Sunday, June 25, 2017

Gabe Pressman, a Dean of New York TV Journalism, Dies at 93

Gabe Pressman, the senior correspondent for WNBC-TV and the indefatigable dean of New York’s television reporters, who chased breaking news, interviewed countless celebrities and covered the hoopla of politics, protests and parades for more than six decades, died early Friday morning in Manhattan. He was 93.

A spokesman for the station confirmed the death, at Mount Sinai Hospital.

A matinee-idol anchorman Mr. Pressman was not. To generations of mayors, governors and ordinary New Yorkers, he was Gabe: the short, rumpled, pushy guy from Channel 4 who seemed always on the scene, elbowing his way to the front and jabbing his microphone in the face of a witness or a big shot.

Over the course of a storied career, Mr. Pressman covered — and, at times, sparred with — every New York City mayor from Robert F. Wagner to Bill de Blasio. He kept at it long past the age when most people retired and kicked back, a steady presence in a rapidly changing media landscape.

The TSA is going to look through your books but promises not to notice what you're reading

The TSA began a new screening policy for paper products at airport checkpoints in Missouri last month, and now the agency's branch in Sacramento, California, is testing out more invasive searches for books and food items.

In the new system, passengers are required to take all reading material and food out of their carry-on luggage and place it in a separate bin. TSA screeners can "fan" through travelers' books to see if anything is hidden in the pages, but agency officials insist they will not pay attention to the content. Critics have long argued passengers selected for extra screening are not chosen as randomly as the TSA claims, and book content — particularly of a political or religious nature — could re-ignite that debate.

Zapruder Film... Super Slow.. Stable.. Smooth

How government elites planned to survive a nuclear attack

The US has a secret network of bunkers primarily built during the Cold War era to protect government officials in case of an atomic bomb

Presidents Kennedy, Eisenhower, Roosevelt and Truman knew there was only enough room for an elite few, but still assured citizens they would be safe in the event of a nuclear war

There is a bunker for officials under the White House, near Camp David and several scattered around the US

The wives of public officials would not be admitted to the elite hideout but secretaries would

There was also a plan to survive off rabbit meat, wild birds and civilian pets when food rations ran out

President George Bush, Vice President Dick Cheney and Secretary of State Condoleezza Rice were ushered into the bunker under the White House on 9/11

In a plan as brutal as it was logical, the President and his inner circle would be saved while tens of millions of ordinary Americans would be incinerated.

Realizing that there was no way to save the population, the conclusion was that 'the government would protect itself and let the rest of us die' writes national security expert Garrett M. Graff.

According to his new book, 'Raven Rock: The Story of the US Government's Secret Plan to Save Itself', the governments of Presidents Kennedy, Eisenhower, Roosevelt and Truman publicly assured people that a nuclear strike could be survivable.

Trump may soon get to pick another Supreme Court justice as rumors abound that Anthony Kennedy could announce his retirement

Washington, DC is abuzz with talk this weekend that President Donald Trump may soon have another chance to nominate a judge to the highest court in the land.

The Supreme Court enters its final week of work before a long summer hiatus with action expected on the Trump administration's travel ban and a decision due in a separation of church and state case that arises from a Missouri church playground.

The biggest news of all, though, would be if Justice Anthony Kennedy were to use the court's last public session on Monday to announce his retirement.

To be sure, Kennedy has given no public sign that he will retire this year and give Trump his second high court pick in the first months of his administration.

Saturday, June 24, 2017

Bernie and Jane Sanders, under FBI investigation for bank fraud, hire lawyers

Sen. Bernie Sanders, I-Vt., and his wife, Jane Sanders have hired prominent defense attorneys amid an FBI investigation into a loan Jane Sanders obtained to expand Burlington College while she was its president, CBS News confirms.

Politico Magazine first reported the Sanders had hired lawyers to defend them in the probe. Sanders' top adviser Jeff Weaver told CBS News the couple has sought legal protection over federal agents' allegations from a January 2016 complaint accusing then-President of Burlington College, Ms. Sanders, of distorting donor levels in a 2010 loan application for $10 million from People's United Bank to purchase 33 acres of land for the institution.

According to Politico, prosecutors might also be looking into allegations that Sen. Sanders' office inappropriately urged the bank to approve the loan.

Beyond Flint: Excessive lead levels found in almost 2,000 water systems across all 50 states

While a harsh national spotlight focuses on the drinking water crisis in Flint, Mich., a USA TODAY NETWORK investigation has identified almost 2,000 additional water systems spanning all 50 states where testing has shown excessive levels of lead contamination over the past four years.

The water systems, which reported lead levels exceeding Environmental Protection Agency standards, collectively supply water to 6 million people. About 350 of those systems provide drinking water to schools or day cares. The USA TODAY NETWORK investigation also found at least 180 of the water systems failed to notify consumers about the high lead levels as federal rules require.

Many of the highest reported lead levels were found at schools and day cares. A water sample at a Maine elementary school was 42 times higher than the EPA limit of 15 parts per billion, while a Pennsylvania preschool was 14 times higher, records show. At an elementary school in Ithaca, N.Y., one sample tested this year at a stunning 5,000 ppb of lead, the EPA’s threshold for “hazardous waste.”

Friday, June 23, 2017

It’s the Banksters, Stupid

It’s something Americans should have figured out after the last financial crisis. The source of their misery stems from the policies of the Federal Reserve and international bankers. As usual, though, the establishment media has diverted attention elsewhere and the financial class of modern robber barons continues its pathological looting and will do so until the bottom falls out of the economy.

WIKILEAKS RELEASE: CIA 'Brutal Kangaroo' and 'Emotional Simian' USB air gap jumping viruses

Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executables.

The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access. It first infects a Internet-connected computer within the organization (referred to as "primary host") and installs the BrutalKangaroo malware on it. When a user is using the primary host and inserts a USB stick into it, the thumbdrive itself is infected with a separate malware. If this thumbdrive is used to copy data between the closed network and the LAN/WAN, the user will sooner or later plug the USB disk into a computer on the closed network. By browsing the USB drive with Windows Explorer on such a protected computer, it also gets infected with exfiltration/survey malware. If multiple computers on the closed network are under CIA control, they form a covert network to coordinate tasks and data exchange. Although not explicitly stated in the documents, this method of compromising closed networks is very similar to how Stuxnet worked.

The Brutal Kangaroo project consists of the following components: Drifting Deadline is the thumbdrive infection tool, Shattered Assurance is a server tool that handles automated infection of thumbdrives (as the primary mode of propagation for the Brutal Kangaroo suite), Broken Promise is the Brutal Kangaroo postprocessor (to evaluate collected information) and Shadow is the primary persistence mechanism (a stage 2 tool that is distributed across a closed network and acts as a covert command-and-control network; once multiple Shadow instances are installed and share drives, tasking and payloads can be sent back-and-forth).

