Before every single false flag event there is an exercise, rehearsal, preparation, etc. We find it later, every time.
By March 2020, the world is on fire, shutting down one geography at a time. Welcome to the new normal, COVID-19 hyper-paranoia. But wait, this was only a surprise to the general public, not the power-elite of course.
Event 201
The Johns Hopkins Center for Health Security in partnership with the World Economic Forum and the Bill and Melinda Gates Foundation hosted Event 201, a high-level pandemic exercise on October 18, 2019, in New York, NY. The exercise illustrated areas where public/private partnerships will be necessary during the response to a severe pandemic in order to diminish large-scale economic and societal consequences.
These are not Theories. These are Facts, do your homework and confirm it for yourself. Because humans are lazy and distracted – they bank on you not doing that, just taking the official version as the fact. Labels like ‘conspiracy’ are meant to detract from the messaging, and don’t do your conscience any favors.
9/11: Operation ‘Able Danger’ Drill Jet-Figher response conveniently impossible, 1-in-a-billion Chance of penetrating the most sophisticated defense system ever, 4 times in a day. Then, Millions sucked from the Stock Market overnight with Put-Options on the involved Airlines ONLY.
Sandy Hook: The school building where the “alleged shooting took place” was a condemned building for black mold. Had not been used in nearly 3 years.
Boston Bombing: Crisis actors everywhere. Online websites for Crisis Actor Hiring were filled with job postings and profiles from many of the fake “victims” on the very same day. [“Crisis Actors” is a real thing. They are hired to play a role but then find themselves trapped in a real situation where they are then told to play along or else]
7/7 London Tube Bombing: The Police were doing a field exercise for the exact scenario that played out on the same day, at the same location. Coincidence? No.
There are dozens of examples of this and it’s always exposed later, when no one cares anymore or there is a new fake crisis being shoved in our faces by all means.
In each “Event” (False Flag) there is one major common denominator. Each plays out by way of this method. And, each of these is predetermined. It is the PRS method. PRS is Problem – Reaction – Solution. It’s a variation on the classic Machiavellian fabricated external-enemy strategy for manipulation of public opinion and society, usually by the government. The general theory is based on the Hegelian Dialectic method, “thesis, antithesis, synthesis.”
Problem-Reaction-Solution is defined as the strategy of creating a crisis (the Problem), waiting for a call for action to resolve the crisis (the Reaction), then taking action (the Solution), supposedly in response, which actually furthers a hidden agenda, usually gaining power. This is often cited as:
First, the government wants power the people will not freely give.
1. The government(s) creates or exploits a “Problem,” blaming it on others.
2. The people “React” by asking the government for help, willing to give up their rights. Think terrorist attacks, Cyber or Domestic Terrorism, Viruses, etc.
3. The government offers their “Solution” they planned long before the crisis (Problem) they created and exploited.
Reality Check:
80% of all those with the Coronavirus “Spontaneously Recover” (Same as Common Cold)
At least 95% of “Coronavirus related deaths” are patients with “pre-existing chronic conditions” (Common Cold deadly to these people already)
Every year in the U.S. there are an average of 18,000 to 49,000 deaths from the FLU. On the high end that is more than 8,000 per month.
And now, here is another one. The Coronavirus is the “common cold” and the “Crisis” is a SCAM.
This is a worldwide government manufactured “Problem” and we are seeing some of the “Reactions” to it. We actually don’t see real Problems. We are just indoctrinated with this information from a completely controlled media machine. Never look at the news “Personality” (designed to make you find a favorite you can trust while they all say the exact same thing), rather look at whom or what owns these media behemoths and what their past and present agendas have been, who they pal around with, what society groups they belong to and whom they swear their religious loyalties.
How is it all of the governments, all over the world all reacted to this “virus” at the same time, the same way, right in step with one another — exactly alike — not one independent reaction — as if they had all been to the same meeting?
There has never been another time, matter, issue, crisis or anything else where the entire world and all governments, all reacted instep with each other. Hugely suspicious!
THE WORLD working together on this? That should be the only thing terrifying us. Not some hijacked common cold. Best of all, for “the powers that be” the public passed the “Brainwashed Slave Test” when they started panic-buying toilet paper as if this “virus” is a diarrhea disease. And, now, just as they were trained, it is the dumbed down, brainwashed, fluoridated public masses driving the fear machine for them. Question the official narrative? Media throws smoke with the C-word. We’ll correct for transmission loss..
CONSPIRACY FACTS. They love to cloud your perception with that ‘theory‘ word. Good thing that’s not what we’re talking about. Don’t see a pattern yet? Then a few more Historical Facts, shall we..
Test: Can you name the virus that nearly took down the last summer Olympics? There were more than a million headlines around the world for this virus. Can’t name it? It’s only been 4 years and it had people cancelling their plans of going to the Olympics, including athletes whom worked their whole lives to get there. Right after the Olympics were over… never heard of the virus again. A lot of money was made off of that one. Can you name it? (it was Zika, the deadly skeeters OMG!) And of course after that, it was Ebola. If ever there should have been a run on TP, that one should probably earn the porcelain throne. We have a whole breakdown on that scam too, from 2014. The Secret Project To Create Weaponized Ebola in the 1980’s
Bird, Flu, Swine Flu, SARS – Oh, My.
It works, so they rinse, repeat.[/vc_column_text][vc_empty_space height=”12px”][vc_column_text]
World Birth and Death Rates –
Birth Rate:-
Four births each second of every day
19 births/1,000 population
131.4 million births per year
360,000 births per day
15,000 births each hour
250 births each minute
Death Rates:
Nearly two people die each second
105 people die each minute
6,316 people die each hour
151,600 people die each day
55.3 million people die each year
And we’re freaking out about Coronavirus? Or, are we being made to freak out about it? These facts brings the worldwide common reaction by all the governments into a different perspective doesn’t it?
If you want to be healthy, do the things you should have been doing already. Eat and drink healthily. Don’t eat foods with pesticides and fertilizer (both heavy metals and poisons). Read labels. If you don’t know what it is, don’t eat it. It’s not as hard as you think.
As a society, we need to stop mocking things that are different or new to us, like eating healthy. In the end, when you learn the truth, you may feel foolish. Let’s be open to learning the truth and sharing with one another.
Did you know recent polling found that most Americans believe 9/11 was, in some degree or completely, fake. Wow!
The lesson is: Two polar opposite “facts” cannot both be true. You cannot have a fake 9/11 and a real need to keep us safe from the terrorists that did not fly planes.
You cannot have Creation and Evolution at the same time. You cannot have Crisis Actors and a real event. We have been brainwashed to accept falsities as reality, thus “official government” story as the truth.
And, all of this is reinforced by the media, the government’s mouthpiece. The two always look like they are opposing each other until you look at each “Crisis” in hindsight.
(1967) The News Benders – Predictive Programming
When you pay attention to details like this, the writing has been on the wall for a long time. Much of our true esoteric ‘reality’ is presented to us front and center in Entertainment and Media since Hollywood’s inception. For an extremely comprehensive analysis on this subject you should bookmark Vigilant Citizen (VigilantCitizen.com)
The Coronavirus scam is either a full scale rollout of their totalitarian plan with isolationism as the new normal or it is a dress rehearsal for it. Our “Reaction” will determine which one. They cannot install their “Solution” if we don’t “React” the way they want.
RESIST BY INSISTING ON LIVING YOUR NORMAL LIFE AND INFLUENCING YOUR FRIENDS AND FAMILY TO DO THE SAME.
IF WE REACT, EXPECT THESE POTENTIAL ‘SOLUTIONS’ SOONER THAN LATER
List of Potential, Possible and/ or Likely Changes to Government Policies, Program Implementations, Changes to Society, Altering of Individual Freedom, Etc:
Global Currency Reset
Restricted foreign and domestic travel
Inter-state travel restrictions for non-essential transportation of goods and commerce
Checkpoints in cities (random), counties (random) and States (borders)
Cashless society
Nationwide DNA registry
Nationwide sweep for all immigrants in the name of testing
Real ID implementation with health related testing, DNA and biometric requirementS
Health testing requirements for all employment
Mandatory 5G installation for health and safety
Suspend all postal services, shipping, package and delivery services
Initial 4 or more day mandatory bank closures
Bank wire transfer and withdrawal limitations, etc.
Eventual mandatory indefinite bank closures to stop the spread of the virus through the circulation of money
Postpone All Election: local, State and National
Indefinite closures of all “nonessential” businesses
Ban on all large groups of people. “Large” being defined by the government.
Definitely worth a listen! We all know that Facebook had some shady beginnings.. stolen code.. angel investment via outed CIA ‘front company’ In-Q-Tel, and it goes on.. What if Zuck really was just the chosen puppet leader of what would ultimately be the worlds largest ‘voluntary citizen dossier’? Give it a listen and decide for yourself. These statements certainly seem to ring true with plenty of background info to give reasonable merit.
Highlights:
Mark’s real name is not even Zuckerberg.
Mark was chosen ahead of time and ‘placed’ at Harvard to fit the story.
Mark did not create the Facebook brand name nor did he write any code.
Mark has ‘handlers’ that dictated (and still do) his every move.
Mark’s lack of any moral compass made him the perfect figure-head.
Mark is the just the face of a much bigger agenda at work.
Interesting ‘Top Comment’
” So, Zuckerberg’s Harvard professor, James P. Chandler, is one in the same patent attorney who stole Michael McKibben’s Leader Technology ideas that he was supposed to help get a patent and instead STOLE the information! WOW, all these deep stater’s are totally intertwined, like a huge cancer. How do you kill a cancer? STARVE IT! “
The recent, rapid growth of digital technologies has produced a vast new appetite for electrical power.Internet data centers, which function as the “factories” of the digital economy, are largely responsible for this demand. Today, the Internet’s electricity demand would rank sixth in the world if it were to be considered its own country. Moreover, according to a new report by Greenpeace, Internet electricity demand will grow by half a trillion kWH a year by 2017 – much of it from streaming videos and on-demand music. Factoring in these trends alongside the ever-present warning of climate change, Internet companies must immediately begin to move away from dirty energy sources and monopoly utilities.
To have Internet infrastructure powered by “clean” energy signifies a commitment to a future based on sustainable energy from scalable sources such as solar and wind rather than the finite supplies of fossil fuels that still sit beneath the Earth’s crust. Xoom Energy has reported that the energy sector contributes about 31 percent of all greenhouse gas emissions in the United States – but the construction of new data centers means a fresh opportunity to rely on renewables from the start. The door is open to large technology companies to rapidly develop the innovative tech needed to break our dependency on oil. Time will tell who chooses to walk through it.
According toEcoWatch, Apple is now working with its Chinese suppliers to produce an eventual 2.2 GW of power for manufacturing from wind, solar and hydroelectric sources. One of Apple’s manufacturing partner, Foxconn is pledging to supply 400 MW of solar power by 2018, as much energy as its Zhengzhou factory uses to make iPhones. 40 MW of completed solar projects in Sichuan province now produce more electricity than all of Apple’s offices and retail stores in China. Apple’s Chinese operations would otherwise use electricity from coal burning plants that emit greenhouse gases into the atmosphere contributing to toxic air pollution locally, and polar ice melting, raised sea levels, and extreme weather globally.
Apple claims to use “100 percent renewable energy” to power their cloud, with large solar farms deployed in North Carolina, California, Nevada, and Arizona. Likewise, they have purchased wind power for their California and Oregon data centers as well as a micro-hydroelectric facility near their Oregon data center, and are working with the Nevada utility to power their future data center with geothermal and solar energy.
Google has kept up with Apple’s drive into building or buying renewable energy where state energy policies have permitted and has embarked on a more complicated quilt of investment, procurement, and policy advocacy elsewhere, even where it has no data centers.
Large Internet companies may declare their intentions of using 100 percent renewable energy, but the reality of their data center electrical needs is more complicated, and clean energy for Internet services and products is not uniformly within easy reach. Large data centers are located in technology friendly locations like North and South Carolina, Georgia, Taiwan, and Singapore that also are home to dirty energy monopoly utilities. Internet companies will have to engage in government policy debates to change this.
One possibility is to tie the establishment of new data centers to the availability of renewable clean energy sources. US state legislatures are aware of the conflict, and may be willing to re-examine those outdated monopolistic energy policies.
Internet companies are, by in large, agile and future-oriented in their approach to electricity and the future of power, displaying a concern for the ecological issues that matter to coming generations. But there is a lot of work ahead for the next wave of tech employees, who will be tasked with the challenge of innovation under serious carbon constraint. Internet companies would do well to push for legislative reform, and utilize their impact to in turn positively change the Earth’s environmental destiny.
From its humble folkloric beginnings to the release George Romero’s classic Night of the Living Dead in 1968, today’s current Walking Dead craze has taken zombie culture in America to new heights. And now that Halloween has arrived, our taste for adventures involving hordes of the undead has doubled. Whether you’re searching for candy treats or goodies of a fleshier variety, it’s the ideal time of year to dig a little deeper into the zombie phenomenon as it continues to fill up our film screens, televisions, and literature.
The zombie myth is timeless, with references to the dead rising up again found throughout the histories of various cultures. However, the actual term “zombie” has more specific roots in Haitian Creole traditions and African religious customs, where the zombies were simply mindless slaves rather than the insatiable, flesh-eating monsters they would become in the hands of American pop culture creators.
Regardless of origin, there’s no denying the zombie has come into its own in the last few decades, serving as a metaphor for everything from the danger of mindless consumerism to economic disasters and epidemics on an international scale. And while zombies still operate effectively as metaphors for large scale disasters, global, environmental, and otherwise, there’s are also more immediate messages in shows like The Walking Dead. As we as a society find ourselves relying more and more on automation and less and less on our own intellect, we’re in danger of becoming just as mindless as the monsters we fear.
We’re increasingly producing devices and systems designed to make our lives easier and safer, but at what cost? Automated home security systems that are designed to do our thinking for us in case of a threat to our family members or property are a prime example of the double-edged sword . By allowing an “intelligent” machine system to do the thinking, we decrease the possibility that we’d be able to respond appropriately to a threat should the system no longer operate.
The risk is also inherent in other types of so-called advanced technology, such as increasingly automated features on the vehicles we drive and labor saving machines replacing the humans in our factories. By allowing the machines to think for us, we run the risk of decreasing our own capacity for innovation and creative thinking and thus our ability to operate without technology. We’re in danger of becoming slaves to the technologies that were intended to serve us instead.
On some subtle level, we seem to be aware of and fear the dangers of our overreliance on automation, as witnessed by the popularity of television shows like The Walking Dead, a show supposedly about zombies but that focuses instead on the survivors of the global apocalypse rather than the cause of it. The main characters, although always in danger, nonetheless present a message that the more willing they are to adapt to a world without the technologies and creature comforts they no doubt relied on prior to the world disaster, the more likely they are to be able to survive the new reality. And it’s no accident that the ones most able to survive from the beginning are the Daryl Dixons and Glenn Rhees of the show, those willing to think creatively and who had lived life prior to the apocalypse without an over-reliance on technology.
While the newest zombie-based show on the scene has only aired its first six-episode season thus far, there’s likely an even stronger possibility of exploring the characteristics required to survive a global loss of technology that accompanies a zombie apocalypse.Fear the Walking Deadis set in the same universe as the original The Walking Dead but with a backed-up timeline meant to show the first days of the epidemic. So, while technology had begun to fail by the end of the first season, characters were not yet completely cut off.
There’s no doubt that advances in technology have numerous benefits for mankind, but when the technology is capable of more advanced thinking than we ourselves are, the dangers may just outweigh some of the benefits. If we want to avoid becoming mindless zombie slaves to technology, we have to be able to do our own thinking.
The problem with repeated false flags and staged events executed for a particular political purpose is that they demand a commitment from the minds of the masses and it has to happen in real-time. You either get it right away that the event is staged or you don’t. That is, you require “proof”. Until you receive that proof or should I say, until you consciously register a series of information that convinces you that it must have been fake, you will choose to believe mainstream media news and accept it as truth. On the other hand, those that are fully awakened to the overall agenda in full motion now know right away as soon as another staged shooting takes place. They know exactly which signs to look for or more specifically, which group of signs to look for. Also there is a sequence of events that usually play out exactly almost every time. Once the working minds of these people see that sequence of events play out their natural brain does not allow them to believe the official story no matter how much “proof” the mainstream media presents to convince their viewers that the story is true. This is the natural resistance that humanity is creating to government lies which I’ve discussed in the past.
That said, without getting too deep into what I believe could likely be another staged shooting event to advance the federal governments gun control agenda, let’s just zip through a list of oddities that every single person must reconcile surrounding the recent Virginia TV reporter shooting of Allison Parker and cameraman Adam Ward by alleged shooter Vester Lee Flannigan. Here are 19 intriguing coincidences surrounding the Virginia shooting, and perhaps you can explain away some of these. If you can, more power to you but good luck tackling the entire list. Ultimately, it’s not about one person being right or wrong but about lining yourself up with truth. Keep in mind that all of these things are happening at once and you have to let your natural instincts, intuition and common sense kick in and take this information in and then file it under one of two categories, orchestrated event or coincident or perhaps I don’t know. You decide:
1- Big black man with gun pointed directly at 2 people just a few feet away. No one notices, no one cares!
No one looks at the gunman even once despite his brandishing a normal sized gun. Peripheral vision must be a conspiracy also! Instead the 2 women carry on with their conversation as usual! You couldn’t make this up. Don’t believe it? Watch the video for yourself.
2- After clearly pointing gun at his victims shooter doesn’t shoot!
The video shows what turns out to be some kind of rehearsal pointing. Ask yourself what killer has ever done this outside of a Hollywood movie set? Put yourself for a second inside the mind of the supposed killer. Who points a gun at people in broad daylight, practices what he’s going to do and then after not pulling the trigger waits around to re-point the gun again a minute later?
3- Cameraman conveniently pointing camera away even though the interview is taking place now.
Watch as the cameraman is inexplicably shooting in a direction unrelated to the interview taking place providing the perfect entrance for the apparently invisible shooter. Ask yourself, why would the cameraman do this? Was the interview that boring or that long that he needs to amuse himself by aimlessly panning across the scenery while the interview is happening? What are the odds of this coincidence?
4- Shooter is super close to cameraman who somehow has no idea he’s there!
How does cameraman Adam Ward not see, hear, sense or even smell that there is someone standing right next to him? The shooter doesn’t even have a shadow! The scene takes place in a super quiet remote area and it’s a big man with a gun who is also invisible. This defies logic and reason, does it not? Coincidence? You decide.
5- How did cameraman know they were shooting that day, that location?
Simple questions that beg good answers. What’s a shooter doing in this remote area anyway? And how does the shooter know to be there at that exact time?? Was he just wandering around in the neighborhood and decided to do this? Or did the shooter have a copy of the WDBJ production schedule? Maybe he did. Just wondering.
6- Reporter never goes down or twitches after being shot multiple times!
Magic bullet part 2? Could this be an example of the adrenaline bullet initial impact resistance theory? Perhaps it happened so fast she didn’t know she was shot? Everyone should go back and watch other videos of people being shot and look for the quick body twitch, the jolt and the instant collapse that happens when people get shot at point blank range which is when bullets do the most damage. Then go back and watch videos of people getting shot multiple times at point blank range and see if anything in this recent shooting looks different. Also ask yourself, where is the blood?? Where is the staggering struggle of someone who has just been shot?
Where have we seen this before? Back in January of this year (2015) during the Charlie Hebdo shooting incident we saw a supposed point blank head explosion shooting of a Paris police officer with a AK47 assault rifle only the video shows the shot hitting at least a foot away, no head jolt and no blood. This might lead us to think they are playing out of the same script again. But who knows? You decide.
7- Shooter commits the usual suicide.
Dead men tell no tales. Once again the shooter, this time Vester Lee Flannigan does not live to tell the story. The perfect ending once again for the controllers. Shooters who contribute to possible future gun legislation apparently almost always conveniently kill themselves now. The end results of shootings these days almost seem automated.
8- Shooter puts out the usual manifesto!
The “manifesto” has become a standard part of the script but we must all start to wonder- is the “manifesto” now being over-played? I don’t know anyone, or know of anyone who has ever met someone who has written or even considered writing a manifesto of their life intent, yet government rolls out manifestos on all killer patsies nowadays. What’ the deal with the automated manifestos? What everyone should realize is that the manifesto is the perfect ‘fill-in-the-blank’ propaganda document to sway the masses on anything they want them to believe. If the manifesto says you did it, then you did it. The manifesto conveniently fills in the blank to create perception of intent. How perfect!
9- Video of shooting seems intended exclusively for shock value, no other purpose.
This may be coincidental as well but like the James Foley fake beheading and all other ISIS videos, this point-of-view video seems like it is mostly intended to shock you and get a reaction from you as in problem-REACTION-solution. Ask yourself, why would the government and media want to shock everyone? Is the story itself not enough?
10- Video conveniently now being censored by YouTube Charlie Hebdo and James Foley-style
Once the shock value is accomplished by the mainstream media as we’ve seen in recent shock value videos like the James Foley fake beheading video or the Charlie Hebdo fake police officer execution video, it seems once the mainstream media pushes the initial shock value video to create the reaction there is no need to allow the world to watch the video and scrutinize it. And seems to be when the censorship of the same video begins. The controllers would rather you not watch the video on your own on YouTube where you might come across alternative media links and explanations of their false flags and crisis actors. Instead they would rather you just trust the mainstream media’s presentation of the video evidence and leave it at that.
11- Image of shooter produced by a video without such frame?
Others have point out how the media put out an image of the shooter based on the video camera footage but we never see this footage so where did they get this frame from? Yes, this may be a coincidence, who knows but given all the other oddities it makes you wonder.
12- Audio file of shooting after camera cuts off sounds very different.
I’m no sound expert but from my military experience I know the sound of rounds shot at a range. Admittedly, the audio of the shooting sounds very different from the camera version due to its much more pronounced echoes. I find this a little odd but who knows.
13- Police order BBC Journalist to delete video footage of shooters crash.
Anytime we hear police forcing anyone especially a journalist to destroy evidence this should set off a red flag in your mind and it’s got to make anyone at least wonder why. Why destroy evidence?? Who or what threat does this evidence represent and to who? This is very troubling.
14- Family members quickly on TV calling for gun control, Sandy Hook style!!
This is one of the most disturbing issues for me when I first watched an interview with family member Andy Parker. Once again supposed family members in lightning speed are propped up on TV bypassing the mourning, sincerity and humility stage that comes with grieving for a recently murdered family member and they are instead calling for gun control and political agendas. Parker delivers his shocking political call to action to America within seconds:
“We’ve got to do something about crazy people getting guns”
Is anyone not reading through this?
15- Andy Parker, alleged father of murder reporter happens to be a former Broadway actor
Should it matter that Andy Parker is a former Broadway actor? Under any other circumstances it might not matter but unfortunately this is not an ordinary situation.
16- Andy Parker- Director of Human Resources for Virginia National Bank
Should it matter that coincidentally Andy Parker is directly tied to the banking system in addition to being a proven professional actor? You decide.
