Sunday, December 31, 2017

Happy New Year from ConspiracyScope!

Section 702 FAA expires: what are the problems with PRISM and Upstream?

Two important NSA programs, PRISM and Upstream, are based upon section 702 of the FISA Amendments Act (FAA), a law that was scheduled to expire today. Now the US Congress has to decide whether to continue or to reform this crucial legal authority.

Although PRISM became almost synonymous for NSA's alleged mass surveillance, it's actually, just like the Upstream program, targeted collection aimed at specific foreign targets. Still, many people think that way too many data are pulled in (incidental collection) and subsequently queried in an illegal way (backdoor searches).

Here we'll show how complicated these two collection programs are, but also that there are various internal procedures and methods in order to keep collection and analysis as focussed as possible.

Until recently, US lawmakers were too involved with president Trump's tax reform to devote enough attention to section 702 FAA. Therefore, on December 21, Congress extended the authority of this law through January 19, 2018. Lawyers from the Trump administration even concluded that the intelligence agencies can lawfully continue to operate under the FAA through late April (because the current FISA Court certification for the program actually expires late April 2018).

This leaves Congress some extra months to either reform or strengthen this important authority. There are several proposals, spanning from making the existing law permanent without changes, to imposing significant new limits to safeguard the privacy rights of Americans.

No Agenda: Sunday (12-31-17) Episode 995 - Missile by Nike

Ad targeters are pulling data from your browser’s password manager

Nearly every web browser now comes with a password manager tool, a lightweight version of the same service offered by plugins like LastPass and 1Password. But according to new research from Princeton's Center for Information Technology Policy, those same managers are being exploited as a way to track users from site to site.

The researchers examined two different scripts — AdThink and OnAudience — both of are designed to get identifiable information out of browser-based password managers. The scripts work by injecting invisible login forms in the background of the webpage and scooping up whatever the browsers autofill into the available slots. That information can then be used as a persistent ID to track users from page to page, a potentially valuable tool in targeting advertising.

Saturday, December 30, 2017

Congress Kicks Surveillance Debate into 2018

As 2017 comes to a close, Congress, still divided over how (or whether) to limit federal surveillance authorities, has kicked the can down the road to at least January 19.

As part of a continuing resolution to keep the federal government running for a few more weeks, Congress extended the deadline to decide what to do about Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments.

Section 702 grants the FBI and National Security Agency (NSA) the authority to engage in covert, unwarranted surveillance of foreign targets overseas. It is a source of public controversy in recent years because it has become clear and public that the federal government has been using this authority to secretly collect data and communications from and about American citizens and using it as evidence for domestic crime investigations, without getting warrants and without citizens knowing it was happening.

Section 702 expires at the end of the year, or it would have if not for the continuing resolution passed right before Christmas. Before renewing Section 702, civil rights activists groups and privacy rights-oriented lawmakers want to make sure the law's text is reformed so that the use of unwarranted surveillance against American citizens is restricted.

DHS Announces Program to ILLEGALLY Scan Our Faces—And They’re Forcing Us to Pay For It

As TSA agents continue to prove their incompetence in the “War on Terror,” the Department of Homeland Security is now allocating $1 billion in taxpayer funding to create a facial recognition program that will illegally scan Americans’ faces.

A study conducted by Georgetown Law’s Center for Privacy and Technology looked at the biometric scanners that are creating an inventory of the faces of individuals leaving the country at airports across the United States. While they are only at certain major airports right now, the full implementation of these scanners could cost Americans up to $1 billion.

The study noted that while the “9/11 Response and Biometric Exit Account” created by Congress has the funds for the program, “neither Congress nor DHS has ever justified the need for the program.”

In addition to the fact that Congress has never provided a reason why the system is needed in the U.S., the study claimed that DHS has “repeatedly questioned ‘the additional value biometric air exit would provide’ compared with the status quo and the ‘overall value and cost of a biometric air exit capability,’ even as it has worked to build it.”

Not only is a government agency pouring $1 billion into a program to increase the country’s security measures even though it lacks full confidence, and has no evidence that the program it is implementing will do so, there is also the fact that the program requires Americans to give up their civil liberties, and it has never been explicitly authorized by the government.

The Story of Reality Winner, America’s Most Unlikely Leaker

Not every leaker is an ideological combatant like Edward Snowden and Chelsea Manning. Reality Winner may be the unlikeliest of all.

To get to the second floor of the Whitelaw Building, where Reality Winner appears to have worked from February until June, she first had to drive into Fort Gordon, “Home of the U.S. Cyber Center of Excellence,” past low-slung brick buildings and uniformed military in formation, past massive satellite dishes behind barbed wire, toward the $286 million, 604,000-square-foot sleek white listening post that is NSA Georgia, gleaming and gently curved, surrounded by a parking lot full of the middle-class cars of working intelligence-industry professionals.

I took this drive in October, after I’d been given a visitor pass at the entrance to the Army base. I drove until I arrived at a building that looked like renderings I’d seen before and walked around feeling perfectly invisible. After five minutes or so, a black SUV pulled up with a police officer inside; she demanded my license. “Woman in a burgundy top” was the efficient way I had been identified in her notepad. Another SUV pulled up. The police officer called the men inside “special agents,” though when I asked a guy for his title, he declined to say. There were two officials, then three, then six, and they were “just trying to figure out what’s going on.” I asked a few times if I could leave and was told I could not in fact leave; I asked if I was under arrest and told no, this was “investigatory detention.” I was then turned over to a third jurisdictional authority, military police, who drove me off the base.

The Whitelaw Building is one of many facilities built all over the country with the government largesse produced by 9/11, in a decade when spending on intelligence more than doubled and the intelligence community, once concentrated in and around greater Washington, D.C., spilled over into places like St. Louis and Salt Lake and San Antonio. It is a pair of coordinates in the “alternative geography” described at length by Dana Priest and Bill Arkin in their 2010 “Top Secret America” series for the Washington Post, one small part of a huge, hidden world of mile-long business parks, unmarked city buildings, and ghost floors in bland suburban high-rises.

Surveillance requires surveillors; mass surveillance requires more of them. In 2011, according to a document leaked by Edward Snowden, the number of people who worked for the 16 agencies that the government considers to be part of the intelligence community was 104,905. But that number doesn’t include contractors, to which most intelligence funding — 70 percent, according to a PowerPoint leaked to investigative journalist Tim Shorrock — now accrues. Precisely how many Americans are involved in the country’s $70 billion intelligence project remains unknown, probably, even to members of the inner circle; senior officials marvel at its size and redundancy. The intelligence contractors Booz Allen Hamilton, CRSA, and SAIC each employ well over 15,000 people, and there are hundreds of smaller companies like the one for which Reality worked. A single Army research-laboratory contract inked in 2010 involved 11 “prime” contractors and 180 subcontractors. This contract, and these numbers, also come to us via leak.

With so many having access to so much, the fabric of secrecy is stretched thin, vulnerable to puncture. And so the Obama administration launched an unprecedented crackdown against whistle-blowers, charging more of them under the Espionage Act of 1917 than all previous administrations combined. To “detect and prevent” potential leakers, the Obama administration introduced something called “insider threat” training.

