The Great Awakening : aka the Q Map

The Great Awakening : aka the Q Map

 Q: The Plan to Save the World

Not affiliated with Trump, Q or any intel source other than what is publicly available here:

Q intel drops: https://QMap.pub  Qproofs: https://www.Qproofs.com

Disclaimer: I am not making accusations of guilt towards anyone featured in this video. That is Huber’s job, and if they have done crimes, they will be exposed – if not, they won’t.

   The good people of America, Left and Right, Democrat and Republican, White or of color, young and old, are witnessing the take-back of America from a large number of very powerful criminals who have been destroying society and the world for several decades, maybe longer.

This is the greatest story of our time. You have the choice of either scratching your head in confusion when seeing events unfold, or looking at the information provided by Q to understand the real story.

These are people I trust to bring you the right information. Look on Twitter for: @cjtruth @GitmoAwaits @Jordan_Sather_ @X22report @RedPill78 @ipot1776    And, there are many others you can find too. 

Also, very interesting relevant follows, @GenFlynn [ General Flynn] and former President @John_F_Kennedy

Don’t be a sheep. They want you divided. They have been working to divide us forever. It’s time to wake up and experience true freedom instead of the fake kind we have been living under.

The good guys, with control over the NSA, began the Q intelligence dissemination program to invoke an online grassroots movement that came to be called “The Great Awakening”.

It started on underground internet channels, then moved to the mainstream.

Q has been a fun distraction for those who follow world events and desire truth, but it is about to begin a much more important and necessary phase – keeping the public informed when the Deep State war breaks out onto the surface.

By this, I mean high-profile arrests.

Yes folks. The criminals I am referring to are famous politicians, actors, singers, CEOs and celebrities. People who have earned our trust, respect and admiration. They have done very bad things that are all fully known and documented, and they will be severely punished.

Those of us who have followed Q since the beginning will be here to help you make sense of the coming events. We are among the first to realize that our petty partisan divisions are just trivial distractions, and we are all enslaved by a hidden enemy. We realize that the problem was never Capitalism or Socialism, Democrat or Republican, black or white, Muslim or Christian.

We know it was just very powerful criminals who had too much power and were crushing us under debt and asinine entertainment, Fellow slaves. It’s time to buckle your seatbelt, recognize your true enemy, and embrace a new future that we all owe to the brave patriots who risked their lives to achieve this victory against the greatest force of evil the world has ever seen.

Could This Be …  ?
Only Time Will Tell

Save the World from…. What ?

Trump w/ Kids     vs.   Biden  w/ Kids

Trump & The Q Plan: Complete from A to Z

Facebook Censorship - Fact Checkers

The Original Awakening Map
by Dylan Louis Monroe
of
The Deep State Mapping Project

THE GREAT AWAKENING
Newest Version(?)
by Dylan Louis Monroe
of
The Deep State Mapping Project

‘CONSPIRACIES WORTH PROTESTING’
Activsm Themed Art Piece 

by Dylan Louis Monroe

The Fall of the Cabal – 10 Part Documentary

The Fall of the Cabal – 10 Part Documentary

This documentary was made by researcher and author Janet Ossebaard from the Netherlands with the aid of countless anons across the world. It Contains thousands of hours of research. Accept nothing as the truth. DO your own research, and double-check everything presented. This is the only way we become independent thinkers.

 

[00:00] Part 1 – Things that make you go hmmm (length : 13mins06)

[13:06] Part 2 – Down the rabbit hole (length : 14mins58)

[28:07] Part 3 – The alien invasion (length : 16mins21)

[44:28] Part 4 – Child lovers everywhere (length : 16mins14)

[01:00:43] Part 5 – Children, art & pizza (length : 19mins31)

[01:20:14] Part 6 – Major media manipulation (length : 16mins55)

[01:37:09] Part 7 – Witches & warlocks (length : 23mins40)

[02:00:50] Part 8 – Beyond kings & queens (length : 19mins02)

[02:19:50] Part 9 – The dawn of a new world (length : 19mins41)

[02:39:40] Part 10 – The return of the king (length : 18mins35)

Everything you Need to Know

Q and the Great Awakening

Conscious Rap – Why it Matters

Conscious Rap – Why it Matters

There has always been a conscious effort to destroy any upliftment of the black race, whether that be physically, mentally, psychologically, morally, culturally, or economically.

KRS-One

Rapper, Music

Conscious Rap Defined

Conscious rap is a subgenre of hip-hop that focuses on creating awareness and imparting knowledge. Conscious rappers traditionally have decried violence, discrimination, and other ailments of society. Conscious rap is propelled by the conviction that radical social change comes through knowledge of self and personal discovery.

Most conscious rap songs contain positive, uplifting messages, often delivered over smooth, ear-grabbing beats. Grandmaster Flash & The Furious 5’s “The Message” and Slick Rick’s “Hey Young World” are grand examples of early conscious hip-hop tracks.

 

 

Conscious Rap vs. Political Hip-Hop

Conscious hip-hop is often confused with its musical cousin, political hip-hop, possibly because they both speak to social turmoil. A disdain for commercialism is another common thread that weaves the two styles together. Politically charged songs by rappers such as Dead Prez and Public Enemy are usually delivered in a militant fashion. The conscious message, on the other hand, empowers by uplifting the listener. Close your eyes and pick any album from The Coup’s catalog and you will have walked in on a crash course on political hip-hop.

 

 

The Gift and Curse of Conscious Rap

Socially aware hip-hoppers often dissect the attitude and ideals propagated in mainstream culture, but the approach is not without its limitations. Since they often create music for headphones, and not necessarily for mass radio, conscious rappers are generally less accomplished than their mainstream counterparts. With the exception of a few emcees (Nas and Kendrick Lamar come to mind), conscious artists typically lose the chart race to their more popular mainstream peers.

 

Despite the prestige attached to being the Voice of the People, many rappers detest bearing the “conscious rap” label because of its limiting virtue. The music also is harder to find because some of the independent labels that once cranked out what’s been called rap’s “righteous underground,” such as Rawkus and Def Jux, are no longer in the business, which has made seeking out conscious rap more akin to a scavenger hunt.

The conscious movement bears some resemblance to—and has some overhang with—rap’s straightedge community, a moniker for hip-hop’s drug- and alcohol-free emcees. It’s a larger group than you might expect, even if some are recent converts.

 

 

Notable Conscious Hip-Hop Acts

Here are some artists that have worn, or now represent (Kanye) the mantle of Conscious Rap:

 

  • Lowkey
  • Beast 1333
  • MC Yogi
  • Gang Starr
  • Immortal Technique
  • Killer Mike
  • Dead Prez
  • Tupac Shakur
  • K-RINO
  • Vinnie Paz
  • Jedi Mind Tricks

Essential Conscious Rap Albums

  • “It Takes a Nation of Millions to Hold Us Back,” Public Enemy
  • “Resurrection,” Common
  • “Quality,” Talib Kweli
  • “Black on Both Sides,” Mos Def
  • “Mos Def & Talib Kweli Are Black Star,” Black Star
  • “2PAC” Changes – Unknown Album
  • “Lowkey” Soundtrack to the Struggle

The Glory That is Conscious Rap

One shining example is “Glory,” performed and written by Common and John Legend. It was the theme song from the 2014 film “Selma,” which recalls the 1965 voting rights march from Selma to Montgomery, Alabama. It says, in part:

“resistance is us
That’s why Rosa sat on the bus
That’s why we walk through Ferguson with our hands up
When it go down we woman and man up
They say, ‘Stay down’ and we stand up”

Inside the Complicated History of Anti-Cop Anthem ‘Sound of Da Police’

The 1993 song reinvigorated KRS-One’s career

and against all odds became a Hollywood (and police) favorite

1992, KRS-One was at a crossroads. After a string of three gold records, his group, Boogie Down Productions, had only sold 250,000 copies of its most recent album, Sex and Violence. He was under industry fire for throwing PM Dawn rapper Prince Be off the stage during a notorious show at New York City’s Sound Factory. Some listeners complained that his music had become too preachy; others questioned his decision to drop a song like “13 and Good.” Meanwhile, BDP itself was coming apart. Other members had sued him for half the ownership of the group, and he’d recently split with his wife, Ms. Melodie, who was also a part of the crew.

Sitting at the Tokyo airport while on tour in support of Sex and Violence, that year, he wrote the lyrics for a new song. He called it “Sound of Da Police.” There wasn’t a particular incident that inspired it. Nothing had occurred between him and the authorities in Japan. The L.A. uprisings had happened earlier that year, but they weren’t consciously on his mind. The song’s inspiration was straightforward and ingrained: generation after generation after generation of Black people experiencing unfair treatment and violence at the hands of the cops.  more on Medium.com

‘Soundtrack To The Struggle’

Official video for Lowkey

When you say the truth, they attack like a Sabre-tooth
Thinking clear they make you disappear like you hate the fruit
We don’t need more Boeings, we don’t need more Rebors, weed or Lyor Cohens
They tell us about terrorism and tell us about terrorists
Look up the definition and tell us what terror is

Insider Leaks Statement: Facebook Was NOT Created By Mark Zuckerberg!

Insider Leaks Statement: Facebook Was NOT Created By Mark Zuckerberg!

Definitely worth a listen!  We all know that Facebook had some shady beginnings.. stolen code.. angel investment via outed CIA ‘front company’ In-Q-Tel, and it goes on..  What if Zuck really was just the chosen puppet leader of what would ultimately be the worlds largest ‘voluntary citizen dossier’?  Give it a listen and decide for yourself.  These statements certainly seem to ring true with plenty of background info to give reasonable merit.

     Highlights:

    • Mark’s real name is not even Zuckerberg.
    • Mark was chosen ahead of time and ‘placed’ at Harvard to fit the story.
    • Mark did not create the Facebook brand name nor did he write any code.
    • Mark has ‘handlers’ that dictated (and still do) his every move.
    • Mark’s lack of any moral compass made him the perfect figure-head.
    • Mark is the just the face of a much bigger agenda at work.

