Anonymous to the Machine: You Will Rust and Die..

Anonymous to the Machine: You Will Rust and Die..

http://www.youtube.com/watch?v=9TG4RTwctlw

A POWERFUL MESSAGE

This is an exert from the movie The Great Dictator starring Charlie Chaplin. Statements made then, Should be held true today. Stand up and fight my brothers and sisters. Raise up your arm to those who oppress and Tyrannize.

IRS Insider Joe Banister Exposes Illegal Fraud

IRS Insider Joe Banister Exposes Illegal Fraud

http://www.youtube.com/watch?v=iEL2uOG9Jrc

Joe Banister is the first and thus far only IRS Criminal Investigation Division Special Agent ever to conduct, while serving as a special agent, an investigation into allegations that the IRS illegally administers and enforces the federal income tax. He respectfully reported the results of his investigation to his IRS superiors, up to and including the IRS Commissioner. Rather than address the legitimate concerns raised by one of their own distinguished investigators, his IRS superiors suspiciously refused to address the chilling evidence of IRS wrongdoing raised in his report and instead encouraged him to resign from his position. Observing that IRS management intended to cover up the deceit and illegal conduct alleged in his report, Banister chose to resign from his position so that he could report his findings to the American public. In effect, Banister had to resign from his position in order to abide by his oath to support and defend the U.S. Constitution.

SOURCE: http://www.infowars.com/irs-insider-joe-banister-exposes-federal-reserve-coup-and-irs-fraud/

 

Leak Site Directory

Leak Site Directory

Contents

Whistle blower leaking Sites

Official and Community based sites that actively support whistle blowing / leaks about various topic

You can edit the wiki without having your ip address displayed by logging with the following Anonymous profile.

Username: Anonymous
Password: leaked

You may use that template in making leak site profiles:

 

WikiLeaks-Like Whistle blowing Sites

Leak Sites that publish leaks and accept submission of leaks, inspired by the original WikiLeaks.org concept.

New Concept Leak Sites

Different approaches and leaking methodologies

Established Leak Sites

Websites which have been publishing censored or leaked material before, or independently in parallel with WikiLeaks

Mainstream Media Whistle blowing Sites

Leak Sites that are operated by the media organizations directly

Environmental Protection Whistle blowing sites

Leak Sites and Organization that accept reporting about environmental issues

National Security or Serious Crime anonymous tip off / whistleblower sites

Tax Whistleblowing

Financial Whistle Blowing

Whistle Blowing for Censorship and Net Neutrality

Leak friendly websites

Websites which have a specific topic, audience and editorial position and as part of their reporting have frequently published high level unpublished documents

Public, USA FOIA and/or historical document release sites

Sites about whistleblowing and leaking

Leak Support Sites

Sites that support leaking in the editing and publishing processes, providing news, commentary or other stuff

Sites Commenting Leaks

Whistle Blowing Organizations

Organizations around the world that support Whistleblowing by promoting it as a transparency practice is public and private sector.

Whistle Blowing Consulting Businesses

Organization that do business related to WhistleBlowing and leaking (Consulting, Services, Press Agency middle men etc).

Whistle Blowing Hot Line Services

Charity and Profit organization that provide to public agencies and private corporation hotline services for whistleblowing in order to outsource the internal reporting service.

 

Whistle Blowing Software as a Service

The commercial services are typically known as Whistleblowing reporting systems, or anonymous internet reporting systems.

Whistle Blowing Software

Software used by public and private organization to manage whistleblowing sites (We need more free software!)

Open Source Whistleblowing Software

  • Honest AppalachiaHonest Appalachia website – uses Tor Hidden Service and PGP and publishes its own Open Source documents submission website software and configuration scripts to help other similar whistleblowing projects

Whistle Blowing in Corporations

A Directory of corporations that implemented corporate transparency by implementing whistleblowing through the organization:

Whistle Blowing Laws, Study and Regulations

A directory of laws, study, regulations and assessments on Whistle Blowing laws and practice in various countries.

Whistle Blowing Cases

Possibly Defunct/Dead websites

Encryption / Anonymity infrastructure services/ software used by some Whistleblower Sites

 

LeakDirectory related

Here misc stuff on Leak Directory initiative

Leak Directory backup wiki

A spam protected backup wiki mirror of this website is available at:

http://leakdirectory.wikispaces.com/

 

External opinions/reportage on LeakDirectory

http://britileaks.tumblr.com/post/15239051302/a-few-brief-notes-on-leakdirectory
https://p10.secure.hostingprod.com/@spyblog.org.uk/ssl/ht4w/leakdirectoryorg-wiki.html

LeakDirectory workshop at 28C3 Chaos Computer Congress

There will be a workshop about the LeakDirectory project at the

28C3: Behind Enemy Lines
28th Chaos Communication Congress
December 27th to 30th, 2011
Berliner Congress Center, Berlin, Germany,

See http://events.ccc.de/congress/2011/wiki/SocialHacking_LeakDirectory:

The Workshop has been glued together with GlobaLeaks one, you can download slides here

SocialHacking LeakDirectory Social Hacking

We will give an overview of what whistle blowing is and how it can be applied a wide array of different situations. Hopefully by the end of the workshop you will understand that whistle blowing is a fundamental tool for a democratic and transparent society.

We will focus in particular on the Leakdirectory Project, a shared crowd based initiative to represent most of the world of whistleblowing with the goal to became a reference for all the whistleblowing initiatives.

http://leakdirectory.org/index.php/Leak_Site_Directory

Attention Activists: 17 Techniques for Truth Suppression

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

1. Dummy up. If it’s not reported, if it’s not news, it didn’t happen.

2. Wax indignant. This is also known as the “How dare you?” gambit.

3. Characterize the charges as “rumors” or, better yet, “wild rumors.” If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through “rumors.” (If they tend to believe the “rumors” it must be because they are simply “paranoid” or “hysterical.”)

4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.

5. Call the skeptics names like “conspiracy theorist,” “nutcase,” “ranter,” “kook,” “crackpot,” and, of course, “rumor monger.” Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the “more reasonable” government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own “skeptics” to shoot down.

6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).

7. Invoke authority. Here the controlled press and the sham opposition can be very useful.

8. Dismiss the charges as “old news.”

9. Come half-clean. This is also known as “confession and avoidance” or “taking the limited hangout route.” This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal “mistakes.” This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.

10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.

11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster “suicide” note was forged, they would have reported it. They haven’t reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.

12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?

13. Change the subject. This technique includes creating and/or publicizing distractions.

14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as “bump and run” reporting.

15. Boldly and brazenly lie. A favorite way of doing this is to attribute the “facts” furnished the public to a plausible-sounding, but anonymous, source.

16. Expanding further on numbers 4 and 5, have your own stooges “expose” scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.

17. Flood the Internet with agents. This is the answer to the question, “What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?” Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.

 

 

 

 

HOW TO JOIN ANONYMOUS

HOW TO JOIN ANONYMOUS

So you want to join Anonymous?

You can not join Anonymous. Nobody can join Anonymous.
Anonymous is not an organization. It is not a club, a party or even a movement. There is no charter, no manifest, no membership fees. Anonymous has no leaders, no gurus, no ideologists. In fact, it does not even have a fixed ideology.

All we are is people who travel a short distance together – much like commuters who meet in a bus or tram: For a brief period of time we have the same route, share a common goal, purpose or dislike. And on this journey together, we may well change the world.

Nobody can speak for Anonymous. Nobody could say: you are in, or you are out. Do you still want to join Anonymous? Well, you are in if you want to.

How to get in contact with others?
Anonymous has no centralized infrastructure. We use existing facilities of the Internet, especially social networks, and we are ready to hop on to the next one if this one seems compromised, is under attack, or starts to bore us.

At the time of this writing, Facebook, Twitter and the IRC appear to host the most active congregations. But this may change at any time. Still, these are probably the best places to get started. Look for terms like “anonymous”, “anonops” and other keywords that might be connected to our activities.

How do I recognize other Anonymous?
We come from all places of society: We are students, workers, clerks, unemployed; We are young or old, we wear smart clothes or rugs, we are hedonists, ascetics, joy riders or activists. We come from all races, countries and ethnicities. We are many.

We are your neighbours, your co-workers, your hairdressers, your bus drivers and your network administrators. We are the guy on the street with the suitcase and the girl in the bar you are trying to chat up. We are anonymous. Many of us like to wear Guy Fawkes masks on demonstrations. Some of us even show them in their profile pictures in social networks. That helps to recognize each other.

Have you been infiltrated?
If you talk to another Anonymous, you will never know who he is. He may be a hacker, cracker, phisher, agent, spy, provocateur – or just the guy from next door. Or his daughter. It is not illegal to be Anonymous. Nor is it illegal to wear Guy Fawkes masks. Keep that in mind. If you personally have not been involved in illegal activities, you have nothing to worry, no matter whom you talk to; If you have, it is wise not to talk about it. To no one.

How do I protect my privacy?
Invent an alias, a nick, a pseudonym … call it as you will, just invent something. Then register a mail account in that name with one of the big mail providers. Use this email address to register your Twitter, Facebook, etc. accounts. Make sure to clear all cookies before you start using your new identity, or better use a different web browser for Anonymous than for your other activities.

If you have higher needs for security, ask us about encryption, steganography, TOR, etc. Many of us know how to use them.We will always respect your need for privacy. We will never ask for your personal information. If we do, we will not expect a truthful answer; And neither should you.

What is the right thing to do?
The only person who can tell you what is right for you is yourself. This is also the only person you should follow. We have no leaders. You are also the only person responsible for your actions. Do what you think is right. Do not what you think is wrong.

How many Anonymous are there?

We are more than you think. We are more than anybody thinks. We are many.

And you are now one of us. Welcome to Anonymous.

NAZI FlashBack: The Courage To Say No

NAZI FlashBack: The Courage To Say No

The photo was taken in Hamburg in 1936, during the celebrations for the launch of a ship, the‘Horst Wessel’. In the crowd, one person refuses to raise his arm to give the Nazi salute.

That man was August Landmesser. He had already been in trouble with the authorities, having been sentenced to two years hard labor for marrying a Jewish woman. We know little else about August Landmesser (born May 24, 1910, presumably killed February 1944), except that he had two children. By pure chance, one of his children recognized her father in this photo when it was published in a German newspaper in 1991.

http://en.wikipedia.org/wiki/August_Landmesser

RESEARCH CREDIT

Outrageous Lies Monsanto and Friends Are Trying to Pass off to Kids as Science

Outrageous Lies Monsanto and Friends Are Trying to Pass off to Kids as Science

It’s not enough that the biotech industry — led by multinational corporations such as Monsanto, Dow, Syngenta, BAS, and Dupont — is poisoning our food and our planet. It’s also poisoning young minds.

In a blatant attempt at brainwashing, the Council for Biotechnology Information(CBI) has widely circulated what it calls a Biotechnology Basics Activity Bookfor kids, to be used by “Agriculture and Science Teachers.” The book — calledLook Closer at Biotechnology — looks like a science workbook, but reads more like a fairy tale. Available on the council’s Web site, its colorful pages are full of friendly cartoon faces, puzzles, helpful hints for teachers — and a heavy dose of outright lies about the likely effects of genetic engineering on health, the environment, world hunger and the future of farming.

CBI’s lies are designed specifically for children, and intended for use in classrooms.

At a critical time in history when our planet is veering toward a meltdown, when our youth are suffering the health consequences (obesity, diabetes, allergies) of Big Ag and Food Inc.’s over-processed, fat-and sugar-laden, chemical-, and GMO-tainted foods, a time when we should be educating tomorrow’s adults about how to reverse climate change, how to create sustainable farming communities, how to promote better nutrition, the biotech industry’s propagandists are infiltrating classrooms with misinformation in the guise of “educational” materials.

Brainwashing children. It’s a new low, even for Monsanto.

You don’t have to read beyond the first page ofLook Closer at Biotechnology to realize that this is pure propaganda:

Hi Kids! Welcome to the Biotechnology Basics Activity Book. This is an activity book for young people like you about biotechnology — a really neat topic. Why is it such a neat topic? Because biotechnology is helping to improve the health of the Earth and the people who call it home. In this book, you will take a closer look at biotechnology. You will see that biotechnology is being used to figure out how to: 1) grow more food; 2) help the environment; and 3) grow more nutritious food that improves our health. As you work through the puzzles in this book, you will learn more about biotechnology and all of the wonderful ways it can help people live better lives in a healthier world. Have fun!

Before we take a closer look at the lies laid out in Look Closer at Biotechnology — lies that are repeated over and over again, the better to imprint them on young minds — let’s take a closer look at the book’s publisher. The Council for Biotechnology Information describes itself as “a non-profit 501(c)(6) organization that communicates science-based information about the benefits and safety of agricultural biotechnology and its contributions to sustainable development.”

According to the Internal Revenue Service, a 501(c)(6) organization is a “business league” devoted to the improvement of business conditions of one or more lines of business. The mission of a 501(c)(6) organization “must focus on the advancement of the conditions of a particular trade or the interests of the community.”

The bottom line is that CBI exists to advance the interests of the corporations that it was formed to promote — in this case, the biotech industry. While it purports to communicate “science-based information,” in fact, that’s not its mission at all. Its mission is to maximize the profits of Monsanto and the biotech industry.

