Monday, September 30, 2013

Vatican Bank To Shut All Embassy Accounts To Halt Money Laundering

Followng Pope Francis' demand that the Vatican Bank review its procedures, Reuters reports that the bank is likely to close all accounts held by foreign embassies, following concerns about large cash deposits and withdrawals by the missions of Iran, Iraq and Indonesia, according to people with knowledge of the situation. The private bank IOR has around EUR7.1 billion in assets but is concerned it could be "an unwitting vehicle for money laundering and other illicit finances."

http://www.zerohedge.com/news/2013-09-30/vatican-bank-shut-all-embassy-accounts-halt-money-laundering

NSA stores metadata of millions of web users for up to a year, secret files show

An introductory guide to digital network intelligence for NSA field agents, included in documents disclosed by former contractor Edward Snowden, describes the agency's metadata repository, codenamed Marina. Any computer metadata picked up by NSA collection systems is routed to the Marina database, the guide explains. Phone metadata is sent to a separate system.

"The Marina metadata application tracks a user's browser experience, gathers contact information/content and develops summaries of target," the analysts' guide explains. "This tool offers the ability to export the data in a variety of formats, as well as create various charts to assist in pattern-of-life development."

The guide goes on to explain Marina's unique capability: "Of the more distinguishing features, Marina has the ability to look back on the last 365 days' worth of DNI metadata seen by the Sigint collection system, regardless whether or not it was tasked for collection."

http://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents

NSA Has Built Its Own, Secret, Warrantless, Shadow Social Network, And You've Already Joined It

There were apparently two policy changes that allowed this to happen, and both occurred in the past three years. First, in November of 2010, the NSA was allowed to start looking at phone call and email logs of Americans to try to help figure out associations for "foreign intelligence purposes." Note that phrase. We'll come back to it. For years, the NSA had been barred from viewing any content on US persons, and the NSA, President Obama and others have continued to insist to this day that there are minimization procedures that prevent spying on Americans. Except, this latest revelation shows that, yet again, this isn't actually true.

The second policy change came in January of 2011, when the NSA was told it could start creating this massive "social graph" on Americans without having to make sure they weren't Americans any more, as indicated above.

http://www.techdirt.com/articles/20130928/22450824685/nsa-has-built-its-own-secret-warrantless-shadow-social-network-youve-already-joined-it.shtml

NYC’s yearly cost per inmate almost as expensive as Ivy League tuition

The city's Independent Budget Office annual figure of $167,731 — which equates to about $460 per day for the 12,287 average daily New York City inmates last year — was based on about $2 billion in total operating expenses for the Department of Correction, which included salaries and benefits for staff, judgments and claims as well as debt service for jail construction and repairs.

But there are particularly expensive costs associated with Rikers.

The department says it spends $30.3 million annually alone on transportation costs, running three bus services that usher inmates to and from court throughout the five boroughs, staff from a central parking lot to Rikers jails and visitors to and around the island. There were 261,158 inmates delivered to court last year.

http://www.foxnews.com/us/2013/09/30/nyc-cost-per-inmate-almost-equals-ivy-league-education-expenses-tied-to-rikers/?intcmp=latestnews

Whistleblower: Banks may be laundering poker money

Compliance officer Cathy Scharf told an auditorium full of aghast colleagues about her experiences at a Utah bank that illegally processed at least $200 million for the offshore gambling sites PokerStars and Full Tilt Poker.

She said her bosses told her the bank would fail without the illegal income and brought in criminal lawyers to threaten her with arrest if she told on them.

http://www.businessweek.com/ap/2013-09-23/whistleblower-banks-may-be-laundering-poker-money

Saturday, September 28, 2013

Looting the Pension Funds

All across America, Wall Street is grabbing money meant for public workers

Five years ago this fall, an epidemic of fraud and thievery in the financial-services industry triggered the collapse of our economy. The resultant loss of tax revenue plunged states everywhere into spiraling fiscal crises, and local governments suffered huge losses in their retirement portfolios – remember, these public pension funds were some of the most frequently targeted suckers upon whom Wall Street dumped its fraud-riddled mortgage-backed securities in the pre-crash years.

