Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]

Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The  NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Stop Funding Criminal Government - Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Cost of War to the United States

Saturday, February 27, 2010

PeNtAcOn DiScLoSeS HuNdReDs Of RePoRtS Of PoSsIbLy IlLeGaL InTeLlIgEnCe AcTiViTiEs

February 27, 2010 - by Nate Cardozo

The Department of Defense has released more than 800 heavily-redacted pages of intelligence oversight reports, detailing activities that its Inspector General has “reason to believe are unlawful.”

The reports are the latest in an ongoing document release by more than a half-dozen intelligence agencies in response to a Freedom of Information Act (FOIA) lawsuit filed by EFF in July 2009.

The reports, submitted to the Intelligence Oversight Board (IOB) by various Department of Defense components, cover the period from 2001 through 2008. The IOB’s role within the Executive Office of the President is to ensure that each component of the intelligence community works within the Constitution and all applicable laws. As such, the Inspector General of each intelligence agency is required to submit periodic reports to the IOB, which in turn is required to forward to the Attorney General any report identifying an intelligence activity that violates the law. Intelligence oversight reporting is rarely disclosed to the public.

This new release, from various Defense components including the Army and the Joint Chiefs of Staff, comes in three parts. Much of the reported improper activity consisted of intelligence gathering on so-called “U.S. Persons,” including citizens, permanent residents and U.S.-based organizations. Although Defense agencies are generally prohibited from collecting such information (except as part of foreign intelligence or counter-intelligence activity), it is apparent from the unredacted reports released to EFF that some DoD components have had chronic difficulty complying with that prohibition.

Part 1

Pg 98: A report that the Joint Forces Command, working with the FBI, improperly collected and disseminated intelligence on Planned Parenthood and a white supremacist group called the National Alliance, as part of preparations for the 2002 Olympics.

Pg 122-137: A NORAD intelligence briefing improperly included intelligence on an anti-war group called Alaskans for Peace and Justice in 2005.


Pg 257-258:
A 2006 report that NORAD had procedural problems relating to collecting information on U.S. Persons.

Part 3

Pg 53-54: A report from 2003 of a closed investigation into prisoner abuse at Abu Ghraib and other sites in Iraq.

Pg 60: A report from 2006 of improper intelligence (in the TALON program) on an anti-recruiting group.

Pg 112: A report from 2007 of an Army Reserve officer routinely collecting data on U.S. Persons exercising their free speech rights.

Part 4

Pg 19: A 2008 report that Army Signals Intelligence in Louisiana intercepted civilian cell phone conversations.

Pg 65: A 2008 report that Army Cyber Counterintelligence officers attended the Black Hat hacker conference without disclosing their Army affiliation and without prior authorization to do so.

Pg 173: A report that the Air Force Office of Special Investigations (AFOSI) set up a “honey pot” computer system to identify foreign threats in May 2006. In October 2007, AFOSI realized that the honey pot system might have been in violation of a sealed Foreign Intelligence Surveillance Court (FISC) order that required a Foreign Intelligence Surveillance Act (FISA) warrant for such activity. AFOSI was not privy to the FISC order and only knew of it from public media reporting. The operation was suspended. Amazingly, when the Air Force asked the Justice Department to see the FISC order at issue, DOJ’s National Security Division denied the Air Force’s request.

===snipped===>
"And Ye Shall Know The Truth and The Truth Will Set You Free"

WAKE UP AMERICA.....IT(s) OUR COUNTRY!!!


Love "Light" and Energy

_Don

References:

Of Interest: [CIA-AIR Report]

[Intelligence Analyst Charged Hacking Top Secret, NGA/SAP Anti-Terror Program]

[The Securitization and Militarization of Daily Life]

[FOIA Releases]

[FOIA Litigation for Accountable Government]

[FOIA: Intelligence Agencies' Misconduct Reports]

[Contractors Tied To Effort To Track, Kill Militants] ....it not just militants!

[Transforming TSA into a Military Intelligence Operation]

Friday, February 26, 2010

SiBeL EdMoNdS: ThE TrAiToR$ AmOnG U.$. - Ab$oLuTeLy $hE’s CrEdIbLe

February 26, 2010 - by Brad Friedman

SIBEL EDMONDS HAS NAMED NAMES. WHY ISN’T THE MEDIA REPORTING THE STORY?

According to a declassified version of a 2005 Department of Justice Inspector General’s report, Sibel Edmonds’s allegations are “credible,” “serious” and “warrant a thorough and careful review by the FBI.”

Perhaps more damningly, the FBI’s John Cole recently confirmed a key element of Edmonds’s claims when he revealed the existence of “the FBI’s decade-long investigation” of the State Department’s Grossman. Edmonds claimed that Grossman was perhaps the top U.S. ringleader for the entire foreign espionage scheme. The probe, Cole added, “ultimately was buried and covered up.”

SIBEL EDMONDS, a former FBI translator, claims that the following government officials have committed what amount to acts of treason. They are lawmakers Dennis Hastert, Bob Livingston, Dan Burton, Roy Blunt, Stephen Solarz and Tom Lantos, as well as at least three members of George W. BushF.R.A.U.D.’s inner circle: Douglas Feith, Paul Wolfowitz and Marc Grossman. But is Sibel Edmonds credible?

