Monday, October 31, 2016

Investigating Donald Trump, F.B.I. Sees No Clear Link to Russia

New leak may show if you were hacked by the NSA

When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers

Peter Thiel’s CIA-Backed Data Mining Company Wins Court Battle Against the U.S. Army

WIKILEAKS RELEASE: The Podesta Emails Part 24

CNN Parts Ways With Donna Brazile

New email shows Donna Brazile leaked a second debate question to Clinton campaign

Sunday, October 30, 2016

FBI in Internal Feud Over Hillary Clinton Probe

As federal agents prepare to scour roughly 650,000 emails to see how many relate to a prior probe of Hillary Clinton’s email use, the surprise disclosure that investigators were pursuing the potential new evidence lays bare building tensions inside the bureau and the Justice Department over how to investigate the Democratic presidential nominee.

Metadata found on the laptop used by former Rep. Anthony Weiner and his estranged wife Huma Abedin, a close Clinton aide, suggests there may be thousands of emails sent to or from the private server that Mrs. Clinton used while she was secretary of state, according to people familiar with the matter. It will take weeks, at a minimum, to determine whether those messages are work-related from the time Ms. Abedin served with Mrs. Clinton at the State Department; how many are duplicates of emails already reviewed by the Federal Bureau of Investigation; and whether they include either classified information or important new evidence in the Clinton email probe.

The FBI has had to await a court order to begin reviewing the emails, because they were uncovered in an unrelated probe of Mr. Weiner.

The new investigative effort, disclosed by FBI Director James Comey on Friday, shows a bureau at times in sharp internal disagreement over matters related to the Clintons, and how to handle those matters fairly and carefully in the middle of a national election campaign. Even as the previous probe of Mrs. Clinton’s email use wound down in July, internal disagreements within the bureau and the Justice Department surrounding the Clintons’ family philanthropy heated up, according to people familiar with the matter.

http://www.wsj.com/articles/laptop-may-include-thousands-of-emails-linked-to-hillary-clintons-private-server-1477854957

WIKILEAKS RELEASE: The Podesta Emails Part 23

No Agenda: Sunday (10-30-16) Episode 873 - Poster Boys of Evil

Saturday, October 29, 2016

"The Clinton Machine"


The Clintons are perhaps the most corrupt political family in American history. The Bushes may be second, but even they maintained a certain decorum in the White House. Neither Bush president would think of cussing out a secret service man or angrily hurl a White House antique at a spouse. The Clintons are at heart common grifters. They’re lying, vulgar confidence tricksters who continue to enjoy pushing the criminal envelope because they’re used to getting away with their crimes. Both should be in prison. Right now.


http://grrrgraphics.com/cartoons/the-clinton-machine

NSA contractor accused of spying stole real names of US undercover officers

Classified information stolen by a United States federal contractor, who was charged with espionage last month, includes the true identities of American intelligence officers posted in undercover assignments abroad, according to court documents. In August of this year, Harold Thomas Martin III, was arrested by the Federal Bureau of Investigation on charges of stealing government property and illegally removing classified material. Martin, 51, served as a US Navy officer for over a decade, where he acquired a top secret clearance and specialized in cyber security. At the time of his arrest earlier this year, he was working for Booz Allen Hamilton, one of the largest federal contractors in the US. Some media reports said Martin was a member of the National Security Agency’s Office of Tailored Access Operations, described by observers as an elite “hacker army” tasked with conducting offensive cyber espionage against foreign targets.

https://intelnews.org/2016/10/28/01-2000/

The Modern History of ‘Rigged’ US Elections



The United States is so committed to the notion that its electoral process is the world’s “gold standard” that there has been a bipartisan determination to maintain the fiction even when evidence is overwhelming that a U.S. presidential election has been manipulated or stolen. The “wise men” of the system simply insist otherwise.

We have seen this behavior when there are serious questions of vote tampering (as in Election 1960) or when a challenger apparently exploits a foreign crisis to create an advantage over the incumbent (as in Elections 1968 and 1980) or when the citizens’ judgment is overturned by judges (as in Election 2000).
Presidents Richard Nixon, George H.W. Bush and Ronald Reagan photographed together in the Oval Office in 1991. (Cropped from a White House photo that also included Presidents Gerald Ford and Jimmy Carter.)Presidents Richard Nixon, George H.W. Bush and Ronald Reagan photographed together in the Oval Office in 1991. (Cropped from a White House photo that also included Presidents Gerald Ford and Jimmy Carter.)

Strangely, in such cases, it is not only the party that benefited which refuses to accept the evidence of wrongdoing, but the losing party and the establishment news media as well. Protecting the perceived integrity of the U.S. democratic process is paramount. Americans must continue to believe in the integrity of the system even when that integrity has been violated.

The harsh truth is that pursuit of power often trumps the principle of an informed electorate choosing the nation’s leaders, but that truth simply cannot be recognized.

https://consortiumnews.com/2016/10/27/the-modern-history-of-rigged-us-elections/

WIKILEAKS RELEASE: The Podesta Emails Part 22

Friday, October 28, 2016

Judicial Watch Files Lawsuit for FBI Records on Clinton Email Investigation; Tarmac Meeting Between Bill Clinton and Loretta Lynch

Judicial Watch announced today that it filed a Freedom of Information (FOIA) lawsuit to obtain Federal Bureau of Investigation (FBI) records relating to its “investigation of former Secretary of State Hillary Clinton’s use of a non-government email server during her tenure.” The lawsuit includes a demand for FBI “302” documents, which are reports of FBI investigation interviews. The lawsuit was filed in the U.S. District Court for the District of Columbia (Judicial Watch v. U.S. Department of Justice (No. 1:16-cv-02046).

The Judicial Watch FOIA lawsuit was filed after the Justice Department failed to comply with a July 7, 2016, FOIA request seeking the following:

All FD-302 forms prepared pursuant to the Federal Bureau of Investigation’s investigation of former Secretary of State Hillary Clinton’s use of a private e-mail server during her tenure.

All records of communications between any agent, employee, or representative of the Federal Bureau of Investigation regarding, concerning, or related to the aforementioned investigation. This request includes, but is not limited to, any related communications with any official, employee, or representative of the Department of Justice, the Executive Office of the President, the Democratic National Committee, and/or the presidential campaign of Hillary Clinton.

All records related to the meeting between Attorney General Lynch and former President Bill Clinton on June 27, 2016.

There is significant controversy about whether the FBI and Obama Justice Department investigation gave Clinton and other witnesses and potential targets preferential treatment.

http://www.judicialwatch.org/press-room/press-releases/judicial-watch-files-lawsuit-fbi-records-clinton-email-investigation-tarmac-meeting-bill-clinton-loretta-lynch/

HIDDEN CAM: Media Matters Brags About Sabotaging Roger Stone

Project Veritas Action has released the sixth video in a multi-part series that is sending shockwaves through the DNC and the Clinton campaign.

FBI reopens Clinton email investigation after new messages found

John Podesta’s New Global Order

Interestingly, one of those deeply involved in this global agenda, as we noted at the time, was John Podesta, the chairman of the 2016 Hillary Clinton presidential campaign who previously served as counselor to Obama. Podesta’s emails are at the center of the WikiLeaks disclosures about the operations of the Clinton campaign, the Clinton Foundation and the Democratic Party.

Podesta, founder of the George Soros-funded Center for American Progress and a member of the elitist Trilateral Commission, went to work for Obama as a senior policy consultant on climate change. A liberal Catholic, he has been a professor at Georgetown Law School. One of the leaked emails shows Podesta saying that he applauds the work of Pope Francis on climate change and that “all my Jesuit friends say the Pope is the real deal.”

