High-Ranking Mexican Drug Cartel Member makes Explosive Allegation: ‘Fast and Furious is not what you think it is’

High-Ranking Mexican Drug Cartel Member makes Explosive Allegation: ‘Fast and Furious is not what you think it is’

The Blaze  A high-ranking Mexican drug cartel operative currently in U.S. custody is making startling allegations that the failed federal gun-walking operation known as “Fast and Furious” isn’t what you think it is.

It wasn’t about tracking guns, it was about supplying them — all part of an elaborate agreement between the U.S. government and Mexico’s powerful Sinaloa Cartel to take down rival cartels.

Jesus-Vincente-Zambada-NieblaThe explosive allegations are being made by Jesus Vicente Zambada-Niebla, known as the Sinaloa Cartel’s “logistics coordinator.” He was extradited to the Chicago last year to face federal drug charges.

Zambada-Niebla claims that under a “divide and conquer” strategy, the U.S. helped finance and arm the Sinaloa Cartel through Operation Fast and Furious in exchange for information that allowed the DEA, U.S. Immigration and Customs Enforcement (ICE) and other federal agencies to take down rival drug cartels. The Sinaloa Cartel was allegedly permitted to traffic massive amounts of drugs across the U.S. border from 2004 to 2009 — during both Fast and Furious and Bush-era gunrunning operations — as long as the intel kept coming.

This pending court case against Zambada-Niebla is being closely monitored by some members of Congress, who expect potential legal ramifications if any of his claims are substantiated. The trial was delayed but is now scheduled to begin on Oct. 9.

Zambada-Niebla is reportedly a close associate of Sinaloa Cartel kingpin Joaquin “El Chapo” Guzman and the son of Ismael “Mayo” Zambada-Garcia, both of which remain fugitives, likely because of the deal made with the DEA, federal court documents allege.

Based on the alleged agreement  ”the Sinaloa Cartel under the leadership of defendant’s father, Ismael Zambada-Niebla and ‘Chapo’ Guzman, were given carte blanche to continue to smuggle tons of illicit drugs into Chicago and the rest of the United States and were also protected by the United States government from arrest and prosecution in return for providing information against rival cartels which helped Mexican and United States authorities capture or kill thousands of rival cartel members,” states a motion for discovery filed in U.S. District Court by Zambada-Niebla’s attorney in July 2011.

A source in Congress, who spoke to TheBlaze on the condition of anonymity, said that some top congressional investigators have been keeping “one eye on the case.”  Another two members of Congress, both lead Fast and Furious Congressional investigators, told TheBlaze they had never even heard of the case.

One of the Congressmen, who also spoke to TheBlaze on the condition of anonymity because criminal proceedings are still ongoing, called the allegations “disturbing.” He said Congress will likely get involved once Zambada-Niebla’s trial has concluded if any compelling information surfaces.

“Congress won’t get involved in really any criminal case until the trial is over and the smoke has cleared,” he added. “If the allegations prove to hold any truth, there will be some serious legal ramifications.”

Earlier this month, two men in Texas were sentenced to 70 and 80 months in prison after pleading guilty to attempting to export 147 assault rifles and thousands of rounds of ammunition to Mexico’s Los Zetas cartel. Compare that to the roughly 2,000 firearms reportedly “walked” in Fast and Furious, which were used in the murders of hundreds of Mexican citizens and U.S. Border Agent Brian Terry, and some U.S. officials could potentially face jail time if they knowingly armed the Sinaloa Cartel and allowed guns to cross into Mexico.

 

If proven in court, such an agreement between U.S. law enforcement agencies and a Mexican cartel could potentially mar both the Bush and Obama administrations. The federal government is denying all of Zambada-Niebla’s allegations and contend that no official immunity deal was agreed upon.

To be sure, Zambada-Niebla is a member of one of the most ruthless drug gangs in all of Mexico, so there is a chance that he is saying whatever it takes to reduce his sentence, which will likely be hefty. However, Congress and the media have a duty to prove without a reasonable doubt that there is no truth in his allegations. So far, that has not been achieved.

Zambada-Niebla was reportedly responsible for coordinating all of the Sinaloa Cartel’s multi-ton drug shipments from Central and South American countries, through Mexico, and into the United States. To accomplish this, he used every tool at his disposal: Boeing 747 cargo planes, narco-submarines, container ships, speed boats, fishing vessels, buses, rail cars, tractor trailers and automobiles. But Guzman and Zambada-Niebla’s overwhelming success within the Sinaloa Cartel was largely due to the arrests and dismantling of many of their competitors and their booming businesses in the U.S. from 2004 to 2009 — around the same time ATF’s gun-walking operations were in full swing. Fast and Furious reportedly began in 2009 and continued into early 2011.

According Zambada-Niebla, that was a product of the collusion between the U.S. government and the Sinaloa Cartel.

Mexico Drug WarSoldiers and police officers guard packages of seized marijuana during a presentation for the media in Tijuana, Mexico. (AP Photo/Guillermo Arias)

The claims seem to fall in line with statements made last month by Guillermo Terrazas Villanueva, a spokesman for the Chihuahua state government in northern Mexico who said U.S. agencies ”don’t fight drug traffickers,“ instead ”they try to manage the drug trade.”

Also, U.S. officials have previously acknowledged working with the Sinaloa Cartel through another informant Humberto Loya-Castro. He is also allegedly a high-ranking member of the Sinaloa Cartel as well as a close confidant and lawyer of “El Chapo” Guzman.

Loya-Castro was indicted along with Chapo and Mayo in 1995 in the Southern District of California in a massive narcotics trafficking conspiracy (Case no. 95CR0973). The case was dismissed in 2008 at the request of prosecutors after Loya became an informant for the United States government and subsequently provided information for years.

In 2005, “the CS (informant Loya-Castro) signed a cooperation agreement with the United States Attorney’s Office for the Southern District of California,” states an affidavit filed in the Zambada-Niebla case by Loya-Castro’s handler, DEA agent Manuel Castanon.

“Thereafter, I began to work with the CS. Over the years, the CS’ cooperation resulted in the seizure of several significant loads of narcotics and precursor chemicals. The CS’ cooperation also resulted in other real-time intelligence that was very useful to the United States government.”

Under the alleged agreement with U.S. agencies, “the Sinaloa Cartel, through Loya-Castro, was to provide information accumulated by Mayo, Chapo, and others, against rival Mexican Drug Trafficking Organizations to the United States government,” a motion for discovery states.

In return, the United States government allegedly agreed to dismiss the charges in the pending case against Loya-Castro (which they did), not to interfere with his drug trafficking activities and those of the Sinaloa Cartel and not actively prosecute him or the Sinaloa Cartel leadership.

Taken directly from the motion filed in federal court:

“This strategy, which he calls ‘Divide & Conquer,’ using one drug organization to help against others, is exactly what the Justice Department and its various agencies have implemented in Mexico. In this case, they entered into an agreement with the leadership of the Sinaloa Cartel through, among others, Humberto Loya-Castro, to receive their help in the United States government’s efforts to destroy other cartels.”

“Indeed, United States government agents aided the leaders of the Sinaloa Cartel.”

The government has denied this and says the deal did not go past Loya-Castro.

Zambada-Niebla was arrested by Mexican soldiers in late March of 2009 after he met with DEA agents at a Mexico City hotel in a meeting arranged by Loya-Castro, though the U.S. government was not involved in his arrest. He was extradited to Chicago to face federal drug charges on Feb. 18, 2010. He is now being held in a Michigan prison after requesting to be moved from Chicago.

“Classified Materials”

During his initial court proceedings, Zambada-Niebla continually stated that he was granted full immunity by the DEA in exchange for his cooperation. The agency, however, argues that an “official” immunity deal was never established though they admit he may have acted as an informant.

Zambada-Niebla and his legal council also requested records about Operation Fast and Furious, which permitted weapons purchased in the United States to be illegally smuggled into Mexico, sometimes by paid U.S. informants and cartel leaders. Their request was denied. From the defense motion:

“It is estimated that approximately 3,000 people were killed in Mexico as a result of ‘Operation Fast and Furious,’ including law enforcement officers in the state of Sinaloa, Mexico, the headquarters of the Sinaloa cartel. The Department of Justice’s leadership apparently saw this as an ingenious way of combating drug cartel activities.”

“It has recently been disclosed that in addition to the above-referenced problems with ‘Operation Fast & Furious,’ the DOJ, DEA, and the FBI knew that some of the people who were receiving the weapons that were being allowed to be transported to Mexico, were in fact informants working for those organizations and included some of the leaders of the cartels.”

Zambada’s attorney has filed several motions for discovery to that effect in Illinois Federal District Court, which were summarily denied by the presiding judge who claimed the defendant failed to make the case that he was actually a DEA informant.

In April, 2012, a federal judge refused to dismiss charges against him.

From a Chicago Sun Times report: “According to the government, [Zambada-Niebla] conveyed his interest and willingness to cooperate with the U.S. government, but the DEA agents told him they ‘were not authorized to meet with him, much less have substantive discussions with him,’” the judge wrote.

Sinaloa Cartel Operative Jesus Vincente Zambada Niebla Makes Explosive Allegation About Operation Fast and Furious

In this courtroom artist’s drawing Jesus Vincente Zambada-Niebla appears before U.S. District Judge Ruben Castillo Tuesday, Feb. 23, 2010, in Chicago. (AP Photo/Verna Sadock)

In their official response to Zambada-Niebla’s motion for discovery, the federal government confirmed the existence of “classified materials” regarding the case but argued they “do not support the defendant’s claim that he was promised immunity or public authority for his actions.”

Experts have expressed doubts that Zambada-Niebla had an official agreement with the U.S. government, however, agree Loya Castro probably did. Either way, the defense still wants to obtain DEA reports that detail the agency’s relationship with the Sinaloa Cartel and put the agents on the stand, under oath to testify.

The documents that detail the relationship between the federal government and the Sinaloa Cartel have still not been released or subjected to review — citing matters of national security.

via

Malaysian Airline Mystery Decrypted

Malaysian Airline Mystery Decrypted

Not many ‘Answers’.. just all the right QUESTIONS

 

 

-A Distraction Decrypted-

 

NSA Tracking Capabilities – Everything means Everything
Total_Information_Awareness_--_system_diagram
Diego Garcia – USA’s Secret Military Base
secret-us-military-base-diego-garcia-flight-370-hijacked-malaysia
The Clone Plane in Tel Aviv
clonetelaviv
Freescale Semiconductor – Classified Technology
Freescale
China vs USA Black Ops?

The Military Drills!  Cope Tiger / Cobra Gold

Man in the Middle Attack?  Hit? Kidnapping?
passengers-and-crew-of-flight-mh370
The Phillip Wood Picture Message – Legit Exif data?
phillip-wood-sara-bajc
Fake Girlfriend of Phillip Wood in Media!?

The Rothschild Connection
Jacob Rothschild -- Malaysia Airlines MH-370

Max is Back – Decrypted Matrix 3.0 – Launch Broadcast

Max is Back – Decrypted Matrix 3.0 – Launch Broadcast

http://youtu.be/MUr6cp_kYI8

 

dcmx-3.0

Max is Back – Decrypted Matrix 3.0

Thanks for your patience, and support. Introduction to the new format, upcoming topics & more!
 
 
 
 
 
SCREENSHARING INFO DISCUSSION:

Snowden Leaks – NSA Sideshow? Hacking industry boomtown

AI Drones – When will the beast think for itself? Micro Swarms!

Manufactured Terrorism Off the Charts – False Flags further expose

Healthcare System Takeover + GMO Freight Train!

Medical Marijuana Movement Unstoppable? (health benefits no longer ignored)

Police State Brutality – and Getting Away with Murder

Trans Pacific Partnership – OMG WTF GLOBALIZATION

FAILED WAR ATTEMPTS: Iran, Syra, Ukraine?

Cabal Sinking their own ship? Does Humanity have a chance?

+Final Thoughts J, Krishnamurti , George Carlin

Science Faction?

Science Faction?

technology-based-future-bradbury-orwellIn a somewhat disturbing case of life imitating art, it seems that real world turmoil is catching up with classic science fiction projections of a dystopian future as envisioned by writers like George Orwell and Ray Bradbury — a world where the general populace is under constant surveillance, and the technology that we’ve become overly dependent on has become our greatest liability.

If the recent NSA debacle wasn’t alarming enough for you, Google recently acquired Nest, the smart device firm and home automation pioneer. Home automation, of course, means having  multiple devices (kitchen appliances, thermostats, locks and security cameras, etc.) equipped with wireless capability and controllable through an app on a smart device. Your phone, in essence, becomes a remote control for your entire house. Some systems, like the one which Samsung recently premiered at CES 2014, will only enable the company’s own products to interact with one another, and the more glitzy products like the ADT home security systems allow homeowners to control their thermostats and other electronics (regardless of brand) with their smart phone.

If it sounds too good to be true…that’s because it potentially is, as this article from Trend Labs explains. The IP configuration on the devices is simple and the security options are quite limited, leaving them easily penetrable by hackers and thieves. Part of the risk, of course, is that if you have a home security system that can be entirely disabled through a smartphone, a thief could hack into your accounts, deactivate your entire security system with the push of a mere button, and enter your home freely. All of your data becomes more accessible to hackers, and now Google will have even more comprehensive data to sell to third party candidates who can market products even more aggressively to you.

Orwell and Bradbury basically called the whole thing…

One of the great things about science-fiction is that, whatever paranoid projections it makes about future global conditions, it’s always very much a product of its own time.This news raises all sorts of issues for an overly imaginative person.

The situation is like George Orwell’s 1984, where the general public can’t even so much as think in privacy. Everyone is under constant surveillance, and the entire system is under the pretense that this is somehow what’s best for society.

The citizens of Orwell’s fictional Oceania all have “telescreens” in their apartments, which enables Big Brother (whether that’s merely a governmental agency monitoring the public or one chief observer is never entirely clear) to supervise every given moment of everyone’s lives, and to possess an absurd level of intel on every given person under the jurisdiction of their central government. Replace telescreens with tablets, and Big Brother with Facebook and Google, and ask yourself how much of a deviation this setup is from life as we know it today.

It also calls to mind a particularly eerie story penned by Ray Bradbury 1950 entitled August 2026: There Will Come Soft Rains. The story focuses on “a-day-in-the-life” of a fully automated home after the extinction of the human race. The house prepares meals, recites important dates and reminders through an intercom system with a pre-recorded voice. We come to learn, throughout the course of the story, that the family who owned the house have been wiped out. We hear about silhouettes permanently fixed unto the side of the homes, in a manner that evoked the victims of Hiroshima and Nagasaki who were vaporized in an atomic blast.

So Bradbury’s grim musings couldn’t have been more fitting for his time, and they are startlingly relevant now. Just as humans channel their ingenuity and creativity into constructive things, or things which enhance life for humanity (all of the advancements in home technology, for instance) the misapplication of that creativity — and the misapplication of technology itself– can have dire, even catastrophic, consequences on humanity.

Is it really as bad as all of that?

Only time will tell, but it does seem more and more likely that whatever minor conveniences the technology yields will hardly justify the potential security risks.

You would hope that, in some cases, paranoid science-fiction literature would help prevent future atrocities from occurring by anticipating them. It’s sort of comforting that we’ve not yet reached the place anticipated by Arthur C. Clarke, where computers have superior intellect to humans and can function, not only with autonomy, but willfully against people. It’s pretty disconcerting, however, that we seem to be drawing nearer and nearer to those imagined realities, not merely a novel thought and fodder for pop literature, but a grim facet of our day to day lives.

