August 29, 2013 – Decrypted Matrix Radio: TruthSeeker Motivations, Syra False Flag Chem Attack, Israeli Sphinx, Human Lab Brain, Obama Gun Control, NSA Parody Takedown, Brain Hacks part 2

Power Grid Down Drill To Be Conducted By US Government

CLIP: Ret. Col Wilkerson “This Could Have Been An Israeli False Flag Operation!”

FLASHBACK: Syrian Chemical Weapons Narrative Likely False Flag

Ancient Egyptian Sphinx Mysteriously Unearthed In Israel

Miniature ‘human brain’ grown in lab

BREAKING: Obama Signs Two New Executive Orders On Gun Control

Nothing Better to Do – The NSA Goes After Parody T-Shirts

More Brain Hacking – Mark Dice Update – TEDx Talks God Helmet Sensor Tech

August 26, 2013 – Decrypted Matrix Radio: Syria WMDs, Celldar 2002, CIA Helped Saddam, Brain Hacking, Monsanto Dumped, Rap Game-Changer, NSA Meanings, REAL Spies

Syria – WMDs Redux!

Rense Reminds of ‘Celldar’ Advanced Spying Techniques – FlashBack 2002!

CIA Files Prove U.S. Helped Saddam During Chemical Attacks On Iran

Mylee Cyrus – Controversy by Design

DARPA Wants Portable Brain Recorders “In Every Classroom in America”
CLIP: Mark dice on Brain Hacking

GREAT NEWS: Insider Traders Begin Dumping Monsanto Stocks as Reality of GMOs Sinks in Across Wall Street

“The Secret Meeting that Changed Rap Music and Destroyed a Generation”

How to Decode the True Meaning of What NSA Officials Say

8 real spies treated better than Manning 8 real spies treated better than Manning

August 22, 2013 – Decrypted Matrix Radio: Chelsea Manning, Hastings Update, Cali Gun Confiscation, NSA protected by Whitehouse, Anons FBI Dump, Human Nuggets, SWAT Cops

Bradley Manning To Serve Prison Sentence as Female, Chelsea Manning
(examples of injustice shared on following episode)

Michael Hastings was afraid his car was tampered with!

CLIP:  Gun Confiscation Begins In California

NSA files: why the Guardian in London destroyed hard drives of leaked files

NSA Intel Review: Transparent ‘outsiders’ end up being CyberSec ‘insiders’ in more White-house Hypocrisy

LULZ: FBI Says Anonymous no longer effective.. Anonymous responds by Dumping more FBI Databases

Chicken Nuggets..!? Strange Fibers..!? Morgellon’s Disease..!? Human Nuggets..!?

WTF: Swat COP Says America has become a battleground and have same dangers as soldiers in Afghanistan??

Edward Snowden Leaks Again – And It’s a Bombshell

Edward Snowden Leaks Again – And It’s a Bombshell

Activists Rally In New York In Support Of NSA Whistleblower Edward SnowdenIn 2008, the National Security Agency illicitly—if accidentally—intercepted a “large number” of phone calls from Washington, D.C. because an error confused Egypt’s country code—“20”—with, yes, “202.”

That fact, one of many startling ones from Barton Gellman’s new blockbuster Washington Post story based on documents given to him by Edward Snowden, is so catchy and memorable that I almost worry about it. That is, I worry people will just think of that and fail to grasp that this was actually one of the more anodyne NSA abuses revealed by these newly disclosed top-secret documents, including an internal audit. In fact, in the year preceding the May 2012 audit, there were 2,776 violations (another eye-grabber, suggestively alike the totemic 1,776).

I think more troubling is that the NSA deliberately fed international communications (which it is permitted to monitor in certain ways) through U.S. fiber-optic cables, commingling those kosher foreign emails with domestic ones—which the secret Foreign Intelligence Surveillance Court (or FISC, and it is generally a rubber stamp) ruled unconstitutional.

I also think more troubling is that last year, the NSA retained more than 3,000 files of telephone call records in defiance of an FISC order (!). How many calls involving how many people were on each file is unknown, by the way.

I think it is pretty messed up that all of this information solely concerns violations that occurred at the NSA’s headquarters in Maryland. “Three government officials, speak­ing on the condition of anonymity to discuss classified matters, said the number [of violations] would be substantially higher if it included other NSA operating units and regional collection centers,” Gellman reports.

Here’s the audit, for those not faint of heart or jargon (an appendix is provided).

There is a valuable, vital debate to be had over how much the federal government, in its intelligence programs, ought to be permitted to violate Americans’ privacy in an effort to protect Americans from a dangerous world that includes people who want to kill Americans. There are many different places where the important red lines can be drawn in this debate. It is a debate strewn with well-intentioned, conscientious people who would draw those lines at very different places. Let’s even be generous and stipulate that the question of whether the statutorily provided oversight of these programs is sufficient belongs, as well, to that debate.

The terrifying thing is that we are not having that debate. As these documents are the latest things to demonstrate, the various overseers as well as the public do not have access to the information that even the current rules assert they should have. That is how I can state with certainty that we are not having that vital debate: We do not have the means to have that debate with any kind of authority; therefore, no matter how much we discuss these issues, we are not having that debate.

The most important thing about the Egypt-D.C. confusion isn’t that U.S. calls were collected in violation of rules, for instance. It is that, after this violation was uncovered, it was not reported to oversight staff.

In a separate, in many ways equally important Post article, Carol D. Leonnig reports that FISC’s chief judge is hopelessly dependent on the NSA in order for it to perform its statutorily mandated oversight. “The FISC does not have the capacity to investigate issues of noncompliance,” the judge, Reggie B. Walton, told her, “and in that respect the FISC is in the same position as any other court.” Obama, Leonnig noted, has explicitly held FISC up as assurance that the programs do have strong oversight. But it should be obvious that outside oversight that depends on the purely internal machinations of the thing that is supposed to be overseen is not accountable oversight.

Lawmakers are not blameless. They may access unredacted documents, albeit in a secure room where they lack the ability to take notes. They might theoretically then, even, pull a Mike Gravel and read the results into the record on the House or Senate floor. Gellman reports that “fewer than 10 percent of lawmakers” presently have the ability actually to do this in practice. Sen. Dianne Feinstein, the Senate Intelligence Committee chairwoman, was unaware of the May 2012 audit until she was contacted for the Post story.

But mainly this is on the NSA, which is to say, on the administration. President Obama pledged last Friday to make these surveillance programs “more transparent.” He argued, “It’s not enough for me as president to have confidence in these programs. The American people need to have confidence in them, as well.”

Yet the administration did not disclose, say, the lapses Gellman reported. In fact, the NSA retroactively placed an on-the-record interview with its director of compliance off the record, according to Gellman. It did this after Obama’s speech extolling the importance of and promising transparency. In a sense, we got his wished-for transparency. We can see right through him now.

via NewRepublic

August 12, 2013 – Decrypted Matrix Radio: Clapper the Fox, 18 Gun Facts, Matrix Philosophy, IRS AR-15s, Apple goes Orwellian, McCain on Snowden

CIA Director Brennan Confirmed as Reporter Michael Hastings Next Target

18 Little-Known Gun Facts That Prove That Guns Make Us Safer

IRS Refuses to Answer Congressman on AR-15s for ‘Standoff Capability’

Philosophy & the Matrix – What is Reality

John McCain: “Young Americans See Edward Snowden as Some Kind of Jason Bourne”

Apple patents new Orwellian Technology

A Fox Guards the Hen-house: James Clapper (who lied about NSA spying) set to lead NSA Investigation

July 15, 2013 – Decrypted Matrix Radio: Special Guest, Zimmerman Continued, Snowden Updates, Disruptive Technologies to Empower the Masses

Special Guest!

