% of the personnel employed by U.S. intelligence agencies are now private contractors holding top secret and above security clearances,”Tom Burghardt wrote in 2008.
SAIC’s expertise and its involvement in the Department of Homeland Security’s misnamed “cyber security” operation is particularly worrisome now that the Obama administration has authorized “a new government program involving the interception of communications on Internet service providers, including AT&T—one of the key players in the NSA warrantless wiretapping program,” theElectronic Frontier Foundation noted last month. The initiative eschews the Fourth Amendment and provides transnational telecoms with immunity from prosecution for crimes against the Constitution and the republic.
The secretive and largely covert high-tech surveillance state apparatus was never intended for the likes of Osama bin Laden. It was built for the American people who are considered the real enemies of the national security state. This fact was underscored by former NSA crypto-mathematician and whistleblower William Binney. In 2012, Binney said the high-tech surveillance state now going online is not about foreign terrorists. It is about Americans “who could be a threat to national security” as defined by a centralized federal government. “Even if they think they aren’t doing something wrong, if their position on something is against what the administration has, then they could easily become a target,” Binney warned.
In March, we quoted Richard Davis, the director of the Arkansas State Fusion Center, who said the fusion center in Little Rock does not waste its time surveilling al-Qaeda and other supposed foreign terror threats. “We focus [on] domestic terrorism and certain groups that are anti-government. We want to kind of take a look at that and receive that information.”
Exploiting the government ginned-up ruse of cyber security, the NSA constructed its Utah Data Center near Bluffdale. Reports suggest the facility will store 5 zettabytes of data, the equivalent storage capacity of over three hundred billion iPhone 5s. NSA General Keith Alexander assured the public “we don’t hold data on U.S. citizens” and that the NSA staff “take protecting your civil liberties and privacy as the most important thing that they do, and securing this nation,” ostensibly from phantom terrorists and rogue hackers who dominate the government’s incessant propaganda campaign.
In April, the Republican-controlled House approved the Cyber Intelligence Sharing and Protection Act (CISPA). The White House claims it will veto the bill “unless more protections for privacy and civil liberties are added,” Fox News reports today. This supposed reluctance by the Obama administration is a ruse, of course. It is nothing more than an effort to persuade Americans and Congress that the federal government is protecting the Constitution and the Bill of Rights. In fact, Obama has signed an executive order directing “government officials to set voluntary standards to reduce cybersecurity risk and offer incentives to private companies to adopt them.”
Now that SAIC and the defense industry are working hand-in-hand with Homeland Security and the Pentagon to spy on the American people, we can expect finishing touches to be put on the national security state’s surveillance grid. It will rival by leaps and bounds anything previously imagined or accomplished under COINTELPRO and concurrent illegal operations by the CIA (including Operation CHAOS) and military intelligence.
A technologically advanced Stasi apparatus is designed for 24/7 surveillance of political enemies opposed to a worldwide authoritarian super-state. Its purpose is to reduce resistance to zero and ferret out, persecute, disappear and eliminate enemies of the state.