Monday, March 31, 2014

CIA misled on interrogation program, Senate report says

A report by the Senate Intelligence Committee concludes that the CIA misled the government and the public about aspects of its brutal interrogation program for years — concealing details about the severity of its methods, overstating the significance of plots and prisoners, and taking credit for critical pieces of intelligence that detainees had in fact surrendered before they were subjected to harsh techniques.

The report, built around detailed chronologies of dozens of CIA detainees, documents a long-standing pattern of unsubstantiated claims as agency officials sought permission to use — and later tried to defend — excruciating interrogation methods that yielded little, if any, significant intelligence, according to U.S. officials who have reviewed the document.

“The CIA described [its program] repeatedly both to the Department of Justice and eventually to Congress as getting unique, otherwise unobtainable intelligence that helped disrupt terrorist plots and save thousands of lives,” said one U.S. official briefed on the report. “Was that actually true? The answer is no.”

Washington Post

Police task force to inspect homes without notice for unpermitted guests

WESTBURY, NY — A special police task force has been created to snoop in on property owners and make sure that they aren’t allowing guests to stay in their homes without government approval.
Homeowners in the Long Island community of Westbury (pop. 15,000)  have had their private property rights abridged to the point where they cannot even make autonomous decisions about what happens inside their own homes.
The police “Housing Enforcement Unit” will abide by an “aggressive zero tolerance” policy for homeowners who allow so-called “illegal tenants” in their homes.
The cops will sweep through communities and conduct housing inspections “without notice.”
A presentation given at a town hall meeting included a prop explaining the changes.  That poster included the following statement: “Modify Search Warrant Law to Eliminate Prior Notice.  Aggressively Use Warrants and Housing Sweeps on a Regular Basis — DONE!”

http://www.policestateusa.com/2014/westbury-housing-task-force/

Bilderberg 2014 Uncovered: Secretive Elite to Meet in Denmark

The 2014 meeting of the Bilderberg Group – a secretive organization of global power brokers – will take place in Denmark at the end of May.

The announcement was made today on the official ‘Bilderberg Meetings’ website, which states simply, “The 62nd Bilderberg meeting will take place at the end of May 2014 in Denmark.”

http://www.infowars.com/bilderberg-2014-uncovered-secretive-elite-to-meet-in-denmark/

Emerging consensus that LBJ killed JFK?

Three books published in the time leading up to the 50th anniversary of the assassination present a common narrative that JFK was killed by a conspiracy led politically by Lyndon Johnson, and operationally by the CIA and J. Edger Hoover. In their books, The Man Who Killed Kennedy: The Case Against LBJ, by Roger Stone; LBJ: The Mastermind of the JFK Assassination, by Phillip F. Nelson; Who Really Killed Kennedy?, by Jerome R. Corsi, the authors explain the psychology of LBJ, and how he conspired to bring together the details of the plot, and the cover-up that followed.

In them, we learn about a rush to advance the lone gunman narrative, about how evidence was mishandled and destroyed by the cleaning and refurbishment of the limousine, and how two mishandled autopsies on JFK's body forever buried evidence that could explain much of what happened. We also learn how the plot was to unfold, how the CIA was to bring in the sharpshooters and provide the patsy to take the blame. We learn how the FBI, on authority by LBJ himself, would handle the cover-up, and how LBJ would then appoint a blue-ribbon commission who would confirm the cover-up of the prearranged narrative.

Lyndon Johnson was a loutish psychopathic willing to do anything to advance his rise to power. His rise was fueled by graft, corruption, and murder. Yes, murder. LBJ's hitman, Malcolm Wallace, had killed seven other people in Johnson's rise to power, including LBJ's own sister, Josefa Johnson. LBJ's high handed wheeling and dealing knew no bounds other than what he could keep from public exposure. Johnson was a ruthless politician who would go to any lengths to attain the presidency, including killing the president in order to assume his job. It is not much of a stretch to see a personality of his type behind the conspiracy.

The assassination of a president itself is shocking enough, but to think the succeeding president was behind the killing was beyond outrageous. It was unthinkable. Yet that is the truth we must face. Indeed, the public never seriously considered that possibility, and gave LBJ a benefit of the doubt he did not deserve.

http://www.renewamerica.com/columns/lukens/140331

How the NSA Can Use Metadata to Predict Your Personality

The president and congressional leaders want to end NSA bulk metadata collection, but not the use of metadata, which may even be expanded. From a technical perspective, the question of what your metadata can reveal about you, or potential enemies, remains as important as it was since the Edward Snowden scandal. The answer is more than you might think.

http://www.defenseone.com/technology/2014/03/how-nsa-can-use-metadata-predict-your-personality/81538/?oref=d-topstory

REPORT: OBAMA ADMIN RELEASED TENS OF THOUSANDS OF ILLEGAL IMMIGRANT CRIMINALS

President Obama’s Department of Homeland Security caught then released 68,000 aliens who had previously been convicted of a crime, a new report from the Center for Immigration Studies shows.

