James O'Keefe Offers $10,000 Award for Content Which Exposes Media Malfeasance
Anonymous Source Within CNN Provided Audio to Project Veritas
More Audio Yet to be Released in a WikiLeaks Style Dump
Project Veritas released 119 hours of raw audio in a WikiLeaks style dump, with over 100 more hours still yet to be released. The audio was secretly recorded in 2009 by an anonymous source inside CNN's Atlanta headquarters who we are identifying as Miss X.
Thursday, February 23, 2017
The Portuguese authorities have detained a former undercover C.I.A. officer whose extradition has been sought by Italy, where she faces a prison sentence over her role in the 2003 kidnapping of an Egyptian cleric as part of a secret United States rendition program.
There is a documentary online about this affair: “The Italian Job”. [Vice News]
The Defense Advanced Research Projects Agency, better known as DARPA, is embarking on a new program, called RadioBio, to determine whether cells are able to exchange information with EM signals and, if so, what the cells are saying and how they do it. This new initiative seems very close to the once TOP-SECRET “PANDORA Project”.
While the casualty claim is almost certainly exaggerated, U.S. officials confirm that the terrorist group appears to have crossed a threshold with its use of unmanned aircraft. Two years after the Islamic State first used commercially purchased drones to conduct surveillance, the militants are showing a growing ambition to use the technology to kill enemies, U.S. officials and terrorism experts say.
The threat to troops is serious enough to prompt U.S. and Iraqi commanders to issue warnings to soldiers near the front lines. But a far bigger worry, U.S. officials say, is the potential for future attacks against civilians. Islamist militants have long discussed the possibility of using drones as remote-controlled missiles that can deliver explosives or even unconventional weapons such as deadly nerve agents. In recent weeks, the notion of terrorist drones has moved a step closer to reality, terrorism experts say.
The Department of Homeland Security issued a sweeping set of orders Tuesday that implement President Trump's plan to increase immigration enforcement, placing the vast majority of the nation's 11 million undocumented immigrants at risk of deportation.
The memos instruct all agents — including Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) — to identify, capture and quickly deport every undocumented immigrant they encounter.
The memos require undocumented immigrants caught entering the country to be placed in detention until their cases are resolved, increase the ability of local police to help in immigration enforcement, call for the hiring of 10,000 more immigration agents and allow planning to begin on an expansion of the border wall between the United States and Mexico.
As we can see in this picture, there are the following telephone sets on the president's desk in the Oval Office:
- On the left: a new Cisco 8841 IP phone, which is part of the internal White House telephone network and can be used for all non-secure calls. This network was modernized since 2015, but the phone was not placed on the president's desk until late 2016.
On the back of this phone is a black metal box and on the front panel there's an extra red button, both of which are modifications by Advanced Programs, Inc. (API) in order to meet Telephone Security Group (TSG) standards, including on-hook security for the handset and the speakerphone and probably also for TEMPEST protection.
These modifications are to make sure that the phone cannot by any means be caused to produce or transmit audio when the handset is on-hook - whether accidental or deliberate. It's not for securing the calls by means of encryption.
- On the right: an older Cisco 7975G Unified IP Phone with expansion module 7916, which is for the highly secure Executive Voice over Secure IP-network connecting the president to all major decision makers, like the secretaries of State, Defense and Homeland Security, the Director of National Intelligence and top military officials.
This telephone network became operational in 2006 or 2007, but this particular phone is on the president's desk only since early 2011. Elsewhere, these phones usually have a bright yellow bezel or faceplate instead of the standard silver one, indicating they may be used for conversations up to the level of Top Secret/SCI.
In a 2015 Women’s Aid survey of 693 women, 29 per cent said they had spyware or GPS locators installed on their phones or computers by a partner or ex. In 2014, NPR surveyed 70 women’s shelters, finding 85 per cent were working with victims whose abusers tracked them via GPS, or what’s often referred to as “spouseware.”
Where do those surveillance tools come from? A FORBES investigation has unearthed evidence that often behind such easy-to-use spyware are opportunistic salesmen who’re peddling not just to jealous spouses and paranoid parents for small fees, but whose powerful spying software is also sold to police and intelligence agencies for hundreds of thousands of dollars. Though the cyberweapons creators we investigated have never publicly disclosed this, their digital trails prove that often the malware used to snoop on terrorists and pedophiles is much the same as that used to control partners in abusive relationships.
Not only are lawmakers, lawyers and women’s rights activists horrified at the blatant militarization of personal surveillance, they’ve called on the U.S. government to take action on the sale of spyware in America, something many have long considered illegal.
Palantir has never masked its ambitions, in particular the desire to sell its services to the U.S. government — the CIA itself was an early investor in the startup through In-Q-Tel, the agency’s venture capital branch. But Palantir refuses to discuss or even name its government clientele, despite landing “at least $1.2 billion” in federal contracts since 2009, according to an August 2016 report in Politico. The company was last valued at $20 billion and is expected to pursue an IPO in the near future. In a 2012 interview with TechCrunch, while boasting of ties to the intelligence community, Karp said nondisclosure contracts prevent him from speaking about Palantir’s government work.
“Palantir” is generally used interchangeably to refer to both Thiel and Karp’s company and the software that company creates. Its two main products are Palantir Gotham and Palantir Metropolis, more geeky winks from a company whose Tolkien namesake is a type of magical sphere used by the evil lord Sauron to surveil, trick, and threaten his enemies across Middle Earth. While Palantir Metropolis is pegged to quantitative analysis for Wall Street banks and hedge funds, Gotham (formerly Palantir Government) is designed for the needs of intelligence, law enforcement, and homeland security customers. Gotham works by importing large reams of “structured” data (like spreadsheets) and “unstructured” data (like images) into one centralized database, where all of the information can be visualized and analyzed in one workspace. For example, a 2010 demo showed how Palantir Government could be used to chart the flow of weapons throughout the Middle East by importing disparate data sources like equipment lot numbers, manufacturer data, and the locations of Hezbollah training camps. Palantir’s chief appeal is that it’s not designed to do any single thing in particular, but is flexible and powerful enough to accommodate the requirements of any organization that needs to process large amounts of both personal and abstract data.
