Michigan Announces Plan to Destroy Ranch Livestock & Arrest Farmers

Michigan Announces Plan to Destroy Ranch Livestock & Arrest Farmers

(NaturalNews) The state of Michigan is only days away from engaging in what can only be called true “animal genocide” — the mass murder of ranch animals based on the color of their hair. It’s all part of a shocking new “Invasive Species Order” (ISO) put in place by Michigan’sDepartment of Natural Resources(DNR). This Invasive Species Order suddenly and shockingly defines virtually all open-range pigs raised by small family farms to be illegal “invasive species,” and possession of just one of these animals is now a felony crime in Michigan, punishable by up to four years in prison.

The state has said it will “destroy” these pigs beginning in April, potentially byraiding local farms with government-issued rifles, then shooting the pig herds while arresting the members of the family and charging them with the “crime” of raising pigs with the wrong hair color. This may truly be a state-sponsored serial animal killing spree.

Reality check: You may think this story is some kind of early April Fools prank, but it isn’t. This is factually true and verifiable through the documents, videos and websites linked below. The state of Michigan seriously intends to unleash amass murder spree of pigs of the wrong colorbeginning April 1.

Yet these are the very pigs that farmers and ranchers in Michigan have been raisingfor decades. The state doesn’t seem to care about this, and there are indications thatthis ISO may have been nudged into position by the conventional pork industryas a tactic to wipe out its competition of local, specialty ranching conducted by small families and dedicated farmers who don’t work for the big pork corporations. (The Michigan Pork Grower’s Association.)

Hear the shocking interview and watch the family farm video…

I have recorded an exclusive interview withMark BakerfromBaker’s Green Acres— one of many ranching operations threatened with total destruction by state bureaucrats and this new Invasive Species Order. Listen to that interview here:
http://buzz.naturalnews.com/000025-Michigan-pigs-invasive_species.htm…

The Baker family has also recorded a video explaining their farming operation and how the state of Michigan is threatening to destroy their entire farming operation. Watch that stunning video (and spread the word about it) at:
http://www.youtube.com/watch?v=843yH_0RMIA

Mark Baker, by the way, is a veteran of the United States Air Force. As a veteran of the U.S. armed forces, he served to protect the rights of others, yet he now finds his own rights and freedoms under assault by the state of Michigan. He told NaturalNews he is determined to protect his livelihood at all costs and to take a stand against tyranny in Michigan.

Got the wrong hair color? The state of Michigan will kill you

The state of Michigan has issued a document describing nine “traits” of what they call “feral pigs” which they claim should be destroyed on April 1.

Read the document describing those nine traits at:
http://www.michigan.gov/documents/dnr/MDNR_DECLARATORY_RULING_2011-12…

Those traits includehaving the wrong color on the tip of the hairor evenbeing born with striped hair. The traits are written so that virtually all pigs raised by family ranchers across the state of Michigan will be targeted for destruction by the state of Michigan starting April 1. Farmers who defend their livestock may be arrested as felons and charged with multiple felony crimes by the state.

Michigan to destroy pigs based on the color of their hair – racial profiling for animal murder

Here’s some of the language from the Michigan document describing which animals are to be destroyed. Remember: For a pig to qualify as “feral” according to state tyrants, it only has to exhibit ONE of these traits, not all of them:

1) Bristle-tip coloration: exhibit bristle tips that are lighter in color (e.g., white, cream, or buff) than the rest of the hair shaft.

2) Dark point coloration: exhibits “points” (i.e., distal portions of the snout, ears, legs, and tail) that are dark brown to black in coloration, and lack light-colored tips on the bristles.

3) Coat coloration: exhibit a number of coat coloration patterns:solid black, solid red / brown, black and white spotted, black and red / brown spotted.

4) Underfur: exhibit the presence of underfur that is lighter in color (e.g., smoke gray to brown) than the overlying dark brown to black bristles/guard hairs.

5) Juvenile coat pattern: exhibit striped coat patterns — a light grayish-tan to brown base coat, with a dark brown to black spinal stripe and three to four brown irregular longitudinal stripes with dark margins along the length of the body.

6) Skeletal appearance: Structures include skull morphology, dorsal profile, and external body measurements including tail length, head-body length, hind foot length, ear length, snout length, and shoulder height.

7) Tail structure: Straight tails.

8) Ear structure: Erect ear structure.

9) “Other characteristics not currently known to the MDNR that are identified by the scientific community.”

Did you catch that last one? So now the so-called “scientific community” can simply invent whatever trait they want and the state of Michigan will legalize the mass murder of all ranch animals displaying that trait.

The state of Michigan plans to bring guns to destroy local food, local farms

What’s clear from all this is that Michigan bureaucrats plan to bring guns and handcuffs to ranches all across Michigan, shooting their family livestock dead and ruining their farming operations. They then plan to arrest these ranchers as felons and separate them from their families, then charge them with felony crimes.

This is all being done under the mantra of “government is good! Government protects you!” It’s being pushed under the guise of protecting people from “invasive species,” yet what the Michigan bureaucrats don’t tell anyone is that now your local food producers have had their own ranch animals placed on that list!

That’s the trick here: Michigan has declaredfarm animalsto be an invasive species!

An epic battle of truth, freedom and justice is being waged in Michigan

We need your help to defend farm freedom in Michigan and across the country. Here are some actions you can take:

1) SHARE this article.

2) WATCH the video:http://youtu.be/843yH_0RMIA

3) LISTEN to the interview at:
http://buzz.naturalnews.com/000025-Michigan-pigs-invasive_species.htm…

4) SUPPORT the Farm-To-Consumer Legal Defense Fund:
www.FarmToConsumer.org

4) DONATE to help support the legal fees of the Baker family farm. Their website is atwww.BakersGreenAcres.com

5) DEMAND farm freedom in your area! No government has the right to tell us what food we can or cannot grow, eat or trade! It’s as simple as that, and any government bureaucrat, tyrant or local dictator who thinks they can trample on your God-given right to choose what kind of food you wish to produce or consume is in desperate need of having a boot shoved deeply and forcefully up their rear ends.

Give tyrants the boot! Defend local farms. Even if you don’t eat pork (I don’t), this is still a farm freedom issue worth fighting for.

Read more at:
www.farmtoconsumer.org/michigan-dnr-going-hog-wild.htm
www.BakersGreenAcres.com

SOURCE:

http://www.naturalnews.com/035372_Michigan_pigs_farm_freedom.html

By: Mike Adams, March 27, 2012

Here’s How Law Enforcement Cracks Your iPhone’s Security Code

Here’s How Law Enforcement Cracks Your iPhone’s Security Code

Update: I’ve clarified two aspects of this story below. First, Micro Systemation’s XRY tool often requires more than two minutes to crack the iPhone’s password. The two minutes I originally cited were a reference to the time shown in the video (now removed by Micro Systemation) below. Given that, as I originally wrote, the phone in the video used the simplest possible password (0000), the process often takes far longer.

Second, Micro Systemation had told me that XRY can gain access to phones that run the latest version of iOS. But in fact, it can only gain access to older iPhones and iPads running the latest version of the operating system, and can’t access the iPhone 4S or the iPad 2 or later. Apologies for this oversight.

Set your iPhone to require a four-digit passcode, and it may keep your private information safe from the prying eyes of the taxi driver whose cab you forget it in. But if law enforcement is determined to see the data you’ve stored on your smartphone, those four digits will slow down the process of accessing it as little as two minutes.

Here’s a video posted last week by Micro Systemation, a Stockholm, Sweden-based firm that sells law enforcement and military customers the tools to access the devices of criminal suspects or military detainees and siphon off their personal information.

Update: After this post brought widespread attention to Micro Systemation’s video, the company has removed it from YouTube.

As the video shows showed, a Micro Systemation application the firm calls XRY can quickly crack an iOS or Android phone’s passcode, dump its data to a PC, decrypt it, and display information like the user’s GPS location, files, call logs, contacts, messages, even a log of its keystrokes.

Mike Dickinson, the firm’s marketing director and the voice in its videos, says that the company sells products capable of accessing passcode-protected iOS and Android devices in over 60 countries. It supplies 98% of the U.K.’s police departments, for instance, as well as many American police departments and the FBI. Its largest single customer is the U.S. military.  ”When people aren’t wearing uniforms, looking at mobile phones to identify people is quite helpful,” Dickinson says by way of explanation.

With smartphone adoption rocketing around the world, Dickinson says Micro Systemation’s “business is booming.” The small company has grown close to 25% in revenue year-over-year, earned $18 million in revenue in 2010 up from $12 million the year before, and doubled its employees since 2009.

“It’s a massive boom industry, the growth in evidence from mobile phones,” says Dickinson. “After twenty years or so, people understand they shouldn’t do naughty things on their personal computers, but they still don’t understand that about phones. From an evidential point of view, it’s of tremendous value.”

“If they’ve done something wrong,” he adds.

 

XRY works much like the jailbreak hacks that allow users to remove the installation restrictions on their devices, Dickinson says, though he wouldn’t say much about the exact security vulnerability that XRY exploits to gain access to the iPhone. He claims that the company doesn’t use backdoor vulnerabilities in the devices created by the manufacturer, but rather seeks out security flaws in the phone’s software just as jailbreakers do, one reason why half the company’s 75 employees are devoted to research and development. “Every week a new phone comes out with a different operating sytems and we have to reverse engineer them,” he says. “We’re constantly chasing the market.”

Update: Mike Dickinson has clarified that Micro Systemation’s XRY tool doesn’t support the iPhone 4S, iPad 2 or iPad 3. It does, however, support the latest version of Apple’s iOS operating system, so he says that older devices that have the latest software installed are still vulnerable.

After bypassing the iPhone’s security restrictions to run its code on the phone, the tool “brute forces” the phone’s password, guessing every possible combination of numbers to find the correct code, as Dickinson describes it. In the video above, the process takes seconds. (Although admittedly, the phone’s example passcode is “0000″, about the most easily-guessed password possible.)

Dicksinson acknowledges that users who set longer passcodes for devices can in fact make the devices far tougher to crack. “The more complex the password, the longer and harder it’s going to be to access the phone,” he says. “In some cases, it takes so long to brute force that it’s not worth doing it.” That may have been the situation, for instance, in one recent case involving the phone of Dante Dears, a paroled convict accused of running a prostitution ring known as “Pimping Hoes Daily” from his Android phone; The FBI, apparently unable or unwilling to crack the phone, asked Google to help in accessing it.

SOURCE:
http://www.forbes.com/sites/andygreenberg/2012/03/27/heres-how-law-enforcement-cracks-your-iphones-security-code-video/

By: Andy Greenberg, March 27, 2012

CIA & Mossad Death Squads Exposed In Syria

CIA & Mossad Death Squads Exposed In Syria

http://www.youtube.com/watch?v=fuWItcSRrM8

“We want the Syrian Army to come into Homs.”

“We want the Syrian Army posted on the roofs of the houses, with helicopters and tanks.”

“Stop these snipers from killing us.”

~ The Residents of Homs, Syria.

Moscow has accused the West and co’ of stirring up tensions in the Arab world by calling for the overthrow of President Assad and the Syrian Government. Russia has commented that those nations who are calling for the “Syrian opposition” to avoid dialogue with the government, are only encouraging and provoking further violence.

Author and journalist Webster Tarpley, from a visit to Syria, says it’s very simple: the Western powers, Israel and the Gulf States are the true forces behind the violence in Syria. They are funding Foreign Terrorist Snipers; “Death Squads”, to come into Syria and Murder Innocent Syrians randomly in their twisted bid to destabilize Syria.

Many of the so called “free syrian army” are in FACT just foreign fighters and fanatics, brought into Syria by the Western Powers, the CIA and Mossad, so as to engineer a false and highly exaggerated impression of the situation there, in order to intervene militarily in Syria and depose Assad’s Government.

What worked so wonderfully for them in Libya, they are trying to repeat in Syria. This engineered and false situation the Western Powers, Israel and the Corrupt Gulf Monarchies are engineering and cultivating is ultimately part of their unjust Zionist agenda and War against Iran and must be Exposed for the Pure Evil it is.

Webster Tarpley – Author, Historian, Journalist




On Guns and Butter | KPFA 94.1 FM Berkeley
‪http://www.kpfa.org/archive/id/76242

‬

On Syrian Addounia TV –
http://tarpley.net/media-interviews/?id=SyriaTV-20111121#SyriaTV-20111121

Pro-government rally –
http://www.youtube.com/watch?v=Is_DYXolAeM

‬

Thierry Meyssan – Author, Journalist 

RT interview –
http://www.youtube.com/watch?v=NfbzDZmtSL4

‬

Eric margolis – Author, Journalist 

Antiwar.com Radio With Scott Horton –
http://antiwar.com/radio/2011/12/13/eric-margolis-59/

Nazir Nayouf – Syrian Journalist
US Troops Deploying on Jordan-Syria Border – The Corbett Report
http://www.corbettreport.com/breaking-us-troops-deploying-on-jordan-syria-bor..

­­.‬

PROOF of Aljazeera’s lies -
‪
http://www.youtube.com/watch?v=8GwRqyGe42I&feature=related

QORVIS: Enabling, Protecting Deadly Regimes Like Bahrain

QORVIS: Enabling, Protecting Deadly Regimes Like Bahrain

Qorvis

Qorvis Communications is a “Public Relations” / lobbying firm based in Washington, DC which specializes in representing high-profile overseas clients – including Saudi Arabia, Bahrain, and Brunei. They are fond of editing Wikipedia to make themselves look better, as documented by Business Insider and Project PM.

According to a media release on 9 Aug, 2000, Qorvis was:

‘Formed through the merger of three well-known and highly regarded companies: The Poretz Group, an investor relations firm serving technology companies; The Weber/Merritt Company, a public affairs and grassroots firm; and JAS Communications, a public relations and marketing communications company. Main mover in the formation of Qorvis was Michael Petruzzello, former CEO of Shandwick North America, who will be the new firm’s managing director. The company launches with approximately $14 million in revenues and 22 employees. In addition, powerhouse law firm Patton Boggs has established an exclusive strategic alliance with Qorvis and is the company’s lead investor.’[1]

 

Contents

[hide]

[edit] Bahrain

Qorvis acquired its Bahrain account from Bell Pottinger in July 2010, for whom it served as a subcontractor until August 2011. [2] In its November 2011 FARA statement, the firm declared having rendered the following services to the Kingdom:

  • monitoring daily media coverage relevant to Bahrain;
  • conducting press activities for government officials
  • drafting/distributing fact sheets, op-ed pieces speeches and news articles by e-mail in order to position Bahrain as a committed player in the war on terror, an agent of peace in the Middle East and other unspecified issues “pertinent to the Kingdom.”[3]

Service began approximately one month prior to a major crackdown on Shiite opposition figures and domestic media outlets.[4] The New York Times speculated that the clampdown was part of the lead-up to the October 2010 parliamentary elections in which the Sunni establishment was expected to lose power to representatives of the Shiite demographic majority.[5]

Qorvis sparked criticism in March, 2011, after issuing a misleading press release on behalf of the Bahraini government.[6] After a draconian crackdown in which security forces in the Bahraini capital violently dispersed unarmed demonstrators, interrupted telecommunications services and reportedly hindered the treatment of injured civilians, Hilary Clinton issued a strong criticism of the government’s actions.[7] Qorvis responded by issuing a press release that emphasized Clinton’s positive comments by presenting them out of context, while completely skirting her critical statements:[8]

      PARIS, March 19, 2011 /PRNewswire-USNewswire/ -- U.S. Secretary of State Hillary Rodham Clinton today emphasized the
      commitment of the United States toward Bahrain and her hope for the success of the National Dialogue in the island
      kingdom. She also affirmed the "sovereign right" of Bahrain to invite security forces from allied countries, and
      stated that the U.S. shared the goals of the GCC regarding Bahrain.

      Since the uprising in Bahrain began, Bahrain's Crown Prince has called on all parties to engage in a dialogue to
      reconcile differences. Secretary Clinton said the goal of the United States is "a credible political process that can
      address the legitimate aspirations of all the people of Bahrain."

      Ambassador Houda Nonoo appreciated the Secretary's comments that dialogue should unfold in a peaceful, positive
      atmosphere that ensures that students can go to school, businesses can operate and people can undertake their normal
      daily activities. Said Ambassador Nonoo, "The government of Bahrain has consistently maintained that differences
      should be resolved peacefully around the negotiating table, but unfortunately, the opposition has not responded to
      this offer and instead has chosen to continue along the path of violence and disruption of normal life in Bahrain. It
      is my government's belief that wisdom will prevail among the opposition and they will come to the negotiating table to
      resolve all differences peacefully."

      This has been issued by Qorvis Communications on behalf of the Embassy of the Kingdom of Bahrain to the United States.

      SOURCE Embassy of the Kingdom of Bahrain to the United States*

Recent media:

[edit] Attack on Maryam al-Khawaja

In May, 2011, Bahrani human rights activist Maryam al-Khawaja was invited to speak as part of a panel discussion ‘Dawn of a New Arab World’ at the Oslo Freedom Forum.[11] Writing in the Huffington Post, Oslo Freedom Forum founder and CEO Thor Halvorssen[12] notes that ‘the Bahraini government has been aided by a coterie of “reputation management” experts, including professionals from the Washington, D.C., offices of Qorvis Communications and the Potomac Square Group, in addition to Bell Pottinger out of their offices in London and Bahrain.’ He goes on to describe:

‘Within minutes of Maryam’s speech (streamed live online) the global Bahraini PR machine went into dramatic overdrive. A tightly organized ring of Twitter accounts began to unleash hundreds of tweets accusing Maryam of being an extremist, a liar, and a servant of Iran. Simultaneously, the Oslo Freedom Forum’s email account was bombarded with messages, all crudely made from a simple template, arguing that Maryam al-Khawaja is an enemy of the Bahraini people and a “traitor.” Most of the U.S.-based fake tweeting, fake blogging (flogging), and online manipulation is carried out from inside Qorvis Communication’s “Geo-Political Solutions” division.
The effort is mechanical and centrally organized, and it goes beyond the online world. In fact, right before Maryam was to give her speech, she noticed two young women in the crowd who stalk her speeches and heckled her a few days earlier at an event in the U.S.
More so than intimidation, violence, and disappearances, the most important tool for dictatorships across the world is the discrediting of critics like Maryam.’[13]

An earlier Huffington Post article on Qorvis, linked to by Halvorssen, states:

‘One of the methods used by Qorvis and other firms is online reputation management — through its Geo-Political Solutions (GPS) division, the firm uses ‘”black arts” by creating fake blogs and websites that link back to positive content, “to make sure that no one online comes across the bad stuff,” says the former insider. Other techniques include the use of social media, including Facebook, YouTube and Twitter.’[14]

Attacks made on Maryam al-Khawaja through Twitter were numerous at that time and this, from @ActivateBahrain, is representative: #OFF2011 Maryam Al Khawaja is presenting a falsified presentation in #oslo about #Bahrain it is a package of lies and exaggerations.[15]

Another, from @Dand00na86, and posted to the #Bahrain hashtag included two phone numbers and the message Let Maryam Al-Khawaja know what you think of her lies by calling her direct![16]

Thor Halvorssen also writes that a second Bahrani blogger, Ali Abdulemam, had also been invited to speak at the 2011 Forum:

‘Ali was imprisoned by his government in September 2010 for “spreading false information.” After being released on February 23, he enthusiastically accepted his speaking invitation and plans were made for his travel. And then he disappeared. No one has seen or heard from him since March 18.’

The Geo-Political Solutions division of Qorvis is under the supervision of partner Matt J Lauer.

[edit] Yemen

To date, Qorvis’ work in Yemen has come about through their association with UK firm Bell Pottinger which is reported to have held contracts with Yemen’s National Awareness Authority and Ministry of Foreign Affairs.[17]

On November 29, 2010, Qorvis’ lodged a statement with the US Department of Justice’s register of lobbyists which outlined its role as a subcontractor to Bell Pottinger on a ‘one off basis’[18]. The work required Qorvis ‘to place an opinion article by a Yemeni official in a news outlet’.[19]

A secong statement was lodged on August 4, 2011. Qorvis was to be ‘subcontracted to provide media outreach for print and television media and strategic communications consulting’ and this would last ‘for the duration of Bell Pottinger’s engagement by Yemen’. The contract was worth a ‘payment of $30,000 monthly’[20].