Podesta was picked by U.N. Secretary-General Ban Ki-moon to be a member of the “high-level panel” of “eminent persons” planning the future of the globe. This so-called “High Level Panel on the Post-2015 Development Agenda” released an 81-page report titled, “A New Global Partnership: Eradicate Poverty and Transform Economies through Sustainable Development.”

“In simplest terms,” explains Patrick Wood, author of Technocracy Rising: The Trojan Horse of Global Transformation, “Sustainable Development is a replacement economic system for capitalism and free enterprise. It is a system based on resource allocation and usage rather than on supply and demand and free economic market forces.”

http://www.aim.org/aim-column/john-podestas-new-global-order/

WIKILEAKS RELEASE: The Podesta Emails Part 21

CIA Will Place Its CREST Database Online

The Central Intelligence Agency said this week that it will post its database of declassified CIA documents online, making them broadly accessible to all interested users.

The database, known as CREST (for CIA Records Search Tool), contains more than 11 million pages of historical Agency records that have already been declassified and approved for public release.

Currently, however, CREST can only be accessed through computer terminals at the National Archives in College Park, MD. This geographic restriction on availability has been a source of frustration and bafflement to researchers ever since the digital collection was established in 2000.

https://fas.org/blogs/secrecy/2016/10/crest-to-go-online/

Thursday, October 27, 2016

No Agenda: Thursday (10-27-16) Episode 872 - Kinetic Kill

Jury finds all Oregon standoff defendants not guilty of federal conspiracy, gun charges

A federal jury on Thursday found Ammon Bundy, his brother Ryan Bundy and five co-defendants not guilty of conspiring to prevent federal employees from doing their jobs through intimidation, threat or force during the 41-day occupation of the Malheur National Wildlife Refuge.

The Bundy brothers and occupiers Jeff Banta and David Fry also were found not guilty of having guns in a federal facility. Kenneth Medenbach was found not guilty of stealing government property, and a hung jury was declared on Ryan Bundy's charge of theft of FBI surveillance cameras.

http://www.oregonlive.com/oregon-standoff/2016/10/oregon_standoff_verdicts_annou.html

Jury finds 7 Malheur occupiers not guilty of conspiracy

When CIA and NSA Workers Blow the Whistle, Congress Plays Deaf

Do the committees that oversee the vast U.S. spying apparatus take intelligence community whistleblowers seriously? Do they earnestly investigate reports of waste, fraud, abuse, professional negligence, or crimes against the Constitution reported by employees or contractors working for agencies like the CIA or NSA? For the last 20 years, the answer has been a resounding “no.”

My own experience in 1995-96 is illustrative. Over a two-year period working with my wife, Robin (who was a CIA detailee to a Senate committee at the time), we discovered that, contrary to the public statements by then-Chairman of the Joint Chiefs Colin Powell and other senior George H. W. Bush administration officials (including CIA Director John Deutch), American troops had in fact been exposed to chemical agents during and after the 1991 war with Saddam Hussein. While the Senate Banking Committee under then-Chairman Don Riegle, D-Mich., was trying to uncover the truth of this, officials at the Pentagon and CIA were working to bury it.

https://theintercept.com/2016/10/27/when-cia-and-nsa-workers-blow-the-whistle-congress-plays-deaf/

Wikileaks Reveals How Bill Clinton Profited From the Clinton Foundation

A new cache of hacked e-mails, released Wednesday by WikiLeaks, is shedding new light on how Bill Clinton made millions of dollars while Hillary Clinton served as secretary of state, and raising questions about whether there may have been conflicts of interest between foreign donations to the Clinton Foundation and the former president’s personal business.

In one 2011 memo written by Doug Band, a longtime aide to Bill Clinton, Band explains how he worked for years to raise $46 million for the Foundation through the Clinton Global Initiative, while also leveraging his relationships with corporate sponsors to secure lucrative speaking arrangements and consulting gigs for the former president. Band, who wrote the 12-page memo in response to an internal audit being conducted by lawyers for the Clinton Foundation, described the money-making endeavor as “Bill Clinton, Inc.”

http://www.vanityfair.com/news/2016/10/bill-clinton-foundation-wikileaks-emails

WIKILEAKS RELEASE: The Podesta Emails Part 20

Inside ‘Bill Clinton Inc.’: Hacked memo reveals intersection of charity and personal income

When top Bill Clinton aide Douglas Band wrote the memo, he was a central player at the Clinton Foundation and president of his own corporate consulting firm. Over the course of 13 pages, he made a case that his multiple roles had served the interests of the Clinton family and its charity.

In doing so, Band also detailed a circle of enrichment in which he raised money for the Clinton Foundation from top-tier corporations such as Dow Chemical and Coca-Cola that were clients of his firm, Teneo, while pressing many of those same donors to provide personal income to the former president.

The system has drawn scrutiny from Republicans, who say it allowed corporations and other wealthy supporters to pay for entree to a popular former president and a onetime secretary of state who is now the Democratic presidential nominee.

Band wrote the memo in 2011 to foundation lawyers conducting a review of the organization amid a brewing feud with the Clintons’ daughter, Chelsea Clinton, who was taking a stronger role in leading the foundation and had expressed concerns about Teneo’s operations.

https://www.washingtonpost.com/politics/inside-bill-clinton-inc-hacked-memo-reveals-intersection-of-charity-and-personal-income/2016/10/26/3bf84bba-9b92-11e6-b3c9-f662adaa0048_story.html

Unfilter 210 - Wikileaks Melts the Media (10-26-16)

Tuesday, October 25, 2016

Justice Dept. Shakes Up Inquiry Into Eric Garner Chokehold Case

The Justice Department has replaced the New York team of agents and lawyers investigating the death of Eric Garner, officials said, a highly unusual shake-up that could jump-start the long-stalled case and put the government back on track to seek criminal charges.

Mr. Garner, 43, died in 2014 on a Staten Island street corner, where two police officers confronted him and accused him of selling untaxed cigarettes. One of the officers, Daniel Pantaleo, was seen on a video using a chokehold, prohibited by the New York Police Department, to subdue him. Mr. Garner’s last words, “I can’t breathe,” became a rallying cry for protesters around the country.

Federal authorities have been investigating whether officers violated Mr. Garner’s civil rights in his fatal encounter with the police. But the case had been slowed by a dispute because federal prosecutors and Federal Bureau of Investigation officials in New York opposed bringing charges, while prosecutors with the Civil Rights Division at the Justice Department in Washington argued there was clear evidence to do so.

http://www.nytimes.com/2016/10/25/nyregion/justice-dept-replaces-investigators-on-eric-garner-case.html

America's Shadow Government and Its Silent Coup

Unaffected by elections. Unaltered by populist movements. Beyond the reach of the law.

Say hello to America’s shadow government.

A corporatized, militarized, entrenched bureaucracy that is fully operational and staffed by unelected officials who are, in essence, running the country, this shadow government represents the hidden face of a government that has no respect for the freedom of its citizenry.

No matter which candidate wins the presidential election, this shadow government is here to stay. Indeed, as recent documents by the FBI reveal, this shadow government—also referred to as “The 7th Floor Group”—may well have played a part in who will win the White House this year.

To be precise, however, the future president will actually inherit not one but two shadow governments.

The first shadow government, referred to as COG or Continuity of Government, is made up of unelected individuals who have been appointed to run the government in the event of a “catastrophe.” COG is a phantom menace waiting for the right circumstances—a terrorist attack, a natural disaster, an economic meltdown—to bring it out of the shadows, where it operates even now. When and if COG takes over, the police state will transition to martial law.

Yet it is the second shadow government—also referred to as the Deep State—that poses the greater threat to freedom right now. Comprised of unelected government bureaucrats, corporations, contractors, paper-pushers, and button-pushers who are actually calling the shots behind the scenes, this government within a government is the real reason “we the people” have no real control over our government.