“Absolutely, she’s credible,” Senator Chuck Grassley (R-Iowa) told CBS’s 60 Minutes when he was asked about her in 2002. “The reason I feel she’s very credible is because people within the FBI have corroborated a lot of her story.” Edmonds’s remarkable allegations of bribery, blackmail, infiltration of the U.S. government and the theft of nuclear secrets by foreign allies and enemies alike rocked the Bush Administration. In fact, Bush and company actually prevented Edmonds from telling the American people what she knew—up until now.

John M. Cole, an 18-year veteran of the FBI’s Counterintelligence and Counterespionage departments, revealed the panic of upper-echelon officials when Edmonds originally started talking back in 2002. “Well, the Bureau is gonna have to try to work something out with Sibel,” Cole said an FBI executive assistant told him at the time, “because they don’t want this to go out and become public.”

But they couldn’t “work something out with Sibel” because, it seems, she wasn’t looking to make a deal. Edmonds says she was looking to expose what she believed to be the ugly truth about the infiltration of the U.S. government by foreign spies. They were enabled, Edmonds claimed, by high-ranking U.S. officials and insider moles planted at nuclear weapons facilities around the nation.

“Everybody at headquarters level at the Bureau of Idiots knew what she was saying was extremely accurate,” Cole said recently. “They were trying to figure out ways of keeping this whole thing quiet because they didn’t want Sibel to come out.”

Her under-oath testimony for the Ohio Election Commission, given in a recent videotaped deposition, is both shocking and horrifying. (Edmonds was the star witness for Congressional candidate David Krikorian in connection with a formal complaint initiated by Representative Jean Schmidt [R-Ohio]. Challenging her in 2008, a Krikorian flyer had accused Schmidt of accepting “blood money” from Turkish interests to help block a House bill recognizing Turkey’s genocide of Armenians in 1915.) The deposition was allowed to proceed by the Obama Administration, which chose not to invoke the draconian and little-known “State Secrets Privilege” to gag her, as the previous administration had done, twice.

Edmonds testified that Congressman Dennis Hastert (R-Illinois), a former Speaker of the House, was involved in “several categories” of corruption on behalf of Turkish agents, according to information she claims to have heard while translating and analyzing FBI counterintelligence wiretaps recorded from 1996 through 2002. She mentioned his “acceptance of large sums of bribery in forms of cash or laundered cash” coupled with the ability “to do certain favors…make certain things happen for… [the] Turkish government’s interest.”

===snipped===>

Former Congressman Bob Livingston (RLouisiana), who was set to become Speaker prior to Hastert until evidence of a sexual affair was revealed by Larry Flynt, was described in Edmonds’s deposition as having participated in “not very legal activities on behalf of foreign interests” before leaving office in 1999. Afterward, she said, Livingston acted “as a conduit to…further foreign interests, both overtly and covertly,” and also became both a lobbyist and “an operative” representing Turkish interests.

According to Edmonds, Representative Roy Blunt (R-Missouri)—likely to run for a U.S. Senate seat in 2010—was “the recipient of both legally and illegally raised…campaign donations from…Turkish entities.” Edmonds also claimed that hard-right Representative Dan Burton (R-Indiana), who was instrumental in the impeachment of President Bill Clinton, carried out “extremely illegal activities” and covert operations that were “against the United States citizens” and “against the United States’ interests.”

Edmonds named allegedly traitorous Democrats too. She said that former New York Congressman Stephen Solarz, now also a lobbyist, “acted as conduit to deliver or launder contributions and other bribe[s, including blackmail] to certain members of Congress.” And, according to Edmonds, the late Congressman Tom Lantos (D-California) was said to have been involved in “not only…bribe[ry], but also…disclosing [the] highest level protected U.S. intelligence and weapons technology information both to Israel and to Turkey [and] other very serious criminal conduct.”

The most overtly salacious of the allegations involved Representative Jan Schakowsky (D-Illinois), who is “married with…grown children, but she is bisexual,” according to Edmonds. The FBI whistleblower described how Schakowsky was “hooked” by Turkish agents into having a lesbian “sexual relationship with one of their spies,” and “the entire episodes of their sexual conduct was being filmed because the entire house…was bugged…to be used for certain things that they wanted to request.”

===snipped===>

Edmonds’s most disturbing allegations, however, may be against high-ranking appointed officials in the Bush Administration. Elaborating on testimony she laid out in her sworn deposition, Edmonds told American Conservative magazine’s Phil Giraldi—a 17-year CIA counterterrorism officer—very specific details of alleged traitorous schemes perpetrated by top State and Defense Department officials. As already noted, these included Douglas Feith, Paul Wolfowitz
and, perhaps most notably, former Deputy Undersecretary of State Marc Grossman, the third-highest-ranking official in the BushF.R.A.U.D. State Department.

Edmonds said that Feith and Wolfowitz were involved in plans to break Iraq into U.S. and British protectorates months prior to 9/11. She also claimed that the duo shared information with Grossman on how to blackmail various officials and that Grossman had accepted cash to help procure and sell nuclear weapons technology to Israel and Turkey—and, from there, on to the foreign black market. There the technology would be purchased by the highest bidder, such as Pakistan, Iran, Libya, North Korea or possibly even al-Qaeda.

===snipped===>
"And Ye Shall Know The Truth and The Truth Will Set You Free"

WAKE UP AMERICA.....IT(s) OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[Sibel Edmonds Blog Rasti]

[Sibel Edmonds Boiling Frogs]

[Sibel Edmonds Discusses U.S. Corruption!]

