Dick Morris: Bill Clinton Personally Orchestrated the 1993 Waco, Texas Tragedy

Dick Morris: Bill Clinton Personally Orchestrated the 1993 Waco, Texas Tragedy

It looks like somebody is going to have to update the Waco Siege page on Wikipedia. Apparently the whitewashed history that former President Bill Clinton would like us to believe regarding the 1993 federal assault on the Branch Davidian compound in Waco, Texas, is missing important details regarding his own personal involvement.

In response to Bill Clinton’s highly publicized linking of the Tea Party movement to the 1995 Oklahoma City bombing in an op-ed piece for the New York Times, former Clinton adviser Dick Morris disclosed on Monday that it was Clinton himself, and not Attorney General Janet Reno, as Americans have been led to believe for the past 17 years, who called the shots during the 1993 botched invasion that led to the death of seventy-six people.

Speaking on the Hannity program on the Fox News Network, Morris criticized Clinton for his Oklahoma City comments: “Let’s understand what was Timothy McVeigh’s motivation …he himself had said that it was the reaction to the Waco takeover. Bill Clinton orchestrated that takeover.”

Morris went on to say, “Clinton in fact was so ashamed about what he did in Waco that he was not going to appoint Janet Reno to a second four-year term. She told him in a meeting right before the inauguration day … ‘If you don’t appoint me I’m going to tell the truth about Waco.’ And that forced Clinton’s hand … It’s never been said (publicly) before.”

For years, Clinton has been criticized for his leadership of the federal government during the Waco crisis, but he has managed to escape personal responsibility for the tragedy. With Morris’s statements, it appears this may no longer be possible. It would seem that Clinton was far more intimately involved with the government response at Waco than previously reported.

While there may be a link between Clinton and the Oklahoma City bombing, I would hardly blame the actions of a psychopath on any one individual or political party.

However, for Clinton to associate such a horrible act of violence with freedom loving Americans, especially given the fact that he must be fully aware that it was his decisions that led to the Waco catastrophe which in turn inspired Timothy McVeigh, is remarkably shameless.

Fred Dardick is the owner and operator of a medical staffing company based in Chicago. Prior to the business world, he worked as a biological researcher at Northwestern University and The University of Chicago. He has BS and MS degrees in biology and maintains a blog at conservativespotlight.com.

Fred can be reached at: [email protected]


Goldman Sachs Bribed Senate To Pass Bailout Bill

Goldman Sachs Bribed Senate To Pass Bailout Bill

 

How much bribe money does it take to transfer $700 Billion taxpayer dollars to Wall Street’s elite?


GOLDMAN SACHS CONTRIBUTIONS:
Obama, Barack (D-IL) $691,930
Clinton, Hillary (D-NY) $468,200
Romney, Mitt (R) $229,675
McCain, John (R-AZ) $208,395
Himes, Jim (D-CT) $114,748
Giuliani, Rudolph W (R) $111,750
Dodd, Christopher J (D-CT) $105,400
Edwards, John (D) $66,450
Specter, Arlen (R-PA) $47,600
Emanuel, Rahm (D-IL) $32,950
Reed, Jack (D-RI) $30,100

How much money did your Represenative get from Big Bankers to look the other way and pass a bill that the American people clearly do not want?

HELP SPREAD THE WORD…
http://www.TakeBackWashington.com
http://www.WashingtonYoureFired.com

You Can Always Get Whatever You Want

You Can Always Get Whatever You Want

It is a spiritual law that the desire to do necessarily implies the ability to do.

You have all read of “Aladdin’s Lamp,” which accomplished such wonderful things. This, of course, is only a fairy story, but it illustrates the fact that man has within him the power, if he is able to use it, to gratify his every wish.

If you are unable to satisfy your deepest longings it is time you learned how to use your God-given powers. You will soon be conscious that you have latent powers within capable when once developed of revealing to you priceless knowledge and unlimited possibilities of success.

Man should have plenty of everything and not merely substance to live on as so many have. All natural desires can be realized. It would be wrong for the Infinite to create wants that could not be supplied. Man’s very soul is in his power to think, and it, therefore, is the essence of all created things. Every instinct of man leads to thought, and in every thought there is great possibility because true thought development, when allied to those mysterious powers which perhaps transcend it, has been the cause of all the world’s true progress.

In the silence we become conscious of “that something” which transcends thought and which uses thought as a medium for expression. Many have glimpses of “that something,” but few ever reach the state where the mind is steady enough to fathom these depths. Silent, concentrated thought is more potent than spoken words, for speech distracts from the focusing power of the mind by drawing more and more attention to the without.

Man must learn more and more to depend on himself; to seek more for the Infinite within. It is from this source alone that he ever gains the power to solve his practical difficulties. No one should give up when there is always the resources of Infinity. The cause of failure is that men search in the wrong direction for success, because they are not conscious of their real powers that when used are capable of guiding them.

The Infinite within is foreign to those persons who go through life without developing their spiritual powers. But the Infinite helps only he who helps himself. There is no such thing as a Special “Providence.” Man will not receive help from the Infinite except to the extent that he believes and hopes and prays for help from this great source.

Concentrate on What You Want and Get It. The weakling is controlled by conditions. The strong man controls conditions. You can be either the conqueror or the conquered. By the law of concentration you can achieve your heart’s desire. This law is so powerful that that which at first seems impossible becomes attainable.

By this law what you at first see as a dream becomes a reality.

Remember that the first step in concentration is to form a Mental Image of what you wish to accomplish. This image becomes a thought-seed that attracts thoughts of a similar nature. Around this thought, when it is once planted in the imagination or creative region of the mind, you group or build associated thoughts which continue to grow as long as your desire is keen enough to compel close concentration.

Form the habit of thinking of something you wish to accomplish for five minutes each day. Shut every other thought out of consciousness. Be confident that you will succeed; make up your mind that all obstacles that are in your way will be overcome and you can rise above any environment.

You do this by utilizing the natural laws of the thought world which are all powerful.

A great aid in the development of concentration is to write out your thoughts on that which lies nearest your heart and to continue, little by little, to add to it until you have as nearly as possible exhausted the subject.

You will find that each day as you focus your forces on this thought at the center of the stream of consciousness, new plans, ideas and methods will flash into your mind. There is a law of attraction that will help you accomplish your purpose. An advertiser, for instance, gets to thinking along a certain line. He has formed his own ideas, but he wants to know what others think. He starts out to seek ideas and he soon finds plenty of books, plans, designs, etc., on the subject, although when he started he was not aware of their existence.

The same thing is true in all lines. We can attract those things that will help us. Very often we seem to receive help in a miraculous way. It may be slow in coming, but once the silent unseen forces are put into operation, they will bring results so long as we do our part. They are ever present and ready to aid those who care to use them. By forming a strong mental image of your desire, you plant the thought-seed which begins working in your interest and, in time, that desire, if in harmony with your higher nature, will materialize.

It may seem that it would be unnecessary to caution you to concentrate only upon achievement that will be good for you and work no harm to another, but there are many who forget others and their rights, in their anxiety to achieve success. All good things are possible for you to have, but only as you bring your forces into harmony with that law that requires that we mete out justice to fellow travelers as we journey along life’s road. So first think over the thing wanted and if it would be good for you to have; say, “I want to do this; I am going to work to secure it. The way will be open for me.”

If you fully grasp mentally the thought of success and hold it in mind each day, you gradually make a pattern or mold which in time will materialize. But by all means keep free from doubt and fear, the destructive forces. Never allow these to become associated with your thoughts.

At last you will create the desired conditions and receive help in many unlooked-for ways that will lift you out of the undesired environment. Life will then seem very different to you, for you will have found happiness through awakening within yourself the power to become the master of circumstances instead of their slave.

To the beginner in this line of thought some of the things stated in this book may sound strange, even absurd, but, instead of condemning them, give them a trial. You will find they will work out.

The inventor has to work out his idea mentally before he produces it materially. The architect first sees the mental picture of the house he is to plan and from this works out the one we see. Every object, every enterprise, must first be mentally created.

I know a man that started in business with thirteen cents and not a dollar’s worth of credit. In ten years he has built up a large and profitable business. He attributes his success to two things—belief that he would succeed and hard work. There were times when it did not look like he could weather the storm. He was being pressed by his creditors who considered him bankrupt. They would have taken fifty cents on the dollar for his notes and considered themselves lucky. But by keeping up a bold front he got an extension of time when needed. When absolutely necessary for him to raise a certain sum at a certain time he always did it. When he had heavy bills to meet he would make up his mind that certain people that owed him would pay by a certain date and they always did. Sometimes he would not receive their check until the last mail of the day of the extension, and I have known him to send out a check with the prospect of receiving a check from one of his customers the following day. He would have no reason other than his belief in the power of affecting the mind of another by concentration of thought for expecting that check, but rarely has he been disappointed.

Just put forth the necessary concentrated effort and you will be wonderfully helped from sources unknown to you.

SOURCE

1 Billion Invested: FBI Launches Facial Recognition Project

1 Billion Invested: FBI Launches Facial Recognition Project

The Next Generation Identification programme will include a nationwide database of criminal faces and other biometrics

“FACE recognition is ‘now’,” declared Alessandro Acquisti of Carnegie Mellon University in Pittsburgh in a testimony before the US Senate in July.

It certainly seems that way. As part of an update to the national fingerprint database, the FBI has begun rolling out facial recognition to identify criminals.

It will form part of the bureau’s long-awaited, $1 billion Next Generation Identification (NGI) programme, which will also add biometrics such as iris scans, DNA analysis and voice identification to the toolkit. A handful of states began uploading their photos as part of a pilot programme this February and it is expected to be rolled out nationwide by 2014. In addition to scanning mugshots for a match, FBI officials have indicated that they are keen to track a suspect by picking out their face in a crowd.

Another application would be the reverse: images of a person of interest from security cameras or public photos uploaded onto the internet could be compared against a national repository of images held by the FBI. An algorithm would perform an automatic search and return a list of potential hits for an officer to sort through and use as possible leads for an investigation.

Ideally, such technological advancements will allow law enforcement to identify criminals more accurately and lead to quicker arrests. But privacy advocates are worried by the broad scope of the FBI’s plans. They are concerned that people with no criminal record who are caught on camera alongside a person of interest could end up in a federal database, or be subject to unwarranted surveillance.

The FBI’s Jerome Pender told the Senate in July that the searchable photo database used in the pilot studies only includes mugshots of known criminals. But it’s unclear from the NGI’s privacy statement whether that will remain the case once the entire system is up and running or if civilian photos might be added, says attorney Jennifer Lynch of the Electronic Frontier Foundation. The FBI was unable to answer New Scientist‘s questions before the magazine went to press.

The FBI hasn’t shared details of the algorithms it is using, but its technology could be very accurate if applied to photographs taken in controlled situations such as passport photos or police shots.

Tests in 2010 showed that the best algorithms can pick someone out in a pool of 1.6 million mugshots 92 per cent of the time. It’s possible to match a mugshot to a photo of a person who isn’t looking at the camera too. Algorithms such as one developed by Marios Savvides’s lab at Carnegie Mellon can analyse features of a front and side view set of mugshots, create a 3D model of the face, rotate it as much as 70 degrees to match the angle of the face in the photo, and then match the new 2D image with a fairly high degree of accuracy. The most difficult faces to match are those in low light. Merging photos from visible and infrared spectra can sharpen these images, but infrared cameras are still very expensive.

Of course, it is easier to match up posed images and the FBI has already partnered with issuers of state drivers’ licences for photo comparison. Jay Stanley of the American Civil Liberties Union urges caution: “Once you start plugging this into the FBI database, it becomes tantamount to a national photographic database.”

