Monday, October 31, 2016
Thiel's Palantir got its foot in the door to a lucrative military contract following a legal battle with the Army. https://t.co/cCuOb8Zw3l— The Intercept (@theintercept) October 31, 2016
Sunday, October 30, 2016
Metadata found on the laptop used by former Rep. Anthony Weiner and his estranged wife Huma Abedin, a close Clinton aide, suggests there may be thousands of emails sent to or from the private server that Mrs. Clinton used while she was secretary of state, according to people familiar with the matter. It will take weeks, at a minimum, to determine whether those messages are work-related from the time Ms. Abedin served with Mrs. Clinton at the State Department; how many are duplicates of emails already reviewed by the Federal Bureau of Investigation; and whether they include either classified information or important new evidence in the Clinton email probe.
The FBI has had to await a court order to begin reviewing the emails, because they were uncovered in an unrelated probe of Mr. Weiner.
The new investigative effort, disclosed by FBI Director James Comey on Friday, shows a bureau at times in sharp internal disagreement over matters related to the Clintons, and how to handle those matters fairly and carefully in the middle of a national election campaign. Even as the previous probe of Mrs. Clinton’s email use wound down in July, internal disagreements within the bureau and the Justice Department surrounding the Clintons’ family philanthropy heated up, according to people familiar with the matter.
Saturday, October 29, 2016
The Clintons are perhaps the most corrupt political family in American history. The Bushes may be second, but even they maintained a certain decorum in the White House. Neither Bush president would think of cussing out a secret service man or angrily hurl a White House antique at a spouse. The Clintons are at heart common grifters. They’re lying, vulgar confidence tricksters who continue to enjoy pushing the criminal envelope because they’re used to getting away with their crimes. Both should be in prison. Right now.
The United States is so committed to the notion that its electoral process is the world’s “gold standard” that there has been a bipartisan determination to maintain the fiction even when evidence is overwhelming that a U.S. presidential election has been manipulated or stolen. The “wise men” of the system simply insist otherwise.
We have seen this behavior when there are serious questions of vote tampering (as in Election 1960) or when a challenger apparently exploits a foreign crisis to create an advantage over the incumbent (as in Elections 1968 and 1980) or when the citizens’ judgment is overturned by judges (as in Election 2000).
Presidents Richard Nixon, George H.W. Bush and Ronald Reagan photographed together in the Oval Office in 1991. (Cropped from a White House photo that also included Presidents Gerald Ford and Jimmy Carter.)Presidents Richard Nixon, George H.W. Bush and Ronald Reagan photographed together in the Oval Office in 1991. (Cropped from a White House photo that also included Presidents Gerald Ford and Jimmy Carter.)
Strangely, in such cases, it is not only the party that benefited which refuses to accept the evidence of wrongdoing, but the losing party and the establishment news media as well. Protecting the perceived integrity of the U.S. democratic process is paramount. Americans must continue to believe in the integrity of the system even when that integrity has been violated.
The harsh truth is that pursuit of power often trumps the principle of an informed electorate choosing the nation’s leaders, but that truth simply cannot be recognized.
Friday, October 28, 2016
Judicial Watch Files Lawsuit for FBI Records on Clinton Email Investigation; Tarmac Meeting Between Bill Clinton and Loretta Lynch
The Judicial Watch FOIA lawsuit was filed after the Justice Department failed to comply with a July 7, 2016, FOIA request seeking the following:
All FD-302 forms prepared pursuant to the Federal Bureau of Investigation’s investigation of former Secretary of State Hillary Clinton’s use of a private e-mail server during her tenure.
All records of communications between any agent, employee, or representative of the Federal Bureau of Investigation regarding, concerning, or related to the aforementioned investigation. This request includes, but is not limited to, any related communications with any official, employee, or representative of the Department of Justice, the Executive Office of the President, the Democratic National Committee, and/or the presidential campaign of Hillary Clinton.
All records related to the meeting between Attorney General Lynch and former President Bill Clinton on June 27, 2016.
There is significant controversy about whether the FBI and Obama Justice Department investigation gave Clinton and other witnesses and potential targets preferential treatment.
Podesta, founder of the George Soros-funded Center for American Progress and a member of the elitist Trilateral Commission, went to work for Obama as a senior policy consultant on climate change. A liberal Catholic, he has been a professor at Georgetown Law School. One of the leaked emails shows Podesta saying that he applauds the work of Pope Francis on climate change and that “all my Jesuit friends say the Pope is the real deal.”