The primary execution vector used by infected thumbdrives is a vulnerability in the Microsoft Windows operating system that can be exploited by hand-crafted link files that load and execute programs (DLLs) without user interaction. Older versions of the tool suite used a mechanism called EZCheese that was a 0-day exploit until March 2015; newer versions seem use a similar, but yet unknown link file vulnerability (Lachesis/RiverJack) related to the library-ms functionality of the operating system.

German intelligence agency spied on thousands of targets in the United States

The foreign intelligence service of Germany spied on at least 4,000 targets in the United States from 1998 until 2006, according to a leaked document published yesterday by leading German newsmagazine Der Spiegel. The German investigative weekly said that the surveillance was carried out by the German Federal Intelligence Service, known as BND. The Hamburg-based magazine claimed to have in its possession a list of approximately 4,000 “selector keywords”, unique distinguishing terms, addresses or numbers that identify individual targets for surveillance. The list allegedly includes names, telephone or fax numbers, and email addresses of people that the BND had identified as worthy of individual attention between 1998 and 2006.

According to Der Spiegel, the list of targets in the United States includes officials in the White House, the Department of the Treasury and the Department of State. Their work and private phone numbers, and often emails, are listed in the BND document. The latter also focuses on the American military sector, paying particular attention to the US Air Force and the Marine Coprs. Other targets include the National Aeronautics and Space Administration and the Defense Intelligence Agency, the US Pentagon’s intelligence organization. In addition to US government targets, the BND exercised surveillance on American companies with ties to the state, such as Lockheed Martin, as well as state-owned universities. The leaked list also includes targets in international organizations that have an institutional presence in the US, such as the International Monetary Fund and the Arab League, which has an office in Washington. Hundreds of foreign embassies and consulates in the US were also targeted, said Der Spiegel.

Surveillance without Borders: The “Traffic Shaping” Loophole and Why It Matters

This report describes a novel and more disturbing set of risks. As a technical matter, the NSA does not have to wait for domestic communications to naturally turn up abroad. In fact, the agency has technical methods that can be used to deliberately reroute Internet communications. The NSA uses the term “traffic shaping” to describe any technical means the deliberately reroutes Internet traffic to a location that is better suited, operationally, to surveillance. Since it is hard to intercept Yemen’s international communications from inside Yemen itself, the agency might try to “shape” the traffic so that it passes through communications cables located on friendlier territory.10 Think of it as diverting part of a river to a location from which it is easier (or more legal) to catch fish.

The NSA has clandestine means of diverting portions of the river of Internet traffic that travels on global communications cables.

Could the NSA use traffic shaping to redirect domestic Internet traffic—emails and chat messages sent between Americans, say—to foreign soil, where its surveillance can be conducted beyond the purview of Congress 11 and the courts? It is impossible to categorically answer this question, due to the classified nature of many national-security surveillance programs, regulations and even of the legal decisions made by the surveillance courts. Nevertheless, this report explores a legal, technical, and operational landscape that suggests that traffic shaping could be exploited to sidestep legal restrictions imposed by Congress and the surveillance courts.

Legal loopholes could allow wider NSA surveillance, researchers say

Secret loopholes exist that could allow the National Security Agency to bypass Fourth Amendment protections to conduct massive domestic surveillance on U.S. citizens, according to leading academics.

The research paper released Monday by researchers at Harvard and Boston University details how the U.S. government could "conduct largely unrestrained surveillance on Americans by collecting their network traffic abroad," despite constitutional protections against warrantless searches.

One of the paper's authors, Axel Arnbak of Harvard University's Berkman Center for Internet & Society, told CBS News that U.S. surveillance laws presume Internet traffic is non-American when it is collected from overseas.

"The loopholes in current surveillance laws and today's Internet technology may leave American communications as vulnerable to surveillance, and as unprotected as the internet traffic of foreigners," Arnbak said.

NSA's use of 'traffic shaping' allows unrestrained spying on Americans

By using a "traffic shaping" technique, the National Security Agency sidestepped legal restrictions imposed by lawmakers and the surveillance courts.

A new analysis of documents leaked by whistleblower Edward Snowden details a highly classified technique that allows the National Security Agency to "deliberately divert" US internet traffic, normally safeguarded by constitutional protections, overseas in order to conduct unrestrained data collection on Americans.

According to the new analysis, the NSA has clandestine means of "diverting portions of the river of internet traffic that travels on global communications cables," which allows it to bypass protections put into place by Congress to prevent domestic surveillance on Americans.

The new findings, published Thursday, follows a 2014 paper by researchers Axel Arnbak and Sharon Goldberg, published on sister-site CBS News, which theorized that the NSA, whose job it is to produce intelligence from overseas targets, was using a "traffic shaping" technique to route US internet data overseas so that it could be incidentally collected under the authority of a largely unknown executive order.

Thursday, June 22, 2017

Stolen NSA malware used to take over traffic cameras in Australia

There’s fresh reason to be worried about Wannacry, the malicious software that hackers stole from the U.S. National Security Agency.

In May, hackers used the malware to infect computers in more than 70 countries. The attack was particularly bad in England, where the software disrupted service at many of the country’s busiest hospitals.

Now, the software has been used to take control of 55 speed and red light cameras in Victoria, the most densely populated state in Australia. The Czech security company Avast says the hackers didn’t use the Internet to launch the attack. The infection came through a USB drive.

That was likely the same technique the U.S. and Israel used to damage Iran's Natanz nuclear facility with the Stuxnet virus.

Former CIA officer accused of selling top secret information to China

A former CIA officer sold top secret and other classified documents to Chinese intelligence officials, according to charges filed Thursday in Alexandria federal court.

Kevin Patrick Mallory, 60, of Leesburg, Va., was arrested Thursday and appeared briefly in front of Judge Theresa Buchanan on counts of delivering defense information to aid a foreign government and making false statements. He asked to be represented by a public defender.

Mallory had a top secret security clearance until he left the government in 2012, prosecutors say, having worked at various government agencies and defense contractors.

DHS Is Starting to Scan Americans’ Faces Before They Get on International Flights

Air travel already features some attributes of a police state. Metal detectors. Bomb-sniffing dogs. Pat-downs. A gloved TSA agent peering at your toothpaste. But it could get worse. What if your check-in also involved a face recognition scan?

Decades ago, Congress mandated that federal authorities keep track of foreign nationals as they enter and leave the United States. If the government could record when every visitor stepped on and off of U.S. soil, so the thinking went, it could easily see whether a foreign national had overstayed a visa.

