"Social Control and Theatrical Fabrications" 

Reload Page Return to "Social Control and Theatrical Fabrications"  

Commentary: "Target’s Close Relationship to Government Needs to Be Watched" [12/31/13] Printer Friendly Version "Target’s Forsenic Services is who the FBI, Secret Service, BATF and others have turned to for help for two decades. Target’s forensic expertise has its roots in loss prevention. But unlike other corporations, Target pursued it to such a degree that they surpassed the capabilities of government crime labs. In a Washington Post article eight years ago, Nathan K. Garvis, Target’s vice president of government affairs at the time said “In many ways, Target is actually a high-tech company masquerading as a retailer.” Target has been actively involved with law enforcement since the mid-90’s but “intensified” after 9/11. And Target’s high tech masquerading isn’t just about crime solving. Target is watching its customers very, very closely. [...] We’ve just seen one of the most massive thefts of financial data ever. Over 40 million credit card numbers, with their PIN data has been stolen [6:20]. And they were stolen from a company that has been the leader in forensic sophistication for 20 years. A company the government relies upon to investigate crime. If you were a criminal hacker, sophisticated enough to get away with a crime of that magnitude, wouldn’t you know about Target’s Forensic Services? Wouldn’t another company be an easier mark? As the business ethics professor said 8 years ago, Target’s close relationship with the government needs to be watched. If we see “anything bad is happening” — like using this theft to push for a biometric identification agenda — we should all start asking a lot of questions. [...]"  

Commentary: "Ruling In Favor Of NSA's Program Relied On Claims In 9/11 Report That Aren't Actually In That Report" [12/31/13] Printer Friendly Version "The more people look at the ruling last week by Judge William Pauley saying that the NSA's bulk metadata collection is legal, the more perplexed they become. We noted multiple problems with the ruling last week, but at almost every turn is evidence that Judge Pauley not only came into the court with his decision already set, but that he took the government's claims at face value, even when they were flat-out factually incorrect -- and which could have been easily checked. We already noted that Pauley's argument that 9/11 could have been prevented with such a metadata collection had been widely debunked, but it's worse than that. Pauley's ruling cites the 9/11 Commission report for this particular argument. There's a big problem with that. The 9/11 Commission report doesn't even mention the story that Judge Pauley claims is in the report. As we've discussed in the past, the NSA and its defenders keep pointing to the story of Khalid al-Mihdhar, a terrorist who was in San Diego and made a call to a known Al Qaeda safe house in Yemen. Except, as was widely reported, the intelligence community had collected all the necessary info and was even intercepting calls between the US and the safe house. The problems was that the CIA "lost" al-Mihdhar, didn't tell the FBI that he was in the US (even though it knew he'd received a Visa) and no one put him on a watch list. None of that would have changed with the metadata collection. However, as Pro Publica notes, not only does Judge Pauley ignore all of this, he claims the 9/11 Commission report talks about the NSA being unable to "capture al-Mihdhar's telephone number identifier" -- but that's not true:  In fact, the 9/11 Commission report does not detail the NSA's intercepts of calls between al-Mihdhar and Yemen. As the executive director of the commission told us over the summer, "We could not, because the information was so highly classified publicly detail the nature of or limits on NSA monitoring of telephone or email communications.”  So when you have a judge using this as a key part of his ruling, and it appears that he simply did not read the report he's citing, but rather accepted the government's misrepresentation of the report, it should call into question what Judge Pauley was doing with this case. Others are noticing this same thing. [...]"  Related: See below: "How Judge William Pauley III De-Legitimized The US Judicial System" [12/29/13]; "Three Senators Refuted Judge Pauley's Ruling A Month Before He Issued It" [12/29/13]; "District Court Tosses ACLU's Lawsuit Against NSA With Very Regrettable Decision That Props Up Agency Rhetoric" [12/28/13] 

Commentary: "How Judge William Pauley III De-Legitimized The US Judicial System" [12/29/13] Printer Friendly Version "This last week Federal Judge Judge William Pauley III dismissed a lawsuit brought by the ACLU against the unconstitutional spying on American citizens by the National Security Agency. In his 53 page opinion, the judge declared from the bench that the NSA's actions were justified by the 9-11 attacks. By doing so, Judge William Pauley III discredited and delegitimized the entire Federal Justice System. In declaring the NSA's actions legal, Judge William Pauley III has in effect created new law from his bench. This is, of course illegal and a violation of the Constitution. Only Congress may make the laws, and only laws which comply with the Constitution are legal and binding. [...]"  Related: "Three Senators Refuted Judge Pauley's Ruling A Month Before He Issued It" Printer Friendly Version 

Interviews: "NSA Whistleblower Reveals Planned Police State" [12/29/13] [19:34] "NSA whistleblower William Binney reacts to yesterday’s ruling. David Knight is joined by Former NSA official and whistleblower William Binney to discuss the latest developments on the intelligence agency's domestic spying under the guise of national security. [...]"  Related: "National Security is A Scam" [23:34] "David Knight and William Binney continue on the topic of the current police state and the slow destruction of the Constitution as we know it.'

Commentary: "District Court Tosses ACLU's Lawsuit Against NSA With Very Regrettable Decision That Props Up Agency Rhetoric" [12/28/13] Printer Friendly Version "The legal battles surrounding the constitutionality of the Section 215 bulk phone records collection are now suddenly at odds with each. A step forward (Judge Leon's decision earlier this month finding the collection to be "likely unconstitutional") has now been matched by a step backward. Judge Pauley of the Southern District of NY has found the Section 215 program to be legal and has dismissed the ACLU's lawsuit against the government. (The ACLU is planning to appeal). The bug-eyed, psycho- looking ghoul is pictured here, in a WSJ profile. This second (and opposite) ruling increases the likelihood that the challenges will end up before the Supreme Court. Judge William Pauley opens his ruling with the mantra of all big police state promoters. "9/11 changes and justifies everything." Pauley refers to the same case (Smith v. Maryland) that Judge Leon referred to in his decision, but comes to very different conclusions. Pauley's ruling is predicated on the very expansive reading of the Third Party Doctrine security, intelligence and law enforcement agencies have relied on for years. Information given voluntarily to third parties is not protected by the Fourth Amendment. This reading has allowed the NSA to collect every phone record generated in the US for the past half-decade uninterrupted and for a majority of the last 12 years. For many people, the reality of the Third Party Doctrine didn't hit home until the Snowden leaks began. It wasn't so surprising that this sort of data harvesting was happening. Whistleblowers had been warning for years that the government was collecting data and content on a massive, worldwide scale. The real shock was that, for the most part, everything was completely legal. Judge Pauley's decision reaffirms this status quo. The opening paragraph sets the tone and lets the reader know exactly what conclusion Pauley will arrive at 54 pages later. [...]  Pauley maintains that the collection is "necessarily broad" because fighting terrorism is a matter of prevention, rather than a matter of investigation. Since the NSA CAN'T know what it's looking for, it needs it all. This has proven to be a problem for the intelligence agency, as its tendency to collect as much as it can has swamped analysts in mountains of data, most of which serves absolutely no purpose. But Pauley ignores this reality while dismissing the ACLU's arguments, stating that the Section 215 collection will always be "relevant" to the NSA's security agenda. But this is all a sideshow. The real question is whether the Section 215 collection violates the Fourth Amendment. Pauley looks at Smith v. Maryland and decides it does not, quoting Smith's assertion that a person has "no legitimate expectation of privacy in information he voluntarily turns over to third parties." The ACLU argued that the collection of metadata allows for the construction of a "rich mosaic" of information about any citizen and is much more revealing than the government will admit. Pauley dismisses the ACLU's "parade of horribles" by quoting none other than Gen. Alexander. [...]"   Note: So, Judge William H. Pauley III, a federal judge from New York who just ruled that collecting NSA data was legal "because of 9/11," in the past let admitted Israeli spy Ben-Ami Kadish go scot-free. Ben-Ami Kadish (September 2, 1923 - July 16, 2012) was a former U.S. Army mechanical engineer. He pled guilty in December 2008 to being an "unregistered agent for Israel," and admitted to disclosing classified U.S. documents to Israel in the 1980s. His unauthorized disclosure of classified U.S. secrets to Israel was concurrent with the espionage activity of Jonathan Pollard... In December 2008, Kadish pleaded guilty to acting as an unregistered agent of Israel, admitting he gave classified documents to Israel in the 1980s. Prosecutors asserted that Kadish had furnished classified American secrets to Yosef Yagur, the same Israeli agent who had received secret documents from Jonathan Pollard. Related: See below: "DC District Court Rules NSA Surveillance Unconstitutional..." [12/17/13] 

MSM: "REAL ID Enforcement Begins In 2014; 21 States Compliant, DHS Says" [12/27/13] Printer Friendly Version "The REAL ID Act prohibits the federal government from accepting driver's licenses and ID cards that do not meet minimum security standards set by DHS no later than May 2017. The minimum standards require that driver's license security features be routinely upgraded to be counterfeit resistant and require applicants to provide documentary proofs confirm true identity. REAL ID compliant driver's licenses and ID cards are key elements of the nation's homeland security strategy. Enforcement of the law will clarify and differentiate between compliant state-issued identity credentials versus less reliable proofs of identity when admitting people to secure federal facilities or, beginning in 2016, to board airlines. [...]  The government will begin phasing in enforcement of the REAL ID Act as required by law, “in a measured, fair, responsible and achievable way,” DHS said. “The first phase will begin on January 20, 2014 and is limited to DHS headquarters in Washington before expanding to other Federal facilities later this year. The fourth phase covers acceptable IDs that can be used for boarding a federally regulated commercial aircraft. Before a date for Phase 4 is set, DHS will conduct an evaluation to inform a fair and achievable timeline. The date for implementing Phase 4 will be set after the evaluation has been complete; this phase will occur no sooner than 2016. [...] DHS commended the 21 states that have already meet the act’s minimum standards for their leadership in improving security for state-issued driver’s licenses and identification cards (Alabama, Colorado, Connecticut, Delaware, Florida, Georgia, Hawaii, Iowa, Indiana, Kansas, Maryland, Mississippi, Nebraska, Ohio, South Dakota, Tennessee, Utah, Vermont, Wisconsin, West Virginia and Wyoming). DHS has granted extensions to twenty states and territories that have provided information demonstrating that they are on the pathway towards achieving full compliance, including Arkansas, California, District of Columbia, Guam, Idaho, Illinois, Michigan, Missouri, New Hampshire, Nevada, North Carolina, North Dakota, Oregon, Pennsylvania, Puerto Rico, Rhode Island, South Carolina, Texas, US Virgin Islands and Virginia. [...]"   

Documentary: "Sandy Hook: The Real Truth" [12/23/13] [2:56:43] "Mark Howitt takes an investigative look into the events and controversy surrounding the Sandy Hook elementary school shooting which happened on December 14th 2012 in Newtown Connecticut. This documentary explores several aspects and claims of details surrounding the event and is an attempt to shed some light and provide logical answers to the many questions that remain as to what happened in Newtown. Using rare news and article clips, testimonies, police audio analysis and several perspectives, it is quite clear that we are not being told the truth about what really happened. Was there others involved in the crime? Why have authorities and media provided abundant amounts of misleading information, changing the official narrative on countless occasions? These questions are being asked by a large amount of people in the public and the case is looked at in great detail to try and make sense of things and bring closure to much of the controversy in what is perhaps the biggest conspiracy since JFK. Topics discussed include identities of multiple suspects, police audio analysis, witness testimonies, media coverage, the Lanza family, gun ban issue, intelligence agencies, examples of covert operations, project longevity, project mockingbird, fast and furious, crisis actor claims, prior drills, living victims, FEMA, advanced knowledge of attack, motive of crime, and several other aspects and anomalies. [...]"   Related: "Sandy Hook Actors–Greenberg-Sexton Clan–Confirmed" Printer Friendly Version | "Dissecting Sandy Hook: One Year Later | CT. Cop" [44:52] "Mark S. Mann is back. He's a cop, he's in Connecticut and on the one year anniversary of the Sandy Hook Elementary "event" in Newton, CT., Mark is taking us through the "official story" - and the "official report" on what happened on December 14, 2012. Nearly every single question we raised in our interview nearly one year ago, remains.  [...]"  

Commentary: "DC District Court Rules NSA Surveillance Unconstitutional. Program Will Continue Pending Appeal" [12/17/13] Printer Friendly Version "Judge Leon of the DC District Court has held that the NSA’s bulk collection of telephony metadata violates the Fourth Amendment and has enjoined the entire program (stayed pending appeal). Judge Leon recognizes that his holding conflicts with the reasoning of other district courts, but he expresses confidence that he is correct and that James Madison would be “aghast” at the NSA’s telephony metadata program. Finding the entire NSA metadata program unconstitutional, Judge Leon enjoins it, but he stays his order pending appeal to the DC Circuit. This is a GREAT ruling, but unfortunately, it’s not going to do a thing in practice right now. He “enjoined” the entire program, but “stayed” his own decision, pending appeal – which will be coming. In other words. He put a stop to the program, but put his own order on hold. NSA surveillance will continue. [...]"  

Commentary: "The Flawed Logic Of Secret Mass Surveillance" [12/17/13] Printer Friendly Version "Privacy is a form of power. Humans are always highly aware who is observing them at any given time and place, and always tailor their behavior to that audience. And they generally work to make sure that their behavior does not reveal things that might put them at a disadvantage. To really gain new insight or leverage over another person, you have to watch them when they don’t know they’re being watched so that their guard is down. So how does a watcher “catch” a subject unawares? It seems to me the possibilities break down into two broad categories: [...]" Related: "All 3 Branches of Government Say Mass Spying On Americans Is Unnecessary" Printer Friendly Version "Officials in the legislative, judicial and executive branches of government all say that the mass surveillance on Americans’ “metadata” is unnecessary: [...]"  

Commentary: "Homeland Security Employee Who Called For Mass Murder of Whites Finally Fired" [12/13/13] Printer Friendly Version "A Department of Homeland Security employee who called for the mass murder of white people has finally been fired over four months after it first emerged that he was running a website which advocated a genocidal race war. Back in August, it emerged that Kimathi had been making $115,000 dollars a year in his job as an acquisitions officer for Immigration and Customs Enforcement, a position he had held since 2009. The DHS first received complaints two years ago that Kimathi was behind the racist website, and his former supervisor told the Southern Poverty Law Center that “everybody in the office is afraid of him,” and worried that he would “come in with a gun someday and go postal.” For over four months after the controversy erupted, the DHS placed Kimathi on administrative leave with pay. He was only fired last week. Last month, the Southern Poverty Law Center’s Josh Glasstetter told National Journal, “This isn’t a mundane human resources matter or a tricky First Amendment question. DHS should have investigated and fired Kimathi months, or even years, ago.” It’s ironic that while the Department of Homeland Security circulates training guidelines and material that instruct their employees to treat “liberty lovers” and constitutionalists as terrorists, actual domestic extremists can remain in jobs with the agency for years while publicly spewing violent racial hatred. [...]"

Commentary: "Whistleblower: TSA Deliberately Hiring Psychopathic Criminals" [12/11/13] [9:20] "A TSA supervisor turned whistleblower has revealed to the Alex Jones Show how the federal agency is deliberately directing its staff to hire people with criminal records who exhibit violent tendencies and psychopathic behavior. “We have a program in the state of Rhode Island where we take prisoners who are out for non violent drug offenses and everything else – basically sociopaths – and we’re sending them to a ten day course and getting them out in uniform out checking people,” said the whistleblower. “If they have a background and it’s something like violence or abusing authority we put them right in, we put them guys on the floor first day,” said Rob, adding he was also encouraged to hire Iraq war veterans with post-traumatic stress disorder. “It’s all about the power trip, it’s all about having people bug their eyes out at the public and getting the public conditioned to the fact that the police state is coming,” he added, noting how TSA screeners were directed to stick their chests out and “eyeball people.” As a recent report by Tennessee Congresswoman Marsha Blackburn highlighted, the fact that TSA agents are so routinely caught engaged in criminal behavior is by no means an aberration but stems “from TSA’s hiring practices and insufficient use of background checks.” [...]"  

Sequential Bimbonics: "TSA Agent Confiscates Sock Monkey's Toy Pistol" [12/11/13] Printer Friendly Version "The TSA agent told May she would have to confiscate the tiny gun and was supposed to call the police. "Rooster Monkburn" the cowboy sock monkey is without his pistol, thanks to a diligent TSA agent in St. Louis. Phyllis May of Redmond, Wash. says she is “appalled and shocked and embarrassed all at the same time” about the incident that happened on Wednesday. May has a small business selling unique sock monkey dolls. She says she and her husband were on their way from St. Louis to Sea-Tac and she had a couple of monkeys and sewing supplies with her in a carry-on bag. “His pistol was in there,” she says of the sock monkey “Rooster Monkburn,” a take-off on John Wayne character “Rooster Cogburn” from the film “True Grit.” May and her husband were going through the screening process when she noticed that one of her bags was missing. “And the (TSA agent) held it up and said ‘whose is this?’” she said. “I realized oh, my god this is my bag.” May said the TSA agent went through the bag, through the sewing supplies and found the two-inch long pistol. “She said ‘this is a gun,’” said May. “I said no, it’s not a gun it’s a prop for my monkey.” “She said ‘If I held it up to your neck, you wouldn’t know if it was real or not,’ and I said ‘really?’” said May.  The TSA agent told May she would have to confiscate the tiny gun and was supposed to call the police. “I said well go ahead,” said May. “And I said really? You’re kidding me right, and she said no it looks like a gun.” “She took my monkey’s gun,” said May, who has retained her sense of humor. “Rooster Monkburn has been disarmed so I’m sure everyone on the plane was safe,” she said. “I understand she was doing her job but at some point doesn’t common sense prevail?” In the end, the agent did not call police and May did get her other sewing supplies back.[...]"  Note: It's not about common sense or security. It's about compliance and control.

MSM: "Former TSA Supervisor Charged With Trafficking Cocaine" [11/30/13] Printer Friendly Version "A former Transportation Security Administration supervisor has been indicted for allegedly helping smuggle at least 11 pounds of cocaine through the Virgin Islands, according to federal officials and court documents. Former TSA Supervisor Dwight Iva Durant, 44, and Shawn Dowe, 29, both of the Virgin Islands, were charged with participating in a trafficking conspiracy, according to Wilfredo Ferrer, U.S. attorney for southern Florida. Each defendant faces a mandatory sentence of 10 years to life in prison, if convicted. [...]" 

MSM: "Absolute Power Corrupts: NSA Report Outlined Goals for More Power" [11/24/13] Printer Friendly Version "Officials at the National Security Agency, intent on maintaining its dominance in intelligence collection, pledged last year to push to expand its surveillance powers, according to a top-secret strategy document. In a February 2012 paper laying out the four-year strategy for the N.S.A.’s signals intelligence operations, which include the agency’s eavesdropping and communications data collection around the world, agency officials set an objective to “aggressively pursue legal authorities and a policy framework mapped more fully to the information age.” Written as an agency mission statement with broad goals, the five-page document said that existing American laws were not adequate to meet the needs of the N.S.A. to conduct broad surveillance in what it cited as “the golden age of Sigint,” or signals intelligence. “The interpretation and guidelines for applying our authorities, and in some cases the authorities themselves, have not kept pace with the complexity of the technology and target environments, or the operational expectations levied on N.S.A.’s mission,” the document concluded. Using sweeping language, the paper also outlined some of the agency’s other ambitions. [...] The strategy document, provided by the former N.S.A. contractor Edward J. Snowden, was written at a time when the agency was at the peak of its powers and the scope of its surveillance operations was still secret. Since then, Mr. Snowden’s revelations have changed the political landscape. The N.S.A. document, titled “Sigint Strategy 2012-2016,” does not make clear what legal or policy changes the agency might seek. The N.S.A.’s powers are determined variously by Congress, executive orders and the nation’s secret intelligence court, and its operations are governed by layers of regulations. While asserting that the agency’s “culture of compliance” would not be compromised, N.S.A. officials argued that they needed more flexibility, according to the paper. [...]" Related: "NSA Collection Of US Phone Records Violates Constitutional Rights, ACLU Says In Court" Printer Friendly Version |"Former NSA Lawer Stewart Baker: FISA Minimization Policies "Are To Blame For 9/11 Attacks" Printer Friendly Version |"White House Orders Review Of 5 Million Security Clearances" Printer Friendly Version |"Government Claims Americans Have No Right To Challenge NSA Phone Surveillance " Printer Friendly Version | "NSA’s ‘Reasonably Articulate Suspicion’ Legitimizes Surveillance Of Just About Anyone" Printer Friendly Version 

Commentary: "Israeli Data Spies Have Eyes Focused On U.S. Citizens" [11/24/13] Printer Friendly Version "While the National Security Agency (NSA) spying scandal continues to grab national headlines, the equally egregious intelligence gathering on United States citizens by Israeli security firms has virtually flown under the radar. A recent article in Rolling Stone magazine, entitled “Meet the Private Companies Helping Cops Spy on Protesters,” comes close to scratching the surface by identifying the four major security contractors that have been aggressively hawking their invasive surveillance products at various trade shows and police conferences throughout the nation. However, they fail to mention that at least two of those companies are owned and operated by members of a foreign nation with a long and notorious history of spying on the U.S. government and its citizens. Among them is NICE Systems, Ltd., an Israel-based company founded in 1986 by seven “Israeli ex-army colleagues.” NICE’s current CEO is Zeevi Bregman, who formerly helmed Comverse Technology, Inc., an Israeli-run private telecommunications firm that provides wiretapping equipment to U.S. law enforcement. [...]"  

Legal Case: "Government Told to Explain Need for Secrecy" [11/23/13] Printer Friendly Version "The U.S. government must explain why a Feb. 19, 2013, order of the Foreign Intelligence Surveillance Court cannot be released to the public, even in a redacted form, a FISC judge ruled. In September 2013, Judge F. Dennis Saylor IV, one of the 11 federal judges who sits on the U.S. Foreign Intelligence Surveillance Court (FISC), ruled that the U.S. government must consider publicly releasing classified opinions regarding the National Security Agency's domestic spying program. The ruling was issued in response to a complaint filed by the American Civil Liberties Union two years ago seeking the release of FISC opinions interpreting the government's power to conduct surveillance related to terrorism under Section 215 of the Patriot Act. Saylor noted the same day in another opinion that the "publication of FISC opinions relating to this provision would contribute to an informed debate." On this order, the government conducted a declassification review of a February 19, 2013 FISC opinion, and concluded Monday that, "after careful review of the opinion by senior intelligence officials and the U.S. Department of Justice, the Executive Branch has determined that the opinion should be withheld in full and a public version of the opinion cannot be provided." The government provided no explanation of its decision. Dissatisfied with this unsupported conclusion, Saylor ordered the government Wednesday to "submit a detailed explanation of its conclusion that the opinion is classified in full and cannot be made public, even in a redacted form." The two-page order ends with Saylor quoting the full FISC rule that empowers the government to request in camera review of classified evidence. If it does so, the government must still file and serve on the other party an unclassified or redacted version, which "at a minimum, must clearly articulate the government's legal arguments," the rule states. [...]" 

Commentary: "NSA’s Mass Surveillance Is Unnecessary" [11/22/13] Printer Friendly Version "On Nov 21, 2013, 3 current U.S. Senators (Ron Wyden, Mark Udall and Martin Heinrich) who are all on the Senate Intelligence Committee – with top security clearance and access to classified NSA briefings – filed a “friend of the court” brief pointing out that the NSA’s mass spying hasn’t stopped a single attack: "Now that the government’s bulk call-records program has been exposed, the government has defended it vigorously. Amici [i.e. friends of the court ... the 3 Senators, along with numerous security experts] submit this brief to respond to the government’s claim, which it is expected to repeat in this suit, that its collection of bulk call records is necessary to defend the nation against terrorist attacks. Amici make one central point: As members of the committee charged with overseeing the National Security Agency’s surveillance, Amici have reviewed this surveillance extensively and have seen no evidence that the bulk collection of Americans’ phone records has provided any intelligence of value that could not have been gathered through less intrusive means. The government has at its disposal a number of authorities that allow it to obtain the call records of suspected terrorists and those in contact with suspected terrorists. It appears to Amici that these more targeted authorities could have been used to obtain the information that the government has publicly claimed was crucial in a few important counterterrorism cases."[...] As Amici and others have made clear, the evidence shows that the executive branch’s claims about the effectiveness of the bulk phone-records program have been vastly overstated and, in some cases, utterly misleading…. For example, the executive branch has defended the program by claiming that it helped “thwart” or “disrupt” fifty-four specific terrorist plots…. But that claim conflates the bulk-collection program with other foreign-intelligence authorities. In fact, as Amici know from their regular oversight of the intelligence community as members of the SSCI, “it appears that the bulk phone records collection program under section 215 of the USA Patriot Act played little or no role in most of these disruptions.” …. Indeed, of the original fifty- four that the government pointed to, officials have only been able to describe two that involved materially useful information obtained through the bulk call-records program…. Even the two supposed success stories involved information that Amici believe—after repeated requests to the government for evidence to the contrary—could readily have been obtained without a database of all Americans’ call records…. In both public statements and in newly declassified submissions to the SSCI, intelligence officials have significantly exaggerated the phone-records program’s effectiveness. Based on the experience of Amici, the public—and this Court—should view the government’s claims regarding the effectiveness of its surveillance programs with searching skepticism and demand evidence rather than assurances before accepting them. Indeed, NSA spying is not very focused on terrorism at all. And even if some mass surveillance program were somehow necessary, counter-terror 'experts' say "we can keep everyone safe without violating the Constitution … more cheaply and efficiently than the current system.The NSA’s whole domestic spying program is a sham …"

MSM: "Homeland Security Officials Testify On The Stewardship Of Taxpayer Dollars" [11/19/13] [70:33] "Nov 15, 2013 C-SPAN" 

Commentary: "Sandy Hook Inspires Schools to Pay $5 Billion in "Safety Spending" [11/18/13] Printer Friendly Version "Dickson County, Tennessee will be allocating $500,000 on classroom barricades and surveillance systems for all school buildings because of the Newtown Shooting in Connecticut. Bob Rial , mayor of Dickson County, explained: “The school shooting up in Connecticut gave us a chance to stop and review things. You are always worried about that person on the fringe.” Recent shootings at schools have caused the fear of another attack to become acute within the social consciousness of Americans. Hartford Public Schools received funding from the mayor’s office as part of the School Security Grant Program (SSGP) to pay for CCTV cameras, bulletproof glass, electric locks, buzz and card entry systems and panic alarms.[...]"  Related: See below: "California Charter School’s New Spy System Places Children Under Complete Surveillance" [11/14/13]   Note: The 'security' racket is a big one .... ALL built on playing to fears that are programmed into people .... for a profit ... Related: "Sofia Smallstorm Unraveling Sandy Hook" [92:13]  

Commentary: "DHS Creates New Fusion Centers, Taking Control of Local Police" [11/17/13] Printer Friendly Version "As the Department of Homeland Security (DHS) doles out billions of dollars to convince local police departments to surrender control to the federal agency, a recent report indicates that intelligence gathered at precincts- cum- surveillance- centers will be shared among all levels of law enforcement. In July, McCaul co-authored with Representative Peter King (R-N.Y.) a report on the progress of the establishment of the nationwide spread of the fusion centers. The press release announcing the report reveals the pair’s support for a program that dismantles federalism and accelerates the militarization of local police and the consolidation of control of those departments to the federal government. The McCaul-King report states: Fusion centers serve as hubs of strategic analysis and information sharing where Federal, State, and local agencies are all represented in one location. State and local crime data is coordinated, gathered and reviewed to determine if there is any potential connection to terrorist activity. In addition, Federal terrorism-related information is shared with State and local law enforcement. Seems the congressmen should be reminded of the fact that there is not a single syllable of the Constitution authorizing any such federal participation in law enforcement. If the power isn’t granted to the federal government in the Constitution, then authority over that area remains with the states and the people as described in the Tenth Amendment. Remarkably, McCaul and King lament the fact that the chain of fusion centers isn't growing quickly enough and the DHS isn’t getting adequate access to all that information. [...]"  

MSM: "Federal Probe Questions TSA Behavior Profiling" [11/15/13] Printer Friendly Version "A federal probe of a Transportation Security Administration program to screen suspicious behavior of passengers at airports suggests the effort, which has cost almost $1 billion since 2007, has not been proven effective, according to a report released Wednesday. The Government Accountability Office said its investigation found that the results of the TSA program — called Screening of Passengers by Observation Techniques — were “no better than chance.” Under the program, agents identify suspicious looking people and talk to them to determine whether they pose a threat. The investigators looked at the screening program at four airports, chosen on the basis of size and other factors. “TSA has yet to empirically demonstrate the effectiveness of the program despite spending about $900 million on it since 2007,” said Steve Lord, who directed the investigation for the GAO. He said the GAO, which is the research and investigative arm of Congress, “conducts active oversight of the TSA for the Congress given their multibillion-dollar budget.” He said “the behavior detection program is viewed as a key layer of aviation security.” The investigation found that behavior detection officers at the four airports said some behavioral indicators they used were “subjective.” The report said the TSA is still collecting evidence on the screening program but has indicated it needs more time to determine the program’s effectiveness. [...]" 

MSM: "Report Calls TSA Billion Dollar Training Program "One Big Waste Of Taxpayer Dollars" [11/15/13] [2:04] Related: "TSA Behavior Profiling Techniques ‘No Better Than Chance’ At Detecting Security Risks - Report" Printer Friendly Version | "Accidentally Revealed Document Shows TSA Doesn't Think Terrorists Are Plotting To Attack Airplanes" Printer Friendly Version | "Defense of Airport Body Scanners Undermined" Printer Friendly Version "Classified TSA documents revealed by clerical error show that the agency does not think terrorists are plotting to attack airplanes, suggesting that nude body scans are unnecessary to protect passengers. After Rapiscan developed "backscatter" body scanners using Advanced Imaging Technology in 2007, Jonathan Corbett sued the Transportation Security Administration three years later. Corbett claimed that the "the abstract risk[s] of terrorism without a credible, specific threat" does not justify the unreasonable screening procedures, which are performed without probable cause or a search warrant.[...]"  Note: So they classify information indicating the whole security theatre of the DHS is a full-blown scam.

Commentary: "Anonymous: "Potential False Flag in L.A, CA Nov 15 2013" [11/15/13] Printer Friendly Version "Message: Greetings citizens of the world, we are Anonymous. We have received intel related to the possible destruction of one of downtown Los Angeles's towers, being set up as a false flag event on Friday, November fifteenth two thousand and thirteen. Over the weekend, SWAT teams were conducting drills in downtown Los Angeles unlike any completed in the past. The Citi Bank building that is currently occupied by Freddie Mac just recently dropped all insurance policies except for the policy portion which contains special conditions, coverages related to terrorism, which is all risk of direct physical damage. The certificate holder for this policy is located at 444 South Flower Street, Los Angeles, California 90015, under Hines Vaf, a private insurance company which offers Loss Adjusters, Allstate Claims Adjuster, Integrated Insurance Services, Property Insurance Adjuster and General Auto Insurance. Similar to the destruction of the twin towers, changes were made to their insurance policies prior to the so called terrorist acts on nine eleven. Although we are not one hundred percent sure of these horrific activities being planned to transpire within the next few days, we did not want to take a chance and risk losing anymore innocent lives and have a repeat of nine eleven in New York. The buildings in question are the Citi bank building which is located adjacent to the US bank building on the corner of South Flower and West Fifth street. It is believed to be the target for a false flag event set for this Friday. We ask American citizens who work in this area of Los Angeles California to take extra precautions. It is advisable given the severity of this information, if you are employed and are working, or conducting personal matters in either the Citi bank or the US bank towers of los Angeles, that you stay away from these two structures on that day. This is a warning, and again, as a precautionary measure we alert you of this possible false flag event being set up in the city of Los Angeles. To the share holders of these policies, you have been warned. We do not forgive, we do not forget. Expect to be held accountable for your actions if you follow through with your sinister agenda. We will not tolerate your wicked greed in pursuit of more wealth and restructure. We are Anonymous. We do not forgive. We do not forget. Expect us. [...]"  Note: We may never know what the story is, since a warning may dissuade an intended operation.

Commentary: "Shooting Near Pittsburgh High School Reveals ‘Active Shooter Drills’ In Region" [11/15/13] Printer Friendly Version "Another shooting, another drill? Local news reports have stated that three students were shot Wednesday afternoon near Brashear High school in Pittsburgh, no arrests have been made. SEE IMAGE: A show of force – local police and SWAT teams deployed to lock down the surrounding area. Lisa Sylvester from WXPI a local affliate in Pittsburgh, said that the suspects were seen “wearing all black” and coming out of the woods near Brashear High School firing at the students before exiting into the surrounding tree lined area … Diane Richard of the Pittsburgh police, gave a news brief around just after 4pm EST where she was quoted as saying: ” We do have units out that are looking for actors.” Given the circumstances this was a strange description, why wouldn’t you say suspects – instead of actors? [...]"  

Commentary: "TSA-LAX Shooting Narrative Disintegrates" [11/03/13] Printer Friendly Version "In similar fashion to the government generated narrative on the Boston Bombing and “active shooter” incidents over the last two years, the cover story for the murder of a TSA agent in Los Angeles has a number of glaring incongruities and oddities. It was initially reported that the shooter was a fellow TSA agent. “Law enforcement sources told the Los Angeles Times that the gunman was a " Transportation Security Administration employee at LAX,” the media reported shortly before noon on Friday. “The gunman was killed by authorities after he opened fire Friday morning. He allegedly shot and killed a fellow TSA employee.” [...] Less than an hour later, it was reported that a “federal law enforcement official said that the gunman was a ticketed passenger entering the airport. Officials don’t believe the gunman has ever worked for TSA. Law enforcement sources had earlier told The Times the gunman was a TSA employee.” The New York Post carried a bizarre graphic photo allegedly showing a wounded suspect at the airport. The photo contradicts a news report stating the “triggerman wore dark clothes and a bulletproof vest.” The individual in the photo is wearing a brown shirt and light-colored pants, not dark clothing. He is certainly not wearing a bullet proof vest. If the photo posted on the supposedly reputable New York Post website in fact shows the alleged shooter, then the earlier report is outright propaganda or shoddy journalism. Then came the expected story turnaround to pave over previous incongruities. Enter Paul Ciancia, a reportedly mentally ill individual who turned out to be a perfect fit for the " violent and dangerous antigovernment loner" meme pushed by the Department of Homeland Security, the establishment media, and various organizations, including the Southern Poverty Law Center and the Anti-Defamation League. The now common domestic terrorist stereotype exemplified by Ciancia also produces fodder for a number of liberal bloggers and others who amplify a hysterical propaganda message about rightwing terrorists in our midst who must be ultimately dealt with by the government. By mid-day Friday it was claimed that Ciancia carried a “manifesto” with him and that he “wanted to kill TSA and pigs.” According to the Daily Mail and others, government sources said the note was signed with the letters “NWO,” short for “New World Order.” “Ciancia’s views appear to be in line with the anti-government Patriot movement, whose members subscribe to the theory that a powerful secret alliance of international elites is plotting to form a one-world government, also known as a New World Order,” the British newspaper reported on Sunday. “In addition to the note found at the scene, investigators are using some other writings of Ciancia’s to help build a case for what drove him to kill a TSA agent on Friday morning,” the Daily Mail reported." According to the SPLC, " Ciancia’s note characterized former Department of Homeland Security boss Janet Napolitano as a “bull dyke” and dismissed her with an obscenity." These alleged “writings” will undoubtedly be used to expand the rightwing meme and underscore the supposed need to deal with violent antigovernment radicals, i.e., anybody who voices displeasure with big government and the growth of a police state apparatus used against political enemies of the establishment. The murder of a frontline TSA hireling will inject the needed degree of urgency to deal with the problem of Americans growing increasingly angry and restless over TSA molestation and wholesale violations of the Fourth Amendment.  Related: "Another Botched False Flag Operation" Printer Friendly Version | "SPLC and Raw Story Blame “Patriots” for the LAX Shooting" Printer Friendly Version | "Lawmakers Debate “Gun Control” After Los Angeles Airport Shooting" Printer Friendly Version |"Gun Battle With TSA Agents At LA Airport: Two Killed" [11/01/13] Printer Friendly Version "Law enforcement sources told the Los Angeles Times that the gunman was a Transportation Security Administration employee at LAX. The gunman was killed by authorities after he opened fire Friday morning. He allegedly shot and killed a fellow TSA employee.  [...]" Update: Despite earlier reports claiming that the shooter was an off-duty TSA worker, a federal law enforcement official told the Los Angeles Times just after 3pm that he was a " ticketed passenger". According to witness reports, the shooter asked people if they worked for TSA before opening fire.  

Commentary: "Homeland Security Funded Study Proves War On Terrorism Has Greatly Increased Global Terrorism" [11/02/13] Printer Friendly Version "A new study from the Department of Homeland Security has proven what has been a well-known fact amongst anyone who follows the alternative media. The so-called war on terrorism has actually increased terrorism around the world. Whenever the United States government announces that they are launching a war on something we get more of what they are waging a war on. The war on poverty resulted in more poverty, the war on drugs resulted in more drug use and now we can definitively say the same thing about the war on terrorism. If the goal of the so-called war on terrorism was to reduce the amount of terrorism in the world it has failed miserably. Anyone with any sort of common sense would look at this study and realize that a policy change is in order. Unfortunately the policy makers within the Obama regime who are either useful idiots or psychotic criminals will do nothing of the sort. [...] According to the study there has been a 69% rise in terrorist attacks and an 89% increase in terrorist related fatalities from 2011. In addition, the number of people killed due to a terrorist attack has risen greatly since 2001. These figures clearly indicate that global terrorism has steadily risen throughout this so-called war on terrorism. In reality, these numbers should be considered low due to the fact that this study does not include terrorist attacks launched by governments or state actors. If they did include these numbers the amount of terrorist attacks and terrorist related fatalities would be much higher with the Obama regime topping the list as one of the world’s biggest terrorist organizations. The Obama regime has authorized countless drone strikes that have killed many civilians including women and children. These incidents should all be considered acts of terrorism. [...] More importantly is the fact that we now have a government funded study proving conclusively that the policies of the Bush 43 and Obama regimes have increased terrorism around the world. The reasons for this are so painfully obvious. Waging endless war and killing an untold amount of people in Muslim countries is undoubtedly going to create intense animosity and hatred. The so-called war on terrorism has done nothing but increasingly radicalize Muslim populations with a greater number of them now desiring revenge against the United States than ever before. It is only helping to create a new generation of Muslims who will at some point lash out against America. It is also possible that this is what the war criminals in Washington DC actually want. A more radicalized Muslim population in the Middle East could eventually pose a problem for China and Russia which border several Muslim countries. Not including the United States, Russia and China are the two largest military forces on the planet and represent the greatest strategic military threat to American interests. Russia specifically has had problems with radical Islamic groups in Chechnya with the CIA long suspected of engaging in covert activities in that part of the world.[...]"   Note: Saudi Arabia has stated that it controls the groups in Chechnya. Russia´s President, Vladimir Putin dismissed a Bribe – Threat during a Meeting of the Russian President and the Saudi Intelligence Chief on 2 August. According to a recent estimate, the Saudi Interior Ministry directly and indirectly finances and controls more than 100.000 mercenaries, belonging to different, Al-Qaeda associated organizations.

MSM: "Off Duty TSA Agent Starts Gun Battle With Other TSA Agents At LA Airport: Two Killed" [11/01/13] Printer Friendly Version "Law enforcement sources told the Los Angeles Times that the gunman was a Transportation Security Administration employee at LAX. The gunman was killed by authorities after he opened fire Friday morning. He allegedly shot and killed a fellow TSA employee.  [...]" 

MSM: "Closed Senate Committee Passes Bill That Cements Bulk NSA Record Collection" [11/01/13] Printer Friendly Version "In a closed session, the US Senate Intelligence Committee approved legislation that codifies into law the NSA’s bulk collection of domestic telephone metadata. The bill, sponsored by committee chair Sen. Dianne Feinstein (D-CA), cements bulk phone metadata collection into the business records provision (Section 215) of the Patriot Act, strengthening NSA surveillance legality allowed under the Foreign Intelligence Surveillance Act (FISA). The committee’s 11-4 vote for passage of the FISA Improvements Act runs counter to legislation introduced by the chairmen of the House and Senate judiciary committees this week. Among other attributes, that legislation - the USA FREEDOM Act - would “end bulk collection under Section 215 of the Patriot Act, in light of the massive intrusion on Americans’ privacy and the lack of evidence of its effectiveness.” Rep. Jim Sensenbrenner (R-OH), chair of the House Judiciary Committee and co-author of the Patriot Act 12 years ago, has previously said that after Congress amended in 2006 the Patriot Act to authorize broad, secret warrants for most any type of “tangible” records, both the Bush and Obama administrations have misinterpreted the law’s power to allow bulk collection of all phone call records in and out of the United States. Feinstein’s bill further authorizes such an interpretation into law, which would thwart current legal challenges to the program under those grounds. Though constitutional challenges could still be considered.  [...]" 

Commentary: "Feds Accused of Harassing “Boston Bomber” Friends, and Friends of Friends" [11/01/13] Printer Friendly Version "In the six months since the Boston Marathon bombing, the FBI has by all appearances been relentlessly intimidating, punishing, deporting and, in one case, shooting to death, persons connected, sometimes only tangentially, with the alleged bombers. All of these individuals have something in common: If afforded constitutional protections and treated as witnesses instead of perpetrators, they could potentially help clear up questions about the violence of April 15. And they might also be able to help clarify the methods and extent of the FBI’s recruitment of immigrants and others for undercover work, and how that could relate to the Bureau’s prior relationship with the bombing suspects—a relationship the Bureau has variously hidden or downplayed. [...]"  

MSM: "Escobar: 9/11 Excuse For NSA – Gift That Keeps On Giving" [11/01/13]   [6:33] "Snowden's revelations about the NSA has seen US intelligence bosses go to great lengths to justify their activities. Officially they've been told to use 9/11 as their main argument, according to a document leaked in the media. And some politicians are happy to follow that advice. Pepe Escobar joins RT to discuss this issue. [...]"  

Commentary: "Internal TSA Documents: Body Scanners, Pat Downs Not For Terrorists" [10/18/13] Printer Friendly Version "The TSA has quietly admitted there is no actual “threat-addressing” basis for employing nude body scanners or invasive pat down procedures at airports, a notion many travelers who are weary of the federal agency’s borderline sexual molestation have long suspected but were hard-pressed to prove. The evidence was found in sealed court documents, available through the PACER.gov website, regarding engineer and blogger Jon Corbett’s ongoing litigation over the constitutionality of the agency’s loathsome security practices. In a redacted version of the appellant’s brief, filed by Corbett on October 7 with the United States Court of Appeals for the Eleventh Circuit, several portions of the Summary of Facts section were blacked out, raising questions as to the nature of the censored information. In a redacted version of the appellant’s brief, filed by Corbett on October 7 with the United States Court of Appeals for the Eleventh Circuit, several portions of the Summary of Facts section were blacked out, raising questions as to the nature of the censored information.But in a sealed version of the same documents ( available here), the redacted sections appear with incriminating clarity. [...] A section detailing how “The TSA Has Misled The Public As to the Likelihood of the Threat ‘Addressed’ By Nude Body Scanners and Pat Downs,” includes a blacked out portion concerning the TSA’s knowledge that “explosives on airplanes are extremely rare.” “For example, the TSA analyzed hijackings in 2007 and found 7 hijacking incidents across the globe, but none of them involved actual explosive devices,” Corbett explains in the brief, adding that the last attempt to bring an explosive onboard an airplane through a U.S. airport occurred 35 years ago. [...] The TSA also had the following section completely censored: "This begs the question, then, of what evidence the government possesses to rationalize that we should be so afraid of non-metallic explosives being brought aboard flights departing from the U.S. that we must sacrifice our civil liberties. The answer: there is none. “As of mid-2011, terrorist threat groups present in the Homeland are not known to be actively plotting against civil aviation targets or airports; instead, their focus is on fundraising, recruiting, and propagandizing.” In the brief’s Summary of Argument, another redacted portion concerns the TSA’s understanding that body scanners and pat downs are ineffective at addressing a threat for which they admit “there is no evidence.” The information contained within the redacted portions support what Infowars and others have long suspected: that the sprawling agency – which is in the process of extending beyond the airport and onto highways, train stations and public buses – was never meant to thwart terrorists, but was instead set up to purposely obstruct, annoy, harass and train the American public. In other words, the court documents go a long way in proving the TSA is pure contrived security theater custom-made solely to indoctrinate Americans, through prisoner training, into blindly accepting obedience to authority as a normal way of life, not to mention a huge waste of about $7.91 billion in taxpayer money a year. " [...]"

MSM: "NSA Director Alexander Admits He Lied about Phone Surveillance Stopping 54 Terror Plots" [10/09/13] Printer Friendly Version "The head of the National Security Agency (NSA) admitted before a congressional committee this week that he lied back in June when he claimed the agency’s phone surveillance program had thwarted 54 terrorist “plots or events.” NSA Director Keith Alexander gave out the erroneous number while the Obama administration was defending its domestic spying operations exposed by whistleblower Edward Snowden. He said surveillance data collected that led to 53 of those 54 plots had provided the initial tips to “unravel the threat stream.” But Senator Patrick Leahy (D-Vermont), chairman of the Senate Judiciary Committee, said on Wednesday during a hearing on the continued oversight of the Foreign Intelligence Surveillance Act that the administration was pushing incomplete or inaccurate statements about the bulk collection of phone records from communications providers. “For example, we’ve heard over and over again that 54 terrorist plots have been thwarted by the use of (this program),” Leahy said. “That’s plainly wrong,” adding: “These weren’t all plots and they weren’t all thwarted.” Alexander admitted that only 13 of the 54 cases were connected to the United States. He also told the committee that only one or two suspected plots were identified as a result of bulk phone record collection. [...]"  

Commentary: "FBI Lawless Unaccountability" [10/08/13] Printer Friendly Version "NSA and CIA aren't America's only rogue agencies. The FBI's been around since 1908. From 1924 - 1972, J. Edgar Hoover ran it. He did so extrajudicially. He did repressively. He waged war on freedom. He defended capital's divine right. He trashed democratic values. He targeted alleged communists, anti-war, human and civil rights activists, political dissidents, the American Indian Movement, and Black Panther Party among other groups and individuals. He did it no-holds-barred. So did his successors. Harassment, intimidation, false accusations, disinformation, and political assassinations are common agency practice. Previous articles discussed what goes on. Rule of law principles don't matter. FBI powers are sweeping. They're used extrajudicially. They're unaccountable. Anyone can be targeted for any reason or none at all. No probable cause, reasonable grounds, or suspicions are needed. Constitutional rights don't matter. Exercising free expression makes law-abiding Americans vulnerable. Alleged terror plots are FBI hatched. Innocent victims are lawlessly entrapped. Whistleblowers are ruthlessly targeted. Rogue agencies operate this way. According to the ACLU, "(t)oday's FBI doesn't just search for evidence to catch criminals, terrorist and spies. Working with other government agencies and private companies, it helps gather information about millions of law abiding Americans." It does it by "tracking our communications and associations." It operates extrajudicially. It does so secretly. It does whatever it wants unaccountably. It does it with executive branch authorization. A previous article discussed an ACLU fact sheet. It headlined "The Ten Most Disturbing Things You Should Know About the FBI Since 9/11." It explained Patriot Act abuses, racial, ethnic and religious bias, unrestrained metadata-mining, targeting dissent and independent journalists, stonewalling congressional oversight, and other unconstitutional practices. Like NSA, CIA and other rogue US agencies, the FBI's a power unto itself. A new ACLU report explains more. It's titled "Unleashed and Unaccountable: The FBI's Unchecked Abuse of Authority PDF " [...]  