Tuesday, February 21, 2017
The world as we know it is about to change. Within our society there is a shadow government. A government that has accumulated great wealth and power. A government that is so woven into the fabric or our reality we can only see what they want us to see. This is a government that has manipulated and blackmailed people and Countries for decades. This government controls the media, the banks, the army, the intelligent services, and most of the internet. They control narratives and agendas. They start wars then set up charities and foundations to help the victims. These charitable foundations are just fronts to provide a platform and face for their hidden agenda. This isn't simply just a plan to see who can accumulate the most wealth. This is a war. A silent war that has been unfolding right in front of our eyes. A war against us the masses and the prize is to become leaders of the new world.
The file the elite want to stop us from seeing , or believing it's contents, is from Vault 7.
Vault 7 is on the 7th floor of the State Department previously ran by Hillary Clinton and her staff.
From what I have pieced together from the research I have done I believe it's a file that will expose the CIA, 100s of public figures including Hillary Clinton, and many of it's secrets. It can only be this. Why all the sudden flurry of activity based around news and leaked documents. The link with vault7 and the DNC and pizzagate. Its all linked.
There is something big in the shadows they don't want us to see. It's big and scary and its probably going to fuck us up. It could be anything from spying on countries and manipulating elections to the war on terror, ISIS and the destabilization of the middle east or the banking crisis being created by Goldman Sachs and Wall Street. Maybe even 9/11 if it was planned.
In his first interview since the November election, John Podesta, the Clinton campaign chair whose hacked personal email arguably changed the course of last Fall’s election, suggested a strong remedy for the distrust in democracy sown since Trump’s surprise win: Establish a 9/11-style commission to investigate all the unresolved questions about Russia’s meddling in the election, its role in the hacking, and its possible ties to the Trump campaign.
Did Pablo Escobar work for the CIA? The question is nothing new for conspiracy theorists who have long argued that the United States government’s War on Drugs was actually a cover-up of its efforts to get in on the action, and a new memoir from an individual with a front row seat lends even more fodder to those suspicions.
In his new memoir, Pablo Escobar In Fraganti: What My Father Never Told Me, the iconic drug trafficker’s son shares these interactions to shed light on the man behind the legend, with one particular detail pushed to the headlines: Marroquín alleges that the CIA was closely associated with his father’s business, according to an exclusive interview with Infobae.
Considered to be both one of the greatest - and most paranoid - spymasters in living memory, CIA Counterintelligence Chief James Jesus Angleton was undeniably one of the best in the field. By the ’70s, however, he was also considered too toxic for government service after revelations, scandals, and Agency politics forced him and other senior staff out. While it’s been known that he remained somewhat active as an advisor and in think tanks, it seems that little is known beyond his involvement with the American Security Council think tank and a few similar organizations. A formerly SECRET memo from CIA, however, establishes that they, and others, consulted with him on an official basis.
Monday, February 20, 2017
KURT NIMMO | FEBRUARY 20, 2017
On this episode of The Geopolitical Report, we examine the special relationship between Saudi Arabia and the United States and the prominent role the Saudi Wahhabi version of Islam plays in the spread of Salafist ideology and terrorism. President Trump’s decision to not include Saudi Arabia on his list of travel ban nations reveals it is business as usual in Washington — and business as usual for Trump, who is on friendly terms with the Saudis, including the half brother of Osama bin Landen. We also look at the role the Saudis have played in funding the likes of the Islamic State and al-Nusra in Syria and its partnership with the CIA and the Pentagon.
William Binney, a former highly placed NSA official turned whistleblower, contended in an exclusive interview today that the National Security Agency (NSA) is “absolutely” monitoring the phone calls of President Donald Trump.
Binney was an architect of the NSA’s surveillance program. He became a famed whistleblower when he resigned on October 31, 2001 after spending more than 30 years with the agency.
He was speaking on the podcast edition of this reporter’s talk radio program, “Aaron Klein Investigative Radio,” broadcast on New York’s AM 970 The Answer and Philadelphia’s NewsTalk 990 AM.
During the interview, Binney referred to a 2008 report referencing two NSA whistleblowers who said they worked at the agency’s station in Fort Gordon, Georgia and were asked to not only monitor phone calls of U.S. citizens but transcribe them.
US and UK intelligence agencies have said that Islamic State has been trying to develop biological weapons at its bases in Syria and Iraq. However, they have played down the threat, saying that the terrorists would need people with the necessary skills, good laboratories and a relatively calm environment free from the confusion and chaos of conflict zones.
Yet other security specialists say the threat from bio-terrorism has become more realistic over the past decade, particularly the past five years, with changes in molecular biology that make development of biological weapons more accessible.
Gates, making his first appearance at the Munich security conference on Saturday, said: “Whether it occurs by a quirk of nature or at the hand of a terrorist, epidemiologists say a fast-moving airborne pathogen could kill more than 30 million people in less than a year. And they say there is a reasonable probability the world will experience such an outbreak in the next 10 to 15 years.”
He added: “It’s hard to get your mind around a catastrophe of that scale, but it happened not that long ago. In 1918, a particularly virulent and deadly strain of flu killed between 50 million and 100 million people.
Sunday, February 19, 2017
Juan Pablo Escobar Henao, son of notorious Medellín cartel drug kingpin, Pablo Escobar, now says his father “worked for the CIA.”
In a new book, “Pablo Escobar In Fraganti,” Escobar, who lives under the pseudonym, Juan Sebastián Marroquín, explains his “father worked for the CIA selling cocaine to finance the fight against Communism in Central America.”
“The drug business is very different than what we dreamed,” he continues. “What the CIA was doing was buying the controls to get the drug into their country and getting a wonderful deal.”
