Monday, April 30, 2012

Spy in the sky: Is it only a matter of time before drone technology is used in civil society?

Their killing power is immense and the surveillance possibilities are endless. Perhaps it's no wonder that the awesome potential of unmanned aerial vehicles is now being so energetically explored – from the battlefields of Afghanistan to the London Olympics.
The Independent Read full article »»

Judyth Vary Baker - Down The Rabbit Hole w/ Popeye (04-29-2012)



Sunday, April 29, 2012

Conservative Presstitutes Try To Link 9/11 Truthers To All Conspiracy Theories

April 28, 2012 C-SPAN

Secret State vs. the Bill of Rights: House Passes Draconian Internet Spying Bill

On Thursday, the U.S. House of Representatives passed the draconian Cyber Intelligence Sharing and Protection Act (H.R. 3523 or CISPA) by a vote of 248-168, with 206 Republicans and 42 Democrats voting in favor.

If the legislation passes muster in the Senate and is signed by President Obama (who has threatened a veto, but don't hold your breath), it would allow private firms--internet service providers (ISPs), telecoms and wireless providers--to hand over personal information about users to law enforcement and security agencies.

This unprecedented power-grab by a cabal of giant corporations and the federal government would take place under the guise of "cybersecurity," the latest front in the secret state's assault on Americans' civil liberties and privacy rights.

While the bill's sponsors and supporters claim that any "information-sharing" of personal data would be "voluntary," it would occur without benefit of a warrant or a court order and automatically "exempts such information from public disclosure."
Antifascist Calling.. Read full article »»

RFK assassination witness tells CNN: There was a second shooter

As a federal court prepares to rule on a challenge to Sirhan Sirhan's conviction in the Robert F. Kennedy assassination, a long overlooked witness to the murder is telling her story: She heard two guns firing during the 1968 shooting and authorities altered her account of the crime. Nina Rhodes-Hughes wants the world to know that, despite what history says, Sirhan was not the only gunman firing shots when Senator Kennedy was murdered a few feet away from her at a Los Angeles hotel. "What has to come out is that there was another shooter to my right," Rhodes-Hughes said in an exclusive interview with CNN. "The truth has got to be told. No more cover-ups."
CNN

Read full article »»

Friday, April 27, 2012

Alex Jones Speech - Blueprint To Defeat The New World Order - Orlando Fl.

Video released by Prison Planet TV on April 27, 2012.

Alex Jones- Blueprint To Defeat The New World Order- Orlando Fl. (2-26-12)

Jim Marrs: JFK Truthers Banned From Dealey Plaza for 50th Anniversary



House Passes Controversial Cybersecurity Measure CISPA

The House on Thursday approved cybersecurity legislation that privacy groups have decried as a threat to civil liberties. The Cyber Intelligence Sharing and Protection Act, or CISPA, sponsored by Reps. Mike Rogers (R-Michigan) and Dutch Ruppersberger (D-Maryland), passed on a vote of 248 to 168. Its goal is a more secure internet, but privacy groups fear the measure breaches Americans’ privacy along the way. The White House had weighed in on Wednesday, threatening a veto unless there were significant changes to increase consumer privacy. The bill was amended to provide more privacy protections, but it was not immediately clear whether the Senate or the White House would give the amended bill its blessing. The measure, which some are calling the Son of SOPA, allows internet service providers to share information with the government, including the Department of Homeland Security and the National Security Agency, about cybersecurity threats it detects on the internet. An ISP is not required to shield any personally identifying data of its customers when it believes it has detected threats, which include attack signatures, malicious code, phishing sites or botnets. In short, the measure seeks to undo privacy laws that generally forbid ISPs from disclosing customer communications with anybody else unless with a court order.
Wired - Read full article »»

Charlotte Iserbyt - Infowars Nightly News (4-26-12)



Thursday, April 26, 2012

The Next US President Will Be....

....the Fortune 500. Why no matter who you vote for, nothing will ever change.
by Tony Cartalucci Read full article »»

CISPA, “National Security,” and the NSA’s Ability to Read Your Emails

This week the House of Representatives is debating CISPA, the dangerous ‘cybersecurity’ bill that threatens to decimate Internet users’ privacy in the name of security. EFF and a wide variety of other groups have been protesting the law’s provisions giving companies the power to read users’ emails and other communications and hand them to the government without any judicial oversight whatsoever—essentially a giant ‘cybersecurity’ exception to all existing privacy laws.
EFF Read full article »»

Pentagon establishes Defense Clandestine Service, new espionage unit

The Pentagon is planning to ramp up its spying operations against high-priority targets such as Iran under an intelligence reorganization aimed at expanding on the military’s espionage efforts beyond war zones, a senior defense official said Monday. The newly created Defense Clandestine Service would work closely with the CIA — pairing two organizations that have often seen each other as rivals — in an effort to bolster espionage operations overseas at a time when the missions of the agency and the military increasingly converge.
Washington Post Read full article »»

