Saturday, December 16, 2017

Glowing Auras and ‘Black Money’: The Pentagon’s Mysterious U.F.O. Program

In the $600 billion annual Defense Department budgets, the $22 million spent on the Advanced Aerospace Threat Identification Program was almost impossible to find.

Which was how the Pentagon wanted it.

For years, the program investigated reports of unidentified flying objects, according to Defense Department officials, interviews with program participants and records obtained by The New York Times. It was run by a military intelligence official, Luis Elizondo, on the fifth floor of the Pentagon’s C Ring, deep within the building’s maze.

The Defense Department has never before acknowledged the existence of the program, which it says it shut down in 2012. But its backers say that, while the Pentagon ended funding for the effort at that time, the program remains in existence. For the past five years, they say, officials with the program have continued to investigate episodes brought to them by service members, while also carrying out their other Defense Department duties.

The shadowy program — parts of it remain classified — began in 2007, and initially it was largely funded at the request of Harry Reid, the Nevada Democrat who was the Senate majority leader at the time and who has long had an interest in space phenomena. Most of the money went to an aerospace research company run by a billionaire entrepreneur and longtime friend of Mr. Reid’s, Robert Bigelow, who is currently working with NASA to produce expandable craft for humans to use in space.

On CBS’s “60 Minutes” in May, Mr. Bigelow said he was “absolutely convinced” that aliens exist and that U.F.O.s have visited Earth.

The Pentagon’s Secret Search for UFOs

Funded at the request of Harry Reid, the program probed a number of encounters military pilots had with aircraft they believed didn’t operate like anything they had seen before.

The Pentagon, at the direction of Congress, a decade ago quietly set up a multi-million dollar program to investigate what are popularly known as unidentified flying objects—UFOs.

The “unidentified aerial phenomena” claimed to have been seen by pilots and other military personnel appeared vastly more advanced than those in American or foreign arsenals. In some cases they maneuvered so unusually and so fast that they seemed to defy the laws of physics, according to multiple sources directly involved in or briefed on the effort.

The Advanced Aviation Threat Identification Program, whose existence was not classified but operated with the knowledge of an extremely limited number of officials, was the brainchild of then-Senate Majority Leader Harry Reid (D-Nevada), who first secured the appropriation to begin the program in 2009 with the support of the late Senators Daniel Inouye (D-Hawaii) and Republican Ted Stevens (R-Alaska), two World War II veterans who were similarly concerned about the potential national security implications, the sources involved in the effort said. The origins of the program, the existence of which the Pentagon confirmed on Friday, are being revealed publicly by POLITICO for the first time.

The Pentagon’s AATIP program marked a 21st century effort to replicate some of the decades of inconclusive research undertaken by the Pentagon in 1950s and 1960s to try to explain thousands of reported sightings of unidentified flying objects, or UFOs by military and civilian pilots and average citizens—particularly an effort known as Project Bluebook that ran from 1947 to 1969 and still a focus of intense interest for UFO researchers.

Thursday, December 14, 2017

WikiLeaks recognised as a 'media organisation' by UK tribunal

A British tribunal has recognised Julian Assange’s WikiLeaks as a “media organisation”, a point of contention with the United States, which is seeking to prosecute him and disputes his journalistic credentials.

The issue of whether Assange is a journalist and publisher would almost certainly be one of the main battlegrounds in the event of the US seeking his extradition from the UK.

The definition of WikiLeaks by the information tribunal, which is roughly equivalent to a court, could help Assange’s defence against extradition on press freedom grounds.

The US has been considering prosecution of Assange since 2010 when WikiLeaks published hundreds of thousands of confidential US defence and diplomatic documents. US attorney general Jeff Sessions said in April this year that the arrest of Assange is a priority for the US.

Dissecting the CIA’s lies regarding MKULTRA

One of the many interesting documents in Central Intelligence Agency’s declassified archives was guidance for public statements regarding their MKULTRA mind-control projects. The guidance, produced in 1983 and modified the following year, was intended for CIA’s Deputy Directors, the Executive Director, the Director of Public Affairs and “all Agency employees on the speaking circuit.” Just over a page long, the text is riddled with lies, errors, and half-truths, starting with the very first sentence.

The dates provided are misleading at best. MKULTRA officially began in 1953, but one of it’s partner programs, MKDELTA, had begun in 1952. Its predecessor programs had begun as early as 1949, judging by CIA’s index of “MKULTRA and behavioral research” documents. It’s impossible to know much about what happened before that in MKULTRA’s predecessor projects BLUEBIRD and ARTICHOKE, as an Agency memo notes that “almost no information [is] available for the period prior to 1952.”

The same memo noted that the records described “only a small part” of the program. MKULTRA also didn’t end in 1964 so much as it changed its name to MKSEARCH. Other MKULTRA subprojects weren’t transferred to MKSEARCH, but rather simply incorporated into the Agency’s general research and funding programs. According to John Marks’ book on the subject, “Gottlieb acknowledged that security did not require transferring all the surviving MKULTRA subprojects over to MKSEARCH. He moved 18 subprojects back into regular Agency funding channels.”

No Agenda: Thursday (12-14-17) Episode 990 - Skin Folk

Unfilter 263 - Unreliable Sources (12-13-17)

F.C.C. Repeals Net Neutrality Rules

The Federal Communications Commission voted on Thursday to dismantle landmark rules regulating the businesses that connect consumers to the internet, granting broadband companies power to potentially reshape Americans’ online experiences.

The agency scrapped so-called net neutrality regulations that prohibited broadband providers from blocking websites or charging for higher-quality service or certain content. The federal government will also no longer regulate high-speed internet delivery as if it were a utility, like phone services.

The action reversed the agency’s 2015 decision, during the Obama administration, to better protect Americans as they have migrated to the internet for most communications.

Ajit Pai, the chairman of the commission, said the rollback of the rules would eventually help consumers because broadband providers like AT&T and Comcast could offer people a wider variety of service options. Mr. Pai was joined in the 3-to-2 vote by his two fellow Republican commissioners.

Ryan Dawson on Michael Flynn, Israel-gate and War Profiteers - Our Interesting Times Podcast

Wednesday, December 13, 2017

The Shady Bank Where This Russian NBA Owner Stashed Money

The Russian oligarch who owns the Brooklyn Nets basketball team stashed money in a bank the U.S. Treasury Department has accused of facilitating money laundering, weapons proliferation, sanctions evasion, organized crime, and financing a terror group, a report obtained by The Daily Beast reveals.

Mikhail Prokhorov, whose fortune is estimated at nearly $9 billion, ran for president of Russia against Vladimir Putin in 2012 in a stage-managed campaign sanctioned by the Kremlin.