But in June of last year, without congressional authorization, and without consulting the public, the Department of Homeland Security started scanning the faces of Americans leaving the country, too.

Privacy Organization Urges Congress To Examine FBI’s Secret Biometric ID Program

Known as the Next Generation Identification system, since 2014 the FBI has amassed more than 50 million images scoured from facial recognition alone; and, as reported by the Electronic Frontier Foundation, the images have merged into the FBI’s legacy database of fingerprints and other identifiers to create a centralized hub of surveillance.

The FBI has admitted that the system contains non-criminal identification as well as criminal, including:

suspects and detainees,
fingerprints for job applicants
military or volunteer service
background checks
security clearances
All told, it’s been estimated that half of all adult Americans appear in a biometric database.

Despite what is clearly a sweeping program of surveillance and a violation of numerous Amendments to the Constitution, the FBI has resisted all inquiries made by privacy organizations and even the House Committee on Oversight and Government Reform.

Wednesday, June 21, 2017

Langleys Jihadists: From the Mujaheddin to ISIL - Wayne Madsen

The CIA’s six most dangerous FOIA topics

From JFK to MKULTRA, here’s what the Agency didn’t want getting released to the public

In a 1978 memo urging the curbing of the newly-empowered Freedom of Information Act, the CIA compiled a list of six FOIA topics considered to be the most potentially dangerous to the Agency’s reputation.

One reason CIA felt these requests were so dangerous was “because of the FOIA requirement to release bits and pieces of information.” There is no such requirement, only exemptions that CIA chooses to take advantage of - there is nothing stopping the agency from developing briefing books specifically for the public, although the Agency generally prefers anonymously releasing information through journalists.

John McAfee On WikiLeaks Dump: CIA Operation "Cherry Blossom" Hacking Residential Routers

Tuesday, June 20, 2017

Prodigy of Mobb Deep: Rapper Reveals Illuminati Symbolism in Music World

Prodigy, Rapper Who Helped Forge the Sound of New York Hip-Hop, Dies at 42

Ron Paul Interviews Edward Snowden

64 Years Later, CIA Finally Releases Details of Iranian Coup

Declassified documents released last week shed light on the Central Intelligence Agency’s central role in the 1953 coup that brought down Iranian Prime Minister Muhammad Mossadegh, fueling a surge of nationalism which culminated in the 1979 Iranian Revolution and poisoning U.S.-Iran relations into the 21st century.

The approximately 1,000 pages of documents also reveal for the first time the details of how the CIA attempted to call off the failing coup — only to be salvaged at the last minute by an insubordinate spy on the ground.

Known as Operation Ajax, the CIA plot was ultimately about oil. Western firms had for decades controlled the region’s oil wealth, whether Arabian-American Oil Company in Saudi Arabia, or the Anglo-Iranian Oil Company in Iran. When the U.S. firm in Saudi Arabia bowed to pressure in late 1950 and agreed to share oil revenues evenly with Riyadh, the British concession in Iran came under intense pressure to follow suit. But London adamantly refused.

So in early 1951, amid great popular acclaim, Mossadegh nationalized Iran’s oil industry. A fuming United Kingdom began conspiring with U.S. intelligence services to overthrow Mossadegh and restore the monarchy under the shah. (Though some in the U.S. State Department, the newly released cables show, blamed British intransigence for the tensions and sought to work with Mossadegh.)

Privacy, Control & the Darknet – Alex Winter with Abby Martin

Two Key Things That Got Overlooked About Project MK Ultra

Monday, June 19, 2017

American Military Fights for ISIS - ISIS = Israeli Secret Intelligence Service

Unholy Alliance: General William “Wild Bill” Donovan and Pope Pius XII

One day in July 1944, as the Second World War raged throughout Europe, General William “Wild Bill” Donovan was ushered into an ornate chamber in Vatican City for an audience with Pope Pius XII.

Donovan bowed his head reverently as the pontiff intoned a ceremonial prayer in Latin and decorated him with the Grand Cross of the Order of Saint Sylvester, the oldest and most prestigious of papal knighthoods.

This award has been given to only 100 other men in history, who “by feat of arms, or writings, or outstanding deeds, have spread the Faith, and have safeguarded and championed the Church.”

Although a papal citation of this sort rarely, if ever, states why a person is inducted into the “Golden Militia,” there can be no doubt that Donovan earned his knighthood by virtue of the services he rendered to the Catholic hierarchy in World War II, during which he served as chief of the Office of Strategic Services (OSS), the wartime predecessor to the Central Intelligence Agency (CIA).

In 1941, the year before the OSS was officially constituted, Donovan forged a close alliance with Father Felix Morlion, founder of a European Catholic intelligence service known as Pro Deo.

When the Germans overran western Europe, Donovan helped Morlion move his base of operations from Lisbon to New York.

From then on, Pro Deo was financed by Donovan, who believed that such an expenditure would result in valuable insight into the secret affairs of the Vatican, then a neutral enclave in the midst of fascist Rome.

Using Texts as Lures, Government Spyware Targets Mexican Journalists and Their Families

Mexico’s most prominent human rights lawyers, journalists and anti-corruption activists have been targeted by advanced spyware sold to the Mexican government on the condition that it be used only to investigate criminals and terrorists.

The targets include lawyers looking into the mass disappearance of 43 students, a highly respected academic who helped write anti-corruption legislation, two of Mexico’s most influential journalists and an American representing victims of sexual abuse by the police. The spying even swept up family members, including a teenage boy.

Since 2011, at least three Mexican federal agencies have purchased about $80 million worth of spyware created by an Israeli cyberarms manufacturer. The software, known as Pegasus, infiltrates smartphones to monitor every detail of a person’s cellular life — calls, texts, email, contacts and calendars. It can even use the microphone and camera on phones for surveillance, turning a target’s smartphone into a personal bug.

The company that makes the software, the NSO Group, says it sells the tool exclusively to governments, with an explicit agreement that it be used only to battle terrorists or the drug cartels and criminal groups that have long kidnapped and killed Mexicans.

5 years & 4 walls: Assange marks anniversary of asylum in Ecuadorian Embassy in London

White House reporters fume over off-camera briefings

The White House press corps vented frustration Monday with press secretary Sean Spicer for conducting off-camera briefings in place of the usual publicly broadcast briefings.

Spicer conducted an off-camera briefing with reporters on Monday in which the press was told it could not film or broadcast audio of the proceedings. Spicer conducted the last on-camera briefing last Monday.

The White House has increasingly forged its own path with the press — holding off-camera briefings and gaggles, imposing restrictions on reporters’ use of audio and video feeds, inviting Cabinet officials to speak only about specific policy issues and rotating between Spicer and deputy press secretary Sarah Huckabee Sanders.
Some of those moves have angered the White House press corps but delighted Trump’s supporters, who view the media as what White House chief strategist Stephen Bannon has dubbed the "opposition party."

