1. Find something beautiful and appreciate it.
Beauty is all around us, from the morning dew to the evening stars and everything in between. Most go through life not noticing all the beautiful things that are around them, and yes it’s every where, so take the time to notice them, and appreciate them when you see it. Whether it’s the scent of a flower or the way rain ripples in puddles of water, appreciate the beauty life has to offer.
2. Make a list of all that you are grateful for.
Making a gratitude list shifts your vibrations from focusing on what you do not have to what is already abundant in your life. There is more to be grateful for than you could possibly imagine. You can start with “I’m Alive!” and expand from there. Gratitude is the Attitude.
3. Meditate.
Sit in a comfortable position, close your eyes and breath in and out. Too often we rush through our days with a scattered brain leaving us in a state of anxiety and stress, Meditation helps to calm your spirit down and put you in a peaceful state of mind. 10 Minuets of meditation a day can change your life forever.
4. Do something for someone else.
Giving to someone else shifts your thinking from “I don’t have enough, to I have more than enough to give to others.” Abundance is a high vibration.
5. Stop complaining and gossiping.
Complaining and Gossip puts you in a very low vibration. Ask yourself “Are the things you are talking about bringing you more of what you want?” if not then, Stop complaining, and start finding ways to rejoice.
6. Move. Exercise. Get active.
Vibration requires movement, the more you move the better your vibrations move. So Get Active! Dance! The happier you feel, the more you will draw happy experiences to yourself because you are operating at a different frequency.
7. Realize that you have more control over your life than you thought.
You are not a victim to circumstance, past, family upbringing, trauma, or anything else. You can change your life in an instant. Just realize this. In many wisdom traditions this is called “total responsibility.” No one is responsible for how you feel right now but you. It isn’t a curse. It’s a blessing because it gives you your power back.
8. Breathe.
Just sit and try to make your breath longer, fuller, and more relaxed. It has a direct affect on your nervous system and helps to calm you down. A calm vibration is a high vibration.
9. Do Something You’re Afraid Of
Fear holds us back from being in a state of love and happiness, and facing those fears opens you up to a greater world of possibilities. Fear of Heights? Go skydiving. Scared of public speaking, say a poem at an open mic. You’ll begin to realize your fear was worse then the actual problem, and a sense of relief will wash over you.
10. Have a Meaningful Conversation with a Friend
Rather than gossip or complaining, talk about you ideas. What do you have planned for yourself? what do you think is the nature of reality? Are we spiritual beings having a human experience? Talking about these things with someone helps to raise both your vibrations by thinking big. If you don’t have someone to talk to about these kinds of things with, there’s a community of higher minded individuals right here. Leave a comment down below and let’s chat!
As part of his promises regarding better oversight of the National Security Agency, President Obama called for expert external opinion on where the lines of privacy should be drawn:
Fourth, we’re forming a high-level group of outside experts to review our entire intelligence and communications technologies. We need new thinking for a new era. We now have to unravel terrorist plots by finding a needle in the haystack of global telecommunications. And meanwhile, technology has given governments — including our own — unprecedented capability to monitor communications. – President Obama.
And yet, no. Obama’s panel is not a set of outsiders in the slightest. As some have pointed out in recent days, the group is instead a slurry of insiders, former insiders, and a previous colleague of the president’s.
Member Michael Morell is from the CIA, Richard Clarke is former national security, Cass Sunstein is ex-Obama White House, Peter Swire was part of the Clinton administration, and Geoffrey Stone is also University Chicago stock, same as the president.
Stone, at a minimum, is part of the ACLU, and thus might have a bit of a backbone on the privacy side of things. But the group is surprisingly un-outsidery, and hardly undogmatic. This has not gone unnoticed. However, something that fewer have noticed is that the group contains no technology or telecom folk.
This is almost comical, as we are arguing over digital and telephonic surveillance. PRISM, tapping of fiber-optic cables, storing the nation’s phone records, and forcing telcos to send huge swatches of the Internet to the NSA, and yet not a single voice from the industries impacted will take part.
In the age of cynicism, this must be a high point.
The group is in fact a good mix of people from the establishment who have perspectives on security, but it is utterly incomplete. To exclude from the conversation companies that are directly impacted by the NSA — bullied is probably a better word — is to silence possible dissent. And that is the opposite of open, or fair.
Not that in this discussion there has been much proffered openness of fairness, but when the president assembles a panel of “outsiders” to examine current policy, one could hope for a bit of each. In the assembled group, those in favor of curtailing the NSA’s surveillance activities couldn’t win a voice vote. That’s not so good, really.
If we are going to legally force tech and telco firms to hand over private information of regular folks, they deserve a hand in the discussion. Unless, naturally, the meetings are a sham in the hopes of quieting public outrage and dissent. In that case, a few former insiders can be tossed together for a chat that will mean little and accomplish less. Which appears to be the case.
At each stage of the NSA revelation saga, the government has obfuscuated or offered little. This is another example of the latter.
Throughout history, one of the ways in which the human spirit has overcome or dealt with the brutish forces of authoritarian regimes has been through the use of humor. As such, it is no surprise that clever Americans from sea to shining sea have figured out ways to mock the NSA while also making a dollar or two. One of these folks is Dan McCall, founder of politically themed T-shirt company Liberty Maniacs. Several days after the spy scandal erupted, Dan created a shirt that read NSA: The only part of the government that actually listens. See below:
Pretty hilarious right? Well, the NSA didn’t find it particularly funny and, in fact, according to the Daily Dot this is what happened:
“Within an hour or two,” as McCall told the Daily Dot, Zazzle emailed him to say the shirt had been removed from the Zazzle site. (Zazzle didn’t respond to the Daily Dot’s request for comment, nor did the NSA.
Zazzle’s first email, which McCall forwarded to the Daily Dot, said in part:
Unfortunately, it appears that your product, The NSA, contains content that is in conflict with one or more of our acceptable content guidelines.
We will be removing this product from the Zazzle Marketplace shortly. …
Result: Not Approved
Policy Notes: Design contains an image or text that may infringe on intellectual property rights. We have been contacted by the intellectual property right holder and we will be removing your product from Zazzle’s Marketplace due to infringement claims.
McCall, who says he’d worked with Zazzle for five years, asked for an explanation, but when the company responded June 11, the distributor didn’t share much more:
Unfortunately, it appears that your product, ” the nsa”, does not meet Zazzle Acceptable Content Guidelines. Specifically, your product contained content which infringes upon the intellectual property rights of National Security Agency.
We have been contacted by legal representatives from the National Security Agency, and at their request, have removed the product from the Zazzle Marketplace.
The NSA: Protecting Americans from terrorists, nuclear war and funny t-shirts since 1952.
As the hearing continues, our ace photographer Melina Mara reports she spotted Sen. John McCain (R-Ariz.) “passing the time by playing poker on his iPhone during the hearing.”
We eagerly await the photographic proof, but generally trust Melina’s sharp eye.
Update 5:55 p.m.: And here’s the proof:
Update 6:38 p.m.: After the photo made the rounds on Twitter, McCain tweeted the following in response:
Anne Szarewski, 53, pioneered the cervical cancer vaccine.
Mystery: Doctors are still at a loss to explain Dr Anne Szarewski’s death in her Hampstead home in August. Doctors are still at a loss to explain what exactly caused the brilliant researchers death. She was found with high levels of an anti-malarial drug in her bloodstream, but doctors said this was not thought to have caused her death. The scientist who pioneered the cervical cancer vaccine was found dead by her husband at their $2 million home after he warned she was “heading for a crisis” by working too hard. Dr Anne Szarewski, 53, a university lecturer whose discovery has saved thousands of lives, was begged to slow down by her husband, who was becoming increasingly concerned about the pressure she was putting on herself. In August he found her dead in their four-bedroom home in West Hampstead, north London, after he spent two hours drilling through a door she had locked from the inside. Dr. Szarewski is credited with discovering the link between the human papillomavirus and cervical cancer, leading to a vaccine for HPV, the first-ever vaccine against any form of cancer, which is now routinely given to girls across the country.
In 2008, the National Security Agency illicitly—if accidentally—intercepted a “large number” of phone calls from Washington, D.C. because an error confused Egypt’s country code—“20”—with, yes, “202.”
That fact, one of many startling ones from Barton Gellman’s new blockbuster Washington Post story based on documents given to him by Edward Snowden, is so catchy and memorable that I almost worry about it. That is, I worry people will just think of that and fail to grasp that this was actually one of the more anodyne NSA abuses revealed by these newly disclosed top-secret documents, including an internal audit. In fact, in the year preceding the May 2012 audit, there were 2,776 violations (another eye-grabber, suggestively alike the totemic 1,776).
I think more troubling is that the NSA deliberately fed international communications (which it is permitted to monitor in certain ways) through U.S. fiber-optic cables, commingling those kosher foreign emails with domestic ones—which the secret Foreign Intelligence Surveillance Court (or FISC, and it is generally a rubber stamp) ruled unconstitutional.
I also think more troubling is that last year, the NSA retained more than 3,000 files of telephone call records in defiance of an FISC order (!). How many calls involving how many people were on each file is unknown, by the way.
I think it is pretty messed up that all of this information solely concerns violations that occurred at the NSA’s headquarters in Maryland. “Three government officials, speaking on the condition of anonymity to discuss classified matters, said the number [of violations] would be substantially higher if it included other NSA operating units and regional collection centers,” Gellman reports.
Here’s the audit, for those not faint of heart or jargon (an appendix is provided).
There is a valuable, vital debate to be had over how much the federal government, in its intelligence programs, ought to be permitted to violate Americans’ privacy in an effort to protect Americans from a dangerous world that includes people who want to kill Americans. There are many different places where the important red lines can be drawn in this debate. It is a debate strewn with well-intentioned, conscientious people who would draw those lines at very different places. Let’s even be generous and stipulate that the question of whether the statutorily provided oversight of these programs is sufficient belongs, as well, to that debate.
The terrifying thing is that we are not having that debate. As these documents are the latest things to demonstrate, the various overseers as well as the public do not have access to the information that even the current rules assert they should have. That is how I can state with certainty that we are not having that vital debate: We do not have the means to have that debate with any kind of authority; therefore, no matter how much we discuss these issues, we are not having that debate.
The most important thing about the Egypt-D.C. confusion isn’t that U.S. calls were collected in violation of rules, for instance. It is that, after this violation was uncovered, it was not reported to oversight staff.
In a separate, in many ways equally important Post article, Carol D. Leonnig reports that FISC’s chief judge is hopelessly dependent on the NSA in order for it to perform its statutorily mandated oversight. “The FISC does not have the capacity to investigate issues of noncompliance,” the judge, Reggie B. Walton, told her, “and in that respect the FISC is in the same position as any other court.” Obama, Leonnig noted, has explicitly held FISC up as assurance that the programs do have strong oversight. But it should be obvious that outside oversight that depends on the purely internal machinations of the thing that is supposed to be overseen is not accountable oversight.
Lawmakers are not blameless. They may access unredacted documents, albeit in a secure room where they lack the ability to take notes. They might theoretically then, even, pull a Mike Gravel and read the results into the record on the House or Senate floor. Gellman reports that “fewer than 10 percent of lawmakers” presently have the ability actually to do this in practice. Sen. Dianne Feinstein, the Senate Intelligence Committee chairwoman, was unaware of the May 2012 audit until she was contacted for the Post story.
But mainly this is on the NSA, which is to say, on the administration. President Obama pledged last Friday to make these surveillance programs “more transparent.” He argued, “It’s not enough for me as president to have confidence in these programs. The American people need to have confidence in them, as well.”
Yet the administration did not disclose, say, the lapses Gellman reported. In fact, the NSA retroactively placed an on-the-record interview with its director of compliance off the record, according to Gellman. It did this after Obama’s speech extolling the importance of and promising transparency. In a sense, we got his wished-for transparency. We can see right through him now.
Wellcome Trust researchers have discovered how the brain assesses confidence in its decisions. The findings explain why some people have better insight into their choices than others.
Throughout life, we’re constantly evaluating our options and making decisions based on the information we have available. How confident we are in those decisions has clear consequences. For example, investment bankers have to be confident that they’re making the right choice when deciding where to put their clients’ money.
Researchers at the Wellcome Trust Centre for Neuroimaging at UCL led by Professor Ray Dolan have pinpointed the specific areas of the brain that interact to compute both the value of the choices we have in front of us and our confidence in those choices, giving us the ability to know what we want.The team used functional magnetic resonance imaging (fMRI) to measure activity in the brains of twenty hungry volunteers while they made choices between food items that they would later eat. To determine the subjective value of the snack options, the participants were asked to indicate how much they would be willing to pay for each snack. Then after making their choice, they were asked to report how confident they were that they had made the right decision and selected the best snack.It has previously been shown that a region at the front of the brain, the ventromedial prefrontal cortex, is important for working out the value of decision options. The new findings reveal that the level of activity in this area is also linked to the level of confidence participants placed on choosing the best option. The study also shows that the interaction between this area of the brain and an adjacent area reflects participants’ ability to access and report their level of confidence in their choices.
Dr Steve Fleming, a Sir Henry Wellcome Postdoctoral Fellow now based at New York University, explains: “We found that people’s confidence varied from decision to decision. While we knew where to look for signals of value computation, it was very interesting to also observe neural signals of confidence in the same brain region.”
