Monday, June 30, 2014

Court gave NSA broad leeway in surveillance, documents show

Virtually no foreign government is off-limits for the National Security Agency, which has been authorized to intercept information “concerning” all but four countries, according to top-secret documents.

The United States has long had broad no-spying arrangements with those four countries — Britain, Canada, Australia and New Zealand — in a group known collectively with the United States as the Five Eyes. But a classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well.

The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency.

Washington Post

Carlyle Group’s Latest Acquisition: the JFK Library (!)

JFK, who entered the White House as outgoing president Eisenhower warned about the dangerous growth of a “military-industrial complex,” battled constantly with the same forces that today virtually reign supreme. He was an enthusiast of attempts in the mass media to draw attention to threats to freedom here at home, as seen in such movies as Seven Days in May, about a military coup against the U.S. government, and The Manchurian Candidate, about the subversion of our democratic system through mind control.

Times have certainly changed. The CEO of Carlyle, it should be noted, is a Democrat. He worked for Jimmy Carter. Other figures in the Carlyle orbit over the years have been Republicans—including George H.W. Bush, former Secretary of State James Baker III, and former Defense Secretary Frank Carlucci—and high-profile foreigners, including British Prime Minister John Major and members of the bin Laden family.

Carlyle itself is one of the increasing ranks of strange companies that seem to come out of nowhere and are suddenly everywhere and into everything. (You really must treat yourself to a review of its holdings; even in the constrained precincts of Wikipedia, it’s still a wonder to behold—if you just drill down one level, from the military contractors to the pipeline companies, many of which it bought undervalued, reinvigorated with new government funding, and then sold off at great profit.)

http://whowhatwhy.com/2014/06/29/carlyle-groups-latest-acquisition-the-jfk-library/

Sunday, June 29, 2014

End the TSA

Whitey Bulger Complains He was Victimized by CIA Mind Control Experiments in the 1950s

Anyway, in the letters obtained by the Herald, Bulger writes to an Arizona man about life inside the federal prison in Tucson, and his bitterness over CIA “mind control” experiments he underwent while a prisoner more than 50 years ago.

“This was classified Top Secret,” Bulger writes. “They tricked us (convicts) into volunteering as ‘Guinea Pigs’ — all in violaton of the Nuremberg Code … They hung Nazi doctors for 
using prisioners for med. experiments — against the Law!”

Bulger, who was doing time for armed robbery in Atlanta, volunteered for the CIA experiment and was given LSD and other drugs along with 18 other inmates, in return for a reduced sentence. Bulger claims he still suffers ill effects from the experiments and cannot sleep at night.

Boston Herald

http://www.constantinereport.com/whitey-bulger-complains-victimized-cia-mind-control-experiments-1950s/

Saturday, June 28, 2014

Case of James Risen, Times Reporter, Poses Dilemma for Justice Department

After more than six years of legal wrangling, the case — the most serious confrontation between the government and the press in recent history — will reach a head in the coming weeks. Mr. Risen has steadfastly refused to testify. But he is now out of challenges. Early this month, the Supreme Court declined to review his case, a decision that allows prosecutors to compel his testimony. If Mr. Risen resists, he could go to prison.

Though the court’s decision looked like a major victory for the government, it has forced the Obama administration to confront a hard choice. Should it demand Mr. Risen’s testimony and be responsible for a reporter’s being sent to jail? Or reverse course and stand down, losing credibility with an intelligence community that has pushed for the aggressive prosecution of leaks?

New York Times

Friday, June 27, 2014

NSA queried phone records of just 248 people despite massive data sweep

The National Security Agency was interested in the phone data of fewer than 250 people believed to be in the United States in 2013, despite collecting the phone records of nearly every American.

As acknowledged in the NSA's first-ever disclosure of statistics about how it uses its broad surveillance authorities, released Friday, the NSA performed queries of its massive phone records troves for 248 "known or presumed US persons" in 2013.

http://www.theguardian.com/world/2014/jun/27/nsa-queries-phone-data-2013-report

Political Warfare and the History of Terrorism: The CIA’s Phoenix Program

A Review of The Phoenix Program by Douglas Valentine

By Kevin Ryan
Global Research, June 26, 2014
Douglas Valentine’s The Phoenix Program  is vital for understanding the history of terrorism and its role in political warfare. Few other historical accounts provide as much detail on how the U.S. government and the CIA began to use programs for counterterrorism to implement political policy through secretive, coldblooded actions. Understanding such history is critical to making sense of what is happening in our world today.

Although implemented as a means of countering terrorism, Valentine shows how the Phoenix Program was in practice a CIA-controlled campaign of terror in Vietnam. Hidden behind terms like pacification and neutralization, Phoenix implemented a program of terror and psychological warfare against the civilian population. Under the guise of counter terrorism, tens of thousands of civilians were kidnapped, tortured, and murdered.

http://www.constantinereport.com/political-warfare-history-terrorism-cias-phoenix-program/

Thursday, June 26, 2014

9/11 conspiracy group could force its way onto ballot

But a small nonprofit dedicated to uncovering the "truth" behind the collapse of the World Trade Center buildings is making a big push to get its issue in front of millions of voters. The group has gathered tens of thousands of petition signatures and raised hundreds of thousands of dollars in an effort to force the city to investigate the destruction of 7 World Trade Center during the attack 13 years ago.

The group, NYC Coalition for Accountability Now, is following the steps to place a referendum on the ballot in November that would require the city's Department of Buildings to investigate the collapse of any building taller than 20-stories dating back to 9/11, and in the future, but not including the Twin Towers. So far, only 7 WTC fits that description.

http://www.crainsnewyork.com/article/20140625/BLOGS04/140629907/9-11-conspiracy-group-could-force-its-way-onto-ballot

Red Cross: How We Spent Sandy Money Is a ‘Trade Secret’

Just how badly does the American Red Cross want to keep secret how it raised and spent over $300 million after Hurricane Sandy?

The charity has hired a fancy law firm to fight a public request we filed with New York state, arguing that information about its Sandy activities is a "trade secret."

http://www.propublica.org/article/red-cross-how-we-spent-sandy-money-is-a-trade-secret

Wednesday, June 25, 2014

Supreme Court bans warrantless cell phone searches

The Supreme Court ruled Wednesday that police cannot go snooping through people’s cell phones without a warrant, in a unanimous decision that amounts to a major statement in favor of privacy rights.

Police agencies had argued that searching through the data on cell phones was no different than asking someone to turn out his pockets, but the justices rejected that, saying a cell phone is more fundamental.

Washington Times

Tuesday, June 24, 2014

16 Ways the Supreme Court Built the Police State and Destroyed Your Rights

A review of the Supreme Court’s rulings over the past 10 years, including some critical ones this term, reveals a startling and steady trend towards pro-police state rulings by an institution concerned more with establishing order and protecting government agents than with upholding the rights enshrined in the Constitution.

Activist Post

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones

Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones.

The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently of each other at Kaspersky Lab in Russia and the Citizen Lab at the University of Toronto’s Munk School of Global Affairs in Canada, who say the findings provide great insight into the trade craft behind Hacking Team’s tools.