Sunday, February 21, 2010

PaRt III: ExPo$iNg OuR EneMy – MeEt tHe EcOnOmIc ElItE

February 19, 2010 - By David DeGraw [TPR]

Part I and II of David DeGraw’s six-part series can be found here and here.

I: Casualties of Economic Terrorism, Surveying the Damage

II: The Rise of the Economic Elite

III: Exposing Our Enemy – Meet the Economic Elite

IV: The Financial Coup d’Etat

"V": Overcoming the Divide and Conquer Strategy

VI: How to Fight Back and Win: Common Ground Issues That Must Be Won

“The money powers prey upon the nation in times of peace and conspire against it in times of adversity. It is more despotic than a monarchy, more insolent than autocracy, and more selfish than bureaucracy. It denounces as public enemies, all who question its methods or throw light upon its crimes… As a result of the war, corporations have been enthroned and an era of corruption in high places will follow, and the money powers of the country will endeavor to prolong it’s reign by working upon the prejudices of the people until all wealth is aggregated in a few hands and the Republic is destroyed.”

– Abraham Lincoln

U.S. Elite - Institutions:

Federal Reserve - Business Council - Bilderberg Group - Conference Board - Brookings Institute

Advertising Council - Heritage Foundation - Trilateral Commission - Business Round Table

Chamber of Commerce - Federal Trade Commission - Council on Foreign Relations

American Petroleum Institute - American Enterprise Institute - American Bankers Association

Pharmaceutical Research and Manufacturers of America (PhRMA)

Public Relations Society of America - American Psychological Association

Project for a New American Century - Securities and Exchange Commission

Committee for Economic Development - National Association of Manufacturers

Carnegie / Ford / Rockefeller Foundations - Tax-exempt Foundations

Military / Media / Prison Industrial Complex

I don’t view the Economic Elite as a small group of men who meet in secrecy to control the world. They do feature elements of conspiracy and are clearly composed of secretive organizations like the Bilderberg Group – this is not a conspiracy theory, this is a conspiracy fact – but as a whole the Economic Elite are primarily united by ideology. They’re made up of thousands of individuals who subscribe to an ideology of exploitation and the belief that wealth and resources need to be concentrated into the fewest hands possible (theirs), at the expense of the many.

===snipped===>

In total, the Economic Elite are made up of about 0.5 percent of the US population. At the center of this group is the Business Roundtable, an organization representing Fortune 500 CEOs that is also interlocked with several lead elite organizations. Most Americans have never heard of the Business Roundtable. However, in my analysis, it is the most influential and powerful Economic Elite organization.

“The Business Roundtable joined the Business Council at the heart of both the corporate community and the policy-formation network and now has the most powerful role…. The Roundtable’s interlocks with other policy groups and with think tanks are presented.” --- G. William Domhoff, Who Rules America?

The Business Roundtable is the most powerful activist organization in the United States. Their leaders regularly lobby members of Congress behind closed doors and often meet privately with the President and his administration. Any legislation that affects Roundtable members has almost zero possibility of passing without their support.

===snipped===>

In addition to dominating our political and economic system, the Economic Elite have already created their own private military. Their private military is now more powerful than the US military. As mentioned earlier, private mercenaries now outnumber US soldiers and receive the lion’s share of military spending.

Corporations like SAIC, Blackwater, Bechtel, Raytheon and Halliburton are composed of the most elite worldwide intelligence and military officers. These are the highly profitable and powerful entities that the Economic Elite turn to when national militaries and intelligence agencies – like the CIA, FBI or other government run entities – can’t get the job done.

For instance, SAIC, a “stealth company” that most people have never heard of, is considered to be the brains of the entire US intelligence apparatus, more powerful than the much more popularly known CIA, NSA and FBI – all agencies that SAIC is deeply intertwined with. I urge you to research SAIC to get a crash course in how the true power structure functions. You can start by reading an excellent investigative report by Donald L. Barlett and James B. Steele titled, “Washington’s $8 billion shadow.”

The Economic Elite dominate US intelligence and military operations. Other than the obvious geo-strategic reasons, the never-ending and ever-expanding War on Terror’s objective is to drain the US population of more resources and further rob US taxpayers, while using our tax money to create a private military that is more powerful than the US military.

I think any logical person can see the ominous implications of having such a vast and powerful private military and intelligence complex, created for and used, in secrecy, by the Economic Elite. Outside of the blatant economic policy attacks, heavily armed and sophisticated covert powers led by small groups of Economic Elite are now a serious risk and present danger.

In conclusion, these economic and government policy forming organizations, along with their private military and intelligence corporations, form the core of the Economic Elite power structure.

===snipped===>"And Ye Shall Know The Truth and The Truth Will Set You Free"

WAKE UP AMERICA.....IT(s) OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[The Ominous Parallels *.*]

Thursday, February 18, 2010

GoOgLe: We DiDn'T hElP tHe NSA (Or dId wE?) - "TeMpUs OmNiA ReVeLaT"

Thursday, February 16, 2010

by Chris Soghoian

Google is now the first of the major search engines and e-mail providers to make a firm statement on the issue of the National Security Agency's wholesale surveillance of Internet content.

Google has stated it didn't help the NSA search your e-mails. More specifically the company denies participating in the NSA's Terrorist Surveillance Program. But the company's carefully worded denial might not be enough to reassure savvy readers.