17- White House Press Secretary, Josh Earnest rolls out direct propaganda!
The White House quickly urges Congress to use “common sense” in order to reduce gun violence in America- Timing is everything isn’t it?
18- Obama administration quickly links the incident to a race war and gun owners perfectly in line with the Flanagan’s manifesto.
Just in case no one believes the manifesto, here comes the White House to reiterate the race theme in the manifesto and to push their propaganda.
19- Shooting takes place 2 days after the UN Arms Trade Treaty in Mexico!
In the end this is about gun control so should it shock you that this shooting took place 2 days after the United Nations’ Arms Trade Treaty (ATT) in Mexico? Lucky timing? Is it a coincident that Obama is trying to claim that Congress ratified the UN’s Arms Trade agreement in 2013 when in fact Congress did not? Does it surprise you that the timing is perfect with these treaty talks? There seems to always be a shooting right around the time the UN Arms Trade Treaty comes up or whenever there is an event or Arms bill being discussed. Coincidence? Again, you decide.
Summary
The globalist have clear cut stated goals to have the United Nations act as the bullies of the world to enforce regulation on guns and arms in complete violation and disregard of the U.S. Constitution which grants every American the inalienable right to bear arms to protect themselves from tyrannical government.
Obama’s cooperation with this UN treaty is an attempt to destroy the second amendment and transfer gun control power to the UN. What this means for freedom lovers and those that oppose tyranny is that the permanent enslavement of humanity is in the balance. Resist now. Do not allow our criminal government and their CIA controlled mainstream media to use shooting events whether real or staged to be used as tools to disarm Americans. This will give ALL the power to an evil oppressive and corrupt totalitarian global government and permanent enslavement of humanity. Don’t miss the bigger picture for a staged comparatively insignificant shooting.
Finally, you decide what happened in this latest Virginia TV reporter shooting. Is this another staged shock and awe psyop for Jade 2 software to monitor and track the reaction from the masses being that we are in the middle of Jade Helm operation? Is this a staged event to boost the likelihood of a UN Arms Trade Treaty signing? Is this a great story to get attention away from Hillary scandals and collapsing economy? Is it all the above? I believe it very well could be. You decide for yourself.
Solutions
Know that the new world order is here and no huge news story is randomly being told by coincidence. There is an argument to be made that if the government and media did that now that might be considered wasted resources. All stories now have a specific purpose.
Find out your purpose and separate yourself from the control system which very much includes the mainstream media. Realize that your mind is just like your laundry or your dishes. It can get dirty or polluted and if so it needs cleansing. Purge their lies out of your mind and stop assuming that those who don’t believe mainstream media are lunatic conspiracy theorist. Now is the healthiest time in history to question every single news piece. Your survival depends on it.
Let’s all exercise short term memory and let’s quickly go back to focusing on solutions instead of dwelling on their crisis actor laced convenient and staged shootings. Instead stay focused on knowing your rights and how special each and every person is. We are born free and we are conscious human beings. See the nature of the cage and purpose to free yourself from their mental enslavement which keeps you bound. Realize that when people forget about a shooting this hurts the controllers and the new world order plans. They want and they need you to keep dwelling on these staged stories for the stories to be effective. Recall the-“I shot Bin Laden” story earlier this year(2015) desperately trying to revive the Bin Laden hoax only no one cared.
The faster the globalist move it only makes me wonder if the new world order is slowly dying. We are seeing many ways every day how humanity is turning things around but you have to look for them. Without looking for and seeing that silver lining it can easily seem like things are really bad and only getting worse without hope of things changing. It’s a classic glass half full situation. How full is the glass from your point of view?
Bernie Suarez Creator of Truth and Art TV Project
Bernie is a revolutionary writer with a background in medicine, psychology, and information technology. He has written numerous articles over the years about freedom, government corruption and conspiracies, and solutions. A former host of the 9/11 Freefall radio show, Bernie is also the creator of the Truth and Art TV project where he shares articles and videos about issues that raise our consciousness and offer solutions to our current problems. His efforts are designed to encourage others to joyfully stand for truth, to expose government tactics of propaganda, fear and deception, and to address the psychology of dealing with the rising new world order. He is also a former U.S. Marine who believes it is our duty to stand for and defend the U.S. Constitution against all enemies foreign and domestic. A peace activist, he believes information and awareness is the first step toward being free from enslavement from the globalist control system which now threatens humanity. He believes love conquers all fear and it is up to each and every one of us to manifest the solutions and the change that you want to see in this world, because doing this is the very thing that will ensure victory and restoration of the human race from the rising global enslavement system, and will offer hope to future generations.
So I’m certain you’ve seen the news non stop, Chapo escaped, again. Happened on a Saturday night, he disappeared from the view of a surveillance camera in his cell and went underground into a tunnel under the Altiplano maximum security prison and wasn’t seen again. That’s the summary of the official story, and the video does appear to show that he went out through the tunnel dug where his shower was located. The story being spun is that since they couldn’t see him escape because Chapo was in a blind spot for the cameras. The authorities stated that out of respect for “human rights” they didn’t want to invade a prisoner’s privacy by placing a surveillance camera that could look into the shower area. That’s their trick up their sleeve, and the one that brings the story down.
An ex prisoner of the very same jail Chapo was doing time in said there is no respect for human rights let alone privacy rights in that prison. The authorities made it seem like they thought Chapo might have just been getting ready to shower. The ex prisoner explained that showers at night are not allowed. You can only shower once, at six in the morning. So there goes that part. He also states that there are indeed cameras that can see into the shower, even the toilet. That you’re only allowed ten minutes in the shower but really about 8 since the guards rush the prisoners to finish. He says the only blind spot in a jail cell at Altiplano is under your bed. You have to take into account that the authorities have stressed that the reason for these so called blind spots, is their concern for human rights. Okay.
If you’ve read enough about the Mexican government and their many hands, then you know that the last thing on their mind is a concern for human rights for its citizens. You can look at a photo of what police did to a young student that will verify that, Google that if you would like to but a face ripped off isn’t something I recommend you look at. The Mexican authorities aren’t concerned with human rights for its citizens let alone prisoners. The conditions at that jail and many others throughout Mexico are nightmarish. Put aside that we all know they don’t care about privacy, because don’t forget about this right here.
Secretary of the Interior Osorio Chong had repeatedly stated that the reason for the blind spots was out of respect for human rights, that turned into backlash as people began to say they looked the other way. He had to state that respecting human rights for a prisoner is not the same as helping them escape. That is true, it isn’t the same thing, but he wasn’t respecting human rights, so let’s get that straight.
It was obvious from the beginning of the story that Chapo must have had help from the inside, and you could ask any Mexican if they thought he had bought his way out and they’ll laugh and explain to you how reasoning works. It was confirmed that several prison workers including the director of Altiplano were detained for their alleged roles in Chapo’s escape. The former prisoner however stated that Chapo needed to have four departments under his control in that prison because of its maximum security status. He needed to control the federal, the prison guards, the prison officials and the special guards. So obviously he was able to do that, since he’s out of prison. Outside the prison is another link of the story of how Chapo was released.
The house at the end of the tunnel had no permit to be built. How could a maximum security prison not notice a building being built not far from its walls? You can say that Mexican authorities are very relaxed with their regulations, but a maximum security prison that houses the most wanted criminals is something else. Not only did it house Chapo, it had the leader of The Zetas Cartel, leader of the Knights Templar Cartel, “La Barbie” of the Beltran-Leyva Cartel, it is the prison of the most high profile cartel leaders. Surely they would notice a house being built about a mile from their walls, right? People familiar with the area have stated how secure that entire area is, you can’t even pick up radio signals there. With regards to how Chapo could’ve pulled this off, again, it isn’t how but why. Chapo didn’t escape if the authorities allowed all the pieces to be put into place for him to leave. He didn’t escape, he just left. He left behind a nice gift at least. That little bracelet used to monitor his location.
The bracelet that kept track of him doesn’t work outside the prison walls, pretty neat feature there for a maximum security prison. That’s another story in itself, the bracelet isn’t of importance because he removed it before going down the tunnel. How did he remove it so easily? What kind of bracelet for prisoner monitoring be so easily removable? Well, it was left behind and even if he couldn’t remove it, it would have stopped working once he was out. To be honest, he could have a huge lighthouse blaring out his location on top of his head and the authorities will still not find him, because they’re not looking for him. They released him. Well, for certain the local authorities did.
Shit rolls downhill, and so does money. This is an embarrassment for the upper echelons of power. President Enrique Peña Nieto is looking like quite the fool for being en route to France as the most prolific drug trafficker in the world just slipped out of prison on a motorcycle through a tunnel. Secretary of the Interior Osorio Chong looked like he was about to suffer an anxiety attack as he held a press conference over Chapo’s escape. They might not be happy about it, but certainly the lower level officials have quite a nice family retirement plan because of this. Sorry, us Mexicans usually think about, “I hope my family is taken care of” not, “I hope the president and the top brass is happy.” I can assure you, anyone involved in letting Chapo go aren’t worrying about the future of their family. They might go to jail, but just like those who sacrifice their being to work endlessly in the US to send money back home to ensure their families are taken care of, that’s all that matters. Speaking of money, that might be the key to the whole story.
Not going to get into specifics here, but the biggest buzz from the Left in Mexico on this story is, the bigger picture. Yeah Chapo is the head of arguably the biggest and most powerful cartel in the world. It was that way when he was in jail, and when he wasn’t in jail. So why all the effort to find him, arrest him, jail him? Well, the biggest bit on that has to do with a general goal with the EPN administration. Privatization and more oversight from the US government over Mexico. There has been talks about the need to privatize Mexican prisons, among other neoliberal proposals such as in the education sector which has met with fierce resistance from education workers. There’s lots of quotes in US media from law enforcement agents saying this is an embarrassment for the corrupt and weak Mexican judicial system, that it needs more US assistance, and you get the idea. This of course is the US lead war on drugs, and they have the final say and if need be, final action. Loretta Lynch went as far to say that the US is ready to “help” Mexico find and capture Chapo. Anytime the US says they’re ready to help another country find “justice” well you know how that story ends. Sovereignty or any resemblance to it not only flies out the window, it leaves a bloody mess. Wow, sorry but I’m looking at this post and it is rather long and tedious to write and I’m certain it’s getting tedious to read as well so I’ll break this down to the core, just a moment.
The rumors, Chapo was allowed to walk right out the front door of the prison. Let’s say that was the truth, that the tunnel was just a prop to assist this novela like story streaming from the TV networks. Even if it wasn’t, his release, yes release, serves a powerful purpose. Either the Mexican state is weak and corrupt, it is. Or, it’s another excuse for a “soft” intervention from the US. It can be both, it most certainly feels that way. We forget the War on Drugs is an actual war, and propaganda is a tool of war. You can point to the bad guy and say that’s enough reason to go to war, but at least recognize that this is part of a war. So treat it like one. Bin Laden was sought after in the War on Terror and many innocent people died going after the bad guy. Remember that lives are a factor here, it’s war after all.
A mere cursory glimpse into the future foretells of a world in which the Internet has been integrated into almost every facet of our lives. However, the flood of smartphones, laptops, and “Internet of Things”-enabled devices in recent years has led it to expand at a rate far beyond the expectations of its original creators. With today’s generation of technology pushing the limits of current fiber optic capacity, in the next decade, radical new solutions to the “capacity crunch” are crucial to the sustained success of the web.
The domain of all things digital is evolving quickly, and tomorrow’s Internet promises to be in places it never was before: inside our appliances, in far-flung villages, even in space. While some of these needs are practical (“smart” healthcare devices, learning thermostats, rural WiFi) others are purely for amusement (Netflix, the introduction of Oculus Rift). All in all, coming changes to the constantly-expanding role of the net stand to make our world a much different place than it was just several years ago.
As much of the world races to improve Internet connection speeds, researchers are concerned that the fiber optic cables which form the physical backbone of the global Internet are reaching their peak capacity and may run out of bandwidth in as soon as five to eight years. According to UK scientists, the cables and fiber optics that deliver data to users will have reached their limit by 2023. No longer able to transmit information, this may trigger an Internet collapse of epic proportions. This is a massive problem, of course, especially taking into account the fact that much of the developing world still needs to be brought online, even as Western superpowers continue to demand greater bandwidth and faster Internet speeds.
This issue has made it to the mainstream, as doomsday predictions from scientists, physicists and engineers warning of a “full” Internet summoned the attention of all who depend on the web (for cat videos, or other perhaps more worthwhile pursuits). Until now, Internet providers have kept up with increased demand simply by sending more and more data down a single line of optic fiber. But now, the optical fibers have reached maximum capacity, and cannot transfer any additional information. Some of the world’s largest providers of fiber optic connections, such as VerizonFiOS, Google, and Microsoft, have recently worked to improve their networking infrastructure to keep up with our insatiable desire for faster, stronger Internet. However, this does not change the fact that computer-to-computer interactions are growing at an exponentially faster rate than anyone had predicted.
As reported by the media, there are several Internet initiatives afoot which may serve to mitigate this issue completely. Some of the biggest names in technology today have a stake in the race to develop better and faster forms of Internet delivery, implementing some wild schemes in an attempt to move beyond broadband. From Google’s Loons to Elon Musk’s lofty plan for individual Internet satellites, some plans are perhaps less “grounded” in reality than others. However, the key to fighting capacity crunch might already be beneath our feet.
“Dark fiber” is a term used to refer to networks of unlit optical cable infrastructure, laid down and left unused during the dotcom era. In the city of San Francisco alone, over 110 miles of fiber optic cable run underground. Only a fraction of that fiber network is currently being put to use. Right now, networks of dark-fiber primarily serve corporate entities, in high-density urban centers. But experts say that putting them to use residential communities wouldn’t be tough.
Robert Steele, former intelligence officer with the CIA, has proposed another idea to solve this problem: open source everything. As the growth of online media consumption – through streaming sites such as Netflix and Youtube – promises to further skyrocket in years ahead, his solution may make the most sense.
Steele spoke on the matter, saying:
“Sharing, not secrecy, is the means by which we realise such a lofty destiny as well as create infinite wealth. The wealth of networks, the wealth of knowledge, revolutionary wealth – all can create a nonzero win-win Earth that works for one hundred percent of humanity. This is the ‘utopia’ that Buckminster Fuller foresaw, now within our reach.”
Does reaching the end of the current optical fiber limit mean an Internet apocalypse will occur within our lifetimes? Personally, I’m optimistic that engineers will soon ameliorate the problem and clean up the mess – hopefully before I have to cancel my Netflix subscription.
If you were murdered today, there’s only a 60% chance of police catching the person who did it. That number drops to 3% if you’re raped. 50 years ago, that number was much higher. What happened?
Despite overwhelming disapproval from the public, the war on drugs wages on and we are witnessing the inevitable materialization of a fascist police state before us.
The irony here is that no matter how much money the state steals from us to fund themselves, and no matter how many tanks or AR-15s they acquire, they are solving far fewer crimes than before.
Police aren’t getting any closer to “winning” this ridiculous and immoral war on drugs either.
So, why aren’t police solving crimes?
The answer to that question can be found by looking at where police allocate much of their time and resources.
Civil asset forfeiture pays. Busting low-level drug dealers by the dozen and confiscating their drugs, guns, cars, houses, and money pays. Writing tickets for victimless crime pays. Pulling you over for window tint, seat belts, arbitrary traveling speeds, and expired license plates; these are the things that pay, not solving crimes.
In criminal justice, clearance rates are used as a measure of crimes solved by the police. The clearance rate is calculated by dividing the number of crimes that are “cleared” (a charge being laid) by the total number of crimes recorded.
In the United States, the murder clearance rate in 1965 was more than 90 percent. Since the inception of the war on drugs, the murder clearance rate has plummetted to an average of less than 65 percent per year.
Despite the near complete erosion of the constitutional protections against unlawful search and seizure, the clearance rate for murder continued its free fall. This highlights the fact that no matter how many rights are given up or freedoms diminished, police cannot guarantee your safety.
It’s not just murders that police fail to investigate, it’s rapes too.
According to the Department of Justice, there are currently over 400,000 untested rape kits collecting dust in police evidence rooms nationwide, and many other estimates suggest that this number could be as high as one million.
As a result of this horrific negligence, roughly 3% of rape cases in America are actually solved. This is in spite of the fact that many rape kits have a high chance of leading to an arrest since most rapists are career criminals who have their DNA on file.
In some cases, the victims even know who their attackers were, but they can not prosecute these criminals because the evidence has yet to be processed by police.
Arresting rapists and murderers simply falls short in the two areas police are worried about; revenue collection and keeping their inflated drug war budgets flowing.
It’s not that police are incapable of solving these crimes either; they’re just not interested in doing so.
“Take for example, homicides of police officers in the course of their duty,” University of Maryland criminologist Charles Wellfordpoints out. On paper, they’re the kind of homicide that’s hardest to solve — “they’re frequently done in communities that generally have low clearance rates … they’re stranger-to-stranger homicides, they [have] high potential of retaliation [for] witnesses.” And yet, Wellford says, they’re almost always cleared.
This is why people don’t like the police.
This lack of solving crimes coupled with the increase in shakedowns of non-violent citizens has created a rift between the rest of society and police.
“One of the consequences of the war on drugs is people have stopped looking at police as their protectors and more see them as their potential persecutors,” explains Sean Dunagan, Former DEA Senior Intelligence Specialist.
The war on drugs has driven a wedge between citizens and police. If you keep locking up millions of people for victimless crimes, eventually you’ll effect enough lives to vastly tarnish your reputation.
“The police department basically becomes the “other” to the community. Once you have that breakdown, then information stops flowing, so you don’t learn about crimes. And the only crime you become interested in is the one you can solve, which is locking up people up for using drugs,” says Ed Burns, Former Baltimore Narcotics and Homicide Detective.
Locking up drug users has proven to be quite the profitable venture.
It is much easier to walk out on the street corner and shakedown a teenager who may have an illegal plant in his pocket than it is to examine the evidence in a rape or murder case. The so-called “Private” Prisons know this and have subsequently found their niche in this immoral war on drugs.
The term Private Prison is a farce from the get-go.
A truly Private prison would not be solely funded by taxpayer dollars. These Private prisons are nothing more than a fascist mixture of state and corporate, completely dependent upon the extortion factor of the state, i.e., taxation, as a means of their corporate sustenance.
A truly Private prison would have a negative incentive to boost its population for the simple fact that it is particularly expensive to house inmates. On the contrary, these fascist, or more aptly, corporatist prisons contractually require occupancy rates of 95%-100%.
The requirement for a 95% occupancy rate creates a de facto demand for criminals. Think about that for a second; a need or demand for people to commit crimes is created by this corporatist arrangement. The implications associated with demanding people commit crimes are horrifying.
Creating a completely immoral demand for “criminals” leads to the situation in which we find ourselves today. People, who are otherwise entirely innocent, are labeled as criminals for their personal choices and thrown in cages. We are now witnessing a vicious cycle between law enforcement, who must create and arrest criminals, and the corporatist prison system which constantly demands more prisoners.
The police and prison corporations know that without the war on drugs, this windfall of money, cars, and houses — ceases to exist.
If you want to know who profits from ruining lives and throwing marijuana users in cages, we need only look at who bribes (also known as lobbies) the politicians to keep the war on drugs alive.
Below is a list of the top five industries who need you locked in a cage for possessing a plant in order to ensure their job security.
Police Unions: Coming in as the number one contributor to politicians for their votes to lock you in a cage for a plant are the police themselves. They risk taking massive pay cuts and losing all their expensive militarized toys without the war on drugs.
Private Prison Corporations: No surprise here. The corporatist prison lobby is constantly pushing for stricter laws to keep their stream of tax dollars flowing.
Pharmaceutical Corporations: The hypocrisy of marijuana remaining a Schedule 1 drug, “No Medical Use Whatsoever,” seems criminal when considering that pharmaceutical companies reproduce a chemical version of THC and are able to market and sell it as such. Ever hear of Marinol? Big pharma simply uses the force of the state to legislate out their competition; which happens to be nature.
Prison Guard Unions: The prison guard unions are another group, so scared of losing their jobs, that they would rather see thousands of non-violent and morally innocent people thrown into cages, than look for another job.
What does it say about a society who’s resolute in enacting violence against their fellow human so they can have a job to go to in the morning?
The person who wants to ingest a substance for medical or recreational reasons is not the criminal. However, the person that would kidnap, cage, or kill someone because they have a different lifestyle is a villain on many fronts.
When does this vicious cycle end?
The good news is, that the drug war’s days are numbered. Evidence of this is everywhere. States are defying the federal government and refusing to lock people in cages for marijuana. Colorado and Washington state served as a catalyst in a seemingly exponential awakening to the government’s immoral war.
Following suit were Oregon, D.C., and Alaska. Medical marijuana initiatives are becoming a constant part of legislative debates nationwide. We’ve even seen bills that would not only completely legalize marijuana, but unregulate it entirely, like corn.
As more and more states refuse to kidnap and cage marijuana users, the drug war will continue to implode. We must be resilient in this fight.
If doing drugs bothers you, don’t do drugs. When you transition from holding an opinion to using government violence to enforce your personal preference, you become the bad guy.
Palm Beach County, Florida – Journalists at the DC Post were looking through message boards that are frequented by law enforcement officers, when they found a post where one officer was causally talking about planting evidence on “mouthy drivers” and “street lawyers.”
The Post then contacted the officer and conducted an anonymous interview with him where he revealed his disturbing perspective.
The officer revealed the illegal and unethical actions that he is proud of taking on the job. The DC Post has also said that they have verified the officer’s position with the Palm Beach County Sheriff’s Office, and they have verified many of the claims that he has made.
The original post was titled “Tricks of the trade – let’s exchange!” and featured the following message:
“I have a method for getting people off the street that should not be there. Mouthy drivers, street lawyers, assholes and just anyone else trying to make my job difficult. Under my floor mat, I keep a small plastic dime baggie with Cocaine in residue. Since it’s just residue, if it is ever found during a search of my car like during an inspection, it’s easy enough to explain. It must have stuck to my foot while walking through San Castle. Anyways, no one’s going to question an empty baggie. The residue is the key because you can fully charge some asshole with possession of cocaine, heroin, or whatever just with the residue. How to get it done? “I asked Mr. DOE for his identification. And he pulled out his wallet, I observed a small plastic baggie fall out of his pocket…” You get the idea. easy, right? Best part is, those baggies can be found lots of places so you can always be ready. Don’t forget to wipe the baggie on the person’s skin after you arrest them because you want their DNA on the bag if they say you planted it or fight it in court.”
Other officers on the board responded by sharing similar stories about how they falsely arrest people who don’t adequately bow to their authority.
Later in the interview, when the officer was asked if planting evidence happened regularly within his department, he responded by saying,
“Um, yes it does, on a regular basis. Probably every day in my shift. I work nights on the Road Patrol in a rough, um, mostly black neighborhood. Planting evidence and lying in your reports are just part of the game.