MSM: "FBI Calls Half Of Populace With 9/11 Doubts Potential Terrorists" [09/21/13] Printer Friendly Version "The FBI is instructing local police departments and "communities against terrorism" to consider anyone who harbors "conspiracy theories" about 9/11 to be a potential terrorist, in a circular released to local police departments. The memo thus adds 9/11-official-story skeptics to a growing list of targets described by federal law enforcement to be security threats, such as those who express "libertarian philosophies," "Second Amendment-oriented views," interest in "self-sufficiency," "fears of Big Brother or big government," and "Declarations of Constitutional rights and civil liberties." A newly released national poll shows that 48 percent of Americans either have some doubts about the official account of 9/11, or do not believe it at all. The FBI circular entitled "Potential Indicators of Terrorist Activities Related to Sleepers" says that people who should be 'considered suspicious' of possible involvement in "terrorist activity" include those who hold the "attitude" described as " Conspiracy theories about Westerners." The circular continues: "e.g. (sic) the CIA arranged for 9/11 to legitimize the invasion of foreign lands."  [...]"  Related: "NSA Isn't The Only Three-Letter Agency Abusing The Rights Of Americans"Printer Friendly Version See also below: "ACLU Releases Report On FBI’s Development Into Abusive Domestic Intelligence Enterprise" [09/17/13] 

MSM: "TSA Agent Arrested For Human Smuggling Ring" [09/20/13] Printer Friendly Version "Immigration and Customs Enforcement (ICE) agents recently arrested TSA officer David Alexander Diaz-Torres for "conspiracy to transport illegal aliens within the United States," according to court documents filed by the U.S. District Attorney's office in Puerto Rico. So now, in addition to theft, sexual deviancy, drug use and gross violations of travelers' privacy, we can add human smuggling to the long and growing list of TSA agent legal violations. [...]"  Related: "TSA Officers Arrested By Police For Dealing In Stolen Goods" Printer Friendly Version "Whether it's because of poor vetting, extremely low standards, substandard pay or a combination of all these elements and others, the Transportation Security Administration has become little more than a criminal laughing stock. Born from the USA Patriot Act with the creation of the Department of Homeland Security following the 9/11 attacks, the TSA as an agency has been involved in scandal after scandal, as scores of its "officers" have been involved in a host of criminal behavior. The latest example comes from Dallas-Fort Worth International Airport, where authorities have arrested at least two TSA officers "in a police sting operation involving stolen parking passes," NBCDFW reports. There could be dozens of others involved as well, said the report. [...]" 

Commentary: "Scheindlin Shuts Down NYC's Request For Stay On Ruling Finding Stop And Frisk Unconstitutional" [09/20/13] Printer Friendly Version "A few weeks back the city of New York filed a motion to stay Judge Scheindlin's ruling (pending appeal) that components of the NYPD's infamous stop and frisk program were unconstitutional. She also ordered the installation of an independent monitor and the deployment of body cameras at one station per precinct. The city, of course, declared that pretty much everything about Sheindlin's decision would result in "irreparable harm" (as one does in these filings). Scheindlin has denied the stay and shot down every single claim presented by the city. Fun fact: several city council members and mayoral candidate Bill De Blasio all offered declarations of opposition to the city's motion to stay. Sheindlin states that allowing the stay would send the wrong message to the public, telling them that the NYPD's stop and frisk program is a) constitutionally sound (when it isn't), and b) that the program actually curbs crime, and that going without it would be dangerous. The case is still being appealed, but in the meantime the remedies ordered by will have to be put into practice. Bloomberg and Kelly are probably past the point of addressing this at a press conference but I imagine they're off somewhere fuming loudly.  [...]"  Related: "Study Finds Stop-And-Frisk Leads To Mistrust Of Cops, Unwillingness To Cooperate With Police" Printer Friendly Version |"Without Any Legal Basis, The NYPD Has Been Classifying Its Own Documents For More Than A Decade" Printer Friendly Version "... The NYPD is doing something no other city law enforcement agency has done: classifying its own documents. Since at least 2003, the New York Police Department has been labeling some of its internal documents "Secret," a designation that has baffled government secrecy experts, journalists and civil liberties lawyers. By labeling documents "secret," the Intelligence Division appears to be operating its own in-house classification system, similar to those used at federal agencies like the CIA, where Intel's chief, David Cohen, previously worked for 35 years. Some of the documents also include the caveat, in all-caps, that "No portion of this document can be copied or distributed without the exclusive permission of the policy commissioner or deputy commissioner of intelligence."  Why is this "baffling?" Because the NYPD's in-house classification system has nothing legal to back it up. "You know what that [label] means? It means diddly," said Robert Freeman, executive director of New York's Committee on Open Government. "I think the police department is following the lead of the federal government. The difficulty is, in my opinion, it does not have a legal basis for doing that." Christopher Dunn, associate legal director at the New York Civil Liberties Union, told HuffPost he has only seen the label on documents created after 2001. He agreed with Freeman that "as far as I know, this marking has no legal significance."  The NYPD remains a law unto itself. Bloomberg has referred to it as the "seventh biggest army in the world" (and his own "personal army") and has, over the course of his three terms, indulged every excess. It should be noted that former CIA officer David Cohen got the ball rolling on the civil liberties-violating "Demographics Group" (the one that labeled entire mosques as terrorist entities) late in 2002, which would explain the noticeable uptick in "SECRET" documents in 2003. Nothing drives overclassification more than a combination of dubious legality and working hand-in-hand with national intelligence agency liaisons. [...]"  

Commentary: "Navy Yard Shooting “Iconic Photo” Not Actually From Shooting Event – False Flag Hoax" [09/20/13] [9:36] "The Navy Yard Shooting so far has provided ZERO evidence there actually was any sort of shooting in the building. There are cameras all over this particular piece of real-estate which should show EXACTLY what happened inside the building- yet these have never been shown, or talked about or even mentioned on the media. Where are all the videos and photos from people who were inside the building from their cell-phone cameras? Are people inside this building allowed to bring shotguns into their first day at work, but not allowed to bring in cell-phones? The "Iconic" picture of a man laying down, being helped, with military personnel in front of the CVS Pharmacy that time and time again was said to have been "1 Block Away from the Shooting" was in fact 4 blocks away from the "shooting"- a "minor mistake".. yet, later, it turned out this man lying on the ground actually had nothing to do with the Navy Yard Shooting- further reducing the amount of photo "evidence" any sort of shooting event actually happened. The fact that that particular photo was unrelated did little to deter Mainstream media from airing it over and over again, and the online "news" sites from showing as some sort of proof of a shooting. Conveniently, helicopters removed the "victims" from the scene- "victims" who don't appear to be injured, or be bloody at all.. one guy smiling as he's being bucketed up. So, not only was the most "iconic" image from "shooting scene" proven not to be one block away as reported (actually 4 blocks) and not actually part of the shooting- and the AR-15 not actually used in the shooting either (makes you wonder how they got that wrong) Nobody shown leaving the scene in a helicopter appears to be injured, and no images cell-phone, surveillance or otherwise have been mentioned to exist or released to the public. [...]"  Related: "Navy Yard Shooting: SWAT Team Ordered To ‘Stand Down’" Printer Friendly Version "According to a BBC report, one of the most heavily armed police teams, assigned with the task of protecting the Capitol complex and responsible for responding to threats of terrorism, was ordered to stand down in response to Monday’s shooting at the Naval Sea Systems Command Headquarters building in D.C. Reports confirm that although the team arrived on the scene shortly after news spread of an active shooter situation at the Navy Yard, several Capitol Police team members say they were told by a watch commander to leave the scene. The sources spoke anonymously to BBC in fear of repercussions. [...]"  

MSM: "Feinstein Calls For New Gun Control Laws Again After Navy Yard Shooting" [09/17/13] Printer Friendly Version "California Democratic Sen. Dianne Feinstein is renewing her call for new gun-control laws because of Monday’s deadly Navy Yard shooting. The FBI confirmed Monday afternoon that 34-year-old Aaron Alexis is the suspect in Monday’s massacre at the Navy Yard in Washington, D.C. Alexis died at the scene. Authorities are still looking for other potential gunmen in the rampage that has killed at least a dozen people. [...]"  Note:  It's amazing to me how the Wicked Witch always emerges from her lair at the right time with "new gun control laws" ready and waiting. Does she have a stack of "laws" just hanging around waiting for the opportune moment? Related: "Fox's Brit Hume: If Gun Control Couldn't Pass After Newtown, It Won't Pass Now" [2:25]  

Commentary: "Crazed “Black Out” Navy Yard Shooter Suspect Alexis Had Secret Government Clearance" [09/17/13] Printer Friendly Version "The suspected Navy Yard gunman shot dead by cops earlier today had a secret government clearance despite the fact he was arrested in Seattle in 2004 after shooting out the tires of a car during an angry “blackout.” Alexis was also arrested in 2010 for shooting into a neighbor’s apartment in Fort Worth, Texas. It is not explained how the former Navy reservist received a secret defense security clearance after the 2010 shooting incident.[...]" 

MSM: "Navy Yard Killer On Anti-Depressant Meds?" [09/17/13] Printer Friendly Version "The Associated Press reports that Alexis, “had been treated since August by the Veterans Administration for his mental problems,” which included paranoia, sleep disorder and hearing voices in his head. According to his father, Alexis suffered from post-traumatic stress disorder as a result of his harrowing experiences during his involvement in rescue operations on 9/11. SSRI (selective serotonin reuptake inhibitor) drugs are the most common form of treatment for PTSD, with Paroxetine being one of the most prescribed medications for this purpose. Paroxetine was also listed as the number 3 top violence-causing drug by the Institute for Safe Medication Practices (ISMP). [...]" 

Commentary: "Russian Official Mocks Navy Yard Shooting" [09/17/13] Printer Friendly Version "A Russian official blasted “American exceptionalism” in a tweet Monday morning, saying the deadly shooting at Washington’s Navy Yard confirms the worst about the U.S. “A new shootout at Navy headquarters in Washington — a lone gunman and 7 corpses. Nobody’s even surprised anymore,” tweeted Alexey Pushkov, a member of the Russian parliamentary foreign affairs committee. “A clear confirmation of American exceptionalism,” he added, according to multiple translations of the original Russian tweet. Mr. Pushkov went on in English to say that American exceptionalism “contradicts the principles of equal rights and smells of political racism.”...The U.S. Embassy in Moscow responded directly to Mr. Pushkov on Twitter in Russian, saying “What is exceptional here? Why use a tragedy for a set of political points? [...]"  Note: Because that's what they have always done. 

Commentary: "ACLU Releases Report On FBI’s Development Into Abusive Domestic Intelligence Enterprise" [09/17/13] Printer Friendly Version "The American Civil Liberties Union (ACLU) has produced a report that fully outlines how the Federal Bureau of Investigation (FBI) has developed into an expansive domestic intelligence enterprise over the past ten to fifteen years, which has little regard for the rights of Americans and targets or undermines those rights in order to advance operations. Before highlighting some of what is in the report, it is worth suggesting that this kind of report is in the spirit of the final report of the Church Committee, which was published in April 14, 1976, after assessing widespread abuses by agencies in conducting “intelligence activities.” [...]"  Related: "A Call for FBI Reform" ACLU Printer Friendly Version "Tomorrow, the ACLU will release a report, "Unleashed and Unaccountable: The FBI's Unchecked Abuse of Authority," documenting the bureau's expanded post-9/11 authorities, their impact on civil liberties in the United States, and the FBI's evasion of oversight that enables abuses to continue today. Twelve years after 9/11, its time for the attorney general and Congress to revisit the extraordinary powers given to the federal government's premier law enforcement agency in the haze of tragedy and initiate a top-to-bottom review of FBI policies and practices to identify and curtail any activities that are unconstitutional or easily misused.[...]"

MSM: "Audit Finds Significant Inaccuracies In 'Terrorism' Stats" [09/17/13] Printer Friendly Version "A government audit of the Justice Department's terrorism-related statistics revealed that all were inaccurately reported, and most were significantly inflated. Five years ago, the Office of the Inspector General found problems with the Justice Department's reporting of terrorism- related statistics and advised it to revise its internal controls. This year's follow-up audit was intended to determine if the Department's corrective actions improved the accuracy of its statistics. Auditors selected 11 of the 39 statistics to thoroughly test, including the number of terrorism-related cases filed, the number of defendants convicted at trial or by guilty plea, and the number of defendants sentenced to prison. But, instead of improvement, the audit found that the Department "inaccurately reported all 11 statistics we reviewed during this follow-up audit. Most of these 11 statistics were inaccurately reported by significant margins." For example, the statistic reporting the number of terrorism-related defendants judged guilty in 2009 was inflated 13 percent, and 26 percent in 2010. The number of terrorism-related defendants sentenced to prison in 2010 was overstated by 19 percent. In addition, the auditors found cases in each category that were incorrectly coded as terrorism/national security case, and should not have been included at all. [...]"  

Commentary: "Head of Syrian Rebels 'Calls for Terrorist Attacks' On America" [09/13/13] Printer Friendly Version "... CBS News reports: Al Qaeda chief Ayman al-Zawahri called has called on Muslims to continue attacking Americans on their own soil in order to “bleed” the U.S. economy. “To keep up the hemorrhage in America’s security and military spending, we need to keep the Unites States on a constant state of alert about where and when the next strike will blow,” Zawahiri said. Reuters noted in February 2012 that al-Zawahri is backing the Syrian rebels, and asking his followers to fight the Syrian government. But al-Zawahri has since taken control of the main Al Qaeda rebel terrorist group in Syria: al-Nusra. [...]"  Related: Flashbacks: "Arms Airlift to Syria Rebels Expands, With C.I.A. Aid" Printer Friendly Version | "US And Europe In 'Major Airlift Of Arms To Syrian Rebels Through Zagreb'" Printer Friendly Version | "U.S. Weapons Reaching Syrian Rebels" Printer Friendly Version  Note: The same people John McCain met with. The 'rebel' groups are US/ Saudi/Israeli- supported and supplied. The propaganda theatre is laughable and transparent ... these guys are on autopilot until the end. "The whole aim of practical politics is to keep the populace alarmed (and hence clamorous to be led to safety) by menacing it with an endless series of hobgoblins, all of them imaginary." -- H.L. Mencken (1918)

MSM: "Orchestrating Terror: 9/11 and Operation Gladio" [09/09/13]   [12:06] Note: References current Syria fiasco.

Commentary: "Timeline of Military-Intelligence Operation: U.S. Had Planned Syrian Civilian Catastrophe Since 2007" [09/06/13] Printer Friendly Version "Western media networks have ensured that a singular narrative of “pro-democracy” uprisings turning violent in the face of brutal oppression by the Syrian government after the so-called “Arab Spring” is disseminated across the public. In reality, “pro-democracy” protesters served as a tenuous smokescreen behind which armed foreign-backed extremists took to the streets and country-sides of Syria to execute a sectarian bloodbath years in the making. Here is a timeline that illuminates the true cause of Syria’s current conflict and the foreign interests, not the Syrian government, responsible for the tens of thousands dead and millions displaced during the conflict. [...]"  

MSM: "NSA Head Makes Public 3 FISA Court Reports Detailing Violations Of U.S. Citizens Privacy Rights" [08/22/13] [3:33] "August 21, 2013 CNN [...]" 

Commentary:"Rise Of False Flag Events Triggers The Need For More Crisis Actors"[08/21/13]  Printer Friendly Version "A recent post on a San Diego Craigslist website advertises the need for “motivated” Surveillance Role Players (SRPs) and scenario driven practical exercise Role Players (RPs). The ad claims to be looking to fill these positions to “support military training activities in the San Diego, Calif. region.” The ad further states: “Qualified personnel should demonstrate an established track record of conducting surveillance operations at various discretion levels, supporting surveillance training and military practical exercise training. Individuals with previous military, intelligence community and law enforcement experience are highly preferred.” The MASY Group, the company hiring, is looking for candidates that have a minimum of five years of counterintelligence (CI) or human intelligence (HUMINT), with at least two years of operational deployments in a CI/HUMINT military occupational specialty. Applicants are also required at minimum, to possess a secret clearance to qualify. [...] The rise of false flag events triggers the need for more crisis actors, and this Craigslist ad seems to be looking for just that. Private defense contractors have been known to routinely be present on the scene during government staged false flag events, often working closely with crisis actors. Five military contractors were confirmed to be on the scene during the Boston bombing, however the mainstream media initially refused to acknowledge their presence. A report from Washington’s Blog states, “there was a drill at the start of the Boston marathon, many false flag attacks coincide with drills (as a cover story to get logistics in place, and in case someone gets caught.)” The report links to a press release by the Air National Guard admitting that “Texas and Mass. National Guard members continue to provide support to civil and local authorities in the wake of the West, Texas and Boston Marathon explosions.” The report also states that in Boston there were “more than 850 National Guard members on duty to assist local authorities with logistics and security.[...]"  

Commentary: "Confessed Liar To Congress, James Clapper, Gets To Set Up The 'Independent' Review Over NSA Surveillance" [08/15/13] Printer Friendly Version "... In case you didn't catch that, Obama's asking Clapper to first create and set up this "outside" and "independent" review group... and then to have the group report its findings back to Clapper. The same strong defender of the program who flat out lied to Congress about it. If this was about "restoring the trust" of the American people that the government isn't pulling a fast one over on them, President Obama sure has a funny way of trying to rebuild that trust. This seems a lot more like giving the concerns of the American public a giant middle finger. [...]"  

Commentary: "Homeland Security Taps Generals to Run Domestic Drone Program: The Rise of Predators at Home" [08/10/13] Printer Friendly Version "... Since DHS began acquiring Predators, along with Predator variants called Guardians, from General Atomics nine years ago, this domestic drone program has proved an abysmal failure – whether measured by its effectiveness in immigration enforcement, drug control, or counterterrorism. A series of reports by the General Accountability Office, Congressional Review Service, and the DHS Inspector General’s Office have documented the paltry achievements, the alarming strategic confusion, and near-systemic logistical and technical shortcomings of the DHS drone program. These government reports pointed to the complete absence of any cost-benefit evaluations and efficiency assessments of the DHS drone program. Yet these official reviews failed to shed any light on the department’s controversial decision to deploy only the hugely expensive military-grade Predator drones and to enter into sole-source contracts with General Atomics to provide, maintain, and even operate the federal government’s domestic drone fleet. Nor did they probe the decision by DHS to hire military men to run the domestic drone program, despite their total lack of experience in law enforcement, border control, drug control, and immigration enforcement. Instead, from the start, DHS brought in generals with a history of procurement and management of the military’s killer drones to hunt down immigrants and illegal drugs with Predator drones. The continuing rise of Predator drones at home has been fueled by the bizarre merger of military influence in domestic affairs and by the key role of border hawks in the politics of immigration reform. The decision early on by DHS to tap generals involved in the military’s own controversial overseas drone program to shape and direct the domestic drone program points to the increasing merger of the post-9/11 homeland security/border security complex with the military-industrial complex. The DHS drone program is run by the Office of Air and Marine (OAM), a division of the Customs and Border Protection (CBP), which also includes the Office of the US Border Patrol.[...]" 

Commentary: "Loophole Shows That, Yes, NSA Has 'Authority' To Spy On Americans -- Directly In Contrast With Public Statements" [08/10/13] Printer Friendly Version "Right, so remember that claim yesterday from Barack Obama about how there is no domestic surveillance program? And remember in our post we noted that such a statement might come back to bite him, seeing that Snowden had leaked somewhere between 15,000 to 20,000 more documents to Glenn Greenwald and somewhere in there, it seemed like there was a decent chance there was evidence that Obama was lying? Right, so, funny story... this morning, James Ball and Spencer Ackerman over at the Guardian have published the details of a neat little loophole that does, in fact, give the NSA "authority" to run searches on Americans without any kind of warrant. This is due to a "rule change" in 2011:[...]" 

MSM: "Rise of America’s Praetorian Guard" [08/08/13] Printer Friendly Version "Military and Intelligence professionals, especially retired ones, are growing more concerned over the growing police state inside America. Those who served and fought to prevent its being imposed by an outside force have been watching it imposed internally… by Americans, including sadly, even veterans themselves. Growing numbers of them now agree that the Patriot Act was planned and designed for use primarily against Americans. The terrorism thing was just a cover as the archives show the legislation had been sitting up on the shelf for the ‘right situation’ to emerge where it could quickly be pushed through. And it was… with many Congressmen admitting later that they had never even read it. [...]"

MSM: "Aspen Security Forum On NSA Data Collection" C-SPAN [08/08/13] [52:33]  

Flashback: "DHS Releases Disappointing Civil Liberties Report on Border Searches of Laptops and Other Electronics" [08/07/13] Printer Friendly Version "In response to an ACLU Freedom of Information Act request, the Department of Homeland Security has at long last released its December 2011 Civil Rights/Civil Liberties Impact Assessment of its policy of conducting suspicionless searches of electronic devices at the border. Because of the sensitive, personal nature of the records we all carry with us on our laptops and phones, both the First and Fourth Amendments prohibit the government from searching these devices at the border, absent reasonable suspicion that a search will turn up evidence of wrongdoing. Disappointingly, the DHS Civil Rights and Civil Liberties Office disagrees. While its constitutional analysis is largely redacted (it's unclear why), the report does explain why such a policy is, in the office's view, "inadvisable." This is striking because it is the first time, as far as we know, that the government has explained why purely suspicionless searches supposedly enhance security: [...] This line of thought is faulty for a few reasons. DHS claims that giving Americans the opportunity to challenge laptop searches in court would lead to the divulgence of national security secrets, but this is obviously wrong. The government has numerous resources at its disposal to prevent the disclosure of sensitive information. The "state secrets privilege," to take just one example that is used in court cases, has been criticized on many grounds, but no one has ever seriously suggested that its protections are too anemic. Although DHS might fear the prospect of being called into open court to explain its actions, executive accountability before the law is the bedrock on which our system of constitutional self-government is built.[...]"  

MSM: "Suspended Homeland Security Supervisor Admits Sharing Child Porn" [08/02/13] Printer Friendly Version "A suspended Homeland Security supervisor entered a guilty plea to possession of child pornography in a plea agreement Monday, admitting in U.S. District Court in Buffalo that he viewed and shared electronic images and videos, some of them showing children in “sadistic or masochistic conduct or other depictions of violence.” Steven Metz, 41, pleaded guilty in front of U.S. District Judge William M. Skretny, who informed the Customs & Border Protection supervisor he could face up to 10 years in prison and a fine of $250,000. Metz possessed more than 600 images and videos of child pornography on his computer and shared them with other individuals through emails, according to U.S. Attorney William J. Hochul Jr. “Some of the files contained sadistic or masochistic conduct or other depictions of violence, and some of the children shown in the images and videos were prepubescent and under the age of 12,” Hochul said. He credited another division of the Department of Homeland Security – Immigration and Customs Enforcement – with discovering the cache of illegal material on the Hamburg resident’s home computer, which was seized in October 2012. [...]"  

MSM: "Report: TSA Employee Misconduct Up 26% In 3 Years" [08/02/13] Printer Friendly Version "A new government report says misconduct by Transportation Security Administration workers has increased more than 26% in the last three years. Some of the most serious violations include: Employees sleeping on the job, letting family and friends go without being screened, leaving work without permission and stealing. The Government Accountability Office report released this week says more than 9,000 cases of misconduct were documented over a three-year span. More than 1,900 of the incidents were deemed significant enough to be possible security threats. [...]"  

MSM: "U.S. State Dept Announces Closure Of Certain International Embassies Because Of Security Fears" [08/01/13] [1:06] 

MSM: "Congressional Hearing: U.S. Government Surveillance Programs And Privacy Rights" [08/01/13] [144:05] "July 31, 2013 C-SPAN [...]"  Related"NSA Director Defends Surveillance" [08/01/13] [3:57] "With more leaked details about the NSA's surveillance systems being published, Director Gen. Keith Alexander offers an unapologetic defense at the Black Hat security conference. [...]" 

Commentary: "The Psychological Reasons Behind Mass Surveillance " Alex Jones [08/01/13] [40:28] "Alex welcomes back UK activist and CCTV cameraman Steve Jolly to discuss his ambivalence towards the surveillance state and his experience addressing the UK Parliament where he scrutinized the Protection of Freedoms Bill. [...]" Related: Interview: "Rep Alan Grayson On NSA Surveillance Programs And Privacy" [42:00] "August 01, 2013 C-SPAN [...]" | Grayson: "They're Not Saying That It 'Prevented Terrorist Attacks' At All" 

MSM: "U.S. Students Fake GPS Signal, Take Control Of  $80million 213-Foot Superyacht In The Mediterranean" [07/31/13] Printer Friendly Version "Students at the University of Texas have used a James Bond-style custom-made GPS device to divert an $80 million yacht from its course, highlighting a potential threat to maritime travel. The effort was led by graduate students from the Cockrell School of Engineering at the end of June. It is known as 'spoofing,' meaning sending false signals to gain control of a vessel's GPS receivers. The students, led by professor Todd Humphreys, used a device to divert the White Rose Of Drachs from its original course by sending the fabricated data. [...]"  

MSM: "New DHS Headquarters Was A CIA Mkultra Test Facility" [07/29/13] Printer Friendly Version "The Department of Homeland Security’s plans to occupy St. Elizabeths Hospital grounds in the Washington D.C. area have slowly been moving forward, despite the project’s enormous projected cost. The mammoth governmental entity, which has come to umbrella the offices of the Border Patrol. Little-reported, however, is the facility’s history of being used to carry out mind-altering and brainwashing experimentation for the CIA (then known as the OSS) on unwitting mental patients, a clandestine program better known as MKUltra. The primary goals of the MKUltra experiments were to test the effects of drugs, namely hallucinogens, and other forms of psychotherapy – including electroshock therapy – on humans, and to research and perfect methods of torture which could best be used to create Manchurian candidates, or mind-controlled persons, who could be programmed to carry out any number of harmful acts, up to and including assassinating presidents of the United States. [...]"  Note: Interestingly, John Hinckley was held there right after shooting Reagan.

Commentary: "Blind Men's Bluff: Why the Surveillance State Is Doomed" [07/28/13] Printer Friendly Version "Senator Ron Wyden of Oregon is by far the most outspoken foe in Congress of the NSA and the domestic surveillance state that was created by Woodrow Wilson in 1917, accelerated by Harry Truman, and made exponential by the passage of the Patriot Act in 2001. He delivered a remarkable speech on July 23 at a meeting held by the Center for American Progress Action Fund. This is a standard Democratic Party Beltway organization: pro-union, pro-global warming, pro-green, pro-big government. But on civil liberties, it is on the side of rolling back the federal government in general and the NSA in particular. Wyden's speech was a summary of how the NSA has provided incorrect information to Congress and the public. He did not say "lies," but this is what he clearly meant. He admitted that Snowden -- unnamed -- blew the whistle on the NSA. Snowden provided evidence of the extent of the data collection, which the NSA's director had categorically denied to Congress had been going on. Wyden's speech is the best summary I have read on the extent of the NSA's systematic deception of Congress. [...] The surveillance state is now unstoppable politically. Legally, there is no possibility that it will be rolled back. It is now the non-law of the land. Wyden thinks the voters may roll it back. They won't. It is unstoppable politically. But this does not mean that it is inherently unstoppable. On the contrary, it is eminently stoppable. It will be stopped. Economics will stop it. The ability of any bureaucracy to make decisions is limited by its ability to use the data at its disposal to make rational decisions. Ludwig von Mises in 1920 showed why all central planning by the state is blind. It has no free market to guide it. There are no prices to guide it. The state is inherently myopic. His 1944 book, Bureaucracy, extended this theme. The more that a bureaucracy seeks omniscience in its quest for omnipotence, the more short-sighted it becomes. I put it this way: it bites off more than it can chew. In the case of the NSA, it bytes off more than it can chew. Bureaucrats are time-servers. They are not original. They are turf-defenders. They are career-builders. They are not entrepreneurial. That was Mises' point in 1944. The key goal of a bureaucrat is this: "Don't make a mistake." In short, "do it by the book." It does not matter which bureaucracy we have in mind: CIA, FBI, NSA. The attitude is the same, because the financing is the same: from the government.  They have bitten off more than they can chew. Central planners are bureaucrats, and bureaucracy is blind. It cannot assess accurately the importance of the mountains of data that are hidden in government-collected and program-assessed digits. The knowledge possessed in the free market is always more relevant. Society is the result of human action, not of human design. The bureaucrats do not understand this principle, and even if they did, it would not change reality. [...]"   Related: See below.

MSM: "Gohmert: NSA Program is Like Busting Pot Smokers by Tracking Stolen Potato Chips" [07/26/13] [6:18] 

Commentary: "Former FISC Judge Quit Over Warrantless Wiretapping, Now Argues FISC Is Out Of Control" [07/25/13] Printer Friendly Version "Last year, we noted that after five years of nothingness, despite what the law required, the federal government finally had a Privacy and Civil Liberties Oversight Board (PCLOB), after years of nominations that went nowhere. The PCLOB does now exist and has been charged with looking into the government's surveillance efforts. While the PCLOB does have some really good members who are strong privacy/civil liberties advocates, there are significant questions about how much authority it actually has. Still, on Tuesday, the PCLOB held hearings on the ongoing surveillance programs, and perhaps the most interesting thing to come out of them were the comments from James Robertson, a former FISC judge, who had quit the court, but had not spoken publicly about why until now. Specifically, he claims that he quit because of revelations about the Bush administration using warrantless wiretapping and going around the court's approval process. Robertson said he asked to join the FISA court "to see what it was up to," had previously played a central role in national security law. He was the judge who ruled against the Bush administration in the landmark Hamdan vs. Rumsfeld case, which granted inmates at the U.S. naval prison at Guantanamo Bay, Cuba, the right to challenge their detentions. That ruling was upheld by the Supreme Court in 2006. Robertson quit the FISA court in 2005, days after the New York Times revealed widespread NSA warrantless wiretapping under President George W. Bush's administration. Robertson had previously refused to explain his decision. But during a break in the hearing Tuesday he confirmed for the first time to the AP that he had "resigned in protest because the Bush administration was bypassing the court on warrantless wiretaps."  Robertson argued that the "rubber stamp" claims about the FISA Court were inaccurate, saying that they left out the fact that FISC frequently pushed back on requests, requiring changes from the government, which were not seen in the overall stats on requests "approved" by the court. That said, he notes that the approval/disapproval of warrants was supposed to be all that FISC was about -- but since the FISA Amendments Act of 2008, the role of FISC has changed entirely, from a narrowly focused court approving specific warrants to what is effectively a judicially run administrative agency designed to approve entire surveillance programs.  [...] Furthermore, Robertson highlighted what many of us have been saying all along: when you have a secret court that only hears one side of a case, it should be no surprise that the court keeps pushing further and further in the direction of the single party (the government) that presents information before it. Robertson's suggestion to try to fix this is to somehow come up with an adversarial process -- whether it's (for example) someone from a public interest group, such as the ACLU, or someone appointed by the PCLOB itself, to act as an advocate for those on the other side of the government's surveillance desires."  

MSM: "Forbes Reporter Gets His Car Hacked To Prove How Easy It Is" [07/25/13] [4:48] "A couple of hackers show off a series of nasty new attacks on cars—with Forbes' Andy Greenberg behind the wheel. "Stomping on the brakes of a 3,500-pound Ford Escape that refuses to stop--or even slow down--produces a unique feeling of anxiety. In this case it also produces a deep groaning sound, like an angry water buffalo bellowing somewhere under the SUV's chassis. The more I pound the pedal, the louder the groan gets--along with the delighted cackling of the two hackers sitting behind me in the backseat. Luckily, all of this is happening at less than 5mph. So the Escape merely plows into a stand of 6-foot-high weeds growing in the abandoned parking lot of a South Bend, Ind. strip mall that Charlie Miller and Chris Valasek have chosen as the testing grounds for the day's experiments..." [...]" 

UK: "UK Private Security As Terrorism Vector" [07/20/13] Printer Friendly Version "The widening of the spiral of fear and increasing demand for 'protection' creates an international protection racket cartel, indistinguishable only in that they call themselves 'legal', from organized criminal gangs. UK security firms Serco and G4S, are described as ‘indispensable’ to Britain's criminal justice system, have been overcharging the government by 'tens of millions of pounds' for criminals who had long finished their sentences or been dead for years. Founded in 2004 G4S employs over 600,000 people in 125 countries with revenue of £7.5bn, making it the world's largest security company. Despite its size G4S appears to have little regard for international law, taking on private prison work in Palestine/Israel which is alleged to contravene Article 76 of the Fourth Geneva Convention. Transporting prisoners from the occupied territory into the country of the occupier. Serco and G4S are now so deep into Britain's criminal justice system the Guardian recently described them as 'indispensable'. Serco manage six prisons including Oakwood 'super-jail' and two immigration removal centres. G4S manage police custody cells, a 999 emergency response service, county control room, police station and court facilities.  [...] In July 2012 London prepared to host its first Olympics since 1948. But behind the scenes one thing threatened to spoil it for everyone. The main security firm was playing games with the Olympic Committee and the government. G4S said it was ready, all the risk assessment boxes were ticked and certified. The trouble was they were lying. With only a month to go until the great show got on the road recruitment was nowhere near the numbers required and training was pitiful.  With only three weeks to go the British army saved the day, stepping in with 3,500 soldiers to replace the senior and mid-ranking G4S staff. How that came about is a cautionary tale about private security that was never fully told by the London press. The world's biggest private security firm G4S had a £300m contract to hire 10,500 staff for the games. They made sure it all looked good for police and Olympic organisers on paper ... but unbeknown to them media savvy G4S trainee Ben Fellows was busy collecting particulars from his G4S classmates about just what a disaster of a 'training operation' was unfolding around them. [...]"  

MSM: "Former Corruption Prosecutor Found Dead Under A Bridge- Suspiciously Ruled A "Suicide" [07/20/13] Printer Friendly Version  "John Fahy, or “Jay” as he was called, was found underneath a bridge, with a single gunshot wound to the head. There is no history of mental illness, or apparent reason for why the man would have wanted to commit suicide, so anyone thinking critically would find this extremely suspicious. Jay was a frequent guest on MSNBC, a propaganda network, and knowing how the White House and corporate elite are allied with corporate media, perhaps he broke some agreement between them, and maybe he was taken out as a result. Only a real investigation performed by citizens could reveal the truth. According to Mediaite Bergen County Prosecutor John L. Molinelli confirmed the death, which he said was “the result of a single gunshot wound to the head, fired with a handgun.” [...]"  

Cover-Up: "Michael Hastings Body Cremated Without Permission" [07/17/13] Printer Friendly Version Video clip  [3:10] "Hastings’ friend and confidant SSgt. Joe Biggs disclosed a macabre twist in the award-winning journalist’s death in a suspicious single-car accident. According to SSgt. Biggs, “Michael Hastings’ body was returned to Vermont in an urn.” He further alleged, “Family members did not want Michael’s body cremated.” This revelation provides another wrinkle in the Los Angeles Police Department’s (LAPD) handling of a case they labeled “no foul play” only hours after the writer’s death. Nevertheless LA County assistant corner, Ed Winter, said it took two days to identify the burned-beyond recognition body of Hastings. Officials also confirmed that an autopsy has been performed, but the cause of death is still pending. Unfortunately the family will have to wait for cause of death answers as LAPD media spokesperson Lieutenant Andrew Neiman indicated, “It will take several weeks to get the toxicology results.” Despite the LAPD’s categorization of the Hasting fatal accident as a “no (evidence of) foul play,” LAPD continues to ignore FOIA (CPRA in Calif.) requests made by San Diego 6 News for the police report, 9/11 call, autopsy, bomb squad and toxicology reports, or make the Mercedes available for inspection which only fuels conjecture. Wife Hires Private Investigator.[...] "  

Commentary: "Georgetown Law Professor: The NSA Surveillance Program Is Unconstitutional" [07/16/13] Printer Friendly Version "The NSA surveillance program, which has been revealed in leaks of classified documents by Edward Snowden, violates both the Fourth and Fifth Amendments to the US Constitution and must be stopped. This is the argument of Randy E. Barnett, a professor of constitutional law at Georgetown University and the author of the 2005 book "Restoring the Lost Constitution: The Presumption of Liberty," in an op-ed posted by the Wall Street Journal on July 11. Barnett applies his critique not only to the warrantless NSA program, but also the Consumer Financial Protection Bureau, which compiling a massive database of citizens' personal financial information to, supposedly, protect consumers from abuses by financial institutions.  [...] These programs also violate the Fifth Amendment's due process clause. "Secret judicial proceedings adjudicating the rights of private parties, without any ability to participate or even read the legal opinions of the judges, is the antithesis of due process of law," Barnett writes. "The secrecy of these programs make it impossible to hold elected officials and appointed bureaucrats accountable," Barnett continues. "Relying solely on internal governmental checks violates the fundamental constitutional principle that the sovereign people must be the ultimate external judge of their servants' conduct in office," a judgement which is impossible to make without the information that these programs conceals. Therefore, "Congress must put a stop to these unreasonable blanket seizures of data and end the jurisdiction of the Foreign Intelligence Surveillance Court to secretly adjudicate the constitutional of surveillance programs," Barnett concludes. "Both practices constitute a present danger to popular sovereignty and the rights retained by the people.[...]" 

Commentary: "U.S. Repeals Propaganda Ban, Spreads Government-Made News To Americans" [07/16/13] Printer Friendly Version "For decades, a so-called anti-propaganda law prevented the U.S. government’s mammoth broadcasting arm from delivering programming to American audiences. But on July 2, that came silently to an end with the implementation of a new reform passed in January. The result: an unleashing of thousands of hours per week of government-funded radio and TV programs for domestic U.S. consumption in a reform initially criticized as a green light for U.S. domestic propaganda efforts. So what just happened? … Until this month, a vast ocean of U.S. programming produced by the Broadcasting Board of Governors (BBG) such as Voice of America, Radio Free Europe/Radio Liberty and the Middle East Broadcasting Networks could only be viewed or listened to at broadcast quality in foreign countries. The programming varies in tone and quality, but its breadth is vast: It's viewed in more than 100 countries in 61 languages. The topics covered include human rights abuses in Iran; self-immolation in Tibet; human trafficking across Asia; and on-the-ground reporting in Egypt and Iraq.  [...] The restriction of these broadcasts was due to the Smith-Mundt Act, a long standing piece of legislation that has been amended numerous times over the years, perhaps most consequentially by Arkansas Senator J. William Fulbright. In the 70s, Fulbright was no friend of VOA and Radio Free Europe, and moved to restrict them from domestic distribution, saying they "should be given the opportunity to take their rightful place in the graveyard of Cold War relics." Fulbright's amendment to Smith-Mundt was bolstered in 1985 by Nebraska Senator Edward Zorinsky who argued that such "propaganda" should be kept out of America as to distinguish the U.S. "from the Soviet Union where domestic propaganda is a principal government activity." " 

MSM: "LAPD Visited Michael Hastings' House Prior To His Death, Were Seen Looking Under His Car" [07/15/13]   [14:58] "Abby Martin takes a closer look at the death of award winning journalist Michael Hastings, featuring interviews with Michael's close friend, Joe Biggs, who suspects his death was not an accident, and Kimberly Dvorak, an investigative journalist who has been conducting an investigation into the anomalies despite stonewalling from the LAPD.  [...]"  Related: See below: "Boston Brakes: “No Skidmarks In The Sky" Gordon Duff [07/15/13] ; "DARPA Manager Explains Multiple Ways Cars Can Be Hacked" [06/28/13] ; "Friend of Michael Hastings Breaks Down Odd Circumstances Before Hastings Death" Alex Jones [06/28/13]; "Michael Hastings Death / Murder and Hatzolah" [06/27/13]; "Full Remote Control Of All Modern U.S. Market Cars Proven" [06/21/13]; "The Political Assassination of Michael Hastings" Alex Jones and David Knight [06/21/13]...

Commentary: "Michael Hastings Update & Smoking Guns" [07/15/13] [5:49] "This is a update to my first video and this proves Michael Hastings was killed . Why is this not obvious to media or police is a question no one should have to ask and sadly means they lose even more credibility . [...]"  

Commentary: "Foul Play Vs Suicide: Ten Years On, The Row Still Rages Over The Death Of Dr David Kelly" [07/15/13] Printer Friendly Version "The weapons expert's body was discovered in lonely woodland – wrists slashed – but journalist Miles Goslett has always pushed for an inquest. He goes head-to-head with John Rentoul of The IoS, who insists that Dr Kelly killed himself, as Lord Hutton found, and that to think otherwise is to believe a ridiculous and tasteless fairy story [...]"  Related: "How A Blair Fixer Picked The Judge For The David Kelly Inquiry Just Three Hours After The Weapons Inspector's “Suicide" Printer Friendly Version 

Commentary: "Montana Enacts Law Prohibiting NSA Spying" [07/14/13] Printer Friendly Version "House Bill 603 requires any government to get a probable cause-based warrant before anyone’s electronic devices can be spied on. The law passed the Montana State Senate in April and was signed into law in May. It never really made any headlines, because it was all done before anyone heard the name Edward Snowden. I mean, most of us knew that the government was spying on everybody, but that was all a conspiracy theory until the media admitted it and then tried justifying it on “national security” grounds. So, H.B. 603 has been Montana law for several weeks now. Here’s what the law states: [...] Will the NSA even care about Montana’s new law? Probably not. They can do whatever they want, and they’ll even claim that they’re within the state law’s limits under subsection (2)(d). They’ll claim that there exists a “possible” life-threatening situation with the possibility of a terrorist attack. I’m sure the Department of Justice will sue Montana on the grounds that it is “obstructing” their investigation of Montanans. [...]"  

Commentary: "Boston Brakes: “No Skidmarks In The Sky" Gordon Duff [07/14/13] Printer Friendly Version "I had never heard of “Boston Brakes” until 2010. Several recent events, the controversial death of investigative journalist Michael Hastings in a one-car accident, juxtaposed by the relative impunity with which “whistleblower” Edward Snowden is able to “flit” from nation to nation and recent legal issues in the United Kingdom tied to the mysterious and controversial figure, John Bradenkamp, make the following study of “Boston Brakes” timely. Last week, Bradenkamps’s legal team joked about reports of their client being accused of stealing nuclear weapons and the crime being covered up by the Blair administration. But there is more to the story, much more. [...] It isn’t just that crash that makes it “Boston Brakes” but the speedometer stuck at some outrageous speed and the blood acohol level, always from a sample that is mysteriously misplaced later. Oh, and I almost forgot, no skidmarks, something accident investigators only see at suicides or murder. Remember, always no skidmarks."  [...] The problem is the pattern of killings, that 9/11 signature that we call “Boston Brakes.” The mysterious death of Richard Waddington, relative of a potential witness in the Chilcot Inquiry that could have opened an unimaginable “can of worms.” Waddington was to be subjected to an intimidating show of power, an arranged car accident, not a murder as it ended up. Waddington was killed to prevent someone else from confirming Israel’s complicity in building 10 nuclear weapons. The “secret world” says “6.” Keeping an Israeli nuclear test secret, keeping a nuke sold to North Korea secret, keeping an “under the table” deal involving the Thatcher government and gun runners secret cost a life. In 2008, Jorg Haider, the anti-Zionist ready to take power as Prime Minister of Austria got the “Boston Brakes” treatment when his Volkswagen Phaeton, one of the world’s finest road cars, as with Waddinton, Princes Di and others, rammed into a concrete abutment, “no skidmarks.” Jon King, writing of these incidents, says the following:  “According to former SAS officer and world-famous explorer, Sir Ranulph Feinnes, it is not beyond reason that both Princess Diana’s Mercedes and Jorg Haider’s Volkswagen were remotely hijacked. In his book, The Feather Men, Feinnes recounts in some detail a highly sophisticated assassination technique which he says has been employed by the world’s intelligence agencies for decades. A microchip transceiver, he explains, is fitted to the target vehicle’s on-board computer, allowing the vehicle to be controlled remotely. He says this technique was first deployed by the CIA in Boston, hence its name: the ‘Boston brakes’. Feinnes also recounts an instance of the ‘Boston brakes’ being successfully deployed in England in 1986, which resulted in the assassination of SAS Major, Michael Marman, and the near-death of a former equerry to the Queen, Sir Peter Horsley. According to Sir Ranuplh Feinnes, the ‘Boston brakes’ is all fact, no fiction.  Truth is, we live in a world where it is cheaper sometimes to use simple thuggery, than to go to the bother of rigging a Boeing 767 or running a car into a concrete abutment. When a member of congress is bribed to support a war, vote for a special tax break for a gangster or to submit to some Israeli abuse, did someone send him a photo of his children playing in a school yard or was his brothers wife raped and beaten recently? This is how the game is played. Between 1995 and 2005, 50 scientists that we know of, all WMD specialists, germ warfare, bio weapons, chemical warfare, died under circumstances, some as plain as an unexpected heart attack in an otherwise healthy young adult to the inevitable “Boston Brakes” crash: (List)  Find this a bit overwhelming? This is only one of several lists. If you wondered what intelligence services do, the answer is simple, they murder people. If you wonder who they work for, the answer is simple also, crooked arms dealers, drug cartels and power mad politicians. (When any major event happens,) within seconds, Fox News will have the whole story, Iranian suspects, airport footage, everything. It is all a game, everything is a game. Everything is a business and our businessmen today are all gangsters, same as our government. [...]" RelatedFlashback: "Boston Brakes" Assassination Technique Becomes Big “Problem Solver" Gordon Duff [07/25/10] Printer Friendly Version  

MSM: "Justice Dept Revises Rules For Dealing With Media During Leak Investigations" [07/14/13] [2:49] July 12, 2013 MSNBC News

MSM: "Boston Police Officer Arrested After Bombs And Explosives Found Inside Home" [07/13/13] Printer Friendly Version "A Boston police officer was arrested and charged after his wife called police to report that she found military-grade explosives, grenades, and ammunition in their home. Police Officer Kirk D. Merricks, 43, is now facing 11 counts of possession of an explosive device, four counts of obtaining stolen property and one count of illegal possession of ammunition. A bomb squad was called in to remove the explosives from the residence on the night of July 11.  A black briefcase contained four 40 mm grenades that are normally used with an M203 grenade launcher – a device that the US military introduced in the early 1970s. M203 grenade launchers are categorized as “Destructive Devices” under the National Firearms Act and are rarely available on the civilian weapons market. Officers also found a detonation cord, blasting caps, and military-grade ammunition. Chief Botieri told reporters that investigators believe the items were stolen, since they are generally not available for civilian purchase. Although Merricks is licensed to carry firearms, none of the explosives or military-grade ammunition were issued to him by police. Merricks was on duty while his home was being searched, and was arrested shortly thereafter. He has been placed on paid administrative leave and stripped of his handgun and badge. [...]"  

Commentary: "NSA Spying Never Catches Israelis - Why Not?" [07/12/13] "Video" Snordelhans Snordelhans [10:55] "Intelligence analysis ALWAYS follows a dual track of analyzing what you can see...and what you can't. The massive coverage on the recent Snowden revelations has basically all been theater as most had already been revealed and/or was known about by every Intel agency on the planet. NSA Spying Never Catches Israelis? WHY NOT? Nobody spies as heavily as the Israeli's, how come they've never been busted? [...] The data mining ability available to governments now is absolutely incredible. They can find out just about anything about anybody...but not on the Israelis, of course. Think about it. With these new tools we should have been able to decimate Israel's espionage networks here...political, military, financial, media, academia and the think tanks. How many Israeli Intel networks have the Western countries broken up since 911? The answer is zero. The Zionists have compromised these Western nations in a variety of ways, with the primary tool being political espionage as that is the pathway you use to get your people deeply embedded in all the important spots. They spend ten, twenty years, even longer grooming their people to have them ready when the time is right to slip them into sensitive positions. Even our Justice Department has been compromised, as people have gone everywhere to initiate prosecutions only to be told that it was just impossible for “protected entities”." 

Commentary: "Snowden Unveils NSA Satellite SAURON Program Targeting Citizens" [07/12/13] Printer Friendly Version " Edward Snowden, the whistleblower who recently unveiled the NSA’s ubiquitous PRISM wiretapping program, unveiled yet another insidious, citizen-targeting surveillance system Friday afternoon, in a chat with Internet Chronicle reporters. SAURON, or the Semi- Autonomous Ultra-high-Resolution Orbital Network, is comprised of a series of hundreds of low-orbiting cameras that can make out objects on the ground as small as 1 centimeter in size. There are so many satellites in this network that they are able to effectively monitor the entire planet’s populated surface without interruption. According to slides Snowden shared, taken from the NSA presentation on SAURON, each spy satellite feeds directly into a data bank so large that it is able to retain the captured imagery indefinitely. SAURON is also a reference to a villain in J.R.R. Tolkien’s “Lord of the Rings” trilogy, an evil god of discord who appears in the material world as an ever-searching eye. Snowden, looking as if he hadn’t slept in weeks, spoke with Internet Chronicle reporters in the transit corridor of Moscow’s Sheremetyevo airport. In a near whisper Snowden said, “It is shocking that the U.S. government would appropriate such evil imagery for a so-called security system like this. There is little doubt that this program – I won’t utter the name here – is not concerned with the security of citizens, but rather, it is a bald grab at power for power’s sake.” [...]" 

Commentary: "Underwear Bomber’ Was Working For The CIA" [07/12/13] Printer Friendly Version "A would-be “underwear bomber” involved in a plot to attack a US-based jet was in fact working as an undercover informer with Saudi intelligence and the CIA, it has emerged. [...]"  Note: This one scam fuelled the Chertoff Group's profit off airport scanners and formed the basis for the continuing harassment of flyers by DHS.

MSM: "Ron Paul on NSA: They Have To Justify Their Existence, Otherwise They're Out Of Work" [07/12/13] [4:47] " Ron Paul on Neil Cavuto 6.18.13 [...]"