Google Comes Under Fire for 'Secret' Relationship with NSA

[Link Add: 06.03.10 Google’s DNA ‘Bio-Piracy’ & Federal DNA Databanks]

The Wall Street Journal recently revealed the true extent of the NSA's surveillance system:

"According to current and former intelligence officials, the spy agency now monitors huge volumes of records of domestic e-mails and Internet searches."

This builds on what we learned the previous week, when The Washington Post revealed that the primary motivation for the White House's wiretapping immunity demands is to protect those firms that assisted with illegal, mass-scale surveillance of e-mail traffic.

Google has now taken the interesting step to become the first major Internet company to deny helping the NSA. In an on-the-record e-mail with a company spokesperson on Friday, I was told that:

"Google was not part of the NSA's Terrorist Surveillance Program."

Is that enough to reassure you?

If Google was obligated to give up search/e-mail records, it is likely that this request would be made via a Patriot Act authorized National Security Letter. A recent Journal article confirmed as much, stating that the information gained from National Security letters ended up in the gigantic NSA databases. But recipients of those letters may not be allowed to tell anyone about it, and may in fact be forced to lie.

The owner of an ISP who received one of these secret orders explained the significant restrictions placed upon him in a letter to The Washington Post back in 2007.

Under the threat of criminal prosecution, I must hide all aspects of my involvement in the case--including the mere fact that I received an NSL--from my colleagues, my family and my friends. When I meet with my attorneys I cannot tell my girlfriend where I am going or where I have been. I hide any papers related to the case in a place where she will not look. When clients and friends ask me whether I am the one challenging the constitutionality of the NSL statute, I have no choice but to look them in the eye and lie.

If this poor gentleman had to lie to his girlfriend and family, it's possible that Google, if it did receive a FBI National Security Letter, might be placed in a similar position.

Careful wording:

My original question to Google was, "Is Google sharing 'huge volumes' of search records with the government?" I never asked about the NSA's Terrorist Surveillance Program specifically.

As Salon's Glenn Greenwald has explained, the BushF.R.A.U.D. administration has been very careful with its use of the term "Terrorist Surveillance Program." Many snooping activities, some of which were clearly illegal, do not come under this definition. Simply put, Google could have handed over a copy of every search request and every e-mail sent by a Gmail user to the U.S. government and it would still be able to quite correctly deny participating in the Terrorist Surveillance Program.

In any case, on January 17, 2007, Attorney General Alberto Gonzales announced that the Terrorist Surveillance Program would not be reauthorized by the president, but would be subjected to quasi-judicial oversight. So the Terrorist Surveillance Program, at least by that name, no longer exists, and Google could be actively handing over millions of e-mails, while the statement made by its PR people would be completely true.

Continued concerns:

What if Google's PR people are telling the truth? What if Google really didn't help the NSA, and that the spooks are collecting millions of search records via wiretaps placed on the Internet backbone?

It's worth pointing out that Google has stood up to the feds when they demanded search records a couple years back--but this was the DOJ, not the NSA.

The problem remains that Google is not doing a single thing to protect its customers from this kind of large-scale surveillance. While the company supports SSL-encrypted Webmail sessions, it does little to advertise it, and has taken no steps to turn it on by default.

However, the biggest problem is search. Google offers no way for its customers to search the Internet without an evil ISP (such as AT&T) from snooping in on the traffic. Google could very easily enable SSL search sessions, but has not taken any steps to do so.


===snipped===>
"And Ye Shall Know The Truth and The Truth Will Set You Free"

WAKE UP AMERICA.....IT(s) OUR COUNTRY!!!


Love "Light" and Energy

_Don

References:

Of Interest: [CIA-AIR Report]

[The Securitization and Militarization of Daily Life]

[Google, Microsoft Push Feds to Fix Privacy Laws] ...L.O.L. Shit is gettng D.E.E.P.!

[Lawmakers Urge FTC To Investigate Google Buzz]

[EPIC Urges Federal Trade Commission to Investigate Google Buzz: EPIC has filed a complaint with the Federal Trade Commission, urging the FTC to open an investigation into Google Buzz. Last week, Google tried to transform its popular email service into an untested social networking service. As a consequence, Google displayed social networking lists based on a user's most frequent address book contacts. The change was widely criticized. EPIC's complaint cites clear harms to service subscribers, and alleges that the change in business practices "violated user expectations, diminished user privacy, contradicted Google's privacy policy, and may have violated federal wiretap laws." EPIC also noted that the FTC has failed to take action in another matter involving Google and Cloud Computing services.]

[Google's Page Rank]

[Effective Mind Control, Etc.]

[Google in bed with U.S. intelligence]

[Windows Vista Security and The NSA]......MicroNetworkSolution/NSA/SAICs Backdoor!

[Google Searches for Staffing Answers]

[Federal DARPA's Cognitive Computing Programs]

[Google's New Algorithm Can Read Employees' Minds]

[DISA’s/NSA’s “Net-Centric” “Global Information Grid”]

[Google Megalomaniacs in Bed with Pentagon/NWO Lunatics]

Wednesday, February 17, 2010

[RECAP] - "RoGuE HaCkEr" aNd BlAcK Op$ - BeHiNd The CyBeRaTtaCk$ oN AmErIcA

February, 17, 2010 - by Tom Burghardt

The iconic American investigative journalist I.F. Stone once said, "All governments are run by liars and nothing they say should be believed." Stone's credo is all the more relevant today when it comes to the pronouncements of intelligence agencies and their corporate masters, particularly where official enemies are concerned

A widespread computer attack that began July 4 took down several U.S. Government, South Korean and financial web sites, the Associated Press reported.