“He did not make the money alone,” Marroquín elaborated in an interview, “but with US agencies that allowed him access to this money. He had direct relations with the CIA.”
Notably, Marroquín added, “the person who sold the most drugs to the CIA was Pablo Escobar.”
Where his first book primarily covered Escobar, the man as a father, Marroquín’s second — which has just been released in Argentina — delves into the kingpin’s “international ties of corruption in which my father had an active participation, among them with the American CIA,” he said in a recent interview.
Those government associates “were practically his partners,” which allowed Escobar to defy the law, and gave him nearly the same power as a government.
Predictably, this information is conveniently absent from media headlines in America.
Read more at http://thefreethoughtproject.com/escobar-son-cia-cocaine/#FRsBbzQ9yuYEvbyE.99
Officials have confirmed that the U.S. military, despite vowing not to use depleted uranium weapons on the battlefield in Iraq and Syria, fired thousands of rounds of the munitions during two high-profile raids on oil trucks in Islamic State-controlled Syria in late 2015. The air assaults mark the first confirmed use of this armament since the 2003 Iraq invasion, when it was used hundreds of thousands of times, setting off outrage among local communities, which alleged that its toxic material caused cancer and birth defects.
U.S. Central Command (CENTCOM) spokesman Maj. Josh Jacques told Airwars and Foreign Policy that 5,265 armor-piercing 30 mm rounds containing depleted uranium (DU) were shot from Air Force A-10 fixed-wing aircraft on Nov. 16 and Nov. 22, 2015, destroying about 350 vehicles* in the country’s eastern desert.
The radiation levels in Fukushima's unit two reactor are so high they could kill a human in two minutes, according to data collected by a robot.
Tokyo Electric Power, the company which operates the nuclear plant in Fukushima, carried out a robotic survey of the area around the core that melted six years ago, following the earthquake and tsunami that triggered the nuclear accident.
But the scorpion robot Sasori got stuck inside the reactor after its crawling functions failed while climbing over highly radioactive debris and had to be abandoned inside the reactor.
Britain's 110 nuclear alerts are revealed: Safety watchdog makes a mockery of the MoD's claim of just 27 ‘incidents’ in 65 years
A chilling catalogue of more than 100 accidents involving Britain’s nuclear weapons reveals for the first time how often we may have come close to disaster.
The shock report by an independent nuclear watchdog documents 110 major alerts – four times higher than the Ministry of Defence has acknowledged.
Among the incidents in the dossier by the Nuclear Information Service (NIS), which has been seen by The Mail on Sunday, are:
⚫British warships carrying nuclear depth charges by mistake in the 1982 Falklands War;
⚫a mid-Atlantic collision between nuclear-armed British and French submarines in 2009;
⚫a truck carrying nuclear warheads overturning on an icy road in Wiltshire in 1987;
⚫the deaths of 116 UK nuclear workers from accidents and cancer.
The MoD’s sole comprehensive report on accidents involving nuclear weapons was published in 2003 and detailed just 27 incidents.
It seems DARPA, the ultra-secretive military research agency, may be getting a run for its money when it comes to developing advanced and alarming forms of surveillance. A private research venture has produced a genetically modified cyborg dragonfly that can deliver payloads, as well as perform ‘guided pollination’ and surveillance missions. Using insects as covert forms of spying on citizens has long been a dream of the government. It appears the day is finally upon us when that weird bug flying a little too close for comfort may actually be one of Uncle Sam’s little insectoid deputies.
Called DragonflEye, the GM cyborg is half-insect, half-machine and is controlled via a fingernail-sized backpack, which allows a remote operator to control its direction. The dragonfly is powered by a solar panel. Developed by R&D company Draper Labs in collaboration with the Howard Hughes Medical Institution, the project required new technology. Controlling the dragonfly’s flight navigation actually required modifying the dragonfly to react to pulses of light. This involved giving the insect a gene that creates light-sensitive proteins.
They observe changes in the atmosphere like astronomers study the stars, analyzing everything from air pressure to water vapor and poring over computer models to arrive at a forecast.
But for all their scrutiny of weather data, many meteorologists part ways with their colleagues — climate scientists who study longer atmospheric trends — in one crucial respect: whether human activity is causing climate change.
Meteorologists are more skeptical than climate scientists, and that division was underscored by the recent departure of Mish Michaels from WGBH News.
Michaels, a former meteorologist at WBZ-TV, lost her job as a science reporter at WGBH’s show “Greater Boston” last week after colleagues raised concerns about her views on vaccines and climate change. She had previously questioned the safety of vaccines and the evidence that human activity was causing global warming, both widely held views in the scientific community.
Saturday, February 18, 2017
Friday, February 17, 2017
Mark Zuckerberg appears to have accidentally revealed plans to use artificial intelligence to spy on Facebook users’ private messages in a bid to combat “terrorism”.
The billionaire hinted at this controversial scheme in an early version of a 6,000-word manifesto about Facebook’s future.
Once the final long document was released to the public, all mention of it seemed to have disappeared.
“The long term promise of AI is that in addition to identifying risks more quickly and accurately than would have already happened, it may also identify risks that nobody would have flagged at all including terrorists planning attacks using private channels, people bullying someone too afraid to report it themselves, and other issues both local and global,” he wrote on a version of the document given to Associated Press.
But here’s what the published version of the document said: “Looking ahead, one of our greatest opportunities to keep people safe is building artificial intelligence to understand more quickly and accurately what is happening across our community.”
It added: “Going forward, there are even more cases where our community should be able to identify risks related to mental health, disease or crime.”
Big Zucker sits at the helm of one of a social network which could easily be turned into one of the most powerful surveillance systems the world has ever seen.
The police body camera industry is the latest to jump on the artificial intelligence bandwagon, bringing new powers and privacy concerns to a controversial technology bolstered by the need to hold police accountable after numerous high-profile killings of unarmed black citizens. Now, that tech is about to get smarter.