Then straight from the horses mouth, the officer said that this crooked behavior was actually encouraged by the drug war. Continuing his discussion about planting evidence, the officer said,
“Yes, all the time. It is something I see a lot of, whether it was from deputies, supervisors or undercovers and even investigators. It’s almost like you have no emotion with it, that they attach the bodies to it, they’re going to be out of jail tomorrow anyway; nothing is going to happen to them anyway. One of the consequences of the war on drugs is that police officers are pressured to make large numbers of arrests, and it’s easy for some of the less honest cops to plant evidence on innocent people. The drug war inevitably leads to crooked policing — and quotas further incentivize such practices. It doesn’t help that your higherups all did the same thing when they were on the road. It’s like a neverending cycle. Like how molested children accept that as okay behavior and begin molesting children themselves.”
When asked if he would get in trouble with the police department for framing people, the officer laughed and said that this type of behavior was actually encouraged.
“Our top boss, Sheriff Ric Bradshaw, supports this behavior and has for his entire career. As with anything, it depends on who you know in our agency. Last year, we had three deputies on the TAC unit, Kevin Drummond and Jarrod Foster, get caught falsifying information for a warrant. They got a pat on the back for a job well done. Just recently, we had a deputy, I think his name was Booth. He was caught completely lying on a car crash. Back a few more years, our Sheriff was involved a massive coverup of the death of two black deputies. He hid the report for years. This is only the beginning. The Sheriff has been involved in falsification of documents and his underling, Chief Deputy Michael Gauger, has been personally involved in an overtime scandal to steal money from the Sheriff’s Office. Does our Sheriff know about this behavior? Of course he does. We have even had a judge outright accuse my agency of committing fraud upon the court in a public hearing. She was one of the ones who saw through all the lying and covering up our department does to get away with the internal crime committed by deputies on a regular basis,” he said.
Palm Beach County Sheriff’s Office is no special police department, and this officer is not just a bad apple. The problems that are discussed in this interview are systematic, and they occur in every town across the country.
Just this week, we exposed a police department in Missouri whose officers were forced to make arrests or faced losing their job. This leads to otherwise innocent people being charged on a regular basis.
Also this week, the Free Thought Project conducted a report to show what happens to cops who try to expose this corruption. Several officers within the Chicago police department were threatened with “going home in a casket” for exposing this same vile practice within their ranks. via FreeThoughtProject
AMERICAN AND BRITISH Leaked: NSA Spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.
The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.
The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.
In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
As part of the covert operations against Gemalto, spies from GCHQ — with support from the NSA — mined the private communications of unwitting engineers and other company employees in multiple countries.
Gemalto was totally oblivious to the penetration of its systems — and the spying on its employees. “I’m disturbed, quite concerned that this has happened,” Paul Beverly, a Gemalto executive vice president, told The Intercept. “The most important thing for me is to understand exactly how this was done, so we can take every measure to ensure that it doesn’t happen again, and also to make sure that there’s no impact on the telecom operators that we have served in a very trusted manner for many years. What I want to understand is what sort of ramifications it has, or could have, on any of our customers.” He added that “the most important thing for us now is to understand the degree” of the breach.
Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
THE MASSIVE KEY THEFT IS “BAD NEWS FOR PHONE SECURITY. REALLY BAD NEWS.”
Beverly said that after being contacted by The Intercept, Gemalto’s internal security team began on Wednesday to investigate how their system was penetrated and could find no trace of the hacks. When asked if the NSA or GCHQ had ever requested access to Gemalto-manufactured encryption keys, Beverly said, “I am totally unaware. To the best of my knowledge, no.”
According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto.
Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
The Mobile Handset Exploitation Team (MHET), whose existence has never before been disclosed, was formed in April 2010 to target vulnerabilities in cellphones. One of its main missions was to covertly penetrate computer networks of corporations that manufacture SIM cards, as well as those of wireless network providers. The team included operatives from both GCHQ and the NSA.
While the FBI and other U.S. agencies can obtain court orders compelling U.S.-based telecom companies to allow them to wiretap or intercept the communications of their customers, on the international front this type of data collection is much more challenging. Unless a foreign telecom or foreign government grants access to their citizens’ data to a U.S. intelligence agency, the NSA or CIA would have to hack into the network or specifically target the user’s device for a more risky “active” form of surveillance that could be detected by sophisticated targets. Moreover, foreign intelligence agencies would not allow U.S. or U.K. spy agencies access to the mobile communications of their heads of state or other government officials.
“It’s unbelievable. Unbelievable,” said Gerard Schouw, a member of the Dutch Parliament, when told of the spy agencies’ actions. Schouw, the intelligence spokesperson for D66, the largest opposition party in the Netherlands, told The Intercept, “We don’t want to have the secret services from other countries doing things like this.” Schouw added that he and other lawmakers will ask the Dutch government to provide an official explanation and to clarify whether the country’s intelligence services were aware of the targeting of Gemalto, whose official headquarters is in Amsterdam.
Last November, the Dutch government proposed an amendment to its constitution to include explicit protection for the privacy of digital communications, including those made on mobile devices. “We have, in the Netherlands, a law on the [activities] of secret services. And hacking is not allowed,” Schouw said. Under Dutch law, the interior minister would have to sign off on such operations by foreign governments’ intelligence agencies. “I don’t believe that he has given his permission for these kind of actions.”
The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
The Chicago police department operates an off-the-books interrogation compound, rendering Americans unable to be found by family or attorneys while locked inside what lawyers say is the domestic equivalent of a CIA black site.
The facility, a nondescript warehouse on Chicago’s west side known as Homan Square, has long been the scene of secretive work by special police units. Interviews with local attorneys and one protester who spent the better part of a day shackled in Homan Square describe operations that deny access to basic constitutional rights.
Alleged police practices at Homan Square, according to those familiar with the facility who spoke out to the Guardian after its investigation into Chicago police abuse, include:
Keeping arrestees out of official booking databases.
Beating by police, resulting in head wounds.
Shackling for prolonged periods.
Denying attorneys access to the “secure” facility.
Holding people without legal counsel for between 12 and 24 hours, including people as young as 15.
At least one man was found unresponsive in a Homan Square “interview room” and later pronounced dead.
Brian Jacob Church, a protester known as one of the “Nato Three”, was held and questioned at Homan Square in 2012 following a police raid. Officers restrained Church for the better part of a day, denying him access to an attorney, before sending him to a nearby police station to be booked and charged.
“Homan Square is definitely an unusual place,” Church told the Guardian on Friday. “It brings to mind the interrogation facilities they use in the Middle East. The CIA calls them black sites. It’s a domestic black site. When you go in, no one knows what’s happened to you.”
The secretive warehouse is the latest example of Chicago police practices that echo the much-criticized detention abuses of the US war on terrorism. While those abuses impacted people overseas, Homan Square – said to house military-style vehicles, interrogation cells and even a cage – trains its focus on Americans, most often poor, black and brown.
Unlike a precinct, no one taken to Homan Square is said to be booked. Witnesses, suspects or other Chicagoans who end up inside do not appear to have a public, searchable record entered into a database indicating where they are, as happens when someone is booked at a precinct. Lawyers and relatives insist there is no way of finding their whereabouts. Those lawyers who have attempted to gain access to Homan Square are most often turned away, even as their clients remain in custody inside.
“It’s sort of an open secret among attorneys that regularly make police station visits, this place – if you can’t find a client in the system, odds are they’re there,” said Chicago lawyer Julia Bartmes.
Chicago civil-rights attorney Flint Taylor said Homan Square represented a routinization of a notorious practice in local police work that violates the fifth and sixth amendments of the constitution.
“This Homan Square revelation seems to me to be an institutionalization of the practice that dates back more than 40 years,” Taylor said, “of violating a suspect or witness’ rights to a lawyer and not to be physically or otherwise coerced into giving a statement.”
Much remains hidden about Homan Square. The Chicago police department did not respond to the Guardian’s questions about the facility. But after the Guardian published this story, the department provided a statement insisting, without specifics, that there is nothing untoward taking place at what it called the “sensitive” location, home to undercover units.
“CPD [Chicago police department] abides by all laws, rules and guidelines pertaining to any interviews of suspects or witnesses, at Homan Square or any other CPD facility. If lawyers have a client detained at Homan Square, just like any other facility, they are allowed to speak to and visit them. It also houses CPD’s Evidence Recovered Property Section, where the public is able to claim inventoried property,” the statement said, something numerous attorneys and one Homan Square arrestee have denied.
“There are always records of anyone who is arrested by CPD, and this is not any different at Homan Square,” it continued.
The Chicago police statement did not address how long into an arrest or detention those records are generated or their availability to the public. A department spokesperson did not respond to a detailed request for clarification.
When a Guardian reporter arrived at the warehouse on Friday, a man at the gatehouse outside refused any entrance and would not answer questions. “This is a secure facility. You’re not even supposed to be standing here,” said the man, who refused to give his name.
A former Chicago police superintendent and a more recently retired detective, both of whom have been inside Homan Square in the last few years in a post-police capacity, said the police department did not operate out of the warehouse until the late 1990s.
But in detailing episodes involving their clients over the past several years, lawyers described mad scrambles that led to the closed doors of Homan Square, a place most had never heard of previously. The facility was even unknown to Rob Warden, the founder of Northwestern University Law School’s Center on Wrongful Convictions, until the Guardian informed him of the allegations of clients who vanish into inherently coercive police custody.
“They just disappear,” said Anthony Hill, a criminal defense attorney, “until they show up at a district for charging or are just released back out on the street.”
‘They were held incommunicado for much longer than I think should be permitted in this country – anywhere – but particularly given the strong constitutional rights afforded to people who are being charged with crimes,” said Sarah Gelsomino, the lawyer for Brian Jacob Church. Photograph: Phil Batta/Guardian
Jacob Church learned about Homan Square the hard way. On May 16 2012, he and 11 others were taken there after police infiltrated their protest against the Nato summit. Church says officers cuffed him to a bench for an estimated 17 hours, intermittently interrogating him without reading his Miranda rights to remain silent. It would take another three hours – and an unusual lawyer visit through a wire cage – before he was finally charged with terrorism-related offenses at the nearby 11th district station, where he was made to sign papers, fingerprinted and photographed.
In preparation for the Nato protest, Church, who is from Florida, had written a phone number for the National Lawyers Guild on his arm as a precautionary measure. Once taken to Homan Square, Church asked explicitly to call his lawyers, and said he was denied.
“Essentially, I wasn’t allowed to make any contact with anybody,” Church told the Guardian, in contradiction of a police guidance on permitting phone calls and legal counsel to arrestees.
Church’s left wrist was cuffed to a bar behind a bench in windowless cinderblock cell, with his ankles cuffed together. He remained in those restraints for about 17 hours.
“I had essentially figured, ‘All right, well, they disappeared us and so we’re probably never going to see the light of day again,’” Church said.
The Disappeared
Brian Church, Jared Chase and Brent Vincent Betterly, known as the ‘Nato Three’
Though the raid attracted major media attention, a team of attorneys could not find Church through 12 hours of “active searching”, Sarah Gelsomino, Church’s lawyer, recalled. No booking record existed. Only after she and others made a “major stink” with contacts in the offices of the corporation counsel and Mayor Rahm Emanuel did they even learn about Homan Square.
They sent another attorney to the facility, where he ultimately gained entry, and talked to Church through a floor-to-ceiling chain-link metal cage. Finally, hours later, police took Church and his two co-defendants to a nearby police station for booking.
After serving two and a half years in prison, Church is currently on parole after he and his co-defendants were found not guilty in 2014 of terrorism-related offenses but guilty of lesser charges of possessing an incendiary device and the misdemeanor of “mob action”.
It’s almost like they throw a black bag over your head and make you disappear for a day or two
-Brian Jacob Church
The access that Nato Three attorneys received to Homan Square was an exception to the rule, even if Jacob Church’s experience there was not.
Three attorneys interviewed by the Guardian report being personally turned away from Homan Square between 2009 and 2013 without being allowed access to their clients. Two more lawyers who hadn’t been physically denied described it as a place where police withheld information about their clients’ whereabouts. Church was the only person who had been detained at the facility who agreed to talk with the Guardian: their lawyers say others fear police retaliation.
One man in January 2013 had his name changed in the Chicago central bookings database and then taken to Homan Square without a record of his transfer being kept, according to Eliza Solowiej of Chicago’s First Defense Legal Aid. (The man, the Guardian understands, wishes to be anonymous; his current attorney declined to confirm Solowiej’s account.) She found out where he was after he was taken to the hospital with a head injury.
“He said that the officers caused his head injuries in an interrogation room at Homan Square. I had been looking for him for six to eight hours, and every department member I talked to said they had never heard of him,” Solowiej said. “He sent me a phone pic of his head injuries because I had seen him in a police station right before he was transferred to Homan Square without any.”
Bartmes, another Chicago attorney, said that in September 2013 she got a call from a mother worried that her 15-year-old son had been picked up by police before dawn. A sympathetic sergeant followed up with the mother to say her son was being questioned at Homan Square in connection to a shooting and would be released soon. When hours passed, Bartmes traveled to Homan Square, only to be refused entry for nearly an hour.
An officer told her, “Well, you can’t just stand here taking notes, this is a secure facility, there are undercover officers, and you’re making people very nervous,” Bartmes recalled. Told to leave, she said she would return in an hour if the boy was not released. He was home, and not charged, after “12, maybe 13” hours in custody.
On February 2, 2013, John Hubbard was taken to Homan Square. Hubbard never walked out. The Chicago Tribune reported that the 44-year old was found “unresponsive inside an interview room”, and pronounced dead. After publication, the Cook County medical examiner told the Guardian that the cause of death was determined to be heroin intoxication.
Homan Square is hardly concerned exclusively with terrorism. Several special units operate outside of it, including the anti-gang and anti-drug forces. If police “want money, guns, drugs”, or information on the flow of any of them onto Chicago’s streets, “they bring them there and use it as a place of interrogation off the books,” Hill said.
‘The real danger in allowing practices like Guantanamo or Abu Ghraib is the fact that they always creep into other aspects,’ criminologist Tracy Siska told the Guardian. Photograph: Chandler West/Guardian
A former Chicago detective and current private investigator, Bill Dorsch, said he had not heard of the police abuses described by Church and lawyers for other suspects who had been taken to Homan Square. He has been permitted access to the facility to visit one of its main features, an evidence locker for the police department. (“I just showed my retirement star and passed through,” Dorsch said.)
Transferring detainees through police custody to deny them access to legal counsel, would be “a career-ender,” Dorsch said. “To move just for the purpose of hiding them, I can’t see that happening,” he told the Guardian.
Richard Brzeczek, Chicago’s police superintendent from 1980 to 1983, who also said he had no first-hand knowledge of abuses at Homan Square, said it was “never justified” to deny access to attorneys.
“Homan Square should be on the same list as every other facility where you can call central booking and say: ‘Can you tell me if this person is in custody and where,’” Brzeczek said.
“If you’re going to be doing this, then you have to include Homan Square on the list of facilities that prisoners are taken into and a record made. It can’t be an exempt facility.”
Indeed, Chicago police guidelines appear to ban the sorts of practices Church and the lawyers said occur at Homan Square.
A directive titled “Processing Persons Under Department Control” instructs that “investigation or interrogation of an arrestee will not delay the booking process,” and arrestees must be allowed “a reasonable number of telephone calls” to attorneys swiftly “after their arrival at the first place of custody.” Another directive, “Arrestee and In-Custody Communications,” says police supervisors must “allow visitation by attorneys.”
Attorney Scott Finger said that the Chicago police tightened the latter directive in 2012 after quiet complaints from lawyers about their lack of access to Homan Square. Without those changes, Church’s attorneys might not have gained entry at all. But that tightening – about a week before Church’s arrest – did not prevent Church’s prolonged detention without a lawyer, nor the later cases where lawyers were unable to enter.
The combination of holding clients for long periods, while concealing their whereabouts and denying access to a lawyer, struck legal experts as a throwback to the worst excesses of Chicago police abuse, with a post-9/11 feel to it.
On a smaller scale, Homan Square is “analogous to the CIA’s black sites,” said Andrea Lyon, a former Chicago public defender and current dean of Valparaiso University Law School. When she practiced law in Chicago in the 1980s and 1990s, she said, “police used the term ‘shadow site’” to refer to the quasi-disappearances now in place at Homan Square.
I’ve never known any kind of organized, secret place where they go and hold somebody before booking for hours and hours
James Trainum, former detective, Washington DC
“Back when I first started working on torture cases and started representing criminal defendants in the early 1970s, my clients often told me they’d been taken from one police station to another before ending up at Area 2 where they were tortured,” said Taylor, the civil-rights lawyer most associated with pursuing the notoriously abusive Area 2 police commander Jon Burge. “And in that way the police prevent their family and lawyers from seeing them until they could coerce, through torture or other means, confessions from them.”
Police often have off-site facilities to have private conversations with their informants. But a retired Washington DC homicide detective, James Trainum, could not think of another circumstance nationwide where police held people incommunicado for extended periods.
“I’ve never known any kind of organized, secret place where they go and just hold somebody before booking for hours and hours and hours. That scares the hell out of me that that even exists or might exist,” said Trainum, who now studies national policing issues, to include interrogations, for the Innocence Project and the Constitution Project.
Regardless of departmental regulations, police frequently deny or elide access to lawyers even at regular police precincts, said Solowiej of First Defense Legal Aid. But she said the outright denial was exacerbated at Chicago’s secretive interrogation and holding facility: “It’s very, very rare for anyone to experience their constitutional rights in Chicago police custody, and even more so at Homan Square,” Solowiej said.
Church said that one of his more striking memories of Homan Square was the “big, big vehicles” police had inside the complex that “look like very large MRAPs that they use in the Middle East.”
Cook County, home of Chicago, has received some 1,700 pieces of military equipment from a much-criticized Pentagon program transferring military gear to local police. It includes a Humvee, according to a local ABC News report.
Tracy Siska, a criminologist and civil-rights activist with the Chicago Justice Project, said that Homan Square, as well as the unrelated case of ex-Guantánamo interrogator and retired Chicago detective Richard Zuley, showed the lines blurring between domestic law enforcement and overseas military operations.
“The real danger in allowing practices like Guantánamo or Abu Ghraib is the fact that they always creep into other aspects,” Siska said.
“They creep into domestic law enforcement, either with weaponry like with the militarization of police, or interrogation practices. That’s how we ended up with a black site in Chicago.”
There is often times a trade-off between security and convenience. With Home Hacks the more easily you can access your personal data, the easier someone else can too, making anything that you put online a potential target for hackers. A growing source of concern for many people is their home security and home automation systems.
Home automation is just starting to come into its own, with more home appliances having the capability to be networked, monitored, and controlled from your computer, phone, or other device. The collection of networked devices is commonly referred to as “the Internet of things” since we’re able to sync almost anything we’d like to the internet and, thus, each other. While home automation is not a new idea, it is only more recently that it has become mainstream and available to the masses while also having a more affordable price. This means you could be able to control many different aspects of your home from anywhere at any time. You can set your own schedules and preferences for things like lights, temperature, door locks, or a home security system.
However, along with the convenience of having all this control and information at your fingertips, there are vulnerabilities to worry about. Once your data is online, it becomes a potential target for hackers and malware. And now it isn’t just personal data there is also the threat of hackers being able to remotely shut down your home security system, or detect when you are not at home. Forbes recently reported on a series of incidents where Insteon smart home systems were installed with no password protection, allowing anyone to easily gain control of a complete stranger’s home.
Another security flaw with some of these devices, like the Mi Casa Verde MIOS VeraLite, is that once connected to a WiFi network, the device assumes anyone is an authorized user. So potential hackers need only connect to someone’s WiFi network (something even a novice could do) to gain control of the house.
These stories highlight the need to take security more seriously, both on the part of manufacturers developing more robust security features, and users taking advantage of these features. For those questioning the security of your home automation, it is important to make sure that any home automation devices are password protected (with 128-bit encryption if possible), and that your home WiFi network and router are also securely behind strong passwords. There are some companies like ADT that monitor these things for you, but if you’re using a build as you go, DIY type system like Wink, you’ll need to pay special attention to this. Make sure any firmware or software updates are installed promptly when security flaws are found and patched. Never use a default password. In fact, it is good practice to periodically change your passwords. With a bit of care, you can safely enjoy the convenience of an automated home.
Tying into the concept of a hyper-connected home, like Home Hacks, and bring some of the same concerns, is the growing technology behind smart grids and smart meters. The so-called smart meter lets consumers see how much power is being used in their homes on an hourly basis. These meters are connected to the smart grid, which allows power companies to adjust prices based on demand and supply, while the added information lets consumers adjust their consumption habits. But there are privacy concerns about utility companies collecting massive amounts of data about their customers and their habits. Similar to hacking a home automation system, if hackers obtained data from a smart meter they could potentially gather personal information as well, determine things like when the house is empty, or even run up fake charges shut down the power.
In May of 2014, the White House released a report called “Big Data: Seizing Opportunities, Preserving Values” which recognized the dangers of all this data being collected, and the need to protect privacy. Currently, the major federal legislation regarding smart grids is the Energy Independence and Security Act of 2007, which created various committees and councils to establish standards and protocols for upgrading to smart grids. Several states have passed their own laws to encourage smart grid development, including California, Maryland, and Illinois.
While smart meters have been touted as a way for consumers to save money on energy bills while helping the energy system as a whole run more efficiently, the two way communication the smart meters permit, the health risks they present, and the lack of demonstrated savings or efficiency increases for many who are using them, have some commentators speculating that smart meters are more trouble than they’re worth. On top of this there are no laws against keeping the government or utilities companies away from personal data obtained through these devices (not that laws would stop them from doing so anyway), and thus no protection for citizens. Home Hacks.
Since they’re inherently controlled by the utilities, smart meters seem highly unlikely to be a secure solution for the average homeowner. Your best bet to get the most out of a smart home and both understand and reduce your energy costs is to stay away from smart meters altogether, and use a home automation system to help control your energy usage – just make sure that it’s a system that you can harden against outside intrusion.
NSA Spy Program A federal judge ruled in favor of the National Security Agency NSA Spy Program in a key surveillance case on Tuesday, dismissing a challenge which claimed the government’s spying operations were groundless and unconstitutional.
Filed in 2008 by the Electronic Frontier Foundation, the lawsuit, Jewel v. NSA, aimed to end the agency’s unwarranted surveillance of U.S. citizens, which the consumer advocacy group said violated the 4th Amendment.
The lawsuit also implicated AT&T in the operations, alleging that the phone company “routed copies of Internet traffic to a secret room in San Francisco controlled by the NSA.” That charge was based off of a 2006 document leak by former AT&T technician and whistleblower Mark Klein, who disclosed a collection program between the company and the NSA that sent AT&T user metadata to the intelligence agency.