MSM: "FBI Refuses To Testify At Congressional Hearing On The Boston Marathon Hearing" [07/12/13] [190:03] "July 10, 2013 C-SPAN [...]" FBI was running a bombing drill during the Boston marathon ... its no secret. Related: "Chairman: FBI Has ‘Chosen to Obstruct’ Oversight" Printer Friendly Version "Tensions between the House Homeland Security Committee and the FBI escalated Wednesday, with the agency’s decision to skip a hearing on the Boston Marathon bombings drawing sharp criticism and questions from the panel. The FBI has said it cannot participate in public hearings while the bombing case is open, but lawmakers argued that the bureau’s failure to cooperate makes conducting oversight more difficult; and some wondered openly if information-sharing among agencies is deteriorating. “I think the FBI has a lot to explain here,” said Rep. Peter King, R-N.Y. “I’m not trying to be a Monday-morning quarterback, but the fact that … they have completely stonewalled us here since the Boston bombing, I think is unacceptable.” The hearing joins other high-profile cases in recent weeks—including those involving the Internal Revenue Service, the National Security Agency, and the Justice Department—that have cast doubt on Congress’s ability to oversee federal agencies.  [...]" | "Only 1% of So Called Terrorists Nabbed by the FBI Were Real" Printer Friendly Version "In the dozen years since the 9/11 attacks, we've watched as a classified new legal regime for government surveillance has been hashed out, local police forces have become heavily armed military-type units and a whole new layer of bureaucracy has hatched to provide us with an abundance of “homeland security.” Proponents of this build-up argue that it's made us safer. They point to hundreds of foiled plots to make their case. But Trevor Aaronson, author ofThe Terror Factory: Inside the FBI's Manufactured War on Terrorism, dug into these supposedly dastardly plots and found that they are much less than meets the eye. [...]" 

Commentary: "Reporter Barrett Brown Faces 105 Years For Reporting on Hacked Private Intelligence Firms" Democracy Now [07/12/13] [12:50] Part 2 [8:06] "Journalist Barrett Brown spent his 300th day behind bars this week on a range of charges filed after he used information obtained by the hacker group Anonymous to report on the operations of private intelligence firms. Brown faces 17 charges ranging from threatening an FBI agent to credit card fraud for posting a link online to a document that contained stolen credit card data. But, according to his supporters, Brown is being unfairly targeted for daring to investigate the highly secretive world of private intelligence and military contractors. Using information Anonymous took from the firm HBGary Federal, Brown helped discover a secret plan to tarnish the reputations of WikiLeaks and journalist Glenn Greenwald of The Guardian. Brown similarly analyzed and wrote about the millions of internal company emails from Stratfor Global Intelligence that were leaked in 2011. We speak to Peter Ludlow, professor of philosophy at Northwestern University, whose article “The Strange Case of Barrett Brown” recently appeared in The Nation. “Considering that the person who carried out the actual Stratfor hack had several priors and is facing a maximum of 10 years, the inescapable conclusion is that the problem is not with the hack itself but with Brown’s journalism,” Ludlow argues. He adds that the case against Brown could suggest criminality “to even link to something or share a link with somebody.” [...]" 

MSM: "Canada Day Pressure Cooker Bomb Plot Will Go Straight To Canadian Supreme Court" [07/11/13] [1:50] Related: See below: "Canada Day Pressure Cooker Bomb Plot Straight Out Of FBI Field Guide" [07/06/13] ; "Landlord Doubts Terror Suspects Could Pull Off Bomb Plot" [07/04/13]; False Flag: "BC Legislature Threat: Canadian Police Stop Pressure Cooker Bomb Plot "Similar To The Bombs At Boston Marathon" [07/03/13] 

MSM: "Witness At Bradley Manning Trial Says No Harm Was Done To National Security" [07/11/13]   [9:44] Related: "Bradley Manning Defense Rests Their Case on Day Two of Testimony; Manning Will Not Testify" Printer Friendly Version 

MSM: " Facebook Android App Can Control Your Camera And Take Pictures Without Telling You" [07/11/13] Printer Friendly Version "CNBC's Eli Langer put together a Storify collecting tweets and posts that suggest the Facebook app on Android might be a security risk. The app has permission to "record audio at any time" and "use the camera at any time" without your confirmation. A spokesperson for Facebook explains this as follows: the language in this disclaimer comes from Google and wasn't written up by Facebook, it's simply how Android handles camera access. While it is technically possible for the Facebook app to record video and audio without your knowing, the spokesperson said Facebook won't do that. [...]"  Note: Well, it's already known that Facebook is tied in with the national security apparatus, so if they need to do it, they will. Another black mark for Android phones. Related: See below: "NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones" [07/10/13] ;"Uncovering Android Master Key That Makes 99% Of Devices Vulnerable" [07/04/13]  

Commentary: "Justice Department Caught Organizing Trayvon Martin Protests" [07/11/13] Printer Friendly Version "Judicial Watch announced today that it has obtained documents in response to local, state, and federal records requests revealing that a little-known unit of the Department of Justice (DOJ), the Community Relations Service (CRS), was deployed to Sanford, FL, following the Trayvon Martin shooting to help organize and manage rallies and protests against George Zimmerman. “These documents detail the extraordinary intervention by the Justice Department in the pressure campaign leading to the prosecution of George Zimmerman,” said Judicial Watch President Tom Fitton. “My guess is that most Americans would rightly object to taxpayers paying government employees to help organize racially-charged demonstrations.”[...]"  

MSM: "The NSA's Mass Indiscriminate Spying On Brazilians, And Rest Of The Planet" [07/10/13] Printer Friendly Version "As the headline suggests, the crux of the main article details how the NSA has, for years, systematically tapped into the Brazilian telecommunication network and indiscriminately intercepted, collected and stored the email and telephone records of millions of Brazilians. The story follows an article in Der Spiegel last week, written by Laura Poitras and reporters from that paper, detailing the NSA's mass and indiscriminate collection of the electronic communications of millions of Germans. There are many more populations of non-adversarial countries which have been subjected to the same type of mass surveillance net by the NSA: indeed, the list of those which haven't been are shorter than those which have. The claim that any other nation is engaging in anything remotely approaching indiscriminate worldwide surveillance of this sort is baseless. [...] the US government - in complete secrecy - is constructing a ubiquitous spying apparatus aimed not only at its own citizens, but all of the world's citizens, has profound consequences. It erodes, if not eliminates, the ability to use the internet with any remnant of privacy or personal security. It vests the US government with boundless power over those to whom it has no accountability. It permits allies of the US - including aggressively oppressive ones - to benefit from indiscriminate spying on their citizens' communications. It radically alters the balance of power between the US and ordinary citizens of the world. And it sends an unmistakable signal to the world that while the US very minimally values the privacy rights of Americans, it assigns zero value to the privacy of everyone else on the planet. This development - the construction of a worldwide, ubiquitous electronic surveillance apparatus - is self-evidently newsworthy, extreme, and dangerous. [...]"   

MSM: "Former NSA Judge: “The Spying Court Should Not Be Approving Dragnet Surveillance" [07/10/13] Printer Friendly Version "On Tuesday a former federal judge who served on the secret court that oversees National Security Agency spying said that the 11-judge panel is flawed because blanket approval of entire surveillance systems is not a judicial function, The Associated Press reports. On Monday we reported that the 2008 amendment to the Foreign Intelligence Surveillance Act (FISA) radically expanded the government's power to amass vast collections of data on Americans by creating a secret body of law with almost no public scrutiny. Previously, the court approved surveillance warrants and not entire surveillance systems. [...]" 

MSM: "NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones" [07/10/13] Printer Friendly Version "Security-Enhanced Android: NSA Edition. Over a decade ago, it was discovered that the NSA embedded backdoor access into Windows 95, and likely into virtually all other subsequent internet connected, desktop-based operating systems. However, with the passage of time, more and more people went “mobile”, and as a result the NSA had to adapt. And adapt they have: as Bloomberg reports, “The NSA is quietly writing code for Google’s Android OS.” Is it ironic that the same “don’t be evil” Google which went to such great lengths in the aftermath of the Snowden scandal to wash its hands of snooping on its customers and even filed a request with the secretive FISA court asking permission to disclose more information about the government’s data requests, is embedding NSA code into its mobile operating system, which according to IDC runs on three-quarters of all smartphones shipped in the first quarter [...]"  Related: See below: "Uncovering Android Master Key That Makes 99% Of Devices Vulnerable" [07/04/13] 

Legal Case: "Judge Throws Out ‘State Secrets’ Claim, Allowing Lawsuit Against NSA To Continue" [07/09/13] Printer Friendly Version "The Obama administration will not be allowed to terminate a lawsuit by asserting that a civil argument would risk exposing national secrets, a federal judge ruled Monday in what has already been called an important advance for civil liberties advocates. The suit, known as Jewel vs. National Security Agency, was originally filed in 2008 by the Electronic Frontier Foundation (EFF) and a group of AT&T customers who claimed Bush administration officials had conducted an “illegal and unconstitutional program of dragnet communications surveillance” by operating warrantless surveillance on US citizens.  [...]" 

Documentary: " Power Principle: Corporate Empire And The Rise Of The National Security State" [07/08/13] [95:42] "Probably the best documentary ever made about American foreign policy". - Information Clearing House.  An Introduction to the Empire; Iran – Oil and Geopolitics; Guatemala – the “merger of state and corporate power”; The Congo – Neocolonialism; Grenada – “The Mafia Doctrine”; Chile – “libertarianism with a small l"; Globalization: Consequences. 1945: Grand Area Strategy; Fascism: a “rational system of the plutocracy”; Case Studies: the Greek Communists; The Italian Communists; the Spanish Anarchists; Fascism’s Western backers; Trading with the Enemy; Fascism as “preservation of civilization”; the Cold War and “A Century of Fear”.[...]" RelatedPart 2- Propaganda [98:56] The Soviet Menace?; Case Studies: El Salvador, Nicaragua; Propaganda: Self-Deception and blowback; The “International Communist Conspiracy”; Declassified Documents; NSC 68; The Pentagon as Keynsian Mechanism; The Military Industrial Complex; The War against the Third World; Shifting rationales; What is imperialism?; Case Study: Haiti; “War is a racket”. Fear-based conditioning - The War of the Worlds, The Triumph of the Will; World view Warfare; The Russians are coming; Television: The “perfect propaganda medium”; Soviet vs. American propaganda; Hollywood and the Pentagon; Psywarriors and the media; Operation Mockingbird; The Pentagon Pundits; Project Revere; The Bomber Gap; “scare the hell out of them” |Part 3- Apocalypse [70:36]  Mutually Assured Destruction; MAD men - Curtis Lemay and the super hawks; MAD men - Hermann Kahn and the Rand Corporation; Over flights as provocation; Cuba: the “danger of a good example”; terrorism against Cuba; “Unconventional warfare”; the Cuban Missile Crisis and the “man who saved the world”. Why did the Soviet Union collapse?; Gorbachev: a “more violent, less stable world”; the Pentagon’s New Map; Did Ronald Reagan end the Cold War?; The Brink of Apocalypse: Able Archer; The betrayal of Russia; The expansion of NATO; Yugoslavia and Libya; the Yeltsin coup; Living standards in the former Soviet Union; A third way? Postscript: The Power Principle. A gripping, deeply informative account of the plunder, hypocrisy, and mass violence of plutocracy and empire; insightful, historically grounded and highly relevant to the events of today.    

Commentary: " Extortion Used To Gain Access To Undersea Cables For Surveillance, Using FCC Cable License Approval Process" [07/08/13] Printer Friendly Version  "...The agreements, whose main purpose is to secure the U.S. telecommunications networks against foreign spying and other actions that could harm national security, do not authorize surveillance. But they ensure that when U.S. government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely, say people familiar with the deals. Negotiating leverage has come from a seemingly mundane government power: the authority of the Federal Communications Commission to approve cable licenses. In deals involving a foreign company, say people familiar with the process, the FCC has held up approval for many months while the squadron of lawyers dubbed Team Telecom developed security agreements that went beyond what’s required by the laws governing electronic eavesdropping. The security agreement for Global Crossing, whose fiber-optic network connected 27 nations and four continents, required the company to have a “Network Operations Center” on U.S. soil that could be visited by government officials with 30 minutes of warning. Surveillance requests, meanwhile, had to be handled by U.S. citizens screened by the government and sworn to secrecy — in many cases prohibiting information from being shared even with the company’s executives and directors. “Our telecommunications companies have no real independence in standing up to the requests of government or in revealing data,” said Susan Crawford, a Yeshiva University law professor and former Obama White House official. “This is yet another example where that’s the case.” [...]" 

Commentary: "The Withdrawal Of An NSA Story – And An Ethical Quagmire For The Observer" [07/08/13] Printer Friendly Version "There are many inspiring stories of heroic actions by journalists and editors – tenacious tales from the front-line in pursuit of truth. Unfortunately for one British Sunday newspaper – the Observer – inclusion in that noble circle may have to wait until the paper conducts a deep dive into its principles. Over the past few days circumstances surrounding the paper’s hasty removal of a front page story on NSA spying within Europe have raised some uncomfortable questions about the Observer’s editorial processes and its ethical compass (the Observer is the sister publication of the Guardian newspaper). It seems that at the heart of the paper’s decision to expunge this story was a torrent of US Liberal media condemnation over the credibility of a former NSA contractor, Wayne Madsen, who had featured in the article. A subsequent mini Twitter-storm and a few hostile online columns in the hours following publication persuaded the Observer to withdraw the story. [...]" 

MSM: " Phones Near Targeted Individual Remotely Activated As Bugs" Mark Dice [07/08/13] [5:22] 

MSM: "In Secret, Court Vastly Broadens Powers of N.S.A." [07/07/13] Printer Friendly Version "In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks, officials say. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come, the officials said. Last month, a former National Security Agency contractor, Edward J. Snowden, leaked a classified order from the FISA court, which authorized the collection of all phone-tracing data from Verizon business customers. But the court’s still-secret decisions go far beyond any single surveillance order, the officials said.  [...]"  Related: See below: "FISA Judge Who Approved Massive NSA Spying Identified" [07/02/13] 

MSM: "French Intelligence Accused Of Running Similar Data Collection Operation As NSA " [07/06/13] [2:40] BBC News

MSM: "ACLU Sues U.S. Gov't Over Secret No-Fly List " [07/06/13] [3:49] "July 04, 2013 CNN [...]"  

MSM: "Canada Day Pressure Cooker Bomb Plot Straight Out Of FBI Field Guide" [07/06/13] [2:28] Related: See below.

MSM: "Uncovering Android Master Key That Makes 99% Of Devices Vulnerable" [07/04/13] Printer Friendly Version "Bluebox Labs – recently discovered a vulnerability in Android’s security model that allows a hacker to modify APK code without breaking an application’s cryptographic signature, to turn any legitimate application into a malicious Trojan, completely unnoticed by the app store, the phone, or the end user. The implications are huge! This vulnerability, around at least since the release of Android 1.6 (codename: “Donut” ), could affect any Android phone released in the last 4 years – or nearly 900 million devices– and depending on the type of application, a hacker can exploit the vulnerability for anything from data theft to creation of a mobile botnet. While the risk to the individual and the enterprise is great (a malicious app can access individual data, or gain entry into an enterprise), this risk is compounded when you consider applications developed by the device manufacturers (e.g. HTC, Samsung, Motorola, LG) or third-parties that work in cooperation with the device manufacturer (e.g. Cisco with AnyConnect VPN) – that are granted special elevated privileges within Android – specifically System UID access. Installation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed. The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls). Finally, and most unsettling, is the potential for a hacker to take advantage of the always-on, always-connected, and always-moving (therefore hard-to-detect) nature of these “zombie” mobile devices to create a botnet. [...]"  

Canada: "Landlord Doubts Terror Suspects Could Pull Off Bomb Plot" [07/04/13] Printer Friendly Version "The man who owns the Surrey, B.C., home where two people accused of trying to carry out a domestic terrorist plot lived questions how the pair could have pulled off such a plan. Ramesh Thaman said he's not sure how a couple that had limited means could have financed the plot. “I wonder, you know, how these people … how they could do this thing. I’m very much shocked. It’s very strange.” John Stewart Nuttall, 30, and Amanda Korody, believed to be around 30, are accused of trying to detonate homemade bombs at the B.C. legislature on Canada Day.Nuttall and Korody are alleged to have turned ordinary pressure cookers into improvised explosive devices filled with rusted nails, nuts, bolts and washers. RCMP accuse the couple of planning to detonate them outside the legislature building. An RCMP official claims the couple were "inspired by al-Qaeda ideology," but security experts and some who know the accused question what, exactly, that means. [...]"  Related: False Flag: "BC Legislature Threat: Canadian Police Stop Pressure Cooker Bomb Plot "Similar To The Bombs At Boston Marathon" [07/03/13] [4:44]   

Commentary: "U.S. Postal Service Logging All Mail for Law Enforcement" [07/04/13] Printer Friendly Version "The NSA isn't the only federal agency collecting your metadata. It turns out the good ole U.S. Postal Service has long been engaged in its share of low-tech domestic surveillance. As the New York Times reports today, a Buffalo, NY bookstore owner by the name of Leslie James Pickering was recently startled to discover his snail mail was being monitored by the F.B.I. with the help of the U.S.P.S. It happened by mistake, shockingly enough for the Postal Service. In his stack of mail, Pickering noticed a handwritten card directing postal workers to pay particular attention to letters and packages sent to his home, and to show them to their supervisor for copying before delivery. It also said "Confidential" highlighted in green. Oops. Pickering was, to say the least, taken aback. “It was a bit of a shock to see it,” he told The Times. Turns out, ten years ago he was an activist of sorts, a spokesman for the Earth Liberation Front, which was labeled as a radical environmental group by the F.B.I. [...] While high-tech spying on the scale that Edward Snowden recently revealed is new, low-tech spying on the part of the Postal Service has been around for a while. For a long time it was a surveillance system called Mail Covers, The Times reports, but that has been replaced by a much more ambitious program ominously called the Mail Isolation Control and Tracking program, "in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year." This program was created after the anthrax attacks of 2001, which killed 5 people. It was used in the recent ricin letter investigation. Supposedly, postal workers only record the outside of letters and packages before delivering them. They can't open your mail without a warrant. What is causing concern is just how sweeping the reach of this program has become. [...]"

Propaganda Theatre: "FBI, DHS Issue Bulletin to Law Enforcement Ahead of July 4" [07/03/13] Printer Friendly Version "Two days before July 4, the FBI and Department of Homeland Security (DHS) issued a joint intelligence bulletin to local law enforcement around the country outlining the potential of Independence Day festivities being targeted. These bulletins have become somewhat routine ahead of major U.S. holidays, and the bulletin issued late Tuesday begins by saying, "DHS and FBI are not aware of any specific, credible information indicating a threat from international terrorists, homegrown violent extremists (HVEs), or domestic terrorists (DTs) to the 2013 Fourth of July celebrations." [...]"  Related: "No 'Specific, Credible' Threat Known for July 4: FBI" Printer Friendly Version |"Some Americans Abandon July 4 Celebrations Over “Outrageous” Security Measures" Printer Friendly Version "Checkpoints, bag searches, snitch hotline, all personal items banned: Happy Independence Day! Bostonians will face airport security-style measures if they wish to attend the city’s major annual July 4 event, with virtually all personal items being banned along with mandatory checkpoints, snitch hotlines and bag searches, begging the question – what “freedoms” are they supposed to be celebrating? National Guard troops will also on patrol, giving the event a martial law feel, and authorities have also worked with the Department of Homeland Security to set up a dedicated snitch line where citizens can report “suspicious activity”. Fireworks sellers across the country have also been told to keep an eye out for buyers who “raise suspicion” by making suspicious political comments. The security measures, introduced in the wake of April’s Marathon bombings, are so stifling that some who planned to attend the party have given up on July 4 altogether. Bostonian Debra Glidden labeled the measures “outrageous,” telling the Globe, “If we can’t bring backpacks, it’s just not worth the hassle, I’d need a large bag to carry sweatshirts, drinks, snacks, sunscreen, cellphones, etc. I can’t imagine what someone with a child in diapers would do.” Steve Cimbrelo has attended the Esplanade celebrations since he was a child but won’t be in attendance this year. “They’re going overboard with security, I don’t know how you can go there for 12 hours bringing next to nothing,” said Cimbrelo, adding that the rules were “an ironic way to celebrate our independence.” [...]"  

Commentary: "FISA Judge Who Approved Massive NSA Spying Identified" [07/02/13] Printer Friendly Version "The Washington Post has a new article out, Secret-Court Judges Upset At Portrayal Of "Collaboration' With Government.. And the article does report that the judge was annoyed that the idea of collaborating with the government was an inaccurate portrayal. This judge is THE judge, who, all alone, decided that it was okay for the NSA and whoever else had access, to spy on ALL Americans. Her name is Colleen Kollar-Kotelly. Here's the excerpt from the WaPo article that is most significant: "On July 14, 2004, the surveillance court for the first time approved the gathering of information by the NSA, which created the equivalent of a digital vault to hold Internet metadata. Kollar-Kotelly's order authorized the metadata program under a FISA provision known as the "pen register/trap and trace," or PRTT. The ruling was a secret not just to the public and most of Congress, but to all of Kollar-Kotelly's surveillance court colleagues. Under orders from the president, none of the court's other 10 members could be told about the Internet metadata program, which was one prong of a larger and highly classified data-gathering effort known as the President's Surveillance Program, or PSP.  But the importance of her order -- which approved the collection based on a 1986 law typically used for phone records -- was hard to overstate."The order essentially gave NSA the same authority to collect bulk Internet metadata that it had under the PSP," the inspector general's report said, with some minor caveats including reducing the number of people who could access the records. On May 24, 2006, Kollar-Kotelly signed another order, this one authorizing the bulk collection of phone metadata from U.S. phone companies, under a FISA provision known as Section 215, or the "business records provision," of the USA Patriot Act."  [...] A 2006 Washington Post article also mentions Kollar-Kotelly, so the news is not a first time revelation of her tie to the authorization. The older article also refers to her predecessor, Royce C. Lamberth and suggests that they had serious concerns about the legality of the program, instituted when George W. Bush was president; " Both judges expressed concern to senior officials that the president's program, if ever made public and challenged in court, ran a significant risk of being declared unconstitutional, according to sources familiar with their actions. Yet the judges believed they did not have the authority to rule on the president's power to order the eavesdropping, government sources said, and focused instead on protecting the integrity of the FISA process. It was an odd position for the presiding judges of the FISA court, the secret panel created in 1978 in response to a public outcry over warrantless domestic spying by J. Edgar Hoover's FBI. The court's appointees, chosen by then-Chief Justice William H. Rehnquist, were generally veteran jurists with a pro-government bent, and their classified work is considered a powerful tool for catching spies and terrorists." [...] The question is, how did any protector of the citizens-- the duty of every elected and appointed government official, ever allow a single person to make such an important decision-- and who decided to keep it secret? Because they violated their oath and should be punished to the full extent of the law."  Related: "New Documents Shed Light On NSA's Dragnet Surveillance" Printer Friendly Version " [...]" 

Flashback: "Glenn Greenwald: "Secrecy Is The Linchpin Of Abuse Of Government Power" [07/02/13] [25:43] "The violent Boston rampage triggered a local and federal response that, according to journalist Glenn Greenwald, adds a new dimension to troubling questions about government secrecy, overreach, and what we sacrifice in the name of 'national security'. Greenwald joins Bill to peel back layers that reveal what the Boston bombings and drone attacks have in common, and how secrecy leads to abuse of government power. [...]"  

MSM: "U.S. Taps Half-Billion German Phone, Internet Links In Month: Report" [07/01/13] Printer Friendly Version "The document Spiegel cited showed that the United States categorized Germany as a "third-class" partner and that surveillance there was stronger than in any other EU country, similar in extent to China, Iraq or Saudi-Arabia. "We can attack the signals of most foreign third-class partners, and we do it too," Der Spiegel quoted a passage in the NSA document as saying. It said the document showed that the NSA monitored phone calls, text messages, emails and internet chat contributions and has saved the metadata - that is, the connections, not the content - at its headquarters. On an average day, the NSA monitored about 20 million German phone connections and 10 million internet data sets, rising to 60 million phone connections on busy days, the report said. [...]"  

Commentary: "Former East German Stasi Officer Expresses Admiration For, Dismay At US Government's Surveillance Capabilities" [07/01/13] Printer Friendly Version "While Germany's security agencies seem to be impressed with the size of our surveillance coverage, the German people are understandably a bit more perturbed. The divided Germany of the not-too-distant past saw many people on the eastern side of the Wall spend a great deal of time being surveilled by their countrymen, and recent developments echo that past all too well. A former Stasi member, Wolfgang Schmidt, was recently interviewed by the McClatchy news service. Unsurprisingly, there's a hint of envy in his discussion of the US government's surveillance infrastructure. “You know, for us, this would have been a dream come true,” he said, recalling the days when he was a lieutenant colonel in the defunct communist country’s secret police, the Stasi. As was pointed out late last year, the US government has more data on the average American citizen than the East German Stasi, a division created solely to surveil German citizens. This was noted before the recent leaks, meaning what's been gathered by the NSA, FBI, etc. is exponentially greater than previously estimated. The Stasi's surveillance was much more targeted than our current efforts, though this was mainly due to technical limitations, rather than out of any concern for German citizens.  [...] the former Stasi agent, despite his begrudging admiration, finds the US surveillance efforts troubling. Schmidt, 73, who headed one of the more infamous departments in the infamous Stasi, called himself appalled. The dark side to gathering such a broad, seemingly untargeted, amount of information is obvious, he said. “It is the height of naivete to think that once collected this information won’t be used,” he said. “This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.” You can't justify harvesting this much data if you're not going to use it. And if you can't find anything worth using it for, you'll connect the all-important "dots" until it resembles something... anything. Anything that departs even minimally from the norm becomes suspicious. Using encryption? Probably a threat. Parking too far away from a hotel? Potential terrorist. Find the local water a little tough to drink? Let's get that file started. Unwittingly engage an undercover FBI agent in conversation? Chances are you'll soon be converted into a terrorist. The US, after years of acting as the world's policeman, has finally revealed itself to instead be the unmarked van that's constantly parked just down the world's street. [...]"   

Commentary: "Germany ‘Among Countries Offering Intelligence’ According To New Claims By Former US Defence Analyst" [07/01/13] Printer Friendly Version "At least six European Union countries in addition to Britain have been colluding with the US over the mass harvesting of personal communications data, according to a former contractor to America’s National Security Agency, who said the public should not be “kept in the dark”. Wayne Madsen, a former US navy lieutenant who first worked for the NSA in 1985 and over the next 12 years held several sensitive positions within the agency, names Denmark, the Netherlands, France, Germany, Spain and Italy as having secret deals with the US. Madsen said the countries had “formal second and third party status” under signal intelligence (sigint) agreements that compels them to hand over data, including mobile phone and internet information to the NSA if requested. Under international intelligence agreements, confirmed by declassified documents, nations are categorised by the US according to their trust level. The US is first party while the UK, Canada, Australia and New Zealand enjoy second party relationships. Germany and France have third party relationships. In an interview Printer Friendly Version published last night on the PrivacySurgeon.org blog, Madsen, who has been attacked for holding controversial views on espionage issues, said he had decided to speak out after becoming concerned about the “half story” told by EU politicians regarding the extent of the NSA’s activities in Europe. [...]"  

Commentary: "Analysis: Eight Global Repercussions From The PRISM Disclosures" [07/01/13] Printer Friendly Version "America’s combative response to the PRISM disclosures – namely the targeting and personalisation of a lone rogue – is likely to trigger wide-ranging and unexpected consequences for the NSA that will go well beyond the immediate diplomatic ripples. The creation of Dramatis personæ in the form of Edward Snowden has shifted PRISM from the theoretical realm to the world of flesh and blood – triggering implications that the US may find difficult to manage. With few exceptions, previous controversies of this nature have quickly petered out in the public consciousness for lack of a simple point of reference. Now – possibly for the first time at such a level – there is a human face. There are countless imponderables of course. Much of the testy reaction of some governments may be little more than posturing, suggesting that the NSA’s activities could end up merely a negotiating trinket in minor geopolitical re-positioning. After all, the NSA has been conducting deep surveillance at a global level for decades, and few governments would have been unaware of its activities. With some rearranging of the deck chairs there is a risk that the global spying regime could return to business as usual. There is, however, a view that the US has wildly overreacted to the events, creating PR stakes that are unnecessarily high. Wheeling out a president to engage diplomatic brinkmanship has not only turned a security problem into a contest of power, it has also created a polemic at multiple levels. Even discounting warnings from US lawmakers that there are more dramatic revelations to come, some outcomes can be predicted with a reasonable degree of certainty.  [...]" Note: See "Social Control and Theatrical Fabrications" link at the top of this panel for related articles.

MSM: "Psychopath Wesley Clark Says American People ‘Like’ NSA Stasi State Spying On Them" [06/30/13]   [8:44] "On Thursday, CNN’s Erin Burnett continued the establishment’s propaganda onslaught against the “leaker” Edward Snowden. After fatuously mischaracterizing Snowden as a “hacker,” Brown introduced former General Wesley Clark and Peter Brookes of the Heritage Foundation, the lobbying outfit that takes money from the neocon Scaife Foundations run by the CIA operative and Operation Mockingbird asset Richard Mellon Scaife. Clark, a notorious war criminal who used cluster bombs and depleted uranium on civilians during his rein as the Supreme Commander of NATO forces, said the American people love the idea of the government illegally and unconstitutionally spying on them. Clark told Burnett the “American people are solidly behind the prism program and all that’s going on,” never mind numerous polls indicating the American people are steadfastly opposed to the government’s surveillance programs. [...]"  Related: Flashbacks: "U.S. Policy Coup Plan Explained By 4-Star General Wesley Clark" (2007) [8:15] "General Wesley Clark, on the talk circuit in 2007, explained how the U.S. military planned to destroy the governments of seven countries in five years and enumerates them in this YouTube video. Listen to what General Clark says how the ‘movers and shakers’ planned to start wars and change governments that, incidentally, would necessitate killing American service men and women in order to carry out the plans of Wolfowitz, Cheney, and Rumsfeld. [...]" | "The Art of War" and the Pentagon’s Reality Show" [08/23/12] Printer Friendly Version "But what makes the reality show unique is the exceptional master of ceremonies: General Wesley Clark, former Supreme Allied Commander in Europe in 1997-2000. It is he who plans the competitors’ missions, guides them and judges them. He doesn’t lack experience: it was he who planned and directed the war against Yugoslavia. Since he retired, Clark has written books and taught courses on how to “wage and win modern warfare,” based on the 1999 war in Yugoslavia. It was the first war NATO carried out in its 50-year history, Clark says, to “put an end to Milosevic’s ethnic cleansing of Kosovo Albanians.” A war in which “America provided the leadership and chose the targets to hit.” But the Pentagon made it “NATO’s war,” involving allies who performed 60 percent of the air strikes. Thus Wesley Clark describes the agenda for another reality show, one far more important than NBC’s, one which the Pentagon puts on the waves in Mondovisione to make falsehoods appear real, disguising the causes and aims of the war. [...]" 

MSM: "CIA Agent Had “No Limitations” Working With NYPD After 9/11" [06/29/13] Printer Friendly Version "Executive Order 12333 and the National Security Act of 1947 prohibit the CIA from engaging in domestic spying. But according to a recently declassified report from the CIA’s inspector general, four CIA operatives were embedded with the NYPD in the years after 9/11, and one of them “believed he had ‘no limitations’ as far as what he could or could not do.” According to the report, that agent, who was on unpaid leave from the CIA, worked for the NYPD at the request of Commissioner Ray Kelly and led “NYPD investigations, operations, and surveillance activities directed at US persons and non-US persons.” Another agent interviewed for the report stated he received “unfiltered” NYPD reports containing information lacking any foreign intelligence. [...]"  

MSM: "Ecuador Revokes Edward Snowden Asylum Documents As Assange Frustration Grows" [06/29/13] Printer Friendly Version "The plan to spirit the surveillance whistleblower Edward Snowden to sanctuary in Latin America appears to be unravelling amid tension between Ecuador’s government and Julian Assange, the founder of WikiLeaks. President Rafael Correa halted an effort to help Snowden leave Russia amid concern Assange was usurping the role of the Ecuadoran government, according to leaked diplomatic correspondence published on Friday. Amid signs Quito was cooling with Snowden and irritated with Assange, Correa declared invalid a temporary travel document which could have helped extract Snowden from his reported location in Moscow. Correa declared that the safe conduct pass issued by Ecuador’s London consul – in collaboration with Assange – was unauthorised, after other Ecuadorean diplomats privately said the WikiLeaks founder could be perceived as “running the show”. According to the correspondence, which was obtained by the Spanish-language broadcaster Univision and shared with the Wall Street Journal, divisions over Assange have roiled Ecuador’s government. [...]"  Related: See below: "Ecuador Tells US To Take Its Trade Agreement And Shove It, After Threats Relayed Over Snowden" [06/28/13] ;"Julian Assange's Wikileaks Protégé Was An FBI Double Agent" [06/28/13] ; "Journalist In US Surveillance Case: More To Come" [06/12/13] and other related stories, below.

MSM: "Ecuador Tells US To Take Its Trade Agreement And Shove It, After Threats Relayed Over Snowden" [06/28/13] Printer Friendly Version "One of the points that many people have made concerning most countries in the world is that they're loathe to challenge the US on many things, even when they're in the right, because they're so reliant on the US for trade. The US regularly lords this fact over countries in seeking to get its way. In fact, US officials had been very strongly suggesting to Ecuador that if it decides to take in Ed Snowden and grant him asylum, that there could be consequences for trade under the Andean Trade Preference Act that both countries are signed to, but which needs to be renewed next month. Specifically, US politicians suggested that they might not allow the renewal if Ecuador granted asylum. In response, Ecuador has taken a stand: saying that it's breaking the trade agreement upfront as it doesn't appreciate the attempt by the US to blackmail it in this matter.  [...]"  

MSM: "DARPA Manager Explains Multiple Ways Cars Can Be Hacked" [06/28/13] [9:25] "With speculation increasing of foul play involving the tragic car explosion that killed investigative reporter Michael Hastings, several reports have emerged how it is indeed possible to hijack the controls of modern vehicles through hacking. Dr. Kathleen Fisher speaks in 2012 on DARPA's High-Assurance Cyber Military Systems (HACMS) program, particularly multiple ways all modern cars are vulnerable to hacking. [...]"  

MSM: "Julian Assange's Wikileaks Protégé Was An FBI Double Agent" [06/28/13] Printer Friendly Version "A former WikiLeaks volunteer from Iceland known for his close ties with the group's founder, Julian Assange, has been unmasked as an FBI informant, it was revealed today. The online magazine Wired, which broke the story Thursday, reported that Sigurdur 'Siggi' Thordarson, 20, passed on eight hard drives containing information about the secretive organization to his handlers within the federal law enforcement agency in exchange for $5,000. As a double-agent for the feds, the Icelander shared thousands of pages of WikiLeaks chat logs, video recordings and other data with the U.S. government. According to Wired, Thordarson first approached the U.S. government in 2011 and was debriefed by FBI officials on four separate occasions in several different locations around the world, among them Washington, D.C. When asked why he decided to betray WikiLeaks and Assange, the 20-year-old ex-informant said, 'I guess I cooperated because I didn’t want to participate in having [hacking gangs] Anonymous and Lulzsec hack for WikiLeaks, since then you’re definitely breaking quite a lot of laws.' Thordarson was eventually ousted from WikiLeaks in November 2011 after being caught siphoning funds from an online T-shirt store in the name of the hacking group into his own bank account. [...]" 

Interviews: "Friend of Michael Hastings Breaks Down Odd Circumstances Before Hastings Death" Alex Jones [06/28/13] [34:52] "Sgt. Joe Biggs, Friend of Michael Hastings, Breaks Down The Odd Circumstances Just Before Michael Hastings Death.  [...]" 

MSM: "Whistleblowers Protection Act Does NOT Apply To U.S. Intelligence Workers Or Contractors " [06/28/13] [11:09] "June 26, 2013 CBC News [...]"

MSM: "Michael Hastings Death / Murder and Hatzolah" [06/27/13] [9:43] "What was a volunteer Jewish EMS team Hatzolah doing on the scene of the Michael Hastings crash so quickly? How is it possible that in such a short period of time (likely less than 3 minutes, maybe less) they were fully dressed, in their vehicles, and on the scene? Why is it that so quickly the FBI has decided there was no fowl play involved so soon- Are we really to believe that on-call LAPD is really that slow to show up to a traffic accident?- and that a volunteer force could assemble so quickly? [...]"  Related: See below: "Hastings “Boston Brakes” Killing a Warning?" Gordon Duff [06/21/13]; "Journalist Who Took Down Army Four-Star Dies In Car Wreck" [06/20/13] and related stories. 

Corbett Report: "Compromised: How the National Security State Blackmails the Government" [06/27/13] [4:18] "That the NSA is covertly spying on all three branches of the American government is nothing short of scandalous. Tice's revelations are especially appalling to anyone even remotely familiar with how exactly the type of information collected in such intercepts can be used for the purposes of political blackmail, and how profoundly that blackmail can shape the political landscape of the country. In fact, there is a long history of intelligence agencies and covert groups using precisely this type of information to blackmail politicians in the past. [...]" Related: See below.

Corbett Report: "Sibel Edmonds Blows the Whistle on Government Blackmailing" [06/25/13] [62:54] "In this remarkable conversation, Sibel Edmonds reflects on Russ Tice's recent revelations to Boiling Frogs Post and The Corbett Report that the NSA has wiretapped top government officials for years. Edmonds discusses from her own experience how the FBI collects dirt on Congressman and public officials for use as political leverage. We also talk about how this scandal proves that there is no "official channel" for whistleblowers to follow when they want to expose wrondoing because the system is being controlled from behind the scenes by the criminals in the national security establishment. [...]"  

MSM: "Russian Intelligence Officials Expected To Interrogate Edward Snowden" [06/25/13] Printer Friendly Version "Former US intelligence contractor Edward Snowden’s stop in Moscow is an unexpected windfall for the Russian secret services even if it risks worsening the already strained relations between the Kremlin and Washington. Snowden’s sensational revelations on the electronic surveillance carried out around the world by the United States present great interest for Russian intelligence officials, who will have seized the opportunity to question him, experts said Monday in Moscow. The location of the US 'fugitive' is now a mystery. He was not on board Monday’s flight to Cuba on which he was booked, and his current whereabouts have not been confirmed amid speculation he could still be in Russia or have flown to another destination. “Russian intelligence and counter-intelligence will have a lot to ask such a well-informed person. I have no doubt that this will be done,” a Russian special services veteran told the Interfax news agency on Sunday on condition of anonymity. “I am sure that Snowden will have had a busy evening and a sleepless night,” the source added of the American’s reported stayover Sunday night in the transit zone of Moscow’s Sheremetyevo airport after landing from Hong Kong. “Snowden presents a lot of interest for the FSB (security service). He can give information on technical aspects of intercepting data,” said Russian security expert and commentator for the Novaya Gazeta newspaper Pavel Felgenhauer. [...]"  

Commentary: "Beyond Prism: General Keith Alexander And The Bonesaw Matrix" [06/24/13] Printer Friendly Version "Meet General Keith Alexander, "a man few even in Washington would likely recognize", which is troubling because Alexander is now quite possibly the most powerful person in the world, that nobody talks about. Which is just the way he likes it. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army. Schematically, Alexander's empire consists of the following: virtually every piece in America's information intelligence arsenal. [...] Defense contractors have been eager to prove that they understand Alexander’s worldview ... One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently anti-transparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. True to form, the company declined Wired’s interview requests. Perhaps for good reason: According to news reports, Endgame is developing ways to break into Internet-connected devices through chinks in their antivirus armor. Like safecrackers listening to the click of tumblers through a stethoscope, the “vulnerability researchers” use an extensive array of digital tools to search for hidden weaknesses in commonly used programs and systems, such as Windows and Internet Explorer. And since no one else has ever discovered these unseen cracks, the manufacturers have never developed patches for them. Thus, in the parlance of the trade, these vulnerabilities are known as “zero-day exploits,” because it has been zero days since they have been uncovered and fixed. They are the Achilles’ heel of the security business, says a former senior intelligence official involved with cyberwarfare. Those seeking to break into networks and computers are willing to pay millions of dollars to obtain them. ”Such as the US government. But if you thought PRISM was bad you ain't seen nuthin' yet. Because tying it all together is Endgame's appropriately named "Bonesaw" - what it is is practically The Matrix transplanted into the real cyber world." Endgame also offers its intelligence clients—agencies like Cyber Command, the NSA, the CIA, and British intelligence—a unique map showing them exactly where their targets are located. Bonesaw displays a map with the geolocation and digital address of basically every device connected to the Internet around the world, providing what’s called network situational awareness. The map will then display what software is running on the computers at any location, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies— the equivalent of a back door left open. Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgame’s clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed. [...]" "Nathaniel Fick, Former CNAS Chief, Heads Cyber Targeting Firm" Printer Friendly Version    

MSM: "Glenn Greenwald on Edward Snowden Asylum & NSA Revelations" [06/24/13] [4:59] "On Sunday’s CIA-Mockingbird “news” show “Meet the Press” host and proud member of the Council on Foreign Relations David Gregory asked REAL journalist Glenn Greenwald why he shouldn’t be charged with a crime for “enabling” NSA whistle blower Edward Snowden. [...]"  Note: Greenwald reveals that there is an 80-page legal opinion by the FISA court that he has read, that is being concealed by the US government, that stated the what the NSA is doing is illegal and unconstitutional. Related: "Edward Snowden Asks Ecuador For Asylum" Printer Friendly Version "Edward Snowden, the former US intelligence contractor who leaked classified documents revealing US internet and phone surveillance, has asked Ecuador for asylum. The request was confirmed by Ecuador's foreign minister on Twitter. Mr Snowden had fled the US for Hong Kong but flew out on Sunday morning and is currently in Moscow. A US extradition request to Hong Kong failed but it insists Mr Snowden should now be denied international travel. [...]" | "Snowden Case Shows US is Bully of the World"   [4:02] "The plane carrying whistleblower Edward Snowden has landed at Moscow’s Sheremetyevo airport. The former CIA contractor, who left Hong Kong in a bid to elude US extradition on espionage charges, is on his way to a ‘third country’ via Russia. Former MI5 agent Annie Machon says America’s whistleblower hunt gives it the image of a major global aggressor. [...]" 

Commentary: "Veil of Lies, Snowden and Wikileaks: The Selling of Snowden" Gordon Duff [06/24/13] Printer Friendly Version "We are told, “and how” we are told, aided by every discredited media hack on the planet, that poor Snowden is flying to Russia where he will either be given “safe passage” or “considered” for asylum. The New World Order is holding a “morality play,” and we all have tickets. Snowden’s baggage includes, we are told, a “Wikileaks legal team” and four computers, carrying details of intelligence intercepts against Russia and China. Please note, Russia and China are among the top four nations when it comes to international “cyber bullying,” with multi-billion dollar budgets. The real violator, behind NSA monitoring, in control of social media, of Wikipedia, of YouTube and Google, monitoring all world mobile communications and, more importantly, in control, not just of a majority of the world’s media and entertainment but the governments of Britain, Canada, Australia, France, Germany, Italy, Greece, Turkey, the United States and dozens of others as well, is Israel. But “Israel” doesn’t exist, not to Wikileaks, not to Snowden. Instead we get “revelations” long in the public domain and of absolutely no consequence whatsoever. In the intelligence community, we look on such efforts as “creating a legend.” “Legends” are “backstories” that provide a needed “platform and capability” for the operational effectiveness of an intelligence asset. By that standard, Assange and Snowden are intelligence assets. They are now acting fully in concert, Snowden joined at the hip, supported and financed by Assange. If Assange is a spy, as asserted by Zbigniew Brzezinski, is Snowden the same? [...]"  

Corbett Report: "Solutions: Sousveillance" [06/24/13] [49:21] "By now we are all familiar with the concept of 'surveillance.' In the Orwellian tyranny of the new normal, we are all gradually being made aware that we are living in a panoptic society where everything we do and say is being watched and recorded. So what is the answer to this constant surveillance? Why not use the surveillance technology to keep tabs on what the government is doing? Welcome to the world of sousveillance. Join us today on The Corbett Report as we explore this concept and the grassroots revolution in citizen media that it has made possible. [...]" 

Interviews: "Sibel Edmonds Blows The Whistle On Government Blackmailing" [06/24/13] Podcast Audio "In this remarkable conversation, Sibel Edmonds reflects on Russ Tice’s recent revelations to Boiling Frogs Post and The Corbett Report that the NSA has wiretapped top government officials for years. Edmonds discusses from her own experience how the FBI collects dirt on Congressman and public officials for use as political leverage. We also talk about how this scandal proves that there is no “official channel” for whistleblowers to follow when they want to expose wrondoing because the system is being controlled from behind the scenes by the criminals in the national security establishment. [...]" 

Commentary: "On The Espionage Act Charges Against Edward Snowden" Glenn Greenwald [06/23/13] Printer Friendly Version "The US government has charged Edward Snowden with three felonies, including two under the Espionage Act, the 1917 statute enacted to criminalize dissent against World War I. My priority at the moment is working on our next set of stories, so I just want to briefly note a few points about this [...] The irony is obvious: the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens, are now accusing the person who exposed it of "espionage". It seems clear that the people who are actually bringing "injury to the United States" are those who are waging war on basic tenets of transparency and secretly constructing a mass and often illegal and unconstitutional surveillance apparatus aimed at American citizens - and those who are lying to the American people and its Congress about what they're doing - rather than those who are devoted to informing the American people that this is being done. The Obama administration leaks classified information continuously. They do it to glorify the President, or manipulate public opinion, or even to help produce a pre-election propaganda film about the Osama bin Laden raid. The Obama administration does not hate unauthorized leaks of classified information. They are more responsible for such leaks than anyone. What they hate are leaks that embarrass them or expose their wrongdoing. Those are the only kinds of leaks that are prosecuted. It's a completely one-sided and manipulative abuse of secrecy laws. It's all designed to ensure that the only information we as citizens can learn is what they want us to learn because it makes them look good. The only leaks they're interested in severely punishing are those that undermine them politically. The "enemy" they're seeking to keep ignorant with selective and excessive leak prosecutions are not The Terrorists or The Chinese Communists. It's the American people.[...]"   Related: See below.

MSM: "Snowden Charged With Espionage For NSA Leaks" [06/22/13] Printer Friendly Version   [0:00] "The Justice Department has charged Edward Snowden with espionage and theft for allegedly leaking details of National Security Agency surveillance operations, a government official confirmed to USA TODAY on Friday night. The Washington Post, which broke the news, reported that the Justice Department had asked authorities in Hong Kong to detain Snowden on a provisional arrest warrant. The 29-year-old former analyst for contractor Booz Allen Hamilton was also charged with conversion of government property, the Post said.. The news came hours after the Guardian newspaper reported that Britain's spy agency had secretly tapped into the fiber-optic cables that carry the world's phone calls and Internet traffic and is sharing information with the NSA. Snowden, who worked as an NSA systems analyst in Hawaii, fled to the Chinese territory last month with top-secret documents and court orders on government surveillance of telephone and Internet communications. [...]" 

Commentary: "Guardian: Documents Expose Massive UK Spying Op" [06/22/13] Printer Friendly Version "British spies are running an online eavesdropping operation so vast that internal documents say it even outstrips the United States' international Internet surveillance effort, the Guardian newspaper reported Friday. The paper cited British intelligence memos leaked by former National Security Agency contractor Edward Snowden to claim that U.K. spies were tapping into the world's network of fiber optic cables to deliver the "biggest internet access" of any member of the Five Eyes — the name given to the espionage alliance composed of the United States, Britain, Canada, Australia, and New Zealand. That access could in theory expose a huge chunk of the world's everyday communications — including the content of people's emails, calls, and more — to scrutiny from British spies and their American allies. How much data the Brits are copying off the fiber optic network isn't clear, but it's likely to be enormous. The Guardian said the information flowing across more than 200 cables was being monitored by more than 500 analysts from the NSA and its U.K. counterpart, GCHQ. [...]"  Related: "Mastering The Internet: How GCHQ Set Out To Spy On The World Wide Web" Printer Friendly Version "Project Tempora – the evolution of a secret programme to capture vast amounts of web and phone data [...]" 