SOURCE: NewScientist

Womb Wisdom: Deepest, Most Ancient Secrets of Life Lie Within Every Woman

Womb Wisdom: Deepest, Most Ancient Secrets of Life Lie Within Every Woman

The following is extremely significant for many reasons.  Humanity’s earliest belief systems held utmost respect and worship to the ‘Feminine’.  These honest and grounded belief systems knew the importance of the woman/womb and that only through this can all human life be possible.  Only later in earth’s timeline, would the New World Order promoted ‘religions’ instead focus on Male dominance, and direct oppression / restriction/ separation of the Feminine in effort to establish a basis of control, out of fear [that woman could become more powerful, perceived or otherwise].                                                                 -DCMX Editor

We come forward now at the brink of a “quantum shift”, but what is it? What is this evolutionary shift we are all on the brink of? It is about women regaining their power and channeling it into the right places. We have just forgotten where to channel it.

The deepest, most ancient secrets of life lie within the womb of every woman. The womb is the holiest temple in your body, the most energy filled place in your body, the place of your most clarity, intuition, creative expression and power. It is your primordial voice, and connector into the web of all life, the web of interdependence that connects all living beings to each other.

We are all birthed from the womb, yet it is one of the least known parts of ourselves. This is not surprising, for it holds the greatest power that a woman possesses; the power to nurture, grow, and create new life. This power of creation is what each woman holds within them, usually only exercising it in the process of giving physical birth.

The womb is not just a place to give birth to a baby; it is a place and state of being that births US, that births new realities, that holds a power for deep transformation for ourselves, and for others we come into contact with. The Womb is a womans feminine core, the generator of tremendous creative potential, vitality, boundless well being, sensual power, and manifestation. It not only births children, but projects, careers, spiritual potential, personal healing and the depths of relating we all yearn for. It births the divine masculine and feminine, bringing balance and loving power to our deepest relationships.

Imagine it; there is a place within us that holds the power of life and death, yet we only use it one or two times in our life. The rest of the time it lies neglected, its power and ability to love and create hidden, misunderstood, and forgotten about.

Yet this has not always been so. In the past, and in present day indigenous traditions, women have known the way of the womb, the knowledge, practices, and power of the womb, and how to use it to create on a profound level. Some of these great women from both East and West include Mary Magdalene, Mother Mary, the female Buddha Yeshe Tsogyal, the Priestesses of Isis, the Daoist and African sisterhoods, and the druid shamanesses of Ireland and England.

As women, we have become so divorced from the womb, our primal centre of gravity, joy, creativity and soul connection, that we have forgotten who we are, and how we could be. Instead we try to compete on masculine terms and conditions to get by in the world of today. The flowering of the feminine rose has become dwarfed by the pillar of the masculine, instead of both sitting side by side in harmony, and relative equality.

This imbalance is caused by us forgetting about the womb, and its true purpose and power. In this forgetting, men too have forgotten how to relate fully to the feminine, and how to be truly human, building walls of intellectual justification and anger around the wounds and holes that have been created by this separation. Many religions and ways of behaviour have been influenced by this separation, creating a grossly distorted view of spirituality and social behaviour that has formed the current infrastructures of society, and how we are living life today. These structures have been created by a handful of men without women, creating an innately flawed and imbalanced worldview and society.

The effects on human society of this imbalance are many and manifold, impacting every area of human life, from the environment, to nuclear arms, educational and cultural values, spiritual traditions and commandments, the loss of family values, and the failure of many intimate relationships and marriages between man and woman. In short, the loss of womb wisdom and power has created a huge imbalance on planet earth that impacts all of us, creating an unstable foundation for our cultures and our lives that is threatening to topple over at any moment, so lopsided has it become.

The increase of intellectualization allied with a lack of actual womb experience means that women are increasingly finding their centre of gravity in their heads, rather than in their wombs. This arises partly as a reaction to the male dominated ideas and concepts that form the foundation of most religions and societies today.

A womans centre is in her womb-heart, not her head. She lives on earth, connected through relationship, not in an abstract concept or code of what life is. As soon as a womans centre of gravity shifts to the womb, she becomes centred, empowered, present, and grounded. When a womans centre is in her head, she suffers badly, and becomes more disempowered, trying to compete with men who are mind centred, thereby losing connection with her feminine essence.

Women are sad that they are centred in their heads, as they innately know that it is not true for them. When they start doing womb work, their sadness and rage well up within them as they realize this, and they start to shift their centres of gravity and resonance back to their primal centre, the source of their joy and womanhood. This then allows the heart to flower, deeply, and organically, flowing in spontaneity, emanating from the web of life, from what is uniquely individual to you at any moment in time, from all that nurtures and supports life, from empathy, and from compassion.

For thousands of years women have been without a role model, not knowing where to turn, or whom to look to to inspire and nurture them. Women have not known where to belong, and the changing roles imposed upon them by a reason driven society have further pushed the essence of the feminine nature into seclusion, and into a pastiche of true femininity as witnessed in modern day consumer society where this pastiche is used to sell products, seduce and manipulate.

Deep within, you know that you must go beyond what is considered normal, and acceptable, in order to stand in your own authority. Woman becomes able to accomplish her own birthing when she leaves behind her attachment to the collective consciousness, the traditional beliefs, institutions, and what is considered in the collective to be culturally acceptable womanly roles and virtues. Separate yourself from those fear driven voices and approaches of both women and men who attempt to belittle the power and full significance of birth and transformation. For the Womb creates new life, letting go of the past.

In this separation, you become able to truly trust yourself, and what is uniquely individual to you. This process of transformation depends upon your ability to feel and fully experience essential feminine values birthed from the womb. Merely having knowledge of, or understanding it rationally is not enough. You have to experience the feminine, making it your own, and living her fully in this initiation, holding your deep felt belly wisdom and gut knowing, your gut instincts to preserve and keep life going.

All life benefits when women come to love their bodies, and live from their truth. For the womb is the generator and keeper of Life, source of full feminine expression. The womb and ovaries are the light generators of the feminine, and the creator of joy. When they are cleared and healed of the many veils of disempowerment, mis-education and repression, you connect fully with your own feminine core in clarity, joy and the full, free expression of life-force, the orgasmic energy of bliss.

Activating the womb is a powerful act that heals many deep seated age-old wounds in both the female, and male, consciousness. Healing the womb helps activate and illuminate the collective psyche, and also powerfully heals on the personal level. For when the womb is cleared, healed, and restored, women come into their full power. By doing so, the men too become balanced, whole, and healed.

The womb provides the basis for a revolution in society. An awakened, socially conscious, and egalitarian society is built on the foundation of the womb that honours life in all its forms as the basis of society, not as an “add on” or a pleasing secondary thought. This divine design is activated and manifested through the organic flowering of the womb and application of its laws and rhythms. This divine design descends soul energy into manifestation; at present, human civilization descends mental energy into manifestation, and ascends root chakra or survival/power/sexual issues into manifestation.

The single most important issue facing humanity is not war, the environment, or poverty; it is the opening of the womb, and the standing up and liberation of women. All else has been done, all teachings on Oneness, liberation, manifestation …and still the world is the same. Women hold the key for the world to become a peaceful, just and balanced place. In their standing up, men too will become liberated, and lay down their arms, their pollution creating devices, and share their riches with others.

With enough open and healed wombs, no war would ever dare be fought by men who listen to the voice of the womb, to the empowered, life affirming woman in their life who shares the sustaining, nurturing power of life. Poverty would be wiped out as female leaders share, distribute, and create structures for people to become self empowered and living in real relating. The environment will heal itself with the presence of a more fertile consciousness, nourishing life from its source. With this nourishing love or manna, nature regenerates itself at its core level, and grows the dying planet back to Life. This is already happening in conscious, manna filled communities worldwide, and is part of the template for the remembrance of our natural divinity as individuals, and as a collective.

The strength and depths of the womb provide the security and foundation deep within to rise up and express freely through the heart.  Head and heart work within grounded foundations sunk deep within the womb. The head by itself cannot come into the heart. The womb is required to bring down the mind into our true centre, that can then rise up and express through the heart, from solid foundations.

The womb feels autonomous, a voice of its own, and can respond depending on what is required in each moment. The wombs voice is wise, ancient, powerful, and connected to the primordial. It is sunk deep, whereas the heart gives rise to passion, inspiration, and expression of love. Womb holds, heart gives. Hearts desire is to unify and bring things together – to end division. The womb holds the space for that to happen, for that to birth into manifestation.

Heart manifests womb, and womb holds heart in a secure space, allowing the heart to go deeper into its layers, rather than just being on the surface or merely sentimental aspect of the heart. The womb holds the steadiness, the unwavering centre and ground of creation, steady, still, reliable, the well of creation. With this foundation, the heart then feels safe and secure, feeling its innate and natural ground to rest on, lean and rely upon, a place to arise from.

One can say that the Womb is the banks of the river, and the heart is the river. The womb is the container for the alchemy of love to occur and rise into manifestation and being. Mind is the servant of womb heart, designed to carry out its orders. The heart is incomplete without the maturity of the womb.  The womb establishes deep within the character, the clarity, the commitment and stamina, housing the ground upon which you may come to take solace and guidance throughout your greatest tests in life.

  1. You have within you this reliable source of stillness. Do you have the heart to discover it?

So men .. stand up and support the women in your life. Do not be scared that you will lose your power, for you will in fact gain the greatest power of all: love borne through humility, that which makes a real man, a perfect man, a king and leader to suit your queen and guide.  Have faith, and listen to the womb; it will serve you to enter your truth, your power, and your true maleness. It will serve you to enter the greatest bliss, the greatest softness, and the deepest power, the wisdom of which will make you stand out as a real man.

Women: delve deep into your primal power, beyond the appearances, customs, and religions of this day. Delve into the Knowing you have always had, and always will, a Knowing that no religion can ever encompass, and that no culture can ever define. Delve deep into your belly and the brain that lies there: the primal brain, your original voice, the voice that will never betray you and will always lead you to the truth of love in action, the being of joy, and the peace that passes all understanding.

This is your time. Seize it, open the wounds, leave the justifications and layers of fear, dust, and excuses that you use to cover the layers of yourself that you KNOW lie hidden, and that you have bartered away for a false peace to placate the masculine in, and around you. By doing this, you will be serving and loving the masculine in your life, truly loving them in the deepest way possible.

Womb work is designed for you to grow and bloom this holy place within, into full manifestation. With the resurrection of the womb comes the resurrection of man. Man will find a new identity that is his timeless, primordial identity, his true identity, when he comes into harmony with the clear and activated womb.

The Womb is the gateway from where we all come, and where we return to. To realize this takes the deepest surrender, to that which lies beyond the mind and reason. In the womb, you cannot KNOW what is happening as it is happening; you simply have to allow, embrace, and trust its feminine voice.

Remember the love as and when you can through the journey. It is only one, small shift of the mind away.

SOURCE: Articlebase.com/sprituality-articles/

Bradley Manning’s Torturous Confinement Controlled by Top Military Lt. General at the Pentagon

Bradley Manning’s Torturous Confinement Controlled by Top Military Lt. General at the Pentagon

The only remedy for the abuse of Bradley Manning and the government’s violation of the law is dismissal of all charges.

Every time I attend a Bradley Manning hearing the prosecutors show their outrageous disrespect for the law, demonstrate they cannot be trusted and that this prosecution should not proceed.

Beginning on November 27, the defense will argue a long-delayed motion to dismiss for unlawful pretrial punishment.  In a moment of high drama, Bradley is likely to testify about his nine months in solitary confinement during the argument of this motion.

Prosecutors Are Caught Hiding More than One Thousand Emails about Manning’s Confinement

The most recent reason for the delay in the hearing was the government was caught hiding 1,374 emails relevant to the confinement of Bradley Manning. Attorney David Coombs had requested all documents relevant to Manning’s confinement at Quantico but did not receive any of the emails. Hours before the deadline for filing the motion to dismiss the Government sent him 84 emails from Quantico that it said were “obviously material to the defense.”  They did not mention the existence of 1,290 other emails relating to Manning’s confinement.

