Saturday, January 31, 2015

German spy agency saves millions of phone records, says report

According to a journalist at German weekly "Die Zeit," writing with reference to "classified files," the German Intelligence Agency (BND) currently collects around 220 million pieces of metadata per day, far more than was currently thought.

Kai Biermann, who has covered the topic of mass surveillance by both the BND and international intelligence authorities including the British Government Communications Headquarters (GCHQ) and the US National Security Agency (NSA), wrote on Friday that German spies provided "at least part" of the data they acquired to the NSA.

Metadata includes the phone numbers involved in a call or text message, when a call was made or text sent and the length of the communication. It does not, however, include what was said during a call or written in a text message.

Quoting BND sources, Biermann wrote that German intelligence "reserves the right to collect metadata, regardless of the amount," of foreign telecommunications traffic. Collection of telecoms traffic of German citizens, however, violates national data protection laws. The report did not specify how German data was filtered, nor has the BND done so.

http://www.dw.de/german-spy-agency-saves-millions-of-phone-records-says-report/a-18226924

EFF Wins Battle Over Secret Legal Opinions on Government Spying

The Electronic Frontier Foundation (EFF) has won its four-year Freedom of Information Act lawsuit over secret legal interpretations of a controversial section of the Patriot Act, including legal analysis of law enforcement and intelligence agency access to census records.

The U.S. Department of Justice today filed a motion to dismiss its appeal of a ruling over legal opinions about Section 215 of the Patriot Act, the controversial provision of law relied on by the NSA to collect the call records of millions of Americans. As a result of the dismissal, the Justice Department will be forced to release a previously undisclosed opinion from the Office of Legal Counsel (OLC) concerning access by law enforcement and intelligence agencies to census data under Section 215.

"The public trusts that information disclosed for the census won't wind up in the hands of law enforcement or intelligence agencies," Staff Attorney Mark Rumold said. "The public has a right to know what the Office of Legal Counsel's conclusions were on this topic, and we're happy to have vindicated that important right."

https://www.eff.org/press/releases/eff-wins-battle-over-secret-legal-opinions-government-spying

Big Banks Fail to Dismiss US Currency Rigging Lawsuit

A federal judge on Wednesday said U.S. investors may pursue a nationwide antitrust lawsuit accusing 12 major banks of rigging prices in the $5.3 trillion-a-day foreign exchange market.
U.S. District Judge Lorna Schofield in Manhattan rejected the defendants' arguments that the case should be dismissed because of a lack of evidence that they colluded to manipulate the WM/Reuters Closing Spot Rates, known as the Fix, or that they impeded competition and caused harm.

"Fairly read, the U.S. complaint adequately alleges that defendants engaged in a long-running conspiracy to manipulate the Fix to defendants' advantage," Schofield wrote in a 30-page decision.

The bank defendants include Bank of America Corp., Barclays Plc, BNP Paribas SA, Citigroup Inc., Credit Suisse Group AG, Deutsche Bank AG , Goldman Sachs Group Inc., HSBC Holdings Plc, JPMorgan Chase & Co., Morgan Stanley, Royal Bank of Scotland Group Plc and UBS AG.

http://www.moneynews.com/InvestingAnalysis/Big-Banks-Currency-Rigging-Lawsuit/2015/01/28/id/621328/

British army creates team of Facebook warriors

The British army is creating a special force of Facebook warriors, skilled in psychological operations and use of social media to engage in unconventional warfare in the information age.

The 77th Brigade, to be based in Hermitage, near Newbury, in Berkshire, will be about 1,500-strong and formed of units drawn from across the army. It will formally come into being in April.

The brigade will be responsible for what is described as non-lethal warfare. Both the Israeli and US army already engage heavily in psychological operations.

Against a background of 24-hour news, smartphones and social media, such as Facebook and Twitter, the force will attempt to control the narrative.

http://www.theguardian.com/uk-news/2015/jan/31/british-army-facebook-warriors-77th-brigade

Friday, January 30, 2015

BILDERBERG 2015 LOCATION CONFIRMED

Austrian counter-terrorism, special-ops forces to run security

The location and dates of the forthcoming 2015 gathering of secretive elites under the Bilderberg Group banner has been confirmed.

Local police have verified that the conference will take place at the opulent Interalpen Hotel, in the Austrian mountains near Telfs.

In a press release, the Austrian police revealed that security for the confab will be in operation from June 9th-14th. As is usually the custom with Bilderberg, the actual meeting of delegates will take place from the Thursday to the Sunday of that week, June 11th-14th.

The police press release notes that security at the Bilderberg meeting will be part of the same operation as security for the much more public G7 meeting, which is scheduled to take place at the beginning of the same week, 7th-8th June, at Schloss Elmau in Bavaria, Germany.

“The security measures at the G7 summit on 7 and 8 June 2015 in Bavaria, and the Bilderberg Conference from 9 to 14 June 2015 in Tyrol were focal points of a briefing by Federal Minister Mag Johanna Mikl-Leitner and representatives of the Ministry of Interior and State Police Tyrol on 13 January 2015 in Vienna.” the press statement reads.

“The venue of the G7 summit lies only 3.6 kilometers in a straight line from the Austrian border, both events cover similar issues and take place one after the other, the G7 summit on 7th and 8th June 2015 and the Bilderberg conference on 9th to 14th June 2015.” the statement continues.

http://www.infowars.com/bilderberg-2015-location-confirmed/

Pete Carroll admired by '9/11 Truth' movement

Pete Carroll is a conspiracy theorist, at least that is how the conspiracy theory goes. And it is one that has gained the Seattle Seahawks coach an unlikely following from the "9/11 Truth" movement in the lead-up to his attempt to win back-to-back Super Bowls.

Two years ago, Carroll met with former Army chief of staff and four-star general Peter Chiarelli and, according to Deadspin citing "sources," brought up many popular conspiracy theories concerned with the attacks of Sept. 11, 2001, on the World Trade Center and quizzed Chiarelli about their veracity.

When asked by USA TODAY Sports on Tuesday about the "9/11 Truth" movement and supporters who back him, Carroll made no attempt to deny his interest.

http://www.usatoday.com/story/sports/nfl/seahawks/2015/01/29/pete-carroll-911-sept-11-truth-movement-truthers/22556683/

Thursday, January 29, 2015

Beware The Two Percent!

Ron Paul's history lesson on the Federal Reserve, including the Fed's absurd mandate to ensure a two percent inflation rate. The Fed is the primary driver of the warfare/welfare state that is destroying the US.

McCain To Demonstrators: "Shut Up Or I'll Have You Arrested," "Get Out Of Here You Low Life Scum"

About a dozen anti-war protesters interrupted a Senate Armed Services Committee hearing with former Secs. of State Henry Kissinger, Madeleine Albright, and George Shultz on Capitol Hill this morning. "In the name of the people" of Chile, Vietnam, East Timur, Cambodia and Laos, they chanted "arrest Henry Kissinger for war crimes" until they were dragged out and Sen. McCain regained control of the room.

http://www.realclearpolitics.com/video/2015/01/29/mccain_to_demonstrators_shut_up_or_ill_have_you_arrested_get_out_of_here_you_low_life_scum.html

Hollywood and The CIA: A Dark Marriage Revealed

One of the more fanciful, or thought to be fanciful, topics I’ve been covering for a good while now is the subject of the relationship of the CIA to Hollywood.

Recent blockbusters like Zero Dark Thirty and American Sniper focus on the military and intelligence agencies in supposed “based on true events” scenarios, but is more at work here? The film industry has always loved tales of espionage, but in reality, the creation and manufacturing of a completely alternate reality and history is far more extensive than most would assume.

While many films have nobly challenged assumptions about war in figures like Kubrick or Stone, for the most part, film has functioned as one of the most powerful forms of propaganda in the western establishment’s arsenal.

http://21stcenturywire.com/2015/01/28/hollywood-and-the-cia-a-dark-marriage-revealed/

New York’s New Elite Anti-Terror Strike Force to Target Protesters

New York City Police Commissioner Bill Bratton announced the creation of a new “anti-terror strike force” Thursday that will admittedly be used to target protesters.

Wednesday, January 28, 2015

Documents Show N.S.A.’s Wiretap Moves Before Congress’s Approval

A federal judge ruled in 2007 that the U.S.A. Patriot Act empowered the National Security Agency to collect foreigners’ emails and phone calls from domestic networks without prior judicial approval, newly declassified documents show.