The Zimmerman Case : How To Create A Racial Conflict And Dupe The Course Of Justice In Favour Of The Police State

youtube.com/StormCloudsGathering

Snowden Saga Continues

‘Anti-Propaganda’ Ban Repealed, Freeing State Dept. To Direct Its Broadcasting Arm At American Citizens

Five Corporation-Crushing Disruptive Technologies That Will Empower the Masses

CLIPS: Graphene & 3D Printing Revolution

July 11, 2013 – Decrypted Matrix Radio: Russel Brand on Bankers, DefCon Bans FEDs, Monsanto Propaganda, UN Arms Treaty, NSA Backdoors

CLIP: Russell Brand on Banksters

For first time ever, Feds asked to sit out Defcon Hacker Conference

Obama Commits to Signing UN Arms Treaty While Congress at Summer Recess

Former wrestling teammate says the guy in the court hearing is NOT Dzhokhar Tsarnaev

Monsanto targets public radio to spread false biotech messages

The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

Spy Back: How to View Your NSA or FBI File

Spy Back: How to View Your NSA or FBI File

fbialtDo you know what FOIA is? No? Don’t be alarmed, most Americans don’t. It is better known as the Freedom of Information Act (introduced by Sen. Edward V. Long in 1965 and signed into law by President Lyndon B. Johnson in 1966), and is most often used by Americans looking for answers into the deep mysteries of government activity. There is something else you should know, however: Freedom of Information Act requests aren’t just for those who are seeking information on black ops activities.

 

You can use it yourself to discover what organizations like the National Security Agency or the Federal Bureau of Investigation have on your file. Amazingly, FIOA can be used by you to get whatever files that the NSA or FBI or any other three letter agency has on you. And with the latest round of leaks covered by Anthony Gucciardi detailing how the NSA is tracking your activity through just about all of the major social websites, this is big news.

 

Perhaps you are politically active and have gone to a few protests and were arrested, or maybe you post a lot of political articles on your favorite social networking site.

 

Grabbing Your File

 

There are two ways you can get your file. Your first option is to get it straight from the source. For the NSA file, you can go to the FOIA request form. Or for the FBI, you can go to their official request form as well. Or perhaps you don’t feel comfortable going through that process and would rather use another party, in which case you can utilize the website Get My FBI File. This website provides the forms for most agencies, CIA, DIA, FBI, NSA, etc.

 

Since the conception of FOIA in 1966, it has been amended eleven times. Most notably by President Gerald Ford in 1974. At first, President Ford was for bolstering various privacy-related amendments, however he then performed a complete 180 on the issue (after being persuaded by his Chief of Staff Donald Rumsfield, and Deputy Richard Cheney), signing a Presidential veto that was eventually overturned by Congress. This was only one of twelve vetoes that were overturned by congress in regards to President Ford.

 

Additional Sources:

 

DailyKos

By Gordon Rupe
Story Leak

From 9/11 To PRISMgate – How The Carlyle Group LBO’d The World’s Secrets

From 9/11 To PRISMgate – How The Carlyle Group LBO’d The World’s Secrets

prism-gate

The short but profitable tale of how 483,000 private individual have “top secret” access to the nation’s most non-public information begins in 2001. “After 9/11, intelligence budgets were increased, new people needed to be hired, it was a lot easier to go to the private sector and get people off the shelf,” and sure enough firms like Booz Allen Hamilton – still two-thirds owned by the deeply-tied-to-international-governments investment firm The Carlyle Group – took full advantage of Congress’ desire to shrink federal agencies and their budgets by enabling outside consultants(already primed with their $4,000 cost ‘security clearances’) to fulfill the needs of an ever-more-encroaching-on-privacy administration.

Booz Allen (and other security consultant providing firms) trade publicly with a cloak of admitted opacity due to the secrecy of their government contracts (“you may not have important information concerning our business, which will limit your insight into a substantial portion of our business”) but the actions of Diane Feinstein who promptly denounced “treasonous” Edward Snowden, “have muddied the waters,” for the stunning 1.1 million (or 21% of the total) private consultants with access to “confidential and secret” government information.

Perhaps the situation of gross government over-spend and under-oversight is summed up best, “it’s very difficult to know what contractors are doing and what they are billing for the work — or even whether they should be performing the work at all.”

First, Diane Feinstein’s take on it all…

“I don’t look at this as being a whistleblower. I think it’s an act of treason,” the chairwoman of the Senate Intelligence Committee told reporters. The California lawmaker went on to say that Snowden had violated his oath to defend the Constitution. “He violated the oath, he violated the law. It’s treason.”

So how did all this get started?… (via AP)

The reliance on contractors for intelligence work ballooned after the 9/11 attacks. The government scrambled to improve and expand its ability to monitor the communication and movement of people who might threaten another attack.

“After 9/11, intelligence budgets were increased, new people needed to be hired,” Augustyn said. “It was a lot easier to go to the private sector and get people off the shelf.”

The reliance on the private sector has grown since then, in part because of Congress’ efforts to limit the size of federal agencies and shrink the budget.

Which has led to what appears to be major problems.

But critics say reliance on contractors hasn’t reduced the amount the government spends on defense, intelligence or other programs.

Rather, they say it’s just shifted work to private employers and reduced transparency. It becomes harder to track the work of those employees and determine whether they should all have access to government secrets.

“It’s very difficult to know what contractors are doing and what they are billing for the work — or even whether they should be performing the work at all,”

… And to the current PRISMgate whistleblowing situation:

Of the 4.9 million people with clearance to access “confidential and secret” government information, 1.1 million, or 21 percent, work for outside contractors, according to a report from Clapper’s office.

Of the 1.4 million who have the higher “top secret” access, 483,000, or 34 percent, work for contractors.

Because clearances can take months or even years to acquire, government contractors often recruit workers who already have them.

Why not – it’s lucrative!!

Snowden says he accessed and downloaded the last of the documents that detailed the NSA surveillance program while working in an NSA office in Hawaii for Booz Allen, where he says he was earning $200,000 a year.

Analysts caution that any of the 1.4 million people with access to the nation’s top secrets could have leaked information about the program – whether they worked for a contractor or the government.

For individuals and firms alike.

Booz Allen has long navigated those waters well.

The firm was founded in 1914 and began serving the U.S. government in 1940, helping the Navy prepare for World War II. In 2008, it spun off the part of the firm that worked with private companies and abroad. That firm, called Booz & Co., is held privately.

Booz Allen was then acquired by the Carlyle Group, an investment firm with its own deep ties to the government. In November 2010, Booz Allen went public.  The Carlyle Group still owns two-thirds of the company’s shares.

Or, a full-majority stake.

Curiously once public, The Booz Allens of the world still operate like a psuedo-private company, with extensive confidential cloaks preventing the full disclosure of financial data. But don’t worry – we should just trust them. Via Bloomberg’s Jonathan Weil.

Psst, here’s a stock tip for you. There’s a company near Washington with strong ties to the U.S. intelligence community that has been around for almost a century and has secret ways of making money — so secret that the company can’t tell you what they are. Investors who buy just need to have faith.

To skeptics, this might seem like a pitch for an investment scam. But as anyone who has been paying attention to the news might have guessed, the company is Booz Allen Hamilton Holding Corp.

“Because we are limited in our ability to provide information about these contracts and services,” the company said in its latest annual report, “you may not have important information concerning our business, which will limit your insight into a substantial portion of our business, and therefore may be less able to fully evaluate the risks related to that portion of our business.”

This seems like it would be a dream arrangement for some corporations: Not only is Booz Allen allowed to keep investors uninformed, it’s required to. I suppose we should give the company credit for being transparent about how opaque it is.