The report, provided to Breitbart News ahead of its late Sunday evening release, reviews internal Immigration and Customs Enforcement (ICE) metrics to conclude that the Obama administration released 35 percent—or 68,000—convicted criminal aliens back into the U.S. general population when they could have been deported. “The criminal alien releases typically occur without formal notice to local law enforcement agencies and victims,” CIS’s Jessica Vaughan, the report’s author, added.

http://www.breitbart.com/Big-Government/2014/03/30/REPORT-Obama-Admin-Released-Tens-Of-Thousands-Of-Illegal-Immigrant-Criminals

Sunday, March 30, 2014

DARPA project seeks hive mind for drones

The Pentagon’s research arm is launching a program to unite existing and future drones into hives, where individual autonomous aircraft will share data and operate together against targets on a battlefield – all while being controlled by one human.

http://wearechange.org/darpa-project-seeks-hive-mind-drones/

COINTELPRO: The FBI's Domestic War

J. Edgar Hoover issued directives for COINTELPRO, a codename for Counter Intelligence Program, in 1956. The original intent was to monitor the Communist Party USA but quickly expanded its scope to infiltrate and marginalize a variety of groups such as the American Indian Movement, the Student Nonviolent Coordinating Committee, and the Black Panthers, as well as targeting high profile individuals such as Martin Luther King, Jr.

The FBI's stated motivation was "protecting national security, preventing violence, and maintaining the existing social and political order."3 (Emphasis added). They used harassment, wiretapping, psychological warfare, propaganda, and assassinations among other techniques to achieve their goals.

http://www.thepeopleshistory.net/2014/03/cointelpro-fbis-domestic-war.html?m=1

Saturday, March 29, 2014

Richard Gage of AE911Truth on 'The Rundown Live' (3-21-14)

Der Spiegel: NSA Put Merkel on List of 122 Targeted Leaders

A series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden, also seen by The Intercept, reveal that the NSA appears to have included Merkel in a surveillance database alongside more than 100 others foreign leaders. The documents also confirm for the first time that, in March 2013, the NSA obtained a top-secret court order against Germany as part of U.S. government efforts to monitor communications related to the country. Meanwhile, the British spy agency Government Communications Headquarters targeted three German companies in a clandestine operation that involved infiltrating the companies’ computer servers and eavesdropping on the communications of their staff.

Der Spiegel, which has already sketched out over several stories the vast extent of American and British targeting of German people and institutions, broke the news last October that Merkel’s cellphone calls were being tapped by the NSA – sparking a diplomatic backlash that strained US-Germany relations. Now a new document, dated 2009, indicates that Merkel was targeted in a broader NSA surveillance effort. She appears to have been placed in the NSA’s so-called “Target Knowledge Base“ (TKB), which Der Spiegel described as the central agency database of individual targets. An internal NSA description states that employees can use it to analyze “complete profiles“ of targeted people.

A classified file demonstrating an NSA search system named Nymrod shows Merkel listed alongside other heads of state.

https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-hacked-german-companies-put-merkel-list-122-targeted-leaders/

GCHQ and NSA Targeted Private German Companies

Documents show that Britain's GCHQ intelligence service infiltrated German Internet firms and America's NSA obtained a court order to spy on Germany and collected information about the chancellor in a special database. Is it time for the country to open a formal espionage investigation?

By Laura Poitras, Marcel Rosenbach and Holger Stark
Der Spiegel

Friday, March 28, 2014

Document Reveals that Nixon Attempted My Lai Massacre Cover-Up

This past week marked the 46th anniversary of the My Lai massacre, in which 504 unarmed Vietnamese civilians were massacred by U.S. troops in 1968. It’s one of the most shameful chapters in American military history, and now documents held at the Nixon Presidential Library paint a disturbing picture of what happened inside the Nixon administration after news of the massacre broke.

The documents, mostly hand-written notes from Nixon’s meetings with his chief of staff H.R. “Bob” Haldeman, lead some historians to conclude that President Richard Nixon was behind the attempt to sabotage the My Lai trials and cover up what was becoming a public-relations disaster for his administration.

One document, scribbled by Haldeman during his Dec. 1, 1969, meeting with Nixon, reads like a threatening to-do list under the headline “Task force – My Lai.” Haldeman wrote “dirty tricks” (with the clarification that those tricks be “not too high a level”) and “discredit one witness,” in order to “keep working on the problem.”

http://www.constantinereport.com/document-reveals-nixon-attempted-lai-massacre-cover/

Jeremy Rys of WarCrime911 Calls the Alex Jones Show (3-27-14)

Tuesday, March 25, 2014

Untangling the Web: How to Search the Internet Like the NSA

The National Security Agency has produced a book to help its spies uncover intelligence hiding on the web.

The 652-page book is titled Untangling the Web: A Guide to Internet Research and was published by the Center for Digital Content of the National Security Agency.

It was released by the NSA last year after a FOIA request filed by MuckRock, but that version is a redacted black and white copy. After doing a quick Google search, LeakSource has discovered the proper unredacted version of the book (source/pdf), in color with working hyperlinks. It looks like it has been on the Internet since 2007.

http://leaksource.info/2014/03/25/untangling-the-web-how-to-search-the-internet-like-the-nsa/

US Jazz Musicians Were Drafted into CIA’s MKULTRA

Here is a bit of US history that shows the reach of the CIA’s infamous mind-control program, MKULTRA.

During the 1940s and 50s, it was common knowledge that musicians who were busted for drug use were shipped, or volunteered to go, to Lexington, Kentucky. Lex was the first Narcotics Farm and US Health Dept. drug treatment hospital in the US.

According to diverse sources, here’s a partial list of the reported “hundreds” of jazz musicians who went to Lex: Red Rodney, Sonny Rollins, Chet Baker, Sonny Stitt, Howard McGhee, Elvin Jones, Zoot Sims, Lee Morgan, Tadd Dameron, Stan Levey, Jackie McLean.

It’s also reported that Ray Charles was there, and William Burroughs, Peter Lorre, and Sammy Davis, Jr.

It was supposed to be a rehab center. A place for drying out.