Bribe or ‘Tax’? NSA gives 10milion to RSA for Backdoor Access

Bribe or ‘Tax’? NSA gives 10milion to RSA for Backdoor Access

Hmm. Hold up. So if we go by this Wikipedia entry..

“Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$ 2.1 billion and operates as a division within EMC.[5]

People need to understand, this means RSA took around 2% of what they’d make in one year. FOR A BACK-DOOR OMG. Does this not sound more like a tax, than a payment (never mind a bribe!)? How much would you care about an extra 2% per year? Exactly. Thats all I got. Someone else needs to close that gap.     -Max

RSA-NSA-Backdoor-TaxWhat’s an encryption backdoor cost? When you’re the NSA, apparently the fee is $10 million.

Intentional flaws created by the National Security Agency in RSA’s encryption tokens werediscovered in September, thanks to documents released by whistleblower Edward Snowden. It has now been revealed that RSA was paid $10 million by the NSA to implement those backdoors, according to a new report in Reuters.

Two people familiar with RSA’s BSafe software told Reuters that the company had received the money in exchange for making the NSA’s cryptographic formula as the default for encrypted key generation in BSafe.

“Now we know that RSA was bribed,” said security expert Bruce Schneier, who has been involved in the Snowden document analysis. “I sure as hell wouldn’t trust them. And then they made the statement that they put customer security first,” he said.

RSA, now owned by computer storage firm EMC Corp, has a long history of entanglement with the government. In the 1990s, the company was instrumental in stopping a government plan to include a chip in computers that would’ve allowed the government to spy on people.

It has also had its algorithms hacked before, as has RSA-connected VeriSign.

The new revelation is important, Schneier said, because it confirms more suspected tactics that the NSA employs.

“You think they only bribed one company in the history of their operations? What’s at play here is that we don’t know who’s involved,” he said.

Other companies that build widely-used encryption apparatus include Symantec, McAfee, and Microsoft. “You have no idea who else was bribed, so you don’t know who else you can trust,” Schneier said.

RSA did not return a request for comment, and did not comment for the Reuters story.

via CNet

 

Billion Dollar Race: Soviet Union vs US in ‘Mind Control Research’

Billion Dollar Race: Soviet Union vs US in ‘Mind Control Research’

mind-control-diagram-expandedCompeting with the US during the Arms Race, the Soviet Union put extensive effort in unconventional research seeking to outflank its rival in understanding behavior control, remote influencing and parapsychology, a new survey by Cornell University Library has revealed.

The survey published by Cornell University Library is based on open scientific and journalistic materials and provides an overview of unconventional research in the USSR and then in its successor, Russia, in the period between 1917 and 2003 – as compared to the USA.

The report by Serge Kernbach showed that unconventional weapons took the scientists in both countries to areas bordering sci-fi which nowadays would be seen in TV programs featuring UFOs, the supernatural and superpowers.

Due the Iron Curtain, Soviet and American scientists knew little about each other’s secret work – still, they focused on same themes.

In the Soviet Union, among the areas of particular interest, were, for instance, “the impact of weak and strong electromagnetic emission on biological objects, quantum entanglement in macroscopic systems, nonlocal signal transmission based on the Aharonov-Bohm effect, and ‘human operator’ phenomena,” the survey says.

Soviet scientists were developing a field they dubbed “psychotronics.” The country spent between $0.5-1 billion on research of the phenomena, Kernbach who works, at the Research Center of Advanced Robotics and Environmental Science in Stuttgart, Germany, found out.

Some of the programs in psychotronic research – even those launched decades ago – have not been officially published.

“For instance, documents on experiments performed in OGPU and NKVD – even 80 years after – still remain classified,” Kernbach noted. The OGPU (Joint State Political Directorate) was the Soviet secret police and the NKVD (The People’s Commissariat for Internal Affairs) was the main law enforcing body, which was later transformed into the Internal Ministry and a security organization which was part of it – into the KGB.

According to the survey, Soviet and American areas of interest often mirrored each other. In particular, Kernbach recalls the Central Intelligence Agency’s (CIA) scandalous human research program MKUltra which involved the use of various methods to manipulate an individual’s mental states and alter brain functions.

“As mentioned in the public documents, the program to some extent was motivated by the corresponding NKVD’s program, with similar strategies of using psychotropic (e.g. drugs) substances and technical equipment,” Kernbach said.

In the 60s and the 70s, the Soviet Union was actively researching the influence of electromagnetic fields on human physiological and psychological conditions. Several authors point to the application of research results in the form of new weapons in the USA and the Soviet Union.

“Over the past years, US researchers have confirmed the possibility of affecting functions of the nervous system by weak electromagnetic fields (EMFs), as it was previously said by Soviet researchers. EMFs may cause acoustic hallucination (’radiosound’) and reduce the sensitivity of humans and animals to some other stimuli, to change the activity of the brain (especially the hypothalamus and the cortex), to break the processes of formation processing and information storage in the brain. These nonspecific changes in the central nervous system can serve as a basis for studying the possibilities of the direct influence of EMFs on specific functions of CNS,” read an article in Nauka (Science) magazine in 1982.

US-MILITARY-WEAPON-SYSTEM
A US Marine Corps truck is seen carrying a palletized version of the Active Denial System, March 9th, 2012, at the US Marine Corps Base Quantico, Virginia. It is a US DoD non-lethal weapon that uses directed energy and projects a beam of man-sized millimeter waves up to 1000 meters that when fired at a human, delivers a heat sensation to the skin and generally makes humans stop what they are doing and run. (AFP Photo/Paul J. Richards)

Kernbach’s analysis lacks details on practical results of unconventional research in the USSR.

He mentions though a device invented by Anatoly Beridze-Stakhovsky – the torsion generator ‘Cerpan’. The exact structure of the device is unknown, as the scientist feared it would be put to unethical uses. Cerpan was designed on the “shape effect” produced by torsion fields. Some sources claim that the device – a 7-kilo metal cylinder – was used to heal people, including Kremlin senior officials.

Kernbach’s overview of unconventional research in USSR and Russia suggests that following the collapse of the USSR in 1991, these programs were first reduced and then completely closed in 2003.

“Due to academic and non-academic researchers, the instrumental psychotronics, denoted sometimes as torsionics, still continue to grow, but we cannot speak about government programs in Russia any longer,” he said.

However, based on the number of participants at major conferences, the number of psychotronics researchers in Russia is estimated between 200 and 500, the report said.

Last year, the now-fired Defense Minister Anatoly Serdyukov said his ministry was working on futuristic weaponry.

“The development of weaponry based on new physics principles; direct-energy weapons, geophysical weapons, wave-energy weapons, genetic weapons, psychotronic weapons, etc., is part of the state arms procurement program for 2011-2020,” Serdyukov said at a meeting with the then Prime Minister Vladimir Putin, cited RIA Novosti.

That followed a series of Putin’s presidential campaign articles, one of which focused on national security guarantees. Speaking about new challenges that Russia may face, and which armed forces should be ready to respond to, he wrote:

“Space-based systems and IT tools, especially in cyberspace, will play a great, if not decisive role in armed conflicts. In a more remote future, weapon systems that use different physical principles will be created (beam, geophysical, wave, genetic, psychophysical and other types of weapons). All this will provide fundamentally new instruments for achieving political and strategic goals in addition to nuclear weapons.”

Source: RT

This -Formerly Secret- Group Controls the World

This -Formerly Secret- Group Controls the World

By Jimmy Mengel, Outsider Club 

“Facts do not cease to exist because they are ignored.”  — Aldous Huxley

 

So who really controls the world?

 

The Illuminati? Freemasons? The Bilderberg Group?

 

Or are these all red herrings to distract your prying eyes from the real global elite? The answer, like most topics worth exploring, is not quite so simple. Have no doubt, there aresecretive global powers whose only goal is to keep and grow that power. But it really may not be as secretive as you’d think. And that’s what makes it even more nefarious…

 

But don’t take my word for it, we have both science and insider testimony to back it up…

 

We’re going to break this down into three categories: Financial, Political and Media. This is a harder task than you may imagine, since they all work in concert by design.

 

 

 

Financial Elite

 

Thanks to the science of complex system theory, the answer may actually be right in front of our faces.

 

This scientific process sheds light on the dark corners of bank control and international finance and pulls some of the major players out from the shadows.

 

And it goes back to the old credo: Just follow the money…

 

Systems theorist James B. Glattfelder did just that.

 

From a massive database of 37 million companies, Glattfelder pulled out the 43,060 transnational corporations (companies that operate in more than one country) that are all connected by their shareholders.

 

Digging further, he constructed a model that actually displays just how connected these companies are to one another through ownership of shares and their corresponding operating revenues.

 

 

The 1318 transnational corporations that form the core of the economy.

 

Superconnected companies are red, very connected companies are yellow. The size of the dot represents revenue.

 

I’ll openly admit that this graphic almost scared me off. Complex scientific theories are not my forte, and this looks like some sort of intergalactic snow globe.

 

But Glattfelder has done a remarkable job of boiling these connections down to the main actors — as well as pinpointing how much power they have over the global market. These “ownership networks” can reveal who the key players are, how they are organized, and exactly how interconnected these powers are.

 

From New Scientist:  Each of the 1318 had ties to two or more other companies, and on average they were connected to 20. What’s more, although they represented 20 per cent of global operating revenues, the 1318 appeared to collectively own through their shares the majority of the world’s large blue chip and manufacturing firms — the “real” economy — representing a further 60 per cent of global revenues.

 

When the team further untangled the web of ownership, it found much of it tracked back to a “super-entity” of 147 even more tightly knit companies — all of their ownership was held by other members of the super-entity — that controlled 40 per cent of the total wealth in the network.

 

According to his data, Glattfelder found that the top 730 shareholders control a whopping 80% of the entire revenue of transnational corporations.

 

And — surprise, surprise! — they are mostly financial institutions in the United States and the United Kingdom.

 

That is a huge amount of concentrated control in a small number of hands…

 

Here are the top ten transnational companies that hold the most control over the global economy (and if you are one of the millions that are convinced Big Banks run the world, you should get a creeping sense of validation from this list):

 

1) Barclays plc

 

2) Capital Group Companies Inc.

 

3) FMR Corporation

 

4) AXA

 

5) State Street Corporation

 

6) JPMorgan Chase & Co.

 

7) Legal & General Group plc

 

8) Vanguard Group Inc.

 

9) UBS AG

 

10) Merrill Lynch & Co Inc.

 

Some of the other usual suspects round out the top 25, including JP Morgan, UBS, Credit Suisse, and Goldman Sachs.

 

What you won’t find are ExxonMobil, Microsoft, or General Electric, which I found shocking. In fact, you have to scroll all the way down to China Petrochemical Group Company at number 50 to find a company that actually creates something.

 

The top 49 corporations are financial institutions, banks, and insurance companies — with the exception of Wal-Mart, which ranks at number 15…

 

The rest essentially just push money around to one another.

 

Here’s the interconnectedness of the top players in this international scheme:

 

 

 

 

Here’s a fun fact about the number one player, Barclays:

 

Barclays was a main player in the LIBOR manipulation scandal, and were found to have committed fraud and collusion with other interconnected big banks. They were fined $200 million by the Commodity Futures Trading Commission, $160 million by the United States Department of Justice and £59.5 million by the Financial Services Authority for “attempted manipulation” of the Libor and Euribor rates.

Despite their crimes, Barclays still paid $61,781,950 in bonuses earlier this year, including a whopping $27,371,750 to investment banking head Rich Ricci. And yes, that’s actually his real name…

These are the guys that run the world.

It’s essentially the “too big to fail” argument laid out in a scientific setting — only instead of just the U.S. banks, we’re talking about an international cabal of banks and financial institutions so intertwined that they pose a serious threat to global economics.

And instead of “too big to fail,” we’re looking at “too connected to fail”…

Glattfelder contends that “a high degree of interconnectivity can be bad for stability, because stress can spread through the system like an epidemic.”

Industrialist Henry Ford once quipped, “It is well enough that people of the nation do not understand our banking and money system, for if they did, I believe there would be a revolution before tomorrow morning.”

It’s one thing to have suspicions that someone is working behind the scenes to control the world’s money supply. It’s quite another to have scientific evidence that clearly supports it.

But these guys can only exist within a political system that supports their goals. And those political systems are pretty much operating in the open…

POLITCAL ELITE

For the sake of brevity, let’s cut right to the chase. Every major geopolitical decision of the last few decades has been run through one of these three organizations: the Trilateral Commission, the Council on Foreign Relations and the World Bank/International Monetary Fund (IMF).

The Trilateral Commission

In 1973, the infamous David Rockefeller created a group of the world’s power brokers to work together — outside of any official governmental or political allegiance — to bring about cooperation of North America, Western Europe and Japan.

They launched under the guise of working together to solve the world’s problems. A noble goal — but “problems” are very subjective.

Here’s the rundown of members:

The North American continent is represented by 120 members (20 Canadian, 13 Mexican and 87 U.S. citizens). The European group has reached its limit of 170 members from almost every country on the continent; the ceilings for individual countries are 20 for Germany, 18 for France, Italy and the United Kingdom, 12 for Spain and 1–6 for the rest. At first, Asia and Oceania were represented only by Japan. However, in 2000 the Japanese group of 85 members expanded itself, becoming the Pacific Asia group, composed of 117 members: 75 Japanese, 11 South Koreans, 7 Australian and New Zealand citizens, and 15 members from the ASEAN nations (Indonesia, Malaysia, Philippines, Singapore and Thailand). The Pacific Asia group also included 9 members from China, Hong Kong and Taiwan. Currently, the Trilateral Commission claims “more than 100″ Pacific Asian members.

It’s a global who’s-who of power brokers. And while the Trilateral Commission excludes anyone currently holding public office from membership, it serves as a revolving door of the rich and powerful from the financial, political and academic elite.

Most suspicions of the group began during the Jimmy Carter administration, when Carter — himself a member of the Trilateral Commission — made Zbigniew Brzezinski his National Security advisor. Brzezinski was the Trilateral Commission’s first executive director. Carter’s Vice President Walter Mondale was also a member.

And perhaps most importantly, Trilateral member Paul Volker served as Carter’s Chair of the Federal Reserve. He is still the North American Honorary Chairman.

Such a concentration of power in a U.S. president’s cabinet obviously made people nervous,

Notable recent additions include Austan Goolsbe — former chairman for Obama’s Council of Economic Advisors. I’d suggest you familiarize yourselves with the entire member list here.

You’ll be shocked at who else is part of this secretive organization.

Follow the Outsider Club  for Part II of this important subject.

 

 

One Bank to Rule Them All: World Bank Whistle-blower Reveals Bank Conspiracy

By Jimmy MengelOutsider Club 

If you had any doubt, we now have science and first-hand testimony to prove it.

Note: This is not some wild conspiracy theory. It’s systems theory, a serious scientific discipline, used by researcher James B. Gladfelder to prove that a small group of banks essentially control the world’s finances.

Gladfelder’s research proved that the top 730 shareholders control a whopping 80% of the entire revenue of transnational corporations.

But the truth is the global banking elite simply cannot maintain a stranglehold on the world’s power all by themselves. And so, while they run off with the money, their lackeys in the political sphere acts as gatekeepers.

Again, we’re not relying on labyrinthine explanations and vague fears of domination; we’re looking at the matter through scientific discipline and actual admissions from the power brokers themselves.

The fact is we simply cannot talk about global control without talking about the World Bank…

The World Bank represents 188 different countries from Albania to Zimbabwe. However, it is controlled by a small number of powerful countries, each with its own serious economic interests.

