Sunday, June 30, 2013

Report: NSA Joint Wiretapping with Foreign Nations


The Observer of the UK interviewed the editor on the National Security Agency's Second, Third, and Fourth Party agreements with other intelligence services that pointed out that German and French protestations about the NSA and British Government Communications Headquarters (GCHQ) jointly tapping the transatlantic cable in Cornwall not withstanding, the NSA also cooperates with Berlin and Paris in collecting private information on European citizens.

On June 29, after The Guardian ran the story prior to The Observer running it on its web site and featuring it as a splash in its June 30 print edition, the story was pulled by The Guardian and The Observer. The second print edition of The Observer also deleted the story but not before the first print run reached London area news agents, as well as those in other British and European cities.

The decision appears to have been made after a well-coordinated campaign was launched by a number of web activists, including a Professor John Schindler who identifies himself as a professor with the U.S. Naval War College in Newport, Rhode Island. Schindler has been particularly critical of NSA whistleblower Edward Snowden and The Guardian journalist Glenn Greenwald who broke most of Snowden's revelations on NSA surveillance.

Schindler immediately began sending out Twitter messages, soliciting further responses and messages from dubious right-wing sites like LittleGreenFootballs and BusinessInsider.com. The tactic is a familiar one. It was used in the campaign to bring down CBS News anchor Dan Rather on a story about President George W. Bush's AWOL status during his service with the Texas Air National Guard.

The Guardian is the sister paper of The Observer. The Guardian ran the Observer's story on Third Parties late afternoon on June 29. In a few hours, as the right-wing web campaign went into full throttle, the story was pulled from The Guardian.

http://www.waynemadsenreport.com/articles/20130630

NSA Spied on European Union Offices

America's NSA intelligence service allegedly targeted the European Union with its spying activities. According to SPIEGEL information, the US placed bugs in the EU representation in Washington and infiltrated its computer network. Cyber attacks were also perpetrated against Brussels in New York and Washington.

http://m.spiegel.de/international/europe/a-908590.html#spRedirectedFrom=www&referrrer=https://www.google.com

NSA slides explain the PRISM data-collection program

The top-secret PRISM program allows the U.S. intelligence community to gain access from nine Internet companies to a wide range of digital information, including e-mails and stored data, on foreign targets operating outside the United States. The program is court-approved but does not require individual warrants. Instead, it operates under a broader authorization from federal judges who oversee the use of the Foreign Intelligence Surveillance Act (FISA). Some documents describing the program were first released by The Washington Post on June 6. The newly released documents below give additional details about how the program operates, including the levels of review and supervisory control at the NSA and FBI. The documents also show how the program interacts with the Internet companies. These slides, annotated by The Post, represent a selection from the overall document, and certain portions are redacted.

http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/m/

New PRISM slides say the program allows NSA to eavesdrop on live conversations

New slides from a leaked NSA presentation published by the Washington Post show that the spy agency is able to monitor live conversations in real time using FBI-operated equipment located on company premises.

http://gigaom.com/2013/06/29/new-prism-slides-say-the-program-allows-nsa-to-eavesdrop-on-live-conversations/

Friday, June 28, 2013

FBI Document—“[DELETED]” Plots to Kill Occupy Leaders “If Deemed Necessary”

Would you be shocked to learn that the FBI apparently knew that some organization, perhaps even a law enforcement agency or private security outfit, had contingency plans to assassinate peaceful protestors in a major American city — and did nothing to intervene?

Would you be surprised to learn that this intelligence comes not from a shadowy whistle-blower but from the FBI itself – specifically, from a document obtained from Houston FBI office last December, as part of a Freedom of Information Act (FOIA) request filed by the Washington, DC-based Partnership for Civil Justice Fund?

To repeat: this comes from the FBI itself. The question, then, is: What did the FBI do about it?

http://whowhatwhy.com/2013/06/27/fbi-document-deleted-plots-to-kill-occupy-leaders-if-deemed-necessary/

EFF Sues FBI, Wants Access To Records Of The FBI's Facial Recognition Program

Companies like Facebook have been scrutinized by government regulators over the use of facial recognition technology. Now the Electronic Frontier Foundation is putting a mirror up to the government to demand the same scrutiny back. The organization is suing the Federal Bureau of Investigation over access to its facial recongition records, based on three Freedom of Information Act (FOIA) requests that the EFF originally made a year ago. We’re embedding the complaint, filed in the U.S. District Court for the Northern District of California, below.

http://m.techcrunch.com/2013/06/26/eff-sues-fbi-wants-access-to-records-of-the-fbis-facial-recognition-program/

Vatican priest arrested for plot to smuggle $26 million from Switzerland

A Vatican cleric and two other people were arrested Friday by Italian police for allegedly trying to smuggle 20 million euros ($26 million) in cash into the country from Switzerland by private jet. It’s the latest scandal to hit the Holy See and broadens an Italian probe into its secretive bank.

Monsignor Nunzio Scarano, already under investigation in a purported money-laundering plot involving the Vatican bank, is accused of corruption and slander and was being held at a Rome prison, prosecutor Nello Rossi told reporters.

Scarano’s arrest came just two days after Pope Francis created a commission of inquiry into the Vatican bank to get to the bottom of the problems that have plagued it for decades and contributed to the impression that it’s an unregulated, offshore tax haven.

http://m.nypost.com/p/news/international/vatican_priest_arrested_for_million_AatQOkO0Z2wqxoVUX4t2xN?utm_source=SFnewyorkpost&utm_medium=SFnewyorkpost

Thursday, June 27, 2013

Know Your History: What is Project ECHELON?

ECHELON is the term popularly used for an automated global interception and relay system operated by the intelligence agencies in five nations: the United States, the United Kingdom, Canada, Australia and New Zealand (it is believed that ECHELON is the code name for the portion of the system that intercepts satellite-based communications).

While the United States National Security Agency (NSA) takes the lead, ECHELON works in conjunction with other intelligence agencies, including the Australian Defence Signals Directorate (DSD). It is believed that ECHELON also works with Britain's Government Communications Headquarters (GCHQ) and the agencies of other allies of the United States, pursuant to various treaties. (1)
 
These countries coordinate their activities pursuant to the UKUSA agreement, which dates back to 1947. The original ECHELON dates back to 1971. However, its capabilities and priorities have expanded greatly since its formation. According to reports, it is capable of intercepting and processing many types of transmissions, throughout the globe. In fact, it has been suggested that ECHELON may intercept as many as 3 billion communications everyday, including phone calls, e-mail messages, Internet downloads, satellite transmissions, and so on. (2) The ECHELON system gathers all of these transmissions indiscriminately, then distills the information that is most heavily desired through artificial intelligence programs. Some sources have claimed that ECHELON sifts through an estimated 90 percent of all traffic that flows through the Internet. (3)

http://cyber-space-war.blogspot.com/2013/06/know-your-history-what-is-project.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+cyberspacewar+(%E2%99%86+Cyber+%E2%98%80+Space+%E2%98%84+War+%E2%98%A0)&m=1

NSA Leak Vindicates AT&T Whistleblower

Today’s revelations that the National Security Agency collected bulk data on the email traffic of millions of Americans provides startling evidence for the first time to support a whistleblower’s longstanding claims that AT&T was forwarding global internet traffic to the government from secret rooms inside its offices.

The collection program, which lasted from 2001 to 2011, involved email metadata — the “enveloped” information for email that reveals the sender’s address and recipient, as well as IP addresses and websites visited, the Guardian newspaper reported today.

Mark Klein, a retired AT&T communications technician, revealed in 2006 that his job duties included connecting internet circuits to a splitting cabinet that led to a secret room in AT&T’s San Francisco office. During the course of that work, he learned from a co-worker that similar cabins were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego, he said.

http://www.wired.com/threatlevel/2013/06/nsa-whistleblower-klein/

NSA collected US email records in bulk for more than two years under Obama

Glenn Greenwald and Spencer Ackerman

The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans, according to secret documents obtained by the Guardian.

The documents indicate that under the program, launched in 2001, a federal judge sitting on the secret surveillance panel called the Fisa court would approve a bulk collection order for internet metadata "every 90 days". A senior administration official confirmed the program, stating that it ended in 2011.

The collection of these records began under the Bush administration's wide-ranging warrantless surveillance program, collectively known by the NSA codename Stellar Wind.

According to a top-secret draft report by the NSA's inspector general – published for the first time today by the Guardian – the agency began "collection of bulk internet metadata" involving "communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States".

http://m.guardiannews.com/world/2013/jun/27/nsa-data-mining-authorised-obama

The 9 Largest Private Armies In The World. What Are They Fighting For?