    Interesting ‘Top Comment’

    ” So, Zuckerberg’s Harvard professor, James P. Chandler, is one in the same patent attorney who stole Michael McKibben’s Leader Technology ideas that he was supposed to help get a patent and instead STOLE the information! WOW, all these deep stater’s are totally intertwined, like a huge cancer. How do you kill a cancer? STARVE IT! “

    Schools Now Monitoring kids with Insecure Impero Software, PR Issues Abound

    Schools Now Monitoring kids with Insecure Impero Software, PR Issues Abound

    One of the most widely used tools for Schools monitoring kids and restricting pupils’ internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children’s personal information exposed to hackers, a researcher has warned.

    Impero Education Pro, a product that restricts and monitors’ students’ website use and searches, is used in 27% of UK secondary schools, according to the company. In a controversial pilot programme, a version of the software looks for extremism-related searches such as “jihadi bride”.

    But last month the security researcher Zammis Clark posted extensive details of a flaw in the company’s encryption protocols which could allow almost anyone to gain full access to computers running the Impero software, run software such as spyware on the systems, or access files and records stored on them.

    The company said it had released a temporary security patch and was working on a permanent upgrade.

    Clark said the flaw he found would leave affected schools’ networks “completely pwned”, online slang meaning in this context that the networks’ security would be fully compromised and information on it would be rendered vulnerable.

    He said he had posted it publicly, rather than privately disclosing it to the company, for several reasons. “One was that I was against the ‘anti-extremism’ stuff, the other was because not being a customer, I didn’t know where to send it.”

    Schools using Impero’s software said the company had notified them of the security flaw in the middle of last month but they were offered few details of its potential scale.

    One school IT manager said the response from Impero was vague and required managers to contact the firm for more information. “Impero are crap at communication,” he said.

    Three schools and chains using the software that were approached by the Guardian said the company had been slow to deliver promised software patches. Impero also offered fixes to schools that were using the software without contractual support, but left it up to those schools to make contact.

    One school said the most recent update on the situation from Impero arrived by email on Monday.

    The company is known on school tech forums for its pushy sales techniques, but the software remains popular because of the lack of quality alternatives.

    Impero stressed that no data had been compromised, it had already issued a temporary fix for the vulnerability and it would install a full solution before the start of the next academic year.

    “On 13 June 2015, we were made aware that someone had maliciously and illegally hacked our product, subsequently making this hack public rather than bringing it to our attention privately and in confidence. No customers have been affected by this and no data has been leaked or compromised,” it said.

    “We immediately released a hot fix, as a short-term measure, to address the issue and since then we have been working closely with our customers and penetration testers to develop a solid long-term solution. All schools will have the new version, including the long-term fix, installed in time for the new school term.”

    The company said “the methods used to identify and communicate this particular issue were not legal” and they would take a “firm stance”.

    “Impero Education Pro is designed to protect and safeguard children in schools and any attempt to jeopardise this by illegally obtaining and publicising sensitive information will be dealt with appropriately,”it said.

    On Monday, a month after Clark first disclosed the software vulnerability, lawyers acting for Impero demanded in a letter that he should remove all of his online postings about the company, under the threat of civil proceedings for breach of confidence and copyright infringement and criminal proceedings under the computer misuse act. The letter admits the potential seriousness of the vulnerability Clark disclosed in schools’ systems.

    “By publicising the encryption key on the internet and on social media and other confidential information, you have enabled anyone to breach the security of our client’s software program and write destructive files to disrupt numerous software systems throughout the UK,” it said.

    Impero said the hack “could only be exploited if basic network security does not exist” and would require the hacker to be physically present in a school.

    Publicly disclosing details of security vulnerabilities is a controversial practice in the online security world. Some believe private disclosure is better initially, as it gives companies time to fix flaws before they are made public, but it rarely results in legal action.

    Mustafa al-Bassam, a security engineer and former member of the hacking collective Lulzsec, said the legal threat against Clark was bizarre, especially when such exploits can be used or sold for profit, rather than posted online to be fixed.

    “Responding with a legal threat to a security researcher that highlighted a serious security flaw in your software is bizarre and shows utter disregard for customers,” he said.

    “Unfortunately it shows a theme that is too common in the software industry: companies view security as an external PR issue because it often affects their customers more than it affects them. And they should be grateful that this security flaw was disclosed publicly instead of being sold to malware developers like Hacking Team.”

    Impero’s Education Pro software serves a variety of roles in schools’ systems, including blocking inappropriate web surfing – such as adult sites – and monitoring students’ activity, as well as rationing printing and making IT administration simpler.

    However, last month – just days before Clark discovered the flaw – the Guardian reported Impero was offering a new feature to monitor keywords potentially tied to terrorism or extremism before the implementation of new counter-terrorism legislation introducing a requirement on schools to monitor pupils for such signs.

    The pilot, introduced in 16 UK schools and five in the US, monitors for phrases such as “YODO” – You Only Die Once – “War on Islam”, and “Storm Front”, a neo-Nazi group.

    The Department for Education said: “We have been clear that schools are expected to ensure that sensitive pupil information is held securely. The Data Protection Act of 1998 is clear what standards schools are expected to adhere to and we provide guidance on this.”

     

    sources:

    https://TheGuardian.com

    https://pdf.yt/d/fRcZ1TWHaDkwz-Ea

     

    Adam Bennett Anon

    Adam Bennett Anon

    Anonymous radio host know as Lorax aka Adam Bennett Anon was arrested (full article).

    Everybody who has known Adam ‘Lorax’ Bennett aka Adam Bennett Anon knows he’s an awesome anon. Furthermore, the article now let us know he was also involved in his local community as an experienced life saver and a fundraising manager for Cancer Support. This kind of person doesn’t belong in jail! He belong to it’s people. The people he give each day of is life to protect.

    If you’ve know Lorax, or Adam John Bennett, now is the time to get involved and help!

    https://twitter.com/Loraxlive/status/467566452015251456

    Take action

    Read the #FreeAnons press Releases : We are All Lorax
    Read tweets and tweet with the #FreeLorax hash tag
    Read this PasteBin
    Keep posted for more information!

    Articles about the arrest

    Surf champ accused of hacking
    “Anonymous” hackers charged for targeting Australia, Indonesia
    ‘Anonymous hacker’ in court in Perth
    Hackers charged for targeting Australia, Indonesia
    Two Australian Anonymous members arrested for hacking Australian and international websites
    AFP arrests two alleged ‘Anonymous’ members

    Was The Lorax Setup?

    The lifesaving Lorax’s tale took an interesting turn the last few nights, as the internets and ircs were ablaze with controversy, flame wars, and a little good-ole-fashioned ‘he-said she-said.’ What was already looking like a classic tale of governmental overreach and the suppression of Adam John Bennett’s Civil-Rights is turning into a dark tale of deception, duplicity, and police-led treachery. While there was much argument among the anons present, one thing was very clear, the Australian government had tricked and deceived a minor in an unsuccessful attempt to lure the Lorax into a hacking scheme. Having failed in that they have continued to attempt to argue that the research work that he did at his job for a Cancer fighting charity that showed a clear problem with the same security protocol that the Australian Government was proposing using with it’s upcoming, Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014, plan for telecoms to keep their customer’s e-mail and phone metadata for two years.

    Soon after Bennett began criticizing the plan there was an alleged hack into AATP (third-largest telecom in Australia) and the Indonesian government, Anonymous was blamed. The Government initially charged the Lorax and two hackers with the breach. After nearly a year of delays and continuations, the court announced that all of the charges for hacking by Bennett would be dropped, but replaced with obscure sounding charges like, “aiding and harassment.” It has become ever more clear that there wasn’t ever much of a case and the government is using Bennett’s bail restrictions to keep his LoraxLive show off of the air.

    This dark tale really begins in 2011, even before the government started suggesting an ill-conceived data retention scheme, before anyone hacked AATP and the Indonesian government. Back in the heyday of lulzsec a 15 year-old hacker who we’ll call Hacker-Z (not his real hacker handle) was caught up in the glamour and prestige of the lulzsec-style direct-action hacking. Hacker-Z was like almost nearly ever teenage boy he wanted to listen to loud music and raise a little hell. That sounds anti-social perhaps, but when you see that the things that young hacktivists want to break are things like evil autocratic governments like Libya or Tunisia, or on-line bullying groups, that anti-social streak can begin to turn an odd shade of heroic on a young person. Apparently, according to general consent, it wasn’t hard for the same sort of Five Eyes investigators–who were at that same time acting as the nefarious Sabu’s puppet masters, in a separate scheme to entrap Anons–to get a hold of this inspired, if naive teenager.

    Having entrapped the would-be activist with an illegal hacking scheme, they first terrified the lad and his mother with the prospect of nearly life in prison for his unsuccessful attempt, while being directed by undercover government agents, to hack government and military websites; according to some in the chatroom. Having scared his mother as best they could it was easy for the police to convince her to give consent for them to use their son as a mole to keep an eye on on-line hacktivists. Any mother if, confronted with the prospect of sending her only child to prison, for probably, the rest of his life would almost surely make the same decision. Having Hacker-Z as a mole worked well for the police apparently, he was generally reported to be a friendly, helpful, and affable young man. No one on this side of things is sure how much information he really got in his few years, probably, working for the police, but needless to say when he was arrested with the Lorax, many a hard drive was wiped, just in case.

    It seems the feds kept Hacker-Z on ice until the day they needed him. That day came, apparently, during the summer of 2012, when the Australian Government first proposed the current anti-privacy legislation that they are quietly pushing through the legislature right now. When The Lorax caught wind of the Government’s plan he immediately saw the obvious problems with warehousing the entire Australian population’s personal web data. Even if the government could show an actual need for all of this personal, which they can’t, Bennett honed in on the first and most obvious problem, security. Eventually Bennett showed, at his workplace, while testing their server, that recent flaws found in OpenSSL, the so called “Heartbleed Bug” could eventually lead to losses of citizen’s personal data to criminals or terrorists, if the government continued with their data retention plan.