As the sole owner of the Barclays Center sports arena in Brooklyn, he has dined with the likes of Jay-Z and former New York City Mayor Michael Bloomberg. He’s a frequent guest at the Four Seasons Hotel and is a fixture on the New York social scene.

But a 2014 “confidential” report written by the Central Bank of Cyprus (CBC) found that the wealthy Russian, a so-called politically exposed person—finance parlance for government officials, candidates, and their relatives who are deemed to be at a higher risk of bribery or money laundering—kept 23 accounts at FBME Bank Ltd., formerly known as the Federal Bank of the Middle East.

All 23 of the Prokhorov accounts had been set up by “front men,” according to the CBC report, and FBME was found not to have complied with Cyprus’ own anti-money-laundering law in accepting the deposits.

The bank was shuttered in May of this year following a U.S. Treasury Department statement noting that it was used to facilitate a host of international financial crimes, including money laundering on behalf of sanctioned regimes and non-state actors.

Legal Aid Demands Info on NYC’s Use of Social Monitoring

The Legal Aid Society has sued the Manhattan district attorney for refusing to divulge whether he buys information from social-media companies as a way to track civil rights protesters and conduct other “social monitoring.”

Though the district attorney’s office is the only defendant in the Article 78 Petition, the nonprofit Legal Aid Society specifically asks for information on “the extent to which the state of New York and New York City employ the services of Geofedia, Inc., Media Sonar Technologies Inc., and X1 Discover, Inc.”

“These companies collect data from social media websites and applications and then sell that data to government law-enforcement agencies,” the complaint continues.

District Attorney Cyrus Vance gave a Glomar response to Legal Aid’s request under Freedom of Information Law: It refused to say whether the requested data even existed.

According to the Dec. 8 complaint in New York County Supreme Court: “Geofeedia has, according to the ACLU, signed agreements with more than 500 law enforcement agencies. In response to invasion-of-privacy concerns, Facebook, Twitter, and Instagram have stated that they have cut off Geofeedia’s access to their information.”

Geofeedia allegedly has financial support from by In-Q-Tel, the CIA’s venture capital firm. The ACLU has accused it of targeting black political activists as “overt threats” while monitoring protests for law enforcement agencies.

China Gathering DNA, Iris Scans For Massive Database Of Millions In Muslim Province

Chinese police have started gathering blood types, DNA samples, fingerprints and iris scans from millions of people in its Muslim-majority Xinjiang province to build a massive citizen database, according to report by activist group Human Rights Watch.

The report, published Wednesday, said officials are collecting the data from citizens between the ages of 12 and 65 years old using a variety of methods. Authorities are gathering DNA and blood types through free medical checkups, and HRW said it is was unclear if patients were aware that their biometric data was being collected for the police during these physical exams.

“Xinjiang authorities should rename their physical exams project ‘Privacy Violations for All,’ as informed consent and real choice does not seem to be part of these programs,” said Sophie Richardson, China director at HRW.

“The mandatory databanking of a whole population’s biodata, including DNA, is a gross violation of international human rights norms, and it’s even more disturbing if it is done surreptitiously, under the guise of a free health care program,” she added.

He’s in charge: FBI file reveals Alexander Haig as architect of the Saturday Night Massacre

File lends credence to theory that Haig manipulated Nixon into disastrous Watergate firings that helped end his Presidency

Although much of the file focuses on standard background issues and threats against the general several new facts stand out. One section, in particular, sheds new light on the Watergate scandal and the ensuing Saturday Night Massacre.

The Saturday Night Massacre refers to the firing of independent special prosecutor Archibald Cox, followed by Attorney General Elliot Richardson and Deputy Attorney General Ruckelshaus, which resulted from the fight over the White House tapes and President Nixon’s refusal to simply hand them over. This provoked an additional wave of backlash against Nixon, and ultimately proved to be his undoing, as it was seen as one attempt too many to interfere with the investigation.

At the time, outrage focused on Nixon, but over the years, various journalists and historians have reexamined the matter and found that many of the threads pointed back to General Haig, in his role as White House Chief of Staff, as one of the primary people behind the firing. However, relatively little documentary evidence was available to support this conclusion. Haig’s FBI file, however, provides one of the crucial missing pieces.

The file reveals that Haig personally ordered the Bureau’s surveillance on the offices of the victims of the Saturday Night Massacre, and later rescinded the order when it had served its purpose. The surveillance itself was reported at the time, with an official and vague comment from the FBI as early as the Sunday afterward. The New York Times reported at the time that an FBI representative said that the surveillance was “at the request of the White House.”

Evidence points to Bitcoin being an NSA-engineered psyop to roll out one-world digital currency

It’s now becoming increasingly evident that Bitcoin may be a creation of the NSA and was rolled out as a “normalization” experiment to get the public familiar with digital currency. Once this is established, the world’s fiat currencies will be obliterated in an engineered debt collapse (see below for the sequence of events), then replaced with a government approved cryptocurrency with tracking of all transactions and digital wallets by the world’s western governments.

NSA mathematicians detailed “digital cash” two decades ago

What evidence supports this notion? First, take a look at this document entitled, “How to make a mint: The cryptography of anonymous electronic cash.” This document, released in 1997 — yes, twenty years ago — detailed the overall structure and function of Bitcoin cryptocurrency.

Who authored the document? Try not to be shocked when you learn it was authored by “mathematical cryptographers at the National Security Agency’s Office of Information Security Research and Technology.”

The NSA, in other words, detailed key elements of Bitcoin long before Bitcoin ever came into existence. Much of the Bitcoin protocol is detailed in this document, including signature authentication techniques, eliminating cryptocoin counterfeits through transaction authentication and several features that support anonymity and untraceability of transactions. The document even outlines the heightened risk of money laundering that’s easily accomplished with cryptocurrencies. It also describes “secure hashing” to be “both one-way and collision-free.”

Although Bitcoin adds mining and a shared, peer-to-peer blockchain transaction authentication system to this structure, it’s clear that the NSA was researching cryptocurrencies long before everyday users had ever heard of the term. Note, too, that the name of the person credited with founding Bitcoin is Satoshi Nakamoto, who is reputed to have reserved one million Bitcoins for himself. Millions of posts and online threads discuss the possible identity of Satishi Nakamoto, and some posts even claim the NSA has identified Satoshi. However, another likely explanation is that Satoshi Nakamoto is the NSA, which means he is either working for the NSA is is a sock puppet character created by the NSA for the purpose of this whole grand experiment.

Deep State’s Merry Christmas To America: Surveillance That Never Ends

As it now stands, Section 702 of the Foreign Intelligence Surveillance Act—the legal basis for two of the National Security Agency’s largest mass surveillance programs, “PRISM” and “Upstream”—is set to expire at the end of 2017.