Monday, April 23, 2012

More Secrets on State Surveillance: Exclusive Part 2 With NSA Whistleblower

DemocracyNow.org - In part two of our national broadcast exclusive on the growing domestic surveillance state, we speak with National Security Agency whistleblower William Binney, and two targeted Americans: Oscar-nominated filmmaker Laura Poitras, and hacker Jacob Appelbaum, who has volunteered for WikiLeaks and now works with Tor Project, a nonprofit organization that teaches about internet security. Binney left the NSA after the 9/11 attacks over his concerns about the agency's widespread surveillance of U.S. citizens. He describes how the FBI later raided his home and held him at gunpoint and notes there is still no effective way of monitoring how and what information the NSA is gathering on U.S. citizens, and how that data is being used.

Sunday, April 22, 2012

NSA Whistleblower: Agency Has Copies of Email of Most Americans

DemocracyNow.org - National Security Agency whistleblower William Binney reveals he believes domestic surveillance has become more expansive under President Obama than President George W. Bush. He estimates the NSA has assembled 20 trillion "transactions" — phone calls, emails and other forms of data — from Americans. This likely includes copies of almost all of the emails sent and received from most people living in the United States. Binney talks about Section 215 of the USA PATRIOT Act and challenges NSA Director Keith Alexander's assertion that the NSA is not intercepting information about U.S. citizens.

Saturday, April 21, 2012

Covert History begins publishing over 1,000,000 pages of Government Documents

On April 20th, Covert History will begin publishing over 1,000,000 pages of Government Documents, drawing on sources from: Federal Bureau of Investigation (FBI) Central Intelligence Agency (CIA) National Security Council National Security Agency (NSA) Department of Defense Defense Intelligence Agency (DIA) Joint Chiefs of Staff Department of Justice Secret Service National Archive Records Administration Presidential Libraries and more! To be clear, these documents are already in the Public Domain – the problem is that it’s almost impossible for the Public to access them! For instance, while the FBI FoIA website currently makes 14 pages available from Roy Cohn’s file, I expect to publish over 4,000 pages of FBI Files covering him! One File/Subject Matter will be uploaded and made freely available each day, until the entire collection is truly in the hands of the public. It is my sincere hope that this will make the work for other Researchers easier, and increase the public’s awareness and direct access to our mutual history. Covert History:Read full article »»

Friday, April 20, 2012

Book: JFK’s mistress killed by CIA ‘because she knew too much about JFK murder’

The suspicious death of one of President John F. Kennedy’s mistresses just months after his death has sparked numerous conspiracy theories. The latest version posits that socialite Mary Pinchot Meyer, a beautiful divorcee who was close friends with the Kennedys and is widely known for having a lengthy affair with the playboy President, was shot in a cover-up operation by the CIA. A new book alleges that, in her preoccupation with her lover’s assassination and ensuing personal investigation, she may have gotten so close to the ‘truth’ that the CIA found her to be a threat. As a result, agency operatives staged a shooting to make it look like she died due to a sexual assault that turned violent.
Daily Mail Read full article »»

Wednesday, April 18, 2012

The Rise of the Killer Drones: How America Goes to War in Secret

The use of drones is rapidly transforming the way we go to war. On the battlefield, a squad leader can receive real-time data from a drone that enables him to view the landscape for miles in every direction, dramatically expanding the capabilities of what would normally have been a small and isolated unit. "It's democratized information on the battlefield," says Daniel Goure, a national security expert who served in the Defense Department during both Bush administrations. "It's like a reconnaissance version of Twitter." Drones have also radically altered the CIA, turning a civilian intelligence-gathering agency into a full-fledged paramilitary operation – one that routinely racks up nearly as many scalps as any branch of the military.

But the implications of drones go far beyond a single combat unit or civilian agency. On a broader scale, the remote-control nature of unmanned missions enables politicians to wage war while claiming we're not at war – as the United States is currently doing in Pakistan. What's more, the Pentagon and the CIA can now launch military strikes or order assassinations without putting a single boot on the ground – and without worrying about a public backlash over U.S. soldiers coming home in body bags. The immediacy and secrecy of drones make it easier than ever for leaders to unleash America's military might – and harder than ever to evaluate the consequences of such clandestine attacks.
by: Michael Hastings -Rolling Stone
Read full article »»

Monday, April 16, 2012

The Titanic Was Sunk On Purpose!!!

Down The Rabbit Hole w/ Popeye (04-15-2012)
On this edition of DTRH Popeye and Steve Stars cover the sinking of the RMS Titanic and the evidence that shows the ship was sunk on purpose.