Dr Benedetto De Martino, a Sir Henry Wellcome Postdoctoral Fellow at UCL, added: “Overall, we think our results provide an initial account both of how people make choices, and also their insight into the decision process.”
The findings are published online today in the journal Nature Neuroscience.
Reference: B. De Martino et al. Confidence in value-based choice. Nature Neuroscience, 2012. [Epub ahead of print]
The US Patriot Act has suddenly scared an entire nation, and it’s not the US itself this time. The Netherlands is currently going nuts about the US government being able to request medical details of all its citizens when the Dutch Electronic Patient Database (EPD) is implemented next month. This will not be the only country that freaks out because of the Patriot Act, as this sort of thing is likely to happen a lot more often. A recent study explained that US government agencies can secretly request anyone’s data if they are using a cloud-computing service which ‘conducts systematic business in the US’. It is already sufficient when the service provider is somehow a subsidiary of a US company.
That turns out to be a problem in the Netherlands, because the company that has developed the EPD and will be hosting the patients’ data on its cloud computing systems is the US-based CSC. The Dutch government and the organization responsible for implementing the EPD are convinced there is no problem, because there are clear contracts which have assigned Dutch jurisdiction, and fortunately the Dutch have stringent data protection laws that will protect patients’ sensitive data. Because that’s what data protection laws do, right?
False! At least with regard to information law, researchers from Amsterdam University warn that this analysis is way too simplistic. According to the scholars, it is quite possible the US government agencies can circumvent data protection laws and could easily request access to medical information of every single person in the Netherlands. The study doesn’t just cover the Netherlands (though it is especially timely for that), but rather looks at how these risks may apply more globally. Here are just a few of the findings that should raise eyebrows across the globe:
“When using a cloud service provider that is subject to U.S. jurisdiction, data may be requested directly from the company in question in the United States. […] From a legal point of view, access to such information cannot be denied and cloud service providers can give no guarantees in this respect. […] The possibility that foreign governments request information is a risk that cannot be eliminated by contractual guarantees. Nor do Dutch privacy laws offer any safeguards in this respect. […] It is a persistent misconception that U.S. jurisdiction does not apply if the data government requests for information do not apply to Dutch users of the cloud. […] legal protection under specific U.S. laws applies primarily to U.S. citizens and residents. […] Given the nature of intelligence work, it is not possible to gain insight into actual requests for information by the U.S. authorities […] Cloud providers will typically not be able to disclose whether such requests are made”
If the above doesn’t yet lead to a new international outrage against the US Patriot Act, then the following sentence on the extra-territorial effects of the Patriot Act should at least send shivers down the spines of sovereignty-loving non-US government officials:
“The transition to cloud computing will, in principle, result in a lower degree of autonomy […]”
Guilty as charged. It is easy to amass a sizable supply of food in a short period of time. This is especially true if you tend to purchase a little bit extra each time you shop. Before you know it, you have a closet or pantry full of stuff but no clue as to what is inside. In my case, I have some well marked buckets of food but no master list. I know I have 30 pounds of coffee beans – or is it 40? And #10 tins of freeze-dried meats, fruits and veggies? They are packed away in carton boxes and I know I have lots of cartons but just exactly what and how much?
I have been storing food for so long that I can not rely on memory alone to know what I already have and what is still needed. This is my number one mistake and one that I plan to remedy in two ways. First of all, everything new that I purchase will be inventoried right away. This is what I call my going forward plan. Then, as time allows, I will methodically inventory everything else.
The key, of course, is not to co-mingle the old with the new. Sure, I may end up with some duplicates but that is better than being so overwhelmed than to do nothing at all. Your plan may be different given the dynamics of your space and your time. All I can say is that if you are fairly new to prepping, don’t let this one slip by. Keep track of what you have from the get go and save yourself a lot of grief down the road.
2. Identifying the most likely risks and prepping for those first.
When I first started, I went off willy-nilly preparing for all sorts of calamities. Earthquakes, terrorist attacks, pandemics, nuclear melt-downs, civil disobedience – you name it, I tried to prepare for it all. These days, I recommend that one of the very first steps that you take when prepping is to evaluate the most likely risks in your area and within your personal domestic situation.
Most if not all city, county and state governments will have emergency management websites that will help you sort through the most likely disasters to occur in your area. Add to this an assessment of your location. Are you in a city where gangs, mobs or terrorist attacks are likely? Do you live in a remote area where the failure of transportations systems or the lack of fuel will cut off you off from supplies from the rest of the world? Is your employment situation tenuous requiring that you build up some cash reserves to get you by just in case the job goes away?
Clearly, at the beginning, some choices will need to be made regarding the best use of your prepping budget. Just remember that food, water and first aid supplies should be at the top of everyone’s list. After that, assess the most likely risks and plan accordingly. A good place to start is 12 Months of Prepping – The First Year which is a recap of monthly supplies, skills and tasks to get you starting on the road to preparedness.
3. Preparing mostly to bug out rather than bugging in.
We all talk about having a bug-out-bag and without question, having your most basic survival items in a pack that you can grab and go if you need to get out of dodge in a hurry is important. But beyond that, over and over I see people acquire all sorts of gear for surviving on the run – perhaps in the woods or bush in a remote location.
I know that in own case and also with the majority of the readers on Backdoor Survival, hunkering down and bugging in will always be preferred to taking off into the unknown with our stuff. For many, the choice to bug in has to do with family, health concerns or financial considerations. That, plus the availability of stored supplies makes bugging in – or staying at home – the choice when a disaster strikes.
At the end of the day, take care of your bugging in needs first and foremost. Plan for outdoor cooking facilities (perhaps an existing charcoal grill?), supplemental lighting (like this $21 Dorcy Wireless Motion LED Flood Lite), stored water, and a portable generator now. Later, down the road, you can expand your supplies to include the essentials for truly bugging out.
That said, pay attention to mistake number 4.
4. Failure to evacuate at just the right time.
When the storm of the century is heading your way, know that it is time to evacuate. Load up your vehicle and go. As much as you feel that your are better off in your own home, if the authorities tell you to leave – and even if they do not – get out of harms way as a precautionary measure. Do so while you still have the ability to load up your vehicle with supplies and fill the tank with gas.
Sticking around when there is at least a 50% chance of a disaster occurring (hurricane, flood, landslides, tsunami,wildfire) is just plain silly. Remember mistake number 2 – failure to evaluate the risks? Part of your planning should be to determine the trigger point for evacuation as well as identification of an evacuation site and a route to get there. Better yet, plan an alternate route as well.
5. Having the gear but not knowing how to use it.
I am guilty of this one as well. I have a Kaito emergency radio as well as some Midland FRS radios. Sure, I know how basically to use them but what if I needed to use some of the more esoteric features? My bad. I also have a hand held compass – a nice one at that – and yet in these days of GPS navigation, would I know how to use it?
Get out the gear two or three times a year and put it through its paces. Not only do you need to know how to use it, but you need to make sure your gear is in good working order. Blades need to be sharpened, batteries need to be charged and skills need to be refreshed.
6. Underestimating other humans as a threat.
In a perfect world, we would all get along and go about our business in a mild-mannered way, not bothering anyone or causing others harm. Alas, as humans this has never been the case. From biblical times forward, man has opposed man. There have been and still are warriors, and armies, soldiers and dictators, enemies and foes.
As recent mass shootings have revealed, mental illness or drugs can make good people go bad. Add the uncertainly and chaos created by an unstable society and the potential for human threat because a major cause for concern.
Whether you embrace firearms or shun them, you still need a way to defend yourself, your family and your property. Consider pepper sprays, martial arts, and other defensive mechanisms in addition to traditional firearms. It is foolhardy to believe that having some means of defense is not needed because “there is no one out to get you”. Desperate people are dangerous people. And the lack of food, water and supplies will turn ordinary people into desperate people in a heartbeat.
7. Buying stuff while ignoring the need to develop skills.
Buying stuff is easy. Save up your money, select your merchandise and go to your local outdoor emporium or Amazon and make a purchase. On the other hand, learning new skills (or practicing old ones) takes time, patience and bit of study. Do you know how to start a fire without matches or a butane lighter? Do you know how to take advantage of natures bounty by knowing how to fish or hunt? And what about growing your own food? Could you do it?
Developing skills to become self-sufficient are every bit as important as having a closet full of the best gear money can by.
8. Lacking the knowledge to properly store your food supplies.
Okay, some might say there is a sixth enemy: namely the two legged type that gets into the tastier items (such a cans of brownie mix) and eats them without telling anyone.
Seriously though, storing food for the long term – meaning five years or longer – does take some care. Brush up on the basics of food storage and set up an active rotation program. You don’t necessarily have to store food for 10 years or longer but what you do store – even for a year or two – should be protected to the best of your ability.
One thing to keep in mind that except for the problem with pests, most food will still be edible even if it is not stored at optimal temperatures in a moisture and oxygen-free environment. But why not learn proper storage methods to insure maximum taste and nutrition. Here on Backdoor Survival, the following articles will help educate and there are plenty of others elsewhere on the internet including YouTube. A few hours of your time is all that it will take to make you a food storage expert.
9. Relying only on yourself and ignoring like-minded members of your community.
When I first started prepping, I did not mention my new little “hobby” to anyone. You know, OPSEC and all that. But about a year into it, I realized that I could not do it all on my own. There were things I was having trouble grasping on my own and I needed help. As I tip toed around the edges of my community, I found some like minded people and much to my surprise, I found that I had skills and knowledge that they lacked.
The mutual exchange of skills and knowledge ensued along with some informal agreements to team up if circumstances required us to be on our own for any period of time. This included teaming up for shelter and food as well as defense.
The importance of having a peer group of like minded comrades in my own community was strengthened as I read R. P. Ruggiero’s Brushfire Plague and continues as I explore other truer than life survival stories,. How you decide to expand your community contacts is up to you but be advised that when it comes to survival 1 plus 1 will definitely add up to more than 2.
The Final Word
These days I feel fortunate that I have come so far with my prepping activities. Moving beyond obsession, the prepping way of life is now a part of my core. It is “what I do” as well as being a hobby and a passion.
Indeed, I have made some mistakes along the way and many of them are listed above. There will surely be others down the road but I know that will be okay since they will afford me an opportunity to learn and grow. At the end of the day, life is all about growth, opportunity and the ability to take care of oneself physically, mentally and spiritually. To me, that is what prepping is all about – mistakes and all.
Today EFF posted several thousand pages of new drone license records and a new map that tracks the location of drone flights across the United States.
These records, received as a result of EFF’s Freedom of Information Act (FOIA) lawsuit against the Federal Aviation Administration (FAA), come from state and local law enforcement agencies, universities and—for the first time—three branches of the U.S. military: the Air Force, Marine Corps, and DARPA (Defense Advanced Research Projects Agency).
While the U.S. military doesn’t need an FAA license to fly drones over its own military bases (these are considered “restricted airspace”), it does need a license to fly in the national airspace (which is almost everywhere else in the US). And, as we’ve learned from these records, the Air Force and Marine Corps regularly fly both large and small drones in the national airspace all around the country. This is problematic, given a recent New York Times report that the Air Force’s drone operators sometimes practice surveillance missions by tracking civilian cars along the highway adjacent to the base.
The records show that the Air Force has been testing out a bunch of different drone types, from the smaller, hand-launched Raven, Puma and Wasp drones designed by Aerovironment in Southern California, to the much larger Predator and Reaper drones responsible for civilian and foreign military deaths abroad. The Marine Corps is also testing drones, though it chose to redact so much of the text from its records that we still don’t know much about its programs.
No one said it better than Michael Crichton – who, in addition to being a best selling author, was also a physician.
During a lecture at Cal Tech, he said, “Let’s be clear: The work of science has nothing whatever to do with consensus. Consensus is the business of politics. Science, on the contrary, requires only one investigator who happens to be right. … The greatest scientists in history are great precisely because they broke with the consensus.”
The medical community has always been subject to “group-think,” but in recent decades we have become the leaders. Numerous physician-scientists have been ostracized, defrocked, de-licensed and in some cases driven to self-destruction by a medical community that has embraced consensus in science.
In essence, “We don’t care about your data; we all agree you are wrong.”
I once had a paper rejected from a major spine journal with a one line denouement: “Everyone knows you can’t do that.”
With time, ultimately, truth prevails, and renegade but correct physicians are vindicated – but not in time to save those patients who die from the mistaken consensus. Today, this “group-think” is depriving people from some of the best and cheapest medical treatment available – supplementation with adequate Vitamin D3.
Vitamin D deficiency has been associated with childhood rickets – a bone disorder – for over a hundred years. And it has been known since the 1970s that those living on the equator, regardless of particular locale, have lower rates of multiple sclerosis, colon cancer and depression. But more recently, many astute observers have discovered that low Vitamin D leads to many other disorders, including cardiac arrhythmia, breast cancer, adult fractures, dementia, heart attack risk and even diabetes.
Most recently, studies have demonstrated that higher levels of Vitamin D improve longevity and are beneficial at preventing influenza – even better than vaccination. Studies showing beneficial effects of high vitamin D levels are quite convincing. They not only show a correlation between low Vitamin D blood levels and the problem, but show improvement in the disease or prevention of the condition when levels are raised up through supplementation.