Multiple media reports claim that the Treasury Department, the Department of Homeland Security (DHS), Secret Service, Federal Trade Commission and Department of Transportation web sites were struck by a distributed denial of service (DDOS) assault that began last Saturday.

According to Computerworld, "a botnet comprised of about 50,000 infected computers has been waging a war against U.S. government Web sites and causing headaches for businesses in the U.S. and South Korea." The magazine reported July 7, "on Saturday and Sunday the attack was consuming 20 to 40 gigabytes of bandwidth per second, about 10 times the rate of a typical DDoS attack, one security expert said after being briefed by the US-CERT on Tuesday. 'It's the biggest I've seen'."

This is particularly embarrassing to the DHS since the agency's U.S. Computer Emergency Readiness Team (U.S.-CERT) is responsible for preventing illegal hacking forays on government networks.

Attacks were also reported on the White House, the Department of Defense, the State Department, The Washington Post, U.S. Bancorp, the New York Stock Exchange and Nasdaq. Affected sites in South Korea included those of the presidential Blue House, the Ministry of Defense, the National Assembly, Shinhan Bank, the newspaper Chosun Ilbo. South Korea's top Internet Service Provider, Naver.com crashed on Tuesday, according to the Associated Press.

===snipped===>Que Bono:Who Benefits?

While we may never know who actually launched the incursions, we just might have a slight inkling of who'll benefit. As Antifascist Calling reported July 6, plans are already afoot to roll-out Einstein 3, a BushF.R.A.U.D.-era surveillance program to screen state computer traffic on private-sector networks.

In partnership with the Department of Homeland Security and the National Security Agency, communications, defense and security firms such as AT&T, General Dynamics, L3 Communications, MCI, Qwest, Sprint and Verizon stand to make billions from contracts under the government's Managed Trusted Internet Protocol Services (MTIPS) program with its built-in "Einstein domain."

How's that for timing!

NeW DHS-NSA-AT&T "CyBeRsEcUrItY" PaRtnEr$hIp

by Antifascist Calling

Pervasive Surveillance Continuing Under ObamaC.H.A.N.G.E.

Under the rubric of cybersecurity, the ObamaC.H.A.N.G.E. administration is moving forward with a BushFRAUD regime program to screen state computer traffic on private-sector networks, including those connecting people to the Internet, The Washington Post revealed July 3.

That project, code-named "Einstein," may very well be related to the much-larger, ongoing and highly illegal National Security Agency (NSA) communications intercept program known as "Stellar Wind," disclosed in 2005 by The New York Times.

There are several components to Stellar Wind, one of which is a massive data-mining project run by the agency. As USA Today revealed in 2006, the "National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth."

Under the current program, Einstein will be tied directly into giant NSA data bases that contain the trace signatures left behind by cyberattacks; these immense electronic warehouses will be be fed by information streamed to the agency by the nation's telecommunications providers.

AT&T, in partnership with the Department of Homeland Security (DHS) and the NSA will spearhead the aggressive new initiative to detect malicious attacks launched against government web sites--by continuing to monitor the electronic communications of Americans.

This contradicts President Obama'sC.H.A.N.G.E. pledge announcing his administration's cybersecurity program on May 29. During White House remarks Obama said that the government will not continue Bush-era surveillance practices or include "monitoring private sector networks or Internet traffic."

Called the "flagship system" in the national security state's cyber defense arsenal, The Wall Street Journal reports that Einstein is "designed to protect the U.S. government's computer networks from cyberspies." In addition to cost overruns and mismanagement by outsourced contractors, the system "is being stymied by technical limitations and privacy concerns." According to the Journal, Einstein is being developed in three stages:

Einstein 1: Monitors Internet traffic flowing in and out of federal civilian networks. Detects abnormalities that might be cyber attacks. Is unable to block attacks.

Einstein 2: In addition to looking for abnormalities, detects viruses and other indicators of attacks based on signatures of known incidents, and alerts analysts immediately. Also can't block attacks.

Einstein 3: Under development. Based on technology developed for a National Security Agency program called Tutelage, it detects and deflects security breaches. Its filtering technology can read the content of email and other communications. (Siobhan Gorman, "Troubles Plague Cyberspy Defense," The Wall Street Journal, July 3, 2009)

===snipped===>Einstein: You Don't Have to Be a Genius to Know They're Lying

But what happens next, after the data is processed and catalogued by the agency is little understood. Programs such as Einstein will provide NSA with the ability to read and decipher the content of email messages, any and all messages in real-time.

While DHS claims that "the new program will scrutinize only data going to or from government systems," the Post reports that a debate has been sparked within the agency over "uncertainty about whether private data can be shielded from unauthorized scrutiny, how much of a role NSA should play and whether the agency's involvement in warrantless wiretapping during George W. BushFRAUD's presidency would draw controversy."