The new components target Android, iOS, Windows Mobile, and BlackBerry users and are part of Hacking Team’s larger suite of tools used for targeting desktop computers and laptops. But the iOS and Android modules provide cops and spooks with a robust menu of features to give them complete dominion over targeted phones.

http://www.wired.com/2014/06/remote-control-system-phone-surveillance/

US police departments are increasingly militarised, finds report

ACLU cites soaring use of war zone equipment and tactics
• Swat teams increasingly deployed in local police raids
• Seven civilians killed and 46 injured in incidents since 2010

http://www.theguardian.com/law/2014/jun/24/military-us-police-swat-teams-raids-aclu

https://www.aclu.org/war-comes-home-excessive-militarization-american-policing

When drones fall from the sky

More than 400 large U.S. military drones have crashed in major accidents around the world since 2001, a record of calamity that exposes the potential dangers of throwing open American skies to drone traffic, according to a year-long Washington Post investigation.

Since the outbreak of the wars in Afghanistan and Iraq, military drones have malfunctioned in myriad ways, plummeting from the sky because of mechanical breakdowns, human error, bad weather and other reasons, according to more than 50,000 pages of accident investigation reports and other records obtained by The Post under the Freedom of Information Act.

Washington Post

Monday, June 23, 2014

NSA? The Postal Service is watching you, too

In 2013, the Postal Inspection Service processed tens of thousands of mail covers, and also “photograph[ed] the exterior of every piece of paper mail” processed by the USPS through the Mail Isolation Control and Tracking program revealed last year.

Last July, the New York Times explained that “Snail mail is subject to the same kind of scrutiny that the National Security Agency has given to telephone calls and e-mail.”

A Postal Service Inspector General report released last month suggests that even the more restrained mail cover program should raise concerns.

A mail cover is used to record data presented on the outside of a piece of mail. This service is used for investigative measures within the Postal Inspection Service, but is also available to law enforcement and intelligence agencies.

According to the USPS Inspector General, law enforcement agencies requesting mail covers must first meet the requirements of the US Postal Inspection Service. They must demonstrate clear reasoning justifying their need to use these services, including details on the violation of law, or proof that a crime has been committed and how the mail cover would be of assistance in the investigation.

The Inspector General’s recent audit covered September 2013 through May 2014, and shows that post office officials failed to put in place compliance procedures over the course of 3 years, placing both privacy and security at risk.

http://www.constitutioncampaign.org/blog/?p=17220#.U6iy0RnD9Ah

Legal memo backing drone strike is released

A federal court on Monday released a previously secret government memo outlining the legal justification for the 2011 killing of Anwar al-Awlaki, a U.S. citizen and accused al-Qaeda operative, in a drone strike in Yemen.

The document was released under order of the U.S. Second Circuit Court of Appeals in New York and provides the most detailed explanation to date for the legal reasoning behind Awlaki’s killing. Its disclosure also represents a significant capitulation by the Obama administration, which fought for years to keep the memo — as well as many other aspects of its targeted killing program — secret from the public.

Washington Post

Sunday, June 22, 2014

New leaks show Germany's collusion with NSA

Several new Snowden-leaked documents show how closely Germany's intelligence agencies work with the NSA. But did the German government deliberately soften laws protecting privacy to make life easier for them?

http://www.dw.de/new-leaks-show-germanys-collusion-with-nsa/a-17726141

Saturday, June 21, 2014

America’s expanding police state

With so much happening internationally and the number of scandals, crises and general screw-ups of the Obama administration here at home, it’s worth noting a disturbing development here on the domestic front: a rapidly expanding police state.

On my radio program last week I had the pleasure of speaking with Cheryl Chumley, a reporter for The Washington Times, about her new book, “Police State USA: How George Orwell’s Nightmare is Becoming our Reality.” The title says it all, and aptly describes the shocking transformation of what had been our free society.

We all know about the scope of National Security Agency (NSA) spying. It’s fair to say at this point in our lives that the notion of privacy is all but dead and gone. However, it didn’t start there. In her book, Mrs. Chumley takes us on a ride through history, reminding us of the original intentions of the Founding Fathers versus the assault on the original design by “21st century realities.”

Washington Times

Friday, June 20, 2014

Snail mail snooping safeguards not followed

Cutting-edge data-gathering techniques may have grabbed the spotlight lately, but it turns out the government has been playing fast and loose with a more old-school surveillance method: snail-mail snooping.
The U.S. Postal Service failed to observe key safeguards on a mail surveillance program with a history of civil liberties abuses, according to a new internal watchdog report that USPS managers tried to keep secret, citing security concerns.

The Office of Inspector General audit of so-called “mail covers” — orders to record addresses or copy the outside of all mail delivered to an individual or an address — found that about 20 percent of the orders implemented for outside law enforcement agencies were not properly approved, and 13 percent were either unjustified or not correctly documented.

Politico

Thursday, June 19, 2014

The Iraq War Ten Years After

The U.S. invasion of Iraq turned out to be a textbook case of flawed assumptions, wrong-headed intelligence, propaganda manipulation, and administrative ad hockery, according to the National Security Archive's briefing book of declassified documents posted today to mark the 10th anniversary of the war.

The Archive's documentary primer includes the famous Downing Street memo ("intelligence and facts were being fixed around the policy"), the POLO STEP PowerPoint invasion plans (assuming out of existence any possible insurgency), an FBI interview with Saddam Hussein in captivity (he said he lied about weapons of mass destruction to keep Iran guessing and deterred), and the infamous National Intelligence Estimate about Iraq's weapons of mass destruction (wrong in its findings, but with every noted dissent turning out to be accurate).

"These dozen documents provide essential reading for anyone trying to understand the Iraq war," remarked Joyce Battle, Archive senior analyst who is compiling a definitive reference collection of declassified documents on the Iraq War. "At a moment when the public is debating the costs and consequences of the U.S. invasion, these primary sources refresh the memory and ground the discussion with contemporary evidence."

http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB418/

Wednesday, June 18, 2014

NSA ‘third party’ partners tap the Internet backbone in global surveillance program

Top-secret NSA documents from whistleblower Edward Snowden provide insight into a new and controversial chapter in the NSA's global mass surveillance plot. Under the codename RAMPART-A, ‘third party’ countries tap fiber optic cables carrying the majority of the world's electronic communications in collaboration with the NSA. These partnerships are among the NSAs closest-guarded secrets, and play a central role in the NSA’s ambition to be able to intercept any electronic communication, anywhere in the world.

It has previously been revealed that the UK monitors, records, and shares large volumes of data intercepted from the Internet backbone, which carries everything from emails to Skype calls across the globe at the speed of light. But the new documents show that a number of nations with weaker ties to the NSA – so-called “third party” partners - are more deeply involved in the NSAs global mass surveillance of individuals and organizations than previously known.

According to the Snowden documents, there are 33 third party countries. While the documents do not explicitly state which countries participate in the RAMPART-A program, details in the documents and extensive reporting points to Denmark and Germany being partners.

