Wednesday, July 31, 2013

X-Keyscore: NSA tool collects ‘nearly everything a user does on the internet’

Glenn Greenwald

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

The Chilling History of How Hollywood Helped Hitler

In devastating detail, an excerpt from a controversial new book reveals how the big studios, desperate to protect German business, let Nazis censor scripts, remove credits from Jews, get movies stopped and even force one MGM executive to divorce his Jewish wife.

http://m.hollywoodreporter.com/news/how-hollywood-helped-hitler-595684

Tuesday, July 30, 2013

Bradley Manning Found Guilty On Most Counts, Acquitted of 'Aiding the Enemy' -- Faces Over 100 Years in Prison

The military intelligence analyst was found not guilty on the most serious charge of "aiding the enemy," but was found guilty of violating the Espionage Act.

http://www.alternet.org/news-amp-politics/wikileaks-source-bradley-manning-verdict

The 25 largest Banks in the world, The largest “private” American bank ranks 8th

And you thought we had the fattest banking cats. Not so.

1Industrial & Commercial Bank …
$2,813.5B

China
2HSBC Holdings
2,692.5

United Kingdom
3Deutsche Bank
2,655.7

Germany
4BNP Paribas
2,517.1

France
5Mitsubishi UFJ Financial Group
2,488.8

Japan
6Credit Agricole
2,431.4

France
7Barclays
2,420.6

United Kingdom
8JPMorgan Chase
2,359.1

United States
9Bank of America
2,258.5

United States
10China Construction Bank
$2,241.0B

China
11Royal Bank of Scotland Group
2,131.4

United Kingdom
12Agricultural Bank of China
2,124.2

China
13Bank of China
2,033.8

China
14Mizuho Financial Group
1,882.9

Japan
15Citigroup
1,864.7

United States
16Banco Santander
1,675.5

Spain
17Societe Generale
1,650.5

France
18Sumitomo Mitsui Financial Gro…
1,578.2

Japan
19Lloyds Banking Group
1,501.7

United Kingdom
20Wells Fargo
1,423.0

United States
21UBS
1,376.8

Switzerland
22UniCredit
$1,223.1B

Italy
23Credit Suisse Group
1,010.6

Switzerland
24Goldman Sachs Group
938.6

United States
25Nordea Bank
894.0

Sweden

http://www.againstcronycapitalism.org/2013/07/the-25-largest-banks-in-the-world-the-largest-private-american-bank-ranks-8th/

Bank of England helped sell looted Nazi gold

The Bank of England played a vital role in one of the darkest episodes in central banking history, facilitating the sale of gold looted by the Nazis after their invasion of Czechoslovakia in 1938.

According to a hitherto unpublished history of the BoE’s activities in and around the Second World War, the U.K.’s central bank sold gold on behalf of the Reichsbank – which Germany’s central bank had seized from its Czech counterpart – after the U.K. government had frozen all Czech assets held in Britain following the Nazi invasion.
In March 1939, gold valued at the time at £5.6-million ($8.8-million) was transferred from the National Bank of Czechoslovakia’s account at the Bank for International Settlements (BIS), the so-called central bankers’ bank, to an account managed on behalf of the Reichsbank.

http://m.theglobeandmail.com/report-on-business/international-business/european-business/bank-of-england-helped-sell-looted-nazi-gold/article13497849/?service=mobile

Cops Can Track Cellphones Without Warrants, Appeals Court Rules

A divided federal appeals court ruled today that the government does not need a probable-cause warrant to access mobile-phone subscribers’ cell-site information, a decision reversing lower court decisions that said the location data was protected by the Fourth Amendment.

The 2-1 decision by the 5th U.S. Circuit Court of Appeals is the third federal appeals court to decide the privacy issue. Adding to the possibility that the U.S. Supreme Court might take up the topic, New Jersey’s high court two weeks ago ruled that warrants were required for the location data.

http://www.wired.com/threatlevel/2013/07/warrantless-cell-tracking/

Sunday, July 28, 2013

'Big Data' Dynamo: How Giant Tech Firms Help the Government Spy on Us and Gut Privacy

Ever since former NSA contractor Edward Snowden began leaking secrets to media outlets about government surveillance programs, one fact stands out: The zero probability these privacy-killing projects would be practical without close (and very profitable) "arrangements" made with phone companies, internet service providers and other technology giants.

Indeed, a top secret NSA Inspector General's report published by The Guardian, revealed that the agency "maintains relationships with over 100 US companies," adding that the US has the "home field advantage as the primary hub for worldwide telecommunications."

http://antifascist-calling.blogspot.com/2013/07/big-data-dynamo-how-giant-tech-firms.html?m=1

FBI Using Drones for Warrantless Surveillance Inside U.S.