As an example, it has been shown in the laboratory that heart muscle does not contract well unless adequate Vitamin D is present. An Italian population study showed that low Vitamin D was proportional to atherosclerotic plaques (clogging of the arteries). Furthermore, a Japanese study of dialysis patients demonstrated that correcting Vitamin D deficiency significantly lowered death from heart attacks and heart disease in general.
These are only a few of the rapidly expanding body of literature supporting the role of Vitamin D in multiple disease prevention. But to achieve the positive effects seen in many diseases, blood levels need to be in the range of 50 to 100 ng/dl, not the 20 ng/dl that laboratories report as the lowest range of “normal” (how labs determine “normal” is the subject of another column). Specifically in the case of breast cancer, if one achieves blood levels above 55 ng/dl, the risk of breast cancer is diminished 85 percent.
It is the observation of many, many practicing clinicians that 1) most patients test in the low 20s, and 2) 400 iu of Vitamin D a day – the government recommended daily allowance doesn’t raise the levels at all. Studies of equatorial inhabitants demonstrate that some of the longest-lived people on the planet obtain 30,000-40,000 iu of Vitamin D (specifically D3) a day from the sunlight – nature’s source of the vitamin. Given that, it is not suprising that supplementing 10,000 iu a day of Vitamin D3 has been shown to have no adverse effects.
As an Orthopaedic Surgeon, I deal with bone disorders daily, and have long been interested in this topic. I quit testing for Vitamin D levels in untreated people after every one of my patients tested in the low 20s. I only tested my husband because he was convinced that golfing in Arizona 18 holes, six days a week would raise his level. It did not – his level was 22 ng/dl.
As a final fact, D3 supplementation is cheap. For less than $12 a month you can easily take 10,000 iu of Vitamin D3 a day.
Now, given all this, what would you do?
I, for one take 10,000 units of Vitamin D3 a day. I have done so for over 7 years, and my levels of 55 ng/dl are barely in the optimal range of 50-100ng/dl. I recommend the same to all my patients. But I must warn them that the government, via the Institute of Medicine and the FDA, disagree and believe people should take only 600-800 iu a day.
Now it doesn’t take a medical degree to figure out that a cheap treatment that has such potential upside with so little (if any) downside is worth doing as real preventive medicine. But the government consensus – developed by intellectuals who feel they are infinitely smarter than we are, and should be able to make our choices for us – is that there is no evidence for the beneficial claims.
Really? If they emerge from their collective basement, they will find pages and pages of references. Don’t believe it? Do a simple Google search. Or just read the newspaper. Besides frequent articles in medical and general science journals supporting Vitamin D3 supplementation, there are monthly news stories about this rapidly advancing science.
Sadly, the government doesn’t just want to discourage you from taking extra Vitamin D, they want to prohibit it. Senator Dick Durban, D-Ill., in 2011 introduced a bill (innocuously labeled the “Supplement Labeling Act”) which would so over-regulate the supplement industry that they could no longer supply products such as Vitamin D3 at a cost affordable to the average consumer.
And state medical boards, which are now populated by many non-physicians, sanction physicians who step out of this approved “consensus” – what they call “standard of care.” According to them, if you are not doing what 90 percent of your colleagues are doing, you are by definition wrong. And they can punish you, even to the extent of taking away your license. So, regardless of progress in science, if 90 percent of doctors are recommending an inadequate dose of Vitamin D, your doctor must give you this wrong advice.
To be a scientific leader in this new world order is to be wrong. If the phone company had this philosophy, we would still be tied to land line rotary dials.
Science and medicine are not a vote. As Dr. Crichton pointed out, voting is for politicians. Science requires freedom to consider the alternatives, and in medicine, the freedom to make our own choices – not have government bureaucrats or the Institute of Medicine make them for us
Do you know what FOIA is? No? Don’t be alarmed, most Americans don’t. It is better known as the Freedom of Information Act (introduced by Sen. Edward V. Long in 1965 and signed into law by President Lyndon B. Johnson in 1966), and is most often used by Americans looking for answers into the deep mysteries of government activity. There is something else you should know, however: Freedom of Information Act requests aren’t just for those who are seeking information on black ops activities.
You can use it yourself to discover what organizations like the National Security Agency or the Federal Bureau of Investigation have on your file. Amazingly, FIOA can be used by you to get whatever files that the NSA or FBI or any other three letter agency has on you. And with the latest round of leaks covered by Anthony Gucciardi detailing how the NSA is tracking your activity through just about all of the major social websites, this is big news.
Perhaps you are politically active and have gone to a few protests and were arrested, or maybe you post a lot of political articles on your favorite social networking site.
Grabbing Your File
There are two ways you can get your file. Your first option is to get it straight from the source. For the NSA file, you can go to the FOIA request form. Or for the FBI, you can go to their official request form as well. Or perhaps you don’t feel comfortable going through that process and would rather use another party, in which case you can utilize the website Get My FBI File. This website provides the forms for most agencies, CIA, DIA, FBI, NSA, etc.
Since the conception of FOIA in 1966, it has been amended eleven times. Most notably by President Gerald Ford in 1974. At first, President Ford was for bolstering various privacy-related amendments, however he then performed a complete 180 on the issue (after being persuaded by his Chief of Staff Donald Rumsfield, and Deputy Richard Cheney), signing a Presidential veto that was eventually overturned by Congress. This was only one of twelve vetoes that were overturned by congress in regards to President Ford.
The short but profitable tale of how 483,000 private individual have “top secret” access to the nation’s most non-public information begins in 2001. “After 9/11, intelligence budgets were increased, new people needed to be hired, it was a lot easier to go to the private sector and get people off the shelf,” and sure enough firms like Booz Allen Hamilton – still two-thirds owned by the deeply-tied-to-international-governments investment firm The Carlyle Group – took full advantage of Congress’ desire to shrink federal agencies and their budgets by enabling outside consultants(already primed with their $4,000 cost ‘security clearances’) to fulfill the needs of an ever-more-encroaching-on-privacy administration.
Booz Allen (and other security consultant providing firms) trade publicly with a cloak of admitted opacity due to the secrecy of their government contracts (“you may not have important information concerning our business, which will limit your insight into a substantial portion of our business”) but the actions of Diane Feinstein who promptly denounced “treasonous” Edward Snowden, “have muddied the waters,” for the stunning 1.1 million (or 21% of the total) private consultants with access to “confidential and secret” government information.
Perhaps the situation of gross government over-spend and under-oversight is summed up best, “it’s very difficult to know what contractors are doing and what they are billing for the work — or even whether they should be performing the work at all.”
First, Diane Feinstein’s take on it all…
“I don’t look at this as being a whistleblower. I think it’s an act of treason,” the chairwoman of the Senate Intelligence Committee told reporters. The California lawmaker went on to say that Snowden had violated his oath to defend the Constitution. “He violated the oath, he violated the law. It’s treason.”
The reliance on contractors for intelligence work ballooned after the 9/11 attacks. The government scrambled to improve and expand its ability to monitor the communication and movement of people who might threaten another attack.
“After 9/11, intelligence budgets were increased, new people needed to be hired,” Augustyn said. “It was a lot easier to go to the private sector and get people off the shelf.”
The reliance on the private sector has grown since then, in part because of Congress’ efforts to limit the size of federal agencies and shrink the budget.
Which has led to what appears to be major problems.
But critics say reliance on contractors hasn’t reduced the amount the government spends on defense, intelligence or other programs.
Rather, they say it’s just shifted work to private employers and reduced transparency. It becomes harder to track the work of those employees and determine whether they should all have access to government secrets.
“It’s very difficult to know what contractors are doing and what they are billing for the work — or even whether they should be performing the work at all,”
… And to the current PRISMgate whistleblowing situation:
Of the 4.9 million people with clearance to access “confidential and secret” government information, 1.1 million, or 21 percent, work for outside contractors, according to a report from Clapper’s office.
Of the 1.4 million who have the higher “top secret” access, 483,000, or 34 percent, work for contractors.
…
Because clearances can take months or even years to acquire, government contractors often recruit workers who already have them.
Why not – it’s lucrative!!
Snowden says he accessed and downloaded the last of the documents that detailed the NSA surveillance program while working in an NSA office in Hawaii for Booz Allen, where he says he was earning $200,000 a year.
Analysts caution that any of the 1.4 million people with access to the nation’s top secrets could have leaked information about the program – whether they worked for a contractor or the government.
For individuals and firms alike.
Booz Allen has long navigated those waters well.
The firm was founded in 1914 and began serving the U.S. government in 1940, helping the Navy prepare for World War II. In 2008, it spun off the part of the firm that worked with private companies and abroad. That firm, called Booz & Co., is held privately.
Booz Allen was then acquired by the Carlyle Group, an investment firm with its own deep ties to the government. In November 2010, Booz Allen went public. The Carlyle Group still owns two-thirds of the company’s shares.
Or, a full-majority stake.
Curiously once public, The Booz Allens of the world still operate like a psuedo-private company, with extensive confidential cloaks preventing the full disclosure of financial data. But don’t worry – we should just trust them. Via Bloomberg’s Jonathan Weil.
Psst, here’s a stock tip for you. There’s a company near Washington with strong ties to the U.S. intelligence community that has been around for almost a century and has secret ways of making money — so secret that the company can’t tell you what they are. Investors who buy just need to have faith.
To skeptics, this might seem like a pitch for an investment scam. But as anyone who has been paying attention to the news might have guessed, the company is Booz Allen Hamilton Holding Corp.
…
“Because we are limited in our ability to provide information about these contracts and services,” the company said in its latest annual report, “you may not have important information concerning our business, which will limit your insight into a substantial portion of our business, and therefore may be less able to fully evaluate the risks related to that portion of our business.”
This seems like it would be a dream arrangement for some corporations: Not only is Booz Allen allowed to keep investors uninformed, it’s required to. I suppose we should give the company credit for being transparent about how opaque it is.
And while the media and popular attention is currently focused on who, if anyone else, may be the next Snowden struck by a sudden pang of conscience, perhaps a better question is what PE behemoth Carlyle, with a gargantuan $170 billion in AUM, knows, and why it rushed to purchase Booz Allen in the months after the Bear Stearns collapse, just when everyone else was batting down the hatches ahead of the biggest financial crash in modern history.
Carlyle Group, the private-equity firm run by David Rubenstein, agreed to acquire Booz Allen Hamilton Inc.’s U.S. government-consulting business for $2.54 billion, its biggest buyout since the credit markets collapsed in July.
The purchase would be Carlyle’s biggest since it agreed to buy nursing-home operator Manor Care Inc. last July for $6.3 billion. Deal-making may be rebounding from a 68 percent decline in the first quarter as investment banks begin writing new commitments for private-equity transactions. Buyouts ground to a halt last year because of a global credit freeze triggered by record U.S. subprime-mortgage defaults.
The Booz Allen government-consulting unit has more than 18,000 employees and annual sales of more than $2.7 billion. Its clients include branches of the U.S. military, the Department of Homeland Security and the World Bank.
Carlyle, based in Washington, manages $81.1 billion in assets [ZH: that was 5 years ago – the firm now boasts $170 billion in AUM]. Rubenstein founded the firm in 1987 with William Conway and Daniel D’Aniello. The trio initially focused on deals tied to government and defense.
Carlyle and closely held Booz Allen have attracted high-level officials from the government. Carlyle’s senior advisers have included former President George H.W. Bush, former British Prime Minister John Major, and Arthur Levitt, the ex-chairman of the U.S. Securities and Exchange Commission.
R. James Woolsey, who led the U.S. Central Intelligence Agency from 1993 to 1995, is a Booz Allen executive. Mike McConnell, the U.S. director of national intelligence, is a former senior vice president with the company.
…
Carlyle last year sold a minority interest in itself to Mubadala Development Co., an investment fund affiliated with the government of Abu Dhabi, capital of the United Arab Emirates.
And in addition to the UAE, who can possibly forget Carlyle’s Saudi connection. From the WSJ circa 2001:
If the U.S. boosts defense spending in its quest to stop Osama bin Laden’s alleged terrorist activities, there may be one unexpected beneficiary: Mr. bin Laden’s family.
Among its far-flung business interests, the well-heeled Saudi Arabian clan — which says it is estranged from Osama — is an investor in a fund established by Carlyle Group, a well-connected Washington merchant bank specializing in buyouts of defense and aerospace companies.
Through this investment and its ties to Saudi royalty, the bin Laden family has become acquainted with some of the biggest names in the Republican Party. In recent years, former President Bush, ex-Secretary of State James Baker and ex-Secretary of Defense Frank Carlucci have made the pilgrimage to the bin Laden family’s headquarters in Jeddah, Saudi Arabia. Mr. Bush makes speeches on behalf of Carlyle Group and is senior adviser to its Asian Partners fund, while Mr. Baker is its senior counselor. Mr. Carlucci is the group’s chairman.
Osama is one of more than 50 children of Mohammed bin Laden, who built the family’s $5 billion business, Saudi Binladin Group, largely with construction contracts from the Saudi government. Osama worked briefly in the business and is believed to have inherited as much as $50 million from his father in cash and stock, although he doesn’t have access to the shares, a family spokesman says. Because his Saudi citizenship was revoked in 1994, Mr. bin Laden is ineligible to own assets in the kingdom, the spokesman added.