Last week, Taser, the stun gun company that has recently become an industry leader in body-mounted cameras, announced the creation of its own in-house artificial intelligence division. The new unit will utilize the company’s acquisition of two AI-focused firms: Dextro, a New York-based computer vision startup, and Misfit, another computer vision company previously owned by the watch manufacturer Fossil. Taser says the newly formed division will develop AI-powered tech specifically aimed at law enforcement, using automation and machine learning algorithms to let cops search for people and objects in video footage captured by on-body camera systems.
A mercenary air force that became a symbol of the U.S. occupation of Iraq is back in action—this time in Central Africa, supporting a shadowy American U.S. Special Forces commando operation targeting the Lord’s Resistance Army.
In late January, a source on the ground in Central African Republic spotted a Sikorsky S-61 helicopter with the registry number N408RC carrying American Special Forces troops. The LRA, a cultish band of thieves and rapists led by warlord Joseph Kony, is most active in the forested region where Central African Republic, South Sudan, and the Democratic Republic of Congo meet.
In 2010, President Barack Obama deployed around 100 Green Berets and other personnel to Central Africa to help local forces hunt down Kony and the LRA. Seven years later, Operation Observant Compass continues, mostly unnoticed by the press. The Pentagon asked Congress for $23 million to extend the operation through 2017.
The White House distanced itself Friday from a Department of Homeland Security draft proposal to use the National Guard to round up unauthorized immigrants, but lawmakers said the document offers insight into the Trump administration's internal efforts to enact its promised crackdown on illegal immigration.
Administration officials said the proposal, which called for mobilizing up to 100,000 troops in 11 states, was rejected, and would not be part of plans to carry out President Donald Trump's aggressive immigration policy.
If implemented, the National Guard idea, contained in an 11-page memo (http://apne.ws/2l1Dj0k ) obtained by The Associated Press, could have led to enforcement action against millions of immigrants living nowhere near the Mexican border. Four states that border on Mexico were included in the proposal — California, Arizona, New Mexico and Texas — but it also encompassed seven states contiguous to those four — Oregon, Nevada, Utah, Colorado, Oklahoma, Arkansas and Louisiana.
Despite the AP's public release of the document, White House spokesman Sean Spicer said there was "no effort at all to utilize the National Guard to round up unauthorized immigrants." A DHS official described the document as a very early draft that was not seriously considered and never brought to Homeland Security Secretary John Kelly for approval.
Former Ohio U.S. Rep. Dennis Kucinich agreed with President Trump’s assessment yesterday that intelligence leaks to the media are more worrisome than the sudden resignation of now former National Security Adviser Michael Flynn.
Kucinich said he feared the intelligence community is trying to influence foreign policy during an appearance yesterday on Boston Herald Radio’s “Adriana Cohen Show.”
“When you look at the way the Flynn episode unfolded it’s very clear that his communications were taped, they were transcribed, they were given to the media with specific timing involved,” Kucinich said. “This was clearly a trap that was set for him.”
In a leading article published on Wednesday, The Wall Street Journal alleged that American intelligence officials are choosing to withhold sensitive intelligence from President Donald Trump, fearing that it might be compromised. The WSJ, America’s leading newspaper by circulation, which is highly influential in conservative circles, cited “current and former officials familiar with the matter”. The paper said it was unclear how much information had been withheld from President Trump. It added that at no point did intelligence officials keep the president in the dark about critical security threats by foreign states or potential terrorist attacks by non-state groups. However, intelligence officials are consciously and systematically withholding information from the White House that concerns “sources and methods”, said the article. The term refers to the precise methods used by the United States Intelligence Community to collect information, as well as the identification of sources —human or otherwise— of the information.
Thursday, February 16, 2017
All major French political parties were targeted for infiltration by the CIA's human ("HUMINT") and electronic ("SIGINT") spies in the seven months leading up to France's 2012 presidential election. The revelations are contained within three CIA tasking orders published today by WikiLeaks as context for its forth coming CIA Vault 7 series. Named specifically as targets are the French Socialist Party (PS), the National Front (FN) and Union for a Popular Movement (UMP) together with current President Francois Hollande, then President Nicolas Sarkozy, current round one presidential front runner Marine Le Pen, and former presidential candidates Martine Aubry and Dominique Strauss-Khan.
President Trump plans to assign a New York billionaire to lead a broad review of American intelligence agencies, according to administration officials, an effort that members of the intelligence community fear could curtail their independence and reduce the flow of information that contradicts the president’s worldview.
The possible role for Stephen A. Feinberg, a co-founder of Cerberus Capital Management, has met fierce resistance among intelligence officials already on edge because of the criticism the intelligence community has received from Mr. Trump during the campaign and since he became president. On Wednesday, Mr. Trump blamed leaks from the intelligence community for the departure of Michael T. Flynn, his national security adviser, whose resignation he requested.
And the investigative journalist George Webb is back. We'll be talking about the US military contractor Dyncorp, it's history of child trafficking, child abuse, murder, corruption and how these crimes were covered up by the Clinton's and their masters.
A retail store in St. Louis called Motomart is demanding customers submit to having their faces scanned before they're allowed entry!
Think about what that means, police are identifying every single customer using DHS's national REAL ID program .
According to a Fox2Now article, once it gets dark, employees put up signs that say: “Facial Recognition Software in Use - Please Look at Above Camera for Entry.”
Make no mistake, when stores start demanding to scan our faces to gain entry, we've entered into a privacy nightmare.
Why aren't people boycotting Motomart? Do we really want police tracking our every movement?
Dr. Wecht, a very early critic of the Warren Commission, testified at the HSCA. At the annual JFK Lancer assassination research conference in Dallas, held in November, Dr. Wecht summarized the medical evidence against the lone-gunman hypothesis.
At the center of Dr. Wecht’s examination is what has become known as the “single-bullet theory” — or the “magic bullet,” as it is known to its detractors: the theory that one bullet can account for the multiple wounds (besides the headshot) of both JFK and Governor Connally. According to Dr. Wecht, the conclusions of the Warren Commission rest entirely on the single-bullet theory. If that theory fails, then there had to be more than one gunman. This, in turn, leads to questions about the history of the United States since 1963 that many people would rather not pursue.