    Seeing the problem the Lorax did what the Lorax does when the community is in danger; he warned people through his popular show, Lorax Live, whose archives, that haven’t been seized by the government, can be heard here and here. Obviously, the leaders and politicians backed by corporatism and fully vested in the telecom industry, couldn’t afford to have a lot people aware of or critical of their massive transfer of both citizen’s data and the nation’s wealth, in the form of fees paid by taxes, to the nation’s telecoms. No, classically, power becomes annoyed when confronted by truth, this story is no different.

    By the Winter of 2012, as far as the Australian government and the Australian Federal Police were concerned; the Lorax had to be silenced. Later when they learned that, while at his job testing his employer’s server’s security, Bennett had discovered a way that the “Heartbleed Bug” might be used to access encrypted files on a server, the very sort of thing that privacy advocates had been screaming about ever since the government first suggested the data retention program, government agents hatched a plan to silence the Lorax.

    The police knew that they would never convince a reputable, white-hat security researcher like Adam John Bennett to participate in a criminal attack on the internet’s infrastructure. It is rumored that the police devised a plan to implicate the Lorax without needing him to take part in any illegal activity. To do this, they gathered up their friendly young, unfortunate mole, Hacker-Z and sent him into an irc chat with the Lorax and had him plead with Bennett to give him, Hacker-Z, Bennett’s note’s from his research work on OpenSSL. The authorities, it seems, hoped that by obtaining information on how one might be able to attack encryption from the researcher they could implicate him in a crime and, at least, keep his radio show off the Internet until they got their data retention plans passed into law.

    Perhaps more despicable than the government’s attempt frame and implicate a man are its motives, of depriving a citizen of his civil-rights, and its methods of abusing the criminal justice system through the attempted entrapment of an innocent man, and misuse of a citizen’s right to bail in order to silence a benign, but vocal critic of governmental corruption and malfeasance. This is not Syria or Zimbabwe where a critic can simply be tossed in a hole or executed by despots, in “free” societies, like Australia, you must design administrative and judicial straps with which to bind their tongues and hands to things like restrictive bail requirements or plea agreements, to trumped up or false charges. The critic is silenced, the powers-that-be have no blood on their hands, the media calls the former hero-of-the-people a villain, and whatever danger the critic was fighting against is forgotten. It’s all very civilized.

    If the police were unaware of who they were dealing with or simply unfamiliar with the world of white-hats is unclear. Bennett did not give their mole any help or information, and not because he believed he was a mole. (As a white-hat researcher Bennett was well aware of cyber-crime and the need for enforcement in the field, it can assuredly be assumed then that he supports law-enforcement and legitimate undercover operations, but any thinking adult would have to wonder about the wisdom of using children as moles to bait and entrap adult criminals.) No, it is rumored that Bennett refused to help the boy, not because he believed he was working with police, rather he believed that the youth might be an impassioned young hacktivist who could possibly do something unwise or damaging with the information, something that might hurt others as well as get the lad in trouble with the law. Most likely, in Bennett’s mind, the young Hacker-Z would be better off waiting until the bugs in OpenSSL were fixed to get a look at the Lorax’s research notes.

    Blown off course, but not sunk by the Adam John Bennett’s integrity, the Australian Government tried a new, indirect tack to get their entrapment scheme back on course. They would have Hacker-Z engage an intermediary, another White Hat researcher, someone the Lorax would trust. They found him in a passionate young researcher we’ll call Hacker-X. Hacker-X was known as a knowledgeable and helpful security expert. He had long been very helpful getting newbloods on the right track on-line and helping others secure their computer systems. Like a lot of hacker culture Hacker-X believes in education and the open-sharing of information, not to cause damage but to protect from damage.

    Imagine you bought a lock for your front door, it’s a common lock, and there are many like it in your neighborhood. If there was a flaw in that lock that could allow criminals to enter your home then you would like to know about it, wouldn’t you? Of course you would, and it would be good for you to know so you could find a way to fix it or replace it, so the burglars can’t come in. Certainly, you wouldn’t want burglars to know about the flaw, but luckily the vast majority of humans aren’t burglars, likewise very few people interested in computer security are criminals. So, for a researcher such as Hacker-X to want to share something that could easily be used to help secure a network, is understandable and legal. It’s not clear if he already had possession of the notes from Lorax’s research into OpenSSL, or if he actually obtained them on behalf of Hacker-Z, regardless, sharing information about a weakness in an encryption protocol is not illegal, as the Australian Government’s delays and recent charge droppings indicate.

    Whether the police were directly involved in or only supervising the alleged hacks on AATP and the Indonesian government isn’t clear, but it has become very clear that they never had any evidence against Adam John Bennett, the Lorax. In an extraordinary judicial move they have dropped all of the charges against Bennett, but have come up with ten new charges that, they claim they will commit to at his next hearing in June. While on one hand it is great to think that the Lorax may end up getting the justice he deserves in a dismissal of all charges at his next hearing, what is maddening is the obvious and bald faced way in which the Australian Government is misusing the criminal justice system to keep him Bennett on the restrictive bail terms that prevent him from broadcasting his show, LoraxLive and his protest about the government’s data retention plan.

    Matt DeHart – Military, Programmer, Activist

    Matt DeHart – Military, Programmer, Activist

    The case of Matt DeHart, a former U.S. drone pilot turned hacktivist, is as strange as it is disturbing. The 29-year-old was recently denied asylum in Canada, having fled there with his family after — he claims — he was drugged and tortured by agents of the FBI, who accused him of espionage and child pornography.

    Prosecutors have shown they’re willing to say anything to convict a hacktivist, even if it means lying

    Last week the Canadian Border Services Agency said he will be deported to the U.S. to stand trial “in very short order,” after a Canadian Immigration and Refugee Board ruling earlier this month denying his request for refugee status. He is being denied access to two thumb drives that he says contain evidence of illegal acts perpetrated by a U.S. government agency. Now after three unsuccessful attempts to gain political asylum, he fears that he and the files will be delivered to the very government he sought to escape.

    “I cannot imagine any life in a country which has already tortured me,” Matt DeHart told reporter Adrian Humphreys, whose astonishing five-part series in Canada’s National Post documents the bizarre case. “Am I now to be given into the hands of my torturers?”

    It’s tempting to dismiss DeHart’s claims based on their sheer outlandishness and his equally outlandish attempts to defect to Russia and Venezuela, which he now says he regrets. But given President Barack Obama’s administration’s penchant for punishing hacktivists and whistleblowers, a disturbing decades-long trend of prosecutorial misconduct and the now established fact that the U.S. has, as Obama put it, “tortured some folks,” it’s clear that the U.S. government’s claims in this case warrant even more skepticism.

    Matt DeHart

    According to government documents, Matt DeHart admitted during an interrogation to becoming involved with a spy ring during his time as a drone pilot, agreeing to broker the sale of military secrets for up to $100,000 per month through a Russian agent in Canada. But he claims he was being drugged and tortured and simply made the story up.

    “I would have told them anything,” he told The National Post of his encounter with the FBI agents, during which he was denied a lawyer. “Information that is derived from torture — to use it against somebody is ridiculous. It’s garbage. I already said it’s not true.”

    He testified that the agents admitted the child porn charges were fabricated — a ruse to enable investigation into his involvement with the nebulous hacktivist collective Anonymous. He says the investigation stems from a file he uploaded twice to a hidden website, hosted on the anonymous Tor network from a server in his parents’ house. DeHart claims it contained evidence of government wrongdoing, “an FBI investigation into the [CIA’s] practices.” Screen shots of the WikiLeaks website found on his computer suggest he intended to send the file to the whistleblowing organization.

    After the asylum ruling earlier this month, three courts — two in the U.S. and one in Canada — have expressed strong doubts about the child pornography charges that triggered a search warrant onMatt DeHart’s parents’ home in the U.S. Those accusations date to 2008 and stemmed from his association with two teenagers while playing the online game “World of Warcraft,” one of whom was also involved with Anonymous; the charges were ultimately not proved.

    After DeHart was arrested while crossing from Canada to the U.S. in 2010, a judge in Bangor, Maine, found it odd that prosecutors were suddenly citing the two-year-old porn accusations and that police hadn’t analyzed Matt DeHart computers for illicit files seven months after they were seized. A judge in Tennessee, where Matt DeHart ‘s family lived before moving to Canada, admitted that “the weight of the evidence is not as firm as I thought it was.” And most recently, the Canadian Immigration and Refugee Board concluded there was “no credible or trustworthy evidence” that DeHart had solicited child porn.

    Prosecutorial misconduct helps the government railroad journalists, whistleblowers, hacktivists and any who dare to speak truth to power.

    To be sure, Matt DeHart strange behavior throughout this ordeal doesn’t place him in a particularly flattering light. But it’s worth noting that these kinds of serious accusations are often made in cases against hacktivists and whistleblowers, helping place them in the government’s crosshairs and paint them as nefarious even when the accusations are easily disproved.

    Barrett Brown, a journalist who investigated links between the U.S. government and private intelligence contractors, had all manner of ridiculous false accusations thrown at him before being sentenced last month to five and a half years in prison. He was initially charged for the innocuous act of copying and pasting a hyperlink to a public file stolen by Anonymous from one chat room into another. The charge was dropped, but the linking was still used to increase the length of his sentence, despite the fact that prosecutors had no evidence Brown had looked at the file or even known what was in it.

    At one point, prosecutors claimed that Brown conspired with members of Anonymous to overthrow the U.S. government. They also accused him of participating in “SWATting,” the practice of making fake 911 calls to harass people in their homes, and even of plotting with another journalist to hack the Bahraini government. Not one of these claims was supported by the voluminous collection of chat logs that the government provided as evidence. Nor did additional logs obtained by The Daily Dot, which the prosecution had withheld under seal.

    Brown was not entirely without fault in the case, having obstructed a search warrant and posted a YouTube video threatening an FBI agent in response to the seizure of his laptops. But in retrospect, it seems clear the impetus for the case was that the government saw Brown’s investigations as a threat and would say anything to guarantee his conviction, even if that meant knowingly making false statements. As Brown put it during his allocution, “This is not the rule of law … It is the rule of law enforcement.”

    Close scrutiny

    What can we expect from the Matt DeHart case if this is the prosecutorial legacy it follows?