Not surprisingly, CBI is funded largely by the biotech, chemical, pesticide, and seed industry giants: BASF, Bayer CropScience, Dow Agro Sciences, Dupont, Monsanto, and Syngenta.

There’s nothing new about corporations lying to the public. Corporations routinely lie to their employees. They lie in advertising. They lie in the lopsided so-called studies and research projects that they self-fund in order to guarantee the outcomes that support their often false, but self-serving premises. They buy off politicians, regulatory officials, scientists, and the media.

Although here we’re focusing on the biotech industry trying to brainwash our kids, CBI certainly does not limit its propaganda to just children. CBI recently contributed $375,000 to the Coalition Against the Costly Labeling Law — a Sacramento-based industry front group working to defeat the California Right to Know Genetically Engineered Food Act of 2012. If passed in November, this citizens’ ballot Initiative will require food manufacturers and retailers to label foods containing genetically engineered ingredients, as well as ban the routine industry practice of labeling or advertising GE-tainted foods as “natural” or “all natural.” CBI, the Farm Bureau, and the Grocery Manufacturers Association are campaigning furiously to preserve their “right” to keep consumers in the dark about whether their food has been genetically engineered or not, and to preserve their “right” to mislabel gene-altered foods as “natural.”

Clearly, the Council for Biotechnology Information has little or no regard for “science-based” information. But lies aimed directly at kids — under the guise of science education? In our schools?

Let’s take a closer look at the claims made in Look Closer at Biotechnology.

Lie #1: “Biotechnology is one method being used to help farmers grow more food.” (page 7)

This statement is patently false.

In 2009, in the wake of similar studies, the Union of Concerned Scientists examined the data on genetically engineered crops, including USDA statistics. Their report — Failure to Yield — was the first major effort to evaluate in detail the overall yields of GE crops after more than 20 years of research and 13 years of commercialization in the United States. According to the definitive UCS study, “GE has done little to increase overall crop yields.” A number of studies indicate in fact that GE soybeans, for example, actually produce lower yields than non-genetically engineered varieties.

Research conducted by the India research group, Navdanya, and reported in The GMO Emperor Has No Clothes turns up the same results:

Contrary to the claim of feeding the world, genetic engineering has not increased the yield of a single crop. Navdanya’s research in India has shown that contrary to Monsanto’s claim of Bt cotton yield of 1500 kg per acre, the reality is that the yield is an average of 400-500 kg per acre. Although Monsanto’s Indian advertising campaign reports a 50-percent increase in yields for its Bollgard cotton, a survey conducted by the Research Foundation for Science, Technology and Ecology found that the yields in all trial plots were lower than what the company promised. (Page 11).

The claim that GE crops increase agricultural yields is a blatant lie. Equally untrue is the industry’s claim that it is motivated by the desire to feed the hungry of the world. As the Union of Concerned Scientists points out: “For the most part, genetic engineering techniques are being applied to crops important to the industrialized world, not crops on which the world’s hungry depend.” Where does all the genetically engineered soy and corn — two of the largest GE crops — end up? In animal feed, processed junk foods — and school lunchrooms. Precious little goes to feed the hungry in impoverished regions.

One of the sub-arguments related to increasing yields is the biotech industry’s claim that GMO crops are more resistant to pests — hence more of the crops survive. In Look Closer at Biotechnology kids are told that agricultural biotechnology is a “precise way to make seeds with special qualities. These seeds will allow farmers to grow plants that are . . . more resistant to pests . . .” In fact widespread commercialization of herbicide-resistant and Bt-spliced GE crops has engendered a growing army of superweeds and superpests, oblivious to all but the most powerful and toxic pesticides.

What we should be teaching kids in science class is what scientists have been warning for years — that any attempt to increase resistance to pests through genetic engineering will ultimately fail. Insects — and diseases — will build up a tolerance over time, and evolve into stronger and stronger strains. That’s how nature works — and even Monsanto can’t fool Mother Nature. Organic agriculture, on the other hand, utilizing crop rotation, biodiversity, natural fertilizers, and beneficial insects, reduces crop loss from pests and weeds, without the collateral damage of toxic pesticides and fertilizers.

Recently, 22 leading scientists told the US Environmental Protection Agency that it should act with “a sense of urgency” to urge farmers to stop planting Monsanto’s genetically engineered Bt corn because it will no longer protect them from the corn rootworm. Bt corn is genetically engineered with bacterial DNA that produces an insecticide in every cell of the plant, aimed at preventing corn rootworm. Except that corn rootworms have now developed resistance to these GE mutants.

Just as scientists had predicted years ago, a new generation of insect larvae has evolved, and is eating away at the roots of Monsanto’s Bt corn — a crop farmers paid a high price for on Monsanto’s promise that they would never have to worry about corn rootworm again. Scientists are now warning of massive yield loss and surging corn costs if the EPA doesn’t act quickly to drastically reduce Bt crops’ acreage and ensure that Monsanto makes non-GMO varieties of corn available to farmers.

“Massive yield loss” doesn’t sound like “more food” — whether you’re 12 years old or 112.

What we should be telling kids is what responsible scientists and farmers — experts at the United Nations — have been saying all along: Eco-farming candouble food output. According to a UN study:

  • Eco-farming projects in 57 nations showed average crop yield gains of 80 percent by tapping natural methods for enhancing soil and protecting against pests.
  • Projects in 20 African countries resulted in a doubling of crop yields within three to 10 years.
  • Sound ecological farming can significantly boost production and in the long term be more effective than conventional farming.

Lie #2: “Biotechnology can help farmers and the environment in many ways.” (page 8)

Two lies for the price of one.

Biotechnology — specifically genetic engineering — helps neither farmers nor the environment, according to the majority of legitimate scientists and economists. In fact, the opposite is true. Genetic engineering of seeds has wreaked havoc on the environment and brought misery to hundreds of thousands of small farmers all over the world.

The majority of farmers in developing countries struggle to afford even the most basic requirements of seeds and fertilizers. Their survival depends on the age-old practice of selecting, saving and sharing seeds from one year to the next. When multinational corporations move into areas previously dominated by small farmers, they force those farmers to buy their patented seeds and fertilizers — under pretense of higher yields, and under threats of lawsuits if they save or share the seeds. Every year, they’re forced to buy more seeds and more chemicals from corporations — and when the promises of higher yields and higher incomes prove empty, farmers go bankrupt.

Compounding their corporate crimes, when Monsanto’s patented seeds contaminate the non-GMO crops of small farmers (because the seeds drift across property lines) Monsanto routinely sues farmers for growing their patented seeds illegally, even though the seeds were actually unwanted trespassers. Further, the company has ruined the livelihoods of small farmers by harassing them for illegally growing patented seeds, even in cases where no patented seeds have been grown, either knowingly or by accident.

As Monsanto and others have expanded worldwide, into India, China, Pakistan, and other countries, the effect on small farmers has been devastating. In India, for instance, after World Trade Organization policies forced the country in 1998 to open its seed sector to companies like Cargill, Monsanto and Syngenta, farmers quickly found themselves in debt to the biotech companies that forced them to buy corporate seeds and fertilizers and pesticides, destroying local economies. Hundreds of thousands of India’s cotton farmers have committed suicide.

And according to a Greenpeace report, poorer farmers in the Philippines were sold Monsanto’s Bt corn as a “practical and ecologically sustainable solution for poor corn farmers everywhere to increase their yields” only to find the opposite was true: Bt corn did not control pests and was “not ecologically sustainable.”

Which brings us to one more of the Council for Biotechnology Information’s lies to kids: That agricultural biotechnology is good for the environment.

Study after study, over more than a decade, has warned us of just the opposite. Even the pro-biotech USDA has admitted that GE crops use more pesticides, not less than non-GE varieties. Genetic engineering results in evermore pesticides being dumped into the environment, destroying soil and water, human and animal health, and threatening the biodiversity of the planet.

How about telling kids instead that numerous reports, including one from theGerman Beekeepers Association, have linked genetically engineered Bt corn to the widespread disappearance of bees, or what is now referred to as Colony Collapse Disorder? And while we’re at it, maybe we should remind kids of the Albert Einstein’s quote: “If the bee disappeared off the surface of the globe then man would only have four years of life left. No more bees, no more pollination, no more plants, no more animals, no more man.”

Maybe we should also tell them that glyphosate, the active ingredient in Monsanto’s herbicide, Roundup, the most widely used herbicide in the world, kills Monarch butterflies, fish, and frogs, destroys soil fertility, and pollutes our waterways and drinking water.

The fact is, widespread use of Monsanto’s Roundup in all agricultural and urban areas of the United States is destroying the environment, pure and simple. US Geological Survey studies released this month show that Roundup is now commonly found in rain and rivers in agricultural areas in the Mississippi River watershed, where most applications are for weed control on GE corn, soybeans and cotton. Here’s the real truth, from an article published this past week: Monsanto’s Roundup is actually threatening the crop-yielding potential of the entire biosphere. According to the article, new research published in the journalCurrent Microbiology highlights the extent to which “glyphosate is altering, and in some cases destroying, the very microorganisms upon which the health of the soil, and — amazingly — the benefits of raw and fermented foods as a whole, depend.”

Lie #3: “Scientists are using biotechnology to grow foods that could help make people healthier.” (page 11)

This is the perhaps the most outrageous lie of all. Telling kids that GE foods are more nutritious is tantamount to telling them Hostess cupcakes and Coca-Cola are health foods.

Genetic engineering — of human food and food for animals that humans eat — has been linked to a host of diseases and health issues, including auto-immune disorders, liver and kidney damage, nutritional deficiencies, allergies, accelerated aging, infertility, and birth defects.

There’s a growing and alarming body of research indicating that GMO foods are unsafe, and absolutely no research whatsoever proving that they are safe. And yet the USDA and FDA continue to approve, and just this past month even agreed tospeed up approval of these crops that scientists and physicians increasingly link to poor health.

Instead of force-feeding kids lies in bogus activity books, how about having them read some truthful articles?

The study Bt Toxin Kills Human Kidney Cells says Bt toxins are not “inert” on human cells, and may indeed be toxic, causing kidney damage and allergies observed in farmers and factory workers handling Bt crops. The article supportsprevious studies done on rats, showing that animals fed on three strains of GE corn made by Monsanto suffered signs of organ damage after only three months.

Or how about this: “19 Studies Find That GMOs Aren’t Up to Consumer Safety Protection Standards” which reports:

It is abundantly clear that both GMOs made to be resistant to herbicides (aka “Roundup Ready”) and those made to produce insecticides have damaging impacts on the health of mammals who consume them, particularly in the liver and kidneys. We already know that from the trials of 90 days and less. In looking a little deeper into the info, we found a number of issues that point to a probable increased level of toxicity when these foods are consumed over the long term, including likely multi-generational effects.

Multi-generational effects. Eating GMO foods harms not only our health, and our kids’ health — but quite possibly their kids, too — even if we stop eating them today.

In a recent report to the United Nations General Assembly Human Rights Council by Special Rapporteur on the right to food, Olivier De Schutter, Schutter outlines the case for sustainable agricultural practices (the antithesis of industrial agribusiness, with its GE crops and heavy reliance on chemical fertilizers and pesticides). He also addresses the links between health and malnutrition. In the report, Schutter shows why undernutrition, micronutrient deficiency and overnutrition are different dimensions of malnutrition that must be addressed together through a life-course approach. From the report’s summary:

Existing food systems have failed to address hunger, and at the same time encourage diets that are a source of overweight and obesity that cause even more deaths worldwide than does underweight. A transition towards sustainable diets will succeed only by supporting diverse farming systems that ensure that adequate diets are accessible to all, that simultaneously support the livelihoods of poor farmers and that are ecologically sustainable.

Corporate greed plus a complicit government have allowed for the rampant poisoning of our food and environment, and the demise of sustainable agriculture practices — practices sorely needed if we are going to feed the world’s population, and avoid a world health crisis. And we’ve exported the same misery and destruction to foreign countries far and wide.

Propaganda like the CBI’s Look Closer at Biotechnology has brainwashed many of our kids into thinking that the biotech industry has people — not profits — in its best interests. The book’s claims are laughable. But framing blatant lies as “science” for children in schools borders on criminal.

For parents and teachers out there, here’s an alternate lesson plan. Because world hunger is a concern, because saving our planet does matter, and because better health is a worthy and achievable goal, let’s ask our kids to think critically, instead of accepting at face value “information” attractively packaged by multinational corporations.

Don M. Huber, emeritus soil scientist of Purdue University puts it in terms everyone, kids included, can understand. Huber talks about a range of key factors involved in plant growth, including sunlight, water, temperature, genetics, and nutrients taken up from the soil. “Any change in any of these factors impacts all the factors,” he said. “No one element acts alone, but all are part of a system.” “When you change one thing,” he said, “everything else in the web of life changes in relationship.”

This is what we should be teaching the future stewards of our planet.

SOURCE:
http://www.alternet.org/food/154602/outrageous_lies_monsanto_and_friends_are_trying_to_pass_off_to_kids_as_science?page=entire

By: Ronnie Cummins, March 20, 2012

US Police Can Copy Your iPhone’s Contents In Under Two Minutes

US Police Can Copy Your iPhone’s Contents In Under Two Minutes

It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes.

