Thursday, April 30, 2015

House reaches deal on bill to end NSA phone collection

House leaders have reached a bipartisan compromise on a bill that would end the National Security Agency's controversial collection of American phone records, but the measure faces an uncertain future in the Senate.

The House Judiciary Committee on Thursday overwhelmingly passed the latest version of a bill known as the USA Freedom Act by a bipartisan vote of 25 to 2. The measure seeks to codify President Barack Obama's proposal to end the NSA's collection of domestic calling records. It would allow the agency to request certain records held by the telephone companies under a court order in terrorism investigations.

The authority to collect those records and other related surveillance provisions of the Patriot Act will expire June 1 unless Congress passes a law reauthorizing it. The House bill would do that, with changes. Senate leaders have introduced a bill that would reauthorize the provisions with no changes, allowing the NSA to continue collecting phone records.

http://www.bostonherald.com/news_opinion/national/2015/04/house_reaches_deal_on_bill_to_end_nsa_phone_collection

Secret Stalin files on Hitler death to go on display to dispel conspiracy theories

*Secret files detail the bizarre journey of Hitler's body following his death
*Claim to have identified burnt remains in May 1945 through dental records
*Reveal how bodies were buried in three different places by nervous Stalin
*But conspiracy theories still abound over Hitler's 'escape' to Argentina

Seventy years after he ended his life in the flaming ruins of Berlin, the secret file detailing what happened to Adolf Hitler and his bride is poised to go on display in Moscow.

It will finally hammer the coffin lid down on bizarre conspiracy theories - among them that the world's greatest murderer escaped from his squalid bunker at the 11th hour to live in Argentina, raise children and die of natural causes.

The files, held by Russia's FSB federal security service, are said to detail exactly what happened to his body in the confusing months following his death in 1945, until it was disposed of for good by a nervous Soviet state in the 1970s.

It is thought the Russian's will finally unveil the documents in May, to coincide with celebrations planned in Moscow marking the end of the war seven decades ago.
'This is the true history of what happened to Hitler,' says an FSB spokesman. 'He died in Berlin and we have the papers to prove it.'

http://www.dailymail.co.uk/news/article-3062373/Secret-Stalin-files-Hitler-death-display-dispel-conspiracy-theories.html


Former NSA Head Exposes Agency's True Crimes - William Binney

American Psychological Association Bolstered C.I.A. Torture Program, Report Says

The American Psychological Association secretly collaborated with the administration of President George W. Bush to bolster a legal and ethical justification for the torture of prisoners swept up in the post-Sept. 11 war on terror, according to a new report by a group of dissident health professionals and human rights activists.

The report is the first to examine the association’s role in the interrogation program. It contends, using newly disclosed emails, that the group’s actions to keep psychologists involved in the interrogation program coincided closely with efforts by senior Bush administration officials to salvage the program after the public disclosure in 2004 of graphic photos of prisoner abuse by American military personnel at Abu Ghraib prison in Iraq.

“The A.P.A. secretly coordinated with officials from the C.I.A., White House and the Department of Defense to create an A.P.A. ethics policy on national security interrogations which comported with then-classified legal guidance authorizing the C.I.A. torture program,” the report’s authors conclude.

http://www.nytimes.com/2015/05/01/us/report-says-american-psychological-association-collaborated-on-torture-justification.html

Tuesday, April 28, 2015

NSA Releases 52,000 Pages of Friedman Papers

In one of its largest and most significant declassification and release of documents to date, the National Security Agency (NSA) released over 52,000 pages of historical material relating to the career of William. F. Friedman.

Considered the dean of American Cryptology, William F. Friedman (1891–1969) was a pioneer in the field as one of the first to apply scientific principles to the making and breaking of codes. His most well-known accomplishment was leading a small team which broke Japan’s “Purple” diplomatic cipher prior to the Pearl Harbor attack, but through his lectures, textbooks, and mentorship Friedman also trained several generations of American cryptologists, thus laying the foundation for the 20th century U.S. signals intelligence community.

https://www.nsa.gov/public_info/declass/friedman_documents/index.shtml

Charting the American Oligarchy – How 0.01% of the Population Contributes 42% of All Campaign Cash

There are roughly 250 million adults in America, so 0.01% of that is about 25,000 people. I would argue even this number is too high. In fact, I want to find out information about what percentage of political contributions come from the 0.001%. That number will probably get us much closer to the root of the problem. It is far more possible and efficient to closely monitor 2,500 people as opposed to 25,000. After all, 25,000 people don’t regularly call Congress and get the specific legislation they want passed. 25,000 people don’t have a direct line to the Federal Reserve, but people like Jamie Dimon do, and it is these people we must watch like hawks. If we can zero in on the 2,500 wealthiest people, we can also efficiently pick out the worst offenders, as opposed to just demonizing people based on wealth, even within the 0.001%. You can’t easily separate the good from the bad with a sample of 25,000 people, but you can with 2,500 (and that smaller group has much more pull anyway).

Far fewer people are calling the shots in America than you could ever imagine, and we must zero in with laser like precision on them, as opposed to alienating 3.2 million people.

http://www.washingtonsblog.com/2015/04/charting-the-american-oligarchy-how-0-01-of-the-population-contributes-42-of-all-campaign-cash.html

White House Refuses to Disclose Secret Cellphone Kill Switch Order

The White House has refused to release information about a secret policy that permits the Department of Homeland Security to unilaterally shut down private cellphone service in the event of a national crisis.
Enacted almost ten years ago without public notice or debate, Standard Operating Procedure (SOP) 303, often referred to as the cellphone kill switch, has been shrouded in secrecy from its inception and has been targeted by civil liberties groups looking to make the policy public.

Harold Feld, the senior vice president of Public Knowledge, a public interest advocacy group, told Al Jazeera America.

In 2012, the Electronic Privacy Information Center (EPIC) filed suit in federal court seeking disclosure of information about SOP 303’s basic guidelines and policy procedures.

After a lower court ordered the policy be made public, the DOH successfully argued on appeal that releasing any information about SOP 303 would risk public safety. Last month, however, EPIC’s petition for a rehearing of that appellate court decision was allowed to proceed.

A hearing in that case is set for this week.

Read more: http://sputniknews.com/us/20150427/1021452090.html

The People Who Risk Jail to Maintain the Tor Network

The Tor network—originally a project fund​ed by the US Navy—is a collection of servers, some big, some smaller, spread across the world. When a user connects to the network, her internet traffic is randomly pinged between at least three of these servers, all the while covered in layers of encryption, making it near impossible for anyone monitoring the traffic to determine who is sending it or where it is going to.

It allows dissidents to communicate anonymously, citizens to bypass government censorship, and criminals to sell drugs or distribute child pornography. Tor also facilitates special sites called “hidden services,” part of the so-called dark web. These allow the owners of websites and their users to remain largely anonymous.

The final set of servers that Tor uses in this process are called “exit nodes,” because they are the points at which a user’s traffic exits the Tor network and joins the normal web that we use everyday.

Rather than being run by one company, most of these exits are set up by volunteers, or “operators.” A few organizations maintain the larger exits, a number of universities have their own, and individual activists run some too. Edward Snowden rep​ortedly had one.

http://motherboard.vice.com/read/the-operators

Monday, April 27, 2015

The Further Democratization of Stingray

Stingray is the code name for an IMSI-catcher, which is basically a fake cell phone tower sold by Harris Corporation to various law enforcement agencies. (It's actually just one of a series of devices with fish names -- Amberjack is another -- but it's the name used in the media.) What is basically does is trick nearby cell phones into connecting to it. Once that happens, the IMSI-catcher can collect identification and location information of the phones and, in some cases, eavesdrop on phone conversations, text messages, and web browsing.

The use of IMSI-catchers in the US used to be a massive police secret. The FBI is so scared of explaining this capability in public that the agency makes local police sign nondisclosure agreements before using the technique, and has instructed them to lie about their use of it in court. When it seemed possible that local police in Sarasota, Florida, might release documents about Stingray cell phone interception equipment to plaintiffs in civil rights litigation against them, federal marshals seized the documents. More recently, St. Louis police dropped a case rather than talk about the technology in court. And Baltimore police admitted using Stingray over 25,000 times.

The truth is that it's no longer a massive police secret. We now know a lot about IMSI-catchers. And the US government does not have a monopoly over the use of IMSI-catchers. I wrote in Data and Goliath:

There are dozens of these devices scattered around Washington, DC, and the rest of the country run by who-knows-what government or organization. Criminal uses are next.

https://www.schneier.com/blog/archives/2015/04/the_further_dem_1.html

Alex Jones vs The Mainstream Media - Documentary (2015)

Sunday, April 26, 2015

7 whistle-blowers facing more jail time than David Petraeus

The administration of President Barack Obama once promised to be “the most transparent administration” of all time. Instead, Obama’s Department of Justice has led the most targeted campaign against whistleblowers of any president ever, charging more government employees under the Espionage Act than all previous presidents combined—almost all of whom sit in prison serving sentences up to 30 years.

As the relative slap on the wrist Gen. David Petraeus received this week revealing classified military information to his mistress and biographer proves, this aggressive pursuit of leaks does not, however, extend to the leadership of his intelligence agencies, revealing a deep seated double standard.

Petraeus is not the exception here. Current CIA director John Brennan once leaked classified details of a busted terror plot to the Associated Press yet saw no charges. Former CIA Director Leon Panetta once revealed classified details about the raid that captured Osama bin Laden to Hollywood filmmaker Kathryn Bigelow for the purposes of her film about the raid, Zero Dark Thirty, but he also saw no charges.