The documents — two rulings of the Foreign Intelligence Surveillance Court — fill in a chapter in the history of the N.S.A.’s warrantless surveillance program. They show the agency’s secret moves in the months before Congress authorized the spying by enacting the Protect America Act in August 2007.

The disclosure also brought into public view a previously unknown example of how the surveillance court, which hears arguments only from the government before issuing secret rulings, sometimes accepts novel interpretations of the law to bless government requests for spying powers.

The orders were dated May 31 and Aug. 2, 2007. Both were issued by Judge Roger Vinson of the Northern District of Florida, who was then serving on the surveillance court. The Obama administration declassified them and provided them to The New York Times on Monday as part of a continuing Freedom of Information Act lawsuit.

http://www.nytimes.com/2015/01/28/us/documents-show-nsas-wiretap-moves-before-congresss-approval.html

Don't Worry, the CIA Is Just a Bunch of Paper Pushers

The American Police State tells in detail how the CIA, FBI, IRS, NSA and other agencies have spied on Americans, engaged in break-ins, wiretapping, bugging, mail-opening, and other forms of government lawbreaking under seven Administrations, from Roosevelt to Nixon to Ford. It documents how this uniquely American form of a police state has come about, and shows how the power of the government is used against political enemies in the name of “national security.”

http://truthstreammedia.com/dont-worry-the-cia-is-just-a-bunch-of-paper-pushers/

The FBI’s plan to collect everyone’s DNA just got a huge boost from congress

Late last year, the FBI cut the ribbon on its one billion dollar biometrics database, called Next Generation Identification. Since NGI’s official launch, state and local law enforcement officials have been encouraged to submit face prints, fingerprints, retina scans, photos of tattoos and scars, and DNA collected from people nationwide to the FBI’s central database. Those state and local officials can also search against the FBI’s biometrics store, if they want to identify someone. With NGI in full operation, the scary future of Minority Report infamy takes a giant leap forward into the world of non-fiction.

The FBI has big goals when it comes to biometric databases, but they can’t achieve them without the active buy-in and assistance of state and local police. That’s part of the reason why Department of Justice and Homeland Security grant programs have paid for state and local police nationwide to purchase biometric capturing and processing technologies. Ask your local police department about their electronic fingerprint readers, for example, and you’re likely to hear that they were purchased with federal funds. Those devices make it easy for police and sheriffs nationwide to submit fingerprints to the FBI—rapidly, from the field, and with very little effort on behalf of departments.

The same is about to be true with DNA, thanks to funds congress has made available specifically for state and local law enforcement to purchase rapid DNA processing machines. The 2015 omnibus budget includes this provision: “$117,000,000 is for a DNA analysis and capacity enhancement program and for other local, State, and Federal forensic activities.” These funds will presumably help the FBI achieve goals it laid out in August 2014, as relayed here by Nextgov—one of the few news outlets to cover the FBI’s DNA collection plans:

https://privacysos.org/node/1659

Canada Joins World Powers in Spying on Smartphone and Download Data

On Monday, a new report was released, based on leaked documents from Edward Snowden, showing that Canadian intelligence agencies—part of the Five Eyes spying conglomerate that includes the US, the UK, Australia and New Zealand—partnered with UK spies to siphon sensitive data from thousands of smartphones by sniffing traffic between applications on the phones and the servers owned by the companies that made the applications. The so-called Badass program is designed to sniff the normal unencrypted communication traffic of certain smartphone apps to glean location information, the unique identifier of the phone and other data that can help spies learn the identity of phone users, among other things. It can also be used to uncover vulnerabilities in a phone to help spies hack it.

Now today, another report by The Intercept, based on Snowden documents, indicates that Canada’s Communications Security Establishment spy agency has also been spying on the download streams from popular content-sharing sites for video, photos and music. According to the program, dubbed Levitation, the spies have tapped internet cables to filter and analyzes up to 15 million downloads daily in several countries across Europe, the Middle East, North Africa, and North America.

http://www.wired.com/2015/01/canada-joins-world-powers-spying-smartphone-download-data/

CANADA CASTS GLOBAL SURVEILLANCE DRAGNET OVER FILE DOWNLOADS

Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents.

The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files.

The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system.

According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)

https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance/

Edward Snowden Wins 'Debate' With NSA Lawyer

At a public event last week, Edward Snowden argued that the NSA has developed a “culture of impunity,” that its people “are not villains, but they think they can do anything because it is for a just cause.” John DeLong, an NSA Director, responded that “the idea that NSA activities were unauthorized is wrong, it’s wrong in a magnificent way.”

The two came as close as possible to a live debate at the “Privacy in a Networked World” symposium at Harvard University’ Institute for Applied Computational Science where Snowden had a wide-ranging discussion via a video link with security expert Bruce Schneier. John DeLong (Harvard Law, former Director of Compliance at the NSA, current Director of the NSA’s Commercial Solutions Center), immediately followed with his talk about privacy, insisting he did not want to turn it into a “point-by-point, Oxford-style debate.”

http://www.forbes.com/sites/gilpress/2015/01/27/edward-snowden-wins-debate-with-nsa-lawyer/

EFF’s Game Plan for Ending Global Mass Surveillance

Intro: Mass Surveillance by NSA, GCHQ and Others

The National Security Agency is working to collect as much as possible about the digital lives of people worldwide. As the Washington Post reported, a former senior U.S. intelligence official characterized former NSA Director Gen. Keith Alexander’s approach to surveillance as “Collect it all, tag it, store it… And whatever it is you want, you go searching for it.”

The NSA can’t do this alone. It relies on a network of international partners who help collect information worldwide, especially the intelligence agencies of Australia, Canada, New Zealand, and the United Kingdom (collectively known, along with the United States, as the “Five Eyes.”) In addition, the United States has relationships (including various levels of intelligence data sharing and assistance) with Belgium, Denmark, France, Germany, Israel, Italy, Japan, the Netherlands, Norway, Singapore, Spain, South Korea, Sweden, and potentially a number of other countries worldwide. There are also other countries—like Russia, China, and others—engaging in surveillance of digital communications without sharing that data with the NSA. Some of those governments, including the U.S. government, are spending billions of dollars to develop spying capabilities that they use aggressively against innocent people around the world. Some of them may do so with even less oversight and even fewer legal restrictions.

Although whistleblowers and journalists have focused attention on the staggering powers and ambitions of the likes of the NSA and GCHQ, we should never assume that other governments lack the desire to join them. Agencies everywhere are hungry for our data and working to expand their reach. Read about international surveillance law reform and fighting back through user-side encryption.

We focus here on the NSA because we know the most about its activities and we have the most legal and political tools for holding it to account. Of course, we need to know much more about surveillance practices of other agencies in the U.S. and abroad and expand our work together with our partners around the world to confront surveillance as a worldwide epidemic.

Mass surveillance is facilitated by technology companies, especially large ones. These companies often have insufficient or even sloppy security practices that make mass surveillance easier, and in some cases may be actively assisting the NSA in sweeping up data on hundreds of millions of people (for example, AT&T). In other cases, tech companies may be legally compelled to provide access to their servers to the NSA (or they may choose to fight that access). Read more about how tech companies can harden their systems against surveillance.

The NSA relies on several laws as well as a presidential order to justify its continued mass surveillance. Laws passed by Congress as well as orders from the U.S. President can curtail surveillance by the NSA, and the Supreme Court of the United States also has authority to put the brakes on surveillance.

https://www.eff.org/deeplinks/2015/01/effs-game-plan-ending-global-mass-surveillance

Tuesday, January 27, 2015

IS FACIAL RECOGNITION THE NEXT PRIVACY BATTLEGROUND?

TECHNOLOGY CAN NOW LINK YOUR FACE WITH DATA ABOUT YOU—A POWERFUL TOOL THAT HAS PRIVACY EXPERTS CONCERNED.

While much recent retail technology buzz has focused on the promise and peril of Apple's iBeacons, another identity tech has matured: facial recognition. It's now powerful enough to let stores use cameras to link customers' faces to information stored in databases—but it's also finding use in industrial and transportation settings, where it can be used to keep people away from sensitive areas. But are we ready for this tech to start linking personal data with our faces without our knowledge?