Podesta was picked by U.N. Secretary-General Ban Ki-moon to be a member of the “high-level panel” of “eminent persons” planning the future of the globe. This so-called “High Level Panel on the Post-2015 Development Agenda” released an 81-page report titled, “A New Global Partnership: Eradicate Poverty and Transform Economies through Sustainable Development.”
“In simplest terms,” explains Patrick Wood, author of Technocracy Rising: The Trojan Horse of Global Transformation, “Sustainable Development is a replacement economic system for capitalism and free enterprise. It is a system based on resource allocation and usage rather than on supply and demand and free economic market forces.”
The database, known as CREST (for CIA Records Search Tool), contains more than 11 million pages of historical Agency records that have already been declassified and approved for public release.
Currently, however, CREST can only be accessed through computer terminals at the National Archives in College Park, MD. This geographic restriction on availability has been a source of frustration and bafflement to researchers ever since the digital collection was established in 2000.
Thursday, October 27, 2016
The Bundy brothers and occupiers Jeff Banta and David Fry also were found not guilty of having guns in a federal facility. Kenneth Medenbach was found not guilty of stealing government property, and a hung jury was declared on Ryan Bundy's charge of theft of FBI surveillance cameras.
My own experience in 1995-96 is illustrative. Over a two-year period working with my wife, Robin (who was a CIA detailee to a Senate committee at the time), we discovered that, contrary to the public statements by then-Chairman of the Joint Chiefs Colin Powell and other senior George H. W. Bush administration officials (including CIA Director John Deutch), American troops had in fact been exposed to chemical agents during and after the 1991 war with Saddam Hussein. While the Senate Banking Committee under then-Chairman Don Riegle, D-Mich., was trying to uncover the truth of this, officials at the Pentagon and CIA were working to bury it.
In one 2011 memo written by Doug Band, a longtime aide to Bill Clinton, Band explains how he worked for years to raise $46 million for the Foundation through the Clinton Global Initiative, while also leveraging his relationships with corporate sponsors to secure lucrative speaking arrangements and consulting gigs for the former president. Band, who wrote the 12-page memo in response to an internal audit being conducted by lawyers for the Clinton Foundation, described the money-making endeavor as “Bill Clinton, Inc.”
In doing so, Band also detailed a circle of enrichment in which he raised money for the Clinton Foundation from top-tier corporations such as Dow Chemical and Coca-Cola that were clients of his firm, Teneo, while pressing many of those same donors to provide personal income to the former president.
The system has drawn scrutiny from Republicans, who say it allowed corporations and other wealthy supporters to pay for entree to a popular former president and a onetime secretary of state who is now the Democratic presidential nominee.
Band wrote the memo in 2011 to foundation lawyers conducting a review of the organization amid a brewing feud with the Clintons’ daughter, Chelsea Clinton, who was taking a stronger role in leading the foundation and had expressed concerns about Teneo’s operations.
Wednesday, October 26, 2016
Tuesday, October 25, 2016
Mr. Garner, 43, died in 2014 on a Staten Island street corner, where two police officers confronted him and accused him of selling untaxed cigarettes. One of the officers, Daniel Pantaleo, was seen on a video using a chokehold, prohibited by the New York Police Department, to subdue him. Mr. Garner’s last words, “I can’t breathe,” became a rallying cry for protesters around the country.
Federal authorities have been investigating whether officers violated Mr. Garner’s civil rights in his fatal encounter with the police. But the case had been slowed by a dispute because federal prosecutors and Federal Bureau of Investigation officials in New York opposed bringing charges, while prosecutors with the Civil Rights Division at the Justice Department in Washington argued there was clear evidence to do so.
Say hello to America’s shadow government.
A corporatized, militarized, entrenched bureaucracy that is fully operational and staffed by unelected officials who are, in essence, running the country, this shadow government represents the hidden face of a government that has no respect for the freedom of its citizenry.
No matter which candidate wins the presidential election, this shadow government is here to stay. Indeed, as recent documents by the FBI reveal, this shadow government—also referred to as “The 7th Floor Group”—may well have played a part in who will win the White House this year.
To be precise, however, the future president will actually inherit not one but two shadow governments.
The first shadow government, referred to as COG or Continuity of Government, is made up of unelected individuals who have been appointed to run the government in the event of a “catastrophe.” COG is a phantom menace waiting for the right circumstances—a terrorist attack, a natural disaster, an economic meltdown—to bring it out of the shadows, where it operates even now. When and if COG takes over, the police state will transition to martial law.
Yet it is the second shadow government—also referred to as the Deep State—that poses the greater threat to freedom right now. Comprised of unelected government bureaucrats, corporations, contractors, paper-pushers, and button-pushers who are actually calling the shots behind the scenes, this government within a government is the real reason “we the people” have no real control over our government.