[edit] Involvement With Saudi Government’s 9/11 Response

Three of Qorvis’s founding partners – Judy Smith, Bernie Merritt and Jim Weber – left in December 2002, probably due to the firm’s taking $200,000 a month from the Saudi government to aid in downplaying the links between Saudi Arabia and Al Qaeda after September 11th, 2001.[21]

[edit] Contact Information

  • 1201 Connecticut Avenue Northwest #500 Washington D.C., DC 20036-2612
  • PO Box 62081 Baltimore, MD 21264 [as of 03/04/2011]
  • Phone: (202) 496-1000
  • Fax: (202) 496-1300
  • Website: http://www.qorvis.com
  • Email: [email protected]

Other:

[edit] Major Players

Managing Partner & CEO:

Partners:

  • Stan Collender
  • Sam Dealey – Former editor of the Washington Times, the newspaper funded by the CIA and the Unification Church that eschews both profitability and truth-seeking in favor of sucking Ronald Regan zombie dick.
  • Ron Faucheux
  • Greg Lagana – Former SVP for communications and marketing @ DynCorp International; worked for Bush 2 at the Coalition Information Center prior to that.
  • Matt J Lauer – Former executive director of U.S. Advisory Commission on Public Diplomacy @ Department of State.
  • Rich Masters – Talking head. Manages client teams for the House of Saud as well as big pharma and the sugar industry.
  • John Reid – Partner and managing director for the Middle East.
  • Esther Thomas Smith
  • Karen Vahouny

Chairman:

  • Abdenbi Abdelmoumen

Vice Chairs:

  • Chuck Conconi
  • Nader Ayoub

[edit] Media Reports

  • ‘Yemen’s butcher, Ali Saleh hires PR firm Bell Pottinger (& Qorvis) amid murder of journo and protesters’[22]
  • ‘Lobbyists Jump Ship In Wake Of Mideast Unrest’[23]
  • ‘PR Mercenaries, Their Dictator Masters, And The Human Rights Stain’[24]
  • ‘Extreme Makeover: Mideast Autocrat Edition: From Moammar Qaddafi to the house of Saud, six repressive rulers who hired PR firms to help clean up their images’[25]
  • ‘Spinning Bahrain, the Qorvis way’[26]
  • ‘State of Virginia employing PR firm used by Middle East regimes accused of human rights abuses’[27]
  • ‘Who would like to provide PR for a brutal, US-backed dictatorship?’[28]
  • ‘Qorvis Working with Bahrain’s Ruling Family to Improve Image’[29]
  • ‘Qorvis Announces Appointment of New Partners’[30]

[edit] Further Research

Equatorial Guinea and Obiang:

  • The campaign for Theodorin

Egypt and Ahmed Ezz:

  • The two-year contract with Ezz

Saudi Arabia:

  • Introduction to campaign:
    • ‘Did Saudis Deceptively Finance Ad Campaign?’[31]
  • FBI raid:
    • ‘FBI Searches Saudi Arabia’s PR Firm’[32]

Other:

  • Astroturfing – Twitter, Blogs & PACs
  • Political Contributions
  • Petruzzello and John Edwards
  • Relationship with Patton Boggs
  • Relationship with Gulf Law Group/Brewer Law Group (Both Qorvis and Brewer occupy the same DC suite)
Obama Executive ‘Order’: US Can Seize Any Person, Any Resource, Any Time

Obama Executive ‘Order’: US Can Seize Any Person, Any Resource, Any Time

 

“A mere demarcation on parchment of the constitutional limits (of government) is not a sufficient guard against those encroachments which lead to a tyrannical concentration of all the powers of government in the same hands.” – James Madison, Federalist Paper #48, 1788.

President Obama signed an Executive Order for “National Defense” yesterday that claims executive authority to seize all US resources and persons, including during peacetime, for self-declared “national defense.”

The EO claims power to place any American into military or “allocated” labor use (analysis here and here).

“American exceptionalism” is the belief that a 200+ year-old parchment in the National Archives has magical powers to somehow guarantee limited government from 1% tyranny, despite the specific and clear warnings of the US Founders, despite world history of repeated oligarchic/1% tyranny claiming to be for the “good of the people,” and despite US history’s descent into vicious psychopathy (short version here: US war history in 2 minutes) hidden in plain view with paper-thin corporate media propaganda.

I don’t know about you, but both my grandfathers were in the US military during the gruesome WW1. My father, father-in-law, and only uncle were in a brutal WW2. Both wars were functions of colonialism; a 1%’s vicious and rapacious greed.

Now, we’re all looking at WW3 that includes official policy and dark rhetoric for US first-strike use of nuclear weapons on Iran. This, after multiple current lie-started and treaty-violating wars surrounding Iran, increased US military preparations, multiple war-propagandizing US political “leaders,” and recent history of US overthrowing Iran’s democracy and 35 consecutive years of US war on Iran that killed over one million Iranians.

I don’t know about you, but I’m teaching the obvious crimes in war and money, destruction of Constitutional Rights rights (see specific links below), and asking students (of all ages) what they see to do about these clear facts. The first answer people see is to help people get over their “American exceptionalism” to recognize these massive crimes, and demand arrests of the obvious criminal “leadership.”

I don’t know about you, but I refuse to be silent in face of lying and criminal government policies that annually murder millions, harm billions, and loot trillions of the 99%’s dollars.

What will you do?

Here is the US government claiming it can Constitutionally assassinate Americans upon the non-reviewable dictate of the leader, as these criminals take psychopathic steps to murder Americans who expose their crimes.

Here is NDAA 2012 where US government claims it can Constitutionally disappear Americans and then appoint a tribunal with death sentence authority (unless unlimited detention is their choice). Here is the 2006 Military Commissions Act that says the same. This is fascist terrorism to silence Americans from communicating that the 1% are War Criminals to arrest NOW.

Here is US government claiming it can Constitutionally control-drown (waterboard) anyone they declare a “terrorist” as a 1% terror-tactic to silence Americans.

Posted on March 18, 2012 by Carl Herman

SOURCE: http://www.washingtonsblog.com/2012/03/obama-executive-order-us-can-seize-any-person-any-resource-any-time.html

Again, what will you do?

Firm Mitt Romney Founded Is Tied to Chinese Surveillance Push

Firm Mitt Romney Founded Is Tied to Chinese Surveillance Push

BEIJING — As the Chinese government forges ahead on a multibillion-dollar effort to blanket the country with surveillance cameras, one American company stands to profit: Bain Capital, the private equity firm founded by Mitt Romney.

Chinese cities are installing surveillance systems with hundreds of thousands of cameras like these at a Beijing building site.

In December, a Bain-run fund in which a Romney family blind trust has holdings purchased the video surveillance division of a Chinese company that claims to be the largest supplier to the government’s Safe Cities program, a highly advanced monitoring system that allows the authorities to watch over university campuses, hospitals, mosques and movie theaters from centralized command posts.

The Bain-owned company, Uniview Technologies, produces what it calls “infrared antiriot” cameras and software that enable police officials in different jurisdictions to share images in real time through the Internet. Previous projects have included an emergency command center in Tibet that “provides a solid foundation for the maintenance of social stability and the protection of people’s peaceful life,” according to Uniview’s Web site.

Such surveillance systems are often used to combat crime and the manufacturer has no control over whether they are used for other purposes. But human rights advocates say in China they are also used to intimidate and monitor political and religious dissidents. “There are video cameras all over our monastery, and their only purpose is to make us feel fear,” said Loksag, a Tibetan Buddhist monk in Gansu Province. He said the cameras helped the authorities identify and detain nearly 200 monks who participated in a protest at his monastery in 2008.

Mr. Romney has had no role in Bain’s operations since 1999 and had no say over the investment in China. But the fortunes of Bain and Mr. Romney are still closely tied.

The financial disclosure forms Mr. Romney filed last August show that a blind trust in the name of his wife, Ann Romney, held a relatively small stake of between $100,000 and $250,000 in the Bain Capital Asia fund that purchased Uniview.

In a statement, R. Bradford Malt, who manages the Romneys’ trusts, noted that he had put trust assets into the fund before it bought Uniview. He said that the Romneys had no role in guiding their investments. He also said he had no control over the Asian fund’s choice of investments.

Mr. Romney reported on his August disclosure forms that he and his wife earned a minimum of $5.6 million from Bain assets held in their blind trusts and retirement accounts. Bain employees and executives are also among the largest donors to his campaign, and their contributions accounted for 10 percent of the money received over the past year by Restore Our Future, the pro-Romney “super PAC.” Bain employees have also made substantial contributions to Democratic candidates, including President Obama.

Bain’s decision to enter China’s fast-growing surveillance industry raises questions about the direct role that American corporations play in outfitting authoritarian governments with technology that can be used to repress their own citizens.

It also comes at a delicate time for Mr. Romney, who has frequently called for a hard line against the Chinese government’s suppression of religious freedom and political dissent.

As with previous deals involving other American companies, critics argue that Bain’s acquisition of Uniview violates the spirit — if not necessarily the letter — of American sanctions imposed on Beijing after the deadly crackdown on protests in Tiananmen Square. Those rules, written two decades ago, bar American corporations from exporting to China “crime-control” products like those that process fingerprints, make photo identification cards or use night vision technology.

Most video surveillance equipment is not covered by the sanctions, even though a Canadian human rights group found in 2001 that Chinese security forces used Western-made video cameras to help identify and apprehend Tiananmen Square protesters.

Representative Frank R. Wolf, Republican of Virginia, who frequently assails companies that do business with Chinese security agencies, said calls by some members of Congress to pass stricter regulations on American businesses have gone nowhere. “These companies are busy making a profit and don’t want to face realities, but what they’re doing is wrong,” said Mr. Wolf, who is co-chairman of the Tom Lantos Human Rights Commission.

In public comments and in a statement posted on his campaign Web site, Mr. Romney has accused the Obama administration of placing economic concerns above human rights in managing relations with China. He has called on the White House to offer more vigorous support of those who criticize the Chinese Communist Party“Any serious U.S. policy toward China must confront the fact that China’s regime continues to deny its people basic political freedoms and human rights,” according to the statement on his Web site. “The United States has an important role to play in encouraging the evolution of China toward a more politically open and democratic order.”

In recent years, a number of Western companies, including Honeywell, General Electric, I.B.M. and United Technologies, have been criticized for selling sophisticated surveillance-related technology to the Chinese government.

Other companies have been accused of directly helping China quash perceived opponents. In 2007, Yahoo settled a lawsuit asserting that it had provided the authorities with e-mails of a journalist who was later sentenced to 10 years in prison for sending an e-mail that prosecutors charged contained state secrets.

Cisco Systems is fighting a lawsuit in the United States filed by a human rights group over Internet networking equipment it sold to the Chinese government. The lawsuit asserts that the system, tailored to government demands, allowed the authorities to track down and torture members of the religious group Falun Gong.

Bain defended its purchase of Uniview, stressing that the Chinese company’s products were advertised as instruments for crime control, not political repression. “China’s increasingly urban population will face growing needs around personal safety and property protection,” the company said in a statement. “Video surveillance is part of the solution to that, as it is anywhere in the world.” The company also said that only one-third of Uniview’s sales were to public security bureaus.

William A. Reinsch, president of the National Foreign Trade Council in Washington, said it was up to the American government, not individual companies, to set the guidelines for such business ventures. “A lot of the stuff we’re talking about is truly dual use,” said Mr. Reinsch, a former Commerce Department official in the Clinton administration. “You can sell it to a local police force that will use it to track down speeders, but you can also sell it to a ministry of state security that will use it to monitor dissidents.”

But Adam Segal, a senior fellow at the Council on Foreign Relations and an expert on the intersection of technology and domestic security in China, said American companies could not shirk responsibility for the way their technology is used, especially in the wake of recent controversies over the sales of Western Internet filtering systems to autocratic rulers in the Arab world. “Technology companies have to begin to think about the ethics and political implications of selling these technologies,” he said.

Uniview is proud of its close association with China’s security establishment and boasts about the scores of surveillance systems it has created for local security agencies in the six years since the Safe Cities program was started.

“Social management and society building pose new demands for surveillance and control systems,” Uniview says in its promotional materials, which include an interview with Zhang Pengguo, the company’s chief executive. “A harmonious society is the essential nature of socialism with Chinese characteristics,” Mr. Zhang says.

Until now, Bain’s takeover of Uniview has drawn little attention outside China. The company was formerly the surveillance division of H3C, a joint venture between 3Com and Huawei, the Chinese telecommunications giant whose expansion plans in the United States have faced resistance from Congress over questions about its ties to the Chinese military.

In 2010, 3Com, along with H3C, became a subsidiary of Hewlett-Packard in a $2.7 billion buyout deal.

H3C also sells technology unrelated to video surveillance, including Internet firewall products, but it was the video surveillance division alone that drew Bain Capital’s interest.

In December, H3C announced that Bain had bought out the surveillance division and formed Uniview, although under terms of the buyout, H3C provides Uniview with products, technical support and, for a period of time, the use of its brand name. Bain controls Uniview but says it has no role in its day-to-day operations.

Bain is, however, well positioned to profit. According to the British firm IMS Research, the Chinese market for security camera networks was $2.5 billion last year, a figure that is expected to double by 2015, with more than two-thirds of that demand coming from the government. Uniview currently has just 1 percent of the market, the firm said.

Chinese cities are rushing to construct their own surveillance systems. Chongqing, in southwest China, is spending $4.2 billion on a network of 500,000 cameras, according to the state news media. Guangdong Province, the manufacturing powerhouse adjacent to Hong Kong, is mounting one million cameras. In Beijing, the municipal government is seeking to place cameras in all entertainment venues, adding to the skein of 300,000 cameras that were installed here for the 2008 Olympics.

By marrying Internet, cellphone and video surveillance, the government is seeking to create an omniscient monitoring system, said Nicholas Bequelin, a senior researcher at Human Rights Watch in Hong Kong. “When it comes to surveillance, China is pretty upfront about its totalitarian ambitions,” he said.

For the legion of Chinese intellectuals, democracy advocates and religious figures who have tangled with the government, surveillance cameras have become inescapable.

Yang Weidong, a politically active filmmaker, said a phalanx of 13 cameras were installed in and around his apartment building last year after he submitted an interview request to President Hu Jintao, drawing the ire of domestic security agents. In January, Ai Weiwei, the artist and public critic, was questioned by the police after he threw stones at cameras trained on his front gate.

Li Tiantian, 45, a human rights lawyer in Shanghai, said the police used footage recorded outside a hotel in an effort to manipulate her during the three months she was illegally detained last year. The video, she said, showed her entering the hotel in the company of men other than her boyfriend.

During interrogations, Ms. Li said, the police taunted her about her sex life and threatened to show the video to her boyfriend. The boyfriend, however, refused to watch, she said.

“The scale of intrusion into people’s private lives is unprecedented,” she said in a phone interview. “Now when I walk on the street, I feel so vulnerable, like the police are watching me all the time.”

SOURCE: http://www.nytimes.com/2012/03/16/world/asia/bain-capital-tied-to-surveillance-push-in-china.html

 

Bamford Claims NSA Has Made “An Enormous Breakthrough” in Cryptanalysis

Bamford Claims NSA Has Made “An Enormous Breakthrough” in Cryptanalysis

Well, it has been the $64,000 question for a couple of decades: Can NSA break something like PGP?

While there might be other black world technologies that could be up to the task (there’s no way to know), what we do know is that a practical quantum computing capability would be, for all intents and purposes, the master key.

I’m pretty confident that NSA has this capability and here’s why: IBM Breakthrough May Make Practical Quantum Computer 15 Years Away Instead of 50. There is no hard constant that one can point to when considering how much more advanced black world technologies are than what we think of as state of the art, but if IBM is 15 years away from building a useful quantum computer, it’s not a stretch to assume NSA has that capability already, or is close to having it.

Bamford lays out a narrative below about the “enormous breakthrough,” but, at the end of the day, it’s conventional computers. There’s no mention quantum computers, or even the far less “out there” photonic systems.

Is Bamford’s piece a limited hangout?

Maybe, but it makes for interesting reading in any event.

Note: For some reason, Bamford refers to Mark Klein as, “A whistle-blower,” without naming him. Because of Mark Klein, we know, for sure, that the mass intercepts are happening, how NSA is doing it, the equipment involved, etc. So, thanks, Mark Klein. Heroes have names on Cryptogon.

Update: Former Senior U.S. Intelligence Official and Current Booz Allen Hamilton Senior Vice President Joan A. Dempsey: ‘We’re a Few Years Away from Realizing Real Quantum Processing and Quantum Computing’

Via: CNN:

One of the first measures of tradecraft, as any good spy will tell you, is being able to tell when something just doesn’t add up. So when Joan Dempsey said she had some 49 years of experience in various roles in the military and intelligence communities, one has to wonder. She hardly looks it, but after spending some 25 years in the U.S. Navy, seven more at the CIA, and another 17 at the Pentagon in a variety of intelligence leadership positions, Dempsey swears it’s true, which means she is one of the few women in the intelligence community with nearly half a century of government experience, which has included, over the years, a number of “firsts.”

“I think that’s a huge growth area in intelligence, the big data analysis kinds of things, quantum computing which, I mean, we’re a few years away from realizing real quantum processing and quantum computing. And I mean these are areas that are going to have profound effect on every aspect of our lives, but certainly on the intelligence.

—End Update—

Via: Wired:

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”

In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever.

The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”

According to Binney—who has maintained close contact with agency employees until a few years ago—the taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct “deep packet inspection,” examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.

The software, created by a company called Narus that’s now part of Boeing, is controlled remotely from NSA headquarters at Fort Meade in Maryland and searches US sources for target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases in email. Any communication that arouses suspicion, especially those to or from the million or so people on agency watch lists, are automatically copied or recorded and then transmitted to the NSA.

The scope of surveillance expands from there, Binney says. Once a name is entered into the Narus database, all phone calls and other communications to and from that person are automatically routed to the NSA’s recorders. “Anybody you want, route to a recorder,” Binney says. “If your number’s in there? Routed and gets recorded.” He adds, “The Narus device allows you to take it all.” And when Bluffdale is completed, whatever is collected will be routed there for storage and analysis.

According to Binney, one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex.

Verizon was also part of the program, Binney says, and that greatly expanded the volume of calls subject to the agency’s domestic eavesdropping. “That multiplies the call rate by at least a factor of five,” he says. “So you’re over a billion and a half calls a day.” (Spokespeople for Verizon and AT&T said their companies would not comment on matters of national security.)

After he left the NSA, Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything. “The whole idea was, how do you manage 20 terabytes of intercept a minute?” he says. “The way we proposed was to distinguish between things you want and things you don’t want.” Instead, he adds, “they’re storing everything they gather.” And the agency is gathering as much as it can.

Once the communications are intercepted and stored, the data-mining begins. “You can watch everybody all the time with data- mining,” Binney says. Everything a person does becomes charted on a graph, “financial transactions or travel or anything,” he says. Thus, as data like bookstore receipts, bank statements, and commuter toll records flow in, the NSA is able to paint a more and more detailed picture of someone’s life.

The NSA also has the ability to eavesdrop on phone calls directly and in real time. According to Adrienne J. Kinne, who worked both before and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the World Trade Center attacks “basically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.” Even journalists calling home from overseas were included. “A lot of time you could tell they were calling their families,” she says, “incredibly intimate, personal conversations.” Kinne found the act of eavesdropping on innocent fellow citizens personally distressing. “It’s almost like going through and finding somebody’s diary,” she says.

Sitting in a restaurant not far from NSA headquarters, the place where he spent nearly 40 years of his life, Binney held his thumb and forefinger close together. “We are, like, that far from a turnkey totalitarian state,” he says.