But it was something else too. Lex was used by the CIA as one of its MKULTRA centers for experimentation on inmates.

http://jonrappoport.wordpress.com/2014/03/24/us-jazz-musicians-were-drafted-into-the-cias-mkultra/

Monday, March 24, 2014

Obama to Call for N.S.A.'s Data Retention to Shift to Phone Companies

The Obama administration is preparing to unveil a legislative proposal for a far-reaching overhaul of the National Security Agency’s once-secret bulk phone records program in a way that — if approved by Congress — would end the aspect that has most alarmed privacy advocates since its existence was leaked last year, according to senior administration officials.

Under the proposal, they said, the N.S.A. would end its systematic collection of data about Americans’ calling habits. The bulk records would stay in the hands of phone companies, which would not be required to retain the data for any longer than they normally would. And the N.S.A. could obtain specific records only with permission from a judge, using a new kind of court order.

NEW YORK TIMES

9/11 Museum Set to Open at Ground Zero Will ‘Educate Future Generations’

It would appear the museum will serve as yet another memorial to the government’s official story in much the same way Dealey Plaza’s 6th Floor Museum at the book depository in Dallas, Texas where JFK was assassinated preserves the government’s magic bullet theory.

Potential visitors should wonder whether or not the new 9/11 museum will host a section illustrating the miracles of that day.

Not just the miracle of the human spirit, of those who gave their lives to save others from a horror many everyday citizens could have never foreseen, but of the other miracles dotting the government’s official story.

The miracle, for example, of the only time in recorded history that steel and iron structures melted and collapsed in on themselves from a building fire supposedly caused by a plane crashing into a few of the floors, but somehow a paper passport could float out of one of the hijacker’s pockets — presumably while he was on one of those planes — and that passport could later be found virtually intact and undamaged on the street below.

The miracle of how a Boeing 757 was able to fly into the Pentagon at an angle that is, by multiple pilot accounts and computer recreations based on the official story, physically impossible, and over 250 pilots and aviation professionals have now gone on record to dispute these official stories. The miracle of how no Boeing 757 was ever found in the hole it supposedly left in the Pentagon, a hole not physically big enough for the plane that supposedly hit it, nor were any people or a plane found at the Shanksville, Pennsylvania crash site.

The miracle of how World Trade Center building 7, a building which was never hit by a plane and only had pockets of isolated fires on a few floors, imploded in a free fall in near-perfect symmetry into its own footprint seven hours after the planes hit the WTC towers.

The miracle of how a reporter at the BBC reported live on this building having already collapsed while standing in front of it onscreen before it collapsed.

Will there be a section on all the rights Americans have lost in the wake of 9/11 in the name of the neverending War on Terror? A display on how the Constitution has been usurped?

http://truthstreammedia.com/911-museum-set-to-open-at-ground-zero-will-educate-future-generations/

http://www.thedailysheeple.com/911-museum-set-to-open-at-ground-zero-will-educate-future-generations_032014

E-ZPASS TRACKS MOTORISTS OUTSIDE OF TOLL BOOTHS

The question on my mind is who or what agency is behind this?  And can your E-ZPass really be used to spy on you? And the answer is yes.
The E-ZPass terms and conditions, found on the agency’s website, don’t say anything about tracking motorists.  A spokesman for the New York City Department of Transportation declined to comment on tape but he did confirm that the agency uses antennas to monitor E-ZPass tags as part of a traffic monitoring project along 42nd Street.   They’re not the only ones collecting data from your E-ZPass tag.

https://www.wbgo.org/newsarticle/e-zpass-tracks-motorists-outside-of-toll-booths

Sunday, March 23, 2014

Police Keep Quiet About Cell-Tracking Technology

Police across the country may be intercepting phone calls or text messages to find suspects using a technology tool known as Stingray. But they're refusing to turn over details about its use or heavily censoring files when they do.

Police say Stingray, a suitcase-size device that pretends it's a cell tower, is useful for catching criminals, but that's about all they'll say.

For example, they won't disclose details about contracts with the device's manufacturer, Harris Corp., insisting they are protecting both police tactics and commercial secrets.

http://www.legitgov.org/Home-Technology-Police-Keep-Quiet-About-Cell-Tracking-Technology

Uncle Sam and his 40,000 snoopers - Nation Review (AU) 1973

After the Ramparts 1972 article this is the second public report on NSA's global signals interception program.

The following is an interview with a former US operative, now in Australia, of America's National Security Agency ...

Cryptome »»

Cryptome - .pdf »»

Snowden Debate - Oxford Union







Saturday, March 22, 2014

Cops or soldiers? America’s Police Have Become Too Militarized

Peter Kraska, a professor at Eastern Kentucky University’s School of Justice Studies, estimates that SWAT teams were deployed about 3,000 times in 1980 but are now used around 50,000 times a year. Some cities use them for routine patrols in high-crime areas. Baltimore and Dallas have used them to break up poker games. In 2010 New Haven, Connecticut sent a SWAT team to a bar suspected of serving under-age drinkers. That same year heavily-armed police raided barber shops around Orlando, Florida; they said they were hunting for guns and drugs but ended up arresting 34 people for “barbering without a licence”. Maricopa County, Arizona sent a SWAT team into the living room of Jesus Llovera, who was suspected of organising cockfights. Police rolled a tank into Mr Llovera’s yard and killed more than 100 of his birds, as well as his dog. According to Mr Kraska, most SWAT deployments are not in response to violent, life-threatening crimes, but to serve drug-related warrants in private homes.