The Deep State, which “operates according to its own compass heading regardless of who is formally in power,” makes a mockery of elections and the entire concept of a representative government.
So who or what is the Deep State?
It’s the militarized police, which have joined forces with state and federal law enforcement agencies in order to establish themselves as a standing army. It’s the fusion centers and spy agencies that have created a surveillance state and turned all of us into suspects. It’s the courthouses and prisons that have allowed corporate profits to take precedence over due process and justice. It’s the military empire with its private contractors and defense industry that is bankrupting the nation. It’s the private sector with its 854,000 contract personnel with top-secret clearances, “a number greater than that of top-secret-cleared civilian employees of the government.” It’s what former congressional staffer Mike Lofgren refers to as “a hybrid of national security and law enforcement agencies”: the Department of Defense, the State Department, Homeland Security, the CIA, the Justice Department, the Treasury, the Executive Office of the President via the National Security Council, the Foreign Intelligence Surveillance Court, a handful of vital federal trial courts, and members of the defense and intelligence committees.
It’s every facet of a government that is no longer friendly to freedom and is working overtime to trample the Constitution underfoot and render the citizenry powerless in the face of the government’s power grabs, corruption and abusive tactics.
These are the key players that drive the shadow government.
While the definition of “ground troops” is flexible, there is a second reality that very few people are talking about in Washington today.
Not unlike the wars in Afghanistan and Iraq—where private military contractors fed, trained, equipped, and protected U.S. military forces “on the ground” in unprecedented numbers—an escalation of hired security forces in a hot spot like Syria would likely boost the presence of U.S. “boots” without causing the political heartburn of putting more actual soldiers and Marines in harm’s way.
In fact, it may already be happening.
Over the summer, a no-bid contract was reportedly awarded to Six3 Intelligence Solutions, a company based in McLean, Va., which in 2014 was acquired by major defense-industry player CACI International. The $10 million award, according to an otherwise pedestrian Pentagon notice, was for “intelligence analysis services” to be performed “in Germany, Italy, and Syria.” It was probably the first sliver of proof that U.S. contractors are actually operating there, despite persistent evasions by military officials.
“Merritt was in a position to access the cellular telephone tower northeast of the McStay family gravesite on February 6th, 2010, two days after the family disappeared,” an affidavit for his girlfriend’s call records reports Hemisphere finding (PDF). Merritt was arrested almost a year to the date after the McStay family’s remains were discovered, and is awaiting trial for the murders.
In 2013, Hemisphere was revealed by The New York Times and described only within a Powerpoint presentation made by the Drug Enforcement Administration. The Times described it as a “partnership” between AT&T and the U.S. government; the Justice Department said it was an essential, and prudently deployed, counter-narcotics tool.
However, AT&T’s own documentation—reported here by The Daily Beast for the first time—shows Hemisphere was used far beyond the war on drugs to include everything from investigations of homicide to Medicaid fraud.
Hemisphere isn’t a “partnership” but rather a product AT&T developed, marketed, and sold at a cost of millions of dollars per year to taxpayers. No warrant is required to make use of the company’s massive trove of data, according to AT&T documents, only a promise from law enforcement to not disclose Hemisphere if an investigation using it becomes public.
Monday, October 24, 2016
WIKILEAKS: At Least 65 MSM Reporters Were Meeting with and/or Coordinating Offline with Top Hillary Advisors
WIKILEAKS: At Least 65 MSM Reporters Were Meeting with and/or Coordinating Offline with Top Hillary Advisors https://t.co/qzfKODPDX7— Conspiracy Scope (@ConspiracyScope) October 25, 2016
U.S. courts: Electronic surveillance up 500 percent in D.C.-area since 2011, almost all sealed cases
The bare-bones release by the courts leaves unanswered how long, in what ways and for what crimes federal investigators tracked individuals’ data and whether long-running investigations result in charges.
Yet the listings of how often law enforcement applied to judges to conduct covert electronic surveillance — a list that itself is usually sealed — underscore the exponential growth in the use of a 1986 law to collect data about users’ telephone, email and other Internet communications.
Unsealing basic docket information “is an important first step for courts to recognize that they have been enabling a kind of vast, secret system of surveillance that we now know to be so pervasive,” said Brett Max Kaufman, a staff attorney at the American Civil Liberties Union’s Center for Democracy.
Sunday, October 23, 2016
The technology was designed by Endace, a little-known New Zealand company. And the important customer was the British electronic eavesdropping agency, Government Communications Headquarters, or GCHQ.
Dozens of internal documents and emails from Endace, obtained by The Intercept and reported in cooperation with Television New Zealand, reveal the firm’s key role helping governments across the world harvest vast amounts of information on people’s private emails, online chats, social media conversations, and internet browsing histories.