Earlier this year, the US Federal Bureau of Investigation (FBI) publicly revealed for the first time in a hearing that it has been using drones to conduct surveillance operations inside the country, a striking admission, given that domestic drone is a subject of intense debate and there’s still not a clear set of rules governing the practice. Now, under prodding from Senator Rand Paul (R-KY), the FBI has finally offered a few more details about its use of drones, namely, in how many cases it’s deployed them, and its rationale for not seeking a search warrant. “Since late 2006, the FBI has conducted surveillance using UAVs [unmanned aerial vehicles] in eight criminal cases and two national security cases,” wrote Stephen D. Kelly, the FBI’s assistant director for the Office of Congressional Affairs, in a letter to Paul. In a footnote added to this statement, Kelly explains drones were also approved in three other cases, but the FBI didn’t use them.

http://mobile.theverge.com/2013/7/26/4559870/fbi-drone-surveillance-in-the-us-10-cases-rand-paul

Lawmakers Who Upheld NSA Phone Spying Received Double the Defense Industry Cash

The numbers tell the story — in votes and dollars. On Wednesday, the House voted 217 to 205 not to rein in the NSA’s phone-spying dragnet. It turns out that those 217 “no” voters received twice as much campaign financing from the defense and intelligence industry as the 205 “yes vote/voters"

http://www.wired.com/threatlevel/2013/07/money-nsa-vote/

New DHS Headquarters was a CIA MKUltra Test Facility

DHS’s new digs used for secret mind-altering experimentation.

http://www.infowars.com/new-dhs-headquarters-was-an-mkultra-test-facility/

Saturday, July 27, 2013

Cable Box Spying On You? Behavior-Detecting Devices Worry Privacy Advocates

News that Google Inc. (NASDAQ:GOOG) may be developing a television set-top box with a motion sensor and video camera has rekindled the debate over technology that can record so-called ambient action. Should a TV-mounted box have the ability to track our movements, record our voices and monitor our behaviors? Should cable providers and tech companies be allowed to collect such information without our consent?

http://www.ibtimes.com/your-cable-box-spying-you-behavior-detecting-devices-verizon-microsoft-others-worry-privacy-1361587

Thursday, July 25, 2013

Feds tell Web firms to turn over user account passwords

The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.

If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.

http://m.cnet.com/news/feds-tell-web-firms-to-turn-over-user-account-passwords/57595529

Wednesday, July 24, 2013

Feds put heat on Web firms for master encryption keys

The U.S. government has attempted to obtain the master encryption keys that Internet companies use to shield millions of users' private Web communications from eavesdropping.

These demands for master encryption keys, which have not been disclosed previously, represent a technological escalation in the clandestine methods that the FBI and the National Security Agency employ when conducting electronic surveillance against Internet users.

http://m.cnet.com/news/feds-put-heat-on-web-firms-for-master-encryption-keys/57595202?ds=1

Goldman Sachs Contains 4,000 Separate Corporate Entities

Seeking to follow the oligarchy's money, the London-based Open Data Institute has collected and mapped corporate data, much of it made public for the first time, showing the complex relationships between multinational companies and their global subsidiaries. Stunning visuals on the corporate networks of the six biggest banks in the U.S. - Goldman Sachs, Bank of America, Morgan Stanley, Wells Fargo, Citigroup and JP Morgan - show the tangled webs they weave.

http://www.commondreams.org/further/2013/07/19-1

Monday, July 22, 2013

CDC Admits 98 Million Americans Received Polio Vaccine In An 8-Year Span When It Was Contaminated With Cancer Causing Virus

The CDC has quickly removed a page from their website, which is now cached here , admitting that more than 98 million Americans received one or more doses of polio vaccine within an 8-year span from 1955-1963 when a proportion of the vaccine was contaminated with a cancer causing polyomavirus called SV40. It has been estimated that 10-30 million Americans could have received an SV40 contaminated dose of the vaccine.

http://www.blacklistednews.com/CDC_Admits_98_Million_Americans_Received_Polio_Vaccine_In_An_8-Year_Span_When_It_Was_Contaminated_With_Cancer_Causing_Virus_/27538/0/0/0/Y/M.html

Saturday, July 20, 2013

Rise of the Warrior Cop

Is it time to reconsider the militarization of American policing?