Mercenaries are soldiers who are fighting in exchange for a gain or material compensation. If we look back in the history, such military force was used for thousands of years in Ancient Greece, Egypt, and the Roman Empire.

If we fast-forward to present times, we can observe that mercenaries have became a type of business. Companies engaged in recruitment and training of mercenaries, provide security services for private clients, as well as participate in war conflicts being hired by governments.

Even though an army can benefit a lot from the use of mercenaries, there are several risks involved with hiring soldiers, including training inefficiencies and above-average wage expenditures. Desertion is also a possibility.

With defense budget cuts being made around the globe, mercenary services are organizations that are worth investors' attention, but only a few have managed what we'd truly consider to be "leaders" in this space.

Let's take a look at the companies that control the 9 largest private armies in the world:

http://www.insidermonkey.com/blog/the-9-largest-private-armies-in-the-world-what-are-they-fighting-for-179460/?singlepage=1

C.I.A. Report Finds Concerns With Ties to New York Police

Four Central Intelligence Agency officers were embedded with the New York Police Department in the decade after Sept. 11, 2001, including one official who helped conduct surveillance operations in the United States, according to a newly disclosed C.I.A. inspector general’s report.

That officer believed there were “no limitations” on his activities, the report said, because he was on an unpaid leave of absence, and thus exempt from the prohibition against domestic spying by members of the C.I.A.

http://mobile.nytimes.com/2013/06/27/nyregion/cia-sees-concerns-on-ties-to-new-york-police.html?from=nyregion

Wednesday, June 26, 2013

SENATE BILL INCENTIVIZES EMPLOYERS TO FIRE AMERICANS AND HIRE AMNESTIED IMMIGRANTS

Under the Gang of 8’s backroom immigration deal with Senators Schumer, Corker and Hoeven, formerly illegal immigrants who are amnestied will be eligible to work, but will not be eligible for ObamaCare. Employers who would be required to pay as much as a $3,000 penalty for most employees who receive an ObamaCare healthcare “exchange” subsidy, would not have to pay the penalty if they hire amnestied immigrants.
Consequently, employers would have a significant incentive to hire or retain amnestied immigrants, rather than current citizens, including those who have recently achieved citizenship via the current naturalization process.

The issue is really an “interaction effect” of the immigration proposal and ObamaCare itself.
Beginning in January, businesses with 50 or more full-time employees, that do not currently offer healthcare benefits that are considered “acceptable” by the Obama administration, must pay a penalty if at least one of their workers obtains insurance on a new government-run “exchange.” The penalty can be as much as $3,000 per employee.

http://www.breitbart.com/Big-Government/2013/06/24/Schumer-Corker-Hoeven-Bill-Incentivizes-Employers-To-Fire-Americans-and-Hire-Amnestied-Immigrants

Timeline of NSA Domestic Spying

Timeline of NSA Domestic Spying

All of the evidence found in this timeline can also be found in the Summary of Evidence we submitted to the court in Jewel v. NSA. It is intended to recall all the credible accounts and information of the NSA's domestic spying program found in the media, congressional testimony, books, and court actions. For a short description of the people involved in the spying you can look at our Profiles page, which includes many of the key characters from the NSA Domestic Spying program.

https://www.eff.org/nsa-spying/timeline

Tuesday, June 25, 2013

Liberal icon Frank Church on the NSA

Glenn Greenwald

In the mid-1970s, the US Senate formed the Select Intelligence Committee to investigate reports of the widespread domestic surveillance abuses that had emerged in the wake of the Nixon scandals. The Committee was chaired by 4-term Idaho Democratic Sen. Frank Church who was, among other things, a former military intelligence officer and one of the Senate's earliest opponents of the Vietnam War, as well as a former Chairman of the Senate Foreign Relations Committee.

Even among US Senators, virtually nothing was known at the time about the National Security Agency. The Beltway joke was that "NSA" stood for "no such agency". Upon completing his investigation, Church was so shocked to learn what he had discovered - the massive and awesome spying capabilities constructed by the US government with no transparency or accountability - that he issued the following warning, as reported by the New York Times, using language strikingly stark for such a mainstream US politician when speaking about his own government:

"'That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide.'

"He added that if a dictator ever took over, the NSA 'could enable it to impose total tyranny, and there would be no way to fight back.'"

http://m.guardiannews.com/commentisfree/2013/jun/25/frank-church-liberal-icon

Submarine internet cables are a gift for spooks

It's a golden age for spying. The subsea fibre-optic cables that carry telephone and internet traffic are a technological marvel – and a gift to intelligence agencies.

They make landfall at just a handful of locations, meaning vast quantities of data can be sucked out at one site and, according to the prolific US National Security Agency whistleblower Edward Snowden, that is what British intelligence has been doing for the last 18 months.

In a leak to The Guardian newspaper on 22 June, Snowden said the UK Government Communications Headquarters (GCHQ) in Cheltenham is siphoning data from at least 200 fibre-optic telecommunications cables – including many of the transatlantic subsea cables that hit British shores at Bude in Cornwall.

The tapping project, known as Tempora, allows phone calls to be monitored, as well as emails on offshore American-hosted webmail services such as Gmail, Yahoo and Outlook. Also included are Google and Yahoo searches, and direct messages on Facebook and Twitter.

http://www.newscientist.com/article/dn23752-submarine-internet-cables-are-a-gift-for-spooks.html?cmpid=RSS|NSNS|2012-GLOBAL|online-news#.UcofEXTD9Ag

NSA & GCHQ fibre-optic surveillance programs began mid-1990s (not 2008)

Anyone who has been investigating GCHQ for years – and we come into that camp – would be incredulous at the notion that blanket surveillance is only a recent phenomena. In reality such broad surveillance, over decades, has adapted to the technologies of the time, becoming more and more sophisticated. Consequently, our investigations can demonstrate that at least one of the mass surveillance programs revealed yesterday by the Guardian (and based on documents provided by NSA whistleblower Edward Snowden) extends back to the mid-1990s, not 2008 as intimated, with the NSA in co-operation with GCHQ running the program without informing their respective citizenry. See below for more (or as a memo from NSA to GCHQ, included in the Guardian article, said, “Have fun!”).

http://darkernet.in/nsa-gchq-fibre-optic-surveillance-programs-began-mid-1990s-not-2008/

Inside Anglo Irish Bank: the secret recordings

Exclusive: Tapes reveal the lies and deception that led to the bank bailout

TAPE RECORDINGS from inside doomed Anglo Irish Bank reveal for the first time how the bank’s top executives lied to the Government about the true extent of losses at the institution.

The astonishing tapes show senior manager John Bowe, who had been involved in negotiations with the Central Bank, laughing and joking as he tells another senior manager, Peter Fitzgerald, how Anglo was luring the State into giving it billions of euro.

The audio recordings are from the bank’s own internal telephone system and date from the heart of the financial crisis that brought the State to its knees in September 2008.

Anglo itself was within days of complete meltdown – and in the years ahead would eat up €30bn of taxpayer money. Mr Bowe speaks about how the State had been asked for €7bn to bail out Anglo – but Anglo’s negotiators knew all along this was not enough to save the bank.
The plan was that once the State began the flow of money, it would be unable to stop.
Mr Bowe is asked by Mr Fitzgerald how they had come up with the figure of €7bn. He laughs as he is taped saying: “Just, as Drummer (then-CEO David Drumm) would say, ‘picked it out of my arse’.”

http://www.independent.ie/business/irish/inside-anglo-the-secret-recordings-29366837.html

William Pepper - Sirhan Sirhan Lawyer - Compelled to Tell The Truth (6-24-13)



Monday, June 24, 2013

Obama’s crackdown views leaks as aiding enemies of U.S.

By Marisa Taylor and Jonathan S. Landay | McClatchy Washington Bureau

Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions.

President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.

Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage.

“Hammer this fact home . . . leaking is tantamount to aiding the enemies of the United States,” says a June 1, 2012, Defense Department strategy for the program that was obtained by McClatchy.

http://www.mcclatchydc.com/2013/06/20/194513/obamas-crackdown-views-leaks-as.html#.Ucj113TD9Ag

The SINGLE Most Important Step to Protect Yourself from Government Spying

MGiven that the NSA is tapping into your phone calls and spying on your Internet activities, you might have switched to a search engine which is more privacy-conscious.

You might have started using encrypted communications.  After all, NSA whistleblower Edward Snowdenand the leading electronic privacy group – the Electronic Frontier Foundation – say that encryption helps to protect privacy.   On the other hand,  Tech Dirt points out that the NSA might consider you suspicious if you encrypt information, and so hold onto your data until they can decrypt it.