The leaked files, which were provided by a source through SecureDrop, show that Endace listed a Moroccan security agency implicated in torture as one of its customers. They also indicate that the company sold its surveillance gear to more than half a dozen other government agencies, including in the United States, Israel, Denmark, Australia, Canada, Spain, and India.
Some of Endace’s largest sales in recent years, however, were to the United Kingdom’s GCHQ, which purchased a variety of “data acquisition” systems and “probes” that it used to covertly monitor internet traffic.
Documents from the National Security Agency whistleblower Edward Snowden, previously disclosed by The Intercept, have shown how GCHQ dramatically expanded its online surveillance between 2009 and 2012. The newly obtained Endace documents add to those revelations, shining light for the first time on the vital role played by the private sector in enabling the spying.
Stuart Wilson, Endace’s CEO, declined to answer questions for this story. Wilson said in a statement that Endace’s technology “generates significant export revenue for New Zealand and builds important technical capability for our country.” He added: “Our commercial technology is used by customers worldwide … who rely on network recording to protect their critical infrastructure and data from cybercriminals, terrorists, and state-sponsored cybersecurity threats.”
Registering sites in Avengers-themed names is a trademark of a shadowy hacker group believed to have orchestrated some of the most devastating attacks in recent memory.
Friday, October 21, 2016
The arrests capped months of looming trouble for Mr. Mangano, a powerful figure in Republican politics on Long Island and the top elected official in Nassau County. He has been dogged by reports — many published in Newsday — that he had received free gifts and vacations from a longtime friend, Harendra Singh, a Long Island restaurateur with about 30 businesses in the area and several government contracts.
Mr. Mangano’s arrest was another blow to the Republican machine in Nassau County, already weakened by the conviction last year of the former State Senate majority leader, Dean G. Skelos, on corruption charges.
In order to understand how one DDoS attack could take out so many websites, you have to understand how Domain Name Servers (DNS) work. Basically, they act as the Internet’s phone book and facilitate your request to go to a certain webpage and make sure you are taken to the right place. If the DNS provider that handles requests for Twitter is down, well, good luck getting to Twitter. Some websites are coming back for some users, but it doesn’t look like the problem is fully resolved.
U.S. Customs and Border Protection wants to start collecting “information associated with your online presence” from travelers from countries eligible for a visa waiver, including much of Europe and a handful of other countries. Earlier this summer, the agency proposed including a field on certain customs forms for “provider/platform” and “social media identifier,” making headlines in the international press. If approved by the Office of Management and Budget, the change could take effect as soon as December.
Privacy groups in recent weeks have pushed back against the idea, saying it could chill online expression and gives DHS and CBP overbroad authority to determine what kind of online activity constitutes a “risk to the United States” or “nefarious activity.”
Thursday, October 20, 2016
Prosecutors also said that Martin should remain locked up and noted that he will soon be charged with violations of the Espionage Act. That law, which dates back nearly a century, is the same law that was used to charge Chelsea Manning and Snowden, among others. If convicted, violators can face the death penalty.
United States Attorney Rod Rosenstein and two other prosecutors laid out new details in the case against Martin, whose arrest only became public earlier this month. Martin had been a contractor with Booz Allen Hamilton and possessed a top-secret clearance.
Before the signing of the USA Freedom Act in June 2015, one of the NSA's most controversial programs was the mass collection of telephonic metadata from millions of Americans — the information about calls, including the telephone numbers involved, the time and the duration but not the calls' content — under a broad interpretation of the Patriot Act's Section 215. From this large "haystack," as officials have called it, NSA analysts could get approval to run queries on specific numbers purportedly linked to international terrorism investigations.
The suit, filed Wednesday in Federal District Court in Manhattan, comes a little more than two months after Mr. Cuomo announced a deal to provide hundreds of millions of dollars per year in subsidies to buttress the bottom lines of four upstate plants. The subsidies were included in an order from the Public Service Commission, whose chairwoman, Audrey Zibelman, is named as the lead defendant.
The suit argues that such action oversteps the federal government’s policy of allowing market forces to set wholesale energy prices, and effectively makes New York residents pay billions through higher electrical rates to prop up the plants, several of which would have failed without the governor’s plan, the suit claims.
“Unless enjoined or eliminated, these credits will result in New York’s captive ratepayers paying the owners an estimated $7.6 billion over 12 years,” the suit reads.
The opinions were written by the Foreign Intelligence Surveillance Court. On Wednesday, the ACLU and the Yale Law School Media Freedom Clinic filed a motion with the court requesting that those opinions be released.