Today, the same Wall Street crowd that caused the crash is not merely rolling in money again but aggressively counterattacking on the public-relations front. The battle increasingly centers around public funds like state and municipal pensions. This war isn't just about money. Crucially, in ways invisible to most Americans, it's also about blame. In state after state, politicians are following the Rhode Island playbook, using scare tactics and lavishly funded PR campaigns to cast teachers, firefighters and cops – not bankers – as the budget-devouring boogeymen responsible for the mounting fiscal problems of America's states and cities.

By Matt Taibbi - Rolling Stone - Read full article »»

N.S.A. Gathers Data on Social Connections of U.S. Citizens

Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials.

By JAMES RISEN and LAURA POITRAS - NY Times -Read full article »»

Most 9/11 Commissioners Don't Buy The Official Story - Why Do You?

Former 9/11 Commissioners speak out about the lies and manipulation of their "exposition." (They admit it was not a criminal investigation). This is a compilation of all available Commissioner quotes and video clips. If they don't buy the official story, why do you?

Read full article »»

Newly Declassified History Divulges Names of Prominent Americans Targeted by NSA during Vietnam Era

During the height of the Vietnam War protest movements in the late 1960s and early 1970s, the National Security Agency tapped the overseas communications of selected prominent Americans, most of whom were critics of the war, according to a recently declassified NSA history. For years those names on the NSA's watch list were secret, but thanks to the decision of an interagency panel, in response to an appeal by the National Security Archive, the NSA has released them for the first time. The names of the NSA's targets are eye-popping. Civil rights leaders Dr. Martin Luther King and Whitney Young were on the watch list, as were the boxer Muhammad Ali, New York Times journalist Tom Wicker, and veteran Washington Post humor columnist Art Buchwald. Also startling is that the NSA was tasked with monitoring the overseas telephone calls and cable traffic of two prominent members of Congress, Senators Frank Church (D-Idaho) and Howard Baker (R-Tennessee).

The NSA history, American Cryptology during the Cold War, is a multi-volume study that covers the intersection of secret communications intelligence with Cold War history. The National Security Archive filed the initial mandatory declassification review request for the histories in 2006. The next year, when the NSA denied significant information from the histories the Archive filed an appeal. The Agency declassified more information in 2008 and the Archive posted the first three volumes on its Web site in 2008, with commentary by Matthew Aid. The NSA had denied so much, however, that the Archive filed a final appeal with the Interagency Security Classification Appeals Panel (ISCAP) that same year. Book I remains under appeal. Five years after the Archive's appeal, the ISCAP has compelled the NSA to release more information from Books II and III.

National Security Archive Electronic Briefing Book No. 441 - Read full article »»

FBI has been using drones since 2006, watchdog agency says

Operating with almost no public notice, the FBI has spent more than $3 million to operate a fleet of small drone aircraft in domestic investigations, according to a report released Thursday by a federal watchdog agency.

The unmanned surveillance planes have helped FBI agents storm barricaded buildings, track criminal suspects and examine crime scenes since 2006, longer than previously known, according to the 35-page inspector general’s audit of drones used by the Justice Department.

The FBI unmanned planes weigh less than 55 pounds each and are unarmed, the report said. The FBI declined requests to discuss its drone operations Thursday.

LA Times - Read full article »»

Newly Declassified Government Documents: Pre 9/11 Bin Laden Hijack Plot Was Ignored By US Intelligence

The United States disregarded advanced warning of a 2000 Al Qaeda plot to hijack a commercial airliner because “nobody believed that Usama bin Laden’s organization or the Taliban could carry out such an operation,” according to intelligence documents obtained by Judicial Watch.

It took the government 11 years to furnish the records, requested in May 2002 as part of JW’s Terrorism Research and Analysis Project, and they are just as alarming today as they would have been a decade ago. The documents, from the Defense Intelligence Agency (DIA) reveal that Al Qaeda had a sophisticated plan to hijack a commercial airliner departing Frankfurt International Airport between March and August 2000. The hijack team was to consist of an Arab, a Pakistani and a Chechen and their targets were U.S. airlines, Lufthansa and Air France.

Judicial Watch - Read full article »»

Dianne Feinstein Accidentally Confirms That NSA Tapped The Internet Backbone

During Thursday's Senate Intelligence Committee hearing, Dianne Feinstein more or less admitted that they get emails via "upstream" collection methods. As you can see in the following clip, Feinstein interrupts a discussion to read a prepared "rebuttal" to a point being made, and in doing so clearly says that the NSA can get emails via upstream collections:

Upstream collection... occurs when NSA obtains internet communications, such as e-mails, from certain US companies that operate the Internet background, i.e., the companies that own and operate the domestic telecommunications lines over which internet traffic flows.