DTRHRadioArchives»»

Wednesday, April 11, 2012

NAZIS, NIXON, ROCKEFELLER, AND WATERGATE

To learn why Richard Nixon was really blown out of the White House, you could begin with the infamous Nazi chemical/pharmaceutical cartel, IG Farben. The cartel that pushed Hitler over the top into power in Germany.

One of its lasting legacies is the multinational corporation expanded out into titanic proportions. Farben didn’t just buy smaller companies, it forged favorable agreements with huge corporations all over the world: Standard Oil (Rockefeller); Rhone-Poulenc; Imperial Chemical Industries; Du Pont; Dow.

During World War 2, Josiah Du Bois, representing the US federal government, was sent on a fact-finding mission to Guatemala. His comment: “As far as I can tell the country is a wholly owned subsidiary of Farben.”

What Farben stood for was an attempt to remake the planet in terms of power.
by Jon Rappoport
Read full article »»

Training Terrorists in Nevada: Seymour Hersh on U.S. Aid to Iranian Group

Journalist Seymour Hersh has revealed that the Bush administration secretly trained an Iranian opposition group on the State Department's list of foreign terrorists. Hersh reports the U.S. Joint Special Operations Command trained operatives from Mujahideen-e-Khalq, or MEK, at a secret site in Nevada beginning in 2005.
Democracynow! Read full article »»


Tuesday, April 10, 2012

Cocaine Death Squads and the War On Terror - Expert Witness Radio (4-10-12)





Read full article »»

FBI Attempts to Hold Sibel Edmonds' Book Hostage

Washington, D.C. April 10, 2012. Today, the National Whistleblowers Center (NWC) revealed that the FBI required employees to sign employment contracts that are illegal under Federal law. The NWC launched the investigation in response to a nearly year long campaign by the FBI to prevent the publication of whistleblower Sibel Edmonds' new book, Classified Woman: The Sibel Edmonds Story.

The NWC is also releasing documentation confirming that the FBI required employees, including Ms. Edmonds, to sign the illegal contracts that allowed the FBI to censor issues of "public policy" it found embarrassing. According to Ms. Edmonds attorney, Stephen M. Kohn, "the controlling law strictly limits government's ability to censor its employees. Agencies like the FBI may require pre-publication review of its employees' writings, but may only censor classified or secret information. The government may not censor books or other writings on 'policy' grounds. The FBI's employment contract with Ms. Edmonds is overreaching and illegal."
NWC
Read full article »»

The Secret Service on 9/11 - Kevin Ryan

Kevin Ryan, a former site manager for Environmental Health Laboratories and a whistleblower on Underwriters' Laboratories involvement in the discredited NIST report on the WTC destruction, joins us to discuss his latest article on the anomalous actions of the secret service on 911, and what it tells us about possible government foreknowledge of the attacks.

Monday, April 9, 2012

Thirteen Ways Government Tracks Us

The advanced technology of the war on terrorism, combined with deferential courts and legislators, have endangered both the right to privacy and the right of people to be free from government snooping and tracking.

Here are thirteen examples of how some of the biggest government agencies and programs track people.
Bill Quigley -Activist Post
Read full article »»

Sunday, April 8, 2012

9/11 as sequel to Iran-Contra: Armitage, Carlucci and friends

By Kevin Ryan - Dig Within
Dick Cheney and Donald Rumsfeld are among the leading suspects in the crimes of September 11, 2001. Reasons for this include that they were in the most powerful positions in the U.S. that day, that there is evidence they had foreknowledge of the attacks, and that they did not respond effectively. Other people who were closely associated with Dick and Don should also be investigated if they were in positions to be involved. Richard Armitage and Frank Carlucci are two such people. They both played important roles with respect to the events of September 11, 2001 and, prior to that, both had a colorful history of covert operations which intertwined and was aligned with the careers of Dick and Don. Armitage and Carlucci both also benefited from the War on Terror by way of profits made after the attacks.

Read full article »»

Terror Trading 9/11

"Terror Trading 9/11" by Lars Schall and Michael Leitner is a video dedicated to the topic of the alleged informed trading activities prior to the terror attacks of September 11th, 2001.