“PRISM” lets the NSA access emails, video chats, instant messages, and other content sent via Facebook, Google, Apple and others. “Upstream” lets the NSA worm its way into the internet backbone—the cables and switches owned by private corporations like AT&T that make the internet into a global network—and scan traffic for the communications of tens of thousands of individuals labeled “targets.”

Just as the USA Patriot Act was perverted from its original intent to fight terrorism abroad and was used instead to covertly crack down on the American people (allowing government agencies to secretly track Americans’ financial activities, monitor their communications, and carry out wide-ranging surveillance on them), Section 702 has been used as an end-run around the Constitution to allow the government to collect the actual content of Americans’ emails, phone calls, text messages and other electronic communication without a warrant.

Under Section 702, the government collects and analyzes over 250 million internet communications every year. There are estimates that at least half of these contain information about U.S. residents, many of whom have done nothing wrong. This information is then shared with law enforcement and “routinely used for purposes unrelated to national security.”

Mind you, this is about far more than the metadata collection that Edward Snowden warned us about, which was bad enough. Section 702 gives the government access to the very content of your conversations (phone calls, text messages, video chats), your photographs, your emails. As Rep. Thomas Massie, R-Ky., warned, “This is not just who you send it to, but what’s in it.”

Tuesday, December 12, 2017

North Korea Has Been Developing Biological Weapons for Over a Decade

Here’s how to shut down the internet: Snip undersea fiber-optic cables

Hundreds of thousands of miles of fiber-optic cable lay on the ocean floors, a crucial part of the global internet’s backbone, and only rarely do ship anchors, undersea landslides or saboteurs disrupt them.

Still, a few voices now call for stronger global mechanisms and even military action to protect the cables against future malicious activity by states, saboteurs or extremists.

“The infrastructure that underpins the internet – these undersea cables – are clearly vulnerable,” said Rishi Sunak, a British member of Parliament and champion of more vigorous action to protect submarine networks. “They underpin pretty much everything that we do.”

Undersea cables conduct nearly 97 percent of all global communications, and every day an estimated $10 trillion in financial transfers and vast amounts of data pass through the seabed routes. Satellites, once crucial but now limited in speed and bandwidth, handle only a tiny percentage of global communications.

Monday, December 11, 2017

Sibel Edmonds Visits the Infowars Studio - Alex Jones Show (12-11-17)

The U.S. Has Way Too Many Secrets

How much does it cost to keep a secret? Well, the U.S. government sort of has an answer: $16.89 billion. That's how much it spent in 2016 to classify information that it deems too sensitive to be released to the public. Some secrets are worth keeping, of course -- like how to cook up chemical weapons, for instance. But others, less so. Rodney McDaniel, a top National Security Council official during the administration of President Ronald Reagan, estimated that only 10 percent of classification was for the "legitimate protection of secrets." Former New Jersey Governor Tom Kean, a head of the 9/11 commission, said that "three quarters of what I read that was classified should not have been." In fact, he argued that overclassification had left the U.S. more vulnerable to the 9/11 attacks. And that's to say nothing of its everyday effects on government accountability and efficiency, congressional oversight and public awareness.

Shortly after the government released a trove of documents on the assassination of John F. Kennedy, I sat down with Tom Blanton, the director of the National Security Archive, to talk about America's dysfunctional mechanisms for classifying and declassifying information. Here, in an edited transcript, he weighs in on why historians should be extra-grateful for Hillary Clinton's private server; what really needs to be declassified; and how history is likely to judge Julian Assange, Edward Snowden and Chelsea Manning.

The interagency CACTUS program served as the conduit between CIA’s Operation CHAOS and FBI’s COINTELPRO

Even after each agecy’s domestic surveillance programs ended, the CACTUS channel continued their efforts and monitored “the idea of corporate complicity” in American imperialism

A little known but extremely important part of the history of domestic surveillance by intelligence agencies is the CACTUS program. CACTUS was a highly classified channel used by agencies like the Central Intelligence Agency and the Federal Bureau of Investigation to transmit information about “the New Left, Black Militants and related matters.” This channel was never disclosed in the Church Committee reports, even when the reports discuss information that was transmitted through CACTUS.

A review of the available documents also indicates that the program is older than previous FOIA releases indicate, with one federal judge questioning CIA’s good faith in processing FOIA requests relating to the CACTUS channel when the Agency declared it was “still utilized” in the mid-1980s.

Bloomberg: The Bank For International Settlements Is ‘A Bastion Of Global Technocracy’

The BIS is arguably the most powerful group of central bankers in the world, who collectively dominate the entire monetary system. Bloomberg rightly calls the BIS a ‘bastion of global Technocracy.” I think the world had better get a clue as to what this means before it’s too late to do anything about it. ⁃ TN Editor

There’s a changing of the guard at the Bank for International Settlements, the little-known but influential organization that sits at the heart of the world’s financial system.

Agustin Carstens, the former head of Mexico’s central bank, will succeed Jaime Caruana as general manager on Friday. He’s taking charge of an institution that stands out, in an age of increasing transparency and growing disillusionment with elites, as a bastion of global technocracy.

The BIS headquarters towers over Basel like a 70-meter stack of copper coins, serving as a clubhouse for the world’s central bankers and financial rule makers. The likes of Mario Draghi, Janet Yellen and Mark Carney routinely hold confidential gatherings there with colleagues from around the globe.

Saturday, December 9, 2017

The U.S. Media Yesterday Suffered its Most Humiliating Debacle in Ages: Now Refuses All Transparency Over What Happened

FRIDAY WAS ONE of the most embarrassing days for the U.S. media in quite a long time. The humiliation orgy was kicked off by CNN, with MSNBC and CBS close behind, with countless pundits, commentators and operatives joining the party throughout the day. By the end of the day, it was clear that several of the nation’s largest and most influential news outlets had spread an explosive but completely false news story to millions of people, while refusing to provide any explanation of how it happened.

The spectacle began on Friday morning at 11:00 am EST, when the Most Trusted Name in News™ spent 12 straight minutes on air flamboyantly hyping an exclusive bombshell report that seemed to prove that WikiLeaks, last September, had secretly offered the Trump campaign, even Donald Trump himself, special access to the DNC emails before they were published on the internet. As CNN sees the world, this would prove collusion between the Trump family and WikiLeaks and, more importantly, between Trump and Russia, since the U.S. intelligence community regards WikiLeaks as an “arm of Russian intelligence,” and therefore, so does the U.S. media.

There was just one small problem with this story: it was fundamentally false, in the most embarrassing way possible. Hours after CNN broadcast its story – and then hyped it over and over and over – the Washington Post reported that CNN got the key fact of the story wrong.