Access to everything
Special Source Operations (SSO), a top-secret NSA division, referred to by Snowden as the NSA’s »crown jewel« oversees the corporate and foreign intelligence partnerships that make the NSA’s vital cable access programs possible. Its logo, an eagle clasping trunks of brightly lit fiber crisscrossing the globe, leaves little room for interpretation: The SSO’s mission is to intercept and extract large data volumes from cables and networks worldwide.

http://www.information.dk/501280

How Secret Partners Expand NSA’s Surveillance Dragnet

Huge volumes of private emails, phone calls, and internet chats are being intercepted by the National Security Agency with the secret cooperation of more foreign governments than previously known, according to newly disclosed documents from whistleblower Edward Snowden.

The classified files, revealed today by the Danish newspaper Dagbladet Information in a reporting collaboration with The Intercept, shed light on how the NSA’s surveillance of global communications has expanded under a clandestine program, known as RAMPART-A, that depends on the participation of a growing network of intelligence agencies.

It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as “third-party partners,” are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables.

https://firstlook.org/theintercept/article/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/

Inquiry Into Hynes’s Spending as Prosecutor Widens

Federal prosecutors have joined a state investigation into possible fraud by Charles J. Hynes, the former Brooklyn district attorney, signaling that he could now be facing federal charges with longer prison terms.

Assistant United States attorneys from New York’s Eastern District are coordinating with an investigation by the state attorney general, Eric T. Schneiderman, who began his inquiry after a city report suggested Mr. Hynes had used more than $200,000 in public funds for a consultant to his re-election campaign. The report, by the Department of Investigation, said the misuse of funds could amount to larceny.

New York Times

New NSA Revelations: Inside Snowden's Germany File

One year after Edward Snowden made the breadth of the NSA's global data monitoring public, much remains unknown about the full scope of the intelligence service's activities in Germany. We know that the Americans monitored the mobile phone of German Chancellor Angela Merkel and we know that there are listening posts in the US Embassy in Berlin and in the Consulate General in Frankfurt.

But much remains in the dark. The German government has sent lists of questions to the US government on several occasions, and a parliamentary investigative committee has begun looking into the subject in Berlin. Furthermore, Germany's chief public prosecutor has initiated an investigation into the NSA -- albeit one currently limited to its monitoring of the chancellor's cell phone and not the broader allegation that it spied on the communications of the German public. Neither the government nor German lawmakers nor prosecutors believe they will receive answers from officials in the United States.

German Left Party politician Jan Korte recently asked just how much the German government knows about American spying activities in Germany. The answer: Nothing. The NSA's promise to send a package including all relevant documents to re-establish transparency between the two governments has been quietly forgotten by the Americans.

In response, SPIEGEL has again reviewed the Snowden documents relating to Germany and compiled a Germany File of original documents pertaining to the NSA's activities in the country that are now available for download here. SPIEGEL has reported on the contents of some of the documents over the course of the past year. The content of others is now being written about for the first time.

Der Spiegel

The NSA in Germany: Snowden's Documents Available for Download

In Edward Snowden's archive on NSA spying activities around the world, there are numerous documents pertaining to the agency's operations in Germany and its cooperation with German agencies. SPIEGEL is publishing 53 of them, available as PDF files.

Der Spiegel

Tuesday, June 17, 2014

Study Asserts Startling Numbers of Insider Trading Rogues

A quarter of all public company deals may involve some kind of insider trading, according to the study by two professors at the Stern School of Business at New York University and one professor from McGill University. The study, perhaps the most detailed and exhaustive of its kind, examined hundreds of transactions from 1996 through the end of 2012.

The professors examined stock option movements — when an investor buys an option to acquire a stock in the future at a set price — as a way of determining whether unusual activity took place in the 30 days before a deal’s announcement.

The results are persuasive and disturbing, suggesting that law enforcement is woefully behind — or perhaps is so overwhelmed that it simply looks for the most egregious examples of insider trading, or for prominent targets who can attract headlines.

The professors are so confident in their findings of pervasive insider trading that they determined statistically that the odds of the trading “arising out of chance” were “about three in a trillion.” (It’s easier, in other words, to hit the lottery.)

New York Times

Mass surveillance of social media is permitted by law, says top UK official

Mass surveillance of social media, such as Facebook, Twitter and YouTube, and even Google searches, is permissible because these are "external communications", according to the government's most senior security official.

In the first detailed justification of the UK's online interception policy, Charles Farr, director general of the Office for Security and Counter-Terrorism, has defended the way in which it sidesteps the need for individual search warrants.

http://www.theguardian.com/world/2014/jun/17/mass-surveillance-social-media-permitted-uk-law-charles-farr

Monday, June 16, 2014

Has the Dept. of Homeland Security Become America’s Standing Army?

If the United States is a police state, then the Department of Homeland Security (DHS) is its national police force, with all the brutality, ineptitude and corruption such a role implies. In fact, although the DHS’ governmental bureaucracy may at times appear to be inept and bungling, it is ruthlessly efficient when it comes to building what the Founders feared most—a standing army on American soil.

The third largest federal agency behind the Departments of Veterans Affairs and Defense, the DHS—with its 240,000 full-time workers, $61 billion budget and sub-agencies that include the Coast Guard, Customs and Border Protection, Secret Service, Transportation Security Administration (TSA) and the Federal Emergency Management Agency (FEMA)—has been aptly dubbed a “runaway train.”

Activist Post

Sunday, June 15, 2014

Secret state: The hidden world of governmental surveillance, from drone bases to "black sites"

Secret prisons, drone bases, surveillance stations, offices where extraordinary rendition is planned: Trevor Paglen takes pictures of the places that the American and British governments don’t want you to know even exist

http://www.independent.co.uk/news/world/americas/secret-state-trevor-paglen-documents-the-hidden-world-of-governmental-surveillance-from-drone-bases-to-black-sites-9536376.html

List of Banks owned by the Rothschild family

“Give me control over a nations currency, and I care not who makes its laws” – Baron M.A. Rothschild

Afghanistan: Bank of Afghanistan
Albania: Bank of Albania
Algeria: Bank of Algeria
Argentina: Central Bank of Argentina
Armenia: Central Bank of Armenia
Aruba: Central Bank of Aruba
Australia: Reserve Bank of Australia
Austria: Austrian National Bank
Azerbaijan: Central Bank of Azerbaijan Republic
Bahamas: Central Bank of The Bahamas
Bahrain: Central Bank of Bahrain
Bangladesh: Bangladesh Bank
Barbados: Central Bank of Barbados
Belarus: National Bank of the Republic of Belarus
Belgium: National Bank of Belgium
Belize: Central Bank of Belize
Benin: Central Bank of West African States (BCEAO)
Bermuda: Bermuda Monetary Authority
Bhutan: Royal Monetary Authority of Bhutan
Bolivia: Central Bank of Bolivia
Bosnia: Central Bank of Bosnia and Herzegovina
Botswana: Bank of Botswana
Brazil: Central Bank of Brazil
Bulgaria: Bulgarian National Bank
Burkina Faso: Central Bank of West African States (BCEAO)
Burundi: Bank of the Republic of Burundi
Cambodia: National Bank of Cambodia
Came Roon: Bank of Central African States
Canada: Bank of Canada – Banque du Canada *****
Cayman Islands: Cayman Islands Monetary Authority
Central African Republic: Bank of Central African States
Chad: Bank of Central African States
Chile: Central Bank of Chile
China: The People’s Bank of China ********************************************
Colombia: Bank of the Republic
Comoros: Central Bank of Comoros
Congo: Bank of Central African States
Costa Rica: Central Bank of Costa Rica
Côte d’Ivoire: Central Bank of West African States (BCEAO)
Croatia: Croatian National Bank
Cuba: Central Bank of Cuba
Cyprus: Central Bank of Cyprus
Czech Republic: Czech National Bank
Denmark: National Bank of Denmark
Dominican Republic: Central Bank of the Dominican Republic
East Caribbean area: Eastern Caribbean Central Bank
Ecuador: Central Bank of Ecuador
Egypt: Central Bank of Egypt **********
El Salvador: Central Reserve Bank of El Salvador
Equatorial Guinea: Bank of Central African States
Estonia: Bank of Estonia
Ethiopia: National Bank of Ethiopia
European Union: European Central Bank *************
money world