Northern Ireland Troubles files among thousands of missing government papers - report

Government files concerning the Troubles in Northern Ireland are among thousands of missing papers, it has been reported.

The Guardian reports that files covering some of the most controversial periods of 20th century British history have "vanished".

Files on the Troubles concerning an assessment of the security situation for ministers of Northern Ireland in the 1970s - have been listed as “misplaced while on loan to government department,” it reported.

As well as the Troubles, missing files include those on the Falklands, British involvement in Palestine, medical testing and the a letter in which MI6 plotted to bring down the first Labour Government - the Zinoviev letter.

Friday, December 29, 2017

The Most Expensive Mile of Subway Track on Earth

The estimated cost of the Long Island Rail Road project, known as “East Side Access,” has ballooned to $12 billion, or nearly $3.5 billion for each new mile of track — seven times the average elsewhere in the world. The recently completed Second Avenue subway on Manhattan’s Upper East Side and the 2015 extension of the No. 7 line to Hudson Yards also cost far above average, at $2.5 billion and $1.5 billion per mile, respectively.

For years, The Times found, public officials have stood by as a small group of politically connected labor unions, construction companies and consulting firms have amassed large profits.

Trade unions, which have closely aligned themselves with Gov. Andrew M. Cuomo and other politicians, have secured deals requiring underground construction work to be staffed by as many as four times more laborers than elsewhere in the world, documents show.

Construction companies, which have given millions of dollars in campaign donations in recent years, have increased their projected costs by up to 50 percent when bidding for work from the M.T.A., contractors say.

Consulting firms, which have hired away scores of M.T.A. employees, have persuaded the authority to spend an unusual amount on design and management, statistics indicate.

Public officials, mired in bureaucracy, have not acted to curb the costs. The M.T.A. has not adopted best practices nor worked to increase competition in contracting, and it almost never punishes vendors for spending too much or taking too long, according to inspector general reports.

At the heart of the issue is the obscure way that construction costs are set in New York. Worker wages and labor conditions are determined through negotiations between the unions and the companies, none of whom have any incentive to control costs. The transit authority has made no attempt to intervene to contain the spending.

Judicial Watch Statement on State Department Release of Huma Abedin’s Government Documents on Weiner’s Laptop

Judicial Watch President Tom Fitton made the following statement regarding today’s pending 3:00 pm (Eastern) release by the U.S. Department of State of Huma Abedin’s work-related documents from the Federal Bureau of Investigation (FBI) that were found on her estranged husband Anthony Weiner’s personal laptop.

This is a major victory. After years of hard work in federal court, Judicial Watch has forced the State Department to finally allow Americans to see these public documents. It will be in keeping with our past experience that Abedin’s emails on Weiner’s laptop will include classified and other sensitive materials. That these government docs were on Anthony Weiner’s laptop dramatically illustrates the need for the Justice Department to finally do a serious investigation of Hillary Clinton’s and Huma Abedin’s obvious violations of law.

In accordance with a court ordered production of documents, a State Department court filing states: “The State Department “identified approximately 2,800 work-related documents among the documents provided by the Federal Bureau of Investigation.” The State Department told the court it expected to complete its review and production of the FBI records by December 31, 2017.

The documents were produced in a May 5, 2015, lawsuit Judicial Watch filed against the State Department (Judicial Watch, Inc. v. U.S. Department of State (No. 1:15-cv-00684)). Judicial Watch sued after the State Department failed to respond to a March 18, 2015, Freedom of Information Act (FOIA) request seeking: “All emails of official State Department business received or sent by former Deputy Chief of Staff Huma Abedin from January 1, 2009 through February 1, 2013 using a non-‘’ email address.”

Classified documents among newly released Huma emails found on Weiner’s laptop

The State Department Friday released a trove of emails from Huma Abedin that the feds discovered on her husband Anthony Weiner’s laptop — including at least five that were marked as “classified.”

Most of the emails were heavily redacted because they contained classified material — but one that was sent on Nov. 25 2010 was addressed to “Anthony Campaign,” an apparent address belonging to Weiner.

The message contained a list of talking points for then-Secretary of State Hillary Clinton, who was prepping to make a call to Prince Saud of Saudi Arabia to warn him about sensitive documents that had been given to WikiLeaks by then-Army intelligence officer Bradley Manning.

State was expected to dump roughly 2,800 emails as a result of a court case won by the conservative watchdog group Judicial Watch.

This is a major victory,” Judicial Watch President Tom Fitton, said in a statement.

Baruch the Scribe & Pamphlet Anon - discuss QAnon on Alex Jones Show (12-29-17)

Baruch the Scribe & Pamphlet Anon discuss QAnon with Rob Dew.

Q's posts...

State papers: Gerry Adams accused of 'setting up' IRA men for slaughter by SAS

Gerry Adams was rumoured to have set up a notorious IRA gang for ambush by the SAS as it tried to blow up a police station in May 1987, previously secret files reveal.

Eight members of the Provisionals' East Tyrone Brigade were shot dead after they loaded a 200lb bomb onto a stolen digger and smashed through the gates of the RUC barracks in Loughgall, Co Armagh.

British army special forces were lying in wait and killed them all, along with innocent bystander Anthony Hughes.

Declassified documents, released through the National Archives in Dublin, showed ballistic tests found that weapons discovered on the dead had been used in 40 to 50 murders, including every republican killing in Fermanagh and Tyrone in 1987.

Three civilian contractors had been murdered in the counties that year, along with officers in the RUC and British army's Ulster Defence Regiment.

The rumour about Mr Adams was passed on to Ireland's Department of Foreign Affairs by respected cleric Fr Denis Faul about three months after the Loughgall operation.

The priest, who had been at school in St Patrick's Academy, Dungannon, with Pádraig McKearney, one of the IRA gang, said the theory doing the rounds was that "the IRA team were set up by Gerry Adams himself".

1987 papers reveal 'MI5 plot to kill Irish PM Haughey'

A loyalist paramilitary claim MI5 asked them to assassinate the Irish prime minister in 1985 is among revelations in newly-released Irish state papers.

Documents include a letter purportedly written by the Ulster Volunteer Force (UVF) to Charles Haughey, saying an MI5 officer asked them to "execute" him.

The documents also contain a claim Sinn Féin leader Gerry Adams "set up" an IRA gang who were shot dead by the SAS at Loughgall, County Armagh, in 1987.

Sinn Féin describe that as "nonsense".

The claim was passed on to the Irish Department of Foreign Affairs by the respected Catholic cleric, Fr Denis Faul, about three months after the Loughgall killings.

The details are all contained in previously classified documents, held by the Irish National Archives, which have been made available to the public for the first time under the 30-year rule.

UVF claimed MI5 urged it to kill former Irish PM, state papers reveal

MI5 encouraged loyalist paramilitaries to assassinate Charles Haughey, the former Irish prime minister was warned in a letter sent to his Dublin office.