…
People familiar with the family’s finances say the bin Ladens do much of their banking with National Commercial Bank in Saudi Arabia and with the London branch of Deutsche Bank AG. They also use Citigroup Inc. and ABN Amro, the people said.
“If there were ever any company closely connected to the U.S. and its presence in Saudi Arabia, it’s the Saudi Binladin Group,” says Charles Freeman, president of the Middle East Policy Council, a Washington nonprofit concern that receives tens of thousands of dollars a year from the bin Laden family. “They’re the establishment that Osama’s trying to overthrow.”
…
A Carlyle executive said the bin Laden family committed $2 million through a London investment arm in 1995 in Carlyle Partners II Fund, which raised $1.3 billion overall. The fund has purchased several aerospace companies among 29 deals. So far, the family has received $1.3 million back in completed investments and should ultimately realize a 40% annualized rate of return, the Carlyle executive said. But a foreign financier with ties to the bin Laden family says the family’s overall investment with Carlyle is considerably larger. He called the $2 million merely an initial contribution. “It’s like plowing a field,” this person said. “You seed it once. You plow it, and then you reseed it again.”
The Carlyle executive added that he would think twice before accepting any future investments by the bin Ladens. “The situation’s changed now,” he said. “I don’t want to spend my life talking to reporters.”
We can clearly see why. We can also clearly see why nobody has mentioned Carlyle so far into the Booz Allen fiasco.
A U.S. inquiry into bin Laden family business dealings could brush against some big names associated with the U.S. government. Former President Bush said through his chief of staff, Jean Becker, that he recalled only one meeting with the bin Laden family, which took place in November1998. Ms. Becker confirmed that there was a second meeting in January 2000, after being read the ex-president’s subsequent thank-you note. “President Bush does not have a relationship with the bin Laden family,” says Ms. Becker. “He’s met them twice.”
Mr. Baker visited the bin Laden family in both 1998 and 1999, according to people close to the family. In the second trip, he traveled on a family plane. Mr. Baker declined comment, as did Mr. Carlucci, a past chairman of Nortel Networks Corp., which has partnered with Saudi Binladin Group on telecommunications ventures.
As one can imagine the rabbit hole just gets deeper and deeper the more one digs. For now, we will let readers do their own diligence. We promise the results are fascinating.
Going back to the topic at hand, we will however ask just how much and what kind of confidential, classified, and or Top Secret information is shared “behind Chinese walls” between a Carlyle still majority-owned company and the private equity behemoth’s employees and advisors, among which are some of the most prominent political and business luminaries currently alive. The following is a list of both current and former employees and advisors. We have used Wiki but anyone wishing to comb through the firm’s full blown roster of over 1,000 employees and advisors, is welcome to do so at the firm’s website.
Olivier Sarkozy (half-brother of Nicolas Sarkozy, former President of France) – co-head and managing director of its recently launched global financial services division, since March 2008.
Luis Téllez Kuenzler, Mexican economist, former Secretary of Communications and Transportation under the Felipe Calderón administration and former Secretary of Energy under the Zedillo administration.
Anand Panyarachun, former Prime Minister of Thailand (twice), former member of the Carlyle Asia Advisory Board until the board was disbanded in 2004
Fidel V. Ramos, former president of the Philippines, Carlyle Asia Advisor Board Member until the board was disbanded in 2004
Peter Chung, former associate at Carlyle Group Korea, who resigned in 2001 after 2 weeks on the job after an inappropriate e-mail to friends was circulated around the world
Thaksin Shinawatra, former Prime Minister of Thailand (twice), former member of the Carlyle Asia Advisory Board until 2001 when he resigned upon being elected Prime Minister.
Media
Norman Pearlstine – editor-in-chief of Time magazine from (1995–2005), senior advisor telecommunications and media group 2006-
Perhaps Bloomberg’s Jonathan Weil sums it up best:
There’s no easy solution here, aside from the obvious point that the government keeps way too many secrets.
So what happens when one corporation, owned and controlled by the same government’s former (and in some cases current) top power brokers, potentially has access to all of the same government’s secrets?
The IRS, currently in the midst of scandals involving the targeting of conservative groups and lavish taxpayer-funded conferences, is ordering surveillance equipment that includes hidden cameras in coffee trays, plants and clock radios.
The IRS wants to secure the surveillance equipment quickly – it posted a solicitation on June 6 and is looking to close the deal by Monday, June 10. The agency already has a company lined up for the order but is not commenting on the details.
“The Internal Revenue Service intends to award a Purchase Order to an undisclosed Corporation,” reads the solicitation.
“If you feel that you can provide the following equipment, please respond to this email no later than 4 days after the solicitation date,” the IRS said.
Among the items the agency will purchase are four “Covert Coffee tray(s) with Camera concealment,” and four “Remote surveillance system(s)” with “Built-in DVD Burner and 2 Internal HDDs, cameras.”
The IRS also is buying four cameras to hide in plants: “(QTY 4) Plant Concealment Color 700 Lines Color IP Camera Concealment with Single Channel Network Server, supports dual video stream, Poe [Power over Ethernet], software included, case included, router included.”
Finishing out the order are four “Color IP Camera Concealment with single channel network server, supports dual video stream, poe, webviewer and cms software included, audio,” and two “Concealed clock radio.”
“Responses to this notice must be received by this office within 3 business days of the date of this synopsis by 2:00 P.M. EST, June 10, 2013,” the IRS said. Interested vendors are to contact Ricardo Carter, a Contract Specialist at the IRS.
“If no compelling responses are received, award will be made to the original solicited corporation,” the IRS said.
The original solicitation was only available to private companies for bids for 19 business hours.
The notice was posted at 11:07 a.m. on June 6 and had a deadline of 2:00 p.m. on Monday. Taking a normal 9-to-5 work week, the solicitation was open for bids for six hours on Thursday, eight hours on Friday, and five hours on Monday, for a total of 19 hours.
The response date was changed on Monday, pushed back to 2:00 p.m. on Tuesday, June 11.
The location listed for the solicitation is the IRS’s National Office of Procurement, in Oxon Hill, Md.
“The Procurement Office acquires the products and services required to support the IRS mission,” according to its website.
In recent weeks the IRS has been at the center of multiple scandals, admitting to targeting Tea Party groups and subjecting them to greater scrutiny when applying for non-profit status during the 2010 and 2012 elections.
A report by the Treasury Inspector General for Tax Administration revealed that groups with names like “patriot” in their titles were singled out, required to complete lengthy personal questionnaires (often multiple times) and having their nonprofit status delayed, sometimes for more than three years.
Last week a second Inspector General report detailed nearly $50 million in wasteful spending by the agency on conferences, in which employees stayed at luxurious Las Vegas hotels, paid a keynote speaker $17,000 to paint a picture of U2 singer Bono, and spent $50,000 on parody videos of “Star Trek.”
Requests for comment from the IRS and Mr. Carter were not returned before this story was posted.
CNSNews.com asked IRS spokesmen Dean Patterson and Anthony Burke to explain the reasoning behind the solicitation, where the surveillance equipment will be used, why the request was so urgent, and whether the request has anything to do with the recent scandals at the IRS.
If twitter is any gauge, a lot of people think this article in Wired about General Keith Alexander is just all kinds of kewl:
General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Alexander runs the nation’s cyberwar efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. “What we see is an increasing level of activity on the networks,” he said at a recent security conference in Canada. “I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.”
In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.
But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander—who declined to be interviewed for this article—has concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.
And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.
The success of this sabotage came to light only in June 2010, when the malware spread to outside computers. It was spotted by independent security researchers, who identified telltale signs that the worm was the work of thousands of hours of professional development. Despite headlines around the globe, officials in Washington have never openly acknowledged that the US was behind the attack. It wasn’t until 2012 that anonymous sources within the Obama administration took credit for it in interviews with The New York Times.
But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.
I don’t suppose the American public have any business knowing if their government is launching such attacks. Why would we? What could possibly go wrong?
Inside the government, the general is regarded with a mixture of respect and fear, not unlike J. Edgar Hoover, another security figure whose tenure spanned multiple presidencies. “We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets,” says one former senior CIA official who agreed to speak on condition of anonymity. “We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.”
Now 61, Alexander has said he plans to retire in 2014; when he does step down he will leave behind an enduring legacy—a position of far-reaching authority and potentially Strangelovian powers at a time when the distinction between cyberwarfare and conventional warfare is beginning to blur. A recent Pentagon report made that point in dramatic terms. It recommended possible deterrents to a cyberattack on the US. Among the options: launching nuclear weapons.
Like I said, what could possibly go wrong?
When the Guardian revealed this program the other day there was a spirited debate about whether this, unlike the other programs, was something we should welcome and expect. My problem with it wasn’t that the government was creating plans to defend against attacks on US cyber-infrastructure or even war plans in case such a thing happened. What I found questionable was the idea that this was conceived as 21st Century offensive war planning, and and in ways that do not necessarily fall within the traditional “national security” boundaries.
When it comes to cyber issues, I’m afraid we are seeing a confluence of commerce and security that everyone should stop and think about for a minute. How are these people defining the “national interest” and on whose behalf are they planning to launch cyberwar? What are the consequences of doing such a thing and who decides that it must be done?
And what do we think about paying huge amounts of taxpayer dollars to contractors like this?
Defense contractors have been eager to prove that they understand Alexander’s worldview. “Our Raytheon cyberwarriors play offense and defense,” says one help-wanted site. Consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, a Tampa, Florida, company, said it was hunting for “attack and penetration consultants.”
One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. True to form, the company declined Wired’s interview requests.
[…]
Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgame’s clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed. But such access doesn’t come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.
The buying and using of such a subscription by nation-states could be seen as an act of war. “If you are engaged in reconnaissance on an adversary’s systems, you are laying the electronic battlefield and preparing to use it,” wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. “In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.” The question is, who else is on the secretive company’s client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. “It should be illegal,” says the former senior intelligence official involved in cyberwarfare. “I knew about Endgame when I was in intelligence. The intelligence community didn’t like it, but they’re the largest consumer of that business.”
There are some serious implications to all of this that need to be hashed out by the American people. Of course we need to have defenses against cyber attacks. I don’t think anyone in the country thinks otherwise. But this looks like it could be a monumental financial boondoggle that is in great danger of running amok and causing some very serious problems. Frankly, this scares me much more than the threat that some would-be is going to get a hold of some beauty supplies and blow himself up.
Islamic terrorism is not and never has been an existential threat. This, I’m not so sure about. We should at least have a little chat about it before we let Cyber Buck Turgidson and his friends run wild.
A new vaccine for influenza has hit the market, and it is the first ever to contain genetically-modified (GM) proteins derived from insect cells. According to reports, the U.S. Food and Drug Administration (FDA) recently approved the vaccine, known as Flublok, which contains recombinant DNA technology and an insect virus known as baculovirus that is purported to help facilitate the more rapid production of vaccines.
According to Flublok’s package insert, the vaccine is trivalent, which means it contains GM proteins from three different flu strains. The vaccine’s manufacturer, Protein Sciences Corporation (PSC), explains that Flublok is produced by extracting cells from the fall armyworm, a type of caterpillar, and genetically altering them to produce large amounts of hemagglutinin, a flu virus protein that enables the flu virus itself to enter the body quickly.
So rather than have to produce vaccines the “traditional” way using egg cultures, vaccine manufacturers will now have the ability to rapidly produce large batches of flu virus protein using GMOs, which is sure to increase profits for the vaccine industry. But it is also sure to lead to all sorts of serious side effects, including the deadly nerve disease Guillain-Barre Syndrome (GSB), which is listed on the shot as a potential side effect.
“If Guillain-Barre Syndrome (GBS) has occurred within six weeks of receipt of a prior influenza vaccine, the decision to give Flublock should be based on careful consideration of the potential benefits and risks,” explains a section of the vaccine’s literature entitled “Warnings and Precautions.” Other potential side effects include allergic reactions, respiratory infections, headaches, fatigue, altered immunocompetence, rhinorrhea, and myalgia.
According to clinical data provided by PSC in Flublok’s package insert, two study participants actually died during trials of the vaccine. But the company still insists Flublok is safe and effective, and that it is about 45 percent effective against all strains of influenza in circulation, rather than just one or two strains.
FDA also approves flu vaccine containing dog kidney cells
Back in November, the FDA also approved a new flu vaccine known as Flucelvax that is actually made using dog kidney cells. A product of pharmaceutical giant Novartis, Flucelvax also does away with the egg cultures, and can similarly be produced much more rapidly than traditional flu vaccines, which means vaccine companies can have it ready and waiting should the federal government declare a pandemic.
Like Flublok, Flucelvax was made possible because of a $1 billion, taxpayer-funded grant given by the U.S. Department of Health and Human Services (HHS) to the vaccine industry back in 2006 to develop new manufacturing methods for vaccines. The ultimate goal is to be able to quickly manufacture hundreds of millions of vaccines for rapid distribution.
Meanwhile, there are reportedly two other GMO flu vaccines currently under development. One of them, which is being produced by Novavax, will utilize “bits of genetic material grown in caterpillar cells called ‘virus-like particles’ that mimic a flu virus,” according to Reuters.