    As The New York Times editorial board recently noted, defendants have no recourse when police and prosecutors lie, cheat and conceal evidence in the courtroom, leading to what one federal judge has described (PDF) as a national epidemic of prosecutorial misconduct. Sometimes it leads to wrongful convictions. Other times, as in Brown’s case, it helps the government railroad journalists, whistleblowers, hacktivists and any who dare to speak truth to power.

    Remember Aaron Swartz, an information activist who prosecutors pursued vigorously for the act of downloading too many academic articles from an MIT library? Much like in Brown’s case, prosecutors were accused of withholding evidence and coercing Swartz into taking a guilty plea. Swartz committed suicide in 2013 amid mounting legal costs and the possibility of up to 35 years in prison, triggering the DeHarts’ decision to flee the country.

    “Aaron Swartz had very similar psychological makeup, similar age, same circumstances as Matt DeHart,” DeHart’s father, Paul DeHart, a retired U.S. Air Force major, told The National Post. “I do not want to wake up one day and find my son hanging from a rope in the garage of our house. And I have noplace to go to bring this to anyone’s attention.”

    With Matt DeHart’s attempted defections and other erratic behavior, it’s admittedly difficult to determine where his true intentions lie. But the government’s actions against him have been just as sketchy, if not more so. His claims must be taken seriously, and his case should be closely scrutinized, lest another potential whistleblower fall prey to the state’s merciless war on leaks.

    by Joshua Kopstein, a cyberculture journalist and researcher from New York City. His work focuses on Internet law and disorder, surveillance and government secrecy.

     

    Leaked: NSA Spies Steal Encryption Keys from Global SIM Manufacturer

    Leaked: NSA Spies Steal Encryption Keys from Global SIM Manufacturer

    AMERICAN AND BRITISH Leaked: NSA Spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

    The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.

    The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.

    In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”

    With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.

    As part of the covert operations against Gemalto, spies from GCHQ — with support from the NSA — mined the private communications of unwitting engineers and other company employees in multiple countries.

    Gemalto was totally oblivious to the penetration of its systems — and the spying on its employees. “I’m disturbed, quite concerned that this has happened,” Paul Beverly, a Gemalto executive vice president, told The Intercept. “The most important thing for me is to understand exactly how this was done, so we can take every measure to ensure that it doesn’t happen again, and also to make sure that there’s no impact on the telecom operators that we have served in a very trusted manner for many years. What I want to understand is what sort of ramifications it has, or could have, on any of our customers.” He added that “the most important thing for us now is to understand the degree” of the breach.

    Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”

    THE MASSIVE KEY THEFT IS “BAD NEWS FOR PHONE SECURITY. REALLY BAD NEWS.”

    Beverly said that after being contacted by The Intercept, Gemalto’s internal security team began on Wednesday to investigate how their system was penetrated and could find no trace of the hacks. When asked if the NSA or GCHQ had ever requested access to Gemalto-manufactured encryption keys, Beverly said, “I am totally unaware. To the best of my knowledge, no.”

    According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto.

    Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”

    The Mobile Handset Exploitation Team (MHET), whose existence has never before been disclosed, was formed in April 2010 to target vulnerabilities in cellphones. One of its main missions was to covertly penetrate computer networks of corporations that manufacture SIM cards, as well as those of wireless network providers. The team included operatives from both GCHQ and the NSA.

    While the FBI and other U.S. agencies can obtain court orders compelling U.S.-based telecom companies to allow them to wiretap or intercept the communications of their customers, on the international front this type of data collection is much more challenging. Unless a foreign telecom or foreign government grants access to their citizens’ data to a U.S. intelligence agency, the NSA or CIA would have to hack into the network or specifically target the user’s device for a more risky “active” form of surveillance that could be detected by sophisticated targets. Moreover, foreign intelligence agencies would not allow U.S. or U.K. spy agencies access to the mobile communications of their heads of state or other government officials.

    “It’s unbelievable. Unbelievable,” said Gerard Schouw, a member of the Dutch Parliament, when told of the spy agencies’ actions. Schouw, the intelligence spokesperson for D66, the largest opposition party in the Netherlands, told The Intercept, “We don’t want to have the secret services from other countries doing things like this.” Schouw added that he and other lawmakers will ask the Dutch government to provide an official explanation and to clarify whether the country’s intelligence services were aware of the targeting of Gemalto, whose official headquarters is in Amsterdam.

    Last November, the Dutch government proposed an amendment to its constitution to include explicit protection for the privacy of digital communications, including those made on mobile devices. “We have, in the Netherlands, a law on the [activities] of secret services. And hacking is not allowed,” Schouw said. Under Dutch law, the interior minister would have to sign off on such operations by foreign governments’ intelligence agencies. “I don’t believe that he has given his permission for these kind of actions.”

    The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”

    …Continued at Firstlook.org

    Dead Prez – Rappers, Activists

    Dead Prez – Rappers, Activists

    When revolutionary rap duo Dead Prez released their classic 2000 opening salvo, Let’s Get Free, the outspoken hip-hop tandem of stic.man and M-1 were lauded and criticized for their two-fisted rebuke of systematic racism in all its forms. Nearly two decades later, Dead Prez is still fighting the good fight: stic is set to release the book The Art of War: Hip-Hop and Social Activism later this year, and M just dropped the track “Sacrifice” in celebration of the prison release of Black Liberation Army member Sekou Odinga. In the polarizing aftermath of the Ferguson, Missouri, grand jury’s decision to not indict a police officer for killing unarmed 18-year-old Michael Brown, OZY reached out to the pair to hear their views on a community and city on fire.

    “What I think is even more constructive … is an economic strike aimed at some of the pressure points of the system.”

    — stic.man

    We here at the decryptedmatrix love these guys and their candor and message. We can only hope for more artists of all kinds to embrace the chance to speak truth to those who will listen to them. Model artists like this are what we need more of to inspire the next generation and to create content that we all enjoy. Without more guys like Dead Prez we fear that music industry will continue to be corrupted by the same corporate influences that have so far shaped what is on the radio and the top of the billboard charts.

    Oliver Stone – Director, Producer, Activist

    Oliver Stone – Director, Producer, Activist

    Oliver Stone, byname of William Oliver Stone   (born September 15, 1946, New York, New York, U.S.), American film director, screenwriter, and producer known for his ambitious and often controversial movies.

    Stone, the son of a wealthy stockbroker, was raised in New York City. He briefly studied at Yale University before dropping out to teach English in South Vietnam. Upon his return, Stone lived in Mexico for a year and again attended Yale for a short period. In 1967, during the Vietnam War, he enlisted in the U.S. Army. He distinguished himself in combat, earning two Purple Hearts and a Bronze Star. Stone then enrolled in film school at New York University (B.A., 1971), studying under director Martin Scorsese.

    Stone was deeply affected by his war experiences, and his student films, such asLast Year in Viet Nam (1971), dealt directly with the consequences of the Vietnam conflict. After graduating, he directed the horror movies Seizure! (1974) and The Hand (1981), the latter of which starred Michael Caine. Stone also began experimenting with screenwriting, and he won an Academy Award for best adapted screenplay for Midnight Express (1978), which was based on the true story of a man brutally abused while imprisoned for drug smuggling in Turkey.

    Stone devoted much of the early 1980s to writing screenplays, including Conan the Barbarian (1982), Scarface (1983), which was directed by Brian De Palma and starred Al Pacino, and Year of the Dragon (1985). He returned to directing withSalvador (1986), which he also wrote. In the film, a journalist (played by James Woods) documents the atrocities committed during the El Salvador uprisings of 1980–81. Stone again drew on the trauma of the Vietnam War in Platoon (1986), for which he won another Academy Award, this time for directing. The film navigates the perils of war from the perspective of a new recruit who quickly realizes that the idealism that motivated his decision to enlist was misguided. Stone drew upon personal experience once more for Wall Street (1987), using memories of his father’s career as a stockbroker to conjure an indictment of the greed and deceit governing the financial world. In 1988 he adapted Eric Bogosian’s Off-Broadway play Talk Radio to film.

    Stone emphasized the continuing ramifications of the Vietnam War with Born on the Fourth of July (1989). The film, based on the autobiography of Vietnam veteran Ron Kovic, chronicles the evolution of a young man, played by Tom Cruise, from patriotic soldier to paraplegic antiwar activist. Stone won an Academy Award for directing that movie and received a fourth career nomination for his writing. The year 1991 saw the release of both JFK, a polarizing investigation of the circumstances surrounding the assassination of Pres. John F. Kennedy, and The Doors, a stylish account of the rise and fall of the titular American rock band. InHeaven and Earth (1993), Stone approached the Vietnam War and its aftermath from the perspective of a young Vietnamese woman.

    Stone again courted controversy with Natural Born Killers (1994), a film, written byQuentin Tarantino, about the savagely violent exploits of a married couple, played by Woody Harrelson and Juliette Lewis. While Stone claimed that the film was meant to be critical of sensationalized violence, some critics found it guilty of exactly what it purported to condemn. Stone then cast Anthony Hopkins in the title role of Nixon (1995), a measured take on the life of the U.S. president. He also developed the screenplay for Evita (1996), an adaptation of the Andrew Lloyd Webber musical about Argentine politician Eva Perón (played by Madonna).

    Stone revisited some of his favoured motifs, power and violence, in Any Given Sunday (1999), about professional football, and in Alexander (2004), a poorly received biography of Alexander the Great. World Trade Center (2006), a retelling of the events of September 11, 2001, from the viewpoint of two police officers, returned Stone to the centre of public debate. While the film was critically acclaimed, some questioned the propriety of making the film so soon after the tragedy. W. (2008), his biopic of Pres. George W. Bush, drew ire from both extremes of the political spectrum for its refusal to pass definitive judgment, positive or negative, on its subject. Stone later directed Wall Street: Money Never Sleeps(2010), a sequel to the 1987 film that was set amid the global financial crisis of 2008, and Savages (2012), an ensemble thriller about marijuana trafficking that, in its depiction of seedy mayhem, was reminiscent of his earlier U Turn (1997).