Friday, June 16, 2017

‘Crash Override’ malware heightens fears for US electric grid

The identification of malware tied to a cyberattack on Ukraine last year is putting a renewed focus on threats to America’s electric grid.

Security firms ESET and Dragos revealed the malware, dubbed “Crash Override” or “Industroyer,” this week. According to the researchers, the malware is only the second to be tailored to industrial control systems and developed and deployed to be disruptive — the first was the Stuxnet virus that ravaged Iran’s nuclear program years ago.

The attack, which knocked out power in Kiev for about an hour, was one of two targeting Ukraine’s electric grid in recent years. Russia, which annexed Ukraine’s Crimean peninsula, is widely believed to have a connection to both attacks.
Experts say the cyber weapon could be deployed against electric infrastructure in Europe and much of Asia and the Middle East and, with slight modifications, could be used against the United States as well.

$15 for 15 minutes: How Courts Are Letting Prison Phone Companies Gouge Incarcerated People

In 2013 and then again in 2015, President Barack Obama’s Federal Communications Commission, the body that regulates the prison phone industry, moved to alleviate the burden of the impossible choice like the one faced by Shields. After activists waged a decadeslong campaign to lower prison call rates, the FCC voted to cap the costs. Different facilities maintained different rates, but no incarcerated person, under Obama’s new rules, would be paying more than 49 cents per minute for a call to someone in the same state where their prison was located.

On Tuesday, much of that progress was undone when the U.S. Court of Appeals for the D.C. Circuit ruled against limiting the cost of intrastate prison phone calls.

For 2.2 million people behind bars and their families, the ruling represents a severe setback in their lengthy struggle for affordable phone calls. The calls allow incarcerated people to keep up relationships, including with their children, among others. Now, when incarcerated people and their families live in the same state, those communications will be completely unregulated by the federal government.

Alex Jones Leaks Megyn Kelly Interview (6-16-17)

Alex Jones has released recordings made during a pre-interview between himself and Megyn Kelly to set the record straight after the release of the highly edited promo for the NBC hosts upcoming hit piece.

'America's War on Drugs': Inside New Miniseries Exposing Hypocrisy of U.S. Drug Policy

There's a great moment in the new History channel miniseries, America's War on Drugs, when a former DEA agent named Celerino Castillo explains why America's crusade to purge drugs from the world is doomed to fail: "America is more addicted to drug money than they are addicted to drugs."

After risking his life going undercover in the 1980s, Castillo had been disillusioned – quite a few different times – to discover that the CIA couldn't care less about stemming the flow of cocaine from Latin America. In fact, the agency ignored the Contras' drug smuggling. The cocaine moved by the guerrillas made its way to America's inner cities as crack, fueling an epidemic of addiction and mass incarceration that has helped make America the number one jailer in the world. When San Jose Mercury reporter Gary Webb broke that story, he was maligned as a conspiracy theorist and fired. Webb eventually killed himself.

Unearthing these kinds of dizzying links in the global drug trade is the driving force behind the eight-hour, four-night event, which premieres this Sunday, June 18th. Using historic footage, dramatic re-enactments and interviews with a cast of fascinating characters – including former CIA and DEA agents, drug traffickers and gang members – the series makes the case that the drug trade has always been entwined in America's military adventures: all the way from the CIA's secret experiments with LSD in the early Cold War, to opium production in Afghanistan during the War on Terror. "We really wanted to do an epic look at the secret history of the war on drugs in America and tell this much bigger story," says Anthony Lappé, who produced the four-part series along with Julian Hobbs and Elli Hakami . "It's almost like the secret history of the last 50 years."

Thursday, June 15, 2017

American Standoff: Aftermath - Episode 4

WIKILEAKS RELEASE: CIA 'CherryBlossom' & 'CherryBomb' have been infecting WiFi routers for years

Today, June 15th 2017, WikiLeaks publishes documents from the CherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International).

CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for "Man-In-The-Middle" attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user.

The wireless device itself is compromized by implanting a customized CherryBlossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful infection. Once the new firmware on the device is flashed, the router or access point will become a so-called FlyTrap. A FlyTrap will beacon over the Internet to a Command & Control server referred to as the CherryTree. The beaconed information contains device status and security information that the CherryTree logs to a database. In response to this information, the CherryTree sends a Mission with operator-defined tasking. An operator can use CherryWeb, a browser-based user interface to view Flytrap status and security info, plan Mission tasking, view Mission-related data, and perform system administration tasks.

Missions may include tasking on Targets to monitor, actions/exploits to perform on a Target, and instructions on when and how to send the next beacon. Tasks for a Flytrap include (among others) the scan for email addresses, chat usernames, MAC addresses and VoIP numbers in passing network traffic to trigger additional actions, the copying of the full network traffic of a Target, the redirection of a Target’s browser (e.g., to Windex for browser exploitation) or the proxying of a Target’s network connections. FlyTrap can also setup VPN tunnels to a CherryBlossom-owned VPN server to give an operator access to clients on the Flytrap’s WLAN/LAN for further exploitation. When the Flytrap detects a Target, it will send an Alert to the CherryTree and commence any actions/exploits against the Target. The CherryTree logs Alerts to a database, and, potentially distributes Alert information to interested parties (via Catapult).

No Agenda: Thursday (6-15-17) Episode 938 - Humalgo

Charleston ‘Dirty Bomb’ Report at Wando Welch Port Terminal

Authorities investigated a “dirty bomb” report made by a YouTube conspiracy theorist and evacuated the Wando Welch terminal in the port of Charleston, South Carolina.

However, they found nothing by 3:30 a.m. June 15 and now say they’ve detained the “original reporting source of the threat,” whom they did not name.

Wednesday, June 14, 2017

Special counsel is investigating Trump for possible obstruction of justice, officials say

The special counsel overseeing the investigation into Russia’s role in the 2016 election is interviewing senior intelligence officials as part of a widening probe that now includes an examination of whether President Trump attempted to obstruct justice, officials said.

The move by special counsel Robert S. Mueller III to investigate Trump’s conduct marks a major turning point in the nearly year-old FBI investigation, which until recently focused on Russian meddling during the presidential campaign and on whether there was any coordination between the Trump campaign and the Kremlin. Investigators have also been looking for any evidence of possible financial crimes among Trump associates, officials said.

Trump had received private assurances from then-FBI Director James B. Comey starting in January that he was not personally under investigation. Officials say that changed shortly after Comey’s firing.