The Obama regime which was already in the midst of three high profile scandals now has a fourth one to deal with. Top secret documents were recently leaked to the Washington Post and the London Guardian detailing a vast government surveillance program code named PRISM. According to the leaked documents, the program allows the National Security Agency (NSA) back door access to data from the servers of several leading U.S. based Internet and software companies. The documents list companies such as Google, Facebook, Yahoo, Microsoft, AOL and Apple as some of the participants in the program. There have also been other reports indicating that the NSA is able to access real-time user data from as many as 50 separate American companies. Under the program, the NSA is able to collect information ranging from e-mails, chats, videos, photographs, VoIP calls and more. Most importantly is the fact that PRISM allows the NSA to obtain this data without having to make individual requests from the service providers or without having to obtain a court order. To say that this is a violation of the Fourth Amendment which forbids unreasonable searches and seizures would be a gross understatement. This is actually much more than that. This is a program designed specifically to serve as a Big Brother like control grid and to end privacy as we know it.
The NSA is quickly building a real life version of 1984’s Big Brother.
It is now painfully obvious that James Clapper the Director of National Intelligence when testifying before the Senate this past March blatantly lied when asked by Senator Ron Wyden if the NSA was involved in collecting data from the American people. Clapper flatly denied that the NSA was engaged in these types of domestic surveillance activities. What makes the situation such a joke is that the Obama regime is not focused on the fact that Clapper lied to the Senate which in of itself is unlawful. Instead they have been more focused on determining the source of the leak that exposed these broad abuses of power. This is probably not surprising considering that this is a regime that rewards corruption by promoting people involved in all sorts of questionable activity. The promotion of Susan Rice as Obama’s new National Security Advisor is a perfect example of this considering her involvement in spreading bogus Benghazi related talking points. On the other hand, the Obama regime has severely punished a variety of whistleblowers who have dared to expose any wrong doing.
At least the Obama regime won’t have to spend much time and energy trying to identify the whistleblower as this person who leaked these documents has already come forward publically. At his own request the Guardian revealed his identity as Edward Snowden a 29-year old Information Technology specialist who has been working at the NSA for different contractors including Booz Allen Hamilton and Dell. Snowden had previously worked at an NSA office in Hawaii but boarded a flight to Hong Kong a few weeks ago where he has stayed since turning over these documents to the media. He expects that he will never set foot on U.S. soil again and may possibly seek political asylum in a country like Iceland. The Guardian interviewed Snowden over several days and has recently posted an interview transcript that provides more detail on the abuses he became aware of and why he decided to come forward as a whistleblower. In the interview Snowden confirms that the NSA has the infrastructure that allows them to intercept almost any type of data that you can imagine from phone records, e-mails to credit cards. He also reveals how the U.S. government is engaged in hacking systems everywhere around the world and how the NSA has consistently lied to Congress about their activities. There is little doubt that Snowden is thus far one of the most important whistleblowers to come along in the 21st century and he will likely face retaliation considering the vast reach and capabilities of the U.S. intelligence community.
Many individuals within the Obama regime including Obama himself have claimed that this type of widespread data collection is needed to fight terrorism and is used for national security purposes. Even if we were to assume that the war on terror is real, this claim is ridiculous and absurd on its face. It would be one thing if they were collecting information based upon a specific criteria identified by legitimate human intelligence. Instead they are collecting indiscriminate amounts of information which makes it much more difficult to analyze and target anything that might indicate a potential threat. If the NSA’s goal is really to detect and target terrorism than all they are doing is making their job more difficult by vastly increasing the noise they have to filter through. Either the people running the NSA are incredibly stupid or the goal of this program is to establish the infrastructure necessary to centrally collect data from communications everywhere around the world.
Other evidence to support this notion is the fact that the NSA is building a huge new facility in Utah that is being designed to store an enormous amount of data. A Fox News report indicates that when completed the facility will be able to store billions of terabytes worth of information. It is hard to fathom how the NSA would need this much storage space unless it was being used to collect and store any and all communications.
The Obama regime has tried to justify all of this by saying that PRISM helped stop an alleged New York City subway bomb plot back in 2009. This has been proven to be factually incorrect as regular police work and help from the British were larger factors in stopping the plot. This is assuming you even believe the official story of this terror plot to begin with. The government and more specifically the FBI have manufactured so many fake terror plots that it is difficult to determine fact from fiction at this point. So with this said, there is really no proof that PRISM has even helped to stop any so-called terror plot. They are collecting information simply for the sake of collecting information with no probable cause or reasonable justification.
At this point it is an undeniable fact that the NSA has been illegally collecting information on the American people. For years what has been dismissed as conspiracy theory is now without question a conspiracy fact. It is laughable that Obama and his assorted cronies are even trying to defend this program as a useful tool to fight terrorists. It is more likely that this program is being used to help find people domestically who dislike the government and would potentially fight back against it. A striking similarity to what is depicted in George Orwell’s dystopic novel 1984 where political dissidents are identified as thought criminals. A tool the NSA uses called Boundless Informant which counts and categorizes the information they collect shows that more data is actually gathered from domestic sources in the U.S. than from Russia. So based off of this one could argue that the NSA almost seems to view the American people as more of a threat to national security than the Russians.
The three scandals the Obama regime was dealing with prior to this new scandal are all grounds for impeachment and one could easily argue that this one is many times worse than the previous three. Obama should resign in disgrace but being that he’s a narcissist who seems unwilling to admit making any mistakes it is highly doubtful he will do this. Obama and the rest of the useful idiots in his regime who have tried to defend and justify this and other criminal programs need to be forcibly removed from office and put on trial. The criminal activity from the Obama regime is so vastly transparent it has become a complete and total joke to anyone who is even remotely paying attention.
The Illuminati were amateurs. The second huge financial scandal of the year reveals the real international conspiracy: There’s no price the big banks can’t fix
Conspiracy theorists of the world, believers in the hidden hands of the Rothschilds and the Masons and the Illuminati, we skeptics owe you an apology. You were right. The players may be a little different, but your basic premise is correct: The world is a rigged game. We found this out in recent months, when a series of related corruption stories spilled out of the financial sector, suggesting the world’s largest banks may be fixing the prices of, well, just about everything.
You may have heard of the Libor scandal, in which at least three – and perhaps as many as 16 – of the name-brand too-big-to-fail banks have been manipulating global interest rates, in the process messing around with the prices of upward of $500 trillion (that’s trillion, with a “t”) worth of financial instruments. When that sprawling con burst into public view last year, it was easily the biggest financial scandal in history – MIT professor Andrew Lo even said it “dwarfs by orders of magnitude any financial scam in the history of markets.”
That was bad enough, but now Libor may have a twin brother. Word has leaked out that the London-based firm ICAP, the world’s largest broker of interest-rate swaps, is being investigated by American authorities for behavior that sounds eerily reminiscent of the Libor mess. Regulators are looking into whether or not a small group of brokers at ICAP may have worked with up to 15 of the world’s largest banks to manipulate ISDAfix, a benchmark number used around the world to calculate the prices of interest-rate swaps.
Interest-rate swaps are a tool used by big cities, major corporations and sovereign governments to manage their debt, and the scale of their use is almost unimaginably massive. It’s about a $379 trillion market, meaning that any manipulation would affect a pile of assets about 100 times the size of the United States federal budget.
It should surprise no one that among the players implicated in this scheme to fix the prices of interest-rate swaps are the same megabanks – including Barclays, UBS, Bank of America, JPMorgan Chase and the Royal Bank of Scotland – that serve on the Libor panel that sets global interest rates. In fact, in recent years many of these banks have already paid multimillion-dollar settlements for anti-competitive manipulation of one form or another (in addition to Libor, some were caught up in an anti-competitive scheme, detailed in Rolling Stone last year, to rig municipal-debt service auctions). Though the jumble of financial acronyms sounds like gibberish to the layperson, the fact that there may now be price-fixing scandals involving both Libor and ISDAfix suggests a single, giant mushrooming conspiracy of collusion and price-fixing hovering under the ostensibly competitive veneer of Wall Street culture.
Why? Because Libor already affects the prices of interest-rate swaps, making this a manipulation-on-manipulation situation. If the allegations prove to be right, that will mean that swap customers have been paying for two different layers of price-fixing corruption. If you can imagine paying 20 bucks for a crappy PB&J because some evil cabal of agribusiness companies colluded to fix the prices of both peanuts and peanut butter, you come close to grasping the lunacy of financial markets where both interest rates and interest-rate swaps are being manipulated at the same time, often by the same banks.
“It’s a double conspiracy,” says an amazed Michael Greenberger, a former director of the trading and markets division at the Commodity Futures Trading Commission and now a professor at the University of Maryland. “It’s the height of criminality.”
The bad news didn’t stop with swaps and interest rates. In March, it also came out that two regulators – the CFTC here in the U.S. and the Madrid-based International Organization of Securities Commissions – were spurred by the Libor revelations to investigate the possibility of collusive manipulation of gold and silver prices. “Given the clubby manipulation efforts we saw in Libor benchmarks, I assume other benchmarks – many other benchmarks – are legit areas of inquiry,” CFTC Commissioner Bart Chilton said.
But the biggest shock came out of a federal courtroom at the end of March – though if you follow these matters closely, it may not have been so shocking at all – when a landmark class-action civil lawsuit against the banks for Libor-related offenses was dismissed. In that case, a federal judge accepted the banker-defendants’ incredible argument: If cities and towns and other investors lost money because of Libor manipulation, that was their own fault for ever thinking the banks were competing in the first place.
“A farce,” was one antitrust lawyer’s response to the eyebrow-raising dismissal.
“Incredible,” says Sylvia Sokol, an attorney for Constantine Cannon, a firm that specializes in antitrust cases.
All of these stories collectively pointed to the same thing: These banks, which already possess enormous power just by virtue of their financial holdings – in the United States, the top six banks, many of them the same names you see on the Libor and ISDAfix panels, own assets equivalent to 60 percent of the nation’s GDP – are beginning to realize the awesome possibilities for increased profit and political might that would come with colluding instead of competing. Moreover, it’s increasingly clear that both the criminal justice system and the civil courts may be impotent to stop them, even when they do get caught working together to game the system.
If true, that would leave us living in an era of undisguised, real-world conspiracy, in which the prices of currencies, commodities like gold and silver, even interest rates and the value of money itself, can be and may already have been dictated from above. And those who are doing it can get away with it. Forget the Illuminati – this is the real thing, and it’s no secret. You can stare right at it, anytime you want.
If you squint incredibly hard and look at the issue through a mirror, maybe while standing on your head, you can sort of see what Wise is saying. In a very theoretical, technical sense, the actual process by which banks submit Libor data – 18 geeks sending numbers to the British Bankers’ Association offices in London once every morning – is not competitive per se.
But these numbers are supposed to reflect interbank-loan prices derived in a real, competitive market. Saying the Libor submission process is not competitive is sort of like pointing out that bank robbers obeyed the speed limit on the way to the heist. It’s the silliest kind of legal sophistry.
But Wise eventually outdid even that argument, essentially saying that while the banks may have lied to or cheated their customers, they weren’t guilty of the particular crime of antitrust collusion. This is like the old joke about the lawyer who gets up in court and claims his client had to be innocent, because his client was committing a crime in a different state at the time of the offense.
“The plaintiffs, I believe, are confusing a claim of being perhaps deceived,” he said, “with a claim for harm to competition.”
Judge Buchwald swallowed this lunatic argument whole and dismissed most of the case. Libor, she said, was a “cooperative endeavor” that was “never intended to be competitive.” Her decision “does not reflect the reality of this business, where all of these banks were acting as competitors throughout the process,” said the antitrust lawyer Sokol. Buchwald made this ruling despite the fact that both the U.S. and British governments had already settled with three banks for billions of dollars for improper manipulation, manipulation that these companies admitted to in their settlements.
Michael Hausfeld of Hausfeld LLP, one of the lead lawyers for the plaintiffs in this Libor suit, declined to comment specifically on the dismissal. But he did talk about the significance of the Libor case and other manipulation cases now in the pipeline.
“It’s now evident that there is a ubiquitous culture among the banks to collude and cheat their customers as many times as they can in as many forms as they can conceive,” he said. “And that’s not just surmising. This is just based upon what they’ve been caught at.”
Greenberger says the lack of serious consequences for the Libor scandal has only made other kinds of manipulation more inevitable. “There’s no therapy like sending those who are used to wearing Gucci shoes to jail,” he says. “But when the attorney general says, ‘I don’t want to indict people,’ it’s the Wild West. There’s no law.”
The problem is, a number of markets feature the same infrastructural weakness that failed in the Libor mess. In the case of interest-rate swaps and the ISDAfix benchmark, the system is very similar to Libor, although the investigation into these markets reportedly focuses on some different types of improprieties.
Though interest-rate swaps are not widely understood outside the finance world, the root concept actually isn’t that hard. If you can imagine taking out a variable-rate mortgage and then paying a bank to make your loan payments fixed, you’ve got the basic idea of an interest-rate swap.
In practice, it might be a country like Greece or a regional government like Jefferson County, Alabama, that borrows money at a variable rate of interest, then later goes to a bank to “swap” that loan to a more predictable fixed rate. In its simplest form, the customer in a swap deal is usually paying a premium for the safety and security of fixed interest rates, while the firm selling the swap is usually betting that it knows more about future movements in interest rates than its customers.