Meanwhile, over in Building 5300, the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems. The code-breaking effort was up and running.

The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”

SOURCE: http://cryptogon.com/?p=28078

CISPA replaces SOPA as Internet’s Enemy No. 1

CISPA replaces SOPA as Internet’s Enemy No. 1

The Cyber Intelligence Sharing and Protection Act (CISPA) is quickly becoming the Internet’s new most-hated piece of legislation. But is it really “the new SOPA,” as critics are calling it? Here, a comprehensive rundown of what CISPA is, what it does, and why people think it’s dangerous.

The Internet has a new enemy. The Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), also known as H.R. 3523, is a “cybersecurity” bill in the House of Representatives. CISPA is quickly gaining traction as “the new SOPA,” the infamous anti-piracy bill that was forced to crawl back into its hole after thousands of websites and millions of Web users protested with a massive, high-profile “blackout.” While CISPA does not focus primarily on intellectual property (though that’s in there, too), critics say the problems with the bill run just as deep. But what is CISPA, really, and will its presence on Congress’ agenda cause the same type of online revolt that SOPA and PIPA did?

What is CISPA?

Unveiled to the House by Rep. Mike Rogers (R-MI) and Rep. C.A. “Dutch” Ruppersberger (D-MD) late last year, CISPA is described as a “cybersecurity” bill. It proposes to amend the National Security Act of 1947 to allow for greater sharing of “cyber threat intelligence” between the U.S. government and the private sector, or between private companies. The bill defines “cyber threat intelligence” as any information pertaining to vulnerabilities of, or threats to, networks or systems owned and operated by the U.S. government, or U.S. companies; or efforts to “degrade, disrupt, or destroy” such systems or networks; or the theft or “misappropriation” of any private or government information, including intellectual property.

CISPA also removes any liability from private companies who collect and share qualified information with the federal government, or with each other. Finally, it directs the Privacy and Civil Liberties Oversight Board to conduct annual reviews of the sharing and use of the collected information by the U.S. government.

Read the full text of CISPA here, or the full official summary at the bottom of this page.

Who supports CISPA?

The bill currently has a whopping 106 co-sponsors in the House — more than twice the number SOPA ever had. Also unlike SOPA, CISPA has explicit support from some of the technology industry’s biggest players, including Internet service providers like AT&T and Verizon, Web companies like Facebook, and hardware companies like IBM and Intel.

See the full list of CISPA co-sponsors here. See a complete list of companies and groups that support CISPA here.

What CISPA supporters say it will do

According to Rep. Rogers, CISPA will help U.S. companies defend themselves “from advanced cyber threats, without imposing any new federal regulations or unfunded private sector mandate.” It will also create “new private sector jobs for cybersecurity professionals,” and protect “the thousands of jobs created by the American intellectual property that Chinese hackers are trying to steal every day.”

In a statement, Rep. Ruppersberger pushed his reasons for proposing the legislation, saying, “Without important, immediate changes to American cybersecurity policy, I believe our country will continue to be at risk for a catastrophic attack to our nation’s vital networks — networks that power our homes, provide our clean water or maintain the other critical services we use every day.  This small but important piece of legislation is a decisive first step to tackle the cyber threats we face.”

Private companies like the bill because it removes some of the regulations that prevent them from sharing cyber threat information, or make it harder to do so. In short, they believe the bill will do exactly what its supporters in the House say it will do — help better protect them from cyber attacks.

What CISPA opponents are worried about

As with SOPA and PIPA, the first main concern about CISPA is its “broad language,” which critics fear allows the legislation to be interpreted in ways that could infringe on our civil liberties. The Center for Democracy and Technology sums up the problems with CISPA this way:

    •    The bill has a very broad, almost unlimited definition of the information that can be shared with government agencies notwithstanding privacy and other laws;
•    The bill is likely to lead to expansion of the government’s role in the monitoring of private communications as a result of this sharing;
•    It is likely to shift control of government cybersecurity efforts from civilian agencies to the military;
•    Once the information is shared with the government, it wouldn’t have to be used for cybesecurity, but could instead be used for any purpose that is not specifically prohibited.

The Electronic Frontier Foundation (EFF) adds that CISPA’s definition of “cybersecurity” is so broad that “it leaves the door open to censor any speech that a company believes would ‘degrade the network.’” Moreover, the inclusion of “intellectual property” means that companies and the government would have “new powers to monitor and censor communications for copyright infringement.”

Furthermore, critics warn that CISPA gives private companies the ability to collect and share information about their customers or users with immunity — meaning we cannot sue them for doing so, and they cannot be charged with any crimes.

According to the EFF, CISPA “effectively creates a ‘cybersecurity’ exemption to all existing laws.”

“There are almost no restrictions on what can be collected and how it can be used, provided a company can claim it was motivated by ‘cybersecurity purposes,’” the EFF continues. “That means a company like Google, Facebook, Twitter, or AT&T could intercept your emails and text messages, send copies to one another and to the government, and modify those communications or prevent them from reaching their destination if it fits into their plan to stop cybersecurity threats.”

Is the Internet freaking out like it did over SOPA/PIPA?

Not yet — but it’s starting to. After TechDirt’s Mike Masnick — a widely followed and trusted source on matters of laws regarding technology, intellectual property, and how they might affect our civil rights — posted an article telling readers to “forget SOPA, you should be worried about this cybersecurity bill” earlier this week, concerned Web users have started to take notice. On Reddit, a community that is largely responsible for the push-back against SOPA/PIPA, an increasing number of posts (some accurate, some not) have popped up regarding the potential dangers of CISPA. Anonymous has also started to get in on the action, having released a “dox” on Rep. Rogers, and a video condemning the bill, earlier this week.

Will CISPA pass?

Nobody can say for sure, but at the moment, its passage looks likely. CISPA breezed through the House Intelligence Committee on December 1, 2011, with a bipartisan vote of 17-1. Also, as mentioned, the bill has broad support in the House, with 106 co-sponsors, 10 of whom are committee chairmen.

As with any piece of legislation, however, nothing is certain until the president signs the bill. And if the Internet community rises up in the same way it did against SOPA and PIPA, then you will certainly see support for CISPA crumble in Congress (it is an election year, after all). That said, whether or not the Internet will react with such force remains a big “if.”

Conclusion

Regardless of the value of CISPA, cyber threats are a real and serious problem, one that the U.S. government will address through legislative means. Civil liberty watchdogs are always going to be wary of any bill that could possibly threaten our privacy, or put us at the mercy of corporations and the federal government. However, CISPA does have all the problems critics claim it has, and Web users should be paying critical attention to the bill.

Remember: opposing this particular bill, or others with similar problems, is not the same as a disregard for our cybersecurity, or national security — which is precisely how CISPA supporters in Congress will attempt to frame the opposition, if or when it gathers steam.

In Case You Missed It:

The Cyber Intelligence Sharing and Protection Act (CISPA) is quickly becoming the Internet’s new most-hated piece of legislation. But is it really “the new SOPA,” as critics are calling it? Here, a comprehensive rundown of what CISPA is, what it does, and why people think it’s dangerous.

The Internet has a new enemy. The Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), also known as H.R. 3523, is a “cybersecurity” bill in the House of Representatives. CISPA is quickly gaining traction as “the new SOPA,” the infamous anti-piracy bill that was forced to crawl back into its hole after thousands of websites and millions of Web users protested with a massive, high-profile “blackout.” While CISPA does not focus primarily on intellectual property (though that’s in there, too), critics say the problems with the bill run just as deep. But what is CISPA, really, and will its presence on Congress’ agenda cause the same type of online revolt that SOPA and PIPA did?

What is CISPA?

Unveiled to the House by Rep. Mike Rogers (R-MI) and Rep. C.A. “Dutch” Ruppersberger (D-MD) late last year, CISPA is described as a “cybersecurity” bill. It proposes to amend the National Security Act of 1947 to allow for greater sharing of “cyber threat intelligence” between the U.S. government and the private sector, or between private companies. The bill defines “cyber threat intelligence” as any information pertaining to vulnerabilities of, or threats to, networks or systems owned and operated by the U.S. government, or U.S. companies; or efforts to “degrade, disrupt, or destroy” such systems or networks; or the theft or “misappropriation” of any private or government information, including intellectual property.

CISPA also removes any liability from private companies who collect and share qualified information with the federal government, or with each other. Finally, it directs the Privacy and Civil Liberties Oversight Board to conduct annual reviews of the sharing and use of the collected information by the U.S. government.

Read the full text of CISPA here, or the full official summary at the bottom of this page.

Who supports CISPA?

The bill currently has a whopping 106 co-sponsors in the House — more than twice the number SOPA ever had. Also unlike SOPA, CISPA has explicit support from some of the technology industry’s biggest players, including Internet service providers like AT&T and Verizon, Web companies like Facebook, and hardware companies like IBM and Intel.

See the full list of CISPA co-sponsors here. See a complete list of companies and groups that support CISPA here.

What CISPA supporters say it will do

According to Rep. Rogers, CISPA will help U.S. companies defend themselves “from advanced cyber threats, without imposing any new federal regulations or unfunded private sector mandate.” It will also create “new private sector jobs for cybersecurity professionals,” and protect “the thousands of jobs created by the American intellectual property that Chinese hackers are trying to steal every day.”

In a statement, Rep. Ruppersberger pushed his reasons for proposing the legislation, saying, “Without important, immediate changes to American cybersecurity policy, I believe our country will continue to be at risk for a catastrophic attack to our nation’s vital networks — networks that power our homes, provide our clean water or maintain the other critical services we use every day.  This small but important piece of legislation is a decisive first step to tackle the cyber threats we face.”

Private companies like the bill because it removes some of the regulations that prevent them from sharing cyber threat information, or make it harder to do so. In short, they believe the bill will do exactly what its supporters in the House say it will do — help better protect them from cyber attacks.

What CISPA opponents are worried about

As with SOPA and PIPA, the first main concern about CISPA is its “broad language,” which critics fear allows the legislation to be interpreted in ways that could infringe on our civil liberties. The Center for Democracy and Technology sums up the problems with CISPA this way:

    •    The bill has a very broad, almost unlimited definition of the information that can be shared with government agencies notwithstanding privacy and other laws;
•    The bill is likely to lead to expansion of the government’s role in the monitoring of private communications as a result of this sharing;
•    It is likely to shift control of government cybersecurity efforts from civilian agencies to the military;
•    Once the information is shared with the government, it wouldn’t have to be used for cybesecurity, but could instead be used for any purpose that is not specifically prohibited.

The Electronic Frontier Foundation (EFF) adds that CISPA’s definition of “cybersecurity” is so broad that “it leaves the door open to censor any speech that a company believes would ‘degrade the network.’” Moreover, the inclusion of “intellectual property” means that companies and the government would have “new powers to monitor and censor communications for copyright infringement.”

Furthermore, critics warn that CISPA gives private companies the ability to collect and share information about their customers or users with immunity — meaning we cannot sue them for doing so, and they cannot be charged with any crimes.

According to the EFF, CISPA “effectively creates a ‘cybersecurity’ exemption to all existing laws.”

“There are almost no restrictions on what can be collected and how it can be used, provided a company can claim it was motivated by ‘cybersecurity purposes,’” the EFF continues. “That means a company like Google, Facebook, Twitter, or AT&T could intercept your emails and text messages, send copies to one another and to the government, and modify those communications or prevent them from reaching their destination if it fits into their plan to stop cybersecurity threats.”

Is the Internet freaking out like it did over SOPA/PIPA?

Not yet — but it’s starting to. After TechDirt’s Mike Masnick — a widely followed and trusted source on matters of laws regarding technology, intellectual property, and how they might affect our civil rights — posted an article telling readers to “forget SOPA, you should be worried about this cybersecurity bill” earlier this week, concerned Web users have started to take notice. On Reddit, a community that is largely responsible for the push-back against SOPA/PIPA, an increasing number of posts (some accurate, some not) have popped up regarding the potential dangers of CISPA. Anonymous has also started to get in on the action, having released a “dox” on Rep. Rogers, and a video condemning the bill, earlier this week.

Will CISPA pass?

Nobody can say for sure, but at the moment, its passage looks likely. CISPA breezed through the House Intelligence Committee on December 1, 2011, with a bipartisan vote of 17-1. Also, as mentioned, the bill has broad support in the House, with 106 co-sponsors, 10 of whom are committee chairmen.

As with any piece of legislation, however, nothing is certain until the president signs the bill. And if the Internet community rises up in the same way it did against SOPA and PIPA, then you will certainly see support for CISPA crumble in Congress (it is an election year, after all). That said, whether or not the Internet will react with such force remains a big “if.”

Conclusion

Regardless of the value of CISPA, cyber threats are a real and serious problem, one that the U.S. government will address through legislative means. Civil liberty watchdogs are always going to be wary of any bill that could possibly threaten our privacy, or put us at the mercy of corporations and the federal government. However, CISPA does have all the problems critics claim it has, and Web users should be paying critical attention to the bill.

Remember: opposing this particular bill, or others with similar problems, is not the same as a disregard for our cybersecurity, or national security — which is precisely how CISPA supporters in Congress will attempt to frame the opposition, if or when it gathers steam.

Special Response Team: Coming To A Neighborhood Near you, by Homeland Security

Special Response Team: Coming To A Neighborhood Near you, by Homeland Security

Now with moar National Intellectual Property Rights Coordination Center … Security unit targets ‘worst’ in world crime – John Lantigua, Palm Beach Post, Nov 26 2011

HSI is a new directorate within the Immigration and Customs Enforcement service. Formed in September, its agents are responsible for investigating large-scale international crime, such as narcotics or arms smuggling, human trafficking, money laundering and any form of terrorism. They also defend against the illegal appropriation and exporting of technology that is crucial to U.S. security.

“In other words we’re looking for illegal activity that is crossing the border into the country or crossing the border out of the country,” Pino says.

The HSI Special Response Team serves warrants and apprehends international criminals considered too dangerous for other law enforcement to go up against.

“A lot of these criminal organizations are very well-armed, very well-funded and some of them may come from military backgrounds in their home countries,” Pino says.

While its name is new, the response team can be traced to the 1980s, before the Department of Homeland Security existed.

“It started here in Miami, in the old cocaine cowboy days,” HSI Special Agent in Charge Mike Shea says. “This is the oldest and best tactical entry team in the country. High-risk entry is the core mission.”

HSI consists of more than 10,000 employees, including 6,700 special agents, who are assigned to more than 200 U.S. cities and 47 countries .

A relatively monstrous SWAT style truck leads us to a whole new blob of police state developments, busy hands with little to do and a lot of hardware to do it. It’s yet another plateau of mad new security bureaucracy, something in this case I was loosely aware of tectonic plates moving, but a little digging revealed quite a nasty new nucleus. Let’s plow in and see what was beta-tested through the willingness of politicians to throw money at repressing immigrants. The results begin with big, black scary trucks. And the biggest intelligence group inside the Department of Homeland Security (DHS), and more. Surprise!

Via CopBlock.org’s Facebook page:

Homeland Security SRT riot truck

What in the hell is the Special Response Team, why do they have eight of these things? etc. What turns up is an entirely new nasty agency gestating with Immigration & Customs Enforcement, from the burbling mass of confused federal police… a new team emerges. With exciting competitions and lurid ways of guarding the Super Bowl from Terrorist Attack – a National Special Security Event. The wikipedia page outlines the bizarre weave of this particular bureaucratic nucleus. And the List of special response units on the ol Wiki shows a spreading motif — but this Homeland Security super-swat is perhaps the swattiest of all.

HSI SRT Training to jump off shiny new helicopters to save the Super Bowl in Miami – yayyyy!!
(this is why your schools/bridges are crumbling, America, the purposeless authoritarian spectacle at its finest ;)

This recently reorganized, months-old ICE Homeland Security Investigations (formerly known as ICE Office of Investigations) should really be on the radar of anyone because this year they are apparently ‘filling in the gaps for the Secret Service’ at NSSEs like G20, NATO summits and the Republican and Democratic national conventions. (unfortunately the Secret Service is now a part of DHS, not Treasury.) The Federal Protective Service, which likes to take photos around the Twin Cities (see my 2010 Fort Snelling Undercover Fail video, classic times) is now part of some weird directorate but briefly passed through ICE after being removed from the General Services Administration.

The HSI Special Response Teams are seemingly the top layer of a lot of things, from the war on terror / war on drugs motif, to the Super Bowl, to whatever the hell they are planning to do to immigrants on the I-5 near LA, which was where this pic was taken according to Copblock. ICE has a large number of staff on the Joint Terrorism Task Forces that do statistic-generating police state busywork around the country, and interestingly this HSI group is now officially becoming publicly distinguished from the rest of ICE — and the theory of course is HSI would be spun out of ICE to become a freestanding ‘directorate’, a more modern and insane paramilitary FBI or whatever.

I wonder if the Secure Communities biometric collection program which was forced upon all counties in Minnesota, regardless of state & local wishes, would feed citizens’ data into HSI…. just like the monstrous truck above, now moving more into the “non immigrant” category of freeform federal police activity. Perhaps they shall do some serious black ops against occupier groups angling to get to the conventions? Nevar!

Wikipedia:

The Special Agents of HSI use their broad legal authority to investigate and combat a range of issues that threaten the national security of the United Statessuch as strategic crimes, human rights violations, human smuggling, art theft,human trafficking, drug smuggling, arms trafficking and other types of smuggling(including weapons of mass destruction), immigration crimes, gang investigations; financial crimes including money laundering, bulk cash smuggling, financial fraud, and trade based money laundering; terrorism, computer crimes including the international trafficking of child pornography over the Internet, intellectual property rights crimes (trafficking of counterfeit trademark protected merchandise), cultural property crimes (theft and smuggling of antiquities and art), and import/export enforcement issues. HSI special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.[8] HSI special agents also provide security details for VIPs, witness protection, and support the U.S. Secret Service’s mission during overtaxed times such as special-security events and protecting candidates running for U.S. president.

HSI was formerly known as the ICE Office of Investigations (OI). HSI Special Agents have legal authority to enforce the U.S. Immigration and Nationality Act (Title 8), U.S. Customs Laws (Title 19), along with Titles 5, 6, 12, 18 (Federal Criminal Code and Rules), 21 (drugs), 22, 26, 28, 31 (exclusive jurisdiction over Money and Finance investigations), 46, 49, and 50 (War and National Defense) statutes; giving them the broadest federal law enforcement jurisdiction of any agency. HSI has more than 8,500 Special Agents, making it the second largest federal law enforcement and criminal investigative agency within the United States government next to the FBI.

The change of names from ICE OI to HSI was announced in June 2010. Part of the reasoning behind the name change was to better describe the general activities of the agency, and to avoid the uninformed stigma that this agency only investigates immigration-related issues (ex. OI/HSI special agents duties were often mistaken by the public, other LE agencies and the media to mirror ERO agents/officers). HSI does have a public relations problem. Its the second largest investigatory agency, but the general public has never heard of it. ICE held it close to the belt and until recently, didn’t publicly make the distinction as TSA does with Federal Air Marshals and CBP does with Border Patrol. In 2012, ICE and HSI have mandated a public distinction be made between both organizations. Most often news reports bury HSI’s efforts as “immigrations agents” or as ICE efforts, and frequently Department of Justice and US Attorney’s Office press releases of HSI-led investigations get spun up to sound like DOJ or FBI investigations that received assistance from local partners and ICE.

The name change to HSI better reflects that it is the U.S. Department of Homeland Security’s primary investigative body, and as a result, its thought that someday it will be pulled out from under the ICE umbrella and stand independent under the DHS. An obscure fact is the original planned name before settling on ICE was the Bureau of Investigations and Criminal Enforcement, but the brothers at the FBI didn’t approve and made their complaints heard.

Intelligence

Intelligence is a subcomponent of Homeland Security Investigations (HSI). The Office of Intelligence uses its Intelligence Research Specialists for the collection, analysis, and dissemination of strategic and tactical intelligence data for use by the operational elements of ICE and DHS. Consequently, the Office of Intelligence works closely with the Central Intelligence Agency, IRS the Federal Bureau of Investigation and U.S. Customs and Border Protection.