FBI leadership claimed Bureau was “almost powerless” against KKK, despite making up one-fifth of its membership

In testimony before the Church Committee, the Federal Bureau of Investigation’s Deputy Director acknowledged that the Bureau at one point made up as much as one-fifth of the Klu Klux Klan’s total membership - but were still powerless to curtail the KKK’s violence. His testimony also acknowledged police participation in said violence, and that the Bureau had three times as many “ghetto informants” as they did those targeting white supremacist domestic terrorists.

In response to a FOIA request filed several months ago for the SENSTUDY 75 file, pertaining to the Church Committee, the FBI recently released a preprocessed file (apparently unable to provide even preprocessed documents within the time period required by the law) that includes excerpts of testimony from Deputy Associate Director James Adams addressing the Bureau’s involvement with, and failure to curtail, the KKK. Before finishing his first sentence in the excerpted testimony, Adams had offered somewhat misleading information in stating that the COINTELPRO efforts had been discontinued in 1971.

New cars to be equipped with ‘complimentary’ TSA PreCheck biometric scanners

I cannot believe what I am writing, the TSA has officially invaded auto manufacturing.

According to a Lincoln Motor Company media release, their 2018 Lincoln's will offer 'complimentary' CLEAR biometric memberships to new car owners.

"Working with CLEAR, Lincoln takes effortless travel to the next level, offering complimentary memberships for new Lincoln owners."

Lincoln owners and their passengers, wishing to travel to the airport or sports arenas will have the 'complimentary' pleasure of being spied on by DHS!

Friday, December 8, 2017

The Assassination of John Lennon - Jack Blood

John Lennon Assassination Coverage - Howard Hoffman - WABC 77 New York - Dec 9, 1980

WABC 77 New York - Night of John Lennon Coverage - Howard Hoffman - Dec 9 1980. Reaction just hours after the passing of John Lennon.

The Assassination of John Lennon - Mae Brussell

Why Did the Top Army Officer in the U.S. Do So Little in Response to the 9/11 Attacks?

General John M. "Jack" Keane was the most senior Army officer in the United States on September 11, 2001. Working at the Pentagon, he was ideally placed to respond promptly and effectively to the terrorist attacks that day. And yet he appears to have done alarmingly little while the attacks were underway.

The only action he has recalled taking after learning about the crashes at the World Trade Center was ordering that the Army Operations Center (AOC) at the Pentagon be brought up to full manning. He apparently did not order the activation of the Army's Crisis Action Team (CAT), even though this was designed for dealing with emergencies like the one taking place at the time.

When the Pentagon was hit, more than 50 minutes after the attacks began, Keane initially spent time helping people get out of the building--a task that anyone could have performed--instead of carrying out his duties as head of the Army. He only went to the AOC, a facility that was ideally equipped for dealing with the crisis, when one of his staffers pointed out that he should "leave the recovery to other people" and go and "take command of the Army."

We need to consider why Keane, despite being an experienced military man, apparently performed very poorly in response to the crisis on September 11. Was his inaction due to incompetence or was there a more sinister reason for it? Might he have been confused because he mistook actual events for simulations, as part of a training exercise? Might he even have been to some degree complicit in what happened and so his inaction was intended to help ensure that the military was unable to stop the attacks before the targets were hit?

Keane was one of a number of key officials who surely had essential duties to perform in coordinating the military's response to the 9/11 attacks but failed to get properly involved in responding to the crisis until it was too late to make a difference to the outcome of the attacks. His actions on September 11, though, have so far avoided serious scrutiny. We therefore need to examine what he did, and what he failed to do, while the attacks were underway.

Privacy Battle Brewing: Are LinkNYC Kiosks Surveillance Devices?

In 2016 LinkNYC began deploying free public Wi-Fi kiosks throughout the city.

The kiosks made news when people began using the public web browsers to watch pornography, and CityBridge the private consortium administering LinkNYC limited the browsers, and made other changes to limit how LinkNYC would store personal browser history, time spent on a particular website, and lacked clarity about how LinkNYC would handle government demands for user data, among others issues.

But now there’s a new battle brewing. It seems that each of the LinkNYC kiosks has front-facing cameras.

Starting on a number of blocks on the Upper West Side, an unknown number of digital protesters has begun to adhere yellow post-it-notes onto the Kiosks, effectively blocking the camera’s view.

Then, late a night, a van marked LinkNYC drives up Broadway were a worker with a long stick with a scraper clears the Post-its. But within days, the Post-Its return.

Thursday, December 7, 2017

Unfilter 262 - Premature Collusion (12-6-17)




No Agenda: Thursday (12-7-17) Episode 988 - Don's Dentures

The attack on Pearl Harbor: Unforgettable photos of the bombing

December 7, 1941. “A date,” President Franklin D. Roosevelt told the nation, “which will live in infamy.” The surprise attack by the Japanese on Pearl Harbor began at 7:55 a.m. Hawaii time under a clear sky — perfect conditions for the swarms of Japanese fighter pilots to drop their bombs.

On Pearl Harbor Day, browse the archives of the agency it helped create

CIA was born of the disaster wrought on the day that would live in infamy

As Americans were waking up on this day 76 years ago, they were entering a new phase of the United States in the world. After the Japanese attack on Pearl Harbor, the country set out on a trajectory that would bring it to drop an atomic weapon, become the global superpower, and firmly embed itself in the domestic affairs of foreign countries, often through the use of a new organization: the Central Intelligence Agency.

Materials in the CIA’s CREST database, which contains declassified materials older than 25 years, date back to this early time, to the days when the CIA was still the Office of Strategic Services and includes multiple reports on the Agency’s attempts to evaluate its mission and execution, including an early one, dated January 1949, from soon-to-be Director of Central Intelligence Allen Dulles.

Wednesday, December 6, 2017

Major concealed-carry bill picks up momentum, steams toward House floor

Gun-rights supporters are eyeing a big win this week as a bill that would make concealed-carry permits valid across state lines heads to the House floor -- though it faces long odds in the Senate amid deep-pocketed opposition from gun-control advocates.

“This is just simple, common-sense legislation that says if you’re a law-abiding citizen … we’re not going to turn you into a criminal just for crossing an invisible state line,” bill sponsor Rep. Richard Hudson, R-N.C., told “Fox News @ Night.”

Hudson says the bill simply attempts to clarify the patchwork of state laws that confuse citizens who can unwittingly get arrested when traveling from state to state.

“All I’m saying is, when I cross the state line, I don’t want to automatically become a criminal,” he said.

The three-term congressman also is quick to point out the measure does not attempt to usurp state and local authority with federal law, nor does it ease background checks on gun purchases.

The bill has 213 cosponsors, including three Democrats, and backing from 24 state attorneys general.