Coombs, based on prior experience with the prosecution team, was suspicious.  The language “obviously material to the defense” was tortured.  Were there other documents that were material to the defense? The law requires the government to provide all material information.  Two government prosecutors responded that the 84 emails were all there was.  Coombs was still suspicious and decided to file a motion with the court on the matter.  At that point the prosecution admitted there were a total of 1,374 emails, but claimed only 84 were discoverable.

Coombs kept pushing and on the first day of the hearing last week the government provided him with a disc containing approximately 600 emails. The prosecutors gave no explanation as to how they jumped from 84 to 600 discoverable emails, even though Coombs asked how that occurred.  Now there are 700 emails in dispute, and Judge Denise Lind granted Coombs’ motion to have her review those to determine if they’re discoverable.

What did the emails contain?  Well, we don’t know yet what surprises are in the 600 given to Coombs during the hearing, but the 84 contained a blockbuster.  They revealed that the decision to hold Manning in tortuous solitary confinement conditions was not made because of Manning’s behavior at Quantico, not made because of the recommendations of the prison psychologists or psychiatrists, not made by the brig commander, not even made by the Commander at Quantico – but made by a three-star general in the Pentagon.

Who was the general in charge of Manning’s confinement?

Lieutenant General George Flynn, who was serving as the Commanding General of the Marine Corps Combat Development Command at the time, ordered Manning’s solitary confinement.

Flynn is a career officer who has been climbing the ladder in the military since 1975.  There are only 60 three-star generals in the entire U.S. Marine Corps.  Flynn is in the top echelon of Marine officers.  Flynn was nominated for appointment by the President under the advice of the Secretary of Defense and the Chairman of the Joint Chiefs of Staff as well as confirmed via majority vote by the Senate. Thus, this position, in addition to being an important military position, is one that requires political skill as well.

Among the positions he has recently held are Chief of Staff and Director, Command Support Center, United States Special Operations Command (2004-2006). Commanding General, Training and Education Command (2006-2007). Deputy Commanding General Multi-National Corps-Iraq (2008), Director for Joint Force Development, The Joint Staff J-7 (2011-). This includes positions he served in during the time documented by Manning’s alleged release.

During Flynn’s time at the U.S. Special Ops command, growing pains were reported as they were developing plans to have an expanded and more complex role against terrorism, working more closely with the CIA. In 2005’s Operation Red Wing, under his command, four Navy SEALs were pinned down in a firefight and radioed for help. A Chinook helicopter, carrying 16 service members, responded but was shot down. All members of the rescue team and three of four SEALs on the ground died. It was the worst loss of life in Afghanistan since the invasion in 2001.

The fact that an officer who was working so closely with the CIA was making the decisions about Manning’s incarceration raises questions about the purpose of Manning’s abusive confinement.  Even before knowing Lt. Gen. Flynn was in charge, many commentators believed Manning was tortured in an effort to break him so he would plead guilty and testify against Julian Assange. Now that we know a three-star general at the Pentagon was making the decisions, these suspicions have much greater credibility.

Who knows what will be uncovered in the 600 emails that have been provided and the remaining 700 in dispute? It already sounds like Manning’s defense needs to broaden its request to all communications involving Lt. Gen. Flynn about Manning, including with the Joint Chiefs of Staff, Secretary of Defense and the White House. We know that the White House in the Bush Administration was approving every step of the torture-interrogation of high profile suspects, so it seems likely that aggressive punishment of a U.S. soldier would need White House approval.  The Manning case is high profile, and it is hard to believe Lt. Gen. Flynn would risk his career by torturing a soldier without approval from political leaders at the Pentagon and White House.

And Manning was kept in torturous conditions.  Not only was he held in solitary for nine months, but he was also mistreated throughout that time. Manning’s confinement is detailed in the 109 page motion to dismiss filed by David Coombs. Manning was held in a windowless 6-by-8 cell in which he was not allowed to have any personal items. He was awakened at 5:00 AM and required to stay awake until 10 PM.  Among the conditions of his confinement were as follows:

– He was not allowed to exercise in the cell.

– He was not permitted to lie down on his rack during the duty day.

– He was not permitted to lean his back against the cell wall; he had to sit upright on his rack without any back support.

– Manning was subjected to constant monitoring; the Brig guards were required to check on him every five minutes by asking him some variation of, “are you okay?”  Manning was required to verbally respond in some affirmative manner. Guards were required to make notations every five minutes in a logbook.

– Some lights would remain on all night. At night, if the guards could not see him clearly, because he had a blanket over his head or he was curled up towards the wall, they would wake Manning in order to ensure that he was okay.

– Manning was only given a mattress and when he tried to fold the mattress to make a pillow Brig officials took it away and gave him a suicide mattress with a built-in pillow, only a couple of inches high, not really any better than sleeping on a flat mattress. Manning was not permitted regular sheets or blankets. Instead he was provided with a tear-proof security blanket. This blanket was extremely coarse and irritated Manning’s skin causing rashes and carpet burns. The blanket did not keep Manning warm due to its stiffness, did not contour to his body or retain heat.

– Manning was required to receive each of his meals alone in his cell. He was only permitted to eat with a spoon.

– Whenever Manning was moved outside his cell, he was shackled with metal hand and leg restraints and accompanied by at least two guards; the entire facility was locked down.

– He was not allowed to speak to other inmates and if he attempted to do so was stopped.

– Manning was permitted only 20 minutes of “sunshine call.” Aside from a 3-5 minute shower, this would be the only time he would regularly spend outside his cell. During this sunshine call, he would be brought to a small concrete yard and permitted to walk around the yard in hand and leg shackles, while being accompanied by a Brig guard at his immediate side (the guard would have his hand on Manning’s back). Two to three other guards would also be present observing Manning while he walked in figure-eights. He was not permitted to sit down or stay stationary.

After a protest in support of Manning outside of Quantico his conditons got worse. Guards harassed him to the point of bringing on a panic attack.  He was placed on suicide watch and had his clothes taken away from him at night, from March 3, 2011, through March 7, 2011, he was forced to stand outside his cell naked during morning inspection.

How involved was Lt. Gen. Flynn in determining these unjustifiable conditions of confinement?  During the last hearing, Coombs disclosed that Flynn was given detailed reports of minor details – he was even notified when Coombs visited his client.  Further, the commander at Quantico said in one email that all decisions to relax confinement needed to be approved by Flynn. This was known up and down the chain of command at Quantico.

The Quantico command had been told what they needed to do, as the Coombs motion states:  “keep PFC Manning subjected to the most rigorous conditions possible. So no matter what the psychiatrists recommended, week-after-week, month-after-month, nothing ever changed because everyone at the Brig had their marching orders from [redacted] who in turn had his marching orders from someone higher up in the chain of command.”

The psychiatrist, who was originally a Brig psychiatrist and later appointed to the Defense team, expressed extreme frustration about the “bizarre” circumstances at Quantico saying: “treating this is so … it’s just bizarre all the way around. I’m just surprised that they would become so intrusive because I’d be concerned about what that looks like later on. And they’ve not seemed to have any qualms at all about reaching down so heavy handed. And when I’ve asked … and again, there’s no documentation  . . . It’s not an interrogation, I don’t think. He’s not been adjudicated, so there’s a lot of risk to putting too many services out there when somebody is in this pretrial situation. . . . They’re supposed to be assumed innocent. What you’re supposed to be doing is protecting where they’re not incriminating themselves. So, I don’t know. It’s been a bizarre thing … I’ve never seen anything like it.”

Are these conditions acceptable under military law?

In United States v. Fricke, 53 M.J. 149, 155 (C.A.A.F. 2000) the accused alleged that he was placed in solitary confinement for an extended period of time because prison officials were attempting to “break him.” The court indicated that “coercing a confession is not a legitimate governmental objective.”

Indeed the only legitimate purposes are to ensure the accused’s presence at trial and the security of the facility.  In 2006’s United States v. Crawford, the Court of Appeals for the Armed Services found a constitutional violation is established where “conditions [are] unreasonable or arbitrary in relation to both purposes” of “ensuring … presence for trial and the security needs of the confinement facility.” Manning was an exemplary inmate who never gave Brig officials reason to believe he was a flight risk, making these harsh conditions, controlled from the Pentagon, impossible to defend.

As the Court of Appeal for the Armed Forces wrote in United States v. Combs, “the courts will not tolerate egregious, intentional misconduct by command where there is no evidence of a legitimate, non-punitive objective for the conduct complained of . . ..” What was the “legitimate, non-punitive objective” of Manning not being able to lean against the wall while seated in his cell, lying down in his cell between 5 AM and 10 PM, exercising in his cell, being forced to stand naked to get his clothes back or being verbally checked every five minutes and waking him from his sleep to see if he was alright? The only purpose of these limitations was to punish, humiliate or break Manning. No doubt Lt. Gen. Flynn is well aware of how these stress techniques can break a person.

Any claim that these abusive conditions were to protect Manning is undermined by the well-known negative impact of solitary confinement.  Numerous federal courts having taken note of the serious negative consequences of such confinement.  The fact is the confinement facility officials were actually causing Manning psychological harm, not protecting him from harm. Finally, the fact that as soon as he was sent to Ft. Leavenworth his conditions changed virtually overnight, demonstrate the conditons at Quantico were unnecessary.

In multiple cases, military courts have found that dismissal of all charges is an appropriate remedy for pre-trial punishment.  Not only was Manning’s pre-trial confinement punishment in violation of military law, in addition after a 14-month investigation, the U. N. Special Rapporteur on torture Juan Méndez formally accused the U.S. government of “cruel, inhuman and degrading treatment” in violation of the International Covenant on Civil and Political Rights.

The motion to dismiss, and the hidden emails, highlights the prosecution’s continuous withholding of material information from the defense in violation of law. The prosecutors’ obfuscation is resulting in a delay of the court martial so that Manning’s trial will occur nearly 1,000 days after his confinement in violation of speedy trial requirements.  It is getting harder and harder to see how any remedy other than dismissal of the charges for outrageous government conduct would serve justice.

Take Action:

On September 6th the Bradley Manning Support Network is organizing protests at Obama campaign headquarters throughout the country.  More than two dozen cities are planning protests to support Manning.  Join us in the quest for justice for Bradley Manning, click here for more information.

By Kevin Zeese. September 4, 2012.