She clearly means "backbone" rather than "background." She's discussing this in an attempt to defend the NSA's "accidental" collection of information it shouldn't have had. But that point is not that important. Instead, the important point is that she's now admitted what most people suspected, but which the administration has totally avoided admitting for many, many years since the revelations made by Mark Klein.

So, despite years of trying to deny that the NSA can collect email and other communications directly from the backbone (rather than from the internet companies themselves), Feinstein appears to have finally let the cat out of the bag, perhaps without realizing it.

Read full article »»

Friday, September 27, 2013

Seymour Hersh: Bin Laden Raid “One Big Lie”

Pulitzer Prize-winning journalist Seymour Hersh says that the raid which killed Osama Bin Laden in 2011 is “one big lie” and that “not one word” of the Obama administration’s narrative on what happened is true.

In a wide-ranging interview published today by the Guardian, Hersh savages the US media for failing to challenge the White House on a whole host of issues, from NSA spying, to drone attacks, to aggression against Syria.

On the subject of the Navy Seal raid that supposedly resulted in the death of the Al-Qaeda terror leader, Hersh remarked, “Nothing’s been done about that story, it’s one big lie, not one word of it is true.”

Hersh added that the Obama administration habitually lies but they continue to do so because the press allows them to get away with it.

“It’s pathetic, they are more than obsequious, they are afraid to pick on this guy [Obama],” Hersh told the Guardian.

http://www.infowars.com/seymour-hersh-bin-laden-death-one-big-lie/

Thursday, September 26, 2013

Part 2. Viva Zapata

Skull and Bones

In 1945, with the end of the war, George H. W. “Poppy” Bush entered Yale University. The CIA recruited heavily at all of the Ivy League schools in those days, with the New Haven campus the standout. “Yale has always been the agency’s biggest feeder,” recalled CIA officer Osborne Day (class of’43), “In my Yale class alone there were thirty-five guys in the agency.” Bush’s father, Prescott, was on the university’s board, and the school was crawling with faculty serving as recruiters for the intelligence services . . . Yale’s society’s boys were the cream of the crop, and could keep secrets to boot. And no secret society was more suited to the spy establishment than Skull and Bones, for which Poppy Bush, like his father, was tapped in his junior year. Established in 1832, Skull and Bones is the oldest secret society at Yale, and thus at least theoretically entrusted its membership with a more comprehensive body of secrets than any other campus group. Bones alumni would appear throughout the public and private history of both wartime and peacetime intelligence . . .

When Bush entered Yale, the university was welcoming back countless veterans of the OSS to its faculty. Bush, with naval intelligence work already under his belt by the time he arrived at Yale, would have been seen as a particularly prime candidate for recruitment.

http://whowhatwhy.com/2013/09/25/part-2-viva-zapata-3/

Secret Cold War Documents Reveal NSA Spied on Senators …along with journalists, civil rights leaders, Muhammad Ali and a Washington Post humor columnist.

As Vietnam War protests grew, the U.S. National Security Agency (NSA) tapped the overseas communications of prominent American critics of the war — including a pair of sitting U.S. senators. That’s according to a recently declassified NSA history, which called the effort “disreputable if not outright illegal.”

For years the names of the surveillance targets were kept secret. But after a decision by the Interagency Security Classification Appeals Panel, in response to an appeal by the National Security Archive at George Washington University, the NSA has declassified them for the first time. The names of the NSA’s targets are eye-popping. Civil rights leaders Martin Luther King and Whitney Young were on the watch list, as were the boxer Muhammad Ali, New York Times journalist Tom Wicker, and veteran Washington Post humor columnist Art Buchwald. But perhaps the most startling fact in the declassified document is that the NSA was tasked with monitoring the overseas telephone calls and cable traffic of two prominent members of Congress, Sen. Frank Church (D-Idaho) and Sen. Howard Baker (R-Tenn.). As shocking as the recent revelations about the NSA’s domestic eavesdropping have been, there has been no evidence so far of today’s signal intelligence corps taking a step like this, to monitor the White House’s political enemies.

https://nsarchive.wordpress.com/2013/09/25/secret-cold-war-documents-reveal-nsa-spied-on-senators-along-with-journalists-civil-rights-leaders-muhammad-ali-and-a-washington-post-humor-columnist/