And while the media and popular attention is currently focused on who, if anyone else, may be the next Snowden struck by a sudden pang of conscience, perhaps a better question is what PE behemoth Carlyle, with a gargantuan $170 billion in AUM, knows, and why it rushed to purchase Booz Allen in the months after the Bear Stearns collapse, just when everyone else was batting down the hatches ahead of the biggest financial crash in modern history.

From Bloomberg, May 2008:

Carlyle Group, the private-equity firm run by David Rubenstein, agreed to acquire Booz Allen Hamilton Inc.’s U.S. government-consulting business for $2.54 billion, its biggest buyout since the credit markets collapsed in July.

The purchase would be Carlyle’s biggest since it agreed to buy nursing-home operator Manor Care Inc. last July for $6.3 billion. Deal-making may be rebounding from a 68 percent decline in the first quarter as investment banks begin writing new commitments for private-equity transactions. Buyouts ground to a halt last year because of a global credit freeze triggered by record U.S. subprime-mortgage defaults.

The Booz Allen government-consulting unit has more than 18,000 employees and annual sales of more than $2.7 billion. Its clients include branches of the U.S. military, the Department of Homeland Security and the World Bank.

Carlyle, based in Washington, manages $81.1 billion in assets [ZH: that was 5 years ago – the firm now boasts $170 billion in AUM]. Rubenstein founded the firm in 1987 with William Conway and Daniel D’Aniello. The trio initially focused on deals tied to government and defense.

Carlyle and closely held Booz Allen have attracted high-level officials from the government. Carlyle’s senior advisers have included former President George H.W. Bush, former British Prime Minister John Major, and Arthur Levitt, the ex-chairman of the U.S. Securities and Exchange Commission.

R. James Woolsey, who led the U.S. Central Intelligence Agency from 1993 to 1995, is a Booz Allen executive. Mike McConnell, the U.S. director of national intelligence, is a former senior vice president with the company.

Carlyle last year sold a minority interest in itself to Mubadala Development Co., an investment fund affiliated with the government of Abu Dhabi, capital of the United Arab Emirates.

And in addition to the UAE, who can possibly forget Carlyle’s Saudi connection. From the WSJ circa 2001:

If the U.S. boosts defense spending in its quest to stop Osama bin Laden’s alleged terrorist activities, there may be one unexpected beneficiary: Mr. bin Laden’s family.

Among its far-flung business interests, the well-heeled Saudi Arabian clan — which says it is estranged from Osama — is an investor in a fund established by Carlyle Group, a well-connected Washington merchant bank specializing in buyouts of defense and aerospace companies.

Through this investment and its ties to Saudi royalty, the bin Laden family has become acquainted with some of the biggest names in the Republican Party. In recent years, former President Bush, ex-Secretary of State James Baker and ex-Secretary of Defense Frank Carlucci have made the pilgrimage to the bin Laden family’s headquarters in Jeddah, Saudi Arabia. Mr. Bush makes speeches on behalf of Carlyle Group and is senior adviser to its Asian Partners fund, while Mr. Baker is its senior counselor. Mr. Carlucci is the group’s chairman.

Osama is one of more than 50 children of Mohammed bin Laden, who built the family’s $5 billion business, Saudi Binladin Group, largely with construction contracts from the Saudi government. Osama worked briefly in the business and is believed to have inherited as much as $50 million from his father in cash and stock, although he doesn’t have access to the shares, a family spokesman says. Because his Saudi citizenship was revoked in 1994, Mr. bin Laden is ineligible to own assets in the kingdom, the spokesman added.

People familiar with the family’s finances say the bin Ladens do much of their banking with National Commercial Bank in Saudi Arabia and with the London branch of Deutsche Bank AG. They also use Citigroup Inc. and ABN Amro, the people said.

“If there were ever any company closely connected to the U.S. and its presence in Saudi Arabia, it’s the Saudi Binladin Group,” says Charles Freeman, president of the Middle East Policy Council, a Washington nonprofit concern that receives tens of thousands of dollars a year from the bin Laden family. “They’re the establishment that Osama’s trying to overthrow.”

A Carlyle executive said the bin Laden family committed $2 million through a London investment arm in 1995 in Carlyle Partners II Fund, which raised $1.3 billion overall. The fund has purchased several aerospace companies among 29 deals. So far, the family has received $1.3 million back in completed investments and should ultimately realize a 40% annualized rate of return, the Carlyle executive said. But a foreign financier with ties to the bin Laden family says the family’s overall investment with Carlyle is considerably larger. He called the $2 million merely an initial contribution. “It’s like plowing a field,” this person said. “You seed it once. You plow it, and then you reseed it again.”

The Carlyle executive added that he would think twice before accepting any future investments by the bin Ladens. “The situation’s changed now,” he said. “I don’t want to spend my life talking to reporters.”

We can clearly see why. We can also clearly see why nobody has mentioned Carlyle so far into the Booz Allen fiasco.

A U.S. inquiry into bin Laden family business dealings could brush against some big names associated with the U.S. government. Former President Bush said through his chief of staff, Jean Becker, that he recalled only one meeting with the bin Laden family, which took place in November1998. Ms. Becker confirmed that there was a second meeting in January 2000, after being read the ex-president’s subsequent thank-you note. “President Bush does not have a relationship with the bin Laden family,” says Ms. Becker. “He’s met them twice.”

Mr. Baker visited the bin Laden family in both 1998 and 1999, according to people close to the family. In the second trip, he traveled on a family plane. Mr. Baker declined comment, as did Mr. Carlucci, a past chairman of Nortel Networks Corp., which has partnered with Saudi Binladin Group on telecommunications ventures.

As one can imagine the rabbit hole just gets deeper and deeper the more one digs. For now, we will let readers do their own diligence. We promise the results are fascinating.

Going back to the topic at hand, we will however ask just how much and what kind of confidential, classified, and or Top Secret information is shared “behind Chinese walls” between a Carlyle still majority-owned company and the private equity behemoth’s employees and advisors, among which are some of the most prominent political and business luminaries currently alive.  The following is a list of both current and former employees and advisors. We have used Wiki but anyone wishing to comb through the firm’s full blown roster of over 1,000 employees and advisors, is welcome to do so at the firm’s website.

Business

Political figures

North America
Europe
Asia
  • Anand Panyarachun, former Prime Minister of Thailand (twice), former member of the Carlyle Asia Advisory Board until the board was disbanded in 2004  
  • Fidel V. Ramos, former president of the Philippines, Carlyle Asia Advisor Board Member until the board was disbanded in 2004  
  • Peter Chung, former associate at Carlyle Group Korea, who resigned in 2001 after 2 weeks on the job after an inappropriate e-mail to friends was circulated around the world    
  • Thaksin Shinawatra, former Prime Minister of Thailand (twice), former member of the Carlyle Asia Advisory Board until 2001 when he resigned upon being elected Prime Minister.  

Media

  • Norman Pearlstine – editor-in-chief of Time magazine from (1995–2005), senior advisor telecommunications and media group 2006-

and across the entire globe?

Here is Carlyle, straight from the horse’s recently IPOed mouth, courtesy of its most recent public presentation

Perhaps Bloomberg’s Jonathan Weil sums it up best:

There’s no easy solution here, aside from the obvious point that the government keeps way too many secrets.