All three leaks were not done in the interest of the public but respectively as a political stunt, a bow to Hollywood jingoism, and pillow talk. The disregard for the criminal activity of these men, all former or current top administration officials, reveals a systemic hypocrisy within an administration failing to live up to its own standards. In order to highlight their hypocrisy, it’s worthwhile to look at seven lower government employees who shared classified information and paid a heavy price for it.

http://www.salon.com/2015/04/25/7_whistleblowers_facing_more_jail_time_than_general_petraeus_partner/




9/11 Aftermath: How it Relates to Current Geopolitcal Developments

The Armenian Genocide

Exactly one century ago, a crime against humanity took place in what was then the Ottoman Empire. Despite being carried out on an enormous scale, there is still no atonement or official recognition for that campaign of terror and death. During WWI, Armenian people faced a deliberate massacre intended to annihilate their whole nation. An atrocity that inspired Hitler and whose victims are, even to this day, denied justice. It was genocide.

https://www.youtube.com/watch?v=Dti6hmhZaGU

Deep Support in Washington for C.I.A.’s Drone Missions

About once a month, staff members of the congressional intelligence committees drive across the Potomac River to C.I.A. headquarters in Langley, Va., and watch videos of people being blown up.

As part of the macabre ritual the staff members look at the footage of drone strikes in Pakistan and other countries and a sampling of the intelligence buttressing each strike, but not the internal C.I.A. cables discussing the attacks and their aftermath. The screenings have provided a veneer of congressional oversight and have led lawmakers to claim that the targeted killing program is subject to rigorous review, to defend it vigorously in public and to authorize its sizable budget each year.

That unwavering support from Capitol Hill is but one reason the C.I.A.’s killing missions are embedded in American warfare and unlikely to change significantly despite President Obama’s announcement on Thursday that a drone strike accidentally killed two innocent hostages, an American and an Italian. The program is under fire like never before, but the White House continues to champion it, and C.I.A. officers who built the program more than a decade ago — some of whom also led the C.I.A. detention program that used torture in secret prisons — have ascended to the agency’s powerful senior ranks.

Although lawmakers insist that there is great accountability to the program, interviews with administration and congressional officials show that Congress holds the program to less careful scrutiny than many members assert. Top C.I.A. officials, who learned the importance of cultivating Congress after the resistance they ran into on the detention program, have dug in to protect the agency’s drone operations, frustrating a pledge by Mr. Obama two years ago to overhaul the program and pull it from the shadows.

http://www.nytimes.com/2015/04/26/us/politics/deep-support-in-washington-for-cias-drone-missions.html

DEA Prostitute Scandal Isn’t Agency’s Only Trick

Drug-War Agency’s Latin America Operations Tarnished By A Pattern of Unaddressed Corruption Allegations

The current scandal over Colombian narco-traffickers paying prostitutes to provide sex services to DEA agents has an even deeper footprint in the agency than the current head of the DEA has conceded, court records stemming from past DEA operations reveal.

A March report by the Department of Justice Inspector General’s office that first revealed the allegations publicly indicates the sex parties with DEA agents and prostitutes in Colombia played out between 2005 and 2008. DEA Administrator Michele Leonhart wasn’t made aware of those activities until around 2012, according to the IG report.

“This has been a very difficult week for DEA, with members of Congress and the media asking tough questions and sharing our outrage about the disgraceful conduct of a few individuals several years ago,” DEA Administrator Michele Leonhart states in an email sent to employees earlier this month.“This employee misconduct has upset me for many reasons, but especially because it calls into question the incredible reputation DEA has built over more than 40 years.”

The House Oversight Committee, which is investigating the charges, recently released a report based on DEA documents that indicates some of the illicit activities in Colombia actually date back to 2001 but involved only a handful of agents.

Court records reviewed by Narco News, however, show DEA agents in Latin America were hooking up with prostitutes as far back as the late 1990s as part of a much broader pattern of alleged corruption involving DEA’s operations in Colombia.

http://narcosphere.narconews.com/notebook/bill-conroy/2015/04/dea-prostitute-scandal-isn-t-agency-s-only-trick

Cyber Warfare, Surveillance & US Government’s Dick Pic Collection

The Cyber Intelligence Sharing and Protection Act (CISPA), is back as CISA. And Obama just issued an executive order that grants him authority to sanction people or groups engaged in civil society online. With the renewal of the Patriot Act on the horizon, the conversation about mass surveillance couldn’t be more vital.
Co-founder of The District Sentinel News Co-op Sam Sacks joins Abby Martin on Media Roots Radio to discuss all things spying.

Saturday, April 25, 2015

Stellar Wind IG Report, Working Thread

Charlie Savage has liberated the Stellar Wind IG Report completed on July 10, 2009. He wrote it up here http://www.nytimes.com/2015/04/25/us/politics/value-of-nsa-warrantless-spying-is-doubted-in-declassified-reports.html. This will be a working thread.

(PDF 13) The report reveals that OPR had not yet finished its review of John Yoo’s hackery in authorizing the illegal wiretap program.

(PDF 14) Wolfowitz, Card, Addington, Cheney, Ashcroft, Yoo, and Tenet refused to cooperate with the IG Report.

(PDF 15) IG Report says policy is only to disseminate foreign SIGINT. But actually that policy was changed in EO 12333 the previous year (almost certainly reflected the status quo before).

(PDF 17) DOJ redacted why Hayden didn’t think he could approve a law for this spying.

(PDF 25) Redaction of discussion of Fourth Amendment OLC memo.

(PDF 31) NSA decided only going out 2 hops useful.

(PDF 32) The fact that the program released content analysis was not included in the unredacted IG Report. But this report still redacts at least one kind of reporting — which may be way the data feeds back into other analysis (they would redact that because it would create ongoing poison tree problems).

(PDF 33) “She noted Hayden took personal responsibility for the program and managed it carefully.”

(PDF 33) The description of the delegation hides a much more strained process as described in the NSA IG Report.

https://www.emptywheel.net/2015/04/25/stellar-wind-ig-report-working-thread/

Government Releases Once-Secret Report on Post-9/11 Surveillance

In response to a Freedom of Information Act lawsuit by The New York Times, the government has declassified a 2009 report by five agencies’ inspectors general about the Stellarwind program, the group of N.S.A. warrantless wiretapping and bulk phone and e-mail records collection activities initiated by President George W. Bush after the terrorist attacks of Sept. 11, 2001. In 2009, the government released a 43-page unclassified version which omitted discussion of many key facts that then remained secret. After the 2013 leaks by the former intelligence contractor Edward J. Snowden, which included a draft version of the N.S.A. inspector general’s contribution to this larger joint I.G. report, the government declassified many facts about surveillance, leading to The Times’ lawsuit seeking release of the full and final report.

http://www.nytimes.com/interactive/2015/04/25/us/25stellarwind-ig-report.html

http://www.nytimes.com/2015/04/25/us/politics/value-of-nsa-warrantless-spying-is-doubted-in-declassified-reports.html

Declassified Report Shows Doubts About Value of N.S.A.’s Warrantless Spying

The secrecy surrounding the National Security Agency’s post-9/11 warrantless surveillance and bulk data collection program hampered its effectiveness, and many members of the intelligence community later struggled to identify any specific terrorist attacks it thwarted, a newly declassified document shows.

The document is a lengthy report on a once secret N.S.A. program code-named Stellarwind. The report was a joint project in 2009 by inspectors general for five intelligence and law enforcement agencies, and it was withheld from the public at the time, although a short, unclassified version was made public. The government released a redacted version of the full report to The New York Times on Friday evening in response to a Freedom of Information Act lawsuit.

http://www.nytimes.com/2015/04/25/us/politics/value-of-nsa-warrantless-spying-is-doubted-in-declassified-reports.html

Friday, April 24, 2015

Exclusive Video: Violence Inside Rikers


In May, 2010, Kalief Browder, a sixteen-year-old high-school sophomore, was arrested in the Bronx for allegedly stealing a backpack. He insisted that he was innocent, but he was taken to Rikers Island, New York City’s four-hundred-acre jail complex. Browder spent the next three years at Rikers, awaiting trial while his case was repeatedly delayed by the courts. In May, 2013, the case against him was dismissed. (Last fall, I wrote about Browder for the magazine.) This week, The New Yorker obtained two ​surveillance-camera video clips that depict the dual horrors of Browder’s years in jail: abuse by a guard and by fellow-inmates.

http://www.newyorker.com/news/news-desk/exclusive-video-violence-inside-rikers



http://www.democracynow.org/2015/4/24/watch_explosive_footage_from_inside_rikers





David Petraeus sentenced to probation for sharing classified information

David Petraeus, the retired US army general and former CIA director responsible for the development of the hugely influential “counter-insurgency” strategy used in Iraq and Afghanistan, was sentenced on Thursday to two years’ probation and ordered to pay a fine of $100,000 for sharing highly classified information with his lover and biographer, Paula Broadwell.

The fine was $60,000 more than had been expected under the terms of a plea deal; the two years’ probation was as expected.

http://www.theguardian.com/us-news/2015/apr/23/david-petraeus-sentenced-sharing-classified-information

Cash Flowed to Clinton Foundation Amid Russian Uranium Deal

As the Russians gradually assumed control of Uranium One in three separate transactions from 2009 to 2013, Canadian records show, a flow of cash made its way to the Clinton Foundation. Uranium One’s chairman used his family foundation to make four donations totaling $2.35 million. Those contributions were not publicly disclosed by the Clintons, despite an agreement Mrs. Clinton had struck with the Obama White House to publicly identify all donors. Other people with ties to the company made donations as well.