MSM: "Judge Napolitano vs. Fake Libertarian John Stossel Over The NSA Scandal " [06/22/13] [5:33]

Commentary: "Russ Tice Claims NSA Ordered Wiretap Of Barack Obama In 2004" [06/21/13] Printer Friendly Version Video clip  [4:47]  "NSA whistleblower Russel Tice told Peter B. Collins on Boiling Frog Post News (the website of high-level FBI whistleblower Sibel Edmonds): Tice: Okay. They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial. But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House–their own people. They went after antiwar groups. They went after U.S. international–U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that–like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civil rights groups. So, you know, don’t tell me that there’s no abuse, because I’ve had this stuff in my hand and looked at it. [...] This was is summer of 2004. One of the papers that I held in my hand was to wiretap a bunch of numbers associated with, with a 40-something- year-old wannabe senator from Illinois. You wouldn’t happen to know where that guy lives right now, would you? It’s a big white house in Washington, DC. That’s who they went after. And that’s the president of the United States now." [...] Other whistleblowers say the same thing. When the former head of the NSA’s digital spying program – William Binney – disclosed the fact that the U.S. was spying on everyone in the U.S. and storing the data forever, and that the U.S. was quickly becoming a totalitarian state, the Feds tried to scare him into shutting up: [...] Retired high-level CIA analyst Ray McGovern – the top CIA briefer to numerous presidents – said this a few weeks ago on a radio program: Which leads to the question, why would [Obama] do all these things? Why would he be afraid for example, to take the drones away from the CIA? Well, I’ve come to the conclusion that he’s afraid." [...]"

MSM: "Revealed: The Top Secret Rules That Allow NSA To Use US Data Without A Warrant" [06/21/13] Printer Friendly Version "FISA court submissions show broad scope of procedures governing NSA's surveillance of Americans' communication [...] Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant. The Guardian is publishing in full two documents submitted to the secret Foreign Intelligence Surveillance Court (known as the Fisa court), signed by Attorney General Eric Holder and stamped 29 July 2009. They detail the procedures the NSA is required to follow to target "non-US persons" under its foreign intelligence powers and what the agency does to minimize data collected on US citizens and residents in the course of that surveillance."  

MSM: "The Secret Law Behind NSA's Verizon Snooping" [06/21/13] Printer Friendly Version "...A law only exists as it is interpreted by the courts. In fact, as Oliver Wendell Holmes famously put it, you could define law as nothing other than a prediction of what the courts will do. So when courts interpret the law, they are in practical effect making the law by saying what the law is. That is why legal interpretation needs to be public -- because it has the same effect as lawmaking. When it is secret, we have in effect secret law. And secret laws don't belong in democratic systems. Countries that have them don't even have the rule of law. They have rule by law, which is a very different thing, when the law isn't supervised by the people but is rather used to manage and control them. The trend of secret legal interpretations goes back to the George W. Bush administration's secret torture and wiretapping memos, which advanced outrageous constitutional and statutory claims. It extends through the secret memo from Barack Obama's legal team authorizing drone strikes to kill U.S. citizens based on executive branch "due process." The Verizon example involves a court, but it belongs to this tradition. We should recognize that while facts may be kept secret and the application of law to facts might also be a secret task some of the time, the meaning of the law itself must always be public. Only then can We the People make sure we think it is being interpreted correctly. The alternative to public law is the end of democratic supervision. And when that happens, well, the result is that the government keeps tabs on all calls in the U.S. All of them.  [...]" 

MSM: "India: Central Monitoring System" [06/21/13] Printer Friendly Version "India has launched a wide-ranging surveillance program that will give its security agencies and even income tax officials the ability to tap directly into e-mails and phone calls without oversight by courts or parliament, several sources said. The expanded surveillance in the world’s most populous democracy, which the government says will help safeguard national security, has alarmed privacy advocates at a time when allegations of massive US digital snooping beyond American shores has set off a global furor. “If India doesn’t want to look like an authoritarian regime, it needs to be transparent about who will be authorized to collect data, what data will be collected, how it will be used, and how the right to privacy will be protected,” said Cynthia Wong, an Internet researcher at New York-based Human Rights Watch. The Central Monitoring System (CMS) was announced in 2011 but there has been no public debate and the government has said little about how it will work or how it will ensure that the system is not abused. The government started to quietly roll the system out state by state in April this year, according to government officials. Eventually it will be able to target any of India’s 900 million landline and mobile phone subscribers and 120 million Internet users. [...]"  

Commentary: "Full Remote Control Of All Modern U.S. Market Cars Proven" [06/21/13] Printer Friendly Version "A team of hackers from the Department of Computer Science at the University of Washington conducted a study which has proven that all cars equipped with antilock brakes sold in the U.S. can be hacked via remote control and have their brakes entirely disabled with the car in motion, throttle revved, and remain fully operational with the key removed and the car in park with all driver input entirely ignored. Though I myself think Hastings was murdered beforehand, parked and burned because the initial fire pictures showed a car with no front impact damage and a blown up rear end, only to be interspersed with scenes of extreme automotive carnage later, I am going to introduce here an entirely new possibility that could have happened. That Hastings' 2013 Mercedes could have instead been hijacked via remote control, run to full throttle with all driver input disabled, and ' rammed into a tree'. [...]"  Note: Except that it didn't crash 'into' a tree .. it ended up next to one, with the motor down the road, from an high explosive detonation in the car. See "The Political Assassination of Michael Hastings" Alex Jones and David Knight  [06/21/13] video below for actual pictures. Related: "Experimental Security Analysis of a Modern Automobile" PDF "Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in efficiency and safety, it has also introduced a range of new potential risks. In this paper we experimentally evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system structure. We demonstrate that an attacker who is able to infiltrate virtually any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems. Over a range of experiments, both in the lab and in road tests, we demonstrate the ability to adversarially control a wide range of automotive functions and completely ignore driver input— including disabling the brakes, selectively braking individual wheels on demand, stopping the engine, and so on. We find that it is possible to bypass rudimentary network security protections within the car, such as maliciously bridging between our car’s two internal subnets. We also present composite attacks that leverage individual weaknesses, including an attack that embeds malicious code in a car’s telematics unit and that will completely erase any evidence of its presence after a crash. Looking forward, we discuss the complex challenges in addressing these vulnerabilities while considering the existing automotive ecosystem. [...]"

Flashback: "Hastings “Boston Brakes” Killing a Warning?" Gordon Duff [06/21/13] Printer Friendly Version Link Fixed "I had never heard of “Boston Brakes” until two days ago. I had been on the Kevin Barrett radio show yesterday, discussing, among other things, the endless ways to gain control of an aircraft and plow it into a building, something I had been briefed on by my Air Force buddies. There are a dozen ways to gain control of a plane, in fact, the more “fly by wire” a plane is, the more ways to control it remotely. Now I am told the same thing works for cars, not exactly the same but close enough. Nothing particularly clever is required, especially when the plane is capable of landing itself or, with a bit of hacking, making an inconvenient stop in the side of a building. I am told this game started with the CIA back in Boston, not with planes but cars. Car wrecks were mechanically staged using the “Boston Brakes” method, not always fatal but always a good way of communicating to someone your displeasure. Sending a college age daughter into a light pole, reporting her speedometer was stuck at 200 mph and fudging her blood test to show she was “double drunk” has been done countless times. It isn’t just that crash that makes it “Boston Brakes” but the speedometer stuck at some outrageous speed and the blood alcohol level, always from a sample that is mysteriously misplaced later. Oh, and I almost forgot, no skid marks, something accident investigators only see at suicides or murder. Remember, always no skid marks.  [...] How many people will be murdered, how many kids threatened, how many poisonings, how much in bribes before America agrees to attack Iran? How many billions are being paid to keep America in Afghanistan, supporting Karzai and immune to knowlege of the $65 billion dollar a year drug trade? If you don’t think members of congress are at the heart of the conspiracy, you aren’t very good at using the Freedom of Information Act to track travel schedules or see who belongs to what organization along with drug lords and thugs. Ask Sibel Edmonds. If, like everyone else, you have come to expect terrorist acts, of late almost comedy routines, the “crotch bomber” and the Times Square Fizzler as potential Vegas headliners, expect that “dirty bomb” we have been warned about. If our “bestest buddies in the whole world” can sell submarines to North Korea or give them atom bombs, don’t be surprised if, in order to push that Iran war we are hearing so much about, you don’t wake up some morning to an American city glowing in the dark. Within seconds, Fox News will have the whole story, Iranian suspects, airport footage, everything. It is all a game, everything is a game. Everything is a business and our businessmen today are all gangsters, same as our government. [...]"  Note: Very good. Related: See below: "Journalist Who Took Down Army Four-Star Dies In Car Wreck" [06/20/13] and related stories. 

MSM: "FBI Chief Demands Broader Surveillance Powers" [06/21/13] Printer Friendly Version "Speaking to the Senate Judiciary Committee today, FBI Chief Robert Mueller lamented that the current level of Internet surveillance, now known to be enormously broad and capturing huge amounts of ordinary Americans’ day-to-day emails, is insufficient for his goals. Direct server access to the PRISM Nine, along with all the other indirect surveillance available to the administration, and a FISA court warrant system that signs off on literally every single request, no matter how asinine, covers an awful lot of ground. But conceivably two people could still communicate in other ways online without it being hoovered up as a matter of course. That’s a terrifying notion to Mueller, who insisted that “criminals and terrorists” (and everyone else) have access to communications tools that he can’t always immediately spy on, and getting warrants keeps him from getting “timely” access. So he wants more unilateral authority. The Electronic Frontier Foundation (EFF) was quick to reject the notion, noting that the government already has ridiculous levels of surveillance ongoing at any given time, and describing as “breathtaking” the notion that they would ask for even more. Since Mueller did use the word “terrorist” in his remarks, however, it will likely mean broad support in the Senate for whatever he wants. [...]"  Related: See below.

Commentary: "The Political Assassination of Michael Hastings" Alex Jones and David Knight [06/21/13] [49:38] "The revelation that Rolling Stone journalist Michael Hastings was working on a story about the CIA before his death and had contacted a Wikileaks lawyer about being under investigation by the FBI hours before his car exploded into flames has bolstered increasingly valid claims that the 33-year-old was assassinated. Hastings died early Tuesday morning in Hollywood when his car allegedly hit a tree at high speed. The Los Angeles Coroner's office has not yet been able to officially identify the body as Hastings because it is so badly burned. [...]" Note: Alex does a good overview of the dynamic. Ignore the brief commercial breaks. Worth listening to. Related: "Over 20 SEALs Who “Killed Osama Bin Laden” Now Dead" Printer Friendly Version See below for more FBI antics:

Commentary: "The Todashev Killing and the House of Cards" [06/21/13] Printer Friendly Version "Sometime in the evening of May 21 a contingent of law enforcement officials arrived at the apartment of 27-year-old Ibragim Todashev (pronounced Ibrahim To-DAH-shev). The FBI says that the group consisted of an FBI agent, two Massachusetts state troopers, and “other law enforcement personnel.” So there were at least four of them, and we may presume that they were all armed. Their interest in Todashev was occasioned by the fact that he was an acquaintance of Tamerlan Tsarnaev, the elder of the two Chechen-immigrant brothers accused in the Boston marathon bombing. Todashev, like Tamerlan Tsarnaev, had been a mixed martial arts fighter and had lived for a time in the Boston area. Their common professional interests and heritage had apparently brought them together, at least casually. All we know for certain as to what transpired in the apartment that night is that Todashev was shot dead sometime after midnight and after a protracted period of interrogation. Unfortunately, the only witnesses we have are the perpetrator or perpetrators of the Todashev killing. It is an understatement to say that their reports have been inconsistent and unreliable. [...]"   Related: "Maddow Explains How The FBI Can Assassinate Anyone They Want"  [12:42]  

Interviews: "Cenk Interviews Michael Hastings of Rolling Stone " [06/21/13] [11:29] " In this May 5, 2012 conversation with Cenk Uygur of The Young Turks, Hastings talks about his early experiences as a journalist, and explains how some media outlets soften news coverage and inadvertently serve the purpose of supporting the establishment. [...]" 

MSM: "Ron Paul on NSA: They Have To Justify Their Existence, Otherwise They're Out Of Work" [06/20/13] [4:47] "Ron Paul on Neil Cavuto 6/18/13 [...]" 

Commentary: "Judge Orders NSA To Hand Over Dragnet Surveillance Records For Criminal Case" [06/19/13] Printer Friendly Version "In wake of the NSA surveillance scandal, a Florida judge has demanded that the federal agency hand over the phone records of a man charged with attempted robbery, to help solve a case that culminated in a murder. The motion provides a glimpse into how the National Security Agency’s surveillance records could be obtained in the future, now that whistleblowers have revealed details of the controversial spy program. Terrance Brown, a 40-year-old South Florida man standing trial in Fort Lauderdale, is accused of masterminding a robbery that resulted in the death of an armored car messenger in October 2010. Attorneys in the case claim that they are missing Brown’s telephone records and that his service provider, MetroPCS, no longer has them. The defendant has pleaded not guilty, but prosecutors have relied on the cell phone records of the robbery’s co-conspirators to try to prove Brown’s involvement. Defense attorneys believe that the missing phone records would prove that Brown was not involved in the July 2010 robbery attempt. The revelation of the NSA’s surveillance program has generated hope that Brown’s missing phone records could be obtained, and possibly prove his alleged innocence. [...]" 

MSM: "DHS Hopes To Get Same Cyber-Spying Powers As NSA" [06/19/13] Printer Friendly Version "Domestic spying capabilities used by the National Security Agency to collect massive amounts of data on American citizens could soon be available to the Department of Homeland Security — a bureaucracy with the power to arrest citizens that is not subject to limitations imposed on the NSA. Unlike the DHS, the NSA is an intelligence agency, not a domestic law enforcement agency. It cannot arrest those suspected of wrongdoing. That power of the federal government lies with agencies under the jurisdiction of the Justice Department, the Treasury, Homeland Security and other law enforcement agencies. The NSA and DHS have waged a long Capitol Hill turf war over cybersecurity. Bills such as the Cyber Intelligence Sharing and Protection Act and the Cybersecurity Act of 2012 have sought to clearly define the relationship between the two agencies, but struggled to get off the ground. Until recently, the NSA’s military access to domestic private sector records — including personally identifiable consumer information — fueled opposition to CISPA’s passage from civil liberties advocates, the White House and Senate Democrats. Meanwhile, Republican critics of the DHS believed the department was too incompetent and inexperienced to conduct meaningful cybersecurity oversight for the nation’s critical infrastructure. Both CISPA and the Cybersecurity Act died in session last year. [...]"  

Commentary: "Israeli Involvement In NSA Spying" [06/19/13] Printer Friendly Version "It doesn't surprise. On June 8, Haaretz headlined "What was the Israeli involvement in collecting US communications intel for NSA?" More on that below. On April 3, 2012, James Bamford headlined "Shady Companies with Ties to Israel Wiretap for US for the NSA. He said NSA chief General Keith Alexander's "having a busy year." [...]" Related: See below: "Narus Insight: Israeli Big Brother Machines Sold To Egypt, Libya And The U.S." [06/16/13]

MSM: "Rand Paul Interview "Senator Are You Saying The General And Other Officials Are Liars? - "Yes" [06/19/13] [9:26] "June 17, 2013 CNN [...]" 

Commentary: "Clapper Admits Lying To Congress In The ‘Least Untruthful Manner Possible’ About NSA Spying" [06/19/13] Printer Friendly Version "The tortured logic and pained explanations (and justifications) being given by top government officials and lawmakers in the wake of the disclosure that the National Security Agency snoops on every American is as astounding as it is pathetic. But then again, they are being made by people who are a) offended that you and I would dare question their conduct and intent; and b) don’t think we have the right to do so in any case. This Big Government arrogance was epitomized by the Director of National Intelligence (DNI), James Clapper, who recently sought to “clarify” his previous false testimony to a congressional panel that the NSA does not collect metadata and other personal information on Americans. In an interview with NBC News‘ Andrea Mitchell, he said that during his testimony he gave the “least untruthful” answer possible in regards to the NSA’s surveillance program. On March 12, during a Senate Intelligence Committee hearing, Clapper was asked by Sen. Ron Wyden, D-Ore., if the NSA gathers “any type of data at all on millions of Americans.” [...]"  

MSM: "FBI Releases Video Of Bombing In Times Square- All Made With "Military Grade Ammunition" [06/19/13] [1:48] "2008 Times Square 'Bombing" [...]" 

Commentary: "Privacy Experts Use Naked Body Scanner Ruling In Effort To Stop NSA Spying" [06/19/13] Printer Friendly Version "A group of privacy experts under the banner of the Electronic Privacy Information Center is citing a 2011 federal court ruling on TSA body scanners in an effort to petition the NSA over warrantless spying. The group, including former intelligence analyst James Bamford, and cryptographers Whitfield Diffie and Bruce Schneier, has petitioned the NSA, asserting that, as well as violating the Fourth Amendment, the domestic surveillance program is “unlawful” because the agency did not ever seek public comment on a program that directly affects the public. “In simple terms, a line has been crossed,” Marc Rotenberg, executive director of the Electronic Privacy Information Center, told CNET. “The agency’s function has been transformed, and we think the public should have an opportunity to say something about that.” EPIC is citing a July 2011 court ruling (PDF) by the U.S. Court of Appeals for the D.C. Circuit, which stated that the TSA flouted the law by neglecting to seek public comment on the mass roll out of body scanners in airports. For months, the TSA ignored the ruling before it was forced by repeated efforts by EPIC to adhere to the court ruling. EPIC hopes that a similar tactic can be used to force more transparency where the NSA is concerned. [...]"  

Commentary: "3 NSA Veterans Speak Out On Snowden: We Told You So" [06/19/13] Printer Friendly Version  "In a roundtable discussion, a trio of former National Security Agency whistle-blowers tell USA TODAY that Edward Snowden succeeded where they failed. When a National Security Agency contractor revealed top-secret details this month on the government’s collection of Americans’ phone and Internet records, one select group of intelligence veterans breathed a sigh of relief. [...]" 

Commentary: "Google’s Deep CIA And NSA Connections " [06/18/13] Printer Friendly Version "Google is, in fact, a key participant in U.S. military and CIA intelligence operations involving torture; subversion of foreign governments; illegal wars of aggression; and military occupations of countries which have never attacked the U.S. and which have cost hundreds of thousands of lives in Afghanistan, Iraq, Pakistan, and elsewhere. To begin with, as reported previously in the Washington Post and elsewhere, Google is the supplier of the customized core search technology for ‘Intellipedia, a highly-secured online system where 37,000 U.S. spies and related personnel share information and collaborate on their devious errands. Agencies such as the so-called ‘National Security Agency’, or NSA, which is implicated in the current ‘spying on Americans’ scandal, have also purchased servers using Google-supplied search technology which processes information gathered by U.S. spies operating all over the planet. In addition, Google is linked to the U.S. spy and military systems through its Google Earth software venture. The technology behind this software was originally developed by Keyhole Inc., a company funded by Q-Tel , a venture capital firm which is in turn openly funded and operated on behalf of the CIA. Google acquired Keyhole Inc. in 2004. The same base technology is currently employed by U.S. military and intelligence systems in their quest, in their own words, for “full-spectrum dominance” of the planet.  Moreover, Google’s connection with the CIA and its venture capital firm extends to sharing at least one key member of personnel. In 2004, the Director of Technology Assessment at In-Q-Tel, Rob Painter, moved from his old job directly serving the CIA to become ‘Senior Federal Manager’ at Google. As Robert Steele, a former CIA case officer has put it: Google is “in bed with” the CIA. [...]"  

MSM: "China Asks U.S. To Explain Internet Surveillance" [06/18/13] Printer Friendly Version "China made its first substantive comments on Monday to reports of U.S. surveillance of the Internet, demanding that Washington explain its monitoring programs to the international community. Several nations, including U.S. allies, have reacted angrily to revelations by an ex-CIA employee over a week ago that U.S. authorities had tapped the servers of internet companies for personal data. "We believe the United States should pay attention to the international community's concerns and demands and give the international community the necessary explanation," Chinese Foreign Ministry spokeswoman Hua Chunying said at a daily briefing. [...]"  Note: Every country that has the technological capability to spy, does it. It is a component of the current dystopian civilization. So, we see this media grandstanding that takes advantage of the dynamic in play.  

UK: "MOD Serves News Outlets With D Notice Over Surveillance Leaks" [06/18/13] Printer Friendly Version "Defence officials issued a confidential D notice to the BBC and other media groups in an attempt to censor coverage of surveillance tactics employed by intelligence agencies in the UK and US. Editors were asked not to publish information that may "jeopardise both national security and possibly UK personnel" in the warning issued on 7 June, a day after the Guardian first revealed details of the National Security Agency's (NSA) secret Prism programme. The D notice, which was marked "private and confidential: not for publication, broadcast or use on social media", was made public on the Westminster gossip blog, Guido Fawkes. Although only advisory for editors, the self-censorship system is intended to prevent the media from making "inadvertent public disclosure of information that would compromise UK military and intelligence operations and methods" [...]"  Note: Since the information has allegedly been 'cleansed' of info revealing operations, methods and sources, and the Guardian can discern these things, it would seem that this wouldn't matter, in the end.

MSM: "Operation Urban Shield: Police Response Training Planned, But Bombs Hit First" [06/17/13] Printer Friendly Version "The scenario had been carefully planned: A terrorist group prepared to hurt vast numbers of people around Boston would leave backpacks filled with explosives at Faneuil Hall, the Seaport District, and in other towns, spreading waves of panic and fear. Detectives would have to catch the culprits. Months of painstaking planning had gone into the exercise, dubbed “Operation Urban Shield,” meant to train dozens of detectives in the Greater Boston area to work together to thwart a terrorist threat. The hypothetical terrorist group was even given a name: Free America Citizens, a home-grown cadre of militiamen whose logo would be a metal skull wearing an Uncle Sam hat and a furious expression, according to a copy of the plans obtained by the Boston Globe. But two months before the training exercise was to take place, the city was hit with a real terrorist attack executed in a frighteningly similar fashion. The chaos of the Boston Marathon bombings disrupted plans for the exercise, initially scheduled for this weekend, forcing police to postpone. Now officials must retool aspects of the training. [...]"  

Commentary: "86 Civil Liberties Groups And Internet Companies Demand An End To NSA Spying" [06/17/13] Printer Friendly Version "A bipartisan coalition of 86 civil liberties organizations and Internet companies – including the Electronic Frontier Foundation, reddit, Mozilla, FreedomWorks, and the American Civil Liberties Union – are demanding swift action from Congress in light of the recent revelations about unchecked domestic surveillance. [...]" 

Exposé: "GCHQ Intercepted Foreign Politicians' Communications At G20 Summits" [06/17/13] Printer Friendly Version "Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week. The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey. [...]"  Related:"G8 Leaders Begin To Arrive For Summit" Printer Friendly Version  "David Cameron has arrived in Northern Ireland for the G8 summit which begins in County Fermanagh later on Monday June 17, 2013 [...]"  Note: They'll be spied upon, too.

Commentary: "Narus Insight: Israeli Big Brother Machines Sold To Egypt, Libya And The U.S." [06/16/13] Printer Friendly Version "... In 2006, an AT&T technician named Mark Klein discovered a secret room inside the company’s windowless “Folsom Street Facility” in downtown San Francisco that was bristling with Narus machines. The now notorious Room 641A was controlled by the NSA, which was using it to collect AT&T customer data for data mining and real-time analysis. Thanks to the powerful Narus Insight system, the NSA was able to monitor 108 billion emails from AT&T customers per day. The revelations set off a national scandal, confirming that the US government was spying on millions of citizens, and that major telecom and service providers were complicit. But no one was held accountable. Following a lawsuit filed against AT&T by the Electronic Freedom Foundation, Congress passed the FISA Amendments Act in July 2008, giving retroactive immunity to telecom corporations that assisted the NSA, and relieving them of any consequences for spying on Americans. Cass Sunstein, an informal advisor to Barack Obama’s 2008 presidential campaign who now heads the Office of Information and Regulatory Affairs, and who has urged federal law enforcement to “cognitively infiltrate” anti-government groups, was an outspoken supporter of the retroactive immunity bill. With Sunstein by his side, Obama reversed his initial objections to the NSA’s domestic spying operations, voting as a Senator for retroactive immunity. The vote allowed the NSA to expand its domestic spying operations, clearing the legal hurdles obstructing the creation of PRISM. The stage was set for the second term scandal that would leave Obama reeling. [...] Enter Narus, the company named for the Latin word for “all knowing.” Founded in the Silicon Valley in 1997 by Israeli expatriates with alleged ties to Israel’s intelligence services, Ori Cohen and Stas Khirman, Narus has been shrouded in mystery since its inception. A 2006 investigation by Haaretz into Cohen’s background was unable to establish a clear portrait of its subject, concluding that he was “hard to pin down.” Khirman, according to journalist James Bamford, worked in the past for Elta Systems, a subsidiary of Israel Aerospace Industries that specialized in advanced eavesdropping systems for Israel’s military-intelligence apparatus. (In 2010, Narus was sold to the Boeing Company, a multinational defense corporation that clearly saw a future in the online surveillance industry)[...] Just as AT&T relied on Narus systems, Verint’s DPI (Deep Packet Inspection) devices have been used to fulfill NSA requests for data from Verizon’s subscribers. And as Bamford explained in his 2008 book on the NSA, “Shadow Factory,” much of the data Verint and other private Israeli contractors gather from can be remotely accessed from Israel. “The greatest potential beneficiaries of this marriage between the Israeli eavesdroppers and America’s increasingly centralized telecom grid are Israel’s intelligence agencies,” Bamford wrote. Journalist Christopher Ketcham speculated in a 2008 article that Israeli-linked firms like Verint and Narus could have implanted Trojan spy technology into their devices, providing Israeli intelligence services with a backdoor means of reviewing and analyzing data stored in secure NSA systems. Boaz Guttmann, an Israeli national police cybercrimes investigator, told Ketcham, "Trojan horse espionage is part of the way of life of companies in Israel. It's a culture of spying."[...]"  

Commentary: "Even The AP Is Calling Bull On Government Claims Of PRISM Helping Stop NYC Subway Bomb" [06/15/13] Printer Friendly Version "We've already explained how some NSA supporters, including Rep. Mike Rogers and Senator Dianne Feinstein, are trying to defend PRISM and other NSA surveillance efforts by saying that it stopped a NYC subway bombing but their claims don't seem to hold up under scrutiny. Now even the Associated Press is calling out those statements as highly questionable, which is somewhat amazing for the AP, as it normally loves to just present "both sides of the story" and then let you decide what's real. But the article linked above actually digs in and points out where the claims by the NSA's defenders don't seem to add up to anything. Director of National Intelligence James Clapper said investigators "found backpacks with bombs." Really, the bombs hadn't been completed and the backpacks the FBI found were unrelated to the plot. Feinstein said the FBI had Zazi under surveillance for six months. Court testimony showed Zazi was watched only for about two weeks before he was arrested. But there's a much bigger point that the AP makes. Even if the claim was somehow true that PRISM was useful, nowhere does that claim show how a standard warrant wouldn't have provided the same information: That's because, even before the surveillance laws of 2007 and 2008, the FBI had the authority to - and did, regularly - monitor email accounts linked to terrorists. The only difference was, before the laws changed, the government needed a warrant. To get a warrant, the law requires that the government show that the target is a suspected member of a terrorist group or foreign government, something that had been well established at that point in the Zazi case. In other words, even if PRISM was used, there's no evidence that it was needed, because the NSA could have easily obtained the same information through traditional means -- getting a warrant -- and without potentially violating the privacy of millions of others. [...]"  Related: Propaganda Theatre: "Did Controversial NSA Spy Programs Really Help Prevent an Attack on the Subway?" Printer Friendly Version  "Late last week, unnamed sources told CBS News, Reuters, and the New York Times that the NSA's PRISM had helped to disrupt Najibullah Zazi's plot to bomb New York's subways in 2009.  [...]" | "Dianne Feinstein: NSA Surveillance Program Helped Disrupt Terror Plots" Printer Friendly Version "The committee chairman, Democratic Dianne Feinstein of California, contends the program helped disrupt a 2009 plot to bomb New York City's subways and played a role in the case against an American who scouted targets in Mumbai, India, before a deadly terrorist attack there in 2008. [...]" 

Commentary: "The Deeper Meaning of Mass Spying in America" James Petras [06/15/13] Printer Friendly Version "•The Politics behind the Police State • The Political and Economic Consequences of the Spy State  "The fundamental reason for the conversion of the state into a gigantic spy apparatus is the nature of deeply destructive domestic and foreign policies which the government has so forcefully pursued. The vast expansion of the police state apparatus is not a response to the terror attack of 9/11. The geometrical growth of spies, secret police budgets, and the vast intrusion into all citizen communications coincides with the wars across the globe. The decisions to militarize US global policy requires vast budgetary re-allocation , slashing social spending to fund empire-building; shredding public health and social security to bailout Wall Street. These are policies which greatly enhance profits for bankers and corporations while imposing regressive taxes on wage and salaried workers. Prolonged and extended wars abroad have been funded at the expense of citizens’ welfare at home. This policy had led to declining living standards for many tens of millions of citizens and rising dissatisfaction. The potential of social resistance as evidenced by the brief “Occupy Wall Street” movement which was endorsed by over 80% of the population, .The positive response alarmed the state and led to an escalation of police state measures. Mass spying is designed to identify the citizens who oppose both imperial wars and the destruction of domestic welfare; labeling them as ‘security threats’ is a means of controlling them through the use of arbitrary police powers. The expansion of the President’s war powers has been accompanied by the growth and scope of the state spy apparatus: the more the President orders overseas drone attacks, the greater the number of his military interventions, the greater the need for the political elite surrounding the President to increase its policing of citizens in anticipation of a popular backlash. In this context, the policy of mass spying is taken as ‘pre-emptive action’. The greater the police state operations, the greater the fear and insecurity among dissident citizens and activists. [...]"  Note: "James Petras is a Bartle Professor (Emeritus) of Sociology at Binghamton University, New York. He is the author of 64 books published in 29 languages, and over 560 articles in professional journals, including the American Sociological Review, British Journal of Sociology, Social Research, Journal of Contemporary Asia, and Journal of Peasant Studies. He has published over 2000 articles."

MSM: "Private "Blackwater-type" Spy Agencies: What Could Possibly Go Wrong?" [06/14/13] [6:59] "Could the sprawling surveillance state enable government or its legion of private contractors to abuse their technology and spy upon domestic political targets or judges This is not a far off possibility. Two years ago, a batch of stolen e-mails revealed a plot by a set of three defense contractors (Palantir Technologies, Berico Technologies and HBGary Federal) to target activists, reporters, labor unions and political organizations. The plans— one concocted in concert with lawyers for the US Chamber of Commerce to sabotage left-leaning critics, like the Center for American Progress and the SEIU, and a separate proposal to "combat" WikiLeaks and its supporters, including Glenn Greenwald, on behalf of Bank of America— fell apart after reports of their existence were published online. [...]"  Related: "How Spy Agency Contractors Have Already Abused Their Power" Printer Friendly Version 

Commentary: "Patriot Act "Sneak and Peek" Searches Misused To Target Drug Offenders, Not Terrorists" [06/14/13] [5:55] "According to a July report from the Administrative Office of the US Courts (thanks to Ryan Grim at the Huffington Post), of 763 sneak and peek search warrants issued last year, only three were issued in relation to alleged terrorist offenses, or less than one-half of 1% of all such black-bag clandestine searches. Nearly two-thirds (62%) were issued to investigate drug trafficking offenses. The report also includes figures on existing warrants that were extended last year. When new and extended warrant figures are combined, the total number of warrants was 1,291, with 843, or 65%, for drug investigations. Only five of all new or extended sneak and peek warrants were for terrorism investigations. Of 21 criminal offense categories for which warrants were issued or extended, terrorism ranked 19th, exceeding only conspiracy and bribery. As Grim noted, Sen. Russ Feingold (D-WI), a leading critic of the PATRIOT Act, challenged Assistant Attorney General David Kris about why powers supposedly needed to fight terrorism were instead being used for common criminal cases. [...]"  

Commentary: "Digital Blackwater: Meet The Contractors Analyzing Your Private Data" [06/14/13] Printer Friendly Version "Amid the torrent of stories about the shocking new revelations about the National Security Agency, few have bothered to ask a central question. Who’s actually doing the work of analyzing all the data, metadata and personal information pouring into the agency from Verizon and nine key Internet service providers for its ever-expanding surveillance of American citizens? [...]"  

MSM: "CIA Invests in Narrative Science and Its Automated Writers" [06/14/13] Printer Friendly Version "Narrative Science has already proven that its robot writers can make sentences that are good enough for newspapers and internal company reports. Now they’re going to work for the CIA. The Chicago-based startup, which uses computers to turn structured data sets into prose, has raised an undisclosed amount of funding from In-Q-Tel, the venture firm that invests on behalf of the Central Intelligence Agency.* The money comes along with a deal to put Narrative Science’s automated writers to work for the CIA and “the broader intelligence community.” [...]"  

MSM: " Binney: Myth That PRISM Necessary To Stop Terrorism Is Very Dangerous" [06/14/13] [5:17] Part 2 [7:32]

Commentary: "Why ‘I Have Nothing to Hide’ Is the Wrong Way to Think About Surveillance" [06/14/13] Printer Friendly Version "The line "if you've got nothing to hide, you have nothing to worry about" is used all too often in defending surveillance overreach. It's been debunked countless times in the past, but with the line being trotted out frequently in response to the NSA revelations, it's time for yet another debunking, and there are two good ones that were recently published. First up, we've got Moxie Marlinspike at Wired, who points out that, you're wrong if you think you've got nothing to hide, because our criminal laws are so crazy, that anyone sifting through your data would likely be able to pin quite a few crimes on you if they just wanted to.  [...]"  

MSM: "Edward Snowden: U.S. Government A 'Bully' To Hong Kong In Quest For Extradition"[06/13/13] Printer Friendly Version "Edward Snowden has resurfaced and accused the U.S. government of trying to “bully” Hong Kong into extraditing him before he leaks more top-secret information. But Snowden, 29, says he has a card up his sleeve that will complicate any extradition request: Information regarding the National Security Agency’s surveillance of people in Hong Kong. [...]"  

Anomalies: "Outer Limits Sci-Fi Episode From 1950's Presaged NSA-Gate and PRISM Dynamic" [06/13/13] [51:22]  

Commentary: "Top Counter-Terrorism Czar: Revealing NSA Spying Program Doesn’t Harm “National Security" [06/13/13] Printer Friendly Version "We noted yesterday that government officials aren’t trying to keep the spying programs secret to protect national security, but only to protect their own reputations. We quoted the former head of the National Security Agency’s global digital data gathering program, who said: The terrorists have already known that we’ve been doing this for years, so there’s no surprise there. They’re not going to change the way they operate just because it comes out in the U.S. press. I mean, the point is, they already knew it, and they were operating the way they would operate anyway. So, the point is that they’re—we’re not—the government here is not trying to protect it from the terrorists; it’s trying to protect it, that knowledge of that program, from the citizens of the United States. This was just confirmed by the top counter-terrorism czar under Presidents Clinton and Bush – Richard Clarke – who writes: " The argument that this sweeping search must be kept secret from the terrorists is laughable. Terrorists already assume this sort of thing is being done. Only law-abiding American citizens were blissfully ignorant of what their government was doing. [...]"  

Commentary: "The Dirty Little Secret About Mass Surveillance: It Doesn’t Keep Us " Safe" [06/13/13] Printer Friendly Version "William Binney knows as much about spying as anyone alive. Binney – a 32-year National Security Agency veteran – is the former head of the NSA’s global digital data gathering program, and a very highly-regarded cryptographer. Binney told Daily Caller yesterday that the spying “dragnet” being carried out by the government is useless: [...] Daily Caller: So it seems logical to ask: Why do we need all of this new data collection when they’re not following up obvious leads, such as an intelligence agency calling and saying you need to be aware of this particular terrorist? Binney: It’s sensible to ask, but that’s exactly what they’re doing. They’re making themselves dysfunctional by collecting all of this data. They’ve got so much collection capability but they can’t do everything." Daily Caller: So what are they doing with all of this information? If they can’t stop the Boston marathon bombing, what are they doing with it? Binney: Well again, they’re putting an extra burden on all of their analysts. It’s not something that’s going to help them; it’s something that’s burdensome. There are ways to do the analysis properly, but they don’t really want the solution because if they got it, they wouldn’t be able to keep demanding the money to solve it. I call it their business statement, “Keep the problems going so the money keeps flowing.” It’s all about contracts and money.[...]" Related: "US: No Plans To End Broad Surveillance Program" Printer Friendly Version "The Obama administration is weighing whether to charge a government contractor with leaking classified government secrets while it defends a much-criticized National Security Agency surveillance program as an indispensable tool for "protecting Americans from terrorists". [...]"| "Former NSA Boss: We Don't Data Mine Our Giant Data Collection, We Just Ask It Questions" Printer Friendly Version | "NSA Surveillance Played Little Role In Foiling Terror Plots, Experts Say" Printer Friendly Version | "The Current Surveillance State Is The End Result Of Two Consecutive Presidents Rewriting Their Job Descriptions" Printer Friendly Version "The escalating build-out of the American surveillance state since 9/11 can't be attributed to any one factor. There have been several contributors, most of which have used the omnipresent "threat" of terrorism as leverage to increase governmental power and control at the expense of its citizens. But one undeniable aspect is the fact that two consecutive presidents have recast their presidential responsibilities, as Micah Zenko points out at Foreign Policy. [...] The executive branch is a key part of the system of checks and balances this country's founders mandated in order to prevent the sort of mission creep and rights erosion occurring today. Instead of protecting the Constitution and their constituents, two consecutive presidents have relegated it to the background, preferring to pursue the unobtainable: safety and security. Other government agencies are ' tasked' with ' protecting the public'. The executive branch is ultimately responsible for preventing abuses and excesses. Instead, this branch has willingly paved the way for a surveillance network that undermines protections and rights in exchange for vague assurances of security. "  Related: See below 

Commentary: "In My Country, They Claimed Surveillance Was "For the Safety of the People" [06/13/13] Printer Friendly Version "I live in a country generally assumed to be a dictatorship. One of the Arab spring countries. I have lived through curfews and have seen the outcomes of the sort of surveillance now being revealed in the US. People here talking about curfews aren’t realizing what that actually FEELS like. It isn’t about having to go inside, and the practicality of that. It’s about creating the feeling that everyone, everything is watching. The purpose of this surveillance from the governments point of view is to control enemies of the state. Not terrorists. People who are coalescing around ideas that would destabilize the status quo. These could be religious ideas. These could be groups like anon who are too good with tech for the governments liking. It makes it very easy to know who these people are. It also makes it very simple to control these people. [...] I actually get really upset when people say “I don’t have anything to hide. Let them read everything.” People saying that have no idea what they are bringing down on their own heads. They are naive, and we need to listen to people in other countries who are clearly telling us that this is a horrible horrible sign and it is time to stand up and say no."  Related: "The Constitution Doesn't Guarantee Safety, It Guarantees Privacy" [06/13/13] Printer Friendly Version "Obama says [3:10] "I think it's important to understand that you can't have 100 percent security and then have 100 percent privacy and zero inconvenience. We're going to have to make some choices as a society." This is obviously a false choice and an admission that he knowingly violates the rights of U.S. citizens. Obama, like Bush before him, claims his most important job is to keep the American people safe. Not true. His job is to uphold and defend the Constitution which guarantees the privacy of all citizens but makes no mention of "safety" or "security". In fact, if war must be waged to defend America, that power rests with the Congress. The president then directs that war. [...]" 

Commentary: "From 9/11 To PRISMgate - How The Carlyle Group LBO'd The World's Secrets" [06/13/13] Printer Friendly Version "The short but profitable tale of how 483,000 private individual have "top secret" access to the nation's most non-public information begins in 2001. "After 9/11, intelligence budgets were increased, new people needed to be hired, it was a lot easier to go to the private sector and get people off the shelf," and sure enough firms like Booz Allen Hamilton - still two-thirds owned by the deeply-tied-to-international-governments investment firm The Carlyle Group - took full advantage of Congress' desire to shrink federal agencies and their budgets by enabling outside consultants(already primed with their $4,000 cost 'security clearances') to fulfill the needs of an ever-more-encroaching-on-privacy administration. [...]"  

Commentary: "European Governments in Crisis over US Spying Revelations" [06/13/13] Printer Friendly Version "The latest revelations regarding the extent of US surveillance of world communications traffic has led to a chorus of protest and expressions of unease in the European media and political circles. According to the information released last Friday by former CIA employee Edward Snowden, the NSA has collected vast amounts of information based on a global sweep of telephone and internet communication. So-called “heat maps” of the spying operation make clear that the NSA had no qualms about tapping the communications not only of countries it defines to be its enemies, but also those regarded as its long-term allies. The NSA heat map published in the Guardian newspaper reveals that no less than 3 billion pieces of data were collected from individuals, institutions and businesses across the continent of Europe in the course of March 2013 alone. Every European state was subject to surveillance, with the continent’s biggest economy, Germany, subjected to the most scrutiny. In editorials and statements Tuesday, European politicians and media outlets complained of the American surveillance operation, while at the same time defending the right of their own national governments to spy on the population at large. [...]"  

Commentary: "22 Nauseating Quotes From Hypocritical Establishment Politicians About The NSA Spying Scandal" [06/13/13] Printer Friendly Version "Establishment politicians from both major political parties are rushing to defend the NSA and condemn whistleblower Edward Snowden. They are attempting to portray Edward Snowden as a “traitor” and the spooks over at the NSA that are snooping on all of us as “heroes”. In fact, many of the exact same politicians that once railed against government spying during the Bush years are now staunchly defending it now that Obama is in the White House. But it isn’t just Democrats that are acting shamefully. Large numbers of Republican politicians that love to give speeches about “freedom” and “liberty” are attempting to eviscerate the Fourth Amendment to the U.S. Constitution. The government is not supposed to invade our privacy and investigate us unless there is probable cause to do so. Apparently many of our politicians misunderstood when they read the novel 1984 by George Orwell. It wasn’t supposed to be an instruction manual. We should be thanking Edward Snowden for exposing the deep corruption that is eating away at our own government like cancer. Now the American people need to pick up the ball and start demanding answers, because without a doubt we are going to see establishment politicians from both major political parties try to shut this scandal down. Establishment Democrats and establishment Republicans both love the Big Brother surveillance grid that the U.S. government has constructed, and they are both making it abundantly clear that they will defend the NSA to the very end. The following are 22 nauseating quotes from hypocritical establishment politicians that show exactly how they feel about the NSA spying scandal… [...]"  Note: Bunch of psychopathic control freaks .... very psychologically disturbed and predatory ...

Commentary: "DHS Admits Boston Training Drill Involving Backpack Explosives Planned Months Before Marathon" [06/12/13] Printer Friendly Version "The Department of Homeland Security has gone public with an admission that an exercise was planned months before the Boston Marathon bombings that involved backpacks being used to detonate explosives by rogue terrorists. According to the DHS documents acquired by the Boston Globe, the agents were planning on conducting training exercises centered around a fictitious terrorist group called ‘Free America Citizens’, a group that would plant backpacks full of explosives around Boston that the detectives would be forced to track down. Ultimately, of course, this ended up happening at the Boston Marathon itself with precise accuracy. The Globe report reads that “the city was hit with a real terrorist attack executed in a frighteningly similar fashion.” [...]"  

Interviews: "Assange On NSA Leak: Snowden Will Be Prosecuted For Years" [06/12/13]   [14:54] "The ex-CIA man who blew the lid off America’s vast NSA public surveillance net – is promising more explosive revelations. Edward Snowden’s supporters are mobilizing too – with tens of thousands signing a petition to pardon the whistleblower. With us now, a man who knows what it’s like to blow the whistle in a big way, and incur the wrath of Washington – Julian Assange. He joins talks to RT via broadband from the Ecuadorian Embassy in London. [...]"  

Commentary: "Air Force Prohibiting Airmen from Reading NSA Scandal Stories" [06/12/13] Printer Friendly Version "Over the weekend I received an email from a mother whose son is stationed with the U.S. Air Force in the Middle East. He and other Airmen received a NOTAM (Notice to Airmen) from the 624th Operations Center prohibiting them from accessing stories about the NSA surveillance activity on the Air Force’s NIPRNET (Non-Secure Internet Protocol Router Network) systems. The 624th Operations Center located at Lackland Air Force Base in Texas serves as the operational arm for the 24th Air Force’s cyberspace operations capability. [...]"  

Legal Cases: "Obama, NSA, Verizon and DoJ Are Being Sued for $3 Billion In A Class Action Lawsuit Over PRISM Scandal" PDF [06/12/13] "Class action lawsuit is filed against various corporations and government entities involved in the recent spying scandal." Related: "ACLU Files Lawsuit Challenging Constitutionality of NSA Phone Spying Program" Printer Friendly Version "The American Civil Liberties Union and the New York Civil Liberties Union today filed a constitutional challenge to a surveillance program under which the National Security Agency vacuums up information about every phone call placed within, from, or to the United States. The lawsuit argues that the program violates the First Amendment rights of free speech and association as well as the right of privacy protected by the Fourth Amendment. The complaint also charges that the dragnet program exceeds the authority that Congress provided through the Patriot Act. [...]"  

Video Short: "Ron Paul Video On Secrecy" [06/12/13] [10:47] Note: This has been repeatedly removed by YouTube ... J.F. Kennedy's comments about secrecy, etc. Very Good, in terms of what is happening right now in the United States.

MSM: "Ron Paul: When You Have A Dictatorship, Truth Becomes Treasonous" [06/12/13] [14:01]  "Former Congressman Ron Paul offered up a heaping portion of Constitutional liberty on CNN’s Piers Morgan Live yesterday when he addressed the recent NSA spy grid scandal, which has linked several high tech giants, including Facebook, Microsoft and Skype, to a secret program in which the government agency was allowed access to those companies’ servers. Asked if he considered NSA contractor turned whistleblower Edward Snowden a hero, Paul answered, “Well… he’s done a great service because he’s telling the truth and this is what we are starved for. The American people are starved for the truth.” Snowden’s actions, first reported by the UK’s Guardian newspaper and next the Washington Post, have come under fierce scrutiny by members on both sides of the political divide, leading several politicians to label him a “traitor” and his leak of government secrets “treasonous.” According to Paul, these are the tell-tale signs of a dictatorial government: “And when you have a dictatorship or an authoritarian government, truth becomes treasonous. And this is what they do if you are a whistleblower, or if you are trying to tell the American people that our country is destroying our rule of law and destroying our Constitution, they turn it around and say, ‘You’re committing treason…’”  Meanwhile, Morgan’s in-studio guest, Robert James Woolsey, Jr., a former CIA boss, found it difficult to answer whether what the NSA is doing violates the Fourth Amendment. [...]"  

MSM: "Journalist In US Surveillance Case: More To Come" [06/12/13] Printer Friendly Version "The journalist who exposed classified U.S. surveillance programs leaked by an American defense contractor said Tuesday that there will be more 'significant revelations' to come from the documents. "We are going to have a lot more significant revelations that have not yet been heard over the next several weeks and months," said Glenn Greenwald of The Guardian. Greenwald told The Associated Press the decision was being made on when to release the next story based on the information provided by Edward Snowden, a 29-year-old employee of government contractor Booz Allen Hamilton who has been accused by U.S. Senate intelligence chairwoman Sen. Dianne Feinstein of California of committing an "act of treason" that should be prosecuted. Greenwald's reports last week exposed widespread U.S. government programs to collect telephone and Internet records. "There are dozens of stories generated by the documents he provided, and we intend to pursue every last one of them," Greenwald said. Snowden's whereabouts were not immediately known on Tuesday, although he was believed to be staying somewhere in Hong Kong. No charges have been brought and no warrant has been issued for the arrest of Snowden. [...]"  

MSM: "Alleged US Security Officials Said NSA Leaker, Journalist Should Be 'Disappeared' " [06/12/13] Printer Friendly Version "A US editor has alleged he overheard security officials saying that the NSA leaker and the Guardian columnist who broke his story should be “disappeared.” Leaker Edward Snowden said that American spies often prefer silencing targets over due process. [...] “In Dulles UAL lounge listening to 4 US intel officials saying loudly leaker & reporter on #NSA stuff should be disappeared recorded a bit,” the Atlantic's Washington-based editor- at-large Steve Clemons tweeted on Sunday. According to Clemons, four men sitting next to him at the airport “were loud. Almost bragging” while discussing an intelligence conference they had just attended hosted by the Intelligence and National Security Alliance. When asked for his reaction to the alleged comments that reporter Glenn Greenwald and the 29-year- old leaker himself should be "disappeared," Snowden told the newspaper: "Someone responding to the story said 'real spies do not speak like that.' Well, I am a spy and that is how they talk. Whenever we had a debate in the office on how to handle crimes, they do not defend due process they defend decisive action. They say it is better to kick someone out of a plane than let these people have a day in court. It is an authoritarian mindset in general." "  

Commentary: "Big Data’: Bilderberg Firm 'Palantir' Works For NSA Spy Agenda" [06/11/13] Printer Friendly Version "Paypal Mafia Don” Peter Thiel brings technocratic control of “big data” to the forefront of Bilderberg’s 2013 agenda via Silicon Valley’s partnership with the NSA and CIA. The age of “big data” is reluctantly upon us, and it affects almost everything, as Bilderberg’s 2013 talking point suggests. Their secretive closed door discussion on massive stores of data, collected from the biggest portals on the Internet and analyzed in the pursuit of NSA objectives, is being led by Dr. Alexander Karp, the co-founder of Palantir Technologies. The firm has admittedly been set-up with $2 million in seed money from In-Q-Tel, the private funding arm of the CIA, and the aid of Peter Thiel, Silicon Valley’s so-called “PayPal Mafia” Don who helps direct Bilderberg’s agenda and invitees as a member of its Steering Committee. Nart Villeneuve from Information Warfare Monitor, former Homeland Security chief Michael Chertoff – responsible for bringing full body scanners to airports – and former chess world champion Garry Kasparov, also a Bilderberg attendee, have all been invited to speak at Palantir discussions dubbed “Palantir Night Live.” Palantir’s Alex Karp has been advised by numerous intelligence officials including the former director of Total Information Awareness, John Poindexter, and George Tenet, the former CIA director. Gen. Keith B. Alexander, the director of NSA and commander of US Cyber Command, testified in Congress on the cyber warfare program that was launched officially in 2010. Alexander discussed in part the fact that Palantir Technologies is contracted by the NSA for datamining and cyber attack operations. A hit team in the infowar, Palantir developed recommendations to target the grassroots leadership, supporters and financiers of Wikileaks and Anonymous, and even outlined the need to target media dissidents like Glen Greenwald, perhaps the foremost critic of drone strikes.[...]"  

MSM: "Glenn Greenwald Interview: Amy Goodman / Democracy Now" [06/11/13] [15:15] "Speaking from Hong Kong where he broke the story of Edward Snowden outing himself as the NSA whistleblower, Guardian columnist Glenn Greenwald joins us to discuss Snowden's actions and the multiple disclosures he's revealed about government surveillance. "There is this massive surveillance apparatus being gradually constructed in the United States that already has extremely invasive capabilities to monitor and store the communications and other forms of behavior not just of tens of millions of Americans, but of hundreds of millions, probably billions of people, around the globe," Greenwald says. "It's one thing to say that we want the U.S. government to have these capabilities. It's another thing to allow this to be assembled without any public knowledge, without any public debate, and with no real accountability. What ultimately drove [Snowden] forward — and what ultimately is driving our reporting — is the need for a light to be shined on what this incredibly consequential [surveillance] world is all about and the impact it's having both on our country and our planet." [...]" Related: "Greenwald Spars With MSNBC’s Brzezinski Over Her ‘WH Talking Points’ About NSA" [5:57] "“Appearing on MSNBC Monday morning, Guardian journalist Glenn Greenwald smacked down “White House talking points” he said were being repurposed by “Morning Joe” co-host Mika Brzezinski, saying the National Security Agency’s spying programs are flatly unconstitutional and that her defense of them was misleading. “Quickly, I just want an answer yes or no,” Brzezinski began. “Isn’t it the case that reviewing of emails or any wiretapping cannot take place without an additional warrant from a judge and a review? It’s not like there’s haphazard probing into all of our personal emails. Can we put this into context so we understand exactly what’s going on?” Greenwald didn’t even hesitate, blowing past Mika’s request for a one-word response.   ... "Yeah, I’ll put it into context for you: The White House talking points that you’re using are completely misleading and false,” Greenwald shot back, noting that a warrant is only needed when the communication is between two American citizens who are both on American soil. “The Senate has been repeatedly asking for the numbers of how many Americans they’re doing that to, and the NSA keeps saying — and it’s false — they can’t provide those numbers. Those talking points you’re reading from are completely false, as anybody who has paid even remote debate know over the last ten years.” Stating that she was simply asking a yes-or-no question about legality, Brzezinski quipped that Greenwald didn’t appear to want to answer. After a bit of back-and-forth, Greenwald said if we’re talking about legality, it’s worth noting that Obama’s Justice Department “has repeatedly blocked courts from ruling on the legality.” If it’s legal, he added, why not let the court say so? [...]" | "Daniel Ellsberg: "Snowden Did An Enormous, Incalculable Service To The American People" [0:52]  "Edward Snowden 'Missing' In Hong Kong" Printer Friendly Version 

Commentary: "Washington Attempts To Contain Fallout From NSA Surveillance Leaks, Clapper Apparently Lied Under Oath" [06/11/13] Printer Friendly Version "Individuals in Washington are now engaging in damage control in response to the devastating information leaked by Edward Snowden about the National Security Agency (NSA) surveillance programs as it becomes increasingly apparent that Director of National Intelligence James Clapper lied under oath. President Barack Obama quickly came out in defense of the NSA’s programs which range from grabbing all of Verizon’s U.S. phone records to working directly with tech giants on the PRISM program but the administration is now kicking it into high gear. Recently, Clapper slammed the press over their coverage of the NSA surveillance programs and, based on what we know now, it seems quite clear that he actually lied under oath... [...]" [Cross-Posted]  Related: "Intelligence Chief Clapper: I Gave ‘Least Untruthful’ Answer On U.S. Spying" Printer Friendly Version "Director of National Intelligence James Clapper is really struggling to explain why he told Congress in March (see video above) that the National Security Agency does not intentionally collect any kind of data on millions of Americans. His latest take: It's an unfair question, he said, like "When are you going to stop beating your wife?" And it seems to depend on the meaning of "collect." "I responded in what I thought was the most truthful, or least untruthful, manner by saying 'no,'" Clapper told NBC News on Sunday. [...]"  Note: I remember Clinton saying something like "it depends on what your definition of 'is', is. These people live in a spectrum of relativism, where there are no clearly defined conceptual boundaries .. typical of psychopathy.  

MSM: "Edward Snowden: The CIA Whistleblower Behind The NSA Surveillance Revelations" [06/10/13] Printer Friendly Version [12:35] "The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell. The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. "I have no intention of hiding who I am because I know I have done nothing wrong," he said. Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world's most secretive organisations – the NSA. [...] The 12.5 minute video interview with Snowden is well worth your time, as there are many facets worth breaking down, including why he decided to risk his entire life in order to be a whistleblower. Most shocking, perhaps, is the power that he claims to have had. At one point he says: "I had full access to the full rosters of everyone working at the NSA, the entire intelligence community, and undercover assets all around the world." Earlier he claims: "Any analyst at any time can target anyone ... I sitting at my desk certainly have the authorities to wiretap anyone — from you or your accountant, to a federal judge, to even the President." And around the 10:30 mark, he makes the shocking claim: 'If I had just wanted to harm the U.S., you could shut down the surveillance system in an afternoon, but that's not my intention." We eagerly await confirmation or a rejection that a 29-year old at an outside firm had the power he claims to have had. [...]" Related: Journalist: No Valid Claim NSA Leaks Will Harm National Security" [5:12] "Glenn Greenwald, the Guardian columnist who broke the NSA surveillance story, says his editors rejected the Obama administration's arguments that 'the stories would increase the risk of terrorism'. [...]"|"Why A 29-Year-Old Contractor Had Access To Government Secrets" Printer Friendly Version 

MSM: "NSA Constitutional Violations – Judge Andrew Napolitano on Geraldo Show" [06/10/13] [7:50]  

Commentary: "Justice Department Fights Release of Secret Court Opinion Finding Unconstitutional Surveillance" [06/10/13] Printer Friendly Version "In the midst of revelations that the government has conducted extensive top-secret surveillance operations to collect domestic phone records and internet communications, the Justice Department was due to file a court motion Friday in its effort to keep secret an 86-page court opinion that determined that the government had violated the spirit of federal surveillance laws and engaged in unconstitutional spying. This important case—all the more relevant in the wake of this week's disclosures—was triggered after Sen. Ron Wyden (D-Ore.), a member of the Senate intelligence committee, started crying foul in 2011 about US government snooping. As a member of the intelligence committee, he had learned about domestic surveillance activity affecting American citizens that he believed was improper. He and Sen. Mark Udall (D-Colo.), another intelligence committee member, raised only vague warnings about this data collection, because they could not reveal the details of the classified program that concerned them. But in July 2012, Wyden was able to get the Office of the Director of National Intelligence to declassify two statements that he wanted to issue publicly. They were: [...]" 

MSM: "Rand Paul Planning Class Action Lawsuit Against Surveillance Programs" [06/10/13] Printer Friendly Version "Sen. Rand Paul (R-Ky.) said Sunday that he plans to file a class action lawsuit against the Obama administration for its “unconstitutional” surveillance programs. On “Fox News Sunday,” Paul said he wants to get the support of 10 million Americans. “I’m going to be seeing if I can challenge this at the Supreme Court level,” Paul said, according to a rush transcript.  [...]" 

  Commentary: "Israeli Involvement In NSA Spying" [06/10/13] Printer Friendly Version "Two Israeli companies are involved. High-tech firms Verint and Narus have longstanding US/Israeli intelligence connections. For many years, Verint was a majority-owned Comverse Technology subsidiary. Both companies have about half their employees in Israel. In August 2012, Verint acquired Comverse. It now operates independently. It makes security software. It calls itself "a global leader in Actionable Intelligence solutions." Narus calls itself a cybersecurity company. It's an independent Boeing subsidiary. It provides real-time network traffic and analytics software. It does so with enterprise class spyware capabilities. In 1997, it was founded in Israel. It created NarusInsight. It's a supercomputer system. A previous article said AT&T uses it at their secret San Francisco facility. It lets NSA spy on its customers. Verint's software also is used to do it. Bamford called it "especially troubling that both companies have had extensive ties to Israel, as well as links to (its) intelligence service." A previous article discussed Israeli spying on America. The CIA calls Israel America's main regional spy threat. An Israeli-based CIA operative once found food in his refrigerator rearranged. Washington knows what's going on. Publicly it's ignored. Pre-9/11, the FBI uncovered a massive US-based Israeli spy ring. It remains active. It betrays America. Numerous Israeli citizens are involved. They have close ties to foreign military, criminal and intelligence sources. They reportedly breach US laws with impunity. Israel's featured prominently in annual FBI reports. It actively seeks proprietary/secret US information. It's mainly on military systems and advanced computer applications. Proprietary commercial and industrial data are stolen. Israel recruits spies. Sophisticated methods are used. Computers are hacked for information. Washington's Government Accountability Office (GAO) said Israel "conducts the most aggressive espionage operation against the United States of any US ally." The Pentagon accused Israel of "actively engaging" in military and industrial espionage in the United States. An Israeli citizen working in the US who has access to proprietary information is likely to be a target of such espionage." FBI whistleblower John Cole said Justice Department officials ordered dozens of Israeli espionage cases dropped. At issue was political pressure. Washington gives Israel billions of dollars in annual aid, state-of-the-art weapons and technology, and numerous other special privileges. In return, it steals US state and commercial secrets. Despite longstanding close ties, Washington considers Israel both ally and counterintelligence threat. In terms of technical capability and human resources, it matches America's best. It has access to the highest US political, military and intelligence sources. Bamford said NSA-developed advanced analytical/data-mining software was lawlessly given Israel. An Operations Directorate technical director did so secretly. Apparently Israeli companies got access. Technology they got advanced their own. Narus once boasted about being "known for its ability to capture and collect data from the largest networks around the world." Retired Israeli General Hanan Gefen ran its secret Unit 8200. It's Israel's NSA equivalent. He admitted Israeli ties to Comverse. At the time, it owned Verint. It owns other Israeli high-tech companies. They specialize in eavesdropping and surveillance. They operate globally. According to Gefen, the "correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental." "Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans." Kobi Alexander founded Verint. He formerly served as chairman. He's a fugitive. FBI accusations include fraud, theft, lying, bribery, money laundering and related crimes. Two of his top Comverse associates were indicted on similar charges. Both were imprisoned. They paid millions of dollars in fines and penalties. NSA claims it takes malfeasance and other legitimate complaints seriously. Spying technology and expertise take precedence. Bamford says take NSA assurances cautiously. "Who's listening to the listeners," he asks? [...]" Related: "NSA Outsourcing Its Domestic Spying To Israel" Printer Friendly Version 

Flashback: "Why Privacy Matters Even if You Have 'Nothing to Hide'" [06/10/13] Printer Friendly Version "When the government gathers or analyzes personal information, many people say they're not worried. "I've got nothing to hide," they declare. "Only if you're doing something wrong should you worry, and then you don't deserve to keep it private." The nothing-to-hide argument pervades discussions about privacy. The data-security expert Bruce Schneier calls it the "most common retort against privacy advocates." The legal scholar Geoffrey Stone refers to it as an "all-too-common refrain." In its most compelling form, it is an argument that the privacy interest is generally minimal, thus making the contest with security concerns a foreordained victory for security. The nothing-to-hide argument is everywhere. In Britain, for example, the government has installed millions of public-surveillance cameras in cities and towns, which are watched by officials via closed-circuit television. In a campaign slogan for the program, the government declares: "If you've got nothing to hide, you've got nothing to fear." Variations of nothing-to-hide arguments frequently appear in blogs, letters to the editor, television news interviews, and other forums. One blogger in the United States, in reference to profiling people for national-security purposes, declares: "I don't mind people wanting to find out things about me, I've got nothing to hide! Which is why I support [the government's] efforts to find terrorists by monitoring our phone calls!" The argument is not of recent vintage.  [...]"  Note: Only paranoid psychopaths with an agenda would insist that people are 'guilty' of something 'until they're proven innocent'. Asking people, without any foundation or actual evidence that they have done anything, to prove a negative, is irrational. Principles of liberty mean that if you have nothing to hide, the government has no business looking for something. The government is darkside and wants you to cower and fall for their "if you've done nothing wrong, then you don't need your privacy" line of intimidation. This is psychotic control freakism. However, I think that the larger matter is when every day people chant this vile mantra in that knee-jerk’ Stockholm syndrome’ way that they do. Typically, these people are sequentials who obviously do not understand that privacy is a value in and of itself

MSM: "Krugman: We Are An Authoritarian Surveillance State" [06/10/13] Printer Friendly Version "On Sunday’s “This Week with George Stephanopoulos” on ABC, liberal New York Times columnist Paul Krugman declared the Obama administration’s surveillance efforts “authoritarian.” Krugman cited a 2008 article by Yale professor Jack Balkin about the so-called “surveillance” state, which asserted that states fall into one of two categories. According to Krugman, the current federal government can be classified as an “authoritarian” state. “There was a really good article written five years ago by Jack Balkin at the Yale Law School,” Krugman said. “He said that technology means we’re going to be living in a surveillance state. But there are different kinds of surveillance states. You can have a democratic surveillance state, which collects as little data as possible and tells you as much as possible about what it’s doing. Or you could have an authoritarian state, which collects as much as possible and tells the public as little as possible, and we are kind of on the authoritarian side. [...]"  Related: "The Constitution in the National Surveillance State" Jack M. Balkin, Yale University - Law School "Abstract: During the last part of the twentieth century the United States began developing a new form of governance that features the collection, collation, and analysis of information about populations both in the United States and around the world. This new form of governance is the National Surveillance State. In the National Surveillance State, the government uses surveillance, data collection, collation and analysis to identify problems, to head off potential threats, to govern populations, and to deliver valuable social services. The National Surveillance State is a special case of the Information State - a state that tries to identify and solve problems of governance through the collection, collation, analysis and production of information. The War on Terror may be the most familiar justification for the rise of the National Surveillance State, but it is hardly the sole or even the most important cause. Increasing use of surveillance and data mining by public and private entities is a predictable result of accelerating developments in information technology. In fact, most surveillance in the National Surveillance State is likely to be in private hands. The question is not whether we will have a surveillance state in the years to come, but what sort of state we will have. The National Surveillance State poses three major dangers for our freedom. The first danger is that government will create a parallel track of preventative law enforcement that routes around the traditional guarantees of the Bill of Rights. The second danger is that traditional law enforcement and social services will increasingly resemble the parallel track. Once governments have access to powerful surveillance and data mining technologies, there will be enormous political pressure to use them in everyday law enforcement and for delivery of government services. Private power and public-private cooperation pose a third danger. Because the Constitution does not reach private parties, government has increasing incentives to rely on private enterprise to collect and generate information for it, thus circumventing constitutional guarantees. Corporate business models, in turn, lead companies to amass and analyze more and more information about individuals in order to target new customers and reject undesirable ones. The Administrative and Welfare State raised problems not only for the Constitution, but also for the rule of law itself. The same is true for the National Surveillance State. Changing methods of government demand new strategies to preserve constitutional values and democratic self-government. We mastered at least some of the problems caused by the rise of the Administrative and Welfare state; we must hope that we can do so the same for the National Surveillance State, which is already here. [...]"  Note: PDF document, 25 pages. Click "Download This Paper

MSM: "Defense Contractors Turn to Border Control for New Profits" [06/10/13] Printer Friendly Version "Millions of immigrants aren’t the only ones hoping for Congress to approve an immigration reform plan. Military contractors, too, are looking forward to the opportunities that the new law might bring. While the reform plan currently in the U.S. Senate would provide new chances at citizenship for immigrants, it also would require the Department of Homeland Security (DHS) to do something that’s never been done before—secure every inch of the nearly 2,000-mile border between the U.S. and Mexico and stanch the flow of illegal immigrants once and for all. Since the federal government can’t afford to add thousands of border agents to accomplish such a goal, DHS will turn instead to technology to halt unauthorized crossings. That’s where companies like Raytheon, Lockheed Martin, General Dynamics and others come in. With the Afghanistan war winding down, these defense contractors are looking for new business opportunities in Washington. In the immigration reform bill, they see ways to demonstrate how their hardware could be applied to defending the border. In fact, half a dozen corporations “are preparing for an unusual desert showdown here this summer, demonstrating their military-grade radar and long-range camera systems in an effort to secure a Homeland Security Department contract worth as much as $1 billion,” according to Eric Lipton of The New York Times. Northrop Grumman hopes DHS will like its automated tracking device that was first developed to help soldiers detect roadside bombs in Afghanistan. General Atomics, which builds reconnaissance drones, is hoping to sell more of the aircraft as part of a $443 million contract. If the legislation as currently drafted becomes law, DHS will have only six months to offer up ways to achieve “effective control” and “persistent surveillance” of the entire 1,969-mile border with Mexico. [...]" 

MSM: "NSA Spying On Canadians, CSEC Capable Of Similar Surveillance: Experts" [06/09/13] Printer Friendly Version "Canadians’ private digital information is inevitably being caught up in the U.S.’s massive surveillance dragnet, and Canada's government has both the capability and the legal loopholes needed to spy on its own citizens as well, experts say. That has raised concerns among privacy rights advocates that Canadians’ personal information may be getting caught up in the U.S.’s programs. Many experts say there is no “if” here; because of the integrated, international nature of online communication, it’s inevitable Canadians’ communications are being collected as part of the U.S. programs. But Canada may be carrying out its own versions of mass, warrantless surveillance; at the very least, experts say, treaties Canada has signed and clauses in national security laws give Canada’s government the legal leeway to do so. Unbeknownst to most Canadians, Canada has laws on the books enabling monitoring that are very similar to the controversial provisions of the USA Patriot Act. Michael Geist, a leading tech law expert, points out in a recent blog posting that section 21 of the Canadian Security Intelligence Act is “arguably similar” to a section of the Patriot Act. “Both do not require probable cause and both can be used to obtain any type of records or any other tangible thing. Moreover, the target of both warrants need not be the target of the national security investigation,” Geist wrote. Canada has its own version of the NSA as well -- the Communications Security Establishment Canada (CSEC), an extremely secretive government agency responsible for monitoring foreign communications related to Canada’s national security. The agency can officially only monitor Canadian communications when a foreign party is involved. [...]"  

MSM: "U.S. Surveillance Revelations Deepen European Fears Of Web Giants" [06/09/13] Printer Friendly Version "Mikko Hypponen, chief research officer at Finnish software security firm F-Secure, said outrage was the appropriate response to the U.S. revelations. "What we have in our hands now is the first concrete proof of U.S.-based high-tech companies participating with the NSA in wholesale surveillance on us, the rest of the world, the non-American, you and me," he said. [...]"  

MSM: "Sources: NSA Sucks In Data From 50 Companies" [06/09/13] Printer Friendly Version "Analysts at the National Security Agency can now secretly access real-time user data provided by as many as 50 American companies, ranging from credit rating agencies to internet service providers, two government officials familiar with the arrangements said. The Wall Street Journal reported today that U.S. credit card companies had also provided customer information. The officials would not disclose the names of the companies because, they said, doing so would provide U.S. enemies with a list of companies to avoid.  [...] It is not clear how the NSA interfaces with the companies. It cannot use standard law enforcement transmission channels to do, since most use data protocols that are not compatible with that hardware. Several of the companies mentioned in the Post report deny granting access to the NSA, although it is possible that they are lying, or that the NSA's arrangements with the company are kept so tightly compartmentalized that very few people know about it. Those who do probably have security clearances and are bound by law not to reveal the arrangement. This arrangement allows the U.S. companies to "stay out of the intelligence business," one of the officials said. That is, the government bears the responsibility for determining what's relevant, and the company can plausibly deny that it subjected any particular customer to unlawful government surveillance. Previously, Congressional authors of the FAA said that such a "get out of jail free" card was insisted by corporations after a wave of lawsuits revealed the extent of their cooperation with the government.[...]"  

MSM: "Boundless Informant: The NSA's Secret Tool To Track Global Surveillance Data" [06/09/13] Printer Friendly Version "The National Security Agency has developed a powerful tool for recording and analysing where its intelligence comes from, raising questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications. The Guardian has acquired top-secret documents about the NSA data-mining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks. The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message. The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013 [...]" 

MSM: "UK’s Electronic Eavesdropping And Security Agency GCHQ Also Accesses NSA’s Secret PRISM Programme" [06/09/13] Printer Friendly Version "The UK’s electronic eavesdropping and security agency, GCHQ, has been secretly gathering intelligence from the world’s biggest internet companies through a covertly run operation set up by America’s top spy agency, documents obtained by the Guardian reveal. The documents show that GCHQ, based in Cheltenham, has had access to the system since at least June 2010, and generated 197 intelligence reports from it last year. The US-run programme, called Prism, would appear to allow GCHQ to circumvent the formal legal process required to seek personal material such as emails, photos and videos from an internet company based outside the UK. The use of Prism raises ethical and legal issues about such direct access to potentially millions of internet users, as well as questions about which British ministers knew of the programme. In a statement to the Guardian, GCHQ, insisted it “takes its obligations under the law very seriously”. The details of GCHQ’s use of Prism are set out in documents prepared for senior analysts working at America’s National Security Agency, the biggest eavesdropping organisation in the world. [...]"  

Commentary: "Repressing “Un-American Activities”: The Historical Roots of Today’s Homeland Surveillance State" [06/09/13] Printer Friendly Version "Political rights are so easily taken for granted – until they’re threatened or curtailed by repressive laws. In the United States, they are usually most vulnerable when people are anxious about some outside threat. After World War II, for instance, dissent became risky as relations with Russia hardened into Cold War I. Hysteria about domestic Communist subversion led quickly to state and congressional investigations of “un-American activities.” And in 1951, a Supreme Court decision led to the imprisonment of eleven Communist leaders, not for any overt acts threatening national security, but rather for trying to organize a political party and teach Marxism. Today the threats to political liberty are no less imminent. The groundwork was actually laid when a proposal for a massive rewrite of the US criminal code became the Nixon administration’s blueprint for crushing dissent and savaging the Bill of Rights. After Watergate and FBI-CIA revelations, proposed charters for the intelligence community were exploited as springboards to legalize intrusive techniques. Meanwhile, the Supreme Court moved toward prior restraint of free speech. Prior restraint of the press became government policy in March 1979 when The Progressive magazine was prevented from publishing an article on the H-bomb. The ban succeeded for six months, on grounds that the 1954 Atomic Energy Act gave the government the right to suppress nuclear knowledge. Although the case was eventually dropped, the law may very well be used again. [...] Support from other publications was slow in coming, possibly because the case involved a small Wisconsin monthly rather than a daily giant like The New York Times’ publication of the Pentagon Papers. The press gag ended only when other researchers found and printed the same “secrets.” Even though the government dropped its case, it asserted that the section on violating national security secrets in the Atomic Energy Act would continue to be enforced, one of several “loaded pistols aimed at the First Amendment,” as writer Nat Hentoff put it. In February 1980, the Supreme Court ruled, in the case of ex-CIA agent Frank Snepp, that government agencies have the right to restrict publication of national security information – even if the material is unclassified – when the book or article has been produced by a government worker with access to “confidential sources.” The Court had effectively usurped the lawmaking powers of Congress and gone a long way toward enacting an American version of the British Official Secrets Act. In a letter to The New York Times, Harvard Law Professor Alan Dershowitz, who was working with Ted Kennedy at the time, said that an Official Secrets Act might not be needed since “we have one now.”[...]"  

Propaganda Theatre: "Government Likely To Open Criminal Probe Into NSA Leaks: Officials" [06/08/13] Printer Friendly Version "Obama's administration is likely to open a criminal investigation into the leaking of highly classified documents that revealed the secret surveillance of Americans' telephone and email traffic, U.S. officials said on Friday. The law enforcement and security officials, who were not authorized to speak publicly, said the agencies that normally conduct such investigations, including the FBI and Justice Department, were expecting a probe into the leaks to a British and an American newspaper. [...]" Related: "Senators Dismiss NSA Attack On Fourth Amendment" [5:42] "After The Guardian outed the NSA and its unprecedented violations of the Fourth Amendment, members of Congress took to the limelight to defend the government’s tyrannical behavior. San Francisco Democrat Dianne Feinstein led the pack. She said the massive intrusion into the private affairs of Americans minus court-issued warrants is on par with the TSA sticking its hand down the pants of travelers. “I read intelligence carefully, and I know that people are trying to get to us,” she said during a press conference following a super-secret Intelligence Committee meeting. “This is the reason why we keep TSA doing what it’s doing. This is the reason why the FBI now has 10,000 people doing intelligence on counterterrorism. This is the reason for the National Counterterrorism Center that’s been set up in the time we’ve been active. It’s to ferret this out before it happens. It’s called protecting America.” [...]"  Note: Feinstein defends the institutionalization of narcissistic paranoid psychopathy for purposes of manipulation and terrorization of the population. Psychopathy is a personality disorder that has been variously described as characterized by shallow emotions (in particular reduced fear), stress tolerance, lacking empathy, coldheartedness, lacking guilt, egocentricity, superficial character, manipulativeness, irresponsibility, impulsivity and antisocial behaviors such as parasitic lifestyle and criminality. Social roles which offer power and require an ability to make objective, clinical decisions divorced from feelings. Psychopaths are drawn to these roles and thrive there.| 

MSM: "Zuckerberg: PRISM Reports 'Outrageous'" [06/08/13] Printer Friendly Version "Mark Zuckerberg and Larry Page, the chief executive officiers of Facebook and Google, respectively, each issued strongly worded statements late Friday, denying any involvement in the so-called PRISM program. "I want to respond personally to the outrageous press reports about PRISM," Zuckerberg wrote in a public Facebook message that was liked 69,000 times in the 21 minutes after it was posted. "Facebook is not and has never been part of any program to give the US or any other government direct access to our servers." [...]"  

MSM: "Breakdown of Current "Lawlessness" of the Government" [06/08/13] [7:57] " Mark Levin talks to Neil Cavuto: "We have the elements of a Police State here" [...]"  

MSM: "Obama Defends NSA Spying Program"[06/08/13] Printer Friendly Version "Obama has defended the collection of data from phone calls and internet accounts by the National Security Agency (NSA) as “legal and necessary to combat terror.” [...]"  Related: "White House Invokes ‘State Privilege’ To Halt Inquiries Into Data Mining" Printer Friendly Version "Officials use little-known ‘military and state secrets privilege’ as civil rights lawyers attempt to hold administration to account. The Obama administration is invoking an obscure legal privilege to avoid judicial scrutiny of its secret collection of the communications of potentially millions of Americans. Civil liberties lawyers trying to hold the administration to account through the courts for its surveillance of phone calls and emails of American citizens have been repeatedly stymied by the government’s recourse to the “military and state secrets privilege”. The precedent, rarely used but devastating in its legal impact, allows the government to claim that it cannot be submitted to judicial oversight because to do so it would have to compromise national security. The government has cited the privilege in two active lawsuits being heard by a federal court in the northern district of California – Virginia v Barack Obama et al, and Carolyn Jewel v the National Security Agency. In both cases, the Obama administration has called for the cases to be dismissed on the grounds that the government’s secret activities must remain secret. The claim comes amid a billowing furore over US surveillance on the mass communications of Americans following disclosures by the Guardian of a massive NSA monitoring programme of Verizon phone records and internet communications. The director of national intelligence, James Clapper, has written in court filings that “after careful and actual personal consideration of the matter, based upon my own knowledge and information obtained in the course of my official duties, I have determined that the disclosure of certain information would cause exceptionally grave damage to the national security of the United States. Thus, as to this information, I formally assert the state secrets privilege.” [...]"  

Commentary: "Petraeus to Push Orwellian Spy Grid Nightmare at Bilderberg" Alex Jones [06/08/13] [42:13] "Former CIA director helping to bolster same surveillance system that brought him down [...]"  

Commentary: "Anonymous Releases NSA Docs Related to Global Spy Network" [06/07/13] Printer Friendly Version "Amid the explosive back-to-back revelations made by the Guardian and Washington Post regarding a pair of National Security Agency surveillance programs this week, the hacktivist group Anonymous on Friday released what they claim are additional NSA documents that both deepen and expand on those earlier revelations. The thirteen documents were posted in a list and included as a digital index, reproduced below: (links) [...]"  

Commentary: "NSA Access Built Into Windows For MS Internet Explorer Interface" [06/07/13] Printer Friendly Version " A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled  [...]The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA. Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer. ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run cryptographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do. [...] Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery. A second key: Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. [...]" Note: Interesting article ... I don't use IE in any capacity, and haven't for many years.

Flashback: "Export Version Of Lotus Notes Provides Trapdoor For NSA" [06/07/13] Printer Friendly Version "Giant US software manufacturer Lotus has been lowering the profile of information about how they have installed an NSA-only trapdoor into e-mail and conference systems used by many European governments, including the German Ministry of Defence, the French Ministry of Education and Research and the Ministry of Education in Latvia. [...]"  

MSM: "Intelligence Chief Defends PRISM Program: Says It Cannot Be Used To 'Intentionally' Target Any US Citizen" [06/07/13] Printer Friendly Version "The Director of National Intelligence defended the Obama administration from reports that the National Security Agency mined data from major Internet companies, releasing a statement saying it is necessary for national security interests and does not target U.S. citizens. James Clapper said that the intelligence collected in the program is "among the most important and valuable foreign intelligence information we collect." He was responding to reports in The Guardian and The Washington Post detailing the program, which until now had been secret. The program, dubbed "PRISM," was revealed by a whistleblower who was reportedly "horrified" at its capabilities. Clapper's full statement: [...]"  

MSM: "NSA Building $860 Million Data Center in Maryland" [06/07/13] Printer Friendly Version "As its current data collection makes headlines, the National Security Agency is continuing to expand its data storage and processing capabilities. The agency recently broke ground on an $860 million data center at Fort Meade, Maryland that will span more than 600,000 square feet, including 70,000 square feet of technical space. Last month the NSA and the U.S. Army Corps of Engineers began building the High Performance Computing Center-2, an NSA-run facility that will be located on base at Fort Meade, which is home to much of the agency’s existing data center operations. The data center will be supported by 60 megawatts of power capacity, and will use both air-cooled and liquid-cooled equipment. The NSA is already building a massive data center in Utah, investing up to $1.5 billion in a project that will feature up to 1 million square feet of facilities. [...]"  The construction at Fort Meade will see investment of $400 million in fiscal 2013 and $431 million in fiscal 2014. Up to 6,000 workers will be involved in the construction and development phase, the NSA said. Scheduled for completion in 2016, the center’s mission will be to protect national security networks and providing U.S. authorities with intelligence and warnings about cyber threats.  [...]" Note: All of this will never see the light of day ... they're out of time.

Commentary: "Patriot Act Author Jim Sensenbrenner "Disturbed" By NSA's Collection Of Verizon Phone Records" [06/07/13] Printer Friendly Version "Rep. Jim Sensenbrenner (R-Wisc.) introduced the Patriot Act in October of 2001. Today, he sent a letter to Attorney General Eric Holder saying that initial reports about the National Security Administration's request for Verizon phone records are "disturbing," and "not consistent with the requirements of the Patriot Act."  Take a minute to let that sink in. “As the author of the Patriot Act, I am extremely troubled by the FBI’s interpretation of this legislation. While I believe the Patriot Act appropriately balanced national security concerns and civil rights, I have always worried about potential abuses," Sensenbrenner said in a statement released in conjunction with the release of his letter to Holder. Last year, Sensenbrenner became apoplectic when Democrats who wanted to hold a hearing on the Patriot Act invoked a little-known rule that required him to let them have one. “Naturally, he scheduled it for something like 9 a.m. on a Friday when Congress wasn’t in session, hoping that no one would show,” recalls a Democratic staffer who attended the hearing. “But we got a pretty good turnout anyway.” Sensenbrenner kept trying to gavel the hearing to a close, but Democrats again pointed to the rules, which said they had a certain amount of time to examine their witnesses. When they refused to stop the proceedings, the chairman did something unprecedented: He simply picked up his gavel and walked out…[...]"  Related: "U.S. Intelligence Mining Data From Nine U.S. Internet Companies In Broad Secret Program" 5 pages "The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time. The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who knew about PRISM were bound by oaths of office to hold their tongues. Apple, Facebook, Microsoft and Google have all denied involvement in the PRISM program.[...]" "Classified Docs Show Vast, Real-Time, Warrantless NSA Online Surveillance" Printer Friendly Version  [3:36] 

Commentary: "Americans Searched On A Hunch? DHS Reaffirms Broad Power" [06/06/13] Printer Friendly Version "The Department of Homeland Security has reaffirmed their belief that they have the power to conduct unwarranted electronic surveillance on American citizens returning to the country, based on nothing more than a hunch. The data taken from electronic devices such as smartphones and laptops can then be copied and saved by homeland security. Despite widespread outrage from civil liberties groups such as the ACLU, Homeland Security’s own internal study shows that they plan to continue the practice and are using scary words such as terrorism and child pornography to justify it. A recent report by a local CBS affiliate in Washington D.C. outlined the study: [...] The study then goes on to ludicrously claim that if border agents were not allowed to search anyone they chose based off of a personal hunch then they would be handicapped in doing their job due to searches conducted needing to be able to be formally defended. In other words, agents simply cannot hassle themselves with worry about the Constitutional rights of American citizens."  

MSM: "FBI Pushes For Wiretap-Friendly Internet" [06/06/13]   [1:31] "A new wiretap bill backed by the FBI has many Internet companies concerned that this new proposed legislation will open the floodgates to all Internet communication. The new motion will expand wiretapping designs significantly and includes the ability for law enforcement to gain access to emails and features like video chats. RT's Meghan Lopez has more. [...]" 

Commentary: "Google Gestapo Coming to a City Near You" [06/02/13] [1:14] "Lithunia, Greece and various parts of Europe are experiencing the pressure of the Google Gestapo as they drive across countries in their spy-mobiles. Google Street View service has partnered up with local tax authorities, and together they are draining the pockets of residents as they turn people against each other and into citizen spies. The Lithuanian Tax office has gone as far as creating their own iPhone app so residents can upload information about their neighbors. “We were very impressed,” said Modestas Kaseliauskas, Lithuanian State Tax Inspectorate. “We realized that we could do more with less and in shorter time.” Hundreds of thousands of dollars are being collected out of an already cash-strapped European public. Last year over 2,500 people reported citizens that they thought might be tax evaders. Gives a whole new meaning to “see something, say something.” [...]" 

MSM: "Homeland Security Funded Exercise Portrayed Homeschoolers as Terrorists" [06/02/13] [0:45] "Taken on its own, the KOMO 4 News report below out of Seattle paints a stark and frightening picture of police battling "angry parents" in a simulated shooting at a school. The practice of police training to take on everything from homeschoolers to patriots and constitutionalists -- "rightwing extremists" in government parlance -- is anything but a rarity. Such exercises are now a prominent feature of the expanding police state. [...]" 

Commentary: "DHS Wastes Billions In The So-Called “Fight Against Terrorism" [06/02/13] Printer Friendly Version "Following the terrorist attacks of September 11, 2001 Congress passed legislation that created the Department of Homeland Security (DHS). Its mission was simple to protect the United States from any future terrorist attacks. It now employs over 240,000 people to carry out five core security missions. Number one is to prevent terrorism and enhance security. This is closely followed by managing US borders and administering immigration law to safeguarding cyberspace and ensuring resilience to natural disasters. The Department of Homeland Security has become the third largest Federal department bringing together 22 different Federal agencies and has a huge billion dollar budget. Recent events have cast shadows over the Department of Homeland Security and suggest that the third largest Federal department is not fit for purpose. One large shadow over the DHS is the damning report issued by Senator Tom Coburn in December 2012 Safety At Any Price: Assessing the Impact of Homeland Security Spending in US Cities. Dr. Coburn conducted a year-long investigation into how the DHS spends its billion dollar budget. It is a devastating indictment of the organization's leadership. The 55-page report issued by Senator Coburn goes into forensic detail of how the DHS has spent over $35 billion of taxpayers' money over the last ten years. His report pulls no punches. In his introduction Senator Coburn informs the tax payer: [...]  Audits carried out by the DHS Inspector General reveal ''serious shortcomings'' about the way grants have been spent. The report questions how many of the acquisitions made by towns and cities have contributed in any way to combating the 'threat of terrorism'. The spending spree has led many cities to purchase military assets often used in war zones such as unmanned aerial drones and armored cars. When officials in Carlsbad, California proposed buying a BearCat armored car one resident observed: What we're really talking about here is a tank, and if we’re at the point where every small community needs a tank for protection, we’re in a lot more trouble as a state than I thought.[...]"   

MSM: "Britons March To Slam Far-Right Racism" [06/02/13] Printer Friendly Version "Britons from various faiths have turned their back on racism foiling a far right bid to exploit the murder of an off-duty soldier last week in Woolwich, southeast London, the Sunday People reports. [...]"  

UK: "Snooper's Charter Is Threat To Internet Freedom, Warn Web Five" [06/01/13] Printer Friendly Version "The five biggest internet companies in the world, including Google and Facebook, have privately delivered a thinly veiled warning to the home secretary, Theresa May, that they will not voluntarily co-operate with the "snooper's charter". In a leaked letter to the home secretary that is also signed by Twitter, Microsoft and Yahoo!, the web's "big five" say that May's rewritten proposals to track everybody's email, internet and social media use remain "expensive to implement and highly contentious". [...]"  

MSM: "Woolwich Attack Is Unprecedented Test For MI5 Oversight Body" [05/30/13] Printer Friendly Version "The brutal killing of Drummer Lee Rigby presents the parliamentary body responsible for holding MI5 to account — the Intelligence and Security Committee — with its biggest test yet. Its credibility is at stake. Its members are appointed by the prime minister, vetted, and sign a declaration saying they are bound by the terms of the Official Secrets Act. They are firmly within what Whitehall calls the "ring of secrecy". The committee is chaired by the former Conservative defence and foreign secretary, Sir Malcolm Rifkind. He is well aware, as he made clear in an article in the Guardian earlier this year, that MI5 prevented the committee from seeing the evidence it needed on the 7/7 London underground bombings in 2005 and its involvement in the secret US rendering of terror suspects, including British citizens and residents. The committee has not inspired confidence in the past. As Rifkind put it, "the independence on which its ability to reassure the public rested was seriously compromised". He has persuaded the government to increase the ISC powers. Instead of merely "requesting" documents and information, it is can now require MI5 (and MI6 and GCHQ) to provide them. It is entitled to examine their files, and investigate operations, he said. Rifkind indicated on Tuesday that the new head of MI5, Andrew Parker, has assured him that he wants to "fully cooperate" with the ISC. The 2013 Justice and Security Act, says any particular investigation carried out by the ISC into MI5 operations would be "limited to the consideration of information provided voluntarily to the ISC ". However, this relates only to current operations. The ISC now has a free hand in investigating MI5 operations retrospectively. [...]" Related: "The Enemy Is Everywhere"': Former MI5 Head Calls For People To Spy On Their Neighbours Following Murder Of Soldier" Printer Friendly Version 

MSM: "‘See Something, Say Something’: DHS Pushes Fear on Indy 500" [05/28/13] [3:00] "Homeland Security is quickly taking over all major sporting events. [...]" 

MSM: "Woolwich Fallout: MI6 Recruited UK Terror Clerics Omar Bakri And Abu Hamza As Early As 1996" [05/27/13] Printer Friendly Version "...According to the former MI6 officer Alastair Crooke, the Saudis, in pursuit of benefiting mutual US-Saudi interests, have played the role of proxy to the Americans, mobilising Islamist extremists to destabilise parts of the Middle East. [...]"   Related: "Saudi Arabia’s King Clinically Dead'" Printer Friendly Version "Saudi Arabia’s King Abdullah bin Abdulaziz is reported to be clinically dead as the monarch is not recently seen in the public. A Saudi journalist working for London-Based Asharq Alawsat says the Saudi monarch has been clinically dead since Wednesday.  [...]"  |"MI5 And The Woolwich Killers" Printer Friendly Version "The decision to arrest Abu Nusaybah at BBC headquarters suggests that Britain’s MI5 and Special Branch know a great deal more than they have admitted about the killers of Lee Rigby. [...]" "Woolwich Attack: Soldier’s ‘Killer’ In Dock On Terror Link Three Years Ago" Printer Friendly Version See below: False Flag Op: "British Ministers Call For Mass Government Snooping In Wake Of Woolwich Attack" [05/24/13]

MSM: "Suspicious Death Of Two FBI Agents Creates Controversy" [05/27/13] Printer Friendly Version "The FBI said in a statement that 41-year-old Christopher Lorek and 40-year-old Stephen Shaw were killed on May 17 as they fell out of a helicopter into water during a training mission off the coast of Virginia Beach. US officials have blamed bad weather for the tragedy but some have questioned the credibility of the official account, considering it a cover-up. They say the agents’ death adds to the suspicious death of a friend of the Boston bombing suspect, Ibragim Todashev, who was killed in his own apartment by an FBI agent. Lorek and Shaw were part of the bureau's Critical Incident Response Group and were both member of the team investigating the Boston Marathon bombings in mid-April. “You could always take it as one of an endless group of coincidences. We have so many [of them], when you look at the Boston investigation that these two individuals were involved in, everything had the stamp of CIA and FBI on it, from the first steps,” Gordon Duff, senior editor of Veterans Today, told Press TV. [...]" Related: 2 FBI Agents Involved in Dzhokar Tsarnaev's Arrest "Fall" Out of Helicopter and Die" [05/24/13] Printer Friendly Version "The statement gave few details regarding the deaths of Special Agents Christopher Lorek and Stephen Shaw, other than to say the helicopter encountered unspecified difficulties [...]"

MSM: "U.S. Spy Device ‘Tested on NZ Public’" [05/27/13] Printer Friendly Version "A high-tech United States surveillance tool which sweeps up all communications without a warrant was sent to New Zealand for testing on the public, according to an espionage expert. The tool was called ThinThread and it worked by automatically intercepting phone, email and internet information. ThinThread was highly valued by those who created it because it could handle massive amounts of intercepted information. It then used snippets of data to automatically build a detailed picture of targets, their contacts and their habits for the spy organisation using it. Those organisations were likely to include the Government Communications Security Bureau (GCSB) after Washington, DC-based author Tim Shorrock revealed ThinThread was sent to New Zealand for testing in 2000-2001. [...]" 

Commentary: "Is DHS Preparing For False Flag Attack On American Shopping Malls?" [05/25/13] Printer Friendly Version "In Virginia and Indiana, Simon Property, owner of 393 properties worldwide, including the Town Center at Aurora (the shopping mall located near the Century 16 Theater in Colorado where the Batman shooting took place) will partner with DHS and Janet Napolitano to participate in the See Something, Say Something campaign which turns average American citizens into Stasi. New participants in the DHS surveillance campaign are representatives from Major League Baseball, Major League Soccer, National Basketball Association, National Hockey League, and National Football League. According to Napolitano , “We’re all safer when everyone is alert and engaged” and she wants the American public to spy on each other because our continued safety is “a shared responsibility”. With the assistance of Simon malls, tenants and employees of tenants will be encouraged with the use of the Delphi technique into spying and reporting “suspicious behavior” displayed by fellow employees and patrons. Napolitano says that the DHS will expand their Stasi into every city, state, university, private business, transportation depot, and hotel/motel and retail stores by brainwashing the public into believing that spying for the US government is being a patriot. [...] Reported last month in mainstream media was the premise that the DHS had 'reason to believe' there was a reasonable supposition that radicalized extremists could threaten shopping malls. Federal and local law enforcement was on alert that Middle Eastern Islamic militants or rightwing extremists could and most likely would threaten a shopping mall to instill fear into the general public. The Southern Poverty Law Center who is sponsored by the FBI and the Zionist-controlled Anti-Defamation League both reported that militia groups in the US had risen to 824 and that there was an intensification of racist hatred by white supremacists in militia movements. Equating the patriot movement with radicalized extremists in the mainstream media effectively blurs the line between government-sponsored terrorism and support for our Constitutional Republic." 

UK: "Britain’s Eton College Asks Teenage Candidates To Justify Shooting Protesters" [05/25/13] Printer Friendly Version "UK’s elite school asked 13-year old boys to pretend to be Prime Minister and justify the army shooting dead 25 protesters in a speech to win a scholarship it is revealed. The question, which was put to students applying for the King’s Scholarship, worth one tenth of Eton’s £32,000 a year fees, is entitled “Concerning Cruelty, Clemency and Whether It Is better To Be Loved than Feared”, and follows a passage from Machiavelli. “The year is 2040. There have been riots in the streets of London after Britain has run out of petrol because of an oil crisis in the Middle East. Protesters have attacked public buildings. Several policemen have died. Consequently, the government has deployed the army to curb the protests. After two days the protests have stopped but 25 protestors have been killed by the army,” the question reads. Candidates are then asked to imagine that they were the Prime Minister and to write a speech for broadcast to the nation on why the decision to deploy the army against violent protests was both necessary and morally right. The paper was set in April 2011, just after the student riots in which the headquarters of the Conservative Party and the treasury were hit and, by coincidence, just before the August 2011 riots, which injured many and caused millions of pounds of damage. At the time David Cameron warned that the army might be deployed. The question caused uproar, with many taking to twitter to express their disagreement. Damian Walter tweeted sarcastically, “having been born into a council estate single parent family, I would never question the superiority of Eton boys with millionaire parents.” [...]"  

False Flag Op: "British Ministers Call For Mass Government Snooping In Wake Of Woolwich Attack" [05/24/13] Printer Friendly Version "Following the brutal murder of a young soldier in London, British politicians have called for the resurrection of a bill that was shelved last month that would see the creation of a dragnet surveillance database, allowing police and intelligence agencies to effectively monitor the communications of everyone in the country. The so-called “snoopers’ charter”, a proposed database of everyone’s internet and phone usage, was blocked last month by The Deputy Prime Minister, and Liberal Democrat leader, Nick Clegg, who cited “significant reduction in personal privacy”. However, Conservatives in government intentionally left the door open for a revival of the legislation. [...]"  Related: "Woolwich Attack 'Hard To Prevent'" Printer Friendly Version "Preventing the killing of Drummer Lee Rigby in Woolwich would have been "incredibly hard", MI6's former head of counter-terrorism says. [...]" |"Britain’s MI5 Agency Knows About Woolwich Suspects" Printer Friendly Version "Britain’s intelligence agency MI5 is facing tough questions over Woolwich attack, following the emergence of a photo of one of the suspects in a protest outside the Old Bailey in 2006. [...]"|"Woolrich London Killing: Terrorism Or False Flag?" Printer Friendly Version | "Woolwich: False Flag: Inside Job: Fake" Printer Friendly Version "... I know the busker who watched it all. "He said they put chalk marks on the ground where the actors, sorry terrorists, involved had to stand. "He said it was so obviously fake; the police threatened to beat him up unless he moved and kept his mouth shut." [...]"|"London’s False Flag Even More Pathetic Than The Boston Bombing" Printer Friendly Version  "Woolwich Attack: MI5 'Offered Job To Suspect'" Printer Friendly Version "MI5 asked Woolwich murder suspect Michael Adebolajo if he wanted to work for them about six months before the killing, a childhood friend has said. [...]" "Woolwich Attack: Soldier’s ‘Killer’ In Dock On Terror Link Three Years Ago" Printer Friendly Version 

MSM: "DHS To Install Infrared Sensors Along ‘Entire Border Of The United States’" [05/24/13] Printer Friendly Version "In a procurement document in which it disclosed its plans to purchase additional GS-100 Passive Infrared Sensors for use along the U.S.-Mexican border, U.S. Customs and Border Protection (CBP) indicated that the existing surveillance system that deploys these PIR sensors spans “the entire border of the United States.” That disclosure may constitute greater specificity about the widespread use of these infrared sensors, which can detect a pedestrian passing up to 100 feet away, than CBP has previously made public. In a procurement document in which it disclosed its plans to purchase additional GS-100 Passive Infrared Sensors for use along the U.S.-Mexican border, U.S. Customs and Border Protection (CBP) indicated that the existing surveillance system that deploys these PIR sensors spans “the entire border of the United States.” [...]"  

MSM: "Ibragim Todashev Killed By FBI During 5 Hour Interrogation" [05/24/13] Printer Friendly Version "The FBI had been following and harassing Ibragim Todashev and his friend Khusen Taramov. Then the FBI questioned them both for 3 hours, but they wanted to further question Todashev for an additional 2 hours, that would equal a 5 hour interrogation without a lawyer… but then they shot him to death, just as he was about to sign a confession to participating in a triple murder with Tamerlan Tsarnaev, but instead of signing the confession he decided to attack them with a knife — no, strike that — they now deny the knife attack happened. [...]"  Note: Somehow, people were led to believe he was seemingly never searched for weapons before the interrogation, and allegedly threatened an agent with a knife, and was shot. Related: "The Killing of Tamerlan Tsarnaev's Would-Be Accomplice Wasn't So Simple" Printer Friendly Version 

MSM: "U.S. Counter-Terrorism Apparatus Used To Quell Dissent Among Americans" [05/24/13] Printer Friendly Version "In the wake of the September 11, 2001, terrorist attacks and the creation of the Department of Homeland Security, the federal government organized “fusion centers” so that local and state police could communicate and share information with Washington in an effort to thwart future terrorist plots. But a new study says this unprecedented coordination of law enforcement has resulted in police spying on demonstrators and creating a chilling effect on dissent. Produced by the DBA Press and the Center for Media and Democracy, the report discusses numerous instances in which fusion centers monitored Occupy Wall Street activists across the country. “Heavily-funded municipal, county, state and federal ‘counter-terrorism’ agencies (often acting in concert through state/regional ‘fusion centers’) view citizens engaged in movements of political and social dissent, such as Occupy Wall Street, as nothing less than nascent, if not bona fide, ‘terrorist’ threats,” the report reads. The authors of the year-long study also say the “monitoring” and “suppression” of activists and dissident groups was often carried out “on behalf of, and in cooperation with, some of the nation’s largest financial and corporate interests—the very entities that the Occupy Wall Street (OWS) movement and others oppose as usurpers of American democracy.” [...]"  

MSM: "New Light Shed On US Government's Extraordinary Rendition Program" [05/23/13] Printer Friendly Version "A groundbreaking research project has mapped the US government's global kidnap and secret detention programme, shedding unprecedented light on one of the most controversial secret operations of recent years. The interactive online project – by two British universities and a legal charity – has uncovered new details of the way in which the so-called extraordinary rendition programme operated for years in the wake of the September 11 attacks, and the techniques used by the Central Intelligence Agency (CIA) to avoid detection in the face of growing public concern. The Rendition Project website is intended to serve as a research tool that not only collates all the publicly available data about the programme, but can continue to be updated as further information comes to light. Data already collated shows the full extent of the UK's logistical support for the programme: aircraft associated with rendition operations landed at British airports more than 1,600 times. [...]"  

Flashback: "Alex Abella: Inside The RAND Corporation " [05/23/13] [56:12] "Cuban-born journalist and author Alex Abella was allowed exclusive access inside the RAND Corporation to view their archives. What he discovered was a plot driven by mad scientists, behaviorists, and generals who were intent on starting world war three and fleecing the American people in the process. Once he was a skeptic on the subject of conspiracy theories and the new world order, but after his work with the RAND Corporation he is now convinced that this top secret think tank has been pulling the strings of American government for at least 60 years [...]"  Related: "Federalized Local Police Helped Arrest Adam Kokesh" Printer Friendly Version "... Calling for “the creation of a high-end police force,” known as a Stability Police Force, the Rand Corporation, in conjunction with the Department of Homeland Security, has been busy inserting special cadres of federal police officers in both state and city police departments, creating designated squads tasked to deal with, among other things, “a range of threats from insurgents to criminal organizations” and counter-terrorism operations. Furthermore, a flow chart illustrating the organization of the Philadelphia Police Department lists their Homeland Security Deputy Commissioner, Thomas Wright, as overseeing specialized units trained in dealing with domestic preparedness and response, such as counter-terrorism operations, and, ambiguously, “civil affairs.” [...]"  

MSM: "CALEA II: FBI Wants Backdoors In Secure Communications Tools" [05/22/13] Printer Friendly Version "A group of twenty computer scientists issued a report criticizing an FBI plan to require makers of secure communication tools to redesign their systems to make wiretapping easy. They argue that the plan would endanger the security of U.S. users and the competitiveness of U.S. companies, without making it much harder for criminals to evade wiretaps. The FBI argues that the Net is “going dark”—that they are losing their ability to carry out valid wiretap warrants. In fact, this seems to be a golden age of surveillance—more collectable communications are available than ever before, including whole new categories of information such as detailed location tracking. Regardless, the FBI wants Congress to require that voice, video, and text communication tools be (re-)designed so that lawful wiretap orders can be executed quickly and silently. [...]"  

Commentary: "CIA Blocks Release of 'Bin Laden ' Photos Signifying ' Bin Laden' Killing Likely Never Took Place" [05/22/13] Printer Friendly Version "If you look back on the whole thing it does seem kind of odd. The whole Bin Laden raid thing. The Bin Laden raid that was conducted by SEAL Team 6, one of the most elite special forces groups on the entire planet. The one where some highly trained hero dog tagged along, garnering the hearts and minds of the American public. The one that later left every member of SEAL Team 6 dead. The one that has the US government now withholding photos, against FIOA requests, that likely don’t even exist. Actually, if you actually think it through, the official story was a cover, as no photos or body will ever be revealed. This raises questions from several angles. One being, Why would a 'war criminal' and known 'diabolic terrorist', get a proper military burial at sea, unless he was officially on the militaries payroll? It also begs the question. Why would the US military go to such an extent to hide the body so abruptly after the alleged incident? [...] The same week the 'Bin Laden raid' took place, the authenticity of President’s birth certificate was questioned publicly causing a firestorm of negative press. The fire needed to be contained. "    Note: All this aside from the fact that Bin Laden died many years ago, in 2001 - it was announced in the Pakistani press, as I recall. Related: Even Noam Chomsky believes the fabricated Seal Team scenario spun by Obama, although he has some reasonable and interesting things to say about the state of mind that prevails at this time with the people prosecuting war and terror: "War, Imperialism, and Propaganda" [26:12] "On this episode of Breaking the Set, Abby Martin talks to Dr. Noam Chomsky, philosopher, linguist, professor, political critic, and author of over 100 books, about the Boston bombings, US terror inflicted abroad, drones (terror weapons), Obama's re-branding of Bush administration policies, the National Defense Authorization Act & Holder v. Humanitarian Law, conventional wisdom, the evolution of media propaganda, and education as a form of elite indoctrination.[...]" 

MSM: "Obama War Powers Under 2001 Law ‘Astoundingly Disturbing,’ Senators Say" [05/18/13] Printer Friendly Version 2 "This is the most astounding and most astoundingly disturbing hearing that I've been to since I've been here. You guys have essentially rewritten the Constitution today," Sen. Angus King (I-Maine) told four senior U.S. military officials who testified about the 2001 Authorization to Use Military Force and what it allows the White House to do. King and others were stunned by answers to specific questions about where President Barack Obama could use force under the key provision of the AUMF -- a 60-word paragraph that targeted those responsible for the 9/11 attacks. "I learned more in this hearing about the scope of the AUMF than in all of my study in the last four or five years," said Harvard Law professor Jack Goldsmith, who was called by the committee to offer independent comments on the issue. "I thought I knew what the application [of the AUMF] meant, but I'm less confident now," he added later. Concerns emerged largely from questions by senators who approve of an aggressive strategy to combat terrorism, including Sen. Lindsey Graham (R-S.C.), who asked if the AUMF gave Obama the authority to put "boots on the ground" in Yemen or the Congo. [...]" Related: "Congress Rethinks 9/11 Law On Military Force"Printer Friendly Version "This authority ... has grown way out of proportions and is no longer applicable to the conditions that prevailed, that motivated the United States Congress to pass the authorization for the use of military force that we did in 2001," Sen. John McCain, R-Ariz., said during a Senate hearing. He told Pentagon officials that "basically you've got carte blanche as to what you are doing throughout the world." Michael Sheehan, assistant secretary of defense for special operations and low-intensity conflict, told the Senate Armed Services Committee that for the war against al-Qaida, the Taliban and other terrorist groups, the 2001 Authorization for the Use of Military Force "serves its purpose." "I believe that al-Qaida, although its narrative ... is very powerful among certain groups. Ultimately it will end up on the ash heap of history, as with other groups ... but that day, unfortunately, is a long way off," Sheehan said. [...]" [Cross-Posted]

Commentary: "Insider at OKC Airport Shares Shocking Info on Alleged TSA Abuses" [05/17/13] Printer Friendly Version "Officially known as the Transportation Safety Administration, this intrusive, abusive and infuriating agency, which, to date, has not caught one terrorist, is better at angering Americans more than protecting them. According to a 2012 report in Human Events, the TSA costs the American economy billions in lost business, both here and abroad. Foreigners don’t like coming here because they find American airports unfriendly and, The Wall Street Journal, in 2011, called the last decade “America’s Lost Decade of Tourism,” no thanks to the bullying thugs at the TSA. Think about this: the US Travel Association reports that two-out-of-five travelers are boycotting airports in favor of trains, cars and other forms of transportation. These people refuse to endure the indignity of being groped, manhandled, felt-up, robbed or even raped, as we have seen in recent years. And if you think the TSA is going to remain solely at America’s airports, think again. They are covertly setting their sights on our highways and railways as well. And Congress? They look the other way as they award TSA more and more money, currently costing taxpayers $1.2 billion annually. We say all this to remind (and who really needs reminding?) that the TSA is not cleaning up their act, despite all the happy talk and promises to “do better.” They don’t do better. The same class of sociopathic imbeciles who can barely fit into their polyester uniforms are still on the same power trips that they were on when the devilish TSA was first created. Bringing things closer to home, Red Dirt Report (which has had a number of bizarre encounters with these “agents” of Uncle Sam) recently spoke to a whistleblower who used to work at Will Rogers World Airport here in Oklahoma City. [...]"  

Commentary: "CIA-Connected SAIC Awarded Government “Cyber Security” Contract" [05/17/13] Printer Friendly Version "The police state brain trust – connected at the hip to the CIA – has merged with Homeland Security. “Science Applications International Corp. is joining the roster of companies involved in a program to protect U.S. infrastructure against cyber threats,” the UPI reports today. “SAIC said it has signed a memorandum of agreement with Homeland Security on joining the initiative. Northrop Grumman announced its participation earlier this week and that it is starting the security accreditation process which is required for the Homeland Security program.” “SAIC… is the invisible hand behind a huge portion of the national security state – the one sector of the government whose funds are limitless and whose continued growth is assured every time a politician utters the word ‘terrorism,’” Donald L. Barlett and James B. Steele wrote for Vantiy Fair in 2007. [...]"  

MSM: "May 10, Israel Ambassador: "Terrorism is a Growth Industry" [05/16/13] Printer Friendly Version "Terrorism can strike anywhere at any time. It is a growth industry working around the clock to expand into new markets. Its mission is to undermine democracies and its vision is instilling fear through violence. It takes an industry to defeat an industry. Terrorism can only effectively be confronted through international cooperation. [...]" Related: "Israel’s Narrative of Control"   [4:52] | See below: "Israel's International Institute for Counter-Terrorism" [05/13/13] for the expansion of the counter-terrorism industry in Israel, a country that specializes in terrorism. Who would speak of terrorism as an expanding market, but someone who needs terrorism to continue? 

Commentary: "Boston Pretext: Pentagon Unilaterally Grants Itself Authority Over ‘Civil Disturbances’" [05/15/13] Printer Friendly Version " ... By making a few subtle changes to a regulation in the U.S. Code titled “Defense Support of Civilian Law Enforcement Agencies” the military has quietly granted itself the ability to police the streets without obtaining prior local or state consent, upending a precedent that has been in place for more than two centuries. A defense official who declined to be named takes a different view of the rule, claiming, “The authorization has been around over 100 years; it’s not a new authority. It’s been there but it hasn’t been exercised. This is a carryover of domestic policy.” Moreover, he insists the Pentagon doesn’t “want to get involved in civilian law enforcement. It’s one of those red lines that the military hasn’t signed up for.” Nevertheless, he says, “every person in the military swears an oath of allegiance to the Constitution of the United States to defend that Constitution against all enemies foreign and domestic.” One of the more disturbing aspects of the new procedures that govern military command on the ground in the event of a civil disturbance relates to authority. Not only does it fail to define what circumstances would be so severe that the president’s authorization is “impossible,” it grants full presidential authority to “Federal military commanders.” According to the defense official, a commander is defined as follows: “Somebody who’s in the position of command, has the title commander. And most of the time they are centrally selected by a board, they’ve gone through additional schooling to exercise command authority.” As it is written, this “commander” has the same power to authorize military force as the president in the event the president is somehow unable to access a telephone. (The rule doesn’t address the statutory chain of authority that already exists in the event a sitting president is unavailable.) In doing so, this commander must exercise judgment in determining what constitutes, “wanton destruction of property,” “adequate protection for Federal property,” “domestic violence,” or “conspiracy that hinders the execution of State or Federal law,” as these are the circumstances that might be considered an “emergency.” “These phrases don’t have any legal meaning,” says Afran. “It’s no different than the emergency powers clause in the Weimar constitution [of the German Reich]. It’s a grant of emergency power to the military to rule over parts of the country at their own discretion.” [...]"  

MSM: "Ground Broken On $3.4 Billion Homeland Security Complex At Site Of Former Insane Asylum" [05/14/13] Printer Friendly Version "The site today has the appearance of a sprawling college campus — although one stuck in time. Established by Congress in 1855 as the Government Hospital for the Insane and later renamed St. Elizabeths, the campus has 62 buildings built between the 1850s and 1940. The federal government plans to preserve 52 of the historic buildings, which are in varying stages of decay. [...]"  Note: Imagine the astral entities which congregate in this area ... if life went on and the DSH HQ were built, it wouldn't be a 'former' insane asylum for long.

MSM: "Saudi Arabian Traveler Arrested With Pressure Cooker at Detroit Airport" [05/14/13] Printer Friendly Version "A traveler from Saudian Arabia was reportedly arrested after arriving at Detroit Metropolitan Airport with a pressure cooker. On Saturday, Hussain Al Kwawahir, who flew from Saudi Arabia through Amsterdam, allegedly told authorities that he was in the U.S. to visit his nephew who attends the University of Toledo. But The Detroit News also claims that he will be arraigned on Monday in federal court for purportedly lying to a Customs and Border Protection Agent about the pressure cooker and for allegedly using an altered passport. [...]"  Note: Security at the airport in Amsterdam is controlled by an Israeli company.

Video Short: "New Suspicious Characters and Media Actors at Boston Bombing" [05/13/13] [9:08] "This is the best video so far of new suspicious characters and media actors at the Boston Marathon bombing. [...]" 

Commentary: "False Flag Theater: Boston Bombing Involves Clearly Staged Carnage" [05/13/13] Printer Friendly Version Note: Look at the pictures. You can clearly see very red fake blood all over the place, and the war-amputee volunteer (later praised for being a 'victim' in order to cement the deception) laying calmly on the ground fitted with prosthetics simulating blown off lower extremities (the bones protruding from the prosthetics are clearly too long to match a normal upper leg) ... all a show and tell before the mainstream media was allowed to take pictures.

Propaganda Theatre: "Israel's International Institute for Counter-Terrorism" [05/13/13] [4:26] "Leading academic institute for counter-terrorism in the world, facilitating international cooperation in the ' global struggle against terrorism'. [...]"  Related: "ICT Website" "Israel 'Security' Biz Salivating Over Biometric Industry Bonanza" "We'll Tell You Who You Are [...]" Hypocrisies: "Israel Was Born Out Of Jewish Terrorism" [2:32] "Gerald Kaufman telling it like it is in Parliament [...]" | "NATO and the US Use Terrorism to Force Regime Change in Syria" Printer Friendly Version "The UN has ignored Fasil Mukdad’s statements that the rebels who are fighting against Bashar al-Assad were “criminals and drug dealers.”Mukdad says it was those rebels who “escalated the attacks” and the Syria has a right to defend itself. Mukdad blames the US government and France for thwarting peace plans; referring to French foreign minister Alain Juppe’s comment “calling for war”. He says, “This is what the West wants – extremist and al-Qaeda forces controlling the whole region.” [...]"  

Video clip: "DHS Grilled Over Why They Aren't Using Simulators Instead Of Live Ammo" [05/08/13] [17:00] "Oversight Committee Investigates Conpsiracy Rumours regarding why DHS Requires so much ammo and asked why aren't they using Simulators instead of huge purchases of Live ammo. [...]"   Related: "Reality Check: Congress And GAO Now Investigating DHS Ammo Stockpiling" [3:51] "For months now, the Internet has been buzzing with rumors of massive ammo buys by the U.S. government. Now, some members of Congress have taken notice and have begun holding hearings about just how much ammo is being bought and for what purpose. [...]"  

Commentary: "Post-Boston: Now You Have to Prove You’re Not a Terrorist" [05/06/13] Printer Friendly Version "...“The greatest mystery in life is the human mind. We don’t know what other people do until it becomes known. Our job is to figure it out, but we need indicators to know something’s not right,” says Sgt. Ed Mullins of the New York Police Department, who is also president of the Sergeants Benevolent Association, the city’s second-largest police union. Using a zero tolerance approach to track domestic terrorists online is the only reasonable way to analyze online threats these days, especially after the Boston Marathon bombing and news that the suspects had subsequently planned to target Times Square in Manhattan, Mullins says. The way law enforcement agencies approach online activity that appears sinister is this: “If you’re not a terrorist, if you’re not a threat, prove it," he says. “This is the price you pay to live in free society right now. It’s just the way it is,” Mullins adds. That method can result in arrests of teenagers whose online activity may be more aptly characterized as stupid pranks. [...]"  Note: Stupid sequential ...

Commentary: "Ex-FBI Counterterrorism Agent Says US Surveillance State Beyond Our Imagination" [05/06/13] Printer Friendly Version "The real capabilities and behavior of the US surveillance state are almost entirely unknown to the American public because, like most things of significance done by the US government, it operates behind an impenetrable wall of secrecy. But a seemingly spontaneous admission this week by a former FBI counterterrorism agent provides a rather startling acknowledgment of just how vast and invasive these surveillance activities are.  [...] Over the past couple days, cable news tabloid shows such as CNN’s Out Front with Erin Burnett have been excitingly focused on the possible involvement in the Boston Marathon attack of Katherine Russell, the 24-year-old American widow of the deceased suspect, Tamerlan Tsarnaev. As part of their relentless stream of leaks uncritically disseminated by our Adversarial Press Corps, anonymous government officials are claiming that they are now focused on telephone calls between Russell and Tsarnaev that took place both before and after the attack to determine if she had prior knowledge of the plot or participated in any way. On Wednesday night, Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could: [...]"  

Interviews: "DHS Whistleblower Censored From 60 Minutes" [05/05/13] [19:13] "Julia is a former Customs and Border Protection Officer who was branded a "Domestic Terrorist" for exposing glaring shortcomings within the U.S. national security establishment. The Federal Government threw the full might of the Patriot Act at her, all for doing her job. [...]"  Related: "Interviews: Julia Davis: Top Priority - The Terror Within" [108:00] 

Commentary: "Mapping The Tsarnaev Brothers" [05/03/13] Printer Friendly Version "... There are no real terrorists of any consequence that are not run by the US, Israel, Her Majesty’s Jewish Government and the Saudi royal family. A neglected aspect of history is the Jewish origins of the Saudi royals who were made kings by the British government. Sabbatai Zevi who was born in 1626 in the Ottoman Empire, claimed to be the Jewish messiah. About half of all Jewish people in the world accepted him as the Messiah despite his almost satanic views. He converted to Islam and formed his own Islamic sect called the Donmeh which eventually took over the Turkish government. They have been linked to the Armenian genocide of 1915-1923. The Saudi royal family were Jewish converts to Islam. They put their support behind the most extreme form of Islam imaginable, the Wahhabis. This Wahhabi sect of Islam is the only one that requires women to wear veils. It is from this radical sect that the terrorists of Al Qaeda are recruited. Al Qaeda means base. The late British Foreign Minister Robin Cook told us in an editorial in the Guardian newspaper before his suspicious death that Al Qaeda was a database of Muslims willing to work for MI6 and the CIA. It was created by Zbigniew Brzezinski during the Carter administration in order to provoke the Soviet Union into invading Afghanistan. Brzezinski also began funding the Chechnyan rebels in the Soviet Union and now Russia. One key element was the promotion of the Saudi Wahhabi sect on Russian territory. This same sect is also promoted in Pakistan to inspire a murderous campaign of bombings and assassinations against Shi’ite Muslims. This has been combined with the frequent drone attacks against the people of Waziristan on northwest Pakistan. All of this support of terrorism and use of drones is part of the Strategy of Tension. The idea is to destabilize the region at a low cost to us and to deny the area to normal commercial development by China, Russia and the people of the region [...]" Related: "Saudi Arabia To Raze Mohammed’s Tomb To Build Larger Mosque" Printer Friendly Version "... Dr. Irfan Al Alawi of the Islamic Heritage Research Foundation: "Mecca is a holy sanctuary as stated in the Quran. It is no ordinary city. The Muslims remain silent against the Saudi Wahhabi destruction because they fear they will not be allowed to visit the Kingdom again,” The fact that there is no reaction on possible destruction has raised talks about hypocrisy because Muslims are turning a blind eye to that their faith people are going to ruin sacred sites. “Some of the Sunni channels based in the United Kingdom are influenced by Saudi petro dollars and dare not to speak against the destruction, but yet are one of the first to condemn the movie made by non Muslims,” Dr. Al Alawi said. [...]" | "Saudis Rally To Condemn Regime Brutality" Printer Friendly Version "Saudi activists have staged a demonstration to voice their anger at the Al Saud regime’s violent crackdown on peaceful protesters in the kingdom’s Eastern Province. [...]" 

Commentary: "Obama Hails Police Lockdown, Covers Up State Role In Boston Bombings" [05/03/13] Printer Friendly Version "At a White House press conference Tuesday, President Barack Obama praised the April 19 police-military lockdown of metropolitan Boston and dismissed questions regarding links between the suspected Boston Marathon bombers and US intelligence and police agencies. He went on to repeat the increasingly discredited official line that the alleged bombers had been “self-radicalized” and acted alone. [...]"  

Commentary: "Exploit Can Turn Google Glass Into Secret Surveillance Device" [05/02/13] Printer Friendly Version "A hacker has proven that Google Glass can be turned into a secret surveillance device by anyone with physical access to the device, according to a report. Oddly enough, even former Secretary of the Department of Homeland Security Michael Chertoff has come out against the technology. It’s quite odd to see the likes of Michael Chertoff – the man who made tons of money off of the TSA’s naked body scanners – coming out against the technology as he did in a recent opinion piece, especially based on privacy concerns. The already quite noteworthy privacy concerns surrounding Google Glass were increased exponentially today with an Ars Technica report stating, “A smartphone hacker has provided conclusive proof that the futuristic computing headset known as Google Glass can be surreptitiously modified to give anyone with physical access almost complete control over the device.” Given than five minutes with a device, security consultant Jay “saurik” Freeman said that he can “pick up your Glass, turn on debug mode, and get root access on it in a way that doesn’t leave a trace.” “Then I can modify any of the software on your device,” Freeman told Ars Technica in a telephone interview. “I can make it so that for the rest of your Glass’ lifetime I’m in there, too, able to get access to your camera, listen in on your microphone. I can turn off debug mode and make it look like there’s nothing changed from your perspective. And when you get it back, you’re screwed.” “A bugged Glass doesn’t just watch your every move: it watches everything you are looking at (intentionally or furtively) and hears everything you do. The only thing it doesn’t know are your thoughts,” Freeman wrote in a blog post. If a hacker obtained that type of access, Freeman described some of the obviously major problems that would arise. Since Glass sees everything you do, it would see you entering passwords, PIN codes, building access codes and even pictures of keys detailed enough to allow copies to be made. “Nothing is safe once your Glass has been hacked,” Freeman said. [...]"  

State Terrorism: "Sherriff's Dept. Volunteers Burst Into Small Oregon Highschool, Firing Blanks At Unprepared Staff To 'Test Readiness' " [05/02/13] Printer Friendly Version "Two masked men wearing hoodies and wielding handguns burst into the Pine Eagle Charter School in this tiny rural community. Students were at home for an in-service day, so the gunmen headed into a meeting room full of teachers and opened fire. [...]"  Note: But if there had been armed teachers there, they might have shot the cops. Also, if they expected the students to be there, they were not bothered by the idea of terrorizing and instilling fear in the students, who would have had ongoing psychological problems ... and opening themselves up to massive lawsuits. Sadistic, fascistic behavior by minion cops.

Commentary: "Boston Bombing – DHS Contracted Security Out To Israelis" [05/01/13] Printer Friendly Version "...Many in the Intel and national security business have watched all this happen just totally aghast not only at the brazenness involved to orchestrate such sting operations, but the general acceptance by a public that seems almost brain dead to the internal threat represented. There is much blame to go around. Military Intelligence usually suspects US law enforcement for most ‘terror attacks’ because they are intimately aware of Israeli intelligence penetration into not only the FBI but having many tentacles into the Dept. of Homeland Insecurity. Much of this is due to their super asset and first DHS director Michael Chertoff. It was through his setting up the outsourcing of DHS’s security drills to outside contractors which was the first nail in the coffin for American security. What most don’t know is that these are usually Israeli companies. They play the role of the ‘opposing force’. Chertoff also saw to it that the Israelis got an affirmative action gift of being a first stop for buying security equipment, ahead of American companies even. If someone were to ask me if other Western countries, when doing their ‘security drills’ if Israeli companies were also contracted to play the opposing force, I would respond, “What do you think?” I think you all are smart enough to see the scale of treason involved in these countries to allow such a situation to develop. More complicated is why all those in their respective security agencies who know this is done to put the Israelis in a position to penetrate them, will never say a word about it publicly. [...] Would real security allow people with big backpacks to roam around without some way to screen these bags? No. So what happened? How did two kettle bombs get placed within a 100 yards of the finish line where the perpetrators would know all the TV cameras would be? Who would risk such a ‘certain to get caught’ attack unless they were rigging up as suicide bombers?"  Related: Flashback: "All 9/11 Airports Serviced By One Israeli Owned Company" Printer Friendly Version  | "Top Secret America: National Security Incorporated" Printer Friendly Version  

Canada: "$3.1B In Anti-Terror And Public Security Funding Unaccounted For, AG Says" [05/01/13] Printer Friendly Version "More than $3 billion in federal funding allocated for public security and anti-terror projects is unaccounted for, Auditor General Michael Ferguson says in his latest report. After Ferguson released his spring report Tuesday, he said there was no evidence that the money was spent inappropriately, but noted it wasn't on the books either. "One of the questions we asked was how much money had been allocated out to the various departments and how much money had been spent," Ferguson told reporters in Ottawa. "The departments were properly reporting back on how much they spent, but what they spent amounted to roughly $10 billion and what was allocated amounted to roughly $13 billion, so there was a difference there between what was allocated and what was spent."[...]"  

Commentary: "Former CIA Operative Robert Baer: Boston Suspects Probably Didn’t Make The Bombs" [05/01/13] [2:34] "Without special training, the Tsarnaev Brothers did not have the skills to make the detonators for the ‘pressure cooker bombs’ used in the Boston Marathon Bombing. Dzhokhar Tsarnaev, the 19-year-old student at University of Massachusetts was majoring in nursing. His brother, Tamerlan Tsarnaev was a boxer. Neither one of the alleged bombers had an electronics background. Former CIA Operative Robert Baer told CNN yesterday that someone else out there must’ve made the bombs. Recent reports by the so-called mainstream media suggest that the pressure cooker bombs were detonated by remote control using ‘toy car’ hand-held controllers. If that really was the case, then the bombs would’ve require an electronic device capable of receiving the same frequency and signal emitted by the hand-held remote control, and yet, capable of igniting the ‘fireworks powder’ or gun powder inside the pressure cookers. The making of such device requires experienced personnel or someone with an electronics background. [...]" 

Commentary: "Is Graham Fuller (CIA) At The Center Of The Boston Bombings?" [05/01/13] Printer Friendly Version "The uncle of the two suspected Boston bombers in last week’s attack, Ruslan Tsarni, was married to the daughter of former top CIA official Graham Fuller [...] Ruslan Tsarni married the daughter of former top CIA official Graham Fuller, who spent 20 years as operations officer in Turkey, Lebanon, Saudi Arabia, Yemen, Afghanistan, and Hong Kong. In 1982 Fuller was appointed the National Intelligence Officer for Near East and South Asia at the CIA, and in 1986, under Ronald Reagan, he became the Vice-Chairman of the National Intelligence Council, with overall responsibility for national level strategic forecasting. What is known is that sometime in the early 1990’s, while she was a graduate student in North Carolina, and he was in law school at Duke, Ruslan Tsarnaev met and married Samantha Ankara Fuller, the daughter of Graham and Prudence Fuller of Rockville Maryland. On a more ominous note, Graham Fuller was listed as one of the American Deep State rogues on Sibel Edmonds’ State Secrets Privilege Gallery. Criminal activities were being protected by claims of State Secrets, she asserted. After Attorney General John Ashcroft went all the way to the Supreme Court to muzzle her under a little-used doctrine of State Secrets, she put up twenty-one photos, with no names. One of them was Graham Fuller. [See links in article]"  

Commentary: "DHS Under Investigation For Purchasing Billions Of Rounds Of Ammo" [05/01/13] Printer Friendly Version "The Department of Homeland Security his under investigation after the corporate media confirmed alternative news reports on the purchase billions of rounds of ammunition. It was the story that wouldn’t die in large part due to the fact that using a majority of ammunition purchased anywhere else except in America against American citizens would be considered a war crime in violation of international law. As alternative media documented DHS plans to purchase billions of rounds of ammunition the inevitable question became that popped up was is the federal government preparing for a civil war? The continued attention to the purchases forced the corporate media to investigate and confirm the plans which then prompted Congress to question the Department of Homeland Security about the purchases. But after the Department of Homeland Security flat out lied and denied their plans to make the purchases, even though their solitications to make the purchases are a matter of public record, the Government Accountablity Office has launched an investigation into the matter. [...] The Government Accountability Office is now conducting the investigation into the alleged DHS purchases, which is “just getting underway,” GAO spokesman Chuck Young told US News & World Report. DHS officials have repeatedly denied stockpiling ammunition, but AP reports claim that the agency plans to buy more than 1.6 billion rounds of ammunition over the next four or five years, and has already bought 360,000 rounds of hollow point bullets and 1.5 billion rounds in 2012. DHS claims that it is buying ammo in bulk to save money, but experts have pointed out that hollow point bullets cost nearly twice as much as full metal jacket rounds. They also explode on impact for maximum damage, which has caused some Americans to wonder what purpose they would serve the DHS domestically. Purchasing 1.6 billion rounds of ammo would also give DHS the means to fight the equivalent of a 24-year Iraq War. Members of Congress say the DHS has repeatedly refused to tell them the purpose of procuring such large amounts of ammo. “They have no answer for that question,” Congressman Timothy Huelscamp said in March, pointing out that the purchases are being made at a time when sequestration should be limiting the agency’s spending. “…We’re going to find out… I say we don’t fund them until we get an answer.” DHS officials testified last week that it was only planning to purchase up to 750 million rounds of ammunition for training centers and law enforcement over the next five years. The agency’s spokesman, Peter Boogaard, told Congress that the media reports are ‘misleading’. But Boogard also mentioned a second five-year contract for up to 450 million rounds of ammunition for law enforcement purposes. Together, the two DHS contracts for ammunition would result in purchases of up to 1.2 billion rounds of ammo.[...]"  

Commentary: "Media Lawyers & Politicians Promote Legal Deception Of ‘Granting Miranda Rights’, There Is No Such Thing" [05/01/13] Printer Friendly Version "A great misconception has been spread all over the media, via “Left Wing” vs. “Right Wing” arguments, on whether a Magistrate Judge, under orders from DoJ, should have “issued Miranda Rights” to Boston Bombings suspect Dzhokhar Tsarnaev. I’ve heard various television lawyers and politicians (most are lawyers) making the most inaccurate legal statements such as these: “the Magistrate Judge GAVE HIM HIS RIGHTS“, “we ISSUED him Miranda Rights”, “we INVOKED his Miranda Rights”, “we GRANTED his Miranda Rights”. There is no such thing as “Miranda Rights”, the proper term is “Miranda Warning”, and it’s a legal requirement to warn a person being charged with a crime of their US Constitution, 5th Amendment, “right to remain silent”. Giving this warning does not GIVE YOU your rights, your rights are there and are granted by the US Constitution. They do not INVOKE your rights, you INVOKE your rights by not speaking. This is a very dangerous misconception being spread into the public consciousness… that you have NO RIGHTS unless they are GRANTED to you by some legal authority… this is a dangerous deception. The short text below explains the “Miranda Warning”. The first video [3:32] shows FOX News monkeys (some of them lawyers) promoting the ”Miranda Rights” misconception. The second video [5:30] shows Judge Andrew Napolitano explaining the legal concept perfectly. [...] The term “Miranda rights” is somewhat misleading, as the mandated Miranda warning simply clarifies preexisting Constitutional rights.) However, a 2004 Supreme Court ruling upheld state “stop-and-identify” laws, allowing police to require biographical information such as name date of birth, and address, without arresting suspects or providing them Miranda warnings. The Miranda warnings were mandated by the 1966 United States Supreme Court decision in the case of Miranda v. Arizona as a means of protecting a criminal suspect’s Fifth Amendment right to avoid coercive self-incrimination (see right to silence). [...]" 

Documentary: "Top Secret America" [05/01/13] [53:39] "Pulitzer Prize-winning reporter Dana Priest traces the journey from 9/11 to the Marathon bombings and investigates the secret history of the 12-year battle against terrorism. [...]"  Note: See related video titles listed under this video. Related: "Top Secret America: A Hidden World, Growing Beyond Control" Printer Friendly Version "The top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work. These are some of the findings of a two-year investigation by The Washington Post that discovered what amounts to an alternative geography of the United States, a Top Secret America hidden from public view and lacking in thorough oversight. After nine years of unprecedented spending and growth, the result is that the system put in place to keep the United States safe is so massive that its effectiveness is impossible to determine. The investigation's other findings include: •  Some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States. •  An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances. • In Washington and the surrounding area, 33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings - about 17 million square feet of space. •  Many security and intelligence agencies do the same work, creating redundancy and waste. For example, 51 federal organizations and military commands, operating in 15 U.S. cities, track the flow of money to and from terrorist networks. •  Analysts who make sense of documents and conversations obtained by foreign and domestic spying share their judgment by publishing 50,000 intelligence reports each year - a volume so large that many are routinely ignored. In the Department of Defense, where more than two-thirds of the intelligence programs reside, only a handful of senior officials - called Super Users - have the ability to even know about all the department's activities. But as two of the Super Users indicated in interviews, there is simply no way they can keep up with the nation's most sensitive work. "I'm not going to live long enough to be briefed on everything" was how one Super User put it. [...] Underscoring the seriousness of these issues are the conclusions of retired Army Lt. Gen. John R. Vines, who was asked last year to review the method for tracking the Defense Department's most sensitive programs. Vines, who once commanded 145,000 troops in Iraq and is familiar with complex problems, was stunned by what he discovered. "I'm not aware of any agency with the authority, responsibility or a process in place to coordinate all these interagency and commercial activities," he said in an interview. "The complexity of this system defies description." The result, he added, is that it's impossible to tell whether the country is safer because of all this spending and all these activities. "Because it lacks a synchronizing process, it inevitably results in message dissonance, reduced effectiveness and waste," Vines said. "We consequently can't effectively assess whether it is making us more safe." [...]"  | "Top Secret America: National Security Incorporated" Printer Friendly Version | "Top Secret America: The Secrets Next Door" Printer Friendly Version "Top Secret America: Monitoring America"  Printer Friendly Version 

MSM: "CNN: If You're Not Doing Anything Wrong Why Should You Care If They're Watching You?"" [05/01/13] [7:40] "April 29, 2013 CNN [...]"  Note: It's why video recording police is ok, but it's a false argument if made by fascists. Related: "Who's Looking Over The Shoulders Of The Police?"   [11:39] 

Commentary: "The Art of Catching Government False Flags in Real Time" [04/29/13] Printer Friendly Version "With the topic of government false-flag operations being discussed throughout the country with the recent slow but progressive mass awakening to such events occurring in America it seems like good timing to ruminate on the issue and discuss just how the average person can develop the skills required to skillfully predict and catch government false-flag attacks in real-time and awaken others around you to these events and the political motives behind them. I use the word ‘art’ because I believe being right about such high-level events deserves attention for the cognitive and intellectual skills required and the ‘delivery of truth’ skills required to share these truths with receptive (intellectually honest) members of society. Truth is always vindicated and victory goes to the opponent that is willing to deal with ALL the facts openly and transparently, as truth seekers in the information war have done for a very long time in America. The establishment government, however, always plays the same hand with these events. Today these longstanding similarities that follow false-flag operations have naturally rendered some clear patterns to recognize for those of us seeking truth. [...]"  

Commentary: "8 Revisions to Canada's Anti-Terrorism Bill" [04/28/13] Printer Friendly Version "The House of Commons passed the new anti-terrorism bill on April 24th 2013 and received royal assent on the 25th. The bill revived provisions from the Anti-terrorism Act passed just after the Sept. 11 attacks and adds some new ones that can very easily violate civil rights. It is no secret that since 9/11 the increase in security and the sheer removal of civil rights and freedoms has been extensive. This of course comes under the guise of protection and safety, but still we fail to see any major terror attacks that have not been either 1. caused by the FBI themselves 2. have had government and other agency groups heavily involved or 3. have had a large number of factors suggesting the event was a staged attack. In fact, it was recently disclosed that of the 22 terror related attacks since 9/11, 14 of them have been created and caused by the FBI themselves. Some new provisions such as investigative hearings and preventive detentions have been added to the new act and are creating quite a controversial stir as many begin to question the real intention behind the passing of these bills. These came after an suspected terror plot was foiled where two men were allegedly plotting to derail a train in Toronto. Another shady accusation. [...]"    

MSM: "Bill Maher: "This Country Is Becoming A Police State, It Is Very Troubling To Me" [04/28/13] [5:00]  "Jimmy Kimmel and Bill Maher thankfully both seem to agree now that the US is a police state." Related: "The European Homeland Security State. EU Anti-Terror Drills and Fear Campaigns" Printer Friendly Version "The events of 9/11 in the US not only led to the attack on several sovereign nations but the government under George W. Bush established the so called “Homeland Security” and proceeded to implement plans to curtail civil rights. First the “Patriot Act” was passed, then the “National Defense Authorization Act”. The combination of these acts and presidential “Executive Orders” transformed the American society. Where previously at least some basic rights existed a basically lawless society was created. The territory of the USA has been declared a battleground. Americans can now be killed on US soil without trial or due process. They can be held indefinitely without charge or without ever knowing why. The inalienable rights believed to be guaranteed by the Bill of Rights and the Constitution have proved to be illusions. All of this was made possible by creating fear among the population through permanent media propaganda about a terrorist threat. Americans and people in the “western world” were and are made to believe that in order to have security and live in peace they have to give up their liberty. They were made to believe that it is not the foreign policy of their own governments that creates terrorism but enemies envying their freedom and prosperity. Is Europe and Ireland now heading down the same road? In an article published last week the journal.ie reported (emphasis added): [...]"  

Commentary: "Five Smoking Guns of The Boston Marathon Bombings" [04/28/13] [3:19] "In addition to all the prior knowledge that has finally broken through to the dying Main Stream Media, we have a complied a list of 5 smoking guns of the Boston Marathon Bombings. [...]" 

Commentary: "Boston Bombers’ Uncle Married Daughter Of Top CIA Official" [04/28/13] Printer Friendly Version "Ruslan Tsarni married the daughter of former top CIA official Graham Fuller, who spent 20 years as operations officer in Turkey, Lebanon, Saudi Arabia, Yemen, Afghanistan, and Hong Kong. In 1982 Fuller was appointed the National Intelligence Officer for Near East and South Asia at the CIA, and in 1986, under Ronald Reagan, he became the Vice-Chairman of the National Intelligence Council, with overall responsibility for national level strategic forecasting. At the time of their marriage, Ruslan Tsarni was known as Ruslan Tsarnaev, the same last name as his nephews Tamerlan and Dzhokhar Tsarnaev, the alleged bombers. It is unknown when he changed his last name to Tsarni. What is known is that sometime in the early 1990’s, while she was a graduate student in North Carolina, and he was in law school at Duke, Ruslan Tsarnaev met and married Samantha Ankara Fuller, the daughter of Graham and Prudence Fuller of Rockville Maryland. Her middle name suggests a reference to one of her father’s CIA postings. On a more ominous note, Graham Fuller was listed as one of the American Deep State rogues on Sibel Edmonds' State Secrets Privilege Gallery,. Edmonds explained it featured subjects of FBI investigations she became aware of during her time as an FBI translator. Criminal activities were being protected by claims of State Secrets, she asserted. After Attorney General John Ashcroft went all the way to the Supreme Court to muzzle her under a little-used doctrine of State Secrets, she put up twenty-one photos, with no names. 
One of them was Graham Fuller. [...]" 

MSM: "Izvestia: Tamerlane Tsarnaev Participated In CIA 2012 Seminar’" [04/28/13] Printer Friendly Version "According to the Russian daily Itzvestia of 24 April 2013, Tamerlane Tsarnaev attended seminars run by the Caucasus Fund of Georgia (Кавказский фонд) between January and July 2012..This association is a branch of the Jamestown Foundation, an information agency created by the CIA. The Caucusus Fund has organized several seminars for young Caucasians with the aim of "destabilizing Russia." In a protest letter published forthwith, the Caucasus Fund denied the reports, alleging a namesake. [...]"  

MSM: "Woman Says She Saw Boston Marathon Bombing Suspect Hit By By Police SUV And Then Shot By Police" [04/28/13] [7:44] "Boston resident Linda called in to the Dennis and Callaghan radio show on the morning after the capture and death of the older Tsarnaev brother, Tamerlan. The previous night she was staying at her boyfriend's house which is located in the area where Tamerlan was caught after an alleged "shoot out" with police during which time he allegedly "threw a pressure cooker bomb" at police. The official story states that Tamerlan was run over by his younger brother, Linda however describes a very different scenario. Please note, neither these radio hosts nor Linda appear to ascribe to any "conspiracy theories" about the Marathon bombing. As such, there is no reason for ANYONE to assume that what Linda reports is not factual. [...]"  

Commentary: "The Billionaire Brothers Behind America's Predator Drones -- And Their Very Strange Past" [04/27/13] Printer Friendly Version "Linden Stanley and James Neal Blue's General Atomics has a massive stake in the drone industry. But that's just the start.  [...] The Predator drone was actually created by an Israeli named Abroham Karem, who had helped design Israel's first drones for use in the Yom Kippur war. In the 1980s, Karem moved to Orange County and set up a small shop with DARPA funding to replicate and improve the technology here. His company was called Leading Systems, and had already developed a working Predator drone prototype that was cheaper and more reliable than what good ol' boy defense companies like Lockheed Martin could crank out. Karem made an elegant and efficient product it, but it wasn't getting much love in the DoD. It needed a power-salesman and a lot of money to grease the procurement process. And that's what the Blue brothers, and their man Cassidy, brought to the table.[...]"  Related: "Israeli Dominated Drone Industry to Cash in on Boston Bombings" Printer Friendly Version "There are three explanations for Israel’s success in becoming a world leader in development and production of UAVs,” a top Israeli official explained to the Jerusalem Post last year. “We have unbelievable people and innovation, combat experience that helps us understand what we need and immediate operational use since we are always in a conflict which allows us to perfect our systems.” Israel markets its expertise in defense to the rest of the world. Israeli academic Neve Gordon cites a glossy government brochure on drones titled “Israel Homeland Security: Opportunities for Industrial Cooperation,” which boasts, “no other advanced technology country has such a large proportion of citizens with real time experience in the army, security and police forces.” The chapter called “Learning from Israel’s Experience” notes that “many of these professionals continue to work as international consultants and experts after leaving the Israel Defense Forces, police or other defense and security organizations.” The work has paid off when it comes to drones: The Jewish state is the single largest exporter of drones in the world, responsible for 41 percent of all UAVs exported between 2001 and 2011, according to a database compiled by the Stockholm International Peace Research Institute. Israeli companies export drone technology to at least 24 countries, including the United States. [...] Drones hover 24 hours a day over communities in northwest Pakistan, striking homes, vehicles and public spaces without warning. Their presence terrorizes men, women and children, giving rise to anxiety and psychological trauma among civilian communities. Those living under drones have to face the constant worry that a deadly strike may be fired at any moment and the knowledge that they are powerless to protect themselves. [...]" | MSM: "Drones Strikes Are Terrorism"   [2:25] "Abby Martin takes a look at the Senate Judiciary Committee's recent hearing on drones, and how one Yemeni man's heartfelt testimony is falling on the deaf ears of elected officials. [...]"| "Boston Police Chief Wants Drones for Next Year’s Marathon" Printer Friendly Version "United States Vice President Joe Biden says the 2014 Boston Marathon will be “bigger, more spectacular” than ever before, and the city’s police commissioner could see that through with some serious changes starting at next year’s race. [...]" |  Note: We will no longer be here for the 'next race'. Drone technology and the purposes for which it is used, constitute a really sick, warped controlling perspective that could only come from the minds of reincarnated retreads ... psychopathically twisted people. It's what they do on other planets, everywhere, coming from a communal fascist state perspective ... suppression and control .... ZERO spirit orientation ... no honor, no virtue ... is it no wonder so many have intuitively recognized that these people are total darkside and have shunned them for so long .... 

Commentary: "The Boston Bombing Web of Lies" [04/27/13] Printer Friendly Version "As with many “terrorism” related events since 9/11, the Boston bombing official narrative proves to be a web of lies as important facts are revealed. It turns out that the FBI has lied about its knowledge of the alleged suspects, Tamerlan and Dzhokhar Tsarnaev, already being presented as guilty not only in the mainstream press but by the President himself. [...]" Related: "The Ties That Bind Washington to Chechen Terrorists" Printer Friendly Version "Evidence is mounting that the accused dead Boston Marathon bomber Tamerlan Tsarnaev, allegedly killed during an April 19 shootout with police in Watertown, Massachusetts, became a «radicalized» Muslim while participating in a covert CIA program, run through the Republic of Georgia, to destabilize Russia’s North Caucasus region… The ultimate goal of the CIA’s campaign was for the Muslim inhabitants of the region to declare independence from Moscow and tilt toward the U.S. Wahhabi Muslim-run governments of Saudi Arabia and Qatar. [...]"| "Russia’s FSB Detains 140 in Moscow for Connection to Caucasus-Tied ‘Islamist Extremist Groups’" Printer Friendly Version

MSM: "Falsely Identified “Boston Bombing” Suspect Found Dead in River" [04/26/13] Printer Friendly Version "A missing Brown University student wrongly rumored to be involved in the Boston Marathon bombings was confirmed dead Thursday, after his body was pulled from the Providence River earlier this week. Officials confirmed through dental records that it was 22-year-old Sunil Tripathi, who was last seen on March 16. “We have confirmed the identity of the young man found in the water off India Point in Providence,” said Dara Chadwick, a spokesperson for the Rhode Island Department of Health. Tripathi’s body was pulled from the river on Tuesday, she said. [...]"  

Commentary: "The Motive Behind the Boston False Flag Operation" [04/26/13] Printer Friendly Version "Any totalitarian government, such as the Obama administration, needs to control the flow of information and make certain that people are left defenseless by seizing their guns. This article is about how the Obama administration has likely used the Boston Marathon bombing as a pretext to seize control over the Internet, thus eliminating the only true form of uncensored news. The first step to subduing an enemy is to remove their command and control, and that is accomplished by eliminating communications. This is precisely what the administration is poised to do and they are moving quickly towards this end. If the government is going to move to shut down the medium of communication which is threatening to expose their criminality to the masses, namely the Internet, they need to first find a pretext.[...]" 

Commentary: "False-flag” Meme Goes Mainstream with Boston Marathon Bombing" [04/26/13] Printer Friendly Version "But after the Boston bombings of April 16th, 2013, even the corporate monopoly media could no longer ignore the possibility of a false-flag attack. Yahoo News asked “Who’s behind the Boston Marathon bombings?” and offered 4 theories: (1) Islamic jihadists, (2) Right-wing militia types, (3) the government, and (4) a criminally-insane lone wolf. Numbers (1), (2), and (4), of course, are the usual suspects. But including (3) “the government” on the suspects list is unprecedented for a mainstream news story reporting on a domestic terror incident. The false-flag meme’s growing prominence was underlined at Massachusetts governor Deval Patrick’s press conference after the bombings. The first question for Governor Patrick came from Infowars correspondent Dan Bidondi, who asked whether the bombings were “a false-flag staged event..to take away our civil liberties.” Patrick, of course, answered “no.” Even the Atlantic Monthly, a neocon-lite magazine associated with names like Goldberg and Hitchens, felt compelled to publish a story headlined: “What Is a ‘False Flag’ Attack, and What Does Boston Have to Do with This?” Amazingly, the Atlantic article stated that yes, there is historical precedent for viewing the Boston bombing as a false-flag event. The author, Philip Bump, even admitted: “If the Boston attack had been a ‘false flag’ attack, Gov. Patrick would have responded ‘no’ anyway.” What has changed since 2001 to bring the false-flag meme into the limelight? Short answer: The 9/11 truth movement. [...] Terror bombings have only one beneficiary: Governments, and the wealthy families that own them. As Vincent Vinciguerra, one of the perpetrators of the Operation Gladio terror attacks, explained: “You had to attack civilians, the people, women, children, innocent people, unknown people far removed from any political game. The reason was quite simple: to force . . . the public to turn to the state to ask for greater security.” Whatever the truth about the Boston bombings, it seems that the false-flag meme is infiltrating mainstream discourse. And it isn’t going to go away . . . at least not until 9/11 and other false-flag crimes are solved, and effective measures instituted to protect the public against the scourge of false-flag terror.[...]"   

World Politics: "Syria in Boston" [04/26/13] Printer Friendly Version "What has Syria got to do with the Boston bombing? Nothing at first glance, yet this event - and the clamor it has sparked - provides the key explanation for the Kerry-Lavrov plan deadlock. If nothing is happening in Syria, it is because Washington and Moscow have run into unforeseen difficulties, including the Chechen imbroglio. [...] The implementation of the Kerry-Lavrov plan for Syria has run into the ground due to the difficulties encountered by the two superpowers. As for the U.S., it is finding it harder to prevail over allies that were recruited against Syria and that are now required to disband with no compensation. On the Russian side, there is growing concern over the sudden arrival of fighters from the Caucasus, since they could clash with the peacekeeping forces of the Collective Security Treaty Organization, as it formerly occurred with the Red Army in Afghanistan. Suddenly, the team change in the Obama administration does not seem to be bearing fruit. John Kerry contradicts himself at every turn, with the result that no one can see the way out of the tunnel. Taking advantage of this situation, new opposition forces sprang up in Congress, where three bills have been filed. The first one subscribes to the Israeli plan to destroy Syria. The second one represents the interests of the military- industrial complex to have a limited war. The third one contemplates the divvying up of gas resources. It is in this context that the attack in Boston took place."  We can affirm that (1) the issue of Chechnya inhibits the Russians in Syria, (2) that the Boston attack was staged to put Chechen terrorism in the forefront, (3) that the manner in which this affair will be portrayed will determine the unfolding of events in Syria. The only weak point of this operation is the survival of Dzhokhar Tsarnaev. A 19-year old boy uncontrollable. [...]"

MSM: "CISPA Dead: 'Privacy Killer' Bill Hits A Brick Wall In The Senate" [04/26/13] Printer Friendly Version "The Senate will not take up the controversial cybersecurity bill, is drafting separate legislation [...] "We're not taking [CISPA] up," the committee representative says. "Staff and senators are divvying up the issues and the key provisions everyone agrees would need to be handled if we're going to strengthen cybersecurity. They'll be drafting separate bills." Sen. Jay Rockefeller, D-W.V., chairman of the committee, said the passage of CISPA was "important," but said the bill's "privacy protections are insufficient." That, coupled with the fact that President Barack Obama has threatened to veto the bill, has even CISPA's staunchest opponents, such as the American Civil Liberties Union, ready to bury CISPA and focus on future legislation.[...]" 

Commentary: "Raytheon Surveillance Software Tracks People’s Movements & “Predicts Future Behavior" [04/25/13] Printer Friendly Version "The latest surveillance tool developed by Raytheon is called Rapid Information Overlay Technology (RIOT) which is “capable of tracking people’s movements and 'predicting future behavior' by 'mining data from social networking websites'.” [...]"  Note: Again, the fact that social networking sites constitute a part of the surveillance system is again being overtly stated. Those who are wise knew all about this propensity for psychological induction of a population way before these social networks came into being .... social networks are compatible with the general narcissism in certain generations ... easy for them to induce people to create their own dossier and report on their activities ... kind of obvious to many of us, but not to most 'people' out there. Notice how, in the news, some have declared that not having social network accounts 'seems suspicious' ... those people only see life as a matter of 'hiding and discovering' under a communal fascist system, so their perspective is paranoid and delusional, and everyone is suspicious, to them.  

MSM: "European Union Cites Boston Attack To Justify Major Anti-Terrorist Operation" [04/24/13] Printer Friendly Version "On April 17 and 18, anti-terrorist units of numerous European Union member states participated in an operation involving simulated terrorist attacks in nine different countries. [...]" 

Commentary: "After Boston Bombing, Australian Media Ramps Up “War On Terror”" [04/24/13] Printer Friendly Version "The response of the Australian media and political establishment to the state of siege imposed on Boston following the April 15 bombings is a clear indication that the ruling elites are prepared to use the same kind of anti-democratic methods in Australia. In the extensive media coverage, the unparalleled military-police lockdown of a major American city in order to hunt down a single 19-year-old youth allegedly responsible for the bomb blasts was barely mentioned, let alone criticised. It was the photographs, rather than the words, that gave a glimpse of what was taking place—heavily-armed police and national guard troops in combat gear, armoured humvees patrolling the streets, “suspects” being handcuffed. The military and police-state methods that have been used for more than a decade to terrorise the populations of Afghanistan and Iraq—curfews, house-to-house searches, roadblocks, the shutdown of transport—are now being deployed in the United States. Yet the imposition of what is tantamount to martial law in Boston and the trampling on democratic rights is not questioned in the slightest by Australian politicians or in the media. Instead, the Boston bombings have seized upon to justify the reactionary agenda of the ruling class in Australia, including the further beefing up of the intelligence agencies and police. As on every other issue, the federal Labor government immediately took its cue from Washington. Within hours of the bomb blasts, long before any evidence had emerged, Foreign Minister Bob Carr had already raising the spectre of terrorism, declaring that it was “legitimate to be concerned... that this does represent a domestic terrorist strike.” [...]"  

Commentary: "Canadian Government Unveils “Terror Plot” As It Adopts Draconian New Law" [04/24/13] Printer Friendly Version "Canadian authorities announced Monday afternoon they had broken up a terrorist conspiracy, just as the country’s parliament was to debate new anti-terrorism legislation that would give the state draconian new powers. [...]"  

MSM: "Alleged Canada Plot Turns Focus To Rail Transport's Vulnerability" [04/24/13] Printer Friendly Version "An alleged al Qaeda-backed plot to derail a U.S. passenger train in Canada sought to exploit the vulnerabilities of railroads that have not gotten much attention from the American public. [...]"  Note: An excuse to lock down more of the social infrastructure. Related: See below: "Operation Smooth – The Canadian Connection to Global "Terrorism" [04/23/13] ; "Canadian Police Claim That They Disrupted A Terrorist Attack On A US Bound Train" [04/23/13] 

Flashback: "ADL Training US Police Departments … For What Purpose?"  2008 [04/24/13] Printer Friendly Version ".. Approximately 150 officers assembled for the ADL expert's informative presentation on the ideologies, symbols, and criminal activities associated with right-wing extremists in the area. The expert also discussed the proliferation of white supremacists in the anti-immigration movement, emphasizing recent trends and tactics used by extremists to exploit anti-immigration sentiment in the region and across the United States. [...]" 

Tarpley: "CIA’s Historical Sponsorship of Chechen Terrorism Is Key to Evaluating Role of Boston Patsies" [04/24/13] MP3 

MSM: "CISPA In Limbo Thanks To Senate Apathy" [04/24/13] Printer Friendly Version "Despite an $84 million lobbying effort, CISPA, the controversial bill aimed at making it easier for corporations to share customers' personal information with the government, faces an uncertain future after approval in the US House of Representatives. CISPA co-sponsor Rep. Mike Rogers (R-Mich.) of the House Intelligence Committee has maintained that the law would help corporations defend against supposedly inevitable cyber-attacks by striking “that right balance between our privacy, civil liberties and stopping bad guys in their tracks from ruining what is one-sixth of the US economy,” as quoted by the Associated Press.  [...]"  Note: Another example of sequential plans awash ... Related: "CISPA: Worse Than The Patriot Act" [04/21/13]   [8:36] "Abby Martin talks to Michelle Richardson, Legislative Counsel with the ACLU, about the renewed push for CISPA, and how its implications could be worse than the Patriot Act. [...]" | "Fighting CISPA With Encryption" Printer Friendly Version

MSM: "Pentagon Will Conduct An “Urban Training Event” In Chicago Suburb April 23 And 24" [04/24/13] Printer Friendly Version "The Pentagon has announced it will conduct an “urban training event” in the Chicago suburb of Tinley Park. Residents will be treated to “training explosives and other techniques” in the evening on April 23 and 24. In addition, the military, in collaboration with local public safety agencies, will hold helicopter operations in the night sky. The exercise will be held at the former Tinley Park Mental Health Center site. Authorities claim the site has nothing to do with recent events. [...]"  

MSM: " Justice and FEMA Preparing for Major Terrorism Exercises Three Cities" [04/23/13] Printer Friendly Version  Pg 2 Printer Friendly Version "The federal government has begun preparing three U.S. cities for large-scale, 10-day terrorism-response exercises scheduled this month. Beginning sometime between May 7 and May 29, local, state and top level federal authorities will respond to simulated weapons of mass destruction attacks in three cities — Denver, Portsmouth, N.H., and the Washington, D.C.-area. Denver or Portsmouth will face either a simulated biological or a chemical weapons attack. The D.C. metropolitan area will respond to a radiological attack drill — which could range from simply an exposed container of radioactive material to a small nuclear detonation.  [...]"  

MSM: "Bloomberg: Interpretation of Constitution Will ‘Have to Change’ After Boston Bombing" [04/23/13] Printer Friendly Version  "In the wake of the Boston Marathon bombings, Mayor Michael Bloomberg said Monday the country’s interpretation of the Constitution will “have to change” to allow for greater security to stave off future attacks. “The people who are worried about privacy have a legitimate worry,” Mr. Bloomberg said during a press conference in Midtown. “But we live in a complex word where you’re going to have to have a level of security greater than you did back in the olden days, if you will. And our laws and our interpretation of the Constitution, I think, have to change.” Mr. Bloomberg, who has come under fire for the N.Y.P.D.’s monitoring of Muslim communities and other aggressive tactics, said the rest of the country needs to learn from the attacks. “Look, we live in a very dangerous world. We know there are people who want to take away our freedoms. New Yorkers probably know that as much if not more than anybody else after the terrible tragedy of 9/11,” he said. [...]"  

Interviews: "Boston Bombing Suspects Were Gov’t Assets — Investigative Journalist Wayne Madsen" [04/23/13] [30:40] "Investigative journalist and author Wayne Madsen stops by to discuss the multiple red herrings in play in the wake of the botched Boston Marathon bombing operation. [...]"  You are 8 times more likely to be killed by a police officer than by a terrorist.

Commentary: "Operation Smooth – The Canadian Connection to Global "Terrorism" [04/23/13] [10:18] "Exactly one week after the Boston Bombings Canadian authorities have announced a “foiled terror plot” that was conducted and referred to as “operation smooth”. The RCMP and CSIS worked hand in hand with the Department of Homeland security and the FBI.  [...]"  Related: See below

Commentary: "Canadian Police Claim That They Disrupted A Terrorist Attack On A US Bound Train" [04/23/13] Printer Friendly Version "Another suspicious terror plot was allegedly thwarted by police today, or so they say. The suspects in the case are being associated with 'Al Qaeda' and Iran in the press, but there has been no evidence release to confirm this. The attack was said to be targeted at a train that was on its way into the US, meaning that police and intelligence agencies in the United States are also now involved in this investigation. Interestingly enough, intelligence agencies from both countries have been in prior contact with these alleged terrorists. [...] In what is now a familiar pattern, the suspects were under surveillance for more than a year before their arrest. The FBI worked with the Canadian Security Intelligence Service, the Canada Border Service Agency, and eight other police agencies, RCMP said Monday. The FBI has a long and well-documented history of staging terror events. The alleged attack arrives as the Harper government works to pass S-7, the Combating Terrorism Act, legislation that will rollback civil liberties in Canada."  Related: "Canadian Government Exploits Boston Bombing to Pass Bill to Limit Civil Liberties" Printer Friendly Version "The Harper government is using the Boston Marathon bombing to expedite the passage of a relatively slow-moving bill that would restrict civil liberties in the name of fighting terrorism. [...]"  

Commentary: "7 Major Bomb Threats Throughout The US April 22" Links [04/23/13] "Bomb Threats, USA… Alabama: 3 Hospitals… Pennsylvania: Shopping Village… Iowa: Neighborhood… Florida: Office Building… [...]" 

MSM: "Judge Napolitano: 'It's Dangerous to Talk of Suspending Suspect's Constitutional Liberties" [04/23/13] [4:52] "In a heated debate with Stuart Varney, Napolitano argues the alleged Boston bomber must be granted his rights under the Constitution. "Guess what. The Fifth Amendment prevents us from 'getting' what we want to get out of him. If you want to suspend his Fifth Amendment right, there will be no limit to whose rights you can suspend!" said Napolitano, pointing out that the younger brother is a U.S. citizen and therefore gets the same "panoply" of constitutional rights that anyone else would. [...]" 

MSM: "Israeli PM’s Advisor “Bullish” Israel Will Benefit From Boston Bombing – Just Like Netanyahu After 9/11" [04/23/13] [2:24] "Speaking to US Jewish leaders, Ron Dermer, a senior advisor to the Israeli prime minister, praised Netanyahu’s leadership before stating: "I’m pretty bullish about the prospects for strengthening cooperation with the United States. Support for Israel – you all can tell me yourselves – I see polls that show that its almost at record highs… The American people stand firmly with Israel. I think they identify with Israel. I think if you look historically, there’s a big change after 9/11. I’m sure that after the bombing, the tragic bombing in Boston, I believe that people will identify more with Israel’s struggle against terror and I think we can maintain that support." [...]"  

MSM: "Legal Group: America Violated Laws And International Treaties" [04/23/13] Printer Friendly Version "The report by a task force of the Constitution Project, founded in 1996 to monitor government surveillance, openness and checks and balances, said that after a go-ahead by the George W. Bush administration, U.S. forces “used interrogation techniques on detainees that constitute torture.” [...]"   Related: See below: "Obama Clinton and Bush Indicted For War Crimes While Media Exploits Boston False Flag

Document: "DoD Strategy for Homeland Defense and Defense Support of Civil Authorities February 2013" [04/22/13] Printer Friendly Version "... DoD must be prepared to help civilian authorities save and protect lives during a complex catastrophe. An effective response will require investments in preparedness (planning, organizing, equipping, and training), improving concepts of operations, and better linking of established Federal and State capabilities and systems.  [...]" Related: "DOD Will Now “Push” Assistance to Civil Authorities" Printer Friendly Version 

Commentary: "Many Bostonians Love And Worship The Militarized Police State" [04/22/13] Printer Friendly Version "The state of martial law in and around Boston undoubtedly resulted in a tremendous amount of revenue lost for businesses in and around the area. Of course the stooges in the corporate media won’t talk about that or the legality and the wisdom of such a boneheaded operation. The reason they won’t is because the roll out of a militarized police force in the name of safety and security is now an accepted norm in America. People just don’t seem to understand that operations like these do not guarantee your safety or security. As I’ve pointed out in previous articles covering the Boston Marathon bombing, there was a huge police presence at the Boston Marathon. Despite the vast number of police and security forces, they still failed to prevent the bombing. When one understands that the government has a historical track record of staging attacks like these in order to justify different agendas, it makes perfect sense as to why all of these security forces couldn’t prevent the attack. However, if we were to assume that this was a real attack that wasn’t sanctioned by official channels, this was a huge police failure. Of course we don’t see anybody in the media questioning the failure of the police to keep people safe do we? Instead, we see talking head propagandists calling for more police, more security, more searches, more cameras and other assorted bull shit. [...] The worship of police officers and members of the military being portrayed as heroic figures has become a national mental illness perpetuated by exaggerated media propaganda and fear mongering. Even though there might be a few good police officers who do their job and uphold civil liberties, there are far too many cases of the police abusing their authority and engaging in an assortment of illegal activities. Many police officers are nothing more than common criminals who enjoy bullying people around. People in third world countries already have a general understanding that the police are corrupt and shouldn’t be trusted but unfortunately it looks like most Americans haven’t quite grasped this concept yet."  

MSM: "New York Republican Recommends ‘Torture’ For Teenage Boston Bomb Suspect" [04/22/13] Printer Friendly Version "If the United States really, in the words of President Barack Obama, wishes to keep “looking forward” instead of backward when it comes to the violent legal limbo that is the Bush administration’s legacy, someone might want to ensure New York State Senator Greg Ball (R) gets a copy of that memo. In several separate instances this weekend, Sen. Ball has advocated torturing the teen police are accusing of helping execute the Boston Marathon bombings [...]"  Note: Another sadistic reincarnated retread .... ought to be arrested for advocating torture.  Related: "CNN Asks Torture Proponent Alberto Gonzales About How To ‘Keep America America’" Printer Friendly Version "In a 2002 memo to then-Presiden George W. Bush, Gonzales argued that the so-called War On Terror 'meant' that the United States was not bound by “quaint” rules in the Geneva Convention that prohibit torture. “This 'new paradigm' renders obsolete Geneva’s strict limitations on questioning of enemy prisoners and renders quaint some of its provisions requiring that captured enemy be afforded such things as commissary privileges,” Gonzales wrote. Bush eventually agreed and within weeks, military interrogators were being trained on the use of enhanced interrogation techniques, which a nonpartisan group recently determined were “clearly torture.” [...]"  See below: "Obama Clinton and Bush Indicted For War Crimes While Media Exploits Boston False Flag"

Flashback: "Judge Napolitano: On The Involvement Of The FBI In 17 False Flag Ops"  2011 [04/22/13] [5:05] "Andrew P. Napolitano, senior judicial analyst."

Interviews: "Dr. Steve Pieczenik: Boston Bombing, Fog of War on Steroids" Link Fixed Link Fixed [04/21/13] [64:39] "Dr. Steve Pieczenik, a psychiatric MD, former Naval Captain, and Deputy Assistant Secretary of State on the Alex Jones show about the Boston Marathon events. [...]" Related: "Obama Clinton and Bush Indicted For War Crimes While Media Exploits Boston False Flag" Printer Friendly Version "On Tuesday, the Constitution Project, a Washington, DC think tank, released a 577-page report by its “Task Force on Detainee Treatment” documenting WAR CRIMES committed by Clinton, Bush and Obama including unthinkable atrocities punishable by life in prison or death. The 11-member Task Force spent two years generating the report, interviewing over 100 individuals, including former detainees, military and intelligence operatives, interrogators and politicians in numerous countries. The report details abuse of detainees during the Clinton, Bush and Obama administrations, and geographically covers such mistreatment in Iraq, Afghanistan, Guantanamo Bay and the so-called black sites where the US government hides detainees in secret locations in foreign countries. The Task Force amassed an enormous and overwhelming quantity of evidence on US crimes. The report’s introduction contains this indictment of the American government’s conduct in the so-called “war on terror”: [...]" | "America: War Criminals Running the USA" Printer Friendly Version 

Interviews: "Confusion And Inconsistencies': How US Plans To Distract Public From Real Truth About Boston" [04/21/13] Printer Friendly Version   [8:06] "The initial questions about the Boston bombing are behind us, but former FBI employee Sibel Edmonds believes the pursuit of truth will eventually lead to a far more secret agenda by the US, which she reveals to RT. The United States is having to quickly wake up to the possibility that Chechens are not the ‘freedom fighters’ Western media has been categorizing them as, especially when it came to the Republic’s relationship to Russia. But even the newly formed perceptions may not be enough when it comes to investigating the motives and planning behind the Boston bombing, according to Edmonds, who is also a founder of the National Security Whistleblowers Coalition. With the dust somewhat settled after the capture of the younger suspect, Dzhokhar Tsarnaev, Edmonds believes there will only be more unanswered questions in an investigation already plagued by obvious inconsistencies and falsities, which she recounts at length. [...]"  Related: "FBI Caught in a Web of Lies in Boston" Printer Friendly Version 

Commentary: "West Texas Explosion Might Have Been Triggered by Militarized Blast" [04/21/13] Printer Friendly Version [5:00] "Matthew Short’s investigation concludes with video evidence that emergency response vehicles were in the area before the explosion at the fertilizer plant in West and drills were being ran as stated by the hospital’s CEO in an interview. This is the same fingerprint we have seen during events such as the attacks on September 11, 2001, the London bombings in July of 2005, the Sandy Hook Elementary School shooting, and even the Patriot’s Day bombing in Boston most recently. Information also exists the suggest nuclear preparedness mass casualty drills were being ran in the area. [...] Information has been brought to light that the explosion was triggered by another source rather from the fertilizer plant fire itself. The videos display the lack of chemical reaction, ignition from an internal point in the plant, but rather from an outside point, possibly from the sky." Note: The plant had an active lawsuit against Monsanto pending. Related: "Monsanto Now Owns Blackwater (Xe)" Printer Friendly Version 

Commentary: "Evidence Some 'Major Injuries' At Boston Event Were Staged" [04/21/13] Printer Friendly Version "I’ve studied and graduated EMT-B certification with the state of Oregon. I’ve been on calls with heavy arterial bleeds, internal bleeding, fatalities, doa’s. I am speaking from direct personal experience with severe trauma. Here is a telling photograph of the amputee actor. I encourage readers to view the photo side by side with my analysis. [...]" Related: "Bomb Victim Is US Army Officer Who Already Lost Legs in Afghanistan - Fitted With Prosthetic For 'Show' After Boston Blast" Photo: "Sandy Hook 'Crew' In Boston?"   

Commentary: "Boston Investigation: Great Argument For Pervasive Surveillance Cameras" [04/21/13] Printer Friendly Version "The bombings in Boston and the subsequent investigation of the suspects will likely revive the debate about pervasive security camera surveillance in the U.S. Stationary security cameras near the bombing location evidently gave police a key lead in identifying the suspects, as the past day of breaking news reports has revealed. Such technology has long been envisioned in Hollywood films, ranging from comic romps like The Truman Show to paranoid dystopias like Minority Report. The idea was popularized in George Orwell’s novel, 1984, about life in a totalitarian state. With the rise of terrorist attacks and improved technology, security cameras have become part of everyday life for many. As soon as the bombs went off and the investigation was under way, law enforcement agencies such as the FBI asked the public for their photo evidence. In the first four days of the investigation, more than 2,000 tips of all kinds came in. It appears that photos taken by a Lord & Taylor store provided key evidence in this case. Civil libertarians are likely to be on the defensive in their argument that pervasive cameras represent an invasion of privacy and an unwarranted search. In the United Kingdom, surveillance cameras have been in use for more than a decade, and they number in the millions. China has also installed large numbers of security cameras, but those countries clearly have different positions on privacy and freedom. Organization such as the Surveillance Studies Network have used such monitoring for years. They define a “surveillance society” as the one that engages in the “extensive collection, recording, storage, analysis and application of information on individuals and groups in those societies as they go about their lives.” The American Civil Liberties Union has set up a site ... “We already live in a state of Big Brother and Little Brother,” said Dave Maas, the media relations coordinator for the Electronic Frontier Foundation in an interview with VentureBeat. “Little Brother takes the form of people using their own cameras. We are sort of monitoring ourselves. That is an indicator of where we are as a society.” [...]"  Related: "This Is the Modern Manhunt: The FBI, the Hive Mind and the Boston Bombers" Printer Friendly Version "In an earlier era, law enforcement might not have identified the suspects in the Boston Marathon bombing so rapidly. When the smoke literally cleared on Monday, investigators had a huge problem and nearly no leads. No individual or organization claimed responsibility for the bombings that killed three and wounded more than 180. So they took a big leap: They copped to how little they knew, and embraced the wisdom of The Crowd. Hiding in plain sight was an ocean of data, from torrents of photography to cell-tower information to locals’ memories, waiting to be exploited. Police, FBI, and the other investigators opted to let spectator surveillance supplement and augment their own. When they called for that imagery, locals flooded it in. They spoke to the public frequently, both in person and especially on Twitter. All that represented a modern twist on the age-old law enforcement maxim that the public’s eyes and ears are crucial investigative assets, as the Internet rapidly compressed the time it took for tips to arrive and get analyzed. [...]"  

Commentary: "Psyops: Mind Control Marathon And Boston Bombings" [04/21/13] Printer Friendly Version "Three people were killed in dual bomb blasts that struck the popular “Boston Marathon” annual running event on Monday, 15 April 2013. Among the 144 persons treated for injuries were eight children; 25 were in serious condition and 17 were critical; 10 had amputated limbs. U.S. Federal authorities were quick to classify the bombing as a terrorist attack but declared the explosive devices themselves were small, crude bombs without high-grade explosive material. Two hotels in the vicinity were evacuated, subway service was halted, flights over the blast area were restricted by the FAA; even an area near the west wing of the White House was cleared. Besides the two bombs that went off near the finish line of the race at approximately 2:45 p.m., three other explosive devices may have been involved: one was found at a nearby hotel, and two others at undisclosed locations. Boston Police Commissioner Ed Davis stated that only one bomb was in police custody, while Massachusetts Democratic Representative Bill Keating claimed that two more were also found. A member of the U.S. House Homeland Security Committee, Keating called the bombing a “sophisticated, coordinated, planned attack.” Later reports, however, indicated that the two bombs that detonated were in fact crude devices improvised from six-liter pressure cookers, and were filled with nails and metal pellets. Bomb fragments and other debris was expedited to the FBI laboratory in Quantico, Virginia in an attempt to find evidence pointing to a suspect but even two days later, no one was in custody nor had anyone or any group claimed responsibility. Nevertheless, police were immediately put on alert for a “darker-skinned or black male,” possibly with a foreign accent, while a Saudi national with a leg injury was under guard at a hospital. As one media outlet put it, the attack had all the “Middle East terrorist hallmarks.”Three days later, the FBI was circulating photos of two rather ordinary looking alleged suspects who were considered “to be armed and extremely dangerous.”  [...] In short, I believe the Boston Marathon Bombing has all the signs of an OP: a psyop, a false-flag operation that is one more grizzly event in the marathon of mind control imposed by the U.S. government on its own citizens to justify its ever-expanding security/police state,and divert attention from the ever-shrinkingcivil rights held by the people. And that is the goal of false-flag terrorist “OPs” as investigative reporter Jon Rappoport explains: “To put the eyes and minds and emotions of the people into the black hole of the disaster, and thereby decrease the resistance of the people to control from above…. This is called mind control.”  [Cross-Posted]

Commentary: "Homeland Security Gathers 'Crap Intelligence' And Spies On Americans" [04/20/13] Printer Friendly Version "The US Department of Homeland Security has endangered the civil liberties of Americans and spent millions on collecting not counterterrorism intel but “a bunch of crap,” a Senate subcommittee investigation of DHS data fusion centers has found. The Senate’s bipartisan Permanent Subcommittee on Investigations released on Tuesday their findings of a two-year-long probe that has left lawmakers scratching their heads over an array of mismanagement, multi-million-dollar flubs and direct violations of constitutionally-protected civil liberties taking place at fusion centers: special intelligence-processing facilities that now total 77 across the United States. In the wake of the September 11, 2001 terrorist attacks, Congress tasked the DHS to begin implementing a coast-to-coast system of highly-connected fusion centers that would allow for greater ease in sharing terrorism-related information between state, local and federal authorities. Under the direction of Chairman Sen. Carl Levin and Ranking Minority Member Sen. Tom Coburn, though, the subcommittee that includes lawmakers from both sides of the aisle concludes that the initiative has all but failed at accomplishing its goals. The Department of Homeland Security’s work with state and local fusion centers, the subcommittee writes, “has not produced useful intelligence to support federal counterterrorism efforts.” Instead, they add, so-called “intelligence” shared between facilities consisted of tidbits of shoddy quality that was often outdated and “sometimes endangering [to] citizen‘s civil liberties and Privacy Act protections.” “More often than not,” the panel adds, information collected and shared at DHS fusion centers was “unrelated to terrorism.” In other instance, surveillance is thought to have been conducted on regular civilians not reasonably suspected of any crime, despite a 2008 memo sent to the DHS warning, “You are prohibited from collecting or maintaining information on US persons solely for the purpose of monitoring activities protected by the US Constitution, such as the First Amendment protected freedoms of religion, speech, press, and peaceful assembly and protest.” [...]"  

Commentary: "USA: The Creator & Sustainer of Chechen Terrorism" Sibel Edmonds [04/20/13] Printer Friendly Version "Here we go again- Déjà vu. Out of the blue we have a ‘terror event,’ a couple of pop-terrorists, and a new buzz-word nation-Chechnya. There they go again: USA Media tales made-in-government: Muslims, terrorists, fanatics, freedom-haters … this time from another exotic-sounding land-Chechnya. They are going to tell you about the new frontiers in the so-called Islamic Terror Cells: The Caucasus and Central Asia. They’ve been planning this for a long time. In fact, the plans were in motion as early as the mid-1990s. Since 2002, despite the gag orders and attacks, I have been talking about: Central Asia & the Caucasus. I have been talking about our operations-grooming our very own terrorists in that region. I have been talking about Chechnya. The government and its media will give you the tales. They will give you the roller-coaster-like spins. They will not give you what you need to know. Two years ago, we, at Boiling Frogs Post, provided you with the following article-analysis. Please read it: with the recent home-made terror incident and the new media buzz-word ‘Chechnya’, you need to arm yourself with facts. [...]"  

Commentary: "Sayanim — Israeli Operatives In The U.S" [04/20/13] Printer Friendly Version "Americans know that something fundamental is amiss. They sense—rightly—that they are being misled no matter which political party does the leading. A long misinformed public lacks the tools to grasp how they are being deceived. Without those tools, Americans will continue to be frustrated at being played for the fool. When the “con” is clearly seen, “the mark” (that’s us) will see that all roads lead to the same duplicitous source: Israel and its operatives. The secret to Israel’s force-multiplier in the U.S. is its use of agents, assets and sayanim (Hebrew for volunteers). When Israeli-American Jonathan Pollard was arrested for spying in 1986, Tel Aviv assured us that he was not an Israeli agent but part of a “rogue” operation. That was a lie. Only 12 years later did Tel Aviv concede that he was an Israeli spy the entire time he was stealing U.S. military secrets. That espionage—by a purported ally—damaged our national security more than any operation in U.S. history. In short, Israel played us for the fool. From 1981-1985, this U.S. Navy intelligence analyst provided Israel with 360 cubic feet of classified military documents on Soviet arms shipments, Pakistani nuclear weapons, Libyan air defense systems and other intelligence sought by Tel Aviv to advance its geopolitical agenda. Agents differ from assets and sayanim. Agents possess the requisite mental state to be convicted of treason, a capital crime. Under U.S. law, that internal state is what distinguishes premeditated murder from a lesser crime such as involuntary manslaughter. Though there’s a death in either case, the legal liabilities are different—for a reason. [...]" [Cross-Posted] 

Commentary: "The FBI Needs To Explain Why It Failed To Monitor Boston Bombing Suspect Despite A Clear Warning" [04/20/13] Printer Friendly Version "The FBI needs to explain in more detail why it failed to realize that the older Boston bombing suspect, Tamerlan Tsarnaev, was a terrorism risk. By the FBI's own admission, the FBI was warned about Tsarnaev in 2011 by a foreign government. The foreign government told the FBI that Tsarnaev had become "a follower of radical Islam and a strong believer and that he had changed drastically...as he prepared to leave the United States for travel to the country's region to join unspecificied underground groups." In response to this warning, the FBI says it checked databases and interviewed Tsarnaev and other family members in the summer of 2011 but found no evidence of "terrorism activity." Then the FBI says it "requested more information" about Tsarnaev from the foreign government but never received it. Less than 2 years later, Tsarnaev is suspected of masterminding a successful terrorist attack on the city of Boston that killed 3 people and injured hundreds. So the FBI has some questions to answer. [...]"  

MSM: "Mother Of Boston Bombing Suspects Says FBI Was In Contact With Her Son" [04/20/13] Printer Friendly Version "Zubeidat K. Tsarnaeva, the mother of Boston bombing suspects Dzhokar and Tamerlan Tsarnaev, suggested Friday that the FBI had been surveilling her older son for several years prior to Monday's attack. In an interview with Russia Today Friday, Tsarnaeva said that Tamerlan Tsarnaev got involved in "religious politics" five years ago, and that the FBI had previously contacted her about her son's activities.  "He was controlled by the FBI, like for three, five years," she said. "They knew what my son was doing, they knew what actions and what sites on the Internet he was going [to], they used to come...and talk to me...they were telling me that he was really a serious leader and they were afraid of him."  "How could this happen?...They were controlling every step of him, and they are telling today that this is a terrorist attack," she added. A spokesperson for the FBI told Business Insider Friday that the agency would be putting out a statement "shortly" regarding its previous contact with either of the Tsarnaev suspects. The spokesperson would not confirm or deny that the agency had had any previous contact.  Tsarnaeva doubled down on her statements later in the interview, insisting that her sons were innocent, and had been "set up" by the FBI:  [...]"  

Commentary: "FBI Tells America: Believe Us And No One Else" [04/19/13] Printer Friendly Version "The implication is clear: there is official truth and then there is everything else. How many times has that assertion put America in the dumper? As I write this, one suspect in the Marathon bombings is dead, and the other suspect is apparently surrounded in a house in Watertown, Massachsetts. (6:55AM, Pacific) The city of Boston is locked down. Once events reach this point, an overwhelming number of people believe the authorities. They accept what is happening. The FBI must have it right. Reject all other possibilities. That’s always a dangerous assumption. Yesterday, at a heralded press conference, seen by millions around the world, Richard DesLauriers, special agent in charge of the FBI’s Boston division, produced photos and video of two suspects in the Marathon bombing. He stated: “…these images should be the only ones, I emphasize, the only ones that the public should view to assist us. Other photos should not be deemed credible, and they unnecessarily divert the public’s attention in the wrong direction, and create undo work for vital law-enforcement resources.” Translation: Ignore all the images uncovered by independent researchers, citizen reporters, bloggers. Forget, for example, about photos of those men who appear to work for Craft International, a private security contractor, who were standing at the finish line of the Marathon. We, the FBI, are running this show. We’re the pros, we deal, you behave.[...]  Richard DesLauriers, who starred in the FBI press conference, made his bones at the Bureau by engineering the exchange of 10 Russian sleeper agents in the US for four CIA agents who were in prison in Russia. That was his big career move. The Russian sleeper agents had been operating under the nose of the FBI in the US, who, in typical fashion, weren’t making any arrests. They were just tracking these Russian spies and watching them, for more than 10 years, as the spies passed across intelligence to their Russian controls. This was a very delicate exchange, mainly because FBI field agents a) didn’t want to let the Russians go back home and escape prosecution and b) because the FBI and the CIA hate each other, and the FBI people weren’t all that enthused about the value of the deal. Bring home four CIA people in return for releasing 10 Russian sleeper agents? Nothing to celebrate there.  [...]" [Cross-Posted]  

Commentary: "Chechen Terrorist Networks Trace Back to the US State Department" [04/19/13] Printer Friendly Version "With the latest developments regarding the suspects identified in the Boston Bombing, reports of the alleged perpetrators’ Chechnyan heritage are being used by the whole of the mainstream media to draw connections between the bombing and Islamic terrorism. Even despite the desire of mainstream magazines like Salon for the bomber(s) to have been white Americans, the narrative being paraded in front of the American collective is currently satisfied with the meme of the Chechen Muslim fundamentalist. [...] Chechen “rebels,” much like their “rebel” cousins in Syria, are, in fact, receiving training, weapons, and financial support via the very networks that so vociferously claim to oppose them – the United States and British governments. Indeed, in order to see the direct connection between the U.S. government and Chechen terrorism, one need only look toward the leader of the “Chechen rebels,” the Minister of Foreign Affairs of the Chechen Republic-Ichkeria, Ilyas Akhmadov, who resides internationally by bouncing back and forth between the United States and Britain all on the tab of the U.S. State Department ever since 2004.[...]" Related: "Father of Boston Suspects: “US Security Services Set Up My Sons” [3:18] | "Suspects' Uncle Holds Furious Press Conference: 'They Do Not Deserve To Live On This Earth'" Printer Friendly Version |"Ramzan Kadyrov, Chechen President, Suggests Boston Bombing Suspects Products Of American Upbringing" Printer Friendly Version 

MSM: "Wild Brooklyn Melee Erupts As NYPD Arrests Muslim Teen For Allegedly Taunting Jewish Subway Rider" [04/19/13] Printer Friendly Version [7:09] "Stephan Stowe, 17, was charged with harassment after telling Jewish rider ‘They should have killed all of you.’ Police also wrestled a woman to the ground and arrested her after angry onlookers swarmed the station's platform, snapping video and yelling at cops during the incident.  [...]"  

MSM: "Video From The Crazy Shootout Between Police And Boston Suspects" [04/19/13] [1:25] "After a police officer was shot dead at MIT university, the manhunt for the suspects sought in the Boston Bombing carried over into nearby Watertown, Mass. The Telegraph has captured some video of the events of last night, with heavily-armed police officers and helicopters overhead. In the video, audio from the shootout with police is heard, which The Telegraph says is from a resident of Watertown who posted it to Facebook. Heavy gunfire and explosions can be heard, and police later shout, "Show me your hands! Show us your hands!" Watch the video [...]"  

MSM: "FBI names Chechnyan Russian Dzhokhar Tsarnaev As Latest At-Large Boston Marathon Bomb Suspect" [04/19/13] Printer Friendly Version "The FBI has refuted the Boston PD yet again this time naming 19-year-old Dzhokhar Tsarnaev and his brother from the Chechnya region of Russia as the Boston Bombings suspects. A massive law enforcement operation is underway as a manhunt ensues to locate the suspect and Massachusetts remains under lock down after a gunfight with explosions occurred which claimed the life of at least one officer and one of the suspects occurred in the early hours of the morning. According to reports, both men have been in America for at least a year and believed to have received military training. [...]"  

MSM: "MIT Says There's a Shooter on the Loose and Officer Down on Campus" [04/19/13] Printer Friendly Version "MIT issued an emergency alert at 10:48 on Thursday night reporting shots fired on the university campus. The school newspaper reports, "Shots fired near 32 Vassar St (Stata Center), police officer down. Please stay inside." That report is backed up by CBS News's Bonney Kapp who reports hearing "officer down" on the police scanner just before the MIT alert went out. For now, details are scarce, but the suspect is on the loose and considered armed and extremely dangerous.  [...]"  

Commentary: "Private Military Contractors Under Suspicion for Boston Bombing" [04/19/13] Printer Friendly Version "Yesterday, Infowars.com posted images of what they referred to as Navy SEALs in civilian field gear lurking at the finish line of the Boston Marathon where two bombs killed 3 and injured hundreds. It turns out these men were Blackwater-like private military contractors from Craft International, according to investigative journalist Anthony Gucciardi of StoryLeak.com. The two mercenaries were wearing typical field gear of khaki tactical pants, combat boots, black coats, and carrying suspicious backpacks. But what really gives them away as Craft International mercs is the hat with the Punisher-like symbol on it. Gucciardi writes:  There has been much discussion over the two individuals fitted with earpieces and military-esque gear spotted at the Boston Marathon, but as it turns out they may likely be employees of the Blackwater-style private military/security firm Craft International. Craft International, modeled after Blackwater as an advanced private military training organization, was founded by the late ex-Navy SEAL Sniper Chris Kyle. Either these serious-looking fellows are big fans of military contractors and want to emulate them, or they're the real deal. In either case, they seem very suspicious to be at the scene of the crime clearly dressed in civilian mission gear. Additionally, a third figure dressed identically is seen crossing the threshold of the finish line holding what appears to be some kind of device. A Youtube video appears to capture a former member of the Navy SEALs walking around the marathon post-explosion with a radiation detector. He has a military style haircut. His boots are military type desert style bates (Tactical Sport Desert Tan) commonly used in the Army and Airforce: Video clip  [0:34] Related: "Craft International: Private Military Forces at Boston Marathon" Printer Friendly Version "FBI briefing on Boston bombings postponed. The FBI said it “needs more time to prepare” before speaking to the media. Struggling to get their narrative straight in the aftermath of numerous men with backpacks being identified? Photos collated on the 4chan website show numerous images of suspicious individuals wearing large backpacks present at the scene of the Boston Marathon bombings. Three of the men appear to be Arab or Middle Eastern in appearance, whereas another two of the individuals are white. The images show the men looking away from the marathon runners, talking on cellphones and running from the scene immediately after the blast. Remains of one of the backpacks are also photographed yards from where one of the bombs exploded. The FBI states that at least one of the pressure cooker devices used in the bombing was housed in a backpack. Some of these men may have merely been victims, but the image of the two men standing together wearing the same clothes and carrying heavy backpacks and wearing credentials suggests they may have been involved in a drill or in the actual attack. One of individuals, a white man whose backpack was found at the scene of the bombing, looks badly dressed and disheveled. [...]" | "Private Security with Black Backpacks Spotted at Boston Marathon " Alex Jones [98:31] "Alex examines the tell-tale signs that point to the Boston Marathon explosions in all likelihood being a false flag attack perpetrated by our own government to take our freedoms, from denials of a drill by appointed officials, to eyewitness accounts of people told prior to the race to stay calm because bomb-sniffing dogs and beefed-up security were part of a "training exercise." Alex also analyzes attempts by the liberal press and certain politicians to predictably blame the bombing on "domestic terrorists," specifically "right-wing extremists."  [...]"  |"FBI Ignores Men With Backpacks At Scene of Boston Bombings" Printer Friendly Version The FBI has attempted to blacklist photos which show men working for a private military organization wearing heavy backpacks and appearing to take part in a drill at the Boston Marathon, instead focusing on two other individuals while proclaiming, “other photos will not be deemed credible.” As Infowars has documented over the last two days, photos taken from the scene of the blast show numerous individuals wearing identical clothing while carrying heavy black backpacks, talking into cellphones and in one case placing one of the backpacks on the ground. [...]"  

MSM: "Judge Napolitano On Government Faking Terror Plots" [04/19/13] [5:02] "The Judge explains the post-9/11 history of terror plots created and facilitated by the FBI and what it means for the alleged Iranian plot. [...]"  

Commentary: "American Police Now “Israeli-DHS Trained,” Precursor To Dictatorship" [04/19/13] Printer Friendly Version "Slowly, every police department in the United States, at the behest of the Department of Homeland Security, is being trained by Israeli groups. As part of this training, there is an increased move to use of military uniforms, armored vehicles, heavy weapons, illegal surveillance, lying to the people, press and courts and systematic interference in the electoral system. They are becoming “Israeli.” The door to this foreign influence in America was thrown open by the Department of Homeland Security and, in particular, Michael Chertoff, an Israeli citizen who was, in particular, most instrumental as former Director of DHS in implementing policies challenged as unconstitutional, policies the new “Israeli trained” American police are tasked with stopping opposition to. “Israelization” of American police is a simple process:  [...] 90% of terrorism, worldwide, including many of the mass killing incidents, all show a pattern of involvement by intelligence organizations. Almost all “terror threats” and “staged announcements” are traced to groups tied directly to the same people who show up at our door with the “cure” to a disease they themselves create. [...]" [Cross-Posted]  

MSM: "Weapons Of Mass Distraction" [04/19/13]   [5:24] "Abby Martin calls out the corporate media for their irresponsible coverage of the Boston Bombings, highlighting how mainstream outlets have spent more time speculating on events with reactionary disaster porn, instead of reporting on reliable facts. [...]"  

MSM: "Israeli Police Head To US To Aid In Boston Marathon Bombing Investigation" [04/18/13] Printer Friendly Version "The investigation into Monday’s deadly bombing at the Boston Marathon has officially gone international: law enforcement officials from Israel have been sent to the United States to assist in the probe. Israel Police Chief Yohanan Danino says he has dispatched officials to Boston, Massachusetts, where they will meet with Federal Bureau of Investigation agents and other authorities, the Times of Israel Reports. Citing an earlier report published by the newspaper Maariv, Times of Israel writes that Danino has dispatched police officers to participate in discussions that “will center on the Boston Marathon bombings and deepening professional cooperation between the law enforcement agencies of both countries.” The paper reports that Israeli law enforcement planned the trip before the deadly pair of bombings on Monday that has so far claimed three lives, but the discussions will now shift focus in order to see how help from abroad can expand the investigation. [...]" Note: The Israelis want to make sure that Mossad participation remains concealed . Related: "On The Mossad Track Record with Pressure Cooker Bombs" Printer Friendly Version "The six-litre pressure cookers contained nails, ball bearings, other shrapnel and gunpowder and were placed on the ground inside black duffel bags near the finish line. Such devices have been used in attacks in Afghanistan, Pakistan, India and Nepal, and one was also deployed in the failed Times Square bombing in May 2010. Note: the Times Square bombing was conducted by Zionist Jews, a rabbi being caught in the act. He was caught on CCTV changing his outfit after setting the bomb. Regardless, this is all a Zionist plot to implicate Islaam for not only the Boston Marathon bombing but also for all their various acts of terror. [...] January 10, 2013: Mossad moles arrested with bomb-making material, wicked intent: A man and his girlfriend, who gave birth under arrest, are facing weapons charges after police say they found a powerful substance used to make bombs and an arsenal of weapons in their New York City apartment. Morgan Gliedman, 27, and Aaron Greene, 31, were arrested Saturday in their Manhattan apartment after officers with a search warrant found 7 grams of HMTD, a highly explosive white powder used in bomb making. Police also seized a flare launcher, a sawed-off shotgun, nine rifle magazines and various how-to manuals on building bombs and booby traps. [...] Only the Mossad and its collaborators would do this. The only way to do it was after the primary race, when the bomb-sniffing dogs and the roof spotters where largely off-site. According to one Tweet by the Boston Police Department the bomb squads were in part performing a drill at virtually precisely the same time as the bombing. This would imply extensive coordination to be sure that the bombing was achieved without risk."  [...] talking heads in the aftermath of the Boston bombing have mentioned that HMTD is the base explosive made by al-Qaeda. It is a kind of revelation that, in fact, the Mossad did use this explosive, and if this is found out, laying a trail against Islamic people.[...]" | "CIA Trained Afghans To Use Pressure Cookers Against Soviet Army" CIA Agent Baer" [9:08]   

Corbett Report: "The FBI Fosters, Funds and Equips American Terrorists" [04/18/13] [14:19] "The Boston Marathon bombing has provoked shock, grief and outrage from around the world. After decades of conditioning, the public automatically equates such terrorism with Muslim radicals. But the evidence shows that every major terror plot on American soil in the past 10 years has been fostered, funded and equipped by one organization: the FBI. [...]"  

MSM: "Boston Bomber 'Is Trapped By His Phone': FBI 'Use Phone Records To Identify Suspect" [04/18/13] Printer Friendly Version "Investigators have identified the face of a Boston marathon suspect using security video that filmed the moments before two blasts ripped through central Boston on Monday - in what is potentially the biggest break in the case yet. According to Reuters, a law enforcement source confirmed that the FBI want to speak to the individual seen on cameras filmed from a nearby Lord and Taylor department store which reportedly show this man planting the second bomb while talking on his cellphone. Investigators say the man is seen at the site of the second explosion wearing a black jacket, a grey hooded sweatshirt, about 6 feet or 6-feet-2-inches tall with a medium build and a white or off-color-white baseball cap backwards placing a back-pack on the ground. The video obtained by the FBI captures this lone man using his cellphone at the moment the first explosion detonated 100 yards away on Boylston Street on Monday and 12 seconds before the second blast close to where he is standing. According to CBS investigators are now going through cell phone logs to determine who made calls from that location near the time of the explosions. Other sources have said the FBI is working with a list of names of cell phone owners and attempting to match one of those to the unknown man on the surveillance. [...]"  Related: "Boston Bombing Culprits Identified?" Printer Friendly Version  

Interviews: "Boston Bombing: Hallmarks of A False Flag – Joel Skousen" [04/18/13] [18:29] "Mormon Joel Skousen has his say on the Alex Jones show [...]" 