So what happens when one corporation, owned and controlled by the same government’s former (and in some cases current) top power brokers, potentially has access to all of the same government’s secrets?

via ZeroHedge

July 8, 2013 – Decrypted Matrix Radio: Egypt Overthrown, Michael Hastings Crash Cover-Up, Wiretap Bounty, Police State Comandeering, Top 20 Obama Scandals

Egypt – Why The Muslim Brotherhood Was Overthrown: Cults And Democracies Don’t Mix

CLIP: Very Unusual Intense Hot Fire in Hastings Car Crash

And Now… Talking Train Window Advertisements

Average cost per ‘official’ wiretap in the United States: $50,452

Nevada Police face rare Third Amendment lawsuit for Force Comandeering Homes

Top 20 Obama Scandals: Quick List (via Intellihub)

July 2, 2013 – Decrypted Matrix Radio: Priest Decries ‘Satanism’, Occupy FBI Snipers, Mysterious Tech, Gen Cartwright Spy, Snowden Snowjob?

Pedo Priest Don Patrizio Poggi Claims Vatican Rife With Prostitution and “Satanism”

FBI Planned to Kill Occupy Leaders – SHOCKER lol

Zimmerman Prosecutor Indicted For Allegely Falsifying arrest warrant and complaint

Mysterious Sophisticated Technology Could Rewrite History

Beyond Snowden: US General Cartwright has been indicted for espionage

Saga Continues: ‘The World Will Be Shocked’: Greenwald on Upcoming NSA Exposé

Snowjob, a colloquialism for a cover-up, distraction

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

June 21, 2013 – Decrypted Matrix Radio: Monsanto Exec’s Nobel ‘Food’ Prize, UFO Drones, Video Game Terrorists, Guccifer on Cryptome, NSA Bitcoin Link?

Monsanto Exec Gets ‘Nobel Peace Prize’ of Food

Video Game Casts Patriot Groups as Enemy Terrorists

New Advanced UFO-Like Drone Technologies Monitor Tens of Thousands of Protestors In Brazil

Conservation Director Warns ‘Unfounded Complaints About Water Supply Could Be Considered Terrorism Under Homeland Security

Next Phase of Syrian Invasion Begins — The Central Bank Connection

US Secret Service Visits Cryptome

World War Z: Emergency Preparedness, United Nations, and Predictive Programming

Is the National Security Agency behind Bitcoin?

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

<

Understanding The Militarized Internet

Understanding The Militarized Internet

cyber-war-landscape-warriors

If twitter is any gauge, a lot of people think this article in Wired about General Keith Alexander is just all kinds of kewl:

General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Alexander runs the nation’s cyberwar efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. “What we see is an increasing level of activity on the networks,” he said at a recent security conference in Canada. “I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.”

In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.

But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander—who declined to be interviewed for this article—has concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.

And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.

The success of this sabotage came to light only in June 2010, when the malware spread to outside computers. It was spotted by independent security researchers, who identified telltale signs that the worm was the work of thousands of hours of professional development. Despite headlines around the globe, officials in Washington have never openly acknowledged that the US was behind the attack. It wasn’t until 2012 that anonymous sources within the Obama administration took credit for it in interviews with The New York Times.

But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.

I don’t suppose the American public have any business knowing if their government is launching such attacks. Why would we? What could possibly go wrong?

Inside the government, the general is regarded with a mixture of respect and fear, not unlike J. Edgar Hoover, another security figure whose tenure spanned multiple presidencies. “We jokingly referred to him as Emperor Alexander—with good cause, because whatever Keith wants, Keith gets,” says one former senior CIA official who agreed to speak on condition of anonymity. “We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.”

Now 61, Alexander has said he plans to retire in 2014; when he does step down he will leave behind an enduring legacy—a position of far-reaching authority and potentially Strangelovian powers at a time when the distinction between cyberwarfare and conventional warfare is beginning to blur. A recent Pentagon report made that point in dramatic terms. It recommended possible deterrents to a cyberattack on the US. Among the options: launching nuclear weapons.

Like I said, what could possibly go wrong?

When the Guardian revealed this program the other day there was a spirited debate about whether this, unlike the other programs, was something we should welcome and expect. My problem with it wasn’t that the government was creating plans to defend against attacks on US cyber-infrastructure or even war plans in case such a thing happened. What I found questionable was the idea that this was conceived as  21st Century offensive war planning, and and in ways that do not necessarily fall within the traditional “national security” boundaries.

When it comes to cyber issues, I’m afraid we are seeing a confluence of commerce and security that everyone should stop and think about for a minute. How are these people defining the “national interest” and on whose behalf are they planning to launch cyberwar? What are the consequences of doing such a thing and who decides that it must be done?

And what do we think about paying huge amounts of taxpayer dollars to contractors like this?

Defense contractors have been eager to prove that they understand Alexander’s worldview. “Our Raytheon cyberwarriors play offense and defense,” says one help-wanted site. Consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, a Tampa, Florida, company, said it was hunting for “attack and penetration consultants.”

One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. True to form, the company declined Wired’s interview requests.
[…]
Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgame’s clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed. But such access doesn’t come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.

The buying and using of such a subscription by nation-states could be seen as an act of war. “If you are engaged in reconnaissance on an adversary’s systems, you are laying the electronic battlefield and preparing to use it,” wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. “In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.” The question is, who else is on the secretive company’s client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. “It should be illegal,” says the former senior intelligence official involved in cyber­warfare. “I knew about Endgame when I was in intelligence. The intelligence community didn’t like it, but they’re the largest consumer of that business.”

There are some serious implications to all of this that need to be hashed out by the American people. Of course we need to have defenses against cyber attacks. I don’t think anyone in the country thinks otherwise. But this looks like it could be a monumental financial boondoggle that is in great danger of running amok and causing some very serious problems. Frankly, this scares me much more than the threat that some would-be is going to get a hold of some beauty supplies and blow himself up.

Islamic terrorism is not and never has been an existential threat. This, I’m not so sure about. We should at least have a little chat about it before we let Cyber Buck Turgidson and his friends run wild.

by Digby

 

NSA Document Leak Proves Conspiracy To Create Big Brother Styled World Control System

NSA Document Leak Proves Conspiracy To Create Big Brother Styled World Control System

The Obama regime which was already in the midst of three high profile scandals now has a fourth one to deal with. Top secret documents were recently leaked to the Washington Post and the London Guardian detailing a vast government surveillance program code named PRISM. According to the leaked documents, the program allows the National Security Agency (NSA) back door access to data from the servers of several leading U.S. based Internet and software companies. The documents list companies such as Google, Facebook, Yahoo, Microsoft, AOL and Apple as some of the participants in the program. There have also been other reports indicating that the NSA is able to access real-time user data from as many as 50 separate American companies. Under the program, the NSA is able to collect information ranging from e-mails, chats, videos, photographs, VoIP calls and more. Most importantly is the fact that PRISM allows the NSA to obtain this data without having to make individual requests from the service providers or without having to obtain a court order. To say that this is a violation of the Fourth Amendment which forbids unreasonable searches and seizures would be a gross understatement. This is actually much more than that. This is a program designed specifically to serve as a Big Brother like control grid and to end privacy as we know it.

ID:1218108 powered by AXP.

The NSA is quickly building a real life version of 1984’s Big Brother.

In some ways this is not really a new story. This is just confirmation of what many people involved in the alternative research community have known for years. Going as far back as the 1990s there were reports revealing how Microsoft provided the NSA with back door access to their Windows operating system. Google’s cozy relationship with the NSA has also been discussed off and on over the past decade. There have even been other whistleblowers that have come forward previously detailing a number of unconstitutional and unlawful abuses conducted by the agency. This includes revelations of how the NSA was spying on American service members stationed overseas. The only difference with this is that these newly leaked documents provide definitive details on just how wide reaching the NSA’s activities have become.