===snipped===>"And Ye Shall Know The Truth and The Truth Will Set You Free"

WAKE UP AMERICA.....IT(s) OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[Update: 06.13.10 Microsoft Secretly Installs Firefox Extension via Windows Update]:O

[Update: 06.06.10 Samsung Smartphone Shipped With Malware-infected Memory Card] Ya Don't Say:O

[Update: 06.02.10 Windows Live Messenger Hack Tool Is Actually Malware] LOL LOL LOL

[Update: 06.01.10 Researchers Beat Clickjacking Defenses of Top Websites] Ya Don't Say:O

[Update: 06.01.10 Clickjacking Worm Hits Facebook] More DoD R&D Backdoors!

[Update 05.21.10: IBM Hands Out Malware at AusCERT Security Conference] Ya Don't Say:O

[Update 05.13.10: Latest Damage Control 'Declassified"] LOL LOL LOL

[Heads Up! Plague in (Security) Software] Intel back-doors

[New attack bypasses virtually all AV protection] More DuDs R&D

[Hacked US Treasury websites serve visitors malware] Ya don't Say!

[The Securitization and Militarization of Daily Life]

[Countermeasure - Foxit PDF Reader]

[Are PDF's Worm-able?]

[IBM and FAA working together on security project] hmm...very interesting ;)

[Countermeasure - Certificate Patrol Firefox Add-On]

[New PDF-Based Arbitrary Code Execution Technique Revealed] Adobe Exposed Again!

[Urban Legend Watch: Cyberwar Attack on U.S. Central Command] Duhhhhhhh

[Google, Microsoft Push Feds to Fix Privacy Laws] ...L.O.L. Shit is getting D.E.E.P.!

LOL LOL LOL [Lawmakers Urge FTC To Investigate Google Buzz] LOL LOL LOL

[Facebook Announces Changes to Privacy Policy. Again...Geo Location Tracking]

[Researchers demo wireless keyboard sniffer for Microsoft 27Mhz keyboards] KeyKeriki

[Intelligence Support Systems for Lawful Interception/Investigations/Spying]

[China Accuses Google of US Intelligence Ties] LOL LOL LOL DUHHHHHHHHH!

[LOL LOL LOL - Governments Fakes SSL Certificates- LOL LOL LOL] TOLD YA SO!

[LOL LOL LOL- Law Enforcement Appliance Subverts 'SSL- LOL LOL LOL] TOLD YA SO!

[Security Watch: Beware the NSA’s Geek-Spy Complex]

[Secret Service Paid TJX Hacker $75,000 a Year] DUHHHHHHHHHHH

[It looks, feels, and acts like Microsucks, maybe it is Microsucks?]

[More Damage Control - LOL LOL LOL "3" Persons Contolling 12 Million IPs? LOL LOL LOL]

[Federal Agencies Expand Internet Monitoring] LOL LOL LOL

[Cyberwar Scam Designed to Destroy Open Internet]

[Cryptome's Publication of Microsoft's Manual is a Fair Use]

[Microsoft/Network Solutions Demand Takedown] DUHHHHHHHHHH

A document from a 2008 oversight report indicates that Army Cyber Counterintelligence officers attended a Black Hat security conference without disclosing their Army affiliation. The conference, held annually in Las Vegas and Washington, D.C., attracts hackers and security professionals from around the world. It’s also a hotbed gathering for undercover law enforcement and intelligence agents from around the world who come to learn about the latest computer security vulnerabilities and what specific hackers are up to. The documents don’t indicate if the officers collected any information on conference attendees.

[Hacker 'Mudge' gets DARPA job]

[Google Buzz accused of EPIC FAIL]

[Firefox: Location-Aware Browsing]

[Pentagon Seeks High School Hackers]

[Hacker claims he was working for FBI]

[Google Buzz bug exposes user geo location]

[Pentagon Working on Cyberwarfare Tools for GIs]

[Hacker ‘Dark Tangent’ Joins DHS Advisory Council]

[Surprise Adobe update grapples with critical flaws]

[Cybersecurity official quits, blasts NSA power grab]

[Hackers update rootkit causing Windows blue screens]........Microsofts Security Updates = Intel Hack Patches

[US: Contractors Vie for Plum Work, Hacking for U.S. Government]

[Programmer Conned CIA, Pentagon Into Buying Bogus Anti-Terror Code]

Notice; site being blocked, use The Cloak to view: www.wired.com/threatlevel/2009/12/montgomery-2/

Tuesday, February 16, 2010

SpYiNg FoR DoLlAr$: MiLiTaRy CoNtRaCtOr$ aNd $eCuRiTy FiRm$ ReAp HuGe PrOfIt$

Tuesday, Feburary 16, 2010

by Tom Burghardt

As the Defense Budget Soars, Billions of Dollars are Channelled Offshore to Avoid Paying Taxes

The Obama administration is seeking to increase the obscenely bloated U.S. Defense Department budget to a whopping $708 billion for fiscal year 2011, 3.4% above 2010's record level, The Wall Street Journal reported.

While the overall budget deficit will balloon to a staggering $1.6 trillion in 2011, the result of massive tax cuts for the rich, declining revenues, a by-product of capitalism's economic meltdown, imperial adventures abroad and general corporate malfeasance (the old tax-dodge grift), the administration plans to cut $250 billion over three years from non-military "discretionary spending" on domestic social programs.

However, as the World Socialist Web Site
points out: "President Barack Obama has done nothing to reverse decades of wage stagnation, mounting poverty, and attacks on the social welfare system. On the contrary, following George W. Bush, he has seized on the crisis to redistribute wealth to a tiny financial elite through the ongoing bailout of the finance industry."