Five people briefed on the requests, speaking on the condition of anonymity because they were not authorized to discuss the matter publicly, said that Daniel Coats, the current director of national intelligence, Mike Rogers, head of the National Security Agency, and Rogers’s recently departed deputy, Richard Ledgett, agreed to be interviewed by Mueller’s investigators as early as this week. The investigation has been cloaked in secrecy, and it is unclear how many others have been questioned by the FBI.

‘How Far Can They Go?’ Police Search of Hundreds of Students Stokes Lawsuit and Constitutional Questions

But on that Friday, beginning around 8 a.m., dozens of police appeared on campus and announced that the school was on lockdown, which lasted until about noon. In that time, police officers searched all, or nearly all, of the approximately 900 students at the school, in Sylvester, Ga., in the southwest part of the state.

On June 1, with the help of the Southern Center for Human Rights and Horsley Begnaud, L.L.C., a law firm, nine of the students sued the sheriff and his deputies, alleging that they lacked the jurisdiction to carry out the body searches, which the lawsuit called “unreasonable, aggressive, and invasive.”

William Binney on The Alex Jones Show (6-14-17)

Five examples of the NYPD’s commitment to “transparency”

Earlier today journalist Matthew Chayes reported that NYPD Deputy Commissioner John Miller called the department “the most transparent municipal police department in the world” in testimony before New York City Council.

In light of this rather bold claim regarding an agency routinely ranked among the worst in the state regarding openness and access, we thought we’d dig up some examples of the NYPD’s rather unique take on transparency over the years.

Top Ten Moments From AG Sessions' Testimony to Senate Intelligence Committee (6-14-17)

Leo Zagami Interviews Reinhard Markner (scholar and editor of Secret School of Wisdom)

Theresa May Puts Peace in Northern Ireland at Risk to Remain U.K. Prime Minister

“A fundamental part of that peace process is that the U.K. government needs to be impartial between all the competing interests in Northern Ireland,” Major said. “And the danger is that however much any government tries, they will not be seen to be impartial if they are locked into a parliamentary deal at Westminster with one of the Northern Ireland parties.”

“The last thing anybody wishes to see,” Major added, “is one or other of the communities so aggrieved that the hard men, who are still there lurking in the corners of the community, decide that they wish to return to some form of violence.”

That concern is made more pressing by two factors: the looming threat of Brexit, which could make it necessary to once again erect barriers along the currently invisible border between Northern Ireland and Ireland, once the U.K. leaves the European Union; and the fact that Northern Ireland’s local assembly is in crisis.

NSA Reneges On Promise To Tell Congress How Many Innocent Americans It Spies On

Intelligence officials have been promising Congress they would provide lawmakers with an estimate of the number of American communications that are collected under Section 702. That estimate is a critical piece of information for lawmakers to have as they consider whether and how to reauthorize and reform the warrantless Internet surveillance of millions of innocent Americans in the coming months.

But during a hearing on Section 702 in front of the Senate Intelligence Committee yesterday, Director of National Intelligence Dan Coats, despite previous assurances, said he won’t be providing that estimate out of national security and, ironically, privacy concerns.

He told lawmakers it is “infeasible to generate an exact, accurate, meaningful, and responsive methodology that can count how often a U.S. person’s communications may be incidentally collected under Section 702.” To do so would require diverting NSA analysts’ attention away from their current work to “conduct additional significant research” to determine whether the communications collected under Section 702 are American. “I would be asking trained NSA analysts to conduct intense identity verification research on potential U.S. persons who are not targets of an investigation,” he said. “From a privacy and civil liberties perspective, I find this unpalatable.”

Friday, June 9, 2017

The spiraling rabbit hole of the Seth Rich Murder - With George Webb

American Standoff: Aftermath - Episode 3

American Standoff: Aftermath is a new short form series that delves deeper into the personal lives of the characters and key issues surrounding the 2016 Malheur Standoff.

50 Years Ago: NSA’s Deadliest Day

June 8, 1967 was the worst day in the history of the National Security Agency. On that date, Israeli airplanes and torpedo boats mauled and nearly sank an American spy ship in international waters, killing or maiming most of its crew. This tragedy appears as a footnote to Israelis, an unpleasant sideshow of their victorious Six Day War, while official Washington preferred the embarrassing episode be forgotten. But NSA has never let the Liberty and her ill-fated crew disappear from memory altogether.

The USS Liberty was owned and operated by the U.S. Navy, which euphemistically referred to her as one of its Technical Research Ships, but she really worked for NSA. A converted World War Two freighter, the Liberty was barely a warship, possessing minimal armament for self-defense, and her mission was very hush-hush. She sailed the world collecting signals intelligence on behalf of her bosses at Fort Meade, Maryland. Her hull contained a large top-secret room where sailors of the Naval Security Group, NSA’s Navy component, intercepted and translated foreign communications.

In the mid-1960s, the Liberty sailed from crisis to crisis, wherever NSA needed her on station to collect SIGINT, and the beginning of June 1967 found her off the coast of west Africa. However, the rapidly deteriorating situation in the Middle East required her dispatch to the eastern Mediterranean, where war was about to break out again between Israel and her Arab neighbors.


Thursday, June 8, 2017

Erasing The USS Liberty: 50th Anniversary Of Israel’s Attack On America

Dave Gahary & Phil Tourney with Andrew Carrington Hitchcock, June 8, 2017.

Top Ten Facts From Comey's Testimony to Senate Intel Committee (6-8-17)

James Comey Senate Hearing Coverage & Analysis (6-8-17)

The Day Israel Attacked America

In 1967, at the height of the Arab-Israeli Six-Day War, the Israeli Air Force launched an unprovoked attack on the USS Liberty, a US Navy spy ship that was monitoring the conflict from the safety of international waters in the Mediterranean.

Israeli jet fighters hit the vessel with rockets, cannon fire and napalm, before three Israeli torpedo boats moved in to launch a second more devastating attack. Though she did not sink, the Liberty was badly damaged. Thirty-four US servicemen and civilian analysts were killed, another 171 were wounded.

Later Israel apologised for what it claimed to be a tragic case of mistaken identity. It said that it had believed the ship to be hostile Egyptian naval vessel. US President Lyndon Johnson was privately furious but publicly the White House chose not to challenge the word of its closest Middle East ally and accepted that the attack had been a catastrophic accident.

However, as this exclusive Al Jazeera investigation reveals, fresh evidence throws new light on exactly what happened that fateful day - and the remarkable cover up that followed.

Glass-Steagall Hail Mary Falls Short–Quietly, With Dems’ Help–as Dodd-Frank Repeal Advances to House Floor

An ambitious bid to replace Republicans’ Dodd-Frank repeal proposal with legislation restoring Glass-Steagall was defeated on Tuesday.

The House Rules Committee voted down the bipartisan Glass-Steagall restoration bill before advancing the push to washout financial reforms passed after last decade’s massive banking collapse.