RAP NEWS 15: Big Brother is WWWatching You

RAP NEWS 15: Big Brother is WWWatching You

Big Brother is WWWatching

   Written by Giordano Nanni & Hugo Farrant
Welcome back, netizens, to this newest edition in
Juice media’s series of Rap News journalism with me, Robert Foster:
this evening we’re actively delving in depth
to facts which affect all of us who dwell on this internet and we’ve got to
give a special welcome to all the ladies and a-gents,
from the NSA, ASIO, MI5: glad you’re listening in;
Because today’s show is
all about surveillance and how it’s spreading from the streets into our modems
As we speak, laws are being tacitly written in
to implement ways of controlling the expanse of this internet,
to keep us safe, we’re told; but from whom?
And will this place ever be the same if these plans go through?
To find out, we connect with our first guest to comment on the matter
we’re live at the Pentopticon with General Baxter,
General – Son! – Good to have you back again with us
explain why the State is spying on us? – My Fellow Oceanians,
As you know, we’ve always been at war with Eurasia…
or is it Eastasia? Either way, it’s war ‘n we need division to wage it!
but now the proles are connecting online bypassing these
illusory divisions of race, religion and nationality…
– Sounds grand to me… – It’s a catastrophe!
Centuries of hard work are being undone, profits are vanishing
And it’s due to the internet, it’s empowering humanity
we need to get this SNAFU under control; rapidly.
– How? – Behold the latest weapon in the War of Terror
our greatest invention since nine eleven
guaranteed to keep us free and safe forever
i give you The Surveillance State, ladies and generals.
Our secret wires log your key style
monitor every single number on your speed dial
rewind straight to your position with facial recognition,
and pinpoint you within point oh-three of a mile!
we’ve put eyes everywhere without consulting you,
keeping you safe, whether or not you want us to.
Soon there’ll be no freedoms left for threatening.
Then we’ll have won the war! Take that Terrorism!
– Brilliant, thank you General, we now interview
Our resident guru, Terence Moonseed, for a different view
– Greetings. – How does this situation look?
– I have one word for you, Robert: doubleplusungood!
The world populace of seven point four billion are all heading in
the direction of Orwellian totalitarian oblivion
My voice is hoarse yelling about Stellar Winds cold chilling em
And TrapWire weaving through the world wide web we all dwelling in
Face it: the all-seeing eye’s in all of our Facebooks like a virus
and in these Eye-phones, with Siri, or should I say “Iris”.
And next in line is RFID devices and mind chips
triggered by Chemtrails the planes spray the sky with.
This time it’s too far: check out the base they’re building in Utah
where they’ll be storing all ya data for over a century; it’s Fubar!
And under the outback is an entire tunnel of wires,
an ECHELON base called Pine Gap, to hijack our Mother Gaia.
– Hey, maybe your mother’s gayer! – Boo hoo!
Why don’t you just kill yourself like most of your troops do!
– That’s it, now you’re on the Cast Iron list
– Hang on, General, why weren’t we informed about this?
– Sorry we didn’t tell you about our grand plan before,
it was meant to be a surprise, under wraps and in store.
But some spoilsports had to go and ruin it for all
by blowin’ whistles, in spite of the damn law.
– Bill Binney and Thomas Drake are Trailblazers for leaking these tactics…
– Hey, civil-liberty fagtivists… err, activists:
this is all legal: anything we do now actually is!
– How did… – You can’t question my authorit-ah, thanks to this.
– And that shit’s global, people! in Australia it’s now legal
for the government to store all SMS’s, searches and emails…
Australians, it’s taking place under your nose
unless you wake up, all your data are belong to ASIO.
– Come on! everyone knows: you can trust the government now
If you’ve got nothing to hide, you got nothing to worry about
– That might be the case with things that are happening now,
because most people agree with most of the laws that are being handed down.
But once the Illuminati reveal their agenda for you
this surveillance will enforce laws you no longer consent to,
but by then it’ll be too late to protest too
and anything you’ve ever said, typed or browsed can and will be used against you.
– I’m confused, so what should we do then?
– What should we do? Nothing! this is all an illusion,
It’s just a ride, a delusion, the matrix, the Maya deceiving us.
– Ah, you hippies really make our job so much easier…
– Sorry to interrupt but we’re picking up
a signal from beyond the space-time continuum
Quick, switch on the Juice Channelling Portal…..
…………….Wait……. is that…… George Orwell?!
– Good day to you – Wow …what do we owe this honour to?
– I tried to warn you noobs, but I see you are actually fools
or else you thought this was an instruction manual.
– Yes, ahem… so can you advise us? What would you have us do?
– An open and universal internet is the most effective tool you have
to address the issues that afflict the world at hand
therefore, protecting it is the most essential task that stands
before your generation – I think I understand… – hush, man
You must not lose the internet. Heed this mantra:
‘who controls the Internet, controls the data
and who controls the data, controls the future’
– We’re losing you – I leave you with a tool to use…
– An onion? – Don’t be simple, Robert, this is but a simile
It stands for ‘Tor’ – Tor? – Google it! It’s for anonimity:
this onion router open network helps considerably against tyrranny
But its abilities only work if all you f***kers use it consistently
and even if you don’t use it, run it so its force swells.
– Thanks, Mr. Orwell – From now on call me: George Torwell
if we’d had such tools when I wrote this, well
It would’ve been so much simpler to tell Big Brother to go f**k himself,
the motherf***king, c***-sucking piece of sh[…]
– Thanks, George Torwell, for manifesting direct from this
memory hole of history, to impress on us these messages.
We’re told we need safety; which is precious, yes,
but can a society that can enforce all its laws ever progress?
Hindsight shows that many figures guilty of “thought-crime”
turned out to be luminaries and heroes, before their time.
But if a surveillance state had reigned then in this form and design
Just think of all the progress we may’ve all been denied:
Could lobbies for women’s or gay rights have appeared and thrived
Would revolutionary ideals have materialised
Would science have pioneered or even survived,
If every word had been monitored by thought police and spies?
Big Brother brings chilling effects, freezing our collective hopes
he doesn’t protect our safety, but protects the status quo,
and threatens this internet, the one channel yet uncontrolled
whose openness we are now called upon to effect and uphold.

 

http://www.thejuicemedia.com

Juice Rap News: Episode 15 – Big Brother is WWWatching You. September 2012 rocks around with some crucial developments in the ongoing struggle over the future of the internet. Will it remain the one open frequency where humanity can bypass filters and barriers; or become the greatest spying machine ever imagined? The future is being decided as we type. Across Oceania, States have been erecting and installing measures to legalise the watching, tracking and storage of data of party-members and proles alike. If they proceed, will this place ever be the same? Join our plucky host Robert Foster as he conducts an incisive analysis of the situation at hand. Joining him are newly appointed Thought Police General at the Pentopticon, Darth O’Brien Baxter, and a surprisingly lucid Terence Winston Moonseed. Once again, in the midst of this Grand Human Experiment, we are forced to ask tough questions about our future. Will it involve a free internet which will continue to revolutionise the way the world communicates with itself? Or is our picture of the future a Boot stamping on this Human InterFace forever?

Written & created by Giordano Nanni & Hugo Farrant – on Wurundjeri Land in Melbourne, Australia.

– SUPPORT the creation of new episodes of Juice Rap News,
a show which relies on private donations: http://thejuicemedia.com/donate

– CONNECT with us:
* Website: http://thejuicemedia.com
* Twitter: http://twitter.com/juicerapnews
* Farcebook: https://www.facebook.com/rapnews

– DOWNLOAD:
* FREE MP3: http://www.reverbnation.com/artist/downloads/603938
* LYRICS available here: http://thejuicemedia.com/video/lyrics
* Download TOR: https://www.torproject.org

– CREDITS:
* MAIN BEAT Produced by the Goat Beats http://www.thegoatbeats.com
* ORCHESTRATION & George-Orwell theme by Adrian Sergovich
* ARTWORK by Zoe Tame of http://visualtonic.com.au for images and website wizardry!
* EFFECTS & ANIMATIONS by Jonas Schweizer (See his work: http://www.indiegogo.com/CaribbeanNewcomer)
* PROPS: Thanks to Zoe Umlaut of Umlautronics for constructing the Juice Channeling Portal, worryingly close to spec. And to Gilles Gundermann for sourcing awesome Orwellian props.
* CAPTIONS: Merci to Koolfy from la Quadrature du Net, for creating English Captions.
* Thanks to Dave Abbott for technical advice; and deep gratitude to Lucy & Caitlin for all the ongoing support (and patience).

– TRANSLATIONS: If you would like to translate this episode into your language, please contact us via our website http://thejuicemedia.com/contact/ to obtain the SRT file.

– FURTHER READING & LINKS:

* TOR PROJECT: https://www.torproject.org/about/overview.html.en

* NATIONAL SECURITY INQUIRY (Australia):
http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representati…

* PIRATE PARTY (Australia) submission to the National Security Inquiry:
http://pirateparty.org.au/2012/08/24/pirate-party-releases-national-security-…
Pirate Party petition on #natsecinquiry: http://pirateparty.org.au/natsecinquiry-petition/

* Great article by Richard Falkvinge, ÒIf you have nothing to hide, you have nothing to fearÓ:
http://falkvinge.net/2012/07/19/debunking-the-dangerous-nothing-to-hide-nothi…

* INTERNET ACTIVISM: We highly recommend checking out this great video-interview with Julian Assange (WikiLeaks), Jacob Appelbaum (Tor Project), Jeremie Zimmerman (La Quadrature du Net) and Andy Muller-Maguhn (Chaos Computer Club): assange.rt.com/cypherpunks-episode-eight-full-version-pt1

Category:

News & Politics

Hacked Intel Email: NYPD Involved in “Damn Right Felonious Activity”

Hacked Intel Email: NYPD Involved in “Damn Right Felonious Activity”

The New York City Police Department (NYPD) really has gone rogue; at least that’s what a high-level FBI official believes.

Among the 5 million emails the group Anonymous hacked from the servers of private intelligence firm Stratfor in February, one seems to not only confirm the controversial NYPD surveillance activities uncovered by the Associated Press, but hints at even worse civil liberties violations not yet disclosed. Anonymous later turned the emails over to WikiLeaks, with which Truthout has entered into an investigative partnership.

I keep telling you, you and I are going to laugh and raise a beer one day, when everything Intel (NYPD’s Intelligence Division) has been involved in during the last 10 years comes out – it always eventually comes out. They are going to make [former FBI Director J. Edgar] Hoover, COINTEL, Red Squads, etc look like rank amatures [sic] compared to some of the damn right felonious activity, and violations of US citizen’s rights they have been engaged in.

The description of alleged NYPD excesses was leveled by an unnamed FBI “senior official” in late November 2011, in an email sent to Fred Burton, vice president for intelligence at the Austin, Texas-based Stratfor and former deputy chief of the counterterrorism division at the State Department. Burton  then sent the official’s email to what appears to be a listserv known as the “Alpha List.”

Burton did not identify the senior FBI official in the email he sent to the listserv. He describes him as a “close personal friend,” and claims he “taught him everything that he knows.” He also instructs members of the listserv not to publish the contents of the email and to use it only for background.

Stratfor, in a statement released after some of the emails were made public, said some of the emails “may be forged or altered to include inaccuracies; some may be authentic” but “having had our property stolen, we will not be victimized twice by submitting to questioning about them.”

What’s particularly stunning about the FBI senior official’s description of NYPD Intelligence Division activities, is how he connects them to previous instances when his own agency bent and broke the law in pursuit of intelligence on perceived enemies of the state throughout the 20th century – and concludes the NYPD Intelligence Division’s violations are worse. As Pulitzer Prize-winning author and former New York Times reporter Tim Weiner writes in his new book, “Enemies: A History of the FBI,” the Bureau has been “America’s closest counterpart” to a secret police.

In the email, Burton queried the FBI official to gain a better understanding of why the FBI declined to get involved with a case involving an alleged “lone wolf” terrorist and al-Qaeda sympathizer named Jose Pimentel, a 27-year-old American of Dominican descent, accused of trying to build three pipe bombs to detonate in New York City.

The FBI official responded by describing some turf and relationship issues between NYPD intelligence officials and NYPD and FBI investigators on New York City’s Joint Terrorism Task Force. It appears the FBI senior official was responding to a news story about Pimentel’s arrest published by the far-right leaning Newsmax, headlined “FBI- NYPD Tensions Highlighted in Terror Case,” which was attached to an email Stratfor analysts had sent around the office.

 There are two issues with this case (off the record of course).

One is the source (confidential informant) was a nightmare and was completely driving the investigation. The only money, planning, materials etc the bad guy got was from … the source. The source was such a maron [sic], he smoked dope with the bad guy while wearing an NYPD body recorder – I heard in open source [sic] yesterday btw [by the way], he is going to be charged with drug possession based on the tape. Ought to go over very nicely when he testifies against the bad guy, don’t you think?

Issue two is that the real rub is between NYPD Intel, [Intelligence Division] and NYPD – JTTF [Joint Terrorism Task Force], not the FBI per se. The NYPD JTTF guys are in total sync with the Bureau and the rest of the partners who make up the JTTF – I understand there are something like 100 NYPD dics [detectives] assigned to the JTTF. NYPD Intel (Cohen, et al) on the other hand, are completely running their own pass patterns. They hate their brother NYPD dics on the JTTF and are trying to undermine them at every turn. They are also listening to [former CIA official David] Cohen [the head of NYPD’s Intelligence Division] who, near as anybody can tell, never had to make a criminal case or testify in court.