It is no small irony that despite stark budget figures and an even bleaker future for the American working class, Washington Technology reported January 28 that the "29 largest publicly traded defense contractors increased their use of offshore subsidiaries by 26 percent from 2003 to 2008."

Citing reports by the Government Accountability Office (GAO), journalist Alice Lipowicz disclosed that the "subsidiaries helped the contractors reduce taxes, in part by avoiding Social Security and Medicare payroll taxes for U.S. workers hired at the foreign subsidiaries."

Considering that the Pentagon hands out some $396 billion annually to contractors, outsourcing everything from "in theatre" construction in places like Afghanistan and Iraq to pricey "intelligence analysts" at secret state agencies, cash not spent on payroll taxes by dodgy firms slices another hole into the already-shredded social safety net.

Amongst the largest firms cited in GAO's 2008 report, updated in January 2010, Oracle Corp., operates in 77 tax havens; Boeing Co., 38; Dell Inc., 29; BearingPoint Inc., 28; Computer Sciences Corp., 21; Fluor Corp., 34; General Dynamics, 5; Harris Corp., 13; Hewlett-Packard, 14; Honeywell International, 7; ITT Corp., 18; L-3 Communications, 15; Sprint Nextel, 7.

-----------------------------------------------------------------------------------------------------------------

??????___GUESS WHO'S NOT IN THE REPORT___??????===> SAIC International Locations

-----------------------------------------------------------------------------------------------------------------

Many of the firms are heavily-leveraged in the lucrative "homeland security" market and provide technology and "cleared" intelligence analysts, many of whom jumped ship from government service for richer, if more dubious employment, to a host of secret state agencies including the CIA, DIA, NSA as well as ultra-secretive outfits engaged in global satellite surveillance such as the National Reconnaissance Office (NRO) and the National Geospatial-Intelligence Agency (NGA).

===snipped===>An "Island Paradise" Where Profits Go to Hide

Despite fabulous riches showered on shareholders by taxpayers, the Military-Industrial-Security-Complex will not rest until every dime has been squeezed from the American people, swelling corporate abdomens well-past the bursting point.

In cinematic terms, think of America's ruling elite as a horde of sociopathic zombies gobbling everything in sight. Instead of screaming "Brains!" as in Sam Raimi's cult classic, The Evil Dead, corporate zombies cry "Cash! I Need Cash!" as they take down entire nations in one rapacious bite!

A new report published by the Government Accountability Office (GAO) in January found, "Many of the top 29 U.S. publicly traded defense contractors--those with $1 billion or more in DOD contracts in fiscal year 2008--have created offshore subsidiaries to facilitate global operations. Between fiscal years 2003 and 2008, they increased their use of these subsidiaries by 26 percent, maintaining at least 1,194 in 2008." DUHHHHHHHHHH

GAO auditors revealed that corporate subsidiaries in tax havens such as the Bahamas, Switzerland, the Cayman Islands, Bahrain, Netherlands Antilles, Jersey, Bermuda, the Channel Islands, Luxembourg, Macao, Lebanon, Liechtenstein and Cyprus "helped the 29 contractors reduce taxes, with about one-third decreasing their effective U.S. corporate tax rates in 2008 in part through the use of foreign affiliates, lower foreign tax rates, and indefinite reinvestment of foreign income outside of the United States."

A convenient shell game since the "indefinite reinvestment of foreign income" isn't taxable until its been repatriated to the United States. What do you think the chances are of thathappening any time soon?

As an added incentive that helped firms hit the old corporate "sweet spot," the congressional watchdogs found that "companies principally used offshore subsidiaries to hire U.S. workers providing services overseas on U.S. government contracts in order to avoid Social Security, Medicare--known as Federal Insurance Contributions Act (FICA)--and other payroll taxes. This practice allowed contractors to offer lower bids when competing for certain services and thereby reduce costs for DOD."

===snipped===>Out of Sight, Out of Mind

A futile exercise perhaps, given that our corrupt representatives in Congress, "change" Democrats and troglodytic Republicans alike, will do nothing to close tax loop-holes big enough to sail an aircraft carrier through.

And why would they, since the largest contributors flooding congressional campaign coffers with cold, hard cash are the same firms that reap the benefits of corporate-friendly tax codes, as the Center for Responsive Politics points out.

Just for kicks, let's take a look at some of the worst malefactors, firms whose stated mission is to "protect" heimat citizens while inflating the bottom line through the creative use of foreign subsidiaries.

Aside from "taking advantage of foreign government markets for commercial work," the GAO reports, "a key benefit of using offshore subsidiaries cited by contractors and other experts we spoke with was the ability to reduce overall taxes."

===snipped===>Flying the Friendly Skies ... With the CIA!

What do these studies tell us? It pays to have friends in high places! Let's take a peek at just two of the 29 firms profiled in GAO's 2010 report as well as their earlier 2008 investigation.

The Boeing Company (Boeing): Washington Technology listsBoeing as No. 2 on their Top 100 list of federal contractors with $10,838,231,984 in overall revenue.

Primary government contracts include projects for NASA, the Navy, Air Force, Army, Marine Corps, the Department of Homeland Security and the State Department. One subsidiary, and contract, which the giant firm isn't too keen on publicizing is Jeppesen International Trip Planning, the booking agent for CIA torture flights.