US District Judge Jeffrey White on Tuesday denied a partial summary judgment motion to the EFF and granted a cross-motion to the government, dismissing the case without a trial. In his order, White said the plaintiff, Carolyn Jewel, an AT&T customer, was unable to prove she was being targeted for surveillance—and that if she could, “any possible defenses would require impermissible disclosure of state secret information.” NSA Spy Program
Offering his interpretation of the decision, EFF senior staff attorney David Greene explained in a blog post:
Agreeing with the government, the court found that the plaintiffs lacked “standing” to challenge the constitutionality of the program because they could not prove that the surveillance occurred as plaintiffs’ alleged. Despite the judge’s finding that he could not adjudicate the standing issue without “risking exceptionally grave damage to national security,” he expressed frustration that he could not fully explain his analysis and reasoning because of the state secrets issue.
The EFF later Tweeted:
NSA Internet surveillance is so secret, the court refused to even consider whether it’s constitutional.
Calling the ruling “frustrating,” Greene said the EFF “disagree[s] with the court’s decision and it will not be the last word on the constitutionality of the government’s mass surveillance of the communications of ordinary Americans.”Jewel v. NSA is the EFF’s longest-running case. Despite the decision, the EFF said it would not back down from its pursuit of justice and was careful to note that the ruling did not mean that the NSA’s operations were legal.
“Judge White’s ruling does not end our case. The judge’s ruling only concerned Upstream Internet surveillance, not the telephone records collection nor other mass surveillance processes that are also at issue in Jewel,” said Kurt Opsahl, deputy legal council at EFF. “We will continue to fight to end NSA mass surveillance.”
The issue is similar to the 2013 Supreme Court decision in Clapper v. Amnesty International, which found that plaintiffs who had reason to believe they were being spied on could not provide substantial proof of surveillance, and thus could not bring their case. NSA Spy Program
Jewel v. NSA stems from the EFF’s 2006 case, Hepting v. AT&T, which was dismissed in 2009 after Congress, including then-Senator Barack Obama, voted to give telecommunications companies immunity from such lawsuits.
“It would be a travesty of justice if our clients are denied their day in court over the ‘secrecy’ of a program that has been front-page news for nearly a decade,” Opsahl added.
Charlie Hebdo As the dust settles from this week’s terror extravaganza in France, more loose ends are turning up (or being tied up), with this latest bizarre bombshell which is already fueling speculation as to the covert nature of theCharlie Hebdo false flag affair.
A police commissioner from Limoges, France, HelricFredou,aged 45 (photo, below), turned up dead from a gun shot to the head on Thursday amid the Charlie Hebdo affair. A high-ranking official within the French law enforcement command-and-control structure, Fredou was also a former deputy directorof the regionalpoliceservice.
According France 3, his body was “found by a colleague” at approximately 1am Thursday – only hours after the initial Paris attack.
At the time of his death, police claim to have not known the reason for his alleged suicide. This was reflected in their official statements to the media: “It is unknownat this timethe reasons forhis actions”. However, a back story appears to have been inserted simultaneously, most likely from the very same police media liaisons, who then told the press that Fredou was ‘depressed and overworked’. For any law enforcement officer in France, it would seem rather odd that anyone would want to miss the biggest single terror event in the century, or history in the making, as it were.
Here is a link to the original report in the French media, which confirms that Commissioner Fredou was indeed working on the Charlie Hebdo case:
“TheFredouCommissioner, like all agentsSRPJ,workedyesterdayon the caseof the massacreat the headquarters ofCharlieHebdo.In particular, hewas investigatingthe family ofone of the victims. He killed himselfbeforecompleting its report. A psychological ‘cell’was set upin thepolice station.”
EDITOR’S NOTE: It is not yet known to 21WIRE exactly how the fatal gun shot occurred, but if any other past political and high-profile ‘suicided’ cases are anything to go by, authorities will claim that this victim either shot himself in the back of the head, with his non-shooting hand. In addition, if that were the case, there would also be a lack of gun powder burns on the hands according to the autopsy.
UK-based investigative reporter Morris108, interviews ‘Phil in France’ regarding this new development:
Even more bizarrely, an almost identical event took place just over one year earlier, November 2013 in Limoges, when the number 3 ranked SRPJ officer had killed himself in similar circumstances, with his weapon in the police hotel. Allegedly, his colleague discovered his body. The prosecution ruled that case was a suicide too, and the police officer had left a suicide note to his family in which he expressed “personal reasons” for his surprising action. Stay tuned for more updates on this story at 21WIRE.
Sputnik News
Police commissioner, who had been investigating the attack on the Charlie Hebdo magazine committed suicide with his service gun on Thursday night.
Police commissioner Helric Fredou, who had been investigating the attack on the French weekly satirical magazine Charlie Hebdo, committed suicide in his office. The incident occurred in Limoges, the administrative capital of the Limousin region in west-central France, on Thursday night, local media France 3 reports.
Helric Fredou, 45, suffered from ‘depression’ and experienced ‘burn out’ [according to the official statement]. Shortly before committing suicide, he met with the family of a victim of the Charlie Hebdo attack and killed himself preparing the report.
Fredou began his career in 1997 as a police officer at the regional office of the judicial police of Versailles. Later he returned to Limoges, his hometown. Since 2012 he had been the deputy director of the regional police service.
“We are all shocked. Nobody was ready for such developments”, a representative of the local police union told reporters.
On January 7, 2015, two gunmen burst into the editorial office of Charlie Hebdo magazine, known for issuing cartoons, ridiculing Islam. The [suspected] attackers, later identified as brothers Said and Cherif Kouachi, killed 12 people and injured 11, and escaped from the scene. Following two days of nationwide manhunt, the suspects were killed on Friday by French police some 20 miles northeast of Paris.
Isreal is Getting Away with Murder On January 28th a barrage of Israeli artillery fire struck near the South Lebanese village of Ghajar, killing United Nations peacekeeper Francisco Javier Soria. Soria, 36, was a Spanish citizen deployed with the United Nations Interim Force in Lebanon, a peacekeeping mission tasked with maintaining the ceasefire between Israel and Lebanon in the occupied Golan Heights.
His death came in the midst of a recent flare-up of violence between Israel and Hezbollah, and Spain’s ambassador to the United Nations placed blame for the incident upon the Israeli Defence Forces, citing an “escalation of violence [which] came from the Israeli side.” The exact circumstances which led to Soria’s death are still under investigation; Israeli officials expressed condolences for his death and said their forces were responding to fire in the area.
What is clear however is that Israeli forces have been killing an alarming number of United Nations personnel in the course of their recent military operations — and that UN officials have vociferously criticized the attacks, sometimes saying they appeared deliberate.
This past summer in the Gaza Strip, Israel forces attacked seven different schools run by the United Nations Relief and Works Agency, schools that had been serving as temporary shelters for the displaced population of the territory. Despite repeated warnings, condemnations and entreaties, United Nations targets were hit again and again by Israeli airstrikes and shelling during the conflict.
As many of 46 civilians are believed to have been killed in these attacks, as well as eleven UNRWA staff members. One particularly lethal strike on a UN-administered elementary school in Beit Hanoun killed 15 civilians and wounded 200 others. That attack reportedly sent shrapnel flying into crowds of families who had been awaiting transportation in the school’s playground.
In the wake of these and other bombings, UNRWA chief Chris Gunness broke down in tears during a live television interview while decrying the “[wholesale] denial” of Palestinian rights by Israeli forces during the operation.
Instead of offering contrition for these deadly incidents, Israeli officials continued to justify them with unsubstantiated, and vigorously deniedallegations that UNRWA schools were near sources of rocket fire and were thus simply caught in the crossfire. An investigation by Human Rights Watch looking at several of Israel’s attacks on these schools said that they, “did not appear to target a military objective or were otherwise unlawfully indiscriminate.”
Indeed, the idea that Israel’s repeated bombing of these schools may have simply been “mistakes” is difficult to countenance.
In one shelling incident which targeted a school in Rafah, United Nations personnel notified the IDF on 33 separate occasions that the facility was being used as a shelter for civilians. United Nations Secretary General Ban Ki-Moon publicly denounced the attack as a “moral outrage and a criminal act”, adding that “nothing is more shameful than attacking sleeping children”.
Even the United States, normally Israel’s most uncritical defender on the world stage, was moved to state that it was was “appalled” by what it described as a “disgraceful” attack on the school.
As egregious as these incidents were however, they are far from the first time in recent years in which Israel has targeted United Nations operations for shelling and airstrikes.
During the 2008-2009 Gaza War, Israeli forces targeted not only UNRWA schools (one of them pictured above) but even the compound housing the headquarters of the agency in the Gaza Strip. That attack, which involved the use of illegal white phosphorus munitions, destroyed tons of vital food aid and medical supplies which the large refugee population of the territory relied upon for basic sustenance.
Isreal is Getting Away with Murder At the time, Israeli officials claimed that they had been responding to rocket fire which had emanated from the compound, a claim which UN officials described as “total nonsense”.
In another notorious incident from Israel’s 2006 war with Lebanon, Israeli aircraft and artillery bombed a single United Nations outpost for upwards of six hours, despite receiving repeated pleas during this time from UN officials to cease fire. Four peacekeepers were killed in what then UN Secretary General Kofi Annan described as an “apparently deliberate” act.
Israel has long had a contentious relationship with United Nations agencies operating in the Middle East. Israeli officials have in past accused UN personnel of offering shelter to militants (a charge the organization strenuously denies), and has also more broadly suggested that the organization is responsible for prolonging the Israel-Palestine conflict due to its provision of refugee status and services to displaced Palestinians and their descendants.
In the wake of the most recent Gaza conflict, some Israeli political figures even called for UNRWA to formally be recognized as a “hostile organization”, an outrageous suggestion which nevertheless provides some insight into the hostility with which the UN is often viewed today in official circles.
Israel’s repeated bombing and shelling of United Nations positions in the region comes against this backdrop, with Soria’s death being only the latest incident in which Israeli forces have been responsible for killing UN personnel. To date, no one has been held legally responsible for any of these attacks.
By way of contrast, imagine the response if Hamas or Hezbollah had repeatedly and unrepentantly killed United Nations officials in the course of their conflict with Israel. Imagine if United Nations schools housing thousands of displaced civilians been struck time and again by militant groups, who in the wake of the bloodshed either denied responsibility outright or sought to justify their actions.
Furthermore, imagine if these attacks inflicted widespread civilian casualties and came despite repeated pleas and entreaties from UN officials to cease fire.
The outcry would rightly be deafening, yet this is exactly what Israel has done again and again in its conflicts in Lebanon and the Gaza Strip without consequence. As a result of this burgeoning culture of impunity, partly enabled by the unprecedented diplomatic protection offered to Israeli officials by the United States, UN personnel and facilities have increasingly been subject to deadly violence from the Israeli military.
As Pierre Krähenbühl, commissioner-general of UNRWA, stated in the aftermath of a deadly bombing against a UN-administered school in Gaza this past summer, “this [attack] is an affront to all of us, a source of universal shame. Today, the world stands disgraced.”
How to identify CIA The operations of secret intelligence agencies aiming at the manipulation of public opinion generally involve a combination of cynical deception with the pathetic gullibility of the targeted populations. There is ample reason to believe that the case of Edward Joseph Snowden fits into this pattern. We are likely dealing here with a limited hangout operation, in which carefully selected and falsified documents and other materials are deliberately revealed by an insider who pretends to be a fugitive rebelling against the excesses of some oppressive or dangerous government agency. But the revelations turn out to have been prepared with a view to shaping the public consciousness in a way which is advantageous to the intelligence agency involved. At the same time, gullible young people can be duped into supporting a personality cult of the leaker, more commonly referred to as a “whistleblower.”
A further variation on the theme can be the attempt of the sponsoring intelligence agency to introduce their chosen conduit, now posing as a defector, into the intelligence apparatus of a targeted foreign government. In this case, the leaker or whistleblower attains the status of a triple agent. Any attempt to educate public opinion about the dynamics of limited hangout operations inevitably collides with the residue left in the minds of millions by recent successful examples of this technique. It will be hard for many to understand Snowden, precisely because they will insist on seeing him as the latest courageous example in a line of development which includes Daniel Ellsberg and Julian Assange, both still viewed by large swaths of naïve opinion as authentic challengers of oppressive government. This is because the landmark limited hangout operation at the beginning of the current post-Cold War era was that of Daniel Ellsberg and the Pentagon papers, which laid the groundwork for the CIA’s Watergate attack on the Nixon administration, and more broadly, on the office of the presidency itself. More recently, we have had the case of Assange and Wikileaks.
Using these two cases primarily, we can develop a simple typology of the limited hangout operation which can be of significant value to those striving to avoid the role of useful idiots amidst the current cascade of whistleblowers and limited hangout artists. In this analysis, we should also recall that limited hangouts have been around for a very long time. In 1620 Fra Paolo Sarpi, the dominant figure of the Venetian intelligence establishment of his time, advised the Venetian senate that the best way to defeat anti-Venetian propaganda was indirectly. He recommended the method of saying something good about a person or institution while pretending to say something bad. An example might be criticizing a bloody dictator for beating his dog – the real dimensions of his crimes are thus totally underplayed.
Limited hangout artists are instant media darlings
The most obvious characteristic of the limited hangout operative is that he or she immediately becomes the darling of the controlled corporate media. In the case of Daniel Ellsberg, his doctored set of Pentagon papers were published by the New York Times, the Washington Post, the Boston Globe, and eventually by a consortium totaling seventeen corporate newspapers. These press organs successfully argued the case for publication all the way to the United States Supreme Court, where they prevailed against the Nixon administration. Needless to say, surviving critics of the Warren Commission, and more recent veterans of the 9/11 truth movement, and know very well that this is emphatically not the treatment reserved for messengers whose revelations are genuinely unwelcome to the Wall Street centered US ruling class. These latter are more likely to be slandered, vilified and dragged through the mud, or, even more likely, passed over in complete silence and blacked out. In extreme cases, they can be kidnapped, renditioned or liquidated.
Cass Sunstein present at the creation of Wikileaks
As for Assange and Wikileaks, the autumn 2010 document dump was farmed out in advance to five of the most prestigious press organs in the world, including the New York Times, the London Guardian, El Pais of Madrid, Der Spiegel of Hamburg, and Le Monde of Paris. This was the Assange media cartel, made up of papers previously specialized in discrediting 9/11 critics and doubters. But even before the document dumps had begun, Wikileaks had received a preemptive endorsement from none other than the notorious totalitarian Cass Sunstein, later an official of the Obama White House, and today married to Samantha Power, the author of the military coup that overthrew Mubarak and currently Obama’s pick for US ambassador to the United Nations. Sunstein is infamous for his thesis that government agencies should conduct covert operations using pseudo-independent agents of influence for the “cognitive infiltration of extremist groups” – meaning of those who reject in the establishment view of history and reality.Sunstein’s article entitled “Brave New WikiWorld” was published in the Washington Post of February 24, 2007, and touted the capabilities of Wikileaks for the destabilization of China.
Perhaps the point of Ed Snowden’s presence in Hong Kong is to begin re-targeting these capabilities back towards the original anti-Chinese plan. Snowden has already become a media celebrity of the first magnitude. His career was launched by the US left liberal Glenn Greenwald, now writing for the London Guardian, which expresses the viewpoints of the left wing of the British intelligence community. Thus, the current scandal is very much Made in England, and may benefit from inputs from the British GCHQ of Cheltenham, the Siamese twin of the NSA at Fort Meade, Maryland. During the days of his media debut, it was not uncommon to see a controlled press organ like CNN dedicating one third of every broadcast hour of air time to the birth, life, and miracles of Ed Snowden.
Another suspicious and tell-tale endorsement for Snowden comes from the former State Department public diplomacy asset Norman Solomon. Interviewed on RT, Solomon warmly embraced the Snowden Project and assured his viewers that the NSA material dished up by the Hong Kong defector used reliable and authentic. Solomon was notorious ten years ago as a determined enemy of 9/11 truth, acting as a border guard in favor of the Bush administration/neocon theory of terrorism.
Limited hangouts contain little that is new
Another important feature of the limited hangout operation if that the revelations often contain nothing new, but rather repackage old wine in new bottles. In the case of Ellsberg’s Pentagon Papers, very little was revealed which was not already well known to a reader of Le Monde or the dispatches of Agence France Presse. Only those whose understanding of world affairs had been filtered through the Associated Press, CBS News, the New York Times, and the Washington Post found any of Ellsberg’s material a surprise. Of course, there was method in Ellsberg’s madness. The Pentagon papers allegedly derived from an internal review of the decision-making processes leading to the Vietnam War, conducted after 1967-68 under the supervision of Morton Halperin and Leslie Gelb. Ellsberg, then a young RAND Corporation analyst and militant warmonger, was associated with this work.
Upon examination, we find that the Pentagon papers tend to cover up such CIA crimes as the mass murder mandated under Operation Phoenix, and the massive CIA drug running associated with the proprietary airline Air America. Rather, when atrocities are in question, the US Army generally receives the blame. Politicians in general, and President John F. Kennedy in particular, are portrayed in a sinister light – one might say demonized. No insights whatever into the Kennedy assassination are offered. This was a smelly concoction, and it was not altogether excluded that the radicalized elements of the Vietnam era might have carried the day in denouncing the entire package as a rather obvious fabrication. But a clique around Noam Chomsky and Howard Zinn loudly intervened to praise the quality of the exposé and to lionize Ellsberg personally as a new culture hero for the Silent Generation. From that moment on, the careers of Chomsky and Zinn soared. Pentagon papers skeptics, like the satirical comedian Mort Sahl, a supporter of the Jim Garrison investigation in New Orleans and a critic of the Warren Commission, faced the marginalization of their careers.
Notice also that the careers of Morton Halperin and Leslie Gelb positively thrived after they entrusted the Pentagon papers to Ellsberg, who revealed them. Ellsberg was put on trial in 1973, but all charges were dismissed after several months because of prosecutorial misconduct. Assange lived like a lord for many months in the palatial country house of an admirer in the East of England, and is now holed up in the Ecuadorian Embassy in London. He spent about 10 days in jail in December 2010.Assange first won credibility for Wikileaks with some chum in the form of a shocking film showing a massacre perpetrated by US forces in Iraq with the aid of drones. The massacre itself and the number of victims were already well known, so Assange was adding only the graphic emotional impact of witnessing the atrocity firsthand.
Limited hangouts reveal nothing about big issues like JFK, 9/11
Over the past century, there are certain large-scale covert operations which cast a long historical shadow, determining to some extent the framework in which subsequent events occur. These include the Sarajevo assassinations of 1914, the assassination of Rasputin in late 1916, Mussolini’s 1922 march on Rome, Hitler’s seizure of power in 1933, the assassination of French Foreign Minister Barthou in 1934, the assassination of President Franklin D. Roosevelt in 1945, in 1963 Kennedy assassination, and 9/11. A common feature of the limited hangout operations is that they offer almost no insights into these landmark events. In the Pentagon Papers, the Kennedy assassination is virtually a nonexistent event about which we learn nothing. As already noted, the principal supporters of Ellsberg were figures like Chomsky, whose hostility to JFK and profound disinterest in critiques of the Warren Commission were well-known.
As for Assange, he rejects any further clarification of 9/11. In July 2010, Assange told Matthew Bell of the Belfast Telegraph: “I’m constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud.” This is on top of Cass Sunstein’s demand for active covert measures to suppress and disrupt inquiries into operations like 9/11. Snowden’s key backers Glenn Greenwald and Norman Solomon have both compiled impressive records of evasion on 9/11 truth, with Greenwald specializing in the blowback theory.
The Damascus road conversions of limited hangout figures
Daniel Ellsberg started his career as a nuclear strategist of the Dr. Strangelove type working for the RAND Corporation. He worked in the Pentagon as an aide to US Secretary of Defense Robert McNamara. He then went to Vietnam, where he served as a State Department civilian assistant to CIA General Edward Lansdale. In 1967, he was back at RAND to begin the preparation of what would come to be known as the Pentagon papers. Ellsberg has claimed that his Damascus Road conversion from warmonger to peace angel occurred when he heard a speech from a prison-bound draft resister at Haverford College in August 1969. After a mental breakdown, Ellsberg began taking his classified documents to the office of Senator Edward Kennedy and ultimately to the New York Times. Persons who believe this fantastic story may be suffering from terminal gullibility.
In the case of Assange, it is harder to identify such a moment of conversion. Assange spent his childhood in the coils of MK Ultra, a complex of Anglo-American covert operations designed to investigate and implement mind control through the use of psychopharmaca and other means. Assange was a denizen of the Ann Hamilton-Byrne cult, in which little children that were subjected to aversive therapy involving LSD and other heavy-duty drugs. Assange spent his formative years as a wandering nomad with his mother incognito because of her involvement in a custody dispute. The deracinated Assange lived in 50 different towns and attended 37 different schools. By the age of 16, the young nihilist was active as a computer hacker using the screen name “Mendax,” meaning quite simply “The Liar.” (Assange’s clone Snowden uses the more marketable codename of “Verax,” the truth teller.) Some of Assange’s first targets were Nortel and US Air Force offices in the Pentagon. Assange’s chief mentor became John Young of Cryptome, who in 2007 denounced Wikileaks as a CIA front.
Snowden’s story, as widely reported, goes like this: he dropped out of high school and also dropped out of a community college, but reportedly was nevertheless later able to command a salary of between $120,000 and $200,000 per year; he claims this is because he is a computer wizard. He enlisted in the US Army in May 2004, and allegedly hoped to join the special forces and contribute to the fight for freedom in Iraq. He then worked as a low-level security guard for the National Security Agency, and then went on to computer security at the CIA, including a posting under diplomatic cover in Switzerland. He moved on to work as a private contractor for the NSA at a US military base in Japan. His last official job was for the NSA at the Kunia Regional SIGINT Operations Center in Hawaii. In May 2013, he is alleged to have been granted medical leave from the NSA in Hawaii to get treatment for epilepsy. He fled to Hong Kong, and made his revelations with the help of Greenwald and a documentary filmmaker Laura Poitras. Snowden voted for the nominally anti-war, ultra-austerity “libertarian” presidential candidate Ron Paul, and gave several hundred dollars to Paul’s campaign.
Snowden, like Ellsberg, thus started off as a warmonger but later became more concerned with the excesses of the Leviathan state. Like Assange, he was psychologically predisposed to the world of computers and cybernetics. The Damascus Road shift from militarist to civil libertarian remains unexplained and highly suspicious. Snowden is also remarkable for the precision of his timing. His first revelations, open secrets though they were, came on June 5, precisely today when the rebel fortress of Qusayr was liberated by the Syrian army and Hezbollah. At this point, the British and French governments were screaming at Obama that it was high time to attack Syria. The appearance of Snowden’s somewhat faded material in the London Guardian was the trigger for a firestorm of criticism against the Obama regime by the feckless US left liberals, who were thus unwittingly greasing the skids for a US slide into a general war in the Middle East.