The previously secret message – apparently issued by the Ulster Volunteer Force and released under the republic’s 30-year rule to its national archives – claims British intelligence went as far as supplying the UVF with targeting details.

The note, on UVF-headed notepaper, was received by Haughey’s office in 1987 while he was serving as taoiseach for a third time. The threat was taken seriously by the Irish government at the time: divers were dispatched to check that no explosive device had been attached to the hull of his yacht.

The loyalist group claimed it had been exploited and manipulated by MI5, MI6 and British special forces from 1972 to 1978 and again in 1985.

Thursday, December 28, 2017

Privacy Complaints Mount Over Phone Searches at U.S. Border Since 2011

American courts have long permitted government agents who protect the borders to search, without a warrant or any specific basis for suspicion, the possessions carried by people as they cross. But smartphones and other personal electronics contain vastly more private information than suitcases.

The American Civil Liberties Union and the Electronic Frontier Foundation have filed a lawsuit in Boston arguing that a warrant should be required to search such devices at the border. Last week, the Trump administration asked a judge to dismiss the case.

The lawsuit comes amid a surge in agents looking through — and sometimes copying data from — cellphones and laptops. Midway through fiscal year 2017, Customs and Border Protection was on pace to search 30,000 travelers’ electronics — more than tripling the annual number by that agency since 2015, when it searched 8,503 people’s devices.

The complaints were submitted to the Department of Homeland Security’s Traveler Redress Inquiry Program. In many cases, the people list a set of grievances in addition to feeling their privacy was violated, like being detained for hours and missing connecting flights. The Knight First Amendment Institute at Columbia University obtained the filed complaints under the Freedom of Information Act and provided them to The New York Times.

A lawyer at the institute, Carrie DeCell, called the practice “digital strip-searches.”

No Agenda: Thursday (12-28-17) Episode 994 - Scromit

How the Interrogation of Reality Winner Reveals the Deceptive Tactics of “Exceedingly Friendly” FBI Agents

But in another high-profile case, involving former NSA contractor Reality Winner, the government released a transcript of the interrogation. It provides a verbatim example — and a rare example — of how FBI agents ingratiate themselves with unsuspecting suspects and intimidate them into saying things that bring doom upon them.

The interrogations of Winner and Papadopoulos were what the FBI likes to call “noncustodial,” so they were not read their Miranda rights — because, the FBI claims, they were not arrested or detained at the time of the interrogation. (Winner’s lawyers have argued in court filings that she was effectively detained and should have been Mirandized.) By avoiding the obligation to inform suspects of their right to a lawyer and the right to stay silent, the FBI makes it easier to get Americans to say things — whether truths or lies — that will be used against them. The Fifth Amendment protects people from testifying against themselves, of course, and the Sixth Amendment provides the right to legal counsel, but law enforcement authorities get around these constitutional protections by contending that some interrogations are noncustodial. The result is that suspects are enticed into talking before they realize the jeopardy they face and the rights they possess.

“Because warnings are only required prior to custodial interrogation, one way to minimize the impact of Miranda on investigations is to try to conduct interrogations whenever possible in noncustodial settings (such as the suspect’s home or on the street, without arrest-like restraints),” notes an article in Police Magazine, which caters to the law enforcement community. The article bore the headline “How to talk to suspects without Mirandizing.”

Wednesday, December 27, 2017

Uncovering British spies’ web of sockpuppet social media personas

The Joint Threat Research Intelligence Group (JTRIG), a unit in one of Britain’s intelligence agencies, is tasked with creating sockpuppet accounts and fake content on social media, in order to use "dirty tricks" to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them. In this talk, we reveal some of that content, in relation to infiltrating activists groups around the world, including during the Arab spring and Iranian revolution.

What Happened to JFK? - James Fetzer on Guns and Butter

Quick recap of the 2017 JFK Assassination Conference in Dallas:
Bethesda autopsy photographs not of JFK; Oswald framed; Warren Commission Report a sham; shooting of J. D. Tippet; Oswald photo with Mannlicher Carcano staged; analysis of Altgens-6 photograph taken by AP photographer shows Lee Oswald in ground floor book depository doorway as presidential motorcade passes; E. Howard Hunt identified eight central figures in the conspiracy to assassinate Kennedy; Rafael Cruz, father of Ted Cruz, in New Orleans in front of the Trade Mart while Oswald was handing out pamphlets; Rafael Cruz on Main Street in Dallas with Antonio Veciana of Alpha 66; Lyndon Johnson the pivotal player in the JFK assassination; Bobby Baker declared JFK would not live out his first term and would die a violent death; two plots were exposed; U2 over-flights; Oswald's defection to the USSR; Michael and Ruth Paine; Oswald sheep dipped as pro-Castro communist sympathizer; Oswald working as paid FBI informant; Bay of Pigs Invasion a bait and switch; reasons behind JFK assassination; CIA a rogue agency; Assad of Syria; 9/11; ISIS created by Defense Intelligence Agency in 2012 with support of DCI John Brennan, Secretary of State Hillary Clinton and Barack Obama, President; head of DIA, Michael Flynn, opposed creation of ISIS and was fired by Obama; CIA owns everyone of significance in the media; Zapruder film.

Monday, December 25, 2017

Jesus Was Born In A Police State

The Roman Empire, a police state in its own right, had ordered that a census be conducted. Joseph and his pregnant wife Mary traveled to the little town of Bethlehem so that they could be counted. There being no room for the couple at any of the inns, they stayed in a stable, where Mary gave birth to a baby boy, Jesus.

Unfortunately, Jesus was born into a police state not unlike the growing menace of the American police state. And when he grew up, Jesus did not shy away from speaking truth to power. Indeed, his teachings undermined the political and religious establishment of his day. He was eventually crucified as a warning to others not to challenge the powers-that-be.

Yet what if, instead of being born into the Roman police state, Jesus had been born and raised in the American police state?

NSA Whistleblower Snowden Launches Mobile App For Paranoid People

Snowden, while currently on the run from the CIA, hiding somewhere in Moscow until 2020, has found enough time to launch his new mobile security app last Friday for the sufficiently paranoid person (e.g. activists, dissidents, journalists, & etc).

Haven is designed to be installed on any Android smartphone, particularly inexpensive and older devices. It operates like a home surveillance system, leveraging on-device sensors to provide surveillance of physical areas. Sensors within the Android phone monitor motion, sound, vibration and light, watching for unwanted guests to notify a user. Combining Haven with an array of sensors in any smartphone, coupled with the most secure communications technologies like Signal and Tor, the app is providing Snowden and other activists around the world with a mobile security system.

Merry Christmas from ConspiracyScope!

Sunday, December 24, 2017

No Agenda: Sunday (12-24-17) Episode 993 - Let Them Speak #1

At least 10,000 people died in Tiananmen Square massacre, secret British cable from the time alleged

The death toll from the 1989 Tiananmen Square massacre was at least 10,000 people, killed by a Chinese army unit whose troops were likened to “primitives”, a secret British diplomatic cable alleged.

The newly declassified document, written little more than 24 hours after the massacre, gives a much higher death toll than the most commonly used estimates which only go up to about 3,000.