Legally, there's nothing stopping American businesses from doing so. A recent BBC article posited the future concern that retail businesses could compare photos taken in-store with databases drawing from data found on the Internet—like databases of social media or Facebook users. But no business wants to be the first on its block to start scanning customer faces and get caught with data the customer didn't want collected, says Joe Rosenkrantz, CEO of FaceFirst, a Los Angeles-based company that sells facial recognition systems. Instead, FaceFirst's retail clients mainly use the company's biometric analytics to track known shoplifters.

http://www.fastcompany.com/3040375/is-facial-recognition-the-next-privacy-battleground

YOUR APPLIANCES MAY BE SPYING ON YOU

Connecting everyday products like refrigerators, baby monitors and watches to the Internet is giving companies and hackers unprecedented access to private information, the Federal Trade Commission warned in a report Tuesday.

The "Internet of Things," the term for the growing universe of Internet-connected devices, can lead to significant improvements in our lives, the FTC wrote. But the connected devices could also undermine our security and privacy if companies aren't careful, the agency warned.

http://www.nextgov.com/big-data/2015/01/your-appliances-may-be-spying-you/103812/

Experts Unmask 'Regin' Trojan as NSA Tool

Earlier this month, SPIEGEL International published an article based on the trove of documents made available by whistleblower Edward Snowden describing the increasingly complex digital weapons being developed by intelligence services in the US and elsewhere. Concurrently, several documents were published as well as the source code of a sample malware program called QWERTY found in the Snowden archive.


For most readers, that source code was little more than 11 pages of impenetrable columns of seemingly random characters. But experts with the Russian IT security company Kaspersky compared the code with malware programs they have on file. What they found were clear similarities with an elaborate cyber-weapon that has been making international headlines since November of last year.

Last fall, Kaspersky and the US security company Symantec both reported for the first time the discovery of a cyber-weapon system which they christened "Regin". According to Kaspersky, the malware had already been in circulation for 10 years and had been deployed against targets in at least 14 countries, including Germany, Belgium and Brazil but also India and Indonesia.

http://www.spiegel.de/international/world/regin-malware-unmasked-as-nsa-tool-after-spiegel-publishes-source-code-a-1015255.html

Obamacare program costs $50,000 in taxpayer money for every American who gets health insurance, says bombshell budget report

*Stunning figure comes from Congressional Budget Office report that revised cost estimates for the next 10 years

*Government will spend $1.993 TRILLION over a decade and take in $643 BILLION in new taxes, penalties and fees related to Obamacare

*The $1.35 trillion net cost will result in 'between 24 million and 27 million' fewer Americans being uninsured – a $50,000 price tag per person at best

*The law will still leave 'between 29 million and 31 million' nonelderly Americans without medical insurance

*Numbers assume Obamacare insurance exchange enrollment will double between now and 2025

http://www.dailymail.co.uk/news/article-2927348/Obamacare-program-costs-50-000-American-gets-health-insurance-says-bombshell-budget-report.html

Justice Department working on national car-tracking database

The Justice Department has acknowledged constructing a database to track the movements of millions of vehicles across the U.S. in real time.

The program, whose existence was first reported by The Wall Street Journal, is primarily overseen by the Drug Enforcement Agency (DEA) to combat drug trafficking near the U.S.-Mexico border. However, government emails indicate that the agency has been working to expand the database throughout the United States over the past several years.

A Justice Department spokesman told Fox News that the tracking program is compliant with federal, claiming it "includes protocols that limit who can access the database and all of the license plate information is deleted after 90 days." In 2012, a DEA agent testified before a House subcommittee that the program was inaugurated in December 2008 and information gathered by it was available to federal, state, and local law enforcement organizations.

It is not clear whether the tracking is overseen or approved by any court.

http://www.foxnews.com/politics/2015/01/26/justice-department-working-on-national-car-tracking-database/

Monday, January 26, 2015

Former CIA officer Jeffrey Sterling convicted in leak case

Jeffrey A. Sterling, a former Central Intelligence Agency officer, was convicted of espionage Monday on charges that he told a reporter for The New York Times about a secret operation to disrupt Iran’s nuclear program.

The conviction is a significant victory for the Obama administration, which has conducted an unprecedented crackdown on officials who speak to journalists about security matters without the administration’s approval. Prosecutors prevailed after a yearslong fight in which the reporter, James Risen, refused to identify his sources.

The case revolved around a C.I.A. operation in which a former Russian scientist provided Iran with intentionally flawed nuclear component schematics. Mr. Risen revealed the operation in his 2006 book, “State of War,” describing it as a mismanaged, potentially reckless mission that may have inadvertently aided the Iranian nuclear program.

http://www.nytimes.com/2015/01/27/us/politics/cia-officer-in-leak-case-jeffrey-sterling-is-convicted-of-espionage.html

Plan C: The top secret Cold War countermeasure which would have brought the United States under martial law

Starting on April 19, 1956, the federal government practiced and planned for a near-doomsday scenario known as Plan C. When activated, Plan C would have brought the United States under martial law, rounded up over ten thousand individuals connected to "subversive" organizations, implemented a censorship board, and prepared the country for life after nuclear attack.

There was no Plan A or B.

The first known mention of this strategy was a memo released by the FBI to MuckRock under a Freedom of Information Act request. It is an invitation to the Bureau to attend an afternoon meeting on April 19, 1956, organized by the Office of Defense Mobilization.

Held in the same room as the president's usual press briefings, just across from the White House in the Executive Office Building, this briefing requested the presence of three top officials from every department, except the Department of Justice which was asked to bring four.

It was here that the broad details of Plan C were laid out:

Officials would designate certain personnel as essential, and develop secretive remote backup offices to be used in the event of an emergency. Each of these sites was to have multiple communications links with the outside world.
The plan was to go into effect before actual war broke out, but when conflict with the USSR seemed imminent.
Martial law would be declared, and 12,949 individuals would immediately be detained as likely threats to national security due to their ties to "subversive organizations."
Soviet diplomats and couriers would be taken into protective custody before being handed over to the State Department. Embassies would entered and searched for nuclear devices.

https://www.muckrock.com/news/archives/2015/jan/26/plan-c-top-secret-cold-war-battle-plan-bring-unite/

The TSA Wants To Read Your Facebook Posts And Check Out Your Purchases Before It Will Approve You For PreCheck

Here's everything that's open to inspection by PreCheck applicant screeners.

"For purposes of this private sector enrollment initiative for the TSA Pre√® Application Program, “commercial data” includes: public record data, such as criminal history and real estate records produced by federal, state, and local governments; other publicly available information, such as directories, press reports, location data and information that individuals post on blogs and social media sites; and wide ranging data such as purchase information, customer lists from registration websites, and self-reported information provided by consumers that is obtained by commercial data sources such as data brokers".

So, the TSA is authorizing contractors to use social media posts in the screening process -- which, yes, are by default public but tend to generate more noise than signal when it comes to spotting the terrorists in PreCheck approval queue.

https://www.techdirt.com/articles/20150123/09423229792/tsa-wants-to-read-your-facebook-posts-check-out-your-purchases-before-it-will-approve-you-precheck.shtml

SECRET ‘BADASS’ INTELLIGENCE PROGRAM SPIED ON SMARTPHONES

British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.

The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS. The German newsweekly did not write about the BADASS document, attaching it to a broader article on cyberwarfare. According to The Intercept‘s analysis of the document, intelligence agents applied BADASS software filters to streams of intercepted internet traffic, plucking from that traffic unencrypted uploads from smartphones to servers run by advertising and analytics companies.

https://firstlook.org/theintercept/2015/01/26/secret-badass-spy-program/

Sunday, January 25, 2015

Google Secretly Gave the Government WikiLeaks Journalists’ Metadata

Google secretly gave the emails of WikiLeaks journalists to the US government in response to an espionage investigation targeting Julian Assange, according to documents disclosed by the internet giant.

Three journalists who have worked for WikiLeaks since 2010 – Sarah Harrison, Joseph Farrell and Kristinn Hrafnsson – have been informed by Google that all their Gmail account content, metadata, subscriber information, and other content were provided to US federal law enforcement in response to search warrants issued in March 2012.

http://www.brisbanetimes.com.au/technology/technology-news/google-provided-wikileaks-journalists-metadata-in-julian-assange-investigation-20150125-12y0pt.html

The Future of Freedom: A Feature Interview with NSA Whistleblower William Binney

The Future of Freedom: A Feature Interview with NSA Whistleblower William Binney from Tragedy and Hope on Vimeo.