More recently, Snowden came forward with allegations that the US and the British had eavesdropped on participants in the meeting of the G-20 nations held in Britain four years ago. This obviously put Obama on the defensive just as Cameron and Hollande were twisting his arm to start the Syrian adventure. By attacking the British GCHQ at Cheltenham, Britain’s equivalent to the NSA, perhaps Snowden was also seeking to obfuscate the obvious British sponsorship of his revelations. Stories about Anglo Americans spying on high profile guests are as old as the hills, and have included a British frogman who attempted an underwater investigation of the Soviet cruiser that brought party leader N. S. Khrushchev for a visit in the 1950s. Snowden has also accused the NSA of hacking targets in China — again, surely no surprise to experienced observers, but guaranteed to increase Sino-American tensions. As time passes, Snowden may emerge as more and more of a provocateur between Washington and Beijing.
Limited hangouts prepare large covert operations
Although, as we have seen, limited hangouts rarely illuminate the landmark covert operations which attempt to define an age, limited hangouts themselves do represent the preparation for future covert operations. In the case of the Pentagon papers, this and other leaks during the Indo-Pakistani Tilt crisis were cited by Henry Kissinger in his demand that President Richard Nixon take countermeasures to restore the integrity of state secrets. Nixon foolishly authorized the creation of a White House anti-leak operation known as the Plumbers. The intelligence community made sure that the Plumbers operation was staffed by their own provocateurs, people who never were loyal to Nixon but rather took their orders from Langley. Here we find the already infamous CIA agent Howard Hunt, the CIA communications expert James McCord, and the FBI operative G. Gordon Liddy. These provocateurs took special pains to get arrested during an otherwise pointless break-in at the headquarters of the Democratic National Committee in the summer of 1972. Nixon could easily have disavowed the Plumbers and thrown this gaggle of agent provocateurs to the wolves, but he instead launched a cover up. Bob Woodward of the Washington Post, equipped with a top secret security clearance from the Office of Naval Intelligence, then began publicizing the story. The rest is history, and the lasting heritage has been a permanent weakening of the office of the presidency and the strengthening of the worst oligarchical tendencies.
Assange’s Wikileaks document dump triggered numerous destabilizations and coups d’état across the globe. Not one US, British, or Israeli covert operation or politician was seriously damaged by this material. The list of those impacted instead bears a striking resemblance to the CIA enemies’ list: the largest group of targets were Arab leaders slated for immediate ouster in the wave of “Arab Spring.” Here we find Ben Ali of Tunisia, Qaddafi of Libya, Mubarak of Egypt, Saleh of Yemen, and Assad of Syria. The US wanted to replace Maliki with Allawi as prime minister of Iraq, so the former was targeted, as was the increasingly independent Karzai of Afghanistan.
Perennial targets of the CIA included Rodriguez Kirchner of Argentina, Berlusconi of Italy, and Putin of Russia. Berlusconi soon fell victim to a coup organized through the European Central Bank, while his friend Putin was able to stave off a feeble attempt at color revolution in early 2012. Mildly satiric jabs at figures like Merkel of Germany and Sarkozy of France were included primarily as camouflage. Assange thus had a hand in preparing one of the largest destabilization campaigns mounted by Anglo-American intelligence since 1968, or perhaps even 1848. If the Snowden operation can help coerce the vacillating and reluctant Obama to attack Syria, our new autistic hero may claim credit for starting a general war in the Middle East, and perhaps even more. If Snowden can further poison relations between United States and China, the world historical significance of his provocations will be doubly assured. But none of this can occur unless he finds vast legions of eager dupes ready to fall for his act. We hope he won’t.
The Big Story Torture Everyone Is Missing Senate Torture Report
While the torture report released by the Senate Intelligence Committee is very important, it doesn’t address the big scoop regarding torture.
Instead, it is the Senate Armed ServicesCommittee’s report that dropped the big bombshell regarding the U.S. torture program.
Senator Levin, commenting on a Armed Services Committee’s report on torture in 2009, explained:
The techniques are based on tactics used by Chinese Communists against American soldiers during the Korean War for the purpose of eliciting FALSE confessions for propaganda purposes. Techniques used in SERE training include stripping trainees of their clothing, placing them in stress positions, putting hoods over their heads, subjecting them to face and body slaps, depriving them of sleep, throwing them up against a wall, confining them in a small box, treating them like animals, subjecting them to loud music and flashing lights, and exposing them to extreme temperatures [and] waterboarding.
Former senior U.S. intelligence official familiar with the interrogation issue said that Cheney and former Defense Secretary Donald H. Rumsfeld demanded that the interrogators find evidence of al Qaida-Iraq collaboration…
For most of 2002 and into 2003, Cheney and Rumsfeld, especially, were also demanding proof of the links between al Qaida and Iraq that (former Iraqi exile leader Ahmed) Chalabi and others had told them were there.”
It was during this period that CIA interrogators waterboarded two alleged top al Qaida detainees repeatedly — Abu Zubaydah at least 83 times in August 2002 and Khalid Sheik Muhammed 183 times in March 2003 — according to a newly released Justice Department document…
When people kept coming up empty, they were told by Cheney’s and Rumsfeld’s people to push harder,” he continued.” Cheney’s and Rumsfeld’s people were told repeatedly, by CIA . . . and by others, that there wasn’t any reliable intelligence that pointed to operational ties between bin Laden and Saddam . . .
A former U.S. Army psychiatrist, Maj. Charles Burney, told Army investigators in 2006 thatinterrogators at the Guantanamo Bay, Cuba, detention facility were under “pressure” to produce evidence of ties between al Qaida and Iraq.
“While we were there a large part of the time we were focused on trying to establish a link between al Qaida and Iraq and we were not successful in establishing a link between al Qaida and Iraq,” Burney told staff of the Army Inspector General. “The more frustrated people got in not being able to establish that link . . . there was more and more pressure to resort to measures that might produce more immediate results.”
“I think it’s obvious that the administration was scrambling then to try to find a connection, a link (between al Qaida and Iraq),” [Senator] Levin said in a conference call with reporters. “They made out links where they didn’t exist.”
Levin recalled Cheney’s assertions that a senior Iraqi intelligence officer had met Mohammad Atta, the leader of the 9/11 hijackers, in the Czech Republic capital of Prague just months before the attacks on the World Trade Center and the Pentagon.
The FBI and CIA found that no such meeting occurred.
Despite what you’ve seen on TV, torture is really only good at one thing: eliciting false confessions. Indeed, Bush-era torture techniques, we now know, were cold-bloodedly modeled after methods used by Chinese Communists to extract confessions from captured U.S. servicemen that they could then use for propaganda during the Korean War.
So as shocking as the latest revelation in a new Senate Armed Services Committee report may be, it actually makes sense — in a nauseating way. The White House started pushing the use of torture not when faced with a “ticking time bomb” scenario from terrorists, but whenofficials in 2002 were desperately casting about for ways to tie Iraq to the 9/11 attacks — in order to strengthen their public case for invading a country that had nothing to do with 9/11 at all.
***
Gordon Trowbridge writes for the Detroit News: “Senior Bush administration officials pushed for the use of abusive interrogations of terrorism detainees in part to seek evidence to justify the invasion of Iraq, according to newly declassified information discovered in a congressional probe.
Colin Powell’s former chief of staff (Colonel Larry Wilkerson) wrote in 2009 that the Bush administration’s “principal priority for intelligence was not aimed at pre-empting another terrorist attack on the U.S. but discovering a smoking gun linking Iraq and al-Qaeda.”
Indeed, one of the two senior instructors from the Air Force team which taught U.S. servicemen how to resist torture by foreign governments when used to extract false confessions has blown the whistle on the true purpose behind the U.S. torture program.
[Torture architect] Jessen’s notes were provided to Truthout by retired Air Force Capt. Michael Kearns, a “master” SERE instructor and decorated veteran who has previously held high-ranking positions within the Air Force Headquarters Staff and Department of Defense (DoD).
***
The Jessen notes clearly state the totality of what was being reverse-engineered – not just ‘enhanced interrogation techniques,’ but an entire program of exploitation of prisoners using torture as a central pillar,” he said. “What I think is important to note, as an ex-SERE Resistance to Interrogation instructor, is the focus of Jessen’s instruction. It is EXPLOITATION, not specifically interrogation. And this is not a picayune issue, because if one were to ‘reverse-engineer’ a course on resistance to exploitation then what one would get is a plan to exploit prisoners, not interrogate them. The CIA/DoD torture program appears to have the same goals as the terrorist organizations or enemy governments for which SV-91 and other SERE courses were created to defend against: the full exploitation of the prisoner in his intelligence, propaganda, or other needs held by the detaining power, such as the recruitment of informers and double agents. Those aspects of the US detainee program have not generally been discussed as part of the torture story in the American press.”
Air Force Col. Steven Kleinman, a career military intelligence officer recognized as one of the DOD’s most effective interrogators as well a former SERE instructor and director of intelligence for JPRA’s teaching academy, said …. “This is the guidebook to getting false confessions, a system drawn specifically from the communist interrogation model that was used to generate propaganda rather than intelligence” …. “If your goal is to obtain useful and reliable information this is not the source book you should be using.”
Much of the 9/11 Commission Report was based upon the testimony of people who were tortured
At least four of the people whose interrogation figured in the 9/11 Commission Report have claimed that they told interrogators information as a way to stop being “tortured.”
The 9/11 Commission itself doubted the accuracy of the torture confessions, and yet kept their doubts to themselves
Today, Raymond McGovern – a 27-year CIA veteran, who chaired National Intelligence Estimates and personally delivered intelligence briefings to Presidents Ronald Reagan and George H.W. Bush, their Vice Presidents, Secretaries of State, the Joint Chiefs of Staff, and many other senior government officials –provides details about one torture victim (Al-Libi) at former Newsweek and AP reporter Robert Parry’s website:
But if it’s bad intelligence you’re after, torture works like a charm. If, for example, you wish to “prove,” post 9/11, that “evil dictator” Saddam Hussein was in league with al-Qaeda and might arm the terrorists with WMD, bring on the torturers.
It is a highly cynical and extremely sad story, but many Bush administration policymakers wanted to invade Iraq before 9/11 and thus were determined to connect Saddam Hussein to those attacks. The PR push began in September 2002 – or as Bush’s chief of staff Andrew Card put it, “From a marketing point of view, you don’t introduce new products in August.”
By March 2003 – after months of relentless “marketing” – almost 70 percent of Americans had been persuaded that Saddam Hussein was involved in some way with the attacks of 9/11.
The case of Ibn al-Sheikh al-Libi, a low-level al-Qaeda operative, is illustrative of how this process worked. Born in Libya in 1963, al-Libi ran an al-Qaeda training camp in Afghanistan from 1995 to 2000. He was detained in Pakistan on Nov. 11, 2001, and then sent to a U.S. detention facility in Kandahar, Afghanistan. He was deemed a prize catch, since it was thought he would know of any Iraqi training of al-Qaeda.
The CIA successfully fought off the FBI for first rights to interrogate al-Libi. FBI’s Dan Coleman, who “lost” al-Libi to the CIA (at whose orders, I wonder?), said, “Administration officials were always pushing us to come up with links” between Iraq and al-Qaeda.
CIA interrogators elicited some “cooperation” from al-Libi through a combination of rough treatment and threats that he would be turned over to Egyptian intelligence with even greater experience in the torture business.
By June 2002, al-Libi had told the CIA that Iraq had “provided” unspecified chemical and biological weapons training for two al-Qaeda operatives, an allegation that soon found its way into other U.S. intelligence reports. Al-Libi’s treatment improved as he expanded on his tales about collaboration between al-Qaeda and Iraq, adding that three al-Qaeda operatives had gone to Iraq “to learn about nuclear weapons.”
Al-Libi’s claim was well received at the White House even though the Defense Intelligence Agency was suspicious.
“He lacks specific details” about the supposed training, the DIA observed. “It is possible he does not know any further details; it is more likely this individual is intentionally misleading the debriefers. Ibn al-Shaykh has been undergoing debriefs for several weeks and may be describing scenarios to the debriefers that he knows will retain their interest.”
Meanwhile, at the Guantanamo Bay prison in Cuba, Maj. Paul Burney, a psychiatrist sent there in summer 2002, told the Senate, “A large part of the time we were focused on trying to establish a link between al-Qaeda and Iraq and we were not successful. The more frustrated people got in not being able to establish that link … there was more and more pressure to resort to measures that might produce more immediate results.”
***
President Bush relied on al-Libi’s false Iraq allegation for a major speech in Cincinnati on Oct. 7, 2002, just a few days before Congress voted on the Iraq War resolution. Bush declared, “We’ve learned that Iraq has trained al-Qaeda members in bomb making and poisons and deadly gases.”
And Colin Powell relied on it for his famous speech to the United Nations on Feb. 5, 2003, declaring: “I can trace the story of a senior terrorist operative telling how Iraq provided training in these [chemical and biological] weapons to al-Qaeda. Fortunately, this operative is now detained, and he has told his story.”
Al-Libi’s “evidence” helped Powell as he sought support for what he ended up calling a “sinister nexus” between Iraq and al-Qaeda, in the general effort to justify invading Iraq.
For a while, al-Libi was practically the poster boy for the success of the Cheney/Bush torture regime; that is, until he publicly recanted and explained that he only told his interrogators what he thought would stop the torture.
You see, despite his cooperation, al-Libi was still shipped to Egypt where he underwent more abuse, according to a declassified CIA cable from early 2004 when al-Libi recanted his earlier statements. The cable reported that al-Libi said Egyptian interrogators wanted information about al-Qaeda’s connections with Iraq, a subject “about which [al-Libi] said he knew nothing and had difficulty even coming up with a story.”
According to the CIA cable, al-Libi said his interrogators did not like his responses and “placed him in a small box” for about 17 hours. After he was let out of the box, al-Libi was given a last chance to “tell the truth.” When his answers still did not satisfy, al-Libi says he “was knocked over with an arm thrust across his chest and fell on his back” and then was “punched for 15 minutes.”
After Al-Libi recanted, the CIA recalled all intelligence reports based on his statements, a fact recorded in a footnote to the report issued by the 9/11 Commission. By then, however, the Bush administration had gotten its way regarding the invasion of Iraq and the disastrous U.S. occupation was well underway.
***
Intensive investigations into these allegations – after the U.S. military had conquered Iraq – failed to turn up any credible evidence to corroborate these allegations. What we do know is that Saddam Hussein and Osama bin Laden were bitter enemies, with al-Qaeda considering the secular Hussein an apostate to Islam.
Al-Libi, who ended up in prison in Libya, reportedly committed suicide shortly after he was discovered there by a human rights organization. Thus, the world never got to hear his own account of the torture that he experienced and the story that he presented and then recanted.
Hafed al-Ghwell, a Libyan-American and a prominent critic of Muammar Gaddafi’s regime at the time of al-Libi’s death, explained to Newsweek, “This idea of committing suicide in your prison cell is an old story in Libya.”
Paul Krugman eloquently summarized the truth about the torture used:
Let’s say this slowly: the Bush administration wanted to use 9/11 as a pretext to invade Iraq, even though Iraq had nothing to do with 9/11. So it tortured people to make them confess to the nonexistent link.
There’s a word for this: it’s evil.
Torture Program Was Part of a Con Job
As discussed above, in order to “justify” the Iraq war, top Bush administration officials pushed and insisted that interrogators use special torture methods aimed at extracting false confessions to attempt to create a false linkage between between Al Qaida and Iraq. And see this and this.
And at 2:40 p.m. on September 11th, in a memorandum of discussions between top administration officials, several lines below the statement “judge whether good enough [to] hit S.H. [that is, Saddam Hussein] at same time”, is the statement “Hard to get a good case.” In other words, top officials knew that there wasn’t a good case that Hussein was behind 9/11, but they wanted to use the 9/11 attacks as an excuse to justify war with Iraq anyway.
(2) acting pursuant to the Constitution and Public Law 107-243 is consistent with the United States and other countries continuing to take the necessary actions against international terrorists and terrorist organizations, including those nations, organizations, or persons who planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001.
Therefore, the Bush administration expressly justified the Iraq war to Congress by representing that Iraq planned, authorized, committed, or aided the 9/11 attacks.
Indeed, Pulitzer prize-winning journalist Ron Suskind reports that the White House ordered the CIA to forge and backdate a document falsely linking Iraq with Muslim terrorists and 9/11 … and that theCIA complied with those instructions and in fact created the forgery, which was then used to justify war against Iraq. And see this.
Suskind also revealed that “Bush administration had information from a top Iraqi intelligence official ‘that there were no weapons of mass destruction in Iraq – intelligence they received in plenty of time to stop an invasion.’ ”
Cheney made the false linkage between Iraq and 9/11 on many occasions.
For example, according to Raw Story, Cheney was still alleging a connection between Iraq and the alleged lead 9/11 hijacker in September 2003 – a year after it had been widely debunked. When NBC’s Tim Russert asked him about a poll showing that 69% of Americans believed Saddam Hussein had been involved in 9/11, Cheney replied:
It’s not surprising that people make that connection.
And even after the 9/11 Commission debunked any connection, Cheney said that the evidence is “overwhelming” that al Qaeda had a relationship with Saddam Hussein’s regime , that Cheney “probably” had information unavailable to the Commission, and that the media was not ‘doing their homework’ in reporting such ties.
Again, the Bush administration expressly justified the Iraq war by representing that Iraq planned, authorized, committed, or aided the 9/11 attacks. See this, this, this.
Former Treasury Secretary Paul O’Neill – who sat on the National Security Council – also says that Bush planned the Iraq war before 9/11.
Top British officials say that the U.S. discussed Iraq regime change even before Bush took office.
And in 2000, Cheney said a Bush administration might “have to take military action to forcibly remove Saddam from power.” And see this.
The administration’s false claims about Saddam and 9/11 helped convince a large portion of the American public to support the invasion of Iraq. While the focus now may be on false WMD claims, it is important to remember that, at the time, the alleged link between Iraq and 9/11 was at least as important in many people’s mind as a reason to invade Iraq.
So the torture program was really all about “justifying” the ultimate war crime: launching an unnecessary war of aggression based upon false pretenses.
Postscript: It is beyond any real dispute that torture does not work to produce any useful, truthfulintelligence. Today, the following question made it to the front page of Reddit:
Why would the CIA torture if torture “doesn’t work”? Wouldn’t they want the most effective tool to gather intelligence?
The Senate Armed Services Committee report gave the answer.
The Pirate Bay In what seems to be a final nail in The Pirate Bay’s coffin, one of the founders of this mega torrent site, Peter Sunde today stated that he was glad that TPB was shut down. This statement was made by him in a blogpost on a aptly named website, Copy Me Happy. Peter who has already faced the wrath of the law for his role in starting the Pirate Bay, was released last month after serving five months in a Swedish prison.
Peter stated that he didnt care that TPB was raided by authorities, “News just reached me that The Pirate Bay has been raided, again. That happened over 8 years ago last time. That time, a lot of people went out to protest and rally in the streets. Today few seem to care. And I’m one of them.” he adds, “Why, you might ask? Well. For multiple reasons. But most of all, I’ve not been a fan of what TPB has become.”
While giving reasons as to why he things TPB gone is a good riddance, Peter writes,
“TPB has become an institution that people just expected to be there. Noone willing to take the technology further. The site was ugly, full of bugs, old code and old design. It never changed except for one thing – the ads. More and more ads was filling the site, and somehow when it felt unimaginable to make these ads more distasteful they somehow ended up even worse. The original deal with TPB was to close it down on it’s tenth birthday.”
“Instead, on that birthday, there was a party in it’s “honour” in Stockholm. It was sponsored by some sexist company that sent young girls, dressed in almost no clothes, to hand out freebies to potential customers. There was a ticket price to get in, automatically excluding people with no money. The party had a set line-up with artists, scenes and so on, instead of just asking the people coming to bring the content. Everything went against the ideals that I worked for during my time as part of TPB.”
“The past years there was no soul left in TPB. The original team handed it over to, well, less soul-ish people to say the least. From the outside I felt that noone had any interest in helping the community if it didn’t eventually pay out in cash. The attention for new artists (the promo bay) felt more like something TPB had to do in order to keep it’s street cred. The street cred I personally tried to destroy when being part of TPB, multiple times, in order to make sure that people stopped idolizing TPB the way they did. Mostly it didn’t work though.”
In an interview to Ars Technica five years ago, Sunde had stated that TPB ownership was transferred to an unnamed organization, which then transferred ownership to a shady shell corporation called Reservella.
Apparently everything boiled down to ethics, social responsibility and commercial interests as far as Peter was concerned. He said they had started TPB with a shared objective of helping the community but as years passed, TPB become more and more commercialised and went afar from its stated objectives. He hopes that something better will rise to take the place of TPB in the vacuum left behind due to its closure, “But from the immense void that will now fill up the fiber cables all over the world, I’m pretty sure the next thing will pan out. And hopefully it has no ads for porn or viagra. There’s already other services for that.”
CIA Torture Pseudonyms Update: The “Associates” of “Company Y” are now known, as is “CIA officer 2.” Additional people and details have become known.
The press has been hard at work uncovering the pseudonyms used and nailing down the true identities of the site. I compile them here.
The most important outstanding questions: who are Detainees “R” & “S,” and where is detention site “red?” While I feel pretty strongly about redacting the names of low-level personnel from the NSA slides, which are technical in nature, I have zero interest in protecting torturers. The public has a right to know where these black sites were, and the detainees deserve a name and a fair trial.
Detention sites:
BLACK – RomaniaBLUE – “Quartz” – Stare Kiejkuty, Poland
BROWN – Afghanistan
COBALT – “Salt Pit” – Afghanistan
GRAY – Afghanistan
GREEN – Thailand
INDIGO – Guantanamo
MAROON – Guantanamo
ORANGE – Afghanistan
VIOLET – Lithuania
RED – This could be an additional site in one of the above countries, or someplace entirely different. It is mentioned only once in the report, on page 140 of 499, and the entry is almost entirely redacted.
Companies:
Company Y – Mitchell, Jessen & Associates, based in Spokane, Washington.The “Associates” are David Ayers, Randall Spivey, James Sporleder, Joseph Matarazzo, and Roger Aldrich.
It should be noted that there is no “Company X” in this report, I found this peculiar. It seems that there should be one, and as it happens there are several shady “Companies’ known: “Premier Executive Transport Services” Incorporated in Dedham Massachusetts, is known to have been part of the CIA rendition program. The names of its officers include “Coleen Bornt,” “Brian Dice” and “Tyler Edward Tate.” These are fictitious people.
Other companies suspected of involvement in rendition include: “Stevens Express Leasing” “Richmor Aviation” “Rapid AirTrans” “Path Corporation”
Businesses:
Business Q – Associated with Zubair, associated with Hambali
Torture Doctors:
“Grayson Swigert” – James Mitchell”Hammond Dunbar” – Bruce Jessen
CIA Officers:
CIA Officer 1 – COBALT Site manager – Matthew Zirbel. Zirbel’s corrupt CIA boss (Convicted) Kyle “Dusty” Dustin Foggo overruled the 10 day suspension Zirbel received in the murder of Gul Rahman (innocent).CIA Officer 2 – Torturer at COBALT and BLUE – Albert El Gamil – retired from CIA in 2004.
[Redacted] – Ron Czarnetsky, CIA Chief of Station on Warsaw, Poland from 2002 to 2005. This would make him responsible for site BLUE.