Trump Recognizes Jerusalem as Israel’s Capital and Orders U.S. Embassy to Move

President Trump on Wednesday formally recognized Jerusalem as the capital of Israel, reversing nearly seven decades of American foreign policy and setting in motion a plan to move the United States Embassy from Tel Aviv to the fiercely contested Holy City.

“Today we finally acknowledge the obvious: that Jerusalem is Israel’s capital,” Mr. Trump said from the Diplomatic Reception Room of the White House. “This is nothing more or less than a recognition of reality. It is also the right thing to do. It’s something that has to be done.”

The president cast his decision as a break with decades of failed policy on Jerusalem, which the United States, along with virtually every other nation in the world, has declined to recognize as the capital since Israel’s founding in 1948. That policy, he said, brought us “no closer to a lasting peace agreement between Israel and the Palestinians.”

FBI releases first part of its files on Charles Manson

Release consists largely of previously-processed collections of clippings from the days after the Tate-LaBianca murders

After nearly half a century as one of the most notorious criminal masterminds in the popular imagination, Charles Manson, 83, passed away last month in a Kern County hospital bed, just a few hours drive from the infamous Barker Ranch, where he had lived with his “Family,” from the Beverly Hills house where that Family had ended the lives of a Hollywood starlet and her friends, and from the prison that had served as his home for the last three decades.

On Friday, the Federal Bureau of Investigation released the first part of its files on the famed cult leader, which focuses primarily on the confusion that followed the August 1969 murders of the pregnant actress Sharon Tate, five of her friends, and another couple.

Tuesday, December 5, 2017

Anatomy of a CIA Assassination: How it Went Down

Was Mary Pinchot Meyer killed in an intricate, CIA-conducted operation like something out of the old television show, Mission Impossible?

Did Meyer, who was President John F. Kennedy’s mistress, know too much about his assassination, and about the organization she believed was involved? Her own husband, Cord Meyer, was in charge of a CIA division that was involved in, among other things, assassinations, according to Peter Janney.

Janney, who has spent nearly a lifetime researching the murder of this woman, came upon the most intriguing stories from alleged witnesses, and these stories create a plausible picture of not only why she was murdered — but how. The excerpt below is about the how.

We don’t know if this is what really happened to Meyer, but we think it possibly could have, and that is grimly fascinating.

Much has been written about the kinds of chicanery US intelligence agencies have been up to, so I see no need to elaborate here. But I do want to share with you one of the more bizarre tricks they planned, but never had the occasion to execute: Operation Dirty Trick — which was revealed by declassified documents in 1997. As described by the Washington Post,

the idea was ‘to provide irrevocable proof that, should the MERCURY manned orbit flight fail, the fault lies with the Communists et al Cuba.’ This could be accomplished, the planners suggested in a Feb. 2, 1962, memo, ‘by manufacturing various pieces of evidence which would prove electronic interference on the part of the Cubans.’

If the Agency had been able to manufacture “irrevocable proof” that Castro caused the space flight to fail — then it’s not so hard to believe they could manufacture “proof” that a poor black laborer murdered Mary Meyer, a troublesome woman who was asking too many questions about the Kennedy assassination.

The excerpt below is from Chapter 12 of Mary’s Mosaic: The CIA Conspiracy to Murder John F. Kennedy, Mary Pinchot Meyer, and Their Vision for World Peace, Third Edition (Skyhorse Publishing, 2016).

Trump White House Weighing Plans for Private Spies to Counter “Deep State” Enemies

THE TRUMP ADMINISTRATION is considering a set of proposals developed by Blackwater founder Erik Prince and a retired CIA officer — with assistance from Oliver North, a key figure in the Iran-Contra scandal — to provide CIA Director Mike Pompeo and the White House with a global, private spy network that would circumvent official U.S. intelligence agencies, according to several current and former U.S. intelligence officials and others familiar with the proposals. The sources say the plans have been pitched to the White House as a means of countering “deep state” enemies in the intelligence community seeking to undermine Donald Trump’s presidency.

The creation of such a program raises the possibility that the effort would be used to create an intelligence apparatus to justify the Trump administration’s political agenda.

“Pompeo can’t trust the CIA bureaucracy, so we need to create this thing that reports just directly to him,” said a former senior U.S. intelligence official with firsthand knowledge of the proposals, in describing White House discussions. “It is a direct-action arm, totally off the books,” this person said, meaning the intelligence collected would not be shared with the rest of the CIA or the larger intelligence community. “The whole point is this is supposed to report to the president and Pompeo directly.”

Company to collect brain wave data on 1.2 mil students in the classroom

Data-mining is the new gold rush, with student data (which is sometimes referred to as human capital) forming the new mountain for conquest. Classrooms are the new West and grant money is the new pickaxe. Big Money, Big Tech, Big Philanthropies and start-up companies, along with the Big State comprise the ranks of the 21st Century’s “forty-niners.” Regardless of who is doing the mining and the collecting of our human capital – the Big State and its Big Beaurocracy, educational venture capitalists/companies like Knewton and DreamBox, Big Tech companies like Amazon and Google, or “venture philanthropists” like Zuckerberg and Gates with their infamous “schoolhouse commercialization” – this get-rich-quick scheme will inevitably have big consequences for student privacy and for the civilian-to-government, government-to-civilian relationship going forward.

The technology: One company among modernity’s forty-niners is BrainCo, Inc. which has created a headband to measure and collect students’ brain waves, or EEG’s. Data collected will then be sent to a teacher dashboard as part of the company’s FocusEDU program. The company purports the technology measures students’ level of attention, and claims that the EEG data collected will help teachers and administrators determine when each student is paying attention during a lesson and/or activity.

China, where the communist regime is always in search of new ways to spy on and, thus, manipulate its citizenry into submission, has ordered 20,000 of these devices. “Our goal with the first 20,000 devices, each of which will be used by multiple students in schools, is to capture data from 1.2 million people,” stated the CEO of BrainCo. “This will enable us to use artificial intelligence on what will be the world’s largest database to improve our algorithms for things like attention and emotion detection.” A school in Long Island is set to roll-out a trial of the headbands this year.

Monday, December 4, 2017

Apple Agrees to Deal With Ireland Over $15 Billion Unpaid Tax Issue

EU said tax deal with Ireland had allowed Apple to pay almost zero tax on European profits between 2003 and 2014

Ireland will begin collecting €13 billion ($15.46 billion) in back taxes from Apple Inc. as soon as early next year after both sides agreed to the terms of an escrow fund for the money, Ireland’s finance chief said Monday.

The European Union in 2016 ordered Dublin to retrieve the billions of euros from Apple in uncollected taxes, which the EU said Apple avoided paying with the help of sweetheart tax deals from Ireland.