“The people of this country can’t hold the government accountable for its surveillance activities unless they know what our laws allow,” said Patrick Toomey, a staff attorney with the ACLU’s National Security Project. “These secret court opinions define the limits of the government’s spying powers. Their disclosure is essential for meaningful public oversight in our democracy.”
Some of the opinions identified by the ACLU offer interpretations of Section 702 of the Foreign Intelligence Surveillance Act, a controversial provision that allows the government to conduct mass surveillance on American’s transnational communications. The authority is set to expire in December 2017.
Geofeedia sold surveillance software typically bought by police to a high school in a northern Chicago suburb, less than 50 miles from where the company was founded in 2011. An Illinois school official confirmed the purchase of the software by phone on Monday.
In the fall of 2014, the Lincolnshire-Prairie School District paid Geofeedia $10,000 to monitor the social media posts of children at Adlai E. Stevenson High School.
“We did have for one year a contract with Geofeedia,” said Jim Conrey, a spokesperson for Lincolnshire-Prairie School District. “We were mostly interested in the possibility of trying to prevent any kind of harm, either that students would do to themselves or to other students.”
Conrey said the district simply wanted to keep its students safe. “It was really just about student safety; if we could try to head off any potential dangerous situations, we thought it might be worth it,” he said.
Ultimately, the school found little use for the platform, which was operated by police liaison stationed on school grounds, and chose not to renew its subscription after the first year, citing cost and a lack of actionable information. “A lot of kids that were posting stuff that we most wanted, they weren’t doing the geo-tagging or making it public,” Conrey said. “We weren’t really seeing a lot there.”
DHS is using the U.S. Census to ask Americans, questions about smoke detectors, so they can to give homes 'fire risk assessments'. The above video (approx. 2:30) shows how the New Orleans fire department "took it up a notch" and "went door to door, boots on the ground" entering resident's homes to install smoke detectors in people's bedrooms, kitchens etc.
According to the "City of Orleans, Analytics-Informed Smoke Alarm Outreach Program," the New Orleans Fire Department (NOFD) has been going door-to-door giving homes free 'fire risk assessments' since 2015.
The NOFD is launching a door-to-door smoke alarm outreach campaign that leverages analytics to prioritize those neighborhoods that are least likely to have smoke alarms and most likely to experience fire fatalities. With this analysis, NOFD will conduct a targeted, risk-informed door-to-door smoke alarm outreach program.
Two companies sponsored by the Department of Housing and Urban Development called the American Housing Survey and Enigma io are behind this program. Interestingly, 'Enigma io' is run by American Express, the New York Times and New Enterprise Associates a global venture capital firm.
Imagine letting a DHS agent into your home without a warrant?
That's exactly what's happening, as firefighters nationwide enter people's homes under the guise of fire safety. Click here, here & here to find out how firefighters work for DHS. Last year, I warned everyone that firefighters are being armed and trained for urban warfare. Click here, here & here to find out more.
Wednesday, October 19, 2016
There was a time when the idea that one’s every move outside one’s home might be recorded seemed a little creepy.
Tuesday, October 18, 2016
Martin hoarded lots of classified documents, not only from NSA but also from a number of other military and intelligence agencies. The FBI is still comparing them with those from the recent Shadow Brokers leak and a range of other NSA leaks from the past few years, but given what's known now, it seems likely that at least one other leaker is still at large.
The New York Times reported that when the FBI raided Martin's house on August 27, they found paper documents and many terabytes of highly classified information, even going back the 1990s. At least six documents were from 2014. It was reported that Martin first took the classified documents on paper, later on CDs and more recently on thumb drives.
The reason why Harold Martin brought home and stored such large numbers of top secret documents isn't yet clarified. One suggestion is that he may have used them for research for his dissertation about "new methods for remote analysis of heterogeneous & cloud computing architectures", which he was working on at the University of Maryland.
Now, after a lengthy legal battle waged by Freddy Martinez, a Chicago software technician, court orders and case notes were released, painting a more detailed picture of how the second-largest police precinct in the U.S. uses surveillance technology to track cellphones.
Martinez, who leads the Lucy Parson Labs, a Chicago-based nonprofit that advocates digital rights and transparency, originally sued for records in September 2014. He provided the released documents to The Intercept.
The Chicago Police Department did not respond to request for comment.
Cell-site simulators, or IMSI catchers, are typically suitcase-sized devices that emit signals over the wireless spectrum, masquerading as legitimate cellphone towers. When a nearby phone attempts to connect to a tower either to make a call or to check for service, it will instead link-up to the rogue device, beaming back information about its location, its owner, and sometimes the contents of communications.