And shortly after the Russians announced their intention to acquire a majority stake in Uranium One, Mr. Clinton received $500,000 for a Moscow speech from a Russian investment bank with links to the Kremlin that was promoting Uranium One stock.

http://www.nytimes.com/2015/04/24/us/cash-flowed-to-clinton-foundation-as-russians-pressed-for-control-of-uranium-company.html

Thursday, April 23, 2015

9/11 Exposed - Documentary (2015)

Hillary Clinton Hires Former Monsanto Lobbyist To Run Her Campaign

Hillary Clinton recently announced that she will be appointing long-time Monsanto lobbyist Jerry Crawford as adviser to her “Ready for Hillary” super PAC.

Crawford has mostly worked with Democratic politicians in the past, but has also put his support behind Republican candidates as well. Anyone who was willing to support Monsanto’s goals would receive support from Crawford.

In the past, Crawford has worked with Bill Clinton, Al Gore, John Kerry and Bill Northey. Over the years, Crawford has been instrumental in fighting against small farmers in court and protecting Monsanto’s seed monopoly.

Just last week it was reported that Hillary Clinton is attempting to repolish her image and paint herself as a champion of the common people. She is planning to make “toppling the 1%” one of her primary campaign selling points, although she is obviously a part of the same ruling class that she is speaking against, and receives massive contributions from some of the most corrupt aristocratic organizations in the world.

http://www.trueactivist.com/hillary-clinton-hires-former-monsanto-lobbyist-to-run-her-campaign/


Far from tolls, New York gathers location data through E-ZPass

E-ZPass readers are used for more than collecting tolls in New York.

Documents published Wednesday shed new light on how city and state transportation officials have been using the E-ZPass tags for at least four years to collect location information from unsuspecting drivers as part of ongoing studies on traffic congestion.

A lawyer with the New York Civil Liberties Union said there are few provisions in place that govern how this information is used, and that the studies could amount to a surveillance network.

"Most people probably didn't know their E-ZPass reader is being read away from toll plazas, which is why they enrolled in the service," said Mariko Hirose, a staff attorney at the NYCLU, who uncovered the scope of the programs through public-records requests and mapped the location of E-ZPass readers. "If the government is going to set up something like this, they should make sure people know it's happening and give them a choice to opt out."

Drivers don't have that choice. In most cases, they're unaware information on their whereabouts is even being collected beyond toll booths, and neither state nor city departments have opt-out procedures in place.

http://www.autoblog.com/2015/04/22/new-york-e-zpass-tracking/

Antony Sutton - Wall Street Financed Communism & Nazism

Wednesday, April 22, 2015

Death from Above: the New Manhattan Project Chemtrail Fleet

Today's chemtrail spraying operations necessarily require a massive fleet of specialized jumbo jet airliners operating covertly. The volume and frequency of chemtrail reports from all over the world, the author's own observations and the massive task of controlling Earth's weather in the fashion of the New Manhattan Project suggest that these planes number over 1000. If you do not know what the New Manhattan Project is, please see the author's previous article "A History of the New Manhattan Project."

These planes must necessarily be of a certain breed. Any old plane rigged up with some spraying equipment or even with spiked jet fuel simply will not do. For example, a commercial passenger airliner following a predetermined route is not an effective chemtrail spraying plane. The chemtrail spray needs to be emitted at specific locations at a moment's notice. The super high-tech nature and payload requirements of the New Manhattan Project also demand specialization. The fuselage of an effective chemtrail spraying aircraft needs to be loaded up not with passengers and luggage, but with chemtrail spray, spraying equipment, communications gear, computers and atmospheric monitoring equipment. An effective chemtrail spraying plane is a dedicated chemtrail spraying plane.

Not only does the New Manhattan Project require over 1000 dedicated airplanes, the project requires that these airplanes operate covertly. Even though there is a mountain of evidence proving the existence of this Project, our federal Government refuses to admit the obvious. Just like the original Manhattan Project was, this project is still officially a big secret. Only this time, it's going on in the sky above us.

As we are interested in exposing chemtrails, we are interested in the origins, development and current state of this large, covert, high-tech jumbo jet air force routinely contaminating our environment and damaging our health. Oddly enough, when one looks back in history for large fleets of covertly operating American aircraft, one finds plenty. It all began in 1940s' China.

http://www.activistpost.com/2015/04/death-from-above-new-manhattan-project.html

The Secret Stingray Case You Need To Know About

How Tor is building a new Dark Net with help from the U.S. military

The Dark Net is under attack.

Actually, it’s always under attack. That's the smart attitude to take as the spotlight has been turned up on technology like the Tor-anonymizing network. Threats from governments and hackers around the world have pushed Tor’s decade-old hidden service technology to its limits.

To stay ahead in the security race, Tor is building the next-generation Dark Net in part with funding from the Defense Advanced Research Projects Agency, the U.S. military agency charged with inventing the cutting edge of new technology.

The funding, which began in 2014, comes as part of DARPA’s Memex project, a “groundbreaking” search engine designed to best commercial titans like Google at searching the Deep Web and other oft-ignored terrain for the U.S. intelligence, law enforcement, and military. To build Memex, DARPA is partnered with universities like Carnegie Mellon, NASA, private research firms, and several Tor Project developers.

DARPA is funding multiple projects focused on improving Tor’s hidden services across “1-3 years,” Tor’s director of communications Kate Krauss told the Daily Dot via email. Tor declined to give more specifics on the grant, like its monetary value and terms, and DARPA didn’t respond to a request for comment.

http://www.dailydot.com/politics/next-generation-tor-darpa/

Don’t Miss the Pulitzer Prize-Winning Series on Corporate Lobbying of State Attorneys General

You don’t understand the world you live in if you haven’t read Eric Lipton’s three-part series in The New York Times on the staggering “explosion” of relentless, grimy lobbying of state attorneys general. Lipton just won a Pulitzer Prize for his work, and it’s truly deserved: it’s a masterpiece of investigative reporting, built on diligent use of open records laws by Lipton and Times researchers.

https://firstlook.org/theintercept/2015/04/22/read-new-york-times-pulitzer-prize-winning-series-corporate-lobbying-state-attorneys-general/

http://www.pulitzer.org/citation/2015-Investigative-Reporting

House Passes Cybersecurity Bill Despite Privacy Protests

On Wednesday the House of Representatives voted 307-116 to pass the Protecting Cyber Networks Act, a bill designed to allow more fluid sharing of cybersecurity threat data between corporations and government agencies. That new system for sharing information is designed to act as a real-time immune system against hacker attacks, allowing companies to warn one another via government intermediaries about the tools and techniques of advanced hackers. But privacy critics say it also threatens to open up a new backchannel for surveillance of American citizens, in some cases granting the same companies legal immunity to share their users’ private data with government agencies that include the NSA.

“PCNA would significantly increase the National Security Agency’s (NSA’s) access to personal information, and authorize the federal government to use that information for a myriad of purposes unrelated to cybersecurity,” reads a letter signed earlier this week by 55 civil liberties groups and security experts that includes the American Civil Liberties Union, the Electronic Frontier Foundation, the Freedom of the Press Foundation, Human Rights Watch and many others.

http://www.wired.com/2015/04/house-passes-cybersecurity-bill-despite-privacy-protests/

Not Just NSA: DEA Also Spending Millions to Purchase Exploits and Spyware

As more information leaks out into the public domain, the only difference between the NSA and the DEA seems to be the selection of letters in their acronyms. Both are now known for their bulk domestic collections and both are known for being involved in neverending wars. Now, thanks to Privacy International and Vice's Motherboard, both are known for purchasing weaponized software.

The Drug Enforcement Administration has been buying spyware produced by the controversial Italian surveillance tech company Hacking Team since 2012, Motherboard has learned.

The software, known as Remote Control System or “RCS,” is capable of intercepting phone calls, texts, and social media messages, and can surreptitiously turn on a user’s webcam and microphone as well as collect passwords.

The DEA originally placed an order for the software in August of 2012, according to both public records and sources with knowledge of the deal.

The problem with the DEA's purchase and deployment of this malware is that tools normally used to engage in the protection of national security -- by military and intelligence agencies -- are being handed out to US law enforcement without the slightest concern for the Fourth Amendment or privacy implications. There's a level of intrusion present here that's never been examined by the courts. Not that the DEA would ever allow details on Hacking Team's products to ever enter a courtroom in the first place. Hacking Team's spy products are one of many secret law enforcement capabilities -- something that must never be spoken of in public forums.

https://www.techdirt.com/articles/20150417/16160930703/dea-also-spending-millions-to-purchase-exploits-spyware.shtml

Supreme Court: Cops can’t hold suspects to wait for drug-sniffing dog

The Supreme Court ruled 6-3 on Tuesday that the Constitution forbids police from holding a suspect without probable cause, even for fewer than 10 extra minutes.

Writing on behalf of the court, Justice Ruth Bader Ginsburg declared that the constitutional protections against unreasonable search and seizure prevent police from extending an otherwise completed traffic stop to allow for a drug-sniffing dog to arrive.