[no mention] Alfreda Frances Bikowsky – Made herself involved in Waterboarding in Poland (BLUE) in March of 2003. Took trip unassigned and on own dime. Was “scolded” and told it “wasn’t supposed to be entertainment.” Would have been there at the same time as Mitchell and Jessen.
Assets:
Asset X – Directly involved in the capture of KSM.Asset Y – Reports on Janat Gul
Persons:
Person 1 – al-Ghuraba group member, with an interest in airplanes and aviation. “intelligence indicates the interest was unrelated to terrorist activity.”
Detainees:
Detainee R – Held by foreign government, rendered to CIA custodyDetainee S – Held by foreign government
I have been observing the hacker and hacktivist communities, at times very
closely, for many years. The exact definition of “hacker” and “hacktivist”
varies from author to author, so I shall make my interpretation of these words
very clear. Let us define a “hacker” as someone who utilizes their knowledge of
computers and of computer networks to make money via illegitimate means. Let us
define a “hacktivist” as someone who utilizes their knowledge of computers and
of computer networks to do justice when justice is not done by the state. I
have found that these two communities are inextricably linked, yet remain
completely separate entities. Many hackers double as hacktivists in their spare
time, although most hacktivists do not fancy themselves hackers.
Although hackers turned hacktivists have the very best of intentions, and their
input and expertise is of great value to the hacktivist community, they have
inadvertently suppressed the potential of the very community they are trying to
aid. The get-in-get-the-goods-get-out methodology of the stolen credit card
driven hacker community that has been transfered to the hacktivist community
via ideological osmosis has tragically affixed blinders to it. It has caused
the hacktivist community to think linearly and strive to do nothing more than
to blindly infiltrate target organizations and immediately leak whatever data
they happen to stumble across. This must change. Stealing and leaking data
makes a point, but it is sometimes necessary to do more than just make a point,
to inflict real, measurable damage. In certain, extreme cases an organization’s
disregard for human rights warrants its immediate and complete obliteration.
In this essay, I will discuss a multitude of ideological, operational, and
technical changes that ought to be made to the hacktivist community. These
proposed changes have been derived from my personal observations. Some will
find the ideas contained within this document to be the product of common
sense. I have found these people to be few in number. If the community accepts
my suggestions it will not only become more effective, but the risks associated
with participating in it will be drastically lowered. My intent in writing this
is not to aid criminals, but rather to aid people who wish to do battle with
governments and corporations that have become criminals. If freedom is to
remain on this earth, its people must be willing and able to take arms to
defend it, both physical and digital.
Personal Security
Sound operational security is the foundation from which all effective
cyber-offensives are launched. You should, at all times, put your own, personal
security above the success of your operations and interests. The security
precautions taken by most hacktivists I have met are mediocre at best, and
needlessly so. Maintaining sound personal security is by no means difficult. It
requires much caution but very little skill. I have devised a series of
security precautions that hactivists should take and divided them up into six
main categories: environmental, hardware, software, mental, pattern related,
and archaeological. We shall examine each individually.
(1) Environmental:
There are but two places you can work: at home or in public. Some people insist
that working at home is best and others insist that working in public is best.
The proper working environment debate has been raging on in the hacker
community for quite some time now, and has great relevance to the hacktivist
community, as most governments view hackers and hacktivists as one in the same.
Proponents of the “work in public” argument claim that by always working at a
different public location, you significantly lower your chances of being
apprehended. They argue that even if the authorities are able to trace many of
the cyber-attacks you took part in back to the public places where you took
part in them from, that does not bring them any closer to finding you. Most
retail stores and coffee shops do not keep surveillance footage for more than a
year at the most, and even if the authorities are able to get a photo of you
from some security camera, that does not necessarily lead them directly to your
front door, especially if you wore a hoody the entire time you where working
and the camera never got a clear shot of your face. On the other hand,
proponents of the “work at home” argument argue that the risk of being seen and
reported, or merely recorded while working in a public place far outweighs the
benefits of the significantly large increase in anonymity that working in
public provides. Both sides have legitimate points, and I urge you to consider
both of them.
If you decide to work in public, the number one threat you face is other
people. Numerous large criminal investigations have been solved using the
observations of average everyday citizens who just happened to remember seeing
something suspicious. If people sense that you are trying to hide something,
they will watch you more closely than they would otherwise. It is important to
always “keep your cool” as the old saying goes. Always try to sit in such a way
that your screen is facing away from the majority of the people in the room you
are sitting in. Corners are your friend. Try to blend in with the crowd. Dress
in plain cloths. Draw no attention. If you are in a coffee shop, sip some
coffee while you work. If you are in a burger joint, buy a burger. If you are
in a library or book store, set a few books beside your laptop. Also, be very
aware of security cameras, both inside the establishment you are working in as
well as on the street near it. Being captured on film is alright as long as the
camera can not see what is on your screen. Some store cameras are watched by
actual people who will undoubtedly report you if they find out what you are
doing. More and more governments are starting to place very high quality CCTV
cameras on their streets to monitor their citizens, and these devices can be a
problem if they are peering over your shoulder through a window you are sitting
beside. When working in public, it is possible that you may have to confront a
law enforcement officer face to face. Law enforcement officers can smell
uneasiness from a mile away, and if you look like you are up to no good it is
possible that a cop will come and talk to you. Always have some sort of cover
story made up before you leave home to explain why you are where you are. If
you are forced to confront a law enforcement officer you should be able to talk
your way out of the situation.
If you decide to work at home, the number one threat you face is your own ego.
Just because you are at home does not mean that your working environment is
secure. Be aware of windows in close proximity to your computer as well as your
security-illiterate or gossipy family members. Security issues in relation to
network configuration begin to come into play when you work at home. If your
computer were to somehow get compromised while you are working at home,
perhaps by your government, it would be nearly impossible for the person or
group of people rummaging around inside of your system to get your actual IP
address (provided that you adhere to the software security guidelines that we
will discuss later). However, if your wi-fi password (or the name of your
printer, or the name of another computer on the network) contains your actual
last name and part of your address, tracking you down becomes very easy. A lot
of people name their network devices and structure their network passwords in
this way.
It is also possible that if an attacker that has infiltrated your computer
notices other machines on your network they can pivot to them (infect them with
malware using your computer as a spring board of sorts) and use them to get
your IP address. A lot of Internet enabled household devices have cameras on
them (your smart TV, your Xbox, and your high tech baby monitor to name a few)
and said cameras can potentially be leveraged against you. It is in your best
interest to not have any other machines running on your home network while you
are working. Also, change your wi-fi password every once in awhile and make
sure that the password on the administrative interface of your router is
something other than the out-of-the-box default. If your computer gets
compromised, logging into your router using username “admin” and password
“admin” is elementary for a moderately skilled attacker. Most modern routers
list their WAN IP address on their control panels.
Regardless of where you decide to work, be aware of mirrors and glass picture
frames near your workplace. In the right light, both of these items have the
potential to reflect crystal clear images of your screen to onlookers across
the room. In addition to this, understand that modern cell phones are your
worst enemy. Not only are they always going to be the weakest link in your
security setup, but if they are somehow compromised they are equipped with a
camera and microphone. Recent studies suggest that it is possible for smart
phones to listen to the high pitched noise your CPU makes and deduce your PGP
private key. Furthermore, the metadata collected by your phone coupled with
pattern analysis techniques could potentially allow your government to link
your real life and online personas together after some time. We will discuss
this in depth later. Leave your phones at home and if possible keep all phones,
yours or otherwise, far away from your computer. Other portable devices such as
iPods and tablets potentially pose the same risk that phones do and should be
treated the same.
(2) Hardware:
Modern computers come equipped with microphones, speakers (which can be used as
microphones under the right circumstances), and cameras. All of these features
can potentially be leveraged to identify you if your computer is compromised.
To mitigate these risks, these features should be physically removed. Your
computer’s microphone and speakers should be ripped out of it, but you should
not rip out your web cam, as it will alter the outward appearance of your
computer and potentially draw attention to you. Instead, open your computer’s
screen and snip the wires that connect to your web cam. Wrap the ends of the
wires in electrical tape so sparks do not jump in between them. If you must
listen to an audio file while working, use headphones. Only keep your
headphones plugged into your computer when you are using them. The computer you
use for your hacktivist activities also should not contain a hard drive, as
they are unnecessary for our purposes.
(3) Software:
Always use a TOR enabled Linux live system when working. At the present moment,
Tails (The Amnesiac Incognito Live System) is by far the best live distribution
for your purposes. You can read more about TOR at www.torproject.org and you
can read more about acquiring, setting up, and using Tails at tails.boum.org.
The Tails operating system lives on a USB flash drive. Every time you start up
your computer, you must first insert your Tails flash drive into it. The Tails
website will guide you through making said flash drive. Tails will
automatically direct all of your outgoing traffic into the TOR network in an
effort to hide your IP address. If you use Tails you will be completely
anonymous and be able to work with impunity provided that:
* You keep your Tails USB up to date. New versions of the Tails
operating system are released every few months.
* You do not login into your “real world” accounts while using Tails.
Do not check your Twitter feed while you are working.
* You do not use Tails to create an account with an alias that you have
used before. If you have been “0pwn” for the past seven years, now
is a good time to stop being 0pwn.
* You do not alter Tails’ default security settings. They are the way
they are for a reason.
* You do not use Tails to create an online account with a password that
you have used before. Doing this only makes deanonymizing you easier.
* You do not install and use random packages that “look cool”; they
could be miscellaneous. Only use packages and scripts that you trust.
Tails is not bullet proof.
* If you decide to set a sudo password when starting up Tails, make
sure that it is very strong.
* You stay conscious of metadata analysis techniques. We will discuss
these later.
* You switch exit nodes every ten to fifteen minutes. This can be done
by double clicking the little green onion in the upper right hand
corner of your Tails desktop and hitting the “Use a New Identity”
button.
* You follow the communication guidelines laid out later in this
document.
More information can be found on the Tails warning page: https://tails.boum.org/
doc/about/warning/index.en.html. Be aware that it is very easy for your ISP
(which is probably working closely with your government) to tell that you are
using both TOR and Tails. It is probably in your best interest to use something
called “TOR bridge mode”. You can read more about how to configure Tails to
use TOR bridges here: https://tails.boum.org/doc/first_steps/startup_options/
bridge_mode/index.en.html.
Tails is unique in that it has a special feature that wipes your computer’s
memory before it shuts down. This is done in order to mitigate risks associated
with the dreaded “cold boot attack” (a forensics method in which a suspects RAM
is ripped out of his or her computer and then thrown into a vat of liquid
nitrogen to preserve its contents for later analysis). This feature is also
triggered if you pull your Tails flash drive out of your computer while you are
working. If while you are working you ever feel that the authorities are about
to move in on you, even if you have a seemingly irrational gut feeling, yank
your Tails flash drive out of your computer. Tails also has a feature that
allows it to disguises itself as a Windows desktop. Using this feature in
public will reduce your risk of capture significantly.
(4) Mental:
A skilled attacker is well disciplined and knows that he must keep his actions
and skills a secret in order to remain safe from harm. Do not flaunt the fact
that you are dissatisfied with your government, a foreign government, or a
particular corporation. Do not attend protests. Do not publicly advertise the
fact that you have an above average aptitude for computer security offensive or
otherwise. And whatever you do, do not tell anyone, even someone you think you
can trust, that you are planning to launch an organized cyber-attack on any
organization, big or small. If you draw attention to yourself no amount of
security precautions will keep you safe. Keep your “real” life mentally
isolated from your “hacktivist” life. One lapse in operational security could
end you.
Be alert and focused. Remain mentally strong. Come to terms with the illegality
of your actions and what will happen to you if you are apprehended. As a wise
man once said, “A warrior considers himself already dead, so there is nothing
to lose. The worst has already happened to him, therefore he’s clear and calm;
judging him by his acts or by his words, one would never suspect that he has
witnessed everything.” It is perfectly acceptable to be paranoid, but do not
let that paranoia consume you and slow your work. Even if you are extremely
cautious and follow this document’s advice to the letter, you still may be
hunted down and incarcerated, tortured, or killed. Some countries do not take
kindly to hacktivists. It is best that you be honest with yourself from the
beginning. In order to operate effectively you must be able to think clearly
and see the world as it actually is.
(5) Pattern Related:
When your online persona is active your real life persona ceases to exist, and
an observant adversary can use this to their advantage. If your ISP, bank, and
mobile phone provider are “cooperating” with your government and allowing them
to browse through all of their records (a fair assumption in this day and age)
then, eventually, they will be able to deduce your real identity by comparing
everyone’s data to information about your online persona. If the government
looks backs on all of the records they have collected in the past year and
notice that you never make a credit card purchase, watch Netflix, go on your
Facebook, Google, or Twitter account, or change your physical location while
1337Hax0r64 is online on some anti-government forum on the deep web, they will
assume that you are 1337Hax0r64. Even information about your home network’s
bandwidth usage can give away your real identity.
Luckily, performing the type of metadata analysis attack described above takes
time, usually many months. It is very important that you change aliases often,
preferably every three or four months. Shed your old names like a snake sheds
its skin. When you do change your online name, make sure your new identity
can not be tied back to your old one.
DO NOT not launch cyber-attacks from your own computer. Launch attacks only
from hacked servers, servers purchased with washed bitcoins, or free shell
accounts. Certain types of cyber-attacks produce a large amount of traffic over
a short amount of time. If the bandwidth usage of your home network spikes at
the same instant that a government or corporate server is attacked, the time it
takes to deanonymize you is reduced significantly. This is especially true if
you launch multiple attacks on multiple occasions. Launching attacks in this
way can be mentally exhausting. Configuring a new attack server with your tool
set every time your old attack server is banned (an inevitable occurrence) can
be a tedious task indeed. I personally recommend creating a bash script to
automatically install your favorite tools to make this transition process
easier. Most hackers and offensive security professionals use under thirty
non-standard tools to do their job, so configuring a new server with everything
you need should not take very long if you know what you are doing. Consider
equipping your server with TOR and a VNC server (for tools that require GUIs
such as most popular intercepting proxies) as well.
(6) Archaeological:
You must insure that there is no forensics evidence of your actions, digital or
otherwise. If the government breaks into your house and rummages through your
things, they should find nothing interesting. Make sure that you never make any
physical notes pertaining to your hacktivist activities. Never keep any
computer files pertaining to your hacktivist activities in your home. Keep all
of your compromising files, notes, scripts, and unusual attack tools (the ones
that can not be installed with apt-get or the like), and stolen information in
the cloud. It is recommended that you keep all of your files backed up on
multiple free cloud storage providers so that in the event that one of the
providers bans your account you still have all of your data. Do not name your
cloud accounts in such a way that they can be connected back to your online
persona. Never, under any circumstances, mention the names or locations of your
cloud accounts to the people you work with. Always hit the “Use New Identity”
button on your TOR control panel after accessing your cloud storage solutions.
Every time you shed your old alias, shed your old cloud accounts.
Security of Communications
The majority of hacktivists I have met communicate via public IRC. Using IRC is
fine for meeting other hacktivists, but as soon as you muster a team of other
hacktivists who wish to attack the same target as you, move to another more
secure form of communication. Some means of communication are more secure than
others, but completely secure communication does not exist. The following
guidelines are meant to work in conjunction with the personal security
guidelines that where discussed in the previous section. If proper personal
security measures are implemented effectively, compromised communication will
result in operational failure at worst and not complete deanonymization. Since
operational failure may very well set you and your cause back several months,
it is in your best interest to attempt to communicate securely:
* Remember that any of the people you meet on the clearnet, deep web,
or public IRC channels who claim to be on your side could actually
be government agents trying to sabotage your operations.
* If possible, communicate mainly via privacy friendly email accounts
(not Gmail, Yahoo, AT&T, etc.) and encrypt all of your messages with
PGP. When a cyber-attack is being carried out it is often necessary
to be able to communicate with your accomplices instantaneously.
Since encrypting, sending, receiving, and decrypting messages by hand
takes time, using PGP in time sensitive situations like this is not
feasible. If you have to confer in an IM environment, use a program
like TorChat that uses its own form of asymmetric encryption to send
and receive messages instantly.
* Use strong passwords for all of your online accounts. The best way to
make a strong password is to pick eight or nine random words and
string them together. Passwords like this are easy to remember but
hard to guess.
* Never give away any personal information (such as country, interests,
hobbies, health, etc.) or give insight into your feelings or
emotions. Your fellow hacktivists are not your friends and should
never be talked to as such. Giving away this sort of information will
make tracking you easier.
* When you receive messages, do not retain them, even if they are
encrypted. Read them, make note of any hard to remember details
(like long server passwords for example), and then delete them.
Having a mile long digital paper trail can not lead to anything good.
In some cases deleted messages on email serves can be recovered via
computer forensics, but deleting messages quickly may reduce the odds
that they can be.
* When typing messages, do so in a word processor on your computer.
Never write your message inside of a communication program (such as
an online email client, forum PM box, etc.). People have been known
to accidentally send unencrypted messages before. The effects of such
an error can be devastating.
* If you find yourself writing large swaths of text intended for public
release (like essays or manifestos) use a tool like Anonymouth to
obscure your writing style. Your writing style is as unique as a
finger print and can be used to identify you.
* Never, under any circumstances, execute a file on your computer or on
your server that has been given to you by a fellow hacktivist. You
should never run into a situation where doing this is necessary.
* Do not disclose information about your involvement in previous
hacktivist operations to people who where not also part of the same
operation.
* If one of the people that you are working with gets captured, assume
that the people who have captured them know everything that they do.
Philosophy of Attacking
The hacktivist community, like every community, has its own unique set of
philosophical musings, taboos, and dogmas. While I do not advocate the severe
alteration of the principles and philosophies on which the community was built,
I do wish to point out a number of flaws in certain aspects of their
composition. These flaws serve only to hold back the community and should be
openly discussed.
(1) When hacktivists target an organization, their goal is more often than not
to force said organization to stop functioning permanently, or at least for the
longest time possible, in an effort to stall unjust actions from being carried
out or to seek retribution for unjust actions done in the past. Leaking
databases, DoXing influential individuals, defacing websites, and launching
massive DDoS campaigns, four of the modern hacktivist community’s favorite
activities, accomplish this goal – to an extent. Infiltrating a target
organization and sowing discord within its ranks is magnitudes more effective
than leaking credit card numbers or putting a CEO’s social security number on
Pastebin, yet it is rarely, if ever, considered to be a viable course of
action. Subtly and silently fostering suspicion and distrust inside of your
target will have a longer lasting impact than simply pointing out that its
security policy has some weak points.
(2) Hacktivists crave publicity, yet they are the most effective when they
operate undetected. Stay hidden. Although it may seem tempting at times, do not
destroy large amounts of information on your target’s computers or servers.
Doing so will announce your arrival inside of your target’s network rather
loudly. Flashy, public displays of power have no place in the hacktivist
community. Just because you are hiding behind TOR does not mean that you should
not make an effort to cover your tracks. Conceal your attack not to mask your
identity, but to convince your target that no attack was carried out in the
first place.
(3) Once your hacktivist collective has decided to attack an organization,
strike fast and strike hard. Overwhelm your target. A well disciplined and well
organized team of attackers can penetrate most networks within a few hours.
Far too often I have seen hacktivist collectives declare all out war on someone
and then attack them slowly and gain entry into their network days, sometimes
even weeks later. By attacking slowly, you give your target time to react and
strengthen their defenses. Detecting an attack from a large hacktivist
collective is a trivial task, but as history has shown detecting the presence
of one inside of a network, especially a large network, can be tricky.
(4) Cyber-attacks seldom go as planned. If you are attempting to do anything
that involves the coordination of more than two people, keep this in mind. It
is not uncommon for tools to stop working in the middle of an attack. It is not
uncommon for reverse shells to die unexpectedly. It is not uncommon for
seemingly simple actions to take hours to perform. You must be ready to think
on your feet and quickly adjust your attack plan to accommodate the ever
changing conditions within the network you are attacking. Predefined
contingency plans are mostly useless.
(5) Remember that no system is impenetrable. On more than one occasion I have
seen hacktivists give up on trying to infiltrate a target network because their
Nessus scan did not yield any useful results. As a hacktivist, you are not
bound by the typical constraints of a pentester. If you can not successfully
attack a website, try attacking its hosting provider. Try attacking the
administrator’s email account. Try going after random social accounts belonging
to the administrator’s family. Try planting iframes in websites you suspect the
administrator frequents in an effort to infect him. If you cause extensive
collateral damage, who cares? It is not your problem. Sometimes the ends
justify the means. Be creative.
(6) Many hacktivists possess unrealistic, self-constructed mental images of the
ideal cyber-attack. In the majority of these movie-induced delusions, the ideal
attack utilizes numerous 0days, an arsenal of home made tools, and highly
advanced, unimaginably complex network intrusion techniques. In reality, this
type of thinking is incredibly dangerous and causes some hacktivists to attempt
to perform convoluted, elaborate attacks to gain the respect of their peers.
When breaking into highly secured networks, such attacks only draw unnecessary
attention. The best attacks are the ones that work. They are usually simple and
take little time to execute. Using sqlmap to spawn a shell on your target’s
server by exploiting a flaw in their website’s search feature is a viable if
not ideal attack. It allows you to access the inside of your target’s network.
Exploiting a vulnerable FTP daemon on one of your target’s servers using public
exploit code is a viable if not ideal attack. It allows you to access the
inside of your target’s network. Using Metasploit in conjunction with a fresh
Gmail account to launch a phishing campaign against your target’s employees is
a viable if not ideal attack. It allows you to access the inside of your
target’s network. The media hates it when hacktivists use open source software
to do their work. Whenever a hacker or hacktivist is arrested for doing
something that involved using “someone else’s” tools, they are publicly
shammed. “Anyone could have done that” they say. “He’s just an unskilled script
kiddie” they say. Claiming that someone is less of a hacker solely because they
partially depend on someone else’s code borders on absurd. It amounts to
claiming that Picasso is a bad artist because he did not carve his own brushes,
synthesize his own paints, and weave his own canvas. Do not shy away from using
open source tools and publicly available information to accomplish your goals.
Hacking is an art, and nmap is your brush.
Organization and Formation
Most of the hacker and hacktivist groups I have observed are unorganized and
undisciplined. They claim to perform actions as a collective, yet when it comes
time to actually launch an attack they attempt to infiltrate their targets as
individuals, each member launching attacks of their own without making the
faintest attempt to coordinate their actions with others. Here I shall describe
a schema that could be easily adopted by any hacktivist collective to allow it
to facilitate highly coordinated attacks involving large numbers of attackers
with great ease. It will be presented as a series of steps.
Step One: Organize yourselves into multiple small groups. These groups shall be
referred to as strike teams. The ideal strike team is composed of three parts
attack specialists, two parts social engineering specialists. Attack
specialists should at least be able to identify and competently exploit
potential vulnerabilities in websites and be able to exploit vulnerable or
misconfigured services. Social engineering specialists should have at least
some real world experience before participating in a strike team. Attack
specialists should only concern themselves with launching attacks and social
engineering specialists should only concern themselves with social engineering.