It also provides horrific detail of the massacre, alleging that wounded female students were bayoneted as they begged for their lives, human remains were “hosed down the drains”, and a mother was shot as she tried to go to the aid of her injured three-year-old daughter.

Written on 5 June 1989 by Sir Alan Donald, the then-British ambassador to China, the hitherto secret cable has now been placed in the UK National Archives at Kew, where it was found by the news website HK01.

Saturday, December 23, 2017

DOJ Opens Probe Into Bundy Prosecutors Who Hid Evidence

The Department of Justice (DOJ) has opened a probe into federal prosecutors of the recent trial of Nevada rancher Cliven Bundy, E&E News reports.

Bundy faced criminal charges related to a 2014 standoff with Bureau of Land Management (BLM) agents. After the prosecutions numerous missteps and “willful” withholding of evidence that would aid the Bundy’s defense, the judge ruled a mistrial Wednesday, The Oregonian reports.

The DOJ did not say whether it would pursue another trial against Cliven Bundy and others involved in the 2014 standoff, according to E&E News.

Attorney General Jeff Sessions “personally directed that an expert in the department’s discovery obligations be deployed to examine the case and advise as to next steps,” DOJ deputy director of public affairs Ian Prior told The Oregonian.

“This is every prosecutor’s nightmare,” retired federal prosecutor Kent Robinson said.

Can America’s Power Grid Survive an Electromagnetic Attack?

An EMP could damage electronic circuits over large areas, depending on the configuration of the weapon and how high it was detonated, though there’s disagreement over how effective such a tactic would be. Scientists also emphasize that a nuclear bomb that hits a ground target is much more worrisome. Nevertheless, with North Korea’s increasingly successful missile and warhead tests in mind, Congress moved to renew funding for the Commission to Assess the Threat to the U.S. from Electromagnetic Pulse Attack as part of the National Defense Authorization Act.

In September, the commission’s top officials warned lawmakers that the threat of an EMP attack from a rogue nation “becomes one of the few ways that such a country could inflict devastating damage to the U.S.”

GridEx IV participants said the use of an EMP, however improbable, has been very much on their radar. Lisa Barton, executive vice president of Columbus, Ohio-based American Electric Power Co.’s transmission unit, said the Electric Power Research Institute, an industry research arm, was analyzing the risk. An EPRI report published this week emphasized that widespread damage was indeed possible from such an attack.

Friday, December 22, 2017

Prosecutors ask FBI agents for info on Uranium One deal

On the orders of Attorney General Jeff Sessions, Justice Department prosecutors have begun asking FBI agents to explain the evidence they found in a now dormant criminal investigation into a controversial uranium deal that critics have linked to Bill and Hillary Clinton, multiple law enforcement officials told NBC News.

The interviews with FBI agents are part of the Justice Department's effort to fulfill a promise an assistant attorney general made to Congress last month to examine whether a special counsel was warranted to look into what has become known as the Uranium One deal, a senior Justice Department official said.

At issue is a 2010 transaction in which the Obama Administration allowed the sale of U.S. uranium mining facilities to Russia's state atomic energy company. Hillary Clinton was secretary of state at the time, and the State Department was one of nine agencies that agreed to approve the deal after finding no threat to U.S. national security.

A senior law enforcement official who was briefed on the initial FBI investigation told NBC News there were allegations of corruption surrounding the process under which the U.S. government approved the sale. But no charges were filed.

As the New York Times reported in April 2015, some of the people associated with the deal contributed millions of dollars to the Clinton Foundation. And Bill Clinton was paid $500,000 for a Moscow speech by a Russian investment bank with links to the transaction.

Thursday, December 21, 2017

Not Ready for Takeoff - Face Scans at Airport Departure Gates

At Boston’s Logan International Airport, travelers at one international boarding gate will be surprised that they are being told to stop before what looks like a sophisticated camera.1 But it’s more than just a camera—the device compares each traveler’s face to a Department of Homeland Security (DHS) biometric database to verify her identity and flags as many as 1 in 25 travelers for further scrutiny. These face scans have been deployed at eight other airports, too.2 In Atlanta, Chicago, Las Vegas, Miami, New York City, Houston, and Washington, D.C., travelers departing on certain international flights have their faces scanned by DHS. If DHS’ current plans are executed, every traveler flying overseas, American and foreign national alike, will soon be subject to a face recognition scan as part of this “biometric exit” program (see Sidebar 1).

This sophisticated biometric screening system could cost up to one billion dollars.7 Congress has already created a “9-11 Response and Biometric Exit Account” to fund a biometric exit program in that amount.8 Yet, curiously, neither Congress nor DHS has ever justified the need for the program. Congress never provided a rationale for it. For its part, DHS says that airport face scans are designed to verify the identities of travelers as they leave the country and stop impostors traveling under someone else’s identity. But DHS itself has repeatedly questioned “the additional value biometric air exit would provide” compared with the status quo and the “overall value and cost of a biometric air exit capability,” even as it has worked to build it.9
DHS should not be scanning the faces of Americans as they depart on international flights—but DHS is doing it anyway.

DHS’ biometric exit program also stands on shaky legal ground. Congress has repeatedly ordered the collection of biometrics from foreign nationals at the border, but has never clearly authorized the border collection of biometrics from American citizens using face recognition technology.10 Without explicit authorization, DHS should not be scanning the faces of Americans as they depart on international flights—but DHS is doing it anyway.11 DHS also is failing to comply with a federal law requiring it to conduct a rulemaking process to implement the airport face scanning program—a process that DHS has not even started.12

Making matters worse, the face scanning technology used by DHS may make frequent mistakes. According to DHS’ own data, DHS’ face recognition systems erroneously reject as many as 1 in 25 travelers using valid credentials.13 At this high rate, DHS’ error-prone face scanning system could cause 1,632 passengers to be wrongfully delayed or denied boarding every day at New York’s John F. Kennedy (JFK) International Airport alone.14 What’s more, DHS does not appear to have any sense of how effective its system will be at actually catching impostors—the system’s primary goal.15

The privacy concerns implicated by biometric exit are at least as troubling as the system’s legal and technical problems. As currently envisioned, the program represents a serious escalation of biometric scanning of Americans, and there are no codified rules that constrain it.16 It may also lead to an even greater and more privacy-invasive government surveillance system. In addition, the program may hasten the development and deployment of privacy-invasive commercial technology by the airlines and technology vendors participating in biometric exit.

No Agenda: Thursday (12-21-17) Episode 992 - Robo Trump

Codebreakers and Killers: CIA Covert Ops and the JFK Assassination

One of the more notorious CIA operations involved recruiting elements of the American mafia — no friends of Castro after he had closed down their casinos — to whack the dictator through famed mafioso and CIA liaison Johnny Roselli.

These assassination attempts fell under the auspices of a top-secret assassination program, code name ZR/RIFLE, which was hidden in a strange place — inside the confines of a CIA signals intelligence section called “Staff D.” From what we can tell, Staff D was a kind of liason to the National Security Agency (NSA), which was in the business of breaking codes. Staff D’s goal was to provide the NSA with code books to decrypt foreign signals — by hook or crook. And the man in charge of this section was a notorious CIA figure — William “Bill” Harvey.