Is Your DJI Drone a Chinese Spy? Leaked DHS Memo Suggests

The United States Department of Homeland Security (DHS) has recently accused Da-Jiang Innovations (DJI), one of the largest drone manufacturers, of sending sensitive information about U.S. infrastructure to China through its commercial drones and software.

A copy memo from the Los Angeles office of the Immigration and Customs Enforcement bureau (ICE) has begun circulating online more recently, alleging "with moderate confidence" that DJI drones may be sending US critical infrastructure and law enforcement data back to China.

However, the bureau accessed "with high confidence" that this critical data collected by the DJI systems could then be used by the Chinese government to conduct physical or cyber attacks against the U.S. critical infrastructure and its population.

The memo goes on to specify the targets the Chinese Government has been attempting to spy on, which includes rail systems, water systems, hazardous material storage facilities, and construction of highways, bridges, and rails.

The memo, marked as "unclassified/law enforcement sensitive," was dated back to August this year, but was recently published by the Public Intelligence project.

Revisiting the Cell Site Simulator Census

The controversial devices continue to make headlines and pose important questions - help us find the answers">The controversial devices continue to make headlines and pose important questions - help us find the answers

In light of an Associated Press article discussing cell site simulators (also known as IMSI catchers, or more commonly by the name of the most popular model, the StingRay), we wanted to revisit our Cell Site Simulator Census Project. Last year we were able to receive documents from dozens of law enforcement agencies across the country which have purchased the controversial devices, and even managed to get our hands on a rare usage log from the Virginia State Police.

Sunday, December 3, 2017

Carbon Taxes Will Increase, Not Decrease, Global Carbon Emissions

As the hysteria over global warming heats up, carbon taxes have become the “cool” option. Environmentalists love them. So do politicians, who are more than happy to raise taxes while scoring political points.

Carbon taxes, or other analogous pricing schemes, are now prevalent in Western Europe, and are making headway in North America. For example, California recently joined forces with the Canadian Provinces of Ontario and Quebec to create an integrated cap-and-trade carbon market.

On top of this, many well-known economists support carbon taxes, thinking they’re the best way to mitigate man’s contribution to climate change. A new report written by thirteen leading economists under the direction of professors Nicholas Stern and Joseph Stiglitz—who won a Nobel Prize in 2001—recommends the adoption of a global carbon tax.

The tax would value carbon emissions somewhere between 50 and 100 USD per ton by 2030, and would cost upwards of $4 trillion. Theoretically, the tax would raise the cost of using carbon-intensive sources of energy, thereby nudging producers to switch from fossil fuels to “green energy” sources like wind and solar power. Likewise, it would raise the cost of electricity, thus creating an incentive to use energy more efficiently.

This makes sense in theory. There’s just one problem. It won’t work.

No Agenda: Sunday (12-3-17) Episode 987 - Kebab Panic!

Friday, December 1, 2017


Former N.S.A. Employee Pleads Guilty to Taking Classified Information

A former National Security Agency employee admitted on Friday that he had illegally taken from the agency classified documents believed to have subsequently been stolen from his home computer by hackers working for Russian intelligence.

Nghia H. Pho, 67, of Ellicott City, Md., pleaded guilty to one count of willful retention of national defense information, an offense that carries a possible 10-year sentence. Prosecutors agreed not to seek more than eight years, however, and Mr. Pho’s attorney, Robert C. Bonsib, will be free to ask for a more lenient sentence. He remains free while awaiting sentencing on April 6.

But in court documents, prosecutors did disclose that he worked from 2006 to 2016 for the N.S.A.’s “Tailored Access Operations.” The unit, whose name has now been changed to Computer Network Operations, is the N.S.A.’s fastest-growing component. Its hackers break into foreign computer networks to gather intelligence, often leaving behind software implants that continue to collect documents and other data and forward it to the agency for months or years.

Prosecutors said that from 2010 until March 2015, Mr. Pho began removing classified documents and writings. He kept those materials, some in digital form, at his home in Maryland, according to prosecutors.

It appears he was charged in March 2015.

Mr. Pho is one of three N.S.A. workers to be charged in the past two years with mishandling classified information, a dismal record for an agency that is responsible for some of the government’s most carefully guarded secrets.

William Binney Discusses The Surveillance State - Real News w/David Knight (12-1-17)

William Binney — What he told CIA Director Pompeo about “Russian Hack” & his message to the American people on the dangers of “The New Praetorian Guard” of the surveillance state turning inward & turning political.

Thursday, November 30, 2017

How A North Korean EMP Attack Could Kill Millions And Turn America Into A Post-Apocalyptic Wasteland

This is why North Korea’s test of an intercontinental ballistic missile is so important. North Korea had test fired a total of 22 missiles so far this year, but this latest one showed that nobody on the globe is out of their reach. In fact, General Mattis is now admitting that “North Korea can basically threaten everywhere in the world”, and that includes the entire continental United States. In addition to hitting individual cities with nukes, there is also the possibility that someday North Korea could try to take down the entire country with an EMP attack.

If the North Koreans detonated a single nuclear warhead several hundred miles above the center of the country, it would destroy the power grid and fry electronics from coast to coast.

I would like you to think about what that would mean for a few moments. Suddenly there would be no power at home, at work or at school. Since nearly all of our vehicles rely on computerized systems, you wouldn’t be able to go anywhere and nobody would be able to get to you. And you wouldn’t be able to contact anyone because all phones would be dead. Basically, pretty much everything electronic would be dead. I am talking about computers, televisions, GPS devices, ATMs, heating and cooling systems, refrigerators, credit card readers, gas pumps, cash registers, hospital equipment, traffic lights, etc.

For the first couple of days life would continue somewhat normally, but then people would soon start to realize that the power isn’t coming back on and panic would begin to erupt.

The intercontinental ballistic missile that North Korea just launched traveled almost 1,000 kilometers and reached a maximum altitude of 4,500 kilometers. We have been told for decades that this would never be allowed to happen, but now it has happened…

U.K. Government Pressured Over Secret Base’s Role in Trump’s Drone Strikes

THE U.K. GOVERNMENT is facing fresh calls to clarify its role in U.S. drone strikes after acknowledging that there are potentially hundreds of British spy agency personnel working inside a U.S.-controlled surveillance base that has played a key role in so-called targeted killings.

Earlier this month, British Minister of State for the Armed Forces Mark Lancaster disclosed to the U.K. Parliament that employees of eavesdropping agency Government Communications Headquarters, or GCHQ, are stationed at a remote base in the north of England called Menwith Hill. An unknown number of GCHQ employees are among 578 British civilians, military, and contractors at the site, Lancaster confirmed in a previously unreported written statement, alongside 627 Americans.