“We hold that a police stop exceeding the time needed to handle the matter for which the stop was made violates the Constitution’s shield against unreasonable seizures,” she ruled.

http://thehill.com/regulation/court-battles/239513-court-rules-cops-cant-hold-suspects-to-wait-for-dog

VA Sends Veterans’ Medical Info To FBI To Get Their Guns Taken Away

Documents obtained by The Daily Caller and interviews with American veterans reveal a shocking government program: The Department of Veterans Affairs is disarming America’s veterans by getting them placed on the FBI’s criminal background-check list.

The VA sends veterans’ personal medical and financial information directly to the FBI and the Bureau of Alcohol, Tobacco and Firearms, which can seize their guns in home raids.

Veterans deemed mentally incompetent or financially incapable are finally speaking out about the errors in the system and the fearful harassment they and their families face from the federal government. And it all starts when vets go to the VA to get medical help.

http://dailycaller.com/2015/04/21/va-sends-veterans-medical-info-to-fbi-to-get-their-guns-taken-away/

Wayne Madsen: "NATO Is Turning Into A Global Army To Protect The Oligarchs!"

The Bankster War on Cash; JPMorganChase Begins to Prohibit the Storage of Cash in Its Safety Deposit Boxes

As of March, Chase began restricting the use of cash in selected markets, including Greater Cleveland. The new policy restricts borrowers from using cash to make payments on credit cards, mortgages, equity lines, and auto loans. Chase even goes as far as to prohibit the storage of cash in its safe deposit boxes . In a letter to its customers dated April 1, 2015 pertaining to its “Updated Safe Deposit Box Lease Agreement,” one of the highlighted items reads: “You agree not to store any cash or coins other than those found to have a collectible value.”

http://www.economicpolicyjournal.com/2015/04/the-bankster-war-on-cash-jpmorganchase.html

Tuesday, April 21, 2015

Lawyers’ Group Seeks Overhaul of a Postal Service Surveillance Program

A Postal Service surveillance program that records the information on the outside of letters and packages delivered to people suspected of criminal activity should be overhauled because of a lack of oversight, according to a report by a national defense lawyers’ group.

An audit by the service’s inspector general last year found that about 20 percent of the orders for surveillance under the program, known as mail covers, were improperly approved. The New York Times reported on abuses in the program, including a case in which law enforcement officials in Arizona used it to investigate a political opponent.

The report, released Tuesday, suggests that Congress pass legislation to ban any evidence obtained through the misuse of mail covers. It also urges outside reviews of requests for mail covers.

High standards of evidence by law enforcement agencies to justify mail covers, which are almost always approved, are also suggested in the report. It also calls on the service to explain why it keeps data from mail covers for eight years, while the National Security Agency keeps the data it collects for five years. The report recommends that the service reduce the amount of time it keeps the information.

The lawyers’ group, the National Association of Criminal Defense Lawyers, called the disclosures about the program troubling.

http://www.nytimes.com/2015/04/22/us/report-seeks-overhaul-of-postal-service-surveillance-program.html

Jeb Bush Praises Obama’s Expansion of NSA Surveillance

One of the most glaring myths propagated by Washington — especially the two parties’ media loyalists — is that bipartisanship is basically impossible, that the two parties agree on so little, that they are constantly at each other’s throats over everything. As is so often the case for Washington partisan propaganda, the reality is exactly the opposite: from trade deals to Wall Street bailouts to a massive National Security and Penal State, the two parties are in full agreement on the bulk of the most significant D.C. policies (which is why the leading candidates of the two parties (from America’s two ruling royal families) will have the same funding base). But because policies that command the agreement of the two parties’ establishments are largely ignored by the D.C. press in favor of the issues where they have some disagreements, the illusion is created that they agree on nothing.

To illustrate how true this all is, consider the comments today of leading GOP presidential candidate Jeb Bush. He appeared on Michael Medved’s conservative talk radio program, and was asked by the host what his favorite part of the Obama administration has been. His answer? As McClatchy’s Lesley Clark noted on Twitter, Bush hailed “Obama’s enhancement of NSA.” The audio was first posted by Ian Hanchett and is embedded below; here is the full transcript of the exchange:

https://firstlook.org/theintercept/2015/04/21/jeb-bush-praises-obamas-expansion-nsa-surveillance/

Pentagon: We Can’t Afford to Replace Aging ICBMs, Bombers, Subs

The Defense Department cannot afford to replace its aging nuclear-missile submarines, ICBMs, and long-range strategic bombers unless it gets a funding boost or radical policy changes are made, according to a top Pentagon official.

Even if Congress approves the White House’s 2016 budget for the Pentagon, the Pentagon will find itself $10 billion to $12 short beginning in 2021.

“We don’t have a solution to that problem right now,” Kendall said, asked by a reporter about the plan for funding a replacement for the Navy’s Ohio-class submarines. All more than 30 years old, these “boomers” slip silently around the world’s oceans, waiting for the command to launch their nuclear-tipped ballistic missiles.

The entire U.S. nuclear inventory needs to be upgraded by the 2030s. That includes the submarines, land-based Minuteman intercontinental ballistic missiles and new stealth bomber. Together, the three make up the “nuclear triad,” the cornerstone of America’s deterrent force. The Pentagon also says it needs a new nuclear cruise missile.

http://www.defenseone.com/management/2015/04/pentagon-we-cant-afford-replace-aging-icbms-bombers-subs/110134/

The Hidden Intelligence Breakdowns Behind the Mumbai Attacks

The mystery soon deepened when ProPublica gained access to a trove of Snowden’s classified materials. Suddenly a new, previously hidden layer in the story emerged, one that largely contradicted the government’s claims and revealed Mumbai as a tragic case study in the strengths and limitations of high-tech surveillance – a rare look at how counterterrorism really works.

Our reporting airs tonight in “American Terrorist,” a major update of the 2011 Frontline film. It details the story of Headley’s eventual capture as well as the secret surveillance of Mumbai plotters that took place before and during the attacks. (We first reported some of the material in December with the New York Times.)

The Snowden documents show that, months before Mumbai, British intelligence began spying on the online communications of Zarrar Shah, a key plotter who was the technology chief for the Pakistani terror group Lashkar-e-Taiba.

Britain’s General Communications Headquarters, or GCHQ, had the ability to monitor many of Shah’s digital activities, including Web searches and emails, during weeks in which he did research on targets, handled reconnaissance data, and set up an internet phone system for the attack.

But based on documents and interviews, it appears that the British spy agency did not use its access to closely analyze data from Shah until a Lashkar attack squad invaded Mumbai on Nov. 26, 2008. Nor did the British tell the Americans they were watching Shah beforehand, despite the close alliance between GCHQ and the N.S.A.

http://www.propublica.org/article/the-hidden-intelligence-breakdowns-behind-the-mumbai-attacks

OFFICIALS SEEK LONG SENTENCE FOR EX-CIA OFFICER IN LEAK CASE

A former CIA officer convicted of leaking classified details of an operation to derail Iran's nuclear ambitions would spend 20 years in prison if a judge follows federal sentencing guidelines.

Jeffrey Sterling of O'Fallon, Missouri, will be sentenced next month in Alexandria following his conviction in January. A jury found him guilty of illegally disclosing to New York Times journalist James Risen a secret mission to stall Iran's nuclear weapons program by feeding them deliberately flawed blueprints.

Prosecutors on Monday filed papers urging a severe sentence, but declining to spell out a specific recommendation. They said probation officers correctly calculated a sentencing guidelines range of 20 to 24 years.

The government cited testimony during the trial from former national security adviser and Secretary of State Condoleezza Rice that the plan was one of the best options the U.S. had in its admittedly limited ability to confront Iran's plans to build a nuclear weapon as part of their argument for a severe sentence.

Rice convinced the Times to spike a newspaper article that would have divulged the program, but Risen later included it in a book, State of War.

http://www.apnewsarchive.com/2015/Prosecutors-urge-severe-sentence-in-CIA-leak-case-guidelines-call-for-20-years/id-8ae7008f1d6a4d2ca51f0458797518e1

Your Privacy Has Been Compromised Since 1947

Monday, April 20, 2015

Glenn Greenwald on Shadow Government

Shadow Government: Surveillance, Secret Wars, and a Global Security State in a Single-Superpower World, Tom Engelhardt. Haymarket Books. Kindle Edition.

Foreword

The goal of the US surveillance state is to make sure that there is no such thing as actual human privacy, not just in the United States but in the world. That’s its intent. It does that by design. What we are really talking about is a globalized system that prevents any form of electronic communication from taking place without being stored and monitored by the National Security Agency. It’s not just journalists but also dissident groups and Muslim communities that have been infiltrated and monitored. The government is deliberately working to create a climate of fear in exactly those communities that are most important in checking those in power.

I really don’t think there’s any more important battle today than combating the surveillance state. Ultimately, the thing that matters most is that the rights that we know we have as human beings are rights that we exercise. The only way those rights can ever be taken away is if we give in to the fear that is being deliberately imposed on our world. You can acculturate people to believing that tyranny is freedom, and that as a consequence their limits are actually liberties. That is what this surveillance state does, by training people to accept their own conformity so they no longer even realize the ways in which they’re being limited.

http://cryptome.org/2015/04/greenwald-shadow-gov.htm

Keeping Track of the US Intelligence Community’s Leakers

It's getting hard to keep track of the US intelligence community leakers without a scorecard. So here's my attempt:

Leaker #1: Chelsea Manning.
Leaker #2: Edward Snowden.
Leaker #3: The person who leaked secret documents to Jake Appelbaum, Laura Poitras, and others in Germany: the Angela Merkel surveillance story, the TAO catalog, the X-KEYSCORE rules. My guess is that this is either an NSA employee or contractor working in Germany, or someone from German intelligence who has access to NSA documents. Snowden has said that he is not the source for the Merkel story, and Greenwald has confirmed that the Snowden documents are not the source for the X-KEYSCORE rules. This might be the "high-ranking NSA employee in Germany" from this story -- or maybe that's someone else entirely.