International Affairs

IA is a subcomponent of Homeland Security Investigations (HSI). The Office of International Affairs, with agents in over 60 locations around the world, represents DHS’ broadest footprint beyond US borders. ICE Attaché offices work with foreign counterparts to identify and combat transnational criminal organizations before they threaten the United States. IA also facilitates domestic HSI investigations.

Oh good, the CIA and FBI together at last… (and let’s not forget the ICE/DHS network of detention facilities: Detention Facilities official front page- what is the HSI role for something like that applied to – somehow – non-immigrants?)

Official Site: http://www.ice.gov/about/offices/homeland-security-investigations/

The ICE Homeland Security Investigations (HSI) directorate is a critical asset in the ICE mission, responsible for investigating a wide range of domestic and international activities arising from the illegal movement of people and goods into, within and out of the United States.

HSI investigates immigration crime, human rights violations and human smuggling, smuggling of narcotics, weapons and other types of contraband, financial crimes, cybercrime and export enforcement issues. ICE special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.

In addition to ICE criminal investigations, HSI oversees the agency’s international affairs operations and intelligence functions. HSI consists of more than 10,000 employees, consisting of 6,700 special agents, who are assigned to more than 200 cities throughout the U.S. and 47 countries around the world.

Report suspicious activity. Complete our tip form…..

HSI conducts criminal investigations against terrorist and other criminal organizations who threaten national security. HSI combats worldwide criminal enterprises who seek to exploit America’s legitimate trade, travel and financial systems and enforces America’s customs and immigration laws at and beyond our nation’s borders.

HSI comprises six key divisions:

-Domestic Operations

-Intelligence

-International Affairs

-Investigative Programs

-Mission Support

-National Intellectual Property Rights (IPR) Coordination Center

The official page for the HSI Special Agent in Charge Field Offices of which there are 26:

Homeland Security Investigations has 26 Special Agent in Charge (SAC) principal field offices throughout the United States. The SAC offices are responsible for the administration and management of all investigative and enforcement activities within the geographic boundaries of the office. The SACs develop, coordinate, and implement enforcement strategies to ensure conformance with national policies and procedures and to support national intelligence programs. SACs coordinate law enforcement activities with the highest level of Federal, state, and local governments, as well as intelligence organizations and international law enforcement entities. In addition, SACs supervise all administrative responsibilities assigned to the office and ensure a responsive Internal Controls Program is developed.

To efficiently manage their designated geographic regions, SAC offices maintain various subordinate field offices throughout their areas of responsibility, which support the enforcement mission. These subordinate field offices, Deputy Special Agents in Charge (DSAC), Assistant Special Agents in Charge (ASAC), Resident Agents in Charge (RAC) and Resident Agents (RA), are responsible for managing enforcement activities within the geographic boundaries of the office.

SAC Minneapolis/St. Paul

2901 Metro Drive, Suite 100

Bloomington, MN 55425

Main (952) 853-2940

Fax (612) 313-9045

If you search for 2901 Metro Drive Suite 100 that is the same office for other immigration, ICE & Homeland Security sub-offices.

These guys also have the completely insane National Intellectual Property Rights Coordination Center, a hearty reminder that the kafkaesque nature of what they call “intellectual property” combined with bureaucratic bloatware budget and an aggressively fascist private industry-friendly design, can truly combine to make one of the most awful, yet admittedly bold, authoritarian government logos of all time. Our Partner Agencies — National Intellectual Property Rights Coordination Center

intel-property-rights-center.png

It’s almost enough to make you believe that swat teams could control all the memes they want, and even maybe the copy and paste commands too!

These are like a new branch of goons yet to be accounted for: HSI-Intel.

The ICE Homeland Security Investigations Intelligence Office (HSI-Intel) is a robust intelligence force that supports the enforcement needs of ICE’s executive leadership and operational field units.

Cutting edge technology, complex intelligence gathering tools, multifaceted investigative techniques and a high level of professionalism have enabled HSI-Intel to set the standard for federal law enforcement/intelligence agencies.

HSI-Intel also serves as home to the National Incident Response Unit (NIRU). This unit ensures that ICE is prepared to respond to national emergencies or critical events, including natural disasters, disease pandemics and terrorist attacks. NIRU plans for ICE’s continuity of operations before, during and after catastrophic incidents. During these incidents, NIRU serves as the agency’s central communications “nerve center,” coordinating the sharing of information between ICE components and other federal, state and local agencies. …..

HSI-Intel collects, analyzes and shares strategic and tactical data for use by DHS and ICE leadership and operational units. It also supports federal, state, local, tribal and international law enforcement partners.

HSI-Intel’s analysis and targeting information plays a vital role in supporting investigations related to illegal immigration, terrorism, weapons proliferation, war crimes, financial crimes, trade fraud, drug smuggling, human smuggling and trafficking, child sex tourism and other criminal activities.

I am sure they will figure out how all that drug money gets through the Federal Reserve Bank computer systems one of these days.

Organizationally parallel to ICE and the gestating HSI within it is the National Protection and Programs Directorate – Wikipedia. Has the Federal Protective Service now. A hodgepodge. Not the Center of the Action like HSI!

Oh true story… the KGB is now… wait for it… Federal Protective Service (Russia) – Wikipedia. Федеральная служба охраны, ФСО,

As far as I can tell, the following picture is not some satirical fan-boy art piece come to life. And those fonts…. christ! It looks like you can clearly see the ‘investigations’ part on there.

photo.jpeg

What about the Office of Investigations Special Response Team? Looks like we’ve found #8 and #10 so far. Both manilla and black color schemas.

Alright lets move this along & get these links out there.I found #9 for the Los Angeles set in Flickr user DFP2746 (plz forgive remixing a part of the images, you intellectual property fusion center types) Source: Homeland Security MRAP / DHS/ICE Special Response Team | Flickr – DFP2746

ice-investigation-srt-9.png

dhs-ice-srt.png

This is getting to be like Pokemon… my SRT trucks. Let me show you them…

First get the swag on eBay: specialresponseteam.JPG HOMELAND SECURITY ICE SRT SPECIAL RESPONSE PATCH | eBay

Press release from 2005 Katrina madness is nice: Department of Homeland Security Special Response Team Deploys to New Orleans Equipped with Zensah Tactical Gear

A– ICE Special Response Team (S.R.T.), an elite tactical unit attached to the Department of Homeland Security, deployed to New Orleans equipped with Zensah (http://www.zensah.com/tactical.html) tactical gear. By wearing Zensah™ moisture wicking tactical clothing, ICE special response team members receive a first line of defense against hazardous conditions found in the Gulf Coast areas affected by Hurricane Katrina.

ICE special response team members are in the affected areas to save lives, to protect lives, and to provide security to the recovery effort. ICE’s primary objectives are to support authorities in securing New Orleans and other affected communities and to provide security to federal rescue and recovery efforts.

….The ICE Special Response Team is an elite tactical team for the office of investigations under the Department of Homeland Security in Miami, Florida. Duties and responsibilities include search and arrests warrants, maritime interdiction, customs and immigration enforcement. For more information pleas visit http://www.ice.gov

Similar: Over 700 ICE Law Enforcement Personnel Were Sent to the Gulf Coast

MOAR GUNS: Tactical-Life.com » THE U.S. ICE MEN: The ICE Special Responders cometh bringing high-speed efficiency and low-drag force as required! “ICE also maintains five additional certified SRT units that are managed by ICE Detention and Operations.” … not sure if they mean 5 or 6 SRTs total. “the U.S. Customs Service evolved into a very progressive and highly successful interdiction and investigative agency. Due to the number of high-risk enforcement actions being executed on a regular basis, the U.S. Customs Service decided to establish a tactical unit called the WETT (Warrant Entry Tactical Team). In time, the U.S. Customs Service changed the name of its tactical team to the Special Response Team.”

They’re Hiring. Supervisory Border Patrol Agent (Special Response Team) – Homeland Security, Customs and Border Protection Job Posting

Buy training: Special Response Team Training 1: Overview & Objectives | Homeland Security Network USA newest backbone information source for First Responders

Gunfire a regular occurrence for ICE employees | California Watch. This has the following govt-produced pic, look how big that damn truck is. We can’t see the apparent city-like (SAC?) insignia on the side or which number it has. It was at this Fort Benning GA training they blather about.

Another benefit of filling up society with needless paramilitary organizations is random accidental gunfire. Nice. “Roughly 80 ICE-involved shootings were unintentional and often involved agents dropping, cleaning or reaching for their guns, records show. The guns, in many cases, discharged in offices, government vehicles or during target practice. ”

Special response teams prep for high risk situations at Ft. Benning – Nov 2011 press release ICE.gov

ice-special-training-ft-benning.png

City of Buffalo NY budget mentions a Major Award for it.

The confusing story of Homeland Security whistleblower Julia Davis ties into this I think. ie. see: Medal of Honor Held By The DHS PAGE 2

[ OKC Tangent. One other note — In the Oklahoma City case I think Terry Nichols tried to tip off these Homeland Security types to a stash of explosives he’d obtained from FBI-friendly weapons dealer and Contra player Roger Moore. I don’t have that info on hand here but it’s around (notes on that ). It failed because some mafia guy snitched to the FBI — the FBI has a pretty careful info cage around Nichols because of the informant-saturated nature of OKC he likes to talk about. This went down in like 2005. (Source of FBI Delay on Terry Nichols Explosives etc) So the idea is if the DOJ/FBI had a specific scheme such as OKC you could get around them through HSI. There’s more to all of this, don’t have the notes here, but there have been developments in recent weeks, search ‘Jesse Trentadue’.. ]

201204120404.jpg

Check the ICE photos for some mad stuff. including saving the world from counterfeit NBA swag.

Conclusions? In any case it’s good to know who the ‘filler goons’ are for NSSE campaigns of state-sponsored violence and insanity, of which 3.5 are scheduled for Chicago/Camp David, RNC & DNC this year, (along with the all important national sporting events), and ICE’s new spawn HSI and the HSI SRT giant trucks will soon be a fixture at high profile gigs. There were weird Border Patrol Swat types at the 2009 G20 – See TC Indymedia Exclusive: Secret ‘Trigger’ & blueprint for emergency domestic military crackdown plan revealedBORTAC is that team. And who knows what they might do with good ol’ FEMA.

What to expect: HSI’s avid effort to become a domestic Swiss army knife of police activity between IRS, CIA and FBI; another layer on the Joint Terrorism Task Force cake and a free-wheeling institution in its own right, combined with a few new flashy PR initiatives (a high profile bust of a little fish or 2 perhaps, etc) in order to carry out the planned ‘branding’ of HSI.

Perhaps we can just shut it down and use the borrowed debt ‘money’ we save to be less permanently indebted to the banker police state… borrowed money to build out echelons of mass suppression is always a grim spectacle. Imagine what we could have done with the wasted resources instead. Now we know which new goonsquad will get the biometrics data from Secure Communities.

And of course, who better to ‘manage’ the war on drugs than the organizational descendant of the ‘cocaine cowboys’ and the 1980s task forces which helped pass through planeload after planeload of cocaine? That era’s keywords, Barry Seal, aviation fronts like Vortex, Southern Air Transport, Evergreen, Polar Air Cross and Air America (some still thriving), operations like AMADEUS, PEGASUS and WATCHTOWER, the quasi-privatized intelligence operations authorized under proclamations like Executive Order 12333 to facilitate the drugs-for-weapons smuggling… those were a few critical points of that era.

What awaits us next? How will HSI deal with the vast scale of financial corruption? What will they do? Who are they going to point the weapons at, and where are the trucks going? Chicago, Charlotte & Tampa… but first, LA, of course. For the immigrants.

SOURCE: http://hongpong.com/archives/2012/04/12/meet-new-boss-town-ice-spawns-hsi-homeland-security-investigations-great-justice

 

Why Did The DHS Just Order 450 Million Rounds Of .40 Caliber Ammunition?

Why Did The DHS Just Order 450 Million Rounds Of .40 Caliber Ammunition?

The Department of Homeland security has just executed an order for enough rounds of 40 caliber ammunition to kill every man, woman and child in the United States.

The Intel Hub alerts us to a shocking new defense contract entered by the Department of Homeland Security to secure a massive amount of  ammunition, with the option for infinite supply, infinite delivery.

ATK Awarded Contract to Supply 450 Million Rounds of .40 Caliber Ammunition to the Department of Homeland Security

ATK has secured a major Indefinite Delivery/Indefinite Quantity deal to supply up to 450 million rounds of .40 caliber ammunition to the Department of Homeland Security.

The 1 year contract with four option years comes at a time when many Americans believe that DHS, along with certain aspects of the military, will soon turn their sights on the American people during some sort of martial law scenario.

“We are proud to extend our track record as the prime supplier of .40 caliber duty ammunition for DHS, ICE,” said Ron Johnson, the president of ATK’s Security and Sporting group,” reported a PR Newswire release.

The Department of Homeland Security has been extremely busy in the last few months.

Whether it be mastering their surveillance of social media, planning to buildlevel 4 bio weapons labs in the middle of the country, defending Globalism,lying to Congress about their big brother policies, labeling people who believe in conspiracy theories as potential terrorists, or taking over cyber security, DHS seems to be actively working against the American people on every front.

Considering this, the fact that they are openly ordering millions more rounds of ammunition should at the very least give the American people pause.

As 2012 continues to move forward and the awakening of the sleeping giant that is the American people kicks into high gear, federal agencies seem hell bent to continue to gear up for a possible confrontation with the people of this once great country.

Source:The Intel Hub

From the ATK press release:

ATK ATK +0.25% announced that it is being awarded an Indefinite Delivery/Indefinite Quantity (IDIQ) agreement from the Department of Homeland Security, U.S. Immigration and Customs Enforcement (DHS, ICE) for .40 caliber ammunition. This contract features a base of 12 months, includes four option years, and will have a maximum volume of 450 million rounds.

ATK was the incumbent and won the contract with its HST bullet, which has proven itself in the field. The special hollow point effectively passes through a variety of barriers and holds its jacket in the toughest conditions. HST is engineered for 100-percent weight retention, limits collateral damage, and avoids over-penetration.

“We are proud to extend our track record as the prime supplier of .40 caliber duty ammunition for DHS, ICE,” said Ron Johnson, President of ATK’s Security and Sporting group. “The HST is a proven design that will continue to serve those who keep our borders safe.”

ATK will produce the ammunition at the Federal Cartridge Company facility in Anoka, Minn. Deliveries are expected to begin in June.

While just a “standard disclosure” the press release goes on to warn this is forward looking contract which may change based on a variety of factors, including economic conditions.

Among those factors are: changes in governmental spending, budgetary policies and product sourcing strategies; the company’s competitive environment; the terms and timing of awards and contracts; economic conditions; the supply, availability and costs of raw materials and components; or reliance on a key supplier.

Question: Who Needs .40 Caliber?

A newbie I know got a sudden hard-on for 40 cal. “It’s what the cops use,” he said. “It’s not as cheap as 9mm,” I pointed out, knowing that my ballistic buddy was going to be doing a LOT of shooting. “It’s also harder to manage the recoil, so you’ll probably going to be less accurate. And it doesn’t make as big a hole as a .45.” I didn’t get into the .40′s history: the whole post-1986 FBI shooting“we need a bigger caliber so how about we neck-down this 10mm cartridge” deal. I think I convinced him with this: “This isn’t Goldilocks and the Three Bears. There is no ‘just right’ caliber. Big holes (.45) or more filling (9mm); pick one.” Am I wrong?

Source: The Truth About Ammo

Terror and Terrorism are Meaningless Propaganda Terms

Terror and Terrorism are Meaningless Propaganda Terms

http://www.youtube.com/watch?v=x7uUFaq7Z4s

The entire concept of a “Terrorism expert” is invalid, as it is an honorific title typically assigned due to ideology and interests served rather than actual expertise.

In U.S. political and media discourse, Terrorism means little more than: that which America’s Enemies du Jour (generally Muslim Enemies) do to it, but not what America and its allies do to anyone.

Terrorism is not a real concept in which one develops “expertise”; it is, and from its introduction into world affairs always has been, a term of propaganda designed to legitimize violence by some actors while de-legitimizing very similar violence by others.

Terrorists for the FBI: The Secret Network that Surveils and Entraps Americans

Six Top FBI-Led Terror Plots

Documents: FBI Spies and Suspects, in Their Own Words

Charts From Our Terror Trial Database

The Making of an FBI Superinformant

What’s an Al Capone? Counterterrorism Jargon Explained.

Interview: The Filmmakers Who Second-Guessed the FBI

Surveillance Video: “This Is for Destroying Airplanes”

 

US Military Drones targeting Rescue Workers and Funerals in Pakistan

The CIA’s drone campaign targeting suspected militants in Pakistan has killed dozens of civilians who had gone to rescue victims or were attending funerals. So concludes a new report by the London-based Bureau of Investigative Journalism. It found that since President Obama took office three years ago, as many as 535 civilians have been killed, including more than 60 children. The investigation also revealed that at least 50 civilians were killed in follow-up strikes when they had gone to help victims. More than 20 civilians have also been attacked in deliberate strikes on funerals and mourners. We speak to Chris Woods, award-winning reporter with the Bureau of Investigative Journalism. “We noted that there were repeated reports at the time, contemporaneous reports in publications like New York Times, news agencies like Reuters, by CNN, that there were these strikes on rescuers, that there were reports that there had been an initial strike and then, some minutes later, as people had come forward to help and pull out the dead and injured, that drones had returned to the scene and had attacked rescuers,” Woods says. “We’ve been able to name just over 50 civilians that we understand have been killed in those attacks. In total, we think that more than 75 civilians have been killed, specifically in these attacks on rescuers and on mourners, on funeral-goers.”

 

Fresh Evidence of CIA civilian Deaths in Pakistan Revealed

Two major investigations have provided fresh evidence that civilians are continuing to be killed in Pakistan’s tribal areas by CIA drones – despite aggressive Agency denials.

In a study of ten major drone strikes in Pakistan since 2010, global news agency Associated Press deployed a field reporter to Waziristan and questioned more than 80 local people about ten CIA attacks. The results generally confirm the accuracy of original credible media reports – and in two cases identify previously unrecorded civilian deaths.

In a further case, in which an anonymous US official had previously attacked the Bureau’s findings of six civilian deaths in a 2011 strike, AP’s report has confirmed the Bureau’s work.

Anglo-American legal charity Reprieve has also filed a case with the United Nations Human Rights Council, based on sworn affidavits by 18 family members of civilians killed in CIA attacks – many of them children. Reprieve is calling on the UNHRC ‘to condemn the attacks as illegal human rights violations.’

 

 

Arab League Report Provides Evidence CIA, MI6, Mossad Behind Violence in Syria

Arab League Report Provides Evidence CIA, MI6, Mossad Behind Violence in Syria

Excerpts from the Arab League observers’ report on Syria make it clear that the establishment media is only telling part of the story and exaggerating violence by the al-Assad government and its police and military.

The report mentions an “armed entity’ that is killing civilians and police and conducting terrorist attacks targeting innocent civilians. Casualties from these attacks are attributed to the al-Assad government and used to build a case against Syria in the United Nations.

Rebels in Idlib, Syria. Evidence reveals they are supported by the CIA, MI6, and Mossad.

According to the Arab League report, the “Free Syria Army” and “armed opposition groups” are responsible for many of the killings.

In January, it was reported that MI6, the CIA, and British SAS are in Syria working with the Free Syrian Army and the Syrian National Council to overthrow the al-Assad regime. The Free Syrian Army is widely recognized as a creation of NATO. It is comprised largely of militants from the Muslim Brotherhood – itself an asset of British intelligence – and is funded, supported, and armed by the United States, Israel, and Turkey.

The report lends credence to reports filed in November of last year by journalist Webster Tarpley, who visited the Middle Eastern nation.