Since the 1960s, in response to a range of perceived threats, law-enforcement agencies across the U.S., at every level of government, have been blurring the line between police officer and soldier. Driven by martial rhetoric and the availability of military-style equipment—from bayonets and M-16 rifles to armored personnel carriers—American police forces have often adopted a mind-set previously reserved for the battlefield. The war on drugs and, more recently, post-9/11 antiterrorism efforts have created a new figure on the U.S. scene: the warrior cop—armed to the teeth, ready to deal harshly with targeted wrongdoers, and a growing threat to familiar American liberties.

http://m.us.wsj.com/articles/a/SB10001424127887323848804578608040780519904?mg=reno64-wsj#

Friday, July 19, 2013

The NSA’s Massive Data Center Is Coming Online Ahead Of Schedule — And It’s More Powerful Than You Thought

The National Security Agency's massive Utah Data Center, designed for communications storage and processing is already up and running, despite agency claims the center won't open until September. Opening the facility — the largest of its kind in history — is the key final step that will allow the agency to collect and store massive amounts of data on United States citizens. The NSA has numerous other data centers, but the Utah facility will be the central repository, enabling data collection on an unprecedented scale.

http://www.buzzfeed.com/justinesharrock/the-nsas-massive-data-center-is-coming-online-ahead-of-sched?s=mobile

CIA Is Funding Government-Led Chemtrailing Project

The Central Intelligence Agency is funding a scientific study that will investigate whether humans could use geoengineering to alter Earth's environment and stop climate change. The National Academy of Sciences (NAS) will run the 21-month project, which is the first NAS geoengineering study financially supported by an intelligence agency. With the spooks' money, scientists will study how humans might influence weather patterns, assess the potential dangers of messing with the climate, and investigate possible national security implications of geoengineering attempts.

http://m.motherjones.com/politics/2013/07/cia-geoengineering-control-climate-change

The Documents behind the Birth of FISA, the Invisible Hand Granting NSA’s Surveillance the Legal ‘OK’

The Court was formally established in 1978 by the Foreign Intelligence Surveillance Act to review applications for monitoring the communications of American citizens suspected of involvement in espionage or terrorist activities. The legislation was both a result of concerns over the NSA’s domestic surveillance practices of the 1970s, as well as over the findings of the Church Committee’s investigations into Richard Nixon’s abuses of federal authority to spy on his rivals.

FISA was signed into law by President Carter, but the debate over the NSA’s warrantless wiretapping began during the Ford administration. A March 1976 memo from White House counsel Philip Buchen details President Ford’s ultimate support of legislation to regulate the NSA’s wiretapping of American citizens only after strong objections from Donald Rumsfeld, G.H.W. Bush, and Henry Kissinger were overcome.

http://nsarchive.wordpress.com/2013/07/16/the-documents-behind-the-birth-of-fisa-the-invisible-hand-granting-nsas-surveillance-the-legal-ok/

NSA Phone Snooping Cannot Be Challenged in Court, Feds Say

The Obama administration for the first time responded to a Spygate lawsuit, telling a federal judge the wholesale vacuuming up of all phone-call metadata in the United States is in the “public interest,” does not breach the constitutional rights of Americans and cannot be challenged in a court of law.

Thursday’s response marks the first time the administration has officially answered one of at least four lawsuits challenging the constitutionality of a secret U.S. snooping program the Guardian newspaper disclosed last month. The administration’s filing sets the stage for what is to be lengthy legal odyssey — one likely to outlive the Obama presidency — that will define the privacy rights of Americans for years to come.

http://www.wired.com/threatlevel/2013/07/spygate-snooping-standing/

Documents Show Undersea Cable Firms Provide Surveillance Access to US Secret State

Documents published last week by the Australian web site Crikey revealed that the US government "compelled Telstra and Hong Kong-based PCCW to give it access to their undersea cables for spying on communications traffic entering and leaving the US."

The significance of the disclosure is obvious; today, more than 99 percent of the world's internet and telephone traffic is now carried by undersea fiber optic cables. An interactive submarine cable map published by the Global Bandwidth Research Service is illustrative in this regard.

Since the late 1960s as part of its ECHELON spy project, the United States has been tapping undersea cables to extract communications and signals intelligence. In fact, projects such as Operation Ivy Bells, a joint Navy-NSA secret intelligence program directed against the former Soviet Union was designed to do just that.

http://antifascist-calling.blogspot.com/2013/07/documents-show-undersea-cable-firms.html?m=1

Tuesday, July 16, 2013

Operation Paul Revere: Infowars On-Line Film Festival Is Now Live!

Online Film Festival
Operation Paul Revere
Infowars's biggest and most important contest ever with $115,000 in cash prizes .

http://www.infowars.com/paulrevere/

The shadowy cartel of doctors that controls Medicare.

It’s fairly common knowledge at this point that Congress does not allow Medicare to negotiate with pharmaceutical companies over the amount the government pays for their drugs. Each drug company simply sets a price for its own product, and Medicare either takes it or doesn’t. While that arrangement undoubtedly drives up Medicare spending—and health care spending more generally—it at least allows for some competition among the drug companies that manufacture similar products. But when it comes to paying doctors for the services and procedures they perform, the system is even more backward. In this case, Medicare actually asks the suppliers—the doctors themselves—to get together first, compare notes, and then report back on how much each of them ought to get paid.

http://www.washingtonmonthly.com/magazine/july_august_2013/features/special_deal045641.php?page=all#

GROUND ZERO 911





http://groundzero911.com/

Monday, July 15, 2013

CIA Will Now Openly Propagandize Americans

Operation Mockingbird, the CIA’s long term effort to control the news, has shifted into overdrive.