More...https://www.schneier.com/blog/archives/2015/04/counting_the_us.html

Assange: How 'The Guardian' Milked Edward Snowden's Story

BY JULIAN ASSANGE

WikiLeaks founder Julian Assange investigates the book behind Snowden, Oliver Stone's forthcoming film starring Joseph Gordon-Levitt, Shailene Woodley, Nicolas Cage, Scott Eastwood and Zachary Quinto. According to leaked Sony emails, movie rights for the book were bought for $700,000.

The Snowden Files: The Inside Story of the World's Most Wanted Man (Guardian/Faber & Faber, 2014) by Luke Harding is a hack job in the purest sense of the term. Pieced together from secondary sources and written with minimal additional research to be the first to market, the book's thrifty origins are hard to miss.

The Guardian is a curiously inward-looking beast. If any other institution tried to market its own experience of its own work nearly as persistently as The Guardian, it would surely be called out for institutional narcissism. But because The Guardian is an embarrassingly central institution within the moribund "left-of-center" wing of the U.K. establishment, everyone holds their tongue.

http://www.newsweek.com/assange-how-guardian-milked-edward-snowdens-story-323480

Leaked Documents Point to DIA’s Inability to Detect Sophisticated Polygraph Countermeasures

Defense Intelligence Agency documents (40 MB .zip archive) obtained by AntiPolygraph.org suggest that the agency lacks the ability to detect sophisticated polygraph countermeasures1 and that spies, saboteurs, and terrorists will have little difficulty deceiving its polygraph operators using techniques such as those described in AntiPolygraph.org’s free book, The Lie Behind the Lie Detector (1 MB PDF) or in Doug Williams‘ manual, How to Sting the Polygraph. The U.S. Government is so concerned about the effectiveness of such techniques that it has targeted Doug Williams for criminal prosecution and may have attempted to entrap AntiPolygraph.org co-founder George Maschke.

It should be noted that the DIA polygraph screening program has never caught a spy. In 2001, the DIA’s senior analyst for Cuban affairs, Ana Belen Montes, was arrested, charged, and ultimately convicted of spying for Cuba. She had in fact been acting as a Cuban agent from the very beginning of her DIA employment: she had been trained by Cuban intelligence how to fool the polygraph, and she succeeded in doing precisely that throughout her DIA career.

https://antipolygraph.org/blog/2015/04/18/leaked-documents-point-to-dias-inability-to-detect-sophisticated-polygraph-countermeasures/

When Cops Check Facebook

The police began using social media almost by accident, he says. One officer discovered over the course of ordinary social media use that he could see the status updates of neighborhood kids. Soon, cops and prosecutors were looking at photos to figure out who might be a witness in a particular case. Bystanders could be identified from the background of photos posted on social media sites. If a kid posted a time-stamped photo of himself standing in front of a door, and the cop recognized the doorway, it could be relevant in an investigation.

Today, police across the country regularly use social media data to keep tabs on citizens. 75 percent of them are self-taught, according to a 2014 Lexis-Nexis research report on social media use in law enforcement. “Facebook has helped me by identifying suspects that were friends or associates of other suspects in a crime and all brought in and interviewed and later convicted of theft and drug offenses,” said one respondent interviewed in the report. “My biggest use for social media has been to locate and identify criminals,” said another. “I have started to utilize it to piece together local drug networks.” Only 9 percent of respondents had received training on using social media in investigations from their agency.

Social media can produce evidence in some cases, but it also fails to capture the complexity of human relationships—and can sometimes distort them. For this reason, it is important to take care that social media data is not misused or misinterpreted in the pursuit of justice.

http://www.theatlantic.com/politics/archive/2015/04/when-cops-check-facebook/390882/

FBI can’t cut Internet and pose as cable guy to search property, judge says

"This is a monumental ruling protecting Americans' privacy in the modern age."

A federal judge issued a stern rebuke Friday to the Federal Bureau of Investigation's method for breaking up an illegal online betting ring. The Las Vegas court frowned on the FBI's ruse of disconnecting Internet access to $25,000-per-night villas at Caesar's Palace Hotel and Casino. FBI agents posed as the cable guy and secretly searched the premises.

The government claimed the search was legal because the suspects invited the agents into the room to fix the Internet. US District Judge Andrew P. Gordon wasn't buying it. He ruled that if the government could get away with such tactics like those they used to nab gambling kingpin Paul Phua and some of his associates, then the government would have carte blanche power to search just about any property.

"Permitting the government to create the need for the occupant to invite a third party into his or her home would effectively allow the government to conduct warrantless searches of the vast majority of residents and hotel rooms in America," Gordon wrote in throwing out evidence the agents collected. "Authorities would need only to disrupt phone, Internet, cable, or other 'non-essential' service and then pose as technicians to gain warrantless entry to the vast majority of homes, hotel rooms, and similarly protected premises across America."

http://arstechnica.com/tech-policy/2015/04/fbi-cant-cut-internet-and-pose-as-cable-guy-to-search-property-judge-says/

Sunday, April 19, 2015

Twitter moves non-US accounts to Ireland away from the NSA

Twitter has updated its privacy policy, creating a two-lane service that treats US and non-US users differently. If you live in the US, your account is controlled by San Francisco-based Twitter Inc, but if you're elsewhere in the world (anywhere else) it's handled by Twitter International Company in Dublin, Ireland. The changes also affect Periscope.

What's the significance of this? Twitter Inc is governed by US law, it is obliged to comply with NSA-driven court requests for data. Data stored in Ireland is not subject to the same obligation. Twitter is not alone in using Dublin as a base for non-US operations; Facebook is another company that has adopted the same tactic. The move could also have implications for how advertising is handled in the future.

Ireland is widely recognized as having the most relaxed privacy laws in Europe, and this is something which is important for any company looking to monetize user data through advertising. While data that is processed in Europe may be beyond the immediate reach of the NSA, the policy change could also be seen as a way of trying to sidestep future legislation which may make it more difficult for US-based companies to share data about European users with advertisers.

http://betanews.com/2015/04/17/twitter-moves-non-us-accounts-to-ireland-away-from-the-nsa/


OKC Bombing - A Conspiracy Theory

Saturday, April 18, 2015

A Noble Lie - OKC Bombing

The 1995 (April 19th) bombing in Oklahoma City was a direct blow to the heart of America. 168 people were killed, including nineteen children. For those watching the nightly news, terrorism had come home. For years following the bombing, countless victims' family members, survivors, rescuers, and ordinary Americans, have questioned the official accounts about that fateful day. Hoping to shed light on answers long ignored and censored, both by prominent media outlets and the U.S. government, A Noble Lie peels back what we thought we knew about the bombing and it's perpetrators. This film exposes information never before examined or brought to the attention of the American public. A Noble Lie is the culmination of years of research and documentation conducted by independent journalists, scholars, and ordinary citizens.

NSA and FBI fight to retain spy powers as surveillance law nears expiration

With about 45 days remaining before a major post-9/11 surveillance authorization expires, representatives of the National Security Agency and the FBI are taking to Capitol Hill to convince legislators to preserve their sweeping spy powers.

That effort effectively re-inaugurates a surveillance debate in Congress that has spent much of 2015 behind closed doors. Within days, congressional sources tell the Guardian, the premiere NSA reform bill of the last Congress, known as the USA Freedom Act, is set for reintroduction – and this time, some former supporters fear the latest version of the bill will squander an opportunity for even broader surveillance reform.

Republican leaders of the House intelligence committee arranged for NSA and FBI representatives to hold secret briefings for members of Congress on Tuesday and Wednesday. Staff did not name the officials addressing legislators.

The classified briefings come amid an unsettled surveillance debate in Congress that rushes up against an unforgiving deadline. On 1 June, Section 215 of the Patriot Act, which permits US law enforcement and surveillance agencies to collect business records, expires.

http://www.theguardian.com/us-news/2015/apr/15/nsa-fbi-surveillance-patriot-action-section-215-expiration

The predictable fruits of citizen disarmament. 100th Anniversary of the Armenian Genocide.

The Armenian Genocide is the prominent example of what can occur when a government decides to implement "gun control" laws, in the 20th century. The Armenian nation was a member of the Turkish Ottoman Empire. There were an estimate of 2,ooo,ooo Armenians living in the Turkish Ottoman Empire. After the fall of the sultan and the rise of Turkish chauvinism under the three Young Turks in the 1900s, the right to bear any arms was slowly limited. This did not affect Turks, Kurds, nor any other Muslims during the time. The ability to protect oneself was taken away from the Armenian people. In the coming years massacres of the Christian Armenian minority would continue. Unarmed, the Armenians would suffer the first genocide of the 20th century.

http://sipseystreetirregulars.blogspot.com/2015/04/the-predictable-fruits-of-citizen.html

Germany is the Tell-Tale Heart of America’s Drone War

A TOP-SECRET U.S. intelligence document obtained by The Intercept confirms that the sprawling U.S. military base in Ramstein, Germany serves as the high-tech heart of America’s drone program. Ramstein is the site of a satellite relay station that enables drone operators in the American Southwest to communicate with their remote aircraft in Yemen, Somalia, Afghanistan and other targeted countries. The top-secret slide deck, dated July 2012, provides the most detailed blueprint seen to date of the technical architecture used to conduct strikes with Predator and Reaper drones.