Joint Terrorism Task Forces are FBI-led counterterrorism investigative units that combine federal, state and local law enforcement in an effort to detect and investigate terrorist activity and prevent attacks before they occur. Originally created in the 1980s, the creation of JTTFs nationwide was accelerated after 9-11. Currently, 104 JTTFs operate nationwide and are considered one of the most important assets in the federal government’s muscular counterterrorism architecture.

After reviewing the Stratfor email thread for Truthout, Michael German, senior policy counsel at the American Civil Liberties Union’s Washington Legislative Office and a former FBI agent who infiltrated white supremacist terrorist organizations, described the FBI official’s criticism of the NYPD’s intelligence as “doubly ironic.”

“The FBI has engaged in widespread spying on the Muslim American community as well, including counting mosques and mapping Muslim neighborhoods, infiltrating mosques with informants, and using the guise of community outreach to spy on Muslim religious and advocacy organizations,” German told Truthout. “But more critically, because the FBI is charged with enforcing the civil rights laws in this country, including violations under color of law.

“This agent suggests the FBI knew the NYPD Intelligence agents were involved in widespread ‘felonious’ activity in violation of Americans’ civil rights, yet the FBI does not appear to have opened a civil rights investigation or done anything to stop this illegal activity.  Our laws are designed to apply equally to protect all of us, including to protect us from illegal police activity. When the FBI abdicates this responsibility, all Americans suffer.”

Responding to the background information from the FBI senior official, Sean Noonan, a “tactical analyst” with Stratfor, wrote in an email sent to the “Alpha List,” “The point that the divide is within NYPD is contradictory to how they would like present it. [sic]. The way the pro-NYPD stories cover it is that NYPD CT/Intel [counterterrorism/intelligence] has successfully gained influence within the JTTF, almost to the point of having infiltrated it.”

German, however, tells Truthout that the rift between the NYPD’s intelligence analysts and NYPD investigators assigned to the FBI’s JTTF, as revealed by the senior FBI official’s email, is consistent with his experience.

“Criminal investigators, like those assigned to the JTTFs, typically find information produced by these intelligence analysts to be useless, whether they’re NYPD intelligence or FBI intelligence,” he said.

And no matter how bad the mutual acrimony between NYPD intelligence analysts and New York City’s JTTF has gotten, German isn’t surprised that the FBI has declined to investigate allegations of the NYPD Intelligence Division breaking the law.

“The FBI didn’t open investigations when it discovered other government agencies engaging in torture and illegal wiretapping either,” he said.

But eventually, the senior FBI official predicts in his email to Burton, the extent of NYPD’s alleged crimes will be revealed.

“As Rush Limbaugh likes to say, ‘don’t doubt me on this,'” he wrote at the end of his correspondence.

 

Matthew Harwood

Matthew Harwood is a journalist in Washington, DC, and a frequent contributor to the Guardian’s Comment is Free. His writing has appeared in The Washington Monthly, Progress Magazine (U.K.) as well as online at Columbia Journalism Review, CommonDreams, and Alternet. He is currently working on a book about evangelical Christian rhetoric and aggressive US foreign policy. You can follow Matt on Twitter @mharwood31.

Jason Leopold

Jason Leopold is lead investigative reporter of Truthout. He is the author of the Los Angeles Times bestseller, News Junkie, a memoir. Visit jasonleopold.com for a preview. His most recent investigative report, “From Hopeful Immigrant to FBI Informant: The Inside Story of the Other Abu Zubaidah,” is now available as an ebook. Follow Jason on Twitter: @JasonLeopold.

 

SOURCE: TruthOut

Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses

Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses

Security professionals, geeks and hackers around the world are hosting a series of cryptography training sessions for the general public.

The ‘crytoparty’ sessions were born in Australia and kicked off last week in Sydney and Canberra along with two in the US and Germany.

Information security experts and privacy advocates of all political stripes have organised the causal gatherings to teach users how to use cryptography and anonymity tools including Tor, PGP and Cryptocat.

Multiple sessions were proposed in Melbourne, Sydney, Adelaide, Canberra, Perth and two in Queensland. A further 10 were organised across Europe, Asia, Hawaii and North America, while dozens of requests were placed for sessions in other states and countries.

The cryptoparties were born from a Twitter discussion late last month between security researchers and Sydney mum and privacy and online activist known by her handle Asher Wolf.

For Wolf, the sessions were a way to reignite technical discussions on cryptography.

“A lot of us missed out on Cypherpunk (an electronic technical mailing list) in the nineties, and we hope to create a new entry pathway into cryptography,” Wolf said.

“The Berlin party was taught by hardcore hackers while Sydney had a diverse range of people attending. The idea is to teach people who don’t crypto how to use it.”

The concept resonated with the online security and privacy community.

It took only hours for about a dozen sessions to spring up around the world on a dedicated wiki page following what was only a casual Twitter exchange between Wolf and others — now cryptoparty organisers.

“When I woke up in the morning, they were all there,” Wolf said.

There was no formal uniformity between each crytoparty. Some were hands-on, with users practising on laptops and tablets, while others were more theory-based with some organisers.

Each session runs for around five hours.

The free classes could accommodate a maximum of about 30 to 40 attendees. One of the first parties in the Southeastern US state of Tennessee had more than 100 people turn up to its afterparty, an event complete with music, beer and fire-twirling.

Copyright © SC Magazine, Australia

Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI

Anonymous Hackers Claim To Release One Million Apple Devices’ Unique Identifiers Stolen From FBI

 

Anonymous has a way of releasing massive collections of information that raise many more questions than they answer.

Case in point: On Monday night, the segment of the hacker group that calls itself Antisec announced that it had dumped 1,000,001 unique device identifier numbers or UDIDs for Apple devices–the fingerprints that Apple, apps and ad networks use to identify the iPhone and iPads of individual users–that it claims to have stolen from the FBI. In a long statement posted with links to the data on the upload site Pastebin, the hackers said they had taken the Apple data from a much larger database of more than 12 million users’ personal information stored on an FBI computer.

While there’s no easy way to confirm the authenticity or the source of the released data, I downloaded the encrypted file and decrypted it, and it does seem to be an enormous list of 40-character strings made up of numbers and the letters A through F, just like Apple UDIDs. Each string is accompanied by a longer collection of characters that Anonymous says is an Apple Push Notification token and what appears to be a username and an indication as to whether the UDID is attached to an iPad, iPhone or iPod touch.

In their message, posted initially in the Anonymous twitter feed AnonymousIRC, the hackers say they used a vulnerability in Java to access the data on an FBI Dell laptop in March of this year. They say the database included not only the UDIDs, but also “user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc.” Anonymous claims that the amount of data about each users was highly variable, and that it only released enough data to the public “to help a significant amount of users to look if their device are listed there or not.”

The Antisec statement also took the opportunity to mock the recent appearance of NSA Director and General Keith Alexander at the hacker conference Defcon, where he made a recruiting pitch to attendees. “It was an amusing hypocritical attempt made by the system to flatter hackers into becoming tools for the state,” Anonymous’ statement reads. “We decided we’d help out Internet security by auditing FBI first.”

If the UDIDs are determined to be real, just what that means about law enforcement and Apple users’ privacy isn’t entirely clear. Much more than passwords or even email addresses, UDIDs are already spread around the Internet by app developers and advertisers–a study by one privacy researcher in 2011 found that 74% of the apps he tested sent a user’s UDID to a remote server. But the same researcher also found that five out of seven social gaming networks he tested allowed users to log in with only their UDID, making a stolen UDID equivalent to a stolen password.

“We never liked the concept of UDIDs since the beginning indeed,” reads the Anonymous statement. “Really bad decision from Apple. Fishy thingie.”

Due perhaps to the privacy concerns around UDIDs’ proliferation, Apple stopped allowing new iOS apps to track UDIDs earlier this year.

Regardless, if the FBI has in fact collected 12 million Apple UDIDs–or even just one million–it will have some explaining to do to privacy advocates. In its release, Anonymous argues that the massive dump of users’ personal information, which it says has been stripped of many of the most identifying details, is designed raise awareness of the FBI’s alleged gadget-tracking shenanigans. “…We will probably see their damage control teams going hard lobbying media with bullshits to discredit this,” the statement reads at one point. “But well, whatever, at least we tried and eventually, looking at the massive number of devices concerned, someone should care about it.”

For now, Anonymous refuses to answer more questions about its release–at least from the press. Before granting any interviews, it’s demanding that Gawker writer Adrian Chen, who has been especially critical of Anonymous, appears on Gawker’s home page in a “huge picture of him dressing a ballet tutu and shoe on the head.”

SOURCE: Forbes.com

Accidental Leak: UK Policeman’s Clipboard Reveals Julian Assange Arrest Tactics

Accidental Leak: UK Policeman’s Clipboard Reveals Julian Assange Arrest Tactics

Handwritten note detailing Met police strategy suggests there should be no escape, no matter how he leaves embassy

A police officer holds notes on Julian Assange’s exile at the Ecuadorean embassy in London. The left side of the document has been pixellated due to sensitive information. Photograph: Lewis Whyld/PA

It is the “restricted” official document that sums up the Metropolitan police‘s tactics towards Julian Assange. “Action required: Assange to be arrested under all circumstances,” says the handwritten note that was photographed under a policeman’s arm on Friday detailing a “summary of the current position” on Assange’s exile inside the Ecuadorean embassy in Knightsbridge.

It is no surprise that a fugitive from a European arrest warrant that demands removal to Sweden to face allegations of rape and sexual assault should face such a fate. Police officers are stationed right up against the front and back of the embassy where Assange has sought sanctuary and he recently claimed to have heard them “swarming” behind the fire escape.

There should be no escape, the note suggests, ordering that Assange is arrested if “he comes out with dip [presumably a diplomat] … as dip bag [which allows immunity from search for diplomatic communications, and which could be as large as a suitcase, crate or even a shipping container], in dip car …. in dip vehicle.”

The note mentions “SS10 to liaise”. The Met police press office said it had no idea what this might mean. Could it be a misspelling of SO10, the colloquial name for the Met’s covert operations group? The later mention of SO20 suggests what Assange and his supporters have always feared: that the western powers that WikiLeaks has done so much to embarrass might consider him some sort of terrorist. SO20 is the Met’s counter-terrorism protective security command.

Photograph: Lewis Whyld/PA
SOURCE: TheGuardian
EX-SPY ANDREA DAVISON SET-UP BY BRITISH GOVERNMENT – IS SHE WITH JULIAN ASSANGE?

EX-SPY ANDREA DAVISON SET-UP BY BRITISH GOVERNMENT – IS SHE WITH JULIAN ASSANGE?

Andrea Davison who risked her life to expose arms to Iraq and pedophillia in England and Wales has been wrongly convicted  by the British Government.
Like activists and whistleblowers before her  she was targeted by the State for political reasons. The State spent an estimated 1 millions pounds and 2.5 years pursuing an older  lady,  who even given what she was convicted of had harmed no-one at all.  She is belived to  have been providing intelligene to Julian Assanges network before she was arrested as the Mastermind in an international fraud  early January 2010.

Claiming Andrea  was  the Head of a criminal network  gave  the Derby Police  headed by DC Stephen Winnard  the excuse to search her home  in North Wales.   This was a ploy   to sieze from her thousands of documents on arms to Iraq and Iran  and  documents which  name pedophiles in the police and the government.  They also wanted to silence  a   lady who, working secretly with the press,  had all but brought down the last Conservative Government.

The prosecution Barrister Felicity Gerry who claims to be a Human Rights Barrister set-up Andrea in collusion with  Derby Police officers.   It is believed that the Derby and Nottingham police blackmailed Gerry because of the Mark Kennedy  Ratcliff  power station case.