The above are all issues about which you are at least somewhat aware.
But there is a giant type of snooping which you probably don’t even know about.  Specifically, ABC News reported in 2006:

Cell phone users, beware.  The FBI can listen to everything you say, even when the cell phone is turned off. A recent court ruling in a case against the Genovese crime family revealed that the FBI has the ability from a remote location to activate a cell phone and turn its microphone into a listening device that transmits to an FBI listening post, a method known as a “roving bug.”
Experts say the only way to defeat it is to remove the cell phone battery.
“The FBI can access cell phones and modify them remotely without ever having to physically handle them,” James Atkinson, a counterintelligence security consultant, told ABC News.  “Any recently manufactured cell phone has a built-in tracking device, which can allow eavesdroppers to pinpoint someone’s location to within just a few feet,” he added.

According to the recent court ruling by U.S. District Court Judge Lewis Kaplan, “The device functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be.”

***

“The courts have given law enforcement a blank check for surveillance,” Richard Rehbock, attorney for defendant John Ardito, told ABC News.

***

“Big Brother is upon us…1984 happened a long time ago,” he said, referring to the George Orwell futuristic novel “1984,” which described a society whose members were closely watched by those in power and was published in 1949.

http://www.washingtonsblog.com/2013/06/the-single-most-important-step-to-protect-yourself-from-government-spying.html

Is the Government Spying On You Through Your Own Computer’s Webcam Or Microphone?

Booz Allen Hamilton: What You Don’t Know About Snowden’s Former Employer

Let’s take another trip down the rabbit hole, shall we?
Lost in the Edward Snowden debate is a critical look at his former employer, the company doing the spying on Americans in the first place: Booz Allen Hamilton.
Booz Allen Hamilton is a government contractor, with 99% of its revenue coming from the US government. Not only does it receive money from the NSA, but also the US Army, US Navy, US Air Force, US Marine Corps, Department of Defense, Department of Homeland Security, the FBI and … the IRS. In addition, Booz Allen is heavily connected to the CIA.

http://www.dailypaul.com/290258/booz-allen-hamilton-what-you-dont-know-about-snowdens-fomer-employer

NSA Spying: So They Are Listening In, After All

Despite a stream of mendacious twaddle from President Obama, congressional grifters and spook agency mouthpieces like Office of the Director of National Intelligence head James Clapper, FBI Director Robert Mueller and NSA chief General Keith Alexander, it turns out our guardians are listening in to America's, and most of the world's, telephone conversations after all.

In the wake of the Boston Marathon bombing, former FBI counterterrorism agent Tim Clemente was asked by CNN whether there's a way that investigators "can get the phone companies" to cough up audio of a particular conversation.

Clemente responded: "No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. It's not necessarily something that the FBI is going to want to present in court, but it may help lead the investigation and/or lead to questioning of her [the alleged bomber's wife]. We certainly can find that out."

CNN's incredulous reply: "So they can actually get that? People are saying, look, that is incredible."

Clemente: "No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not."

When questioned the next day whether he would confirm his previous statements, Clemente told CNN, "I'm talking about all digital communications are--there's a way to look at digital communications in the past. I can't go into detail of how that's done or what's done. But I can tell you that no digital communication is secure. So these communications will be found out. The conversation will be known."

While there was scant media follow-up to Clemente's assertions, recent revelations of NSA dragnet spying have confirmed what analysts, researchers and whistleblowers have been saying for years: the secret state has the technological wherewithal to digitally record the content of all electronic communications, including telephone calls, and store them in massive cloud computing server farms in the event they're needed for future "reference."

http://antifascist-calling.blogspot.com/2013/06/nsa-spying-so-they-are-listening-in.html?m=1

Sunday, June 23, 2013

Snowden Becomes Eighth Person to Be Charged with Violating the Espionage Act Under Obama

The Espionage Act is a law from 1917 that was intended to criminalize individuals who engaged in spying, not leakers or whistleblowers. It was not initially used to prosecute government employees who passed on information to a reporter or a media organization. But, under Obama, the Justice Department has exercised wide discretion and interpreted the law as one that can be used to criminalize government employees who blow the whistle on corruption or share information on operations, policies or programs with the press. They have used to prosecute them as if they are “insiders,” “informers,” or “spies.”
President Barack Obama came into office committed to “protecting” whistleblowers.

http://dissenter.firedoglake.com/2013/06/21/snowden-becomes-eighth-person-to-be-indicted-for-espionage-by-the-obama-justice-department/#comments

Saturday, June 22, 2013

NSA Whistleblower Russ Tice Goes on Record - Reveals New Information & Names Culprits!



NSA uses 'terrorism' to justify mass surveillance that started long before 9/11 and the Patriot Act

All of this documented mass surveillance activity by the NSA in 2001, prior to 9/11 and the signing of the Patriot Act, would seem to fly in the face of what we have been told — and are still being told — about such spying even today, as NSA officials testify before Congressional hearings regarding the recent NSA leaks at the hands of Edward Snowden. The NSA claims that all of its spying started as a result of the terrorist attacks on Sept. 11, 2001, and has always been done legally — either approved by the executive branch by way of the Patriot Act or authorized by Congress — and all the while overseen and condoned by the courts.

But as the evidence points out, such a claim simply isn’t true. The NSA was clearly working hard to create systems that would collect massive amounts of phone and Internet data in 2001, prior to the attacks. For a plausible explanation for this behavior, we have to look at one of the most important underreported stories of our time. Literally underreported.

In 1996, New Zealand based journalist Nicky Hager shocked the world with his exposé on a global surveillance system known as ECHELON. Hager wrote a book about his findings, which were controversial enough that elements within the British government wanted to ban the book from being sold in the U.K. In the U.S., a summary of Hager’s ECHELON revelations was published in the award-winning Covert Action Quarterly in its winter 1996/1997 edition. That same story went on to be named as one of Project Censored’s 25 most important underreported stories of the year in 1998.

http://www.boulderweekly.com/article-11289-nsa-uses-terrorism-to-justify-mass-surveillance-that-started-long-before-9_11-and-the-patriot-act.html

Friday, June 21, 2013

U.S. charges Edward Snowden with espionage in leaks about NSA surveillance programs

Federal prosecutors have filed a sealed criminal complaint against Edward Snowden, the former National Security Agency contractor who leaked a trove of documents about top-secret surveillance programs, and the United States has asked Hong Kong to detain him on a provisional arrest warrant, according to U.S. officials.

Snowden was charged with espionage, theft and conversion of government property, said the officials, who spoke on the condition of anonymity because they were not authorized to speak about the case.

The complaint was filed in the Eastern District of Virginia, a jurisdiction where Snowden’s former employer, Booz Allen Hamilton, is headquartered and a district with a long track record of prosecuting cases with national security implications.

http://m.washingtonpost.com/world/national-security/us-charges-snowden-with-espionage/2013/06/21/507497d8-dab1-11e2-a016-92547bf094cc_story.html

GCHQ taps fibre-optic cables for secret access to world's communications

Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal

The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called "the largest programme of suspicionless surveillance in human history".

"It's not just a US problem. The UK has a huge dog in this fight," Snowden told the Guardian. "They [GCHQ] are worse than the US."

http://m.guardiannews.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa

Fact-check: The NSA and Sept. 11

It is impossible to know for certain whether screening phone records would have stopped the attacks -- the program didn’t exist at the time. It’s also not clear whether the program would have given the NSA abilities it didn’t already possess with respect to the case. Details of the current program and as well as NSA’s role in intelligence gathering around the 9/11 plots remain secret. 

But one thing we do know: Those making the argument have ignored a key aspect of historical record.

U.S. intelligence agencies knew the identity of the hijacker in question, Saudi national Khalid al Mihdhar, long before 9/11 and had the ability find him, but they failed to do so.

http://www.propublica.org/article/fact-check-the-nsa-and-sept-11

Thursday, June 20, 2013

NSA Whistleblower: NSA Spying On – and Blackmailing – Top Government Officials and Military Officers

Whistleblower Says Spy Agency Targeting Top American Leaders

NSA whistleblower Russel Tice – a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping – told Peter B. Collins on Boiling Frogs Post (the website of FBI whistleblower Sibel Edmonds):

Tice: Okay. They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial. But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House–their own people. They went after antiwar groups. They went after U.S. international–U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that–like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civil rights groups. So, you know, don’t tell me that there’s no abuse, because I’ve had this stuff in my hand and looked at it. And in some cases, I literally was involved in the technology that was going after this stuff. And you know, when I said to [former MSNBC show host Keith] Olbermann, I said, my particular thing is high tech and you know, what’s going on is the other thing, which is the dragnet. The dragnet is what Mark Klein is talking about, the terrestrial dragnet. Well my specialty is outer space. I deal with satellites, and everything that goes in and out of space. I did my spying via space. So that’s how I found out about this.

