Friday, August 31, 2012

Greed and Debt: The True Story of Mitt Romney and Bain Capital

How the GOP presidential candidate and his private equity firm staged an epic wealth grab, destroyed jobs – and stuck others with the bill
By Matt Taibbi-Read full article »»



THE JFK CASE: THE TWELVE WHO BUILT THE OSWALD LEGEND (Part 9 - Oswald Takes Center Stage As An Intelligence Asset)

When Lee Oswald returned to his hometown of New Orleans, he returned to a world where the CIA was wary of the local Cuban exile organizations because of infiltration by Castro's forces. Oswald went to work for Guy Banister, the head of a major Southern anti-communist intelligence network.
Bill Simpich- Read full article »»

Thursday, August 30, 2012

9/11 trial 'may not begin for another four years'

The trial of the five men charged over the September 11 attacks on America will not be televised and may not begin for another four years, it has been disclosed.
Telegraph-

Read full article »»

Correspondence and collusion between the New York Times and the CIA

Mark Mazzetti's emails with the CIA expose the degradation of journalism that has lost the imperative to be a check to power.

Glenn Greenwald-Guardian

Read full article »»

Tuesday, August 28, 2012

Monday, August 27, 2012

Saturday, August 25, 2012

The Essence Of The Banking Industry...control the debt



The Corporate Surveillance State: How the Thought Police Use Your Cell Phone to Track Your Every Move

Advanced technology now provides government agents and police officers with the ability to track our every move. The surveillance state is our new society. It is here, and it is spying on you, your family and your friends every day. Worse yet, those in control are using life’s little conveniences, namely cell phones, to do much of the spying. And worst of all, the corporations who produce these little conveniences are happy to hand your personal information over to the police so long as their profit margins increase. To put it simply, the corporate-surveillance state is in full effect, and there is nowhere to hide.
By John W. Whitehead-The Rutherford Institute

Read full article »»

The FBI War on Tupac Shakur and Black Leaders: John Potash



Wednesday, August 22, 2012

The Assassination of General Patton & Japan's Secret War

On this edition of Down The Rabbit Hole.. Popeye talks with author Robert K. Wilcox about the assassination of General George Patton and Japan's secret A-Bomb research at the end of World War Two. Robert is the author of 9 books including TARGET PATTON and JAPAN'S SECRET WAR.

Infowars Magazine Vol.1 Issue 1

Print 2.0: Answer to the Internet Kill Switch»»



Infowars Magazine »»

Infowars Magazine»»

Monday, August 20, 2012

Man who armed Black Panthers was FBI informant, records show

The man who gave the Black Panther Party some of its first firearms and weapons training – which preceded fatal shootouts with Oakland police in the turbulent 1960s – was an undercover FBI informer, according to a former bureau agent and an FBI report.
Seth Rosenfeld - Center for Investigative Reporting

Read full article »»



Bombshell: Senator Suggested False Flag Attack To Kennedy 2 Years Prior To Operation Northwoods Proposal

According to newly released documents by the John F. Kennedy Memorial Library, former Californian democratic senator George Smathers proposed an Operation Northwoods style false flag attack on Gitmo to then Massachusetts senator Kennedy. The Guardian reports Kennedy and Smathers were seriously entertaining the possibility of assassinating Fidel Castro. Kennedy was obviously against the entire idea. Smathers went on to propose the option of bombing American troops to provide an excuse for military intervention in Cuba. Significant about Smather’s confessions is the now apparent fact that the idea of bombing the US naval base at Guantanamo Bay was obviously floating in political circles as well as military ones some time before the actual formalization of the false flag proposals in the Operation Northwoods documents, ultimately rejected by President Kennedy in 1962. The other significant aspect of the confession by Smathers is that the proposals described within Northwoods in March of 1962 literally reflect the false flag proposal submitted to Kennedy in 1960 by senator Smathers.
Jurriaan Maessen- ExplosiveReports.com

Read full article »»

Wednesday, August 15, 2012

Internet should not have gatekeepers or regulators – Steve Wozniak

Apple’s co-founder fears that freedom of information is under attack, with the internet controlled and regulated in unnecessary and harmful ways. RT talked to Steve Wozniak on a range of topics, from Wikileaks to Megaupload founder Kim Dotcom.

Read full article »»

Expert Witness Radio: The Mexican Diplomat, Stratfor and Wikileaks



Saturday, August 11, 2012

WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network

The U.S. cable networks won't be covering this one tonight (not accurately, anyway), but Trapwire is making the rounds on social media today—it reportedly became a Trending hashtag on Twitter earlier in the day.

Trapwire is the name of a program revealed in the latest Wikileaks bonanza—it is the mother of all leaks, by the way. Trapwire would make something like disclosure of UFO contact or imminent failure of a major U.S. bank fairly boring news by comparison.

And someone out there seems to be quite disappointed that word is getting out so swiftly; the Wikileaks web site is reportedly sustaining 10GB worth of DDoS attacks each second, which is massive.
David Seaman- Read full article »»

Wikileaks Trapwire Release »»

Stratfor emails reveal secret, widespread TrapWire surveillance system

Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it's the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation's ties are assumed to go deeper than even documented.