Since there is no voting for the leadership and chief economists at the bank, the United States and other large countries have complete control to appoint who they’d like to do their bidding — and they have appointed some highly questionable folks to run the behemoth:

Robert McNamara – JFK’s former secretary of defense and president of Ford Motor Company was chosen to lead the Bank in 1968, fresh off his disastrous handling of the Vietnam War.

Lewis T. Preston – a bank executive with J.P. Morgan. We all know J.P. Morgan doesn’t have the interest of the working poor at heart, as evidenced by years of abuse of regular folks, culminating in their record $13 billion fine this year.

Robert Zoellick – a bank executive with Goldman Sachs. Again, if the head of Goldman Sachs is at the helm, you know the bidding of the powerful will get its due… After all, you don’t earn a nickname like “The Great Vampire Squid” for your altruism.

Paul Wolfowitz – Much like McNamara, Wolfowitz was handed the reigns to the World Bank after helping orchestrate George Bush’s outrageous war on Iraq. While president of the Bank, he gave his girlfriend massive pay raises — more than double what she was entitled to! The fact that the head of the World Bank could engage in such petty corruption doesn’t bode well for the bank at large, considering the immense power they wield. Wolfowitz was eventually forced to resign.

Perhaps more alarmingly, the World Bank also receives complete immunity from any and all countries it does “business” with, so it cannot be held legally accountable for its actions.

The United States has complete veto power over the Bank’s actions as well, which it can use to block any action by the Bank that may threaten national interests — and the interests of the global financial powers that control them.

The World Bank’s stated purpose is to help poor and developing countries by providing loans.

The catch? To obtain one of these loans, you have to comply with the Bank’s draconian wish lists.

Examples of the conditions countries must meet to gain access to a loan include suppressing wages, cutting programs like education and health care, and easing limits on foreign investment.

How do the results stack up with its stated mission?

Not well. In fact, data shows most countries that have taken the World Bank’s money and agreed to its terms are no better off today then they were when they received their first loan — and many are actually worse off.

From the Heritage Foundation:

Of the 66 less-developed countries receiving money from the World Bank for more than 25 years (most for more than 30 years), 37 are no better off today than they were before they received such loans.

Of these 37 countries, most (20 in all) are actually poorer today than they were before receiving aid from the Bank.

Former less-developed countries that have prospered over the past 30 years did so by freeing up the productive forces of their economies. The best examples are Hong Kong and Singapore: Even though a country like Singapore received a small amount of money from the World Bank, the evidence shows that what most affected economic growth was not World Bank aid, but economic freedom.

What’s more, an ex-World Bank employee described something far more nefarious than ineptitude…

Karen Hudes watched first-hand as the World Bank manipulated and covered up corruption in its economic development projects.

It’s important to know Hudes wasn’t some disgruntled lackey; she served as Senior Counsel and worked for the bank for 20 years. During those two decades at the World Bank, Hudes saw systematic and widespread corruption.

“It’s a mafia,” she told the New American.

“These culprits that have grabbed all this economic power have succeeded in infiltrating both sides of the issue, so you will find people who are supposedly trying to fight corruption who are just there to spread disinformation and as a placeholder to trip up anybody who manages to get their act together. Those thugs think that if they can keep the world ignorant, they can bleed it longer.”

Hudes saw large-scale enrichment of the powerful, while the poor the Bank was supposed to be helping were getting stiffed.

“I realized we were now dealing with something known as state capture, which is where the institutions of government are co-opted by the group that’s corrupt,” she noted.

Hudes was eventually fired after she spoke out against the Bank’s attempt to cover up a botched bailout of a crooked bank in the Philippines.

Here are a few choice examples of what happens to the $2.5 billion in U.S. taxpayer money that is funneled into the World Bank each and every year, from the American Enterprise Institute:

38 countries have amassed $71 billion in unpayable multilateral loans, encouraged by the Bank’s self-serving projections of country growth, on which rich-country taxpayers must now make good.

Corruption has been exposed both within the World Bank and in its programs, and is now estimated at more than $100 billion.

Protest is rising among leading African scholars who seek to stop all aid because it serves only to entrench and enrich a series of corrupt elites. Massive anecdotal evidence of waste, ineptitude, and outright theft can no longer be ignored.

Not exactly the poverty-fighting superhero the institution makes itself out to be.

The World Bank works in conjunction with the International Monetary Fund, which operates in the same vein of enriching Wall Street and supporting dictators. We’ll pull the curtain back on the IMF next week.

 

See more from Jimmy Mengel at the Outsider Club

 

 @mengeled on Twitter

 

Jimmy is a managing editor for Outsider Club and the Investment Director of the personal finance advisory The Crow’s Nest. You may also know him as the architect behind the wildly popular finance and investing website Wealth Wire, where he’s brought readers the stories behind the mainstream financial news each and every day. For more on Jimmy, check out his editor’s page.

An NSA Coworker Remembers The Real Edward Snowden: ‘A Genius Among Geniuses’

An NSA Coworker Remembers The Real Edward Snowden: ‘A Genius Among Geniuses’

snowden-genius

Perhaps Edward Snowden’s hoodie should have raised suspicions.

The black sweatshirt sold by the civil libertarian Electronic Frontier Foundation featured a parody of the National Security Agency’s logo, with the traditional key in an eagle’s claws replaced by a collection of AT&T cables, and eavesdropping headphones covering the menacing bird’s ears. Snowden wore it regularly to stay warm in the air-conditioned underground NSA Hawaii Kunia facility known as “the tunnel.”

His coworkers assumed it was meant ironically. And a geek as gifted as Snowden could get away with a few irregularities.

Months after Snowden leaked tens of thousands of the NSA’s most highly classified documents to the media, the former intelligence contractor has stayed out of the limelight, rarely granting interviews or sharing personal details. A 60 Minutes episode Sunday night, meanwhile, aired NSA’s officials descriptions of Snowden as a malicious hacker who cheated on an NSA entrance exam and whose work computers had to be destroyed after his departure for fear he had infected them with malware.

But an NSA staffer who contacted me last month and asked not to be identified–and whose claims we checked with Snowden himself via his ACLU lawyer Ben Wizner—offered me a very different, firsthand portrait of how Snowden was seen by his colleagues in the agency’s Hawaii office: A principled and ultra-competent, if somewhat eccentric employee, and one who earned the access used to pull off his leak by impressing superiors with sheer talent.

The anonymous NSA staffer’s priority in contacting me, in fact, was to refute stories that have surfaced as the NSA and the media attempt to explain how a contractor was able to obtain and leak the tens of thousands of highly classified documents that have become the biggest public disclosure of NSA secrets in history. According to the source, Snowden didn’t dupe coworkers into handing over their passwords, as one report has claimed. Nor did Snowden fabricate SSH keys to gain unauthorized access, he or she says.

Instead, there’s little mystery as to how Snowden gained his access: It was given to him.

“That kid was a genius among geniuses,” says the NSA staffer. “NSA is full of smart people, but anybody who sat in a meeting with Ed will tell you he was in a class of his own…I’ve never seen anything like it.”

When I reached out to the NSA’s public affairs office, a spokesperson declined to comment, citing the agency’s ongoing investigation into Snowden’s leaks.

But over the course of my communications with the NSA staffer, Snowden’s former colleague offered details that shed light on both how Snowden was able to obtain the NSA’s most secret files, as well as the elusive 30-year old’s character:

  • Before coming to NSA Hawaii, Snowden had impressed NSA officials by developing a backup system that the NSA had widely implemented in its codebreaking operations.
  • He also frequently reported security vulnerabilities in NSA software. Many of the bugs were never patched.
  • Snowden had been brought to Hawaii as a cybersecurity expert working for Dell’s services division but due to a problem with the contract was reassigned to become an administrator for the Microsoft intranet management system known as Sharepoint. Impressed with his technical abilities, Snowden’s managers decided that he was the most qualified candidate to build a new web front-end for one of its projects, despite his contractor status. As his coworker tells it, he was given full administrator privileges, with virtually unlimited access to NSA data. “Big mistake in hindsight,” says Snowden’s former colleague. “But if you had a guy who could do things nobody else could, and the only problem was that his badge was green instead of blue, what would you do?”
  • As further evidence that Snowden didn’t hijack his colleagues’ accounts for his leak, the NSA staffer points to an occasion when Snowden was given a manager’s password so that he could cover for him while he was on vacation. Even then, investigators found no evidence Snowden had misused that staffer’s privileges, and the source says nothing he could have uniquely accessed from the account has shown up in news reports.
  • Snowden’s superiors were so impressed with his skills that he was at one point offered a position on the elite team of NSA hackers known as Tailored Access Operations. He unexpectedly turned it down and instead joined Booz Allen to work at NSA’s Threat Operation Center.
  • Another hint of his whistleblower conscience, aside from the telltale hoodie: Snowden kept a copy of the constitution on his desk to cite when arguing against NSA activities he thought might violate it.
  • The source tells me Snowden also once nearly lost his job standing up for a coworker who was being disciplined by a superior.
  • Snowden often left small, gifts anonymously at colleagues’ desks.
  • He frequently walked NSA’s halls carrying a Rubik’s cube–the same object he held to identify himself on a Hong Kong street to the journalists who first met with him to publish his leaks.
  • Snowden’s former colleague says that he or she has slowly come to understand Snowden’s decision to leak the NSA’s files. “I was shocked and betrayed when I first learned the news, but as more time passes I’m inclined to believe he really is trying to do the right thing and it’s not out of character for him. I don’t agree with his methods, but I understand why he did it,” he or she says. “I won’t call him a hero, but he’s sure as hell no traitor.”

via Forbes.com

President Appoints Top Spy Who Lied to Congress to Lead Review of Surveillance Programs

President Appoints Top Spy Who Lied to Congress to Lead Review of Surveillance Programs

100809-D-7203C-007.JPGA fox raids a chicken coop, killing all the chickens. With feathers sticking out of the sides of his mouth, stinking of blood, he swears he didn’t do it. He wasn’t even there! Days later, in response to sustained cries of protest from the animals, the farmer commissions an investigation to determine who was responsible for the grisly scene. To the shock and horror of the farm animals, he appoints the fox to lead the investigation. The fox issues a statement pledging to regain the public trust.

The government is the farmer, we are the farm animals, and James Clapper is the fox.

Director of National Intelligence James Clapper, the all-powerful spy infamous for lying to congress about the Section 215 bulk metadata program, will establish a “review group to examine intelligence collection,” the government tells us. This incredible turn of events comes, as Marcy Wheeler points out, only 72 hours after President Obama promised a thorough review of intelligence programs conducted by “outside,” “independent” actors.

James Clapper is about as inside as it gets. As Jameel Jaffer observed on Twitter, appointing Clapper to oversee a review of intelligence programs is akin to assigning the author of the Bush administration torture memos, John Yoo, “to lead [an] independent inquiry into the CIA torture program.”

That’s bad enough. But it gets worse.

When the government announced the Clapper ‘review,’ it offered us this quote from the perjurer himself, describing what his ‘review group’ sets out to do:

The review group will assess whether, in light of advancements in communications technologies, the United States employs its technical collection capabilities in a manner that optimally protects our national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust.

Read that sentence very carefully. Completely absent from the passage is any reference to the legality, democratic compatibility, or constitutionality of the surveillance programs.

Not only is the fox set to investigate the incident at the hen house. He has told us up front that the programs’ impact on civil liberties is not even up for discussion. Instead, the review will assess whether US surveillance programs are thorough enough, and whether they’ll continue ‘advanc[ing] our foreign policy’ interests amidst ‘the risk of unauthorized disclosure.’ (This, I imagine, is code for: How can we keep these programs secret so as not to thoroughly piss off our allies?)

Instead of looking at the ways in which his spy programs kill democracy and obliterate any possibility for political freedom, Clapper admits at the outset that his ‘review group’ will seek to determine whether and how the intelligence agencies can keep a tighter lid on their global surveillance operations.

And then there’s the horrifying kicker. The review group will seek to ‘account for’ one last ‘policy consideration,’ he says: ‘our need to maintain the public trust.’

The public trust! James Clapper!

At least Clapper isn’t totally unaware of what’s going on around him; it’s true that the public does not trust the intelligence apparatus. But while public trust in government is important, more important than trust is a transparent and accountable architecture that deserves to be trusted. Clapper’s announcement of his intention to figure out how to regain the public trust in the absence of even one mention of reforming the spy programs to conform with constitutional or democratic principles is positively chilling. It is an acknowledgement that our government is more interested in appearances than it is in actual accountability. And it suggests that the primary lesson the establishment has learned in the past few months has been that it should do a better job lying to the public — not that it should roll back the monstrous surveillance state.

This statement about ‘the public trust’ makes clear that the administration views the fallout from the Snowden leaks, and American and global outrage over NSA surveillance and government mendacity, as just another public relations war. That’s too bad, because the leaks have in fact ignited a war over the soul of this country, raising absolutely critical questions about the possibility for democracy in the 21st century.

Clapper is set to deliver his interim findings to the President within two months, and will publish a report with recommendations by mid-December. When those recommendations become public, don’t forget who put them together, and what his intentions were from the outset: not to examine the programs’ constitutionality, but rather to figure out how to spin, entrench, and prolong them.

Remember the fox.

via PrivacySOS.com

UPDATE: In a bizarre about-face, the Obama administration is now fiercely denying that Clapper will control the “review group.” Maybe this Huffington Post page pushed them over the edge:

clapperhuffpo

Carol Ambruster

Carol Ambruster

Carol-AmbrusterProfessor Carol Ambruster, 69, University professor and Astronomy and Astrophysics Officers had found nothing in Ambruster’s life or history that appeared suspicious. Philly.com reported; Carol W. Ambruster, 69 was found by her roommate in the kitchen of her apartment in the 5500 block of Wayne Avenue, Germantown with a knife in her neck about 9 p.m., police said. She also had been stabbed in the chest. Ambruster, a tenured professor in the department of astronomy and astrophysics at Villanova, retired in 2011. Ambruster attended Northeastern University, where she majored in physics, and received her doctorate in astronomy from the University of Pennsylvania in 1984. Her research interests included stars and the history of astronomy

Ancient Origins – The Golden Ratio – A Sacred Number That Links the Past & Present

Ancient Origins – The Golden Ratio – A Sacred Number That Links the Past & Present

golden-ratioPrecisely, this is the number 1.61803399, represented by the Greek letter Phi, and considered truly unique in its mathematical properties, its prevalence throughout nature, and its ability to achieve a perfect aesthetic composition.

According to astrophysicist Mario Livio:

Some of the greatest mathematical minds of all ages, from Pythagoras and Euclid in ancient Greece, through the medieval Italian mathematician Leonardo of Pisa and the Renaissance astronomer Johannes Kepler, to present-day scientific figures such as Oxford physicist Roger Penrose, have spent endless hours over this simple ratio and its properties. But the fascination with the Golden Ratio is not confined just to mathematicians. Biologists, artists, musicians, historians, architects, psychologists, and even mystics have pondered and debated the basis of its ubiquity and appeal. In fact, it is probably fair to say that the Golden Ratio has inspired thinkers of all disciplines like no other number in the history of mathematics.

In mathematics and the arts, two quantities are in the golden ratio if their ratio is the same as the ratio of their sum to the larger of the two quantities. When the Golden Mean is conceptualised in two dimensions it is typically presented as a regular spiral that is defined by a series of squares and arcs, each forming “Golden Rectangles”.

This symbolic potential arises because of the way the mean’s spiral shape resembles growth patterns observed in nature and its proportions are reminiscent of those in human bodies. Thus, these simple spirals and rectangles, which served to suggest the presence of a universal order underlying the world, were thereby dubbed “golden” or “divine”.