Amid fierce European criticism of America’s targeted killing program, U.S. and German government officials have long downplayed Ramstein’s role in lethal U.S. drone operations and have issued carefully phrased evasions when confronted with direct questions about the base. But the slides show that the facilities at Ramstein perform an essential function in lethal drone strikes conducted by the CIA and the U.S. military in the Middle East, Afghanistan and Africa.

The slides were provided by a source with knowledge of the U.S. government’s drone program who declined to be identified because of fears of retribution. According to the source, Ramstein’s importance to the U.S. drone war is difficult to overstate. “Ramstein carries the signal to tell the drone what to do and it returns the display of what the drone sees. Without Ramstein, drones could not function, at least not as they do now,” the source said.

The new evidence places German Chancellor Angela Merkel in an awkward position given Germany’s close diplomatic alliance with the United States. The German government has granted the U.S. the right to use the property, but only under the condition that the Americans do nothing there that violates German law.

https://firstlook.org/theintercept/2015/04/17/ramstein/

Richard Gage AE911Truth Lecture at Delft University of Technology NL. April 16 2015

Friday, April 17, 2015

HEAD of the FBI’s Anthrax Investigation Says the Whole Thing Was a SHAM

Agent In Charge of Amerithrax Investigation Blows the Whistle

The FBI head agent in charge of the anthrax investigation – Richard Lambert – has just filed a federal whistleblower lawsuit calling the entire FBI investigation bullsh!t:

http://www.washingtonsblog.com/2015/04/head-fbis-anthrax-investigation-calls-b-s.html


Thursday, April 16, 2015

WikiLeaks Publishes Thousands of Hacked Sony Documents

WikiLeaks, which came to prominence releasing sensitive government documents, said that it was releasing the archive because reporters were only able to “scratch the surface” before the correspondence was taken down.

“This archive shows the inner workings of an influential multinational corporation,” WikiLeaks editor-in-chief Julian Assange said in a statement. “It is newsworthy and at the center of a geopolitical conflict. It belongs in the public domain. WikiLeaks will ensure it stays there.”

The group said that the correspondence expose Sony’s political fundraising and its lobbying activities on behalf of anti-piracy. In particular, WikiLeaks cites emails detailing how members of the studio set up a “collective” in order to get around campaign donation limits and send money to New York Governor Andrew Cuomo, because of his support for state film and television tax incentives and work cracking down on piracy.

https://variety.com/2015/film/news/wikileaks-sony-hack-1201473964/

https://wikileaks.org/sony/press/

Agency Overseeing Obama Trade Deals Filled With Former Trade Lobbyists

The Office of the United States Trade Representative, the agency responsible for negotiating two massive upcoming trade deals, is being led by former lobbyists for corporations that stand to benefit from the deals, according to disclosure forms obtained by The Intercept.

The Trans-Pacific Partnership (TPP) is a proposed free trade accord between the U.S. and 11 Pacific Rim countries; the Transatlantic Trade and Investment Partnership (TTIP) is a similar agreement between the U.S. and the E.U.

The Obama administration is pushing hard to complete both deals, which it says will increase U.S. trade opportunities. Critics say the deals will provide corporate interests with sweeping powers to challenge banking and environmental regulations.

https://firstlook.org/theintercept/2015/04/16/tpp-revolving-door/

Sen. Bob Graham Says FBI went beyond 9/11 Cover-Up to “Aggressive Deception”

Graham said that a smoking gun in this case are contained in 80,000 documents being reviewed by a federal judge in south Florida. The documents are being reviewed by the judge thanks to the work of FloridaBulldog.org’s investigative journalist, Dan Christensen, who submitted a FOIA request to obtain those documents. These documents, which are being released little by little, show a connection between a wealthy Florida family, the Saudi royal family and the hijackers.

Graham, who was the former head of the intelligence Senate committee and had first hand knowledge of these documents, says that the FBI is covering up the fact that it investigated this family. Judge Andrew Napolitano told Fox News’ Shepard Smith that he believes that Graham has seen the documents and knows exactly what’s in them (3:34).

http://benswann.com/sen-bob-graham-says-fbi-went-beyond-911-cover-up-to-aggressive-deception/

How Israel Hid Its Secret Nuclear Weapons Program

An exclusive look inside newly declassified documents shows how Israel blocked U.S. efforts to uncover its secret nuclear reactor.

Read more: http://www.politico.com/magazine/story/2015/04/israel-nuclear-weapons-117014.html#ixzz3XW9IelNH

Wednesday, April 15, 2015

Europe Calling Out for AE911Truth WTC Evidence


In a few days, Architects & Engineers for 9/11 Truth founder and 28-year professional architect Richard Gage, AIA, embarks on an intensive month-long speaking tour that is designed to illuminate Europeans on the facts of the destruction of the three World Trade Center skyscrapers on September 11, 2001.

Armed with unbiased expert analysis and eyewitness testimony, Gage exposes major flaws in the official 9/11 narrative, upon which a dubious perpetual war on terror and erosion of civil liberties across the globe has been predicated. Mounting death tolls, stratospheric military spending, and widespread government insolvency are prompting citizens of all countries to call for a closer examination of the evidence of the catastrophic events of 9/11 — events that have been the impetus for these planet-wide ills.

http://www.ae911truth.org/news/212-news-media-events-gage-2015-euro-tour.html

Inventor of Antivirus Sofware: The Government Is Planting Malicious Software On Your Phone So It Can See What You're Doing

John McAfee invented commercial antivirus software. He may be a controversial and eccentric figure … but the man knows his technology.

Earlier this month, McAfee told security expert Paul Asadoorian that encryption is dead. Specifically, he said:

Every city in the country has 1 to 3 Stingray spy devices … Bigger cities like New York probably have 200 or 300
When you buy a Stingray, Harris Corporation makes you sign a contract keeping your Stingray secret (background here and here)
Stingray pushes automatic “updates” – really malicious software – onto your phone as soon as you come into range
The software – written by the largest software company in the world – allows people to turn on your phone, microphone and camera, and read everything you do and see everything on your screen
Encryption doesn’t matter in a world where anyone can plant software on your phone and see what you’re seeing. Protecting transmission of information from one device to the other doesn’t matter anymore … they can see what you see on your device
There are many intrusions other than Stingray. For example, everyone has a mobile phone or mobile device which has at least 10 apps which have permission to access camera and microphone
Bank of America’s online banking app requires you to accept microphones and cameras. McAfee called Bank of America and asked why they require microphones and cameras. They replied that – if you emptied all of the money in your account and said “it wasn’t me”, they could check, and then say:
Well, it certainly looks like you. And it certainly sounds like you.
In order to do that, B of A’s app keeps your microphone and camera on for a half hour after you’ve finished your banking
In addition, people can call you – and have you call them back – and plant software on your phone when you call them back



http://www.zerohedge.com/news/2015-04-14/inventor-antivirus-sofware-government-planting-malicious-software-your-phone-so-it-c

9/11 mother of all false flag attacks

Tuesday, April 14, 2015

The Lincoln Assassination and Cover-Up: Part of an On-Going Story

Even more mysteries surround the assistance provided Lincoln’s assassin, John Wilkes Booth. In a recent article, the Washington Post described Booth as “embittered,” the term used by Psychology Today to “analyze” Lee Harvey Oswald. Other more scholarly studies have argued that Booth was originally plotting not the murder but the abduction of Lincoln, Vice-President Johnson, and Secretary of State Seward. This was part of a coherent strategy to throw the determination of the next president into the hands of the Supreme Court, where Chief Justice Roger Taney had already shown in the Dred Scott case that he was pro-slavery and sympathetic to the South.

Speculation of a cover-up about Booth has abounded since the time that four of his associates in the crime were swiftly hanged. A benign explanation for the cover-up would be the desire to avoid dealing with the possibility that Booth had been guided or at least assisted in his plotting by the Confederate Secret Service. This was suspected almost immediately when a Vigenère Cipher table (a code used by the South) was discovered among Booth’s effects. At that time a strong need to restore unity to a divided nation would have been an ample motive to present Booth, like Oswald a century later, as an embittered loner.

It is now pretty well established, by historian Thomas Goodrich and others, that Booth had traveled widely to Canada and elsewhere as a spy and courier for the Confederate Secret Service. Other historians have concluded, in the words of David Herbert Donald, that “at least at the lower levels of the Southern secret service, the abduction of the Union President was under consideration.”

http://whowhatwhy.org/2015/04/14/the-lincoln-assassination-and-cover-up-part-of-an-on-going-story/

'Killing ISIS' - Full Uncensored Mini Documentary (2015)

MK Ultra

During the Cold War, the CIA funded a series of secret brainwashing experiments at a prestigious psychiatric clinic at McGill University.

No method was too bizarre, including using LSD, hypnosis, prolonged periods of induced sleep, and electrical shocks to the brain. Patients were given the treatment without explanation or consent, and even decades later complained that they had never completely recovered.