Prices for interest-rate swaps are often based on ISDAfix, which, like Libor, is yet another of these privately calculated benchmarks. ISDAfix’s U.S. dollar rates are published every day, at 11:30 a.m. and 3:30 p.m., after a gang of the same usual-suspect megabanks (Bank of America, RBS, Deutsche, JPMorgan Chase, Barclays, etc.) submits information about bids and offers for swaps.
And here’s what we know so far: The CFTC has sent subpoenas to ICAP and to as many as 15 of those member banks, and plans to interview about a dozen ICAP employees from the company’s office in Jersey City, New Jersey. Moreover, the International Swaps and Derivatives Association, or ISDA, which works together with ICAP (for U.S. dollar transactions) and Thomson Reuters to compute the ISDAfix benchmark, has hired the consulting firm Oliver Wyman to review the process by which ISDAfix is calculated. Oliver Wyman is the same company that the British Bankers’ Association hired to review the Libor submission process after that scandal broke last year. The upshot of all of this is that it looks very much like ISDAfix could be Libor all over again.
“It’s obviously reminiscent of the Libor manipulation issue,” Darrell Duffie, a finance professor at Stanford University, told reporters. “People may have been naive that simply reporting these rates was enough to avoid manipulation.”
And just like in Libor, the potential losers in an interest-rate-swap manipulation scandal would be the same sad-sack collection of cities, towns, companies and other nonbank entities that have no way of knowing if they’re paying the real price for swaps or a price being manipulated by bank insiders for profit. Moreover, ISDAfix is not only used to calculate prices for interest-rate swaps, it’s also used to set values for about $550 billion worth of bonds tied to commercial real estate, and also affects the payouts on some state-pension annuities.
So although it’s not quite as widespread as Libor, ISDAfix is sufficiently power-jammed into the world financial infrastructure that any manipulation of the rate would be catastrophic – and a huge class of victims that could include everyone from state pensioners to big cities to wealthy investors in structured notes would have no idea they were being robbed.
“How is some municipality in Cleveland or wherever going to know if it’s getting ripped off?” asks Michael Masters of Masters Capital Management, a fund manager who has long been an advocate of greater transparency in the derivatives world. “The answer is, they won’t know.”
Worse still, the CFTC investigation apparently isn’t limited to possible manipulation of swap prices by monkeying around with ISDAfix. According to reports, the commission is also looking at whether or not employees at ICAP may have intentionally delayed publication of swap prices, which in theory could give someone (bankers, cough, cough) a chance to trade ahead of the information.
Swap prices are published when ICAP employees manually enter the data on a computer screen called “19901.” Some 6,000 customers subscribe to a service that allows them to access the data appearing on the 19901 screen.
The key here is that unlike a more transparent, regulated market like the New York Stock Exchange, where the results of stock trades are computed more or less instantly and everyone in theory can immediately see the impact of trading on the prices of stocks, in the swap market the whole world is dependent upon a handful of brokers quickly and honestly entering data about trades by hand into a computer terminal.
Any delay in entering price data would provide the banks involved in the transactions with a rare opportunity to trade ahead of the information. One way to imagine it would be to picture a racetrack where a giant curtain is pulled over the track as the horses come down the stretch – and the gallery is only told two minutes later which horse actually won. Anyone on the right side of the curtain could make a lot of smart bets before the audience saw the results of the race.
At ICAP, the interest-rate swap desk, and the 19901 screen, were reportedly controlled by a small group of 20 or so brokers, some of whom were making millions of dollars. These brokers made so much money for themselves the unit was nicknamed “Treasure Island.”
Already, there are some reports that brokers of Treasure Island did create such intentional delays. Bloomberg interviewed a former broker who claims that he watched ICAP brokers delay the reporting of swap prices. “That allows dealers to tell the brokers to delay putting trades into the system instead of in real time,” Bloomberg wrote, noting the former broker had “witnessed such activity firsthand.” An ICAP spokesman has no comment on the story, though the company has released a statement saying that it is “cooperating” with the CFTC’s inquiry and that it “maintains policies that prohibit” the improper behavior alleged in news reports.
The idea that prices in a $379 trillion market could be dependent on a desk of about 20 guys in New Jersey should tell you a lot about the absurdity of our financial infrastructure. The whole thing, in fact, has a darkly comic element to it. “It’s almost hilarious in the irony,” says David Frenk, director of research for Better Markets, a financial-reform advocacy group, “that they called it ISDAfix.”
After scandals involving libor and, perhaps, ISDAfix, the question that should have everyone freaked out is this: What other markets out there carry the same potential for manipulation? The answer to that question is far from reassuring, because the potential is almost everywhere. From gold to gas to swaps to interest rates, prices all over the world are dependent upon little private cabals of cigar-chomping insiders we’re forced to trust.
“In all the over-the-counter markets, you don’t really have pricing except by a bunch of guys getting together,” Masters notes glumly.
That includes the markets for gold (where prices are set by five banks in a Libor-ish teleconferencing process that, ironically, was created in part by N M Rothschild & Sons) and silver (whose price is set by just three banks), as well as benchmark rates in numerous other commodities – jet fuel, diesel, electric power, coal, you name it. The problem in each of these markets is the same: We all have to rely upon the honesty of companies like Barclays (already caught and fined $453 million for rigging Libor) or JPMorgan Chase (paid a $228 million settlement for rigging municipal-bond auctions) or UBS (fined a collective $1.66 billion for both muni-bond rigging and Libor manipulation) to faithfully report the real prices of things like interest rates, swaps, currencies and commodities.
All of these benchmarks based on voluntary reporting are now being looked at by regulators around the world, and God knows what they’ll find. The European Federation of Financial Services Users wrote in an official EU survey last summer that all of these systems are ripe targets for manipulation. “In general,” it wrote, “those markets which are based on non-attested, voluntary submission of data from agents whose benefits depend on such benchmarks are especially vulnerable of market abuse and distortion.”
Translation: When prices are set by companies that can profit by manipulating them, we’re fucked.
“You name it,” says Frenk. “Any of these benchmarks is a possibility for corruption.”
The only reason this problem has not received the attention it deserves is because the scale of it is so enormous that ordinary people simply cannot see it. It’s not just stealing by reaching a hand into your pocket and taking out money, but stealing in which banks can hit a few keystrokes and magically make whatever’s in your pocket worth less. This is corruption at the molecular level of the economy, Space Age stealing – and it’s only just coming into view.
Will we ever learn the full truth about the Boston Marathon bombing? Personally, I have been looking into this attack for days, and I just keep coming up with more questions than answers. At this point, I honestly have no idea what really happened. Why was a bomb drill being held on the day of the attack? Why have authorities denied that a bomb drill was taking place? Were Tamerlan and Dzhokhar Tsarnaev acting alone? What was the nature of their previous contacts with the FBI and other federal agencies? Why did the FBI at first deny that they had been in contact with the Tsarnaev brothers previously? Why was the investigation of a mysterious Saudi national with familial links to al-Qaeda suddenly dropped shortly after the Saudi ambassador held an unscheduled meeting with Barack Obama? Why did Michelle Obama subsequently visit that mysterious Saudi national in the hospital? If you are looking for answers to these questions, I am afraid that I don’t have them at this point. But what alarms me is that the mainstream media seems to be afraid to ask any of the hard questions that they should be asking. They just seem to swallow whatever the authorities tell them hook, line and sinker without following up on any of the things in this case that simply do not seem to make sense.
So what kinds of questions should they be asking? The following are 17 unanswered questions about the Boston Marathon bombing that the media appears to be afraid to ask…
#1 Why were runners being told that a bomb squad drill was taking place during the Boston Marathon? The following is from an article by Natural News…
Alastair Stevenson is a veteran marathon runner who has competed in dozens of marathons around the world, including the London Marathon. He’s very familiar with the security typically found at marathons, and he immediately noticed something odd about the Boston marathon security.
“They kept making announcements on the loud speaker that it was just a drill and there was nothing to worry about. It seemed like there was some sort of threat, but they kept telling us it was just a drill,” he was quoted as saying by Local15TV.com.
In the interview, you’ll hear Stevenson say:
“At the start at the event, at the Athlete’s Village, there were people on the roof looking down onto the Village at the start. There were dogs with their handlers going around sniffing for explosives, and we were told on a loud announcement that we shouldn’t be concerned and that it was just a drill. And maybe it was just a drill, but I’ve never seen anything like that — not at any marathon that I’ve ever been to. You know, that just concerned me that that’s the only race that I’ve seen in my life where they had dogs sniffing for explosions, and that’s the only place where there had been explosions.”
#2 Why did authorities deny that a bomb squad drill was being held?
#3 According to The Mirror, the FBI is reportedly “hunting” a 12-strong terrorist “sleeper cell” that Tamerlan and Dzhokhar Tsarnaev were allegedly a part of…
A source close to the investigation said: “We have no doubt the brothers were not acting alone. The devices used to detonate the two bombs were highly sophisticated and not the kind of thing people learn from Google.
“They were too advanced. Someone gave the brothers the skills and it is now our job to find out just who they were. Agents think the sleeper cell has up to a dozen members and has been waiting several years for their day to come.”
If that is the case, why are authorities in Boston adamantly insisting that the two brothers were acting alone?
#4 CBS News is reporting that the FBI interviewed Tamerlan Tsarnaev back in 2011. The mother of the two Tsarnaev brothers insists that the FBI had been in contact with them for up to five years. At first, the FBI denied any previous contact with the two suspects. Will we ever learn the true scope of the previous relationship between the FBI and the Tsarnaev brothers?
#5 Debka is reporting that the Tsarnaev brothers were “double agents” which had been “hired by US and Saudi intelligence to penetrate the Wahhabi jihadist networks which, helped by Saudi financial institutions, had spread across the restive Russian Caucasian.” Could this possibly be true? If so, will the American people be told the truth about these links?
#6 According to their uncle, there were “mentors” that “radicalized” the Tsarnaev brothers. So precisely who were those “mentors”?
#8 Were the Tsarnaev brothers in contact with a rebel leader named Doku Umarov who is known as “Russia’s Bin Laden”?
#9 Did Tamerlan Tsarnaev post a video on YouTube last summer that expresses a belief that the 12th Imam, Mahdi, will soon come and that an Islamic army with black flags with arise out of a province in Iran known as Khorasan?
#10 Why aren’t we being told that the “pressure cooker bombs” used in the Boston Marathon attacks are very similar to the kind of pressure cooker bombs that are commonly used in the Middle East?…
The Daily Beast has confirmed with U.S. counter-terrorism officials that the bombs placed Monday at the marathon were made from pressure cookers, a crude kind of explosive favored by insurgents in Pakistan and Afghanistan. A recipe for a bomb that uses the pressure cooker was part of the debut issue of Inspire, the English-language online magazine of al Qaeda in the Arabian Peninsula.
#11 Initially we were told that Saudi national Abdulrahman Ali Alharbi was a “person of interest” in the case. But now he is scheduled to leave the country with the full blessing of the U.S. government. Why is there such a rush to get him out of the United States?
#12 Why aren’t we being told that Abdulrahman Ali Alharbi was photographed with two other Saudis in the vicinity of the Boston marathon bombings?
#13 Why aren’t we being told of the shocking familial links that Abdulrahman Ali Alharbi has to known members of al-Qaeda? The following is from research complied by Walid Shoebat…
Many from Al-Harbi’s clan are steeped in terrorism and are members of Al-Qaeda. Out of a list of 85 terrorists listed by the Saudi government shows several of Al-Harbi clan to have been active fighters in Al-Qaeda:
#15 Badr Saud Uwaid Al-Awufi Al-Harbi
#73 Muhammad Atiq Uwaid Al-Awufi Al-Harbi
#26 Khalid Salim Uwaid Al-Lahibi Al-Harbi
#29 Raed Abdullah Salem Al-Thahiri Al-Harbi
#43 Abdullah Abdul Rahman Muhammad Al-Harbi (leader)
#60 Fayez Ghuneim Humeid Al-Hijri Al-Harbi
Source: http://aalhameed1.net/vb/showthread.php?t=1565
There are specific Saudi clans that are rife with members of Al-Qaeda, which makes it quite alarming as to why nearly a hundred thousand student visas are issued to these. Americans are clueless as to clan ties when it comes to terrorism.
#14 Why did U.S. Secretary of State John Kerry have a private meeting with a Saudi foreign minister shortly after Abdulrahman Ali Alharbi was identified as a potential suspect?
#15 Why did Barack Obama hold an unscheduled meeting with the ambassador from Saudi Arabia shortly after Abdulrahman Ali Alharbi was identified as a potential suspect?
#16 Why did Michelle Obama visit Abdulrahman Ali Alharbi in the hospital?
#17 Why did numerous mainstream media outlets openly suggest that “right-wing extremists” were behind the bombings in the immediate aftermath of the attack?
Many documents produced by the U.S. government are confidential and not released to the public for legitimate reasons of national security. Others, however, are kept secret for more questionable reasons. The fact that presidents and other government officials have the power to deem materials classified provides them with an opportunity to use national security as an excuse to suppress documents and reports that would reveal embarrassing or illegal activities.