To help us understand who Harvey was, the origins and mission of these covert programs, and how Kennedy fell out of favor with the project’s leaders, esteemed JFK researchers Larry Hancock and Bill Simpich gave this joint in-depth talk at the recent JFK Lancer conference in Dallas.

It's A Wonderful Lie — 100 Years of the Federal Reserve

The National Archives unseals thousands more JFK files

The National Archives has unsealed thousands-more pages from the Kennedy files. And while assassinations buffs weren't likely to find any major revelations — no proof of a second gunman, a Cuban plot, or evidence the killer could have been stopped — they'll have plenty to chew on.

The Dallas Morning News reports the 3,539 records include FBI and CIA reports on Soviet spies, the assassination of the Rev. Martin Luther King Jr., and Lee Harvey Oswald's trip to Mexico City a few weeks before he murdered President John F. Kennedy in Dallas on Nov. 22, 1963.

This batch likely will be the last released pending a final review of records. Many remain sealed at the request of the FBI, CIA and other agencies that pressed for more time ahead of a deadline set a quarter century earlier.

Remembering Lockerbie (Dec 21 1988) — The Saga of Pan Am 103 Told by the People Themselves

On Tuesday July 4 2017, the Scottish Criminal Cases Review Commission [SCCRC] confirmed that it has received a new application to review the conviction in the case of Abdelbaset Ali Mohmed Al-Megrahi, better known as the ‘Lockerbie bomber’.

Here are some of the quotes I have collected over the years regarding the Lockerbie affair. Together they tell an extraordinary story and they should convince the readers that there are indeed “many dark and sinister corners to this atrocity”.

In 2007, the SCCRC announced that there were six grounds upon which it had concluded that a miscarriage of justice might have occurred.

Let us now hope that the SCCRC will accept the new application for a full review of Megrahi’s conviction, often described as “a blot on Scotland’s reputation for fair trials”.

Abdelbaset al-Megrahi — the only person ever convicted for the Lockerbie bombing — died on May 20 2012. His New York Times’ obituary was a bit of a surprise as the US Newspaper admitted — for the first time ever — that the case against him was riddled with errors and false testimony.

As I learned from Noam Chomsky, Howard Zinn and Edward Herman, History is best told by the people who lived it. Thus, here are a few quotes about the Lockerbie case.

Wednesday, December 20, 2017

Cardinal Bernard Law, who left Boston in wake of clergy abuse scandal, dies at 86

Cardinal Bernard F. Law, whose 19-year tenure as head of the Archdiocese of Boston ended in his resignation after it was revealed he had failed to remove sexually abusive priests from the ministry, setting off a scandal that reached around the world, died Tuesday. He was 86.

Boston’s eighth bishop and fourth archbishop, Cardinal Law was the highest-ranking official in the history of the US church to leave office in public disgrace. Although he had not broken any laws in the Commonwealth — clergy were not required to report child sex abuse until 2002 — his actions led to a sense of betrayal among many Boston Catholics that the church is still dealing with today.

The abuse scandal was “the greatest tragedy to befall children — ever” in the Commonwealth, the attorney general’s office said in 2003, and “as archbishop, and therefore chief executive of the archdiocese, Cardinal Bernard Law bears ultimate responsibility for the tragic treatment of children that occurred during his tenure. But by no means does he bear sole responsibility.”

The attorney general’s office said the abuse extended over six decades and involved at least 237 priests and 789 children; of those, 48 priests and other archdiocesan employees were alleged to have abused children while Law was leader of the Boston archdiocese.

The Boston Globe’s Pulitzer Prize-winning coverage of sexual abuse in the Catholic Church in 2002 ...

Pope Francis to preside over funeral of cardinal who resigned in disgrace after covering up for pedophile priests

Pope Francis will preside over the funeral of disgraced former Boston archbishiop Cardinal Bernard F. Law.

Cardinal Bernard F. Law, who died Wednesday at age 86, resigned 15 years ago amid allegations that he covered up priests' pedophilia and permitted them to continue their pastoral service.

Law's service will be held at St. Peter's Basilica in Vatican City on Thursday. Cardinal Angelo Sodano, the dean of the College of Cardinals, will celebrate mass and Pope Francis will preside over the "final commendation," the Vatican said in a statement posted to Twitter.

Law, who was recently hospitalized in Rome, died "after a long illness," according to the Vatican.

Judge Declares Mistrial In Bundy Standoff Case After Prosecutors Accused Of Withholding Evidence

A judge on Wednesday declared a mistrial in the case of a group of Nevada ranchers involved in an armed standoff with federal agents in 2014 after finding that prosecutors failed to share some evidence with defense attorneys.

The four men standing trial in Las Vegas — Cliven Bundy, his two sons, Ammon and Ryan, and longtime supporter Ryan Payne — were key figures in two separate armed standoffs that helped embolden an anti-federal government movement in the US.

They had faced charges of conspiracy to commit offenses against the US, impeding or injuring a federal officer, threatening federal officials, and multiple weapons charges. But the prosecution's case was dealt a huge blow when a 17-page letter by an investigator with the Bureau of Land Management was leaked earlier this year. The letter accused top supervisors at the agency of mocking the Bundy family, playing a role in increasing tensions during the armed confrontation with agents, and possibly withholding exculpatory evidence for the trial.

Tuesday, December 19, 2017

After he shot Lee Harvey Oswald, Jack Ruby’s psychosis was diagnosed by the same CIA doctor who had once killed an elephant with psychedelics

Some researchers in the JFK assassination community are aware of the fact that one of the doctors that treated Jack Ruby was none other than Louis Jolyon West, a figure equally infamous for allegedly killing an elephant with LSD and for his work in MKULTRA - the Central Intelligence Agency’s infamous interrogation, hypnosis, and mind control program. An analysis of available documents from the CIA’s declassified archives and the recovered MKULTRA files shows that not only did West want to continue his work with the Agency during the period he was treating Ruby, the University he researched at thought that’s exactly what he was doing.

Facebook is giving the US government more and more data

Every year, Facebook gets tens of thousands of requests for data from governments worldwide, including search warrants, subpoenas, or calls to restrict certain kinds of content. According to a new report released by the company on Dec. 18, these requests are increasing.

In the US, the requests rose by 26% from the last six months of 2016 to the first six months of 2017, while globally, requests increased by about 21%. Since 2013, when the company first started providing data on government requests, the US number has been steadily rising—it has roughly tripled in a period of four years.

Facebook has also been more forthcoming. In the first six months of 2013, it granted the government—which includes the police—79% of requests (“some data was produced” in these cases, the company says); in the first six months of 2017, that share rose to 85%.

Facebook Wants Your Face and You'll Probably Let Them Have It

Facebook just got one step closer to becoming the literal embodiment of its name. On Tuesday, the company announced it’s rolling out several new facial recognition features on its platforms. Once you agree to let Facebook use your face data, you gain access to new tools the company says will help protect your privacy and block catfishing attempts.