Collins: Now Russ, the targeting of the people that you just mentioned, top military leaders, members of Congress, intelligence community leaders and the–oh, I’m sorry, it was intelligence committees, let me correct that–not intelligence community, and then executive branch appointees. This creates the basis, and the potential for massive blackmail.

Tice: Absolutely! And remember we talked about that before, that I was worried that the intelligence community now has sway over what is going on. Now here’s the big one. I haven’t given you any names. This was is summer of 2004. One of the papers that I held in my hand was to wiretap a bunch of numbers associated with, with a 40-something-year-old wannabe senator from Illinois. You wouldn’t happen to know where that guy lives right now, would you? It’s a big white house in Washington, DC. That’s who they went after. And that’s the president of the United States now.

http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html

Club Of Rome Founder Proposed “Global Matrix” Of Manufactured Consent

Environmental think tank aspired to global matrix of manufactured consent

Recently unearthed documents from the private collection of former diplomat and Bilderberg regular George C. McGhee have revealed (among other things) that the Club of Rome in 1970 wanted to create a “global matrix approach”, or G-Matrix approach, as a means of bringing people into an enviro-eugenicist mindset globally.

The Club of Rome was an influential think tank, advocating among other things worldwide population reduction and global environmental governance.
The author of the uncovered manuscript from 1970 was Italian industrialistAurelio Peccei, who founded the Club of Rome in 1968. Peccei wrote that any acceptance of the Club’s conclusions “relies heavily on a global matrix approach”. Furthermore he writes that these conclusions by the infamous Club (which includes advocacy of worldwide population reduction) can only be generally accepted “through (…) an iterative, global and substantive process”. Through such a comprehensive process, writes Peccei, mankind can “gradually attain a value-base consensus, and avoid the prospects of a critical future situation.”

http://explosivereports.com/2013/06/19/club-of-rome-founder-proposed-global-matrix-of-manufactured-consent/

Wednesday, June 19, 2013

TWA Flight 800 crash not due to gas tank explosion, say former investigators

The producers of an upcoming documentary on TWA Flight 800—which exploded and crashed into the waters off Long Island, N.Y., on July 17, 1996, killing all 230 people on board—claim to have proof that a missile caused the Paris-bound flight to crash. And six former investigators who took part in the film say there was a cover-up and want the case reopened.

"There was a lack of coordination and willful denial of information," Hank Hughes, a senior accident investigator for the National Transportation Safety Board, said on Wednesday during a conference call with reporters. "There were 755 witnesses. At no time was information provided by the witnesses shared by the FBI."

Jim Speer, an accident investigator at the time of the crash for the Airline Pilots Association, who sifted through the recovered wreckage in a hangar, said he discovered holes consistent with those that would be formed by a high-energy blast in the right wing. He requested it be tested for explosives. When the test came back positive, he said, he was "physically removed" from a room by two CIA agents.

http://news.yahoo.com/blogs/lookout/twa-flight-800-crash-investigation-ntsb-141624708.html

WHY MONOPOLIES MAKE SPYING EASIER

These days, America has one dominant search engine, one dominant social-networking site, and four phone companies. The structure of the information industry often goes unnoticed, but it has an enormous effect on the ease with which the government spies on citizens. The remarkable consolidation of the communications and Web industries into a handful of firms has made spying much simpler and, therefore, more likely to happen.

http://m.newyorker.com/online/blogs/elements/2013/06/why-monopolies-make-spying-easier.html

FBI director admits domestic use of drones

The FBI uses drones for domestic surveillance purposes, the head of the agency told Congress early Wednesday.

Robert Mueller, the director of the Federal Bureau of Investigation, confirmed to lawmakers that the FBI owns several unmanned aerial vehicles, but has not adopted any strict policies or guidelines yet to govern the use of the controversial aircraft.
“Does the FBI use drones for surveillance on US soil?” Sen. Chuck Grassley (R-Iowa) asked Mr Mueller during an oversight hearing on Capitol Hill Wednesday before the Senate Judiciary Committee.

“Yes,” Mueller responded bluntly, adding that the FBI’s operation of drones is “very seldom.”

http://rt.com/usa/fbi-director-mueller-drones-947/

Tuesday, June 18, 2013

Big Brother alert: Cameras in the cable box to monitor TV viewers

It hardly gets more Orwellian than this. New technology would allow cable companies to peer directly into television watchers’ homes and monitor viewing habits and reactions to product advertisements.

The technology would come via the cable box, and at least one lawmaker on Capitol Hill is standing in opposition.

Mass. Democratic Rep. Michael Capuano has introduced a bill, the We Are Watching You Act, to prohibit the technology on boxes and collection of information absent consumer permission. The bill would also require companies that do use the data to show “we are watching you” messages on the screen and to explain just what kinds of information is being captured and for what reasons, AdWeek reported.

http://m.washingtontimes.com/news/2013/jun/17/big-brother-alert-cameras-cable-box-monitor-tv-vie/print/

21 Facts About NSA Snooping That Every American Should Know

There seems to be a lot of confusion about what the NSA is actually doing.  Are they reading our emails?  Are they listening to our telephone calls?  Do they target American citizens or is it only foreigners that they are targeting?  Unfortunately, the truth is that we aren’t going to get straight answers from our leaders about this.  The folks running the NSA have already shown that they are willing to flat out lie to Congress, and Barack Obama doesn’t exactly have the greatest track record when it comes to telling the truth.  These are men that play word games and tell lies for a living.  So it would be unrealistic to expect them to come out and tell us the unvarnished truth about what is going on.  That is why it is so important that whistleblowers such as Edward Snowden have come forward.  Thanks to them and to the brave journalists that are willing to look into these things, we have been able to get some glimpses behind the curtain.  And what we have learned is not very pretty.  The following are 21 facts about NSA snooping that every American should know…

http://endoftheamericandream.com/archives/21-facts-about-nsa-snooping-that-every-american-should-know

The Supreme Court Decided Your Silence Can Be Used Against You

On Monday, in a 5-4 ruling on Salinas v. Texas in which the conservative members of the Court and Anthony Kennedy determined that if you remain silent before police read your Miranda rights, that silence can and will be held against you. Here's what that means.

Basically, if you're ever in any trouble with police (no, we don't condone breaking laws) and want to keep your mouth shut, you will need to announce that you're invoking your Fifth Amendment right instead of, you know, just keeping your mouth shut. "Petitioner's Fifth Amendment claim fails because he did not expressly invoke the privilege against self-incrimination in response to the officer's question," reads the opinion from Justice Samuel Alito, which Justice Kennedy and Chief Justice John Roberts backed. Justices Thomas and Scalia had a concurring opinion while the remaining four Supremes dissented.

http://m.theatlanticwire.com/politics/2013/06/supreme-court-salinas-v-texas-ruling-explained/66309/

Monday, June 17, 2013

Google’s deep CIA and NSA connections

To begin with, as reported previously in the Washington Post and elsewhere, Google is the supplier of the customized core search technology for ‘Intellipedia, a highly-secured online system where 37,000 U.S. spies and related personnel share information and collaborate on their devious errands.

Agencies such as the so-called ‘National Security Agency’, or NSA, which is implicated in the current ‘spying on Americans’ scandal, have also purchased servers using Google-supplied search technology which processes information gathered by U.S. spies operating all over the planet.

In addition, Google is linked to the U.S. spy and military systems through its Google Earth software venture. The technology behind this software was originally developed by Keyhole Inc., a company funded by Q-Tel http://www.iqt.org/, a venture capital firm which is in turn openly funded and operated on behalf of the CIA.
Google acquired Keyhole Inc. in 2004. The same base technology is currently employed by U.S. military and intelligence systems in their quest, in their own words, for “full-spectrum dominance” of the planet.

Moreover, Google’s connection with the CIA and its venture capital firm extends to sharing at least one key member of personnel. In 2004, the Director of Technology Assessment at In-Q-Tel, Rob Painter, moved from his old job directly serving the CIA to become ‘Senior Federal Manager’ at Google.
As Robert Steele, a former CIA case officer has put it: Google is “in bed with” the CIA.

http://www.infowars.com/googles-deep-cia-and-nsa-connections/

Obamacare will share personal health info with federal, state agencies

A new rule issued late Friday requires state, federal and local agencies as well as health insurers to swap the protected personal health information of anybody seeking to join the new health care program that will be enforced by the Internal Revenue Service.
Personal health information, or PHI, is highly protected under federal law, but the latest ruling from the Department of Health and Human Services allows agencies to trade the information to verify that Obamacare applicants are getting the minimum amount of health insurance coverage they need from the health “exchanges.”

http://m.washingtonexaminer.com/obamacare-will-share-personal-health-info-with-federal-state-agencies/article/2531990

First Public Report on NSA Electronic Espionage (1972)

Note: The article begins with commentary on information provided by an anonymous former analyst of the National Security Agency followed by the full interview. The analyst was later named as Perry Fellwock, at the time using the pseudonym Winslow Peck.