With both passion and meticulous attention to detail, Wecht dissects the Warren Commission’s conclusions. Moving beyond the medical evidence, he then utters words unexpected from any former American elected official, and particularly powerful coming from a person with his credentials: “What we witnessed…my friends, in plain, plain English — was [a] coup d’état in America. The overthrow of the government. That’s what this case was all about.”
At a time when America again faces extraordinary political turbulence, what happened more than half a century ago takes on renewed significance.
Wednesday, February 15, 2017
While most people with an interest in the history of CIA will have heard of “Operation Mockingbird,” which weaponized the press for propaganda purposes through the “Office of Policy Coordination,” there is another side to program that’s much less well-known. A declassified memo from 1965 reveals a network of journalists that regularly received intelligence from Ray S. Cline, one of CIA’s senior analysts and at that time the Deputy Director of the Directorate of Intelligence. Several of these journalists were former intelligence officers and were not only involved in information and propaganda dissemination, but other ongoing CIA operations.
A bipartisan group of House and Senate lawmakers introduced legislation Wednesday requiring police agencies to get a search warrant before they can deploy powerful cellphone surveillance technology known as "stingrays" that sweep up information about the movements of innocent Americans while tracking suspected criminals.
“Owning a smartphone or fitness tracker shouldn’t give the government a blank check to track your movements," said Sen. Ron Wyden, D-Ore., a member of the Senate Intelligence Committee who introduced the bill with Reps. Jason Chaffetz, R-Utah, and John Conyers, D-Mich. "Law enforcement should be able to use GPS data, but they need to get a warrant. This bill sets out clear rules to make sure our laws keep up with the times."
Stingrays are suitcase-sized devices that can pinpoint a cellphone’s location within a few yards by essentially masquerading as a cell tower. While they can help police track suspected criminals, the devices also intercept information from the cellphones of innocent people who just happen to be nearby. Dozens of police departments throughout the U.S. use the devices, often concealing that fact from suspects and their lawyers during court proceedings.
Researchers have recently developed the first reliable technique for websites to track visitors even when they use two or more different browsers. This shatters a key defense against sites that identify visitors based on the digital fingerprint their browsers leave behind.
State-of-the-art fingerprinting techniques are highly effective at identifying users when they use browsers with default or commonly used settings. For instance, the Electronic Frontier Foundation's privacy tool, known as Panopticlick, found that only one in about 77,691 browsers had the same characteristics as the one commonly used by this reporter. Such fingerprints are the result of specific settings and customizations found in a specific browser installation, including the list of plugins, the selected time zone, whether a "do not track" option is turned on, and whether an adblocker is being used.
Until now, however, the tracking has been limited to a single browser. This constraint made it infeasible to tie, say, the fingerprint left behind by a Firefox browser to the fingerprint from a Chrome or Edge installation running on the same machine. The new technique—outlined in a research paper titled (Cross-)Browser Fingerprinting via OS and Hardware Level Features—not only works across multiple browsers. It's also more accurate than previous single-browser fingerprinting.
Fingerprinting isn't automatically bad and, in some cases, offers potential benefits to end users. Banks, for instance, can use it to know that a person logging into an online account isn't using the computer that has been used on every previous visit. Based on that observation, the bank could check with the account holder by phone to make sure the login was legitimate. But fingerprinting also carries sobering privacy concerns.
Starting on February 4th, each day Wikileaks began sending out a series of cryptic question Tweets teasing the world about “Vault 7”.
The questions were framed in Who, What, When, Where, Why, and How format (but not in that order). Each came with an image “clue”.
Here they are in chronological order starting with the earliest.
Tuesday, February 14, 2017
Think the ideas behind the Trans-Pacific Partnership or the so-called “free trade” regime are buried? Sadly, no. Definitely, no. Some of the countries involved in negotiating the TPP seeking to find ways to resurrect it in some new form — but that isn’t the most distressing news. What’s worse is the TPP remains alive in a new form with even worse rules. Meet the Trade In Services Agreement, even more secret than the Trans-Pacific Partnership. And more dangerous.
The Trade In Services Agreement (TISA), currently being negotiated among 50 countries, if passed would prohibit regulations on the financial industry, eliminate laws to safeguard online or digital privacy, render illegal any “buy local” rules at any level of government, effectively dismantle any public advantages to be derived from state-owned enterprises and eliminate net neutrality.
TISA negotiations began in April 2013 and have gone through 21 rounds. Silence has been the rule for these talks, and we only know what’s in it because of leaks, earlier ones published by WikiLeaks and now a new cache published by Bilaterals.org.
The Department of Justice on Monday announced the indictment of six current and former TSA Officers in Puerto Rico, along with another half dozen other individuals, on charges related to a scheme to smuggle more than 20 tons of cocaine through airports over nearly 20-years.
According to a DOJ press release, the defendants were part of a scheme that helped transport more than 20 tons of cocaine though the Luis Muñoz Marín International Airport from 1998 through 2016. The defendants are accused of allowing “drug mules” to check suitcases containing between 8 – 15 kilograms of cocaine through security gates in order to transport the cocaine.
The current and former TSA defendants (“TSA defendants”) are accused of smuggling multi-kilogram quantities of cocaine while acting as TSA Officers employed at the San Juan airport. Their duties called from them to conduct security and baggage screenings on outbound flights leaving the airport. They are accused of pushing the luggage through the security screenings and onto outbound flights without detection, despite knowing they contained multiple kilograms of cocaine.
by Kurt Nimmo
Mike Flynn’s out. He resigned as Trump’s advisor this evening after a chorus of calls for him to step down for an alleged relationship with the Russians. This fits the narrative used by Democrats since the election: Putin and the Russians influenced the vote somehow, although nobody can tell us how exactly. Trump and his supporters are in league with them, according to the narrative.