Monday, December 18, 2017

Brainwashed : The Secret CIA Experiments in Canada

It sounded like a bad Hollywood horror movie. Patients at a psychiatric hospital subjected to intensive shock treatments, LSD and drug-induced comas. But for hundreds of Canadians, it was an all-too real nightmare. They were brutal experiments on human guinea pigs -- funded by the Canadian government and the U.S. Central Intelligence Agency.

Concerned about the brainwashing of U.S. soldiers who had been Korean prisoners of war, the CIA funded mind-control experiments across North America. They turned to Dr. Ewen Cameron and Montreal’s famed Allen Memorial Institute.

In the 1950s and 1960s, patients committed to the hospital for something as simple as post-partum depression were subjected to chemically- induced sleep for weeks and continuous rounds of electroshocks. Many emerged broken and destroyed, their memories erased and minds permanently damaged.

Trudeau government gag order in CIA brainwashing case silences victims, lawyer says

Forty years after revelations that the U.S. Central Intelligence Agency funded brainwashing experiments on unsuspecting Canadians, the Trudeau government is continuing a pattern of silencing the victims, a lawyer for one of the families says.

A recent Department of Justice gag order in an out-of-court settlement was designed to avoid responsibility and avert compensation to more victims and their families, said Alan Stein, who has represented numerous survivors who were once patients at the Allan Memorial Institute in Montreal.

Stein told CBC News that successive federal governments have demanded confidentiality agreements in at least five of the cases he has settled in the last few decades.

"If they hadn't been confidential and the settlements had the publicity that they should have had, a lot of the victims would have come forward and gone to court," he said.

The Information Industrial Complex

Half a century ago, outgoing President Dwight D. Eisenhower coined the term “military-industrial complex” to describe the fascistic collusion between the Pentagon and America’s burgeoning armaments industry. But in our day and age we are witnessing the rise of a new collusion, one between the Pentagon and the tech industry that it helped to seed, that is committed to waging a covert war against people the world over. Now, in the 21st century, it is time to give this new threat a name: the information-industrial complex.

Sunday, December 17, 2017

The secret backstory of how Obama let Hezbollah off the hook

In its determination to secure a nuclear deal with Iran, the Obama administration derailed an ambitious law enforcement campaign targeting drug trafficking by the Iranian-backed terrorist group Hezbollah, even as it was funneling cocaine into the United States, according to a POLITICO investigation.

The campaign, dubbed Project Cassandra, was launched in 2008 after the Drug Enforcement Administration amassed evidence that Hezbollah had transformed itself from a Middle East-focused military and political organization into an international crime syndicate that some investigators believed was collecting $1 billion a year from drug and weapons trafficking, money laundering and other criminal activities.

Over the next eight years, agents working out of a top-secret DEA facility in Chantilly, Virginia, used wiretaps, undercover operations and informants to map Hezbollah’s illicit networks, with the help of 30 U.S. and foreign security agencies.

They followed cocaine shipments, some from Latin America to West Africa and on to Europe and the Middle East, and others through Venezuela and Mexico to the United States. They tracked the river of dirty cash as it was laundered by, among other tactics, buying American used cars and shipping them to Africa. And with the help of some key cooperating witnesses, the agents traced the conspiracy, they believed, to the innermost circle of Hezbollah and its state sponsors in Iran.

But as Project Cassandra reached higher into the hierarchy of the conspiracy, Obama administration officials threw an increasingly insurmountable series of roadblocks in its way, according to interviews with dozens of participants who in many cases spoke for the first time about events shrouded in secrecy, and a review of government documents and court records. When Project Cassandra leaders sought approval for some significant investigations, prosecutions, arrests and financial sanctions, officials at the Justice and Treasury departments delayed, hindered or rejected their requests.

Advanced Surveillance Technology Helping China To Make Thousands Vanish

The student’s friends think he joined the thousands — possibly tens of thousands — of people, rights groups and academics estimate, who have been spirited without trial into secretive detention camps for alleged political crimes that range from having extremist thoughts to merely traveling or studying abroad. The mass disappearances, beginning the past year, are part of a sweeping effort by Chinese authorities to use detentions and data-driven surveillance to impose a digital police state in the region of Xinjiang and over its Uighurs, a 10-million strong, Turkic-speaking Muslim minority that China says has been influenced by Islamic extremism.

“There are tens of thousands of cameras here.”A police officer in the Xinjiang region
Along with the detention camps, unprecedented levels of police blanket Xinjiang’s streets. Cutting-edge digital surveillance systems track where Uighurs go, what they read, who they talk to and what they say. And under an opaque system that treats practically all Uighurs as potential terror suspects, Uighurs who contact family abroad risk questioning or detention.

No Agenda: Sunday (12-17-17) Episode 991 - Milkshake Duck

L.S.D., Lies, and the C.I.A.: The Incredible True Story Behind Wormwood

In the early morning of November 28, 1953, 42-year-old Army scientist Frank Olson went out the window of a room in New York City’s Statler Hotel. Was it an accident, or an assassination?

Wormwood, the new Netflix true-crime documentary re-enactment series from director Errol Morris, investigates just that: Olson’s possible murder, and the conspiracy to cover up the death of a man who may have been ready to reveal government secrets. Among those possibly wishing to silence him: the C.I.A., President Gerald Ford’s chief and deputy chief of staff—Donald Rumsfeld and Dick Cheney, respectively—plus a rogue’s gallery of military men, a pseudo psychiatrist, and a magician.

Saturday, December 16, 2017

Glowing Auras and ‘Black Money’: The Pentagon’s Mysterious U.F.O. Program

In the $600 billion annual Defense Department budgets, the $22 million spent on the Advanced Aerospace Threat Identification Program was almost impossible to find.

Which was how the Pentagon wanted it.

For years, the program investigated reports of unidentified flying objects, according to Defense Department officials, interviews with program participants and records obtained by The New York Times. It was run by a military intelligence official, Luis Elizondo, on the fifth floor of the Pentagon’s C Ring, deep within the building’s maze.

The Defense Department has never before acknowledged the existence of the program, which it says it shut down in 2012. But its backers say that, while the Pentagon ended funding for the effort at that time, the program remains in existence. For the past five years, they say, officials with the program have continued to investigate episodes brought to them by service members, while also carrying out their other Defense Department duties.

The shadowy program — parts of it remain classified — began in 2007, and initially it was largely funded at the request of Harry Reid, the Nevada Democrat who was the Senate majority leader at the time and who has long had an interest in space phenomena. Most of the money went to an aerospace research company run by a billionaire entrepreneur and longtime friend of Mr. Reid’s, Robert Bigelow, who is currently working with NASA to produce expandable craft for humans to use in space.

On CBS’s “60 Minutes” in May, Mr. Bigelow said he was “absolutely convinced” that aliens exist and that U.F.O.s have visited Earth.

The Pentagon’s Secret Search for UFOs

Funded at the request of Harry Reid, the program probed a number of encounters military pilots had with aircraft they believed didn’t operate like anything they had seen before.