Ramparts, Vol. 11, No. 2, August, 1972, pp. 35-50

U.S. Electronic Espionage:
A Memoir

http://cryptome.org/jya/nsa-elint.htm

Sunday, June 16, 2013

GCHQ intercepted foreign politicians' communications at G20 summits

Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

http://m.guardiannews.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits

The JFK Assassination - A Forensic Look - PT 3 - Down The Rabbit Hole with Popeye (6-5-13)



Saturday, June 15, 2013

NSA admits listening to U.S. phone calls without warrants

Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed "simply based on an analyst deciding that."

If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he learned. "I was rather startled," said Nadler, an attorney and congressman who serves on the House Judiciary committee.

Not only does this disclosure shed more light on how the NSA's formidable eavesdropping apparatus works domestically it also suggests the Justice Department has secretly interpreted federal surveillance law to permit thousands of low-ranking analysts to eavesdrop on phone calls.

http://m.cnet.com/news/nsa-admits-listening-to-us-phone-calls-without-warrants/57589495

Recovered Nazi diary gives rare view into Third Reich

It was a mystery for nearly 70 years: What happened to Nazi Party leader Alfred Rosenberg’s diary, a valuable document with insights into the Third Reich?

Rosenberg was the party’s chief ideologue and became a confidante of Adolf Hitler after meeting him in 1921. He joined the party before Hitler and gained fame writing anti-Semitic tracts and editing the Nazi newspaper. He eventually became head of the foreign policy office and was one of the chief architects of the plan to systematically exterminate Jews.

The influential Nazi intellectual was convicted of war crimes at the Nuremberg International Military Tribunal and hanged in October 1946. Parts of his diary — a loose-leaf collection of notes he kept from 1934-1944 were used by the tribunal, but the bulk of the diary, dating from 1936-1944, went missing after the trial.

http://www.cnn.com/2013/06/13/us/nazi-diary/?sr=google_news&google_editors_picks=true

What the NSA Revelations Tell Us about America's Police State

The publication of the FISA order confirms what whistleblowers such as former AT&T technician Mark Klein, Babak Pasdar, as well as NSA insiders William Binney, Russell Tice and Thomas Drake have been warning for years: the architecture of an American police state is not only in place but fully functioning.

http://antifascist-calling.blogspot.com/2013/06/what-nsa-revelations-tell-us-about.html?m=1

New Book Reveals 9/11 Suspects

The U.S. government has turned to 9/11 again in order to justify its program of spying on all Americans and to support a new, expanded war in Syria. Yet as Americans are distracted by these ongoing crimes, the deception behind the origin of the War on Terror is being more fully revealed.

Were the crimes of September 11, 2001 solely the work of Osama bin Laden and nineteen troubled young Arabs, or were more powerful people involved? After a decade of investigation Kevin Ryan, the co-editor of the Journal of 9/11 Studies, offers an evidence-based analysis of nineteen other suspects.

With the support of victim’s families and leading 9/11 researchers, Another Nineteen looks at who was in position to accomplish major elements of the crimes that have yet be explained. Detailed evidence is presented that reveals how each of the alternative suspects had the means, motive and opportunity to accomplish one or more aspects of the 9/11 attacks.

http://911blogger.com/news/2013-06-14/new-book-reveals-911-suspects

http://www.another19.com/index.html/

Friday, June 14, 2013

U.S. Agencies Said to Swap Data With Thousands of Firms

Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence, four people familiar with the process said.

These programs, whose participants are known as trusted partners, extend far beyond what was revealed by Edward Snowden, a computer technician who did work for the National Security Agency. The role of private companies has come under intense scrutiny since his disclosure this month that the NSA is collecting millions of U.S. residents’ telephone records and the computer communications of foreigners from Google Inc (GOOG). and other Internet companies under court order.

http://mobile.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html

Wednesday, June 12, 2013

NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar

THE SECRET WAR
By James Bamford

INFILTRATION. SABOTAGE. MAYHEM. FOR YEARS FOUR-STAR GENERAL KEITH ALEXANDER HAS BEEN BUILDING A SECRET ARMY CAPABLE OF LAUNCHING DEVASTATING CYBERATTACKS.
NOW IT’S READY TO UNLEASH HELL.

http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/

Connecting the Dots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center

BY JAMES BAMFORD

As someone who has written many books and articles about the agency, I have seldom seen the NSA in such a state. Like a night prowler with a bag of stolen goods suddenly caught in a powerful Klieg light, it now finds itself under the glare of nonstop press coverage, accused of robbing the public of its right to privacy. Despite the standard denials from the agency’s public relations office, the documents outline a massive operation to secretly keep track of everyone’s phone calls on a daily basis – billions upon billions of private records; and another to reroute the pipes going in and out of Google, Apple, Yahoo, and the other Internet giants through Fort Meade – figuratively if not literally.

http://www.wired.com/threatlevel/2013/06/nsa-prism-verizon-surveillance/

Edward Snowden: US government has been hacking Hong Kong and China for years

In a frank hour-long interview, the 29-year-old, who US authorities have confirmed is now the subject of a criminal case, said he was neither a hero nor a traitor and that:

US National Security Agency’s controversial Prism programme extends to people and institutions in Hong Kong and mainland China;
The US is exerting “bullying’’ diplomatic pressure on Hong Kong to extradite him;
Hong Kong’s rule of law will protect him from the US;
He is in constant fear for his own safety and that of his family.

http://m.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china

Tuesday, June 11, 2013

From 9/11 To PRISMgate - How The Carlyle Group LBO'd The World's Secrets

The short but profitable tale of how 483,000 private individual have "top secret" access to the nation's most non-public information begins in 2001. "After 9/11, intelligence budgets were increased, new people needed to be hired, it was a lot easier to go to the private sector and get people off the shelf," and sure enough firms like Booz Allen Hamilton - still two-thirds owned by the deeply-tied-to-international-governments investment firm The Carlyle Group - took full advantage of Congress' desire to shrink federal agencies and their budgets by enabling outside consultants (already primed with their $4,000 cost 'security clearances') to fulfill the needs of an ever-more-encroaching-on-privacy administration.

http://www.zerohedge.com/news/2013-06-10/911-prismgate-how-carlyle-group-lbod-worlds-secrets

Monday, June 10, 2013

Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law

Are you on the list?  Are you one of the millions of Americans that have been designated a threat to national security by the U.S. government?  Will you be subject to detention when martial law is imposed during a major national emergency?  As you will see below, there is actually a list that contains the names of at least 8 million Americans known as Main Core that the U.S. intelligence community has been compiling since the 1980s.

http://www.activistpost.com/2013/06/main-core-list-of-millions-of-americans.html?m=1

Booz Allen Hamilton: Edward Snowden's US contracting firm

Booz Allen Hamilton, Edward Snowden's employer, is one of America's biggest security contractors and a significant part of the constantly revolving door between the US intelligence establishment and the private sector.

The current of director of national intelligence (DNI), James Clapper, who issued a stinging attack on the intelligence leaks this weekend, is a former Booz Allen executive. The firm's current vice-chairman, Mike McConnell, was DNI under the George W Bush administration. He worked for the Virginia-based company before taking the job, and returned to the firm after leaving it. The company website says McConnell is responsible for its "rapidly expanding cyber business".

http://m.guardiannews.com/world/2013/jun/09/booz-allen-hamilton-edward-snowden

What’s in the Rest of the Top-Secret NSA PowerPoint Deck?

What’s in Edward Snowden’s 41-slide PowerPoint deck that’s so hot that nobody dare publish it?

Now that Snowden has revealed himself to the world as the NSA whistleblower, details about his interaction with the press are surfacing. And at the center of the drama is a still mostly unpublished 41-slide presentation, classified top secret, that Snowden gave to the Washington Post and the Guardian to expose the NSA’s internet spying operation “PRISM.”

Only five slides from the presentation have been published. The other 36 remain a mystery. Both the Guardian’s Glenn Greenwald and the Post’s Barton Gellman have made it clear that the rest of the PowerPoint is dynamite stuff … which we’re not going to be seeing any time soon.

http://www.wired.com/threatlevel/2013/06/snowden-powerpoint/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired27b+%28Wired%3A+Blog+-+Threat+Level%29

Sunday, June 9, 2013

Edward Snowden: the whistleblower behind the NSA surveillance revelations

The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell.