In 1980, the fifth estate exposed the magnitude of the human tragedy with this episode in which two Canadians told their stories publicly for the first time.

http://www.cbc.ca/fifth/episodes/40-years-of-the-fifth-estate/mk-ultra

Monday, April 13, 2015

The NSA wants ‘front door’ access to your encrypted data

The systemic flaws in the front-door solution

The first problem with Rogers proposed front-door solution is that it’s a meaningless feel-good measure given the current regulatory structure of our national security system. Before the Snowden leaks, Google, Microsoft, and other digital providers were forbidden from disclosing that they’d received national security letters, even in aggregate. Thanks to Snowden, we now know that Yahoo went to bat for users, challenging the legality and authority of the NSA — and lost, every time.

Giving half a key to Google or Yahoo would be meaningless unless the company possesses the authority to refuse to use it. In theory, the court system offers robust oversight of how such capabilities are used. In practice, the FISA court has operated more like a rubber stamp body than an organization devoted to judicial oversight. The government, as a whole, doesn’t currently have a great track record of respecting suspects’ rights — the FBI is on record as ordering local police departments to drop cases rather than disclose how secret stingray hardware may have been used in ways that fundamentally violate those suspects’ Fourth Amendment rights.

The other systemic problem with Rogers’ suggestion is that it assumes a degree of trust between corporations and government at a time when such good feelings are at an all-time low. The NSA has demonstrated no practical ability to differentiate between friend and foe. Its decision to hoover up data running across Google’s transatlantic cables may have been legal, but it illustrated a total lack of respect for Google — and a willingness to resort to extrajudicial methods when it was convenient.

The NSA could avoid this problem by sharing the key with government-appointed escrows rather than corporations, but this simply hides the process from public view. That’s already extremely problematic.

http://www.extremetech.com/extreme/203275-the-nsa-wants-front-door-access-to-your-encrypted-data

Ex-Blackwater contractors sentenced in Nusoor Square shooting in Iraq

One former employee of the private Blackwater Worldwide security company was sentenced Monday to life in prison and three others to 30 years each behind bars for their roles in a 2007 mass shooting in Baghdad that left 17 people dead.

A federal jury convicted the four in October after a lengthy trial that saw some 30 witnesses travel from Iraq to testify against the security contractors. Prosecutors accused the men of illegally unleashed "powerful sniper fire, machine guns and grenade launchers on innocent men, women and children."

http://www.cnn.com/2015/04/13/us/blackwater-contractors-iraq-sentencing/index.html

Hillary Clinton: The International Neocon Warmonger

Hillary Clinton has announced her candidacy for President of the United States. While the European press showers her with praise without thinking, Webster G. Tarpley recalls her balance sheet: in all circumstances, she supported war and corporate interests.

http://www.voltairenet.org/article187315.html

Florida Ex-Senator Pursues Claims of Saudi Ties to Sept. 11 Attacks

Mr. Graham, 78, a two-term governor of Florida and three-term senator who left Capitol Hill in 2005, says he will not relent in his efforts to force the government to make public a secret section of a congressional review he helped write — one that, by many accounts, implicates Saudi citizens in helping the hijackers.

“No. 1, I think the American people deserve to know the truth of what has happened in their name,” said Mr. Graham, who was a co-chairman of the 2002 joint congressional inquiry into the terrorist attacks. “No. 2 is justice for these family members who have suffered such loss and thus far have been frustrated largely by the U.S. government in their efforts to get some compensation.”

Mr. Graham’s focus on a possible Saudi connection has received renewed attention because of claims made by victims’ families in a federal court in New York that Saudi Arabia was responsible for aiding the Sept. 11 hijackers and because of a Freedom of Information Act lawsuit filed against the F.B.I. in Florida.

http://www.nytimes.com/2015/04/14/world/middleeast/florida-ex-senator-pursues-claims-of-saudi-ties-to-sept-11-attacks.html

Sunday, April 12, 2015

How the FBI is whitewashing the Saudi connection to 9/11

Former Democratic Sen. Bob Graham, who in 2002 chaired the congressional Joint Inquiry into 9/11, maintains the FBI is covering up a Saudi support cell in Sarasota for the hijackers. He says the al-Hijjis “urgent” pre-9/11 exit suggests “someone may have tipped them off” about the coming attacks.

Graham has been working with a 14-member group in Congress to urge President Obama to declassify 28 pages of the final report of his inquiry which were originally redacted, wholesale, by President George W. Bush.

“The 28 pages primarily relate to who financed 9/11, and they point a very strong finger at Saudi Arabia as being the principal financier,” he said, adding, “I am speaking of the kingdom,” or government, of Saudi Arabia, not just wealthy individual Saudi donors.

Sources who have read the censored Saudi section say it cites CIA and FBI case files that directly implicate officials of the Saudi Embassy in Washington and its consulate in Los Angeles in the attacks — which if true, would make 9/11 not just an act of terrorism, but an act of war by a foreign government. The section allegedly identifies high-level Saudi officials and intelligence agents by name, and details their financial transactions and other dealings with the San Diego hijackers. It zeroes in on the Islamic Affairs Department of the Saudi Embassy, among other Saudi entities.

http://nypost.com/2015/04/12/saudi-role-in-911-being-whitewashed-by-fbi/

Twenty Years Later: Facts About the OKC Bombing That Go Unreported

Next week will mark the 20th anniversary of the terrorist bombing of the Murrah Federal Building in Oklahoma City, which killed 168 people including 19 children. The mainstream media will undoubtedly focus its attention on Timothy McVeigh, who was put to death in June 2001 for his part in the crime. They might also mention Terry Nichols, who was convicted of helping McVeigh plan the bombing and is serving a life sentence without parole.

There will be less discussion about how the FBI spent years hunting for a man who witnesses say accompanied McVeigh on the day of the bombing. They called this accomplice John Doe #2 and theories about his identity range from an Iraqi named Hussain Al-Hussaini, to a German national described below, to a neo-nazi bank robber named Richard Guthrie. The Justice Department finally gave up its search and said it was all a mistake— that there was never any credible evidence of a John Doe #2 being involved.

That reversal demonstrates a pattern of cover-up by authorities and limited media coverage in the years since the crime. This week, accounts will not repeat early reports of secondary devices in the building, or reports of the involvement of unknown middle-eastern characters. There will also be little if any mention of the extensive independent investigation into the crime that was conducted by leading members of the OKC community. Here are seven more facts that will probably not see much coverage on the 20th anniversary.

http://digwithin.net/2015/04/12/okc-bombing/

http://911blogger.com/news/2015-04-12/twenty-years-later-facts-about-okc-bombing-go-unreported

Meet The Secretive Group That Runs The World

Over the centuries there have been many stories, some based on loose facts, others based on hearsay, conjecture, speculation and outright lies, about groups of people who "control the world." Some of these are partially accurate, others are wildly hyperbolic, but when it comes to the historic record, nothing comes closer to the stereotypical, secretive group determining the fate of over 7 billion people, than the Bank of International Settlements, which hides in such plain sight, that few have ever paid much attention.

This is their story.

http://www.zerohedge.com/news/2015-04-11/meet-secretive-group-runs-world

Friday, April 10, 2015

Illuminati and the Council on Foreign Relations: Myron C. Fagan (1967)

A Guide to the 5+ Known Intelligence Community Telecommunications Metadata Dragnets

I’ve been laying this explanation out since USA Today provided new details on DEA’s International Dragnet, but it’s clear it needs to be done in more systematic fashion, because really smart people continue to mistakenly treat the Section 215 database as the analogue to the DEA dragnet described by USAT, which it’s not. There are at least five known telecommunications dragnets (some of which appear to integrate other kinds of metadata, especially Internet metadata). Here’s a quick guide to what is known about each (click to enlarge, let me know of corrections/additions, I will do running updates to make this more useful):

https://www.emptywheel.net/2015/04/09/a-guide-to-the-5-known-intelligence-community-telecommunications-metadata-dragnets/

How a '50s-Era New York Knife Law Has Landed Thousands in Jail

For years, New York's gravity-knife law has been formally opposed by a broad swath of the legal community. Elected officials call the statute "flawed" and "unfair." Defense attorneys call it "outrageous" and "ridiculous" -- or worse. Labor unions, which have seen a parade of members arrested for tools they use on the job, say the law is woefully outdated. Even the Office of Court Administration -- the official body of the New York State judiciary -- says the law is unjustly enforced and needs to change. They've petitioned the legislature to do just that.
But despite significant pushback from many legal experts, the half-century-old statute is the same as it ever was. In fact, it's been enforced with increasing frequency in recent years. Neal didn't know it at the time, but on that summer evening in 2008, he became part of a remarkable surge in gravity-knife arrests in New York City over the past 10 years.

Law enforcement agencies don't track gravity-knife crimes as a class, which may explain why the frequency of those arrests has gone largely unreported in the news media. But a Village Voice analysis of data from several sources suggests there have been as many as 60,000 gravity-knife prosecutions over the past decade, and that the rate has more than doubled in that time. If those estimates are correct, it's enough to place gravity-knife offenses among the top 10 most prosecuted crimes in New York City.

The increase seems to be the result of a confluence of forces. Changes in knife design have played a part, as modern features have nudged the most popular styles closer to the edge of the legal definition. But the NYPD's stop-and-frisk program also may be one driver. A prime rationale for the policy has always been weapon recovery; former NYPD commissioner Ray Kelly put that goal front and center in a 2013 Wall Street Journal op-ed, pointing out that stop-and-frisk had "taken tens of thousands of weapons off the street" over the previous decade.