While tracking one cellphone, the device also often sweeps up information about all the other phones in the area and can disrupt cell service. It’s unclear exactly how long the disruption lasts, or how far the range of each device extends. Activists are currently challenging the Federal Communications Commission to step in and regulate how law enforcement uses IMSI catchers, because they interrupt wireless service without authorization — posing a danger to emergency communications.
Most people would probably answer “no.” This summer, the Government Accountability Office revealed that close to 64 million Americans do not have a say in the matter: 16 states let the FBI use face recognition technology to compare the faces of suspected criminals to their driver’s license and ID photos, creating a virtual line-up of their state residents. In this line-up, it’s not a human that points to the suspect—it’s an algorithm.
But the FBI is only part of the story. Across the country, state and local police departments are building their own face recognition systems, many of them more advanced than the FBI’s. We know very little about these systems. We don’t know how they impact privacy and civil liberties. We don’t know how they address accuracy problems. And we don’t know how any of these systems—local, state, or federal—affect racial and ethnic minorities.
Conducted over a year and relying in part on Freedom of Information and public record requests to 106 law enforcement agencies, the study, conducted by Georgetown Law’s Center on Privacy and Technology, found American police use of facial recognition technology is a scattered, hodgepodge network of laws and regulations.
“Looking at the sum total of what we found, there have been no laws that comprehensively regulate face recognition technology, and there’s really no case law either,” Clare Garvie, an associate at the CPT, told Vocativ. “So we find ourselves having to rely on the agencies that are using that technology to rein it in. But what we found is that not every system — by a long shot — has a use policy.”
That so many American adults are in at least one facial recognition database is largely due to the fact that at least 26 states, and likely more, share their Department of Motor Vehicles databases with the FBI, state police, or other law enforcement agencies, the study found. Compounded with that, police often have access to mugshot databases. Garvie’s study found that most law enforcement agencies don’t purge such records, even if the arrested suspect is found not guilty, unless a court orders it. The sole known exception is the Michigan State Police, which does expunge photos after a set amount of time.
Between 1998 and 2005, electronic surveillance agency Government Communications Headquarters and domestic spy agency MI5 began secretly harvesting “bulk personal datasets” containing millions of records about people’s phone calls, travel habits, internet activity, and financial transactions.
On Monday, the Investigatory Powers Tribunal, a special court that handles complaints related to British spy agencies, found that access to the datasets had not been subject to sufficient supervision through a 17-year period between 1998 and November 2015. The tribunal said that due to “failings in the system of oversight” the surveillance regime had violated Article 8 of the European Convention on Human Rights, which protects the right to privacy.
Increasingly, the skills developed by spying and waging cyberwarfare don’t stay in the military. Unit 8200 is a feeder school to the private surveillance industry in Israel, the self-proclaimed “startup nation” — and the products those intelligence veterans create are sold to governments around the world to spy on people. While the companies that Unit 8200 veterans run say their technologies are essential to keeping people safe, privacy advocates warn their products undermine civil liberties.
In August, Privacy International, a watchdog group that investigates government surveillance, released a report on the global surveillance industry. The group identified 27 Israeli surveillance companies — the highest number per capita of any country in the world. (The United States leads the world in sheer number of surveillance companies: 122.) Unit 8200 veterans either founded or occupy high-level positions in at least eight of the Israeli surveillance companies named by Privacy International, according to publicly available information. And that list doesn’t include companies like Narus, which was founded by Israeli veterans of Unit 8200 but is now owned by Boeing, the American defense contractor. (Privacy International categorized Narus as an American company because it’s headquartered in California.) Narus technology helped AT&T collect internet traffic and billions of emails and forward that information to the National Security Agency, according to reporting in Wired magazine and documents from the Snowden archive.
As an organization, Scientists for 9/11 Truth has stood virtually alone in maintaining large plane impact at the Pentagon together with controlled demolition of the buildings in New York City. With the publication of three new works, cited below, there are now indications that the 9/11 truth movement may be ready to adopt this position also.
Monday, October 17, 2016
New O'Keefe Video: Clinton Campaign, DNC Coordinated With Organizations To Incite Violence At Trump Events
The 100 pages, released Monday morning, include claims that Clinton "blatantly" disregarded protocol. Other claims include that a group of powerful State Department employees attempted to coordinate a document release, and that a department official asked for a "quid pro quo" related to the former secretary of state's emails.
One revelation in the documents came from an interview with an unidentified person who suggested that Freedom of Information Act requests related to Clinton went through a group sometimes called "the Shadow Government."