The CelleBrite UFED is a handheld device that Michigan officers have been using since August 2008 to copy information from mobile phones belonging to motorists stopped for minor traffic violations. The device can circumvent password restrictions and extract existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags.

 

In short, it can copy everything on your smartphone in a matter of minutes.

Learning that the police had been using mobile forensic devices, the American Civil Liberties Union (ACLU) has issued freedom of information requests which demand that state officials open up the data collected, to better assess if penalised motorists warrant having their data copied.

Michigan State Police were more than happy to provide the information – as long as the ACLU paid $544,680. Obviously not pocket change.

“Law enforcement officers are known, on occasion, to encourage citizens to cooperate if they have nothing to hide,” ACLU staff attorney Mark P. Fancher wrote. “No less should be expected of law enforcement, and the Michigan State Police should be willing to assuage concerns that these powerful extraction devices are being used illegally by honoring our requests for cooperation and disclosure.”

Once the data is obtained, the device’s “Physical Analyzer” can map both existing and deleted locations on Google Earth, porting location data and image geotags on Google Maps.

The ACLU’s main worry is that the handheld is quietly being used to bypass Fourth Amendment protections against unreasonable searches:

“With certain exceptions that do not apply here, a search cannot occur without a warrant in which a judicial officer determines that there is probable cause to believe that the search will yield evidence of criminal activity.

A device that allows immediate, surreptitious intrusion into private data creates enormous risks that troopers will ignore these requirements to the detriment of the constitutional rights of persons whose cell phones are searched.”

The next time you are Michigan, be sure drive carefully!

SOURCE:
http://thenextweb.com/us/2011/04/20/us-police-can-copy-your-iphones-contents-in-under-two-minutes/

CLINTON BODY COUNT: Associates that ended up DEAD

CLINTON BODY COUNT: Associates that ended up DEAD

Here is the latest body count that we have. All of these people have been connected with the Clintons in some form or another. We have not included any deaths that could not be verified or connected to the Clinton scandals. All deaths are listed chronologically by date.  Accurate to circa 2001

Susan Coleman: Rumors were circulating in Arkansas of an affair with Bill Clinton. She was found dead with a gunshot wound to the head at 7 1/2 months pregnant. Death was an apparent suicide.

Larry Guerrin: Was killed in February 1987 while investigating the INSLAW case.

Kevin Ives & Don Henry: Initial cause of death was reported to be the result of falling asleep on a railroad track in Arkansas on August 23, 1987. This ruling was reported by the State medical examiner Fahmy Malak. Later it was determined that Kevin died from a crushed skull prior to being placed on the tracks. Don had been stabbed in the back. Rumors indicate that they might have stumbled upon a Mena drug operation.

Keith Coney: Keith had information on the Ives/Henry deaths. Died in a motorcycle accident in July 1988 with unconfirmed reports of a high speed car chase.

Keith McKaskle: McKaskle has information on the Ives/Henry deaths. He was stabbed to death in November 1988.

Gregory Collins: Greg had information on the Ives/Henry deaths. He died from a gunshot wound to the face in January 1989.

Jeff Rhodes: He had information on the deaths of Ives, Henry & McKaskle. His burned body was found in a trash dump in April 1989. He died of a gunshot wound to the head and there was some body mutilation, leading to the probably speculation that he was tortured prior to being killed.

James Milam: Milam had information on the Ives & Henry deaths. He was decapitated. The state Medical examiner, Fahmy Malak, initially ruled death due to natural causes.

Richard Winters: Winters was a suspect in the deaths of Ives & Henry. He was killed in a “robbery” in July 1989 which was subsequently proven to be a setup.

Jordan Kettleson: Kettleson had information on the Ives & Henry deaths. He was found shot to death in the front seat of his pickup in June 1990.

Alan Standorf: An employee of the National Security Agency in electronic intelligence. Standorf was a source of information for Danny Casalaro who was investigating INSLAW, BCCI, etc. Standorf’s body was found in the backseat of a car at Washington National Airport on Jan 31, 1991.

Dennis Eisman: An attorney with information on INSLAW. Eisman was found shot to death on April 5, 1991.

Danny Casalaro: Danny was a free-lance reporter and writer who was investigating the “October Surprise”, INSLAW and BCCI. Danny was found dead in a bathtub in a Sheraton Hotel room in Martinsburg, West Virginia. Danny was staying at the hotel while keeping appointments in the DC area pertinent to his investigation. He was found with his wrists slashed. At least one, and possibly both of his wrists were cut 10 times. All of his research materials were missing and have never been recovered.

Victor Raiser: The National Finance Co-Chair for “Clinton for President.” He died in a airplane crash on July 30, 1992.

R. Montgomery Raiser: Also involved in the Clinton presidential campaign. He died in the same plane crash as Victor.

Paul Tully: Tulley was on the Democratic National Committee. He was found dead of unknown causes in his hotel room on September 24, 1992. No autopsy was ever allowed.

Ian Spiro: Spiro had supporting documentation for grand jury proceedings on the INSLAW case. His wife and 3 children were found murdered on November 1, 1992 in their home. They all died of gunshot wounds to the head. Ian’s body was found several days later in a parked car in the Borego Desert. Cause of death? The ingestion of cyanide. FBI report indicated that Ian had murdered his family and then committed suicide.

Paula Gober: A Clinton speech writer. She died in a car accident on December 9, 1992 with no known witnesses.

Jim Wilhite: Wilhite was an associate of Mack McClarty’s former firm. Wilhite died in a skiing accident on December 21, 1992. He also had extensive ties to Clinton with whom he visited by telephone just hours before his death.

Steve Willis, Robert Williams, Todd McKeahan & Conway LeBleu:   Died Feburary 28, 1993 by gunfire at Waco. All four were examined by a pathologist and died from identical wounds to the left temple. All four had been body guards for Bill Clinton, three while campaigning for President and when he was Governor of Arkansas.They also were the ONLY 4 BATF agents killed at Waco.

Sgt. Brian Haney, Sgt. Tim Sabel, Maj. William Barkley, Capt. Scott Reynolds: Died: May 19, 1993 – All four men died when their helicopter crashed in the woods near Quantico, Va. – Reporters were barred from the site, and the head of the fire department responding to the crash described it by saying, “Security was tight,” with “lots of Marines with guns.” A videotape made by a firefighter was seized by the Marines. All four men had escorted Clinton on his flight to the carrier Roosevelt shortly before their deaths.

John Crawford: An attorney with information on INSLAW. He died from a heart attack in Tacoma in April of 1993.

John Wilson: Found dead from an apparent hanging suicide on May 18, 1993. He was a former Washington DC council member and claimed to have info on Whitewater.

Paul Wilcher: A lawyer who was investigating drug running out of Mena, Arkansas and who also sought to expose the “October Surprise”, BCCI and INSLAW. He was found in his Washington DC apartment dead of unknown causes on June 22, 1993.

Vincent Foster: A White House deputy counsel and long-time personal friend of Bill and Hillary’s. Found on July 20, 1993, dead of a gunshot wound to the mouth — a death ruled suicide.  Was found in a park, yet was covered head to toe in carpet fibers.  Dried blood on the face had miraculously dripped upwards, against gravity. Despite having his car near the park, there were no keys to be found on, nor near his person.  The missing keys showed up in the victim’s pocket, once the body had made it back to the morgue; leading investigators to believe they simply missed it.

Jon Parnell Walker: An investigator for the RTC who was looking into the linkage between the Whitewater and Madison S&L bankruptcy. Walker “fell” from the top of the Lincoln Towers Building.

Stanley Heard & Steven Dickson: They were members of the Clinton health care advisory committee. They died in a plane crash on September 10, 1993.

Jerry Luther Parks: Parks was the Chief of Security for Clinton’s national campaign headquarters in Little Rock. Gunned down in his car on September 26, 1993 near the intersection of Chenal Parkway and Highway 10 west of Little Rock. Parks was shot through the rear window of his car. The assailant then pulled around to the driver’s side of Park’s car and shot him three more times with a 9mm pistol. His family reported that shortly before his death, they were being followed by unknown persons, and their home had been broken into (despite a top quality alarm system). Parks had been compiling a dossier on Clinton’s illicit activities. The dossier was stolen.

Ed Willey: A Clinton fundraiser. He died of a self-inflicted gunshot wound on November 30, 1993. His death came the same day his wife, Kathleen, was sexually assaulted in the White House by Bill Clinton.

Gandy Baugh: Baugh was Lasater’s attorney and committed suicide on January 8, 1994. Baugh’s partner committed suicide exactly one month later on February 8, 1994.

Herschell Friday: A member of the presidential campaign finance committee. He died in an airplane explosion on March 1, 1994.

Ronald Rogers: Rogers died on March 3, 1994 just prior to releasing sensitive information to a London newspaper. Cause of death? Undetermined.

Kathy Furguson: A 38 year old hospital worker whose ex-husband is a co- defendant in the Paula Jones sexual harassment law suit. She had information supporting Paula Jone’s allegations. She died of an apparent suicide on May 11, 1994 from a gunshot wound to the head.

Bill Shelton: Shelton was an Arkansas police officer and was found dead as an apparent suicide on kathy Ferguson’s grave (Kathy was his girl friend), on June 12, 1994. This “suicide” was the result of a gunshot wound to the back of the head.

Stanley Huggins: Huggins, 46, was a principal in a Memphis law firm which headed a 1987 investigation into the loan practices of Madison Guaranty S&L. Stanley died in Delaware in July 1994 — reported cause of death was viral pneumonia.

Paul Olson: A Federal witness in investigations to drug money corruption in Chicago politics, Paul had just finished 2 days of FBI interviews when his plane ride home crashed, killing Paul and 130 others on Sept 8 1994. The Sept. 15, 1994 Tempe Tribune newspaper reported that the FBI suspected that a bomb had brought down the airplane.

Calvin Walraven: 24 year on Walraven was a key witness against Jocelyn Elder’s son’s drug case. Walraven was found dead in his apartment with a gunshot wound to the head. Tim Hover, a Little Rock police spokesman says no foul play is suspected.

Alan G. Whicher: Oversaw Clinton’s Secret Service detail. In October 1994 Whicher was transferred to the Secret Service field office in the Murrah Building in Oklahoma City. Whatever warning was given to the BATF agents in that building did not reach Alan Whicher, who died in the bomb blast of April 19th 1995.

Duane Garrett: Died July 26, 1995-A lawyer and a talk show host for KGO-AM in San Fransisco, Duane was the campaign finance chairman for Diane Fienstien’s run for the senate, and was a friend and fundraiser for Al Gore. Garrett was under investigation for defrauding investors in Garrett’s failed sports memorabilia venture. There was talk of a deal to evade prosecution. On July 26th, Garrett canceled an afternoon meeting with his lawyer because he had to meet some people at the San Fransisco airport. Three hours later he was found floating in the bay under the Golden Gate Bridge.

Ron Brown: The Commerce Secretary died on  April 3, 1996, in an Air Force jet carrying Brown and 34 others, including 14 business executives on a trade mission to Croatia, crashed into a mountainside. The Air Force, in a 22-volume report issued in June of 1996, confirmed its initial judgment that the crash resulted from pilot errors and faulty navigation equipment At the time of Brown’s death, Independent Counsel Daniel Pearson was seeking to determine whether Brown had engaged in several sham financial transactions with longtime business partner Nolanda Hill shortly before he became secretary of commerce.

Charles Meissner: died: UNK – Following Ron Brown’s death, John Huang was placed on a Commerce Department contract that allowed him to retain his security clearance
by Charles Meissner. Shortly thereafter, Meissner died in the crash of a small plane.   He was an Assistant Secretary of Commerce for International Economic Policy.

William Colby: Retired CIA director was found dead on May 6,1996 after his wife reported him missing on April 27,1996. Apparently, Colby decided to go on a impromptu canoeing excursion and never returned. Colby who had just started writing for Strategic Investment newsletter, worried many in the intelligent community. Colby’s past history of divulging CIA secrets in the past were well known. Strategic Investor had covered the Vince Foster suicide and had hired handwriting experts to review Foster’s suicide note.

Admiral Jeremy Boorda: Died on May 16,1996 after he went home for lunch and decided to shoot himself in the chest (by one report, twice) rather than be interviewed by Newsweek magazine that afternoon. Explanations for Boorda’s suicide focused on a claim that he was embarrassed over two “Valor” pins he was not authorized to wear.

Lance Herndon: Herndon a 41 year old computer specialist and a  prominent entrepreneur who received a presidential appointment in 1995 died August 10, 1996 under suspicious circumstances. He   appeared to have died from a blow to the head. Police said no weapons were found at his  mansion, adding that Mr. Herndon had not been shot or stabbed and there was no evidence of forced entry or theft.

Neil Moody: Died -August 25, 1996 Following Vincent Foster’s murder, Lisa Foster married James Moody, a judge in Arkansas, on Jan 1, 1996. Near the time Susan McDougal first went to jail for contempt, Judge Moor’s son, Neil died in a car crash. There were other reports that Neil Moody had discovered something very unsettling among his stepmother’s private papers and was threatening to go public with it just prior to the beginning of the Democratic National Convention. He was alleged to have been talking to Bob Woodward of the Washington Post about a blockbuster story. Witnesses said they saw Neil Moody sitting in his car arguing with another person just prior to His car suddenly speeding off out of control and hitting a brick wall.