The Deep State, which “operates according to its own compass heading regardless of who is formally in power,” makes a mockery of elections and the entire concept of a representative government.

So who or what is the Deep State?

It’s the militarized police, which have joined forces with state and federal law enforcement agencies in order to establish themselves as a standing army. It’s the fusion centers and spy agencies that have created a surveillance state and turned all of us into suspects. It’s the courthouses and prisons that have allowed corporate profits to take precedence over due process and justice. It’s the military empire with its private contractors and defense industry that is bankrupting the nation. It’s the private sector with its 854,000 contract personnel with top-secret clearances, “a number greater than that of top-secret-cleared civilian employees of the government.” It’s what former congressional staffer Mike Lofgren refers to as “a hybrid of national security and law enforcement agencies”: the Department of Defense, the State Department, Homeland Security, the CIA, the Justice Department, the Treasury, the Executive Office of the President via the National Security Council, the Foreign Intelligence Surveillance Court, a handful of vital federal trial courts, and members of the defense and intelligence committees.

It’s every facet of a government that is no longer friendly to freedom and is working overtime to trample the Constitution underfoot and render the citizenry powerless in the face of the government’s power grabs, corruption and abusive tactics.

These are the key players that drive the shadow government.

http://rutherford.org/publications_resources/john_whiteheads_commentary/the_path_to_total_dictatorship_americas_shadow_government_and_its_sile

Rise of the American Mercenary

Presidential candidate Hillary Clinton has asserted several times, and quite vociferously, that there will be “no American ground troops in Syria” if she is elected president in November.

While the definition of “ground troops” is flexible, there is a second reality that very few people are talking about in Washington today.

Not unlike the wars in Afghanistan and Iraq—where private military contractors fed, trained, equipped, and protected U.S. military forces “on the ground” in unprecedented numbers—an escalation of hired security forces in a hot spot like Syria would likely boost the presence of U.S. “boots” without causing the political heartburn of putting more actual soldiers and Marines in harm’s way.

In fact, it may already be happening.

Over the summer, a no-bid contract was reportedly awarded to Six3 Intelligence Solutions, a company based in McLean, Va., which in 2014 was acquired by major defense-industry player CACI International. The $10 million award, according to an otherwise pedestrian Pentagon notice, was for “intelligence analysis services” to be performed “in Germany, Italy, and Syria.” It was probably the first sliver of proof that U.S. contractors are actually operating there, despite persistent evasions by military officials.

https://www.theamericanconservative.com/articles/rise-of-the-american-mercenary/

AT&T Is Spying on Americans for Profit, New Documents Reveal

Project Hemisphere is a secretive program run by AT&T that searches trillions of call records and analyzes cellular data to determine where a target is located, with whom he speaks, and potentially why.

“Merritt was in a position to access the cellular telephone tower northeast of the McStay family gravesite on February 6th, 2010, two days after the family disappeared,” an affidavit for his girlfriend’s call records reports Hemisphere finding (PDF). Merritt was arrested almost a year to the date after the McStay family’s remains were discovered, and is awaiting trial for the murders.

In 2013, Hemisphere was revealed by The New York Times and described only within a Powerpoint presentation made by the Drug Enforcement Administration. The Times described it as a “partnership” between AT&T and the U.S. government; the Justice Department said it was an essential, and prudently deployed, counter-narcotics tool.

However, AT&T’s own documentation—reported here by The Daily Beast for the first time—shows Hemisphere was used far beyond the war on drugs to include everything from investigations of homicide to Medicaid fraud.

Hemisphere isn’t a “partnership” but rather a product AT&T developed, marketed, and sold at a cost of millions of dollars per year to taxpayers. No warrant is required to make use of the company’s massive trove of data, according to AT&T documents, only a promise from law enforcement to not disclose Hemisphere if an investigation using it becomes public.

http://www.thedailybeast.com/articles/2016/10/25/at-t-is-spying-on-americans-for-profit.html

WIKILEAKS RELEASE: The Podesta Emails Part 18

Wife of Imprisoned CIA Whistleblower Jeffrey Sterling Speaks Out

Monday, October 24, 2016

WIKILEAKS: At Least 65 MSM Reporters Were Meeting with and/or Coordinating Offline with Top Hillary Advisors

U.S. courts: Electronic surveillance up 500 percent in D.C.-area since 2011, almost all sealed cases

Secret law enforcement requests to conduct electronic surveillance in domestic criminal cases have surged in federal courts for Northern Virginia and the District, but only one in a thousand of the applications ever becomes public, newly released data show.

The bare-bones release by the courts leaves unanswered how long, in what ways and for what crimes federal investigators tracked individuals’ data and whether long-running investigations result in charges.

Yet the listings of how often law enforcement applied to judges to conduct covert electronic surveillance — a list that itself is usually sealed — underscore the exponential growth in the use of a 1986 law to collect data about users’ telephone, email and other Internet communications.

Unsealing basic docket information “is an important first step for courts to recognize that they have been enabling a kind of vast, secret system of surveillance that we now know to be so pervasive,” said Brett Max Kaufman, a staff attorney at the American Civil Liberties Union’s Center for Democracy.

https://www.washingtonpost.com/local/public-safety/us-courts-electronic-surveillance-up-500-percent-in-dc-area-since-2011-almost-all-sealed-cases/2016/10/22/48693ffa-8f10-11e6-9c52-0b10449e33c4_story.html

Rigging the Election – Video III: Creamer Confirms Hillary Clinton Was PERSONALLY Involved

WIKILEAKS RELEASE: The Podesta Emails Part 17

Sunday, October 23, 2016

No Agenda: Sunday (10-23-16) Episode 871 - New World Hackers

WIKILEAKS RELEASE: The Podesta Emails Part 16

The Little-Known Company That Enables Worldwide Mass Surveillance

It was a powerful piece of technology created for an important customer. The Medusa system, named after the mythical Greek monster with snakes instead of hair, had one main purpose: to vacuum up vast quantities of internet data at an astonishing speed.

The technology was designed by Endace, a little-known New Zealand company. And the important customer was the British electronic eavesdropping agency, Government Communications Headquarters, or GCHQ.

Dozens of internal documents and emails from Endace, obtained by The Intercept and reported in cooperation with Television New Zealand, reveal the firm’s key role helping governments across the world harvest vast amounts of information on people’s private emails, online chats, social media conversations, and internet browsing histories.

The leaked files, which were provided by a source through SecureDrop, show that Endace listed a Moroccan security agency implicated in torture as one of its customers. They also indicate that the company sold its surveillance gear to more than half a dozen other government agencies, including in the United States, Israel, Denmark, Australia, Canada, Spain, and India.

Some of Endace’s largest sales in recent years, however, were to the United Kingdom’s GCHQ, which purchased a variety of “data acquisition” systems and “probes” that it used to covertly monitor internet traffic.

Documents from the National Security Agency whistleblower Edward Snowden, previously disclosed by The Intercept, have shown how GCHQ dramatically expanded its online surveillance between 2009 and 2012. The newly obtained Endace documents add to those revelations, shining light for the first time on the vital role played by the private sector in enabling the spying.

Stuart Wilson, Endace’s CEO, declined to answer questions for this story. Wilson said in a statement that Endace’s technology “generates significant export revenue for New Zealand and builds important technical capability for our country.” He added: “Our commercial technology is used by customers worldwide … who rely on network recording to protect their critical infrastructure and data from cybercriminals, terrorists, and state-sponsored cybersecurity threats.”

https://theintercept.com/2016/10/23/endace-mass-surveillance-gchq-governments/

Inside the Cyberattack That Shocked the U.S. Government

The Office of Personnel Management repels 10 million attempted digital intrusions per month—mostly the kinds of port scans and phishing attacks that plague every large-scale Internet presence—so it wasn’t too abnormal to discover that something had gotten lucky and slipped through the agency’s defenses. In March 2014, for example, OPM had detected a breach in which blueprints for its network’s architecture were siphoned away. But in this case, the engineers noticed two unusually frightening details. First, opmsecurity.org had been registered on April 25, 2014, which meant the malware had probably been on OPM’s network for almost a year. Even worse, the domain’s owner was listed as “Steve Rogers”—the scrawny patriot who, according to Marvel Comics lore, used a vial of Super-Soldier Serum to transform himself into Captain America, a member of the Avengers.