He estimates that 89% of police departments serving American cities with more than 50,000 people had SWAT teams in the late 1990s—almost double the level in the mid-1980s. By 2007 more than 80% of police departments in cities with between 25,000 and 50,000 people had them, up from 20% in the mid-1980s (there are around 18,000 state and local police agencies in America, compared with fewer than 100 in Britain).

Economist

Targeting Huawei: NSA Spied on Chinese Government and Networking Firm

The American government conducted a major intelligence offensive against China, with targets including the Chinese government and networking company Huawei, according to documents from former NSA worker Edward Snowden that have been viewed by SPIEGEL. Among the American intelligence service's targets were former Chinese President Hu Jintao, the Chinese Trade Ministry, banks, as well as telecommunications companies.

But the NSA made a special effort to target Huawei. With 150,000 employees and €28 billion ($38.6 billion) in annual revenues, the company is the world's second largest network equipment supplier. At the beginning of 2009, the NSA began an extensive operation, referred to internally as "Shotgiant," against the company, which is considered a major competitor to US-based Cisco. The company produces smartphones and tablets, but also mobile phone infrastructure, WLAN routers and fiber optic cable -- the kind of technology that is decisive in the NSA's battle for data supremacy.

Der Spiegel

N.S.A. Breached Chinese Servers Seen as Security Threat

American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for fear that the company would create “back doors” in its equipment that could allow the Chinese military or Beijing-backed hackers to steal corporate and government secrets.

But even as the United States made a public case about the dangers of buying from Huawei, classified documents show that the National Security Agency was creating its own back doors — directly into Huawei’s networks.

The agency pried its way into the servers in Huawei’s sealed headquarters in Shenzhen, China’s industrial heart, according to N.S.A. documents provided by the former contractor Edward J. Snowden. It obtained information about the workings of the giant routers and complex digital switches that Huawei boasts connect a third of the world’s population, and monitored communications of the company’s top executives.

New York Times

"Fascism in America" - Alex Constantine talks about the research of Mae Brussell

Mae Brussell, a housewife in Los Angeles in the early ‘60s, had been taught this version of history, too, and may well have believed it, until an act of political violence dug under her skin and wouldn’t let her go – the assassination of John Kennedy. She listened to the official explanations, followed the Warren Commission hearings, read authoritative news reports on Oswald, and like most Americans considered the government’s explanation unpersuasive.

Several years of obsessive research led her to the study of fascism, particularly after WW II. Oswald had been involved with a network of far-right extremists, some of them White Russians, some of them Birchers with ties to the Third Reich. She discovered that the CIA and American military had made a postwar pact, that the Nazis recruited by the Army’s Counter-Intelligence Corps and CIA had burrowed deeply into establishment Cold War American politics.

And that establishment was, naturally, corporate. Farben-Thyseen-Krupp et al., the military-industrial complex behind Hitler, had intentionally, before the war, established ties with companies in the United States through patent licensing, processing and marketing agreements, and so on, that rendered their financial interests mutual. Farben and Standard Oil were, in effect, one international business concern. The Morgan banking interests on Wall Street and Fritz Thyssen’s in Austria were intertwined — both profited from the rearmament of Germany, the rise of Hitler, WW II and the Holocaust.

http://www.reddirtreport.com/rustys-reads/fascism-america-alex-constantine-talks-about-research-mae-brussell

http://www.constantinereport.com/

Mae Brussell Archive - You Tube

Friday, March 21, 2014

Awash In Cash, Drug Cartels Rely On Big Banks To Launder Profits

The Sinaloa Cartel, headquartered on Mexico's northern Pacific Coast, is constantly exploring new ways to launder its gargantuan profits. The reports that Mexican trafficking organizations earn between $19 and $29 billion every year from selling marijuana, cocaine, heroin and methamphetamines on the streets of American cities.

And Sinaloa is reportedly the richest, most powerful of them all, according to the Drug Enforcement Administration. The capture last month of the Mexican druglord Joaquin "Chapo" Guzman has cast a spotlight on the smuggling empire he built.

One key to the Sinaloa Cartel's success has been to use the global banking system to launder all this cash.

NPR »»

Navy database tracks civilians' parking tickets, fender-benders, raising fears of domestic spying

A parking ticket, traffic citation or involvement in a minor fender-bender are enough to get a person's name and other personal information logged into a massive, obscure federal database run by the U.S. military.

The Law Enforcement Information Exchange, or LinX, has already amassed 506.3 million law enforcement records ranging from criminal histories and arrest reports to field information cards filled out by cops on the beat even when no crime has occurred.

LinX is a national information-sharing hub for federal, state and local law enforcement agencies. It is run by the Naval Criminal Investigative Service, raising concerns among some military law experts that putting such detailed data about ordinary citizens in the hands of military officials crosses the line that generally prohibits the armed forces from conducting civilian law enforcement operations.

Washington Examiner

Thursday, March 20, 2014

Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators

Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.

https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/

Wednesday, March 19, 2014

US tech giants knew of NSA data collection, agency's top lawyer insists

The senior lawyer for the National Security Agency stated unequivocally on Wednesday that US technology companies were fully aware of the surveillance agency’s widespread collection of data, contradicting months of angry denials from the firms.