The Pentagon, at the direction of Congress, a decade ago quietly set up a multi-million dollar program to investigate what are popularly known as unidentified flying objects—UFOs.

The “unidentified aerial phenomena” claimed to have been seen by pilots and other military personnel appeared vastly more advanced than those in American or foreign arsenals. In some cases they maneuvered so unusually and so fast that they seemed to defy the laws of physics, according to multiple sources directly involved in or briefed on the effort.

The Advanced Aviation Threat Identification Program, whose existence was not classified but operated with the knowledge of an extremely limited number of officials, was the brainchild of then-Senate Majority Leader Harry Reid (D-Nevada), who first secured the appropriation to begin the program in 2009 with the support of the late Senators Daniel Inouye (D-Hawaii) and Republican Ted Stevens (R-Alaska), two World War II veterans who were similarly concerned about the potential national security implications, the sources involved in the effort said. The origins of the program, the existence of which the Pentagon confirmed on Friday, are being revealed publicly by POLITICO for the first time.

The Pentagon’s AATIP program marked a 21st century effort to replicate some of the decades of inconclusive research undertaken by the Pentagon in 1950s and 1960s to try to explain thousands of reported sightings of unidentified flying objects, or UFOs by military and civilian pilots and average citizens—particularly an effort known as Project Bluebook that ran from 1947 to 1969 and still a focus of intense interest for UFO researchers.

Thursday, December 14, 2017

WikiLeaks recognised as a 'media organisation' by UK tribunal

A British tribunal has recognised Julian Assange’s WikiLeaks as a “media organisation”, a point of contention with the United States, which is seeking to prosecute him and disputes his journalistic credentials.

The issue of whether Assange is a journalist and publisher would almost certainly be one of the main battlegrounds in the event of the US seeking his extradition from the UK.

The definition of WikiLeaks by the information tribunal, which is roughly equivalent to a court, could help Assange’s defence against extradition on press freedom grounds.

The US has been considering prosecution of Assange since 2010 when WikiLeaks published hundreds of thousands of confidential US defence and diplomatic documents. US attorney general Jeff Sessions said in April this year that the arrest of Assange is a priority for the US.

Dissecting the CIA’s lies regarding MKULTRA

One of the many interesting documents in Central Intelligence Agency’s declassified archives was guidance for public statements regarding their MKULTRA mind-control projects. The guidance, produced in 1983 and modified the following year, was intended for CIA’s Deputy Directors, the Executive Director, the Director of Public Affairs and “all Agency employees on the speaking circuit.” Just over a page long, the text is riddled with lies, errors, and half-truths, starting with the very first sentence.

The dates provided are misleading at best. MKULTRA officially began in 1953, but one of it’s partner programs, MKDELTA, had begun in 1952. Its predecessor programs had begun as early as 1949, judging by CIA’s index of “MKULTRA and behavioral research” documents. It’s impossible to know much about what happened before that in MKULTRA’s predecessor projects BLUEBIRD and ARTICHOKE, as an Agency memo notes that “almost no information [is] available for the period prior to 1952.”

The same memo noted that the records described “only a small part” of the program. MKULTRA also didn’t end in 1964 so much as it changed its name to MKSEARCH. Other MKULTRA subprojects weren’t transferred to MKSEARCH, but rather simply incorporated into the Agency’s general research and funding programs. According to John Marks’ book on the subject, “Gottlieb acknowledged that security did not require transferring all the surviving MKULTRA subprojects over to MKSEARCH. He moved 18 subprojects back into regular Agency funding channels.”

No Agenda: Thursday (12-14-17) Episode 990 - Skin Folk

Unfilter 263 - Unreliable Sources (12-13-17)

F.C.C. Repeals Net Neutrality Rules

The Federal Communications Commission voted on Thursday to dismantle landmark rules regulating the businesses that connect consumers to the internet, granting broadband companies power to potentially reshape Americans’ online experiences.

The agency scrapped so-called net neutrality regulations that prohibited broadband providers from blocking websites or charging for higher-quality service or certain content. The federal government will also no longer regulate high-speed internet delivery as if it were a utility, like phone services.

The action reversed the agency’s 2015 decision, during the Obama administration, to better protect Americans as they have migrated to the internet for most communications.

Ajit Pai, the chairman of the commission, said the rollback of the rules would eventually help consumers because broadband providers like AT&T and Comcast could offer people a wider variety of service options. Mr. Pai was joined in the 3-to-2 vote by his two fellow Republican commissioners.

Ryan Dawson on Michael Flynn, Israel-gate and War Profiteers - Our Interesting Times Podcast

Wednesday, December 13, 2017

The Shady Bank Where This Russian NBA Owner Stashed Money

The Russian oligarch who owns the Brooklyn Nets basketball team stashed money in a bank the U.S. Treasury Department has accused of facilitating money laundering, weapons proliferation, sanctions evasion, organized crime, and financing a terror group, a report obtained by The Daily Beast reveals.

Mikhail Prokhorov, whose fortune is estimated at nearly $9 billion, ran for president of Russia against Vladimir Putin in 2012 in a stage-managed campaign sanctioned by the Kremlin.

As the sole owner of the Barclays Center sports arena in Brooklyn, he has dined with the likes of Jay-Z and former New York City Mayor Michael Bloomberg. He’s a frequent guest at the Four Seasons Hotel and is a fixture on the New York social scene.

But a 2014 “confidential” report written by the Central Bank of Cyprus (CBC) found that the wealthy Russian, a so-called politically exposed person—finance parlance for government officials, candidates, and their relatives who are deemed to be at a higher risk of bribery or money laundering—kept 23 accounts at FBME Bank Ltd., formerly known as the Federal Bank of the Middle East.

All 23 of the Prokhorov accounts had been set up by “front men,” according to the CBC report, and FBME was found not to have complied with Cyprus’ own anti-money-laundering law in accepting the deposits.

The bank was shuttered in May of this year following a U.S. Treasury Department statement noting that it was used to facilitate a host of international financial crimes, including money laundering on behalf of sanctioned regimes and non-state actors.

Legal Aid Demands Info on NYC’s Use of Social Monitoring

The Legal Aid Society has sued the Manhattan district attorney for refusing to divulge whether he buys information from social-media companies as a way to track civil rights protesters and conduct other “social monitoring.”

Though the district attorney’s office is the only defendant in the Article 78 Petition, the nonprofit Legal Aid Society specifically asks for information on “the extent to which the state of New York and New York City employ the services of Geofedia, Inc., Media Sonar Technologies Inc., and X1 Discover, Inc.”

“These companies collect data from social media websites and applications and then sell that data to government law-enforcement agencies,” the complaint continues.

District Attorney Cyrus Vance gave a Glomar response to Legal Aid’s request under Freedom of Information Law: It refused to say whether the requested data even existed.

According to the Dec. 8 complaint in New York County Supreme Court: “Geofeedia has, according to the ACLU, signed agreements with more than 500 law enforcement agencies. In response to invasion-of-privacy concerns, Facebook, Twitter, and Instagram have stated that they have cut off Geofeedia’s access to their information.”