Saturday, January 24, 2015

Snowden's Great Escape (Documentary, English/Danish)

"Snowden's Great Escape" tells the story of how Edward Snowden managed to escape Hong Kong and U.S. prosecution with the assistance of WikiLeaks, after blowing the whistle on NSA's secret mass surveillance programs. Featuring newly revealed details provided in exclusive interviews with Snowden, Julian Assange, and Sarah Harrison.

http://leaksource.info/2015/01/24/snowdens-great-escape/


Illuminati History, Genealogy & Secret Rituals with Fritz Springmeier

Friday, January 23, 2015

How the CIA made Google

INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’

The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: NSA mass surveillance, a permanent state of global war, and a new initiative to transform the US military into Skynet.

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. But the inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit.

Known as the ‘Highlands Forum,’ this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the network around the Highlands Forum has become increasingly successful in dominating US defense policy.

https://medium.com/@NafeezAhmed/how-the-cia-made-google-e836451a959e

PART 2...

Thursday, January 22, 2015

Mae Brussell: A Forgotten Superhero

For more than 25 years, Mae Brussell (1922-1988) was America’s preeminent researcher into the suppressed history of political assassinations, covert operations, mind control, secret societies, organized banking crime and international fascism.

Brussell had doubts about the official version of the JFK assassination from the moment she watched Jack Ruby assassinate Lee Harvey Oswald on live nation televisions. When Brussell’s daughter first saw Oswald in the hallway of the Dallas jail, it was obvious he’d been beaten and she felt sorry for him. She was wrapping up her teddy bear to send him when they saw Ruby shoot him.

Because it also bothered Brussell that the newspaper and TV coverage regarding Oswald’s background was full of discrepancies and contradictions. In 1964 she paid $86 to purchase the 26 volume Warren Commission report of the Kennedy assassination, which contained even more discrepancies and contradictions. As she stated in a 1974 interview with Playgirl Magazine, “Twenty-three adjectives were used to describe him in the Warren Report. They said he had no friends, no meaningful relationships, couldn’t hold a job, and so on. But the evidence all pointed in the opposite direction.”

So she began a seven-year project to cross index all the key witnesses and findings, filling dozens of notebooks with 28,000 pages of files on each witness and their specific link to Oswald. What she ultimately discovered was that the international terror network had gone underground and were continuing their fascist campaign to take over one country after another, including the US.

http://www.veteranstoday.com/2015/01/22/mae-brussell-a-forgotten-superhero/

Via Blogdog


Sheldon Silver, New York Assembly Leader, Is Arrested on Graft Charges

The speaker of the New York State Assembly, Sheldon Silver, was arrested on federal corruption charges on Thursday and accused of using the power of his office for more than a decade to secure millions of dollars in bribes and kickbacks and then covering up his schemes, according to court documents.

Mr. Silver, a Democrat from the Lower East Side of Manhattan who has served as speaker for more than two decades, is accused of a range of corrupt dealings that capitalized on his official position. They include using his position to obtain corrupt payments misrepresented as referral fees from a law firm, funneling state research funds and other benefits to a doctor who in return referred asbestos claims to the law firm where the speaker worked, and secretly helping real estate developers win tax breaks.

In recent years, a steady parade of lawmakers in Albany have been charged with corruption, and the complaint against Mr. Silver outlines a capital culture rife with back-room dealing, where money and influence shape public policy for the benefit of private agendas.

http://www.nytimes.com/2015/01/23/nyregion/speaker-of-new-york-assembly-sheldon-silver-is-arrested-in-corruption-case.html

LAPD Spies on Millions of Innocent Folks

LAPD and the Los Angeles County Sheriff are monitoring the whereabouts of residents whether they have committed a crime or not. The biggest surveillance net is license plate reading technology that records your car’s plate number as you pass police cruisers equipped with a rooftop camera, or as you drive past street locations where such cameras are mounted. z_lapd_surveillance001
Information on the identity and movements of millions of Southern California residents is being collected and tracked.

The Electronic Frontier Foundation and the American Civil Liberties Union of Southern California are suing LAPD and the Sheriff’s Department, demanding to see a sample week’s worth of that data in order to get some idea of what cops are storing in a vast and growing, regionally shared database.

Two dozen police agencies have gathered more than 160 million data points showing the exact whereabouts of L.A.-area drivers.

http://undergroundlosangeles.blogspot.com/2015/01/lapd-spies-on-millions-of-innocent-folks.html


Congressman Walter Jones - 28 Pages.Org




Seeking the American government’s analysis of the 9/11 attacks, most people look to the 9/11 Commission Report. There is, however, another report that merits equal attention: the Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001.

President George W. Bush censored 28 pages of this report—an entire section said to describe the involvement of specific foreign governments in the attacks.

28Pages.org works to build awareness of the 28 pages and bolster the growing, bipartisan movement to pressure Congress and the president to finally release them.

http://28pages.org/

We Were Lied To About 9/11 - Episode 18 - Bob McIlvaine

Air Force UFO files hit the Web

The truth is out there — now on the Web. The fabled Project Blue Book, the Air Force's files on UFO sightings and investigations, have tantalized and frustrated extraterrestrial enthusiasts for decades. But this past week, nearly 130,000 pages of declassified UFO records — a trove that would make Agent Fox Mulder's mouth water — were put online.

UFO enthusiast John Greenewald has spent nearly two decades filing Freedom of Information Act requests for the government's files on UFOs and other phenomena. On Jan. 12, Greenewald posted the Blue Book files — as well as files on Blue Book's 1940s-era predecessors, Project Sign and Project Grudge — on his online database, The Black Vault.

Project Blue Book was based at Wright-Patterson Air Force Base near Dayton, Ohio. Between 1947 and 1969, the Air Force recorded 12,618 sightings of strange phenomena — 701 of which remain "unidentified."

http://www.usatoday.com/story/tech/2015/01/19/air-force-ufo-files/21985651/

http://www.theblackvault.com/

http://www.airforcetimes.com/story/military/tech/2015/01/17/air-force-ufo-files/21812539/

Wednesday, January 21, 2015

How the NYPD’s Counterterrorism Apparatus Is Being Turned on Protesters

The police wearing the counterterrorism jackets at protests are perhaps the most palpable sign of the agency's transformation since 2001. Before 9/11 the NYPD had no counterterrorism bureau and the Intelligence Division focused its resources on gang activity. After the September 11 attacks, however, billions of dollars were poured into the department to counter the threat of terrorism, as a 2011 60 Minutesreport showed. Critics of the NYPD's post-9/11 turn have been arguing that practices devoted to fighting terrorism have violated the Constitution.

Now, they say, the NYPD is unleashing its counterterrorism tools on activists against police brutality, conflating legitimate protest with the threat of terrorism.

http://www.vice.com/read/how-the-nypds-counter-terror-apparatus-is-being-turned-on-police-protesters-119

The Golden Age of Black Ops: Special Ops Missions Already in 105 Countries in 2015

During the fiscal year that ended on September 30, 2014, U.S. Special Operations forces (SOF) deployed to 133 countries — roughly 70% of the nations on the planet — according to Lieutenant Colonel Robert Bockholt, a public affairs officer with U.S. Special Operations Command (SOCOM). This capped a three-year span in which the country’s most elite forces were active in more than 150 different countries around the world, conducting missions ranging from kill/capture night raids to training exercises. And this year could be a record-breaker. Only a day before the failed raid that ended Luke Somers life — just 66 days into fiscal 2015 — America’s most elite troops had already set foot in 105 nations, approximately 80% of 2014’s total.

Despite its massive scale and scope, this secret global war across much of the planet is unknown to most Americans. Unlike the December debacle in Yemen, the vast majority of special ops missions remain completely in the shadows, hidden from external oversight or press scrutiny. In fact, aside from modest amounts of information disclosed through highly-selective coverage by military media, official White House leaks, SEALs with something to sell, and a few cherry-picked journalists reporting on cherry-picked opportunities, much of what America’s special operators do is never subjected to meaningful examination, which only increases the chances of unforeseen blowback and catastrophic consequences.

http://www.tomdispatch.com/post/175945/tomgram%3A_nick_turse%2C_a_shadow_war_in_150_countries/

Tuesday, January 20, 2015

FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific details as long as the target computer location has been hidden through a technical tool like Tor or a virtual private network. It would also allow nonspecific search warrants where computers have been intentionally damaged (such as through botnets, but also through common malware and viruses) and are in five or more separate federal judicial districts. Furthermore, the provision would allow investigators to seize electronically stored information regardless of whether that information is stored inside or outside the court's jurisdiction.

http://yro.slashdot.org/story/15/01/20/1540241/fbi-seeks-to-legally-hack-you-if-youre-connected-to-tor-or-a-vpn

Think It All Started with Phones and Email? The NSA Used to Copy Our Telegrams

In the mid-1960s, there was a photocopying machine in the operations room of Western Union International in New York. Whenever a foreign government sent a cable via the company’s facilities, the Western Union operator would copy it on the machine.