The Golden Ratio in History

The golden ratio has fascinated Western intellectuals of diverse interests for at least 2,400 years. The earliest known monuments believed to have been built according to this alluring number are the statues of the Parthenon in Greece, dating back between 490 and 430 BC.  However, there are many who have argued that it goes back much further than this and that the Egyptians were well versed in the properties of this unique number.

According to some historians, the Egyptians thought that the golden ratio was sacred.  Therefore, it was very important in their religion.  They used the golden ratio when building temples and places for the dead.  In addition, the Egyptians found the golden ratio to be pleasing to the eye.  They used it in their system of writing and in the arrangement of their temples.  The Egyptians were aware that they were using the golden ratio, but they called it the “sacred ratio.”

The first recorded definition of the golden ratio dates back to the period when Greek mathematician, Euclid (c. 325–c. 265 BC), described what he called the “extreme and mean ratio”. However, the ratio’s unique properties became popularised in the 15th century when aesthetics were a vital component of Renaissance art and geometry served both practical and symbolic purposes.  As the famous mathematician, astronomer, and astrologer, Johannes Kepler (1571 – 1630) wrote:

Geometry has two great treasures: one is the Theorem of Pythagoras, and the other the division of a line into extreme and mean ratio; the first we may compare to a measure of gold, the second we may name a precious jewel.

The Golden Ratio in Architecture

Many artists and architects have proportioned their work to approximate the golden ratio, with the belief that the outcome will be more aesthetically pleasing.  Using any of these ratios, an architect can design a door handle that has a complementary relationship to its door, which in turn has a similar relationship to its enclosing wall, and so on.  But more than this, the golden ratio has been used for the façade of great buildings from the Parthenon to the Great Mosque of Kairouan and all the way through to modern landmarks such as the Sydney Opera House and the National Gallery in London.

The Golden Ratio in Nature

Perhaps what is most surprising about the Golden Ratio is that it can be seen as a naturally occurring phenomenon in nature.   The golden ratio is expressed in the arrangement of branches along the stems of plants and the veins in leaves.   It can be seen in the skeletons of animals and humans and the branching of their veins and nerves.  It can even be seen in the proportions of chemical compounds and the geometry of crystals. Essentially, it is all around us and within us and for this reason, German psychologist Adolf Zeising (1810 – 1876) labelled it a ‘universal law’:

in which is contained the ground-principle of all formative striving for beauty and completeness in the realms of both nature and art, and which permeates, as a paramount spiritual ideal, all structures, forms and proportions, whether cosmic or individual, organic or inorganic, acoustic or optical; which finds its fullest realization, however, in the human form.

As a result of the unique properties of this golden proportion, many view the ratio as sacred or divine and as a door to a deeper understanding of beauty and spirituality in life, unveiling a hidden harmony or connectedness in so much of what we see.

via Ancient Origins

Making A Killing With Cancer: A $124.6 Billion Industry

Making A Killing With Cancer: A $124.6 Billion Industry

blood-money-cancer-industryIf you had a business selling something that made you well over a hundred billion dollars per year, would you take steps to eradicate the need for your business? Or would you make every effort for that money continue rolling in?

Take cancer, for example. Don’t let all the media hype about “The Cure” fool you. No one who is in a position to do so wants to end cancer because they are all making a killing on the big business of treatment, while ordinary people go broke, suffer horribly, and die.

There will never be a “cure” brought to market because there just isn’t enough profit in eradicating the disease entirely. There will never be a governing body that protects consumers from being subjected to known carcinogens, because that, too, will stop the cash from rolling in. A great deal of research is covered up and many potential cures are ignored and discredited because there is far more money in perpetuating illness than in curing it. In 2012, the reported spending on cancer treatment was 124.6 billion dollars. Blood money.

The Grim Statistics

Just the word “cancer” sends a frisson of fear down the spine of the most stalwart optimist. Terrifyingly, almost one in two people will get the dreaded disease, and the numbers are only getting worse. Here are some quick stats for background:

  • Nearly half of all Americans will develop cancer in their lifetime. (source) Quick math tells us that is an astonishing 157 million victims.
  • Over half a million people in America died of cancer in 2012. (source)
  • In 2011, cancer was the #1 cause of death in the Western world, and #2 in developing countries. (source)
  • Cancer is the #1 cause of childhood death in the United States. (source)

This is a fairly recent increase. A hundred years ago, the number was far different. At that time, 1 in 33 people was stricken with the disease. And despite billions of dollars being spent to find “the cure”, the World Health Organization predicts that deaths from cancer will DOUBLE by the year 2030.

It’s being normalized. The news is full of photos of babies who are missing an eye, of beautiful bald children who have lost their hair to chemo, and of people who have had to have body parts removed in order to survive a few more years. But cancer is NOT normal. It isn’t something that “just happens.” Researchers know the things that cause cancer. Government protection agencies do, too, but they do nothing to limit these toxins in the marketplace.

Why?

Because, cancer is big business and those who are profiting have great financial interest in seeing the deadly trend continue to increase.

Poisoned for Profit

So what has changed? How did we go from a 3% chance of contracting cancer to a 41% chance?

It’s the advent of Big Pharma, Big Agri and Big Business. They are getting rich off of poisoning Americans through the manufacture of toxic elements that we are exposed to on a daily basis.

Unless you live in a bubble and have no contact with manufactured items, outside air, or the sun, you are exposed to a staggering number of known and suspected carcinogens every day. (Check out THIS LIST to see the known and suspected carcinogens that are readily available in the United States.)

The statistics support that the cumulative build up of all these different toxins in the human body eventually results in cancer in many people.

First, the manufacturers and the “food” producers profit when we buy their poisoned goods.

Then the medical system and pharmaceutical companies profit when we become ill and must fight cancer.

The drugs alone can cost over $100,000 per year, and that is on top of exorbitant costs for radiation, chemotherapy, and physicians’ bills. In the United States, cancer is the #1 most expensive “per person” illness to treat. (source)

Why would those who profit want to prevent cancer when 95.5 BILLION DOLLARS PER YEAR is spent on treating it? There is a vested interest in this increase in illness and the people benefiting from it have no intention of reducing the cases of cancer.

Don’t Count on Obamacare

Don’t look to Obamacare to be the saving grace of cancer victims, either. With this type of government-controlled medicine, budgets will be strictly adhered to and the decisions on how to proceed and what will be paid for will NOT be in the hands of the ill person. Treatments, medications, and funds will be strictly allocated through what many people are referring to as “death panels.”

Furthermore, Obamacare only covers 60% of your medical costs in most cases (after a hefty deductible) and none of your medication is covered. If you don’t have $50,000 or more kicking around for your co-pay, you will be out of luck, despite diligently paying your worthless monthly premiums.

Prevention: Your Only Defense

Avoiding carcinogens as diligently as possible is your best defense against becoming the “1 in 3″, but it isn’t easy. Furthermore, you’ll be considered an “extremist” or a “kook” by those around you who have buried their heads in the sand.

Basically, a spending day in the Western world is a like spending a day running a gauntlet of toxins and carcinogens. Big Pharma, Big Agri and Big Business are getting rich off of poisoning Americans.

There are steps you can take to limit your exposure but be prepared for many people to consider your actions extreme. Very few people are committed enough to their health and the health of their family to do the research required to identify the dangers around them and then go against the current to avoid those perils. (source)

Since most of us don’t live in a bubble, we will be subjected to some of these toxins – they’re impossible to avoid entirely. However, you can limit your exposure by taking the following steps to reduce your exposure to everyday poisons. (This list is expanded from the article, “The Great American Cancer Cluster” with permission from The Daily Sheeple.)

    • Purchase organic foods as often as possible. GMOs and pesticides are proven carcinogens.
    • Load your plate with colorful antioxidants. Opt for organic versions of foods like berries, colorful veggies, dark chocolate, and coffee, to name a few, are loaded with powerful, cancer-fighting antioxidants and will boost your immune system against other types of illness and disease as well.
    • Avoid processed foods. Many of the additives and preservatives featured abundantly in North America are banned in other countries precisely because of the health risks they represent.
    • Select non-toxic cookware. Nonstick cookware contains Teflon and perfluorooctanoic acid (PFOA), which emit at least toxic gases within 5 minutes of heating up that nonstick pan. Once the pans become scratched, toxic particles are leached directly into the food you’re preparing. Aluminum cookware is also potentially toxic. Cast iron, ceramic, glass, and clay are all better cookware options.
    • Don’t smoke.
    • Consume alcohol only in moderation.

 

  • Limit the use of plastic in your home. BPA or Bisphenol-A are petrochemical plastics that are a major component of many water bottles, lines the inside of canned goods, and makes up the hard material of many reusable food containers, including some brands of baby bottles. They leach cancer causing endocrine disruptors into food, especially if the food is hot. Use glass containers whenever possible.
  • Select personal care products that do not contain petrochemicals. Many cosmetics and other health and beauty aids contain petrochemicals. The danger of this is their byproduct, 1,4-dioxane, a proven carcinogen. The U.S. Environmental Protection Agency classifies dioxane as a probable human carcinogen California state law has classified dioxane to cause cancer. Animal studies in rats suggest that the greatest health risk is associated with inhalation of vapors. Avoid the following ingredients:
  • Paraffin Wax
  • Mineral Oil
  • Toluene
  • Benzene
  • Phenoxyethanol
  • Anything with PEG (polyethylene glycol)
  • Anything ending in ‘eth’ indicates that it required ethylene oxide (a petrochemical) to produce e.g. myreth, oleth, laureth, ceteareth
  • Anything with DEA (diethanolamine) or MEA (ethanolamine)
  • Butanol and any word with ‘butyl’ – butyl alcohol, butylparaben, butylene glycol
  • Ethanol and word with ‘ethyl’ – ethyl alcohol, ethylene glycol, ethylene dichloride, EDTA (ethylene-diamine-tetracetatic acid), ethylhexylglycerin
  • Any word with “propyl” – isopropyl alcohol, propylene glycol, propylalcohol, cocamidopropyl betaine
  • Methanol and any word with ‘methyl’ – methyl alcohol, methylparaben, methylcellulose
  • Parfum or fragrance – 95% of chemicals used in fragrance are from petroleum
  • Opt for natural, biodegradable food grade cleaning products. According to the website Natural Pure Organics, the average household contains up to 25 gallons of toxic materials, most of which are in cleaning products. When you use these cleaners, they linger in the air and on the surfaces, increasing your exposure to carcinogens as you inhale the toxins into your lungs or absorb them through your skin.
  • Avoid artificial sweeteners. Aspartame, for example, is a known carcinogen that breaks down into formaldehyde in the human body.
  • Refuse vaccines. Many vaccines contain formaldehyde and mercury, both of which are known carcinogens. By the age of two, if a child has received all of the recommended vaccines, he or she has received 2,370 times the “allowable safe limit” for mercury (if there is such a thing as a safe level of poison). The HPV vaccine can actually increase the risk of reproductive cancer. The polio vaccine most recently came under fire for its cancer-causing ingredients. (Learn more about the cancer causing ingredients in vaccines HERE.)
  • Avoid tap water. If you have municipal water, drink it at the risk of ingesting loads of toxins. First, there is the willful addition of sodium fluoride, a pesticide which is labeled as “deadly to humans.” Not only has the consumption of fluoride been linked to cancer, but it also lowers IQs, causes infertility, and causes hardening of the arteries. Then there is the addition of chlorine, which is used to kill bacteria that could make us sick. Unfortunately, according to Dr. Michael J. Plewa, a genetic toxicology expert at the University of Illinois, chlorinated water is carcinogenic. “Individuals who consume chlorinated drinking water have an elevated risk of cancer of the bladder, stomach, pancreas, kidney and rectum as well as Hodgkin’s and non-Hodgkin’s lymphoma.”
  • Maintain a healthy body weight. Obesity has been linked to increased risks of cancers of the esophagus, breast, endometrium, uterus, colon and rectum, kidney, pancreas, thyroid, and gallbladder.
  • Exercise daily.

The mindboggling thing is that those who strictly avoiding carcinogens and toxins are labeled “crazy” or “hysterical”. I can’t tell you how many times I have watched people roll their eyes or scoff when I refuse to partake in things that are hazardous. Somehow, drinking water from my own BPA-free water bottle is considered to be “extreme”. Not taking my children to McDonald’s or feeding them hot-dogs and Doritos is “mean”. Making our body care products and cleaning products from wholesome, non-toxic ingredients is “silly”.

I believe that knowingly ingesting toxic ingredients is “crazy”. I believe that rubbing carcinogens on my body or spraying them around my house is “ridiculous”. I think that having poison injected into my defenseless children or feeding it to them on a colorful plate is “mean”.

Never forget that the bottom line is profit. Don’t expect the FDA or the EPA to step in. They’ve proven time and again that their purpose is to serve the interests of Big Business, not the consumers.

Cancer represents big money to the pharmaceutical companies and the health industry. They do NOT have a vested interest in prevention. So, maybe, just maybe, subjecting your body to the tender mercies of Big Pharma and the AMA and lining their already loaded pockets is just a little bit sillier than taking steps to avoid illness altogether.

This article is dedicated to some beloved people in my life, one of whom fought it and won and the other who is fighting the good fight and will not go quietly… much love to SD and JS, and all who are touched by this icy finger.

Daisy Luther is a freelance writer and editor. Her website, The Organic Prepper, where this article first appeared, offers information on healthy prepping, including premium nutritional choices, general wellness and non-tech solutions. You can follow Daisy on Facebook and Twitter, and you can email her at [email protected]

Florida cop arrested for wearing ‘Anonymous’ mask warns ‘there’s a war coming’

Florida cop arrested for wearing ‘Anonymous’ mask warns ‘there’s a war coming’

 

ericsonThe police officer arrested for refusing to remove his “Anonymous” mask at an anti-Obamacare rally gave an interview to Red Pill Philosophy and WeAreChange in which he said that “there’s a war coming” and “it’s time to fight.”

Ericson Harrell wore the Guy Fawkes mask, he said, because it’s a “symbol of protest.”

“I always keep my mask in my truck, my cape in the truck, the flag in truck and everything,” he said. “So I put on the mask and the cape, grabbed the flag, and I stood on the corner.”

Eventually a female police officer confronted him, at which point he asserted “my right to free speech,” and tried to convince the officer that the anti-masking statute didn’t apply to him, because that statute “was not put into place for peaceful protests, not for figures just standing on the side of the road trying to express their first amendment rights.”

After her supervisor showed up, he was arrested for refusing to remove his mask or identify himself.

He stated that the officer and her supervisor thought he was part of a larger anti-Obamacare protest, but “in actual reality, I was alone at the time. I was a soldier of one.”

Harrell also claimed that he only announced himself as a police officer “after the fact, because I didn’t want to get any preferential treatment.”

The anti-masking statute, he correctly claimed, was put into place “sometime in the 1950s because of the Ku Klux Klan trying to intimidate a certain group of people — a certain race of people.” He declined to specify which “group” or “race” that was.

Harrell is currently on administrative leave, and his department will make a decision as to his permanent employment situation after the charges against him are dealt with.

Watch the complete interview with Ericson Harrell below.

 

 

Mass Animal Deaths – Alaska feeling Fukishima?

Mass Animal Deaths – Alaska feeling Fukishima?