Gerry who knew that Mark Kennedy was an undercover cop lied to the Court.  If it were not for  undercover cop Mark Stone/Kennedy  coming clean and admitting he had set up the Ratcliff  Power Station Activists then  all the innocent activists   would have been convicted and jailed.

see Daily Mail http://www.dailymail.co.uk/news/article-1345707/Undercover-policeman-Mark-Kennedy-Case-collapses-offers-evidence-defence.html

Felicity Gerry  did not care what lies she told  to get the activists convicted because she was already embroiled  deeply in corruption and easily blackmailed.   She lives in Bedford with her husband and three children and is known to be involved with paedophiles.  How much the Derby police know about her activities is unclear  but Gerry is often chosen to Defend paedophiles

A body  was set-up to investigate  the Mark Kennedy affair  and her role .  Gerry then  lied to the commission saying she knew nothing about her witness Mark Kennedy  being an undercover cop.  If she had not lied she  would have been given a long   prison sentence.
So it was easy for the Derby Fraud Squad to blackmail Gerry into setting up the innocent older lady  Andrea Davison.

The Solicitors Garstangs  of London were appointed by the Court against Andrea’s will  and they failed to call any of her defence witnesses or present her volumes evidence proving her innocence to the jury.  Important evidence to prove her innocence had been seized by the Police and they failed to make disclosure of this.   The jury were not told about the thousands of documents on arms to Iraq that were seized  by the police or the numerous Human Rights abuses Andrea had suffered at the hands of the Police and the State.

In August of the  year of her arrest in January 2010  her friend and neighbour  ‘spy in a bag’  Gareth Williams was murdered in London by the same people who are  out to silence  Andrea.

Even after persecuting Andrea for nearly three years  they  could not find any evidence that she has caused anyone any loss, or had harmed anyone and there was no complainant.  For example one of the crimes she  received a 2 and a half year sentence for was stealing a passport from the passport office. This was her own passport which she paid for. The passport office had put a 6 instead of an O in her date of birth and she has  not complained.   How could a jury convict someone of theft for stealing their own passport?  they should have realised the police were clutching at straws and had no real evidence against her if they were forced  to charge her with stealing her own passport.

She is  now  seeking Political asylum  the same as Julian Assange  and believed to be  in  Ecuador  or in the Embassy.

I escaped Palestine to come to a country the world believes has a just and fair legal system only to find it is a country of deep hypocrisy where the innocent are set-up by the State who have endless resources to silence  those who tell the truth,

Fluoride and The Pineal Gland: Know the Truth

Fluoride and The Pineal Gland: Know the Truth

The single animal study of pineal function indicates that fluoride exposure results in altered melatonin production and altered timing of sexual maturity. Whether fluoride affects pineal function in humans remains to be demonstrated. The two studies of menarcheal age in humans show the possibility of earlier menarche in some individuals exposed to fluoride, but no definitive statement can be made. Recent information on the role of the pineal organ in humans suggests that any agent that affects pineal function could affect human health in a variety of ways, including effects on sexual maturation, calcium metabolism, parathyroid function, postmenopausal osteoporosis, cancer, and psychiatric disease. SOURCE: National Research Council. (2006). Fluoride in Drinking Water: A Scientific Review of EPA’s Standards. National Academies Press, Washington D.C. p221-22. “In conclusion, the human pineal gland contains the highest concentration of fluoride in the body. Fluoride is associated with depressed pineal melatonin synthesis by prepubertal gerbils and an accelerated onset of sexual maturation in the female gerbil. The results strengthen the hypothesis that the pineal has a role in the timing of the onset of puberty. Whether or not fluoride interferes with pineal function in humans requires further investigation.” SOURCE: Luke J. (1997). The Effect of Fluoride on the Physiology of the Pineal Gland. Ph.D. Thesis. University of Surrey, Guildford. p. 177.

WHO ARE THEY REALLY GUARDING? ASSANGE OR DAVISON?

WHO ARE THEY REALLY GUARDING? ASSANGE OR DAVISON?

This article by Peter Eyre suggests that it is not only Julian Assange who is being heavily guarded after having sought refuge in the Ecuadorean Embassy but rather, and more importantly, a woman named Andrea Davison.

Eyre writes:

Dr David Kelly and Andrea Davison have several things in common both were experts on Biological Weapons and both were involved in the arms that went to Iraq and WMD’s and both were whistleblowers.

In his article, Eyre makes the case that others are also making that the Assange Wikileaks revealations are less than stellar and in fact, it has been said by several sources that Assange is likely a CIA/Australian secret service/Mossad asset and not the hero and defender of whistleblowers that he has been depicted as.

Apparently, Ms. Davison has evidence of arms sales and weapons of mass destruction that were moved by the Brits from South Africa to Oman and then stolen….  And much more that according to Eyre would implicate Brown, Blair and other British government members in a vast conspiracy.

According to this evidence Ms. Davison:

She knows as much as the late Dr. David Kelly and in actual fact puts herself on par with him…..she also did many runs to Iraq and herself worked for the DTI Select Committee as an “Arms to Iraq” investigator and may have also worked for MI5/6…….and yes she would be considered as a “thorn in the side” to current and past leaders and their respective governments!!

Dr. David Kelly is widely thought to have been suicided to keep hin silent and so if this is true, and Davison has similar evidence, it is vital that she be allowed to testify in open court or at the very least have that evidence reach the major media with whatever further information it can provide on just how far this rabbit hole goes.

Peter Eyre was a recent guest on my radio show… And I will endeavor to have him on once again to discuss this and other background to the axis of power with regard to the City of London who he refers to as the “Crown Templar”.

It is fact that all of the above were all involved in the New World Order financial rape of not only this country but many others compliments of the Crown Templar that is housed in the City of London – the “True axis of evil” with its tentacles radiating out from the Rothschild’s and the Committee of 300 across the waters to Europe and the good old US of A.

Many Camelot readers will be familiar with our whistelblower [see Anglo Saxon Mission article here] who talks in detail about being present during City of London meetings where fates of nations were discussed like dominoes on a board.  This is an area that needs further revealing and Eyre is clearly on that trail as an investigative journalist with inside information in that regard.

Thursday, 23 August 2012 02:04
Written by Kerry Cassidy
Irish Heroine of Batman Shooting Spree Drowns

Irish Heroine of Batman Shooting Spree Drowns

It is widely known that victims and witnesses were giving conflicting reports when compared to the ‘official’ version of events. Did Jenny hear something she shouldn’t have? Did she know something they didn’t want to get out? This is far too suspicious…

-Max Maverick, DCMX Editor

US president Barack Obama and his wife Michelle paid tribute to Jenny and her colleagues who are credited with saving the lives of some of those injured in the massacre.

PHD student James Holmes has been charged in relation to the shootings which left 12 people dead.

However, her family has now been plunged into a sense of grief of their own. Jenny was out swimming in a lake close to her home when she is believed to have drowned.

Her husband Greg Pinson and five-year-old son Jack are struggling to come to terms with the loss of a “wonderful mother”.

Heartbroken

Her mother Brigid, who was unable to fly to Denver for the funeral, added: “I am heartbroken, it is just terrible, terrible. She was such a wonderful person who was just so full of life and a wonderful mother who loved Jack so much,” she said.

“I will miss her so much. Her brothers and sisters went over for the funeral and we had a little mass for her here. She could light up a room when she walked into it.”

Jenny studied to be a nurse in Denver in the nineties and decided to settle there.

She was a GAA fanatic and founded the Denver Gaels ladies football club.

The club posted an emotional tribute on its website, describing Jenny as a “loving and devoted mother” and a “proud Meath woman”.

“Every team has its ups and downs, its wins and losses … the Pinson and Gallagher families, the Gaels and our Irish community suffered a great loss. Jennifer Gallagher passed on, leaving a wake of sorrow, sadness and loving memories.

“When you met Jenny she brightened up your day and wanted to know how you were doing. Others always came first in the most natural and sincere way.

“In her vocation as a nurse, she cared for those with most acute needs in the burn unit, the ER and most recently was recognized for her work with the Aurora shooting victims by President Obama. We were all very proud of her”

A special memorial mass is due to take place in Duleek on August 26.

[email protected]

Thousands of UK Workers ‘Blacklisted’ Over Political Views

Thousands of UK Workers ‘Blacklisted’ Over Political Views

Activists threaten legal action over failure to investigate

Corporations in the UK who used a secret “blacklisting” database to screen out ‘left wing trouble-makers’ and union sympathizers as potential job recruits are facing renewed scrutiny after the UK-activist group Liberty called for a fresh investigation Monday night.

A demonstration outside the Olympic site on March 1, 2011 was called in solidarity with the whistleblower who was fired for standing up for an illegally blacklisted workmate. The blacklist scandal first broke in 2008, when the UK media revealed that more than 40 leading employers had subscribed to the vetting service provided by The Consulting Association, which had surveillance files on more than 3,200 workers, including political activists, shop stewards and health and safety representatives.

Police seized the database three years ago and Ian Kerr, the founder of The Consulting Association, was fined only about $7,500. Invoices were discovered showing that 44 companies had paid to access the names on the list.

But full details of the material it contained only emerged as workers began to pursue legal action over their inclusion.

Liberty is now threatening to go to court to force the UK government to investigate the case, which it has compared in severity to the national press phone hacking scandal.

Corinna Ferguson, legal officer for Liberty, told the Independent: “We can’t believe the inaction of the Information Commissioner on a human-rights violation of such wide public interest.

“Contracting out the blacklisting of innocent workers, politicians and journalists is no better than farming out phone hacking to private detectives and the consequences for our democracy are just as grave. If we cannot persuade the Commissioner to discharge his public duty, we will consider seeking assistance from the courts.”

Statements from some of the blacklisted workers from the Blacklist Support Group (BSG):

Mick Abbott, a 74-year-old ex-scaffolder, commented: “This nearly ruined my marriage and it meant that my children were on free meals at school. My file goes back to 1964 and the last entry says that I rekindled the campaign for justice for the Shrewsbury picketers in 2006. They have been watching me all these years and passing this information around, blighting my life over four decades.”

Steve Kelly, an electrician and spokesperson for the Blacklist Support Group said: “I was blacklisted because I was a union member and because I raised issues about safety. In 2007, [Sir Robert] McAlpine sacked me from the Colchester Barracks project after 2 days for refusing to work on a moving platform without proper training (exactly as we had been instructed in the site induction) – the dismissal is recorded on my blacklist file.

“Over the year I suffered severe financial strain, my wages were cut in half which caused immense stress paying bills and putting food on table. I was out of work for a year apart from few weeks here and there in 2001. Being sacked from Colchester Barracks after only two days piled up the stress and caused a nervous breakdown for me eventually.

“The blacklisting firms should be made to pay compensation for years lost and years in future. They should be made to employ blacklisted workers or not be awarded any public government backed contracts. An apology in national press and to individuals whose lives they ruined would be a start.”

SOURCE: CommonDreams.org

PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones

PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones

In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved.

The patent describes a Trojan-like program that can be secretly installed on mobile phones, allowing the attacker to monitor and record all communications incoming and outgoing, as well as manipulate the phone itself. Oceans’ Edge says that the tool is particularly useful because it allows law enforcement and corporations to work around mobile phone providers when they want to surveil someone’s phone and data activity. Instead of asking AT&T for a tap, in other words, the tool embeds itself inside your phone, turning your device against you.

A former employee of Oceans’ Edge notes on his LinkedIn page that the company’s clients included the FBI, Drug Enforcement Agency, and other law enforcement.

Oddly enough, Oceans’ Edge, Inc. describes itself as an information security company on its sparsely populated website. The “About Us” page reads:

Oceans Edge Inc. (OE) is an engineering company founded in 2006 by wireless experts to design, build, deploy, and integrate Wireless Cyber Solutions.
Our team is composed of subject matter experts in the following areas:
  • Wireless Cyber Security
  • Mobile Application Development
  • Wireless Communication Protocols
  • Wireless Network Implementation
  • Lawful Intercept Technology
With this expertise, we deliver engineering services and wireless technology solutions in critical mission areas for our government and commercial customers.
But while the company may offer “cyber security” solutions to government and corporations, as the website claims, the firm only has one approved patent on file with the US Patent and Trademark Office.
Remote mobile spying

The patent is for a “Mobile device monitoring and control system.” The applicants summarize the technology thusly:

Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described.