    In addition to directing and writing, Stone produced many of his own movies. Besides narrative films, he made two documentaries about Latin American politics: Comandante (2003), about Cuban dictator Fidel Castro, and South of the Border (2009), which focused on several other left-wing leaders, notably Venezuelan Pres. Hugo Chávez. With Peter Kuznick, he also created Oliver Stone’s Untold History of the United States (2012), a 10-part television documentary (and accompanying book) that took an unorthodox look at the preceding century of American political history. In 1997 Stone published a semiautobiographical novel,A Child’s Night Dream.

     

    team-sean-stoneSean Stone, son of controversial filmmaker Oliver Stone has acted in his father’s films such as Wall Street, The Doors, JFK, Natural Born Killers and many more. He has starred and directed in his own feature film Greystone Park.  Sean joined the team of investigators for the Tru TV hit Conspiracy Theory with Jesse Ventura. Sean currently hosts an alternative media show ‘Buzzsaw’ featuring interviews with whistleblowers, styling itself as the ‘real X files’ looking into the hidden agendas behind the news.

    Martin Luther King Jr – Doctor, Pastor, Human Rights, Activist

    Martin Luther King Jr – Doctor, Pastor, Human Rights, Activist

    Doctor, Pastor, Human Rights Activist

    Born Michael Luther King, Jr., but later had his name changed to Martin Luther King Jr. His grandfather began the family’s long tenure as pastors of the Ebenezer Baptist Church in Atlanta, serving from 1914 to 1931; his father has served from then until the present, and from 1960 until his death Martin Luther acted as co-pastor. Martin Luther attended segregated public schools in Georgia, graduating from high school at the age of fifteen; he received the B. A. degree in 1948 from Morehouse College, a distinguished Negro institution of Atlanta from which both his father and grandfather had graduated. After three years of theological study at Crozer Theological Seminary in Pennsylvania where he was elected president of a predominantly white senior class, he was awarded the B.D. in 1951. With a fellowship won at Crozer, he enrolled in graduate studies at Boston University, completing his residence for the doctorate in 1953 and receiving the degree in 1955. In Boston he met and married Coretta Scott, a young woman of uncommon intellectual and artistic attainments. Two sons and two daughters were born into the family.

    In 1954, Martin Luther King became pastor of the Dexter Avenue Baptist Church in Montgomery, Alabama. Always a strong worker for civil rights for members of his race, King was, by this time, a member of the executive committee of the National Association for the Advancement of Colored People, the leading organization of its kind in the nation. He was ready, then, early in December, 1955, to accept the leadership of the first great Negro nonviolent demonstration of contemporary times in the United States, the bus boycott described by Gunnar Jahn in his presentation speech in honor of the laureate. The boycott lasted 382 days. On December 21, 1956, after the Supreme Court of the United States had declared unconstitutional the laws requiring segregation on buses, Negroes and whites rode the buses as equals. During these days of boycott, King was arrested, his home was bombed, he was subjected to personal abuse, but at the same time he emerged as a Negro leader of the first rank.

    In 1957 he was elected president of the Southern Christian Leadership Conference, an organization formed to provide new leadership for the now burgeoning civil rights movement. The ideals for this organization he took from Christianity; its operational techniques from Gandhi. In the eleven-year period between 1957 and 1968, King traveled over six million miles and spoke over twenty-five hundred times, appearing wherever there was injustice, protest, and action; and meanwhile he wrote five books as well as numerous articles. In these years, he led a massive protest in Birmingham, Alabama, that caught the attention of the entire world, providing what he called a coalition of conscience. and inspiring his “Letter from a Birmingham Jail”, a manifesto of the Negro revolution; he planned the drives in Alabama for the registration of Negroes as voters; he directed the peaceful march on Washington, D.C., of 250,000 people to whom he delivered his address, “l Have a Dream”, he conferred with President John F. Kennedy and campaigned for President Lyndon B. Johnson; he was arrested upwards of twenty times and assaulted at least four times; he was awarded five honorary degrees; was named Man of the Year by Time magazine in 1963; and became not only the symbolic leader of American blacks but also a world figure.

    At the age of thirty-five, Martin Luther King, Jr., was the youngest man to have received the Nobel Peace Prize. When notified of his selection, he announced that he would turn over the prize money of $54,123 to the furtherance of the civil rights movement.

    On the evening of April 4, 1968, while standing on the balcony of his motel room in Memphis, Tennessee, where he was to lead a protest march in sympathy with striking garbage workers of that city, he was assassinated.

     

    Murder Conspiracy

    After four weeks of testimony and over 70 witnesses in a civil trial in Memphis, Tennessee, twelve jurors reached a unanimous verdict on December 8, 1999 after about an hour of deliberations that Dr. Martin Luther King, Jr. was assassinated as a result of a conspiracy.In a press statement held the following day in Atlanta, Mrs. Coretta Scott King welcomed the verdict, saying ,

    “There is abundant evidence of a major high level conspiracy in the assassination of my husband, Martin Luther King, Jr. And the civil court’s unanimous verdict has validated our belief. I wholeheartedly applaud the verdict of the jury and I feel that justice has been well served in their deliberations. This verdict is not only a great victory for my family, but also a great victory for America. It is a great victory for truth itself. It is important to know that this was a SWIFT verdict, delivered after about an hour of jury deliberation. The jury was clearly convinced by the extensive evidence that was presented during the trial that, in addition to Mr. Jowers, the conspiracy of the Mafia, local, state and federal government agencies, were deeply involved in the assassination of my husband. The jury also affirmed overwhelming evidence that identified someone else, not James Earl Ray, as the shooter, and that Mr. Ray was set up to take the blame. I want to make it clear that my family has no interest in retribution. Instead, our sole concern has been that the full truth of the assassination has been revealed and adjudicated in a court of law… My husband once said, “The moral arc of the universe is long, but it bends toward justice.” To-day, almost 32 years after my husband and the father of my four children was assassinated, I feel that the jury’s verdict clearly affirms this principle. With this faith, we can begin the 21st century and the new millennium with a new spirit of hope and healing.”

     

    TRANSCRIPTS

    View Full Trial Transcript>

    View Transcript of King Family Press Conference on the Verdict>

     

    KING FAMILY STATEMENT ON MEDIA REQUESTS REGARDING THE MEMPHIS VERDICT

    The King family stands firmly behind the civil trial verdict reached by twelve jurors in the Memphis, Tennessee courtroom on December 8, 1999.

    An excerpt from remarks made by Mr. Dexter Scott King, Chairman, President, and CEO of The King Center, during the December 9, 1999 press conference regarding the verdict that may be used in support of this family decision:

    “We can say that because of the evidence and information obtained in Memphis we believe that this case is over. This is a period in the chapter. We constantly hear reports, which trouble me, that this verdict creates more questions than answers. That is totally false. Anyone who sat in on almost four weeks of testimony, with over seventy witnesses, credible witnesses I might add, from several judges to other very credible witnesses, would know that the truth is here.”

    The question now is, “What will you do with that?” We as a family have done our part. We have carried this mantle for as long as we can carry it. We know what happened. It is on public record. The transcripts will be available; we will make them available on the Web at some point. Any serious researcher who wants to know what happened can find out.”

    The King family feels that the jury’s verdict, the transcripts of the conspiracy trial, and the transcripts of the King family’s press conference following the trial — all of which can be found on The King Center’s website — include everything that that family members have to say about the assassination.

    Therefore, the King family shares the conviction that there is nothing more to add to their comments on record and will respectfully decline all further requests for comment.

    The Pirate Bay Cofounder Happy to See TPB Dead and Buried

    The Pirate Bay Cofounder Happy to See TPB Dead and Buried

     

    The Pirate Bay In what seems to be a final nail in The Pirate Bay’s coffin, one of the founders of this mega torrent site, Peter Sunde today stated that he was glad that TPB was shut down.  This statement was made by him in a blogpost on a aptly named website, Copy Me Happy. Peter who has already faced the wrath of the law for his role in starting the Pirate Bay, was released last month after serving five months in a Swedish prison.

    Peter stated that he didnt care that TPB was raided by authorities, “News just reached me that The Pirate Bay has been raided, again. That happened over 8 years ago last time. That time, a lot of people went out to protest and rally in the streets. Today few seem to care. And I’m one of them.” he adds, “Why, you might ask? Well. For multiple reasons. But most of all, I’ve not been a fan of what TPB has become.”

    While giving reasons as to why he things TPB gone is a good riddance, Peter writes,

    “TPB has become an institution that people just expected to be there. Noone willing to take the technology further. The site was ugly, full of bugs, old code and old design. It never changed except for one thing – the ads. More and more ads was filling the site, and somehow when it felt unimaginable to make these ads more distasteful they somehow ended up even worse. The original deal with TPB was to close it down on it’s tenth birthday.”

    “Instead, on that birthday, there was a party in it’s “honour” in Stockholm. It was sponsored by some sexist company that sent young girls, dressed in almost no clothes, to hand out freebies to potential customers. There was a ticket price to get in, automatically excluding people with no money. The party had a set line-up with artists, scenes and so on, instead of just asking the people coming to bring the content. Everything went against the ideals that I worked for during my time as part of TPB.”

    “The past years there was no soul left in TPB. The original team handed it over to, well, less soul-ish people to say the least. From the outside I felt that noone had any interest in helping the community if it didn’t eventually pay out in cash. The attention for new artists (the promo bay) felt more like something TPB had to do in order to keep it’s street cred. The street cred I personally tried to destroy when being part of TPB, multiple times, in order to make sure that people stopped idolizing TPB the way they did. Mostly it didn’t work though.”

    In an interview to Ars Technica five years ago, Sunde had stated that TPB ownership was transferred to an unnamed organization, which then transferred ownership to a shady shell corporation called Reservella.

    Apparently everything boiled down to ethics, social responsibility and commercial interests as far as Peter was concerned.  He said they had started TPB with a shared objective of helping the community but as years passed, TPB become more and more commercialised and went afar from its stated objectives.  He hopes that something better will rise to take the place of TPB in the vacuum left behind due to its closure, “But from the immense void that will now fill up the fiber cables all over the world, I’m pretty sure the next thing will pan out. And hopefully it has no ads for porn or viagra. There’s already other services for that.”

    via TechWorm.com

    CIA Torture Pseudonyms

    CIA Torture Pseudonyms

    cia-rendition-black-site-torture

    via Cryptome.org 11 December 2014

    CIA Torture Pseudonyms


    Paulmd199 sends:

    CIA Torture Pseudonyms Update: The “Associates” of “Company Y” are now known, as is “CIA officer 2.” Additional people and details have become known.