Registering sites in Avengers-themed names is a trademark of a shadowy hacker group believed to have orchestrated some of the most devastating attacks in recent memory.

https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/

WIKILEAKS RELEASE: The Podesta Emails Part 15

Friday, October 21, 2016

Nassau County Executive Is Arrested in Bribery Scheme

The Nassau County executive, Edward P. Mangano, his wife and a local town supervisor were arrested and charged on Thursday with trading government contracts and official favors for free vacations, a no-show job as a food taster and other bribes — the latest in a series of corruption scandals to embarrass New York.

The arrests capped months of looming trouble for Mr. Mangano, a powerful figure in Republican politics on Long Island and the top elected official in Nassau County. He has been dogged by reports — many published in Newsday — that he had received free gifts and vacations from a longtime friend, Harendra Singh, a Long Island restaurateur with about 30 businesses in the area and several government contracts.

Mr. Mangano’s arrest was another blow to the Republican machine in Nassau County, already weakened by the conviction last year of the former State Senate majority leader, Dean G. Skelos, on corruption charges.

www.nytimes.com/2016/10/21/nyregion/edward-mangano-nassau-county-executive-arrest-bribery-scheme.html

This Is Why Half the Internet Shut Down Today

Twitter, Spotify and Reddit, and a huge swath of other websites were down or screwed up this morning. This was happening as hackers unleashed a large distributed denial of service (DDoS) attack on the servers of Dyn, a major DNS host. It’s probably safe to assume that the two situations are related.

In order to understand how one DDoS attack could take out so many websites, you have to understand how Domain Name Servers (DNS) work. Basically, they act as the Internet’s phone book and facilitate your request to go to a certain webpage and make sure you are taken to the right place. If the DNS provider that handles requests for Twitter is down, well, good luck getting to Twitter. Some websites are coming back for some users, but it doesn’t look like the problem is fully resolved.

gizmodo.com/this-is-probably-why-half-the-internet-shut-down-today-1788062835

Anonymous’ Most Notorious Hacker Is Back, and He’s Gone Legit

For the past year, Hector “Sabu” Monsegur has quietly been working as the lead penetration tester for the small Seattle security firm Rhino Security Labs, managing a six-person team that breaks into clients’ networks to demonstrate vulnerabilities and help the firms patch them. The job marks his turn to full-time cybersecurity work after a much higher profile career as the brash de facto leader of a hacktivist team breaching targets almost daily—including Sony, PBS, and Newscorp, as well as security firms like HBGary and Mantech. When he was caught, he followed that rampage with a stint as an FBI informant, helping the agency to prevent some of the same kinds of cyberattacks he’d helped orchestrate, and then spent seven months in prison after taking a plea deal. Now his new white-hat hacking position is putting to the test whether companies will allow one of the world’s most notorious hackers, reformed or not, to attack their networks—and whether the cybersecurity industry will accept as one of its own someone who not so long ago was eviscerating security firms like the one that now employs him.

https://www.wired.com/2016/10/anonymous-notorious-hacker-back-hes-gone-legit/

The U.S. Government Wants to Read Travelers’ Tweets Before Letting Them In

Soon, foreign visitors to the United States will be expected to tell U.S. authorities about their social media accounts.

U.S. Customs and Border Protection wants to start collecting “information associated with your online presence” from travelers from countries eligible for a visa waiver, including much of Europe and a handful of other countries. Earlier this summer, the agency proposed including a field on certain customs forms for “provider/platform” and “social media identifier,” making headlines in the international press. If approved by the Office of Management and Budget, the change could take effect as soon as December.

Privacy groups in recent weeks have pushed back against the idea, saying it could chill online expression and gives DHS and CBP overbroad authority to determine what kind of online activity constitutes a “risk to the United States” or “nefarious activity.”

https://theintercept.com/2016/10/21/the-u-s-government-wants-to-read-travelers-tweets-before-letting-them-in/

WIKILEAKS RELEASE: The Podesta Emails Part 14

No Agenda: Thursday (10-20-16) Episode 870 - Yeezy Squeezy

Thursday, October 20, 2016

Feds seized 50TB of data from NSA contractor suspected of theft

In a new Thursday court filing, federal prosecutors expanded their accusations against a former National Security Agency contractor. Federal investigators seized at least 50 terabytes of data from Harold Thomas Martin III, at least some of which was "national defense information." If all of this data was indeed classified, it would be the largest such heist from the NSA, far larger than what former contractor Edward Snowden took.

Prosecutors also said that Martin should remain locked up and noted that he will soon be charged with violations of the Espionage Act. That law, which dates back nearly a century, is the same law that was used to charge Chelsea Manning and Snowden, among others. If convicted, violators can face the death penalty.

United States Attorney Rod Rosenstein and two other prosecutors laid out new details in the case against Martin, whose arrest only became public earlier this month. Martin had been a contractor with Booz Allen Hamilton and possessed a top-secret clearance.

http://arstechnica.com/tech-policy/2016/10/feds-nsa-contractor-stole-at-least-50tb-worth-of-highly-classified-data/

NSA Can Access More Phone Data Than Ever

One of the reforms designed to rein in the surveillance authorities of the National Security Agency has perhaps inadvertently solved a technical problem for the spy outfit and granted it potential access to much more data than before, a former top official told ABC News.

Before the signing of the USA Freedom Act in June 2015, one of the NSA's most controversial programs was the mass collection of telephonic metadata from millions of Americans — the information about calls, including the telephone numbers involved, the time and the duration but not the calls' content — under a broad interpretation of the Patriot Act's Section 215. From this large "haystack," as officials have called it, NSA analysts could get approval to run queries on specific numbers purportedly linked to international terrorism investigations.

http://abcnews.go.com/US/nsa-potentially-access-phone-data/story?id=42892417

WIKILEAKS RELEASE: The Podesta Emails Part 13



Unfilter 209 - Race To The Bottom (10-19-16)

Lawsuit Seeks to Halt New York Subsidies for Upstate Nuclear Plants

A collection of energy companies and trade associations have filed a lawsuit seeking to reverse a decision by the administration of Gov. Andrew M. Cuomo to subsidize several struggling upstate nuclear plants, arguing that the state overstepped federal authority to regulate energy prices.

The suit, filed Wednesday in Federal District Court in Manhattan, comes a little more than two months after Mr. Cuomo announced a deal to provide hundreds of millions of dollars per year in subsidies to buttress the bottom lines of four upstate plants. The subsidies were included in an order from the Public Service Commission, whose chairwoman, Audrey Zibelman, is named as the lead defendant.

The suit argues that such action oversteps the federal government’s policy of allowing market forces to set wholesale energy prices, and effectively makes New York residents pay billions through higher electrical rates to prop up the plants, several of which would have failed without the governor’s plan, the suit claims.

“Unless enjoined or eliminated, these credits will result in New York’s captive ratepayers paying the owners an estimated $7.6 billion over 12 years,” the suit reads.

http://www.nytimes.com/2016/10/20/nyregion/lawsuit-seeks-to-halt-new-york-subsidies-for-upstate-nuclear-plants.html

ACLU Wants 23 Secret Surveillance Laws Made Public

The ACLU has identified 23 legal opinions that contain new or significant interpretations of surveillance law — affecting the government’s use of malware, its attempts to compel technology companies to circumvent encryption, and the CIA’s bulk collection of financial records under the Patriot Act — all of which remain secret to this day, despite an ostensible push for greater transparency following Edward Snowden’s disclosures.