Barbara Wise: Wise a 14-year Commerce Department employee found dead and partially naked in her office following a long weekend. She worked in the same section as John Huang. Officially, she is said to have died of natural causes.

Doug Adams: Died January 7, 1997- A lawyer in Arkansas who got involved trying to help the people who were being swindled out of their life savings. Adams was found in his vehicle with a gunshot wound to his head in a Springfield Mo. hospital parking lot.

Mary C. Mahoney: 25, murdered at the Georgetown Starbuck’s coffee bar over the 4th of July ’97 weekend. She was a former White House intern who worked with John Huang. Apparently she knew Monica Lewinsky and her sexual encounters with Bill Clinton. Although not verified, it has been said that Lewinsky told Linda Tripp that she did not want to end up like Mahoney.

Ronald Miller: Suddenly took ill on October 3rd,1997 and steadily worsened until his death 9 days later. (This pattern fits Ricin poisoning.) Owing to the strangeness of the illness, doctors at the Integris Baptist Medical Center referred the matter to the Oklahoma State Medical Examiner’s Office. The Oklahoma State Medical Examiner’s Office promptly ran tests on samples of Ron Miller’s blood, but has refused to release the results or even to confirm that the tests were ever completed.

Had been investigated by authorities over the sale of his company, Gage Corp. to Dynamic Energy Resources, Inc. was the man who tape recorded Gene and Nora Lum and turned those tapes (and other records) over to congressional oversight investigators. The Lums were sentenced to prison for campaign finance violations, using “straw donors” to conceal the size of their contributions to various candidates. Indeed, Dynamic Energy Resources, Inc. had hired Ron Brown’s son Michael solely for the purpose of funneling $60,000 through him to the Commerce Secretary, according to Nolanda Hill’s testimony.

Sandy Hume: On Sunday, February 22nd, 1998, Sandy Hume, the 28 year old son of journalist Britt Hume, was reportedly found dead in his Arlington, Virginia home. Aside from the statement that this was an “apparent” suicide, there remains in place a total media blackout on this story, possibly out of concern that the actual facts will not withstand public scrutiny. Worked for Hill magazine, about Congress for Congress.

Jim McDougal: Bill and Hillary Clinton friend, banker, and political ally, sent to prison for  eighteen felony convictions. A key whitewater witness, dies of a heart attack on March, 8 1998. As of this writing allegations that he was given an injection of the diuretic lasix has not been denied or confirmed.
Died on March 8, 1998

Johnny Lawhon: 29, died March 29, 1998- The Arkansas transmission specialist who discovered a pile of Whitewater documents in the trunk of an abandoned car on his property and turned them over to Starr, was killed in a car wreck two weeks after the McDougal death.. Details of the “accident” have been sketchy — even from the local Little Rock newspaper.

Charles Wilbourne Miller: 63, was found dead of a gunshot wound to the head on November 17, 1998  in a shallow pit about 300 yards from his ranch house near Little Rock. Police found a .410 gauge shotgun near Miller’s body and a Ruger .357-caliber revolver submerged in water. Investigators concluded the Ruger was the weapon used by Miller to kill himself. Yet, two rounds in the handgun’s cylinder had been spent.

He had long served as executive vice president and member of the board of directors for a company called Alltel and was deeply involved in his own software engineering company until the day he died. Alltel is the successor to Jackson Stephens’ Systematics, the company that provided the software for the White House’s “Big Brother” data base system and that was behind the administration’s plan to develop the secret computer “Clipper” chip to bug every phone, fax and email transmission in America.

Carlos Ghigliotti: 42, was found dead in his home just outside of Washington D.C. on April 28, 2000. There was no sign of a break-in or struggle at the firm of Infrared Technology  where the badly decomposed body of Ghigliotti was found. Ghigliotti had not been seen for several weeks.

Ghigliotti, a thermal imaging analyst hired by the House Government Reform Committee to review tape of the siege, said he determined the FBI fired shots on April 19, 1993. The FBI has explained the light bursts on infrared footage as reflections of sun rays on shards of glass or other debris that littered the scene.

“I conclude this based on the groundview videotapes taken from several different angles simultaneously and based on the overhead thermal tape,” Ghigliotti told The Washington Post last October. “The gunfire from the ground is there, without a doubt.”

Ghigliotti said the tapes also confirm the Davidians fired repeatedly at FBI agents during the assault, which ended when flames raced through the compound. About 80 Branch Davidians perished that day, some from the fire, others from gunshot wounds.

Mark Corallo, a spokesman for the congressional committee chaired by Rep. Dan Burton, R-Ind., said that police found the business cards of a committee investigator in Ghigliotti’s office. Corallo said Ghigliotti’s work for the committee ended some time ago.

Tony Moser: 41, was killed as he crossed a street in Pine Bluff, Ark on on June 10, 2000. Killed 10 days after being named a columnist for the Democrat-Gazette newspaper and two days after penning a stinging indictment of political corruption in Little Rock.

Police have concluded that no charges will be filed against the unnamed driver of a 1995 Chevrolet pickup, which hit Moser as he was walking alone in the middle of unlit Rhinehart Road about 10:10 p.m

Police say they have ruled out foul play and will file no charges against the driver because he was not intoxicated and there was no sign of excessive speed.

“Published originally at EtherZone.com : republication allowed with this notice and hyperlink intact.”

 

Homeland Security is Searching Facebook & Twitter For These Words

Homeland Security is Searching Facebook & Twitter For These Words

The Department of Homeland Security monitors your updates on social networks, including Facebook and Twitter, to uncover “Items Of Interest” (IOI), according to an internal DHS document released by the EPIC. That document happens to include a list of the baseline terms for which the DHS–or more specifically, a DHS subcontractor hired to monitor social networks–use to generate real-time IOI reports. (Although the released PDF is generally all reader-selectable text, the list of names was curiously embedded as an image of text, preventing simple indexing. We’ve fixed that below.)

To be fair, the DHS does have an internal privacy policy that attempts to strip your “PII”–Personally Identifiable Information–from the aggregated tweets and status updates, with some broad exceptions:

1) U.S. and foreign individuals in extremis situations involving potential life or death circumstances; (this is no change)
2) Senior U.S. and foreign government officials who make public statements or provide public updates;
3) U.S. and foreign government spokespersons who make public statements or provide public updates;
4) U.S. and foreign private sector officials and spokespersons who make public statements or provide public updates;
5) Names of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and/or social media in real time to keep their audience situationally aware and informed;
6) Current and former public officials who are victims of incidents or activities related to Homeland Security; and
7) Terrorists, drug cartel leaders or other persons known to have been involved in major crimes of Homeland Security interest, (e.g., mass shooters such as those at Virginia Tech or Ft. Hood) who are killed or found dead.

In addition, the Media Monitoring Capability team can transmit personal information to the DHS National Operations Center over the phone as deemed necessary.

The MMC watch may provide the name, position, or other information considered to be PII to the NOC over the telephone when approved by the appropriate DHS OPS authority. But that information must not be stored in a database that could be searched by an individual’s PII.

In addition to the following list of terms, the DHS can also add additional search terms circumstantially as deemed necessary.

DHS Media Monitoring Terms

2.13 Key Words & Search Terms

This is a current list of terms that will be used by the NOC when monitoring social media sites to provide situational awareness and establish a common operating picture. As natural or manmade disasters occur, new search terms may be added.

The new search terms will not use PII in searching for relevant
mission-related information.

DHS & Other Agencies

  • Department of Homeland Security (DHS)
  • Federal Emergency Management Agency (FEMA)
  • Coast Guard (USCG)
  • Customs and Border Protection (CBP)
  • Border Patrol
  • Secret Service (USSS)
  • National Operations Center (NOC)
  • Homeland Defense
  • Immigration Customs Enforcement (ICE)
  • Agent
  • Task Force
  • Central Intelligence Agency (CIA)
  • Fusion Center
  • Drug Enforcement Agency (DEA)
  • Secure Border Initiative (SBI)
  • Federal Bureau of Investigation (FBI)
  • Alcohol Tobacco and Firearms (ATF)
  • U.S. Citizenship and Immigration Services (CIS)
  • Federal Air Marshal Service (FAMS)
  • Transportation Security Administration (TSA)
  • Air Marshal
  • Federal Aviation Administration (FAA)
  • National Guard
  • Red Cross
  • United Nations (UN)

Domestic Security

  • Assassination
  • Attack
  • Domestic security
  • Drill
  • Exercise
  • Cops
  • Law enforcement
  • Authorities
  • Disaster assistance
  • Disaster management
  • DNDO (Domestic Nuclear Detection Office)
  • National preparedness
  • Mitigation
  • Prevention
  • Response
  • Recovery
  • Dirty Bomb
  • Domestic nuclear detection
  • Emergency management
  • Emergency response
  • First responder
  • Homeland security
  • Maritime domain awareness (MDA)
  • National preparedness initiative
  • Militia
  • Shooting
  • Shots fired
  • Evacuation
  • Deaths
  • Hostage
  • Explosion (explosive)
  • Police
  • Disaster medical assistance team (DMAT)
  • Organized crime
  • Gangs
  • National security
  • State of emergency
  • Security
  • Breach
  • Threat
  • Standoff
  • SWAT
  • Screening
  • Lockdown
  • Bomb (squad or threat)
  • Crash
  • Looting
  • Riot
  • Emergency Landing
  • Pipe bomb
  • Incident
  • Facility

HAZMAT & Nuclear

  • Hazmat
  • Nuclear
  • Chemical Spill
  • Suspicious package/device
  • Toxic
  • National laboratory
  • Nuclear facility
  • Nuclear threat
  • Cloud
  • Plume
  • Radiation
  • Radioactive
  • Leak
  • Biological infection (or event)
  • Chemical
  • Chemical burn
  • Biological
  • Epidemic
  • Hazardous
  • Hazardous material incident
  • Industrial spill
  • Infection
  • Powder (white)
  • Gas
  • Spillover
  • Anthrax
  • Blister agent
  • Exposure
  • Burn
  • Nerve agent
  • Ricin
  • Sarin
  • North Korea

Health Concern + H1N1

  • Outbreak
  • Contamination
  • Exposure
  • Virus
  • Evacuation
  • Bacteria
  • Recall
  • Ebola
  • Food Poisoning
  • Foot and Mouth (FMD)
  • H5N1
  • Avian
  • Flu
  • Salmonella
  • Small Pox
  • Plague
  • Human to human
  • Human to ANIMAL
  • Influenza
  • Center for Disease Control (CDC)
  • Drug Administration (FDA)
  • Public Health
  • Toxic
  • Agro Terror
  • Tuberculosis (TB)
  • Agriculture
  • Listeria
  • Symptoms
  • Mutation
  • Resistant
  • Antiviral
  • Wave
  • Pandemic
  • Infection
  • Water/air borne
  • Sick
  • Swine
  • Pork
  • Strain
  • Quarantine
  • H1N1
  • Vaccine
  • Tamiflu
  • Norvo Virus
  • Epidemic
  • World Health Organization (WHO and components)
  • Viral Hemorrhagic Fever
  • E. Coli

Infrastructure Security

  • Infrastructure security
  • Airport
  • CIKR (Critical Infrastructure & Key Resources)
  • AMTRAK
  • Collapse
  • Computer infrastructure
  • Communications infrastructure
  • Telecommunications
  • Critical infrastructure
  • National infrastructure
  • Metro
  • WMATA
  • Airplane (and derivatives)
  • Chemical fire
  • Subway
  • BART
  • MARTA
  • Port Authority
  • NBIC (National Biosurveillance Integration Center)
  • Transportation security
  • Grid
  • Power
  • Smart
  • Body scanner
  • Electric
  • Failure or outage
  • Black out
  • Brown out
  • Port
  • Dock
  • Bridge
  • Canceled
  • Delays
  • Service disruption
  • Power lines

Southwest Border Violence

  • Drug cartel
  • Violence
  • Gang
  • Drug
  • Narcotics
  • Cocaine
  • Marijuana
  • Heroin
  • Border
  • Mexico
  • Cartel
  • Southwest
  • Juarez
  • Sinaloa
  • Tijuana
  • Torreon
  • Yuma
  • Tucson
  • Decapitated
  • U.S. Consulate
  • Consular
  • El Paso
  • Fort Hancock
  • San Diego
  • Ciudad Juarez
  • Nogales
  • Sonora
  • Colombia
  • Mara salvatrucha
  • MS13 or MS-13
  • Drug war
  • Mexican army
  • Methamphetamine
  • Cartel de Golfo
  • Gulf Cartel
  • La Familia
  • Reynose
  • Nuevo Leon
  • Narcos
  • Narco banners (Spanish equivalents)
  • Los Zetas
  • Shootout
  • Execution
  • Gunfight
  • Trafficking
  • Kidnap
  • Calderon
  • Reyosa
  • Bust
  • Tamaulipas
  • Meth Lab
  • Drug trade
  • Illegal immigrants
  • Smuggling (smugglers)
  • Matamoros
  • Michoacana
  • Guzman
  • Arellano-Felix
  • Beltran-Leyva
  • Barrio Azteca
  • Artistics Assassins
  • Mexicles
  • New Federation