Questioned in 2013 about GCHQ’s presence at the base, the British government had insisted that it “would not comment on whether there are personnel working in intelligence” there – a position that appears to have changed with Lancaster’s admission, possibly unintentionally. His statement came in response to a Parliament member’s question about how many people are working at Menwith Hill. A spokesperson for the U.K. government’s Ministry of Defence declined to answer questions about whether the statement represented a policy shift.

Menwith Hill is the National Security Agency’s largest overseas surveillance facility, located near the small town of Harrogate in North Yorkshire. As The Intercept revealed in 2015, the base has been used to aid “a significant number of capture-kill operations” across the Middle East and North Africa, according to top-secret documents. The facility operates spy satellites used to pinpoint the locations of people on the ground below, and it is equipped with eavesdropping technology that can harvest data from more than 300 million emails and phone calls a day.

No Agenda: Thursday (11-30-17) Episode 986 - Fruit Machine

NSA Secretly Helped Convict Defendants in U.S. Courts, Classified Documents Reveal

But Justice Department lawyers gained their conviction against Kurbanov after failing to disclose a legally significant fact: Kurbanov’s conversations with his alleged terrorist associate had been captured through PRISM, a National Security Agency mass surveillance program whose existence was revealed in documents provided by whistleblower Edward Snowden. Under PRISM, the government obtains communications directly from at least eight large technology companies without the need for warrants, a type of practice authorized in 2008, when Congress provided new surveillance powers under FISA.

While traditional FISA authority permits spying on a particular person or group through warrants issued by the secret Foreign Intelligence Surveillance Court, under the new powers, codified in FISA Section 702, monitoring is approved in bulk by the court through what is essentially a recipe for mass surveillance. Once approved, such a recipe can be used against thousands of targets. Under Section 702 authority, the NSA is currently monitoring digital communications of more than 100,000 people; it swept up an estimated 250 million internet communications each year as of a 2011 Foreign Intelligence Surveillance Court opinion. The FBI frequently searches Section 702 databases when it opens national security and domestic criminal “assessments,” precursors to full investigations.

STUDY: Satellites Show No Acceleration In Global Warming For 23 Years

Global warming has not accelerated temperature rise in the bulk atmosphere in more than two decades, according to a new study funded by the Department of Energy.

University of Alabama-Huntsville climate scientists John Christy and Richard McNider found that by removing the climate effects of volcanic eruptions early on in the satellite temperature record it showed virtually no change in the rate of warming since the early 1990s.

“We indicated 23 years ago — in our 1994 Nature article — that climate models had the atmosphere’s sensitivity to CO2 much too high,” Christy said in a statement. “This recent paper bolsters that conclusion.”

Christy and McNider found the rate of warming has been 0.096 degrees Celsius per decade after “the removal of volcanic cooling in the early part of the record,” which “is essentially the same value we determined in 1994 … using only 15 years of data.”

The study is sure to be contentious. Christy has argued for years that climate models exaggerate global warming in the bulk atmosphere, which satellites have monitored since the late 1970s.

Christy, a noted skeptic of catastrophic man-made global warming, said his results reinforce his claim that climate models predict too much warming in the troposphere, the lowest five miles of the atmosphere. Models are too sensitive to increases in carbon dioxide concentrations in the atmosphere, he said.

Wednesday, November 29, 2017

Supreme Court Hears Arguments About Cellphone Location Tracking in Landmark Privacy Case

THE SUPREME COURT heard arguments for the first time Wednesday about whether police can obtain cellphone location records without a warrant, setting up the possibility for legal precedent that could affect privacy law for generations.

Experts have said the case could have consequences far beyond location tracking by law enforcement – it could impact National Security Agency surveillance and even help outline how courts should handle privacy concerns as technology evolves.

The case, Carpenter v. United States, stems from the case of Timothy Carpenter and Timothy Sanders, who were convicted in 2013 of robbing Radio Shack and T-Mobile stores in Michigan and Ohio.

During its investigation into the robberies, the FBI sought information from the suspects’ cellphone service providers to place them at the scene of the crime. But rather than obtain a warrant, the agency requested the data under the Stored Communications Act, which applies to electronic communications stored by third-party service providers and has a lower standard of evidence than the Fourth Amendment requirement for a search warrant. The FBI also requested cellphone location data for a 127-day period — instead of just the days on which the robberies occurred — allowing federal law enforcement agents to precisely map the men’s movements over a period of four months.

Much of Wednesday’s argument focused on whether the men had a reasonable expectation of privacy regarding their whereabouts over such an extended period.

Africans are being sold at Libyan slave markets. Thanks, Hillary Clinton.

Black Africans are being sold in open-air slave markets, and it’s Hillary Clinton’s fault. But you won’t hear much about that from the news media or the foreign-policy pundits, so let me explain.

Footage from Libya, released recently by CNN, showed young men from sub-Saharan Africa being auctioned off as farm workers in slave markets.

And how did we get to this point? As the BBC reported back in May, “Libya has been beset by chaos since NATO-backed forces overthrew long-serving ruler Col. Moammar Gadhafi in October 2011.”

And who was behind that overthrow? None other than then-Secretary of State Hillary Clinton.

Under President George W. Bush in 2003, the United States negotiated an agreement with Libyan strongman Gadhafi. The deal: He would give up his weapons of mass destruction peacefully, and we wouldn’t try to depose him.

That seemed a good deal at the time, but the Obama administration didn’t stick to it. Instead, in an operation spearheaded by Clinton, the United States went ahead and toppled him anyway.

In the ‘80s, the CIA wanted NASA to bring the Cold War to the moon

When future Secretary of Defense Robert Gates suggested the U.S. establish a permanent moon base, the Agency touted the “‘spectacular’ value” of reminding the world “the US is there”

Memos unearthed in the Central Intelligence Agency archives show that at the height of Reagan’s renewed Cold War, the CIA’s Deputy Director, future Secretary of Defense Robert Gates, had a meeting with James C. Fletcher, head of the National Aeronautics and Space Administration.

Private Companies Look to Cash in as Homeland Security Brings Facial Recognition to U.S. Borders

In a crowded conference room earlier this month in Menlo Park, California, representatives from companies around the world listened intently as officials from the Department of Homeland Security explained the bidding process for contracts to develop facial recognition capabilities at land border crossings. The companies were eager to get on the ground floor of the government’s pilot program for using facial scanners and databases at the border. The pilot program, managed by the DHS Silicon Valley Innovation Program, in conjunction with U.S. Customs and Border Protection, is one of several initiatives to use image-recognition technology designed for security purposes on a grander scale.