It is now painfully obvious that James Clapper the Director of National Intelligence when testifying before the Senate this past March blatantly lied when asked by Senator Ron Wyden if the NSA was involved in collecting data from the American people. Clapper flatly denied that the NSA was engaged in these types of domestic surveillance activities. What makes the situation such a joke is that the Obama regime is not focused on the fact that Clapper lied to the Senate which in of itself is unlawful. Instead they have been more focused on determining the source of the leak that exposed these broad abuses of power. This is probably not surprising considering that this is a regime that rewards corruption by promoting people involved in all sorts of questionable activity. The promotion of Susan Rice as Obama’s new National Security Advisor is a perfect example of this considering her involvement in spreading bogus Benghazi related talking points. On the other hand, the Obama regime has severely punished a variety of whistleblowers who have dared to expose any wrong doing.

At least the Obama regime won’t have to spend much time and energy trying to identify the whistleblower as this person who leaked these documents has already come forward publically. At his own request the Guardian revealed his identity as Edward Snowden a 29-year old Information Technology specialist who has been working at the NSA for different contractors including Booz Allen Hamilton and Dell. Snowden had previously worked at an NSA office in Hawaii but boarded a flight to Hong Kong a few weeks ago where he has stayed since turning over these documents to the media. He expects that he will never set foot on U.S. soil again and may possibly seek political asylum in a country like Iceland. The Guardian interviewed Snowden over several days and has recently posted an interview transcript that provides more detail on the abuses he became aware of and why he decided to come forward as a whistleblower. In the interview Snowden confirms that the NSA has the infrastructure that allows them to intercept almost any type of data that you can imagine from phone records, e-mails to credit cards. He also reveals how the U.S. government is engaged in hacking systems everywhere around the world and how the NSA has consistently lied to Congress about their activities. There is little doubt that Snowden is thus far one of the most important whistleblowers to come along in the 21st century and he will likely face retaliation considering the vast reach and capabilities of the U.S. intelligence community.

Many individuals within the Obama regime including Obama himself have claimed that this type of widespread data collection is needed to fight terrorism and is used for national security purposes. Even if we were to assume that the war on terror is real, this claim is ridiculous and absurd on its face. It would be one thing if they were collecting information based upon a specific criteria identified by legitimate human intelligence. Instead they are collecting indiscriminate amounts of information which makes it much more difficult to analyze and target anything that might indicate a potential threat. If the NSA’s goal is really to detect and target terrorism than all they are doing is making their job more difficult by vastly increasing the noise they have to filter through. Either the people running the NSA are incredibly stupid or the goal of this program is to establish the infrastructure necessary to centrally collect data from communications everywhere around the world.

Other evidence to support this notion is the fact that the NSA is building a huge new facility in Utah that is being designed to store an enormous amount of data. A Fox News report indicates that when completed the facility will be able to store billions of terabytes worth of information. It is hard to fathom how the NSA would need this much storage space unless it was being used to collect and store any and all communications.

The Obama regime has tried to justify all of this by saying that PRISM helped stop an alleged New York City subway bomb plot back in 2009. This has been proven to be factually incorrect as regular police work and help from the British were larger factors in stopping the plot. This is assuming you even believe the official story of this terror plot to begin with. The government and more specifically the FBI have manufactured so many fake terror plots that it is difficult to determine fact from fiction at this point. So with this said, there is really no proof that PRISM has even helped to stop any so-called terror plot. They are collecting information simply for the sake of collecting information with no probable cause or reasonable justification.

At this point it is an undeniable fact that the NSA has been illegally collecting information on the American people. For years what has been dismissed as conspiracy theory is now without question a conspiracy fact. It is laughable that Obama and his assorted cronies are even trying to defend this program as a useful tool to fight terrorists. It is more likely that this program is being used to help find people domestically who dislike the government and would potentially fight back against it.  A striking similarity to what is depicted in George Orwell’s dystopic novel 1984 where political dissidents are identified as thought criminals. A tool the NSA uses called Boundless Informant which counts and categorizes the information they collect shows that more data is actually gathered from domestic sources in the U.S. than from Russia. So based off of this one could argue that the NSA almost seems to view the American people as more of a threat to national security than the Russians.

The three scandals the Obama regime was dealing with prior to this new scandal are all grounds for impeachment and one could easily argue that this one is many times worse than the previous three. Obama should resign in disgrace but being that he’s a narcissist who seems unwilling to admit making any mistakes it is highly doubtful he will do this. Obama and the rest of the useful idiots in his regime who have tried to defend and justify this and other criminal programs need to be forcibly removed from office and put on trial. The criminal activity from the Obama regime is so vastly transparent it has become a complete and total joke to anyone who is even remotely paying attention.

Source: Lee Rogers, Blacklisted News

June 12, 2013 – Decrypted Matrix Radio: Alabama DNA RoadBlock, Military Blocked from NSA Story, Exchanging Liberty for Security, Boston FBI Head Steps Down, Security Contractor Methods

Off-Duty Cops Collect DNA Samples at Alabama Roadblocks

Air Force Prohibiting Airmen from Reading NSA Scandal Stories

NSA surveillance played little role in foiling terror plots, experts say

More Americans see man who leaked NSA secrets as ‘patriot’ than traitor: Poll

Chief of FBI’s Boston office, key figure in marathon bombing investigation, stepping down

CLIP: Young Turks – What Security Contractors have already done to attack Political opponents

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

<

June 11, 2013 – Decrypted Matrix Radio: Alphabet Spies, Physicians Against Fluoridation, CellPhone Industry Cover-Up, Project Camelot Super Soldiers Update

IRS Buying Spying Equipment: Covert Cameras in Coffee Trays, Plants

NSA Leak Proves Conspiracy to Create Big Brother Control System

600 Physicians Come together on water Fluoridation

What the Cellphone Industry Doesn’t Want You to Know About Radiation Concerns

CLIP: Project Camelot Super Soldiers – WOW!

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

<

June 6, 2013 – Decrypted Matrix Radio: Anonymous Warns M.I. Complex, PRISM Tech Spying, UFOs in Canada, Newtown Censorship, Haunted by Drone Killings

CLIP: Anonymous – The Military Industrial Complex Threat

Two Secretive Israeli Companies May Have Bugged The US Telecommunications Grid For The NSA

New PRISM leak shows feds can access user accounts for Google, Facebook and more

CLIP: UFO Alien Disclosure By Canadian Minister Of Defense May 2013

Newtown parents ask to block release of photos, audio – Conn. Gov. Signs Bill Restricting Newtown Photos

Robo-Raven Robotic bird created by Army and University of Maryland researchers

Former drone operator says he’s haunted by his part in more than 1,600 deaths

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

<

June 5, 2013 – Decrypted Matrix Radio: The Peoples Voice, Billionaires Dump Stocks, Obamacare Survey, Manning Transcripts, Anonymous for Turkey, NSA Exposed, DHS Search & Seizure, Lasting Inner Peace

Sgt Bales Pleads Guilty to Murdering 16 Afghan Civilians??

David Icke’s Initiative to Create “The People’s Voice” Broadcasting Network

Billionaires Dumping Stocks, Economist Knows Why

Two-Thirds of Uninsured Americans Don’t Know If They Will Buy Insurance Under Obamacare

Crowdfunded Stenographer Denied Press Pass To Cover Transcript-less Bradley Manning Trial

Anonymous – Message to the Turkish Government (Gezi Park Demonstration – #OccupyTurkey)

Secret Court Documents: NSA Collecting Phone Records of Millions of Americans Daily

DHS: Laptops, Phones Can Be Searched Based On Hunches

The Five Elements of Lasting Inner Peace

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

<

11 Secret Documents Americans Deserve to See

11 Secret Documents Americans Deserve to See

top-secret-documents

Many documents produced by the U.S. government are confidential and not released to the public for legitimate reasons of national security.  Others, however, are kept secret for more questionable reasons.  The fact that presidents and other government officials have the power to deem materials classified provides them with an opportunity to use national security as an excuse to suppress documents and reports that would reveal embarrassing or illegal activities.