The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. "I have no intention of hiding who I am because I know I have done nothing wrong," he said.

Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world's most secretive organisations – the NSA.

http://m.guardiannews.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance



Ex-CIA worker says he’s source of the NSA leak

Edward Snowden, a 29-year-old former undercover CIA employee, unmasked himself Sunday as the principal source of recent Washington Post and Guardian disclosures about top-secret National Security Agency programs.

Snowden, who has contracted for the NSA and works for the consulting firm Booze Allen Hamilton, denounced what he described as systematic surveillance of innocent citizens and said in an interview that “it’s important to send a message to government that people will not be intimidated.

”Director of National Intelligence James R. Clapper Jr. said Saturday that the NSA had initiated a Justice Department investigation into who leaked the information — an investigation supported by intelligence officials in Congress.

http://m.washingtonpost.com/politics/intelligence-leaders-push-back-on-leakers-media/2013/06/09/fff80160-d122-11e2-a73e-826d299ff459_story.html

NSA's Prism surveillance program: how it works and what it can do

Slide from secret PowerPoint presentation describes how program collects data 'directly from the servers' of tech firms

http://m.guardiannews.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google

Boundless Informant: the NSA's secret tool to track global surveillance data

Glenn Greenwald and Ewen MacAskill

The National Security Agency has developed a powerful tool for recording and analysing where its intelligence comes from, raising questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications.

The Guardian has acquired top-secret documents about the NSA datamining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks.

http://m.guardiannews.com/world/2013/jun/08/nsa-boundless-informant-global-datamining

Whistleblower’s NSA warning: ‘Just the tip of the iceberg’

William Binney, an award-winning mathematician and noted NSA whistleblower, says the collection dates back to when the super-secret agency began domestic surveillance after the Sept. 11 attacks.“I believe they’ve been collecting data about all domestic calls since October 2001,” said Mr. Binney, who worked at NSA for more than 30 years. “That’s more than a billion calls a day.”He called his figures “back of the envelope” estimates, adding that they include emails as well as telephone calls.

Mr. Binney, who left the agency in October 2001, said the data were collected under a highly classified NSA program code-named “Stellar Wind,” which was part of the warrantless domestic wiretapping effort — the Terrorist Surveillance Program — launched on orders from President George W. Bush.

The Terrorist Surveillance Program was revealed by The New York Times in 2005, but officials said it only monitored calls between Americans and suspected terrorists abroad. The Bush administration said it based the program’s legal authority on the president’s powers as commander-in-chief.Congress subsequently amended the law governing wiretapping by spy agencies — the 1978 Foreign Intelligence Surveillance Act (FISA) — to provide legislative authority for the program and require supervision by the special secret court the 1978 act established.

http://m.washingtontimes.com/news/2013/jun/7/the-national-security-agencys-collection-of-phone-/

How the U.S. Uses Technology to Mine More Data More Quickly

By JAMES RISEN and ERIC LICHTBLAU
June 8, 2013

The partnership between the intelligence community and Palantir Technologies, a Palo Alto, Calif., company founded by a group of inventors from PayPal, is just one of many that the National Security Agency and other agencies have forged as they have rushed to unlock the secrets of “Big Data.”

Today, a revolution in software technology that allows for the highly automated and instantaneous analysis of enormous volumes of digital information has transformed the N.S.A., turning it into the virtual landlord of the digital assets of Americans and foreigners alike. The new technology has, for the first time, given America’s spies the ability to track the activities and movements of people almost anywhere in the world without actually watching them or listening to their conversations.

New disclosures that the N.S.A. has secretly acquired the phone records of millions of Americans and access to e-mails, videos and other data of foreigners from nine United States Internet companies have provided a rare glimpse into the growing reach of the nation’s largest spy agency. They have also alarmed the government: on Saturday night, Shawn Turner, a spokesman for the director of national intelligence, said that “a crimes report has been filed by the N.S.A.”

http://mobile.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html

Saturday, June 8, 2013

GCHQ Also Accesses PRISM

The UK’s electronic eavesdropping and security agency, GCHQ, has been secretly gathering intelligence from the world’s biggest internet companies through a covertly run operation set up by America’s top spy agency, documents obtained by the Guardian reveal.

The documents show that GCHQ, based in Cheltenham, has had access to the system since at least June 2010, and generated 197 intelligence reports from it last year.

The US-run programme, called Prism, would appear to allow GCHQ to circumvent the formal legal process required to seek personal material such as emails, photos and videos from an internet company based outside the UK.

http://m.guardiannews.com/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-prism

NSA Built Back Door In All Windows Software by 1999

Government Built Spy-Access Into Most Popular Consumer Programs Before 9/11

In researching the stunning pervasiveness of spying by the government (it’s much more wide spread than you’ve heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.

Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software:

http://www.washingtonsblog.com/2013/06/microsoft-programmed-in-nsa-backdoor-in-windows-by-1999.html

Obama orders US to draw up overseas target list for cyber-attacks

Glenn Greenwald and Ewen MacAskill
The Guardian

Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals.

The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) “can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging”.

It says the government will “identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power”.

http://m.guardiannews.com/world/2013/jun/07/obama-china-targets-cyber-overseas

Exclusive: Top NSA Whistleblower Spills the Beans on the Real Scope of the Spying Program

Top NSA Official: Government Tapping CONTENT, Not Just Metadata … Using Bogus “Secret Interpretation” of Patriot Act

http://www.washingtonsblog.com/2013/06/exclusive-top-nsa-whistleblower-spills-the-beans-on-the-real-scope-of-the-spying-program.html

Thursday, June 6, 2013

NSA taps in to internet giants' systems to mine user data, secret files reveal

Glenn Greenwald

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called PRISM, which allows them to collect material including search history, the content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims "collection directly from the servers" of major US service providers.

http://m.guardiannews.com/world/2013/jun/06/us-tech-giants-nsa-data

U.S. intelligence mining data from nine U.S. Internet companies in broad secret program

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.

The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who know about PRISM were bound by oaths of office to hold their tongues.

http://m.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html

Graham: FBI hindered Congress’s 9/11 inquiry, withheld reports about Sarasota Saudis

Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congress’s Joint Inquiry into 9/11 by withholding information about a Florida connection to the al-Qaeda attacks that killed nearly 3,000 people.

The information, first reported by BrowardBulldog.org in 2011, includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota “to individuals associated with the terrorist attacks on 9/11/2001.”

“The FBI’s failure to call (to the Joint Inquiry’s attention) documents finding ‘many connections’ between Saudis living in the United States and individuals associated with the terrorist attack(s)…interfered with the Inquiry’s ability to complete its mission,” said Graham, co-chairman of the Joint Inquiry.

http://www.miamiherald.com/2013/06/05/3434487/graham-fbi-hindered-congresss.html

NSA collecting phone records of millions daily, court order reveals

Glenn Greenwald
The Guardian Wed.5 June 2013

The National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, one of America’s largest telecoms providers, under a top secret court order issued in April.

The order, a copy of which has been obtained by the Guardian, requires Verizon on an “ongoing, daily basis” to give the NSA information on all telephone calls in its systems, both within the US and between the US and other countries.

The document shows for the first time that under the Obama administration the communication records of millions of US citizens are being collected indiscriminately and in bulk – regardless of whether they are suspected of any wrongdoing.

http://m.guardiannews.com/world/2013/jun/06/nsa-phone-records-verizon-court-order



Bilderberg Group? No conspiracy, just the most influential group in the world

Conspiracy theorists claim it is a shadow world government. Former leading members tell the Telegraph it was the most useful meeting they ever went to and it was crucial in forming the European Union. Today, the Bilderberg Group meets in Britain.

http://www.telegraph.co.uk/news/politics/10102168/Bilderberg-Group-No-conspiracy-just-the-most-influential-group-in-the-world.html

Dept. of Homeland Security: Laptops, Phones Can Be Searched Based on Hunches

U.S. border agents should continue to be allowed to search a traveler’s laptop, cellphone or other electronic device and keep copies of any data on them based on no more than a hunch, according to an internal Homeland Security Department study. It contends limiting such searches would prevent the U.S. from detecting child pornographers or terrorists and expose the government to lawsuits.

The 23-page report, obtained by The Associated Press and the American Civil Liberties Union under the U.S. Freedom of Information Act, provides a rare glimpse of the Obama administration’s thinking on the long-standing but controversial practice of border agents and immigration officers searching and in some cases holding for weeks or months the digital devices of anyone trying to enter the U.S.

http://washington.cbslocal.com/2013/06/05/dept-of-homeland-security-laptops-phones-can-be-searched-based-on-hunches/

Tuesday, June 4, 2013

Beyond Bilderberg



Bilderberg’s 60-Year Trajectory Exposed

Jurriaan Maessen
ExplosiveReports.Com
June 4, 2013

Some commenters in mainstream media are trying to downplay Bilderberg’s historical significance by suggesting the annual confabulation is a mostly reactionary body, contemplating current events but never steering them.