The move, which wasn’t unexpected, means that the lower chamber will likely go ahead this week with considering conservatives’ Dodd-Frank replacement.

While Democrats on the committee asked for a roll call vote after the Dodd-Frank repeal advanced along party lines, they did not ask for votes to be recorded after the Glass-Steagall motion failed, signifying that the party did not want to attempt to embarrass those who voted against the proposal.

Glass-Steagall refers to Great Depression-era legislation, which segregated retail and investment banking. It was fully repealed by Congress and the Clinton administration in 1999.

Dodd-Frank refers to the 2010 law that created new mechanisms to oversee the banking sector. Republicans’ repeal bill, called the CHOICE Act, would take independence away from the Consumer Financial Protection Bureau and entirely rebrand the watchdog as the “Consumer Law Enforcement Agency.

The CHOICE Act would also nullify provisions of Dodd-Frank that allow regulators to break up failing banks without bailing them out. It would also exempt banks from many Dodd-Frank rules on prudence, if they can satisfy certain requirements on equity injections from investors.

Dutch-Russian cyber crime case reveals how the police tap the internet

About how signals intelligence agencies, like NSA and GCHQ, are intercepting communications, we learned a lot from the Snowden revelations, the German parliamentary inquiry, but also from new legislation in France, the Netherlands and the United Kingdom.

Much less is known about the practice of tapping by law enforcement, like for example the FBI and police forces. Now, a case from the Netherlands provides some interesting insights in how Dutch police intercepts internet communications - in a way that comes remarkably close to the bulk collection by intelligence agencies.

USS Liberty Attack by Israel Exposed by Alex Jones

Alex Jones exposes the agenda behind the Israeli attack on the USS Liberty June 8, 1967 .

50th Anniversary of Israel’s Infamous USS Liberty Attack

On June 8, during Israel’s preemptive Six-Day War, an act of aggression, not self-defense against regional Arab states, the IDF did the unthinkable.

It provocatively attacked its main ally, striking the USS Liberty intelligence gathering ship, in international waters about 25.5 nautical miles northwest of Egypt’s Sinai Peninsula in international waters.

The incident took 34 US lives, another 171 wounded, the vessel severely damaged, lucky to stay afloat.

It was deployed to monitor belligerents’ communications in response to Israeli aggression on Egypt, Jordan, Syria and Iraq – not the other way around.

Wednesday, June 7, 2017

James Comey’s statement posted on Senate intel panel’s website ahead of testimony to Congress

Former FBI Director James Comey will say Thursday that President Donald Trump asked him about the former national security adviser Michael Flynn and to "see your way clear to letting this go," according to a copy of his opening remarks posted online.

"He then said, 'I hope you can see your way clear to letting this go, to letting Flynn go. He is a good guy. I hope you can let this go,'" Comey said in remarks posted on the website of the Senate intelligence committee. "I replied only that 'he is a good guy.' (In fact, I had a positive experience dealing with Mike Flynn when he was a colleague as Director of the Defense Intelligence Agency at the beginning of my term at FBI.) I did not say I would 'let this go.'"

Comey also recalled a one-on-one dinner with Trump during which he told the president he would not be "'reliable,' in the way that politicians use that word" but would always give him the honest truth.

"A few moments later, the President said, 'I need loyalty, I expect loyalty,'" according to Comey. "I didn’t move, speak, or change my facial expression in any way during the awkward silence that followed. We simply looked at each other in silence."

See his full remarks

FBI covered up spying on Americans: Lawsuit

A former U.S. intelligence contractor tells Circa he walked away with more than 600 million classified documents on 47 hard drives from the National Security Agency and the CIA, a haul potentially larger than Edward Snowden's now infamous breach.

And now he is suing former FBI Director James Comey and other government figures, alleging the bureau has covered up evidence he provided them showing widespread spying on Americans that violated civil liberties.

The suit, filed late Monday night by Dennis Montgomery, was assigned to the same federal judge who has already ruled that some of the NSA's collection of data on Americans violates the U.S. Constitution’s Fourth Amendment, setting up an intriguing legal proceeding in the nation’s capital this summer.


Top Spies Stonewall Congress About Their Talks With Trump on James Comey and Russia

ON TUESDAY, PRESIDENT Donald Trump said that he would not invoke executive privilege to keep the public from hearing the truth from James Comey about his reported attempts to sideline the FBI’s investigation into his Russia ties. On Wednesday, it became clear why he might not have to. Four of America’s top intelligence and law enforcement officials stonewalled the issue of Trump’s reported interference with the investigation, despite a series of probing and sometimes heated questions from the Senate Intelligence Committee.

The reticence of the leaders of the National Security Agency, the Office of the Director of National Intelligence, and the FBI to discuss Trump’s behavior with their congressional overseers raises a larger issue. When Congress asks America’s spymasters an unclassified question, are they obliged to answer?

Not necessarily, according to Dan Coats, the director of national intelligence. Coats declined to address several questions about whether Trump had asked him if he could intervene in the FBI’s investigation of Trump’s Russia ties, as reported in detail by the Washington Post.

Tuesday, June 6, 2017

WikiLeaks Declares War on The Intercept

The FBI says a reporter led them to an NSA leaker. Julian Assange says that person, whom he suspects is an Intercept reporter, is a "menace" to sources, journalists, and democracy.

“If the FBI affidavit is accurate the reporter concerned must be named, shamed and fired by whomever they work for to maintain industry standards,” Assange said via Twitter direct message through the WikiLeaks account on Tuesday.
“Source burning reporters are a menace,” he said. “They chill trust in all journalists which impedes public understanding.”
WikiLeaks offered a $10,000 reward for information “leading to the public exposure & termination” of the reporter.

Fifty Years Later, NSA Keeps Details of Israel’s USS Liberty Attack Secret

This week marks the 50th anniversary of the assault on the USS Liberty, and though it was among the worst attacks in history against a non-combatant U.S. naval vessel, the tragedy remains shrouded in secrecy. The question of if and when Israeli forces became aware they were killing Americans has proved a point of particular contention in the on-again, off-again public debate that has simmered over the last half a century. The Navy Court of Inquiry’s investigation proceedings following the incident were held in closed sessions, and the survivors who had been on board received gag orders forbidding them to ever talk about what they endured that day.

Now, half a century later, The Intercept is publishing two classified documents provided in the cache of files leaked by NSA whistleblower Edward Snowden related to the attack and its aftermath. They reveal previously unknown involvement by Government Communications Headquarters, the U.K. signals intelligence agency; internal NSA communications that seem to bolster a signals-intelligence analyst’s account of the incident, which framed it as an accident; as well as a Hebrew transliteration system unique to the NSA that was in use at least as recently as 2006.