"There was a powerful group of very high-ranking STATE officials that some referred to as 'The 7th Floor Group' or 'The Shadow Government.' This group met every Wednesday afternoon to discuss the FOIA process, Congressional records, and everything CLINTON-related to FOIA/Congressional inquiries," the FBI's interview summary said.
That group, according to the summary, argued for a Clinton document release to be conducted all at once "for coordination purposes" instead of on a rolling basis as would normally be the case. But the "Shadow Government" did not get its way, and the agency in charge decided for a rolling release, the FBI summary said.
Cartwright, who also led the U.S. Strategic Command and was known to have a close relationship with President Barack Obama, was the subject of a federal investigation into the leaking of details of a reported joint U.S.-Israeli cyberattack targeting Iran's nuclear program.
The charge involves testimony he gave investigators about information obtained by New York Times reporter David Sanger, as well as another journalist, Daniel Klaidman.
The transparency activist has been claiming asylum at London's Ecuadorean embassy since 2012 to avoid extradition over sex assault allegations.
There was no way to immediately verify if he had been knocked offline, and if so, how a state actor was suspected.
Wikileaks has recently been releasing emails from Hillary Clinton's presidential campaign.
The anti-secrecy organisation did not return calls and emails on Monday, though it said in a tweet: "We have activated the appropriate contingency plans."
A woman who picked up the phone at the Ecuadorean embassy said: "I cannot disclose any information."
Current and former officials have said that the CIA has been asked to deliver options for “clandestine” cyber operations designed to “embarrass” the Russian government.
The anonymous officials told NBC News the CIA were already operating cyber doors, selecting targets and making other preparations for an operation.
The source said they had already gathered information that could potentially expose wrongdoing by Russian President Vladimir Putin.
It follows repeated alleged attempts by Russian state-backed hacking groups which have resulted in the leak of thousands of emails sent by senior members of the Democratic party.
A hacker known as Guccifer 2.0 released thousands of emails sent between senior members of the Democratic National Committee (DNC) days before their conference in July where they discussed ways to undermine the candidacy of Senator Bernie Sanders. It led to the resignation of the DNC chair Debbie Wasserman Schultz.
According to the memorandum, signed off by U.S. attorney for the Central District of California Eileen Decker, the government asked for even more than just fingerprints: “While the government does not know ahead of time the identity of every digital device or fingerprint (or indeed, every other piece of evidence) that it will find in the search, it has demonstrated probable cause that evidence may exist at the search location, and needs the ability to gain access to those devices and maintain that access to search them. For that reason, the warrant authorizes the seizure of ‘passwords, encryption keys, and other access devices that may be necessary to access the device,’” the document read.
Legal experts were shocked at the government’s request. “They want the ability to get a warrant on the assumption that they will learn more after they have a warrant,” said Marina Medvin of Medvin Law. “Essentially, they are seeking to have the ability to convince people to comply by providing their fingerprints to law enforcement under the color of law – because of the fact that they already have a warrant. They want to leverage this warrant to induce compliance by people they decide are suspects later on. This would be an unbelievably audacious abuse of power if it were permitted.”
It wasn’t an easy moment. Together, Clapper and Vickers had forced Flynn out as the head of DIA.
The Defense Intelligence Agency is the Pentagon’s version of the CIA, a vast intelligence organization focused on providing senior officials in the Office of the Secretary of Defense, and senior uniformed leaders, with the intelligence necessary to develop strategy and make scores of difficult decisions each day. During the ceremony, Flynn would be extolled by Admiral Mike Rogers, the director of the National Security Agency, as “the best intelligence officer of the past 20 years.” But given the nature of the intelligence business that united them, many of the attendees also knew that Flynn’s retirement at age 56 was premature. A well-known maverick, Flynn had been asked to “shake things up” at the 17,000-person agency. He brought a more wartime mind-set and ethos to a sleepy Washington bureaucracy, until the bureaucracy pushed back and Flynn’s gung-ho style was deemed too “disruptive” for an administration determined to put the unpleasant memories of Iraq and Afghanistan in the rearview mirror.
Taking the podium, Flynn, dark-haired with an aquiline face and a surfer’s wiry build, waved to his many family members in the crowd. He acknowledged the many senior officials in attendance, including his nemeses, Clapper and Vickers. He also made special note of retired General Stanley McChrystal, with whom Flynn had transformed the U.S. Joint Special Operations Command (JSOC) into history’s most lethal terrorist hunting network. “If there is any one individual in this country who changed the way America fights its wars, it was Stan,” Flynn told the capacity crowd. Of course, everyone there knew that McChrystal, too, had been ousted from his job, after an article in Rolling Stone titled “Runaway General” quoted unnamed members of his staff making disrespectful comments about the White House. Inside military and intelligence circles it was understood that McChrystal, along with another ousted former general, David Petraeus, were the preeminent generals and wartime field commanders of their generation of officers, and the manner of their dismissal struck many as insulting. As did the treatment of Lt. Gen. Mike Flynn.