Flashback: "How Did Mossad Know The London Bombings Were Going To Happen?" [04/18/13] Printer Friendly Version "..the Mossad office in London received advance notice about the attacks, but only six minutes before the first blast... [...]"  Related: "The 7/7 London Bombings: How to Set Up a Patsy" Printer Friendly Version "I got an email with an interesting rumor going around London that just before the attacks, someone was trying to hire Muslims to play terrorists for a terror drill, to try to sneak onto the trains and buses with fake bombs to test out the security. We know the terror drill was real. We know they were running the drill at the exact same stations the bombings actually occurred. [...]" 

MSM: "FBI Arrests Suspect In Ricin Letters To Obama" [04/18/13] Printer Friendly Version "Federal agents on Wednesday arrested a suspect in the mailing of letters to President Barack Obama and a U.S. senator that initially tested positive for the poison ricin. The suspect was identified as Kenneth Curtis of Tupelo, Miss. Both letters carried an identical closing statement, according to the FBI. [...]"  

Commentary: "FBI Says Ricin Letters Sent To Obama And Sen. Wicker Not Linked To Boston Marathon Bombings" [04/18/13] Printer Friendly Version "According to the FBI, the letters that reportedly tested positive for ricin sent to President Barack Obama and Senator Roger Wicker are not connected to the Boston Marathon bombings. More letters may be received as the investigation continues, according to a statement issued Wednesday by the FBI. It is important to note that the positive test for ricin is only preliminary and a full lab test – which can actually contradict the preliminary test – can take up to 48 hours to complete. “There is no indication of a connection to the attack in Boston,” the FBI statement said, casting aside the speculation surrounding a link between the two incidents. [...]"  Related: "Senator: Police Have Suspect in Ricin Mailing" Printer Friendly Version "Unlike with the Boston Marathon bomber, police have a suspect in mind as they try to determine who mailed a letter to Sen. Roger Wicker that tested positive for poisonous ricin, a Senate colleague said. “The person that is a suspect writes a lot of letters to members,” Sen. Claire McCaskill, D-Mo., said Tuesday as she emerged from a classified briefing.  [...]" 

MSM: "‘No Assault Rifle Used In Sandy Hook School Shooting’" [04/18/13] Printer Friendly Version "In a crazy twist that really makes you wonder about the credibility of US law enforcement, mainstream media, and the US government alike, new information comes forth from state and federal officials on the Sandy Hook School Shooting. Contradictory to all of the reports, officials now say that 4 handguns were recovered from the school, and only handguns. No AR-15 “assault rifle” was used in the shootings as originally reported by media and police. It has also now come out according to reports that Lanza was involved in some sort of an altercation with 4 staff members at the school. Now citizens speculate if factions of their very own government used the event to pass gun control measures such as the New York “SAFE Act“. [...]" 

Commentary: "Boston Highlights the Illusion of Terror and Security" [04/18/13] Printer Friendly Version " ...There is nothing more symbolic of the fall of America as a free people than scenes of impotent militarized police standing around aimlessly with their immense arsenal cradled in their idle hands in the wake of an attack their presence did nothing to prevent. What's more, is their presence after the attack was likewise useless, their weapons and armor incapable of doing anything to help the scores of injured.  [...] Disturbing is the habit of the FBI's posing as terrorists with ties to Al Qaeda, approaching patsies who they then provide explosives and other weapons to, and help engineer an attack which they then "foil" to make spectacular headlines. Many times real explosives are test-detonated with suspects, before inert devices are switched in for the final attack. [...]"   

Commentary: "AG Holder: Americans Not Worried Enough About Home-Grown Terrorists" [04/17/13] Printer Friendly Version "Attorney General Eric Holder (pictured) lies awake at night worrying about the threat to the homeland from home-grown terrorists. “It’s a very serious threat. I think what it says is that the scope, our scope, has to be broadened. We can’t think that it’s just a bunch of people in caves in some part of the world,” Holder told ABC News on Wednesday. “We have to be concerned about the homeland to the same extent that we are worried about the threat coming from overseas.” The threat, as Holder sees it, is increased by the failure of the American people to fear the next attack. [...]"  Note: It's easy to see how pathological these people are. Ernest Beckers "Terror Management Theory" at work again. See the "Flight From Death" video at the top of this panel to see how it works ...

Commentary: "Ricin: History Is Repeating Itself After Boston Marathon Bombings" [04/17/13] Printer Friendly Version "After the 9/11 attacks, there were a string of political figures who had Anthrax mailed to their office. This stoked the people’s fears after the deadly attacks. It seems that history is now repeating itself. A letter for Senator Roger Wicker was intercepted at an off-site mail facility today, laced with Ricin, a deadly poison. This is an eerie reminder of the events on 9/11, happening only a day after theBoston Marathon bombings. The bombings are quickly being considered a staged false flag event to ramp up the people’s fears; the Ricin letters are an additional tool used by the globalists to keep Americans living in constant fear. [...]"  

Propaganda Theatre: "Al Qaeda Investigated In Boston Blasts" [04/17/13] Printer Friendly Version " Law enforcement and intelligence authorities investigating the Boston terror bombings suspect al Qaeda terrorists were behind the blasts that killed three and injured scores although so far there is no firm evidence. A U.S. official familiar with briefings on the probe into the blast said investigators remain stymied in determining who was behind the bombings near the finish line of the Boston Marathon Monday. So far there has been no claim of responsibility, something that in the past was a characteristic of al Qaeda’s attack methodology. Senior jihadists monitored by Western intelligence agencies on the Internet remained silent in the hours after the bombings, officials said. [...]"  Related: See below.

Propaganda Theatre: "Peter King: ‘Saudi Man Is Still A Suspect’, Pressure Cooker Bombs Suggest Al Qaeda" [04/16/13] [10:22]  "Peter King sounds quite insane, but he is the mouthpiece for the military industrialists who want more “money” for more “security”, and more “money” to keep fighting their never ending wars in places like… Afghanistan! [...]"  Related: "Al-Qaeda" Does Not Exist" Printer Friendly Version "The origins of the name "Al-Qaeda," and its real arabic connotations prove that every time the Bush administration, Fox News, or any individual who cites the threat of "Al-Qaeda," as a mandate for war and domestic authoritarianism, they are propagating the myth that such a group ever existed.  [...]" |"BBC: al Qaeda Does Not Exist", Banned in the U.S." Printer Friendly Version | Corbett Report: "Al Qaeda Doesn't Exist" [14:22] "Part One of the Al Qaeda Doesn't Exist documentary from The Corbett Report, dealing with the founding and funding of what we know as Al Qaeda. [...]"  

Propaganda Theatre: "Media Parade of Zionist Commentators Rush To 'Judgment' In Boston Marathon Bombing" [04/16/13] Printer Friendly Version "The explosion of two bombs Monday afternoon at the Boston Marathon has been accompanied by a rush to judgment by the media, in which claims of 'a broad new terror attack' are being made without any factual substantiation. [...] In the absence of clear facts or forensic evidence, many of the statements made by the media amounted to pure speculation, aimed at promoting an unstated political agenda and encouraging a mood of panic. Many assertions contradicted one another. For example, some commentators claimed the explosive devices were small and primitive, while others said they were sophisticated and indicated the work of a terrorist organization. Some media outlets in particular seemed bent on 'steering the public toward the view that the Boston events were a terror attack along the lines of 9/11'. CNN’s Wolf Blitzer (dual-nationality Israeli Zionist) directed the network’s reportage along these lines, encouraging his “expert” commentators to make wide-ranging claims within minutes of the explosions and while the mayhem on the streets of Boston was still unfolding. Jane Harman (Zionist multimillionare), the former Democratic chair of the House Intelligence Committee, appearing as a 'CNN commentator', claimed the bombings 'pointed in the direction of Al Qaeda'. The Murdoch (Zionist) press’ New York Post ran a banner headline, “Clearly an Act of Terror,” and featured a second article  headlined “Authorities ID suspect as Saudi national in marathon bombings, under guard at Boston hospital.” NBC Evening News featured as its terrorism expert Michael Leiter, (Zionist) former director (CV) of the US National Counterterrorism Center under both the Bush and Obama administrations. Without any factual substantiation, Leiter declared that the bombings were the act of a “terrorist organization.”[...]"  Note: It also begs the question as to what this is a distraction from .. the financial chaos and manipulation, etc ... look for Mossad methods of operation in this, with US assistance ... recall the work of Ernest Becker and Terror Management Studies (see Special Notes panel below) which make use of the 'fear of death' to manipulate populations. Related: "Kill All Muslims': Fox News Contributor Erik Rush Provokes Furious Reaction With Tweet Following Boston Marathon Bomb Attack" Printer Friendly Version |"While You Focus On the Boston Bombing, You Are Blind To Tragedies In Your Own Back Yard" [2:43] 

Commentary: "Family Guy Episode 'Predicted' Boston Marathon Attack" [04/16/13] Printer Friendly Version Video clip  [9:40] "An episode of the popular show Family Guy which was first aired less than a month ago eerily predicted aspects of the Boston Marathon attack, depicting the main character detonating two bombs in addition to winning the marathon by killing the rest of the participants. The episode, named Turban Cowboy, centers around Peter becoming embroiled with terrorists who plan on blowing up bridges in Boston. The show aired on March 17, just under a month ago on the Fox network and has been repeated in recent days. The image of Peter killing the Boston Marathon runners even shows blood and missing limbs, a chilling reminder of the very real scenes of carnage we saw yesterday. It is important to note that the video shows two clips from different points of the show edited together, but they are from the same episode. Critics responded to the episode by remarking that it “feels like an episode made in 2002 and left on the shelf for a decade.” The plot was so similar to the tragic events in Boston yesterday that scenes have been deleted for rebroadcasts. [...]"  

Commentary: "Timing: The Boston Bombing: On Massachusetts ‘Patriot’s Day’?" [04/16/13] Printer Friendly Version "Patriot’s Day magically coincides with the Branch Davidian compound slaughter at Waco, Texas, and the Oklahoma City bombing (both federal government cover-ups), so it doesn’t take a genius to guess that Eric Holder and the Department of Justice will be running point on all the talking points related to this crime scene, perhaps claiming that this week is some sort of ‘rallying cry’ for right-wing anti-government groups. [...]"  Related: "News Stations Now Blaming Right Wing Religious Conservatives For Boston Bombing" 8  | "Media Exploits Boston Marathon Terror to Demonize Alex Jones" Printer Friendly Version |"The Month Of April Seems Prone To Mass Violence" Printer Friendly Version "On NBC, reporter Tom Llamas told Matt Lauer that "over the last 20 years in this country several terrorist attacks and school shootings have taken place around this time of the year." He cited the Virginia Tech shooting, which took place April 16, 2007; the Columbine school shooting, which occurred April 20, 1999, and the Oklahoma City bombing, which took place on April 19, 1995. [...]" | "Coming Up: "Occult" Significance -Period Of April 19-May 1" Printer Friendly Version "This thirteen day stretch is considered blood sacrifice to the fire god; a critical 13-day period of the year. Fire sacrifice is required around the Date of April 19. The definition of fire sacrifice can vary, yet throughout history great fires or murderous events killed innocent humans surrounding the dates of April 19 through May 1. April 19 is the first day of the 13-day satanic ritual day relating to the fire/sun god. This day is a human sacrifice day, sometimes emotional sacrifice, demanding fire sacrifice with an emphasis on human death. This day is a sacrifice day of importance, and as such, has had some important historic events occur on this day. [...] Historic events that were staged according to this blood sacrifice period of April 19-20th:[...]"

Commentary: "The Boston Bombing — The Eerily Predictable Symbolism of an Age of Terror" [04/16/13] Printer Friendly Version "Yair Rosenberg, a writer at Tablet Magazine and the editor of the English-language blog of the Israeli National Archives, makes an intriguing observation about the multiple explosions at the Boston Marathon. Commenting on a photo taken by the Boston Globe’s John Tlumacki of a grey-haired runner lying in the middle of the road surrounded by Boston police officers reacting at the scene, Rosenberg draws attention to what might best be described as the uncannily predictable symbolism associated with such terror events: Eerily, the photo above depicts first responders after the explosion, with the Israeli flag visible in the background—on Israel’s own memorial day [...]" 

MSM: "Hagel Says Pentagon Ready to Violate Posse Comitatus" [04/16/13] Printer Friendly Version Video clip  [2:11] " The U.S. military is ready to assist after what Defense Secretary Chuck Hagel called a “cruel act of terror” in Boston. Testifying on Capitol Hill, Hagel said Tuesday that the attack on the Boston Marathon was terrorism, and that the Pentagon is prepared to respond quickly to any request from domestic law enforcement. [...]"  

Commentary: "FBI's History of Handling "Terror Suspects" Live Explosives " [04/16/13] Printer Friendly Version "In late September 2011, AFP reported that a man was charged with "planning to fly explosive-packed, remote controlled airplanes into the Pentagon and the Capitol in Washington." In its report, "US man charged with Pentagon bomb plot," AFP stated (emphasis added): During the alleged plot, undercover FBI agents posed as accomplices who supplied Ferdaus with one remote-controlled plane, C4 explosives, and small arms that he allegedly envisioned using in a simultaneous ground assault in Washington. However, ''the public was never in danger from the explosive devices, which were controlled by undercover FBI employees,'' the FBI said. Ferdaus was arrested in Framingham, near Boston, immediately after putting the newly delivered weapons into a storage container, the FBI said. Authorities described Ferdaus as a physics graduate from Northeastern University who followed al-Qaeda and was committed to ''violent jihad'' since early last year. In November 2010, a similar "plot" was engineered, then "disrupted," also by the FBI - this time in Portland, Oregon. The so-called "Christmas Tree Bomber" attempted to remote detonate a van he believed was filled with explosives, provided by the FBI, before being arrested during a Christmas tree lighting ceremony at Pioneer Courthhouse Square. The FBI's official statement regarding the incident revealed that FBI agents had handled, even detonated live explosives with the entrapped suspect at Lincoln County Park in the lead up to the final failed bombing. [...]"  

Commentary: "Official Story Unraveling For Boston Marathon Bombing; Clear Evidence Points To Bomb Squad's Prior Knowledge" [04/16/13] Printer Friendly Version "It's now becoming clear that members of the Boston bomb squad had advance notice of the horrific bombing that took place at the marathon today. As an eyewitness reports, once the bombs went off, officials began announcing, "this is just a drill!" This logically means they were all informed of the "bomb drill" beforehand. Otherwise, why would they respond with, "this is just a drill" ? According to Local15TV.com, a University of Mobile's Cross Country Coach said there were bomb-sniffing dogs at both the start and finish lines, long before any explosions went off. [...]" Related: "MSM Backtracking On Ball Bearings And Unexploded Bombs" [5:00] "As we have demonstrated time and time again, the "official" story in these events always begins to fall into place on day 2. So never mind that "every bomb tells a story" and just like day one of the Oklahoma City bombing, never mind the initial media reports of additional bombs being found. [...]" |"Problems with the Boston Bombing Story Surface" [1:57] | "Boston Police Radio: Additional Explosive Devices Found" [12:30]   "There’s devices… definitely devices here,” a voice in the background of the audio says between 17 and 25 seconds into the video below. “Get off the radio, I want the channel clear,” another voice says at 30 seconds. On April 16, Massachusetts Governor Deval Patrick and officialdom stated not additional explosive devices were found on the scene of the Boston Marathon. The official story is now in chaos.[...]" 

Commentary: "The New World Order Formula for False Flag Attacks" [04/16/13] Printer Friendly Version "As Mark Twain once said, “history does not repeat, but it sure does rhyme.” [...]" 

MSM: "Cell Phone Service Shutdown Immediately Following Explosions At Boston Marathon" [04/16/13] [9:32] 

MSM: "Boston Bombing 'Used Pressure Cooker Packed With Metal'" [04/16/13] Printer Friendly Version  "Clues emerge from forensic examination of bomb site, but investigators still have no leads on perpetrator or motive. Federal investigators involved in one of the largest manhunts in US history have revealed that the Boston marathon bombs that killed three people and injured more than 170 may have been made from pressure cookers packed with ball bearings and nails. [...]"  Note: Another story claimed that a piece of a circuit board had been found.

MSM: "Mass Casualty Mobile Tablet Deployed For Use In Boston Marathon 3 days In Advance" [04/16/13] Printer Friendly Version "Why was mass casualty technology deployed 3 days before the Boston Marathon for the first time, preceding an actual bombing attack rare to American history? [...]"  

MSM: "Boston Runners Were Warned Beforehand That "They Were Going To Die" [04/16/13] Printer Friendly Version "Runners getting set to take part in the Boston Marathon were warned beforehand that they were going to die, said a Squamish resident who took part in the race. Mike Heiliger, 59, said a woman holding several bags was telling runners who were picking up their pre-race packages in downtown Boston on Saturday (April 13) that they were going to die if they participated in the event. [...]"  

Commentary: "Early Evidence Indicates Boston Marathon Bombing Was a False Flag" [04/16/13] Printer Friendly Version "Only hours after two bombs were detonated near the finish line of a Boston marathon, evidence is beginning to emerge suggesting that the act may have been a false flag attack. While reports continue to emerge from the scene, a number of facts point toward the typical setup used to devise, control, and execute such an attack as took place around the 9/11, 7/7, and OKC bombings as well as the Aurora and Sandy Hook shootings. One of the hallmark signals of a false flag attack, as Webster Tarpley has expertly demonstrated in his book, 9/11 Synthetic Terror, is the use of drills acting as a cover for sinister plans and mechanizations within the halls of the shadow government itself which ultimately manifest as false flag terror attacks. Much like the aforementioned attacks, the Boston Bombing also carried the trademark “coincidence” of a drill scheduled to take place at almost exactly the same time that the bombs were being detonated at the marathon. For instance, earlier in the morning of April 15, 2013, the “Officials: There will be a controlled explosion opposite the library within one minute as part of bomb squad activities.”  [...]" Related: See below. "It is important to emphasize that the New York Times recently reported that most of the recent domestic terror plots in the United States “were facilitated by the F.B.I.,” suggesting that today’s incident in Boston may have been part of such an operation. It remains to be seen how the media and the Obama administration will exploit this incident depending who gets the blame, but Rahm Emanuel’s “never let a serious crisis go to waste” advisory is sure to be in play."

Commentary: "Bombing Happened On Same Day As ‘Controlled Explosion’ Drill By Boston Bomb Squad" [04/15/13] Printer Friendly Version "What’s not yet being reported by the mainstream media is that a “controlled explosion” was under way on the same day as the marathon explosion. As the Boston Globe tweeted today, “Officials: There will be a controlled explosion opposite the library within one minute as part of bomb squad activities.” Some people believe this explosion might have been part of the demolition of another bomb. It seems unlikely, however, that a bomb at the library, one mile away, could be so quickly located and rigged to be exploded by the bomb squad in less than one hour following the initial explosions at the marathon.  What's not yet being reported by the mainstream media is that a "controlled explosion" was under way on the same day as the marathon explosion. As the Boston Globe tweeted today, "Officials: There will be a controlled explosion opposite the library within one minute as part of bomb squad activities." Some people believe this explosion might have been part of the demolition of another bomb. It seems unlikely, however, that a bomb at the library, one mile away, could be so quickly located and rigged to be exploded by the bomb squad in less than one hour following the initial explosions at the marathon.[...]"  Note: Why is this not surprising .. parallel drills also happened with 9/11, 7/7 and other events. Related "UM Coach: Bomb Sniffing Dogs Were at Start, Finish Lines for “Drill”" Printer Friendly Version "University of Mobile’s Cross Country Coach, who was near the finish line of the Boston Marathon when a series of explosions went off, said he thought it was odd there were bomb sniffing dogs at the start and finish lines. [...]" | See also below.

False Flag Ops: "Two Nearly Simultaneous Explosions In Boston Near Buildings At End of Marathon" [04/15/13] Printer Friendly Version Photo |Video clip  [0:31]"There have been multiple explosions at the finish line for the Boston Marathon, with reports of at least "dozens" of injuries. We spoke to a Boston Police Department Spokesperson who said there was "some sort of incident at 671 Boylston Street" just before 3pm EST, which is the finish line for the race. They could not give out further information at the time of the call. Live video from CBS shows ambulances at the scene. The New York Post reports that 12 are dead and dozens more are injured, while the Boston Police's Twitter account currently says 2 dead and 22 injured. Fox News reports that there are at least 10 patients with lost limbs just at MA General Hospital. [...]" Related: "Police Investigating Reports Of More Bombs In Boston After Marathon Blast" Printer Friendly Version "Following multiple explosions at the finish line of the Boston Marathon, police are investigating reports of bombs in other parts of the city, Time's Andrew Katz is reporting. Citing a police scanner, Katz tweeted that there was an "incendiary device" possible at JFK Library as well as "another device" in front of Boston's luxury Mandarin hotel. One device was found in a trash can and all officers should "beware of trash containers," the police scanner stated, according to Katz. The scanner also said police were going to do a third, controlled explosion on the 600 block of Boylston Street. Boston Phoenix reporter Chris Faraone tweets a police officer near the finish line said this: "There are secondary devices that have been found and are unexploded." [...]" | "NYPD Is Stepping Up Security At Hotels And Other Prominent Locations After Boston Marathon Explosions" Printer Friendly Version | "Boston Police Are Already Calling The Site Of The Marathon Blast 'Ground Zero'" Printer Friendly Version | "Reported Boston Explosion Suspect In Custody, Is A Saudi National" Printer Friendly Version |"Police Have Video of Suspect Dropping Bombs in Trash Cans" Printer Friendly Version | "Boston Police Looked For Yellow Penske Truck In The Marathon Bombing" Printer Friendly Version "Police spent part of the day looking for a yellow Penske truck after the Boston Marathon bombing. Earlier, Boston police were asked by the FBI to look out for a yellow Penske truck with an unidentified driver, according to emergency services radio scanner chatter. The dispatcher advised officers to "approach with caution." The truck apparently attempted to deliver medical supplies near the marathon earlier in the day but was turned away. [...]"  Note: Who stands to benefit .... the control paradigm only ... another intentionally staged operation ... the Israeli Mossad loves to do this stuff ...

Status Report: "Homeland Security's New $3.9 Billion Headquarters On Grounds Of Former Mental Institution" [04/15/13] Printer Friendly Version "Barack Obama is trying to solve big problems in his proposed 2014 budget. His efforts to curtail entitlement spending have gotten most of the headlines. But he also seems determined to complete the U.S. Department of Homeland Security’s new headquarters, the largest federal construction project since the Pentagon rose in the 1940s. The cost: $3.9 billion. The project would unite at a single location nearly all DHS’s 22 divisions devoted to thwarting terrorists and safeguarding the populace from natural and manmade disasters. The site is the campus of St. Elizabeth Hospital, a former federal asylum that was once the home of poet Ezra Pound and John Hinckley, Ronald Reagan’s would-be assassin. There would be 4.5 million square feet of workspace in the new facility and ample employee parking. The project’s supporters say the price tag is justified. They say it’s not easy to get the various DHS divisions to operate in concert with each other if they are scattered throughout the capital area. At the 2009 groundbreaking, DHS Secretary Janet Napolitano herself made the casefor the agency’s costly new digs: “It will help us have meetings. It will help us create a culture of ‘one DHS.’” It didn’t take long for the project to become mired in politics. House Republicans, a number of whom see the DHS as an inefficient and fiscally profligate bureaucracy, were loath to fund the new headquarters fully.  [...] Now Obama is trying to ensure that the DHS headquarters eventually rises. On Wednesday, the president included $367 million in his budget to continue construction. Getting the money won’t be easy. In February, one of the DHS’s more persistent naysayers, U.S. Representative John Mica, a Florida Republican, boasted about how he and his fellow party members had curtailed the project. He said he would also like to dismantle much of the DHS. He’d better act swiftly. If the White House ever gets all the DHS’s divisions on one campus, nobody will want to move them again.[...]"  Note: Just imagine the astral influences on the already-warped personnel that would staff the DHS headquarters .... if it ever came about ... and it won't ... it is not destined to manifest in this local game. 

Commentary: "Enemies Of The Warfare State: Government Spying On Peaceful Political Dissidents" [04/05/13] Printer Friendly Version " The DHS has used the inflated powers granted to it post-9/11 to expand the definition of “domestic terrorist” to anyone who disagrees with the government and acts on it. [...] But since there is not enough of a terrorist threat to obstruct, the state has been busy countering the real threat they face: dissent. That existing 'threat', notably, only becomes 'truly menacing' to the state when it gets attention. The documents show a Department of Homeland Security that appears obsessed with the question of whether any and all protests that are being surveilled receive media attention and coverage. Reporting within the DHS on media coverage of First Amendment protected activities, even in the smallest places, appears to be a routine part of DHS intelligence reports. None of the documents explain why media coverage of peaceful demonstrations is of interest to law enforcement or concerns “homeland security” in any way.[...]"  Note: It's pretty elemental, really ... they want to forcefully prevent the public from finding out too much and getting excited about anything that could existentially put the lives of state and corporate tyrants in jeopardy... 

Commentary: "TSA Screening Lawsuit Helps Expose Government Abuse" [04/03/13] Printer Friendly Version "On April 3, the First Circuit U.S. Court of Appeals will hear an appeal for a lawsuit against the Transportation Security Administration (TSA) filed by two Harvard law students in 2010 claiming that their Fourth Amendment rights were violated by "nude body scanners" and "enhanced pat-downs." The First Circuit is also allowing Freedom to Travel USA, an anti-TSA advocacy group, to make an appearance and oral arguments. A victory on the side of the two students, Jeffrey Redfern and Anant Pradhan, would definitely be a win for civil liberties and the Bill of Rights. But even if, however, the lawsuits are struck down, this case will help continue to highlight and expose one of the most pervasive institutions of government abuse that exists in America. This case alone is just one of many that the Freedom to Travel USA, Redfern, and Pradhan have helped bring to the public's attention. They have put pressure on the TSA for not disclosing enough information about the capability of its scanners and attacking them for their veil of secrecy and dismissive nature towards worries over the health effects. While some may defend the TSA as supposedly "necessary" for security and many others may acquiesce to their civil liberties violations to go along with the crowd and not raise a fuss, the TSA is truly one of the most vivid examples of the cold, cruel nature of government power. Every time I have had the unfortunate experience of waiting in an airport (and now, even taking the train or bus), I see Orwell's nightmares staring back at me: the latex gloves, the hideous uniforms, the omnipresent voice-overs, the sheep-like lines, the arrogance of undeserved authority. It truly is the purgatory of the national-security state. One could easily write an entire book detailing the outrages and crimes perpetrated by the TSA, and many Americans are no doubt well aware of them or have experienced them directly themselves. There are cases of toddlers and 85-year-old women being searched and humiliated; private property confiscated from passengers; millions scanned with radiation and photographs taken and stored in a database. Perhaps most egregious of all, are the amount of convicted pedophiles and child molesters that have somehow earned a TSA badge. The growth of TSA also exemplifies a point made by economist Robert Higgs. Higgs, in his classic work, Crisis and Leviathan, describes what he calls a "ratchet effect" that perpetuates the costs and increases in government power. Whenever there is a crisis, real or imagined, the government claims new authority, creates agencies, and taxes and transfers wealth. After the crisis is over, the authority may shrink a bit, but never is reduced to the extent that it was before. Unfortunately, the "crisis" that is used to justify the TSA — "the war on terror" — is open-ended, perpetual, and is amplified by a foreign policy of drone warfare, black-op death squads, subsidizing dictators and economic sanctions that breed terrorism worldwide. The predictable boomeranging of an interventionist foreign policy abroad is then used to justify domestic interventionism in the form of TSA domestically. [...]"  

MSM: "Underwear Bomber" Was Working For The CIA"[04/01/13] Printer Friendly Version "Bomber involved in plot to attack US-bound jet was working as an informer with Saudi intelligence and the CIA, it has emerged. A would-be "underwear bomber" involved in a plot to attack a US-based jet was in fact working as an undercover informer with Saudi intelligence and the CIA, it has emerged. The revelation is the latest twist in an increasingly bizarre story about the disruption of an apparent attempt by al-Qaida to strike at a high-profile American target using a sophisticated device hidden in the clothing of an attacker. The plot, which the White House said on Monday had involved the seizing of an underwear bomb by authorities in the Middle East sometime in the last 10 days, had caused alarm throughout the US. [...]"  Note: The whole TSA pat down and surveillance dynamic is built on this diversionary propaganda op. Related: Flashback: "Tracing the CIA Underwear Bomb Leak Back to the White House" 5/18/12 Printer Friendly Version "The Associated Press gets credit for actually breaking the recent "underwear bomber" news, but the information that the plot was an inside job by an intelligence operative actually appears to have come accidentally from a White House attempt at damage control. What makes Reuters' Mark Hosenball's story's fascinating is how it so clearly shows the fine line intelligence and law enforcement agencies have to walk when they deal with the press. It can't be easy showing they're doing their job while assuring people they're safe while not revealing sensitive information. In this case, while explaining why the public had no cause to worry, an insider apparently tipped his hand. You know those expert commentators who once held high-level counter-terrorism jobs and now work as talking heads for news shows? Well, they're called "experts" because they get access to people like current counter-terrorism adviser John Brennan, who held a conference call to brief some of them on the plot earlier this month. And while explaining why they shouldn't tell people the United States was in danger from a would-be bomber, Brennan apparently let the secret slip, reports' Hosenball: According to five people familiar with the call, Brennan stressed that the plot was never a threat to the U.S. public or air safety because Washington had "inside control" over it. Brennan's comment appears unintentionally to have helped lead to disclosure of the secret at the heart of a joint U.S.-British-Saudi undercover counter-terrorism operation. The next step was for Richard Clarke, a former Clinton counter-terrorism adviser who was on the call, to say on ABC News that "The U.S. government is saying it never came close because they had insider information, insider control, which implies that they had somebody on the inside who wasn't going to let it happen."  The White House says Brennan never leaked the information, and "places the blame squarely on AP," which probably suits the AP just fine. [...]" 

Commentary: "Legality Questioned As Secretive ‘Stingray’ Cell Phone Surveillance Tool Used More Frequently" [03/30/13] Printer Friendly Version "Questions about the legality of the secretive cell phone surveillance tool known as “Stingray” are being raised as the use of the device, originally billed as a counterterrorism tool, expands into everything but cases related to terrorism. Unfortunately this is just one of many methods of surveillance – all of which are increasing dramatically – used by the government, law enforcement and even the private sector. The Electronic Frontier Foundation (EFF) called Stingrays “the biggest technological threat to cell phone privacy you don’t know about” and “an unconstitutional, all- you- can- eat data buffet” in October of last year and unfortunately it has only become more important since then. The Stingray essentially dupes cell phones into treating the device as if it were a real cell phone tower, thus allowing “the government to electronically search large areas for a particular cell phone’s signal—sucking down data on potentially thousands of innocent people along the way,” as the EFF puts it. The major problem is that law enforcement has used them while circumventing the need for individualized warrants as the Constitution requires. Since this is dragnet surveillance, anyone and everyone can be targeted by the device without a warrant being issued for the search and seizure of their data. In late January, LA Weekly reported that Stingray while “intended to fight terrorism, was used in far more routine LAPD criminal investigations 21 times in a four-month period during 2012, apparently without the courts’ knowledge that the technology probes the lives of non-suspects who happen to be in the same neighborhood as suspected terrorists.” The Los Angeles Police Department (LAPD) was able to purchase their device thanks to a 2006 grant from the Department of Homeland Security (DHS). Keep in mind, DHS funds many highly troublesome surveillance efforts around the nation. [...]"  Related: "When A Secretive Stingray Cell Phone Tracking ‘Warrant’ Isn’t A Warrant" Printer Friendly Version "Stingray" is the brand name of an International Mobile Subscriber Identity locator, or “IMSI catcher.” A Stingray acts as a fake cell-phone tower, small enough to fit in a van, allowing the government to route all network traffic to the fake tower. We’ve warned that Stingrays are dangerous because they have the capability to obtain the contents of electronic and wire communications while necessarily sucking down data on scores of innocent people along the way. The Fourth Amendment requires searches be “reasonable,” generally meaning they must be accompanied by a warrant. To get a warrant, the government must show there is probable cause to believe the place they want to search will have evidence of a crime. And it means the judge must issue ensure the warrant is “particular,” or limited to only allow searches into areas where the evidence is most likely to be found. The only way a judge can make these tough decisions is with the government being forthright about what it’s doing. But when it comes to Stingrays the government has been extremely secretive about its use, withholding documents in FOIA requests, failing to explain or even understand the technology to a Texas federal judge, and in the Rigmaiden case, misleading the court about the fact it’s even using one at all. [...]"

Internet: "FBI Pursuing Real-Time Gmail Spying Powers as “Top Priority” for 2013" [03/30/13] Printer Friendly Version "Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year. Last week, during a talk for the American Bar Association in Washington, D.C., FBI general counsel Andrew Weissmann discussed some of the pressing surveillance and national security issues facing the bureau. He gave a few updates on the FBI’s efforts to address what it calls the “going dark” problem—how the rise in popularity of email and social networks has stifled its ability to monitor communications as they are being transmitted. It’s no secret that under the Electronic Communications Privacy Act, the feds can easily obtain archive copies of emails. When it comes to spying on emails or Gchat in real time, however, it’s a different story. [...]"  

MSM: "Facial Recognition And GPS Tracking: Trapwire Company Conducting Even More Surveillance" [03/28/13] Printer Friendly Version "An internationally-spread Orwellian surveillance system uncovered by RT has been linked to a software company that collects the GPS coordinates of cell phone users in over 100 major cities. The discovery of the TrapWire risk mitigation program last year and its ability to match human faces caught on camera against massive databases of intelligence led to an outcry from privacy advocates around the world. Now once again the burgeoning preponderance of Big Brother is being put into perspective. [...]" 

Commentary: "Weapons Manufacturer: Big Sis Attempting To Exhaust Ammo Supplies" [03/27/13] Printer Friendly Version [7:33] "A weapons manufacturer who supplies the federal government with ammunition told the nationally syndicated Savage Nation radio show that the Department of Homeland Security’s huge ammo purchases were an attempt to dry up supplies as part of an end run around the second amendment. The caller, who described himself as a defense contractor and a licensed weapons manufacturer, said the goal was to “control the amount of market that’s available on the commercial market at any time,” by forcing manufacturers to hold back stock. “If they periodically do this in increments, they’re going to control how much ammo is available on the commercial market [...] The caller noted how this process had caused prices to shoot up at gun shows, while in the commercial market ammunition was very limited and on back order as a result and that “supply cannot keep up with demand.” He also noted how the State Department and the ATF were making it harder to import ammunition from overseas. Host Michael Savage stated that the DHS’ commitment to purchase 1.6 billion bullets over the past year was, “obviously an attempt to dry up the ammunition market, to control the ammunition market.” The weapons manufacturer agreed, adding that the deals the DHS is agreeing with manufacturers are based on, “indefinite delivery, indefinite quantity,” allowing the feds to monopolize the supply on ammo by preventing companies from selling the bullets to the commercial market.[...]"  Related: Speculation: "Special Forces Commander: ‘Constabulary Force’ Coming" Printer Friendly Version Referencing Meme: Obama (2008): "We cannot continue to rely on our military in order to achieve the national security objectives that we’ve set,” he said. “We’ve got to have a civilian national security force that’s just as powerful, just as strong, just as well-funded.”

Commentary: "Government Cover-up of Ammo Buys Implodes" [03/23/13] Printer Friendly Version "The failure on behalf of the federal government to provide any explanation for why the Department of Homeland Security is arming to the teeth with high powered weapons and billions of hollow point bullets, as well as crude efforts by mainstream media mouthpieces to debunk the war-like preparations, have backfired massively, propelling the story to a viral status. As we reported today, 15 Congressman have written a letter to the DHS demanding to know why the federal agency is buying so many rounds of ammunition and whether the purchases are part of a deliberate attempt to restrict supply to the American people. Big Sis has remained silent on the issue, refusing to answer questions from reporters and even from multiple elected representatives, about the ammo buys. The continued huge orders for weapons and bullets have prompted attendances at gun shows to explode, as gun store owners say they having to contend with significant national shortages. Efforts to portray the very real stockpiling by the federal agency as a conspiracy theory have fallen flat on their face, and have only served to further highlight how suspect the DHS’ actions are. When Media Matters and Raw Story both recently attacked Fox Business host Lou Dobbs for daring to raise the issue on his show, it quickly became clear that neither had any prevailing counter point, and were dismissing the facts only by regurgitating a glib statement of a single DHS official. [...]" 

MSM: "Domestic Drones: 327 Entities in US Have Active Certificates Of Operation" [03/22/13] Printer Friendly Version "Thanks to the Federal Aviation Administration (FAA), police in Arlington, Texas have been cleared to fly two small helicopter drones, joining the countless other public entities that have already been given permission to fly drones over the United States. “Citing privacy and security concerns, the FAA does not disclose information about which government entities or publicly funded universities have certificates of authorization,” wrote Susan Schrock for the Star-Telegram in an article discussing Arlington’s drones. “But spokesman Les Dorr said 327 certificates of operation are active in the U.S.,” Schrock added. While that higher number is more accurate, there are many discrepancies between the various publicly known lists and most notably, it does not include the unknown number of classified drone authorizations. That number has not even been released to individuals in Congress. [...]"  Related: "Pentagon Taking Over Drones Magnifies The CIA's Free Rein" Printer Friendly Version  

MSM: "The Domestic Use of Surveillance Drones: Senate Hearing" [03/22/13] [107:45] "March 20, 2013 C-SPAN "There Really Is A Subjective Harm Living In A Society Where You Feel You're Under Surveillance" [...]" 

MSM: "Justice Department Backs Rewriting Law That Allows Police To Read Emails" [03/22/13] Printer Friendly Version "Communication law passed before most people had email has allowed law enforcement some access without a search warrant. The Justice Department said on Tuesday that it supports rewriting 26-year-old legislation that has allowed US law enforcement officials to read a person's emails without a search warrant so long as the email is older than six months or already opened. The law has long been criticized by privacy advocates as a loophole when it comes to protecting Americans from government snooping. "There is no principled basis to treat email less than 180 days old differently than email more than 180 days old," Elana Tyrangiel, acting assistant attorney general in the Office of Legal Policy, told a House judiciary subcommittee. She also said emails deserve the same legal protections whether they have been opened or not. [...]"  

Legal Case: "Lawsuit Challenges Warrantless Searches of Arrestees' Cellphones" [03/21/13] Printer Friendly Version "Police in some states, including California, inspect mobile phones of anybody arrested, without a warrant, based on the legal theory that officers have a right to review the belongings of those they apprehend. But the American Civil Liberties Union is trying to change that with a novel legal theory. On Wednesday, it sued the San Francisco Police Department, claiming the warrantless search of arrestees? mobile phones not only breaches the First Amendment right of those arrested, but also violates the same rights of those in the suspect?s phone contacts, Facebook feed and text messages, etc. [...]"  

Commentary: "Forgetting Torture: Lee Hamilton, John Brennan, and Abu Zubaydah" [03/14/13] Printer Friendly Version "The ground is giving way under the feet of the Presidential Commission of Inquiry into the attacks of September 11. The main source of the Commission’s report, Abu Zoubeida, whose confessions were extracted under torture, is now officially considered worthless. And the CIA agent who arrested and interrogated Zoubeida has admitted he invented everything. [...]"  Related: See below. 

Commentary: "Solitary Confinement: ‘Crime Against Humanity’" [03/13/13] Printer Friendly Version "A new report shows that an estimated 80,000 American prisoners spend 23 hours a day in closed isolation units for 10, 20 or even more than 30 years. An American journalist has said such an act is “a crime against humanity” though he called it “not surprising.” “It’s not surprising that this method of confinement is being utilized here in the United States,” Abayomi Azikiwe, editor of Pan-African News Wire told the U.S. Desk on Monday. “The U.S. has the highest per capita prison population of any other country throughout the world even though the United States champions itself as being a democratic political and social system.” “The majority” of the people in prison according to Azikiwe are “people from the national minorities and the working class as well as the poor.” “There are possibly 2.5 million people in prisons in the United States, and millions more are under some form of judicial or law enforcement supervision,” he said. Azikiwe said that this “criminalization” of the American people roots back to “racism” and also “relates to the impact of the economic crisis, particularly on young people from national minorities.” There’s growing evidence that solitary confinement causes mental breakdown. American prisoners in solitary confinement have testified about suicidal depression, self-mutilation, lethargy, hallucinations and other ills. [...]"  Related: "Nightmare: System Forgets About Man Left in Solitary Confinement" Printer Friendly Version  "A New Mexico prisoner who languished for nearly two years in solitary confinement — and was so neglected that he had to yank out his own tooth — has been awarded one of the largest federal civil rights settlements in history. Stephen Slevin, 59, will be paid $15.5 million after Dona Ana County agreed to settle with the former inmate, who was jailed at the county detention center from 2005 to 2007 on a DWI arrest. … Those 22 months in solitary was an inhumane and hellish experience for Slevin: His toenails grew so long that they curled around his foot; he was denied showers, causing fungus to form on his skin; and he developed bedsores. Jail officials also didn’t allow him to see a dentist, his lawyer said, so Slevin grew so desperate that he extracted a painful tooth on his own. Before and after pictures of the inmate show the dramatic difference during his time in jail. After two years, his hair was long and unkempt, his face became haggard. He said he lost 50 pounds. Now, he still faces an uphill battle with his health after doctors diagnosed him with lung cancer, he said. [...]" | "Palestinian Prisoner Can’t Talk After 2 Years In Isolation" Printer Friendly Version "A prominent Gazan engineer, who was kidnapped by Israeli agents in Ukraine two years ago, remains in solitary confinement in an Israeli jail. The engineer denies Tel Aviv’s claims he was developing Gaza’s rocket capabilities, but he’s never gone on trial to defend himself.  [...]"| "’93 World Trade Center Bomber Sues To End Solitary Confinement" Printer Friendly Version | "Auditor to Study Use of Solitary in Federal Pens" Printer Friendly Version | "Elementary School Places Unruly Kids In Solitary Confinement" Printer Friendly Version |"Doctor Objected to Manning's Confinement" Printer Friendly Version |"Obama’s Continuing Cover-Up of Torture"  Printer Friendly Version 

MSM: "U.S. Justice Department Says Citizens Have The Right To Record Police" [03/14/13] Printer Friendly Version "The U.S. Justice Department says it is now “settled law” that anyone is allowed to record or photograph police officers in public. A statement of interest – a legal term for when an agency or organization has a stake in the outcome of a trial, but not direct involvement – filed by the Justice Department this week in the case of Mannie Garcia v. Montgomery County, Md., upholds the right of individuals to photograph police under the First, Fourth and Fourteenth Amendments to the U.S. Constitution. [...]"  Related: "Opinion Filed By The Justice Department" Printer Friendly Version 

Commentary: "DHS To Purchase MORE Firearms As Arms Build-Up Intensifies" [03/12/13] Printer Friendly Version "Just days after announcing a 5-year, $4.5 million contract with Heckler & Koch, the Department of Homeland Security has released details of an identical agreement with weapons manufacturer Sig Sauer, as Forbes publishes an article calling for a “national conversation” about the DHS arms build-up that has been dismissed by the media as a conspiracy theory. A solicitation for a no bid contract posted on the Federal Business Opportunities website contains details of a DHS agreement with Sig Sauer to provide weapons parts under the remit of a $900,000 dollar a year contract set to run for five years. [...] The PDF document accompanying the solicitation is virtually identical to an agreement announced last week for Heckler & Koch to provide firearms replacement parts for the exact same fee and time period. Despite our article drawing attention to the fact that the supposedly “redacted” figure of $4.5 million on the original agreement with Heckler & Koch was in fact visible, the same error appears in the Sig Sauer agreement, suggesting that only the name has been changed. Although controversy surrounding the DHS’ purchase of some 2 billion rounds of ammunition has dominated concerns about the federal government’s apparent arms build up, the DHS also purchased 7,000 fully automatic assault rifles last September. Despite the fact that some mainstream media outlets and leftist websites have tried to downplay concerns about the arms build up as paranoid conspiracy theories, the influential Forbes Magazine today features an article by Ralph Benko asking if the issue should become a “national conversation.”"  Related: "1.6 Billion Rounds Of Ammo For Homeland Security? It's Time For A National Conversation" Forbes Printer Friendly Version "The Denver Post, on February 15th, ran an Associated Press article entitled Homeland Security aims to buy 1.6b rounds of ammo, so far to little notice. It confirmed that the Department of Homeland Security has issued an open purchase order for 1.6 billion rounds of ammunition. As reported elsewhere, some of this purchase order is for hollow-point rounds, forbidden by international law for use in war, along with a frightening amount specialized for snipers. Also reported elsewhere, at the height of the Iraq War the Army was expending less than 6 million rounds a month. Therefore 1.6 billion rounds would be enough to sustain a hot war for 20+ years. In America. It is utterly inconceivable that Department of Homeland Security Secretary Janet Napolitano is planning a coup d’etat against President Obama, and the Congress, to install herself as Supreme Ruler of the United States of America. There, however, are real signs that the Department bureaucrats are running amok.  Spending money this way is beyond absurd well into perverse. According to the AP story a DHS spokesperson justifies this acquisition to “help the government get a low price for a big purchase.” Peggy Dixon, spokeswoman for the Federal Law Enforcement Training Center: “The training center and others like it run by the Homeland Security Department use as many as 15 million rounds every year, mostly on shooting ranges and in training exercises.” At 15 million rounds (which, in itself, is pretty extraordinary and sounds more like fun target-shooting-at-taxpayer-expense than a sensible training exercise) … that’s a stockpile that would last DHS over a century. To claim that it’s to “get a low price” for a ridiculously wasteful amount is an argument that could only fool a career civil servant. Meanwhile, Senator Diane Feinstein, with the support of President Obama, is attempting to ban 100 capacity magazine clips. Doing a little apples-to-oranges comparison, here, 1.6 billion rounds is … 16 million times more objectionable. [...] 

MSM: "9th Circuit Appeals Court: 4th Amendment Applies At The Border; Also: Password Protected Files Shouldn’t Arouse Suspicion" [03/09/13] Printer Friendly Version "Here’s a surprise ruling. For many years we’ve written about how troubling it is that Homeland Security agents are able to search the contents of electronic devices, such as computers and phones at the border, without any reason. The 4th Amendment only allows reasonable searches, usually with a warrant. But the general argument has long been that, when you’re at the border, you’re not in the country and the 4th Amendment doesn’t apply. This rule has been stretched at times, including the ability to take your computer and devices into the country and search it there, while still considering it a “border search,” for which the lower standards apply. Just about a month ago, we noted that Homeland Security saw no reason to change this policy. Well, now they might have to. In a somewhat surprising 9th Circuit ruling (en banc, or in front of the entire set of judges), the court ruled that the 4th Amendment does apply at the border, that agents do need to recognize there’s an expectation of privacy, and cannot do a search without reason. Furthermore, they noted that merely encrypting a file with a password is not enough to trigger suspicion. This is a huge ruling in favor of privacy rights. [...]"  

MSM: "DHS Using Customized Versions Of Predator Drones" [03/03/13] Printer Friendly Version "The U.S. Department of Homeland Security has customized its Predator drones, originally built for overseas military operations, to carry out at-home surveillance tasks that have civil libertarians worried: identifying civilians carrying guns and tracking their cell phones, government documents show. The documents provide more details about the surveillance capabilities of the department’s unmanned Predator B drones, which are primarily used to patrol the United States’ northern and southern borders but have been pressed into service on behalf of a growing number of law enforcement agencies including the FBI, the Secret Service, the Texas Rangers, and local police. Homeland Security’s specifications for its drones, built by San Diego-based General Atomics Aeronautical Systems, say they “shall be capable of identifying a standing human being at night as likely armed or not,” meaning carrying a shotgun or rifle. They also specify “signals interception” technology that can capture communications in the frequency ranges used by mobile phones, and “direction finding” technology that can identify the locations of mobile devices or two-way radios. [...]"  

Commentary: "DHS to Order 21.6 Million Rounds of Ammo: 1.625 Billion Rounds Ordered in 10 Month Period" [02/09/13] Printer Friendly Version "The Department of Homeland Security has placed yet another solicitation for millions of rounds of ammunition. Late last year we outlined a number of large ammo purchases from DHS, including one for 750 million rounds of high-power ammunition and another large scale procurement of 450 million rounds of .40 caliber hollow point ammo from Alliant Techsystems. The newest bid for ammo requests 10 million .40 caliber 165 Grain, jacketed Hollow point bullets; 10 million 9mm 115 grain, jacketed hollow points; and 1.6 million 9mm ball bullets. That means in the last 10 months, the department of Homeland security has requested over 1.625 billion rounds of ammunition. At the same time Americans are finding it almost impossible to find ammunition for their own defense, it seems the Department of Homeland security may be making the situation even worse, as they will likely secure supplies before they’re ever released to the general public. [...]"