As Antifascist Calling previously reported, the firm is being sued by victims of the Bush administration's illegal practice of "rendering" (kidnapping) so-called "terrorists" into the hands of torture-friendly regimes or to CIA "black sites" in Europe and the Middle East.

===snipped===>Spying for Dollars [Let's not forget SAIC a.k.a. NSA West]

Computer Sciences Corporation (CSC): One of the largest defense contractors operating under the radar, CSC is No. 9 on Washington Technology's Top 100 list of prime federal contractors with some $3,435,767,906 in revenue.

The Falls Church, Virginia-based outfit's business includes consulting, systems integration and outsourcing, and their major customers include the Defense Department, NASA, Navy, Army, Air Force, Treasury Department, Health and Human Services, the Environmental Protection Agency, Transportation Department and Department of State.

In his essential book
Spies for Hire, Shorrock has described CSC as "one of the NSA's most important contractors," managing "global information networks and produces and disseminates intelligence products, including specialized expertise in the area of imagery processing and archiving."

"After 9/11" Shorrock writes, "CSC formed a new business unit to go after homeland security and intelligence work," including contracts with the Defense Intelligence Agency.

Shorrock reveals that one of the "mission critical" consortiums that run DIA global operations "is managed by Computer Sciences Corporation (CSC). ... The CSC team includes CACI International and L-3 MPRI. This last company is one of the largest private armies in the world, and would have at its disposal hundreds of paramilitary officers who would fit in exceedingly well with the DIA's secret intelligence teams in the Middle East and North Africa."

According to the firm's web site, CSC's Intelligence Analysis and Operational Support division "applies advanced information technology, expert knowledge, best practices, and business process improvement in all phases of the intelligence cycle (planning and direction, collection, processing, analysis and production, and dissemination)."

"At the enterprise level," CSC informs us, "our prowess in systems integration, engineering, and consulting help create IT infrastructures and ways of doing business that put the right tools in the right hands at the right time, so that intelligence staffs and decision makers can get on with the business of protecting the country."

With no end in sight, the data-mining growth curve continues along its merry way, integrating and analyzing the electronic communications of Americans "captured" by CIA, DIA, FBI, NCTC and NSA data miners and their partners in the telecommunications industry.

Accordingly, CSC "develops and integrates automated tools for unique requirements of specialized intelligence analysts." Tools that enable secret state agencies to "Capture and mine information from multiple sources in multiple languages; Collaborate in real time with fellow analysts; Create models in which to store working data and test hypotheses; Discover insider threats by tracking network behavior; Automatically analyze and visualize complex data using intelligent software agents."

As with hundreds of other firms who trade top secret security clearances as if they were trading cards, CSC provides "experienced, cleared intelligence professionals who perform intelligence analysis, database construction and population, editorial support and quality assurance, production and collection management, analytic tradecraft training, on-the-ground acquisition of unique data sets, and foreign language support."

Conveniently, CSC has some 1,200 employees who they rent to the secret state at a premium price "who meet DCID 6/4 eligibility requirements and have access to Sensitive Compartmented Information (SCI) or Special Access Programs (SAPs)," i.e., Pentagon, CIA and NSA "black programs" only known by code words that escape congressional scrutiny, or indeed any democratic oversight.

===snipped===>
"And Ye Shall Know The Truth and The Truth Will Set You Free"

WAKE UP AMERICA.....IT(s) OUR COUNTRY!!!


Love "Light" and Energy

_Don

References:

[
The Securitization and Militarization of Daily Life]

[CSC]

[CACI]

[MPRI]

[SAIC]

[Data Mining]

Saturday, February 6, 2010

HAARP HaS DeLeTeD iTs ReCoRdS FrOm 01.11.2010 - InTeReStInG R[aN]D


By Daniel Solis

A very unusual deletion can be observed in the archived data of HAARP instrument readings from the day before the Haiti earthquake. Perhaps it is a matter of time until it will get fixed with a simple copy-paste operation, but I have made screen shots of it).

Set the date in "Chart Archives" below the today's graph to January 11 2010 in the window below the graph and see for your selves. It is the only instance of such an occurrence I have discovered by looking through other historical dates. Perhaps some other deletions have already been fixed, I can think of date like May 12th 2008 or December 26th 2004.

The graphs are here:






Also check patents related to HAARP to understand the technology of reversed piezoelectric effect in which earth can tremble when energy is applied to ionosphere. Scientific references will be underlining this further in this post: The patents are from greater part owned by a LARGE defense contractor:






- US Patent 5068669 - Power beaming system


Just lets remember the scenario 6 years ago: Did New York Orchestrate The Asian Tsunami?


Theoretical Model of Possible Disturbances in the Nighttime Mid-Latitude Ionospheric D Region over an Area of Strong-Earthquake Preparation (Institute of Terrestrial Magnetism, Ionosphere, and Radio-Wave Propagation of the Russian Academy of Sciences)

Relationship between microseisms, geomagnetic activity and ionospheric absorption of radio waves (Geophysical Institute, Czechosl. Acad. Sci., Prague)

MODELING OF THE ACOUSTO-ELECTROMAGNETIC METHOD FOR IONOSPHERE MONITORING (Karpenko Physico-Mechanical Institute of the National Academy of Sciences of Ukraine)

===snipped===>"And Ye Shall Know The Truth and The Truth Will Set You Free"

WAKE UP AMERICA.....IT(s) OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

TOPs Blogger Role