Dead-Birds-In-AlaskaWhy are huge numbers of dead birds dropping dead and washing up along the coastlines of Alaska?  It is being reported that many of the carcases of the dead birds are “broken open and bleeding”.  The photo of some of these dead birds at the top of this article was originally posted by Alaska native David Akeya on Facebook.  You can find more photos of these dead birds right here.  And of course it isn’t just birds that are dying.  As you will see below, something is causing mass death events among various populations of fish as well.  In addition, it has been reported that large numbers of polar bears, seals and walruses in Alaska are being affected by hair loss and “oozing sores”.  So precisely what is causing all of this?  Could Fukushima be responsible?  Authorities are claiming that all of this is being caused by “disease” or “harsh weather”, but are they actually telling us the truth?  Evaluate the evidence that I have shared below and decide for yourself…

#1 Something is causing large numbers of dead birds to wash up on shores all over Alaska.  The following is a report from Alaska Public Media about just one of these incidents…

Hundreds of dead birds washed up on the shores of St. Lawrence Island towards the end of November. And though the cause of the die off isn’t yet known, the quick response demonstrates a mounting capacity for dealing with unexpected environmental events in the region.

Scientists do not know why this is happening.  Some of them are blaming “harsh weather”.

#2 Something is causing large numbers of seals and walruses to lose hair and develop “oozing sores”…

For example, while skin ulcers and other conditions — hair loss, lethargy, oozing sores, bloody mucous, congested lungs — are affecting seals and walruses, it’s not known if the two species are suffering from the same sickness. And although much studying has been done to determine whether it’s the result of a virus or radiation, and no tests have linked these origins to the illness, it’s not yet known what the root cause is. Toxins and environmental factors, like harmful algae blooms and thermal burns, are under consideration. As is whether allergy, hormone or nutritional problems might play a role.

Once again, scientists do not know why this is happening.

#3 Polar bears along the Alaska coastlines are also suffering from fur loss and open sores

Wildlife experts are studying whether fur loss and open sores detected in nine polar bears in recent weeks is widespread and related to similar incidents among seals and walruses.

The bears were among 33 spotted near Barrow, Alaska, during routine survey work along the Arctic coastline. Tests showed they had “alopecia, or loss of fur, and other skin lesions,” the U.S. Geological Survey said in a statement.

Once again, scientists do not know why this is happening.

#4 The population of sockeye salmon along the coastlines of Alaska is at a “historic low”

Aboriginal people in British Columbia who rely on Skeena River sockeye are facing some extremely difficult decisions as sockeye salmon returns plunge to historic lows.

Lake Babine Chief Wilf Adam was on his way to Smithers, B.C., on Monday for a discussion about whether to entirely shut down the food fishery on Lake Babine, something he said would be drastic and unprecedented – but may ultimately be necessary.

Authorities say that the number of sockeye salmon has dropped by more than 80 percent since last year…

Mel Kotyk, North Coast area director for the Department of Fisheries and Oceans, said the department’s monitoring activities were finding one of the lowest runs in 50 years.

Only 453,000 sockeye are expected to swim along the Skeena this year, Kotyk said, compared to approximately 2.4 million last year, forcing all commercial and recreational Skeena sockeye fisheries to be closed.

Once again, scientists do not know why this is happening.

#5 Something is causing Pacific herring to bleed from their gills, bellies and eyeballs

Independent fisheries scientist Alexandra Morton is raising concerns about a disease she says is spreading through Pacific herring causing fish to hemorrhage.

Ms. Morton has called on the federal Department of Fisheries and Oceans to investigate, saying it could cause large-scale herring kills and infect wild salmon, which feed heavily on herring.

“I’ve been seeing herring with bleeding fins,” Ms. Morton said Monday. “Two days ago I did a beach seine on Malcolm Island [near Port McNeill on northern Vancouver Island] and I got approximately 100 of these little herring and they were not only bleeding from their fins, but their bellies, their chins, their eyeballs. These are very, very strong disease symptoms.”

Once again, scientists do not know why this is happening.

#6 Some residents of Alaska are absolutely convinced that Fukushima is to blame for the rapidly declining fish populations.  For example, just check out the following excerpt from a recent editorial in one Alaskan newspaper

We are concerned this hazardous material is hitching a ride on marine life and making its way to Alaska.

Currents of the world’s oceans are complex. But, generally speaking, two surface currents — one from the south, called the Kuroshio, and one from the north, called the Oyashio — meet just off the coast of Japan at about 40 degrees north latitude. The currents merge to form the North Pacific current and surge eastward. Fukushima lies at 37 degrees north latitude. Thousands of miles later, the currents hit an upwelling just off the western coast of the United States and split. One, the Alaska current, turns north up the coast toward British Columbia and Southeast Alaska. The other, the California current, turns south and heads down the western seaboard of the U.S.

The migration patterns of Pacific salmon should also be taken into consideration. In a nutshell, our salmon ride the Alaska current and follow its curve past Sitka, Yakutat, Kodiak and the Aleutian Islands. Most often, it’s the chinook, coho and sockeye salmon migration patterns that range farthest. Chum and pink salmon seem to stay closer to home. Regardless of how far out each salmon species ventures into the Pacific, each fish hitches a ride back to its home rivers and spawning grounds on the North Pacific current, the same one pulling the nuclear waste eastward.

We all know too much exposure to nuclear waste can cause cancer. And many understand that certain chemicals, such as cesium-137 and strontium-9, contained in said waste products can accumulate in fish by being deposited in bones and muscle permanently.

We are concerned our Alaska salmon are being slowly tainted with nuclear waste. We are worried about the impact this waste could have on our resources, and especially the people who consume them.

#7 Something also seems to be causing a substantial spike in the death rate for killer whales living off of the coast of British Columbia

A Vancouver Aquarium researcher is sounding the alarm over “puzzling” changes he’s observed in the killer whale pods that live off the southern British Columbia coast.

Dr. Lance Barrett-Lennard says he fears changes in the ocean environment are prompting odd behaviour and an unusually high mortality rate.

Barrett-Lennard says the southern resident orca pod, which is found in the Salish Sea between Vancouver Island and the B.C. mainland, has lost seven matriarchs over the past two years, and he’s noticed a lack of vocalizations from the normally chatty mammals.

Once again, scientists do not know why this is happening.

These kinds of things are happening further south along the Pacific coast as well.

For example, the recent death of thousands of birds down in Oregon is absolutely baffling scientists…

Residents have reported groups ranging from 10 to 200 dead or dying barn and violet-green swallows in barns and around other structures where they perch. The Oregon Department of Fish and Wildlife said the dieoffs appear to be worst close to rivers and standing water where the birds tend to gather.

The toll, estimated in the thousands, has stunned Fish and Wildlife specialists. “This type of mortality event is unprecedented and considered a rare and unusual event,” said Colin Gillin, wildlife veterinarian for the agency. “The effect on bird populations is unknown.”

Some scientists are blaming these deaths on “harsh weather”.

Do you buy that?

Clearly something very unusual is happening, and it should not be unreasonable to ask if Fukushima is at least partially responsible for all of this.

Without a doubt, the Pacific Ocean appears to be a much different place than it was before the Fukushima disaster.  In fact, one very experienced Australian adventurer said that he felt as though “the ocean itself was dead” as he journeyed from Japan to San Francisco recently…

The next leg of the long voyage was from Osaka to San Francisco and for most of that trip the desolation was tinged with nauseous horror and a degree of fear.

“After we left Japan, it felt as if the ocean itself was dead,” Macfadyen said.

“We hardly saw any living things. We saw one whale, sort of rolling helplessly on the surface with what looked like a big tumour on its head. It was pretty sickening.

“I’ve done a lot of miles on the ocean in my life and I’m used to seeing turtles, dolphins, sharks and big flurries of feeding birds. But this time, for 3000 nautical miles there was nothing alive to be seen.”

In place of the missing life was garbage in astounding volumes.

“Part of it was the aftermath of the tsunami that hit Japan a couple of years ago. The wave came in over the land, picked up an unbelievable load of stuff and carried it out to sea. And it’s still out there, everywhere you look.”

What in the world would cause the Pacific Ocean to be “dead” like that?

Where did all the life go?

Hopefully we will start to get some answers to these questions.

For much more on all of this, please see my previous articles entitled “28 Signs That The West Coast Is Being Absolutely Fried With Nuclear Radiation From Fukushima” and “Something Is Killing Life All Over The Pacific Ocean – Could It Be Fukushima?

Meanwhile, radiation levels around Fukushima just continue to increase.  The following is from a recent RT article

Outdoor radiation levels have reached their highest at Japan’s Fukushima nuclear plant,warns the operator company.Radiation found in an area near a steel pipe that connects reactor buildings could kill an exposed person in 20 minutes,local media reported.

The plant’s operator and the utility responsible for the clean-up Tokyo Electric Power Company (TEPCO) detected record radiation levels on a duct which connects reactor buildings and the 120 meter tall ventilation pipe located outside on Friday. TEPCO measured radiation at eight locations around the pipe with the highest estimated at two locations – 25 Sieverts per hour and about 15 Sieverts per hour, the company said. This is the highest level ever detected outside the reactor buildings, according to local broadcaster NHK.

And every single day, another 400 tons of very highly radioactive water gets released into the Pacific Ocean.  The total amount of radioactive material in the Pacific is constantly rising, and because many of these radioactive particles have a half-life of 30 years or longer, much of this material is going to be with us for a very, very long time.

This is turning out to be the greatest environmental disaster in modern history, and it is very far from over.

About the author: Michael T. Snyder is a former Washington D.C. attorney who now publishes The Truth.  His new thriller entitled “The Beginning Of The End” is now available on Amazon.com.

via TheTruthWins

Anti-American Sleeper Cell Identified

Anti-American Sleeper Cell Identified

terrorist-cell-usa-destroyers-found

We’re being destroyed from within by a socialistic bureaucracy who’s overriding goal is its own survival at the cost of National Security, which as the historian Thomas Cahill asserts was one of the major reasons for the fall of the Roman Empire.

World of Spycraft: NSA and CIA Spied in Online Games

World of Spycraft: NSA and CIA Spied in Online Games

This story has been reported in partnership between The New York Times, the Guardian and ProPublica based on documents obtained by The Guardian.

Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.

Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels.

The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, voice and text chats, a way to conduct financial transactions — American and British intelligence agencies worried that they might be operating there, according to the papers.

Takeaways: How Spy Agencies Operate In Virtual Worlds

gathering-intelligence-NSA-WOWGATHERING INTELLIGENCE: U.S. and British intelligence agencies — including the Central Intelligence Agency, Defense intelligence agency and Britain’s Government Communications Headquarters — have operated in virtual worlds and gaming communities to snoop and try to recruit informants. For example, according to Snowden documents, the U.S. has conducted spy operations in Second Life (pictured), where players create human avatars to socialize, buy and sell goods and explore exotic virtual destinations. (Second Life image via Linden Lab)
Slideshow: 1 of 5

Online games might seem innocuous, a top-secret 2008 NSA document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!,” another 2008 NSA document declared.

But for all their enthusiasm — so many CIA, FBI and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat.

The documents do not cite any counterterrorism successes from the effort, and former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.

(Transcript: What are intelligence agencies doing in virtual worlds?)

Games “are built and operated by companies looking to make money, so the players’ identity and activity is tracked,” said Peter W. Singer of the Brookings Institution, an author of “Cybersecurity and Cyberwar: What Everyone Needs to Know.” “For terror groups looking to keep their communications secret, there are far more effective and easier ways to do so than putting on a troll avatar.”

The surveillance, which also included Microsoft’s Xbox Live, could raise privacy concerns. It is not clear exactly how the agencies got access to gamers’ data or communications, how many players may have been monitored or whether Americans’ communications or activities were captured.

One American company, the maker of World of Warcraft, said that neither the NSA nor its British counterpart, the Government Communications Headquarters, had gotten permission to gather intelligence in its game. Many players are Americans, who can be targeted for surveillance only with approval from the nation’s secret intelligence court. The spy agencies, though, face far fewer restrictions on collecting certain data or communications overseas.

“We are unaware of any surveillance taking place,” said a spokesman for Blizzard Entertainment, based in Irvine, Calif., which makes World of Warcraft. “If it was, it would have been done without our knowledge or permission.”

A spokeswoman for Microsoft declined to comment. Philip Rosedale, the founder of Second Life and a former chief executive officer of Linden Lab, the game’s maker, declined to comment on the spying revelations. Current Linden executives did not respond to requests for comment.

A Government Communications Headquarters spokesman would neither confirm nor deny any involvement by that agency in gaming surveillance, but said that its work is conducted under “a strict legal and policy framework” with rigorous oversight. An NSA spokeswoman declined to comment.

Intelligence and law enforcement officials became interested in games after some became enormously popular, drawing tens of millions of people worldwide, from preteens to retirees. The games rely on lifelike graphics, virtual currencies and the ability to speak to other players in real time. Some gamers merge the virtual and real worlds by spending long hours playing and making close online friends.

In World of Warcraft, players share the same fantasy universe — walking around and killing computer-controlled monsters or the avatars of other players, including elves, animals or creatures known as orcs. In Second Life, players create customized human avatars that can resemble themselves or take on other personas — supermodels and bodybuilders are popular — who can socialize, buy and sell virtual goods, and go places like beaches, cities, art galleries and strip clubs. In Microsoft’s Xbox Live service, subscribers connect online in games that can involve activities like playing soccer or shooting at each other in space.

According to American officials and documents that Mr. Snowden provided to The Guardian, which shared them with The New York Times and ProPublica, spy agencies grew worried that terrorist groups might take to the virtual worlds to establish safe communications channels.

In 2007, as the NSA and other intelligence agencies were beginning to explore virtual games, NSA officials met with the chief technology officer for the manufacturer of Second Life, the San Francisco-based Linden Lab. The executive, Cory Ondrejka, was a former Navy officer who had worked at the NSA with a top-secret security clearance.

He visited the agency’s headquarters at Fort Meade, Md., in May 2007 to speak to staff members over a brown bag lunch, according to an internal agency announcement. “Second Life has proven that virtual worlds of social networking are a reality: come hear Cory tell you why!” said the announcement. It added that virtual worlds gave the government the opportunity “to understand the motivation, context and consequent behaviors of non-Americans through observation, without leaving U.S. soil.”

Ondrejka, now the director of mobile engineering at Facebook, said through a representative that the NSA presentation was similar to others he gave in that period, and declined to comment further.

Even with spies already monitoring games, the NSA thought it needed to step up the effort.

“The Sigint Enterprise needs to begin taking action now to plan for collection, processing, presentation and analysis of these communications,” said one April 2008 NSA document, referring to “signals intelligence.” The document added, “With a few exceptions, NSA can’t even recognize the traffic,” meaning that the agency could not distinguish gaming data from other Internet traffic.

By the end of 2008, according to one document, the British spy agency, known as GCHQ, had set up its “first operational deployment into Second Life” and had helped the police in London in cracking down on a crime ring that had moved into virtual worlds to sell stolen credit card information. The British spies running the effort, which was code-named “Operation Galician,” were aided by an informer using a digital avatar “who helpfully volunteered information on the target group’s latest activities.”

Though the games might appear to be unregulated digital bazaars, the companies running them reserve the right to police the communications of players and store the chat dialogues in servers that can be searched later. The transactions conducted with the virtual money common in the games, used in World of Warcraft to buy weapons and potions to slay monsters, are also monitored by the companies to prevent illicit financial dealings.

In the 2008 NSA document, titled “Exploiting Terrorist Use of Games & Virtual Environments,” the agency said that “terrorist target selectors” — which could be a computer’s Internet Protocol address or an email account — “have been found associated with Xbox Live, Second Life, World of Warcraft” and other games. But that document does not present evidence that terrorists were participating in the games.