Flynn will be replaced by retired Gen. Keith Kellogg.
Kellogg has an interesting history. In addition to his disastrous mismanagement of the Coalition Provisional Authority in Iraq, Kellogg was president of Abraxas, a wholly owned subsidiary of Cubic Corporation. Cubic provides diversified systems and services to the transportation and defense markets worldwide, according to MarketWatch.
President Donald Trump's embattled national security adviser Michael Flynn resigned late Monday night, following reports that he had misled Vice President Mike Pence and other officials about his contacts with Russia. His departure upends Trump's senior team after less than one month in office.
In a resignation letter, Flynn said he gave Vice President Mike Pence and others "incomplete information" about his calls with Russia's ambassador to the U.S. The vice president, apparently relying on information from Flynn, initially said the national security adviser had not discussed sanctions with the Russian envoy, though Flynn later conceded the issue may have come up.
Trump named retired Lt. Gen. Keith Kellogg as the acting national security adviser. Kellogg had previously been appointed the National Security Council chief of staff and advised Trump during the campaign. Trump is also considering former CIA Director David Petraeus and Vice Admiral Robert Harward, a U.S. Navy SEAL, for the post, according to a senior administration official.
The Trump team's account of Flynn's discussions with the Russian envoy changed repeatedly over several weeks, including the number of contacts, the dates of those contacts and ultimately, the content of the conversations.
While American Spies was written prior to Donald Trump winning the 2016 presidential election, it has become vital and relevant under the new Republican administration.
Jennifer Stisa Granick is one of the premiere legal minds currently trying to grok the intersection between surveillance, privacy, and public policy. She serves as the Director of Civil Liberties at the Stanford Center for Internet and Society. Before that, she worked at the Electronic Frontier Foundation.
In her book, Granick presents an expansive overview of the national-security legal landscape. However, despite being geared largely toward attorneys and academics, American Spies can be easily understood by anyone with even a passing familiarity with touchstone concepts that have graced the pages of Ars Technica in recent years, including Edward Snowden, Section 702, and Executive Order 12333.
Monday, February 13, 2017
A prosecutor last week described the defendants as lawbreaking gunmen who answered Bundy's call to prevent federal Bureau of Land Management agents from seizing his cattle in a decades-long dispute over grazing rules and unpaid fees.
Defense attorneys portrayed the men as law-abiding citizens spurred by reports of scuffles between federal agents and Bundy family members to protest government heavy-handedness.
Cliven Bundy, two sons and two other accused leaders of the conspiracy are due for trial after the first trial concludes.
Defense lawyers for the four Oregon standoff defendants set for trial this week want Pete Santilli, who awaits prosecution in Nevada, to be flown to Oregon to testify on their behalf and to impeach another co-defendant, Blaine Cooper, now expected to be a government witness.
Jury selection starts Tuesday morning for the remaining four defendants accused of federal conspiracy, weapons and depredation of government property charges stemming from the 41-day seizure of the Malheur National Wildlife Refuge last winter.
U.S. District Judge Anna J. Brown already has issued orders for occupation leaders Ammon Bundy, who was acquitted of all charges, and Ryan Payne, who has pleaded guilty to a conspiracy charge, to be flown from Nevada to Oregon to testify for the defense.
The conspiracy hub has become a clubhouse for Trump fanboys—and a former employee is crying foul.
Depending on who you talk to, Kurt Nimmo, a former editor for Infowars, left the conspiracy-peddling website after being a demonstrably lazy staffer—or he was fired in a sudden and acrimonious manner by the site’s red-faced major-domo, Alex Jones.
But the real story, whatever it is, is only slightly less muddy than the fever swamps through which its writers trudge each day to deliver stories about Lady Gaga’s satanic Super Bowl performance and the imminent assassination of President Donald Trump.
Nimmo told The Daily Beast this week that he joined Infowars in 2008 and “rebuilt the website.” He left the publication in July 2016, and has since been working for NewsBud, a site run by the conspiratorially minded whistleblower Sibel Edmonds. Nimmo also periodically writes for his own blog, entitled Another Day in the Empire.
Kurt Nimmo, a longtime former editor for Alex Jones’ Infowars.com, has been publicly trashing his ex-boss as a “snake oil salesman” who sold out to support President Donald Trump.
Nimmo has repeatedly trashed his former employer for turning into “infotrump.” He tweeted that the site has become “the Trump branch office in Austin” and that Jones "turned over his audience to the #Trump Borg hive." He’s also called Jones a “snake oil salesman” who is “playing the race & religion card.” Nimmo responded to the site’s hiring of Jerome Corsi by writing: “#Infowars hires neocon, joins Republican effort to rekindle Cold War. Imagine my surprise.” He has also suggested that Jones has purged personnel who have disagreed with his new direction.
Sunday, February 12, 2017
Saturday, February 11, 2017
An FBI search warrant used to hack into thousands of computers around the world was unconstitutional, the Electronic Frontier Foundation (EFF) told a federal appeals court today in a case about a controversial criminal investigation that resulted in the largest known government hacking campaign in domestic law enforcement history.
The Constitution requires law enforcement officers seeking a search warrant to show specific evidence of a possible crime, and tie that evidence to specific persons and places they want to search. These fundamental rules protect people from invasions of privacy and police fishing expeditions.
But the government violated those rules while investigating “Playpen,” a child pornography website operating as a Tor hidden service. During the investigation, the FBI secretly seized servers running the website and, in a controversial decision, continued to operate it for two weeks rather than shut it down, allowing thousands of images to be downloaded. While running the site, the bureau began to hack its visitors, sending malware that it called a “Network Investigative Technique” (NIT) to visitors’ computers. The malware was then used to identify users of the site. Ultimately, the FBI hacked into 8,000 devices located in 120 countries around the world. All of this hacking was done on the basis of a single warrant. The FBI charged hundreds of suspects who visited the website, several of whom are challenging the validity of the warrant.