 

I’ve been collecting the stories of unreleased documents for several years. Now I have chosen 11 examples that were created—and buried—by both Democratic and Republican administrations and which cover assassinations, spying, torture, 50-year-old historical events, presidential directives with classified titles and…trade negotiations.

 

1. Obama Memo Allowing the Assassination of U.S. Citizens      

When the administration of George W. Bush was confronted with cases of Americans fighting against their own country, it responded in a variety of ways. John Walker Lindh, captured while fighting with the Taliban in December 2001, was indicted by a federal grand jury and sentenced to 20 years in prison. José Padilla was arrested in Chicago in May 2002 and held as an “enemy combatant” until 2006 when he was transferred to civilian authority and, in August 2007, sentenced to 17 years in prison for conspiring to support terrorism. Adam Gadahn, who has made propaganda videos for al-Qaeda, was indicted for treason in 2006 and remains at large.

 

After he took over the presidency, Barack Obama did away with such traditional legal niceties and decided to just kill some Americans who would previously have been accused of treason or terrorism. His victims have included three American citizens killed in Yemen in 2011 by missiles fired from drones: U.S.-born anti-American cleric Anwar al-Awlaki, Samir Khan, an al-Qaeda propagandist from North Carolina, and Awlaki’s 16-year-old son, Abdulrahman al-Awlaki.

 

Obama justified his breach of U.S. and international law with a 50-page memorandum prepared by the Justice Department’s Office of Legal Counsel.  Attorney General Eric Holder argued that the killing of Awlaki was legal because he was a wartime enemy and he could not be captured, but the legal justification for this argument is impossible to confirm because the Obama administration has refused to release the memo.

 

2. The Obama Interpretation of Section 215 of the Patriot Act

Section 215 of the Patriot Act allows the FBI, in pursuit of spies and terrorists, to order any person or entity to turn over “any tangible things” without having to justify its demands by demonstrating probable cause. For example, a library can be forced to reveal who borrowed a book or visited a web site. According to Section 215, the library is prohibited from telling anyone what it has turned over to the FBI.

 

The Obama administration has created a secret interpretation of Section 215 that goes beyond the direct wording of the law to include other information that can be collected. Democratic Senator Ron Wyden of Oregon, who, as a member of the Senate Intelligence Committee, was briefed about this secret interpretation, urged the president to make it public. “I want to deliver a warning this afternoon,” he said. “When the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry.”

 

Wyden and Sen. Mark Udall of Colorado, also a Democrat, have implied that the Obama administration has expanded the use of Section 215 to activities other than espionage and terrorism. In a letter to Attorney General Eric Holder, Wyden and Udall wrote that “there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows. This is a problem, because it is impossible to have an informed public debate about what the law should say when the public doesn’t know what its government thinks the law says.”
3. 30-page Summary of 9/11 Commission Interview with Bush and Cheney

You would have thought that, in the interests of the nation, the Bush administration would have demanded a thorough investigation of the terrorist attacks of September 11, 2001, the deadliest assault ever on U.S. soil. Instead, they fought tooth and nail against an independent investigation. Public pressure finally forced President George W. Bush to appoint a bipartisan commission that came to be known as the 9/11 Commission.  It was eventually given a budget of $15 million…compared to the $39 million spent on the Monica Lewinsky/Bill Clinton investigation. When the commission completed its work in August 2004, the commissioners turned over all their records to the National Archives with the stipulation that the material was to be released to the public starting on January 2, 2009. However, most of the material remains classified. Among the more tantalizing still-secret documents are daily briefings given to President Bush that reportedly described increasingly worried warnings of a possible attack by operatives of Osama bin Laden.

 

Another secret document that the American people deserve to see is the 30-page summary of the interview of President Bush and Vice-President Dick Cheney conducted by all ten commissioners on April 29, 2004.  Bush and Cheney refused to be interviewed unless they were together. They would not testify under oath and they refused to allow the interview to be recorded or transcribed.  Instead the commission was allowed to bring with them a note taker. It is the summary based on this person’s notes that remains sealed.

 

4. Memos from President George W. Bush to the CIA Authorizing Waterboarding and other Torture Techniques

Four days after the terrorist attacks of September 11, 2001, President George W. Bush signed a “memorandum of notification” (still secret) that authorized the CIA to do what it needed to fight al-Qaeda.  However the memo did not address what interrogation and torture techniques could be used on captured suspects. By June 2003, Director George Tenet and others at the CIA were becoming worried that if their seemingly illegal tactics became known to the public, the White House would deny responsibility and hang the CIA out to dry.  After much discussion, Bush’s executive office handed over two memos, one in 2003 and another in 2004, confirming White House approval of the CIA interrogation methods, thus giving the CIA “top cover.” It is not known if President Bush himself signed the memos.

 

5. 1,171 CIA Documents Related to the Assassination of President Kennedy

It’s been 49 years since President John F. Kennedy was shot to death in Dallas, yet the National Archives and Records Administration (NARA) insists that more than one thousand documents relating to the case should not be released to the public until NARA is legally required to do so in 2017…unless the president at that time decides to extend the ban.  It would appear that some of the blocked material deals with the late CIA agent David Phillips, who is thought to have dealt with Lee Harvey Oswald in Mexico City six weeks before the assassination.

 

6. Volume 5 of the CIA’s History of the Bay of Pigs Fiasco

In the late 1970s and early 1980s, CIA historian Dr. Jack B. Pfeiffer compiled a multi-volume history of the failed US attempt to invade Cuba in April 1961.  In August 2005, the National Security Archive at George Washington University, citing the Freedom of Information Act, requested access to this history.  The CIA finally released the information almost six years later, in July 2011. However it refused to release Volume V, which is titled “CIA’s Internal Investigation of the Bay of Pigs Operations.”  Although more than 50 years have passed since the invasion, the U.S. District Court for the District of Columbia ruled that Volume V is exempt from the Freedom of Information Act because it “is covered by the deliberative process privilege” which “covers documents reflecting advisory opinions, recommendations and deliberations comprising part of a process by which governmental decisions and policies are formulated.”

 

7. National Security Decision Directives with Classified Titles

The day before he left the White House on January 20, 1993, President George H. W. Bush issued National Security Directive (NSD) #79, a document so secret that even its title remains classified almost 20 years later. The same goes for National Security Directive #77, issued a few days earlier, as well as four others issued in 1989 (#11, 13a, 19a and 25a). If the “a”s are any indication of the subjects, it is worth noting that NSD 13 dealt with countering cocaine trafficking in Peru; NSD 19 dealt with Libya and NSD 25 with an election in Nicaragua.

 

President Ronald Reagan also issued six NSDs with classified titles, and President Bill Clinton issued 29.  President George W. Bush issued two such NSDs, presumably shortly after the terrorist attacks of September 11, 2001. President Barack Obama has issued at least seven Presidential Policy Directives with classified titles.

 

8. Major General Douglas Stone’s 700-Page Report on Prisoners Held in Afghanistan

Marine Corps General Douglas Stone earned positive reviews for his revamping of detention operations in Iraq, where he determined that most of the prisoners held by the United States were not actually militants and could be taught trades and rehabilitated. Based on his success in Iraq, Stone was given the task of making an evaluation of detainee facilities in Afghanistan. His findings, conclusions and recommendations were included in a 700-page report that he submitted to the U.S. Central Command in August 2009. According to some accounts of the report, Stone determined that two-thirds of the Afghan prisoners were not a threat and should be released. However, three years after he completed it, Stone’s report remains classified.