    The press has been hard at work uncovering the pseudonyms used and nailing down the true identities of the site. I compile them here.

    The most important outstanding questions: who are Detainees “R” & “S,” and where is detention site “red?” While I feel pretty strongly about redacting the names of low-level personnel from the NSA slides, which are technical in nature, I have zero interest in protecting torturers. The public has a right to know where these black sites were, and the detainees deserve a name and a fair trial.

    Detention sites:

    BLACK – RomaniaBLUE – “Quartz” – Stare Kiejkuty, Poland

    BROWN – Afghanistan

    COBALT – “Salt Pit” – Afghanistan

    GRAY – Afghanistan

    GREEN – Thailand

    INDIGO – Guantanamo

    MAROON – Guantanamo

    ORANGE – Afghanistan

    VIOLET – Lithuania

    RED – This could be an additional site in one of the above countries, or someplace entirely different. It is mentioned only once in the report, on page 140 of 499, and the entry is almost entirely redacted.

    Companies:

    Company Y – Mitchell, Jessen & Associates, based in Spokane, Washington.The “Associates” are David Ayers, Randall Spivey, James Sporleder, Joseph Matarazzo, and Roger Aldrich.

    It should be noted that there is no “Company X” in this report, I found this peculiar. It seems that there should be one, and as it happens there are several shady “Companies’ known: “Premier Executive Transport Services” Incorporated in Dedham Massachusetts, is known to have been part of the CIA rendition program. The names of its officers include “Coleen Bornt,” “Brian Dice” and “Tyler Edward Tate.” These are fictitious people.

    Other companies suspected of involvement in rendition include: “Stevens Express Leasing” “Richmor Aviation” “Rapid AirTrans” “Path Corporation”

    Businesses:

    Business Q – Associated with Zubair, associated with Hambali

    Torture Doctors:

    “Grayson Swigert” – James Mitchell”Hammond Dunbar” – Bruce Jessen

    CIA Officers:

    CIA Officer 1 – COBALT Site manager – Matthew Zirbel. Zirbel’s corrupt CIA boss (Convicted) Kyle “Dusty” Dustin Foggo overruled the 10 day suspension Zirbel received in the murder of Gul Rahman (innocent).CIA Officer 2 – Torturer at COBALT and BLUE – Albert El Gamil – retired from CIA in 2004.

    [Redacted] – Ron Czarnetsky, CIA Chief of Station on Warsaw, Poland from 2002 to 2005. This would make him responsible for site BLUE.

    [no mention] Alfreda Frances Bikowsky – Made herself involved in Waterboarding in Poland (BLUE) in March of 2003. Took trip unassigned and on own dime. Was “scolded” and told it “wasn’t supposed to be entertainment.” Would have been there at the same time as Mitchell and Jessen.

    Assets:

    Asset X – Directly involved in the capture of KSM.Asset Y – Reports on Janat Gul

    Persons:

    Person 1 – al-Ghuraba group member, with an interest in airplanes and aviation. “intelligence indicates the interest was unrelated to terrorist activity.”

    Detainees:

    Detainee R – Held by foreign government, rendered to CIA custodyDetainee S – Held by foreign government

    Sources:

    http://www.businessinsider.com/the-company-behind-cia-torture-2014-12http://www.washingtonpost.com/blogs/worldviews/wp/2014/12/09/decoding-the-secret-black-sites-on-the-senates-report-on-the-cia-interrogation-program/

    http://www.reuters.com/article/2014/12/10/us-usa-cia-torture-lithuania-idUSKBN0JO18M20141210

    http://www.nytimes.com/2014/12/11/world/cia-torture-report-draws-world-reaction.html?smid=tw-share&_r=0

    http://www.historycommons.org/entity.jsp?entity=zirbel_1

    https://news.vice.com/video/the-architect?utm_source=vicenewsfb

    http://www.wbrz.com/news/psychologist-defends-harsh-cia-interrogations/

    http://www.nbcnews.com/storyline/cia-torture-report/cia-paid-torture-teachers-more-80-million-n264756

    https://www.youtube.com/watch?v=SDxue3jGAug#t=541

    https://firstlook.org/theintercept/2014/12/15/charmed-life-cia-torturer/

    http://www.propublica.org/article/disgraced-senior-cia-official-heads-to-prison-still-claiming-hes-a-patriot

    http://cryptocomb.org/?p=421

    https://www.youtube.com/watch?v=ih1GgxOoSZ8

    Barrett Brown – Journalist, Activist

    Barrett Brown – Journalist, Activist

    Barrett Brown is an American journalist, essayist and satirist. He is often referred to as an unofficial spokesperson for the hacktivist collective Anonymous, a label he disputes. He is credited with the creation of Project PM, a research outfit and information collective determined to expose agents of the corporate military spying apparatus. Brown’s large vocabulary and quick wit often make his thoughts a joy to read.

     

    The Barrett Brown Review of Arts and Letters and Jail: A Funny Thing Happened on the Way to the Prison

    The seven guys with whom I recently spent two months living in a small room at the Kaufman County Jail while awaiting transfer were in the distressing habit of compulsively watching local TV news, which is the lowest form of news. They would even watch more than one network’s evening news program in succession, presumably so as to get differing perspectives on the day’s suburban house fires and rush-hour lane closings rather than having to view these events through a single ideological prism.

    One day, there was a report about a spate of bank robberies by a fellow the media was dubbing the Lunch Money Bandit after his habit of always striking around noon, when tellers were breaking for lunch. Later that week, there was another report on the suspect, accompanied by surveillance footage — and then, shortly afterward, he was actually brought in to our cell, having just been captured when the cops received a tip from a former accomplice who’d been picked up on unrelated charges.

    Lunch Money was an affable twentysomething guy from New Orleans who’d lost his two front teeth fighting off a couple of assailants who’d tried to rob his family’s motel room after Katrina and had already done four years in federal prison for other bank robberies. He would have gladly taken a real job if he’d been able to find one, he said. Still, he conceded, “I just love robbing banks.” I couldn’t imagine what there is to love about such a career; this isn’t the old days when a bank robbery entailed brandishing a Tommy gun, dynamiting a safe, and tearing off in a stolen Model T roadster with your hard-drinking flapper girlfriend and a dozen cloth sacks adorned with dollar sign symbols. These guys today just sort of walk up to the teller and hand over a note to the effect that they have a gun (which they don’t — going armed carries a more serious charge, and there’s no point in bringing a gun to a bank that’s federally insured, even in Texas).

    Drug dealers find bank robbers to be fascinating eccentrics and tend to pepper them with questions. One cocaine entrepreneur asked Lunch Money, “What if, like, when you handed her the note, the bitch just laughed in your face?”

    “Man, that’d be fucked up,” he replied thoughtfully, visibly shaken by this potential revolution in human affairs.

    One night, as we all lay in our bunks discussing the wicked world, Lunch Money proclaimed that Magic Johnson had never actually had HIV and that the whole thing had merely been a plot by the CIA, which had paid him handsomely to fake it so that he could later pretend to “recover” and the U.S. medical establishment could take credit for having developed such effective HIV treatments. As evidence, he noted that Johnson was inexplicably worth over a billion dollars. I debated with him about this for an hour. I’m not too bothered by my five-year prison sentence, as it will be neat to get out when it’s over and see to what extent video game graphics have improved while I was away, but I sure would like to get back the hour I spent arguing about Magic Johnson’s HIV status with the fucking Lunch Money Bandit.

    ***

    The other day I was woken up at 4:30 am, escorted to a small, bare room, strip-searched, put in handcuffs and leg shackles, had a heavy chain wrapped around my midsection, and placed in the back of a dark and cage-lined van that looked like something from one of those Saw movies. But this was good news. It meant that, having recently gotten my ludicrous sentence, I’d now been “designated.” A crack team of specially trained federal prison picker-outers had chosen a facility for me. I was now to begin the multi-stage pilgrimage to the particular compound where I’ll be spending the next one to two years, depending on whether I get into any further trouble (so, two years).

    For the majority of federal defendants, this Prisoner’s Progress, as I’m pleased to call it, entails “catching chain,” or being put on the weekly prison bus and taken to the federal inmate processing facility in Oklahoma, where the federal government has been sending its victims since the Trail of Tears. They’ll spend a week or so there before being shipped in turn to their designated prison. Prisons being far more humane than the amusingly horrid little detention centers where most inmates facing charges are kept until they inevitably give in and plea to a crime, this journey is viewed with fond anticipation by federal prisoners, who thus constitute the only population in human history among which it is common to be excited about the prospect of going to Oklahoma.

    As for me, I’d rather rip off my own balls and mail them to Stratfor as restitution than set foot in a third-rate state like Oklahoma, regardless of what wonders may lie at the end of that particular rainbow, so it’s a fine thing that I was just going down the road to the Fort Worth Federal Correctional Institution, which will be my home for the next, er, two years. I know little of Fort Worth other than that it’s a lawless haven for half-caste Indian fighters and shiftless part-time cowhands looking to blow their greenbacks and Comanche scalps at one of the town’s countless Chinese-run opium dens, nor am I bothered by the possibility that what little I do know about the town may be 130 years out of date and racist. But I specifically requested that I be sent to this benighted city’s federal prison. For one thing, I’d already “toured the campus,” as it were, shortly after my arrest, when I spent two months at FCI Fort Worth’s jail unit so that the resident psychologists could subject me to a competency evaluation. (Based on their report, Judge Sam Lindsay declared me competent to participate in a trial, which is more than I can say for Judge Sam Lindsay.)