I’ve been collecting the stories of unreleased documents for several years. Now I have chosen 11 examples that were created—and buried—by both Democratic and Republican administrations and which cover assassinations, spying, torture, 50-year-old historical events, presidential directives with classified titles and…trade negotiations.
1. Obama Memo Allowing the Assassination of U.S. Citizens
When the administration of George W. Bush was confronted with cases of Americans fighting against their own country, it responded in a variety of ways. John Walker Lindh, captured while fighting with the Taliban in December 2001, was indicted by a federal grand jury and sentenced to 20 years in prison. José Padilla was arrested in Chicago in May 2002 and held as an “enemy combatant” until 2006 when he was transferred to civilian authority and, in August 2007, sentenced to 17 years in prison for conspiring to support terrorism. Adam Gadahn, who has made propaganda videos for al-Qaeda, was indicted for treason in 2006 and remains at large.
After he took over the presidency, Barack Obama did away with such traditional legal niceties and decided to just kill some Americans who would previously have been accused of treason or terrorism. His victims have included three American citizens killed in Yemen in 2011 by missiles fired from drones: U.S.-born anti-American cleric Anwar al-Awlaki, Samir Khan, an al-Qaeda propagandist from North Carolina, and Awlaki’s 16-year-old son, Abdulrahman al-Awlaki.
Obama justified his breach of U.S. and international law with a 50-page memorandum prepared by the Justice Department’s Office of Legal Counsel. Attorney General Eric Holder argued that the killing of Awlaki was legal because he was a wartime enemy and he could not be captured, but the legal justification for this argument is impossible to confirm because the Obama administration has refused to release the memo.
2. The Obama Interpretation of Section 215 of the Patriot Act
Section 215 of the Patriot Act allows the FBI, in pursuit of spies and terrorists, to order any person or entity to turn over “any tangible things” without having to justify its demands by demonstrating probable cause. For example, a library can be forced to reveal who borrowed a book or visited a web site. According to Section 215, the library is prohibited from telling anyone what it has turned over to the FBI.
The Obama administration has created a secret interpretation of Section 215 that goes beyond the direct wording of the law to include other information that can be collected. Democratic Senator Ron Wyden of Oregon, who, as a member of the Senate Intelligence Committee, was briefed about this secret interpretation, urged the president to make it public. “I want to deliver a warning this afternoon,” he said. “When the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry.”
Wyden and Sen. Mark Udall of Colorado, also a Democrat, have implied that the Obama administration has expanded the use of Section 215 to activities other than espionage and terrorism. In a letter to Attorney General Eric Holder, Wyden and Udall wrote that “there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows. This is a problem, because it is impossible to have an informed public debate about what the law should say when the public doesn’t know what its government thinks the law says.” 3. 30-page Summary of 9/11 Commission Interview with Bush and Cheney
You would have thought that, in the interests of the nation, the Bush administration would have demanded a thorough investigation of the terrorist attacks of September 11, 2001, the deadliest assault ever on U.S. soil. Instead, they fought tooth and nail against an independent investigation. Public pressure finally forced President George W. Bush to appoint a bipartisan commission that came to be known as the 9/11 Commission. It was eventually given a budget of $15 million…compared to the $39 million spent on the Monica Lewinsky/Bill Clinton investigation. When the commission completed its work in August 2004, the commissioners turned over all their records to the National Archives with the stipulation that the material was to be released to the public starting on January 2, 2009. However, most of the material remains classified. Among the more tantalizing still-secret documents are daily briefings given to President Bush that reportedly described increasingly worried warnings of a possible attack by operatives of Osama bin Laden.
Another secret document that the American people deserve to see is the 30-page summary of the interview of President Bush and Vice-President Dick Cheney conducted by all ten commissioners on April 29, 2004. Bush and Cheney refused to be interviewed unless they were together. They would not testify under oath and they refused to allow the interview to be recorded or transcribed. Instead the commission was allowed to bring with them a note taker. It is the summary based on this person’s notes that remains sealed.
4. Memos from President George W. Bush to the CIA Authorizing Waterboarding and other Torture Techniques
Four days after the terrorist attacks of September 11, 2001, President George W. Bush signed a “memorandum of notification” (still secret) that authorized the CIA to do what it needed to fight al-Qaeda. However the memo did not address what interrogation and torture techniques could be used on captured suspects. By June 2003, Director George Tenet and others at the CIA were becoming worried that if their seemingly illegal tactics became known to the public, the White House would deny responsibility and hang the CIA out to dry. After much discussion, Bush’s executive office handed over two memos, one in 2003 and another in 2004, confirming White House approval of the CIA interrogation methods, thus giving the CIA “top cover.” It is not known if President Bush himself signed the memos.
5. 1,171 CIA Documents Related to the Assassination of President Kennedy
It’s been 49 years since President John F. Kennedy was shot to death in Dallas, yet the National Archives and Records Administration (NARA) insists that more than one thousand documents relating to the case should not be released to the public until NARA is legally required to do so in 2017…unless the president at that time decides to extend the ban. It would appear that some of the blocked material deals with the late CIA agent David Phillips, who is thought to have dealt with Lee Harvey Oswald in Mexico City six weeks before the assassination.
6. Volume 5 of the CIA’s History of the Bay of Pigs Fiasco
In the late 1970s and early 1980s, CIA historian Dr. Jack B. Pfeiffer compiled a multi-volume history of the failed US attempt to invade Cuba in April 1961. In August 2005, the National Security Archive at George Washington University, citing the Freedom of Information Act, requested access to this history. The CIA finally released the information almost six years later, in July 2011. However it refused to release Volume V, which is titled “CIA’s Internal Investigation of the Bay of Pigs Operations.” Although more than 50 years have passed since the invasion, the U.S. District Court for the District of Columbia ruled that Volume V is exempt from the Freedom of Information Act because it “is covered by the deliberative process privilege” which “covers documents reflecting advisory opinions, recommendations and deliberations comprising part of a process by which governmental decisions and policies are formulated.”
7. National Security Decision Directives with Classified Titles
The day before he left the White House on January 20, 1993, President George H. W. Bush issued National Security Directive (NSD) #79, a document so secret that even its title remains classified almost 20 years later. The same goes for National Security Directive #77, issued a few days earlier, as well as four others issued in 1989 (#11, 13a, 19a and 25a). If the “a”s are any indication of the subjects, it is worth noting that NSD 13 dealt with countering cocaine trafficking in Peru; NSD 19 dealt with Libya and NSD 25 with an election in Nicaragua.
President Ronald Reagan also issued six NSDs with classified titles, and President Bill Clinton issued 29. President George W. Bush issued two such NSDs, presumably shortly after the terrorist attacks of September 11, 2001. President Barack Obama has issued at least seven Presidential Policy Directives with classified titles.
8. Major General Douglas Stone’s 700-Page Report on Prisoners Held in Afghanistan
Marine Corps General Douglas Stone earned positive reviews for his revamping of detention operations in Iraq, where he determined that most of the prisoners held by the United States were not actually militants and could be taught trades and rehabilitated. Based on his success in Iraq, Stone was given the task of making an evaluation of detainee facilities in Afghanistan. His findings, conclusions and recommendations were included in a 700-page report that he submitted to the U.S. Central Command in August 2009. According to some accounts of the report, Stone determined that two-thirds of the Afghan prisoners were not a threat and should be released. However, three years after he completed it, Stone’s report remains classified.
9. Detainee Assessment Briefs for Abdullah Tabarak and Abdurahman Khadr
In 2011, WikiLeaks released U.S. military files known as Detainee Assessment Briefs (DABs), which describe the cases of 765 prisoners held at Guantánamo Bay. However, there were actually 779 prisoners. So what happened to the files for the other fourteen? Andy Worthington, author of The Guantanamo Files, has noted that two of the fourteen missing stories are especially suspicious: those of Abdullah Tabarak and Abdurahman Khadr.
Tabarak, a Moroccan, was allegedly one of Osama bin Laden’s long-time bodyguards, and took over bin Laden’s satellite phone in order to draw U.S. fire to himself instead of to bin Laden when U.S. forces were chasing the al-Qaeda leader in the Tora Bora mountains in December 2001. Captured and sent to Guantánamo, Tabarak was mysteriously released, sent back to Morocco in July 2003, and set free shortly thereafter.
Abdurahman Khadr, the self-described “black sheep” of a militant family from Canada, was 20 years old when he was captured in Afghanistan and turned over to American forces. He has said that he was recruited by the CIA to become an informant at Guantánamo and then in Bosnia. When the CIA tried to send him to Iraq, he refused and returned to Canada. His younger brother, Omar, was 15 years old when he was captured in Afghanistan and accused of killing an American soldier, Sergeant First Class Christopher Speer, during a firefight. He was incarcerated at Guantánamo for almost ten years until he was finally released to Canadian custody on September 29, 2012.
10. FBI Guidelines for Using GPS Devices to Track Suspects
On January 23, 2012, in the case of United States v. Jones, the Supreme Court ruled unanimously that attaching a GPS device to a car to track its movements constitutes a “search” and is thus covered by the Fourth Amendment protecting Americans against “unreasonable searches and seizures.” But it did not address the question of whether the FBI and other law enforcement agencies must obtain a warrant to attach a GPS device or whether it is enough for an agent to believe that such a search would turn up evidence of wrongdoing.
A month later, at a symposium at the University of San Francisco, FBI lawyer Andrew Weissman announced that the FBI was issuing two memoranda to its agents to clarify how the agency would interpret the Supreme Court decision. One memo dealt with the use of GPS devices, including whether they could be attached to boats and airplanes and used at international borders. The second addressed how the ruling applied to non-GPS techniques used by the FBI.
The ACLU, citing the Freedom of Information Act, has requested publication of the two memos because they “will shape not only the conduct of its own agents but also the policies, practices and procedures of other law enforcement agencies—and, consequently, the privacy rights of Americans.”
11. U.S. Paper on Negotiating Position on the Free Trade Agreement of the Americas
The subject of international trade negotiations is one that makes most people’s eyes glaze over. So why is the Obama administration fighting so hard to keep secret a one-page document that relates to early negotiations regarding the Free Trade Agreement of the Americas (FTAA), an accord that was proposed 18 years ago and about which public negotiations ended in 2005? All we know is that the document “sets forth the United States’ initial proposed position on the meaning of the phrase ‘in like circumstances.’” This phrase “helps clarify when a country must treat foreign investors as favorably as local or other foreign investors.”
Responding to a Freedom of Information Act lawsuit filed by The Center for International Environmental Law, DC District Judge Richard W. Roberts ordered the Office of the United States Trade Representative (USTR) to release the document, but the Obama administration has refused, claiming that disclosure “reasonably could be expected to result in damage to the national security” because all the nations involved in the failed negotiations agreed to keep all documents secret until December 31, 2013…“unless a country were to object to the release of one of its own documents at that time.” Judge Roberts ruled that the USTR has failed to present any evidence that release of the document would damage national security.
Most likely, the Obama administration is afraid that release of the document would set a precedent that could impede another secret trade negotiation, the Trans-Pacific Partnership (TPP), also known as the Trans-Pacific Strategic Economic Partnership Agreement, which seeks to establish a free trade zone among the U.S., New Zealand, Chile, Singapore, Brunei, Australia, Peru, Vietnam, Malaysia and possibly Canada, Mexico and Japan.
New details have emerged that shed light on the chaos that embroiled the Benghazi mission on 9/11/2012 that led to the murder of Ambassador Christopher Stevens and three other Americans at the hands of the very anti-Qaddafi rebels that Stevens formally liaised with for the CIA.
It wasn’t a secret that Ambassador Christopher Stevens played a key role in Libya’s “Arab Spring.” During the course of the revolution that ultimately toppled Muammar Qaddafi, Stevens’ built a relationship with the Libyan rebels and it’s this experience that made him the frontrunner for the Libyan ambassadorship. Stevens’ history of working with Libyan radicals provided the perfect opportunity for the Obama administration to covertly move newly purchased weapons from Libya’s freedom fighters to Syrian insurgents via ships through Turkey.
In March 2011 Stevens became the official U.S. liaison to the al-Qaeda-linked “Libyan opposition, working directly with Abdelhakim Belhadj of the Libyan Islamic Fighting Group—a group that has now disbanded, with some fighters reportedly participating in the attack that took Stevens’ life.”
Former CIA officer Clare Lopez said, “That means Stevens was authorized by the U.S. Department of State and the Obama administration to aid and abet individuals and groups that were, at a minimum, allied ideologically with al-Qaeda, the jihadist terrorist organization that attacked the homeland on the first 9/11, the one that’s not supposed to exist anymore after the killing of its leader, Osama bin Laden, on May 2, 2011.”
Obama’s weapon buyback program in Libya
Couple this with the weapon buyback program offered by the Obama administration and there’s a recipe for catastrophe.
Shortly after the October 2011 death of Qaddafi, Secretary of State Hillary Clinton announced in Tripoli that the U.S. was committing $40 million to help Libya “secure and recover its weapons stockpiles.” Department of State Assistant Secretary Andrew Shapiro confirms DOS had a weapons buy-back program in Libya that was also supported by the UK who gave $1.5 million, the Netherlands gave $1.2 million, Germany gave about $1 million and our neighbor to the north, Canada gave $1.6 million to purchase the deadly arsenal that went missing after the fall of Qaddafi.