Still, the intelligence agencies found other benefits in infiltrating these online worlds. According to the minutes of a January 2009 meeting, GCHQ’s “network gaming exploitation team” had identified engineers, embassy drivers, scientists and other foreign intelligence operatives to be World of Warcraft players — potential targets for recruitment as agents.

At Menwith Hill, a Royal Air Force base in the Yorkshire countryside that the NSA has long used as an outpost to intercept global communications, American and British intelligence operatives started an effort in 2008 to begin collecting data from World of Warcraft.

One NSA document said that the World of Warcraft monitoring “continues to uncover potential Sigint value by identifying accounts, characters and guilds related to Islamic extremist groups, nuclear proliferation and arms dealing.” In other words, targets of interest appeared to be playing the fantasy game, though the document does not indicate that they were doing so for any nefarious purposes. A British document from later that year said that GCHQ had “successfully been able to get the discussions between different game players on Xbox Live.”

By 2009, the collection was extensive. One document says that while GCHQ was testing its ability to spy on Second Life in real time, British intelligence officers vacuumed up three days’ worth of Second Life chat, instant message and financial transaction data, totaling 176,677 lines of data, which included the content of the communications.

For their part, players have openly worried that the NSA might be watching them.

In one World of Warcraft discussion thread, begun just days after the first Snowden revelations appeared in the news media in June, a human death knight with the user name “Crrassus” asked whether the NSA might be reading game chat logs.

“If they ever read these forums,” wrote a goblin priest with the user name “Diaya,” “they would realize they were wasting” their time.

Even before the American government began spying in virtual worlds, the Pentagon had identified the potential intelligence value of video games. The Pentagon’s Special Operations Command in 2006 and 2007 worked with several foreign companies — including an obscure digital media business based in Prague — to build games that could be downloaded to mobile phones., according to people involved in the effort. They said the games, which were not identified as creations of the Pentagon, were then used as vehicles for intelligence agencies to collect information about the users.

The SAIC headquarters in McLean, Va., and the company’s island in Second Life. (The Meridian Group, SAIC)

Eager to cash in on the government’s growing interest in virtual worlds, several large private contractors have spent years pitching their services to American intelligence agencies. In one 66-page document from 2007, part of the cache released by Mr. Snowden, the contracting giant SAIC promoted its ability to support “intelligence collection in the game space,” and warned that online games could be used by militant groups to recruit followers and could provide “terrorist organizations with a powerful platform to reach core target audiences.”

It is unclear whether SAIC received a contract based on this proposal, but one former SAIC employee said that the company at one point had a lucrative contract with the CIA for work that included monitoring the Internet for militant activity. An SAIC spokeswoman declined to comment.

In spring 2009, academics and defense contractors gathered at the Marriott at Washington Dulles International Airport to present proposals for a government study about how players’ behavior in a game like World of Warcraft might be linked to their real-world identities. “We were told it was highly likely that persons of interest were using virtual spaces to communicate or coordinate,” said Dmitri Williams, a professor at the University of Southern California who received grant money as part of the program.

After the conference, both SAIC and Lockheed Martin won contracts worth several million dollars, administered by an office within the intelligence community that finances research projects.

It is not clear how useful such research might be. A group at the Palo Alto Research Center, for example, produced a government-funded study of World of Warcraft that found “younger players and male players preferring competitive, hack-and-slash activities, and older and female players preferring noncombat activities,” such as exploring the virtual world. A group from the nonprofit SRI International, meanwhile, found that players under age 18 often used all capital letters both in chat messages and in their avatar names.

Those involved in the project were told little by their government patrons. According to Nick Yee, a Palo Alto researcher who worked on the effort, “We were specifically asked not to speculate on the government’s motivations and goals.”

Andrew W. Lehren contributed reporting.

Transcript: What are intelligence agencies doing in virtual worlds? ProPublica reporter Justin Elliott, New York Times reporter Mark Mazzetti and The Guardian’s James Ball discussed #SpyGames with our readers. Like this story? Get more great ProPublica journalism by signing up for our email newsletter.

via ProPublica

U.S. Forces, Intelligence Agents and American Security Agents (MERCs) clandestine war in Yemen

U.S. Forces, Intelligence Agents and American Security Agents (MERCs) clandestine war in Yemen

obama-in-yemenSaudi militants were behind the massive car bombing and assault on Yemen’s military headquarters that killed more than 50 people, including foreigners, investigators said in a preliminary report released Friday.

Al-Qaeda claimed responsibility for the attack, saying it was retaliation for US drone strikes that have killed dozens of the terror network’s leaders.

The attack – the deadliest in Sanaa since May 2012 – marked an escalation in the terror network’s battle to undermine the US-allied government and destabilise the impoverished Arab nation despite the drone strikes and a series of US-backed military offensive against it.

US forces also have been training and arming Yemeni special forces, and exchanging intelligence with the central government.

Military investigators described a two-stage operation, saying heavily armed militants wearing army uniforms first blew up a car packed with 500 kilograms of explosives near an entrance gate, then split into groups that swept through a military hospital and a laboratory, shooting at soldiers, doctors, nurses, doctors and patients.

Officials earlier said 11 militants were killed, including the suicide bomber who drove the car. It was not clear if the 12th attacker was captured or escaped.

The investigative committee led by Yemen’s Chief of Staff Gen. Ahmed al-Ashwal, said militants shot the guards outside the gates of the military hospital, allowing the suicide bomber to drive the car inside, but a gunfight forced him to detonate his explosives before reaching his target.

It said the 12 militants killed, included Saudis.

Two military officials told The Associated Press that wounded soldiers had told them the assailants who stormed the hospital separated out the foreigners and shot everybody in the head.

Other military officials said American security agents were helping with the investigations, but that could not be confirmed. All officials spoke on condition of anonymity because they were not allowed to brief reporters.

Yemeni commandos and other security forces besieged the militants before they could reach the ministry’s main building, preventing them from going further than the ministry’s entrance gate. All the attackers were killed by 4:30 pm Thursday, according to the committee.

Yemeni security forces launched a manhunt in the capital to find the perpetrators, sparking gun battles that killed five suspected militants and a Yemeni commando, officials said.

The committee, which sent its report to Yemeni President Abed Rabbo Mansour Hadi, did not explain how it came to its conclusions.

The report, read on state TV, raised the death toll to 56 and said more than 200 people were wounded.

The foreigners killed included two aid workers from Germany, two doctors from Vietnam, two nurses from the Philippines and a nurse from India, according to Yemen’s Supreme Security Commission.

But a spokesman for the Philippines’ Department of Foreign Affairs, Raul Hernandez, said on Friday that seven Filipinos were killed in the attack, including a doctor and nurses, while 11 others were wounded.

The victims were among 40 Filipino workers in the hospital. Hernandez said that the Philippines’ honorary consul reported that the others survived by pretending to be dead.

It was not immediately possible to reconcile the conflicting accounts. But officials from the military hospital said Friday that at least 10 foreigners had been killed.

The United States considers the Yemeni al-Qaeda branch to be the most active in the world and it has escalated drone attacks against the militants in Yemen.

 

via SkyNews

Bitcoins: A Fully-Compliant Currency The Government Can Love

Bitcoins: A Fully-Compliant Currency The Government Can Love

bitcoinsI’m finishing up a novel, a piece of speculative fiction in a genre you could call “economic-thriller”.

The Mark of the Beast?

In the book, the dollar crashes in a hyperinflationary fire (natch), replaced by a new currency called the american. The exchange rate at the time of the changeover is $1,000 equals ₳1. To illustrate its purchasing power, ₳1 buys you a candy bar. 

However, americans don’t exist as physical currency. There are no “american bills” like there are dollar bills, and no coins either. Instead, americans are a fully digital currency: They exist in the ether. You need a card—be it a credit card, debit card, or EBT card—to spend americans. And to receive americans, either from employers, customers, government, etc., you need a “central account” which is tethered to your Social Security number. 

The rationale for these measures is convenience—but the implication is, no one can earn, save or spend money without the government being aware of exactly what you are doing. 

Since the government can easily access all your spending and earning of americans, no one can launder money, or evade taxes, or even so much as fail to pay all their bills on time. Law-makers and politicians and pundits say it’s no big deal that the government will know everything about the citizen’s finances, because, “If you’re not doing anything wrong, you’ve got nothing to hide! If you’re paying all your bills and your taxes and your loans, you got nothing to worry about!

Another feature of this virtual currency: With americans, you can never again be late with your bills. Payments you have to make are automatically deducted from your central account. And if you take out a loan for whatever purpose, not only is that information in your central account, but your ability to spend money is automatically prioritized: Taxes get paid first, followed by private loans, then bills, then food, then “etc.” 

In the novel, law-makers use this compulsory “compliance” as a selling point for the american. “Think of the convenience! No more worrying about paying your bills—your bills are all paid for you!

However, if you don’t have enough money for “etc.”—entertainment, booze, an ice-cream sundae with the kids, what have you—you don’t get any. And if after paying off your loans and bills there isn’t enough left over for food—then no food for you. Ditto with bills: No money for electricity, or water, or heat? Then no electricity, or water, or heat for you. And if perchance you can’t fully pay off your loans, then you are declared in “non-compliance”. And if you can’t pay off your taxes, then you are charged as being in “criminal non-compliance”—and then woe is you. 

In the language of the novel, it is a “fully-compliant currency”—and it forces the people to be “fully-compliant citizens” of the dictates of the government and the banksters. 

This is of course a fiction I invented for my upcoming novel—but I couldn’t help notice how lawmakers and banks are all of a sudden getting on the bitcoin bandwagon. 

For something that was supposed to be a threat to the established order, which is what bitcoin and the other cryptocurrencies promised to be, the established order sure seems to be happy with it: The U.S. Senate hearings on bitcoins were pretty much of a success for bitcoins, and banks are starting to throw nothing but love in bitcoin’s direction. The mainstream media isn’t putting down bitcoins, as it did a few years back. 

In short, and unlike what a lot of cryptocurrency proselytizers have been saying—that the powers that be would be against bitcoins—the establishment seems to be fully in favor—or at least accepting—of bitcoins. 

Makes you go Hmm . . ., now doesn’t it?

Me, I’ve already explained here and here why I think that bitcoins are in a bubble, and why bitcoins and other cryptocurrencies will never be currencies per se, only an asset class. My thinking is, cryptocurrencies represent a new class of assets whose value is highly unstable so long as they are not actually tethered to some good or service people both need to buy and have to sell. Until that day happens, cryptocurrencies are nothing but speculative investments that can plummet to zero at a moment’s notice. 

However, thinking about cryptocurrencies from the point of view of the Federal Reserve, or a senator on the Banking Committee, or a trader at a bank’s prop desk, cryptocurrencies such as bitcoin have a lot of advantages—they’re not something to be dismissed out of hand. 

All of bitcoin’s benefits to the establishment revolve around its blockchain. 

In simple terms, a blockchain is a registry of all transactions carried out in bitcoins. Thus is resolved the problem of double-spending one particular bitcoin: It can’t be done (at least in theory) due to the blockchain. 

But the blockchain is in fact a register—a trail—of bitcoins. So it’s a relative cinch to piece together each and every transaction of any particular wallet in the bitcoin universe. And since exchanges need detailed personal information about a bitcoin user in order to comply with money-laundering laws before issuing a new user with a wallet, the government or other interested parties could determine what any one particular person has been doing in the bitcoin marketplace. 

In other words: Imagine that the government knew each and every cent you earned and spent, without a single exception. 

That cannot be done with dollars, at least not easily. The dollar’s inefficiencies when compared to bitcoin or any other cryptocurrency are exactly what make tracking dollar transactions so hard. That’s why money-laundering in fact exists: Criminals are taking advantage of inefficiencies in the dollar to hide their profits and thus not get caught.

But with bitcoins as they currently exist, it is a snap to keep people compliant. Once some simple baseline limitations are imposed on users of bitcoins—such as the rules implemented by exchanges so as to comply with money-laundering laws—a user’s transactions are as transparent as glass. 

Which is what a government would want, in order to get every bit of tax revenue it wants. Which is what a bank would want, in order to properly gauge the risk of a loan it is extending, and thereby maximize its profits. 

Not only that, being able to track people’s spending completely, in real time, as can be done with bitcoin and conceivably every cryptocurrency, the government could easily rescind someone’s ability to earn money. 

Witness how the government shut off WikiLeaks’ source of funding—took them less than a week. WikiLeaks depended exclusively on donations made via credit card payments—so by “encouraging” the credit card companies, Visa and Mastercard, to refuse to process donations to the organization, the U.S. government shut down Wikileaks just days after the first big document leaks of 2010. 

With bitcoin or some similar cryptocurrency, the government wouldn’t even need to take the step of contacting credi card companies to “encourage them to do the right thing”: The government could simply make any payment to a targeted group invalid. (And perhaps get a notice of whoever it was who donated to the targeted group?)

All this is to say, bitcoins and other cryptocurrencies are potentially a great step forward for a government looking to impose a Panopticon society on the American people. We can’t travel without TSA’s approval, so why not extend that power to people’s ability to interact in the economy as well? Due to the fact that, with bitcoins, there is a trail from people to their bitcoin wallet to their bitcoin usage, a trail that is relatively easy to read, the government could have this power over each and every citizen—the power to monitor and control our interactions with the economy. 

Which is why bitcoin—far from being a threat—might just prove to be the fully-compliant currency the U.S. government can come to love. A currency that will let it have unfettered access to each and every financial transaction you carry out. 

Is that something that we as a people want? More power to the government? Because that’s the promise of bitcoin.

 

via Gonzalo Lira

Researchers Finally Show How Mindfulness and Your Thoughts Can Induce Specific Molecular Changes To Your Genes

Researchers Finally Show How Mindfulness and Your Thoughts Can Induce Specific Molecular Changes To Your Genes

cosmic-brain-dna-genesWith evidence growing that training the mind or inducing specific modes of consciousness can have beneficial health effects, scientists have sought to understand how these practices physically affect the body. A new study by researchers in Wisconsin, Spain, and France reports the first evidence of specific molecular changes in the body following a period of intensive mindfulness practice. The study investigated the effects of a day of intensive mindfulness practice in a group of experienced meditators, compared to a group of untrained control subjects who engaged in quiet non-meditative activities. After eight hours of mindfulness practice, the meditators showed a range of genetic and molecular differences, including altered levels of gene-regulating machinery and reduced levels of pro-inflammatory genes, which in turn correlated with faster physical recovery from a stressful situation. “To the best of our knowledge, this is the first paper that shows rapid alterations in gene expression within subjects associated with mindfulness meditation practice,” says study author Richard J. Davidson, founder of the Center for Investigating Healthy Minds and the William James and Vilas Professor of Psychology and Psychiatry at the University of Wisconsin-Madison. “Most interestingly, the changes were observed in genes that are the current targets of anti-inflammatory and analgesic drugs,” says Perla Kaliman, first author of the article and a researcher at the Institute of Biomedical Research of Barcelona, Spain (IIBB-CSIC-IDIBAPS), where the molecular analyses were conducted.

The study was published in the Journal Psychoneuroendocrinology.

Mindfulness-based trainings have shown beneficial effects on inflammatory disorders in prior clinical studies and are endorsed by the American Heart Association as a preventative intervention. The new results provide a possible biological mechanism for therapeutic effects.

Gene Activity Can Change According To Perception 

According to Dr. Bruce Lipton, gene activity can change on a daily basis. If the perception in your mind is reflected in the chemistry of your body, and if your nervous system reads and interprets the environment and then controls the blood’s chemistry, then you can literally change the fate of your cells by altering your thoughts.