Major U.S. cities are spending millions of dollars on tools that track and extract data from people’s cellphones — but almost nothing on rules to guide their use.
U.S. intelligence has collected information that Russia is considering turning over Edward Snowden as a "gift" to President Donald Trump — who has called the NSA leaker a "spy" and a "traitor" who deserves to be executed.
That's according to a senior U.S. official who has analyzed a series of highly sensitive intelligence reports detailing Russian deliberations and who says a Snowden handover is one of various ploys to "curry favor" with Trump. A second source in the intelligence community confirms the intelligence about the Russian conversations and notes it has been gathered since the inauguration.
Snowden's ACLU lawyer, Ben Wizner, told NBC News they are unaware of any plans that would send him back to the United States.
"Team Snowden has received no such signals and has no new reason for concern," Wizner said.
Snowden responded to NBC's report on Twitter and said it shows that he did not work with the Russian government.
"Finally: irrefutable evidence that I never cooperated with Russian intel," Snowden said. "No country trades away spies, as the rest would fear they're next."
Friday, February 10, 2017
IN 2010, THOMAS DRAKE, a former senior employee at the National Security Agency, was charged with espionage for speaking to a reporter from the Baltimore Sun about a bloated, dysfunctional intelligence program he believed would violate Americans’ privacy. The case against him eventually fell apart, and he pled guilty to a single misdemeanor, but his career in the NSA was over.
Though Drake was largely vindicated, the central question he raised about technology and privacy has never been resolved. Almost seven years have passed now, but Pat Eddington, a former CIA analyst, is still trying to prove that Drake was right.
While working for Rep. Rush Holt, D-N.J., Eddington had the unique opportunity to comb through still-classified documents that outline the history of two competing NSA programs known as ThinThread and Trailblazer. He’s seen an unredacted version of the Pentagon inspector general’s 2004 audit of the NSA’s failures during that time, and has filed Freedom of Information Act requests.
In January, Eddington decided to take those efforts a step further by suing the Department of Defense to obtain the material, he tells The Intercept. “Those documents completely vindicate” those who advocated for ThinThread at personal risk, says Eddington.
CIA covert aid to Italy continued well after the agency’s involvement in the 1948 elections – into the early 1960s – averaging around $5 million a year, according to a draft Defense Department historical study published today for the first time by the National Security Archive at The George Washington University.
The study, declassified in 2016, focuses on the role of Clare Boothe Luce as ambassador to Italy, 1953-1957. In addition to overseeing a program of covert financial support to centrist Italian governments, she used the awarding of contracts under the Department of Defense Offshore Procurement Program to weaken the Italian Communist Party's hold on labor unions. The author concludes that the Eisenhower administration, faced with the possibility of civil war in Italy or the Communist Party coming to power legally, was "willing to intervene militarily only if the Communists seized power forcibly and then only in concert with other European nations."
Fresh from a legal setback to his travel ban, U.S. President Donald Trump expressed confidence on Friday that his order would ultimately be upheld by the courts, and promised to introduce additional national security steps next week.
Trump's executive order banning entry to the United States by refugees and by citizens of seven Muslim-majority was put on hold by a federal judge in Seattle last week, and that suspension was upheld by an appeals court in San Francisco on Thursday.
The White House is not ruling out the possibility of rewriting Trump's Jan. 27 order in light of the court actions, an administration official said.
Trump's order, which he has called a national security measure to head off attacks by Islamist militants, barred people from Iran, Iraq, Libya, Somalia, Sudan, Syria and Yemen from entering for 90 days and all refugees for 120 days, except refugees from Syria, who are banned indefinitely.
The dozens of American diplomats taken hostage by revolutionary students who seized the U.S. embassy in Iran in 1979 may have had some secret company during their 15-month captivity: U.S. intelligence agencies had a squad of military-trained psychics using ESP to watch them, according to declassified documents in a newly available CIA database.
In an operation code-named Grill Flame, half a dozen psychics working inside a dimly lit room in an ancient building in Fort Meade, Maryland, on more than 200 occasions tried to peer through the ether to see where the hostages were being held, how closely they were guarded and the state of their health.
Officially, the psychics worked for U.S. Army intelligence. But the documents in the CIA database make it clear their efforts were monitored — and supported — by a wide array of government intelligence agencies as well as top commanders at the Pentagon.
Thursday, February 9, 2017
The US Army Corp of Engineers has granted the final easement to Energy Transfer Partners, the company behind the Dakota Access Pipeline. But are the Native American Nations willing to give up on the fight? Filmmaker Josh Fox, who has covered the story at Standing Rock, joins “News With Ed” to discuss this and more.
This is the third of a five-part series exploring the Iran-Contra Affair and its consequences. Part 1 described the Reagan Administration’s secret wars and illegal arms deals exposed in the scandal. Part 2 explained how the constitutional crisis unfolded as a result of Congress’s failure to address the CIA’s power to wage secret wars in the name of avoiding a world-ending nuclear confrontation between the Superpowers. Part 3 exposes the roots of Iran-Contra in the Watergate scandal, but congressional abdication of responsibility and judicial deference backfired in the restoration of the Imperial Presidency, suppressing civil liberties and expanding wars justified as necessary to fighting the Cold War, even as the Cold War ended with collapse of the Soviet Union. Part 4 will survey the era of global insecurity we entered in the second Bush and Obama Administrations, while Part 5 examines the role key members of the incoming Trump team played in creating this permanent state of war by immunizing themselves from the consequences of past criminality.
A federal judge currently in the spotlight for blocking President Donald Trump's executive order banning immigration from seven Muslim-majority countries is now questioning the constitutionality of secrecy orders that accompany government surveillance demands.
U.S. District Court Judge James Robart issued a 47-page opinion Thursday allowing Microsoft to proceed with a lawsuit claiming a First Amendment violation when the government restricts internet providers from notifying subscribers about requests for their data.
Lately, there’s been a lot of rhetoric comparing Donald Trump to Adolf Hitler. The concern is that a Nazi-type regime may be rising in America.