Terrorism

  • Terrorism
  • Al Queda (all spellings)
  • Terror
  • Attack
  • Iraq
  • Afghanistan
  • Iran
  • Pakistan
  • Agro
  • Environmental terrorist
  • Eco terrorism
  • Conventional weapon
  • Target
  • Weapons grade
  • Dirty bomb
  • Enriched
  • Nuclear
  • Chemical weapon
  • Biological weapon
  • Ammonium nitrate
  • Improvised explosive device
  • IED (Improvised Explosive Device)
  • Abu Sayyaf
  • Hamas
  • FARC (Armed Revolutionary Forces Colombia)
  • IRA (Irish Republican Army)
  • ETA (Euskadi ta Askatasuna)
  • Basque Separatists
  • Hezbollah
  • Tamil Tiger
  • PLF (Palestine Liberation Front)
  • PLO (Palestine Libration Organization)
  • Car bomb
  • Jihad
  • Taliban
  • Weapons cache
  • Suicide bomber
  • Suicide attack
  • Suspicious substance
  • AQAP (Al Qaeda Arabian Peninsula)
  • AQIM (Al Qaeda in the Islamic Maghreb)
  • TTP (Tehrik-i-Taliban Pakistan)
  • Yemen
  • Pirates
  • Extremism
  • Somalia
  • Nigeria
  • Radicals
  • Al-Shabaab
  • Home grown
  • Plot
  • Nationalist
  • Recruitment
  • Fundamentalism
  • Islamist

Weather/Disaster/Emergency

  • Emergency
  • Hurricane
  • Tornado
  • Twister
  • Tsunami
  • Earthquake
  • Tremor
  • Flood
  • Storm
  • Crest
  • Temblor
  • Extreme weather
  • Forest fire
  • Brush fire
  • Ice
  • Stranded/Stuck
  • Help
  • Hail
  • Wildfire
  • Tsunami Warning Center
  • Magnitude
  • Avalanche
  • Typhoon
  • Shelter-in-place
  • Disaster
  • Snow
  • Blizzard
  • Sleet
  • Mud slide or Mudslide
  • Erosion
  • Power outage
  • Brown out
  • Warning
  • Watch
  • Lightening
  • Aid
  • Relief
  • Closure
  • Interstate
  • Burst
  • Emergency Broadcast System

Cyber Security

  • Cyber security
  • Botnet
  • DDOS (dedicated denial of service)
  • Denial of service
  • Malware
  • Virus
  • Trojan
  • Keylogger
  • Cyber Command
  • 2600
  • Spammer
  • Phishing
  • Rootkit
  • Phreaking
  • Cain and abel
  • Brute forcing
  • Mysql injection
  • Cyber attack
  • Cyber terror
  • Hacker
  • China
  • Conficker
  • Worm
  • Scammers
  • Social media

Yes, the Department of Homeland Security is searching social media for…”social media”.

SOURCE:
http://animalnewyork.com/2012/02/the-department-of-homeland-security-is-searching-your-facebook-and-twitter-for-these-words/

By: Joel Johnson, February 27, 2012

Report: Worldwide Opposition to Monsanto Growing

Report: Worldwide Opposition to Monsanto Growing

“Farmers worldwide are resisting for food sovereignty, but the rest of the world must join us.”

– Common Dreams staff

A report released today shows that worldwide opposition to the biotechnology giant Monsanto and “the agro-industrial model that it represents” is growing.

(photo: Alexis Baden-Mayer / Millions Against Monsanto)

La Via Campesina, Friends of the Earth International, and Combat Monsanto, the groups who issued the report, show that small farmers, groups and communities in every continent are rising up to resist Monsanto’s products and environmental harm. While Monsanto’s — and other giant agribusinesses’ — approach, including genetically modified crops, has been shown to hurt biodiversity, local food knowledge and the environment, the report shows that “food sovereignty is a real and feasible alternative.”

“This new report documents the intense opposition to this powerful transnational company, which peddles its genetically modified products seemingly without regard for the associated social, economic and environmental costs,” said Martin Drago, Friends of the Earth International’s Food Sovereignty programme coordinator.

“This report demonstrates that the increasingly vocal objections from social movements and civil society organisations are having an impact on the introduction of GM crops.” said Josie Riffaud from La Via Campesina.

The report notes that an “unprecedented agribusiness offensive underway, under the banner of the new ‘green economy’” positioning giant agribusiness companies like Monsanto to have even greater control. The report’s highlighting the “offensive” echoes a report issued last month on global water security from the Defense Intelligence Agency that also pushed biotechnology and agricultural exports rather than agroecology and food sovereignty.

“Who will hold Monsanto responsible for the global depletion of biodiversity, soil erosion, and violations of peasant rights wrought by the application of petroleum-based inputs required by industrial agriculture?” asked Dena Hoff of the National Family Farm Coalition / La Via Campesina North America. “Farmers worldwide are resisting for food sovereignty, but the rest of the world must join us,” she added.

* * *

Selections from the report:

France

‘Les Faucheurs Volontaires’: tactical non-violent resistance against GM

The Voluntary Reapers or ‘Faucheurs Volontaires’ are a group of self-organised non-violent French activists that have led several direct actions to ‘neutralise’ field tests set up by GM corporations and, to a lesser extent, unauthorised fields cultivated by pro-GM farmers. Jose Bové has been an important actor in the movement and a spokesman for the anti-GM activists, although this organisation does not recognise any leadership as such.

The Voluntary Reapers act openly and unmasked, and they claim responsibility for all their actions, sometimes turning themselves in to the police. They argue that civil disobedience is necessary in order to strengthen democracy and defend the common good against private interests backed by public authorities. They personally assume the civil and penal consequences of their actions in court, and use these trials to deliver their views against Monsanto and GMOs to the public.

In August 2010, 60 faucheurs volontaires and 15 farmers were sentenced to two months suspended prison sentences, after they tore up 70 GM grapevines, which were being cultivated as part of a GM trial in Colmar in Alsace, in north-eastern France.

(photo: Ernest Morales)

* * *

India

Nationwide actions

In August 2011, energised by the success in achieving a temporary ban on Bt brinjal, farmers and activists carried out ‘Monsanto, Quit India’ protests across the country to coincide with Independence Day, drawing parallels with the anti-colonial, civil disobedience ‘Quit India’ movement that campaigned against British rule. Just as political sovereignty was demanded previously, farmers and consumers are now calling for food sovereignty. Monsanto is targeted as it is an archetypal, aggressive foreign corporation that hurts farmers and small-scale, safe domestic food producers.

The Tamil Nadu Farmers’ Association, for example, organised a day of action in Coimbatore, mobilising in solidarity with other farmers opposing the monopolisation of the Indian seed industry by corporations like Monsanto.

In Uttar Pradesh, the Bhartiya Kissan Union led a five-day long protest against GM crop trials, celebrating the agro-ecological approaches that have successfully produced high rice yields in the region. Other protests have taken place in the states of Orissa, Andhra Pradesh, Bihar, Karnataka, Maharashtra, Punjab, Madhya Pradesh and Gujarat.68

* * *

Haiti

Haitians oppose seed aid

In June 2010, more than 10,000 Haitians took to the streets under the initiative of Papaye Peasant Movement (MPP), a member of La Via Campesina, to oppose Monsanto and demand food sovereignty, including local control over native seeds. This popular opposition to Monsanto stems from its announcement, in May 2010, that it had made a shipment of over 60 tons of hybrid maize and vegetable seeds to Haiti and anticipated sending another 400 tons over the next year, with the support of USAID. But these hybrid seeds cannot be replanted from one season to another and require massive amounts of pesticides, making farmers dependent on corporate seed and chemicals producers. Monsanto stated that this decision was made at the World Economic Forum in Davos, Switzerland, and it seems that Haitian officials were not involved in the discussions.

Haitian peasant leader Chavannes Jean-Baptiste from the Peasant Movement of Papaye (MPP), part of La Via Campesina, has described Monsanto’s seed aid as the “next earthquake.” This donation sparked suspicion and anger as the local seed heritage is vanishing because of the increasing domination of multinational seed and agrochemical corporations. Globally, FAO estimates that in the last century around 75% of genetic diversity of agricultural crops has been lost.  InHaiti, around 65% of the population is made up of subsistence farmers living in rural areas.

* * *

(Related video: Haitian farmers burning Monsanto’s “gift” of seeds:)

* * *

U.S.

Stopping the spread of GM crops into national wildlife refuges

According to the non-profit alliance of Public Employees for Environmental Responsibility (PEER), the US government has been collaborating with Monsanto to secure agricultural export markets, removing barriers to the spread of GM crops, including into national wildlife refuges.

However, most of these crops are modified to be resistant to Monsanto’s Roundup herbicide, which is causing an over-reliance on these toxic agricultural chemicals that have spawned an epidemic of herbicide-resistant ‘superweeds’. The spread of these superweeds within national wildlife refuges could have a devastating impact on biodiversity.

Nevertheless, in recent years farming on these refuges has been opened up to GMOs, primarily Monsanto’s Roundup resistant crops. However, legal battles led by PEER and the Centre for Food Safety (CFS) forced the US Fish & Wildlife Service (FWS) to end the planting of GM crops in 12 states.

* * *

South Africa

South African farmers reject GM maize

A solid body of scientific evidence shows that organic matter is the most important trait in making soils more resilient to drought and erratic rainfall. No such evidence exists for GM crops. Biotechnology has proved unable to develop drought-resistant seeds, which would require major changes to the plant’s metabolism; and no GM crops have yet been developed that are yield enhancing.

In October 2011, however, South African authorities approved imports of Bayer CropScience’s GM rice, LL62, which is engineered to be resistant to glufosinate ammonium. Famers and civil society organisations strongly opposed this decision on the grounds that it may contaminate non-GM rice varieties. Moreover, the herbicide glufosinate is toxic, can be harmful for reproductive health, and is therefore slated for an EU ban in the near future.

In the same month, the Lutzville Emerging Farmers Forum and the Food Sovereignty Campaign protested alongside residents of this West Coast region, to reject the GM maize experiments for drought resistance being conducted by Monsanto in collaboration with South Africa’s Agricultural Research Council (ARC). Monsanto’s engineered traits are present in an estimated 75% of all GM maize cultivated in South Africa.

* * *

Conclusions

As shown in this report, Monsanto and agribusiness in general are increasingly unwelcome wherever they operate. They ruin local agriculture and harm communities with their attempts to dominate food production systems.

As a result of Monsanto’s presence, local seeds are becoming illegal, biodiversity is disappearing, land is being contaminated, and farmers and agricultural workers are being poisoned, criminalised and displaced from their land. Local food producers aiming to feed communities have to compete with huge corporations whose sole objective is to make profits. […]

We are calling for collective action from all of those who share our vision of a sustainable world. There has never been a more important time to globalise our struggles, and globalise hope.

SOURCE:
http://www.commondreams.org/headline/2012/04/04-5

By: Common Dreams, April 4, 2012

How the US Uses Sexual Humiliation as a Political Tool to Control the Masses

How the US Uses Sexual Humiliation as a Political Tool to Control the Masses

In a five-four ruling this week, the supreme court decided that anyone can be strip-searched upon arrest for any offense, however minor, at any time. This horror show ruling joins two recent horror show laws: the NDAA, which lets anyone be arrested forever at any time, and HR 347, the “trespass bill”, which gives you a 10-year sentence for protesting anywhere near someone with secret service protection. These criminalizations of being human follow, of course, the mini-uprising of the Occupy movement.Bagram airbase was used by the US to detain its ‘high-value’ targets during the ‘war on terror’ and is still Afghanistan’s main military prison. Photograph: Dar Yasin/AP

Is American strip-searching benign? The man who had brought the initial suit, Albert Florence, described having been told to “turn around. Squat and cough. Spread your cheeks.” He said he felt humiliated: “It made me feel like less of a man.”

In surreal reasoning, justice Anthony Kennedy explained that this ruling is necessary because the 9/11 bomber could have been stopped for speeding. How would strip searching him have prevented the attack? Did justice Kennedy imagine that plans to blow up the twin towers had been concealed in a body cavity? In still more bizarre non-logic, his and the other justices’ decision rests on concerns about weapons and contraband in prison systems. But people under arrest – that is, who are not yet convicted – haven’t been introduced into a prison population.

Our surveillance state shown considerable determination to intrude on citizens sexually. There’s the sexual abuse of prisoners at Bagram – der Spiegel reports that “former inmates report incidents of … various forms of sexual humiliation. In some cases, an interrogator would place his penis along the face of the detainee while he was being questioned. Other inmates were raped with sticks or threatened with anal sex”. There was the stripping of Bradley Manning is solitary confinement. And there’s the policy set up after the story of the “underwear bomber” to grope US travelers genitally or else force them to go through a machine – made by a company, Rapiscan, owned by terror profiteer and former DHA czar Michael Chertoff – with images so vivid that it has been called the “pornoscanner”.

Believe me: you don’t want the state having the power to strip your clothes off. History shows that the use of forced nudity by a state that is descending into fascism is powerfully effective in controlling and subduing populations.