Tuesday, September 24, 2013

Tosh Plumlee on the Alex Jones Show (9-24-13)



Insider Reveals Arms Deals Behind Recent Major Events

According to various sources, behind all this bloody turmoil lies a program known as Direct Commercial Sales (DCS). This group operates within the US State Department’s Directorate of Defense Trade Controls (DDTC). The DCS program regulates private U.S. companies’ overseas sales of weapons and other defense articles, defense services, and military training. It is separate from the Foreign Military Sales (FMS) program, which manages government-to-government sales. It is within little-known programs such as this that vast sums of money are shuffled through international banks, corporate business and foreign governments.
In a program entitled “Blue Lantern” the DDTC monitors end-use recipients of weapons and services licensed by the State Department provided by Direct Commercial Sales. Some defense industry sources now claim that DCS is “playing both sides against the middle for corporate or political gain.” Such activity has been traced back to operations in Cuba in the 1950s and 60’s, the Iran-Contra Scandal of the Reagan administration and the long-lost War on Drugs. An objective look at this program also lends tremendous support to critics who contend that the United States is the “arms merchant of the world.”
In Blue Lantern reports going back to the early 2000s, it was found that many investigations of end users of weaponry supplied by US firms were “unfavorable,” with arms sometimes ending up in the hands of foreign enemies. Such reports were handed to law enforcement agencies for possible legal action but usually have been dropped for foreign relations considerations.
William Robert “Tosh” Plumlee, a former CIA contract pilot who flew arms and ammunition for the agency as far back as the overthrow of Cuban dictator Fulgencio Batista and the 1961 Bay of Pigs Invasion, questioned if such arms dealing might be another “off-the-books” covert operation run by the CIA’s Special Tactical Unit akin to the arms-for-drugs deal in Iran-Contra and the Cuban Project of the 1950s, in which both Fidel Castro and the Batista Government in Cuba were sold weapons from American stockpiles for corporate profit. Numerous field reports have stated Plumlee flew arms to Nicaragua during the Iran-Contra Scandal. In testimony to the US Senate, Plumlee also said he returned to the US with loads of cocaine during the Reagan years. Recently, Plumlee has worked as a photojournalist along the US-Mexican border and participated in investigations into the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) Fast and Furious sting operation..
Plumlee said he perceives the same type of operations being conducted today in the Middle East. He reported to federal officials large shipments of “High Impact” weapons as well as small arms and ammunition being funneled through a network of clandestine CIA safe houses in Turkey, Jordan, Qatar, Pakistan and other Middle Eastern locations by hired civilians and mercenaries financed by private US corporations and the CIA’s “Black Budget.” Plumlee said he worked with a unit called Task Force Seven under Able Charlie Command headquartered at Ft Bliss, Texas.

http://www.infowars.com/insider-reveals-arms-deals-behind-recent-major-events/

Lois Lerner, IRS official at heart of tea party scandal, retires

Lois G. Lerner, the woman at the center of the IRS tea party targeting scandal, retired from the agency Monday morning after an internal investigation found she was guilty of “neglect of duties” and was going to call for her ouster, according to congressional staff.

Her departure marks the first government official to pay a significant price in the scandal, though Republicans were quick to say her decision doesn’t put the matter to rest and pointed out that she still can be called before Congress to testify.

http://m.washingtontimes.com/news/2013/sep/23/lois-lerner-irs-official-tea-party-scandal-retires/

Monday, September 23, 2013

Sunday, September 22, 2013

Will the Supreme Court Stop Cops From Reading Your Text Messages?

The Supreme Court has been asked to consider two cases—United States v. Wurie and Riley v. California—which challenge the legality of warrantless cellphone searches under the Fourth Amendment. Police (and the Obama Administration) maintain that these searches are necessary, stopping suspects from deleting crucial information about drug deals and trafficking rings, but civil liberties advocates say that's no excuse for officers not to get a warrant. Here's everything you need to know about these searches, and whether the Supreme Court might stop them:

http://m.motherjones.com/politics/2013/09/police-cell-phone-search-warrant-supreme-court

Friday, September 20, 2013

Private prisons demand states maintain maximum capacity or pay fees

Falling crime rates are bad for business at privately run prisons, and a new report shows the companies that own them require them to be filled near capacity to maintain their profit margin.

http://www.rawstory.com/rs/2013/09/20/low-crime-rates-bad-for-business-so-private-prisons-require-maximum-capacity/