Hundreds of American troops now rotate through makeshift bases in Somalia, the largest military presence since the United States pulled out of the country after the “Black Hawk Down” battle in 1993.
The Somalia campaign, as it is described by American and African officials and international monitors of the Somali conflict, is partly designed to avoid repeating that debacle, which led to the deaths of 18 American soldiers. But it carries enormous risks — including more American casualties, botched airstrikes that kill civilians and the potential for the United States to be drawn even more deeply into a troubled country that so far has stymied all efforts to fix it.
The Somalia campaign is a blueprint for warfare that President Obama has embraced and will pass along to his successor. It is a model the United States now employs across the Middle East and North Africa — from Syria to Libya — despite the president’s stated aversion to American “boots on the ground” in the world’s war zones. This year alone, the United States has carried out airstrikes in seven countries and conducted Special Operations missions in many more.
Sunday, October 16, 2016
State’s Attorney Ladd R Erickson filed the new charges on Friday before District Judge John Grinsteiner who will decide on Monday (October 17) whether probable cause exists for the riot charge.
Goodman has traveled to North Dakota to face the charges and will appear at Morton County court on Monday at 1:30 pm local time (CDT) if the charges are approved.
“I came back to North Dakota to fight a trespass charge. They saw that they could never make that charge stick, so now they want to charge me with rioting, " said Goodman. "I wasn’t trespassing, I wasn’t engaging in a riot, I was doing my job as a journalist by covering a violent attack on Native American protesters."
Saturday, October 15, 2016
“Politics is like sausage being made. It is unsavory, and it always has been that way, but we usually end up where we need to be. But if everybody’s watching . . . then people get a little nervous, to say the least. So, you need both a public and a private position.”
The sausage maker was Mrs. Clinton, giving one of her $225,000 speeches that she’s so long sought to conceal from the public, in this instance to the National Multi-Housing Council in April 2013. It came at a time when the just-retired secretary of state was coyly gearing up for a White House run, little tin cup at the ready, raking in nearly a million dollars that month alone.
When her ode to pragmatic two-facedness was called out by Donald Trump at last week’s debate, she lamely blamed it on Abe Lincoln, as portrayed in Steven Spielberg’s 2012 film. Never mind that a high-priced collection plate and the passage of the 13th Amendment have little in common. It’s all in a day’s work for a woman who claims to be for the Little Guy but spends most of her time frolicking with the political and financial elites.
The attendees are top in-house lawyers for some of the world’s most powerful banks -- people who sit at the table for decisions that can shape multibillion-dollar litigation tabs for the likes of Barclays Plc, Citigroup Inc., Goldman Sachs Group Inc., Deutsche Bank AG and JPMorgan Chase & Co.
For this year’s meeting, in late May, the lawyers descended on Trianon Palace Versailles, a luxury hotel less than two kilometers from the palace of Louis XIV and adjacent to the royal park.
The gatherings, which were described by several people familiar with them who asked not to be identified, tend to feature discussions of nuts-and-bolts issues such as managing relationships with the board and whether compliance personnel should receive stock incentives.
This year, according to two of the people, some attendees arrived at the marble and gilded hotel primed to focus on a common scourge: class-action lawyers who seek billions of dollars from top banks for alleged market manipulations and related bad behavior. Eric Grossman, chief legal officer at Morgan Stanley, implored his confederates to hang together and resist the temptation to settle quickly.
The speech transcripts, in their entirety, were revealed for the first time in an email from Tony Carrk, research director at Hillary for America, in an email dated January 23, 2016, and disclosed to the public for the first time ever during today's latest Wikileak of Podesta emails.
Here are five leaks that came out just this week about Hillary, any *one* of which in a sane world with fair elections (instead of rigged ones run by psycho elites) would have been enough to end her entire campaign for president by now.
Friday, October 14, 2016
Hillary Answers Judicial Watch Under Oath - "Does Not Recall" Most Of Her Tenure As Secretary Of State
Occurrences of the phrase "Does Not Recall": 20
Occurrences of the word "Object" or "Objection": 84
To summarize the 23-page response, Hillary "does not recall" the majority of her tenure as Secretary of State and "objects" to everything that she does recall.
Another phrase that occurs throughout the document, well at least in response to the questions that she actually decided to answer, implies that she was under the illusion that all of her emails subject to FOIA requests would be captured on the email systems of her staffers who actually decided to follow the law and use "state.gov accounts."