But about 80 percent of weapons recovered under stop-and-frisk were knives, according to an analysis of the department's own statistics. And experts say the vast majority of those were likely misclassified as "gravity knives." Whether deliberate or not, dramatically expanding the definition of an illegal knife has not only landed thousands of innocent people in jail -- it also had the effect of making stop-and-frisk appear far more effective than it actually was.

http://blogs.villagevoice.com/runninscared/2014/10/nyc-gravity-knife-law-arrests.php?page=all

Thursday, April 9, 2015

Former F.B.I. Agent Sues, Claiming Retaliation Over Misgivings in Anthrax Case

When Bruce E. Ivins, an Army microbiologist, took a fatal overdose of Tylenol in 2008, the government declared that he had been responsible for the anthrax letter attacks of 2001, which killed five people and set off a nationwide panic, and closed the case.

Now, a former senior F.B.I. agent who ran the anthrax investigation for four years says that the bureau gathered “a staggering amount of exculpatory evidence” regarding Dr. Ivins that remains secret. The former agent, Richard L. Lambert, who spent 24 years at the F.B.I., says he believes it is possible that Dr. Ivins was the anthrax mailer, but he does not think prosecutors could have convicted him had he lived to face criminal charges.

In a lawsuit filed in federal court in Tennessee last Thursday, Mr. Lambert accused the bureau of trying “to railroad the prosecution of Ivins” and, after his suicide, creating “an elaborate perception management campaign” to bolster its claim that he was guilty. Mr. Lambert’s lawsuit accuses the bureau and the Justice Department of forcing his dismissal from a job as senior counterintelligence officer at the Energy Department’s lab in Oak Ridge, Tenn., in retaliation for his dissent on the anthrax case.

http://www.nytimes.com/2015/04/09/us/ex-fbi-agent-claims-retaliation-for-dissent-in-anthrax-inquiry.html?_r=0

Why IS the US military moving back into 'Stargate' base deep under the Rocky Mountains a decade after it was abandoned?

It shut down nearly ten years ago as the threat from Russia seemed to subside, but this week the Pentagon announced that Cheyenne Mountain will once again be home to the most advanced tracking and communications equipment in the United States military.

The shift to the Cheyenne Mountain base in Colorado is designed to safeguard the command's sensitive sensors and servers from a potential electromagnetic pulse (EMP) attack, military officers said.

The Pentagon last week announced a $700 million contract with Raytheon Corporation to oversee the work for North American Aerospace Command (NORAD) and US Northern Command.

Admiral William Gortney, head of NORAD and Northern Command, said that 'because of the very nature of the way that Cheyenne Mountain's built, it's EMP-hardened.'

http://www.dailymail.co.uk/news/article-3031041/Why-military-moving-Stargate-base-deep-Rocky-Mountains-decade-abandoned.html#ixzz3Wod66mbE


Lobbyists for Spies Appointed To Oversee Spying

Who’s keeping watch of the National Security Agency? In Congress, the answer in more and more cases is that the job is going to former lobbyists for NSA contractors and other intelligence community insiders.

A wave of recent appointments has placed intelligence industry insiders into key Congressional roles overseeing intelligence gathering. The influx of insiders is particularly alarming because lawmakers in Washington are set to take up a series of sensitive surveillance and intelligence issues this year, from reform of the Patriot Act to far-reaching “information sharing” legislation.

After the first revelations of domestic surveillance by NSA whistleblower Edward Snowden, President Obama defended the spying programs by claiming they were “subject to congressional oversight and congressional reauthorization and congressional debate.” But as Rep. Alan Grayson, D-Fla., and other members of Congress have pointed out, there is essentially a “two-tiered” system for oversight, with lawmakers and staff on specialized committees, such as the House and Senate committees on Intelligence and Homeland Security, controlling the flow of information and routinely excluding other Congress members, even those who have asked for specific information relating to pending legislation.

The Intercept reviewed the new gatekeepers in Congress, the leading staffers on the committees overseeing intelligence and surveillance matters, and found a large number of lobbyists and consultants passing through the revolving door between the intelligence community and the watchdogs who purportedly oversee the intelligence community. We reached out to each of them earlier this week and have yet to hear back:

https://firstlook.org/theintercept/2015/04/09/lobbyists-for-spies-appointed-to-oversee-spying/

Wednesday, April 8, 2015

Ex-CIA officials to be charged in Pakistan over 2009 drone strike



ISLAMABAD — A Pakistani judge on Tuesday ordered that criminal charges be filed against a former CIA lawyer who oversaw its drone program and the one-time chief agency operative in Islamabad over a 2009 strike that killed two people.

Former acting general counsel John A. Rizzo and ex-station chief Jonathan Bank must face charges including murder, conspiracy, terrorism and waging war against Pakistan, Justice Shaukat Aziz Siddiqui of the Islamabad High Court ruled. A court clerk and a lawyer involved the case, Mirza Shahzad Akbar, confirmed details of the judge’s ruling.

Rizzo and Bank could not be immediately reached for comment. The CIA will have no comment, spokesman Chris White told The Associated Press.

The legal action comes as the number of CIA drone strikes in Pakistan has fallen precipitously from their 2010 high, amid signs that the U.S. and Pakistan have been more closely cooperating on counterterrorism issues after years of tensions. It is unclear how the criminal charges will affect that cooperation, even though the defendants will almost certainly never see the inside of a Pakistani courtroom.

The only way the case could go forward is if U.S. officials cooperate with the Pakistani court, which is inconceivable given that the drone strikes were carried out under a program ordered by two successive U.S. presidents.

http://nypost.com/2015/04/07/pakistani-judge-orders-charges-for-ex-cia-officials-over-2009-drone-strike/

The Surveillance State Repeal Act Introduced In Congress

Last week, Reps. Mark Pocan (D-Wis.) and Thomas Massie (R-Ky.), introduced bipartisan legislation, H.R. 1466, to completely repeal the PATRIOT act. The bill would reform the National Security Agency (NSA), and dramatically revamp America’s overall espionage apparatus and posture.

Aptly named the Surveillance State Repeal Act, the bill, if enacted, would be the single biggest legislative check against the unwarranted government overreach and draconian surveillance of Americans that has transpired subsequent the events of 9/11, while at the same time restoring our civil liberties.

The bill would also give whistleblowers like Edward Snowden, who exposed the National Security Agency’s mass surveillance in 2013, additional protections under the law.

“Really, what we need are new whistleblower protections so that the next Edward Snowden doesn’t have to go to Russia or Hong Kong or whatever the case may be just for disclosing this,” Rep. Massie said.

The PATRIOT Act was passed as a fear-based reaction to the events of 9/11 and gave the federal government an unprecedented amount of power to monitor the private communications of U.S. citizens without a warrant. This law is a clear violation of the 4th Amendment, yet it has been allowed to transform our republic into something almost unrecognizable.

The Surveillance State Repeal Act would prohibit the government from collecting information on U.S. citizens obtained through private communications without a warrant. In addition, it would also mandate that the Government Accountability Office (GAO) provide monitoring of domestic surveillance programs to ensure compliance with the law.

http://thefreethoughtproject.com/patriot-act-killer-congress-surveillance-state-repeal-act/

Barrett Brown Loses Email Access For A Year After Using Email To Complain About Prison



An hour or so after having used the system to contact a journalist about potential BOP [Bureau of Prisons] wrongdoing, Barrett Brown’s access to the TRULINCS prisoner e-mail system was restricted, for a full year until April 2016, without explanation.

This is contrary to the BOP’s own policy on several points, as noted in their 2009 documentation — the administration is only allowed to remove access to TRULINCS for thirty days pending an investigation of any potential misuse, and the inmate is supposed to be informed in writing of the reason for that.

But despite all of that, prison officials don't seem to care. They made it clear they just wanted to shut up Brown:

Barrett spoke to a supervisor this morning who told him that he lost his e-mail access because he was “using it for the wrong thing”. This refers to his contacts with the press. A review of his e-mail activity had been made, Barrett was also told by this person that he “wasn’t supposed to have” e-mail, when there’s been no such order or determination that we’re aware of.

https://www.techdirt.com/articles/20150406/06454030561/barrett-brown-loses-email-access-year-after-using-email-to-complain-about-prison.shtml

Court mulls revealing secret government plan to cut cell phone service

A federal appeals court is asking the Obama administration to explain why the government should be allowed to keep secret its plan to shutter mobile phone service during "critical emergencies."

The Department of Homeland Security came up with the plan—known as Standing Operating Procedure 303—after cellular phones were used to detonate explosives targeting a London public transportation system.

SOP 303 is a powerful tool in the digital age, and it spells out a "unified voluntary process for the orderly shut-down and restoration of wireless services during critical emergencies such as the threat of radio-activated improvised explosive devices."

The US Court of Appeals for the District of Columbia Circuit in February sided (PDF) with the government and ruled that the policy did not need to be disclosed under a Freedom of Information Act request from the Electronic Privacy Information Center. The court agreed with the government's citation of a FOIA exemption that precludes disclosure if doing so "could reasonably be expected to endanger the life or physical safety of any individual."

EPIC asked the court to revisit its ruling, arguing that the decision, "if left in place, would create an untethered 'national security' exemption'" in FOIA law. On Friday, the court ordered (PDF) the government to respond—a move that suggests the appellate court might rehear the case.

http://arstechnica.com/tech-policy/2015/04/court-mulls-revealing-secret-government-plan-to-cut-cell-phone-service/