“What average Syrians of all ethnic groups say about this is that they are being shot at by snipers. People complained that there are terrorist snipers who are shooting at civilians, blind terrorism simply for the purpose of destabilizing the country. I would not call this civil war – it is a very misleading term. What you are dealing with here are death squads, you are dealing with terror commandos; this is a typical CIA method. In this case it’s a joint production of CIA, MI6, Mossad, it’s got money coming from Saudi Arabia, The United Arab Emirates and Qatar,” Tarpley told RT.

Tarpley said the United States is pushing a “bankrupt model of the color revolution, backed up by terrorist troops – people from Al-Qaeda and the Muslim Brotherhood” and the objective is “to smash the Middle East according to ethnic lines.”

Excerpts from the Arab League observers’ report make it clear “that there is widespread violence on both sides, but that the opposition and the Western media have exaggerated the violence and casualties inflicted by government forces,” writes Nicolas Davies for War Is A Crime blog, formerly After Downing Street.

“The UN has stopped accepting casualty figures claimed by the opposition, and has frozen its “official” estimate of civilian deaths at 5,400, without acknowledging that this may already be highly exaggerated,” Davies explains. “This is not yet a bloodbath on the scale of Libya, where even the new government admits that at least 25,000 people died in the NATO-led war.  Syria could follow the Libya model though, if NATO and the GCC keep providing weapons and military training to the Free Syrian Army and are prepared to beef it up with special forces on the ground, and as long as the UN approves a no-fly zone to provide cover for another 9,700 air strikes.”

The establishment media put the number of dead between 1,000 and 5,000. The International Criminal Court, Hisham Abu Hajer (of the Libyan “rebels,” in other words al-Qaeda), Pravda and other sources put the number at between 50,000 and 100,000. Tarpley estimated the number at 150,000, a staggering number for a population of just under six and half million people.

Relevant excepts from Report of the Head of the League of Arab States Observer Mission to Syria from December 24, 2011 to January 18, 2012 follow:

“The Mission determined that there is an armed entity that is not mentioned in the protocol. This development on the ground can undoubtedly be attributed to the excessive use of force by Syrian Government forces in response to protests that occurred before the deployment of the Mission demanding the fall of the regime. In some zones, this armed entity reacted by attacking Syrian security forces and citizens, causing the Government to respond with further violence. In the end, innocent citizens pay the price for those actions with life and limb.

In Homs, Idlib and Hama, the Observer Mission witnessed acts of violence being committed against Government forces and civilians that resulted in several deaths and injuries. Examples of those acts include the bombing of a civilian bus, killing eight persons and injuring others, including women and children, and the bombing of a train carrying diesel oil. In another incident in Homs, a police bus was blown up, killing two police officers. A fuel pipeline and some small bridges were also bombed.

28. The Mission noted that many parties falsely reported that explosions or violence had occurred in several locations. When the observers went to those locations, they found that those reports were unfounded.

29. The Mission also noted that, according to its teams in the field, the media exaggerated the nature of the incidents and the number of persons killed in incidents and protests in certain towns.

According to their latest reports and their briefings to the Head of the Mission on 17 January 2012 in preparation for this report, group team leaders witnessed peaceful demonstrations by both Government supporters and the opposition in several places. None of those demonstrations were disrupted, except for some minor clashes with the Mission and between loyalists and opposition. These have not resulted in fatalities since the last presentation before the Arab Ministerial Committee on the Situation in Syria at its meeting of 8 January 2012.

Some observers reneged on their duties and broke the oath they had taken. They made contact with officials from their countries and gave them exaggerated accounts of events. Those officials consequently developed a bleak and unfounded picture of the situation.

Arab and foreign audiences of certain media organizations have questioned the Mission’s credibility because those organizations use the media to distort the facts. It will be difficult to overcome this problem unless there is political and media support for the Mission and its mandate. It is only natural that some negative incidents should occur as it conducts its activities because such incidents occur as a matter of course in similar missions.

75. Recently, there have been incidents that could widen the gap and increase bitterness between the parties. These incidents can have grave consequences and lead to the loss of life and property. Such incidents include the bombing of buildings, trains carrying fuel, vehicles carrying diesel oil and explosions targeting the police, members of the media and fuel pipelines. Some of those attacks have been carried out by the Free Syrian Army and some by other armed opposition groups.

Since its establishment, attitudes towards the Mission have been characterized by insincerity or, more broadly speaking, a lack of seriousness. Before it began carrying out its mandate and even before its members had arrived, the Mission was the target of a vicious campaign directed against the League of Arab States and the Head of the Mission, a campaign that increased in intensity after the observers’ deployment. The Mission still lack the political and media support it needs in order to fulfill its mandate. Should its mandate be extended, the goals set out in the Protocol will not be achieved unless such support is provided and the Mission receives the backing it needs to ensure the success of the Arab solution.”

Kurt Nimmo
Infowars.com
February 7, 2012

Source: http://www.infowars.com/arab-league-report-provides-evidence-cia-mi6-mossad-behind-violence-in-syria/

Federal Investigation of Iran dissident Group Bypasses K Street Firms

Federal Investigation of Iran dissident Group Bypasses K Street Firms

A federal investigation of an Iranian dissident group that has targeted a number of former government officials seems to have bypassed K Street.

Lobby firms and clients who have been working to remove the Mujahedin-e Khalq (MEK) — otherwise known as the People’s Mujahedin of Iran — from the State Department’s list of terrorist organizations told The Hill they have not been subpoenaed by federal authorities.

Former government officials such as Ed Rendell, the Democratic ex-governor of Pennsylvania, and Gen. Hugh Shelton, former chairman of the Joint Chiefs of Staff, have come under scrutiny from federal investigators over the speaking fees they were paid to deliver speeches supporting MEK, according to press reports.

Subpoenas have reportedly been issued for Rendell, Shelton and others.

But lobby firms that have worked to legitimize MEK in the United States said the investigation hasn’t reached them.

Victoria Toensing, a founding partner of diGenova & Toensing, said her firm has not received a subpoena and doesn’t expect to.

“Why would I receive a subpoena?” Toensing said. “I was paid by individuals who are Americans and live in Texas. They are not on the terrorist list.”
Toensing’s firm was paid $110,000 by the Iranian-American Community of North Texas before the lobbying registration was terminated last year, according to lobbying disclosure records.

Toensing said she was “furious” about the reports that former government officials who have spoken in favor of MEK have been subpoenaed.

“They have used government authority to subvert the First Amendment,” Toensing said. “When a government violates a court order, are we not allowed to speak out against them?”

Toensing was referring to a federal court ruling from July of 2010 that required the State Department to review its designation of the MEK as a terrorist group.

Supporters argue MEK was placed on the list in 1997 by the Clinton administration to help improve relations between the United States and Iran.

Homeira Hesami, president of the Iranian-American Community of North Texas, also said her group has not been subpoenaed. She called the investigation “a smokescreen” by the State Department, which she believes is stalling on reviewing the group’s designation as a terrorist organization.

“I am reminded of an adage: ‘If you don’t like the message, shoot the messenger.’ This is a smokescreen and an obvious attempt by the State Department to sidestep the principal issue,” Hesami said. “This is a clear case of abuse of power.”

According to the State Department, MEK was founded in the 1960s by college-educated Iranian Marxists who opposed the shah of Iran. In 1981, the group attempted to overthrow the new Islamic regime. State says the group was also behind several terrorist attacks in the 1970s that killed Americans in Iran.

MEK supporters say the organization today is pursing freedom and democracy and is not engaged in terrorism. They also deny it was ever Marxist or had a role in the attacks that killed Americans. U.S. backers of MEK say the group’s opposition to the Iranian regime could help the United States as tensions grow over Iran’s nuclear program.

Over the past year, the push to remove MEK from the terrorist list has become an attention-grabbing public campaign, involving legal action, lobbying, TV ads and speeches by big names in politics.

It has also reportedly triggered a federal investigation due to suspicion over who is paying for the ex-officials’ speeches. Receiving payments from a terrorist group, or providing services to one, can be against the law.

On March 9, the Washington Times reported that Rendell had received a subpoena for MEK payment records from the Treasury Department’s Office of Foreign Assets Control. This past Friday, MSNBC reported that speaking agencies representing former FBI Director Louis Freeh and Shelton had also been subpoenaed.

Others have lobbied to remove MEK from the terrorist-group list.

Akin Gump Strauss Hauer & Feld earned $290,000 in lobbying fees in 2011 from the Iranian-American Community of Northern California, according to lobbying disclosure records. Last quarter, former Reps. Vic Fazio (D-Calif.) and Bill Paxon (R-N.Y.) were among the lobbyists working to remove MEK from the list.

An Akin Gump spokesman said the firm has not received a subpoena from Treasury regarding its work on behalf of the client.

Ahmad Moein, executive director of the Iranian-American Community of Northern California, said his group has not received a subpoena.

Others have worked to draw attention to Camp Ashraf in Iraq, where more than 3,000 MEK members live. The Iraqi military has attacked the camp in the past, leaving several MEK members dead.

PR firm Brown Lloyd James signed a $40,000, two-month contract last year to bring attention to the camp. Ali Taslimi, an individual living in Germany, paid for the contract, which included distributing press releases, hosting a dinner for reporters and inviting media to a Paris conference on Camp Ashraf, according to Justice records.

In a statement, the firm said it had not been subpoenaed regarding its work on behalf of Taslimi, which has since ended.

“We understood that ‘delisting’ was one of the many issues tied to the broader humanitarian situation. We have not been contacted by any authorities concerning this work, which was brief, duly reported and ended nearly one year ago,” said Brown Lloyd James.

John Sullivan, a Treasury spokesman, declined to say whether any of the firms were under federal investigation.

“The Department of the Treasury does not comment on potential investigations,” Sullivan said. He also said that the MEK is a terrorist group and enforcement of sanctions are taken “seriously.”

“The MEK is a designated terrorist group; therefore, U.S. persons are generally prohibited from engaging in transactions with or providing services to this group. The Treasury Department takes sanctions enforcement seriously and routinely investigates potential violations of sanctions laws,” Sullivan said.

Source: http://thehill.com/business-a-lobbying/k-street-insiders/k-street-insiders/216863-federal-investigation-of-iran-dissident-group-bypasses-k-street-firms

Executive Director: “Why I Am Leaving Goldman Sachs”

Executive Director: “Why I Am Leaving Goldman Sachs”

TODAY is my last day at Goldman Sachs. After almost 12 years at the firm — first as a summer intern while at Stanford, then in New York for 10 years, and now in London — I believe I have worked here long enough to understand the trajectory of its culture, its people and its identity. And I can honestly say that the environment now is as toxic and destructive as I have ever seen it. 

To put the problem in the simplest terms, the interests of the client continue to be sidelined in the way the firm operates and thinks about making money. Goldman Sachs is one of the world’s largest and most important investment banks and it is too integral to global finance to continue to act this way. The firm has veered so far from the place I joined right out of college that I can no longer in good conscience say that I identify with what it stands for.

It might sound surprising to a skeptical public, but culture was always a vital part of Goldman Sachs’s success. It revolved around teamwork, integrity, a spirit of humility, and always doing right by our clients. The culture was the secret sauce that made this place great and allowed us to earn our clients’ trust for 143 years. It wasn’t just about making money; this alone will not sustain a firm for so long. It had something to do with pride and belief in the organization. I am sad to say that I look around today and see virtually no trace of the culture that made me love working for this firm for many years. I no longer have the pride, or the belief.

But this was not always the case. For more than a decade I recruited and mentored candidates through our grueling interview process. I was selected as one of 10 people (out of a firm of more than 30,000) to appear on our recruiting video, which is played on every college campus we visit around the world. In 2006 I managed the summer intern program in sales and trading in New York for the 80 college students who made the cut, out of the thousands who applied.

I knew it was time to leave when I realized I could no longer look students in the eye and tell them what a great place this was to work.

When the history books are written about Goldman Sachs, they may reflect that the current chief executive officer, Lloyd C. Blankfein, and the president, Gary D. Cohn, lost hold of the firm’s culture on their watch. I truly believe that this decline in the firm’s moral fiber represents the single most serious threat to its long-run survival.

Over the course of my career I have had the privilege of advising two of the largest hedge funds on the planet, five of the largest asset managers in the United States, and three of the most prominent sovereign wealth funds in the Middle East and Asia. My clients have a total asset base of more than a trillion dollars. I have always taken a lot of pride in advising my clients to do what I believe is right for them, even if it means less money for the firm. This view is becoming increasingly unpopular at Goldman Sachs. Another sign that it was time to leave.

How did we get here? The firm changed the way it thought about leadership. Leadership used to be about ideas, setting an example and doing the right thing. Today, if you make enough money for the firm (and are not currently an ax murderer) you will be promoted into a position of influence.

What are three quick ways to become a leader? a) Execute on the firm’s “axes,” which is Goldman-speak for persuading your clients to invest in the stocks or other products that we are trying to get rid of because they are not seen as having a lot of potential profit. b) “Hunt Elephants.” In English: get your clients — some of whom are sophisticated, and some of whom aren’t — to trade whatever will bring the biggest profit to Goldman. Call me old-fashioned, but I don’t like selling my clients a product that is wrong for them. c) Find yourself sitting in a seat where your job is to trade any illiquid, opaque product with a three-letter acronym.

Today, many of these leaders display a Goldman Sachs culture quotient of exactly zero percent. I attend derivatives sales meetings where not one single minute is spent asking questions about how we can help clients. It’s purely about how we can make the most possible money off of them. If you were an alien from Mars and sat in on one of these meetings, you would believe that a client’s success or progress was not part of the thought process at all.

It makes me ill how callously people talk about ripping their clients off. Over the last 12 months I have seen five different managing directors refer to their own clients as “muppets,” sometimes over internal e-mail. Even after the S.E.C., Fabulous Fab, Abacus, God’s work, Carl Levin, Vampire Squids? No humility? I mean, come on. Integrity? It is eroding. I don’t know of any illegal behavior, but will people push the envelope and pitch lucrative and complicated products to clients even if they are not the simplest investments or the ones most directly aligned with the client’s goals? Absolutely. Every day, in fact.

It astounds me how little senior management gets a basic truth: If clients don’t trust you they will eventually stop doing business with you. It doesn’t matter how smart you are.

These days, the most common question I get from junior analysts about derivatives is, “How much money did we make off the client?” It bothers me every time I hear it, because it is a clear reflection of what they are observing from their leaders about the way they should behave. Now project 10 years into the future: You don’t have to be a rocket scientist to figure out that the junior analyst sitting quietly in the corner of the room hearing about “muppets,” “ripping eyeballs out” and “getting paid” doesn’t exactly turn into a model citizen.

When I was a first-year analyst I didn’t know where the bathroom was, or how to tie my shoelaces. I was taught to be concerned with learning the ropes, finding out what a derivative was, understanding finance, getting to know our clients and what motivated them, learning how they defined success and what we could do to help them get there.

My proudest moments in life — getting a full scholarship to go from South Africa to Stanford University, being selected as a Rhodes Scholar national finalist, winning a bronze medal for table tennis at the Maccabiah Games in Israel, known as the Jewish Olympics — have all come through hard work, with no shortcuts. Goldman Sachs today has become too much about shortcuts and not enough about achievement. It just doesn’t feel right to me anymore.

I hope this can be a wake-up call to the board of directors. Make the client the focal point of your business again. Without clients you will not make money. In fact, you will not exist. Weed out the morally bankrupt people, no matter how much money they make for the firm. And get the culture right again, so people want to work here for the right reasons. People who care only about making money will not sustain this firm — or the trust of its clients — for very much longer.

Greg Smith is resigning today as a Goldman Sachs executive director and head of the firm’s United States equity derivatives business in Europe, the Middle East and Africa.

SOURCE: http://www.nytimes.com/2012/03/14/opinion/why-i-am-leaving-goldman-sachs.htm

Matrix Breakthrough: Self Correcting ‘Computer’ Code Discovered in Depths of String Theory

Matrix Breakthrough: Self Correcting ‘Computer’ Code Discovered in Depths of String Theory

 

“Doubly-even self-dual linear binary error-correcting block code,” first invented by Claude Shannon in the 1940’s, has been discovered embedded WITHIN the equations of superstring theory!

Why does nature have this? What errors does it need to correct? What is an ‘error’ for nature? More importantly what is the explanation for this freakish discovery? Your guess is as good as mine.

References
1.) Recent NPR interview with Professor Gates: http://being.publicradio.org/programs/2012/codes-for-reality/gates-symbolsofp…
2.) Gates original paper: http://arxiv.org/abs/0806.0051
3.) A potential explanation, Bostrom’s Simulation Hypothesis (below): http://www.simulation-argument.com/simulation.html

ARE YOU LIVING IN A COMPUTER SIMULATION?

BY NICK BOSTROM

Faculty of Philosophy, Oxford University

Published in Philosophical Quarterly (2003) Vol. 53, No. 211, pp. 243-255.

[www.simulation-argument.com]

         pdf-version: [PDF]

 

ABSTRACT

 

This paper argues that at least one of the following propositions is true: (1) the human species is very likely to go extinct before reaching a “posthuman” stage; (2) any posthuman civilization is extremely unlikely to run a significant number of simulations of their evolutionary history (or variations thereof); (3) we are almost certainly living in a computer simulation. It follows that the belief that there is a significant chance that we will one day become posthumans who run ancestor-simulations is false, unless we are currently living in a simulation. A number of other consequences of this result are also discussed.

 

 

I. INTRODUCTION

 

Many works of science fiction as well as some forecasts by serious technologists and futurologists predict that enormous amounts of computing power will be available in the future. Let us suppose for a moment that these predictions are correct. One thing that later generations might do with their super-powerful computers is run detailed simulations of their forebears or of people like their forebears. Because their computers would be so powerful, they could run a great many such simulations. Suppose that these simulated people are conscious (as they would be if the simulations were sufficiently fine-grained and if a certain quite widely accepted position in the philosophy of mind is correct). Then it could be the case that the vast majority of minds like ours do not belong to the original race but rather to people simulated by the advanced descendants of an original race. It is then possible to argue that, if this were the case, we would be rational to think that we are likely among the simulated minds rather than among the original biological ones. Therefore, if we don’t think that we are currently living in a computer simulation, we are not entitled to believe that we will have descendants who will run lots of such simulations of their forebears. That is the basic idea. The rest of this paper will spell it out more carefully.

Apart form the interest this thesis may hold for those who are engaged in futuristic speculation, there are also more purely theoretical rewards. The argument provides a stimulus for formulating some methodological and metaphysical questions, and it suggests naturalistic analogies to certain traditional religious conceptions, which some may find amusing or thought-provoking.

The structure of the paper is as follows. First, we formulate an assumption that we need to import from the philosophy of mind in order to get the argument started. Second, we consider some empirical reasons for thinking that running vastly many simulations of human minds would be within the capability of a future civilization that has developed many of those technologies that can already be shown to be compatible with known physical laws and engineering constraints. This part is not philosophically necessary but it provides an incentive for paying attention to the rest. Then follows the core of the argument, which makes use of some simple probability theory, and a section providing support for a weak indifference principle that the argument employs. Lastly, we discuss some interpretations of the disjunction, mentioned in the abstract, that forms the conclusion of the simulation argument.

 

II. THE ASSUMPTION OF SUBSTRATE-INDEPENDENCE

 

A common assumption in the philosophy of mind is that of substrate-independence. The idea is that mental states can supervene on any of a broad class of physical substrates. Provided a system implements the right sort of computational structures and processes, it can be associated with conscious experiences. It is not an essential property of consciousness that it is implemented on carbon-based biological neural networks inside a cranium: silicon-based processors inside a computer could in principle do the trick as well.

Arguments for this thesis have been given in the literature, and although it is not entirely uncontroversial, we shall here take it as a given.

The argument we shall present does not, however, depend on any very strong version of functionalism or computationalism. For example, we need not assume that the thesis of substrate-independence is necessarily true (either analytically or metaphysically) – just that, in fact, a computer running a suitable program would be conscious. Moreover, we need not assume that in order to create a mind on a computer it would be sufficient to program it in such a way that it behaves like a human in all situations, including passing the Turing test etc. We need only the weaker assumption that it would suffice for the generation of subjective experiences that the computational processes of a human brain are structurally replicated in suitably fine-grained detail, such as on the level of individual synapses. This attenuated version of substrate-independence is quite widely accepted.