The political use of forced nudity by anti-democratic regimes is long established. Forcing people to undress is the first step in breaking down their sense of individuality and dignity and reinforcing their powerlessness. Enslaved women were sold naked on the blocks in the American south, and adolescent male slaves served young white ladies at table in the south, while they themselves were naked: their invisible humiliation was a trope for their emasculation. Jewish prisoners herded into concentration camps were stripped of clothing and photographed naked, as iconic images of that Holocaust reiterated.

One of the most terrifying moments for me when I visited Guantanamo prison in 2009 was seeing the way the architecture of the building positioned glass-fronted shower cubicles facing intentionally right into the central atrium – where young female guards stood watch over the forced nakedness of Muslim prisoners, who had no way to conceal themselves. Laws and rulings such as this are clearly designed to bring the conditions of Guantanamo, and abusive detention, home.

I have watched male police and TSA members standing by side by side salaciously observing women as they have been “patted down” in airports. I have experienced the weirdly phrased, sexually perverse intrusiveness of the state during an airport “pat-down”, which is always phrased in the words of a steamy paperback (“do you have any sensitive areas? … I will use the back of my hands under your breasts …”). One of my Facebook commentators suggested, I think plausibly, that more women are about to be found liable for arrest for petty reasons (scarily enough, the TSA is advertising for more female officers).

I interviewed the equivalent of TSA workers in Britain and found that the genital groping that is obligatory in the US is illegal in Britain. I believe that the genital groping policy in America, too, is designed to psychologically habituate US citizens to a condition in which they are demeaned and sexually intruded upon by the state – at any moment.

The most terrifying phrase of all in the decision is justice Kennedy’s striking use of the term “detainees” for “United States citizens under arrest”. Some members of Occupy who were arrested in Los Angeles also reported having been referred to by police as such. Justice Kennedy’s new use of what looks like a deliberate activation of that phrase is illuminating.

Ten years of association have given “detainee” the synonymous meaning in America as those to whom no rights apply – especially in prison. It has been long in use in America, habituating us to link it with a condition in which random Muslims far away may be stripped by the American state of any rights. Now the term – with its associations of “those to whom anything may be done” – is being deployed systematically in the direction of … any old American citizen.

Where are we headed? Why? These recent laws criminalizing protest, and giving local police – who, recall, are now infused with DHS money, military hardware and personnel – powers to terrify and traumatise people who have not gone through due process or trial, are being set up to work in concert with a see-all-all-the-time surveillance state. A facility is being set up in Utah by the NSA to monitor everything all the time: James Bamford wrote in Wired magazine that the new facility in Bluffdale, Utah, is being built, where the NSA will look at billions of emails, texts and phone calls. Similar legislation is being pushed forward in the UK.

With that Big Brother eye in place, working alongside these strip-search laws, – between the all-seeing data-mining technology and the terrifying police powers to sexually abuse and humiliate you at will – no one will need a formal coup to have a cowed and compliant citizenry. If you say anything controversial online or on the phone, will you face arrest and sexual humiliation?

Remember, you don’t need to have done anything wrong to be arrested in America any longer. You can be arrested for walking your dog without a leash. The man who was forced to spread his buttocks was stopped for a driving infraction. I was told by an NYPD sergeant that “safety” issues allow the NYPD to make arrests at will. So nothing prevents thousands of Occupy protesters – if there will be any left after these laws start to bite – from being rounded up and stripped naked under intimidating conditions.

Why is this happening? I used to think the push was just led by those who profited from endless war and surveillance – but now I see the struggle as larger. As one internet advocate said to me: “There is a race against time: they realise the internet is a tool of empowerment that will work against their interests, and they need to race to turn it into a tool of control.”

As Chris Hedges wrote in his riveting account of the NDAA: “There are now 1,271 government agencies and 1,931 private companies that work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States, the Washington Post reported in a 2010 series by Dana Priest and William M Arken. There are 854,000 people with top-secret security clearances, the reporters wrote, and in Washington, DC, and the surrounding area 33 building complexes for top-secret intelligence work are under construction or have been built since September 2011.”

This enormous new sector of the economy has a multi-billion-dollar vested interest in setting up a system to surveil, physically intimidate and prey upon the rest of American society.

Now they can do so by threatening to demean you sexually – a potent tool in the hands of any bully.

SOURCE:
http://www.commondreams.org/view/2012/04/06-8

By: Naomi Wolf, April 6, 2012

Young Girl Exposes Canadian Banking FRAUD

Young Girl Exposes Canadian Banking FRAUD

This is my daughter. She gave this speech at a businees meeting in front of 600 people. Her eyes have been opened to a scam that is being perpetrated upon Canadians and the rest of the world.

I am the owner of this video.

Please copy the following
http://www.youtube.com/watch?v=axS-QdUkMqk
and add “Corrupt Canadian Banking System” to the description if you choose to re-upload

Feel free to use it freely without altering the content in a manner that would draw conclusions unintended by the speech but please redirect people back to the original post.

Please also see these great resources for more information and people who are trying their best to enact the necessary change in our country and the world:

Documentary (really good)
http://www.ohcanadamovie.com/

Bill Abram;’s mini documentary (really good)
http://www.youtube.com/watch?v=q7HMt5MgsDg

The Case against the Bank of Canada (lawsuit to have the BOC reinstated as our lender)

http://www.youtube.com/watch?feature=player_embedded&v=TN2USVC6QYQ

Torie’s Interview with Dan Dicks from Press For Truth:

http://www.youtube.com/watch?v=4YaDD3Dx0FA&feature=watch_response

A special thank you to John and Lisa Brombal for inviting our daughter to speak at their business meeting.

Map of US Police Departments’ Policies on Tracking Cell-Phone Use Without a Warrant

Map of US Police Departments’ Policies on Tracking Cell-Phone Use Without a Warrant


ACLU affiliates across America requested information on local law enforcement’s use of cell-phone tracking, and received a wealth of disturbing information about the extent of wireless tracking. They produced a map showing which police departments were discovered to be tracking people’s phones without a warrant, either by getting gutless phone companies to fink out their own customers for warrantless fishing expeditions, or by buying some kind of “cell phone tracking equipment.”

Many law enforcement agencies track cell phones quite frequently. For example, based on invoices from cell phone companies, it appears that Raleigh, N.C. tracks hundreds of cell phones a year. The practice is so common that cell phone companies have manuals for police explaining what data the companies store, how much they charge police to access that data, and what officers need to do to get it.

Most law enforcement agencies do not obtain a warrant to track cell phones, but some do, and the legal standards used vary widely. Some police departments protect privacy by obtaining a warrant based upon probable cause when tracking cell phones. For example, police in the County of Hawaii, Wichita, and Lexington, Ky. demonstrate probable cause and obtain a warrant when tracking cell phones. If these police departments can protect both public safety and privacy by meeting the warrant and probable cause requirements, then surely other agencies can as well.

Unfortunately, other departments do not always demonstrate probable cause and obtain a warrant when tracking cell phones. For example, police in Lincoln, Neb. obtain even GPS location data, which is more precise than cell tower location information, on telephones without demonstrating probable cause. Police in Wilson County, N.C. obtain historical cell tracking data where it is “relevant and material” to an ongoing investigation, a standard lower than probable cause.

Police use various methods to track cell phones. Most commonly, law enforcement agencies obtain cell phone records about one person from a cell phone carrier. However, some police departments, like in Gilbert, Ariz., have purchased their own cell tracking technology.

SOURCE:
http://boingboing.net/2012/04/02/map-of-us-police-departments-t.html

By: Cory Doctorow, April 2, 2012

US Mercenary “Took Part” in Gaddafi Killing; Sent to Assist Syrian opposition

US Mercenary “Took Part” in Gaddafi Killing; Sent to Assist Syrian opposition

(Photo:REUTERS – Zohra Bensemra)

US government officials requested that an American private security firm contact Syrian opposition figures in Turkey to see “how they can help in regime change,” the CEO of one of these firms told Stratfor in a company email obtained by WikiLeaks and Al-Akhbar.

James F. Smith, former director of Blackwater, is currently the Chief Executive of SCG International, a private security firm with experience in Afghanistan, Iraq, and Libya. In what appears to be his first email to Stratfor, Smith stated that his “background is CIA” and his company is comprised of “former DOD [Department of Defense], CIA and former law enforcement personnel.”

“We provide services for those same groups in the form of training, security and information collection,” he explained to Stratfor. (doc-id5441475)

In a 13 December 2011 email to Stratfor’s VP for counter-terrorism Fred Burton, which Burton shared with Stratfor’s briefers, Smith claimed that “[he] and Walid Phares were getting air cover from Congresswoman [Sue] Myrick to engage Syrian opposition in Turkey (non-MB and non-Qatari) on a fact finding mission for Congress.”

Walid Phares, named by the source as part of the “fact finding team,” is a Lebanese-American citizen and currently co-chairs Republican presidential candidate Mitt Romney’s Middle East advisory group.

In a profile of Walid Phares published in Salon, As’ad AbuKhalil details Phares’ history with right-wing militias during the Lebanese civil war.

Sue Myrick, who allegedly was providing “air cover” for the “fact finding team”, is a Republican Congresswoman from North Carolina who has a track record of extremist pro-zionist and anti-Islamic views.

These include leading the charge against Dubai Ports World’s attempt to buy major American ports in 2006 – labeling the Islamic Society of North America as a group of “radical jihadists” – and demanding that former President Jimmy Carter’s citizenship be revoked for daring to meet with Hamas leaders in 2008.

Currently, Myrick is a member of the United States House Permanent Select Committee on Intelligence, a congressional committee charged with overseeing the American intelligence community, and is also involved with the Department of Defense and the US military.

In his email, the “true mission” for the “fact finding” team, Smith told Burton, was how “they can help in regime change.”

Furthermore, the email added that Smith intended to offer “his services to help protect the opposition members, like he had underway in Libya.” He also said that Booz Allen Hamilton, an American consulting firm regularly contracted by the US government for civil and defense projects, “is also working [with] the Agency on a similar request.” (doc-id 5331882)

Smith had originally contacted Stratfor through an email to its founder George Friedman on 15 February 2011 in order to thank the private intelligence firm for its “excellent service of intelligence reporting and analysis.”

“Outstanding just doesn’t cut it – professionally competent, salient, germane, concise are all descriptors that describe your organization’s work product,” he added quite lovingly. (doc-id 257534)

This email was forwarded by Friedman to Burton, who gradually built a friendly relationship with Smith.

By September, Smith had become a major source for Stratfor. Codenamed LY700, he provided intelligence to Burton on developments in Libya – where Smith and his company were contracted to protect Libyan National Transitional Council (NTC) members and train Libyan rebel fighters after the implementation of the no-fly zone in March 2011. (doc-id 121087)

Smith’s intelligence impressed Burton, who in praising him to his peers reeled off another one of his signature racist slurs, “Good skinny. This is what is defined as a credible source. Not some windbag Paki academic belching and passing gas.” (doc-id 5280688)

One of Smith’s contacts was Mehdi al-Harati, an Irish-Libyan who was the commander of the Tripoli Revolutionary Brigade and deputy commander of the Tripoli Military Council prior to his resignation on 11 October 2011. (doc-id 966063)

During his involvement with Stratfor, Smith provided intelligence on missing surface-to-air missiles (SAMs) (doc-id 5321612) and allegedly “took part” in the killing of former Libyan dictator Muammar Gaddafi. (doc-id 3980511)

On the same day Burton was informed of Smith’s new assignment to Syria, he requested an overview of the Syrian opposition from the Startfor briefers, Zucha and Aflano.

Zucha in turn contacted Ashley Harrison, a tactical analyst, for more in-depth info about the Syrian opposition. Harrison responded with an attached 14-page document detailing key groups and their leaders. (doc-id 5355211)

The trail of emails ends December 13, days before the Stratfor mail servers were reportedly hacked, with Burton saying that his source “is meeting w/specific people described as key leaders.” (doc-id 5293788)

SOURCE:
http://english.al-akhbar.com/content/blackwater-veteran-took-part-gaddafi-killing-asked-us-help-syrian-opposition

By: Yazan al-Saadi, March 19, 2012

The 10 Major Food Companies – Flowchart Infographic

The 10 Major Food Companies – Flowchart Infographic

 

Wholesale and distribution

A vast global transportation network is required by the food industry in order to connect its numerous parts. These include suppliers, manufacturers, warehousing, retailers and the end consumers. There are also companies that add vitamins, minerals, and other necessary requirements during processing to make up for those lost during preparation. Wholesale markets for fresh food products have tended to decline in importance in OECD countries as well as in Latin America and some Asian countries as a result of the growth of supermarkets, which procure directly from farmers or through preferred suppliers, rather than going through markets.

The constant and uninterrupted flow of product from distribution centers to store locations is a critical link in food industry operations. Distribution centers run more efficiently, throughput can be increased, costs can be lowered, and manpower better utilized if the proper steps are taken when setting up a material handling system in a warehouse. [1]

Retail

With populations around the world concentrating in urban areas,[5] food buying is increasingly removed from all aspects of food production. This is a relatively recent development, having taken place mainly over the last 50 years. The supermarket is the defining retail element of the food industry, where tens of thousands of products are gathered in one location, in continuous, year-round supply. Restaurants, Cafes, Bakeries and Mobile trucks are also ways consumers can purchase food.