Rajesh De, the NSA general counsel, said all communications content and associated metadata harvested by the NSA under a 2008 surveillance law occurred with the knowledge of the companies – both for the internet collection program known as Prism and for the so-called “upstream” collection of communications moving across the internet.

http://www.theguardian.com/world/2014/mar/19/us-tech-giants-knew-nsa-data-collection-rajesh-de

Qatar World Cup 2022 investigation: former Fifa vice-president Jack Warner and family paid millions

Documents appear to show a senior Fifa official and his family were paid millions by a company controlled by a former Qatari football official shortly after the country won its bid for the 2022 World Cup

A senior Fifa official and his family were paid almost $2 million (£1.2m) from a Qatari firm linked to the country’s successful bid for the 2022 World Cup, The Telegraph can disclose.

Jack Warner, the former vice-president of Fifa, appears to have been personally paid $1.2 million (£720,000) from a company controlled by a former Qatari football official shortly after the decision to award the country the tournament.

Telegraph UK

Edward Snowden via Beam Robot @ TED2014

Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but requires a fundamental rethink of the role of the internet in our lives — and the laws that protect it. “Your rights matter,” he say, “because you never know when you’re going to need them.” Chris Anderson interviews, with special guest Tim Berners-Lee.

leaksource.info..Read full article »»

Tuesday, March 18, 2014

NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

By Barton Gellman and Ashkan Soltani
Washington Post

Monday, March 17, 2014

NSA Nicknames and Codewords

Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets.

http://electrospaces.blogspot.com/p/nicknames-and-codewords.html?m=1

Sunday, March 16, 2014

War of Words Between Sen. Dianne Feinstein and CIA Is Empty Rhetoric

Richard Horn Case Proves CIA Deception, Ultimate Congressional Acquiescence Are Business As Usual

The current flap between the CIA and US Sen. Dianne Feinstein, chair of the Senate Select Committee on Intelligence (SSCI), echoes a prior, little-known dust-up between the spy agency and a former DEA agent, Richard Horn, who likewise accused the CIA of illegal spying, manipulating official documents and lying to outside official parties.

http://narcosphere.narconews.com/notebook/bill-conroy/2014/03/war-words-between-sen-dianne-feinstein-and-cia-empty-rhetoric

U.S. to relinquish remaining control over the Internet

U.S. officials announced plans Friday to relinquish federal government control over the administration of the Internet, a move that pleased international critics but alarmed some business leaders and others who rely on the smooth functioning of the Web.

Pressure to let go of the final vestiges of U.S. authority over the system of Web addresses and domain names that organize the Internet has been building for more than a decade and was supercharged by the backlash last year to revelations about National Security Agency surveillance.

Washington Post

William Cooper - Sedona Arizona (9-24-89) Full Lecture

Charlotte Thomson Iserbyt - Down The Rabbit Hole w/Popeye (3-14-14)

Saturday, March 15, 2014

Ben Swann Radio Show Podcast

http://benswann.com/»»

http://www.youtube.com/user/BenSwannRealityCheck »»

9 /11: Hard Evidence

Three lines of evidence (the dynamics of the building destruction, evidence for high temperatures, and discovery of nanothermite in the WTC dust) + strong evidence of a coverup indicate that the official story of 9/11 is false. This is not conspiracy theory. This is hard evidence. Honesty requires that we be willing to follow the evidence.

David Chandler is on the board and on the science committee of Scientists for 9/11 Truth .

911speakout.org»»

Thursday, March 13, 2014

John McAfee’s ultimate hack

McAfee has stumbled onto a layered story of government corruption, of criminal gangs gone wild, of murder for hire, of the illegal selling of passports and a complex history of public opinions.

McAfee’s story has taken on more form over time, yet it hasn’t ever really changed and reflecting on this collective information what I found most compelling going into this was the amount of information from the story that were easily verified. There is a situation here that includes stories about Belize, stories about its government – real stories and real people doing terrible things, all of which seemingly corroborate McAfee’s continued tale. Things only begin within the series of events that led to the raid on his property.

This is the story that few know or have given any attention to. The raid on his Belize property, the murder of Greg Faull and everything that led up to it are still a part of this, but this story is even stranger, bigger, and more nefarious than you would ever think. Welcome to McAfee’s life after his “last stand.” It’s a story of how he hacked an entire country.

Read full article »»

Exclusive Profile Series: Being John McAfee »»

FISA court reverses order to destroy NSA phone data

The U.S. Foreign Intelligence Surveillance Court has temporarily reversed its earlier order that call records collected by the National Security Agency should be destroyed after the current five-year limit.

The court modified its stand after a District Court in California on Monday ordered the government to retain phone records it collects in bulk from telecommunications carriers, as the metadata could be required as evidence in two civil lawsuits that challenge the NSA’s phone records program under section 215 of the Patriot Act.

PC World

Representative Stephen Lynch, victims’ families demand release of 28 pages from 9/11 report

Joined by family members who lost loved ones in the Sept. 11, 2001, attacks, Representative Stephen F. Lynch renewed his push Wednesday to make public part of a 9/11 congressional investigation.

The South Boston Democrat and Representative Walter B. Jones, a Republican of North Carolina, said releasing 28 pages from the investigation would expose new details on the terrorism plot that killed nearly 3,000 people. The two representatives introduced a resolution in December calling for President Obama to declassify the information.

Boston Globe »»

Wednesday, March 12, 2014

Enemies of the Internet 2014: entities at the heart of censorship and surveillance

Identifying government units or agencies rather than entire governments as Enemies of the Internet allows us to draw attention to the schizophrenic attitude towards online freedoms that prevails in in some countries. Three of the government bodies designated by Reporters Without Borders as Enemies of the Internet are located in democracies that have traditionally claimed to respect fundamental freedoms: the Centre for Development of Telematics in India, the Government Communications Headquarters (GCHQ) in the United Kingdom, and the National Security Agency (NSA) in the United States.