That process, however, began a long time ago.
In fact, following the second World War, the U.S. government recruited Hitler’s employees, adopted his protocols, embraced his mindset about law and order, implemented his tactics in incremental steps, and began to lay the foundations for the rise of the Fourth Reich.
Sounds far-fetched? Read on. It’s all documented.
Wednesday, February 8, 2017
The Senate has voted to confirm Sen. Jeff Sessions (R-Ala.) as attorney general in a 52-47 vote that went along party lines, following days of rigorous discussion and capping a vicious debate that left Democrats and Republicans seething, and Elizabeth Warren barred from speaking.
Sen. Joe Manchin was the only Democrat to break party rank and vote to back Sessions. Independent Senators Angus King of Maine and Bernie Sanders of Vermont voted alongside 45 Democrats in opposition to the nominee.
The fight over Sessions' nomination infamously escalated last night, when Sen. Elizabeth Warren read a letter that Coretta Scott King had written in 1986 that accused Sessions, a U.S. attorney at the time, of using the power of his office to prevent blacks from voting. As we reported last night, Senate Majority Leader Mitch McConnell objected to Warren’s speech, saying she had impugned another member of the Senate. Then, in a 49-43 vote, the Senate agreed, blocking Warren from speaking on the Senate floor on Wednesday.
A former National Security Agency contractor was indicted on Wednesday by a federal grand jury on charges he willfully retained national defense information, in what U.S. officials have said may have been the largest heist of classified government information in history.
The indictment alleges that Harold Thomas Martin, 52, spent up to 20 years stealing highly sensitive government material from the U.S. intelligence community related to national defense, collecting a trove of secrets he hoarded at his home in Glen Burnie, Maryland.
The government has not said what, if anything, Martin did with the stolen data.
Martin faces 20 criminal counts, each punishable by up to 10 years in prison, the Justice Department said.
Now, a major military scholar is calling for the creation of “megacities combat units” – a proposal that is a major and drastic departure from warfare of the past, which has been designed away from cities. Now, military and paramilitary units, as well as local law enforcement, much engage the population itself – with all the unpredictability afforded by a real life, complex situation filled with combatants, non-combatants and friendlies behind any and all doors, etc.
With a heightened focus on terrorism and reigning in undocumented immigrants, there will be a tendency, if we are not careful, for a heightened militarized and police state atmosphere to arise – both at home, and in everyplace that they take the fight.
Major John Spencer, a former Ranger Instructor and scholar at West Point’s Modern War Institute called for an armed unit ready for megacities deployment in an op-ed:
Hundreds of documents obtained by CityLab from the country’s top fifty largest police departments over the last ten months reveal that similar cellphone surveillance devices have been quietly acquired by local authorities nationwide.
The majority of these departments have at least one of two main types of digital-age spy tools: cellphone interception devices, used to covertly track or grab data from nearby mobile devices, and cellphone extraction devices, used to crack open locked phones that are in police possession and scoop out all sorts of private communications and content.
Access to such devices was once largely limited to intelligence agencies like the NSA and the FBI; their acquisition by local police departments is a relatively recent, less-discussed part of a wider police militarization trend. With only a few clicks, police can now map out individuals’ social networks, communication timelines, and associates’ locations, based on the data captured by these surveillance tools.
During a probe of massive fraud in 9/11 benefits, Facebook took a stand for user privacy in objecting to bulk electronic search warrants, an attorney for the social-networking giant told New York’s high court Tuesday.
The oral arguments come four years after the Manhattan District Attorney’s Office sent Facebook 381 search warrants targeting the accounts of some of the New York City police officers and firefighters who took early retirement after 9/11, claiming mental trauma.
Investigators wanted to see if the same individuals claiming to be disabled painted a different story on their social media, and a Manhattan judge ultimately ordered Facebook to comply with the warrants. Prosecution of the benefits scheme by Vance’s office ultimately snared more than 130 individuals, 62 of whom were among the targeted Facebook users.
NEWLY RELEASED DOCUMENTS from the Transportation Security Administration appear to confirm the concerns of critics who say that the agency’s controversial program that relies on body language, appearance, and particular behaviors to select passengers for extra screening in airports has little basis in science and has led to racial profiling.
Files turned over to the American Civil Liberties Union under the Freedom of Information Act include a range of studies that undermines the program’s premise, demonstrating that attempts to look for physical signs of deception are highly subjective and unreliable. Also among the files are presentations and reports from the TSA and other law enforcement agencies that put forth untested theories of how to profile attackers and rely on broad stereotypes about Muslims.
Tuesday, February 7, 2017
Federal prosecutors in Baltimore are expected to seek an indictment as early as this week against a former National Security Agency contractor who is accused of carrying out the biggest theft of classified information in U.S. history.
The indictment against Harold T. Martin III is expected to contain charges of violating the Espionage Act by “willfully” retaining information that relates to the national defense, including classified data such as NSA hacking tools and operational plans against “a known enemy” of the United States, according to individuals familiar with the case.
Vizio, one of the world’s biggest makers of Smart TVs, is paying $2.2 million to settle charges that it collected viewing habits from 11 million devices without the knowledge or consent of the people watching them.
According to a complaint filed Monday by the US Federal Trade Commission, Internet-connected TVs from Vizio contained ACR—short for automated content recognition—software. Without asking for permission, the ACR code captured second-by-second information about the video the TVs displayed. The software collected other personal information and transmitted it, along with the viewing data, to servers controlled by the manufacturer. Vizio then sold the data to unnamed third-parties for purposes of audience measurement, analysis, and tracking.
The U.S. Army will grant the final permit for the controversial Dakota Access oil pipeline after an order from President Donald Trump to expedite the project, despite opposition from Native American tribes and climate activists.
The protest against the $3.8 billion pipeline drew thousands of people to the North Dakota plains last year and attracted high-profile political and celebrity support.
The administration of former President Barack Obama delayed completion of the line pending a review of tribal concerns and last year ordered an environmental study.