That machine belonged not to Western Union International, but to the National Security Agency. It gave the NSA access to cables in which embassies communicated with their countries and to messages from nations giving instructions to their legations in the United States.

Once a week, an NSA employee came to the office and serviced the machine. He removed its film roll and replaced it with a fresh one.

http://truthstreammedia.com/think-it-all-started-with-phones-and-email-nsa-used-to-copy-our-telegrams/

THE IRISH SLAVES: WHAT THEY WILL NEVER, EVER TELL YOU IN HISTORY CLASS

In the 17th Century, from 1600 until 1699, there were many more Irish sold as slaves than Africans. There are records of Irish slaves well into the 18th Century.Many never made it off the ships. According to written record, in at least one incident 132 slaves, men, women, and children, were dumped overboard to drown because ships’ supplies were running low. They were drowned because the insurance would pay for an “accident,” but not if the slaves were allowed to starve.
Typical death rates on the ships were from 37% to 50%.In the West Indies, the African and Irish slaves were housed together, but because the African slaves were much more costly, they were treated much better than the Irish slaves. Also, the Irish were Catholic, and Papists were hated among the Protestant planters. An Irish slave would endure such treatment as having his hands and feet set on fire or being strung up and beaten for even a small infraction. Richard Ligon, who witnessed these things first-hand and recorded them in a history of Barbados he published in 1657, stated:”Truly, I have seen cruelty there done to servants as I did not think one Christian couldhave done to another.”(5)According to Sean O’Callahan, in To Hell or Barbados, Irish men and women were inspected like cattle there, just as the Africans were.

http://yournewswire.com/the-irish-slaves-what-they-will-never-tell-you-in-history/

New police radars can 'see' inside homes

At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance.

Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person's house without first obtaining a search warrant.

The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.

http://www.usatoday.com/story/news/2015/01/19/police-radar-see-through-walls/22007615/

Monday, January 19, 2015

The Inside Information That Could Have Stopped 9/11

Rossini is well placed to do just that. He’s been at the center of one of the enduring mysteries of 9/11: Why the CIA refused to share information with the FBI (or any other agency) about the arrival of at least two well-known Al-Qaeda operatives in the United States in 2000, even though the spy agency had been tracking them closely for years.

That the CIA did block him and Doug Miller, a fellow FBI agent assigned to the “Alec Station,” the cover name for CIA’s Osama bin Laden unit, from notifying bureau headquarters about the terrorists has been told before, most notably in a 2009 Nova documentary on PBS, “The Spy Factory.” Rossini and Miller related how they learned earlier from the CIA that one of the terrorists (and future hijacker), Khalid al-Mihdhar, had multi-entry visas on a Saudi passport to enter the United States. When Miller drafted a report for FBI headquarters, a CIA manager in the top-secret unit told him to hold off. Incredulous, Miller and Rossini had to back down. The station’s rules prohibited them from talking to anyone outside their top-secret group.

The various commissions and internal agency reviews that examined the “intelligence failure” of 9/11 blamed institutional habits and personal rivalries among CIA, FBI and National Security Agency (NSA) officials for preventing them from sharing information. Out of those reviews came the creation of a new directorate of national intelligence, which stripped the CIA of its coordinating authority. But blaming “the system” sidesteps the issue of why one CIA officer in particular, Michael Anne Casey, ordered Rossini’s cohort, Miller, not to alert the FBI about al-Mihdhar. Or why the CIA’s Alec Station bosses failed to alert the FBI—or any other law enforcement agency—about the arrival of Nawaf al-Hazmi, another key Al-Qaeda operative (and future hijacker) the agency had been tracking to and from a terrorist summit in Malaysia.

http://www.newsweek.com/2015/01/23/information-could-have-stopped-911-299148.html

Mae Brussell - Martin Luther King Jr. Assassination (9-1-78)

Evidence of Revision - Part 6 - The Assassination of Martin Luther King Jr.

Complete Transcript of the Martin Luther King, Jr. Assassination Conspiracy Trial


http://www.thekingcenter.org/sites/default/files/KING%20FAMILY%20TRIAL%20TRANSCRIPT.pdf

Senator Feinstein’s husband stands to profit big from government deal

Ever wonder how lowly paid lawmakers leave office filthy rich?

Sen. Dianne Feinstein is showing how it’s done.

The US Postal Service plans to sell 56 buildings — so it can lease space more expensively — and the real estate company of the California senator’s husband, Richard Blum, is set to pocket about $1 billion in commissions.

http://pagesix.com/2015/01/16/senators-husband-stands-to-profit-from-government-deal/

PRISON DISPATCHES FROM THE WAR ON TERROR: EX-CIA OFFICER JOHN KIRIAKOU SPEAKS

John Kiriakou is the only CIA employee to go to prison in connection with the agency’s torture program. Not because he tortured anyone, but because he revealed information on torture to a reporter.

Kiriakou is the Central Intelligence Agency officer who told ABC News in 2007 that the CIA waterboarded suspected al-Qaeda prisoners after the September 11 attacks, namely Abu Zubaydah, thought to be a key al Qaeda official. Although he felt at the time that waterboarding probably saved lives, Kiriakou nevertheless came to view the practice as torture and later claimed he unwittingly understated how many times Zubaydah was subjected to waterboarding.

In January 2012, Kiriakou was charged by the Justice Department for allegedly and repeatedly disclosing classified information to journalists. The Justice Department accused Kiriakou of disclosing the identity of a CIA officer involved in Zubaydah’s capture to a freelance reporter. The reporter did not publicly reveal the official’s name, but his name did appear on a website in October 2012. Kiriakou also allegedly provided New York Times reporter Scott Shane information on CIA employee Deuce Martinez, who was involved in Zubaydah’s capture and interrogation.

After agreeing to a plea deal in October 2012, Kiriakou was sentenced in January 2013 to 30 months in prison. That sentence made him the second CIA employee ever to be locked up under the Intelligence Identities Protection Act, which bars the release of the name of a covert agent; the first was Sharon Scranage, who in 1985 pled guilty to disclosing the identities of intelligence agents in Ghana after giving classified information to a Ghanaian, reportedly her lover.

https://firstlook.org/theintercept/2015/01/19/cia-agent-jailed-john-kiriakous-long-road-era-torture/

GCHQ captured emails of journalists from top international media

GCHQ’s bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK’s largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals.

Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency’s intranet as part of a test exercise by the signals intelligence agency.

The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.

The journalists’ communications were among 70,000 emails harvested in the space of less than 10 minutes on one day in November 2008 by one of GCHQ’s numerous taps on the fibre-optic cables that make up the backbone of the internet.

http://www.theguardian.com/uk-news/2015/jan/19/gchq-intercepted-emails-journalists-ny-times-bbc-guardian-le-monde-reuters-nbc-washington-post

The U.S Government Assassinated Martin Luther King

Sunday, January 18, 2015

The Digital Arms Race: NSA Preps America for Future Battle

According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest.

Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.

The US Army, Navy, Marines and Air Force have already established their own cyber forces, but it is the NSA, also officially a military agency, that is taking the lead. It's no coincidence that the director of the NSA also serves as the head of the US Cyber Command. The country's leading data spy, Admiral Michael Rogers, is also its chief cyber warrior and his close to 40,000 employees are responsible for both digital spying and destructive network attacks.

http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html

Saturday, January 17, 2015

Hacking, Cyberwars & Control of The Internet - Down The Rabbit Hole w/Popeye (1-15-15)

U.S. drug enforcement agency halts huge secret data program

The U.S. Drug Enforcement Administration has halted a secret, nearly 15-year program that collected virtually all data on international calls between the United States and certain countries, according to documents and officials familiar with the matter.