In other words, the technology works to snoop on mobile phones by secretly installing itself on phone hardware. The targeted phone is thus compromised in two ways: first, the attacker can spy on all the contents of the phone; and second, the attacker can operate the phone from afar. That’s to say, it doesn’t just let the attacker read your text messages. It also potentially lets him write them.

The summary goes on:

One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; a listen-only recording service in electronic communication with the device controller; and a WAP gateway in electronic communication with the remote computer controlled wireless communication device.

The technology therefore also enables automated data storage of all of a phone’s activity in the attacker’s database. So if someone used this technology to spy on your phone, they would be able to use the Oceans’ Edge product to automatically store everything you do on it, to go back to later.

In case you aren’t sure who would want this kind of spook technology or why, Oceans’ Edge explains in the patent application:

A user’s employment of a mobile device, and the data stored within a mobile device, is often of interest to individuals and entities that desire to monitor and/or record the activities of a user or a mobile device. Some examples of such individuals and entities include law enforcement, corporate compliance officers, and security-related organizations. As more and more users use wireless and mobile devices, the need to monitor the usage of these devices grows as well. Monitoring a mobile device includes the collection of performance metrics, recording of keystrokes, data, files, and communications (e.g. voice, SMS (Short Message Service), network), collectively called herein “monitoring results“, in which the mobile device participates.

The application goes on to explain that the tool is beneficial to law enforcement or other customers because it allows them to avoid dealing with pesky mobile phone providers when they want to covertly spy on people’s mobile communications. Instead of the FBI going to AT&T or T-Mobile to get access to your cell data, they can just surreptitiously install this bug on your phone. They’ll get all your data — and your phone company might never know.
Mobile device monitoring can be performed using “over the air” (OTA) at the service provider, either stand-alone or by using a software agent in conjunction with network hardware such a telephone switch. Alternatively, mobile devices can be monitored by using a stand-alone agent on the device that communicates with external servers and applications. In some cases, mobile device monitoring can be performed with the full knowledge and cooperation of one of a plurality of mobile device users, the mobile device owner, and the wireless service provider. In other cases, the mobile device user or service provider may not be aware of the monitoring. In these cases, a monitoring application or software agent that monitors a mobile device can be manually installed on a mobile device to collect information about the operation of the mobile device and make said information available for later use. In some cases, this information is stored on the mobile device until it is manually accessed and retrieved. In other cases, the monitoring application delivers the information to a server or network device. In these cases, the installation, information collection, and retrieval of collected information are not performed covertly (i.e. without the knowledge of the party or parties with respect to whom the monitoring, data collection, or control, or any combination thereof, is desired, such as, but not limited to, the device user, the device owner, or the service provider). The use of “signing certificates” to authenticate software prior to installation can make covert installation of monitoring applications problematic. When software is not signed by a trusted authority, the software may not be installed, or the device user may be prompted for permission to install the software. In either case, the monitoring application is not installed covertly as required. Additionally, inspection of the mobile device can detect such a monitoring application and the monitoring application may be disabled by the device user. Alternatively, OTA message traffic may be captured using network hardware such as the telephone switch provided by a service provider. This requires explicit cooperation by the service provider, and provides covert monitoring that is limited to message information passed over the air. As a result, service provider-based monitoring schemes require expensive monitoring equipment, cooperation from the service provider, and are limited as to the types of information they can monitor.
The applicants describe some of the challenges they had to overcome, which include:
Additional challenges are present when the monitoring results are transmitted from a mobile device. First, many mobile devices are not configured to transmit and receive large amounts of information. In some instances, this is because the mobile device user has not subscribed to an appropriate data service from an information provider. In other instances, the mobile device has limited capabilities.
In other words, make sure you get that unlimited data plan, or else it’ll be really hard for the FBI to spy on your mobile phone! It’ll take up so much of your data usage that you’ll notice and maybe even complain to your mobile provider! That would be awkward.
Second, transmitting information often provides indications of mobile device activity (e.g. in the form of activity lights, battery usage, performance degradation).
Bad battery performance that the geeks at the Apple genius bar can’t explain? Maybe your device has been compromised.
Third, transmitting information wirelessly requires operation in areas of intermittent signal, with automated restart and retransmission of monitoring results if and when a signal becomes available.
The monitoring program has got to be clever enough to stop and restart every time you go out of range of your cell network, or you turn the phone off.
Fourth, many mobile devices are “pay as you go” or have detailed billing enabled at the service provider. The transmission of monitoring results can quickly use all the credit available on a pre-paid wireless plan, or result in detailed service records describing the transmission on a wireless customer’s billing statement.
When the snoops steal your information, you might have to pay for the pleasure of being spied on. That’s because your mobile phone provider might read the spying activity as your activity. After all, it’s coming from your phone.
Lastly, stored monitoring results can take up significant storage on a mobile device and the stored materials and the use of this storage can be observed by the device user.
Is there a large chunk of space on your phone that seems full, but you can’t figure out why? Perhaps a snoop tool like that devised by Oceans’ Edge, Inc. is storing data on your phone that it plans to later capture.
Given all of those potential problems, the technologists had a lot of work cut out for them. Here’s how they addressed those problems:
From the foregoing, it will be appreciated that effective covert monitoring of a mobile device requires the combination of several technologies and techniques that hide, disguise, or otherwise mask at least one aspect of the monitoring processes: the covert identification of the mobile devices to be monitored, the covert installation and control of the monitoring applications, and the covert exfiltration of collected monitoring results. As used herein, “covert exfiltration” refers to a process of moving collected monitoring results from a mobile device while it is under the control of another without their knowledge or awareness. Thus covert exfiltration processes can be those using stealth, surprise, covert, or clandestine means to relay monitoring data. “Collected monitoring results” as used herein includes any or all materials returned from a monitored mobile device to other devices, using either mobile or fixed points-of-presence. Examples of collected monitoring results include one or more of the following: command results, call information and call details, including captured voice, images, message traffic (e.g. text messaging, SMS, email), and related items such as files, documents and materials stored on the monitored mobile device. These materials may include pictures, video clips, PIM information (e.g. calendar, task list, address and telephone book), other application information such as browsing history, and device status information (e.g. device presence, cell towers/wireless transmitters/points-of-presence used, SIM data, device settings, location, profiles, and other device information). Additionally, the capability to covertly utilize a mobile device as a covertly managed camera or microphone provides other unique challenges. 
Thus covert monitoring of a mobile device’s operation poses the significant technical challenges of hiding or masking the installation and operation of the monitoring application, its command and control sessions, hiding the collected monitoring results until they are exfiltrated, surreptitiously transmitting the results, and managing the billing for the related wireless services. The exemplary illustrative technology herein addresses these and other important needs.
In short, Oceans’ Edge Inc., a company founded and operating in the heart of CIA country, says it has a technology that can secretly install itself on mobile phones and push all the contents of the devices to an external database, doing so entirely under the radar of both the target and the target’s mobile provider. It even boasts that the tool allows for covertly managing phone cameras and microphones.
What kind of contracts does this company have, and with which government agencies? A cursory internet search didn’t turn up much, except for a couple of bids to work on a military information operations program and a cyber defense project. Neither one of those programs has an obvious link to the mobile snooping device described in the patent application.

Since we don’t know which agencies are using this technology or how, it’s hard to say to what extent this kind of secret monitoring is taking place in the US. We have some evidence suggesting that the FBI and DEA are using this tool (thanks, Chris Soghoian, for the tip). If those agencies really are using this technology, they should get warrants before they compromise anyone’s phone.

Is the government getting warrants to use this tool? We don’t know.

Oceans’ Edge Inc., like many purveyors of surveillance products, claims that its technology is only deployed for “lawful interception,” but it makes no claims about what that actually means. There’s no mention of judicial oversight, warrants, or any kind of due process. As I’ve written elsewhere on this blog, given the state of the law concerning surveillance in the digital age, we shouldn’t let our guard down simply because a company claims its surveillance tools are used lawfully. That’s because we do not know how these tools are being deployed, and yet we know that the state of surveillance law in the US at present grants the government wide latitude to infringe on our privacy in ways that are often improper or even unconstitutional.

In most cases (with a few notable exceptions), lawmakers haven’t worked to address this issue.

As we can see, surveillance technologies are developing rapidly. It’s past time for our laws to catch up.

Chemtrails: Air Force Pilot Admits Spraying

Chemtrails: Air Force Pilot Admits Spraying

 

People continue to become ill as high levels of chemicals show up in random testing of soil and water supplies, after witnesses photograph KC-135s and KC-10s outfitted with what appears to be a “spraying device.” The circular device is obviously not a refueling probe. A former Air Force pilot tells a reporter, “Yeah, we have them, but were not supposed to talk about it.”

The South Coast Air Quality Management District tentatively identifies the powder wafting down from the sky as “cedar pollen.” But a biologist retorts that December is not the season when cedar pollen normally appears. And when pollen appears in the spring, it does not “explode.” Several witnesses saw a yellow cloud “exploding” in the skies over the Lake Arrowhead area.

Dramatic increase in illnesses immediatly follow Chemtrail spraying

According to a press story, community after community continue to report that hundreds of people are becoming ill at the same time-usually following heavy chemtrail activity. Three physicians report an increasing number of patients being seen for similar illness.

“Persistent hacking coughs, upper respiratory and intestinal distress, pneumonia, extreme fatigue, lethargy, dizziness, disorientation, splitting headaches, elevated arthritis symptoms and unexplainable nosebleeds are just a few of the symptoms these doctors have described. These doctors have said they are seeing larger numbers of patients with these complaints during or within days after the times that the physicians themselves have observed a larger number of chemtrails in the skies above mountain communities.”

Pharmacist Ed Burrows is sick himself. Since early December he has been suffering from a respiratory ailment that has includes a “gooey phlegm” that, despite his best efforts, he has been unable to relieve. Burrows said the issue is raising “high concern” for him that his health may be “jeopardized.” Burrows says he “feels that it is directly related” to recent chemtrail activity.

World population being lied to…

“Our government’s refusal to level with the people indicates that whatever it is they are polluting our environment with must be dangerous and/or unhealthy. There is no need to be secretive if what you are doing is beneficial,” he says. “As the former owner and pharmacist of the Lake Gregory Pharmacy for more than two decades, this is the first time in those 22 years I’ve witnessed so many in our community suffering with respiratory ailments with no apparent cause… ”

CHEMTRAILS BASES IDENTIFIED

Las Vegas reporter Marcus Dalton writes that an archeologist working throughout Nevada began noticing “all white unmarked aircraft” preparing for take-off at Nellis AFB, and at the Mancamp Complex near Tonopah in the late-90s.

“It was these unmarked planes that were constantly laying down the criss-crossing X patterns of lingering chemical-spray trails over Southern Nevada,” the archeologist stated. When he asked the military escort accompanying his civilian research team into “sensitive” areas around Nellis, about the planes, he was strongly advised, “You didn’t see anything.” [Tribune Media Group June 26/06]

Outside Dobbins Air Base in Marietta, Georgia, another observer writes: “We drove up to a light and saw the runway, and saw a large, white plane, with a blue stripe, no markings at all, taxiing to take off.”

A delivery person at Tinker AFB states “I have seen more than 30 of these white, KC-135s parked on the tarmac. I have seen six to 10 take off, one after another. They are, indeed, white with no markings.”

The white planes have also been spotted at a former AFB near Phoenix, and at the previously closed George AFB in the Mojave Desert.

One correspondent claims to have personally seen the spray planes taking off from and landing at McGuire AFB in New Jersey. Active in the Canadian military “since my birth,” Bryan says, “What I have noticed is that unusual trails have been coming from white USAF KC-135s heading to Shiloh, Alaska.