Geofeedia allegedly has financial support from by In-Q-Tel, the CIA’s venture capital firm. The ACLU has accused it of targeting black political activists as “overt threats” while monitoring protests for law enforcement agencies.

China Gathering DNA, Iris Scans For Massive Database Of Millions In Muslim Province

Chinese police have started gathering blood types, DNA samples, fingerprints and iris scans from millions of people in its Muslim-majority Xinjiang province to build a massive citizen database, according to report by activist group Human Rights Watch.

The report, published Wednesday, said officials are collecting the data from citizens between the ages of 12 and 65 years old using a variety of methods. Authorities are gathering DNA and blood types through free medical checkups, and HRW said it is was unclear if patients were aware that their biometric data was being collected for the police during these physical exams.

“Xinjiang authorities should rename their physical exams project ‘Privacy Violations for All,’ as informed consent and real choice does not seem to be part of these programs,” said Sophie Richardson, China director at HRW.

“The mandatory databanking of a whole population’s biodata, including DNA, is a gross violation of international human rights norms, and it’s even more disturbing if it is done surreptitiously, under the guise of a free health care program,” she added.

He’s in charge: FBI file reveals Alexander Haig as architect of the Saturday Night Massacre

File lends credence to theory that Haig manipulated Nixon into disastrous Watergate firings that helped end his Presidency

Although much of the file focuses on standard background issues and threats against the general several new facts stand out. One section, in particular, sheds new light on the Watergate scandal and the ensuing Saturday Night Massacre.

The Saturday Night Massacre refers to the firing of independent special prosecutor Archibald Cox, followed by Attorney General Elliot Richardson and Deputy Attorney General Ruckelshaus, which resulted from the fight over the White House tapes and President Nixon’s refusal to simply hand them over. This provoked an additional wave of backlash against Nixon, and ultimately proved to be his undoing, as it was seen as one attempt too many to interfere with the investigation.

At the time, outrage focused on Nixon, but over the years, various journalists and historians have reexamined the matter and found that many of the threads pointed back to General Haig, in his role as White House Chief of Staff, as one of the primary people behind the firing. However, relatively little documentary evidence was available to support this conclusion. Haig’s FBI file, however, provides one of the crucial missing pieces.

The file reveals that Haig personally ordered the Bureau’s surveillance on the offices of the victims of the Saturday Night Massacre, and later rescinded the order when it had served its purpose. The surveillance itself was reported at the time, with an official and vague comment from the FBI as early as the Sunday afterward. The New York Times reported at the time that an FBI representative said that the surveillance was “at the request of the White House.”

Evidence points to Bitcoin being an NSA-engineered psyop to roll out one-world digital currency

It’s now becoming increasingly evident that Bitcoin may be a creation of the NSA and was rolled out as a “normalization” experiment to get the public familiar with digital currency. Once this is established, the world’s fiat currencies will be obliterated in an engineered debt collapse (see below for the sequence of events), then replaced with a government approved cryptocurrency with tracking of all transactions and digital wallets by the world’s western governments.

NSA mathematicians detailed “digital cash” two decades ago

What evidence supports this notion? First, take a look at this document entitled, “How to make a mint: The cryptography of anonymous electronic cash.” This document, released in 1997 — yes, twenty years ago — detailed the overall structure and function of Bitcoin cryptocurrency.

Who authored the document? Try not to be shocked when you learn it was authored by “mathematical cryptographers at the National Security Agency’s Office of Information Security Research and Technology.”

The NSA, in other words, detailed key elements of Bitcoin long before Bitcoin ever came into existence. Much of the Bitcoin protocol is detailed in this document, including signature authentication techniques, eliminating cryptocoin counterfeits through transaction authentication and several features that support anonymity and untraceability of transactions. The document even outlines the heightened risk of money laundering that’s easily accomplished with cryptocurrencies. It also describes “secure hashing” to be “both one-way and collision-free.”

Although Bitcoin adds mining and a shared, peer-to-peer blockchain transaction authentication system to this structure, it’s clear that the NSA was researching cryptocurrencies long before everyday users had ever heard of the term. Note, too, that the name of the person credited with founding Bitcoin is Satoshi Nakamoto, who is reputed to have reserved one million Bitcoins for himself. Millions of posts and online threads discuss the possible identity of Satishi Nakamoto, and some posts even claim the NSA has identified Satoshi. However, another likely explanation is that Satoshi Nakamoto is the NSA, which means he is either working for the NSA is is a sock puppet character created by the NSA for the purpose of this whole grand experiment.

Deep State’s Merry Christmas To America: Surveillance That Never Ends

As it now stands, Section 702 of the Foreign Intelligence Surveillance Act—the legal basis for two of the National Security Agency’s largest mass surveillance programs, “PRISM” and “Upstream”—is set to expire at the end of 2017.

“PRISM” lets the NSA access emails, video chats, instant messages, and other content sent via Facebook, Google, Apple and others. “Upstream” lets the NSA worm its way into the internet backbone—the cables and switches owned by private corporations like AT&T that make the internet into a global network—and scan traffic for the communications of tens of thousands of individuals labeled “targets.”

Just as the USA Patriot Act was perverted from its original intent to fight terrorism abroad and was used instead to covertly crack down on the American people (allowing government agencies to secretly track Americans’ financial activities, monitor their communications, and carry out wide-ranging surveillance on them), Section 702 has been used as an end-run around the Constitution to allow the government to collect the actual content of Americans’ emails, phone calls, text messages and other electronic communication without a warrant.

Under Section 702, the government collects and analyzes over 250 million internet communications every year. There are estimates that at least half of these contain information about U.S. residents, many of whom have done nothing wrong. This information is then shared with law enforcement and “routinely used for purposes unrelated to national security.”

Mind you, this is about far more than the metadata collection that Edward Snowden warned us about, which was bad enough. Section 702 gives the government access to the very content of your conversations (phone calls, text messages, video chats), your photographs, your emails. As Rep. Thomas Massie, R-Ky., warned, “This is not just who you send it to, but what’s in it.”

Tuesday, December 12, 2017

North Korea Has Been Developing Biological Weapons for Over a Decade

Here’s how to shut down the internet: Snip undersea fiber-optic cables

Hundreds of thousands of miles of fiber-optic cable lay on the ocean floors, a crucial part of the global internet’s backbone, and only rarely do ship anchors, undersea landslides or saboteurs disrupt them.

Still, a few voices now call for stronger global mechanisms and even military action to protect the cables against future malicious activity by states, saboteurs or extremists.

“The infrastructure that underpins the internet – these undersea cables – are clearly vulnerable,” said Rishi Sunak, a British member of Parliament and champion of more vigorous action to protect submarine networks. “They underpin pretty much everything that we do.”

Undersea cables conduct nearly 97 percent of all global communications, and every day an estimated $10 trillion in financial transfers and vast amounts of data pass through the seabed routes. Satellites, once crucial but now limited in speed and bandwidth, handle only a tiny percentage of global communications.