5 Years After the Financial Crisis, The Big Banks Are Still Committing Massive Crimes

Here are just some of the improprieties by big banks over the last century (you’ll see that many shenanigans are continuing today):

Laundering money for terrorists (the HSBC employee who blew the whistle on the banks’ money laundering for terrorists and drug cartels says that the giant bank is still laundering money, saying:  “The public needs to know that money is still being funneled through HSBC to directly buy guns and bullets to kill our soldiers …. Banks financing … terrorists affects every single American.” He also said: “It is disgusting that our banks are STILL financing terror on 9/11 2013“.  And see this)

Funding the Nazis

Financing illegal arms deals, and funding the manufacture of cluster bombs (and see this and this) and other arms which are banned in most of the world

Launching a coup against the President of the United States

Handling money for rogue military operations

Laundering money for drug cartels. See this, this, this, this and this (indeed, drug dealers kept the banking system afloat during the depths of the 2008 financial crisis).   A whistleblower said: “America is losing the drug war because our banks are [still] financing the cartels“, and “Banks financing drug cartels … affects every single American“.  And see this.)

http://www.washingtonsblog.com/2013/09/5-years-after-the-financial-crisis-the-big-banks-are-committing-more-crimes-than-ever.html

US nearly detonated atomic bomb over North Carolina – secret document

A secret document, published in declassified form for the first time by the Guardian today, reveals that the US Air Force came dramatically close to detonating an atom bomb over North Carolina that would have been 260 times more powerful than the device that devastated Hiroshima.

The document, obtained by the investigative journalist Eric Schlosser under the Freedom of Information Act, gives the first conclusive evidence that the US was narrowly spared a disaster of monumental proportions when two Mark 39 hydrogen bombs were accidentally dropped over Goldsboro, North Carolina on 23 January 1961. The bombs fell to earth after a B-52 bomber broke up in mid-air, and one of the devices behaved precisely as a nuclear weapon was designed to behave in warfare: its parachute opened, its trigger mechanisms engaged, and only one low-voltage switch prevented untold carnage.

http://www.theguardian.com/world/2013/sep/20/usaf-atomic-bomb-north-carolina-1961

Thursday, September 19, 2013

Without Any Legal Basis, The NYPD Has Been Classifying Its Own Documents For More Than A Decade

Since at least 2003, the New York Police Department has been labeling some of its internal documents "Secret," a designation that has baffled government secrecy experts, journalists and civil liberties lawyers.

By labeling documents "secret," the Intelligence Division appears to be operating its own in-house classification system, similar to those used at federal agencies like the CIA, where Intel's chief, David Cohen, previously worked for 35 years.

http://www.techdirt.com/articles/20130917/05251924551/without-any-legal-basis-nypd-has-been-classifying-its-own-documents-more-than-decade.shtml?_format=full

FBI calls half of populace with 9/11 doubts potential terrorists


The FBI is instructing local police departments and "communities against terrorism" to consider anyone who harbors "conspiracy theories" about 9/11 to be a potential terrorist, in a circular released to local police departments.

The circular thus adds 9/11 official story skeptics to a growing list of targets described by federal law enforcement to be security threats, such as those who express "libertarian philosophies," "Second Amendment-oriented views," interest in "self-sufficiency," "fears of Big Brother or big government," and "Declarations of Constitutional rights and civil liberties."

http://www.digitaljournal.com/article/358624

Charlotte Iserbyt on The Order of Skull & Bones



Linux creator admits NSA demanded backdoor

Speaking at the keynote LinuxCon panel this year, Linus Torvalds, who created the open-source Linux operating system 22 years ago, revealed that the government had approached him about installing a backdoor into system’s structure. Linux is the preferred operating system for the privacy conscious infosec community.

It’s just the latest in a string of revelations illustrating how the NSA have for a number of years attempted to intervene in the very structuring of online communications and cryptography to enable easier surveillance.

http://www.salon.com/2013/09/19/linux_creator_admits_nsa_demanded_backdoor/

Wednesday, September 18, 2013

Major General Smedley Butler – The Military Industrial Complex’s Original Whistleblower

In the 1930′s, an outstanding Major General of the Marine Corps, Smedley Butler, went public with information that he was approached by powerful industrialists to be involved in a plot to overthrow the United States government. Led by powerful business magnates with the intention of ousting President Roosevelt and installing a Fascist dictatorship ruled by business magnates and a private army of half a million US soldiers, this coup was disrupted by Butler’s integrity and willingness to be one of the military industrial complex’s first whistle-blowers.

http://www.wakingtimes.com/2013/09/12/maj-gen-smedley-butler-military-industrial-complex-original-whistleblower/



Rothschild World Government Take Over Timeline

World government take over historical timeline.

http://www.thedailydigest.org/2011/09/29/rothschild-world-government-take-over-timeline/

“Mr. George Bush Of The Central Intelligence Agency” Part 1

What possible connection could there have been between George H.W. Bush and the assassination of John F. Kennedy?  Or between the C.I.A. and the assassination?  Or between Bush and the C.I.A.? For some people, apparently, making such connections was as dangerous as letting one live wire touch another.

In his book, Family of Secrets: The Bush Dynasty, America’s Invisible Government and the Hidden History of the Last Fifty Years, Russ Baker, editor of WhoWhatWhy, documents some of the strangest and least known events relating to the assassination, whose 50th anniversary falls this November 22.

http://whowhatwhy.com/2013/09/16/part-1-mr-george-bush-of-the-central-intelligence-agency/

Alex Jones Coverage of Bill Coopers Murder - Nov 6, 2001



The US classification system

Here we'll explain the classification system of the United States, which is far more complex than most people think, also because it's one of the world's biggest secrecy systems. In 2012 almost 5 million (!) people in the US had a clearance for access to classified information.*

The deeper parts of this classification system are classified, but some new details and codewords have been revealed in documents from the recent Snowden-leaks.

Classification levels

The United States government classifies information according to the degree which the unauthorized disclosure would damage national security. Like many other countries, the US has three classifications levels. From the highest to the lowest level these are:

- TOP SECRET (TS) - SECRET (S) - CONFIDENTIAL (C)

Government documents that do not have a classification can be marked as: - UNCLASSIFIED (U)

Top Level Telecommunications -Read full article »»

Tuesday, September 17, 2013

Fisa court: no telecoms company has ever challenged phone records orders

No telecommunications company has ever challenged the secretive Foreign Intelligence Surveillance court's orders for bulk phone records under the Patriot Act, the court revealed on Tuesday.

The secretive Fisa court's disclosure came inside a declassification of its legal reasoning justifying the National Security Agency's ongoing bulk collection of Americans' phone records.

http://www.theguardian.com/law/2013/sep/17/fisa-court-bulk-phone-records-collection

25 Fast Facts About The Federal Reserve

As we approach the 100 year anniversary of the creation of the Federal Reserve, it is absolutely imperative that we get the American people to understand that the Fed is at the very heart of our economic problems.  It is a system of money that was created by the bankers and that operates for the benefit of the bankers.  The American people like to think that we have a "democratic system", but there is nothing "democratic" about the Federal Reserve.  Unelected, unaccountable central planners from a private central bank run our financial system and manage our economy.  There is a reason why financial markets respond with a yawn when Barack Obama says something about the economy, but they swing wildly whenever Federal Reserve Chairman Ben Bernanke opens his mouth.  The Federal Reserve has far more power over the U.S. economy than anyone else does by a huge margin.  The Fed is the biggest Ponzi scheme in the history of the world, and if the American people truly understood how it really works, they would be screaming for it to be abolished immediately.  The following are 25 fast facts about the Federal Reserve that everyone should know...

http://theeconomiccollapseblog.com/archives/25-fast-facts-about-the-federal-reserve-please-share-with-everyone-you-know

Sunday, September 15, 2013

Syria: nearly half rebel fighters are jihadists or hardline Islamists, says IHS Jane's report

The new study by IHS Jane's, a defence consultancy, estimates there are around 10,000 jihadists - who would include foreign fighters - fighting for powerful factions linked to al-Qaeda.

Another 30,000 to 35,000 are hardline Islamists who share much of the outlook of the jihadists, but are focused purely on the Syrian war rather than a wider international struggle.

There are also at least a further 30,000 moderates belonging to groups that have an Islamic character, meaning only a small minority of the rebels are linked to secular or purely nationalist groups.

http://www.telegraph.co.uk/news/worldnews/middleeast/syria/10311007/Syria-nearly-half-rebel-fighters-are-jihadists-or-hardline-Islamists-says-IHS-Janes-report.html

NSA Spies on International Payments

The National Security Agency (NSA) widely monitors international payments, banking and credit card transactions, according to documents seen by SPIEGEL.

The information from the American foreign intelligence agency, acquired by former NSA contractor and whistleblower Edward Snowden, show that the spying is conducted by a branch called "Follow the Money" (FTM). The collected information then flows into the NSA's own financial databank, called "Tracfin," which in 2011 contained 180 million records. Some 84 percent of the data is from credit card transactions.

http://m.spiegel.de/international/world/a-922276.html#spRedirectedFrom=www&referrrer=

The Sixth Floor's Conspiracy

For more than two years, The Sixth Floor Museum, the city's official assassination museum in the School Book Depository Building, has lied about its involvement in the Dallas Police Department's campaign to cleanse Dealey Plaza of people who preach assassination theories to tourists.

Emails and now a lengthy legal deposition — the sworn testimony of a career police officer involved in the police department's "Dealey Plaza Initiative" — show irrefutably that The Sixth Floor was the lead agency goading the police all along.

http://www.dallasobserver.com/2013-09-12/news/the-sixth-floor-s-conspiracy/

Friday, September 13, 2013

E-ZPasses Get Read All Over New York (Not Just At Toll Booths)

A spokesperson for the New York Department of Transportation, Scott Gastel, says the E-Z Pass readers are on highways across the city, and on streets in Manhattan, Brooklyn and Staten Island, and have been in use for years. The city uses the data from the readers to provide real-time traffic information, as for this tool. The DoT was not forthcoming about what exactly was read from the passes or how long geolocation information from the passes was kept. Notably, the fact that E-ZPasses will be used as a tracking device outside of toll payment, is not disclosed anywhere that I could see in the terms and conditions.

http://www.forbes.com/sites/kashmirhill/2013/09/12/e-zpasses-get-read-all-over-new-york-not-just-at-toll-booths/

Wednesday, September 11, 2013

NSA shares raw intelligence including Americans' data with Israel

The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.

Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.

The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.

http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents

The Cowboy of the NSA

Inside Gen. Keith Alexander's all-out, barely-legal drive to build the ultimate spy machine

http://www.foreignpolicy.com/articles/2013/09/08/the_cowboy_of_the_nsa_keith_alexander

A Brief History of False Flag Terror



9/11 in 60 Seconds: Mass Trauma That Shocked the National Mind



9/11 - Echoes of Darkness [Mini-documentary]



9/11: FDNY Dispatch - World Trade Center Tapes



Tuesday, September 10, 2013

9-11 Explained in 5 Minutes



9/11: The 19 Suspects the Government Wants to Hide



One in Two Americans Have Doubts About Government’s Account of 9/11

On the 12th anniversary of 9/11, a new national survey by the polling firm YouGov reveals that one in two Americans have doubts about the government’s account of 9/11, and after viewing video footage of World Trade Center Building 7’s collapse, 46% suspect that it was caused by a controlled demolition. Building 7, a 47-story skyscraper, collapsed into its own footprint late in the afternoon on 9/11.

The poll was sponsored by ReThink911, a global public awareness campaign launched on September 1. The campaign includes a 54-foot billboard in Times Square and a variety of transit and outdoor advertising in 11 other cities, all posing the question, “Did you know a third tower fell on 9/11?”

http://rethink911.org/news/new-poll-finds-most-americans-open-to-alternative-911-theories/

Reality Check: More Americans "Rethinking" 9/11?



Sunday, September 8, 2013

Global warming? No, we’re actually cooling, say scientists

A cold Arctic summer has led to a record increase in the ice cap, leading experts to predict a period of global cooling.

There has been a 60 per cent increase in the amount of ocean covered with ice compared to this time last year, they equivalent of almost a million square miles.

A leaked report to the UN Intergovernmental Panel on Climate Change (IPCC) seen by the Mail on Sunday, has led some scientists to claim that the world is heading for a period of cooling that will not end until the middle of this century.

If correct, it would contradict computer forecasts of imminent catastrophic warming. The news comes several years after the BBC predicted that the arctic would be ice-free by 2013.

http://www.telegraph.co.uk/earth/environment/climatechange/10294082/Global-warming-No-actually-were-cooling-claim-scientists.html

NSA Can Spy On Smart Phone Data

The United States’ National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. Top secret NSA documents that SPIEGEL has seen explicitly note that the NSA can tap into such information on Apple iPhones, BlackBerry devices and Google’s Android mobile operating system.

The documents state that it is possible for the NSA to tap most sensitive data held on these smart phones, including contact lists, SMS traffic, notes and location information about where a user has been.

http://m.spiegel.de/international/world/a-920971.html#spRedirectedFrom=www&referrrer=http://www.infowars.com/nsa-can-spy-on-smart-phone-data/

Obama Administration Had Restrictions On NSA Reversed In 2011

Ellen Nakashima
Washington Post
September 7, 2013

The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases, according to interviews with government officials and recently declassified material.

In addition, the court extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years — and more under special circumstances, according to the documents, which include a recently released 2011 opinion by U.S. District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court.

http://m.washingtonpost.com/world/national-security/obama-administration-had-restrictions-on-nsa-reversed-in-2011/2013/09/07/c26ef658-0fe5-11e3-85b6-d27422650fd5_story.html

Professor Griff - The Illuminati & Hip Hop - Coast To Coast AM - Sept 06 2013 -



Who Was Really Behind the 9/11 Attacks?



Saturday, September 7, 2013

The GCHQ Tempora Programme

Tempora is the codename for a secret data gathering operation run by Britain's Government Communications Headquarters (GCHQ). Documents released by whistleblower Edward Snowden reveal that Tempora surpasses even the American Prism program in scope. Never before in the history of the world has a government had so much information about their citizens at its fingertips!

Thursday, September 5, 2013

Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security

Newly revealed documents show that the NSA has circumvented or cracked much of the encryption that automatically secures the emails, Web searches, Internet chats and phone calls of Americans and others around the world. The project, referred to internally by the codename Bullrun, also includes efforts to weaken the encryption standards adopted by software developers.

http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption

N.S.A. Foils Much Internet Encryption

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

http://mobile.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?pagewanted=all&

US and UK spy agencies defeat privacy and security on the internet

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.

The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.

http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

EXCLUSIVE: Soldier's claim SAS hit squad 'did kill Princess Diana' is 'utterly convincing'

Soldier N apparently claimed Diana and Dodi’s driver Henri Paul were blinded by an intense flash of light moments before he lost control of their ­Mercedes. The claim appears to support testimony from an ex-spy at the inquest into Diana and Dodi’s death.

The former MI6 agent told the hearing that he was aware of a colleague’s proposal to kill Serbian leader ­Slobodan Milosevic by using a strobe light in a tunnel to distract his driver, causing a crash.

And he revealed the existence of a shadowy unit within the SAS known as The Increment which comprises troops from the SAS and SBS for the purposes of carrying out lethal operations on behalf of MI6.

http://www.express.co.uk/news/royal/427036/EXCLUSIVE-Soldier-s-claim-SAS-hit-squad-did-kill-Princess-Diana-is-utterly-convincing

Wednesday, September 4, 2013

WikiLeaks Releases “Spy Files #3″ – 249 Documents from 92 Global Intelligence Contractors

Today, Wednesday 4 September 2013 at 1600 UTC, WikiLeaks released ‘Spy Files #3′ – 249 documents from 92 global intelligence contractors. These documents reveal how, as the intelligence world has privatised, US, EU and developing world intelligence agencies have rushed into spending millions on next-generation mass surveillance technology to target communities, groups and whole populations.

http://wikileaks.org/spyfiles3.html

NSA Laughs at PCs, Prefers Hacking Routers and Switches

The NSA runs a massive, full-time hacking operation targeting foreign systems, the latest leaks from Edward Snowden show. But unlike conventional cybercriminals, the agency is less interested in hacking PCs and Macs. Instead, America’s spooks have their eyes on the internet routers and switches that form the basic infrastructure of the net, and are largely overlooked as security vulnerabilities.

Under a $652-million program codenamed “Genie,” U.S. intel agencies have hacked into foreign computers and networks to monitor communications crossing them and to establish control over them, according to a secret black budget document leaked to the Washington Post. U.S. intelligence agencies conducted 231 offensive cyber operations in 2011 to penetrate the computer networks of targets abroad.

http://www.wired.com/threatlevel/2013/09/nsa-router-hacking/

Monday, September 2, 2013

Drug Agents Use Vast Phone Trove, Eclipsing NSA’s

For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.

The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.

http://mobile.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?pagewanted=1&_r=1&smid=tw-nytimes&partner=rss&emc=rss&