The sweeping bulk DEA database program was stopped in September 2013, shortly after elements were revealed by Reuters and then The New York Times, according to a redacted court filing made public on Thursday and U.S. officials.

The program, run by DEA’s Special Operations Division, collected international U.S. phone records to create a database primarily used for domestic criminal cases – not national security investigations, according to records and sources involved.

DEA shared this information with other law enforcement agencies, including the FBI, IRS, Homeland Security, and intelligence agencies, according to records reviewed by Reuters.

http://www.reuters.com/article/2015/01/16/us-usa-dea-data-idUSKBN0KP2DD20150116

Friday, January 16, 2015

First footage from inside GCHQ: the home of Britain's spy network

For the first time in history, cameras have been let into Government Communications Headquarters (GCHQ) in Cheltenham.
GCHQ is situated in a huge circular building known as The Doughnut, the heir of the war-winning codebreakers. Up to 5,500 employees monitor the communications of of national security, “economic well-being’’ and combating serious crime.
It was originally established after World War One as the Government Code and Cypher School (GC&CS) and was known under that name until 1946.
During the Second World War it was located at Bletchley Park. It was hear that it gained further prominence for its role in the breaking of the German Enigma codes.

http://www.telegraph.co.uk/news/uknews/defence/11350481/Watch-First-footage-from-inside-the-Government-Communications-Headquarters.html

Holder limits seized-asset sharing process that split billions with local, state police

Attorney General Eric H. Holder Jr. on Friday barred local and state police from using federal law to seize cash, cars and other property without proving that a crime occurred.

Holder’s action represents the most sweeping check on police power to confiscate personal property since the seizures began three decades ago as part of the war on drugs.

Since 2008, thousands of local and state police agencies have made more than 55,000 seizures of cash and property worth $3 billion under a civil asset forfeiture program at the Justice Department called Equitable Sharing.

The program has enabled local and state police to make seizures and then have them “adopted” by federal agencies, which share in the proceeds. The program allowed police departments and drug task forces to keep up to 80 percent of the proceeds of the adopted seizures, with the rest going to federal agencies.

http://www.washingtonpost.com/investigations/holder-ends-seized-asset-sharing-process-that-split-billions-with-local-state-police/2015/01/16/

Justice Department Kept Secret Telephone Database

The Justice Department secretly kept a database of U.S. calls to and from foreign countries for more than a decade, according to a new court filing and officials familiar with the program.

The revelation of another secret government database storing records of Americans’ calls came in a filing Thursday in the case of a man accused of conspiring to unlawfully export electronic goods to Iran.

http://blogs.wsj.com/law/2015/01/16/justice-department-kept-secret-telephone-database/

Thursday, January 15, 2015

Secret US cybersecurity report: encryption vital to protect private data

Newly uncovered Snowden document contrasts with British PM’s vow to crack down on encrypted messaging after Paris attacks

Secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough.

The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies.

In the wake of the Paris terror attacks, the prime minister said on Monday there should be “no means of communication” that British authorities could not access. Cameron will use his visit to the US, which started on Thursday , to urge Barack Obama to apply more pressure to tech giants, such as Apple, Google and Facebook, which have been expanding encrypted messaging for their millions of users since the revelations of mass NSA surveillance by the whistleblower Edward Snowden.

http://www.theguardian.com/us-news/2015/jan/15/-sp-secret-us-cybersecurity-report-encryption-protect-data-cameron-paris-attacks

German media: double agent 'stole' list with names of German intel agents

A double agent reportedly stole a list which contained both the real and undercover names of 3,500 German intelligence employees. The spy was arrested last July on suspicions of working for the CIA.

Investigators found a list containing confidential information about employees from Germany's foreign intelligence agency (BND) saved on a private hard drive of the alleged double agent Markus R, German media reported on Wednesday. They had seized the hard drive in a search of his apartment last summer.

The 32-year old man believed to have stolen the top-secret BND document from 2011, according to the German mass-circulation newspaper Bild. The list reportedly includes identities of the agents working at the German embassies, as well as those in German army missions in Afghanistan, Mali, Lebanon and Sudan.

The stolen document could jeopardize more than half of some 6,500 agents of BND. However, it remains unclear whether the double agent sold the list to another intelligence agency, said Bild in its Wednesday edition, citing sources close to the investigation.

http://www.dw.de/german-media-double-agent-stole-list-with-names-of-german-intel-agents/a-18189063

CIA clears CIA in Senate hacking

The five officers involved in the CIA monitoring of computers Senate staffers used while probing the intelligence agency's torture program acted in good faith and committed no wrongdoing. That's according to a Wednesday report from an "accountability board" in which three of its five members are CIA officials.

The review board concluded there was simply a misunderstanding, that the CIA believed it could search the computers being used by staffers of the Senate Select Committee on Intelligence. National security was at stake, too.

"The Board determined that while an informal understanding existed that SSCI work product should be protected, no common understanding existed about the roles and responsibilities in the case of a suspected security incident," according to its highly redacted report [PDF] released Wednesday. The review said that the CIA's position was that it had "obligations under the National Security Act" and a legal duty to scour the computers "for the presence of Agency documents to which SSCI staff should not have access."

Sen. Dianne Feinstein (D-CA) chaired the intelligence committee last year when the breaches occurred, and the politician said she was "disappointed that no one at the CIA will be held accountable."

http://arstechnica.com/tech-policy/2015/01/shocking-cia-clears-cia-in-senate-hacking-brouhaha/

White House says net neutrality legislation not needed

The White House on Thursday said legislation was not necessary to settle so-called "net neutrality" rules because the Federal Communications Commission had the authority to write them.

Republicans in Congress are trying to drum up support for a bill that would counter the FCC's upcoming new rules. The Obama administration's comments, while not entirely rebuffing the legislative effort, could make some Democrats wary of joining it.

"In terms of legislation, we don’t believe it’s necessary given that the FCC has the authorities that it needs under Title II," a White House official told Reuters. "However, we always remain open to working with anyone who shares the president's goal of fully preserving a free and open internet now and into the future."

At stake is what rules should govern how Internet service providers (ISPs) manage web traffic on their networks to ensure they treat all Internet content fairly. At the heart of the latest phase in the debate over the rules is what legal authority should guide regulations.

http://www.reuters.com/article/2015/01/15/us-usa-internet-neutrality-exclusive-idUSKBN0KO2JO20150115

Shocking History of the CIA

Wednesday, January 14, 2015

Why Did the Air Force's Top Officials at the Pentagon Delay Responding to the 9/11 Attacks?

The immediate response to the 9/11 attacks of dozens of the most senior U.S. Air Force officials at the Pentagon who were together in a meeting when the attacks began appears to have been far from what we might reasonably expect, considering the serious and unprecedented crisis the officials had to deal with and the Air Force's key role in responding to it. Evidence suggests that after the first plane crash at the World Trade Center was reported on television on September 11, 2001, there was a delay of over 10 minutes before the officials' meeting was interrupted and the officials were alerted to the incident. The subsequent response of the officials appears to have been slow and lacking urgency.

Even after they saw the second hijacked plane crashing into the World Trade Center live on television, the officials reportedly spent several minutes just watching the news coverage of the attacks and then continued with their routine meeting, instead of immediately halting what they were doing and getting involved with responding to the crisis. [1] Furthermore, when the meeting finally adjourned, instead of helping with the response to the attacks, the Air Force's most senior uniformed officer initially took the time to go upstairs, simply to bring a colleague down from his office to the Pentagon's basement. [2]

Some evidence suggests that the officials in the meeting may have failed to realize the seriousness of what was taking place when they learned of the attacks on the World Trade Center, and this was why they reacted so slowly. They could, perhaps, have mistakenly thought that what they were hearing about was a simulated scenario in a training exercise. Indeed, one of the officials has recalled that when they learned of the first crash, "At first we thought it was part of the briefing." [3] The officials may therefore have felt it was unnecessary for them to respond immediately.

If the officials were indeed confused about whether the attacks were real or simulated, might their slow response have been the intended result of an attempt by some of the people who planned and perpetrated the attacks to paralyze America's defenses, so as to ensure the attacks were successful? Might these planners--presumably rogue individuals within the U.S. military--have arranged what would happen on September 11 so that these key Air Force officials would initially fail to realize that a real-world crisis was taking place, which they needed to respond to immediately?