Our Men in Iran?

by Seymour M. Hersh - The New Yorker

The Joint Special Operations Command (JSOC) conducted training, beginning in 2005, for members of the Mujahideen-e-Khalq, a dissident Iranian opposition group known in the West as the M.E.K. The M.E.K. had its beginnings as a Marxist-Islamist student-led group and, in the nineteen-seventies, it was linked to the assassination of six American citizens. It was initially part of the broad-based revolution that led to the 1979 overthrow of the Shah of Iran. But, within a few years, the group was waging a bloody internal war with the ruling clerics, and, in 1997, it was listed as a foreign terrorist organization by the State Department. In 2002, the M.E.K. earned some international credibility by publicly revealing—accurately—that Iran had begun enriching uranium at a secret underground location. Mohamed ElBaradei, who at the time was the director general of the International Atomic Energy Agency, the United Nations’ nuclear monitoring agency, told me later that he had been informed that the information was supplied by the Mossad. The M.E.K.’s ties with Western intelligence deepened after the fall of the Iraqi regime in 2003, and JSOC began operating inside Iran in an effort to substantiate the Bush Administration’s fears that Iran was building the bomb at one or more secret underground locations. Funds were covertly passed to a number of dissident organizations, for intelligence collection and, ultimately, for anti-regime terrorist activities. Directly, or indirectly, the M.E.K. ended up with resources like arms and intelligence. Some American-supported covert operations continue in Iran today, according to past and present intelligence officials and military consultants.

Read full article »»

Wednesday, April 4, 2012

Shady Companies With Ties to Israel Wiretap the U.S. for the NSA

Despite the post-9/11 warrantless wiretapping of Americans, the NSA says that citizens should trust it not to abuse its growing power and that it takes the Constitution and the nation’s privacy laws seriously.

But one of the agency’s biggest secrets is just how careless it is with that ocean of very private and very personal communications, much of it to and from Americans. Increasingly, obscure and questionable contractors — not government employees — install the taps, run the agency’s eavesdropping infrastructure, and do the listening and analysis.

And with some of the key companies building the U.S.’s surveillance infrastructure for the digital age employing unstable employees, crooked executives, and having troubling ties to foreign intelligence services, it’s not clear that Americans should trust the secretive agency, even if its current agency chief claims he doesn’t approve of extrajudicial spying on Americans. His predecessor, General Michael V. Hayden, made similar claims while secretly conducting the warrantless wiretapping program.
James Bamford - Wired
Read full article »»

9/11 ‘mastermind’ Khaled Sheikh Mohammed charged

The United States has issued charges against Khaled Sheikh Mohammed, the self-proclaimed mastermind of the 9/11 attacks, setting the stage for what has been dubbed the “trial of the century”.

“The charges allege that the five accused are responsible for the planning and execution of the attacks of Sept. 11, 2001, in New York and Washington DC, and Shanksville, Pa., resulting in the killing of 2,976 people,” the Defense Department said in a statement.
“The convening authority referred the case to a capital military commission, meaning that, if convicted, the five accused could be sentenced to death.”

The Telegraph
Read full article »»

"911 and the Cover-Up" (Film by Ryan Dawson)



911 and the cover up by Ryan Dawson from Ryantineocon on Vimeo.

Tuesday, April 3, 2012

Propaganda's Founding Father Edward Bernays Exposed!



IBM at Auschwitz, New Documents

Newly-released documents expose more explicitly the details of IBM's pivotal role in the Holocaust - all six phases: identification, expulsion from society, confiscation, ghettoization, deportation, and even extermination. Moreover, the documents portray with crystal clarity the personal involvement and micro-management of IBM president Thomas J. Watson in the company's co-planning and co-organizing of Hitler's campaign to destroy the Jews.
Edwin Black, Reader Supported News
Read full article »»

Monday, April 2, 2012

Federal Judge Slaps FBI for Continuing OKC Bombing Cover-Up

During a March 20 hearing in Salt Lake City, U.S. District Judge Clark Waddoups described as “astounding” the FBI’s claim that critical video of the 1995 Oklahoma City Bombing had simply gone “missing” – an assertion that buttresses attorney Jesse Trentadue’s belief that the Bureau has spared no effort to cover up critical facts about the atrocity.
William Grigg -Republic Magazine
Read full article »»

Justices Approve Strip-Searches for Any Offense

The Supreme Court on Monday ruled by a 5-to-4 vote that officials may strip-search people arrested for any offense, however minor, before admitting them to jails even if the officials have no reason to suspect the presence of contraband.
NY Times
Read full article »»


SCOTUSblog analysis »»

Sunday, April 1, 2012

Police Are Using Phone Tracking as a Routine Tool

Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show.

The practice has become big business for cellphone companies, too, with a handful of carriers marketing a catalog of “surveillance fees” to police departments to determine a suspect’s location, trace phone calls and texts or provide other services. Some departments log dozens of traces a month for both emergencies and routine investigations.
By ERIC LICHTBLAU -NY Times
Read full article »»

Internet activity 'to be monitored' under new laws

Under legislation expected in next month's Queen's Speech, internet companies will be instructed to install hardware enabling GCHQ – the Government's electronic "listening" agency – to examine "on demand" any phone call made, text message and email sent, and website accessed in "real time", The Sunday Times reported.

A previous attempt to introduce a similar law was abandoned by the former Labour government in 2006 in the face of fierce opposition.
TELEGRAPH.CO.UK
Read full article »»