The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.
RT- Read full article »»

Wikileaks Trapwire Release»»

Unravelling TrapWire: The CIA-Connected Global Suspicious Activity Surveillance System

Hacked emails from the private intelligence firm Stratfor shed light on a global suspicious activity surveillance system called TrapWire that is reportedly in use in locations around the world from the London Stock Exchange to the White House. The emails, which were released yesterday by WikiLeaks, provide information on the extent and operations of a system designed to correlate suspicious activity reports and other evidence that may indicate surveillance connected with a potential terrorist attack.

A proprietary white paper produced by TrapWire, formerly called Abraxas Applications, describes the product as “a unique, predictive software system designed to detect patterns of pre-attack surveillance.” In an interview from 2005 with the Northern Virginia Technology Council, the CEO of Abraxas Corporation Richard “Hollis” Helms says the goal of TrapWire is to “collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” Fred Burton, the former CEO of Stratfor and current vice president, describes TrapWire in an email from November 2009 as “a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.”
Public Intelligence- Read full article »»

MAINCORE, PROMIS, and a Second Look at Chuck Hayes

Main Core is the code name of a database maintained since the 1980s by the federal government of the United States. Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders.

The existence of the database was first reported on in May 2008 by Christopher Ketcham and in July 2008 by Tim Shorrock.
Covert History- Read full article »»

Thursday, August 9, 2012

Cryptome Tracks The NYPD Ring Of Steel

Cryptome Tracks the NYPD Ring of Steel

Deborah Natsios, John Young

Cryptome's digital multimedia presentation of original cartography, animations, video, and architectural documentation will explore the urban implications of the NYPD One Police Plaza Security Plan - a.k.a. Ring of Steel - which locked down Lower Manhattan after 9/11, transforming its Civic Center into a threatscape centered on NYPD headquarters. With its militarized jurisdiction mobilizing through technologies of command, control, communications, intelligence, surveillance, and reconnaissance, the Ring of Steel has declared itself an iconic public space for our time.



NYPD-Microsoft Domain Spying System »»

Reality Check: The U.S. Government Created Al Qaeda?

Ben Swann Reality Check takes a look at how the United States government created Al Qaeda and yet in some countries is still fighting them while in others is supporting them.

Monday, August 6, 2012

Never Before seen Footage from Deep Inside Bohemian Grove



Kennedys keep vise-grip on RFK papers

A trove of documents housed in a secure vault at the John F. Kennedy Library has long been described as Robert F. Kennedy’s private papers and been kept from public view by the Kennedy family. But many of the documents have little to do with personal matters and instead detail once-secret military and intelligence activities he helped manage as attorney general, according to an unpublished index of the collection obtained by The Boston Globe.

Scholars and government officials believe the 62 boxes of files covering Kennedy’s three years as attorney general during his brother’s administration could provide insights into critical Cold War decisions on issues ranging from the Cuban missile crisis to Vietnam.

Yet the Kennedy family, led by Robert’s widow, Ethel, has rarely permitted even limited access to the papers. Their expansive control of the RFK archive, which extends to dozens of Pentagon, State Department, and CIA documents, stems from a controversial agreement reached with the National Archives following Robert Kennedy’s assassination in 1968.
Boston Globe

Read full article »»

FBI's Facial Recognition is Coming to a State Near You

Recently-released documents show that the FBI has been working since late 2011 with four states--Michigan, Hawaii, Maryland, and possibly Oregon--to ramp up the Next Generation Identification (NGI) Facial Recognition Program. When the program is fully deployed in 2014, the FBI expects its facial recognition database will contain at least 12 million "searchable frontal photos." (p. 6)

The documents, which the National Day Laborer Organizing Network (NDLON) obtained from a recent meeting of the FBI's Criminal Justice Information Services (CJIS) Advisory Policy Board,1 shed new light on the FBI's plans for NGI--the Bureau's massive biometrics database that combines fingerprints, iris scans, palm prints, facial recognition and extensive biographical data collected from over 100 million Americans.

The Advisory Board documents show that FBI's database of facial images will provide search results automatically (the system won't need to rely on a human to check the results before forwarding them to the state or local agency) and that the FBI is developing "Universal Face Workstation software" to allow states that don't have their own "Face/Photo search capabilities" to search through the FBI's images.


informationliberation Read full article »»

Sunday, August 5, 2012

Scientology's Concentration Camp for Its Executives: The Prisoners, Past and Present

This weekend, we published a two-part story about the rather amazing 32-year Scientology career of John Brousseau, whose adventures included driving for L. Ron Hubbard, spending time in the Sea Org's prison program the RPF, and working in the Cruise household with Tom and Katie Holmes.

What seemed to generate the most comments, however, was Brousseau's involvement in the creation of Scientology's notorious office-prison for its top executives, variably known as "CMO Int," the "A to E Room," the "SP Hole," and simply "The Hole."

It was Brousseau who was ordered to put bars on the doors and locks on the windows to turn a set of offices at Scientology's International Base east of Los Angeles into a prison that housed out-of-favor church executives from 2004 to the present day.
Tony Ortega-Village Voice Read full article »»