 

9. Detainee Assessment Briefs for Abdullah Tabarak and Abdurahman Khadr

In 2011, WikiLeaks released U.S. military files known as Detainee Assessment Briefs (DABs), which describe the cases of 765 prisoners held at Guantánamo Bay. However, there were actually 779 prisoners. So what happened to the files for the other fourteen? Andy Worthington, author of The Guantanamo Files, has noted that two of the fourteen missing stories are especially suspicious: those of Abdullah Tabarak and Abdurahman Khadr.

 

Tabarak, a Moroccan, was allegedly one of Osama bin Laden’s long-time bodyguards, and took over bin Laden’s satellite phone in order to draw U.S. fire to himself instead of to bin Laden when U.S. forces were chasing the al-Qaeda leader in the Tora Bora mountains in December 2001.  Captured and sent to Guantánamo, Tabarak was mysteriously released, sent back to Morocco in July 2003, and set free shortly thereafter.

 

Abdurahman Khadr, the self-described “black sheep” of a militant family from Canada, was 20 years old when he was captured in Afghanistan and turned over to American forces. He has said that he was recruited by the CIA to become an informant at Guantánamo and then in Bosnia. When the CIA tried to send him to Iraq, he refused and returned to Canada. His younger brother, Omar, was 15 years old when he was captured in Afghanistan and accused of killing an American soldier, Sergeant First Class Christopher Speer, during a firefight.  He was incarcerated at Guantánamo for almost ten years until he was finally released to Canadian custody on September 29, 2012.

 

10. FBI Guidelines for Using GPS Devices to Track Suspects

On January 23, 2012, in the case of United States v. Jones, the Supreme Court ruled unanimously that attaching a GPS device to a car to track its movements constitutes a “search” and is thus covered by the Fourth Amendment protecting Americans against “unreasonable searches and seizures.”  But it did not address the question of whether the FBI and other law enforcement agencies must obtain a warrant to attach a GPS device or whether it is enough for an agent to believe that such a search would turn up evidence of wrongdoing.

 

A month later, at a symposium at the University of San Francisco, FBI lawyer Andrew Weissman announced that the FBI was issuing two memoranda to its agents to clarify how the agency would interpret the Supreme Court decision. One memo dealt with the use of GPS devices, including whether they could be attached to boats and airplanes and used at international borders. The second addressed how the ruling applied to non-GPS techniques used by the FBI.

 

The ACLU, citing the Freedom of Information Act, has requested publication of the two memos because they “will shape not only the conduct of its own agents but also the policies, practices and procedures of other law enforcement agencies—and, consequently, the privacy rights of Americans.”

 

11. U.S. Paper on Negotiating Position on the Free Trade Agreement of the Americas

The subject of international trade negotiations is one that makes most people’s eyes glaze over. So why is the Obama administration fighting so hard to keep secret a one-page document that relates to early negotiations regarding the Free Trade Agreement of the Americas (FTAA), an accord that was proposed 18 years ago and about which public negotiations ended in 2005? All we know is that the document “sets forth the United States’ initial proposed position on the meaning of the phrase ‘in like circumstances.’” This phrase “helps clarify when a country must treat foreign investors as favorably as local or other foreign investors.”

 

Responding to a Freedom of Information Act lawsuit filed by The Center for International Environmental Law, DC District Judge Richard W. Roberts ordered the Office of the United States Trade Representative (USTR) to release the document, but the Obama administration has refused, claiming that disclosure “reasonably could be expected to result in damage to the national security” because all the nations involved in the failed negotiations agreed to keep all documents secret until December 31, 2013…“unless a country were to object to the release of one of its own documents at that time.” Judge Roberts ruled that the USTR has failed to present any evidence that release of the document would damage national security.

 

Most likely, the Obama administration is afraid that release of the document would set a precedent that could impede another secret trade negotiation, the Trans-Pacific Partnership (TPP), also known as the Trans-Pacific Strategic Economic Partnership Agreement, which seeks to establish a free trade zone among the U.S., New Zealand, Chile, Singapore, Brunei, Australia, Peru, Vietnam, Malaysia and possibly Canada, Mexico and Japan.

NSA Whistleblower: Everyone in US Under Virtual Surveillance, All Info Stored

NSA Whistleblower: Everyone in US Under Virtual Surveillance, All Info Stored

RT talks to William Binney, whistleblower and former NSA crypto-mathematician who served in the agency for decades. Virtual privacy in US, Petraeus affair and whistleblowers’ odds in fight against the authorities are among key topics of this exclusive interview

RT: In light of the Petraeus/Allen scandal while the public is so focused on the details of their family drama, one may argue that the real scandal in this whole story is the power, the reach of the surveillance state. I mean if we take General Allen – thousands of his personal e-mails have been sifted through private correspondence. It’s not like any of those men was planning an attack on America. Does the scandal prove the notion that there is no such thing as privacy in a surveillance state?

William Binney: Yes, that’s what I’ve been basically saying for quite some time, is that the FBI has access to the data collected, which is basically the emails of virtually everybody in the country. And the FBI has access to it. All the congressional members are on the surveillance too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything they’ve done for the last 10 years at least.

RT: And it’s not just about those, who could be planning, who could be a threat to national security, but also those, who could be just…

WB: It’s everybody. The Naris device, if it takes in the entire line, so it takes in all the data. In fact they advertised they can process the lines at session rates, which means 10-gigabit lines. I forgot the name of the device (it’s not the Naris) – the other one does it at 10 gigabits. That’s why they’re building Bluffdale [database facility], because they have to have more storage, because they can’t figure out what’s important, so they are just storing everything there. So, emails are going to be stored there in the future, but right now stored in different places around the country. But it is being collected – and the FBI has access to it.

RT: You mean it’s being collected in bulk without even requesting providers?

WB: Yes.

RT: Then what about Google, you know, releasing this biannual transparency report and saying that the government’s demands for personal data is at an all-time high and for all of those requesting the US, Google says they complied with the government’s demands 90 percent of the time. But they are still saying that they are making the request, it’s not like it’s all being funneled into that storage. What do you say to that?

WB: I would assume that it’s just simply another source for the same data they are already collecting. My line is in declarations in a court about the 18-T facility in San Francisco, that documented the NSA room inside that AST&T facility, where they had Naris devices to collect data off the fiber optic lines inside the United States. So, that’s kind of a powerful device, that would collect everything it was being sent. It could collect on the order over of 100 billion 1,000-character emails a day. One device.

RT: You say they sift through billions of e-mails. I wonder how do they prioritize? How do they filter it?

WB: I don’t think they are filtering it. They are just storing it. I think it’s just a matter of selecting when they want it. So, if they want to target you, they would take your attributes, go into that database and pull out all your data.

RT: Were you on the target list?

WB: Oh, sure! I believe I’ve been on it for quite a few years. So I keep telling them everything I think of them in my email. So that when they want to read it they’ll understand what I think of them.

RT: Do you think we all should leave messages for the NSA mail box?

WB: Sure!

RT: You blew the whistle on the agency when George W. Bush was the president. With President Obama in office, in your opinion, has anything changed at the agency, in the surveillance program? In what direction is this administration moving?

WB: The change is it’s getting worse. They are doing more. He is supporting the building of the Bluffdale facility, which is over two billion dollars they are spending on storage room for data. That means that they are collecting a lot more now and need more storage for it. That facility by my calculations that I submitted to the court for the Electronic Frontiers Foundation against NSA would hold on the order of 5 zettabytes of data. Just that current storage capacity is being advertised on the web that you can buy. And that’s not talking about what they have in the near future.

RT: What are they going to do with all of that? Ok, they are storing something. Why should anybody be concerned?