Neurotransmitters, nerve growth factors, and other chemicals that are smaller than a synapse clearly play a role in human cognition and learning. The substrate-independence thesis is not that the effects of these chemicals are small or irrelevant, but rather that they affect subjective experience only via their direct or indirect influence on computational activities. For example, if there can be no difference in subjective experience without there also being a difference in synaptic discharges, then the requisite detail of simulation is at the synaptic level (or higher).

 

III. THE TECHNOLOGICAL LIMITS OF COMPUTATION

 

At our current stage of technological development, we have neither sufficiently powerful hardware nor the requisite software to create conscious minds in computers. But persuasive arguments have been given to the effect that if technological progress continues unabated then these shortcomings will eventually be overcome. Some authors argue that this stage may be only a few decades away.[1] Yet present purposes require no assumptions about the time-scale. The simulation argument works equally well for those who think that it will take hundreds of thousands of years to reach a “posthuman” stage of civilization, where humankind has acquired most of the technological capabilities that one can currently show to be consistent with physical laws and with material and energy constraints.

Such a mature stage of technological development will make it possible to convert planets and other astronomical resources into enormously powerful computers. It is currently hard to be confident in any upper bound on the computing power that may be available to posthuman civilizations. As we are still lacking a “theory of everything”, we cannot rule out the possibility that novel physical phenomena, not allowed for in current physical theories, may be utilized to transcend those constraints[2] that in our current understanding impose theoretical limits on the information processing attainable in a given lump of matter. We can with much greater confidence establish lower bounds on posthuman computation, by assuming only mechanisms that are already understood. For example, Eric Drexler has outlined a design for a system the size of a sugar cube (excluding cooling and power supply) that would perform 1021 instructions per second.[3] Another author gives a rough estimate of 1042 operations per second for a computer with a mass on order of a large planet.[4] (If we could create quantum computers, or learn to build computers out of nuclear matter or plasma, we could push closer to the theoretical limits. Seth Lloyd calculates an upper bound for a 1 kg computer of 5*1050 logical operations per second carried out on ~1031 bits.[5] However, it suffices for our purposes to use the more conservative estimate that presupposes only currently known design-principles.)

The amount of computing power needed to emulate a human mind can likewise be roughly estimated. One estimate, based on how computationally expensive it is to replicate the functionality of a piece of nervous tissue that we have already understood and whose functionality has been replicated in silico, contrast enhancement in the retina, yields a figure of ~1014 operations per second for the entire human brain.[6] An alternative estimate, based the number of synapses in the brain and their firing frequency, gives a figure of ~1016-1017 operations per second.[7] Conceivably, even more could be required if we want to simulate in detail the internal workings of synapses and dendritic trees. However, it is likely that the human central nervous system has a high degree of redundancy on the mircoscale to compensate for the unreliability and noisiness of its neuronal components. One would therefore expect a substantial efficiency gain when using more reliable and versatile non-biological processors.

Memory seems to be a no more stringent constraint than processing power.[8] Moreover, since the maximum human sensory bandwidth is ~108 bits per second, simulating all sensory events incurs a negligible cost compared to simulating the cortical activity. We can therefore use the processing power required to simulate the central nervous system as an estimate of the total computational cost of simulating a human mind.

If the environment is included in the simulation, this will require additional computing power – how much depends on the scope and granularity of the simulation. Simulating the entire universe down to the quantum level is obviously infeasible, unless radically new physics is discovered. But in order to get a realistic simulation of human experience, much less is needed – only whatever is required to ensure that the simulated humans, interacting in normal human ways with their simulated environment, don’t notice any irregularities. The microscopic structure of the inside of the Earth can be safely omitted. Distant astronomical objects can have highly compressed representations: verisimilitude need extend to the narrow band of properties that we can observe from our planet or solar system spacecraft. On the surface of Earth, macroscopic objects in inhabited areas may need to be continuously simulated, but microscopic phenomena could likely be filled in ad hoc. What you see through an electron microscope needs to look unsuspicious, but you usually have no way of confirming its coherence with unobserved parts of the microscopic world. Exceptions arise when we deliberately design systems to harness unobserved microscopic phenomena that operate in accordance with known principles to get results that we are able to independently verify. The paradigmatic case of this is a computer. The simulation may therefore need to include a continuous representation of computers down to the level of individual logic elements. This presents no problem, since our current computing power is negligible by posthuman standards.

Moreover, a posthuman simulator would have enough computing power to keep track of the detailed belief-states in all human brains at all times. Therefore, when it saw that a human was about to make an observation of the microscopic world, it could fill in sufficient detail in the simulation in the appropriate domain on an as-needed basis. Should any error occur, the director could easily edit the states of any brains that have become aware of an anomaly before it spoils the simulation. Alternatively, the director could skip back a few seconds and rerun the simulation in a way that avoids the problem.

It thus seems plausible that the main computational cost in creating simulations that are indistinguishable from physical reality for human minds in the simulation resides in simulating organic brains down to the neuronal or sub-neuronal level.[9] While it is not possible to get a very exact estimate of the cost of a realistic simulation of human history, we can use ~1033 – 1036 operations as a rough estimate[10]. As we gain more experience with virtual reality, we will get a better grasp of the computational requirements for making such worlds appear realistic to their visitors. But in any case, even if our estimate is off by several orders of magnitude, this does not matter much for our argument. We noted that a rough approximation of the computational power of a planetary-mass computer is 1042 operations per second, and that assumes only already known nanotechnological designs, which are probably far from optimal. A single such a computer could simulate the entire mental history of humankind (call this an ancestor-simulation) by using less than one millionth of its processing power for one second. A posthuman civilization may eventually build an astronomical number of such computers. We can conclude that the computing power available to a posthuman civilization is sufficient to run a huge number of ancestor-simulations even it allocates only a minute fraction of its resources to that purpose. We can draw this conclusion even while leaving a substantial margin of error in all our estimates.

 

  • Posthuman civilizations would have enough computing power to run hugely many ancestor-simulations even while using only a tiny fraction of their resources for that purpose.

 

IV. THE CORE OF THE SIMULATION ARGUMENT

The basic idea of this paper can be expressed roughly as follows: If there were a substantial chance that our civilization will ever get to the posthuman stage and run many ancestor-simulations, then how come you are not living in such a simulation?

We shall develop this idea into a rigorous argument. Let us introduce the following notation:

 

: Fraction of all human-level technological civilizations that survive to reach a posthuman stage

 

: Average number of ancestor-simulations run by a posthuman civilization

 

: Average number of individuals that have lived in a civilization before it reaches a posthuman stage

 

The actual fraction of all observers with human-type experiences that live in simulations is then

 

 

 

Writing for the fraction of posthuman civilizations that are interested in running ancestor-simulations (or that contain at least some individuals who are interested in that and have sufficient resources to run a significant number of such simulations), and for the average number of ancestor-simulations run by such interested civilizations, we have

 

 

 

and thus:

 

(*)

 

Because of the immense computing power of posthuman civilizations,  is extremely large, as we saw in the previous section. By inspecting (*) we can then see that at least one of the following three propositions must be true:

 

(1)

(2)

(3)

 

V. A BLAND INDIFFERENCE PRINCIPLE

 

We can take a further step and conclude that conditional on the truth of (3), one’s credence in the hypothesis that one is in a simulation should be close to unity. More generally, if we knew that a fraction x of all observers with human-type experiences live in simulations, and we don’t have any information that indicate that our own particular experiences are any more or less likely than other human-type experiences to have been implemented in vivo rather than in machina, then our credence that we are in a simulation should equal x:

 

(#)

 

This step is sanctioned by a very weak indifference principle. Let us distinguish two cases. The first case, which is the easiest, is where all the minds in question are like your own in the sense that they are exactly qualitatively identical to yours: they have exactly the same information and the same experiences that you have. The second case is where the minds are “like” each other only in the loose sense of being the sort of minds that are typical of human creatures, but they are qualitatively distinct from one another and each has a distinct set of experiences. I maintain that even in the latter case, where the minds are qualitatively different, the simulation argument still works, provided that you have no information that bears on the question of which of the various minds are simulated and which are implemented biologically.

A detailed defense of a stronger principle, which implies the above stance for both cases as trivial special instances, has been given in the literature.[11] Space does not permit a recapitulation of that defense here, but we can bring out one of the underlying intuitions by bringing to our attention to an analogous situation of a more familiar kind. Suppose that x% of the population has a certain genetic sequence S within the part of their DNA commonly designated as “junk DNA”. Suppose, further, that there are no manifestations of S (short of what would turn up in a gene assay) and that there are no known correlations between having S and any observable characteristic. Then, quite clearly, unless you have had your DNA sequenced, it is rational to assign a credence of x% to the hypothesis that you have S. And this is so quite irrespective of the fact that the people who have S have qualitatively different minds and experiences from the people who don’t have S. (They are different simply because all humans have different experiences from one another, not because of any known link between S and what kind of experiences one has.)

The same reasoning holds if S is not the property of having a certain genetic sequence but instead the property of being in a simulation, assuming only that we have no information that enables us to predict any differences between the experiences of simulated minds and those of the original biological minds.

It should be stressed that the bland indifference principle expressed by (#) prescribes indifference only between hypotheses about which observer you are, when you have no information about which of these observers you are. It does not in general prescribe indifference between hypotheses when you lack specific information about which of the hypotheses is true. In contrast to Laplacean and other more ambitious principles of indifference, it is therefore immune to Bertrand’s paradox and similar predicaments that tend to plague indifference principles of unrestricted scope.

Readers familiar with the Doomsday argument[12] may worry that the bland principle of indifference invoked here is the same assumption that is responsible for getting the Doomsday argument off the ground, and that the counterintuitiveness of some of the implications of the latter incriminates or casts doubt on the validity of the former. This is not so. The Doomsday argument rests on a much stronger and more controversial premiss, namely that one should reason as if one were a random sample from the set of all people who will ever have lived (past, present, and future) even though we know that we are living in the early twenty-first century rather than at some point in the distant past or the future. The bland indifference principle, by contrast, applies only to cases where we have no information about which group of people we belong to.

If betting odds provide some guidance to rational belief, it may also be worth to ponder that if everybody were to place a bet on whether they are in a simulation or not, then if people use the bland principle of indifference, and consequently place their money on being in a simulation if they know that that’s where almost all people are, then almost everyone will win their bets. If they bet on not being in a simulation, then almost everyone will lose. It seems better that the bland indifference principle be heeded.

Further, one can consider a sequence of possible situations in which an increasing fraction of all people live in simulations: 98%, 99%, 99.9%, 99.9999%, and so on. As one approaches the limiting case in which everybody is in a simulation (from which one can deductively infer that one is in a simulation oneself), it is plausible to require that the credence one assigns to being in a simulation gradually approach the limiting case of complete certainty in a matching manner.

 

VI. INTERPRETATION

The possibility represented by proposition (1) is fairly straightforward. If (1) is true, then humankind will almost certainly fail to reach a posthuman level; for virtually no species at our level of development become posthuman, and it is hard to see any justification for thinking that our own species will be especially privileged or protected from future disasters. Conditional on (1), therefore, we must give a high credence to DOOM, the hypothesis that humankind will go extinct before reaching a posthuman level:

 

 

 

One can imagine hypothetical situations were we have such evidence as would trump knowledge of . For example, if we discovered that we were about to be hit by a giant meteor, this might suggest that we had been exceptionally unlucky. We could then assign a credence to DOOM larger than our expectation of the fraction of human-level civilizations that fail to reach posthumanity. In the actual case, however, we seem to lack evidence for thinking that we are special in this regard, for better or worse.

Proposition (1) doesn’t by itself imply that we are likely to go extinct soon, only that we are unlikely to reach a posthuman stage. This possibility is compatible with us remaining at, or somewhat above, our current level of technological development for a long time before going extinct. Another way for (1) to be true is if it is likely that technological civilization will collapse. Primitive human societies might then remain on Earth indefinitely.

There are many ways in which humanity could become extinct before reaching posthumanity. Perhaps the most natural interpretation of (1) is that we are likely to go extinct as a result of the development of some powerful but dangerous technology.[13] One candidate is molecular nanotechnology, which in its mature stage would enable the construction of self-replicating nanobots capable of feeding on dirt and organic matter – a kind of mechanical bacteria. Such nanobots, designed for malicious ends, could cause the extinction of all life on our planet.[14]

The second alternative in the simulation argument’s conclusion is that the fraction of posthuman civilizations that are interested in running ancestor-simulation is negligibly small. In order for (2) to be true, there must be a strong convergence among the courses of advanced civilizations. If the number of ancestor-simulations created by the interested civilizations is extremely large, the rarity of such civilizations must be correspondingly extreme. Virtually no posthuman civilizations decide to use their resources to run large numbers of ancestor-simulations. Furthermore, virtually all posthuman civilizations lack individuals who have sufficient resources and interest to run ancestor-simulations; or else they have reliably enforced laws that prevent such individuals from acting on their desires.

What force could bring about such convergence? One can speculate that advanced civilizations all develop along a trajectory that leads to the recognition of an ethical prohibition against running ancestor-simulations because of the suffering that is inflicted on the inhabitants of the simulation. However, from our present point of view, it is not clear that creating a human race is immoral. On the contrary, we tend to view the existence of our race as constituting a great ethical value. Moreover, convergence on an ethical view of the immorality of running ancestor-simulations is not enough: it must be combined with convergence on a civilization-wide social structure that enables activities considered immoral to be effectively banned.

Another possible convergence point is that almost all individual posthumans in virtually all posthuman civilizations develop in a direction where they lose their desires to run ancestor-simulations. This would require significant changes to the motivations driving their human predecessors, for there are certainly many humans who would like to run ancestor-simulations if they could afford to do so. But perhaps many of our human desires will be regarded as silly by anyone who becomes a posthuman. Maybe the scientific value of ancestor-simulations to a posthuman civilization is negligible (which is not too implausible given its unfathomable intellectual superiority), and maybe posthumans regard recreational activities as merely a very inefficient way of getting pleasure – which can be obtained much more cheaply by direct stimulation of the brain’s reward centers. One conclusion that follows from (2) is that posthuman societies will be very different from human societies: they will not contain relatively wealthy independent agents who have the full gamut of human-like desires and are free to act on them.

The possibility expressed by alternative (3) is the conceptually most intriguing one. If we are living in a simulation, then the cosmos that we are observing is just a tiny piece of the totality of physical existence. The physics in the universe where the computer is situated that is running the simulation may or may not resemble the physics of the world that we observe. While the world we see is in some sense “real”, it is not located at the fundamental level of reality.

It may be possible for simulated civilizations to become posthuman. They may then run their own ancestor-simulations on powerful computers they build in their simulated universe. Such computers would be “virtual machines”, a familiar concept in computer science. (Java script web-applets, for instance, run on a virtual machine – a simulated computer – inside your desktop.) Virtual machines can be stacked: it’s possible to simulate a machine simulating another machine, and so on, in arbitrarily many steps of iteration. If we do go on to create our own ancestor-simulations, this would be strong evidence against (1) and (2), and we would therefore have to conclude that we live in a simulation. Moreover, we would have to suspect that the posthumans running our simulation are themselves simulated beings; and their creators, in turn, may also be simulated beings.

Reality may thus contain many levels. Even if it is necessary for the hierarchy to bottom out at some stage – the metaphysical status of this claim is somewhat obscure – there may be room for a large number of levels of reality, and the number could be increasing over time. (One consideration that counts against the multi-level hypothesis is that the computational cost for the basement-level simulators would be very great. Simulating even a single posthuman civilization might be prohibitively expensive. If so, then we should expect our simulation to be terminated when we are about to become posthuman.)

Although all the elements of such a system can be naturalistic, even physical, it is possible to draw some loose analogies with religious conceptions of the world. In some ways, the posthumans running a simulation are like gods in relation to the people inhabiting the simulation: the posthumans created the world we see; they are of superior intelligence; they are “omnipotent” in the sense that they can interfere in the workings of our world even in ways that violate its physical laws; and they are “omniscient” in the sense that they can monitor everything that happens. However, all the demigods except those at the fundamental level of reality are subject to sanctions by the more powerful gods living at lower levels.

Further rumination on these themes could climax in a naturalistic theogony that would study the structure of this hierarchy, and the constraints imposed on its inhabitants by the possibility that their actions on their own level may affect the treatment they receive from dwellers of deeper levels. For example, if nobody can be sure that they are at the basement-level, then everybody would have to consider the possibility that their actions will be rewarded or punished, based perhaps on moral criteria, by their simulators. An afterlife would be a real possibility. Because of this fundamental uncertainty, even the basement civilization may have a reason to behave ethically. The fact that it has such a reason for moral behavior would of course add to everybody else’s reason for behaving morally, and so on, in truly virtuous circle. One might get a kind of universal ethical imperative, which it would be in everybody’s self-interest to obey, as it were “from nowhere”.

In addition to ancestor-simulations, one may also consider the possibility of more selective simulations that include only a small group of humans or a single individual. The rest of humanity would then be zombies or “shadow-people” – humans simulated only at a level sufficient for the fully simulated people not to notice anything suspicious. It is not clear how much cheaper shadow-people would be to simulate than real people. It is not even obvious that it is possible for an entity to behave indistinguishably from a real human and yet lack conscious experience. Even if there are such selective simulations, you should not think that you are in one of them unless you think they are much more numerous than complete simulations. There would have to be about 100 billion times as many “me-simulations” (simulations of the life of only a single mind) as there are ancestor-simulations in order for most simulated persons to be in me-simulations.

There is also the possibility of simulators abridging certain parts of the mental lives of simulated beings and giving them false memories of the sort of experiences that they would typically have had during the omitted interval. If so, one can consider the following (farfetched) solution to the problem of evil: that there is no suffering in the world and all memories of suffering are illusions. Of course, this hypothesis can be seriously entertained only at those times when you are not currently suffering.

Supposing we live in a simulation, what are the implications for us humans? The foregoing remarks notwithstanding, the implications are not all that radical. Our best guide to how our posthuman creators have chosen to set up our world is the standard empirical study of the universe we see. The revisions to most parts of our belief networks would be rather slight and subtle – in proportion to our lack of confidence in our ability to understand the ways of posthumans. Properly understood, therefore, the truth of (3) should have no tendency to make us “go crazy” or to prevent us from going about our business and making plans and predictions for tomorrow. The chief empirical importance of (3) at the current time seems to lie in its role in the tripartite conclusion established above.[15] We may hope that (3) is true since that would decrease the probability of (1), although if computational constraints make it likely that simulators would terminate a simulation before it reaches a posthuman level, then out best hope would be that (2) is true.

If we learn more about posthuman motivations and resource constraints, maybe as a result of developing towards becoming posthumans ourselves, then the hypothesis that we are simulated will come to have a much richer set of empirical implications.

 

VII. CONCLUSION

A technologically mature “posthuman” civilization would have enormous computing power. Based on this empirical fact, the simulation argument shows that at least one of the following propositions is true: (1) The fraction of human-level civilizations that reach a posthuman stage is very close to zero; (2) The fraction of posthuman civilizations that are interested in running ancestor-simulations is very close to zero; (3) The fraction of all people with our kind of experiences that are living in a simulation is very close to one.

If (1) is true, then we will almost certainly go extinct before reaching posthumanity. If (2) is true, then there must be a strong convergence among the courses of advanced civilizations so that virtually none contains any relatively wealthy individuals who desire to run ancestor-simulations and are free to do so. If (3) is true, then we almost certainly live in a simulation. In the dark forest of our current ignorance, it seems sensible to apportion one’s credence roughly evenly between (1), (2), and (3).

Unless we are now living in a simulation, our descendants will almost certainly never run an ancestor-simulation.

 

 

Acknowledgements

I’m grateful to many people for comments, and especially to Amara Angelica, Robert Bradbury, Milan Cirkovic, Robin Hanson, Hal Finney, Robert A. Freitas Jr., John Leslie, Mitch Porter, Keith DeRose, Mike Treder, Mark Walker, Eliezer Yudkowsky, and several anonymous referees.

 

[Nick Bostrom’s academic homepage: www.nickbostrom.com]
[More on the simulation argument: www.simulation-argument.com]


[1] See e.g. K. E. Drexler, Engines of Creation: The Coming Era of Nanotechnology, London, Forth Estate, 1985; N. Bostrom, “How Long Before Superintelligence?” International Journal of Futures Studies, vol. 2, (1998); R. Kurzweil, The Age of Spiritual Machines: When computers exceed human intelligence, New York, Viking Press, 1999; H. Moravec, Robot: Mere Machine to Transcendent Mind, Oxford University Press, 1999.

[2] Such as the Bremermann-Bekenstein bound and the black hole limit (H. J. Bremermann, “Minimum energy requirements of information transfer and computing.” International Journal of Theoretical Physics 21: 203-217 (1982); J. D. Bekenstein, “Entropy content and information flow in systems with limited energy.” Physical Review D 30: 1669-1679 (1984); A. Sandberg, “The Physics of Information Processing Superobjects: The Daily Life among the Jupiter Brains.” Journal of Evolution and Technology, vol. 5 (1999)).

[3] K. E. Drexler, Nanosystems: Molecular Machinery, Manufacturing, and Computation, New York, John Wiley & Sons, Inc., 1992.

[4] R. J. Bradbury, “Matrioshka Brains.” Working manuscript (2002), http://www.aeiveos.com/~bradbury/MatrioshkaBrains/MatrioshkaBrains.html.

[5] S. Lloyd, “Ultimate physical limits to computation.” Nature 406 (31 August): 1047-1054 (2000).

[6] H. Moravec, Mind Children, Harvard University Press (1989).

[7] Bostrom (1998), op. cit.

[8] See references in foregoing footnotes.

[9] As we build more and faster computers, the cost of simulating our machines might eventually come to dominate the cost of simulating nervous systems.

[10] 100 billion humans50 years/human30 million secs/year[1014, 1017] operations in each human brain per second  [1033, 1036] operations.

[11] In e.g. N. Bostrom, “The Doomsday argument, Adam & Eve, UN++, and Quantum Joe.” Synthese 127(3): 359-387 (2001); and most fully in my book Anthropic Bias: Observation Selection Effects in Science and Philosophy, Routledge, New York, 2002.

[12] See e.g. J. Leslie, “Is the End of the World Nigh? ” Philosophical Quarterly 40, 158: 65-72 (1990).

[13] See my paper “Existential Risks: Analyzing Human Extinction Scenarios and Related Hazards.” Journal of Evolution and Technology, vol. 9 (2001) for a survey and analysis of the present and anticipated future threats to human survival.

[14] See e.g. Drexler (1985) op cit., and R. A. Freitas Jr., “Some Limits to Global Ecophagy by Biovorous Nanoreplicators, with Public Policy Recommendations.” Zyvex preprint April (2000), http://www.foresight.org/NanoRev/Ecophagy.html.

[15] For some reflections by another author on the consequences of (3), which were sparked by a privately circulated earlier version of this paper, see R. Hanson, “How to Live in a Simulation.” Journal of Evolution and Technology, vol. 7 (2001).

Ancient City Older Than Egypt’s Pyramids Unearthed Off Georgia Coast

Ancient City Older Than Egypt’s Pyramids Unearthed Off Georgia Coast

Six hours southeast of Atlanta off the Georgia coast on Sapelo Island, archaeologists have unearthed the remains of an ancient walled city which predates the construction of Egypt’s pyramids. Known as the Sapelo Shell Ring Complex, this ancient city was constructed around 2300 B.C. and featured three neighborhoods each surrounded by circular walls twenty feet in height constructed from tons of seashells. Some of the earliest pottery in North America was also found buried in the remains of this lost city.

The site is quite an enigma because at the time of its construction the Native Americans living in the area were simple hunters and gatherers who had yet to invent agriculture. Many scholars believe agriculture is a prerequisite for civilization. Did these simple tribal people somehow make the leap from hunting-and-gathering to civilization in a single bound producing not only a walled city but also the new technology of pottery without the benefit of agriculture? Or did an already civilized people arrive on the coast of Georgia from elsewhere and, if so, where did they come from and why?

Just thirty years before the construction of the Sapelo Shell Rings researchers have noted that Bronze Age civilizations around the world show a pattern of collapse. According to the article “Sapelo Shell Rings (2170 BC)“:

In the Middle East, Akkadian Sumer collapsed at this time and the Dead Sea water levels reached their lowest point. In China, the Hongsan culture collapsed. Sediments from Greenland and Iceland show a cold peak around 2200 BC. The population of Finland decreased by a third between 2400 and 2000 BC. In Turkey’s Anatolia region, including the site of ancient Troy, over 350 sites show evidence of being burnt and deserted. Entire regions reverted to a nomadic way of life after thousands of years of settled agricultural life. In fact, most sites throughout the Old World which collapsed around 2200 BC showed unambiguous signs of natural calamities and/or rapid abandonment.

What happened around 2200 B.C. that could have caused such widespread devastation?

Meteor Storms & Cosmic Catastrophe?

Evidence is mounting that this devastation came from the sky. Astronomers have theorized that at this time Earth passed through a dense concentration of cosmic debris. Just picture the asteroid scene in Star Wars and you’ll get the idea. Yet researchers don’t think much of this debris actually impacted the ground. Instead they believe these meteors exploded in air bursts high above the ground, creating an ancient version of an atomic bomb blast.

Tunguska
The Tunguska meteor flattened 80 million trees over 2000 square miles as seen in this photo taken in 1927.

These air bursts would have first incinerated everything within tens if not hundreds of miles. Next they would have created hurricane force winds which would have obliterated any above-ground structures as well as forests.

Astronomers believe this catastrophe was similar to the Tunguska Event which flattened 80 million trees over a 2,000 square mile area of Russian Siberia in 1908. Russian scientists believe this event was caused by the explosion of a large meteor tens of meters across at an altitude of 3-6 miles. A similar event is thought to have caused the climate downturn in 3200 BC which flash froze the so-called Ice Man in the Swiss Alps.

Who Built the Sapelo Shell Rings?

At the time of European contact, two Native American tribes were known for constructing round, walled villages: the Timucua and Yuchi. Archaeologists believe some time in the past the Timucua migrated to Georgia and Florida from South America since their language was similar to that spoken by Indians in Venezuela. Did they flee their homeland after it was devastated by a meteor swarm that destroyed huge swaths of jungle? The Rio Cuarto impact craters in Argentina are thought by some geologists to date to this time period which supports the idea that South America was affected by the same event that struck the Old World.

The Yuchi also have a legend that they arrived in Georgia after “the old moon broke” and devastated their island homeland in the Bahamas. Could they have thought these meteors were pieces of the moon falling to Earth? Could impact tsunamis have devastated their island home in the Bahamas forcing them to flee to the mainland? Only further research will answer the questions.

Learn More

Learn more about the lastest research regarding the Sapelo Shell Ring Complex. Or visit the Sapelo Island Visitor’s Center at 1766 Landing Road, S.E., Darien, GA 31305. You can also find me on Facebooksubscribe to my newsletter, watch my DVD “Lost Worlds: Georgia” or purchase posters, mugs, t-shirts, mousepads and other gifts featuring the Sapelo Shell Rings artwork at my Sapelo Gift Shop.

SOURCE: http://lostworlds.org/ancient-walled-city-older-egypts-pyramids-unearthed-georgia-coast/

 

US to Start ‘Trade Wars’ with Nations Opposed to Monsanto, GMO Crops

US to Start ‘Trade Wars’ with Nations Opposed to Monsanto, GMO Crops

The United States is threatening nations who oppose Monsanto’s genetically modified (GM) crops with military-style trade wars, according to information obtained and released by the organization WikiLeaks. Nations like France, which have moved to ban one of Monsanto’s GM corn varieties, were requested to be ‘penalized’ by the United States for opposing Monsanto and genetically modified foods. The information reveals just how deep Monsanto’s roots have penetrated key positions within the United States government, with the cables reporting that many U.S. diplomats work directly for Monsanto.

The WikiLeaks cable reveals that in late 2007, the United States ambassador to France and business partner to George W. Bush, Craig Stapleton, requested that the European Union along with particular nations that did not support GMO crops be penalized. Stapleton, who co-owned the Dallas/Fort Worth-based Texas Rangers baseball team with Bush in the 1990s, stated:

“Country team Paris recommends that we calibrate a target retaliation list that causes some pain across the EU since this is a collective responsibility, but that also focuses in part on the worst culprits. The list should be measured rather than vicious and must be sustainable over the long term, since we should not expect an early victory. Moving to retaliation will make clear that the current path has real costs to EU interests and could help strengthen European pro-biotech voices.”

The Leaked Political Agenda Behind Monsanto’s GMO Crops

The ambassador plainly calls for ‘target retaliation’ against nations who are against using Monsanto’s genetically modified corn, admittedly linked to organ damage and environmental devastation. Amazingly, this is not an isolated case. In similar newly released cables, United States diplomats are found to have pushed GMO crops as a strategic government and commercial imperative. Furthermore, the U.S. specifically targeted advisers to the pope, due to the fact that many Catholic bishops and figureheads have openly denounced GMO crops. In fact, the Vatican has openly declared Monsanto’s GMO crops as a ‘new form of slavery’.

“A Martino deputy told us recently that the cardinal had co-operated with embassy Vatican on biotech over the past two years in part to compensate for his vocal disapproval of the Iraq war and its aftermath – to keep relations with the USG [US government] smooth. According to our source, Martino no longer feels the need to take this approach,” says the cable.

Perhaps the most shocking piece of information exposed by the cables is the fact that these U.S. diplomats are actually working directly for biotech corporations like Monsanto. The cables also highlight the relationship between the U.S. and Spain in their conquest to persuade other nations to allow for the expansion of GMO crops. Not only did the Spanish government secretly correspond with the U.S. government on the subject, but the U.S. government actually knew beforehand how Spain would vote before the Spanish biotech commission reported their decision regarding GMO crops. The cable states:

“In response to recent urgent requests by [Spanish rural affairs ministry] state secretary Josep Puxeu and Monsanto, post requests renewed US government support of Spain’s science-based agricultural biotechnology position through high-level US government intervention.”

Monsanto has undoubtedly infiltrated the United States government in order to push their health-endangering agenda, and this has been known long before the release of these WikiLeaks cables. The U.S. is the only place where Monsanto’s synthetic hormone Posilac is still used in roughly 1/3 of all cows, with 27 nations banning the substance over legitimate health concerns. Despite Monsanto’s best attempts at incognito political corruption, nothing can stop the grassroots anti-Monsanto movement that is taking over cities and nations alike.

By Anthony Gucciardi

Contributing Writer for Wake Up World

About the author:

Anthony Gucciardi is an accomplished investigative journalist with a passion for natural health. Anthony’s articles have been featured on top alternative news websites such as Infowars, NaturalNews, Rense, and many others. Anthony is the co-founder of Natural Society, a website dedicated to sharing life-saving natural health techniques. Stay in touch with Natural Society via the following sites FacebookTwitterWeb

SOURCE: http://wakeup-world.com/2012/01/10/leaked-cable-us-to-start-%E2%80%98trade-wars%E2%80%99-with-nations-opposed-to-monsanto-gmo-crops/

Inside Job: Anonymous Leader Flipped Into FBI Informant?

Inside Job: Anonymous Leader Flipped Into FBI Informant?

As reported by Fox News yesterday, LulzSec “mastermind” and Anonymous hacker Sabu (real name: Hector Xavier Monsegur) was flipped by the FBI. Big surprise. Give the FBI a cookie.

There has been a widespread belief that Sabu was a rat for quite some time within the hacking community—an August 2011 chat between Sabu and Virus, for instance. Virus quite prophetically wrote in that infamous chat: “I’m absolutely positive, you already got raided, and are setting your friends up and when they’re done draining you for information and arrests they’ll sentence you and it’ll make nose.”

Beyond that, in a community wherein anyone can have a voice, it stands to reason that subversive government influences are present, whether passively watching or actively suggesting. Disinformation, false flag operations, and immunity: these are the human intelligence gathering techniques that spy agencies use to infiltrate movements.

With that in mind, one of two possibilities exist: The FBI has transformed Anonymous into one monolithic false-flag operation, or agents take down hackers the way they take down other targets—with one or multiple informants. Judging the FBI’s efforts purely on the frequency of Anonymous’ activities throughout the last year, it’s probably safe to say that the FBI hasn’t accomplished the former.

If this conclusion is wildly off-base, and the former is true, then one has to entertain the following possibilities: the Stratfor hack was socially engineered by the FBI; Stratfor allowed it; and the FBI manipulated Anonymous into a partnership with WikiLeaks in the publication of the Global Intelligence Files. Then, of course, one must wonder if WikiLeaks itself is not a false-flag operation. This scenario seems rather unlikely, especially in a world where those who attempt to regulate the Internet are always one step behind.

Where then does this leave Anonymous and its supporters?

Again, judging from Anonymous’ efforts in the last year, which included a hybridization with Occupy Wall Street, the Stratfor hack,  a partnership with WikiLeaks, an infiltration of the FBI and Scotland Yard’s conference call on Anonymous, Operation ANTI-ACTA (which struck the Polish government), and the CIAPC hack (following Elisa’s blockade of The Pirate Bay), amongst other projects; it would seem seem that Anonymous, as a global collective, has grown far beyond LulzSec and Sabu’s influence—that it has indeed shed Sabu’s influence.

Anonymous’ efforts are truly global now and ever-shifting. Unless people believe that stool pigeon Sabu’s opera singing is evidence of some international, multi-state false flag conspiracy to nab radical hackers, Anonymous likely won’t be slowing down anytime soon.

Here’s a suggestion to the FBI: Maybe you should spend a little less time pursuing Anonymous and put more effort into bringing to justice the white-collar criminals who crashed the economy in 2008, thereby pocketing billions and evaporating middle class savings, delaying retirement, and sending families into the grip of poverty; driving individuals to suicide, or illegal and prescription drug use to numb the pain; to theft, alcoholism, and welfare that the GOP hates so much; and saddling college graduates with hundreds of thousands of dollars in debt from which they won’t soon liberate themselves.

Yes, one can see how a DDoS attack launched against Sony Pictures would be a priority. The FBI does work for politicians after all, who are kept in office by the campaign donations of corporations.

Indeed, the FBI, like Sabu himself, knows the following maxim all too well: you’re always somebody’s bitch.

SOURCE: http://www.deathandtaxesmag.com/179764/anonymous-has-grown-beyond-lulzsec-and-sabu/

CRIMINAL COMPLAINT:

Monsegur-Hector-Xavier-Information

U.S. Special Ops ‘Spy’ Plane Crashes in Africa Killing Four

U.S. Special Ops ‘Spy’ Plane Crashes in Africa Killing Four

  • NAIROBI, Kenya (The Blaze/AP) — An American reconnaissance plane crashed 6 miles (10 kilometers) from the only U.S. base in Africa, killing four service members on board, after returning from a mission in support of the war in Afghanistan, the military said Monday.The statement said that the crash occurred at about 8 p.m. Saturday in Djibouti. U.S. personnel from Camp Lemonnier in the tiny Horn of Africa nation responded to the scene. Reports don’t specify what exactly took the plane down, but Specialist Ryan Whitney of the 1st Special Operations Wing said that initial indications are that the plane did not crash because of hostile fire.

    The plane was conducting an intelligence, surveillance and reconnaissance mission, he said. A statement from U.S. Africa Command called it a “routine” flight.

    Amy Oliver, public affairs director of the Air Force 1st Special Operations Wing, said the single-engine, fixed-wing U-28A was returning from a mission in support of the Afghanistan war, specifically Operation Enduring Freedom.

    The cause of the crash is still under investigation. Camp Lemonnier lies only miles from the border with Somalia. Wired, which called the aircraft a “spy” plane, reports that military activity in this area has increased recently:

    […] special operations forces have increased their activity in east Africa significantly in recent years, particularly in Somalia, where on January 24, they pulled off a dramatic hostage rescue deep inside the country. There is another American still held hostage in Somalia, the author Michael Scott Moore, but it was unclear whether the intelligence mission the four elite airmen completed had anything to do with Moore.

    The four killed in the crash included: Capt. Ryan P. Hall, 30, of Colorado Springs, Colorado, with the 319th Special Operations Squadron; Capt. Nicholas S. Whitlock, 29, of Newnan, Georgia, with the 34th Special Operations Squadron; 1st Lt. Justin J. Wilkens, 26, of Bend, Oregon, with the 34th Special Operations Squadron; and Senior Airman Julian S. Scholten, 26, of Upper Marlboro, Maryland, with the 25th Intelligence Squadron.

    Hall was a U-28 pilot with more than 1,300 combat flight hours. He was assigned to the 319th Special Operations Squadron at Hurlburt Field, Fla.

SOURCE: http://www.theblaze.com/stories/u-s-special-ops-spy-plane-crashes-in-africa-killing-four/

Judge Naomi Buchwald: Corrupted By Monsatno

Judge Naomi Buchwald: Corrupted By Monsatno

On February 24, Judge Naomi Buchwald handed down her ruling on a motion to dismiss in the case of Organic Seed Growers and Trade Assn et al v. Monsanto after hearing oral argument on January 31st in Federal District Court in Manhattan. Her ruling to dismiss the case brought against Monsanto on behalf of organic farmers, seed growers and agricultural organizations representing farmers and citizens was met with great disappointment by the plaintiffs.

Plaintiff lead attorney Daniel Ravicher said, “While I have great respect for Judge Buchwald, her decision to deny farmers the right to seek legal protection from one of the world’s foremost patent bullies is gravely disappointing. Her belief that farmers are acting unreasonable when they stop growing certain crops to avoid being sued by Monsanto for patent infringement should their crops become contaminated maligns the intelligence and integrity of those farmers. Her failure to address the purpose of the Declaratory Judgment Act and her characterization of binding Supreme Court precedent that supports the farmers’ standing as ‘wholly inapposite’ constitute legal error.  In sum, her opinion is flawed on both the facts and the law. Thankfully, the plaintiffs have the right to appeal to the Court of Appeals, which will review the matter without deference to her findings.”

Monsanto’s history of aggressive investigations and lawsuits brought against farmers in America have been a source of concern for organic and non-GMO farmers since Monsanto’s first lawsuit brought against a farmer in the mid-90′s. Since then, 144 farmers have had lawsuits brought against them by Monsanto for alleged violations of  their patented seed technology.  Monsanto has brought charges against more than 700 additional farmers who have settled out-of-court rather than face Monsanto’s belligerent litigious actions. Many of these farmers claim to not have had the intention to grow or save seeds that contain Monsanto’s patented genes. Seed drift and pollen drift from genetically engineered crops often contaminate neighboring fields. If Monsanto’s seed technology is found on a farmer’s land without contract they can be found liable for patent infringement.

“Family farmers need the protection of the court,” said Maine organic seed farmer Jim Gerritsen, President of lead plaintiff OSGATA.  ”We reject as naïve and undefendable the judge’s assertion that Monsanto’s vague public relations ‘commitment’ should be ‘a source of comfort’ to plaintiffs. The truth is we are under threat and we do not believe Monsanto. The truth is that American farmers and the American people do not believe Monsanto. Family farmers deserve our day in court and this flawed ruling will not deter us from continuing to seek justice.”

The plaintiffs brought this suit against Monsanto to seek judicial protection from such lawsuits and challenge the validity of Monsanto’s patents on seeds.

“As a citizen and property owner, I find the Order by the Federal Court to be obsequious to Monsanto,” said plaintiff organic farmer Bryce Stephens of Kansas.  ”The careless, inattentive, thoughtless and negligent advertisement Monsanto has published on their website to not exercise its patent rights for inadvertent trace contamination belies the fact that their policy is in reality a presumptuous admission of contamination by their vaunted product on my property, plants, seeds and animals.”

“Seeds are the memory of life,” said Isaura Anduluz of plaintiff Cuatro Puertas and the Arid Crop Seed Cache in New Mexico.  ”If planted and saved annually, cross pollination ensures the seeds continue to adapt. In the Southwest, selection over many, many generations has resulted in native drought tolerant corn.  Now that a patented drought tolerant corn has been released how do we protect our seeds from contamination and our right to farm?”

A copy of Judge Buchwalds ruling is located here.

EXPERTS: “Feds Purposely Keeping U.S. Borders Wide Open”

EXPERTS: “Feds Purposely Keeping U.S. Borders Wide Open”

Under the guise of environmentalism, various federal agencies and departments are blocking Border Patrol agents’ access to critical areas while contributing to widespread lawlessness along the U.S. border, according to experts. Criminals, meanwhile, are taking full advantage of the rapidly deteriorating situation.

Despite claims by the Obama administration that the American border is “safer” or “more secure” than ever, sources with knowledge of the reality on the ground say that is simply not true. In fact, as Mexico spirals deeper into chaos, conditions along the border are only getting worse — rapidly.

“Far from contained and secure, the Arizona Border remains a terribly dangerous sieve from which not only illegals enter America, but drug cartels operating as organized crime syndicates and even as terrorist cells are coming to and from across America’s supposed secure border,” noted private-sector intelligence analyst and border expert Lyle Rapacki with Sentinel Intelligence Services in an e-mailed briefing obtained by The New American.

And according to experts, the federal government itself is a major contributor to the problem. Its public-lands policies, for example, have essentially created vast “no-go” zones where the Border Patrol is barred from meaningful operations while criminals and traffickers run wild.

“Federal agencies are using environmental laws to keep agents from having unfettered access to the border and to pursue criminals on federal public land once the criminals have crossed,” Vice Chairman Zack Taylor of the National Association of Former Border Patrol Officers (NAFBPO — symbolic badge shown above) told The New American. “The criminals have destroyed the federal public land and it makes no sense to keep Border Patrol off because it simply causes more damage.”

According to Taylor and other experts, the Department of Interior and the Department of Agriculture are the main culprits responsible for creating the dangerous situation. “It is a ploy of the open borders advocates to keep Border Patrol out and let the illegal aliens and drugs in,” he explained. “They are using the environmental protection laws to do that. That simple.”

And by restricting Border Patrol access to huge areas of public land — from Arizona and New Mexico to Montana and Idaho — the federal government is giving criminals the advantage. And they are using it to wreak havoc within America.

“If the agents cannot access the border area, they cannot patrol it,” Taylor noted. “The criminals then have an advantage and make good use of the advantage by smuggling drugs and aliens into the United States.”

Taylor said criminals occupy and monitor the vast off-limits areas to increase the chances of success in their smuggling operations. In some cases, traffickers’ networks of surveillance and communication can keep a constant view of corridors stretching from the Mexican border to Phoenix, he explained. And that makes bringing in drugs, illegal immigrants, and terrorists much simpler.

Of course, it is not just border states that are threatened. Hundreds of American cities now have active foreign-based criminal networks that operate with impunity. And very little is being done to stop it, experts say.

The press, meanwhile, has largely remained silent. “It is as if the administration has placed a gag order on them,” Taylor said. “They just won’t talk about it, much less report it.”

The state of Arizona has attempted to adopt some measures aimed at protecting citizens, but the Obama administration has responded with lawsuits and harassment. Lawmakers in the state, however, know that something must be done.

“Arizona is losing control of her sovereign land,” noted State Senator Sylvia Allen, chairman of the Arizona Senate Committee on Border Security. “Arizona is in a State of Emergency. If we want to protect our national and state sovereignty, we must secure our border and enforce our laws.”

Sen. Allen’s committee has heard testimony from citizens along the border area who reported home invasions, vandalism, theft, and a host of other criminal activities. Clearly, the state is facing a monumental crisis that needs to be addressed, she said. Yet, instead of helping, the federal government is making matters worse, according to a statement issued by Sen. Allen late last year. And the problems created by the executive branch are hardly isolated incidents.

“Why is the apparent official policy of the United States to ridicule and silence those who are trying to protect our state of Arizona? Why are the cartels protected?” she wondered. “Why do official U.S. government departments, sworn to protect American citizens, extend protection to gangs working with the drug cartels, and even to terrorists entering our nation from various border entry points?”

Sen. Allen and numerous other experts believe they know the answer — or at least part of it. The disastrous federal border policies, according to Allen, are connected to the emerging “North American Union” — a plan to essentially “merge” the United States with Mexico and Canada that is regularly and openly discussed by top officials including former Mexican President Vicente Fox, who told CNN that the merger is “inevitable.”

“There is a concerted, deliberate, and sophisticated program under way to erase our national boundaries and create a North American Union,” Sen. Allen explained. “The gift of sovereignty handed to us by our Forefathers would be extinguished, and we would become subjects, no longer free.”

Other critics of U.S. policies have noted the futility — insanity, perhaps — of fighting a multi-trillion-dollar terror war around the world and using the armed forces to secure land borders in Asia even as America’s own borders remain wide open for potential terrorists. Homeland Security, meanwhile, has been too busy hyping the threat of “right-wing extremism” to properly control the border. And the apparent lunacy does not end there.

The federal government is also shoveling billions of American tax dollars into the coffers of corrupt Latin American governments — purportedly to fight the “drug war” — even as narcotics flow virtually unhindered across wide swaths of the U.S. border. And if recent reports and statements by experts are to be believed, the problem goes even deeper than that.

The Obama administration is currently being investigated by Congress for trafficking thousands of high-powered weapons to Mexican drug cartels under Operation Fast and Furious. Some of those guns were later tied to the murder of Border Patrol agent Brian Terry.

Meanwhile, lawmakers are also probing the administration’s money laundering activities through the DEA after a front page story in the New York Times exposed the scheme. According to sources and reports, the federal government may even be directly involved in fomenting the chaos south of the border: More than a few drug kingpins and some American officials have even said the U.S. government was purposefully providing weapons and protection to the criminal empires.

Another controversial policy that experts say is related to the overall plan is the President’s effort to provide covert “amnesty” for millions of illegal immigrants without even obtaining approval from Congress. “We have been betrayed by our leaders in a way that I just did not think was possible,” NAFBPO [National Association of Former Border Patrol Officers] Chairman and former Assistant Chief Patrol Agent Kent Lundgren explained in an exclusive interview with the Liberty News Network.

Critics of the policies — including lawmakers nationwide, NAFBPO, and countless other concerned groups — believe it is past time to rein in the administration and put an end to the lawlessness. But as Mexico descends into a bloody civil war that is seeping across the border, the time for action may be running out.

Related articles:

Border Group: Obama Amnesty “Contempt for Law”

WikiLeaks Exposes North American Integration Plot

Escalating Chaos on Our Border

Obama Scales Back Border Patrol Enforcement

Govt Proposes Unmanned Border Crossing from Mexico

War on the Border Patrol

Feds Prosecuted U.S. Border Agent for Mexico

ATF Linked to Border Agent’s Murder

Holder Admits Lies in Fast and Furious, Refuses to Resign

Internationalists Renew Call for a North American Union

Trafficker: U.S. Feds Aided Mexican Drug Cartel

Mexican Drug Trafficker Says He Worked With Feds

Reports: CIA Working with Mexican Drug Cartels

War on Drugs Grows FAST Abroad

Congress Probes DEA Drug Money Laundering Scheme

 

SOURCE: http://www.thenewamerican.com/usnews/immigration/10924-feds-purposely-keeping-us-borders-wide-open-experts-say

FALSE FLAG: The FBI Yet Again, Thwarts its Own Terror Plot

FALSE FLAG: The FBI Yet Again, Thwarts its Own Terror Plot

The FBI has received substantial criticism over the past decade — much of it valid — but nobody can deny its record of excellence in thwarting its own Terrorist plots.  Time and again, the FBI concocts a Terrorist attack, infiltrates Muslim communities in order to find recruits, persuades them to perpetrate the attack, supplies them with the money, weapons and know-how they need to carry it out — only to heroically jump in at the last moment, arrest the would-be perpetrators whom the FBI converted, and save a grateful nation from the plot manufactured by the FBI.

Last year, the FBI subjected 19-year-old Somali-American Mohamed Osman Mohamud to months of encouragement, support and money and convinced him to detonate a bomb at a crowded Christmas event in Portland, Oregon, only to arrest him at the last moment and then issue a Press Release boasting of its success.  In late 2009, the FBI persuaded and enabled Hosam Maher Husein Smadi, a 19-year old Jordanian citizen, to place a fake bomb at a Dallas skyscraper and separately convinced Farooque Ahmed, a 34-year-old naturalized American citizen born in Pakistan, to bomb the Washington Metro.  And now, the FBI has yet again saved us all from its own Terrorist plot by arresting 26-year-old American citizen Rezwan Ferdaus after having spent months providing him with the plans and materials to attack the Pentagon, American troops in Iraq, and possibly the Capitol Building using “remote-controlled” model airplanes carrying explosives.

None of these cases entail the FBI’s learning of an actual plot and then infiltrating it to stop it.  They all involve the FBI’s purposely seeking out Muslims (typically young and impressionable ones) whom they think harbor animosity toward the U.S. and who therefore can be induced to launch an attack despite having never taken even a single step toward doing so before the FBI targeted them.  Each time the FBI announces it has disrupted its own plot, press coverage is predictably hysterical (new Homegrown Terrorist caught!), fear levels predictably rise, and new security measures are often implemented in response (the FBI’s Terror plot aimed at the D.C. Metro, for instance, led to the Metro Police announcing a new policy of random searches of passengers’ bags).   I have several observations and questions about these matters:

(1) The bulk of this latest FBI plot entailed attacks on military targets: the Pentagon, U.S. troops in Iraq, and possibly military bases.  The U.S. is — as it has continuously announced to the world — a Nation at War.  The Pentagon is the military headquarters for this war, and its troops abroad are the soldiers fighting it.  In what conceivable sense can attacks on those purely military and war targets be labeled “Terrorism” or even illegitimate?  The U.S. has continuously attacked exactly those kinds of targets in multiple nations around the world; it expressly tried to kill Saddam and Gadaffi in the wars against their countries (it even knowingly blew up an entire suburban apartment building to get Saddam, who wasn’t actually there).   What possible definition of “Terrorism” excludes those attacks by the U.S. while including this proposed one on the Pentagon and other military targets (or, for that matter, Nidal Hasan’s attack on Fort Hood where soldiers deploy to war zones)?

(2) With regard to the targeted building that is not purely a military target — the Capitol Building — is that a legitimate war target under the radically broad standards the U.S. and its allies have promulgated for itself?  The American “shock and awe” assault on Baghdad destroyed “several government buildings and palaces built by Saddam Hussein”; on just the third day of that war, “U.S. bombs turn[ed] key government buildings in Baghdad into rubble.”  In Libya, NATO repeatedly bombed non-military government buildings.  In Gaza, Israeli war planes targeted a police station filled with police recruits on the stated theory that a valid target “ranges from the strictly military institutions and includes the political institutions that provide the logistical funding and human resources” to Hamas.

Obviously, there is a wide range of views regarding the justifiability of each war, but isn’t the U.S. Congress — which funds, oversees, and regulates America’s wars — a legitimate war target under the (inadvisedly) broad definitions the U.S. and its allies have imposed when attacking others?  If the political leaders and even functionaries of other countries with which the U.S. is at war are legitimate targets, then doesn’t that necessarily mean that Pentagon officials and, arguably, those in the Congress are as well?

(3) The irony that this plot featured “remote-controlled aircraft filled with plastic explosives” is too glaring to merit comment; the only question worth asking is whether the U.S. Government can sue Ferdaus for infringing its drone patents.  Glaring though that irony is, there is no shortage of expressions of disgust today, pondering what kind of Terrorist monster does it take to want to attack buildings with remote-controlled mini-aircraft.

(4) Wouldn’t the FBI’s resources be better spent on detecting and breaking up actual Terrorist plots — if there are any — rather than manufacturing ones so that they can stop those?  Harboring hatred for the U.S. and wanting to harm it (or any country) is not actually a crime; at most, it’s a Thought Crime.  It doesn’t become a crime until steps are taken to attempt to transform that desire into reality.  There are millions and millions of people who at some point harbor a desire to impose violent harm on others who never do so: perhaps that’s true of a majority of human beings.  Many of them will never act in the absence of the type of highly sophisticated, expert push of which the FBI is uniquely capable.  Is manufacturing criminals — as opposed to finding and stopping actual criminals — really a prudent law enforcement activity?

(5) Does the FBI devote any comparable resources to infiltrating non-Muslim communities in order to persuade and induce those extremists to become Terrorists so that they can arrest them?  Are they out in the anti-abortion world, or the world of radical Christianity, or right-wing anti-government radicals, trying to recruit them into manufactured Terrorist plots?

(6) As usual, most media coverage of the FBI’s plots is as uncritical as it is sensationalistic.  The first paragraph of The New York Times article on this story described the plot as one “to blow up the Pentagon and the United States Capitol.”  But the FBI’s charging Affidavit (reproduced below) makes clear that Ferdaus’ plan was to send a single model airplane (at most 1/10 the size of an actual U.S. jet) to the Capitol and two of them to the Pentagon, each packed with “5 pounds” of explosives (para. 70); the Capitol was to be attacked at its dome for “psychological effect” (para 34).  The U.S. routinely drops 500-pound or 1,000-pound bombs from actual fighter jets; this plot — even if it were carried out by someone other than a hapless loner with no experience and it worked perfectly — could not remotely “blow up” the Pentagon or the Capitol.

(7) As is now found in almost every case of would-be Terrorist plots against the U.S. — especially “homegrown Terrorists” — the motive is unbridled fury over (and a desire to avenge) contintuous U.S violence against Muslim civilians.  Infused throughout the charging Affidavit here are such references to Ferdaus’ motives, including his happiness over the prospect of killing U.S. troops in Iraq; his proclamation that he’s “interested in traveling to Afghanistan” to aid insurgents; his statement that “he wanted to ‘decapitate’ the U.S. government’s ‘military center’ and to severely disrupt . . . the head and heart of the snake” (para 12) and to “essentially decapitate the entire empire” (para 34) (compare that language to how the U.S. described what it tried to do in Baghdad).  At least according to the FBI, this is how Feradus replied when expressly asked why he wanted to attack the U.S.:

Cause that would be a huge scare . . . the point is you want to scare them so they know not to mess with you . . . They have . . . . have killed from us, our innocents, our men, women and children, they are all enemies (para 19).

If the FBI’s allegations are accurate, then it’s clear Ferdaus has become hardened in his hatred; he talks about a willingness to kill American civilians because they have become part of the enemy, and claims that he fantasized about such attacks before the FBI informant spoke to him.

But whatever else is true,  it’s simply unrealistic in the extreme to expect to run around for a full decade screaming WE ARE AT WAR!! — and dropping bombs and attacking with drones and shooting up families in multiple Muslim countries (and occupying, interfering in and killing large numbers before that) – and not produce many Rezwan Ferdauses.  In fact, the only surprising thing is that these seem to be so few of them actually willing and able to attack back that — in order to justify this Endless War on civil liberties (and Terror)  — the FBI has to search for ones they can recruit, convince, and direct to carry out plots.

Complaint Affidavit

Close

Glenn Greenwald
Follow Glenn Greenwald on Twitter: @ggreenwaldMore Glenn Greenwald

SOURCE: http://www.salon.com/2011/09/29/fbi_terror/

Appeals Court: No Forced Decryption

Appeals Court: No Forced Decryption

Privilege Against Self-Incrimination Applies to Act of Decrypting Data

San Francisco – A federal appeals court has found a Florida man’s constitutional rights were violated when he was imprisoned for refusing to decrypt data on several devices. This is the first time an appellate court has ruled the 5th Amendment protects against forced decryption – a major victory for constitutional rights in the digital age.

In this case, titled United States v. Doe, FBI agents seized two laptops and five external hard drives from a man they were investigating but were unable to access encrypted data they believed was stored on the devices via an encryption program called TrueCrypt. When a grand jury ordered the man to produce the unencrypted contents of the drives, he invoked his Fifth Amendment privilege against self-incrimination and refused to do so. The court held him in contempt and sent him to jail.

The Electronic Frontier Foundation (EFF) filed an amicus brief under seal, arguing that the man had a valid Fifth Amendment privilege against self-incrimination, and that the government’s attempt to force him to decrypt the data was unconstitutional. The 11th U.S. Circuit Court of Appeals agreed, ruling that the act of decrypting data is testimonial and therefore protected by the Fifth Amendment. Furthermore, the government’s limited offer of immunity in this case was insufficient to protect his constitutional right, because it did not extend to the government’s use of the decrypted data as evidence against him in a prosecution.

“The government’s attempt to force this man to decrypt his data put him in the Catch-22 the 5th Amendment was designed to prevent – having to choose between self-incrimination or risking contempt of court,” said EFF Senior Staff Attorney Marcia Hofmann. “We’re pleased the appeals court recognized the important constitutional issues at stake here, and we hope this ruling will discourage the government from using abusive grand jury subpoenas to try to expose data people choose to protect with encryption. ”

A similar court battle is ongoing in Colorado, where a woman named Ramona Fricosu has been ordered by the court to decrypt the contents of a laptop seized in an investigation into fraudulent real estate transactions. EFF also filed a friend of the court brief in that case, arguing that Fricosu was being forced to become a witness against herself. An appeals court recently rejected her appeal, and she has been ordered to decrypt the information this month.

“As we move into an increasingly digital world, we’re seeing more and more questions about how our constitutional rights play out with regards to the technology we use every day,” said EFF Staff Attorney Hanni Fakhoury. “This is a case where the appeals court got it right – protecting the 5th Amendment privilege against self-incrimination.”

John Doe was represented by Chet Kaufman of the Federal Public Defender’s Office in Tallahassee.

For the full court ruling:
https://www.eff.org/document/opinion

Contacts:

Marcia Hofmann
Senior Staff Attorney
Electronic Frontier Foundation
[email protected]

Hanni Fakhoury
Staff Attorney
Electronic Frontier Foundation
[email protected]

USDA Gives Monsanto ‘Speed Approval’

USDA Gives Monsanto ‘Speed Approval’

If you thought Monsanto’s lack of testing on their current GMO crops was bad before, prepare to now be blown away by the latest statement by the USDA. Despite links to organ damage and mutated insects, the USDA says that it is changing the rules so that genetically modified seed companies like Monsanto will get ‘speedier regulatory reviews’. With the faster reviews, there will be even less time spent on evaluating the potential dangers. Why? Because Monsanto is losing sales with longer approval terms.

The changes are expected to take full effect in March when they’re published in the Federal Register. The USDA’s goal is to cut the approval time for GMO crops in half in order to speedily implement them into the global food supply. The current USDA process takes longer than they would like due to ‘public interest, legal challenges, and the challenges associated with the advent of national organic food standards‘ says USDA deputy administrator Michael Gregoire.

According to the United States Department of Agriculture, problems like public interest (activist groups attempting to bring the dangers of GMO crops to light), legal challenges (farmers suing Monsanto over genetic contamination), and national food standards are all getting in the way of their prime goal — to helpMonsanto unleash their latest untested GMO creation. In fact, the concern is that Monsanto may be losing cash flow as nations like Brazil speed genetically modified seeds through laughable approval processes.

Steve Censky, chief executive officer of the American Soybean Association, states it quite plainly. This is a move to help Monsanto and other biotechnology giants squash competition and make profits. After all, who cares about public health?

It is a concern from a competition standpoint,” Censky said in a telephone interview.

The same statements are re-iterated by analyst Jeff Windau in an interview with Bloomberg:

“If you can reduce the approval time, you get sales that much faster,” said Windau

If you can reduce the approval time, as in the time it takes to determine if these food products are safe, then you can get sales much faster. Is the USDA working for the United States consumer, or is it working for Monsanto?

SOURCE: http://www.nationofchange.org/usda-give-monsanto-s-new-gmo-crops-special-speed-approval-1330267848