In fact, Dr. Lipton’s research illustrates that by changing your perception, your mind can alter the activity of your genes and create over thirty thousand variations of products from each gene. He gives more detail by saying that the gene programs are contained within the nucleus of the cell, and you can rewrite those genetic programs through changing your blood chemistry.

In the simplest terms, this means that we need to change the way we think if we are to heal cancer. “The function of the mind is to create coherence between our beliefs and the reality we experience,” Dr. Lipton said. “What that means is that your mind will adjust the body’s biology and behavior to fit with your beliefs. If you’ve been told you’ll die in six months and your mind believes it, you most likely will die in six months. That’s called the nocebo effect, the result of a negative thought, which is the opposite of the placebo effect, where healing is mediated by a positive thought.”cosmic-neurons

That dynamic points to a three-party system: there’s the part of you that swears it doesn’t want to die (the conscious mind), trumped by the part that believes you will (the doctor’s prognosis mediated by the subconscious mind), which then throws into gear the chemical reaction (mediated by the brain’s chemistry) to make sure the body conforms to the dominant belief. (Neuroscience has recognized that the subconscious controls 95 percent of our lives.)

Now what about the part that doesn’t want to die–the conscious mind? Isn’t it impacting the body’s chemistry as well? Dr. Lipton said that it comes down to how the subconscious mind, which contains our deepest beliefs, has been programmed. It is these beliefs that ultimately cast the deciding vote.

“It’s a complex situation,” said Dr. Lipton. People have been programmed to believe that they’re victims and that they have no control. We’re programmed from the start with our mother and father’s beliefs. So, for instance, when we got sick, we were told by our parents that we had to go to the doctor because the doctor is the authority concerning our health. We all got the message throughout childhood that doctors were the authority on health and that we were victims of bodily forces beyond our ability to control. The joke, however, is that people often get better while on the way to the doctor. That’s when the innate ability for self-healing kicks in, another example of the placebo effect.

Mindfulness Practice Specifically Affects Regulatory Pathways

The results of Davidson’s study show a down-regulation of genes that have been implicated in inflammation. The affected genes include the pro-inflammatory genes RIPK2 and COX2 as well as several histone deacetylase (HDAC) genes, which regulate the activity of other genes epigenetically by removing a type of chemical tag. What’s more, the extent to which some of those genes were downregulated was associated with faster cortisol recovery to a social stress test involving an impromptu speech and tasks requiring mental calculations performed in front of an audience and video camera.

Biologists have suspected for years that some kind of epigenetic inheritance occurs at the cellular level. The different kinds of cells in our bodies provide an example. Skin cells and brain cells have different forms and functions, despite having exactly the same DNA. There must be mechanisms–other than DNA–that make sure skin cells stay skin cells when they divide.

Perhaps surprisingly, the researchers say, there was no difference in the tested genes between the two groups of people at the start of the study. The observed effects were seen only in the meditators following mindfulness practice. In addition, several other DNA-modifying genes showed no differences between groups, suggesting that the mindfulness practice specifically affected certain regulatory pathways.

The key result is that meditators experienced genetic changes following mindfulness practice that were not seen in the non-meditating group after other quiet activities — an outcome providing proof of principle that mindfulness practice can lead to epigenetic alterations of the genome.

Previous studies in rodents and in people have shown dynamic epigenetic responses to physical stimuli such as stress, diet, or exercise within just a few hours.

“Our genes are quite dynamic in their expression and these results suggest that the calmness of our mind can actually have a potential influence on their expression,” Davidson says.

“The regulation of HDACs and inflammatory pathways may represent some of the mechanisms underlying the therapeutic potential of mindfulness-based interventions,” Kaliman says. “Our findings set the foundation for future studies to further assess meditation strategies for the treatment of chronic inflammatory conditions.”

Subconscious Beliefs Are Key

Too many positive thinkers know that thinking good thoughts–and reciting affirmations for hours on end–doesn’t always bring about the results that feel-good books promise.

Dr. Lipton didn’t argue this point, because positive thoughts come from the conscious mind, while contradictory negative thoughts are usually programmed in the more powerful subconscious mind.

“The major problem is that people are aware of their conscious beliefs and behaviors, but not of subconscious beliefs and behaviors. Most people don’t even acknowledge that their subconscious mind is at play, when the fact is that the subconscious mind is a million times more powerful than the conscious mind and that we operate 95 to 99 percent of our lives from subconscious programs.

“Your subconscious beliefs are working either for you or against you, but the truth is that you are not controlling your life, because your subconscious mind supersedes all conscious control. So when you are trying to heal from a conscious level–citing affirmations and telling yourself you’re healthy–there may be an invisible subconscious program that’s sabotaging you.”

The power of the subconscious mind is elegantly revealed in people expressing multiple personalities. While occupying the mind-set of one personality, the individual may be severely allergic to strawberries. Then, in experiencing the mind-set of another personality, he or she eats them without consequence.

The new science of epigenetics promises that every person on the planet has the opportunity to become who they really are, complete with unimaginable power and the ability to operate from, and go for, the highest possibilities, including healing our bodies and our culture and living in peace.

About the Author

Michael Forrester is a spiritual counselor and is a practicing motivational speaker for corporations in Japan, Canada and the United States.

Sources: wisc.edu brucelipton.com ts-si.org

 
DARPA Hackers Show How Cars Can Be Remotely Controlled

DARPA Hackers Show How Cars Can Be Remotely Controlled

darpa-hacks-car-remote-prius

Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car.

Valasek is the director of security intelligence for IOActive and Miller is a security engineer for Twitter.

These two security researchers showed that they can turn off the breaks, for example, even if the driver is at the helm.

Using a grant from the Defense Advanced Research Projects Agency (DARPA), Miller and Valasek have been researching computerized car vulnerabilities since 2012 and will be displaying their findings at DEF CON, a hacker’s conference in Las Vegas next month.

Miller asserted that they “had full control of braking” and that they “disengaged the brakes so if you were going slow and tried to press the brakes they wouldn’t work. We could turn the headlamps on and off, honk the horn. We had control of many aspects of the automobile.”

• Turn off power to the steering
• Have the onboard GPS give incorrect directions
• Change the numbers on the speedometer
• Force the car to change direction

Miller explained: “At the moment there are people who are in the know, there are nay-sayers who don’t believe it’s important, and there are others saying it’s common knowledge but right now there’s not much data out there. We would love for everyone to start having a discussion about this, and for manufacturers to listen and improve the security of cars.”

Using the vehicle’s electronic control unit (ECU) and the on-board diagnostics port (OBD), Miller and Valasek gained control over a 2010 Ford Escape and Toyota Prius.

ECUs are embedded systems that “controls one or more of the electrical system or subsystems in a motor vehicle.”

The OBD is the “vehicle’s self-diagnostic and reporting” apparatus that “gives the vehicle owner or repair technician access to the status of the various vehicle sub-systems.”

A representative from Toyota explained that the hacker would have to be in the car to manipulate its systems.

He said: “Altered control can only be made when the device is connected. After it is disconnected the car functions normally. We don’t consider that to be ‘hacking’ in the sense of creating unexpected behavior, because the device must be connected – ie the control system of the car physically altered. The presence of a laptop or other device connected to the OBD [on board diagnostics] II port would be apparent.”

Hacking into cars that are remotely controlled, such as Google’s self-driving vehicles, is a concern and this researcher could uncover implications for security purposes.

In 2010, teams from the University of Washington (UW) and the University of California (UC) were able to breach the computer systems of cars using cellular phone connections, Bluetooth headsets and a CD.

Stefan Savage from UC explained that their research “explores how hard it is to compromise a car’s computers without having any direct physical access to the car.”

Computerized cars “contain cellular connections and Bluetooth wireless technology” that could be tapped into remotely and used to take over the controls of the vehicle, listen into the conversations taking place in the cab of the car and completely compromise the safety of the vehicle.

Because computer connections to cars are virtually indistinguishable from internet-connected computers, their propensity toward vulnerabilities from outside influences are similar.

Using an On-Star navigation unit, a hacker could utilize the controls a remote technician at the GPS corporation’s on-call center because they are fully capable of controlling a vehicle in the event of an accident or call from a customer.

With complete disregard for driver privacy, the Obama administration gave their consent to the National Highway Traffic Safety Administration (NHTSA) to mandate black box event data recorders (EDR) be installed in all new cars in the US.

The NHTSA says that by September 2014 all car and light trucks will be equipped with EDRs that will silently “record the actions of drivers and the responses of their vehicles in a continuous information loop.”

The information recorded by EDRs includes:

• vehicle speed
• whether the brake was activated in the moments before a crash
• crash forces at the moment of impact
• information about the state of the engine throttle
• air bag deployment timing and air bag readiness prior to the crash
• whether the vehicle occupant’s seat belt was buckled

The NHTSA claims that “EDRs do not collect any personal identifying information or record conversations and do not run continuously.”

Advanced EDRs can collect detailed information about drivers and their driving habits; including the size and weight of the driver, the seat position, the habits of the driver as well as passengers.

The excuse is the EDRs gather information about car crashes in the moments leading up to the accident that manufacturers can use to improve their safety measures when constructing vehicles. However, the government regulation utilizes surveillance technology with policies that do not outline the expressed use of the data collected in the EDRs.

Read More here.

SEAL Team 6 Families Force Congress To Investigate Mysterious Chopper Crash

SEAL Team 6 Families Force Congress To Investigate Mysterious Chopper Crash

seal-team-6-familiesLed by firebrand Rep. Jason Chaffetz (R-Utah), Congress is to launch an official investigation into the mysterious helicopter crash that killed several members of the Navy SEAL team 6 in Afghanistan in 2011.

Back in May, the families of the SEALs went public with concerns that the Obama administration was at least partially responsible for the deaths of their sons.

The family members say that they still have not received satisfactory answers to their questions, and that there are still many inconsistencies and contradictions in the explanations they have been provided.

“We’re going to dive into this.” said Chaffetz, who is acting in his position as chairman of the House Oversight and Government Reform subcommittee on National Security.

30 Americans were killed in the crash on August 6, 2011 when insurgents shot down a U.S. military helicopter during fighting in eastern Afghanistan, making it the largest loss of life in a single incident for the U.S. military during the war. 22 of the victims belonged to the same unit as the Navy SEALS involved in the purported Osama Bin Laden operation, just three months earlier.

US military officials have maintained that none of the individuals involved directly in the Bin Laden mission were killed in the crash. However, sources have claimed that there were at least two SEALs who died on the chopper who had been involved in the Bin Laden raid.

Some of the families feel that the Obama administration’s handling of the death of Bin Laden made retaliatory attacks against SEAL Team 6 more likely. Family members have also expressed concerns that SEALS were sent into battle “without special operations aviation and proper air support.”

Chaffetz has said that he is preparing to send questions to the Pentagon and may hold congressional hearings on the issue. He noted that the families deserve answers: “That’s why you do an investigation. I want to be as factual as I can.” he said.

Larry Klayman of Freedom Watch, who is representing some of the families told reporters “This is a scandal even greater than Benghazi.”

“There we lost four valued American lives; here we sacrificed 30 American soldiers. The big question is were these brave Americans sold out by the Afghani government as payment to the Taliban for the death of bin Laden?” Klayman added.

Klayman’s questions stem from the fact that Afghani forces accompanying the Navy SEAL servicemen on the helicopter were most likely not properly vetted, meaning that they may have disclosed classified information to the Taliban about the mission, resulting in the shoot down of the helicopter.

Pentagon documents have confirmed that immediately prior to the take off of the helicopter, seven Afghan commandos who were listed on the passenger itinerary were mysteriously replaced by other Afghan military officials.

Defense officials have confirmed that all seven names of the Afghan soldiers on the passenger list did not tally with those on board when the chopper took to the air.

The families of the SEALs have noted that their sons did not have trust in Afghan soldiers, with one quoted as saying, “They are loyal to the highest bidder.”

Charlie Strange, the father of one of the killed SEALs also pointed out “There was no eye in the sky tracking [the Chinook]. Why not?”

In addition, pre-assault fire was requested by the team, but was denied by military officials on the ground.

“My son Michael died,” Strange said. “I want to know, who made these calls?”

The Pentagon probe into the shoot down denies that the incident was an “established ambush,” instead claiming that “it was a lucky shot of a low-level fighter that happened to be living [in the area]. He heard all the activity and he happened to be in the right spot.”

Families have countered those suggestions by pointing out that leading militants took to the internet in the immediate aftermath of the attack, to boast that they had successfully ambushed SEAL Team 6.

The Pentagon has also claimed that, despite recovering all the bodies of those killed, the helicopter’s black box was washed away in a flash flood.

The Pentagon told the families that all the bodies were cremated due to the fact that they were badly burned in the crash. However, pictures have emerged that show some deceased SEALs without bad burns.

“The body I saw didn’t need to be cremated,” Rep. Chaffetz said, also noting that the DoD’s explanation regarding the helicopter’s black box is “awfully odd.”

Perhaps even more controversially, family members have also provided evidence that suggests a Muslim cleric attended the funerals of the service members and disparaged them by “damning them as infidels to Allah” during an Islamic prayer.

Refusing to answer specific questions, a DoD spokesperson stated “the operational planning and execution of this mission was consistent with previous missions” and “was thoroughly investigated … we share in the grief of all of the families who lost their loved ones. The loss of 38 U.S. and Afghan military personnel was a tragic loss during a difficult campaign.”

Read More.

Mark Ferri

Mark Ferri

Mark-FerriA renowned American engineer was found dead in his hotel room in Salford after his heart suddenly stopped working. Mark Ferri, 59, from Tennessee, had completed two degrees in engineering as well as an MBA before becoming a nuclear engineer. At an inquest into Mr. Ferri’s death at Bolton Crown Court, it was heard that the dad-of-one was visiting Manchester on business on September 18, the day of his death. It was said Mr. Ferri had been under stress from his job. His wife, Michaela, told the inquest, “He said a number of times, this job is killing me.”.  Mr. Ferri was originally due to return to the US a week earlier to see his family but was asked to remain in the UK for an extra week. On September 5, Mrs. Ferri spoke to her husband and, “he didn’t sound right”. She said, “He said it was just his work and they were giving him additional assignments and he was feeling overwhelmed and he didn’t think he would be able to complete them”.

Information Technology – Higher Education… or?

Information Technology – Higher Education… or?

higher-education-fraud

Information security, especially at schools that provide training on the subject, in for-profit higher education should not be a premium. It would make a really great story to send an “undercover” technician to DeVry and Rasmussen campuses to observe their incredible service delivery.

Rasmussen’s portal has long had a SQL injection vulnerability that has been published on the internet several times. It still remains uncorrected.

Rasmussen College and DeVry Institute of Technology are both HLC accredited schools with for-profit business models. Both schools often claim, “the same accreditation as Harvard” and other quality Universities. Surprisingly, the two institutions have a lot more in common. From sharing questionable leadership to providing questionable placement practices for students and even extremely questionable security policies, these institutions are the embodiment of the flaws of American education.

The curriculum, and curriculum for partner schools as mentioned later, is created by individuals that rarely have any current knowledge in the subjects. Course material is often incorrect or misunderstood by the instructors. The policy of both institutions require instructors with Masters Degrees, but because they do not invest in qualified candidates they will allow, for example, an individual with a Masters Degree in Business to teach OpenGL Programming based on course material created by an individual with no programming experience.

Rasmussen and DeVry not only share the same accreditation, but the sponsorship was provided with the same seed money. The two institutions share employees, transferring their employees back and forth. One such employee is Todd Pombert, a newly appointed Vice President of Infrastructure and Technology for Rasmussen College. Having very little professional experience when compared to individuals at similar roles, it was insisted Todd be given this role by Gerald Gagliardi. Gerald Gagliardi is on the board of directors for businesses like NetWolves and Rasmussen College itself. A shrewd investor from Boca Raton, Mr. Gagliardi is shrewd investor that has used his resources to create successful people and businesses as he decides. There is no altruism here.