The opinions were written by the Foreign Intelligence Surveillance Court. On Wednesday, the ACLU and the Yale Law School Media Freedom Clinic filed a motion with the court requesting that those opinions be released.

“The people of this country can’t hold the government accountable for its surveillance activities unless they know what our laws allow,” said Patrick Toomey, a staff attorney with the ACLU’s National Security Project. “These secret court opinions define the limits of the government’s spying powers. Their disclosure is essential for meaningful public oversight in our democracy.”

Some of the opinions identified by the ACLU offer interpretations of Section 702 of the Foreign Intelligence Surveillance Act, a controversial provision that allows the government to conduct mass surveillance on American’s transnational communications. The authority is set to expire in December 2017.

https://theintercept.com/2016/10/19/aclu-wants-secret-surveillance-laws-made-public/

CIA-backed surveillance software was marketed to public schools

An online surveillance tool that enabled hundreds of U.S. law enforcement agencies to track and collect information on social media users was also marketed for use in American public schools, the Daily Dot has learned.

Geofeedia sold surveillance software typically bought by police to a high school in a northern Chicago suburb, less than 50 miles from where the company was founded in 2011. An Illinois school official confirmed the purchase of the software by phone on Monday.

In the fall of 2014, the Lincolnshire-Prairie School District paid Geofeedia $10,000 to monitor the social media posts of children at Adlai E. Stevenson High School.

“We did have for one year a contract with Geofeedia,” said Jim Conrey, a spokesperson for Lincolnshire-Prairie School District. “We were mostly interested in the possibility of trying to prevent any kind of harm, either that students would do to themselves or to other students.”

Conrey said the district simply wanted to keep its students safe. “It was really just about student safety; if we could try to head off any potential dangerous situations, we thought it might be worth it,” he said.

Ultimately, the school found little use for the platform, which was operated by police liaison stationed on school grounds, and chose not to renew its subscription after the first year, citing cost and a lack of actionable information. “A lot of kids that were posting stuff that we most wanted, they weren’t doing the geo-tagging or making it public,” Conrey said. “We weren’t really seeing a lot there.”

http://www.dailydot.com/layer8/geofeedia-surveillance-software-high-school-chicago-social-media-monitoring/

DHS is using firefighters to spy on Americans in their own homes

DHS is using firefighters to spy on Americans in their own homes.

DHS is using the U.S. Census to ask Americans, questions about smoke detectors, so they can to give homes 'fire risk assessments'. The above video (approx. 2:30) shows how the New Orleans fire department "took it up a notch" and "went door to door, boots on the ground" entering resident's homes to install smoke detectors in people's bedrooms, kitchens etc.

According to the "City of Orleans, Analytics-Informed Smoke Alarm Outreach Program," the New Orleans Fire Department (NOFD) has been going door-to-door giving homes free 'fire risk assessments' since 2015.

The NOFD is launching a door-to-door smoke alarm outreach campaign that leverages analytics to prioritize those neighborhoods that are least likely to have smoke alarms and most likely to experience fire fatalities. With this analysis, NOFD will conduct a targeted, risk-informed door-to-door smoke alarm outreach program.

Two companies sponsored by the Department of Housing and Urban Development called the American Housing Survey and Enigma io are behind this program. Interestingly, 'Enigma io' is run by American Express, the New York Times and New Enterprise Associates a global venture capital firm.

Imagine letting a DHS agent into your home without a warrant?

That's exactly what's happening, as firefighters nationwide enter people's homes under the guise of fire safety. Click here, here & here to find out how firefighters work for DHS. Last year, I warned everyone that firefighters are being armed and trained for urban warfare. Click here, here & here to find out more.

http://massprivatei.blogspot.com/2016/10/dhs-uses-firefighters-to-enter-homes.html

DONALD TRUMP vs HILLARY CLINTON FINAL 2016 PRESIDENTIAL DEBATE IN LAS VEGAS (FULL DEBATE)

Wednesday, October 19, 2016

NYPD Eyes Massive Network of Surveillance Cameras. The City Yawns.

It looks like New York City can only handle one debate about policing tactics at a time. How else would one explain the silence that greeted NYPD Commissioner James O’Neill’s call last week for “all public and commercial entities to install camera systems the NYPD can access, enabling us to more quickly view valuable footage and close more investigations?”

There was a time when the idea that one’s every move outside one’s home might be recorded seemed a little creepy.

http://citylimits.org/2016/10/18/city-eyes-massive-network-of-surveillance-cameras-yawn/

WIKILEAKS RELEASE: The Podesta Emails Part 12

Tuesday, October 18, 2016

With NSA contractor Martin arrested, other leakers may still be at large

Earlier this month we learned the name of a second person who stole top secret documents from the US National Security Agency (NSA). After Edward Snowden admitted doing so publicly in June 2013, the FBI has now arrested the 51-year old Harold T. Martin III at his home in Maryland.

Martin hoarded lots of classified documents, not only from NSA but also from a number of other military and intelligence agencies. The FBI is still comparing them with those from the recent Shadow Brokers leak and a range of other NSA leaks from the past few years, but given what's known now, it seems likely that at least one other leaker is still at large.

The New York Times reported that when the FBI raided Martin's house on August 27, they found paper documents and many terabytes of highly classified information, even going back the 1990s. At least six documents were from 2014. It was reported that Martin first took the classified documents on paper, later on CDs and more recently on thumb drives.

The reason why Harold Martin brought home and stored such large numbers of top secret documents isn't yet clarified. One suggestion is that he may have used them for research for his dissertation about "new methods for remote analysis of heterogeneous & cloud computing architectures", which he was working on at the University of Maryland.

http://electrospaces.blogspot.com/2016/10/with-nsa-contractor-martin-arrested.html

How Chicago Police Convinced Courts to Let Them Track Cellphones Without a Warrant

The Chicago Police Department has acquired and used several varieties of advanced cellphone trackers since at least 2005 to target suspects in robberies, murders, kidnappings, and drug investigations. In most instances, officers only lightly described the devices’ advanced technical surveillance capabilities to courts, which allowed the police to use them, often without a warrant.

Now, after a lengthy legal battle waged by Freddy Martinez, a Chicago software technician, court orders and case notes were released, painting a more detailed picture of how the second-largest police precinct in the U.S. uses surveillance technology to track cellphones.

Martinez, who leads the Lucy Parson Labs, a Chicago-based nonprofit that advocates digital rights and transparency, originally sued for records in September 2014. He provided the released documents to The Intercept.

The Chicago Police Department did not respond to request for comment.

Cell-site simulators, or IMSI catchers, are typically suitcase-sized devices that emit signals over the wireless spectrum, masquerading as legitimate cellphone towers. When a nearby phone attempts to connect to a tower either to make a call or to check for service, it will instead link-up to the rogue device, beaming back information about its location, its owner, and sometimes the contents of communications.

While tracking one cellphone, the device also often sweeps up information about all the other phones in the area and can disrupt cell service. It’s unclear exactly how long the disruption lasts, or how far the range of each device extends. Activists are currently challenging the Federal Communications Commission to step in and regulate how law enforcement uses IMSI catchers, because they interrupt wireless service without authorization — posing a danger to emergency communications.

https://theintercept.com/2016/10/18/how-chicago-police-convinced-courts-to-let-them-track-cellphones-without-a-warrant/

The Perpetual Line-up... Unregulated Police Face Recognition in America

There is a knock on your door. It’s the police. There was a robbery in your neighborhood. They have a suspect in custody and an eyewitness. But they need your help: Will you come down to the station to stand in the line-up?