Israel Embraces Medical Cannabis

Israel Embraces Medical Cannabis

While Americans petition state senators to legalize medical marijuana, and the Dutch simply go to an Amsterdam café to self-medicate, thousands of Israelis are enrolled in a regulated medical marijuana program. As talk-show veteran Montel Williams recently saw for himself, Israel is one of the most progressive countries in the world to “legalize it.”

Israel’s inroads into legalizing cannabis for pain relief and managing terminal illness rest on the seminal research of Prof. Raphael Mechoulam of the Hebrew University in Jerusalem’s Center for Research on Pain.

Back in 1964, working from bags of hashish seized by the local police, Mechoulam isolated the active compound from cannabis, THC. He came to be a trusted consultant on the topic to governments and individuals — even to a US senator who was worried about his child’s use of pot at jazz clubs — and urged that derivative compounds called cannabinoids be legalized for medical purposes in Israel.

Mechoulam’s work has inspired generations of research teams around the world to look to marijuana for alleviating medical conditions from chemo-induced nausea to chronic pain. His work led to the discovery of ananamides, naturally occurring THC-like materials in the brain.Mechoulam was recently awarded the Rothschild Prize in physical and chemical sciences in recognition of his contributions. With the help of his efforts, Israel started to develop policies so that medical marijuana can be accessed by those who need it most.

Reducing the reliance on opiates

Mechoulam’s lab was one of the stops on a recent tour of Israel’s medical marijuana researchers by US celeb Montel Williams, who told reporters that the United States could learn a few things from Israel’s approach.

Diagnosed with multiple sclerosis (MS) in 1999, Williams advocates for research and education on new directions in treatment, including medical marijuana, through his MS Foundation. Williams says that medical marijuana helps ease his neuropathic pain and he’s working to legalize it in the United States.Mechoulam acknowledges that Israel’s approach is probably the most advanced in the world, considering the numbers of patients taking medical marijuana in a supervised way.

“At present, about six or seven thousand people get it for various reasons, for [chronic] pain and for cancer, as it’s helping the symptoms of cancer by lowering the amount of opiates patients have to take,” Mechoulam tells ISRAEL21c. That number is expected to rise to about 40,000 by 2016.

“People who are in great pain who are taking opiates aren’t really functional anymore. Taking THC as a medical marijuana, or in its pure form, means that the opiates can be lowered, and then this person will have a better way of life,” he says.

Rigorous screening

The Health Ministry slowly began the program in 1994, but it really got going in 2002 under the direction of Dr. Yehuda Baruch from Abarbanel Hospital, a psychiatric facility in Bat Yam.

Patients of all ages may apply for approval through their own medical doctor or through the Sheba Medical Center, and must pass a rigorous screening process. Those eligible include cancer patients undergoing chemotherapy; cancer patients with final-stage tumors; patients enrolled in an Israeli HIV center; and people under treatment for chronic pain, Crohn’s or ulcerative colitis, MS and post-traumatic stress disorder.

When properly dispensed under medical supervision, medical cannabis has a very low rate of abuse, says Mechoulam.

Still working as a researcher, Mechoulam is asked periodically to test the levels of THC in pot grown by licensed Israelis. And while he’s happy with the country’s progress, he says more research needs to be done on standardizing the dosages and incorporating missing elements in the medical strain used in Israel.

“Basically Israel is moving in the right direction. [THC] has to be better quantified, and cannabidial, a potent anti-inflammatory agent, needs to be present in the doses used in Israel,” he says. Cannabidial alleviates possible undesirable side-effects of THC.

These room-to-grow tips not withstanding, “Israel is one of the leading cannibinoid centers of research in the world. There are about two dozen groups working on it and people come from all around the world to see what we do,” Mechoulam concludes.

By: Karin Kloosterman, March 29, 2012

SOURCE

 

10 Foods with More Ammonia than Pink Slime

10 Foods with More Ammonia than Pink Slime

One of the most nausea-inducing qualities of “pink slime” (a.k.a. disinfected leftover beef trimmings, a.k.a. the contents of your fast food hamburger patty) is the fact that it’s doused with ammonia. But as it turns out, that’s not as uncommon as you might like to think.According to the University of Michigan Risk Science Center, a burger patty made with pink slime contains 0.02 grams of ammonia per 100 grams of meat — but bleu cheese contains almost seven times as much.

Here are 10 foods with more ammonia than your slimy, slimy burger:

  • Cheese. Oh my god, cheese is like an ammonia warehouse. Domestic bleu cheese topped the list with 0.138 grams of ammonia per 100 grams, but cheddar (0.11), beer cheese (0.092), American cheese (0.081), and a couple types I’ve never heard of all ranked.
  • Salami, 0.11 grams of ammonia per 100 grams.
  • Peanut butter, 0.049 grams per 100.
  • Mayonnaise, 0.041 grams per 100.
  • Ketchup, 0.035.
  • Gelatin, 0.034.
  • Onions, 0.027.
  • Potato chips, 0.024, though I imagine the brand and flavor would matter.
  • Brewer’s yeast, 0.022.
  • Margarine, 0.021

Now, to be fair this is based on a 1973 paper, so the ammonia content in some of these foods may have changed. But on the other hand, in 1973 the ammonia content in a burger patty was half what it is today. So those changes might not have been for the better.

It’s not totally clear whether you should be less freaked out by pink slime, or a hell of a lot more freaked out by everything else. But one thing is for certain: You may want to think twice about whether you’re going to eat that burger with mayo, onion, ketchup, and American cheese — or whether you’re just going to use it to clean your windows.

SOURCE:

Conspiracy Theorists Deserve An Apology

Conspiracy Theorists Deserve An Apology

The world must apologize to 9/11 truth-tellers.

The reason why there is so much hate and scorn for 9/11 truth activists is because they are right and consistent. The destruction of the 9/11 myth and war on terror ideology is unbearable for the children who are emotionally, spiritually, and psychologically attached to the U.S. government and the Israeli government. They are under the delusion that these evil governments actually care about them, their security, and their future.

The mature men and women of America and the West are waking up and confronting the lies of 9/11 and 7/7. And this political awakening is not unique to America and Western civilization. There is a global political and spiritual awakening happening. All totalitarian regimes in the world will fail in hijacking history and they will fall into ruin. The state terrorists in Washington, London, and Tel Aviv have already lost the battle for history and the souls of mankind.

Alternative accounts of history and reality under totalitarian regimes have always been denounced by regime political mouthpieces as crazy and conspiratorial. And they always failed because truth and history were not on their side. The crazy and the conspiratorial were proven right in the end. This is what history shows, and especially the history of the demonic 20th century. So we should have hope and continue to speak the truth about 9/11 to wake up as many people as possible before the U.S. and Israeli governments blow up the whole world.

II. Unthinking and Regressive: Think Progress Attacks 9/11 Truth, Drudge Report, And Infowars

The political mouthpiece of the Obama administration called ‘Think Progress’ tried to shame and belittle Drudge Report for highlighting Infowars stories. Paul Joseph Watson writes in his article, “Obama Front Group Attacks Drudge For Linking To Infowars”:

“Think Progress is a little more than a PR firm for the Obama administration. No wonder they are so terrified that thanks to traffic from Drudge, the likes of Infowars and World Net Daily have grown to become two of the most visible anti-Obama news outlets on the web.

Think Progress claims it is upset that Drudge is promoting what they call “conspiracy theories,” but in reality the root of the anger is that Drudge is providing a platform for some of the Obama administration’s most ardent critics.”

Think Progress is not worth talking about. It is an irrelevant thought-control political operation. Their reporters defend myths and fallacies while putting down truth-tellers as conspiracy theorists. What they are doing is not only unjust but just plain stupid. They are embarrassing themselves. It is actually very sad.

Truth is more powerful than totalitarian propaganda. The mainstreaming of the 9/11 truth movement is unstoppable. 9/11 truth deniers should rejoin reality and admit that it is wrong to defend the official conspiracy theory that was spread by the Bush administration and Israeli government quickly after the traumatic events.

III. The Religious Nature of The 9/11 Deception and Propaganda

Author and Christian theologian David Ray Griffin explained why the belief in the official conspiracy theory of 9/11 is religious in nature in his lecture in October 2007 called, “9-11 and Nationalistic Faith.” Griffin was recently interviewed by Jan Frel of AlterNet in an article called, “David Ray Griffin: How a Retired Theologian Became a High-Priest of the 9/11 Truth Movement.” Describing Dr. Griffin as a “High-Priest,” suggesting that the 9/11 truth movement is somehow a new age mystery cult, is really aiming low.

9/11 truth has nothing to do with religion or priests. Scientific facts are the basis of the movement. Architects, engineers, chemists, scientists, and university professors are the leading spokespeople. Religious figures like Dr. Griffin have contributed great wisdom and understanding but to imply that the 9/11 truth movement is led by “priests” is a lie.

Priests are nowhere to be found in the 9/11 truth movement and that’s okay because they are not needed. They are too busy defending evil empires on the pulpit and sacrificing moral principles for temporary power. Their days as the rulers of the spiritual life of Western civilization have come and gone.

Dr. Griffin is a noble exception, but, in general, Christianity has proven to be useless, corrupt, stupid, blind, and power-driven. The same is true for every other moronic religion that makes individuals submit their heart and soul to a corrupt clergy. The majority of Christians are too obsessed about the second coming and the holiness of Israel to really understand that 9/11 was an inside job committed by the occult elite in America and Israel. They don’t want to admit that the criminal wars in the Middle East have nothing to do with defending the security of USrael.

What do priests and religious idiots offer humanity and the world? Nothing. They are absent in the battle for souls and the battle for freedom because they are corrupt, blind, and stupid. Expecting Christians to fight the totalitarian state and liberate America is laughable. I’m generalizing here, but Christians, Muslims, and religious Jews are the most tyrannical, greedy, hypocritical, hateful, soulless, and ungrateful people in the world. They want to have a monopoly on the human soul and human mind. What maniacs! And the totalitarian priests who head the CIA and Mossad are just as crazy and demented because they also want to monopolize the thoughts of citizens and control the growth of society.

The role of blind religious faith in preventing people from seeing the truth about 9/11 is big. American Christians, who have bought USrael’s propaganda and blindly accept the official 9/11 story, feel no shame in calling for the destruction of Iran and the Muslim world. They make me sick. They don’t realize that they’re bringing destruction upon themselves by calling for the destruction of other nations and civilizations. As they say, what goes around comes around. If warmongering American Christians want death and destruction so much then they will get it in plenty, except the fires of hell won’t burn in the Middle East alone, but in America as well.

IV. Conspiracy Theorists And 9/11 Truthers Deserve An Apology

Who is trying to stop World War III and wake the West up from its sleep? Progressives? No. Liberals? No. Conservatives? No. Christians? No. Journalists? No. They all believe in the official 9/11 deception, which is the ideological foundation that justifies USrael’s aggressive wars in the Middle East.

9/11 truth-tellers, the “conspiracy theorists,” have tried to wake up humanity in order to stop the USraeli government from starting the catastrophe of world war three. And for their efforts they have been slandered and smeared in the press. But the 9/11 truth movement still continues to grow by the day.

There is a simple reason why the rise of 9/11 truth cannot be contained by the USraeli government, and it is this: the age of slandering and smearing is over. Belittling people by calling them mentally ill conspiracy theorists and truthers is not working anymore. We embrace these terms. We are proud of being called conspiracy theorists because it means we’re thinking.

Slandering and smearing Infowars and other alternative news websites is futile. It is a waste of time. Censorship, disinformation, and propaganda are failing. The global free market and global civil society have spoken. People want the news, not smears; truth, not lies; facts, not totalitarian propaganda; freedom, not tyranny; peace, not war.

The Excavator
Related:
We Are All Conspiracy Theorists Now: The Mainstreaming of 9/11 Truth
The Evaporation of Darkness: Mass Deprogramming And The End of The 9/11 Consensus
A Radical Rethinking of Conspiracy Theories Is Underway Globally