Food preparation is another area where change in recent decades has been dramatic. Today, two food industry sectors are in apparent competition for the retail food dollar. The grocery industry sells fresh and largely raw products for consumers to use as ingredients in home cooking. The food service industry by contrast offers prepared food, either as finished products, or as partially prepared components for final “assembly”.

Food industry technologies

Sophisticated technologies define modern food production. They include many areas. Agricultural machinery, originally led by the tractor, has practically eliminated human labor in many areas of production. Biotechnology is driving much change, in areas as diverse as agrochemicals, plant breeding and food processing. Many other areas of technology are also involved, to the point where it is hard to find an area that does not have a direct impact on the food industry. Computer technology is also a central force, with computer networks and specialized software providing the support infrastructure to allow global movement of the myriad components involved.

Marketing

As consumers grow increasingly removed from food production, the role of product creation, advertising, and publicity become the primary vehicles for information about food. With processed food as the dominant category, marketers have almost infinite possibilities in product creation.

Media & Marketing

A key tool for FMCG marketing managers targeting the supermarket industry includes national titles like The Grocer in the U.K., Checkout in Ireland, Progressive Grocer in the U.S., and Private Label Europe for the entire of the European Union.it

 

http://en.wikipedia.org/wiki/Food_industry

http://www.foodprocessing.com/top100/index.html

Operation COLTAN: Raising Awareness of the Slave Labor Exploitation Super Mineral

Operation COLTAN: Raising Awareness of the Slave Labor Exploitation Super Mineral

Coltan: What You Should Know

What is Coltan?
Coltan is short for Columbite-tantalite – a black tar-like mineral found in major quantities in the Congo.. The Congo possesses 80 percent of the world’s coltan. When coltan is refined it becomes a heat resistant powder that can hold a high electric charge. The properties of refined coltan is a vital element in creating devices that store energy or capacitors, which are used in a vast array of small electronic devices, especially in mobile phones, laptop computers, pagers, and other electronic devices.

Who are the primary exploiters of Coltan in the Congo?
Rwanda, Uganda, Burundi and their proxy militias are the primary exploiters of coltan in the Congo. In an 18 month period Rwanda made $250 million as a result of exploitation of coltan in the Congo. Although Rwanda and Uganda possess little or no coltan, during the period of the war in the Congo, their exports escalated exponentially. For example, Rwanda’s coltan export went from less than 50 tons in 1995 to almost 250 tons in 1998. Zero cassiterite was transported from the Congo to Uganda in 1998, however by 2000 151 drums were transported.

The United Nations notes in its 2001 report on the Illegal Exploitation of Natural Resources in the congo that “The consequences of illegal exploitation has been twofold: (a)massive availability of financial resources for the Rwandan Patriotic Army, and the individual enrichment of top Ugandan military commanders and civilians; (b) the emergence of of illegal networks headed by either top military officers or businessmen.”

Foreign Corporate exploitation
Although the countries mentioned above directly exploit coltan, foreign multi-national corporations have been deeply involved in the exploitation of coltan in the Congo. The coltan mined by rebels and foreign forces is sold to foreign corporations. Although, the United Nations in its reports on the Congo do not directly blame the multi-national corporations for the conflict in the Congo, the United Nations does say that these companies serve as “the engine of the conflict in the DRC.

Major United States players include:
Cabot Corporation, Boston, MA
OM Group, Cleveland, Ohio
AVX, Myrtle Beach, SC
Eagle Wings Resources International, Ohio
Trinitech International, Ohio
Kemet Electronics Corporation, Greenville, SC
Vishay Sprague. Malvern, PA

Corporations from other countries have been a part of the coltan exploitation chain. These companies include but are not limited to Germany’s HC Starc and EPCOS, China’s Nigncxia, and Belgium’s George Forrest International.

Once the coltan is processed and converted to capacitors, it is then sold to companies such as Nokia, Motorola, Compaq, Alcatel, Dell, Hewlett-Packard , IBM, Lucent, Ericsson and Sony for use in a wide assortment of everyday products ranging from cell phones to computer chips and game consoles.

What are some of the uses of coltan in modern society?
• Laptop computers
• Cellular phones
• Jet engines
• Rockets
• Cutting tools
• Camera lenses
• X-ray film
• Ink jet printers
• Hearing aids
• Pacemakers
• Airbag protection systems
• Ignition and motor control modules, GPS, ABS systems in automobiles
• Game consoles such as playstation, xbox and nintendo
• Video cameras
• Digital still cameras
• Sputtering targets
• Chemical process equipment
• Cathodic protection systems for steel structures such as bridges, water tanks
• Prosthetic devices for humans – hips, plates in the skull, also mesh to repair bone removed after damage by cancer
• Suture clips
• Corrosion resistant fasteners, screws, nuts, bolts
• High temperature furnace parts.
• High temperature alloys for air and land based turbines

Links and Resources

Coltan Wiki Facts
Guns, Money and Cell Phones
United Nations Coltan Primer
Congo’s Coltan Rush!


POLE Institute Report “The Coltan Phenomenon!” (PDF)
Columbium and Tantulum: US Geological Survey (PDF)
China and Congo’s Coltan Connection (PDF)

Congo War – 4 Million Dead (PDF)
Coltan Facts (PDF)
FFI Coltan Report (PDF)

 

The components controlling the flow of electricity in mobile phones are composed of the refined mineral known as Coltan. With more and more people using mobile phones the demand for Coltan has increased significantly.

Mobile phones fuel Congo conflict

The largest reserves of Coltan are to be found in the Democratic Republic of the Congo, and much of the finance sustaining the civil wars in Africa, especially in the Democratic Republic of the Congo, is directly connected to Coltan profits. Coltan is extracted under terrible working conditions in mines in Eastern Congo.

The United Nations reports child labour in Africa has significantly increased in Coltan mines. In some regions of the Congo, about 30 percent of schoolchildren are now forced to work in the mines.

It can be dangerous to ask questions

“The control over these resources works through maintaining local militia and exploiting cheap labour to excavate the mines”, says Antony Grange, Country Coordinator with experience from the DanChurchAid work in DRC Congo. “Attempting to oppose these practices locally is very risky business, as DanChurchaid’s former partner “Héritiers de la Justice” knows all too well since they have experienced several assassination of their staff members in the recent years. Only international pressure may stop this development,” says Antony Grange.

International pressure is important

When Denmark become a member of the UN Security Council, the Danish Government put the actions to promote peace and stability in Africa on top of the agenda, and they promised to put a focus on the role natural recourses play as a cause to many conflicts. Income from oil, diamonds and export of woods, continues to fuel armed conflicts.

A call to action

However, Denmark has not managed to convince the Security Council to strengthen the present activities. Therefore the Danish development NGOs now call on the Minister for Foreign Affairs to bring the issue to the table and to work for more efficient tools for the UN to punish those who make profit out of the conflict resources. The organisation also calls for a permanent position within the UN, with a mandate to work for prevention of conflicts financed by natural resources such as oil, woods, and minerals.

Zombie Survival Maps Show Danger Zones, Armories and Food Sources for Entire U.S.

Zombie Survival Maps Show Danger Zones, Armories and Food Sources for Entire U.S.

How safe are you when the zombies come for your brain? Photo: Google Maps/Doejo

 

The Walking Dead teaches us that well-stocked pantries and armories are paramount to the survival of the human race after a zombie infestation. Canned food and ammunition: You can never have enough of these key essentials.

Enter the Map of the Dead from Doejo, which overlays zombie danger zones and potential supply locations on a Google Map of your local haunts. Red areas denote population centers where zombies might graze, while dark gray zones cover parks and wilderness areas, which are most likely to be walker-free. Supply locations are annotated with helpful descriptions — liquor stores, hospitals, gun shops, military bases and cemeteries are just some of the locations highlighted.

The map uses Google APIs and keyword searches to determine the location types that appear on the maps. The developers at Doejo are looking into adding more location types, such as schools, pawn shops and barricades. Unfortunately, certain keywords are currently returning too many false positives for these types of landmarks.

As for user-generated content — in other words, crowd-sourced supply and hiding place annotation — it’s something Doejo is exploring, but has no definite plans to implement. Which might be good. You don’t want to share your favorite fortified sniper perch with the whole world.

Still, with the Doejo maps, you can better plan for the coming zombie apocalypse, and even other natural disasters. At Gadget Lab, we scanned not only our local San Francisco environs, but also Chicago and New York City to determine safe zones should the worst come to pass. (We briefly considered a quick survey of Los Angeles, but decided that traffic snarls will doom the City of Angels to a quick and unstoppable zombie epidemic. Sorry, LA. We’ll miss your movie blockbusters and sunny beaches.)

Here’s a quick look at how well our three metropolitan areas are set up for riding out the zombie plague.

Manhattan

 


Shut down the bridges and start rooting out the undead. Photo: Google Maps/Doejo

Manhattan is an island, which gives it an advantage over outlaying areas, insomuch that once the city shuts down the bridges and tunnels, survivors can start rooting out the water-locked zombies. On the flipside, a quick look at the map shows only three gun stores.

Sure, you can kill a zombie with a well-placed smack to the head, but who wants to get that close to something that wants to chew on your shoulder? Also, be careful about that military base between the two cemeteries — it’s actually just a recruitment center. And, of course, stay far away from cemeteries, which are typically popular spawning points for the undead.

As with all the Doejo maps of metropolitan areas, the Manhattan map only shows major stores, and leaves out neighborhood bodegas. So make friends with the owners of these stores right now. A few pleasantries today could prove fruitful tomorrow.

Chicago

 


Zombies don’t want deep dish, they want brains. Photo: Google Maps/Doejo

The Windy City is surrounded by suburbs on three sides. That much open space could help the citizens of Chicago escape early in the infestation. That said, if you’re trapped in the city, it’s best to stay near the shore, as it’s easier to defend three sides than four. Plus, if you have an escape boat, you can head to Canada where the zombies are allegedly nicer.

Four military bases are within the immediate Chicago area, and could potentially help keep zombie infestation to a minimum. Or, conversely, the soldiers could become zombies — military-trained zombies with access to guns. It’s a judgement call. You have the map, so at least you know your options.

San Francisco

 


All those peace rallies could suddenly become zombie buffets. Photo: Google Maps/Doejo

San Francisco has the advantage of being at the tip of a peninsula. Shutting down the two bridges the lead into the city should be no problem. The disadvantage of San Francisco is that it’s San Francisco, home of pacifism and protest. People here may not have the gumption to mount an effective counter-attack, and no amount of pacifistic protesting will stop a zombie from popping open your skull, and devouring your brain like it’s soup inside a sourdough bread bowl.

Our lack of local gun stores is especially disturbing. Hopefully, the thin design of the MacBook Air — you can find four or five in every local hipster cafe — will help these notebooks serve as effective weapons for zombie decapitation.

San Francisco’s saving grace may be its DIY resourcefulness. Within a few days of the collapse of society, someone will probably have an open-source 3D printable weapon that not only kills zombies, but also offers a much lower carbon footprint than your average bullet.

Plus, San Francisco moved all of it’s dead to the nearby suburb of Colma. That should cut down on the first wave of zombies that wander the streets lusting for brraaaiiinnnsss.

SOURCE:
http://www.wired.com/gadgetlab/?p=96515

By: Roberto Baldwin, April 11, 2012

Supreme Court Makes It Even More Impossible for Torture Victims to Win Lawsuits

Supreme Court Makes It Even More Impossible for Torture Victims to Win Lawsuits

The US Supreme Court unanimously decided that foreign political organizations and multinational corporations cannot be sued for the torture or extrajudicial killing of persons abroad under an anti-torture law passed in 1992. The law only gives people the right to sue “an individual,” “who acted under the authority of a foreign nation,” according to the Los Angeles Times.

The decision came in a lawsuit filed by the family of a US citizen, Azzam Rahim, who was tortured and killed in the Palestinian Territory by Palestine Liberation Organization (PLO) intelligence officers. It was Justice Sonia Sotomayor, who President Barack Obama appointed to the Supreme Court, that spoke for the decision. She explained the text of the Torture Victims Protection Act of 1991 “convinces us that Congress did not extend liability to organizations, sovereign or not. There are no doubt valid arguments for such an extension. But Congress has seen fit to proceed in more modest steps in the Act, and it is not the province of this branch to do otherwise.”

This outcome is not just a blow for the family of Rahim but also those concerned with human rights. If one considers the intent of the law, it seems like Rahim’s family should not have been scoffed at as they were for bringing the lawsuit. (Chief Justice John Roberts laughed at the lawyer for the family, Jeffrey Fisher, during arguments in Court.)

President George H.W. Bush, who signed the law, intended this to be legislation that would push Congress to ratify the Convention Against Torture:

I regret that the legislation proposed by the Administration to implement the United Nations Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment has not yet been enacted. This proposed implementing legislation would provide a tougher and more effective response to the problem, putting in place for torturers the same international “extradite or prosecute” regime we have for terrorists. The Senate gave its advice and consent to the Torture Convention on October 27, 1990, but the United States cannot proceed to become a party until the necessary implementing legislation is in place. I again call upon the Congress to take prompt action to approve the Torture Convention implementing legislation.

The law was already considered a law that would not apply to the US Armed Forces or law enforcement operations that were carried out under US law.