Most people would probably answer “no.” This summer, the Government Accountability Office revealed that close to 64 million Americans do not have a say in the matter: 16 states let the FBI use face recognition technology to compare the faces of suspected criminals to their driver’s license and ID photos, creating a virtual line-up of their state residents. In this line-up, it’s not a human that points to the suspect—it’s an algorithm.

But the FBI is only part of the story. Across the country, state and local police departments are building their own face recognition systems, many of them more advanced than the FBI’s. We know very little about these systems. We don’t know how they impact privacy and civil liberties. We don’t know how they address accuracy problems. And we don’t know how any of these systems—local, state, or federal—affect racial and ethnic minorities.

https://www.perpetuallineup.org/

Study: 1 in 2 American Adults Already In Facial Recognition Network

Half of all American adults are already in some sort of facial recognition network accessible to law enforcement, according to a comprehensive new study.

Conducted over a year and relying in part on Freedom of Information and public record requests to 106 law enforcement agencies, the study, conducted by Georgetown Law’s Center on Privacy and Technology, found American police use of facial recognition technology is a scattered, hodgepodge network of laws and regulations.

“Looking at the sum total of what we found, there have been no laws that comprehensively regulate face recognition technology, and there’s really no case law either,” Clare Garvie, an associate at the CPT, told Vocativ. “So we find ourselves having to rely on the agencies that are using that technology to rein it in. But what we found is that not every system — by a long shot — has a use policy.”

That so many American adults are in at least one facial recognition database is largely due to the fact that at least 26 states, and likely more, share their Department of Motor Vehicles databases with the FBI, state police, or other law enforcement agencies, the study found. Compounded with that, police often have access to mugshot databases. Garvie’s study found that most law enforcement agencies don’t purge such records, even if the arrested suspect is found not guilty, unless a court orders it. The sole known exception is the Michigan State Police, which does expunge photos after a set amount of time.

http://www.vocativ.com/368572/facial-recognition-databases/

Rigging the Election - Video II: Mass Voter Fraud

In the second video of James O'Keefe's new explosive series on the DNC and Hillary Clinton campaign, Democratic party operatives tell us how to successfully commit voter fraud on a massive scale. Scott Foval, who has since been fired, admits that the Democrats have been rigging elections for fifty years.

WIKILEAKS RELEASE: The Podesta Emails Part 11

U.K.’s Mass Surveillance Databases Were Unlawful for 17 Years, Court Rules

For nearly two decades, British spies unlawfully maintained vast troves of people’s private data without adequate safeguards against misuse, a tribunal of senior judges has ruled.

Between 1998 and 2005, electronic surveillance agency Government Communications Headquarters and domestic spy agency MI5 began secretly harvesting “bulk personal datasets” containing millions of records about people’s phone calls, travel habits, internet activity, and financial transactions.

On Monday, the Investigatory Powers Tribunal, a special court that handles complaints related to British spy agencies, found that access to the datasets had not been subject to sufficient supervision through a 17-year period between 1998 and November 2015. The tribunal said that due to “failings in the system of oversight” the surveillance regime had violated Article 8 of the European Convention on Human Rights, which protects the right to privacy.

https://theintercept.com/2016/10/17/gchq-mi5-investigatory-powers-tribunal-bulk-datasets/

How Israel Became a Hub for Surveillance Technology

When drafted into the army, Israel’s smartest youth are steered toward the intelligence unit and taught how to spy, hack, and create offensive cyberweapons. Unit 8200 and the National Security Agency reportedly developed the cyberweapon that attacked Iranian computers running the country’s nuclear program, and Unit 8200 engages in mass surveillance in the occupied Palestinian territories, according to veterans of the military intelligence branch.

Increasingly, the skills developed by spying and waging cyberwarfare don’t stay in the military. Unit 8200 is a feeder school to the private surveillance industry in Israel, the self-proclaimed “startup nation” — and the products those intelligence veterans create are sold to governments around the world to spy on people. While the companies that Unit 8200 veterans run say their technologies are essential to keeping people safe, privacy advocates warn their products undermine civil liberties.

In August, Privacy International, a watchdog group that investigates government surveillance, released a report on the global surveillance industry. The group identified 27 Israeli surveillance companies — the highest number per capita of any country in the world. (The United States leads the world in sheer number of surveillance companies: 122.) Unit 8200 veterans either founded or occupy high-level positions in at least eight of the Israeli surveillance companies named by Privacy International, according to publicly available information. And that list doesn’t include companies like Narus, which was founded by Israeli veterans of Unit 8200 but is now owned by Boeing, the American defense contractor. (Privacy International categorized Narus as an American company because it’s headquartered in California.) Narus technology helped AT&T collect internet traffic and billions of emails and forward that information to the National Security Agency, according to reporting in Wired magazine and documents from the Snowden archive.

https://theintercept.com/2016/10/17/how-israel-became-a-hub-for-surveillance-technology/

Bringing Closure to the 9/11 Pentagon Debate

or over fifteen years the 9/11 truth movement and some of its most visible leaders have debated this question: Did a large plane, matching a Boeing 757 in general and Flight AA 77 in particular, hit the Pentagon on September 11, 2001? In the last several years a group of scientists and engineers have presented a number of scientific papers that answer both of these questions with a resounding “Yes.” A number of these scientists and engineers are affiliated with the organization Scientists for 9/11 Truth, which also fully supports the hypothesis that the impacts and resulting fires from the Boeing 767s crashing into the World Trade Center’s Twin Towers (WTC1 and WTC2) on 9/11 could not account for the destruction of these buildings. Building 7 (WTC7) was destroyed without being impacted by any plane. The evidence is clear that all three of these buildings were destroyed by some form of controlled demolition. While the 9/11 truth movement generally agrees on what happened in New York City, thus far there has been no closure on the Pentagon debate.

As an organization, Scientists for 9/11 Truth has stood virtually alone in maintaining large plane impact at the Pentagon together with controlled demolition of the buildings in New York City. With the publication of three new works, cited below, there are now indications that the 9/11 truth movement may be ready to adopt this position also.

http://www.foreignpolicyjournal.com/2016/10/07/bringing-closure-to-the-911-pentagon-debate/

Monday, October 17, 2016

New O'Keefe Video: Clinton Campaign, DNC Coordinated With Organizations To Incite Violence At Trump Events

A new video investigation released Monday by James O’Keefe’s Project Veritas Action shows how Democratic-aligned organizations used a tactic called 'bird-dogging' to incite violence and chaos at Trump rallies for media consumption. A key Clinton operative is captured on camera saying, "It doesn’t matter what the friggin’ legal and ethics people say, we need to win this motherfucker."

http://www.realclearpolitics.com/video/2016/10/17/new_okeefe_video_clinton_campaign_dnc_coordinated_with_organizations_to_beat_up_trump_supporters.html

WIKILEAKS RELEASE: The Podesta Emails Part 10

New FBI release on Clinton email probe refers to 'Shadow Government'

A new trove of interview summaries and notes from the FBI's investigation into Hillary Clinton's emails lays out a series of allegations that could prove fodder for future attacks on the Democratic presidential nominee.

The 100 pages, released Monday morning, include claims that Clinton "blatantly" disregarded protocol. Other claims include that a group of powerful State Department employees attempted to coordinate a document release, and that a department official asked for a "quid pro quo" related to the former secretary of state's emails.

One revelation in the documents came from an interview with an unidentified person who suggested that Freedom of Information Act requests related to Clinton went through a group sometimes called "the Shadow Government."

"There was a powerful group of very high-ranking STATE officials that some referred to as 'The 7th Floor Group' or 'The Shadow Government.' This group met every Wednesday afternoon to discuss the FOIA process, Congressional records, and everything CLINTON-related to FOIA/Congressional inquiries," the FBI's interview summary said.