The tactics used to prevent these officials from responding quickly could have been part of an effort to ensure key individuals from various military and government agencies, who might have organized a successful response to the attacks, were "out of the loop"--unavailable or unable to respond--when the attacks took place.

The evidence currently available is limited and inconclusive. But the behavior of the Air Force's leaders when the 9/11 attacks began certainly deserves further scrutiny.

http://911blogger.com/news/2015-01-14/why-did-air-forces-top-officials-pentagon-delay-responding-911-attacks

http://shoestring911.blogspot.com/2015/01/why-did-air-forces-top-officials-at.html

1975 Video: CIA Admits to Congress the Agency Uses Mainstream Media to Distribute Disinfo

It has been verified by a source who claims she was there that then-CIA Director William Casey did in fact say the controversial and often-disputed line “We’ll know our disinformation program is complete when everything the American public believes is false,” reportedly in 1981.

Despite Casey being under investigation by Congress for being involved in a major disinformation plot involving the overthrow of Libya’s Qaddafi in 1981, and despite Casey arguing on the record that the CIA should have a legal right to spread disinformation via the mainstream news that same year, this quote continues to be argued by people who weren’t there and apparently cannot believe a CIA Director would ever say such a thing.

But spreading disinfo is precisely what the CIA would — and did — do.

This 1975 clip of testimony given during a House Intelligence Committee hearing has the agency admitting on record that the CIA creates and uses disinformation against the American people.

http://truthstreammedia.com/1975-video-cia-admits-to-congress-the-agency-uses-mainstream-media-to-distribute-disinfo/

CIA on Trial in Virginia for Planting Nuke Evidence in Iran

Some people have heard of James Risen, a New York Times reporter who refused to name his source for a story. Damn right. Good for him. But what was the story and whom did the government want named as a source? Ah. Those questions might seem obvious, but the reporting on James Risen has avoided them like the plague for years and years now. And the independent media is not always as good at creating a story as it is at improving on stories in the corporate press.

Jeffrey Sterling went to Congress with his story. He was a CIA case officer. He is accused of having taken his story to James Risen. The prosecution is quite clearly establishing, against its own interest, during the course of this trial already, that numerous people were in on the story and could have taken it to Risen. If Sterling is to be proved guilty of the non-crime of blowing the whistle on a crime, the prosecution has yet to hint at how that will be done.

But what is the story? What is the crime that Sterling exposed for that tiny sliver of the population that's interested enough to have listened? (Sure, Risen's book was a "best seller" but that's a low hurdle; not a single prospective juror in Alexandria had read the book; even a witness involved in the case testified Wednesday that he'd only read the one relevant chapter.)

The story is this. The CIA drew up plans for a key part of a nuclear bomb (what a CIA officer on Wednesday described in his testimony as "the crown jewels" of a nuclear weapons program), inserted flaws in the plans, and then had a Russian give those flawed plans to Iran.

During the trial on Wednesday morning, the prosecution's witnesses made clear both that aiding Iran in developing a part of a bomb would be illegal under U.S. export control laws, and that they were aware at the time that there was the possibility of what they were doing constituting just such aid.

http://warisacrime.org/content/cia-trial-virginia-planting-nuke-evidence-iran



Special Coverage from the Jeffrey Sterling Trial


http://exposefacts.org/blog/the-latest/

Trial Begins for Former C.I.A. Official Accused of Breaching National Security

The Justice Department on Tuesday pressed ahead with the prosecution of a former Central Intelligence Agency official, a day after it said it would not force a reporter for The New York Times to testify at the trial.

The former official, Jeffrey Sterling, is accused of revealing a covert operation to disrupt Iran’s nuclear program, the details of which were included in a 2006 book, “State of War,” by James Risen, the Times reporter. In attempting to compel Mr. Risen’s testimony for the past seven years, the Justice Department had argued that his account was crucial to their case. But under pressure from journalism groups and advocates, Attorney General Eric H. Holder Jr. agreed not to force Mr. Risen to reveal his sources, leaving the government with a case that is largely circumstantial.


In opening arguments in Federal District Court here on Tuesday, prosecutors said that much of the information that Mr. Risen published about the Iranian operation was known only to Mr. Sterling, whom they described as a disgruntled employee who was bitter that the C.I.A. refused to settle a discrimination lawsuit he had filed. They said Mr. Sterling caused lasting harm with his disclosures.

http://www.nytimes.com/2015/01/14/us/politics/trial-begins-for-former-cia-official-accused-of-breaching-national-security.html?_r=0

How German BND Spies Work with NSA

This is part III about the German parliamentary committee which investigates NSA spying activities and the cooperation between NSA and the German foreign intelligence service BND.

The hearings of a number of BND employees which are summarized below, provided many interesting details about BND cable and satellite collection and how these data are selected and filtered and how privacy rights are implemented. This was especially of concern for the cooperation between NSA and BND in the Joint SIGINT Activity (JSA).

http://electrospaces.blogspot.com/2015/01/german-investigation-of-cooperation.html

Tuesday, January 13, 2015

CIA Flashback: “We’ll Know Our Disinformation Program Is Complete When Everything the American Public Believes Is False.”

“We’ll know our disinformation program is complete when everything the American public believes is false.”

(Truthstream Media) That creepy quote above has been widely attributed to Former CIA Director William Casey.

Casey was the 13th CIA Director from 1981 until he left in January 1987. He died not long after of a brain tumor in May 1987. Dead men tell no tales, as they say.

But did William Casey really say this quote?

The quote itself has been passed around extensively on the Internet, and some people claim Casey never really said it because the only main source it traces back to is late political researcher and radio show host Mae Brussell.

Brussell was the host of the radio show Dialogue: Conspiracy. She got her start when, as a radio show guest, she questioned the official JFK assassination story and the Warren Commission Hearings by suggesting that Lee Harvey Oswald wasn’t the only person involved in Kennedy’s murder. Perhaps the propagandized label of “conspiracy theorist” is the reason why people question the quote Brussell often repeated.

http://truthstreammedia.com/cia-flashback-well-know-our-disinformation-program-is-complete-when-everything-the-american-public-believes-is-false/

Monday, January 12, 2015

One Member of Congress = 18 American Households: Lawmakers’ Personal Finances Far From Average

It would take the combined wealth of more than 18 American households to equal the value of a single federal lawmaker’s household, the Center for Responsive Politics’ latest analysis of congressional wealth finds.

The median net worth of a member of Congress was $1,029,505 in 2013 — a 2.5 percent increase from 2012 — compared with an average American household’s median net worth of $56,355. Once again, the majority of members of Congress are millionaires — 271 of the 533 members currently in office, or 50.8 percent.

While the median net worth of an American family has declined by nearly one-third between 2007 and 2013, members of Congress have recovered quite well from the recession. The Senate’s median net worth went from $2.3 million to $2.8 million over that period, while for members of the House the numbers went from $708,500 to $843,507.

https://www.opensecrets.org/news/2015/01/one-member-of-congress-18-american-households-lawmakers-personal-finances-far-from-average/

Download the full list of all current members of Congress and the most popular congressional investments here.

F.B.I. Is Broadening Surveillance Role, Report Shows

Although the government’s warrantless surveillance program is associated with the National Security Agency, the Federal Bureau of Investigation has gradually become a significant player in administering it, a newly declassified report shows.

In 2008, according to the report, the F.B.I. assumed the power to review email accounts the N.S.A. wanted to collect through the “Prism” system, which collects emails of foreigners from providers like Yahoo and Google. The bureau’s top lawyer, Valerie E. Caproni, who is now a Federal District Court judge, developed procedures to make sure no such accounts belonged to Americans.


Then, in October 2009, the F.B.I. started retaining copies of unprocessed communications gathered without a warrant to analyze for its own purposes. And in April 2012, the bureau began nominating new email accounts and phone numbers belonging to foreigners for collection, including through the N.S.A.’s “upstream” system, which collects communications transiting network switches.

That information is in a 231-page study by the Justice Department’s inspector general about the F.B.I.’s activities under the FISA Amendments Act of 2008, which authorized the surveillance program. The report was entirely classified when completed in September 2012. But the government has now made a semi-redacted version of the report public in response to a Freedom of Information Act lawsuit filed by The New York Times.

http://www.nytimes.com/2015/01/12/us/politics/beyond-nsa-fbi-is-assuming-a-larger-surveillance-role-report-shows.html

Rockefeller to join foreign affairs think tank

Recently retired Sen. Jay Rockefeller (D-W.Va.) will become a distinguished fellow at the Council on Foreign Relations (CFR), a foreign policy think tank in Washington.