For the companies looking to get in on the action, the government has a test in mind: According to solicitation documents, the pilot program challenges bidding companies to accurately identify three individuals in a car traveling at roughly 25 mph through raised car windows and light rain, with one of the passengers in the vehicle’s backseat. While DHS officials acknowledged in Menlo Park that facial recognition is far from a mature technology and would accept up to a 70 percent error rate for initial projects, the short-term goals of both the government and private sectors are to drastically reduce inaccuracies. CBP officials already believe that technology is far more accurate than humans at identifying people.

WaPo: National Security Reporter Says Russia Story is “f*cking crap shoot…” and “Maybe it doesn’t exist, we haven’t found it yet.”

In this all new Project Veritas video, two Washington Post employees are caught on hidden camera expressing their biases and acknowledging that the Trump-Russia collusion narrative has no foundation.

The Washington Post’s National Security Reporter Adam Entous says that the Trump-Russia story doesn’t hold much weight:

But we really haven’t addressed… Our reporting has not taken us to a place where I would be able to say with any confidence that the result of it is going to be the president being guilty of being in cahoots with the Russians. There’s no evidence of that that I’ve seen so far.

“We’ve seen a lot of flirtation, if you will, between them but nothing that, in my opinion, would rank as actual collusion. Now that doesn’t mean that it doesn’t exist, it just means we haven’t found it yet. Or maybe it doesn’t exist.

Entous, who says he does “most of this reporting” on Russian collusion continues to describe the investigation as a “f*cking crap shoot.”

When The Rockefeller Trilateral Commission Exposed Its Own Secret

Now and then, I republish an explosive interview with two Rockefeller Trilateral Commission members, highlighting how much political power can be controlled in a few hands.

People often misunderstand how the game works. In the area of US foreign policy, for example, they focus on the long-standing rats’ nest called the State Department.

Well, they should. But that bureaucracy implements policy. It doesn’t really formulate the basics. The basics come from higher on the food chain.

The Globalist movement—within which the Trilateral Commission is a leading force—dictates a “one-world” theme. Separate nations and their power should be melted down and folded into one planet-wide management system.

This system would ultimately determine worldwide production quotas for goods and services, and their distribution. Energy, in particular, is a prime target. How much will be created? Who will benefit? Who will suffer?

The US federal government and other governments around the world are currently trying to bring us closer to that “utopian day.”

Who sits in the shadows pulling their strings?

Here is another question that has the same answer: who is in charge of undermining free markets and thus taking down economies?

One group has been virtually forgotten. Its influence is enormous. It has existed since 1973.

It’s called the Trilateral Commission (TC).

Tuesday, November 28, 2017

Black Box, Red Disk: How Top Secret NSA and Army Data Leaked Online

In the wake of a string of data exposures originating from Pentagon intelligence-gathering agencies, the most recent of which revealed the workings of a massive, worldwide social media surveillance program, the UpGuard Cyber Risk Team can now disclose another. Critical data belonging to the United States Army Intelligence and Security Command (INSCOM), a joint US Army and National Security Agency (NSA) Defense Department command tasked with gathering intelligence for US military and political leaders, leaked onto the public internet, exposing internal data and virtual systems used for classified communications to anyone with an internet connection. With a middling CSTAR cyber risk score of 589 out of a maximum of 950, INSCOM’s web presence provides troubling indications of gaps in their cybersecurity - exemplified by the presence of classified data within this publicly accessible data repository.

Among the most compelling downloadable assets revealed from within the exposed bucket is a virtual hard drive used for communications within secure federal IT environments, which, when opened, reveals classified data labeled NOFORN - a restriction indicating a high level of sensitivity, prohibited from being disseminated even to foreign allies. The exposed data also reveals sensitive details concerning the Defense Department’s battlefield intelligence platform, the Distributed Common Ground System - Army (DCGS-A) as well as the platform’s troubled cloud auxiliary, codenamed “Red Disk.

New NSA leak exposes Red Disk, the Army's failed intelligence system

The leak marks at least the fifth exposure of NSA-related data in as many years.

The contents of a highly sensitive hard drive belonging to a division of the National Security Agency have been left online.

The virtual disk image contains over 100 gigabytes of data from an Army intelligence project, codenamed "Red Disk." The disk image belongs to the US Army's Intelligence and Security Command, known as INSCOM, a division of both the Army and the NSA.

The disk image was left on an unlisted but public Amazon Web Services storage server, without a password, open for anyone to download. Unprotected storage buckets have become a recurring theme in recent data leaks and exposures. In the past year alone, Accenture, Verizon, and Viacom, and several government departments, were all dinged by unsecured data.

Chris Vickery, director of cyber risk research at security firm UpGuard, found the data and informed the government of the breach in October. The storage server was subsequently secured, though its owner remains unknown.

The leak marks yet another exposure of classified government data. Since the Edward Snowden disclosures in 2013, the agency made headlines last year when Harold Martin, an NSA contractor, was indicted for removing terabytes of secret data from the agency's headquarters. Another contractor, Reality Winner, was indicted this year for leaking classified secrets to news site The Intercept.

NBC Pushes an Unfounded Conspiracy Theory on Behalf of CIA

Retired National Security Agency (NSA) chief technology officer William Binney is being branded as a "conspiracy theorist" by corporate media outlets, most notably, the Comcast-owned National Broadcasting Corporation, for co-authoring a controversial memo issued this past summer by a group of former intelligence officers – Veteran Intelligence Professionals for Sanity.

The memo opined that the leak of Democratic National Committee e-mails during the 2016 presidential campaign were not the result of Russian state-sponsored hacking but the result of an inside job by a DNC staffer who loaded the purloined e-mails onto a thumb drive. That view is contrary to an assessment made in a 2017 intelligence assessment by 17 US intelligence agencies. That assessment claimed that Russian government-sponsored hackers broke into the email servers of the DNC and then provided the emails to WikiLeaks. However, the assessment was not the unanimous view of 17 US intelligence agencies, but merely four – the Central Intelligence Agency, the National Security Agency, the Federal Bureau of Investigation. It was provided a chapeau of legitimacy by the Director of National Intelligence. Contrary to news reports, the Defense Intelligence Agency, the State Department Bureau of Intelligence and Research, and intelligence elements of the military services did not provide input to the assessment.

Binney was also accused by NBC "national security reporter" Ken Dilanian of pushing the "conspiracy theory" that the "NSA is collecting and storing nearly every US communication." Far from being a conspiracy theory, NSA's unconstitutional eavesdropping program, code-named STELLAR WIND and officially known as the “President’s Surveillance Program,” was proven in classified documents revealed by NSA whistleblower Ed Snowden and, earlier, by Justice Department prosecutor Thomas Tamm. A metadata-capturing program called PRISM ensnared the personal data of millions of Americans from AT&T, Verizon, Sprint, Facebook, Apple, Google, Microsoft, Yahoo, and AOL.