On July 2, a little noticed “reform” passed in January went into effect. The Smith-Mundt Modernization Act of 2012, passed as part of the 2013 National Defense Authorization Act, will allow the CIA to flood America with more government propaganda.

The Smith-Mundt Act, passed as the national security state was taking shape in 1948, authorized the State Department to unleash a tidal wave of propaganda outside the United States while supposedly forbidding its dissemination inside the country. The law set the stage for Frank Wisner, who headed up he CIA’s covert action division in the early 1950s, to build his “mighty Wurlitzer,” described by none other than the New York Times as “the means for orchestrating, in almost any language anywhere in the world, whatever tune the CIA was in the mood to hear.”

In the years since, the establishment media has worked hand in glove with the CIA. This cozy relationship was revealed by Frank Church and the Select Committee to Study Governmental Operations with Respect to Intelligence Activities in 1975 and, a few years later, by reporter Carl Bernstein.

http://www.infowars.com/cia-will-now-openly-propagandize-americans/

The Making of the U.S. Surveillance State, 1898-2020

Today, as Washington withdraws troops from the Greater Middle East, a sophisticated intelligence apparatus built for the pacification of Afghanistan and Iraq has come home to help create a twenty-first century surveillance state of unprecedented scope. But the past pattern that once checked the rise of a U.S. surveillance state seems to be breaking down.  Despite talk about ending the war on terror one day, President Obama has left the historic pattern of partisan reforms far behind. In what has become a permanent state of “wartime” at home, the Obama administration is building upon the surveillance systems created in the Bush years to maintain U.S. global dominion in peace or war through a strategic, ever-widening edge in information control.  The White House shows no sign -- nor does Congress -- of cutting back on construction of a powerful, global Panopticon that can surveil domestic dissidents, track terrorists, manipulate allied nations, monitor rival powers, counter hostile cyber strikes, launch preemptive cyberattacks, and protect domestic communications.

http://www.tomdispatch.com/post/175724/tomgram%3A_alfred_w._mccoy%2C_obama%27s_expanding_surveillance_universe/#more

Sunday, July 14, 2013

Travellers' mobile phone data seized by police at border

Thousands of innocent holidaymakers and travellers are having their phones seized and personal data downloaded and stored by the police, The Telegraph can disclose.

Officers use counter-terrorism laws to remove a mobile phone from any passenger they wish coming through UK air, sea and international rail ports and then scour their data.

The blanket power is so broad they do not even have to show reasonable suspicion for seizing the device and can retain the information for “as long as is necessary”.

http://www.telegraph.co.uk/technology/10177765/Travellers-mobile-phone-data-seized-by-police-at-border.html

Friday, July 12, 2013

The Government Is Spying On ALL Americans’ Digital and Old-Fashioned Communications

Anyone Who Says the Government Only Spies On Potential Bad Guys Is Sadly Uninformed

Even now – after all of the revelations by Edward Snowden and other whistleblowers – spying apologists say that the reports are “exaggerated” or “overblown”, and that the government only spies on potential bad guys.

In reality, the government is spying on everyone’s digital and old-fashioned communications.

http://www.washingtonsblog.com/2013/07/anyone-who-says-the-government-only-spies-on-limited-targets-is-wrong.html

ECHELON Today: The Evolution of an NSA Black Program

Before PRISM there was ECHELON: the top secret surveillance program whose all-encompassing "dictionaries" (high-speed computers powered by complex algorithms) ingest and sort key words and text scooped-up by a global network of satellites, from undersea cables and land-based microwave towers.

http://antifascist-calling.blogspot.com/2013/07/echelon-today-evolution-of-nsa-black.html?m=1

Thursday, July 11, 2013

Revealed: how Microsoft handed the NSA access to encrypted messages

Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian.

The files provided by Edward Snowden illustrate the scale of co-operation between Silicon Valley and the intelligence agencies over the last three years. They also shed new light on the workings of the top-secret Prism program, which was disclosed by the Guardian and the Washington Post last month.