The first document, a formerly unreleased NSA classification guide, details which elements of the incident the agency still regarded as secret as of 2006. The second lists a series of unauthorized Signals Intelligence disclosures that “have had a detrimental effect on our ability to produce intelligence against terrorist targets and other targets of national concern.” Remarkably, information relevant to the attack on the Liberty falls within this highly secret category.

Though neither document reveals conclusive information about the causes of the assault, both highlight that at the time of their publication—approximately four decades after the incident—the NSA was determined to keep even seemingly minor details about the attack classified. The agency declined to comment for this article.

NSA Contractor Charged for Leak After Intercept Exposé Reveals Russian Cyberattack of 2016 Election

D-DAY June 6,1944

On June 6, 1944, more than 160,000 Allied troops landed along a 50-mile stretch of heavily-fortified French coastline, to fight Nazi Germany on the beaches of Normandy, France. Gen. Dwight D. Eisenhower called the operation a crusade in which, “we will accept nothing less than full victory.” More than 5,000 Ships and 13,000 aircraft supported the D-Day invasion, and by day’s end, the Allies gained a foot-hold in Continental Europe. The cost in lives on D-Day was high. More than 9,000 Allied Soldiers were killed or wounded, but their sacrifice allowed more than 100,000 Soldiers to begin the slow, hard slog across Europe, to defeat Adolf Hitler’s crack troops.

June 6, 1944 - Omaha Beach

Monday, June 5, 2017

Supreme Court to decide if a warrant is needed to track a suspect through cellphone records

The Supreme Court will decide next term whether law enforcement authorities need a warrant to track suspects through their cellphone records, the justices announced Monday.

The decision to accept the case involving cellphone tower records comes after lower courts have said that decades-old privacy rulings by the Supreme Court may need to be updated to account for society’s reliance on rapidly changing technology.

The case involves a convicted robber named Timothy Carpenter, who was found guilty partly on the basis of months of cellphone location records turned over without a warrant.

“Because cellphone location records can reveal countless private details of our lives, police should only be able to access them by getting a warrant based on probable cause,” said Nathan Freed Wessler, an American Civil Liberties Union lawyer representing Carpenter. “The time has come for the Supreme Court to make clear that the long-standing protections of the Fourth Amendment apply with undiminished force to these kinds of sensitive digital records.”

The Secret History of ISIS

Feds Charge NSA Contractor Accused of Exposing Russian Hacking

LEAKERS OF CLASSIFIED material and national security journalists alike know that publishing government secrets carries risks. But rarely have the revelation of a bombshell leak and the criminal charges against its source come in such quick succession—in the latest exposé of Russian election hacking, not much more than an hour apart.

The Department of Justice on Monday afternoon released a criminal complaint against Reality Leigh Winner, a 25-year-old intelligence contractor, accusing her of violating her top-secret security clearance to print and mail a classified document to the media early last month. That classified document appears to be the one published by the Intercept just hours earlier Monday.

In its complaint against Winner, an employee of a contractor firm called Pluribus assigned to an Augusta, Georgia government facility, the Justice Department writes that Winner removed the NSA report from her workplace on May 9, and mailed it to a news outlet. In its story Monday, the Intercept notes that it received the top-secret report on Russian election hacking from an anonymous source. Intercept reporters then shared the report, in some form, with intelligence officials at the Office of the Director of National Intelligence and the NSA prior to publication to discuss redacting any details that might be damaging to national security.

Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election

RUSSIAN MILITARY INTELLIGENCE executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept.

The top-secret National Security Agency document, which was provided anonymously to The Intercept and independently authenticated, analyzes intelligence very recently acquired by the agency about a months-long Russian intelligence cyber effort against elements of the U.S. election and voting infrastructure. The report, dated May 5, 2017, is the most detailed U.S. government account of Russian interference in the election that has yet come to light.

While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.

What We Didn't Learn At Bilderberg 2017

Sunday, June 4, 2017


The Trump administration has a large number of Council on Foreign Relations members and associates on staff, but you never hear about this. The propaganda media does not talk about it because many media people are members or former members.

Chuck Baldwin has posted a comprehensive list of CFR and Bilderberg members Trump has appointed:

Elaine Chao, United States Secretary of Transportation (CFR individual member)
Jay Clayton, Chair of the Securities and Exchange Commission (CFR corporate member)
Gary Cohn, Director of the National Economic Council (CFR corporate member)
Jamie Dimon, Member of Strategic and Policy Forum (CFR corporate member)
Jim Donovan, Deputy Treasury Secretary (CFR corporate member)
Larry Fink, Member of Strategic and Policy Forum (CFR corporate member)
Neil M. Gorsuch, Supreme Court Justice (individual CFR member)
Vice Admiral Robert S. Harward, National Security Advisor (declined appointment) (CFR corporate member)
Kevin Hassett, Chair of the Council of Economic Advisers (CFR fellow traveler)
Robert Wood “Woody” Johnson IV, United States Ambassador to the United Kingdom (individual CFR member)
Robert Lighthizer, United States Trade Representative (individual CFR member)
James Mattis, Secretary of Defense (Bilderberg attendee)
K.T. McFarland, Deputy National Security Adviser (individual CFR member)
Linda McMahon, Administrator of the Small Business Administration (CFR corporate member)
Army Lt. General Herbert Raymond “H. R.” McMaster, National Security Advisor (individual CFR member)
Jim McNerney, Member of Strategic and Policy Forum (CFR corporate member)
Steve Mnuchin, Secretary of the Treasury (CFR corporate member)
Indra Nooyi, Member of Strategic and Policy Forum (CFR corporate member, Bilderberg attendee)
Rick Perry, Secretary of Energy (Bilderberg attendee)
Dina Powell, Deputy National Security Advisor for Strategy (CFR corporate member)
Ginni Rometty, Member of Strategic and Policy Forum (CFR corporate member)
Stephen Schwarzman, Member of Strategic and Policy Forum (CFR corporate member)
Patrick Shanahan, Deputy Secretary of Defense (CFR corporate member)
Rex Tillerson, Secretary of State (CFR corporate member)
Jack Welch, Member of Strategic and Policy Forum (CFR corporate member)
Heather Ann Wilson, Secretary of the Air Force (individual CFR member)

EFF sues DOJ for information about alleged FBI-Geek Squad program

The Electronic Frontier Foundation filed a Freedom of Information Act lawsuit against the Department of Justice Wednesday after a months-long quest to obtain records regarding the FBI’s alleged use of Best Buy Geek Squad employees to search customer computers without warrants.

The lawsuit comes after a February FOIA request by EFF was denied by the FBI under grounds that the FBI will neither confirm nor deny the existence of records pertaining to an ongoing investigations. EFF also received no comment on a following administrative appeal.