    Fort Worth is also the only federal prison aside from FCI Seagoville that’s located near Dallas, and I’m pretty sure I’m still banned from that one, as noted in a prior column, and naturally I want to be close to my parents so that they can visit me with some regularity. My mom, a writer and editor and former flight attendant and South Texas beauty queen who once took me on a vacation to see a swimming pig at a place called Aquarena Springs, is a valuable fountainhead of media gossip, including which outlets are currently going down in flames (The New Republic, as it turns out), and always makes sure to let me know whether and to what extent my haircut is inadequate. Sometimes, if I happen to have a pimple, she insists on popping it right then and there in the visiting room, right in front of the other criminals. Note that I am 33 years old and, arguably, a hardened convict.

    Likewise, my dad is my chief source of information regarding plot developments in what I gather to be a popular television program called The Blacklist, new episodes of which he details to me at great length at every opportunity, although I have never asked him for these reports or expressed any interest in the show whatsoever. Incidentally, when I was a kid, he took me on five different occasions to see a film called Hard Target in which the protagonist, ably portrayed by Jean Claude van Damme, finds himself hunted for sport by a wealthy fellow and his mercenary squad of professional trackers, all of whom he ends up killing in turn. My dad also gave me a promotional poster for this movie and, for years afterward, would turn to me and solemnly proclaim the film’s tagline, “Don’t hunt what you can’t kill,” which I suppose is as good advice as any.

    Last time he came for a visit, he began to relate to me, apropos of nothing, the nature and potential killing power of some sort of subterranean supervolcano located at Yellowstone and the general circumstances under which it will someday explode and kill a great majority of North Americans, an event which he prophesied with obvious relish. It’s not that he’s one of those ecological mystics who despise humanity and long to see Mother Earth fight back against the ravages of industrial sentience or some such irritating thing. Quite the contrary. In my younger days, he would often drag me around East Texas and command me to assassinate deer and wild boars with rifles he would supply for the purpose, even though I had no ideological differences with any of these animals, and one time, when I was 17, he took me to East Africa to help him exploit the resident natural resources alongside a group of ex-military adventurers with whom we had somehow managed to attach ourselves (this expedition failed rather spectacularly), and lately he seems to have gotten involved in fracking. So he’s certainly no partisan of Nature. It’s just that he’s fond of power in its rawest forms, and if he smiles at the prospect of 400 million deaths, it is only because he feels that man is insufficiently reverent of this particular supervolcano, this god-made-manifest, which therefore has no choice but to lash out against us as punishment. He’s also a longtime pillar of the Dallas Safari Club and on at least one occasion of which I am aware was literally almost eaten by a lion. I could go on and on. Thankfully my parents are divorced, and so I usually only have to deal with these hyperactive Southern Gothic archetypes one at a time these days. Occasionally, though, they set aside their differences in order to come harass me together, and I eventually emerge from the visitation room looking haunted.

    I wasn’t taken straight to Fort Worth from Kaufman County, as that would be too quick and easy and cost effective, the prison being less than a half-hour’s drive away; rather, I was taken to the federal courthouse in downtown Dallas to wait for another ride to the Mansfield jail, where I’d already spent much of 2013, and from which I’d eventually be taken to Fort Worth next time a U.S. Marshal happened to be going in that general direction. At the end of the day’s no doubt majestic federal court proceedings, I was placed back in the chew-your-arm-off-and-only-then-shall-I-give-you-the-key van for the ride over to Mansfield. In the rusty cage next to mine were two girls, shackled like I was, who had been to court that afternoon. One had been crying; she’d just been sentenced to eight years for conspiracy to distribute marijuana despite having originally been given reason to expect considerably less time, as she’d cooperated with the FBI. The agents had clearly found her testimony helpful, as they’d met with her a second time, but nonetheless they’d neglected to ask the judge for the sentence reduction they’d promised her in exchange. Like most drug dealers, this girl was in the habit of making and keeping bargains on the strength of her word and expected others to do likewise, but then she’d never dealt with the FBI before.

    Just as she finished sobbing out her story, something rather incredible happened: the U.S. Marshal who was driving us back to the jail, having been listening to this account, apparently decided that he was sick of serving as another cog in a fascist system that literally places females in chains and ruins their lives over consensual non-crimes like selling marijuana, because he pulled over, stepped out of the van, came around the back, unlocked the girl’s cage, removed her chains and leg irons and handcuffs, gave her all the cash he had on him, kissed her on the forehead, and advised her to hitchhike to Mexico and then catch a flight to Europe, where she’d have another chance at life, far away from the all-seeing state that had sought to deprive her of her youth and freedom.

    Just kidding. Actually he drove us to the jail while the girl cried in her cage.

    ***

    Quote of the Day:

    “Truth does not often escape from palaces.” —William Durant

    ***

    Editor’s note: Barrett Brown has been incarcerated since September 2012. Go here to read earlier installments of “The Barrett Brown Review of Arts and Letters and Jail.” If you’d like to send him a book, here’s his Amazon wish list.

    Barrett Brown #45047-177
    FCI Fort Worth
    P.O. Box 15330
    Fort Worth, TX 76119

     

    John Young – Architect, Blogger, Activist

    John Young – Architect, Blogger, Activist

    john-young-cryptome

     

    John Young Architect, Cryptologist, Leak Facilitator, Cryptome.org Founder

    John Young is a wise, seasoned, and ‘angry’ citizen determined to expose corruption and abhorrent secrecy.  He is currently living in New York, doing architectural work for some of the most powerful members of the political establishment that he has sworn to attack. “It’s an easy way to make money in New York, to do corrupt work,” he says with a shrug.

    Young on .gov tactics:

    “Assassination Politics,” is what Young described as “an imaginative and sophisticated prospective for improving governmental accountability by way of a scheme for anonymous, untraceable political assassination.”

    Interesting, Young disclosed the fact on Cryptome in 2000:

    “My father-in-law was a longtime career officer in the Central Intelligence Agency, one of its earliest members, and chief of station in several countries…. He’s not talking to Cryptome, and that’s regrettable, for I believe such knowledgeable persons should disclose everything they know about the global culture of secret intelligence and its profound effects – to better inform citizens on the true way their governments function.”

    Cryptome.org

    Cryptome warns visitors that it does not promise security, that is responsibility of visitors. To not believe security promises by others.

    Cryptome Public Key 11 June 2013. New PK for cryptome[at]earthlink.net
    Key ID: 0x8B3BF75C

    —–BEGIN PGP PUBLIC KEY BLOCK—–
    Version: PGP Universal 2.9.1 (Build 347)

    mQENBFG3XG8BCACbsuBHhg2txl4ubbd7bia6fND1j6rxt4oXC2NX0gJJ6MJ+Z3BY
    nPLCRVX39UsKcXc3NChM4kOF8A650e6nuR3X3pU6UwgwnEUmEi9oSDkAZGDJyKRa
    XakSU2jz5PPMdudXWK0GgE9mLWVSn5RchC3RRCDvlbWk4ZKa1N04g/5Hp/iDzmuc
    HUeGPMArhnN+1KGIXT5Swh/VJT6zuhMbWncHM0PCTRn5r4lfqfAivP/A2IJNm70/
    z6Z6o1rkDVWVN7TXPISi+pEnxbedMtB4aU0RG21v2/kv2Y/ELPTfSjoSkItG7/pK
    0LORjgeGR0VIqe3fviWu7rsoFaaExPv3/UYHABEBAAG0IUNyeXB0b21lIDxjcnlw
    dG9tZUBlYXJ0aGxpbmsubmV0PokBhwQQAQIAcQUCUbdclTAUgAAAAAAgAAdwcmVm
    ZXJyZWQtZW1haWwtZW5jb2RpbmdAcGdwLmNvbXBncG1pbWUHCwkIBwMCCgIZARkY
    bGRhcDovL2tleXNlcnZlci5wZ3AuY29tBRsDAAAAAxYCAQUeAQAAAAQVCAkKAAoJ
    ELZQVyuLO/dcn20H/08Q+GjrCZI9PhK7CEzJRO3xZxTyI21XMgxTu35fsN/TFM09
    ZpgG6IpJfbu+VpW8mBHWyN0lC97IsH4Ep/gV9dix04Rtlokf2QuSnQUfA4WOqsgN
    CqVy/fNIYSRoGurqVjIGE+/1eOpahDL4SSeJney9grwqleKxFwWLwnLeAUQoH9xA
    8GSrYLW7cL1RJGlfpf0JTKxn3goY8+hcKg1OpM0UjNmeFszJ6iLAUePXTA4P0fpA
    JHUuSmZ/NTrxjzlmbbC/O+UVrf+jUxM3pVbehGqGWgxEZsdp0JFTaI02z/+Q1GJY
    +gvRDys0dOcumI/PDRWwVkeePYMYC0OigfYwlDKJASIEEAECAAwFAlG3XdoFAwAS
    dQAACgkQlxC4m8pXrXyDyQgAknEkbcNKNdhIXlHqF7RliZdtkUdsCByKJqao9Tf/
    hhAhcOQVN5DcpxkqMnqiDg6hE4DslE2mA9iRUoqmzjpfk2oRKzk4vntBwTrjPxCM
    kPfbW2kPZKj8X7QtXeuMyBKwGvro59s1i+XBQLZD3Qn75OUvwFDAEi459pc9heEB
    6wXK293YhyaB92CyDTglPu3Dlv8Qkvgp4cKbdfFCRGwGbQGa8l7jST15NwAmtorr
    ydP+IB8rOBku30V31/MFAMrlGhKayhs5vp24b4akQxnrfl4Zdyeoe6Nuq81lr4V6
    UN4MZ992Af3Cv0L9bQNgyBKgWswWhSqxlc/gzfeFTPsJybkBDQRRt1xwAQgAywDY
    TFabKR1p37QGO0+77Wp0SAtvEMJCpmwKOgxmNtLCoOc9VS+aTkLypE/zpQ8ZGJz4
    2gR1vnGrOjwAJLhP/OuNwpqEKmXZ7SklrCEbIFnK0jXWklvc1nKd2XP4UXxGjaHQ
    nn2xCzFmDck15a42EBvzdIWr2Xtx8C0cS7i1fXsmdzR8EMfndo/oFMa6lJqu3oil
    RYZ/3IFdlnEQlzQxZ2AjoLPW0VbWlwDGqPggvKBPfIk+/cH+pcY3SJJg7RlQwHn5
    DRepaCuS3n4kKK5IV5VlNJziYyVsEN2D5BQCtfqHdzkTitRXOgz40tyneX1bqIfI
    CRAHhpYYLYIkeEWjPwARAQABiQJBBBgBAgErBQJRt1xxBRsMAAAAwF0gBBkBCAAG
    BQJRt1xwAAoJEFaLTmSpng5LAZEH/3N4W4HWdN4NwR04oL/ysFLqHRnRYagA30St
    78p/MyZJOMX0372zpoBWBSfXRq8XeSwUXoohugGPyyoIwtINn3/ctZqRziUo6wpF
    c7tYIDNd+duA1jMdLjw/rMYcf2LgkFCCN1piAl1014cixpDMM2PXnNbKHDWP91qd
    ApdLFnchP/Z4I8gdf4e1itizJ3ONcRT/9iqH3DXCw5CUNckm8ExcBidCC+I4Oh4g
    9byDubxQMPzZK54HlK89sUkdvEgQ7QHELNaAP/Y/7IOxAl5AgmIvw/NM4euRL84j
    USP8NAIqLbRMMp07kSTVArAMOvmTg7+/rpv9UQkfp1ykBJtr61EACgkQtlBXK4s7
    91w4QAf9Gflur6PCr9msaa0mEAi0xcqcmzDkp/Ecms+NKiAjz7U6UT9IgdivFPfi
    iyMUTHgOjw5daY/IKaecO0I69wDYRnmLvx9mLjDY+IiQQlw3L9CrN1JLkcUO250p
    f3LR/DXFCPgDHdvaTgy0kgg2a4YjKXAirdYyDXGjYgEuM1OvgGLSnDfJ5xJ+Fugq
    7IlLoZZQPz/G/k+7c9UDAJ5gaxR9Jyu4aadNsnBD7daO+Mr326fB9M7ded3/gqng
    gn/oL6ZkF2QMDWMVcF+qq8CsbqaZMg/UO4obxPbDyCRKE+1ggG+t/tWTMvSoUfEZ
    ySZ+3dIlBIbIaHXQCE4ES8wW0JgtaA==
    =gjKZ
    —–END PGP PUBLIC KEY BLOCK—–