The documents show that:

• Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal;

• The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail;

• The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide;

• Microsoft also worked with the FBI's Data Intercept Unit to "understand" potential issues with a feature in Outlook.com that allows users to create email aliases;

• In July last year, nine months after Microsoft bought Skype, the NSA boasted that a new capability had tripled the amount of Skype video calls being collected through Prism;

• Material collected through Prism is routinely shared with the FBI and CIA, with one NSA document describing the program as a "team sport".

http://m.guardiannews.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data

The Coming National DNA Database

A national DNA database is coming.  Barack Obama has already said that he wants one.  A major Supreme Court decision last month paved the way for one.  The DNA of those that commit “serious crimes” is already being routinely collected all over the nation.  Some states (such as New Jersey) are now passing laws that will require DNA collection from those charged with committing “low level crimes”.  And a law that was passed under George W. Bush allows the federal government to screen the DNA of all newborn babies in the United States. So how long will it be before we are all required to give DNA samples to the authorities?  How long will it be before DNA collection is routinely done when we take a trip to the DMV?

http://www.activistpost.com/2013/07/the-coming-national-dna-database.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+ActivistPost+(Activist+Post)&m=1

The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones

Over a decade ago, it was discovered that the NSA embedded backdoor access into Windows 95, and likely into virtually all other subsequent internet connected, desktop-based operating systems. However, with the passage of time, more and more people went "mobile", and as a result the NSA had to adapt. And adapt they have: as Bloomberg reports, "The NSA is quietly writing code for Google’s Android OS."

Is it ironic that the same "don't be evil" Google which went to such great lengths in the aftermath of the Snowden scandal to wash its hands of snooping on its customers and even filed a request with the secretive FISA court asking permission to disclose more information about the government’s data requests, is embedding NSA code into its mobile operating system, which according to IDC runs on three-quarters of all smartphones shipped in the first quarter? Yes, yes it is.

http://www.zerohedge.com/news/2013-07-09/nsa-has-inserted-its-code-android-os-bugging-three-quarters-all-smartphones

Wednesday, July 10, 2013

Adam Kokesh Raided By “Storm Trooper” Cops

Days after Adam Kokesh staged an open carry protest by loading a shotgun in Washington DC, “storm trooper” police raided the former Marine’s home last night, smashing in his door and deploying a flash bang grenade before arresting Kokesh.

According to a press release issued by Kokesh’s Adam vs the Man media team, “Numerous police vehicles, including a light armored vehicle and two low-flying helicopters barricaded Adam’s street. More than 20 armored SWAT team members surrounded the house, as well as a number of detectives, and plainclothes officers. Assault rifles were aimed on all members of the team as they were handcuffed without being told why they were detained. Masked and armored police in full “Storm Trooper” gear flooded in and ransacked the residence. The team was cordoned in a front room, while Adam was pulled aside for questioning.”

Roads around Kokesh’s home, which also contains his broadcast studio, were blocked off and other residents were told to stay indoors. The raid was conducted by Herndon police as well as US Parks Police, an arm of Homeland Security.

http://www.infowars.com/adam-kokesh-raided-by-storm-trooper-cops/

Linchpin for Obama’s plan to predict future leakers unproven, isn’t likely to work, experts say

In an initiative aimed at rooting out future leakers and other security violators, President Barack Obama has ordered federal employees to report suspicious actions of their colleagues based on behavioral profiling techniques that are not scientifically proven to work, according to experts and government documents.

The techniques are a key pillar of the Insider Threat Program, an unprecedented government-wide crackdown under which millions of federal bureaucrats and contractors must watch out for “high-risk persons or behaviors” among co-workers. Those who fail to report them could face penalties, including criminal charges.

http://www.mcclatchydc.com/2013/07/09/196211/linchpin-for-obamas-plan-to-predict.html#.Ud3v3XTD9Aj

The NSA slide you haven’t seen

A classified NSA slide obtained by The Washington Post and published here for the first time lists “Two Types of Collection.”

One is PRISM, the NSA program that collects information from technology companies, which was first revealed in reports by the Post and Britain’s Guardian newspaper last month. The slide also shows a separate category labeled “Upstream,” described as accessing “communications on fiber cables and infrastructure as data flows past.”

http://m.washingtonpost.com/business/economy/the-nsa-slide-you-havent-seen/2013/07/10/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html

Shocker: Only 1% of So Called Terrorists Nabbed by the FBI Were Real

A larger number of arrestees, poor and powerless, were caught in FBI "Threat Factory" stings.

http://www.alternet.org/civil-liberties/fbis-terror-scam

Tuesday, July 9, 2013

Bin Laden raid files secretly moved to CIA to avoid public disclosure

Military files detailing the Navy SEAL raid which killed Osama bin Laden in 2011 were removed from Defense Department computers and sent to the CIA, in an effort to make the documents harder for the general public to access.

The secret move, ordered by Adm. William McRaven, was mentioned in a draft report by the Pentagon's inspector general, which was acquired by AP.  

http://rt.com/usa/bin-laden-files-cia-pentagon-794/

Paper reveals NSA ops in Latin America

A Brazilian newspaper on Tuesday published an article it said is based on documents provided by the former American contractor Edward Snowden asserting that the United States has been collecting data on telephone calls and e-mails from several countries in Latin America, including important allies such as Brazil, Colombia and Mexico.