EFF Civil Liberties Director David Greene told CyberScoop that the FBI had not yet commented on the lawsuit, which seeks to examine whether Geek Squad employees have acted on behalf of federal agents when searching customer computers, in which case a warrant is necessary, according to constitutional law.

Trump Administration Returns Copies of Report on C.I.A. Torture to Congress

Senators, spies and a president spent years in a pitched battle over how the history is told of one of the most controversial chapters of America’s campaign against terrorism, the detention and interrogation of prisoners in secret C.I.A. jails.

But recent moves by the Trump administration have increased the likelihood that much of what is known about the macabre humiliations that unfolded in those jails around the world will remain hidden from public view.

Congressional officials said on Friday that the administration had begun returning to Congress copies of a 6,700-page Senate report from 2014 about the C.I.A. program. The move raises the possibility that most of the copies could be locked in Senate vaults indefinitely or even destroyed — and increases the risk that future government officials, unable to read the report, will never learn its lessons.

The classified report is the result of a lengthy investigation into the program by Democrats on the Senate Intelligence Committee, telling the story of how — in the years after the Sept. 11, 2001, terrorist attacks — the C.I.A. began capturing terrorism suspects and interrogating them in secret prisons beyond the reach of the American judicial and military legal systems. The central conclusion of the report is that the spy agency’s interrogation methods — including waterboarding, sleep deprivation and other kinds of torture — were far more brutal and less effective than the C.I.A. described to policy makers, Congress and the public.

George Webb on The Richie Allen Show - 6/1/17

George Webb on The Alex Jones Show (6-2-17)

Saturday, June 3, 2017

Trump Supporters Hold Pointless Rally at Bilderberg Confab

Kurt Nimmo

A gaggle of Trump supporters has arrived in Chantilly, Virginia, at the Bilderberg meeting to protest against the globalists.

Problem is, Trump sent his top adviser, H.R. McMaster, his commerce secretary, Wilbur Ross, and strategist Chris Liddell to rub elbows with Henry Kissinger, Christine Lagarde of the IMF, the neocon Lindsey Graham, the king of the Netherlands, and dozens of banksters and corporatists.

Apparently, Trump supporters don’t have an issue with their leader’s minions talking with the elite.

Standing Rock Documents Expose Inner Workings of “Surveillance-Industrial Complex”

Leaked documents and public records reveal a troubling fusion of private security, public law enforcement, and corporate money in the fight over the Dakota Access Pipeline.

Friday, June 2, 2017


Today, June 1st 2017, WikiLeaks publishes documents from the "Pandemic" project of the CIA, a persistent implant for Microsoft Windows machines that share files (programs) with remote users in a local network. "Pandemic" targets remote users by replacing application code on-the-fly with a trojaned version if the program is retrieved from the infected machine. To obfuscate its activity, the original file on the file server remains unchanged; it is only modified/replaced while in transit from the pandemic file server before being executed on the computer of the remote user. The implant allows the replacement of up to 20 programs with a maximum size of 800 MB for a selected list of remote users (targets).

As the name suggests, a single computer on a local network with shared drives that is infected with the "Pandemic" implant will act like a "Patient Zero" in the spread of a disease. It will infect remote computers if the user executes programs stored on the pandemic file server. Although not explicitly stated in the documents, it seems technically feasible that remote computers that provide file shares themselves become new pandemic file servers on the local network to reach new targets.

Bilderberg 2017: secret meeting of global leaders could prove a problem for Trump

The annual gathering of government and industry elites will include a ‘progress report’ on the Trump administration. Will it get a passing grade?

The storm around Donald Trump is about to shift a few miles west of the White House, to a conference centre in Chantilly, Virginia, where the embattled president will be getting his end-of-term grades from the people whose opinion really matters: Bilderberg.

The secretive three-day summit of the political and economic elite kicks off on Thursday in heavily guarded seclusion at the Westfields Marriott, a luxury hotel a short distance from the Oval Office. The hotel was already on lockdown on Wednesday, and an army of landscapers have been busy planting fir trees around the perimeter, to protect coy billionaires and bashful bank bosses from any prying lenses.

Bilderberg 2017 Video Playlist

American Standoff: Aftermath

American Standoff: Aftermath is a new short form series that delves deeper into the personal lives of the characters and key issues surrounding the 2016 Malheur Standoff.

Episode 1: Finicum

After the death of Lavoy Finicum, the BLM cancelled the Finicum Ranch Grazing Permit. More than a year later, Lavoy's widow Jeanette is still trying to get the permit reinstated.

Episode 2: Recall

In May 2016, Harney County resident Kim Rollins succesfully collected enough signatures to validate his petition to force a recall vote of Judge Steve Grasty.

Thursday, June 1, 2017

Trump Destroys Carbon Tax Scam - Pulls Out of Paris Climate Accord - Full Speech

Trump Will Withdraw U.S. From Paris Climate Agreement

President Trump announced on Thursday that the United States would withdraw from the Paris climate accord, weakening efforts to combat global warming and embracing isolationist voices in his White House who argued that the agreement was a pernicious threat to the economy and American sovereignty.

In a speech from the Rose Garden, Mr. Trump said the landmark 2015 pact imposed wildly unfair environmental standards on American businesses and workers. He vowed to stand with the people of the United States against what he called a “draconian” international deal.

“I was elected to represent the citizens of Pittsburgh, not Paris,” the president said, drawing support from members of his Republican Party but widespread condemnation from political leaders, business executives and environmentalists around the globe.

No Agenda: Thursday (6-1-17) Episode 934 - Weaponized Tech

Unfilter 238 - The Panda Patriot (5-31-17)

Wednesday, May 31, 2017

Nearly two dozen Lucchese crime family members arrested

Top-ranking members of the Lucchese crime family – including ruling boss Matthew Madonna and his second-in-command Steven Crea Sr. – were busted Wednesday on federal racketeering charges, including murder, authorities said.

Madonna and underboss Crea Sr., aka “Wonder Boy,” as well as consigliere Joseph DiNapoli, and four others – Steven Crea Jr., Dominic Truscello, John “Big John” Castelucci and Tindaro “Tino” Corso – who served as captains or acting captains were among 19 charged in a superseding indictment unsealed Wednesday.

Soldiers Joseph Venice, James “Jimmy the Jew” Maffucci, Joseph “Big Joe” and “Joey Glasses” Datello, Paul “Paulie Roast Beef” Cassano, Christopher Londonio and several others were also nabbed.

The crew of goodfellas was allegedly behind the 2013 murder of Michael Meldish, a former leader of the notorious Purple Gang, who did jobs for the Lucchese and Genovese families.