The NSA and GCHQ have spied on the communications of millions of citizens including many journalists. They have knowingly introduced security flaws into devices and software used to transmit requests on the Internet. And they have hacked into the very heart of the Internet using programmes such as the NSA’s Quantam Insert and GCHQ’s Tempora. The Internet was a collective resource that the NSA and GCHQ turned into a weapon in the service of special interests, in the process flouting freedom of information, freedom of expression and the right to privacy.

The mass surveillance methods employed in these three countries, many of them exposed by NSA whistleblower Edward Snowden, are all the more intolerable because they will be used and indeed are already being used by authoritarians countries such as Iran, China, Turkmenistan, Saudi Arabia and Bahrain to justify their own violations of freedom of information. How will so-called democratic countries will able to press for the protection of journalists if they adopt the very practices they are criticizing authoritarian regimes for?

Reporters Without Borders

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

By Ryan Gallagher and Glenn Greenwald

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/

How a Court Secretly Evolved, Extending U.S. Spies’ Reach

By CHARLIE SAVAGE and LAURA POITRAS

Ten months after the Sept. 11 attacks, the nation’s surveillance court delivered a ruling that intelligence officials consider a milestone in the secret history of American spying and privacy law. Called the “Raw Take” order — classified docket No. 02-431 — it weakened restrictions on sharing private information about Americans, according to documents and interviews.

The administration of President George W. Bush, intent on not overlooking clues about Al Qaeda, had sought the July 22, 2002, order. It is one of several still-classified rulings by the Foreign Intelligence Surveillance Court described in documents provided by Edward J. Snowden, the former National Security Agency contractor.

Previously, with narrow exceptions, an intelligence agency was permitted to disseminate information gathered from court-approved wiretaps only after deleting irrelevant private details and masking the names of innocent Americans who came into contact with a terrorism suspect. The Raw Take order significantly changed that system, documents show, allowing counterterrorism analysts at the N.S.A., the F.B.I. and the C.I.A. to share unfiltered personal information.

New York Times

Tuesday, March 11, 2014

Feinstein: CIA searched Intelligence Committee computers

The head of the Senate Intelligence Committee on Tuesday sharply accused the CIA of violating federal law and undermining the constitutional principle of congressional oversight as she detailed publicly for the first time how the agency secretly removed documents from computers used by her panel to investigate a controversial interrogation program.

Sen. Dianne Feinstein (D-Calif.) said that the situation amounted to attempted intimidation of congressional investigators, adding: “I am not taking it lightly.”

She confirmed that an internal agency investigation of the action has been referred to the Justice Department for possible criminal prosecution. And she said that the CIA appears to have violated the Fourth Amendment, which bars unreasonable searches and seizures, as well as various federal laws and a presidential executive order that prevents the agency from conducting domestic searches and surveillance.

Washington Post

Monday, March 10, 2014

FBI declassifies files showing Hitler did not die in Germany

Newly declassified FBI documents prove that the government knew Hitler was alive and well, and living in the Andes Mountains long after World War II.

Recently released FBI documents are beginning to show that not only was Hitler and Eva Braun’s suicide faked, the infamous pair might have had help from the director of the OSS himself, Allen Dulles.

In one FBI document from Los Angles, it is revealed that the agency was well aware of a mysterious submarine making its way up the Argentinian coast dropping off high level Nazi officials. What is even more astonishing is the fact that the FBI knew he was in fact living in the foothills of the Andes.

http://wakeupcallnews.blogspot.com/2014/03/fbi-declassifies-files-showing-hitler.html?m=1

Edward Snowden and ACLU at SXSW

Saturday, March 8, 2014

Victims’ families: Release secret ‘Saudi’ 9/11 report

Two congressmen lawmakers
concerned about a government censoring of Saudi Arabia’s alleged role in the 9/11 attacks will hold a press conference this week with families of the victims to step up pressure on the White House to declassify the information.

Three months ago, Reps. Walter Jones (R-NC) and Stephen Lynch (D-Mass.) introduced a resolution urging President Obama to follow through on his campaign promise to 9/11 families to release the censored section of a 2002 congressional report on the attacks.

http://nypost.com/2014/03/08/victim-families-release-secret-saudi-911-report/

9/11: The Best Physical Evidence of Explosives - David Chandler

David Chandler, 2/18/2014: Guest Lecture at Arizona State University by invitation of 9/11 Studies and Outreach, a student group affiliated with Architects and Engineers for 9/11 Truth.

Court rejects NSA request to keep data

The secretive federal surveillance court has denied the National Security Agency’s (NSA) attempt to hold onto people’s phone records for longer than the law allows.

In an order released on Friday, the Foreign Intelligence Surveillance Court said the Justice Department’s attempt to authorize keeping the records beyond the current five-year legal limit “is simply unpersuasive.”

http://thehill.com/blogs/hillicon-valley/technology/200236-spy-court-nsa-cant-keep-phone-records-longer

Friday, March 7, 2014

Snowden: I raised NSA concerns internally over 10 times before going rogue

Former National Security Agency contractor Edward Snowden said he repeatedly tried to go through official channels to raise concerns about government snooping programs but that his warnings fell on the deaf ears. In testimony to the European Parliament released Friday morning, Snowden wrote that he reported policy or legal issues related to spying programs to more than 10 officials, but as a contractor he had no legal avenue to pursue further whistleblowing.

Washington Post

Thursday, March 6, 2014

Why is American internet so slow?

Huge telecommunication companies" such as Comcast, Time Warner, Verizon, and AT&T have "divided up markets and put themselves in a position where they're subject to no competition."

How? The 1996 Telecommunications Act — which was meant to foster competition — allowed cable companies and telecoms companies to simply divide markets and merge their way to monopoly, allowing them to charge customers higher and higher prices without the kind of investment in internet infrastructure, especially in next-generation fiber optic connections, that is ongoing in other countries. Fiber optic connections offer a particularly compelling example. While expensive to build, they offer faster and smoother connections than traditional copper wire connections. But Verizon stopped building out fiber optic infrastructure in 2010 — citing high costs — just as other countries were getting to work.

http://theweek.com/article/index/257404/why-is-american-internet-so-slow

Wednesday, March 5, 2014

A Vast Hidden Surveillance Network Runs Across America, Powered by the Repo Industry

An automated reader attached to the spotter car takes a picture of every ­license plate it passes and sends it to a company in Texas that already has more than 1.8 billion plate scans from vehicles across the country.

These scans mean big money for Sousa — typically $200 to $400 every time the spotter finds a vehicle that’s stolen or in default — so he runs his spotter around the clock, typically adding 8,000 plate scans to the database in Texas each day.

“Honestly, we’ve found random apartment complexes and shopping ­plazas that are sweet spots” where the company can impound multiple vehicles, explains Sousa, the president of New England Associates Inc. in Bridgewater.

But the most significant impact of Sousa’s business is far bigger than locating cars whose owners have defaulted on loans: It is the growing database of snapshots showing where Americans were at specific times, information that everyone from private detectives to ­insurers are willing to pay for.

http://betaboston.com/news/2014/03/05/a-vast-hidden-surveillance-network-runs-across-america-powered-by-the-repo-industry/

CIA Reportedly Spied on Senate Intelligence Committee

The CIA Inspector General’s Office has asked the Justice Department to investigate allegations of malfeasance at the spy agency in connection with a yet-to-be released Senate Intelligence Committee report into the CIA’s secret detention and interrogation program, McClatchy has learned.

The criminal referral may be related to what several knowledgeable people said was CIA monitoring of computers used by Senate aides to prepare the study. The monitoring may have violated an agreement between the committee and the agency.

The development marks an unprecedented breakdown in relations between the CIA and its congressional overseers amid an extraordinary closed-door battle over the 6,300-page report on the agency’s use of waterboarding and harsh interrogation techniques on suspected terrorists held in secret overseas prisons. The report is said to be a searing indictment of the program. The CIA has disputed some of the reports findings.

McClatchy DC

Tuesday, March 4, 2014

Forbes Billionaires: Full List Of The World's 500 Richest People

1. Bill Gates
Net Worth: $76 B
Source of wealth: Microsoft

2. Carlos Slim Helu & family
Net Worth: $72 B
Source of wealth: telecom

3. Amancio Ortega
Net Worth: $64 B
Source of wealth: retail

4. Warren Buffett
Net Worth: $58.2 B
Source of wealth: Berkshire Hathaway

5. Larry Ellison
Net Worth: $48 B
Source of wealth: Oracle

6. Charles Koch
Net Worth: $40 B
Source of wealth: diversified

6. David Koch
Net Worth: $40 B
Source of wealth: diversified

8. Sheldon Adelson
Net Worth: $38 B
Source of wealth: casinos

9. Christy Walton & family
Net Worth: $36.7 B
Source of wealth: Wal-Mart

10. Jim Walton
Net Worth: $34.7 B
Source of wealth: Wal-Mart

Forbes

Monday, March 3, 2014

Nixon, Rockefeller, IG Farben, and global control

In an effort to bolster US companies and protect them from foreign competition inside the United States, Nixon began erecting tariffs on a range of goods imported into the US.

If this Nixon economic plan spread to other countries, the entire global program to install “free trade” and mega-corporate emperors on their thrones for a thousand years could crash and burn.

Nixon was a Rockefeller man. He was owned by them. He’d been rescued from financial ruin by The Family, and now he was in the White House sticking pins in their greatest dream. You can’t overstate the degree of the betrayal, from the Rockefeller point of view. You simply can’t.

Something had to be done. The president had to go. This was the real motivation behind Watergate. This was the real op. Yes, there were sub-motives and smaller contexts, as in any major op, but the prime mover was: get Free Trade back on track: get suitable revenge on the puppet in the White House who went off the script.

http://jonrappoport.wordpress.com/2014/02/28/nixon-rockefeller-ig-farben-and-global-control/

Sunday, March 2, 2014

CIA Scrubbed Surveillance Files on Thousands of Americans (Including Chomsky) Under 60′s-70′s CHAOS Program

I can now confirm that the reason why the CIA could not locate its file on Noam Chomsky, despite the fact that the CIA had in fact maintained records on him, is that the CIA destroyed them and, unfortunately in my view, the destruction was authorized by the Archivist of the United States.

The new piece of the puzzle, just obtained via FOIA, is this CIA records control schedule, NC1-263-78-1, signed by then Archivist James B. Rhoads in March 1978 approving a “Request for immediate disposal” of thousands of CIA files on U.S. citizens “and the index related to these collections which were established under project CHAOS during the period 1967-1974.”  The schedule notes that the “files were opened to maintain information bearing on possible foreign Communist exploitation of dissention in the United States, primarily concerning the Vietnam War. Subject of the folders were U.S. citizens and organizations involved in dissident activities in the United States.”

LeakSource

http://www.docexblog.com/2014/02/confirmed-cia-destroyed-its-noam.html?m=1

Gold Fix Study Shows Signs of Decade of Bank Manipulation

The London gold fix, the benchmark used by miners, jewelers and central banks to value the metal, may have been manipulated for a decade by the banks setting it, researchers say.

Unusual trading patterns around 3 p.m. in London, when the so-called afternoon fix is set on a private conference call between five of the biggest gold dealers, are a sign of collusive behavior and should be investigated, New York University’s Stern School of Business Professor Rosa Abrantes-Metz and Albert Metz, a managing director at Moody’s Investors Service, wrote in a draft research paper.

The paper is the first to raise the possibility that the five banks overseeing the century-old rate -- Barclays Plc, Deutsche Bank AG (DBK), Bank of Nova Scotia (BNS), HSBC Holdings Plc (HSBA) and Societe Generale SA (GLE) -- may have been actively working together to manipulate the benchmark.

Bloomberg

FBI Room 6527 Files

The FBI has been hiding sensitive records of American eavesdropping operations from parliamentary scrutiny for decades. FBI director J. Edgar Hoover (right) gave orders in 1948 for tricky political papers to be stored away in Room 6527 – known as the Confidential File Room – at its Washington headquarters. The records did not show up in any index so that the FBI would be able to deny any knowledge of the relevant documents should a parliamentary control commission ever start to ask questions.

Along with records of US eavesdropping on friendly states, Hoover also stashed away documents about Eastern Block spies or reports about the unusual sexual practices of senior Communist officials and politicians. There were so many documents that they began to threaten the vast official building’s structural mechanics. An internal FBI memo from September 1961 notes that secret papers had to be immediately transferred to other rooms due to the weight of Room 6527’s 26 filing cabinets. Thanks to Freedom of Information Act requests, Government Attic, SonntagsZeitung and Le Matin Dimanche have gained access to these historic and previously unpublished intercept records.

http://leaksource.info/2014/03/02/fbi-room-6527-files/

http://room6527.com/enindex.html

Saturday, March 1, 2014

Narco-Villain “El Chapo’s” Arrest Packaged for Media Consumption

Former DEA Supervisor Contends Guzman’s Capture Was An “Arranged” Event

The recent capture of the notorious Joaquin "El Chapo" Guzman Loera, longtime leader of Mexico’s Sinaloa narco-trafficking organization, was not what it appeared to be, according to a former DEA supervisory agent who still has a deep network of contacts in Mexico.

Guzman’s takedown, despite the media script portraying it as a daring predawn raid, was, in fact, an “arranged thing,” claims the retired DEA agent, Hector Berrellez, who led the investigation into the 1985 torture and murder of DEA agent Kiki Camarena. That cross-border investigation ran for several years and eventually led to the capture and conviction in Mexico of Rafael Caro Quintero, Miguel Angel Felix Gallardo and Ernesto Fonseca Carrillo — considered the leaders of Mexico’s then-dominate drug organization, The Guadalajara Cartel.

“Chapo [Guzman] was protected by Mexican federal agents and military, by the Mexican government,” Berrellez told Narco News. “He was making [Mexican President Enrique] Peña Nieto look bad, and so the government decided to withdraw his security detail. Chapo was told he could either surrender, or he would be killed.”

http://narcosphere.narconews.com/notebook/bill-conroy/2014/03/narco-villain-el-chapo-s-arrest-packaged-media-consumption

CIA Helped to Train and Support Bin Laden, Ramzi Yousef and Other Top Islamic Terrorists Who Bombed The World Trade Center

We Created Terrorists to Fight the Soviets in Afghanistan

Top American officials admit that the U.S. armed and supported Bin Laden and the other Mujahadin – which later morphed into Al Qaeda – in the 1970s, in order to fight the Soviets.

Jimmy Carter’s National Security Adviser Zbigniew Brzezinski admitted on CNN that the U.S. organized and supported Bin Laden and the other originators of “Al Qaeda” in the 1970s to fight the Soviets.

http://www.washingtonsblog.com/2014/03/blowback.html

Castle Bravo at 60

Today , March 1, 2014, is the 60th anniversary of the Castle Bravo nuclear test. I’ve written about it several times before, but I figured a discussion of why Bravo matters was always welcome. Bravo was the first test of a deliverable hydrogen bomb by the United States, proving that you could not only make nuclear weapons that had explosive yields a thousand times more powerful than the Hiroshima bomb, but that you could make them in small-enough packages that they could fit onto airplanes. It is was what truly inaugurated the megaton age (more so than the first H-bomb test, Ivy Mike, which was explosively large but still in a bulky, experimental form). As a technical demonstration it would be historically important even if nothing else had happened.

But nobody says something like that unless other things — terrible things — did happen. Two things went wrong. The first is that the bomb was even more explosive than the scientists thought it was going to be. Instead of 6 megatons of yield, it produced 15 megatons of yield, an error of 250%, which matters when you are talking about millions of tons of TNT. The technical error, in retrospect, reveals how grasping their knowledge still was: the bomb contained two isotopes of lithium in the fusion component of the design, and the designers assumed only one of them would be reactive, but they were wrong. The second problem is that the wind changed. Instead of carrying the copious radioactive fallout that such a weapon would produce over the open ocean, where it would be relatively harmless, it instead carried it over inhabited atolls in the Marshall Islands. This necessitated evacuation, long-term health monitoring, and produced terrible long-term health outcomes for many of the people on those islands.

http://blog.nuclearsecrecy.com/2014/02/28/castle-bravo-at-60/