The paper, O Globo, based in Rio de Janeiro, says the documents show the National Security Agency amassed military and security data on countries such as Venezuela, an American adversary that has been accused of aiding Colombia’s Marxist rebels and maintaining close ties with Iran. But the documents also show that the agency carried out surveillance operations to unearth inside commercial information on the oil industry in Venezuela and the energy sector in Mexico, which is under state control and essentially closed to foreign investment.

http://m.washingtonpost.com/world/the_americas/paper-reveals-nsa-ops-in-latin-america/2013/07/09/eff0cc7e-e8e3-11e2-818e-aa29e855f3ab_print.html

Sunday, July 7, 2013

The Official Video: ReThink911 September 2013





ReThink 911.org »»

GCHQ Surveillance: The Power of Britain's Data Vacuum

Britain's Tempora system is the signal intelligence community's first "full-take Internet buffer," Snowden said in an interview.

The scope of this "full take" system is vast. According to the whistleblower and Britain's Guardian newspaper, Tempora stores communications data for up to 30 days and saves the content of those messages for up to three days, in a so-called Internet buffer. "It snarfs everything, in a rolling buffer to allow retroactive investigation without missing a single bit," Snowden said. If you send a single data packet, he further explains, "and it routes through the UK, we get it."

http://m.spiegel.de/international/world/a-909852.html

NSA 'In Bed Together with the Germans'

In an interview, Edward Snowden accuses the National Security Agency of partnering with Germany and other governments in its spying activities. New information also indicates close working ties between the German foreign intelligence agency and the American authority.

http://m.spiegel.de/international/world/a-909847.html

Thursday, July 4, 2013

New You Tube Channel ConspiracyScope2



Courts Can’t Agree on Whether Cops Can Track Your Cell Without a Warrant

Federal law enforcement agents have been using warrantless cell-tower locational tracking of criminal suspects in the wake of the Supreme Court’s ruling 18 months ago that they need probable-cause warrants from judges to affix covert GPS devices to vehicles.

But the law on cell-site locational tracking is all over the books, with judges offering mixed rulings on whether warrants are needed. While dozens of lower courts have ruled on the issue, only two appellate courts have. All of which means some suspects are being convicted based on locational data of what towers their cell phones are pinging, and others are not, because some courts are requiring warrants.

http://www.wired.com/threatlevel/2013/07/cell-site-data-crossroads/

The U.S. Postal Service Is Monitoring Your Snail Mail

While snail mail surveillance has been a tool of law enforcement for over a century, the program that targeted Pickering is called Mail Isolation Control and Tracking. As part of this surveillance tactic, the “Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images.”
When combined, the NSA and the U.S. Postal Service can keep every form of communication — electronic and conventional — under constant surveillance, without probable cause. This last fact is a direct violation of the Fourth Amendment.

The Fourth Amendment mandates:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

http://thenewamerican.com/usnews/constitution/item/15897-the-us-postal-service-is-monitoring-your-snail-mail

Wednesday, July 3, 2013

Top Experts Have Warned for 50 Years that Mass Surveillance Would Lead to Tyranny in America

Listen to What Top Experts Say About Mass Surveillance

Jimmy Carter’s National Security Adviser – a key American foreign policy architect – Zbigniew Brzezinski wrote in 1970:

The [future] era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen. These files will be subject to instantaneous retrieval by the authorities.

In 1975, the head of the Senate committee investigating illegal spying by the U.S. government – Senator Frank Church – said about the NSA:

I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.

http://www.washingtonsblog.com/2013/07/top-experts-have-warned-for-50-years-that-mass-surveillance-would-lead-to-tyranny-in-america.html

Beyond Snowden: US General Cartwright has been indicted for espionage

While the world focuses on Washington’s pursuit of NSA whistleblower Ed Snowden, another much more high ranking member of the US power structure has been indicted for espionage this week…

US General James Cartwright was regarded by Washington insiders as ‘Obama’s General’, and now he’s facing prosecution for blowing the whistle on ‘Operation Olympic Games’ which planted the Stuxnet and Flame viruses in Iranian nuclear facilities in order derail Iran’s civilian nuclear program. At closer examination, it appears that Cartwright’s revelations didn’t so much harm US interests per say, but they hindered Israeli ambitions towards a war with Iran.

But why espionage? What is the line between “whistleblowing” and “espionage” in America today?