List of Banks owned by the Rothschild family
Fiji: Reserve Bank of Fiji
Finland: Bank of Finland
France: Bank of France
Gabon: Bank of Central African States
The Gambia: Central Bank of The Gambia
Georgia: National Bank of Georgia
Germany: Deutsche Bundesbank
Ghana: Bank of Ghana
Greece: Bank of Greece
Guatemala: Bank of Guatemala
Guinea Bissau: Central Bank of West African States (BCEAO)
Guyana: Bank of Guyana
Haiti: Central Bank of Haiti *****
Honduras: Central Bank of Honduras
Hong Kong: Hong Kong Monetary Authority
Hungary: Magyar Nemzeti Bank
Iceland: Central Bank of Iceland
India: Reserve Bank of India
Indonesia: Bank Indonesia
Iran: The Central Bank of the Islamic Republic of Iran ***************************************
Iraq: Central Bank of Iraq *****************************
Ireland: Central Bank and Financial Services Authority of Ireland
Israel: Bank of Israel
Italy: Bank of Italy
Jamaica: Bank of Jamaica
Japan: Bank of Japan
Jordan: Central Bank of Jordan
Kazakhstan: National Bank of Kazakhstan
Kenya: Central Bank of Kenya
Korea: Bank of Korea
Kuwait: Central Bank of Kuwait
Kyrgyzstan: National Bank of the Kyrgyz Republic
Latvia: Bank of Latvia
Lebanon: Central Bank of Lebanon
Lesotho: Central Bank of Lesotho
Libya: Central Bank of Libya *************Most Recently Added*********
us homeland security seal plaque m 747261

List of Banks owned by the Rothschild family
Uruguay: Central Bank of Uruguay
Lithuania: Bank of Lithuania
Luxembourg: Central Bank of Luxembourg
Macao: Monetary Authority of Macao
Macedonia: National Bank of the Republic of Macedonia
Madagascar: Central Bank of Madagascar
Malawi: Reserve Bank of Malawi
Malaysia: Central Bank of Malaysia
Mali: Central Bank of West African States (BCEAO)
Malta: Central Bank of Malta
Mauritius: Bank of Mauritius
Mexico: Bank of Mexico
Moldova: National Bank of Moldova
Mongolia: Bank of Mongolia
Montenegro: Central Bank of Montenegro
Morocco: Bank of Morocco
Mozambique: Bank of Mozambique
Namibia: Bank of Namibia
Nepal: Central Bank of Nepal
Netherlands: Netherlands Bank
Netherlands Antilles: Bank of the Netherlands Antilles
New Zealand: Reserve Bank of New Zealand
Nicaragua: Central Bank of Nicaragua
Niger: Central Bank of West African States (BCEAO)
Nigeria: Central Bank of Nigeria
Norway: Central Bank of Norway
Oman: Central Bank of Oman
Pakistan: State Bank of Pakistan
Papua New Guinea: Bank of Papua New Guinea
Paraguay: Central Bank of Paraguay
Peru: Central Reserve Bank of Peru
Philip Pines: Bangko Sentral ng Pilipinas
Poland: National Bank of Poland
Portugal: Bank of Portugal
Qatar: Qatar Central Bank
Romania: National Bank of Romania
Russia: Central Bank of Russia ***********************************************
Rwanda: National Bank of Rwanda
San Marino: Central Bank of the Republic of San Marino
Samoa: Central Bank of Samoa
Saudi Arabia: Saudi Arabian Monetary Agency **************
Senegal: Central Bank of West African States (BCEAO)
Serbia: National Bank of Serbia
Seychelles: Central Bank of Seychelles
Sierra Leone: Bank of Sierra Leone
Singapore: Monetary Authority of Singapore
Slovakia: National Bank of Slovakia
Slovenia: Bank of Slovenia
Solomon Islands: Central Bank of Solomon Islands
South Africa: South African Reserve Bank
Spain: Bank of Spain
Sri Lanka: Central Bank of Sri Lanka
Sudan: Bank of Sudan
Surinam: Central Bank of Suriname
Swaziland: The Central Bank of Swaziland
Sweden: Sveriges Riksbank
Switzerland: Swiss National Bank ******************
Tajikistan: National Bank of Tajikistan
Tanzania: Bank of Tanzania
Thailand: Bank of Thailand
Togo: Central Bank of West African States (BCEAO)
Tonga: National Reserve Bank of Tonga
Trinidad and Tobago: Central Bank of Trinidad and Tobago
Tunisia: Central Bank of Tunisia
Turkey: Central Bank of the Republic of Turkey ***********
Uganda: Bank of Uganda
Ukraine: National Bank of Ukraine
United Arab Emirates: Central Bank of United Arab Emirates *****************
United Kingdom: Bank of England ********************Mother Central Bank*********************
United States: Federal Reserve, Federal Reserve Bank of New York ******************************
US FederalReserveSystem Seal svg

List of Banks owned by the Rothschild family
Vanuatu: Reserve Bank of Vanuatu
Venezuela: Central Bank of Venezuela ***************************************
Vietnam: The State Bank of Vietnam
Yemen: Central Bank of Yemen
Zambia: Bank of Zambia
Zimbabwe: Reserve Bank of Zimbabwe

http://flowofwisdom.com/2014/06/09/list-of-banks-owned-by-the-rothschild-family/

Friday, June 13, 2014

Citing “Intense Public Interest and Concern” Over Mass Surveillance, Judge Orders DOJ to Turn Over Secret Legal Opinions for Court to Review

A federal judge today ordered the Department of Justice to hand over key opinions by the Foreign Intelligence Surveillance Court (also known as the “FISA court”) so the judge can directly review whether information about mass surveillance was improperly withheld from the public.
The order is another victory in EFF’s Freedom of Information Act lawsuit against the DOJ, which sought to reveal how the government uses Section 215 of the Patriot Act to secretly gather communications records from millions of American citizens.

EFF

What you need to know about commercial drones

Wondering why you don't see drones everywhere, despite the intention of Amazon and others to deliver all the things with flying robots? Here's why: It's illegal. The United States Federal Aviation Administration (FAA) doesn't permit filming, crop-spraying, spying, tour-guiding, pizza delivery or any other commercial drone applications (you can, however, fly one privately). "But that's unjust!" you may rail. "Why should the government stop businesses from plying their trades?" The FAA is charged with keeping the skies safe, and drone operators could pose a danger to commercial aircraft or spy on you illegally. On the other hand, US businesses want the FAA to approve drone use stat, so they can stop operating quasi-illegally and start making money. So, who's right? Who's wrong? Here are the ABCs of commercial drone flight in the US.

Engadget

Did US fake top Nazi's WWII suicide and spirit him away to get hands on Hitler's secret weapons programme?

S.S. general Hans Kammler was head of construction and defence projects

He planned forced labour factories at Auschwitz and secret V-2 rocket plants

Officially he committed suicide near Prague on May 9, 1945

But a new documentary has suggested his suicide was faked by the Americans who wanted his secrets of Hitler's weapon programme

Daily Mail

Why Online Tracking Is Getting Creepier

Currently, many companies track where users go on the Web—often through cookies—in order to display customized ads. That's why if you look at a pair of shoes on one site, ads for those shoes may follow you around the Web.

But online marketers are increasingly seeking to track users offline, as well, by collecting data about people's offline habits—such as recent purchases, where you live, how many kids you have, and what kind of car you drive.

http://www.propublica.org/article/why-online-tracking-is-getting-creepier

US pushing local police departments to keep quiet on cell-phone surveillance technology

The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods, The Associated Press has learned.

Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any about the purchase and use of such powerful surveillance equipment.

Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.

AP

Thursday, June 12, 2014

Law Enforcement Agencies Continue To Obtain Military Equipment, Claiming The United States Is A 'War Zone'

That law enforcement agencies across the US are swiftly converting themselves into military outfits is hardly a surprise at this point. The problem is that nothing seems to be slowing them down, not even the dismayed reactions of citizens supposedly under their care.

The government's desire to offload its unused military hardware at deeply discounted rates has turned a few outliers into the new normal. Towns as with populations well under the 10,000 mark have secured Mine-Resistant Ambush Protected (MRAP) vehicles, supposedly in order to keep up with a non-existent arms race between the good guys and the bad guys.

The MRAPs are only the most visible symptom of law enforcement's desire to dress for battle. Along with the vehicles (which normally run from $250,000-$750,000 but are routinely paid for by DHS grants awarded to requests that mention the word "terrorism" or "drugs" in a sufficiently terrified manner), agencies are also picking up military-grade weapons like grenade launchers and automatic weapons. The low prices and large grants make this an opportunity few agencies are able to resist.

https://www.techdirt.com/articles/20140610/11461127539/law-enforcement-agencies-continue-to-obtain-military-equipment-claiming-united-states-is-war-zone.shtml

Pentagon preparing for mass civil breakdown

A US Department of Defense (DoD) research programme is funding universities to model the dynamics, risks and tipping points for large-scale civil unrest across the world, under the supervision of various US military agencies. The multi-million dollar programme is designed to develop immediate and long-term "warfighter-relevant insights" for senior officials and decision makers in "the defense policy community," and to inform policy implemented by "combatant commands."

http://www.theguardian.com/environment/earth-insight/2014/jun/12/pentagon-mass-civil-breakdown

Wednesday, June 11, 2014

Cops Can’t Collect Your Cell Tower Data Without a Warrant, Court Rules

A federal appeals court has ruled that the warrantless collection of cellphone tower data, which can be used to track the location of a suspect, is unconstitutional without a probable-cause warrant from a court.

A three-judge panel of the 11th Circuit Court in Florida ruled that the government’s warrantless collection of a defendant’s cell site data violated his reasonable expectation of privacy.

“In short, we hold that cell site location information is within the subscriber’s reasonable expectation of privacy,” they wrote in their ruling (.pdf). “The obtaining of that data without a warrant is a Fourth Amendment violation.”

Although the 11th Circuit Court ruling covers only three states — Florida, Georgia, and Alabama — it constitutes the first time that a federal appeals court has ruled in favor of a warrant for cell site data and is being touted by civil liberties groups as a victory in the effort to protect phone users from unreasonable searches and seizures.

http://www.wired.com/2014/06/cell-tower-data-requires-warrant/

New Details on the 1961 Goldsboro Nuclear Accident

Multi-Megaton Bomb Was Virtually "Armed" When It Crashed to Earth in North Carolina, Sandia Lab Report Concluded

Nuclear Stockpile Safety Review from the Mid-1970s Identified Four Weapons Systems that Needed "Time Urgent" Evaluation Because of "Nuclear Detonation Safety Concerns"

1986 Sandia Lab Study Found that, with Respect to "Fully Assembled" and "Combat-Ready" Nuclear Weapons, U.S. Could Not Claim "in an Absolute Sense, that We Take Every Action to Ensure their Safety"

National Security Archive Electronic Briefing Book No. 475

Posted - June 9, 2014 (UPDATED JUNE 11, 2014)

http://www2.gwu.edu/~nsarchiv/nukevault/ebb475/

Nuclear bomb nearly detonated over North Carolina, declassified report says



There are few things in this world that can change the course of history faster than a nuclear bomb exploding. The devastation is immediate and lasts for years.

That makes the latest details to emerge about a Jan. 24, 1961, incident involving two nuclear bombs all the more jarring. A B-52 bomber broke up in the sky over North Carolina, and one of the two bombs on board was in the “armed” setting by the time it hit the ground near Goldsboro, N.C., according to a newly declassified report published Monday by the National Security Archive. If the switch had not been damaged by the impact of the crash, the weapon could have detonated, the report said.

Washington Post

Tuesday, June 10, 2014

Revealed: Asian slave labour producing prawns for supermarkets in US, UK

A six-month investigation has established that large numbers of men bought and sold like animals and held against their will on fishing boats off Thailand are integral to the production of prawns (commonly called shrimp in the US) sold in leading supermarkets around the world, including the top four global retailers: Walmart, Carrefour, Costco and Tesco.

The investigation found that the world's largest prawn farmer, the Thailand-based Charoen Pokphand (CP) Foods, buys fishmeal, which it feeds to its farmed prawns, from some suppliers that own, operate or buy from fishing boats manned with slaves.

Men who have managed to escape from boats supplying CP Foods and other companies like it told the Guardian of horrific conditions, including 20-hour shifts, regular beatings, torture and execution-style killings. Some were at sea for years; some were regularly offered methamphetamines to keep them going. Some had seen fellow slaves murdered in front of them.

http://www.theguardian.com/global-development/2014/jun/10/supermarket-prawns-thailand-produced-slave-labour

Monday, June 9, 2014

Thousands of children in Irish care homes at centre of 'baby graves scandal' were used in secret vaccine trials in the 1930s

Scientists secretly vaccinated more than 2,000 children in religious-run homes in suspected illegal drug trials, it emerged today.

Old medical records show that 2,051 children and babies in Irish care homes were given a one-shot diphtheria vaccine for international drugs giant Burroughs Wellcome between 1930 and 1936.

There is no evidence that consent was ever sought, nor any records of how many may have died or suffered debilitating side-effects as a result.

The scandal was revealed as Irish premier, Enda Kenny, ordered ministers to see whether there are more mass baby graves after the discovery that 800 infants may be buried in a septic tank outside a former mother and baby home in Tuam, Co. Galway.

Daily Mail

War Gear Flows to Police Departments

During the Obama administration, according to Pentagon data, police departments have received tens of thousands of machine guns; nearly 200,000 ammunition magazines; thousands of pieces of camouflage and night-vision equipment; and hundreds of silencers, armored cars and aircraft.

The equipment has been added to the armories of police departments that already look and act like military units. Police SWAT teams are now deployed tens of thousands of times each year, increasingly for routine jobs.

New York Times

EXCLUSIVE REPORT: NSA Whistleblower: Snowden Never Had Access to the JUICIEST Documents … Far More Damning

RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden?

Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing?

They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.]

Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way.

I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”.   SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these.   STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.

http://www.washingtonsblog.com/2014/06/original-nsa-whistleblower-snowden-never-access-juicy-documents.html

Sunday, June 8, 2014

65 Things We Know About NSA Surveillance That We Didn’t Know a Year Ago

It's been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent people. Since then, the onslaught of disturbing revelations, from disclosures, admissions from government officials, Freedom of Information Act requests, and lawsuits, has been nonstop. On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago:

EFF

Friday, June 6, 2014

NSA: Inside the FIVE-EYED VAMPIRE SQUID of the INTERNET

Profiling the global machinations of merchant bank Goldman Sachs in Rolling Stone in 2009, journalist Matt Taibbi famously characterized them as operating "everywhere ... a great vampire squid wrapped around the face of humanity, relentlessly jamming its blood funnel into anything that smells like money”.

The NSA, with its English-speaking "Five Eyes" partners (the relevant agencies of the UK, USA, Australia, New Zealand and Canada) and a hitherto unknown secret network of corporate and government partners, has been revealed to be a similar creature. The Snowden documents chart communications funnels, taps, probes, "collection systems" and malware "implants" everywhere, jammed into data networks and tapped into cables or onto satellites.

The evidence Snowden has provided, by the bucketload, has shown that no country, no network, no communications system, no type of communication has been too small or trivial or irrelevant to attract attention and the ingestion of data into huge and enduring archives - under construction at NSA headquarters and already in operation at its new Utah Data Center.

http://www.theregister.co.uk/2014/06/05/how_the_interenet_was_broken/

Some Governments Have Backdoor Access to Listen in on Calls, Vodafone Says

An undisclosed number of countries have direct backdoor access to the communications passing through the network of telecommunications giant Vodafone, without needing to obtain a warrant, according to a new transparency report released by the company. In these countries, the company noted, Vodafone “will not receive any form of demand for lawful interception access as the relevant agencies and authorities already have permanent access to customer communications via their own direct link.”

Governments in these countries have direct cables or interception systems connected to the networks of Vodafone and other telecoms, which allow them to silently intercept and record all communications that pass over the networks. This happens at the flick of a switch and without the countries obtaining court permission or notifying the telecoms that they are accessing the data, according to Vodafone.

http://www.wired.com/2014/06/vodafone-transparency-report/

'New York Times' Editor: Losing Snowden Scoop 'Really Painful'

When former National Security Agency contractor Edward Snowden made the fateful decision to share sensitive documents with reporters revealing secret and mass gathering of the metadata associated with the phone calls made by tens of millions of Americans, he had to figure out which news outfit to trust.

But Snowden already knew the one place he didn't trust: The New York Times. He went instead to reporters working for The Guardian and The Washington Post, each of which posted the first in a series of breathtaking revelations one year ago. In April, the two news organizations shared the Pulitzer Prize for public service.

Snowden's choice was the bitter harvest of seeds sown by the Times almost a decade ago. In the fall of 2004, just ahead of the November general elections, the Times' news leadership spiked an exclusive from Washington correspondents James Risen and Eric Lichtblau, disclosing massive warrantless domestic eavesdropping by the NSA.

NPR

Some numbers about NSA's data collection

Today it's exactly one year ago the Snowden-leaks started. Among the many highly classified documents which were disclosed during the past year are various charts that provide us with actual numbers about the amount of data the National Security Agency (NSA) is collecting.

Here we will take a look at those numbers and see what we can learn from them by comparing various sources and from breaking them down into NSA-divisions, countries and collection programs. As still only fragmented parts have been published, this overview cannot provide completeness or full accuracy (estimates are shown as round numbers).

BOUNDLESSINFORMANT

The most detailed numbers about NSA's data collection are from the BOUNDLESSINFORMANT tool, which is used by NSA officials to view the metadata volumes collected from specific countries or by specific programs.

A worldwide overview is provided by a heat map which was published by The Guardian on June 11, 2013. It displays the figures over a 30-day period ending in March 2013:

NSA worldwide total:

Internet records (DNI):
Telephony records (DNR):

221.919.881.317

97.111.188.358
124.808.692.959

This total of 221 billion telephony and internet records a month equals 2,6 trillion a year and 7,3 billion a day.

http://electrospaces.blogspot.com/2014/06/some-numbers-about-nsas-data-collection.html?m=1

Thursday, June 5, 2014

Exclusive: How FBI Informant Sabu Helped Anonymous Hack Brazil

In early 2012, members of the hacking collective Anonymous carried out a series of cyber attacks on government and corporate websites in Brazil. They did so under the direction of a hacker who, unbeknownst to them, was wearing another hat: helping the Federal Bureau of Investigation carry out one of its biggest cybercrime investigations to date.

A year after leaked files exposed the National Security Agency's efforts to spy on citizens and companies in Brazil, previously unpublished chat logs obtained by Motherboard reveal that while under the FBI's supervision, Hector Xavier Monsegur, widely known by his online persona, "Sabu," facilitated attacks that affected Brazilian websites.

The operation raises questions about how the FBI uses global internet vulnerabilities during cybercrime investigations, how it works with informants, and how it shares information with other police and intelligence agencies.

http://motherboard.vice.com/read/exclusive-how-an-fbi-informant-helped-anonymous-hack-brazil?trk_source=homepage-lede

How an FBI informant orchestrated the Stratfor hack

Sealed court documents obtained by the Daily Dot and Motherboard, however, reveal that the attack was instigated and orchestrated not by Hammond, but by an informant, with the full knowledge of the Federal Bureau of Investigation (FBI).

In addition to directly facilitating the breach, the FBI left Stratfor and its customers—which included defense contractors, police chiefs, and National Security Agency employees—vulnerable to future attacks and fraud, and it requested knowledge of the data theft to be withheld from affected customers. This decision would ultimately allow for millions of dollars in damages.

The documents also confirm the integral role of a shadowy hacker, operating under the handle “Hyrriiya,” who provided key access for the now-infamous attack.

http://www.dailydot.com/politics/hammond-sabu-fbi-stratfor-hack/

Prosecutors launch probe into NSA tapping Merkel's mobile

Germany's federal public prosecutor confirmed on Wednesday that he would formally probe the US intelligence agency, the National Security Agency (NSA), for its monitoring of Chancellor Angela Merkel's cellular phone. Less than a week ago, it appeared that the case would be dropped, a situation that prompted considerable criticism in parliament and the domestic press.

http://www.dw.de/prosecutors-launch-probe-into-nsa-tapping-merkels-mobile/a-17681574

Will the Government Finally Acknowledge Which Telecom Companies Cooperate With the NSA?

Yesterday, advocates for government transparency argued for the release of more documents that could reveal how the Federal Intelligence Act Surveillance (FISA) Court has provided oversight of the US intelligence community and confirm which telecom companies cooperated with the government. It's the latest step in an uphill battle that's been waged by the Electronic Frontier Foundation since 2011 for records they say may reveal disputes between the FISA court and the intelligence community, confirm the existence additional surveillance programs, and provide official acknowledgment of some essential details of known programs that have been already revealed in the media.

Under Freedom of Information Act law, the government can be compelled to release information once the existence of it has been established through authorized disclosures, like official statements and court-ordered releases. But unauthorized disclosures like leaks don't count. That's a problem the EFF is now grappling with. While the government has voluntarily confirmed the existence of some programs first revealed by Snowden, and the leaks themselves have revealed details that the EFF sought in its original 2011 lawsuit, leaked information can't be used as the basis for requesting more information, even if the seeking party knows certain information and documents exist. It's a government secrecy Catch-22.

http://m.motherjones.com/politics/2014/06/justice-department-still-doesnt-care-what-you-think-you-heard-ed-snowden

Wednesday, June 4, 2014

Daniel Estulin Discusses 25th anniversary of the Tiananmen Square Massacre

Let’s Not Forget Duane Andrews and SAIC

Both before and after 9/11, one private company had a greater impact on counterterrorism programs in the Unites States than any other. That company, Science Applications International Corporation (SAIC), also profited more from the events of 9/11 than any other. Its chief operating officer (COO), Duane Andrews, was a man who had expertise-level knowledge of the vulnerabilities that were exploited on 9/11. He also just happened to be a long-time, close colleague of Dick Cheney and Donald Rumsfeld.

SAIC feeds on terrorism, having won many of its record number of government contracts through the national security state that has arisen via the War on Terror. Through its numerous contracts and employee security clearances, it has become a private business that cannot be distinguished from a permanent form of government. In short, SAIC is “the fraternal twin of the intelligence establishment.”[1]

With regard to 9/11, SAIC’s impact cannot be overstated as the company:

Created the national databases that tracked and identified terrorists
Supplied U.S. airports with terrorism screening equipment
Predicted and investigated terrorist attacks against U.S. infrastructure including national defense networks and the World Trade Center (WTC)
Helped create the official account for what happened at the WTC both in 1993 and after 9/11
Was a leader in research on thermitic materials like those found in the WTC dust[2]
Employed the leader of the robotics team that scoured the pile at Ground Zero, using equipment capable of eliminating explosives
Provided the information to capture the alleged mastermind of the attacks, Khalid Sheik Mohammed (KSM)
Furthermore, Dick Cheney’s long-time protégé, Duane P. Andrews, ran SAIC’s government business for thirteen years, from 1993 to 2006, and was therefore a principal character in these activities. During this time, Andrews was also a leading corporate representative on government commissions and taskforces that evaluated threats to U.S. defense and information systems.

http://911blogger.com/news/2014-06-04/let-s-not-forget-duane-andrews-and-saic

War Crimes and 9/11: Why Dick and Don Are Suspects

Richard Clarke, the former counterterrorism official, has recently come out suggesting that George W. Bush, Dick Cheney, and Donald Rumsfeld should be brought up on war crimes. Unfortunately, media outlets reporting this story have failed to examine Clarke’s long relationship to Cheney and Rumsfeld and his record of having prevented the capture of Osama bin Laden. These omissions highlight that, although Cheney and Rumsfeld undoubtedly are guilty of post-9/11 war crimes, suspicions that they helped create the pretext for those crimes go unreported.

Clarke’s history is regularly misrepresented in the media. It’s often said that he started in his counterterror position under Clinton when he was, in fact, appointed to it by George H.W. Bush in 1992. Clarke is a right wing hawk who had close ties to Cheney and Rumsfeld going back at least another decade with his selection for a secret Reagan Administration project. Clarke, Cheney and Rumsfeld were among a small group that spent nearly 30 years practicing to takeover the United States government in the Continuity of Government (COG) program. Their secretive COG plan was implemented only once—on the morning of 9/11.

http://911blogger.com/news/2014-06-04/war-crimes-and-911-why-dick-and-don-are-suspects

How GCHQ & NSA tap Internet cables

Exclusive Above-top-secret details of Britain’s covert surveillance programme - including the location of a clandestine British base tapping undersea cables in the Middle East - have so far remained secret, despite being leaked by fugitive NSA sysadmin Edward Snowden. Government pressure has meant that some media organisations, despite being in possession of these facts, have declined to reveal them. Today, however, the Register publishes them in full.

The secret British spy base is part of a programme codenamed “CIRCUIT” and also referred to as Overseas Processing Centre 1 (OPC-1). It is located at Seeb, on the northern coast of Oman, where it taps in to various undersea cables passing through the Strait of Hormuz into the Persian/Arabian Gulf. Seeb is one of a three site GCHQ network in Oman, at locations codenamed “TIMPANI”, “GUITAR” and “CLARINET”. TIMPANI, near the Strait of Hormuz, can monitor Iraqi communications. CLARINET, in the south of Oman, is strategically close to Yemen.

British national telco BT, referred to within GCHQ and the American NSA under the ultra-classified codename “REMEDY”, and Vodafone Cable (which owns the former Cable & Wireless company, aka “GERONTIC”) are the two top earners of secret GCHQ payments running into tens of millions of pounds annually.

The Register

Tuesday, June 3, 2014

For The First Time Ever, More Than Half The Members Of Congress Are Millionaires

Wealthy members of Congress are living the high life at taxpayer expense, while most of the rest of the country continues to suffer through one of the worst economic periods in our lifetimes.  According to an analysis conducted by the Center for Responsive Politics earlier this year, more than half of the members of Congress are millionaires.  This is the first time that this has ever happened in U.S. history.  In addition, the same study found that a hundred members of Congress are actually worth at least five million dollars.  We have a government of the wealthy, by the wealthy and for the wealthy, but as you will see below, that isn’t stopping members of Congress from wasting taxpayer money in some incredibly bizarre ways.  Millions of dollars are being spent on “office expenses” and on the hair care needs of Senators, but very little is being done to stop this abuse.  It is almost as if the American people have just accepted that this is how “big government” is supposed to operate.
No matter what your political affiliation is, it should bother you that we are overwhelmingly being represented by the very wealthy.  We are supposed to be a government “of the people”, but instead Congress is rapidly becoming a millionaire’s club…

http://endoftheamericandream.com/archives/for-the-first-time-ever-more-than-half-the-members-of-congress-are-millionaires

Supreme Court Rejects Appeal From Times Reporter Over Refusal to Identify Source

The Supreme Court on Monday turned down an appeal from James Risen, a reporter for The New York Times facing jail for refusing to identify a confidential source.

The court’s one-line order gave no reasons but effectively sided with the government in a confrontation between what prosecutors said was an imperative to secure evidence in a national security prosecution and what journalists said was an intolerable infringement of press freedom.

The case arose from a subpoena to Mr. Risen seeking information about his source for a chapter of his 2006 book, “State of War.” Prosecutors say they need Mr. Risen’s testimony to prove that the source was Jeffrey Sterling, a former C.I.A. official.

The United States Court of Appeals for the Fourth Circuit, in Richmond, Va., ordered Mr. Risen to comply with the subpoena. Mr. Risen has said he will refuse.

“I will continue to fight,” Mr. Risen said Monday.

New York Times

Monday, June 2, 2014

William C. Van Duyn’s Opening Remarks Bilderberg 2014

This letter was sent to Fritz Springmeier and is posted on his website...

Today, my speech will be officially published by our new enemy : the Media.
Bilderberg isn´t a secret society, never was. Perhaps in the eyes of the population, but what we did is we kept our topics and decision to ourselves. We are not an evil. I do not have an all-seeing eye. My ancestors only made sure the Eye is on the [U.S.] dollar bill.

Bilderberg is no conspiracy, but people and conspiracists with their infantile fantasies see it as such. None of you, and I don’t care how powerful you are, sit around the table in a dark room, holding hands, staring at a crystal ball, planning the world´s future.

The exuberant myth created by conspiracy theorists, journalists, and media moguls has been fabricated about the image of the Bilderberg. But are they really the cause of our consequences? Didn’t we involve ourselves into this luxurious secretive, mystical image? Going back in time, I am today in conversation with a certain controversial researcher who studied the Illuminati for more than 2 decades [Fritz Springmeier]. I respect this gentleman for his courage and vision.
I want to change history.

http://pentracks.com/blog/2014/05/william-c-van-duyns-opening-remarks-bilderberg-mtg-2014/

Bilderberg 2014: George Osborne and the man at the centre of everything

After terrifying John Major, Sir John Kerr has moved on to well-connected boardrooms and the heart of Bilderberg

http://www.theguardian.com/world/2014/jun/02/bilderberg-2014-george-osborne-john-kerr

World Trade Center Bldg. 7’s Controlled Demolition: 9/11 Consensus Panel Releases New Evidence from Witness Testimonies and Architectural Drawings

The 24-member 9/11 Consensus Panel – which includes physicists, chemists, engineers, commercial pilots, attorneys and lawyers – today announced three new studies confirming the controlled demolition of World Trade Center 7.

The studies scientifically refute the U.S. National Institute of Standards and Technology (NIST) claim that, for the first time in history, fire caused the sudden and complete collapse of a large, fire-protected, steel-framed building on 9/11.

(Note that whereas the Consensus Panel uses a scientific methodology to peer-review its work, the NIST report was not peer-reviewed.)

The first Panel study deals with the NIST computer simulations, which purported to show that fire-induced thermal expansion caused a girder to be pushed off its seat at Column 79, thereby initiating a global collapse of the entire 47-storey building at 5:21 in the afternoon.

However, a recent FOIA request has produced WTC 7 architectural drawings showing that the NIST simulations omitted basic structural supports that would have made this girder failure impossible.

The second Consensus Panel study deals with NIST’s claim that it did not recover any steel from this massive steel-frame skyscraper.

This is extraordinary, given the need to understand why a steel-frame building would have completely collapsed for the first time in history from fire alone, and to thereby prevent a recurrence.

We know now that some of the steel was recovered.  Photographs recently obtained by researchers show the strange curled-up paper-thin WTC 7 steel, with a NIST investigator pointing it out.

The third Panel study shows that on September 11, 2001, many people were told hours in advance that WTC 7 was going to collapse.

MSNBC reporter Ashleigh Banfield said early in the afternoon: “I’ve heard several reports from several different officers now that that is the building that is going to go down next.”

Many members of the New York Fire Department were confidently waiting for the building to come down:

Firefighter Thomas Donato: “We were standing, waiting for seven to come down. We were there for quite a while, a couple hours.”

Assistant Commissioner James Drury: “I must have lingered there. There were hundreds of firefighters waiting to — they were waiting for 7 World Trade Center to come down.”

Chief Thomas McCarthy: “So when I get to the command post, they just had a flood of guys standing there. They were just waiting for 7 to come down.”

In addition, CNN and the BBC made premature announcements.

This foreknowledge corroborates the evidence presented in previous Consensus Points (WTC7-1 to WTC7-5) that WTC 7 was brought down by controlled demolition.

http://www.consensus911.org/press-release-world-trade-center-bldg-7s-controlled-demolition-911-consensus-panel-releases-new-evidence-from-witness-testimonies-and-architectural-drawings/

Second Informant Surfaces in ICE’s Mayan Jaguar Cocaine-Plane Op

US Attorney Dismisses Criminal Case Against Brazilian Informant

The secrecy cloaking a corporate jet with a CIA-linked tail number that crash landed in Mexico in the fall of 2007 with a nearly four-ton load of cocaine onboard continues to unravel, one string at a time.

The Gulfstream II cocaine jet was part of a suspected US intelligence operation wrapped in the garbs of an Immigration and Customs Enforcement (ICE) undercover operation called Mayan Jaguar, law enforcement sources suspect.

The newest revelations in the case pop up in court pleadings recently unearthed by Narco News and show the cocaine jet that ditched in Mexico’s Yucatan in September 2007 was part of a much larger web of cocaine planes sold to drug-traffickers with the assistance of at least two informants who continue to work for or own aviation brokerage companies.

The ICE undercover operation played out in the first decade of the 2000s (roughly 2004 until sometime in 2008) and involved the use of US government front companies to sell aircraft to suspected Latin American drug-trafficking organizations.

http://narcosphere.narconews.com/notebook/bill-conroy/2014/06/second-informant-surfaces-ice-s-mayan-jaguar-cocaine-plane-op

Sunday, June 1, 2014

Bilderberg on Ukraine: military chiefs, arms bosses and billionaire speculators

Bad enough that you've got military chiefs briefing arms companies bosses - in private - about their hopes and dreams for Ukraine. But you've also got billionaire speculators and the heads of gigantic private equity funds listening in.

People who stand to make a killing out of knowing where and when the bombs are going to fall, how many and on whom.

People like David Petraeus, the former director of the CIA and now head of KKR's Global Institute, the advisory wing of a multibillion dollar private equity company.

http://www.theguardian.com/world/2014/may/31/bilderberg-ukraine-summit

​Bilderberg actually talks nukes, euro nationalism and… Barack Obama – leak

The officially released agenda of the prestigious Bilderberg club meeting is not true, claims RT show host Daniel Estulin, a longtime watcher of the ‘secret world govt’ group. He says he obtained the real agenda for this year’s gathering in Copenhagen.

An insider leaked the list of talking points for the ongoing Bilderberg conference to the investigative journalist last week, he said. The list has nine items, seven of which he shared:

1. Nuclear diplomacy and the deal with Iran currently in the making.
2. Gas deal between Russia and China.
3. Rise of nationalist moods in Europe.
4. EU internet privacy regulations.
5. Cyberwarfare and its potential effect on internet freedoms.
6. From Ukraine to Syria, Barack Obama’s foreign policy.
7. Climate change.

http://rt.com/news/162740-bilderberg-meeting-leak-agenda/

N.S.A. Collecting Millions of Faces From Web Images

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents.

The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed.

The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. While once focused on written and oral communications, the N.S.A. now considers facial images, fingerprints and other identifiers just as important to its mission of tracking suspected terrorists and other intelligence targets, the documents show.

By JAMES RISEN and LAURA POITRAS
New York Times