That group, according to the summary, argued for a Clinton document release to be conducted all at once "for coordination purposes" instead of on a rolling basis as would normally be the case. But the "Shadow Government" did not get its way, and the agency in charge decided for a rolling release, the FBI summary said.

http://www.cnbc.com/2016/10/17/fbi-releases-100-new-pages-on-clinton-email-probe.html

Ex-Joint Chiefs vice chairman charged with lying in Stuxnet leak investigation

Retired Marine Gen. James Cartwright, the former Joint Chiefs vice chairman, has been charged with making false statements in an investigation into the leaking of classified information about Iran's nuclear program.

Cartwright, who also led the U.S. Strategic Command and was known to have a close relationship with President Barack Obama, was the subject of a federal investigation into the leaking of details of a reported joint U.S.-Israeli cyberattack targeting Iran's nuclear program.

The charge involves testimony he gave investigators about information obtained by New York Times reporter David Sanger, as well as another journalist, Daniel Klaidman.

http://www.politico.com/story/2016/10/retired-general-charged-in-probe-of-classified-information-disclosure-229891

Wikileaks: Julian Assange's internet access 'cut'

Wikileaks says an unidentified "state actor" has shut down internet access for its founder Julian Assange.

The transparency activist has been claiming asylum at London's Ecuadorean embassy since 2012 to avoid extradition over sex assault allegations.

There was no way to immediately verify if he had been knocked offline, and if so, how a state actor was suspected.

Wikileaks has recently been releasing emails from Hillary Clinton's presidential campaign.

The anti-secrecy organisation did not return calls and emails on Monday, though it said in a tweet: "We have activated the appropriate contingency plans."

A woman who picked up the phone at the Ecuadorean embassy said: "I cannot disclose any information."

http://www.bbc.com/news/technology-37680411

Obama administration asks CIA to prepare revenge cyber attack against Russia

The White House is considering launching an unprecedented cyber attack against Russia in retaliation for their alleged interference in the US election, intelligence officials say.

Current and former officials have said that the CIA has been asked to deliver options for “clandestine” cyber operations designed to “embarrass” the Russian government.

The anonymous officials told NBC News the CIA were already operating cyber doors, selecting targets and making other preparations for an operation.

The source said they had already gathered information that could potentially expose wrongdoing by Russian President Vladimir Putin.

It follows repeated alleged attempts by Russian state-backed hacking groups which have resulted in the leak of thousands of emails sent by senior members of the Democratic party.

A hacker known as Guccifer 2.0 released thousands of emails sent between senior members of the Democratic National Committee (DNC) days before their conference in July where they discussed ways to undermine the candidacy of Senator Bernie Sanders. It led to the resignation of the DNC chair Debbie Wasserman Schultz.

http://www.independent.co.uk/news/world/politics/obama-us-government-cia-cyber-attack-against-russia-retaliation-hacking-fancy-bears-a7363321.html

Feds Walk Into A Building. Demand Everyone's Fingerprints To Open Phones

FORBES found a court filing, dated May 9 2016, in which the Department of Justice sought to search a Lancaster, California, property. But there was a more remarkable aspect of the search, as pointed out in the memorandum: “authorization to depress the fingerprints and thumbprints of every person who is located at the SUBJECT PREMISES during the execution of the search and who is reasonably believed by law enforcement to be the user of a fingerprint sensor-enabled device that is located at the SUBJECT PREMISES and falls within the scope of the warrant.” The warrant was not available to the public, nor were other documents related to the case.

According to the memorandum, signed off by U.S. attorney for the Central District of California Eileen Decker, the government asked for even more than just fingerprints: “While the government does not know ahead of time the identity of every digital device or fingerprint (or indeed, every other piece of evidence) that it will find in the search, it has demonstrated probable cause that evidence may exist at the search location, and needs the ability to gain access to those devices and maintain that access to search them. For that reason, the warrant authorizes the seizure of ‘passwords, encryption keys, and other access devices that may be necessary to access the device,’” the document read.

Legal experts were shocked at the government’s request. “They want the ability to get a warrant on the assumption that they will learn more after they have a warrant,” said Marina Medvin of Medvin Law. “Essentially, they are seeking to have the ability to convince people to comply by providing their fingerprints to law enforcement under the color of law – because of the fact that they already have a warrant. They want to leverage this warrant to induce compliance by people they decide are suspects later on. This would be an unbelievably audacious abuse of power if it were permitted.”

http://www.forbes.com/sites/thomasbrewster/2016/10/16/doj-demands-mass-fingerprint-seizure-to-open-iphones/#76ce2c4c8d9d

How Mike Flynn Became America’s Angriest General

On August 7, 2014, clusters of well-dressed men and women filed into the gleaming metal and glass superstructure of the Defense Intelligence Agency at Joint Base Anacostia-Bolling, just across the river from Reagan National Airport, for the retirement ceremony of Lieutenant General Michael T. Flynn, the agency's director. Among those present to honor Flynn were James Clapper, the nation’s top intelligence officer—who was a master of ceremonies for the event—and Michael Vickers, the undersecretary of defense for intelligence.

It wasn’t an easy moment. Together, Clapper and Vickers had forced Flynn out as the head of DIA.

The Defense Intelligence Agency is the Pentagon’s version of the CIA, a vast intelligence organization focused on providing senior officials in the Office of the Secretary of Defense, and senior uniformed leaders, with the intelligence necessary to develop strategy and make scores of difficult decisions each day. During the ceremony, Flynn would be extolled by Admiral Mike Rogers, the director of the National Security Agency, as “the best intelligence officer of the past 20 years.” But given the nature of the intelligence business that united them, many of the attendees also knew that Flynn’s retirement at age 56 was premature. A well-known maverick, Flynn had been asked to “shake things up” at the 17,000-person agency. He brought a more wartime mind-set and ethos to a sleepy Washington bureaucracy, until the bureaucracy pushed back and Flynn’s gung-ho style was deemed too “disruptive” for an administration determined to put the unpleasant memories of Iraq and Afghanistan in the rearview mirror.

Taking the podium, Flynn, dark-haired with an aquiline face and a surfer’s wiry build, waved to his many family members in the crowd. He acknowledged the many senior officials in attendance, including his nemeses, Clapper and Vickers. He also made special note of retired General Stanley McChrystal, with whom Flynn had transformed the U.S. Joint Special Operations Command (JSOC) into history’s most lethal terrorist hunting network. “If there is any one individual in this country who changed the way America fights its wars, it was Stan,” Flynn told the capacity crowd. Of course, everyone there knew that McChrystal, too, had been ousted from his job, after an article in Rolling Stone titled “Runaway General” quoted unnamed members of his staff making disrespectful comments about the White House. Inside military and intelligence circles it was understood that McChrystal, along with another ousted former general, David Petraeus, were the preeminent generals and wartime field commanders of their generation of officers, and the manner of their dismissal struck many as insulting. As did the treatment of Lt. Gen. Mike Flynn.

http://www.politico.com/magazine/story/2016/10/how-mike-flynn-became-americas-angriest-general-214362

In Somalia, U.S. Escalates a Shadow War

The Obama administration has intensified a clandestine war in Somalia over the past year, using Special Operations troops, airstrikes, private contractors and African allies in an escalating campaign against Islamist militants in the anarchic Horn of Africa nation.

Hundreds of American troops now rotate through makeshift bases in Somalia, the largest military presence since the United States pulled out of the country after the “Black Hawk Down” battle in 1993.

The Somalia campaign, as it is described by American and African officials and international monitors of the Somali conflict, is partly designed to avoid repeating that debacle, which led to the deaths of 18 American soldiers. But it carries enormous risks — including more American casualties, botched airstrikes that kill civilians and the potential for the United States to be drawn even more deeply into a troubled country that so far has stymied all efforts to fix it.