Journalist Thierry Meyssan give us a historical perspective and tells is what it really means…

http://21stcenturywire.com/2013/07/02/beyond-snowden-us-general-cartwright-has-been-indicted-for-espionage/

http://www.voltairenet.org/article179196.html

Tuesday, July 2, 2013

Russian Forces to Provide “Security” At US Events

As part of a deal signed last week in Washington DC between the Russian Emergency Situations Ministry and FEMA, Russian officials will provide “security at mass events” in the United States, a scenario that won’t sit well with Americans wary of foreign assets operating on US soil.

According to a press release by the Ministry of the Russian Federation for Civil Defense and Emergencies, US and Russian officials met on June 25 at the 17th Joint U.S.-Russia Cooperation Committee on Emergency Situations.
In addition to agreeing with FEMA to “exchange experts during joint rescue operations in major disasters,” the Russian Emergency Situations Ministry will also be providing “security at mass events” in the United States.
This suggests that events designated as “National Special Security Events” by the Department of Homeland Security, which include the Super Bowl, international summits such as the G8 and presidential inaugurations, will now rely partly on Russian authorities to provide security.
The meeting last week also agreed on the conclusion that US and Russian emergency authorities will increase their co-operation, “in order to respond efficiently to all kinds of disasters.”
The use of foreign troops or other officials in a law enforcement capacity providing “security” inside the United States is illegal under Posse Comitatus. Capt. William Geddes of the U.S. Army Reserve acknowledged last year that it is against federal law to use US troops to conduct police patrols, despite the fact that such occurrences are becoming increasingly common. The use of foreign troops is an even more clear cut violation of Posse Comitatus.

http://www.infowars.com/russian-forces-to-provide-security-at-us-events/

7 Future Methods of Mind Control

The mind control of the future forgoes all pretense at indirectly altering perception through media and politics, as that continues to be exposed for what it truly is. It does away with the clumsy and sporadic effectiveness of mind-altering drugs and environmental toxins, as companies like Monsanto are not only reviled, but are seen as the epitome of true evil on earth.

The mind control of the future goes straight into direct programming of the digital mind, and this is exactly what the technotronic elite are discussing right now. There are 7 likely ways this could be achieved if we don't learn about their agenda in time to continue resisting their anti-human ends.

http://www.activistpost.com/2013/06/7-future-methods-of-mind-control.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+ActivistPost+(Activist+Post)&m=1

If You Like The Surveillance State, You’ll Love E-Verify

By Ron Paul

From massive NSA spying, to IRS targeting of the administration's political opponents, to collection and sharing of our health care information as part of Obamacare, it seems every day we learn of another assault on our privacy. Sadly, this week the Senate took another significant, if little-noticed, step toward creating an authoritarian surveillance state. Buried in the immigration bill is a national identification system called mandatory E-Verify.

The Senate did not spend much time discussing E-Verify, and what little discussion took place was mostly bipartisan praise for its effectiveness as a tool for preventing illegal immigrants from obtaining employment. It is a tragedy that mandatory E-Verify is not receiving more attention, as it will impact nearly every American’s privacy and liberty.

The mandatory E-Verify system requires Americans to carry a “tamper-proof” social security card. Before they can legally begin a job, American citizens will have to show the card to their prospective employer, who will then have to verify their identity and eligibility to hold a job in the US by running the information through the newly-created federal E-Verify database. The database will contain photographs taken from passport files and state driver's licenses. The law gives federal bureaucrats broad discretion in adding other “biometric” identifiers to the database. It also gives the bureaucracy broad authority to determine what features the “tamper proof” card should contain.

Regardless of one’s views on immigration, the idea that we should have to ask permission from the federal government before taking a job ought to be offensive to all Americans. Under this system, many Americans will be denied the opportunity for work. The E-Verify database will falsely identify thousands as "ineligible," forcing many to lose job opportunities while challenging government computer inaccuracies. E-Verify will also impose additional compliance costs on American businesses, at a time when they are struggling with Obamacare implementation and other regulations.
According to David Bier of Competitive Enterprise Institute, there is nothing stopping the use of E-Verify for purposes unrelated to work verification, and these expanded uses could be authorized by agency rule-making or executive order. So it is not inconceivable that, should this bill pass, the day may come when you are not be able to board an airplane or exercise your second amendment rights without being run through the E-Verify database. It is not outside the realm of possibility that the personal health care information that will soon be collected by the IRS and shared with other federal agencies as part of Obamacare will also be linked to the E-Verify system.

Those who dismiss these concerns as paranoid should consider that the same charges were leveled at those who warned that the PATRIOT Act could lead to the government collecting our phone records and spying on our Internet usage. Just as the PATRIOT Act was only supposed to be used against terrorists but is now used to bypass constitutional protections in matters having noting to do with terrorism or national security, the national ID/mandatory E-Verify database will not only be used to prevent illegal immigrants from gaining employment. Instead, it will eventually be used as another tool to monitor and control the American people.