Studying the few reports that have managed to slip past the censors in the course of the previous decades, we can see that both the European Union and the European single currency have been nurtured and guided by the far-reaching hands of Bilderberg. For example, in the leaked transcript from the 1955 Bilderberg meeting (chaired by prince Bernhard of the Netherlands) participants speak of the “pressing need to bring the German people, together with the other peoples of Europe, into a common market”, and the desire is expressed to “arrive in the shortest possible time at the highest degree of integration, beginning with a common European market.”

http://explosivereports.com/2013/06/04/bilderbergs-60-year-trajectory-exposed/

Monday, June 3, 2013

Bradley Manning trial begins 3 years after arrest…

Bradley Manning trial 'dangerous' for civil liberties – experts

Laurence Tribe, a Harvard professor who is considered to be the foremost liberal authority on constitutional law in the US and who taught the subject to President Barack Obama, told the Guardian that the charge could set a worrying precedent. He said: "Charging any individual with the extremely grave offense of 'aiding the enemy' on the basis of nothing beyond the fact that the individual posted leaked information on the web and thereby 'knowingly gave intelligence information' to whoever could gain access to it there, does indeed seem to break dangerous new ground."

Tribe, who advised the department of justice in Obama's first term, added that the trial could have "far-reaching consequences for chilling freedom of speech and rendering the internet a hazardous environment, well beyond any demonstrable national security interest."

http://m.guardiannews.com/world/2013/jun/03/bradley-manning-wikileaks-trial-aiding-enemy?guni=Network%20front:network-front%20main-3%20Main%20trailblock:Network%20front%20-%20main%20trailblock:Position1

Supreme Court OKs Taking DNA From Arrestees

Deciding its biggest genetic privacy case of the term, a fractured Supreme Court said today that the states may take DNA samples from anybody arrested for serious crimes.

Privacy groups and law enforcement officials were closely watching the case because at least 27 states and the federal government have regulations requiring suspects to give a DNA sample upon some type of arrest, regardless of conviction. In all the states with such laws, the DNA records are cataloged in state and federal crime-fighting databases.

In a 5-4 decision, (.pdf) the justices reversed a 2012 ruling from Maryland’s top court, which had said that it was a breach of the Fourth Amendment right against unreasonable search and seizure to take, without warrants, DNA samples from suspects who have been arrested for crimes ranging from attempted burglary to murder.

http://www.wired.com/threatlevel/2013/06/scotus-dna-testing/

Bilderberg Releases 2013 Agenda

Jurriaan Maessen
ExplosiveReports.Com
June 3, 2013

In addition to the list of particpants released today, the official Bilderberg website has released the key topics that will be discussed at the conference.

The key topics for discussion this year include:
• Can the US and Europe grow faster and create jobs?
• Jobs, entitlement and debt
• How big data is changing almost everything
• Nationalism and populism
• US foreign policy
• Africa’s challenges
• Cyber warfare and the proliferation of asymmetric threats
• Major trends in medical research
• Online education: promise and impacts
• Politics of the European Union
• Developments in the Middle East
• Current affairs

http://explosivereports.com/2013/06/03/breaking-bilderberg-releases-2013-agenda/

http://www.bilderbergmeetings.org/meeting_2013.html

Bilderberg 2013 List of Participants Released

Jurriaan Maessen
ExplosiveReports.Com
June 3, 2013

The official Bilderberg website has today released the official list of participants for the upcoming Bilderberg conference near Watford UK.