UN Special Rapporteur on Torture Juan Mendez submitted a brief to the court in support of Rahim that outlined the fact that the Torture Convention is supposed to help “prevent torture” by “persons who act, de jure or de facto, in the name of, in conjunction with, or at the behest of the State Party.” In other words, being a government official doesn’t make one immune to prosecution. Any person who is complicit or participates in torture is to be criminalized. There are to be civil remedies in place to compensate and give justice to victims of torture. What this ruling does then is undercut the United States’ responsibility to uphold the Torture Convention.

Aside from the reality that the US government finds it has no obligation to do what signatories to the Torture Convention are expected to do, the ruling is troublesome on another level because the comments from Supreme Court justices suggest if the family of Rahim knew the names of people that had tortured and killed him then they might not have had a weak case.

Now, against scholarly understanding of international law, the Court has effectively rendered precedents where non-state actors, like corporations, have been held liable for torture moot. As the Yale Law School Center for Global Legal Challenges demonstrates in a brief, they are contradicting the US State Department policy:

The U.S. State Department has routinely acknowledged that non-state groups and organizations have engaged in torture. See, e.g., U.S. Dep’t of State,  Democratic Republic of the Congo: Country Reports on Human Rights Practices (Feb. 23, 2000) (citing credible reports that “Mai Mai groups fighting on the side of the Government committed * * * torture * * * of civilians”); U.S. Dep’t of State, Sri Lanka: Country Reports on Human Rights Practices (Mar. 4, 2002) (“[T]wo former Tamil terrorist organizations aligned with the former PA Government * * * have been implicated in cases involving extrajudicial killing [and] torture.”).

It was already difficult for torture victims to win lawsuits. In December 2011, a federal judge dismissed a lawsuit by a former Guantanamo detainee claiming US military officials had tortured him repeatedly. A federal appeals court dismissed torture cases against Abu Ghraib contractors in September 2011. The Ninth Circuit dismissed a suit against Jeppesen Dataplan that alleged they had “knowingly aided in the rendition and subsequent torture of terror suspects by the CIA,” after the Obama Justice Department invoked a state secrets privilege. A federal appeals court did allow a lawsuit against former Secretary of Defense Donald Rumsfeld for authorizing torture to move forward, but a district court dismissed another lawsuit against him for authorizing the torture of detainees by US military personnel in Iraq and Afghanistan. And, months before that, a lawsuit brought by convicted terrorist Jose Padilla against US Defense Secretary Robert Gates and Rumsfeld for their role in his torture and isolation on a Navy military brig was thrown out and the Obama Justice Department determined that Bush administration lawyers that had crafted legal justification for torture had engaged in no “professional misconduct.”

If torture is illegal, it is only prohibited from being expressly included in policies of agencies or departments. It most certainly is something agents, military personnel and government officials can engage in and avoid prosecution. Given that reality, the narrow interpretation is not necessarily surprising. Using this case to create a precedent that grants cover to corporations that engage in torture is in line with the culture of impunity that has been fostered by US government. Unfortunately, if torture victims want justice, the United States is one of the last countries they should turn to for reparations at this point in history.

By: Kevin Gosztola Wednesday April 18, 2012 6:40 pm

Source: http://dissenter.firedoglake.com/2012/04/18/supreme-court-makes-it-even-more-impossible-for-torture-victims-to-wi-suits/

The Way of the Drone: Emblem for an Empire of Cowards

The Way of the Drone: Emblem for an Empire of Cowards

A few months back, I reposted here an article that I wrote 10 years ago, before the invasion of Iraq: a fictional scenario of how the Terror War would play out on the ground of the target nations — and in the minds of those sent to wage these campaigns. I was reminded of that piece by a story in the latest Rolling Stone.

The RS story, by Michael Hastings, depicts the drone mentality now consuming the US military-security apparatus, a process which makes the endless slaughter of the endless Terror War cheaper, easier, quieter. I didn’t anticipate the development in my proleptic piece; the first reported “kill” by American drones, in Yemen, had taken place just a few weeks before my article appeared in the Moscow Times.

(One of the victims of this historic first drawing of blood was an American citizen, by the way. Thus from the very beginning, the drone war — presented as noble shield to defend American citizens from harm — has been killing American citizens, along with the hundreds and hundreds and hundreds and hundreds of innocent men and women around the world being murdered without warning — and without any chance to defend themselves or take shelter — by cowards sitting in padded seats behind computer consoles thousands of miles away, following orders from the even greater cowards who strut around the Pentagon, CIA headquarters and the White House.)

But what brought my earlier piece to mind was a brief mention of the “military slang” now being used to designate the victims of the drones. Below are a few snippets from my 2002 post, a fictional email by an occupation soldier to a friend:

      Yo, Ed! I’m looking out the window of Watchtower 19 in Force Zone Seven. They’re loading up the dead wagon. Three friendlies, two uncardeds, the usual collateral – and one bug. We zapped the market before the bug got his hard-on – another one of those Czech AK-47 knock-offs that our friendly neighborhood warlord keeps bringing in. He says he doesn’t know how the bugs get hold of them – they drop down from heaven, I guess …

… I’d just come off night patrol in Deep-City Zone, hardcore bugland, backing up some Special Ops doing a Guantanamo run on terrorperp suspects. Banging down doors, barrel in the face of some shrieking bug-woman in her black bag, children scuttling in the dark like rats, the perp calling down an airstrike from Allah on our heads. You know the drill. You know the jangle. Not even the new meds can keep you blanked out completely.

So there’s always the overstep somewhere. Woman’s cheekbone cracking from a backhand, some kid stomped or booted out of the way. Some perp putting his hand in one of those damned dresses they wear, going for who knows what – Koran? Mosquito bite? Scimitar? Czech special? – and you open up. More shrieking, more screaming – and then the splatter on the wall.

In the new Rolling Stone story, Hastings tells us how America’s brave drone warriors view their victims:

    For a new generation of young guns, the experience of piloting a drone is not unlike the video games they grew up on. Unlike traditional pilots, who physically fly their payloads to a target, drone operators kill at the touch of a button, without ever leaving their base – a remove that only serves to further desensitize the taking of human life. (The military slang for a man killed by a drone strike is “bug splat,” since viewing the body through a grainy-green video image gives the sense of an insect being crushed.)

“Bugs” being “splattered.” This is what Barack Obama — who has expanded the drone death squads beyond the imaginings of George W. Bush — and all of his brave button pushers and joystick riders think of the defenseless human beings they are killing (including 174 children by last count).

This has been the attitude underlying the Terror War since its beginnings. When I wrote my piece with its “bug” imagery, I was only reflecting what was already obvious and pervasive, both in the military-security war machine and in much of the general public. Anyone designated by those in power as an “enemy” — for any reason, known or unknown, or for no reason at all — is considered a subhuman, an insect, whose destruction is meaningless, without moral content, like swatting a fly on the wall. (As, for example, in this 2008 piece about a figure much lauded by progressives at the time: “Crushing the Ants.”)

There is not only a tolerance for this official program of state murder; there is an absolute enthusiasm for it. Our rulers heartily enjoy ordering people to be killed. (And to be tortured, as we noted here last week.) It makes them feel good. It makes them feel “hard,” in every sense of the word. As Hastings notes:

    From the moment Obama took office, according to Washington insiders, the new commander in chief evinced a “love” of drones. “The drone program is something the executive branch is paying a lot of attention to,” says Ken Gude, vice president of the Center for American Progress. “These weapons systems have become central to Obama.” In the early days of the administration, then-chief of staff Rahm Emanuel would routinely arrive at the White House and demand, “Who did we get today?”

Here are some examples of what Rahm and his then-boss, the Nobel Peace Prize Laureate, were “getting” with their flying deaths squads:

    But for every “high-value” target killed by drones, there’s a civilian or other innocent victim who has paid the price. The first major success of drones – the 2002 strike that took out the leader of Al Qaeda in Yemen – also resulted in the death of a U.S. citizen. More recently, a drone strike by U.S. forces in Afghanistan in 2010 targeted the wrong individual – killing a well-known human rights advocate named Zabet Amanullah who actually supported the U.S.-backed government. The U.S. military, it turned out, had tracked the wrong cellphone for months, mistaking Amanullah for a senior Taliban leader. A year earlier, a drone strike killed Baitullah Mehsud, the head of the Pakistani Taliban, while he was visiting his father-in-law; his wife was vaporized along with him. But the U.S. had already tried four times to assassinate Mehsud with drones, killing dozens of civilians in the failed attempts. One of the missed strikes, according to a human rights group, killed 35 people, including nine civilians, with reports that flying shrapnel killed an eight-year-old boy while he was sleeping. Another blown strike, in June 2009, took out 45 civilians, according to credible press reports.

And of course there is this, the follow-up to the “extrajudicial killing” of U.S. citizen Anwar al-Awlaki. After killing al-Awlaki — without ever charging him with a single crime — the Obama administration then murdered his 16-year-old son (as we noted here last year). Hastings writes:

      In the days following the killing, Nasser and his wife received a call from Anwar’s 16-year-old son, Abdulrahman al-Awlaki, who had run away from home a few weeks earlier to try to find his now-deceased father in Yemen. “He called us and gave us his condolences,” Nasser recalls. “We told him to come back, and he promised he would. We really pressed him, me and his grandmother.”

The teenage boy never made it home. Two weeks after that final conversation, his grandparents got another phone call from a relative. Abdulrahman had been killed in a drone strike in the southern part of Yemen, his family’s tribal homeland. The boy, who had no known role in Al Qaeda or any other terrorist operation, appears to have been another victim of Obama’s drone war: Abdulrahman had been accompanying a cousin when a drone obliterated him and seven others. The suspected target of the killing – a member of Al Qaeda in the Arabian Peninsula – is reportedly still alive; it’s unclear whether he was even there when the strike took place.

The news devastated the family. “My wife weeps every day and every morning for her grandson,” says Nasser, a former high-ranking member of the Yemenite government. “He was a nice, gentle boy who liked to swim a lot. This is a boy who did nothing against America or against anything else. A boy. He is a citizen of the United States, and there are no reasons to kill him except that he is Anwar’s son.”

The boy was probably killed in a “signature strike,” where bold and brave CIA analysts sit back in their chairs and observe people going about their business in a foreign country far away. If their activities look “suspicious” according to some arbitrary, secret criteria, then they can be slaughtered instantly by a drone missile — even if the attackers have no idea whatsoever who the targets are or what they are actually doing. Plotting terrorism, or praying? Organizing jihad, or holding a wedding? Building bombs, or having lunch? The attackers don’t know — and can’t know. They simply put down their Cheetohs and fire the missile. Who cares? It’s just “bug splatter.”

And the fact is, no one does care. As Hastings notes, this hideous program of murder and terror has been fully embraced by the political elite and by society at large. And our rulers are now bringing it back home with a vengeance, putting more and more Americans under the unsleeping eye of government drones watching their every move, looking for the “signature” of “suspicious” behaviour. Hastings notes:

    In the end, it appears, the administration has little reason to worry about any backlash from its decision to kill an American citizen – one who had not even been charged with a crime. A recent poll shows that most Democrats overwhelmingly support the drone program, and Congress passed a law in February that calls for the Federal Aviation Administration to “accelerate the integration of unmanned aerial systems” in the skies over America. Drones, which are already used to fight wildfires out West and keep an eye on the Mexican border, may soon be used to spy on U.S. citizens at home: Police in Miami and Houston have reportedly tested them for domestic use, and their counterparts in New York are also eager to deploy them.

History affords few if any examples of a free people — in such a powerful country, under no existential threat, undergoing no invasion, no armed insurrection, no natural disaster or epidemic or societal collapse — giving up their own freedoms so meekly, so mutely. Most Americans like to boast of their love of freedom, their rock-ribbed independence and their fiercely-held moral principles: yet they are happy to see the government claim — and use — the power to murder innocent people whenever it pleases while imposing an ever-spreading police state regimen on their lives and liberties. Sheep doped with Rohypnol would put up a stronger fight than these doughty patriots.

Hasting’s story should be read in full. In its straightforward marshalling of facts and refusal to simply parrot the spin of the powerful (something we used to call “journalism,” kids; ask your grandparents about it, they might remember), it lays out the hideous reality of our times. I am tempted to call it an important story — but I know that it will sink with scarcely a ripple into the abyss of our toxic self-regard. A few will read it and be horrified; the rest will stay riveted on the oh-so-exciting and oh-so-important race to see who will get to perpetuate this vile and murderous system for the next four years.

WRITTEN BY CHRIS FLOYD
WEDNESDAY, 18 APRIL 2012 08:37

Source: http://www.chris-floyd.com/component/content/article/1-latest-news/2235-the-way-of-the-drone-emblem-for-an-empire-of-cowards.html

Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most Of Your Emails

Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most Of Your Emails

In his first television interview since he resigned from the National Security Agency over its domestic surveillance program, William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower. Binney was a key source for investigative journalist James Bamford’s recent exposé in Wired Magazine about how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain near-bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls, Google searches and other personal data.

Binney served in the NSA for over 30 years, including a time as technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could “create an Orwellian state.” Today marks the first time Binney has spoken on national television about NSA surveillance. This interview is part of a 5-part special on state surveillance. Click here to see segment 2, 3, 4 and 5. [includes rush transcript]