The recent revelations of the extent of National Security Agency (NSA) spying on Americans, plus recent stories of IRS targeting Tea Party and similar groups for special scrutiny, demonstrates the dangers of trusting government with this type of power. Creation of a federal database with photos and possibly other “biometric” information about American citizens is a great leap forward for the surveillance state. All Americans who still care about limited government and individual liberty should strongly oppose E-Verify.

http://www.the-free-foundation.org/tst7-1-2013.html

Russian soldiers will be put on U.S. soil to provide security at mass events



Monday, July 1, 2013

How a 30-year-old lawyer exposed NSA mass surveillance of Americans—in 1975

Project SHAMROCK allowed the NSA to intercept telegrams sent by US citizens.

In May 1975, the Church Committee received an 800 page report from the separate Rockefeller Commission. The report contained hundreds of pages of testimony from CIA employees about possible problems at that agency, but Snider and Fenn also found two small references to the NSA. The first mentioned an office in New York, loaned from the CIA to NSA in order to spy on telegrams; the second "disclosed that CIA had asked NSA to monitor the communications of certain US citizens active in the antiwar movement."

Snider took the first of these. He asked the NSA to explain the telegram-spying program, but the agency didn't respond. Pulling out the big guns, Snider sent the NSA another round of questions, this time signed by Senator Church, the committee chairman. The NSA objected, saying that it could only talk about the secretive program to the two senators running the committee—no one else. Snider couldn't get the meeting arranged for months; the two senators were too busy to make the joint scheduling work, in part because of how much other work they were doing on matters of more direct concern to the committee. As the Senate history of the Church Committee notes, it "interviewed 800 individuals and conducted 250 executive and 21 public hearings. At the first televised hearing, staged in the Senate Caucus Room, Chairman Church dramatically displayed a CIA poison dart gun to highlight the committee's discovery that the CIA directly violated a presidential order by maintaining stocks of shellfish toxin sufficient to kill thousands."

That August, Snider's scheduling problem suddenly evaporated. The New York Times dropped another bombshell, reporting that NSA had been spying on US citizens who were communicating abroad.

http://arstechnica.com/tech-policy/2013/06/how-a-30-year-old-lawyer-exposed-nsa-mass-surveillance-of-americans-in-1975/

Infrastructure of a Police State: The NSA’s Cyber-surveillance Technology

Edward Snowden’s documentary exposure of secret NSA surveillance activities has brought to light details of the mass illegal collection of phone metadata and online transaction activity of both US citizens and individuals, organizations and governments around the world.
Following a classified Congressional intelligence briefing on June 11, US Representative Loretta Sanchez stated in a C-Span interview that Snowden’s disclosures were “the tip of the iceberg.” Indeed, with more revelations to come, Edward Snowden has courageously helped make the public aware of a vast spying conspiracy by the corporate-military-intelligence apparatus within the US.
Prior to Snowden’s revelations, available published information about the NSA’s signals intelligence systems has been limited. Much of what is presented here is derived from the work of James Bamford, journalist and intelligence expert and author of several books on the NSA including The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America (2008).

 

Bamford has conducted extensive interviews with former NSA employees and other whistleblowers. He is also the author of a March 2012 Wired magazine article entitled, The NSA is Building the Country’s Biggest Spy Center (Watch What You Say).

http://www.globalresearch.ca/infrastructure-of-a-police-state-the-nsas-cyber-surveillance-technology/5340941

How the NSA Targets Germany and Europe

An NSA table (see graphic), published for the first time here by SPIEGEL, documents the massive amount of information captured from the monitored data traffic. According to the graph, on an average day last December, the agency gathered metadata from some 15 million telephone connections and 10 million Internet datasets. On Dec. 24, it collected data on around 13 million phone calls and about half as many Internet connections.

On the busiest days, such as Jan. 7 of this year, the information gathered spiked to nearly 60 million communications processes under surveillance. The Americans are collecting metadata from up to half a billion communications a month in Germany — making the country one of the biggest sources of streams of information flowing into the agency’s gigantic sea of data.

http://m.spiegel.de/international/world/a-908609.html#spRedirectedFrom=www&referrrer=http://www.pogowasright.org/?p=35166

New Documents Shed Light on NSA's Dragnet Surveillance

Although the news outlets principally responsible for bringing these stories to light, principally The Guardian, Washington Post, South China Morning Post, and now Der Spiegel, have not (as yet) published complete sets of NSA documents, and their reporting has barely scratched the surface of content-siphoning deep packet inspection (DPI) programs for internet and telephone surveillance (indeed, PRISM may be a subset of larger and more pernicious programs that collect, analyze and store everything), what we have learned so far is deeply troubling and pose grave threats to civil liberties.

http://antifascist-calling.blogspot.com/2013/07/new-documents-shed-light-on-nsas.html?m=1