Current list of Participants
Status 3 June 2013

Chairman

FRA Castries, Henri de Chairman and CEO, AXA Group

DEU Achleitner, Paul M. Chairman of the Supervisory Board, Deutsche Bank AG
DEU Ackermann, Josef Chairman of the Board, Zurich Insurance Group Ltd
GBR Agius, Marcus Former Chairman, Barclays plc
GBR Alexander, Helen Chairman, UBM plc
USA Altman, Roger C. Executive Chairman, Evercore Partners
FIN Apunen, Matti Director, Finnish Business and Policy Forum EVA
USA Athey, Susan Professor of Economics, Stanford Graduate School of Business
TUR Aydıntaşbaş, Aslı Columnist, Milliyet Newspaper
TUR Babacan, Ali Deputy Prime Minister for Economic and Financial Affairs
GBR Balls, Edward M. Shadow Chancellor of the Exchequer
PRT Balsemão, Francisco Pinto Chairman and CEO, IMPRESA
FRA Barré, Nicolas Managing Editor, Les Echos
INT Barroso, José M. Durão President, European Commission
FRA Baverez, Nicolas Partner, Gibson, Dunn & Crutcher LLP
FRA Bavinchove, Olivier de Commander, Eurocorps
GBR Bell, John Regius Professor of Medicine, University of Oxford
ITA Bernabè, Franco Chairman and CEO, Telecom Italia S.p.A.
USA Bezos, Jeff Founder and CEO, Amazon.com
SWE Bildt, Carl Minister for Foreign Affairs
SWE Borg, Anders Minister for Finance
NLD Boxmeer, Jean François van Chairman of the Executive Board and CEO, Heineken N.V.
NOR Brandtzæg, Svein Richard President and CEO, Norsk Hydro ASA
AUT Bronner, Oscar Publisher, Der Standard Medienwelt
GBR Carrington, Peter Former Honorary Chairman, Bilderberg Meetings
ESP Cebrián, Juan Luis Executive Chairman, Grupo PRISA
CAN Clark, W. Edmund President and CEO, TD Bank Group
GBR Clarke, Kenneth Member of Parliament
DNK Corydon, Bjarne Minister of Finance
GBR Cowper-Coles, Sherard Business Development Director, International, BAE Systems plc
ITA Cucchiani, Enrico Tommaso CEO, Intesa Sanpaolo SpA
BEL Davignon, Etienne Minister of State; Former Chairman, Bilderberg Meetings
GBR Davis, Ian Senior Partner Emeritus, McKinsey & Company
NLD Dijkgraaf, Robbert H. Director and Leon Levy Professor, Institute for Advanced Study
TUR Dinçer, Haluk President, Retail and Insurance Group, Sabancı Holding A.S.
GBR Dudley, Robert Group Chief Executive, BP plc
USA Eberstadt, Nicholas N. Henry Wendt Chair in Political Economy, American Enterprise Institute
NOR Eide, Espen Barth Minister of Foreign Affairs
SWE Ekholm, Börje President and CEO, Investor AB
DEU Enders, Thomas CEO, EADS
USA Evans, J. Michael Vice Chairman, Goldman Sachs & Co.
DNK Federspiel, Ulrik Executive Vice President, Haldor Topsøe A/S
USA Feldstein, Martin S. Professor of Economics, Harvard University; President Emeritus, NBER
FRA Fillon, François Former Prime Minister
USA Fishman, Mark C. President, Novartis Institutes for BioMedical Research
GBR Flint, Douglas J. Group Chairman, HSBC Holdings plc
IRL Gallagher, Paul Senior Counsel
USA Geithner, Timothy F. Former Secretary of the Treasury
USA Gfoeller, Michael Political Consultant
USA Graham, Donald E. Chairman and CEO, The Washington Post Company
DEU Grillo, Ulrich CEO, Grillo-Werke AG
ITA Gruber, Lilli Journalist – Anchorwoman, La 7 TV
ESP Guindos, Luis de Minister of Economy and Competitiveness
GBR Gulliver, Stuart Group Chief Executive, HSBC Holdings plc
CHE Gutzwiller, Felix Member of the Swiss Council of States
NLD Halberstadt, Victor Professor of Economics, Leiden University; Former Honorary Secretary General of Bilderberg Meetings
FIN Heinonen, Olli Senior Fellow, Belfer Center for Science and International Affairs, Harvard Kennedy School of Government
GBR Henry, Simon CFO, Royal Dutch Shell plc
FRA Hermelin, Paul Chairman and CEO, Capgemini Group
ESP Isla, Pablo Chairman and CEO, Inditex Group
USA Jacobs, Kenneth M. Chairman and CEO, Lazard
USA Johnson, James A. Chairman, Johnson Capital Partners
CHE Jordan, Thomas J. Chairman of the Governing Board, Swiss National Bank
USA Jordan, Jr., Vernon E. Managing Director, Lazard Freres & Co. LLC
USA Kaplan, Robert D. Chief Geopolitical Analyst, Stratfor
USA Karp, Alex Founder and CEO, Palantir Technologies
GBR Kerr, John Independent Member, House of Lords
USA Kissinger, Henry A. Chairman, Kissinger Associates, Inc.
USA Kleinfeld, Klaus Chairman and CEO, Alcoa
NLD Knot, Klaas H.W. President, De Nederlandsche Bank
TUR Koç, Mustafa V. Chairman, Koç Holding A.S.
DEU Koch, Roland CEO, Bilfinger SE
USA Kravis, Henry R. Co-Chairman and Co-CEO, Kohlberg Kravis Roberts & Co.
USA Kravis, Marie-Josée Senior Fellow and Vice Chair, Hudson Institute
CHE Kudelski, André Chairman and CEO, Kudelski Group
GRC Kyriacopoulos, Ulysses Chairman, S&B Industrial Minerals S.A.
INT Lagarde, Christine Managing Director, International Monetary Fund
DEU Lauk, Kurt J. Chairman of the Economic Council to the CDU, Berlin
USA Lessig, Lawrence Roy L. Furman Professor of Law and Leadership, Harvard Law School; Director, Edmond J. Safra Center for Ethics, Harvard University
BEL Leysen, Thomas Chairman of the Board of Directors, KBC Group
DEU Lindner, Christian Party Leader, Free Democratic Party (FDP NRW)
SWE Löfven, Stefan Party Leader, Social Democratic Party (SAP)
DEU Löscher, Peter President and CEO, Siemens AG
GBR Mandelson, Peter Chairman, Global Counsel; Chairman, Lazard International
USA Mathews, Jessica T. President, Carnegie Endowment for International Peace
CAN McKenna, Frank Chair, Brookfield Asset Management
GBR Micklethwait, John Editor-in-Chief, The Economist
FRA Montbrial, Thierry de President, French Institute for International Relations
ITA Monti, Mario Former Prime Minister
USA Mundie, Craig J. Senior Advisor to the CEO, Microsoft Corporation
ITA Nagel, Alberto CEO, Mediobanca
NLD Netherlands, H.R.H. Princess Beatrix of The
USA Ng, Andrew Y. Co-Founder, Coursera
FIN Ollila, Jorma Chairman, Royal Dutch Shell, plc
GBR Omand, David Visiting Professor, King’s College London
GBR Osborne, George Chancellor of the Exchequer
USA Ottolenghi, Emanuele Senior Fellow, Foundation for Defense of Democracies
TUR Özel, Soli Senior Lecturer, Kadir Has University; Columnist, Habertürk Newspaper
GRC Papahelas, Alexis Executive Editor, Kathimerini Newspaper
TUR Pavey, Şafak Member of Parliament (CHP)
FRA Pécresse, Valérie Member of Parliament (UMP)
USA Perle, Richard N. Resident Fellow, American Enterprise Institute
USA Petraeus, David H. General, U.S. Army (Retired)
PRT Portas, Paulo Minister of State and Foreign Affairs
CAN Prichard, J. Robert S. Chair, Torys LLP
INT Reding, Viviane Vice President and Commissioner for Justice, Fundamental Rights and Citizenship, European Commission
CAN Reisman, Heather M. CEO, Indigo Books & Music Inc.
FRA Rey, Hélène Professor of Economics, London Business School
GBR Robertson, Simon Partner, Robertson Robey Associates LLP; Deputy Chairman, HSBC Holdings
ITA Rocca, Gianfelice Chairman,Techint Group
POL Rostowski, Jacek Minister of Finance and Deputy Prime Minister
USA Rubin, Robert E. Co-Chairman, Council on Foreign Relations; Former Secretary of the Treasury
NLD Rutte, Mark Prime Minister
AUT Schieder, Andreas State Secretary of Finance
USA Schmidt, Eric E. Executive Chairman, Google Inc.
AUT Scholten, Rudolf Member of the Board of Executive Directors, Oesterreichische Kontrollbank AG
PRT Seguro, António José Secretary General, Socialist Party
FRA Senard, Jean-Dominique CEO, Michelin Group
NOR Skogen Lund, Kristin Director General, Confederation of Norwegian Enterprise
USA Slaughter, Anne-Marie Bert G. Kerstetter ’66 University Professor of Politics and International Affairs, Princeton University
IRL Sutherland, Peter D. Chairman, Goldman Sachs International
GBR Taylor, Martin Former Chairman, Syngenta AG
INT Thiam, Tidjane Group CEO, Prudential plc
USA Thiel, Peter A. President, Thiel Capital
USA Thompson, Craig B. President and CEO, Memorial Sloan-Kettering Cancer Center
DNK Topsøe, Jakob Haldor Partner, AMBROX Capital A/S
FIN Urpilainen, Jutta Minister of Finance
CHE Vasella, Daniel L. Honorary Chairman, Novartis AG
GBR Voser, Peter R. CEO, Royal Dutch Shell plc
CAN Wall, Brad Premier of Saskatchewan
SWE Wallenberg, Jacob Chairman, Investor AB
USA Warsh, Kevin Distinguished Visiting Fellow, The Hoover Institution, Stanford University
CAN Weston, Galen G. Executive Chairman, Loblaw Companies Limited
GBR Williams of Crosby, Shirley Member, House of Lords
GBR Wolf, Martin H. Chief Economics Commentator, The Financial Times
USA Wolfensohn, James D. Chairman and CEO, Wolfensohn and Company
GBR Wright, David Vice Chairman, Barclays plc
INT Zoellick, Robert B. Distinguished Visiting Fellow, Peterson Institute for International Economics

http://explosivereports.com/2013/06/03/breaking-bilderberg-2013-list-of-participants-released/

http://www.bilderbergmeetings.org/participants2013.html

Sunday, June 2, 2013

The Military-Industrial Complex in the 50s and 60s

4/16/1953 "Every gun that is fired, every warship launched, every rocket fired signifies in the final sense a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children.... We pay for a single fighter plane with a half million bushels of wheat (by 1987, the price was twenty million bushels). We pay for a single destroyer with new homes that could have housed more than eight thousand people.. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."

-- Dwight David Eisenhower's Cross of Iron speech

https://deeppoliticsforum.com/forums/showthread.php?11701-The-Military-Industrial-Complex-in-the-50s-and-60s

FBI Director Candidate Comey Complicit in “Dark Chapter” in US History

Former Deputy Attorney General Played Leading Role in Cover-Up of US Government Informant’s Participation in Mass Murder in Mexico

http://narcosphere.narconews.com/notebook/bill-conroy/2013/06/fbi-director-candidate-comey-complicit-dark-chapter-us-history

Google Is Ordered To Give Private Customer Data To The FBI

A U.S. judge has ordered Google to comply with FBI secret demands for customer data, despite earlier ruling the warrantless orders unconstitutional.

District court judge Susan Illston this week rejected the Internet search giant’s argument that so-called National Security Letters (NSLs) violated its constitutional rights.

As such it ordered Google to hand over private information relating to U.S. citizens to federal agents.
It comes despite Illston earlier ruling the letters unconstitutional in a separate case in March. In that case, brought by non-profit advocacy group the Electronic Frontier Foundation, the judge said that such demands violated the right to free speech.

http://m.guardiannews.com/technology/2013/jun/01/google-ordered-hand-over-data-fbi

Saturday, June 1, 2013

Why Didn't the SEC Catch Madoff? It Might Have Been Policy Not To

More and more embarrassing stories of keep leaking out of the SEC, which is beginning to look somehow worse than corrupt – it's hard to find the right language exactly, but "aggressively clueless" comes pretty close to summing up the atmosphere that seems to be ruling the country's top financial gendarmes. 

The most recent contribution to the broadening canvas of dysfunction and incompetence surrounding the SEC is a whistleblower complaint filed by 56-year-old Kathleen Furey, a senior lawyer who worked in the New York Regional Office (NYRO), the agency outpost with direct jurisdiction over Wall Street.

Furey's complaint is full of startling revelations about the SEC, but the most amazing of them is that Furey and the other 20-odd lawyers who worked in her unit at the NYRO were actually barred by a superior from bringing cases under two of the four main securities laws governing Wall Street, the Investment Advisors Act of 1940 and the Investment Company Act of 1940.

According to Furey, her group at the SEC's New York office, from a period stretching for over half a decade through December, 2008, did not as a matter of policy pursue cases against investment managers like Bernie Madoff. Furey says she was told flatly by her boss, Assistant Regional Director George Stepaniuk, that "We do not do IM cases."

http://www.rollingstone.com/politics/blogs/taibblog/why-didnt-the-sec-catch-madoff-it-might-have-been-policy-not-to-20130531