Rasmussen College, Inc. itself, along with it’s sister company Deltak Innovation which is now owned by John Wiley & Sons in an attempt to break into online courseware, is reorganizing. Rasmussen Collge will be its own entity with I.T. services provided by Collegis Managed Services. These are the same employees but now with a different title. Services provided include lead generation, hosting online courses with the Angel, Blackboard and Moodle LMS systems; retaining student data and more. Customers of Collegis include Purdue University, University of Florida, Gonzaga, Benedictine, Lubbock, Anna Maria College and more – if a school’s online URL includes learntoday.info it is a Rasmussen (now Collegis) resource. Similarly, if the URL begins with “engage” then it is most likely a Collegis resource. These schools are outsourcing to Collegis hosting some of their online courses. There are no operational controls, no security officer and no practice in providing even the smallest amount of protection for the data these schools have hosted with Collegis. In particular, many colleges are Jesuit schools that are preyed upon for their association to other Jesuit colleges.

In the case of Todd Pombert this individual was promoted to a very senior role with no practical or noticeable work experience that should be required for a leader in an industry requiring critical care in student information security. A drop-out from his Master’s Degree, this individual maintains this position only because of the multi-level-marketing that DeVry and Rasmussen consider as qualifications for employment. There is no Security Officer for Rasmussen College. There is no reputable third party providing those services. Todd Pombert does not have the qualifications to adhere to industry practices that provide protection, confidentiality and integrity to managed services exposing flaws to their customers. Worse, an educational institution cannot provide and does not insist on the training required to keep students of Rasmussen and its partners safe. The lack of knowledge is so blatant that Todd Pombert keeps an archive of every email he received at DeVry to use as reference at Rasmussen. From confidential information, business plans, document templates and even financial data, much of DeVry’s history and future decisions are recorded unsecured on a “competitor” owned laptop with no disk encryption.

The school has all of the students in the same domain as contractors, faculty, staff and the board of directors. Not only does this create conflicts, but it allows any domain user (ie: student, contractor, etc) to browse the domain for information about any other user. Students are free to attempt to brute force Executive passwords giving them access to unencrypted financial information of other students and more. The network services between campus and the datacenter is the same class A network – you can reach the Chicago based datacenter from a school in Fargo from any ethernet jack. There are no standard, practical security mechanisms in place to prevent such a thing.

Students are forced to use a password convention that they often can’t change – firstname.lastname password: fl1234. This 6 character password utilizes the last four digits of the student’s social security number. None of the websites have any protection from common brute force attacks. If you know the name of a student (Joe Smith) then you know 1/3 of his password (jsXXXX) and it is trivial to use the portal, online courses or other services to continually guess 0000-9999. This exposes the student to possible fraud from someone acquiring their personal identifying information as well as allows an intruder to view the student’s grades, financial data email to the student with the same password and any academic work the student has previously submitted.

Staff manage students through a public RDP system at class.learntoday.info. There is no password policy assigned. Staff are free to use passwords including their own names and more. If an intruder gains access to the RDP system all student financial data is stored unencrypted on a Windows file share.

The wireless network for Rasmussen is WEP. WEP is a long outdated mechanism for securing a wireless network. Modern approaches to attacking WEP networks can allow an intruder to gain access within minutes. Again, financial data for students and the school itself are not encrypted in-place or in-flight. An attacker is able to gain access to any information just by being near a campus or corporate site.

There is no NAP, no RADIUS no 802.1X. The networks are completely unprotected. Coincidentally, both schools teach courses that promote the use of tools capable of easily harvesting corporate, student and financial data like Wireshark and Snort.

Even basic controls have been neglected. The printers and copiers throughout all sites run default settings with no authentication and the web interface enabled. Anyone can request a re-print of jobs including social security numbers or financial data.

The employee portal itself did not follow practical standards and did not have SSL protecting employee information from being broadcast in plain text. That includes the passwords of financial aid employees as well as C-level visitors to local campuses.

These points above may not even be considered the most critical flaws in the service provided. The practices of Rasmussen and DeVry are a blight on Higher Education as a whole. Their practices should be considered, and some are outright, criminally negligent.

Rasmussen and DeVry continue to pay their questionable leadership large amounts of money. This is a clear misappropriation. If even a fraction of Todd Pombert’s salary was spent on security reviews, operational controls or educating Todd Pombert then these schools would not be risking disastrous consequences for their students and students of large, responsible institutions like Purdue and the University of Florida.

For Rasmussen (Collegis) hosted instances of online platforms nearly all of the content has the same ACL. There is nothing protecting content from one school from being used in another school’s offering or worse – being copied by an intruder.

Finally, to add insult to injury, while these schools are raking in student tuition to pay higher amounts of money to irresponsible leadership, they are placing students with Bachelor’s degrees as minimum wage Gamestop clerks. They claim this to be “in-field” placement for Information Technology students. The subject of ballooning student loans is covered in-depth lately and there is no need to remind you that these students will never be able to pay their debt for an education they received at profit for individuals just as qualified as graduates.

-Anonymous Email Submission-

The Secret Meeting that Changed Rap Music and Destroyed a Generation

The Secret Meeting that Changed Rap Music and Destroyed a Generation

Rap Music Industry Control & Planning

Below is a letter claimed to be written by a former music executive who says he witnessed a secret meeting in 1991 where the prison industrial complex encouraged the music industry to promote rap artists who glorify crime with the goal of encouraging listeners to get locked up in prison, so the private prisons could make more money.  It’s a very interesting read, but unless others come forward and confirm his story, there is no way to verify whether or not this meeting took place.  This letter first surfaced on HipHopisRead.com after the admin claims he received it in his email anonymously on April 24, 2012.   The spelling and grammatical errors have been left as they were in the original and have not been corrected. This ‘Dot’ Connects to Others, namely Prisons – for – Profit, Police Militarization, and plans for Martial Law by way of Racial Divide.  All of which we’ve documented for some time.  The buttons below will auto-search those keywords.

PrisonsPolice

THE ANONYMOUS LETTER

Hello,

After more than 20 years, I’ve finally decided to tell the world what I witnessed in 1991, which I believe was one of the biggest turning point in popular music, and ultimately American society. I have struggled for a long time weighing the pros and cons of making this story public as I was reluctant to implicate the individuals who were present that day. So I’ve simply decided to leave out names and all the details that may risk my personal well being and that of those who were, like me, dragged into something they weren’t ready for.

Between the late 80’s and early 90’s, I was what you may call a “decision maker” with one of the more established company in the music industry. I came from Europe in the early 80’s and quickly established myself in the business. The industry was different back then. Since technology and media weren’t accessible to people like they are today, the industry had more control over the public and had the means to influence them anyway it wanted. This may explain why in early 1991, I was invited to attend a closed door meeting with a small group of music business insiders to discuss rap music’s new direction. Little did I know that we would be asked to participate in one of the most unethical and destructive business practice I’ve ever seen.

The meeting was held at a private residence on the outskirts of Los Angeles. I remember about 25 to 30 people being there, most of them familiar faces. Speaking to those I knew, we joked about the theme of the meeting as many of us did not care for rap music and failed to see the purpose of being invited to a private gathering to discuss its future. Among the attendees was a small group of unfamiliar faces who stayed to themselves and made no attempt to socialize beyond their circle. Based on their behavior and formal appearances, they didn’t seem to be in our industry. Our casual chatter was interrupted when we were asked to sign a confidentiality agreement preventing us from publicly discussing the information presented during the meeting. Needless to say, this intrigued and in some cases disturbed many of us. The agreement was only a page long but very clear on the matter and consequences which stated that violating the terms would result in job termination. We asked several people what this meeting was about and the reason for such secrecy but couldn’t find anyone who had answers for us. A few people refused to sign and walked out. No one stopped them. I was tempted to follow but curiosity got the best of me. A man who was part of the “unfamiliar” group collected the agreements from us.

Quickly after the meeting began, one of my industry colleagues (who shall remain nameless like everyone else) thanked us for attending. He then gave the floor to a man who only introduced himself by first name and gave no further details about his personal background. I think he was the owner of the residence but it was never confirmed. He briefly praised all of us for the success we had achieved in our industry and congratulated us for being selected as part of this small group of “decision makers”. At this point I begin to feel slightly uncomfortable at the strangeness of this gathering. The subject quickly changed as the speaker went on to tell us that the respective companies we represented had invested in a very profitable industry which could become even more rewarding with our active involvement. He explained that the companies we work for had invested millions into the building of privately owned prisons and that our positions of influence in the music industry would actually impact the profitability of these investments. I remember many of us in the group immediately looking at each other in confusion. At the time, I didn’t know what a private prison was but I wasn’t the only one. Sure enough, someone asked what these prisons were and what any of this had to do with us. We were told that these prisons were built by privately owned companies who received funding from the government based on the number of inmates. The more inmates, the more money the government would pay these prisons. It was also made clear to us that since these prisons are privately owned, as they become publicly traded, we’d be able to buy shares. Most of us were taken back by this. Again, a couple of people asked what this had to do with us. At this point, my industry colleague who had first opened the meeting took the floor again and answered our questions. He told us that since our employers had become silent investors in this prison business, it was now in their interest to make sure that these prisons remained filled. Our job would be to help make this happen by marketing music which promotes criminal behavior, rap being the music of choice. He assured us that this would be a great situation for us because rap music was becoming an increasingly profitable market for our companies, and as employee, we’d also be able to buy personal stocks in these prisons. Immediately, silence came over the room. You could have heard a pin drop. I remember looking around to make sure I wasn’t dreaming and saw half of the people with dropped jaws. My daze was interrupted when someone shouted, “Is this a f****** joke?” At this point things became chaotic. Two of the men who were part of the “unfamiliar” group grabbed the man who shouted out and attempted to remove him from the house. A few of us, myself included, tried to intervene. One of them pulled out a gun and we all backed off. They separated us from the crowd and all four of us were escorted outside. My industry colleague who had opened the meeting earlier hurried out to meet us and reminded us that we had signed agreement and would suffer the consequences of speaking about this publicly or even with those who attended the meeting. I asked him why he was involved with something this corrupt and he replied that it was bigger than the music business and nothing we’d want to challenge without risking consequences. We all protested and as he walked back into the house I remember word for word the last thing he said, “It’s out of my hands now. Remember you signed an agreement.” He then closed the door behind him. The men rushed us to our cars and actually watched until we drove off.

A million things were going through my mind as I drove away and I eventually decided to pull over and park on a side street in order to collect my thoughts. I replayed everything in my mind repeatedly and it all seemed very surreal to me. I was angry with myself for not having taken a more active role in questioning what had been presented to us. I’d like to believe the shock of it all is what suspended my better nature. After what seemed like an eternity, I was able to calm myself enough to make it home. I didn’t talk or call anyone that night. The next day back at the office, I was visibly out of it but blamed it on being under the weather. No one else in my department had been invited to the meeting and I felt a sense of guilt for not being able to share what I had witnessed. I thought about contacting the 3 others who wear kicked out of the house but I didn’t remember their names and thought that tracking them down would probably bring unwanted attention. I considered speaking out publicly at the risk of losing my job but I realized I’d probably be jeopardizing more than my job and I wasn’t willing to risk anything happening to my family. I thought about those men with guns and wondered who they were? I had been told that this was bigger than the music business and all I could do was let my imagination run free. There were no answers and no one to talk to. I tried to do a little bit of research on private prisons but didn’t uncover anything about the music business’ involvement. However, the information I did find confirmed how dangerous this prison business really was. Days turned into weeks and weeks into months. Eventually, it was as if the meeting had never taken place. It all seemed surreal. I became more reclusive and stopped going to any industry events unless professionally obligated to do so. On two occasions, I found myself attending the same function as my former colleague. Both times, our eyes met but nothing more was exchanged.

As the months passed, rap music had definitely changed direction. I was never a fan of it but even I could tell the difference. Rap acts that talked about politics or harmless fun were quickly fading away as gangster rap started dominating the airwaves. Only a few months had passed since the meeting but I suspect that the ideas presented that day had been successfully implemented. It was as if the order has been given to all major label executives. The music was climbing the charts and most companies when more than happy to capitalize on it. Each one was churning out their very own gangster rap acts on an assembly line. Everyone bought into it, consumers included. Violence and drug use became a central theme in most rap music. I spoke to a few of my peers in the industry to get their opinions on the new trend but was told repeatedly that it was all about supply and demand. Sadly many of them even expressed that the music reinforced their prejudice of minorities.

I officially quit the music business in 1993 but my heart had already left months before. I broke ties with the majority of my peers and removed myself from this thing I had once loved. I took some time off, returned to Europe for a few years, settled out of state, and lived a “quiet” life away from the world of entertainment. As the years passed, I managed to keep my secret, fearful of sharing it with the wrong person but also a little ashamed of not having had the balls to blow the whistle. But as rap got worse, my guilt grew. Fortunately, in the late 90’s, having the internet as a resource which wasn’t at my disposal in the early days made it easier for me to investigate what is now labeled the prison industrial complex. Now that I have a greater understanding of how private prisons operate, things make much more sense than they ever have. I see how the criminalization of rap music played a big part in promoting racial stereotypes and misguided so many impressionable young minds into adopting these glorified criminal behaviors which often lead to incarceration. Twenty years of guilt is a heavy load to carry but the least I can do now is to share my story, hoping that fans of rap music realize how they’ve been used for the past 2 decades. Although I plan on remaining anonymous for obvious reasons, my goal now is to get this information out to as many people as possible. Please help me spread the word. Hopefully, others who attended the meeting back in 1991 will be inspired by this and tell their own stories. Most importantly, if only one life has been touched by my story, I pray it makes the weight of my guilt a little more tolerable.

Thank you.

  

KRS One saw the reality of the situation a long time ago. 

He tried to warn us.  How relevant are these lyrics today?

Ask Yourself Why You’ve Never Heard of this OG Truth-Bomb dropper

Now here’s a little truth, open up your eye
While you’re checkin’ out the boom-bap, check the exercise
Take the word overseer, like a sample
Repeat it very quickly in a crew, for example
Overseer, overseer, overseer, overseer
Officer, officer, officer, officer
Yeah, officer from overseer
You need a little clarity? Check the similarity!
The overseer rode around the plantation
The officer is off, patrollin’ all the nation
The overseer could stop you, “What you’re doing?”
The officer will pull you over just when he’s pursuing
The overseer had the right to get ill
And if you fought back, the overseer had the right to kill
The officer has the right to arrest
And if you fight back they put a hole in your chest

 

KRS One – Sound of ‘Da Police

Conscious hip-hop is often confused with its musical cousin, political hip-hop, possibly because they both speak to social turmoil.

A disdain for commercialism is another common thread that weaves the two styles together. Politically charged songs by rappers such as Dead Prez and Public Enemy are usually delivered in a militant fashion.

September 6, 2012: Decrypted Matrix with Max Maverick on Revealing Talk Radio

Prison Industrial Complex Explained: Learn how Corporations are outsourcing & privatizing labor costs to the Prison Industry and how there are massive profits exploding from within this corrupted Incarceration System. Slave Labor Camps, Return of the Debtor Prisons, Products most often created by Prisoners, Recent Wallstreet investments & the Goldman Sachs connection. SERCO, UNICOR, Federal Prison Industries, Inc. and the astronomical nationwide per-capita figures that will make your head spin.

Today, how many words

is a picture really worth?