Rockefeller retired at the end of the last Congress after serving in the Senate for three decades, including as the chairman of Senate Intelligence and Commerce panels.

Based in the CFR’s Washington office, he will specialize his research on Japan, East Asia and cybersecurity issues, among others, according to a release sent on Monday.

“For more than three decades, first as a governor and then a U.S. senator, Jay Rockefeller has shown an uncommon ability to get important things done,” said CFR President Richard Haass in a statement. “We are thrilled to have someone of his experience, achievement, and range join us at the Council on Foreign Relations.”

The Council on Foreign Relations is also a membership organization based in New York. Rockefeller first became a member in 1978. The council publishes Foreign Affairs bimonthly.

http://thehill.com/policy/cybersecurity/229185-rockefeller-to-join-foreign-affairs-think-tank

Some New York Police Officers Were Quick to Resort to Chokeholds, Inspector General Finds

The first investigation by New York City’s police inspector general includes the finding that in several cases where officers were found to have used a chokehold, the banned maneuver was the officer’s initial physical response to verbal resistance.

The 45-page report, released on Monday, follows the death in July of Eric Garner on Staten Island after an arresting officer placed him in a chokehold, a tactic that was banned by the Police Department two decades ago. The report looks at officers’ ongoing use of chokeholds and the department’s handling of such actions.

Headed by Philip K. Eure, who was hired in May, the inspector general’s office examined the circumstances and the disciplinary actions that resulted in 10 confrontations between officers and suspects from 2009 to June 2014 in which a separate oversight agency verified that a chokehold had been used by an officer.


In each instance, the agency, the Civilian Complaint Review Board, recommended stiff discipline. However, in the cases that have been decided so far, officers were given little or no punishment by the Police Department.

http://www.nytimes.com/2015/01/12/nyregion/new-york-police-officers-are-quick-to-resort-to-chokeholds-inspector-general-finds.html

The FBI Says It Doesn’t Need a Warrant to Track Your Cell Phone in Public

The FBI claims that it doesn't need a warrant to use so-called Stingray cell-phone tracking technology in public spaces, according to two US Senators raising privacy concerns over use of the devices.

Stingrays and similar devices intercept data by emulating a cell phone tower, say privacy groups. With the briefcase-size technology, police can identify and locate cell phone users in a general area or search for a specific person while also vacuuming up metadata from phones.

The FBI recently settled on a new policy surrounding the use of Stingrays and similar technology that requires agents to obtain a warrant before using the technology in a criminal investigation. However, the policy includes such broad exceptions that privacy advocates worry they do practically nothing to protect citizens' Fourth Amendment rights.

http://www.vice.com/read/the-fbi-says-it-doesnt-need-a-warrant-to-track-your-cellphone-in-public-112

JFK to 9/11 Everything Is A Rich Man's Trick

Sunday, January 11, 2015

Propaganda 101: Operation Mockingbird Continues

Most Americans are under the influence of TV and radio sources for the daily dose of propaganda. Not understanding they are being lied to and made to believe a lie, it becomes a formidable task to get folks to see the light. They want to see, it’s just the lie is so big, so pervasive at this point it is hard for people to grasp the size of the depth and breadth the lie has reached.

For me, and you may disagree, propaganda is nothing more than a lie that has been presented as truth and is intended to influence how people live and think. As you read you will see that I use the words “lie” and “propaganda” interchangeably – they are the same thing for the purposes of this article and my life.

http://www.activistpost.com/2015/01/propaganda-101-operation-mockingbird.html

http://en.wikipedia.org/wiki/Operation_Mockingbird

Judge Orders NYPD to Release Records on X-ray Vans

A state judge has ordered the New York City Police Department to release records on a secretive program that uses unmarked vans equipped with X-ray machines to detect bombs.

The ruling follows a nearly three-year legal battle by ProPublica, which had requested police reports, training materials, contracts and any health and safety tests on the vans under the state's Freedom of Information Law.

ProPublica filed the request as part of its investigation into the proliferation of security equipment, including airport body scanners, that expose people to ionizing radiation, which can mutate DNA and increase the risk of cancer.

Richard Daddario, then the NYPD's deputy commissioner of counterterrorism, told the court in 2013 that releasing the documents would hamper the department's ability to conduct operations and endanger the lives of New Yorkers.

Disclosing them, he said, would "permit those seeking to evade detection to conform their conduct to the times, places and methods that avoid NYPD presence and are thus most likely to yield a successful attack."

But Supreme Court Judge Doris Ling-Cohan called the NYPD's argument "mere speculation" and "patently insufficient" to outweigh the public's right to know.

http://www.propublica.org/article/judge-orders-nypd-to-release-records-on-x-ray-vans

Saturday, January 10, 2015

CIA mind-control program: not gone, not forgotten

“In the 1950s and 60s, the CIA engaged in an extensive program of human experimentation [MKULTRA], using drugs, psychological, and other means, in search of techniques to control human behavior for counterintelligence and covert action purposes… Most of the MKULTRA records were deliberately destroyed in 1973 by the order of then DCI Richard Helms…Helms testified that he agreed to destroy the records because ‘there had been relationships with outsiders in government agencies and other organizations and that these would be sensitive in this kind of a thing but that since the [mind-control] program was over and finished and done with, we thought we would just get rid of files as well, so that anybody who assisted us in the past would not be subject to follow-up questions, embarrassment, if you will.’”

Helms was not only admitting he destroyed the records, he was stating that the MKULTRA program deployed, through contracts, “outsiders” to carry out mind control experiments. He was determined to protect the outsiders, to keep their identity and work secret. He was also dedicated to preventing these people from exposing the nature of their mind-control work.

Subsequently, some of these “outsiders” have been revealed. But no one really knows how deep, far, and wide the CIA penetrated into academic and research communities to enable MKULTRA.

http://www.activistpost.com/2015/01/cia-mind-control-program-not-gone-not.html

F.B.I. and Justice Dept. Said to Seek Charges for Petraeus

The F.B.I. and Justice Department prosecutors have recommended bringing felony charges against David H. Petraeus, contending that he provided classified information to a lover while he was director of the C.I.A., officials said, and leaving Attorney General Eric H. Holder Jr. to decide whether to seek an indictment that could send the pre-eminent military officer of his generation to prison.

The Justice Department investigation stems from an affair Mr. Petraeus had with Paula Broadwell, an Army Reserve officer who was writing his biography, and focuses on whether he gave her access to his C.I.A. email account and other highly classified information.

F.B.I. agents discovered classified documents on her computer after Mr. Petraeus resigned from the C.I.A. in 2012 when the affair became public.

http://www.nytimes.com/2015/01/10/us/politics/prosecutors-said-to-recommend-charges-against-former-gen-david-petraeus.html

Thursday, January 8, 2015

Exclusive: Edward Snowden on Cyber Warfare

Last June, journalist James Bamford, who is working with NOVA on a new film about cyber warfare that will air in 2015, sat down with Snowden in a Moscow hotel room for a lengthy interview. In it, Snowden sheds light on the surprising frequency with which cyber attacks occur, their potential for destruction, and what, exactly, he believes is at stake as governments and rogue elements rush to exploit weaknesses found on the internet, one of the most complex systems ever built by humans. The following is an unedited transcript of their conversation.

http://www.pbs.org/wgbh/nova/next/military/snowden-transcript/

The Invasion of America

Between 1776 and the present, the United States seized some 1.5 billion acres from North America’s native peoples, an area 25 times the size of the United Kingdom. Many Americans are only vaguely familiar with the story of how this happened. They perhaps recognise Wounded Knee and the Trail of Tears, but few can recall the details and even fewer think that those events are central to US history.

Their tenuous grasp of the subject is regrettable if unsurprising, given that the conquest of the continent is both essential to understanding the rise of the United States and deplorable. Acre by acre, the dispossession of native peoples made the United States a transcontinental power. To visualise this story, I created ‘The Invasion of America’, an interactive time-lapse map of the nearly 500 cessions that the United States carved out of native lands on its westward march to the shores of the Pacific.

http://aeon.co/magazine/society/americans-must-not-forget-their-history-of-dispossession/