Well-defined roles are the key to a strike team’s success. This configuration
will often create an abundance of social engineering specialists, and that is
perfectly acceptable. Having the capability to immediately launch multiple well
planned social engineering campaigns is crucial. The size of a strike team
will be determined by the skill of its members. Highly skilled individuals
should work in very small strike teams (five member teams are acceptable)
whereas unskilled individuals should work in larger strike teams (up to a few
dozen). The organization of strike teams should be coordinated as a collective.
No one person should be given the authority to sort people themselves. Strike
teams should function as “sub collectives” and be autonomous. Hacktivist
collectives are composed of people around the world, most of whom can not be
online all the time. This means that all strike teams should set themselves up
knowing that their members will pop on and offline and that it is possible new
members will have to be annexed at a later time.
Step Two: Within each strike team, agree upon a stratagem; a broad, realistic,
nonspecific plan of action that aims to accomplishes one, very specific goal.
Strike teams should only execute one stratagem at a time. Multiple strike teams
within the same hacktivist collective can execute different stratagems at the
same time in an effort to accomplish some sort of final goal (perhaps to
destabilize an organization or to acquire trade secrets). The next section of
this essay is devoted solely to exploring the concept of stratagems and how to
best form and use them. Strike teams should be allowed to do what they want,
but their initial stratagem should be approved by the collective so that no two
strike teams attempt to do the same thing at the same time.
Step Three: As a strike team, map your target’s attack surface. If multiple
strike teams are all attacking the same network, they should share information
very closely in this step. It is very possible that multiple strike teams
working together to accomplish the same goal could actually be attacking
different networks, in which case mapping should be done within individual
strike teams. Each member of a given strike team should attempt to map the
target network themselves, and then members should compare information. It is
very unlikely that anything will be overlooked by every single member of the
team.
Step Four: Divide your target network up into manageable chunks and assign
certain individuals within your team to each one of those chunks. Efficient
devision of labor is key to launching speedy attacks. Here is an example
involving a network composed of four servers (two SQL servers, a DNS server,
and a web server hosting a feature rich corporate site) and a strike team
composed of six attack specialists and four social engineering specialists:
* Have one attack specialist attack the SQL and DNS servers.
* Have one attack specialist attack the website’s multistage user
registration mechanism and login mechanism.
* Have one attack specialist attack the contact and session management
mechanism.
* Have one attack specialist attack any forms not assigned to other
attack specialists as well as any other potentially exploitable
scripts, pages, or mechanisms.
* Have one attack specialist and two social engineering specialists
attempt to launch some sort of phishing champaign against the
company’s employees.
* Have one attack specialist and two social engineering specialists
attempt to convince the company’s hosting provider that they are the
rightful owners of the company’s four servers and have been locked
out of their email account.
Step Five: Drill yourselves. This step is optional but highly recommended.
Procure a server with a large amount of RAM and multiple processors. Have one
member of your strike team set up a virtual network on it that, to the best of
your knowledge, mimics the network you are planning to attack. This one team
member should not participate in the drills themselves, and they should not
give other team members details pertaining to the virtual network. If you are
planning on attacking a large cooperation, set up the virtual network like a
large cooperate network with a labyrinth of firewalls, routers, switches, and
domain controllers. If you are planning on attacking a small cooperation or
home business, set up your network accordingly. You should never have to
visualize more than 12 workstations, even if your team is doing a complex
pivoting exercise. As a group, attempt to break into your virtual network and
execute your stratagem. The virtual network should be deliberately
misconfigured so that there is a way for your team to infiltrate it and
accomplish their simulated goal, but the misconfigurations should be extremely
subtle. The team should have to work very hard to find them. Run multiple
drills. After each drill, the misconfigurations in the network, and potentially
the layout of the network itself, should be altered to force your team to
attack it in a different way or to exercise a different skill. The purpose of
these drills are two fold. Firstly, they allow your team members to get
accustomed to working together. Secondly, they will prepare your team for the
day when they actually go up against your real target network.
Step Six: Execute your stratagem on your target network. Your strike team
should attack methodically and silently. Every member should know what they
need to do and how they need to do it. No mistakes should be made. Every tool
you use should be well honed and function flawlessly. Not a second should be
wasted. Use time to your advantage. Your target organization will be the most
unprepared for an attack in the middle of the night when all of its IT staff
are at home sound asleep. If your stratagem calls for being embedded in your
target network for a long period of time, tread very lightly once you
infiltrate it.
Interlocking Stratagems in Theory
In this section I will give multiple examples of stratagems that an actual
strike team could make use of. You should combine multiple stratagems to
accomplish your ultimate goal. Individual stratagems are like pieces of a
jigsaw puzzle, and are intended to be pieced together. A strike team should
execute multiple stratagems in succession, possibly in cooperation with other
strike teams in an effort to accomplish a common goal. This section is not
intended to be a play book. I encourage you to build off of my stratagems or,
better yet, devise your own. Some stratagems are:
(1) Collect information on individuals within the target organization. Mount a
phishing campaign against the organization and gain access to as many
workstations as possible. Once you have breached its network, do not pivot.
Attempt to locate any useful information on the workstations you have
compromised, and then remain in the network for as long as possible doing
nothing more than idly gathering intelligence.
(2) Take complete or partial control over the target organization’s main means
of communication (usually email). Review a few of their messages and learn how
they are structured and formatted. Then, send a number of blatantly false
messages to one or more members of the organization using the credentials of
another member of the organization. Multiple false messages should be sent over
some period of time. When members of the organization begin to receive false
messages from their colleagues, distrust will begin to take root.
(3) Take complete or partial control over the target organization’s main means
of communication (usually email). Review a few of their messages and learn how
they are structured and formatted. Then, devise some way to intercept and
inspect or modify messages in transit within the target organization
(essentially, perform a man in the middle attack). Every once in awhile, alter
a message in a subtle but disruptive way. Perhaps change a date or a time so
certain individuals do not arrive at their meetings on time or do not arrive at
all. Once you have reason to believe that your modifications have taken their
toll (i.e. the person you targeted missed their meeting), undo the changes you
made to the message you intercepted so upon audit it appears as though the
message was never tampered with. Doing this is usually hard to detect and will
slowly cause the target organization to destabilize itself as tensions between
individuals within it begin to rise and their employees begin to question their
own sanity.
(4) Take complete or partial control over the target organization’s main means
of communication (usually email). Review a few of their messages and learn how
they are structured and formatted. Use the credentials of a high ranking
individual within the target organization to distribute a message that appears
to be from them that claims a terrible tragedy has occurred that warrants an
immediate, brash, resource intensive response from the rest of the
organization. You will most likely not be able to pull this off more than once.
This stratagem works especially well against militant groups with poorly
defined command structures but has other applications as well.
(5) Once inside of the target organization’s network, acquire a small amount of
classified data intended for the eyes of high ranking personnel only.
Strategically plant the data on the computer of one or more lower ranking
individuals. Make it look like an espionage attempt. If many key individuals
within the target organization are accused of trying to siphon out its secrets,
it will be forced to suspend a large portion of its operations while an
investigation is done.
(6) Use a DDoS attack to disrupt the target organization’s communications for a
short period of time when they are most in need of it. For a corporation, this
could be during an important international Skype call. For a government, this
could be immediately following a devastating attack from an insurgency group.
Doing this will cause panic, which will make the target organization
temporarily more susceptible to other kinds of attacks.
(7) Pose as a legitimate company selling legitimate software and befriend the
target organization. Create a piece of software with a very hard to detect
security flaw in it and sell it to them. The flaw could be as simple as a
poorly implemented encryption library or as complex as an insecure multistage
parsing algorithm. It must be incredibly subtle. So subtle that if it is
detected you will be able to write it off as unintentional. It should be
plausibly deniable. Once the target organization installs the vulnerable
software on their machines, leverage it to perform targeted attacks on key
individuals within it. Do not use it to infect entire subnets, as that will
draw to much attention.
(8) Locate a small software provider your target organization already does
business with and infiltrate their network by using other stratagems. Modify
their source code slightly so that their software becomes vulnerable to remote
attack. Do not modify just any code you come across, study the software
provider’s development process and target code that has already been checked
for bugs and is days away from being released to customers. When the target
organization installs the latest version of software from the company that you
have infiltrated, they will become vulnerable. Leverage this vulnerability to
perform targeted attacks on key individuals within the target organization. Do
not use it to infect entire subnets, as that will draw to much attention.
(9) Locate a small software provider your target organization already does
business with and infiltrate their network by using other stratagems. Most
software companies offer rewards to security researchers who find
vulnerabilities in their products. Determine how reported vulnerabilities are
managed by the company you have infiltrated and devise a way to monitor them
in real time. As soon as a security researcher reports a major vulnerability
in a product your target organization uses, use it to perform targeted attacks
on key individuals within it. Do not use it to infect entire subnets, as that
will draw to much attention.
(10) Using other stratagems, infiltrate the computers of a number of influential
individuals within the target organization. Monitor their activity constantly
and closely. If possible, listen to them through their computer’s microphone.
When you believe that one of them has left their computer, undo things they
have just done. Delete the last sentence they wrote. Hit the back button on
their web browser. Close the program they just opened. Over time, this will
lead them to question their sanity.
(11) Using other stratagems, infiltrate the computers of a number of influential
individuals within the target organization. Most modern governments and
corporations are at least partially corrupt. Find evidence of this corruption
and use it to compel one or more of these influential individuals to aid your
cause. If you are unable to find any evidence of corruption, do not be afraid
to bluff. If you make a mysterious window pop up on, say, a CFO’s computer that
alludes to some sort of dirty secret, it is very possible that the CFO will
assume that the hacker who caused the widow to appear knows something about
them that they actually do not. A lot of powerful people have skeletons in the
closet. The media has instilled a fear of hackers into the general populace,
and this fear can be used to your advantage. Most normal people, upon being
confronted by a hacker that has gained complete control of their computer, will
be inclined to believe plausible sounding white lies. Having an “inside man”
within your target organization can be extremely useful.
Interlocking Stratagems in Practice
In this section I shell present an example of a plausible situation that could
warrant the involvement of hacktivists and a corresponding attack loosely built
upon the stratagems from the last section. I have tried to make the situation
realistic, but it is very likely that if you use my writing to plan and execute
your own attack it will play out nothing like the attack depicted below. Most
actual attacks are far more complex than the one presented here. The purpose
of this example is to demonstrate the way in which multiple strike teams should
work together. Notice how at all times each team has one or more specific
goals.
Situation: A hacktivist collective has decided to attack the terrorist
organization Bina Al-ar-mal after they captured and executed a tourist in
Syria. Bina Al-ar-mal is believed to consist of over 40,000 people, has
hundreds of public Twitter feeds and Facebook accounts, and runs a small
terrorist news site hosted on a Russian server. It has three known leaders, who
we shall refer to as Head Terrorist 1, Head Terrorist 2, and Head Terrorist 3.
Twenty-seven hacktivists have joined the effort. They have been split into
three teams: team 1 consists of five of the most highly skilled hacktivists,
team 2 consists of seven moderately skilled hacktivists, and team 3 consists of
fifteen amateur hacktivists.
Time Line:
(Day 1, Hour 1) Team 1 is initially tasked by the collective with infiltrating
as many terrorist Twitter and Facebook accounts as possible. The team starts
enumerating the accounts immediately. They decide that no drill will be
executed, as breaking into Facebook and Twitter accounts is a trivial task.
(Day 1, Hour 1) Team 2 is initially tasked by the collective with infiltrating
the web hosting provider hosting the terrorist group’s website. They begin
reconnaissance.
(Day 1, Hour 1) Team 3 is initially tasked by the collective with attacking
Bina Al-ar-mal’s website directly. They begin to map the website.
(Day 1, Hour 2) Team 1 finishes enumerating the terrorist Facebook and Twitter
accounts. They begin attempting to break into them.
(Day 1, Hour 2) Team 3 finishes mapping Bina Al-ar-mal’s website and begins to
attack.
(Day 1, Hour 3) Team 1 has breached a few terrorist Facebook and Twitter
accounts. After examining their contents they determine that the terrorists
are using SpookyMail email service to communicate off of social media. A few
terrorist email accounts are identified and the team begins to try to break
into those as well.
(Day 1, Hour 3) Team 3 gains read/write access to a limited portion of the
server Bina Al-ar-mal’s website is hosted on. The other teams are alerted.
They set up a simple php based IP logger script to capture the IP addresses of
Bina Al-ar-mal members attempting to check their organization’s news feed.
(Day 1, Hour 6) Team 2’s reconnaissance ends. They have located the web hosting
provider and gathered information on said provider’s website and servers. They
begin attacking them.
(Day 1, Hour 7) Team 1 breaches their first few terrorist email accounts.
(Day 1, Hour 9) Team 2 locates a vulnerability in the the terrorist’s web
hosting provider’s website. They are not able to fully compromise any of their
servers, but they are able to get a list of customer names, domain names, and
billing addresses by exploiting a flaw in the website’s shopping cart feature.
Upon inspecting the list, they discover that the person paying Bina Al-ar-mal’s
hosting bill has a British billing address. The other teams are alerted and
Scotland Yard is notified of the terrorist threat immediately.
(Day 1, Hour 23) Team 1 is able to get Head Terrorist 1’s email address off of
the “contact” pane of one of the hacked terrorist email accounts. They make
ready for a spear phishing attack against him, but decide to wait some time to
launch it, as it is currently the middle of the night where Head Terrorist 1 is
believed to be.
(Day 2, Hour 3) Team 3 has gathered over seven thousand IP addresses of people
viewing Bina Al-ar-mal’s news feed and tries to attack them all using known
router vulnerabilities. When all is said and done they have infected
thirty-seven routers and forty-six workstations. They determine that
thirty-four of these work stations belong to active members of Bina Al-ar-mal.
They observe these workstations passively, hoping to gather information. The
other two teams are briefed on their success.
(Day 2, Hour 8) Team 1 launched a spear phishing attack against Head Terrorist
1 using the hacked email account of another terrorist.
(Day 2, Hour 9) Team 1’s spear phishing attack against Head Terrorist 1 is a
success. They now have full control over his Windows XP laptop and inform the
other two teams of their success. After searching the laptop’s hard drive and
downloading a half gigabyte of confidential documents and IM logs, the team
decides to plant a PDF of the Christian Bible on it along with some real
looking fake papers from the CIA. After gleaning Head Terrorist 2’s and Head
Terrorist 3’s email addresses from the stolen IM logs, the team sends them both
emails from the hacked email account of a lower level terrorist claiming that
Head Terrorist 1 is dirty.
(Day 2, Hour 9) Team 3 decides to take the sensitive information stolen from
Head Terrorist 1’s computer stolen by Team 1 along with other fake CIA
documents and place it on all thirty-four of the terrorist workstations they
control. They use a hacked email account belonging to an uninvolved terrorist
to inform Head Terrorist 2 and Head Terrorist 3 that Head Terrorist 1 is a
traitor an he has at least thirty-four moles inside of their organization, all
of whom they mention by name.
(Day 2, Hour 10) Head Terrorist 1’s laptop is searched by security forces under
the control of Terrorist 2. Head Terrorist 1 is determined to be part of the
CIA and is placed into a cell to be used as leverage against the United States.
(Day 2, Hour 17) Head Terrorist 2 and Head Terrorist 3 raid all thirty-four of
the suspected moles and find the planted documents. They begin to interrogate
all thirty-four of them in order to find out how deep the CIA has penetrated
their organization. None of them know anything but most of them make up real
sounding false information to make the interrogations end.
(Day 3, Hour 3) Team 1 determines that most remaining Facebook and Twitter
accounts can not be breached. Several team members leave and a few stick around
to try and finish off the remaining accounts.
(Day 6, Hour 17) Scotland Yard arrests the person allegedly paying for Bina
Al-ar-mal’s web hosting. It is later determined that the person is actually
part of a London-based Bina Al-ar-mal cell.
(Day 6, hour 20) Team 2 destroys Bina Al-ar-mal’s web site after catching word
of the Scotland Yard raid.
End Result: One of three head terrorists is being held by their own
organization as a traitor and thirty-four unrelated terrorists are being held
by their own organization and brutally interrogated about actions they did not
commit. One terrorist is in the custody of the Scotland Yard, and a British
terror cell has been exposed. Bina Al-ar-mal’s entire communication network is
compromised (but they do not know that yet), and their website has been taken
offline permanently. All members of Bina Al-ar-mal are now becoming
increasingly suspicious of their fellow members and the hacktivist collective
is now in a position to launch further attacks on Bina Al-ar-mal (using the
compromised email and social media accounts) at a later time. This has all been
accomplished in under a week.
________________________________________________________________________________
Disclaimer: All information provided in this document is for educational
purposes only. The ideas presented here are solely academic and should never be
acted upon or put into practice. The author of this document will not be held
responsible in the event any criminal or civil charges be brought against any
individuals misusing the information in this document to break the law.
Encryption has gained the attention of actors on both sides of the mass surveillance debate. For example in a speech at the Brookings Institution FBI Director James Comey complained that strong encryption was causing U.S. security services to “go dark.” Comey described encrypted data as follows:
“It’s the equivalent of a closet that can’t be opened, a safe deposit box that can’t be opened, a safe that can’t ever be cracked.”
Got that? Comey essentially says that encryption is a sure bet. Likewise during an interview with James Bamford whistleblower Ed Snowden confidently announced that:
“We have the means and we have the technology to end mass surveillance without any legislative action at all, without any policy changes… By basically adopting changes like making encryption a universal standard—where all communications are encrypted bydefault—we can end mass surveillance not just in the United States but around the world.”
If you glanced over the above excerpts and took them at face value you’d probably come away thinking that all you needed to protect your civil liberties is the latest encryption widget. Right? Wow, let me get my check book out! PagingMr. Omidyar…
Not so fast bucko. There’s an important caveat, some fine print that Ed himself spelled out when he initially contacted film director Laura Poitras. In particular Snowden qualified that:
“If the device you store the private key and enter your passphrase on has been hacked, it is trivial to decrypt our communications.”
This corollary underscores the reality that, despite the high profile sales pitchthat’s being repeated endlessly, strong encryption alone isn’t enough. Hi-techsubversion is a trump card as the Heartbleed bug graphically illustrated. In light of the NSA’s mass subversion programsit would be naïve to think that there aren’t other critical bugs like Heartbleed, subtle intentional flaws, out in the wild being leveraged by spies.
The FBI’s Tell
James Comey’s performance at Brookings was an impressive public relations stunt. Yet recent history is chock full of instances where the FBI employed malware like Magic Lantern and CIPAV to foil encryption and identify people usingencryption-based anonymity software like Tor. If it’s expedient the FBI will go so far as to impersonate a media outletto fool suspects into infecting their own machines. It would seem that crooks aren’t the only attackers who wield social engineering techniques.
In fact the FBI has gotten so adept at hacking computers, utilizing what are referred to internally as Network Investigative Techniques, that the FBI wants to change the law to reflect this. The Guardian reportson how the FBI is asking the U.S. Advisory Committee on Rules and Criminal Procedure to move the legal goal posts, so to speak:
“The amendment [proposed by the FBI] inserts a clause that would allow a judge to issue warrants to gain ‘remote access’ to computers ‘located within or outside that district’ (emphasis added) in cases in which the ‘district where the media or information is located has been concealed through technological means’. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.”
In other words the FBI wants to be able to hack into a computer when its exact location is shrouded by anonymity software. Once they compromise the targeted machine it’s pretty straightforward to install a software implant (i.e. malware) and exfiltrate whatever user data they want, including encryption passwords.
If encryption is really the impediment that director Comey makes it out to be then why is the FBI so keen to amend the rules in a manner which implies that they can sidestep it? In the parlance of poker this is a “tell.”
Denouncement
As a developer who has built malicious softwaredesigned to undermine security tools I can attest that there is a whole burgeoning industrywhich prays on naïve illusions of security. Companies like Hacking Teamhave found a lucrative niche offering products to the highest bidder that compromise security and… a drumroll please… defeat encryption.
There’s a moral to this story. Cryptome’s own curmudgeon, John Young, prudently observes:
“Protections of promises of encryption, proxy use, Tor-likeanonymity and ‘military- grade’ comsec technology are magic acts –ELINT, SIGINT and COMINT always prevail over comsec. The most widely trusted and promoted systems are the most likely to be penetrated, exploited, spied upon, successfully attacked, covertly compromised with faults hidden by promoters, operators, competitors, compromisers and attackers all of whom warn against the others while mutually benefiting from continuous alarms about security and privacy.”
When someone promises you turnkey anonymity and failsafe protection from spies, make like that guy on The Walking Dead and reach for your crossbow. Mass surveillance is a vivid expression of raw power and control. Hence what ails society is fundamentally a political problemwith economic and technical facets, such that safeguarding civil liberties on the Internet will take a lot more than just the right app.
Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.
Voice biometrics—the use of voice-recognition software to record and use your speech patterns as a unique “fingerprint” that can be used to identify you—will be increasingly standardized for government and businesses in the next two to three years
Everybody has a unique voice—and it can now be used to track you.
That’s the burgeoning field of “voice biometrics,” and businesses and governments are increasingly using the technology to track individuals—an estimated 65 million voiceprints are now in corporate and government databases, according to the Associated Press. And the technology is now widely available, and spreading rapidly.
Among the companies that AP identifies as using biometrics are Barclays Bank, mutual fund manager Vanguard Group, and Turkish cell phone provider Turkcell. On the government side, US law enforcement uses voice biometrics to track inmates and paroled offenders, the Internal Revenue Department in New Zealand currently has 1 million voiceprints on record, and South Africa’s Social Security Agency has tallied 7 million voiceprints.
Via AP:
Activists worry that the popularity of voiceprinting has a downside.
“It’s more mass surveillance,” said Sadhbh McCarthy, an Irish privacy researcher. “The next thing you know, that will be given to border guards, and you’ll need to speak into a microphone when you get back from vacation.”
The legality of voice recording differs from country to country. In the United States, voice recording falls under state, rather than federal law, and rules differ from state to state. In 38 states and the District of Columbia, “conversations may be recorded if the person is party to the conversation, or if at least one of the people who are party to the conversation have given a third party consent to record the conversation. In California, Connecticut, Delaware, Florida, Illinois, Maryland, Massachusetts, Nevada, New Hampshire, Pennsylvania, Vermont, and Washington State, the consent of all parties of the conversation must be obtained in order to record a conversation,” according to Wikipedia.
Consent, of course, may be given without much thought—it might easily be buried in, for instance, a phone company’s terms of service, or an “all calls may be recorded for training purposes” notice on a phone call you sleep through.
Within the next two to three years, it’s expected that more and more companies will begin standardizing the use of voice biometrics as passwords—you’ll just speak your name or a phrase into the phone to identify yourself, instead of a password.
Of course, once locked in, voice biometrics could conceivably be used to track individuals in public places, meaning that the use of cell phones to monitor and track individuals could be obsolete, giving way to simply tracking any spoken word as long as it’s in the range of equipment sensitive enough to identify voice biometrics.