The State Department was specifically looking to acquire the 20,000 MANPADS (they are commonly known as man-portable air shoulder-fire missiles) that went missing once Qaddafi was killed.
State Department Assistant Secretary, for Political-Military affairs, Andrew Shapiro said, they did not know how many MANPADs remained missing, but admitted it was a significant number.
“Many militia groups remain reluctant to relinquish them,” Shapiro said. He did say that the U.S. has recovered about 5,000 MANPADs earlier this year.
Repeated calls and emails went unanswered to the State Department and Shapiro regarding an update on the weapon buyback program as well as what the State Department did with the weapons they purchased.
Russia and China complained of U.S. arms trafficking in Syria
Another curious piece to this puzzle is Russia. Did they have a part to play inside Benghazi and was presidential contender, Mitt Romney right that Russia remains a threat to the U.S.? (Story by this reporter here)
The Russian response, under former KGB Cold War foe Valdimir Putin, who was visibly incensed last fall when a jubilant crowd of rebels murdered his ally, Muammar Qaddafi, has described the event as “repulsive and disgusting.”
Shortly after the death of U.S. ambassador in Libya, numerous Russian commentators used social media to describe their position on the destabilization in Libya.
“The democratized residents of Libya thanked the staff of the American Embassy for its support,” one Tweet read. “This is what you call exporting democracy, it seems. America gives Libya a revolution, and Libyans, in return, kill the ambassador.”
Aleksei K. Pushkov, the head of Russia’s parliamentary Foreign Affairs Committee, wrote via Twitter: “Under Qaddafi they didn’t kill diplomats. Obama and Clinton are in shock? What did they expect – ‘Democracy?’ Even bigger surprises await them in Syria,” aNew York Times story read in September.
It is no secret that Putin disagreed with the West’s view of Syrian ruler Assad. When Putin was Prime Minister, he delivered a scathing criticism of the Libya bombing by NATO and left the impression that under his leadership it would have never happened.
It’s also worth pointing out that Russia and China have consistently opposed any military intervention in Syria. Russia and its allies have repeatedly warned the West that efforts to aid Syrian rebels would only bring more bloodshed to an already embattled region. Also, the Russians have been demanding a cessation of U.S. aid to the Syrian rebels fighting President Assad, again noting that any military aid would destabilizes the entire region, and could have serious economic consequences for Russia.
Even Russian Foreign Minister Sergei Lavrov cautioned the West against arming the Syrian rebels. However, theArab Times news agency said, “Western officials say that Russia’s vetoes have abetted the Syrian violence by encouraging Assad to pursue an offensive with his Russian-supplied armed forces to crush the popular revolt. Saudi Arabia and Qatar are believed to have funded arms shipments.”
Case in point, in late August Russia said there was increasing evidence that Syrian rebels were procuring large numbers of Western-made weapons. They even suggested that America and other EU countries were spurring the violence in Syria.
So was Benghazi a message delivered by the Russians to end U.S. gun-running by executing Ambassador Stevens, the kingpin between the armed groups, the Libya stockpiles, and the shipments to Turkey?
Reports are abundant and U.S. acknowledged guns went to Al Qaeda
Despite evidence to the contrary, a State Department spokeswoman rejected the idea of arms trafficking, saying Ambassador Stevens was in Benghazi for diplomatic meetings, and the opening of a new cultural center.
The State Department response rings hollow, however, since the Times of London reported that a Libyan Al Entisar ship was found carrying at least 400 tons of cargo. “Some of it was humanitarian, but also reportedly weapons, described by the report as the largest consignment of weapons headed for Syria’s rebels on the frontlines.”
Middle East expert, Walid Phares confirmed the ship was carrying “a lot of weapons.”
Also former CIA Director Porter Goss told Fox News that some of the weapons from the Libya uprising are making their way to Syria. Goss claimed that the U.S. intelligence is aware of the networking given their presence in Benghazi and throughout the region.
“I think there’s no question that there’s a lot of networking going on. And … of course we know it,” he said. Unfortunately, many of those weapons shipped through Turkey to Syria ended up in the hands of al-Qaeda.
Not so long ago, America armed the Taliban with shoulder-fire missiles to fight a proxy war against the Russians only to find those weapons being used to kill Americans during the “war on terror.” This illustrates once again that arming enemies is never a good idea.
Middle East experts contend the Muslim Brotherhood and its proxy, Libyan Islamic Fighting Group (LIFG) leader Abdulhakim Belhadj, were in direct contact with Stevens and provided information as to which rebel groups in Libya and Syria deserved American trust and more importantly, weapons.
Proof comes from the 2010 classified cablefrom Stevens that read in part: “Development Foundation brokered talks with imprisoned members of the Libyan Islamic Fighting Group (LIFG) that led to the release earlier this year of about 130 former LIFG members. The GOL (Government of Libya) considers the program an important means to signal willingness to reconcile with former enemies, a significant feature of Libya’s tribal culture.”
The Business Insider wrote a story focusing on the export of fighters. “If the new Libyan government was sending seasoned Islamic fighters and 400 tons of heavy weapons to Syria through a port in southern Turkey—a deal brokered by Stevens’ primary Libyan contact during the Libyan revolution—then the governments of Turkey and the U.S. surely knew about it.
Another portion of the 2010 classified cable says, “Libya also cooperates closely with Syria, particularly on foreign fighter flows. Syria has transferred over 100 Libyan foreign fighters to the GOL’s custody over the past two years, including a tranche of 27 in late 2007. Our assessment is that the flow of foreign fighters from Libya to Iraq and the reverse flow of veterans to Libya has diminished due to the GOL’s cooperation with other states and new procedures. Counter-terrorism cooperation is a key pillar of the U.S.-LIBYA bilateral relationship and a shared strategic interest.”
Crowds outside Benghazi mission were presumed buy-back customers
It’s been months since the 9/11 Benghazi attack and no official conclusions have been released. After last week’s Congressional closed-door intelligence briefing, many lawmakers emerged wondering why Ambassador Stevens was not more concerned with the growing boisterous rebel crowd outside the mission’s gates shortly before the attack that would kill him?
Retired Army Lieutenant Colonel and Defense Intelligence Agency operative Anthony Shaffer says he knows the answer. “The Ambassador was expecting a weapon buyback deal shortly before the attack. That knowledge played a role in the slow response and created the initial confusion in Benghazi.”
U.S. rendered no aid to Stevens despite President’s “render all aid” order
While there was no shortage of second-guessing in the White House Situation Room, military leaders in charge of quick response teams a half-a-world away sprang into action upon receipt of the consulate’s 911 call and readied the troops for a real-world rescue.
“As the events were unfolding, the Pentagon began to move special operations forces from Europe to Sigonella Naval Air Station in Sicily. U.S. aircraft routinely fly in and out of Sigonella and there are also fighter jets based in Aviano, Italy. But while the U.S. military was at a heightened state of alert because of 9/11, there were no American forces poised and ready to move immediately into Benghazi when the attack began,” the Military Timesreported.
It’s also been reported that on the fateful day in Libya, CIA/SEALs had a laser target trained on the enemy firing mortar rounds at the compound. The Pentagon has listed numerous explanations as to why the trained SEALs would use the lasers. However, they conveniently omitted the key component—the expectation that U.S. help was seconds away. The “fog of spin” from the Obama administration, no matter how creative, cannot conceal the truth. If fighter aircraft were dispatched to assist Ambassador Chris Stevens and other consulate personnel, a former Naval pilot says, “The paper trail would be a mile long. Not only do the pilots have to file logbook reports, but the ground crew, the crew arming the jets with appropriate weapons and the Italian air controllers would have exhaustive records.”
The President told a KUSA Denver reporter that the minute he found out about the Benghazi attack he directed all available diplomatic and military resources to secure American consular personnel.
Unfortunately for the CIA/SEALs fighting off the Ansar al-Shariah terrorists, the jets would never arrive. The fact, CIA/SEALs were painting their lasers on the enemy targets shortly after midnight, five hours before their eventual deaths, indicates they were expecting air support. And why would they be waiting for air support? Because the trained SEALs knew the oplans (operations plans) and military protocol for this exact operation once they requested the assistance.
U.S. did not undertake an immediate FBI investigation as in USS Cole attack
“There is clear precedence for conducting an investigation into this type of terrorist attack – we faced similar circumstance with the terrorist attack on the USS Cole in October of 2000 in Aden, Yemen,” Shaffer described. “We had to work rapidly to put a qualified team on the ground to investigate one of the most severe acts of terror in the pre-9/11 era. Many of the perpetrators of this attack were eventually killed, captured or eliminated via Predator drone strikes… but in the case of the Benghazi attack there HAS NOT been a rapid or expansive effort made by this White House to establish a clear path forward and begin the hard work of bringing justice to those who died and those who attacked and looted the weapons from the CIA annex -weapons that include Surface to Air missiles that can be used to down civilian airliners.”
The FBI’s own press information concerning the response to the USS Cole bombing in 2000 highlights some key differences between the Benghazi incident and Yemen.
“We quickly sent to Yemen more than 100 agents from our Counterterrorism Division, the FBI Laboratory, and various field offices. Director Louis Freeh arrived soon after to assess the situation and to meet with the President of Yemen. On November 29, a guidance document was signed between the U.S. State Department and the Yemeni government setting protocols for questioning witnesses and suspects. FBI and Yemeni investigators proceeded with interviews, and a large amount of physical evidence was shipped back to the FBI Laboratory for examination.”
So what is the difference between the attack in Yemen against the USS Cole and the terror attack in Benghazi? Shaffer says, “CIA.”
“The CIA and State Department worked to keep FBI out of Benghazi because they knew as soon as the FBI showed up, an aggressive investigation would reveal the details of the CIA mistakes and wrongdoings.”
Was Ambassador Stevens still a CIA agent?
Speculation is nothing new inside the beltway, but several questions surround Ambassador Chris Stevens real/past employer. If he were working as a CIA agent he would be in violation of international diplomatic protocols by running an arms trafficking program under diplomatic cover.
Judge Napolitano offered this scenario to the Washington Times. “Now we can connect some dots. If Stevens was a CIA agent, he was in violation of international law by acting as the U.S. ambassador. And if he and his colleagues were intelligence officials, they are not typically protected by Marines, because they ought to have been able to take care of themselves.”
Further ties to the intelligence world comes from a 2010 leaked Wikileaks classified cable that highlights the topics Mr. Stevens would be discussing to assist Libyans full reintegration to the international community.
The main issues include; Internal political issues, bilateral relations, human rights, counter-terrorism cooperation, Sub-Saharan Africa, regional issues including Iraq and Iran, and energy sector and commercial opportunities.
In the classified cable Stevens describes Libya as a “strong partner in the war against terrorism and cooperation in liaison channels is excellent…Worried that fighters returning from Afghanistan and Iraq could destabilize the regime, the GOL has aggressively pursued operations to disrupt foreign fighter flows, including more stringent monitoring of air/land ports of entry, an blunt the ideological appeal of radical Islam.”
However, since this explanation lends itself to possible criminal actions requiring jail time, and since the CIA doesn’t post a roster of their agents, American’s will undoubtedly remain in the dark.
Congressional hearings have produced no info on the Benghazi attack
Compelling evidence names the Benghazi’s mission as the headquarters for another U.S. arms trafficking business deal gone wrong. The mission is also the scene where U.S. Ambassador Chris Stevens, two former SEALs and one State Department Information Officer were murdered.
Keeping that statement in mind, the Benghazi disaster takes a new angle, one that could have derailed President Obama’s reelection.
Normally international gun trafficking is a punishable crime, but sadly, not only is Benghazi, Libya another U.S. sanctioned-weapons buyback program paying jihadist large sums of money to turn in their stolen arsenal, but it appears that Ambassador Stevens acted as a point man to move those newly-repurchased weapons into the hands of Syrian rebels, many of whom are affiliated with al-Qaeda.
This made for Hollywood movie script includes all the action, violence and drama required for today’s bloodthirsty audience—except it is real. The State Department provided the Benghazi mission with the diplomatic cover, or the comprehensive alibi, required for the Central Intelligence Agency to operate covertly in the jihadi-rich North African region.
If this is true, one could conclude that the attack on the Benghazi mission was a counterinsurgency operation launched by terrorists that opposed another American-installed government in the Middle East.
Conclusion
Other than closed-door hearing leaks from members of Congress, American citizens are still no closer to learning what exactly happened in Benghazi. Nor are they privy to “why” the terrorist organization that worked with the U.S., specifically Ambassador Stevens, would turn their weapons on the mission.
Perhaps Secretary of State Hillary Clinton will provide more details when she testifies before the House and Senate later this month. However most politicos agree she will provide more “fog of spin” the Obama administration is standing by.
The only new update is the arrest of a suspected terrorist this weekend in Egypt.
Most major media outlets reported that Egyptians detained Muhammad Jamal Abu Ahmad, a former Egyptian jihad member that was released from prison in 2011. It’s alleged that he is the leader of Jamal network that operates terror-training camps in Egypt and Libya and who wanted to set up al-Qaeda inside Egypt. But like everything connected to Benghazi, U.S. officials haven’t been cleared to interrogate convicted terrorist who may be responsible for the death of four Americans.