    John Young Architect: http://jya.nyc
    Special Inspections: http://jya.nyc/special-inspections.htm

    YTCracker – Hacker, Rapper, Activist

    YTCracker – Hacker, Rapper, Activist

    YT-CrackerBryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17. Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.

    YT-CrackerBryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17. Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.

    YT-CrackerBryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17. Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17.

     

     

    Capital Steez – Rapper, Activist

    Capital Steez – Rapper, Activist

    Capital-SteezCapital Steez Courtney “Jamal” Everald Dewar JR, better known by his stage name Capital Steez, was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital Steez Courtney “Jamal” Everald Dewar JR, better known by his stage name Capital Steez, was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York. Courtney “Jamal” Everald Dewar JR, better known by his stage name  was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital Steez Courtney “Jamal” Everald Dewar JR, better known by his stage name Capital Steez, was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital Steez Courtney “Jamal” Everald Dewar JR, better known by his stage name  was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital Steez Courtney “Jamal” Everald Dewar JR, better known by his stage name Capital Steez, was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital-SteezEverald Dewar JR, better known by his stage name Capital Steez, was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital Steez Courtney “Jamal” Everald Dewar JR, better known by his stage name  was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York. Courtney “Jamal” Everald Dewar JR, better known by his stage name Capital Steez, was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York. Courtney “Jamal” Everald Dewar JR, better known by his stage name was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York Courtney “Jamal” Everald Dewar JR, better known by his stage name Capital Steez, was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital Steez Courtney “Jamal” Everald Dewar JR, better known by his stage name  was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York. He was a major advocate of freedom and his music is still relevant to this day.Capital-SteezEverald Dewar JR, better known by his stage name was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital Steez Courtney “Jamal” Everald Dewar JR, better known by his stage name was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York. Courtney “Jamal” Everald Dewar JR, better known by his stage name Capital Steez, was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital Steez Dewar JR, better known by his stage name Capital Steez, was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.Capital Steez Courtney “Jamal” Everald Dewar JR, better known by his stage name was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York. Courtney “Jamal” Everald Dewar JR, better known by his stage name  was an American hip hop recording artist and anarchist from Brooklyn, New York City, New York.

    Laura Poitras – Journalist, Filmmaker

    Laura Poitras – Journalist, Filmmaker

    laura-pLaura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.Laura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.Laura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.Laura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.Laura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.laura-pLaura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.Laura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.Laura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.Laura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.Laura Poitras is an American documentary film director and producer residing in Berlin. Poitras has received numerous awards for her work. Her 2006 documentary, My Country, My Country, was nominated for an Academy Award. Edward Snowden first reached out to Laura with the classified info, and she has made a documentary called ‘CITIZENFOUR’ which explains how it all unfolded.

    Daniel Ellsberg – Intelligence, Leaker

    Daniel Ellsberg – Intelligence, Leaker

    Daniel-EllsbergDaniel Ellsberg is an activist and former United States military analyst who, while employed by the RAND Corporation, precipitated a national political controversy in 1971 when he released the Pentagon Papers.Daniel Ellsberg is an activist and former United States military analyst who, while employed by the RAND Corporation, precipitated a national political controversy in 1971 when he released the Pentagon Papers.Daniel Ellsberg is an activist and former United States military analyst who, while employed by the RAND Corporation, precipitated a national political controversy in 1971 when he released the Pentagon Papers.Daniel Ellsberg is an activist and former United States military analyst who, while employed by the RAND Corporation, precipitated a national political controversy in 1971 when he released the Pentagon Papers.Daniel-EllsbergDaniel Ellsberg is an activist and former United States military analyst who, while employed by the RAND Corporation, precipitated a national political controversy in 1971 when he released the Pentagon Papers.Daniel Ellsberg is an activist and former United States military analyst who, while employed by the RAND Corporation, precipitated a national political controversy in 1971 when he released the Pentagon Papers.Daniel Ellsberg is an activist and former United States military analyst who, while employed by the RAND Corporation, precipitated a national political controversy in 1971 when he released the Pentagon Papers.Daniel Ellsberg is an activist and former United States military analyst who, while employed by the RAND Corporation, precipitated a national political controversy in 1971 when he released the Pentagon Papers.

    Ray McGovern – Intelligence, Activist

    Ray McGovern – Intelligence, Activist

    Ray-McGovern

    Ray McGovern Raymond McGovern is a retired CIA officer turned political activist. McGovern was a CIA analyst from 1963 to 1990, and in the 1980s chaired National Intelligence Estimates and prepared the President’s Daily Brief.Ray McGovern Raymond McGovern is a retired CIA officer turned political activist. McGovern was a CIA analyst from 1963 to 1990, and in the 1980s chaired National Intelligence Estimates and prepared the President’s Daily Brief.Ray McGovern Raymond McGovern is a retired CIA officer turned political activist. McGovern was a CIA analyst from 1963 to 1990, and in the 1980s chaired National Intelligence Estimates and prepared the President’s Daily Brief.Ray McGovern Raymond McGovern is a retired CIA officer turned political activist. McGovern was a CIA analyst from 1963 to 1990, and in the 1980s chaired National Intelligence Estimates and prepared the President’s Daily Brief.National Intelligence Estimates and prepared the President’s Daily Brief.National Intelligence Estimates and prepared the President’s Daily Brief.National Intelligence Estimates and prepared the President’s Daily Brief. We need more people who work for the government to follow in the foot steps of these brave leaders. The truth movement would not be the same without the efforts of these great men and wonen.We need more people who work for the government to follow in the foot steps of these brave leaders. The truth movement would not be the same without the efforts of these great men and wonen.We need more people who work for the government to follow in the foot steps of these brave leaders. The truth movement would not be the same without the efforts of these great men and wonen.

    William Binney – Intelligence, Leaker

    William Binney – Intelligence, Leaker

    William-BinneyWilliam Binney William Edward Binney is a former highly placed intelligence official with the United States National Security Agency turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. We need more truthers like this guy. Without people coming forward we wil never have the kind of freedom of information that our founding fathers fought so hard for. Remember America is only as good as those who are willing to speak the truth.William Edward Binney is a former highly placed intelligence official with the United States National Security Agency turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. We need more truthers like this guy. Without people coming forward we wil never have the kind of freedom of information that our founding fathers fought so hard for. Remember America is only as good as those who are willing to speak the truth.William Edward Binney is a former highly placed intelligence official with the United States National Security Agency turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. We need more truthers like this guy. Without people coming forward we wil never have the kind of freedom of information that our founding fathers fought so hard for. Remember America is only as good as those who are willing to speak the truth.William-BinneyWilliam Binney William Edward Binney is a former highly placed intelligence official with the United States National Security Agency turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. We need more truthers like this guy. Without people coming forward we wil never have the kind of freedom of information that our founding fathers fought so hard for. Remember America is only as good as those who are willing to speak the truth.William Edward Binney is a former highly placed intelligence official with the United States National Security Agency turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. We need more truthers like this guy. Without people coming forward we wil never have the kind of freedom of information that our founding fathers fought so hard for. Remember America is only as good as those who are willing to speak the truth.William Edward Binney is a former highly placed intelligence official with the United States National Security Agency turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. We need more truthers like this guy. Without people coming forward we wil never have the kind of freedom of information that our founding fathers fought so hard for. Remember America is only as good as those who are willing to speak the truth.

    The Paypal 14 – Activists

    The Paypal 14 – Activists

    The-Paypal-14The PayPal 14 are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.The-Paypal-14The PayPal 14 are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pled guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service.

    Christopher Doyon – Hacker

    Christopher Doyon – Hacker

    Christopher-DoyonChristopher Doyon Chris Doyon (alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.Chris Doyon (alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.(alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across the border into Canada.

    Jake Davis – Hacker

    Jake Davis – Hacker

    Jake-DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. Jake Davis He has worked with AnonyJake-DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake Davis