The Electronic Frontier Foundation has been sounding the alarm about biometrics and civil liberties violations since 2003—in this case, facial recognition technology. Documents released by Edward Snowden this summer reveal that the NSA collects over 55,000 facial recognition quality images a day through global surveillance programs—through e-mails, texts, social media, videoconferencing and more. As the NSA has been demonstrated to track and record nearly all cell phone calls, it presumably wouldn’t be much trouble to use that information for establishing a covert voice biometrics database.
Following leads on the anthrax trail took us across four continents – filming outside the high security perimeter fences of some of the world’s most secret germ war labs (and inside a couple), tracking down and talking to experts and scientists some of whom were members of the so called “International Bio-Weapons Mafia”. None was more chilling than the face to face we got with the man they call Doctor Death – Wouter Basson, the army scientist who headed apartheid South Africa’s secret germ war program – Project Coast.
Shrouded in mystery and hidden behind front companies that used worldwide intelligence connections, the shocking activities of the program only emerged after the fall of apartheid – revealing a shockingly sophisticated operation that had 200 scientists developing germ war agents to be used against the country’s black population.
This was one of the very few interviews Doctor Death has given and for the first time he talks candidly about the help the received from the West, his relationship with David Kelly and the creation of “the Black Bomb” an agent that could sterilize blacks without their knowledge.
And then there’s his strange relationship with Larry Ford, the Mormon gynecologist to Hollywood stars who was also moonlighting for the South Africans and had CIA connections.
Some experts are wondering whether Doctor Deaths’s program provided a convenient off-shore operation for Western germ war experimentation?
Operating out of South Africa during the Apartheid era in the early 1980’s, Dr. Wouter Basson launched a secret bioweapons project called Project Coast. The goal of the project was to develop biological and chemical agents that would either kill or sterilize the black population and assassinate political enemies. Among the agents developed were Marburg and Ebola viruses.
Basson is surrounded by cloak and dagger intrigue, as he told Pretoria High court in South Africa that “The local CIA agent in Pretoria threatened me with death on the sidewalk of the American Embassy in Schoeman Street.” According to a 2001 article in The New Yorker magazine, the American Embassy in Pretoria was “terribly concerned” that Basson would reveal deep connections between Project Coast and the United States.
In 2013, Basson was found guilty of “unprofessional conduct” by the South African health council.
Bioweapons expert Jeanne Guillemin writes in her book Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterrorism, “The project‘s growth years were from 1982 to 1987, when it developed a range of biological agents (such as those for anthrax, cholera, and the Marburg and Ebola viruses and for botulinum toxin)…“
Basson’s bioweapons program officially ended in 1994, but there has been no independent verification that the pathogens created were ever destroyed. The order to destroy them went directly to Dr. Basson. According to the Wall Street Journal, “The integrity of the process rested solely on Dr. Basson’s honesty.”
Basson claims to have had contact with western agencies that provided “ideological assistance” to Project Coast. Basson stated in an interview shot for the documentary Anthrax War that he met several times with Dr. David Kelly, the infamous UN weapons inspector in Iraq. Kelly was a top bioweapons expert in the United Kingdom. He was found dead near his home in Oxfordshire in 2003. While the official story claims he committed suicide, medical experts highly doubt this story.
In a 2007 article from the Mail Online, it was reported that a week prior to his death, Dr. Kelly was to be interviewed by MI5 about his ties to Dr. Basson.
Dr. Timothy Stamps, Minister of Health of Zimbabwe, suspected that his country was under biological attack during the time that Basson was operating. Stamps told PBS Frontline in 1998 that “The evidence is very clear that these were not natural events. Whether they were caused by some direct or deliberate inoculation or not, is the question we have to answer.”
Stamps specifically named the Ebola and Marburg viruses as suspect. Stamps thinks that his country was being used as a testing ground for weaponized Ebola.
“I’m talking about anthrax and cholera in particular, but also a couple of viruses that are not endemic to Zimbabwe [such as] the Ebola type virus and, we think also, the Marburg virus. We wonder whether in fact these are not associated with biological warfare against this country during the hostilities…Ebola was along the line of the Zambezi [River], and I suspect that this may have been an experiment to see if a new virus could be used to directly infect people.”
The Ghanaian Times reported in early September on the recent Ebola outbreak, noting connections between Basson and bioweapons research. The article points out that, “…there are two types of scientists in the world: those who are so concerned about the pain and death caused to humans by illness that they will even sacrifice their own lives to try and cure deadly diseases, and those who will use their scientific skill to kill humans on the orders of… government…”
Indeed, these ideas are not new. Plato wrote over 2,000 years ago in his work The Republic that a ruling elite should guide society, “…whose aim will be to preserve the average of population.” He further stated, “There are many other things which they will have to consider, such as the effects of wars and diseases and any similar agencies, in order as far as this is possible to prevent the State from becoming either too large or too small.”
As revealed by The Age, Nobel prize winning Australian microbiologist Sir Macfarlane Burnet secretly urged the Australian government in 1947 to develop bio weapons for use against the “overpopulated countries of South-East Asia.” In a 1947 meeting with the New Weapons and Equipment Development Committee, the group recommended that “the possibilities of an attack on the food supplies of S-E Asia and Indonesia using B.W. agents should be considered by a small study group.”
This information gives us an interesting perspective on the recent unprecedented Ebola outbreak. Is it an organic natural phenomenon? Did this strain of Ebola accidentally escape from a bioweapons lab? Or, was it deliberately released?
When communities attempt to police the police, they often get, well… policed.
In several states, organized groups that use police scanners and knowledge of checkpoints to collectively monitor police activities by legally and peacefully filming cops on duty have said they’ve experienced retaliation, including unjustified detainment and arrests as well as police intimidation.
The groups operate under many decentralized organizations, most notably CopWatch and Cop Block, and have proliferated across the United States in the last decade – and especially in the aftermath of the events that continue to unfold in Ferguson, Missouri, after officer Darren Wilson fatally shot unarmed, black teenager Michael Brown.
Many such groups have begun proactively patrolling their communities with cameras at various times during the week, rather than reactively turning on their cameras when police enter into their neighborhoods or when they happen to be around police activity.
Across the nation, local police departments are responding to organized cop watching patrols by targeting perceived leaders, making arrests, threatening arrests, yanking cameras out of hands and even labeling particular groups “domestic extremist” organizations and part of the sovereign citizens movement – the activities of which the FBI classifies as domestic terrorism.
Courts across the nation at all levels have upheld the right to film police activity. The American Civil Liberties Union (ACLU) and photographer’s associcationshave taken many similar incidents to court, consistently winning cases over the years. The Supreme Court has ruled police can’t search an individual’s cellphone data without a warrant. Police also can’t legally delete an individual’s photos or video images under any circumstances.
“Yet, a continuing stream of these incidents (often driven by police who have been fed ‘nonsense‘ about links between photography and terrorism) makes it clear that the problem is not going away,” writes Jay Stanley, a senior policy analyst at the ACLU’s Speech, Privacy & Technology Project.
Sources who have participated in various organized cop watching groups in cities such as New York; Chicago; Cleveland; Las Vegas; Oakland; Arlington, Texas; Austin and lastly Ferguson, Missouri, told Truthout they have experienced a range of police intimidation tactics, some of which have been caught on film. Cop watchers told Truthout they have been arrested in several states, including Texas, New York, Ohio and California in retaliation for their filming activity.
More recently, in September, three cop watchers were arrested while monitoring police activity during a traffic stop in Arlington, Texas. A group of about 20 people, a few of them associated with the Tarrant County Peaceful Streets Project, gathered at the intersection of South Cooper Street and Lynda Lane during a Saturday night on September 6 to film police as they conducted a traffic stop. A video of what happened next was posted at YouTube.
Arlington police charged Janie Lucero, her husband, Kory Watkins, and Joseph Tye with interference of public duties. Lucero and Watkins were charged with obstructing a highway while Tye was arrested on charges of refusing to identify himself.
Arlington police have defended the arrests of the three cop watchers, but the watchers say they weren’t interfering with police work, and were told to move 150 feet away from the officers – around the corner of a building where they couldn’t film the officers.
“When we first started [cop watching, the police] seemed kind of bothered a little bit,” Watkins told Truthout. “There was a change somewhere where [the police] started becoming a little bit more offended, and we started having more cop watchers so I guess they felt like they needed to start bringing more officers to traffic stops.”
On the night of Watkin’s arrest, his group had previously monitored two other traffic stops without any confrontation with Arlington police officers before the incident that led to the arrests.
Sometimes, though, retaliation against cop watching groups goes far beyond arresting cop watchers on patrol.
Cops Label Cop Watch Groups Domestic Terrorists
On New Year’s Day in 2012, Antonio Buehler, a West Point graduate and former military officer, witnessed two Austin police officers assaulting a woman. He pulled out his phone.
As he began photographing the officers and asking questions about their activities, the cops assaulted and arrested him. He was charged with spitting in a cop’s face – a felony crime.
However, two witness videos of the incident surfaced and neither of them showed that Buehler spit in Officer Patrick Oborski’s face. A grand jury was finally convened in March 2013 and concluded there was not enough evidence to indict Buehler on any of the crimes he was charged with.
A few months after the New Year’s Day incident, Buehler and other Austin-based activists started the Peaceful Streets Project (PSP), an all-volunteer organization dedicated to stopping police abuse. The group has held “Know Your Rights” trainings and a Police Accountability Summit. The group also regularly organizes cop watch patrols in Austin.
Since the PSP was launched, the movement has grown, with local chapters popping up in other cities and states across the United States, including Texas’ Tarrant County chapter, which the three cop watchers arrested in Arlington were affiliated with.
But as the Peaceful Streets movement spread, police retaliation against the groups, and particularly Buehler himself, also escalated.
“[The Austin Police Department (APD)] sees us as a threat primarily because we shine a spotlight on their crimes,” Buehler said.
The group recently obtained documents from the APD through a Freedom of Information Act (FOIA) request that reveal Austin police colluded to arrest Buehler and other cop watchers affiliated with the Peaceful Streets Project. Since the New Year’s Day incident, Buehler has been arrested three more times by APD officers. At least four other members of PSP have been arrested on charges of interference or failing to identify themselves during their cop watching activities.
The emails indicate APD officers monitored Buehler’s social media posts and attempted to justify arresting him for another felony crime of online impersonation over an obviously satirical post he made on Facebook, as well as reveal that some APD officers coordinated efforts to stop PSP members’ legal and peaceful activities, even suggesting reaching out to the District Attorney’s office to see if anything could be done to incarcerate members of the group.
Another internal email from APD senior officer Justin Berry identifies PSP as a “domestic extremist” organization. Berry writes that he believes police accountability groups including PSP, CopWatch and Cop Block are part of a “national domestic extremism trend.” He believes he found “mirror warning signs” in “FBI intel.” Berry makes a strange attempt to lump police accountability activists and the hacker-collective Anonymous in with sovereign citizens groups as a collective revolutionary movement.
“Sovereign citizens” groups generally believe federal, state and local governments are illegitimate and operate illegally. Some self-described sovereign citizens create fake license plates, identification and forms of currency to circumvent official government institutions. The FBI classifies the activities of sovereign citizens groups as domestic terrorism, considering the groups a growing “domestic threat” to law enforcement.
Buehler told Truthout the APD is working with a Department of Homeland Security (DHS) fusion center to attempt to identify PSP as a sovereign citizens group to associate its members with domestic terrorism with state and federal authorities. DHS fusion centers are designed to gather, analyze and promote the sharing of intelligence information between federal and state agencies.
“They have spent a fair amount of resources tracking us, spying on us and infiltrating our group, and we are just peaceful activists who are demanding accountability for the police,” Buehler told Truthout. “They have absolutely no evidence that we’ve engaged in any criminal activity or that we’ve tried to engage in criminal activity.”
APD officials did not respond to a request for comment.
“They’ve pushed us; they’ve assaulted us for filming them; they’ve used their horses against us and tried to run us into walls; they’ve driven their cars up on us; they illegally detained us and searched us; they get in our face and they yell at us; they threaten to use violent force against us,” Buehler said. “But we didn’t realize until these emails just how deep this intimidation, how deep these efforts were to harm us for trying to hold them accountable.”
Buehler also said the group has additional internal emails which have not been released yet that reveal the APD attempted to take another charge to the District Attorney against him for felony child endangerment over the activities of a teenaged member of PSP.
He said he and other members of PSP were interested in pursuing a joint civil action against the APD over their attempts to frame and arrest them for their First Amendment activities.
This is not the first time a municipal police department has labeled a local cop watching group as an extremist organization.
In 2002, internal files from the Denver Police Department’s (DPD) Intelligence Unit were leaked to the ACLU, revealing the unit had been spying on several activist groups in the city, and keeping extensive records about members of the activist groups. Many of these groups were branded as “criminal extremist” organizations in what later became a full-scale controversy widely known as the Denver police’s “spy files.” Some of the groups falsely branded as “criminal extremist” groups included three police accountability organizations: Denver CopWatch, End the Politics of Cruelty and Justice for Mena.
Again, from October 2003 through the Republican National Convention (RNC) in August 2004, intelligence digests produced by the New York City Police Department (NYPD) on dozens of activist groups, including several police accountability organizations, were made public under a federal court order. TheNYPD labeled participants of the “Operation CopWatch” effort as criminal extremists.
Those who participated in “Operation CopWatch” during the RNC hoped to identify undercover cops who might attempt to provoke violence during demonstrations and document police violence or misconduct against protesters.
Communities Benefiting From Cop Watch Patrols Resist Police Retaliation Against Watchers
In some major urban areas, rates of police harassment of individuals drop considerably after cop watchers take to the streets – and communities band together to defend cop watch patrols that experience police retaliation, say veteran cop watchers.
Veteran police accountability activist José Martín has trained and organized with several organizations that participate in cop watch activities. Martín has been detained and arrested several times while cop watching with organized patrols in New York and Chicago.
His arrests in New York are part of a widely documented problem in the city. In fact, retaliation in New York against cop watchers has been so widespread that the NYPD had to send out an official memo to remind officers that it is perfectly legal for civilians to film cops on duty.
Martín described an experience in Chicago in which he felt police unjustly retaliated against him after a local CopWatch group formed and began regularly patrolling Chicago’s Pilsen neighborhood. After the group became well-known by the Pilsen community, residents gathered around an officer who had detained Martín after a patrol one night in 2009, calling for his release. The officer let him go shortly after.
“When cop watchers are retaliated against, if the community is organized, if there is a strong relationship between cop watch patrols and the community, but most importantly, if the cop watchers are people of the community, that community has the power to push back against retaliation and prevent its escalation,” Martín said. “Retaliation doesn’t work if you stand together.”
Another veteran cop watcher, Jacob Crawford, co-founder of Oakland’s We Copwatch, is helping the community of Ferguson, Missouri, organize cop watch patrols and prepare the community for the potential of police retaliation. His group raised $6,000 to pass out 110 cameras to organizers and residents in Ferguson, and train them to monitor police activity in the aftermath of the upheavals that rocked the city after Wilson killed Brown.
“I do expect retaliation, I do expect that these things won’t be easy, but these folks are in it,” Crawford told Truthout. “This is something that makes more sense to them than not standing up for themselves.”
“What we committed in the Indies stands out among the most unpardonable offenses ever committed against God and mankind, and this trade [in Indian slaves] as one of the most unjust, evil, and cruel among them.” – Bartolomé de las Casas
Christopher Columbus
Age Of Exploration
Christopher Columbus was not the first to discover the Americas, nor was he the first to realize that the earth is round. He was the first, however, in other exploits, namely genocide and the transatlantic slave trade. Doesn’t sound familiar? Read on.
The Afro-Phoenicians are described as having sailed from Egypt to the coast of Mexico as early as 750 B.C. Though Columbus may not have been the first to discover the Americas, his exploits there marked a turning-point in European thought and conquest. Five factors made this new “Age of Exploration” possible:
Advances in military technology. Around 1400, due to ongoing wars, European rulers began to improve their guns and refine their warfare strategies, prompting a European arms race. Nations with less military ability would now easily succumb to the European nations who chose to conquer them.
The printing press. Increased information now allowed rulers to govern distant lands more easily. News of Columbus’ findings traveled quickly back to the King and Queen of Spain.
Winning esteem through wealth. The amassing of great wealth was now seen not just as something positive, but also as a way in which to dominate others and allow for their “salvation.”
Proselytizing religion. European Christianity believed that religion legitimatized conquest. They would land and say a few words (in an unfamiliar language) to get the inhabitants to convert to Christianity. If they were not instantly converted, the Europeans felt relieved of their religious duties, and free to do whatever they wanted with them.
Disease. European strains of smallpox and the plague were transmitted to those they met in their travels, allowing for easier and faster domination of them.
“Tomorrow morning before we depart, I intend to land and see what can be found in the neighborhood.” – Christopher Columbus
In 1492, Columbus “discovered” the Americas when he landed in Haiti and several islands in the Caribbean. The Arawak Indians inhabited these islands, and at first Columbus described them as “very handsome,” and went into great detail about their formidable wooden boats that could hold 40-45 men. In little time, though, and after noticing their gold nose rings, he got to the point: “I was very attentive to them, and strove to learn if they had any gold.” In search of this gold, he sailed the next day around the island, ending with the ominous statement: “I could conquer the whole of them with fifty men and govern them as I pleased.” On this first voyage, Columbus captured 20-25 Arawak slaves, who he then transported back to Spain.
For the second voyage to Haiti the following year (1493), Ferdinand and Isabella gave him the resources needed to subdue the population. When he returned to Haiti, Columbus demanded food, gold, and cotton thread, and was increasingly met with resistance. This resistance gave him the opportunity he needed to declare war on the Arawaks. According to Bartolomé de Las Casas, who was there with the Spanish, Columbus chose “200 foot soldiers and 20 cavalry, with many crossbows and small cannon, lances, and swords, and a still more terrible weapon against the Indians, in addition to the horses: this was 20 hunting dogs, who were turned loose and immediately tore the Indians apart.”
The Spanish won the war, of course, for the Arawaks had only rudimentary weapons. As Columbus still could not find the gold he sought, and having to bring something back to Spain, he rounded up 1,000 Arawaks to be used as slaves. Five hundred of these he brought back to Spain, and the remaining 500 he gave to the Spanish then “governing” the island.
“These people are very unskilled in arms; with 50 men they could all be subjected and made to do all that one wished.” – Christopher Columbus
Though now in control of the Arawak Indians and their island Haiti, Christopher Columbus still could not find the gold that he was sure was somewhere on the island. The Arawaks, I’m sure, were not very willing to tell him where it was. Therefore, he set up a “tribute system” which worked thus:
Every three months, each Haitian over 14 years of age would be required to pay Columbus with either 25 pounds in cotton or a large “hawk’s bell” of gold dust (a lot of gold dust.)
Once the slaves paid this, they would receive a metal token. This token was worn around their necks as a signal that they were home-free for another 3 months (during which time they saved up for their next token, of course.)
Those who did not pay had both of their hands chopped off.
“Gold is a treasure, and he who possesses it does all he wishes to in this world, and succeeds in helping souls into paradise.” – Christopher Columbus
Hispaniola – [get directions]is a major island in the Caribbean, [now] containing the two sovereign states of the Dominican Republic and Haiti
Genocide
Due to the tribute system, the Arawaks were forced to work in the mines instead of growing food in their fields, which led to generalized malnutrition. According to a letter written by Pedro de Cordoba to King Ferdinand, “As a result of the sufferings and hard labor they endured, the Indians choose and have chosen suicide. The women, exhausted by labor, have shunned conception and childbirth…Many, when pregnant, have taken something to abort and have aborted. Others after delivery have killed their children with their own hands, so as not to leave them in such oppressive slavery.”
The initial Arawak population was estimated at 8,000,000. By 1516 only around 12,000 were still alive. By 1542, less than 200 remained. By 1555, the Arawaks were all gone.
Thus, the crime of genocide began with our very own Christopher Columbus. He completely exterminated an entire race of 8,000,000 people –and that’s only counting one of the cultures he decimated. “Haiti under the Spanish is one of the primary instances of genocide in all human history.” – Dr. James W. Loewen
“After having dispatched a meal, I went ashore, and found no habitation save a single house, and that without an occupant; we had no doubt that the people had fled in terror at our approach, as the house was completely furnished.” – Christopher Columbus
Columbus wasn’t just into subjugating and decimating; he was also interested in the sexual aspect of slavery. According to a letter written by Michele de Cuneo, before his first voyage had even reached Haiti in 1492, “Columbus was rewarding his lieutenants with native women to rape.” Columbus wrote in 1500: “A hundred castellanoes are as easily obtained for a woman as for a farm, and it is very general and there are plenty of dealers who go about looking for girls; those from nine to ten are now in demand.” This is not exactly the character of Christopher Columbus that was portrayed in public school.
Aside from sexual slavery, there existed, of course, the aspect of using slavery for profit. When there were no more Arawaks to mine his gold for him–for they no longer existed–Columbus systematically depleted the Bahamas of their peoples for this task. Tens of thousands of slaves from the Bahamas were transported to Haiti, leaving the islands behind deserted. Peter Martyr reported in 1516: “Packed in below deck, with hatchways closed to prevent their escape, so many slaves died on the trip that a ship without a compass, chart, or guide, but only following the trail of dead Indians who had been thrown from the ships could find its way from the Bahamas to Hispaniola.”
After the new batch of slaves died, Columbus depleted Puerto Rico, and then Cuba. When they had all succumbed, he turned his eyes to Africa, thus establishing the transatlantic slave trade and the concept of “race.” Through his exploits in Haiti, Columbus lead the way for other European nations to begin seeking wealth through domination, conquest, and slavery. In essence, Columbus changed the world, and we recognize this in one way or another by delineating history as being either pre- or post-Columbian.
“Columbus’ government was characterized by a form of tyranny. Even those who loved him had to admit the atrocities that had taken place. Now one can understand why he was sacked and we can see that there were good reasons for doing so. The monarchs wanted someone who did not give them problems. Columbus did not solve problems, he created them.” – Francisco de Bobadilla
The second Monday of each October, The United States of America celebrates “Columbus Day” with a public holiday and parades. Grade school kids write about how wonderful he was, and high school students write reports proclaiming his brilliance and enduring courage. He is virtually made into a sort of God, carefully placed upon a pedestal of complete ignorance.
Many college students who take history classes, and many indigenous peoples, in contrast, opt to protest the holiday in respect for the countless nations decimated by Columbus. As George P. Horse Capture writes, “No sensible Indian person can celebrate the arrival of Columbus.” Nor, I should add, can any sensible person who knows anything of his history.
“The worshipful biographical vignettes of Columbus in our textbooks serve to indoctrinate students into a mindless endorsement of colonialism that is strikingly inappropriate in today’s post-colonial era.” – Dr. James W. Loewen
“Here was a man lived long ago,
Who dreamed a special dream –
Christopher Columbus,
Christopher Columbus,
Christopher Columbus,
Dreamed a special dream.”