The Somalia campaign is a blueprint for warfare that President Obama has embraced and will pass along to his successor. It is a model the United States now employs across the Middle East and North Africa — from Syria to Libya — despite the president’s stated aversion to American “boots on the ground” in the world’s war zones. This year alone, the United States has carried out airstrikes in seven countries and conducted Special Operations missions in many more.

http://www.nytimes.com/2016/10/16/world/africa/obama-somalia-secret-war.html

Sunday, October 16, 2016

WIKILEAKS RELEASE: The Podesta Emails Part 9

No Agenda: Sunday (10-16-16) Episode 869 - Swamp of Crazy

Networks Trash Trump, Steer Clear of WikiLeaks

North Dakota Prosecutor Seeks "Riot" Charges Against Amy Goodman For Reporting On Pipeline Protest

A North Dakota state prosecutor has sought to charge award-winning journalist Amy Goodman with participating in a "riot" for filming an attack on Native American-led anti-pipeline protesters. The new charge comes after the prosecutor dropped criminal trespassing charges.

State’s Attorney Ladd R Erickson filed the new charges on Friday before District Judge John Grinsteiner who will decide on Monday (October 17) whether probable cause exists for the riot charge.

Goodman has traveled to North Dakota to face the charges and will appear at Morton County court on Monday at 1:30 pm local time (CDT) if the charges are approved.

“I came back to North Dakota to fight a trespass charge. They saw that they could never make that charge stick, so now they want to charge me with rioting, " said Goodman. "I wasn’t trespassing, I wasn’t engaging in a riot, I was doing my job as a journalist by covering a violent attack on Native American protesters."

http://www.democracynow.org/2016/10/15/breaking_nd_prosecutor_seeks_riot_charges

RELATED:



http://www.rollingstone.com/politics/taibbi-on-amy-goodman-arrest-for-covering-dakota-pipeline-story-w444754

https://www.thenation.com/article/amy-goodman-is-facing-prison-for-reporting-on-the-dakota-access-pipeline-that-should-scare-us-all/

Saturday, October 15, 2016

Leaked emails reveal Hillary Clinton’s life of deceit

Among the many telling kernels of truth dappling the spoor of the Hillary Clinton campaign’s internal e-mails released by WikiLeaks this past week, this one immediately leaped out:

“Politics is like sausage being made. It is unsavory, and it always has been that way, but we usually end up where we need to be. But if everybody’s watching . . . then people get a little nervous, to say the least. So, you need both a public and a private position.”

The sausage maker was Mrs. Clinton, giving one of her $225,000 speeches that she’s so long sought to conceal from the public, in this instance to the National Multi-Housing Council in April 2013. It came at a time when the just-retired secretary of state was coyly gearing up for a White House run, little tin cup at the ready, raking in nearly a million dollars that month alone.

When her ode to pragmatic two-facedness was called out by Donald Trump at last week’s debate, she lamely blamed it on Abe Lincoln, as portrayed in Steven Spielberg’s 2012 film. Never mind that a high-priced collection plate and the passage of the 13th Amendment have little in common. It’s all in a day’s work for a woman who claims to be for the Little Guy but spends most of her time frolicking with the political and financial elites.

http://nypost.com/2016/10/15/the-hillary-emails-reveal-a-life-full-of-deceit/


Inside the Secret Society of Wall Street's Top In-House Lawyers

It’s a Wall Street club that’s virtually unknown on Wall Street. It has no name or official membership list, and it meets only once a year, in locations such as Switzerland’s Lake Lucerne, Connecticut’s Litchfield County, and, this year, Versailles.

The attendees are top in-house lawyers for some of the world’s most powerful banks -- people who sit at the table for decisions that can shape multibillion-dollar litigation tabs for the likes of Barclays Plc, Citigroup Inc., Goldman Sachs Group Inc., Deutsche Bank AG and JPMorgan Chase & Co.

For this year’s meeting, in late May, the lawyers descended on Trianon Palace Versailles, a luxury hotel less than two kilometers from the palace of Louis XIV and adjacent to the royal park.

The gatherings, which were described by several people familiar with them who asked not to be identified, tend to feature discussions of nuts-and-bolts issues such as managing relationships with the board and whether compliance personnel should receive stock incentives.

This year, according to two of the people, some attendees arrived at the marble and gilded hotel primed to focus on a common scourge: class-action lawyers who seek billions of dollars from top banks for alleged market manipulations and related bad behavior. Eric Grossman, chief legal officer at Morgan Stanley, implored his confederates to hang together and resist the temptation to settle quickly.

http://www.bloomberg.com/news/articles/2016-10-14/what-top-bank-lawyers-were-doing-at-secret-versailles-summit

Here Are Hillary Clinton's Three Speeches To Goldman Sachs For Which She Was Paid $675,000

As has been widely reported, in 2013 Hillary Clinton was paid $675,000 for three speeches to Goldman Sachs. One was delivered on June 4, 2013 at the 2013 IBD CEO Annual Conference at The Inn at Palmetto Bluff in South Carolina, a second one took place on October 24, 2013 at the Goldman Sachs Asset Management AIMS Alternative Investment Symposium, and the last one was delivered on October 29, 2013 at the Goldman Sachs builders and innovators summit.

The speech transcripts, in their entirety, were revealed for the first time in an email from Tony Carrk, research director at Hillary for America, in an email dated January 23, 2016, and disclosed to the public for the first time ever during today's latest Wikileak of Podesta emails.

http://www.zerohedge.com/news/2016-10-15/here-are-hillary-clintons-three-speeches-goldman-sachs-which-she-was-paid-675000

06042013 GS 1 by zerohedge on Scribd



10242013 GS 2 by zerohedge on Scribd



10292013 GS 3 by zerohedge on Scribd

WIKILEAKS RELEASE: The Podesta Emails Part 8

5 Wikileaks Revelations That Should've Tanked Hillary's Campaign

Wikileaks has now dumped over 10,000 of Hillary campaign chairman John Podesta’s emails and the insane amount of corruption and lies coming out of her camp in this election continues to ooze out in big fat slimy piles by the day…

Here are five leaks that came out just this week about Hillary, any *one* of which in a sane world with fair elections (instead of rigged ones run by psycho elites) would have been enough to end her entire campaign for president by now.

http://www.thedailysheeple.com/5-wikileaks-revelations-that-shouldve-tanked-hillarys-campaign_102016

WIKILEAKS RELEASE: Hillary Clinton's Private Goldman Sach's Paid Speechs - full transcripts

Friday, October 14, 2016

Hillary Answers Judicial Watch Under Oath - "Does Not Recall" Most Of Her Tenure As Secretary Of State

Back in August, U.S. District Court Judge Emmet G. Sullivan granted Judicial Watch the right to ask 25 questions of Hillary Clinton about the creation of her private email server which she was required to answer under oath (we wrote about it here). This morning Hillary filed her response to those 25 questions which can be best summarized by the following stats:

Occurrences of the phrase "Does Not Recall": 20

Occurrences of the word "Object" or "Objection": 84

To summarize the 23-page response, Hillary "does not recall" the majority of her tenure as Secretary of State and "objects" to everything that she does recall.

Another phrase that occurs throughout the document, well at least in response to the questions that she actually decided to answer, implies that she was under the illusion that all of her emails subject to FOIA requests would be captured on the email systems of her staffers who actually decided to follow the law and use "state.gov accounts."

http://www.zerohedge.com/news/2016-10-14/hillary-answers-judicial-watch-under-oath-does-not-recall-most-her-tenure-secretary-

2016.10.14 - Hillary Questions by zerohedge on Scribd