WB: If you ever get on the enemies list, like Petraeus did or… for whatever reason, than you can be drained into that surveillance.

RT: Do you think they would… General Petraeus, who was idolized by the same administration? Or General Allen?

WB: There are certainly some questions, that have to be asked, like why would they target it to begin with? What law were they breaking?

RT: In case of General Petraeus one would argue that there could have been security breaches. Something like that. But with General Allen  – I don’t quite understand, because when they were looking into his private emails to this woman.

WB: That’s the whole point. I am not sure what the internal politics is… That’s part of the program. This government doesn’t want things in the public. It’s not a transparent government. Whatever the reason or the motivation was, I don’t really know, but I certainly think that there was something going on in the background that made them target those fellows. Otherwise why would they be doing it? There is no crime there.

RT: It seems that the public is divided between those, who think that the government surveillance program violates their civil liberties, and those who say, ‘I’ve nothing to hide. So, why should I care?’ What do you say to those who think that it shouldnt concern them.

WB: The problem is if they think they are not doing anything that’s wrong, they don’t get to define that. The central government does, the central government defines what is right and wrong and whether or not they target you. So, it’s not up to the individuals. Even if they think they aren’t doing something wrong, if their position on something is against what the administration has, then they could easily become a target.

RT: Tell me about the most outrageous thing that you came across during your work at the NSA.

WB: The violations of the constitution and any number of laws that existed at the time. That was the part that I could not be associated with. That’s why I left. They were building social networks on who is communicating and with whom inside this country. So that the entire social network of everybody, of every US citizen was being compiled overtime. So, they are taking from one company alone roughly 320 million records a day. That’s probably accumulated probably close to 20 trillion over the years.

The original program that we put together to handle this to be able to identify terrorists anywhere in the world and alert anyone that they were in jeopardy. We would have been able to do that by encrypting everybody’s communications except those who were targets. So, in essence you would protect their identities and the information about them until you could develop probable cause, and once you showed your probable cause, then you could do a decrypt and target them. And we could do that and isolate those people all alone. It wasn’t a problem at all. There was no difficulty in that.

RT: It sounds very difficult and very complicated. Easier to take everything in and…

WB: No. It’s easier to use the graphing techniques, if you will, for the relationships for the world to filter out data, so that you don’t have to handle all that data. And it doesn’t burden you with a lot more information to look at, than you really need to solve the problem.

RT: Do you think that the agency doesn’t have the filters now?

WB: No.

RT: You have received the Callaway award for civic courage. Congratulations! On the website and in the press release it says: “It is awarded to those, who stand out for constitutional rights and American values at great risk to their personal or professional lives.” Under the code of spy ethics I don’t know if there is such a thing your former colleagues, they probably look upon you as a traitor. How do you look back at them?

WB: That’s pretty easy. They are violating the foundation of this entire country. Why this entire government was formed? It’s founded with the Constitution and the rights were given to the people in the country under that Constitution. They are in violation of that. And under executive order 13526, section 1.7 – you can not classify information to just cover up a crime, which this is, and that was signed by President Obama. Also President Bush signed it earlier as an executive order, a very similar one. If any of this comes into Supreme Court and they rule it unconstitutional, then the entire house of cards of the government falls.

RT: What are the chances of that? What are the odds?

WB: The government is doing the best they can to try to keep it out of court. And, of course, we are trying to do the best we can to get into court. So, we decided it deserves a ruling from the Supreme Court. Ultimately the court is supposed to protect the Constitution. All these people in the government take an oath to defend the Constitution. And they are not living up to the oath of office.

March 20, 2013 – Decrypted Matrix Radio: CIA Spook’s Message, Data Mining Exposed, Cyprus Explained, Internet Surveillance, Contract Security War Crimes

March 20, 2013 – Decrypted Matrix Radio: CIA Spook’s Message, Data Mining Exposed, Cyprus Explained, Internet Surveillance, Contract Security War Crimes

A Motivational Message From Robert Steele – Former CIA

Why the Cyprus Situation Might become a big deal

The Internet Is a Surveillance State

Extreme Data Mining – What we know about tracking users Online

The Privatization of War: Mercenaries, Private Military and Security Companies

3-20

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

March 18, 2013 – Decrypted Matrix Radio: National Security Letters, CIA Secrecy Rejected, NSA Profiteers, Eric Holder Crime Boss, Censorship, Monsanto Thugs

March 18, 2013 – Decrypted Matrix Radio: National Security Letters, CIA Secrecy Rejected, NSA Profiteers, Eric Holder Crime Boss, Censorship, Monsanto Thugs

Federal Judge Finds National Security Letters Unconstitutional, Bans Them

Appeals Court Rejects CIA Secrecy on Drones

Feds: No Warrant Needed to Track Your Car With a GPS Device

Cock-A-Doodle-Doo! Roosters Really Do Know What Time It Is by Circadian Rhythms

Former NSA director joins security firm Endgame’s board after it raises $23M

Eric Holder: Organized Crime’s Man of the Year

Google CENSORS AdBlock Plus from Play Store

What are my rights at CHECKPOINTS..?

Human Snatching Drones – Eagle Claw Design

Monsanto Protection Act EXPOSED

3-18

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

December 12, 2012 – Decrypted Matrix Radio: 11 Secret Docs, Manning Wins, Drone Flights, Patriot Act, NSA Spying, Photog Terrorists, CIA Trafficking, Cancer Cure, Russia’s Aliens

December 12, 2012 – Decrypted Matrix Radio: 11 Secret Docs, Manning Wins, Drone Flights, Patriot Act, NSA Spying, Photog Terrorists, CIA Trafficking, Cancer Cure, Russia’s Aliens


11 Secret Documents Americans Deserve to See

Jacintha Saldanha’s Family Says She Told Them Nothing About Hoax Call – Queen Prank Suicide

Manning wins Person of Year 2012 in landslide

Newly Released Drone Records Reveal Extensive Military Flights in U.S

US Government Agencies Will Soon Be Able To Access Foreign

Medical Dossiers Due To Patriot Act

CLIP: NSA Whistleblower William Binney: Everyone in US under virtual surveillance, all info stored, no matter the post

Public Buses Across Country Quietly Adding Microphones to

Record Passenger Conversations

Homeland Security and FBI Release Document Once Again

Labeling Photographers as Potential Terrorists

Egypt’s Army Given Power to Arrest Civilians

Did CIA and State Department Run Illegal Arms Trafficking in Benghazi?

CLIP: Cancer is finally cured in Canada but Big Pharma has no interest as won’t drive in enough PROFIT

Russian Premier Jokes about Secret Files on Aliens

12-12

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

November 30, 2012 – Decrypted Matrix Radio: Anonymous Bulks Up, NSA Decieves Congress Praises, Body Scanners, CypherPunks, Brain Weapons, TSA Criminial, Jerusalem Segregation

November 30, 2012 – Decrypted Matrix Radio: Anonymous Bulks Up, NSA Decieves Congress Praises, Body Scanners, CypherPunks, Brain Weapons, TSA Criminial, Jerusalem Segregation

 Anonymous Hacktivists: ‘Bigger and Stronger Than Ever’

NSA’s Marching Orders to Congress: Deceive the Public, Praise NSA Effusively

Next generation of airport scanners will scan every single molecule in your body

Review: Cypherpunks: Freedom and the Future of the Internet
by Julian Assange with Jacob Appelbaum, Andy Müller-Maguhn and Jérémie Zimmermann. OR Books, New York, 2012, 186 pages, Paper.

Sentry System Combines a Human Brain with Computer Vision

TSA chief will be a ‘no show’ at congressional hearing

West Bank and East Jerusalem buses are already segregated

11-30

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –