November 23, 2012 – DCMX Radio:  Texas to Block NDAA/TSA, California Face Scanning, NSA Cyber Silence, Obama’s Secret Inauguration, 2025 Police Drones

November 23, 2012 – DCMX Radio: Texas to Block NDAA/TSA, California Face Scanning, NSA Cyber Silence, Obama’s Secret Inauguration, 2025 Police Drones

Texas Threatens to BLOCK the implementation of NDAA & TSA

NSA prohibits disclosure of Obama CyberSecurity effort

Facial Recognition Technology Explosion in California

Goldman Sachs CEO Lloyd Blankfein wants to raise your retirement age!

Chief Justice Roberts behind another ‘Secret Inauguration’ for President Obama 2nd Term

Manufacturer Design Competition promoting Automated Police Drones for US Highways by 2025


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

How To Secure Your Android Phone Like the NSA

How To Secure Your Android Phone Like the NSA

Rejoice, paranoid security fanatics! There’s finally a version of Android that enables your obsessive need to lock and control each and every file on your mobile device. There’s just one catch: you’ve got to trust the National Security Agency to use it. The NSA has released its security-enhanced version of Android, named SE Android… because G-men have slightly less imagination than your average sea sponge. You can download the source code now and compile it on any operating system you want, so long as you want to compile it on Fedora Linux. Other operating systems should work, but haven’t been tested.

To build SE Android, you’ll need to download and compile the latest code from the Android Open Source Project, then applying the custom SE Android code on top of it. So what do the extra bells and whistles do? Basically every single file and folder that Android has access to can be locked down tight, with considerable encryption and put in place to protect them. Network securityis enhanced on both WiFi and mobile networks, and the already considerable app permission system is enhanced with multi-level security.

Currently SE Android is only intended for emulators and the Nexus S, and son’t expect much support if you intend to expand its horizons. The project wiki assumes that you’re already familiar and comfortable with building Android from source, and know your way around Linux/Unix-based systems. Tin foil hats are sold separately.

via AndroidCommunity

 

The Supreme Court Isn’t Bothered By the NSA’s Warrantless Wiretapping

The Supreme Court Isn’t Bothered By the NSA’s Warrantless Wiretapping

The Supreme Court refused to hear a case on Tuesday that holds telecom companies accountable for letting the National Security Agency spy on unknowing Americans without a warrant. Dating back to 2006 when the American Civil Liberties Union and the Electronic Frontier Foundation first filed the class-action lawsuit, the case accuses AT&T of providing the NSA with customers’ personal information — phone calls, emails and web browsing history — without seeking a court order. Verizon and Sprint are also mentioned. The plaintiff, former AT&T technician Mark Klein, even provided internal documentation that showed evidence of the NSA surveilling Americans’ Internet traffic from a secret room in San Francisco. That case, Hepting v. AT&T, has now been thrown out, and the Supreme Court didn’t even comment on why.

This sound very important! After all, doesn’t the Constitution protect American citizens from being spied on by their government without their knowledge or consent? Well, yes and no. Warrantless wiretapping sounds invasive and terrible, sure, but it’s actually technically legal under a 2008 law that retroactively granted immunity to all of the telecom companies that were spying on Americans at the government’s behest. Unsurprisingly, the practice can be traced back to President George W. Bush’s anti-terrorism program following the 2001 World Trade Center attacks. Once things calmed down and people actually started suing the government for eavesdropping on everyday Americans, Congress passed the FISA Amendements Act. (FISA stands for the original law, the Federal Intelligence Surveillance Act.) That law is currently up for renewal in Congress.

As Wired points out, neither the Bush administration nor the Obama administration has confirmed or denied allegations of warrantless wiretapping. They’ve both argued that the surveillance program is a state secret and any sort of disclosure would endanger national security. The EFF doesn’t buy this argument. “The government still claims that this massive program of surveillance of Americans is a state secret, but after eleven years and multiple Congressional reports, public admissions and media coverage, the only place that this program hasn’t been seriously considered is in the courts — to determine whether it’s legal or constitutional,” said Cindy Cohn, the EFF’s legal director. “We look forward to rectifying that.”

Indeed, Heptig v. AT&T is not the civil liberties advocates’ last hope at gaining some clarity on the warrantless wiretapping issue. In a separate case, the EFF sued the government directly, rather than going after the telecom companies. The case was tossed out by a district court judge only to be picked up by the 9th Circuit Court of Appeals, where Judge Margaret McKeown ruled that the EFF’s arguments “are not abstract, generalized grievances and instead meet the constitutional standing requirement of concrete injury.”

That case will be heard in December. Until then, be careful what you say on the phone. You know who is listening.

via AtalanticWire

New Book Details the NSA’s Warrantless Wiretapping Program, As Government Moves to Avoid All Accountability in Court

New Book Details the NSA’s Warrantless Wiretapping Program, As Government Moves to Avoid All Accountability in Court

Former New York Times reporter Kurt Eichenwald’s new book, published last week, provides yet more details about how the the NSA’s unconstitutional warrantless wiretapping program came about, and confirms that even top Bush Administration lawyers felt there was a “strong argument” that the program violated the law. “Officials might be slammed for violating the Fourth Amendment as a result of having listened in on calls to people inside the country and collecting so much personal data,” Eichenwald wrote, and “in the future, others may question the legality” of their actions.

Yet even today, eleven years later, the government continues to claim that no court can judge the program’s legality. In the next month, the government will argue—in EFF’s case in federal district court and ACLU’s case in the Supreme Court—that courts must dismiss the legal challenges without ever coming to a ruling on the merits.

Eichenwald’s book, 500 Days: Secrets and Lies in the Terror Wars, describes how the NSA’s illegal program—what he calls “the most dramatic expansion of NSA’s power and authority in the agency’s 49 year history”— was devised just days after 9/11 to disregard requirements in the Foreign Intelligence Surveillance Act (FISA). Instead of getting individualized warrants to monitor Americans communicating overseas, the Bush administration unilaterally gave the NSA the power to sweep up millions of emails and phone calls into a database for analysis without court approval:

Connections between a suspect e-mail address and others—accounts that both sent and received messages there, whether in the United States or not—would be examined. At that point, a more detailed level of analysis would be applied creating something of a ripple effect. The suspect e-mail address would lead to a second, the second to the accounts it contacted.

In other words, the NSA was given the green light to warrantlessly spy of Americans communications on American soil—a power that was illegal under FISA. And the government—instead of finding probable cause for surveillance like the Constitution requires—started using a burden of proof akin to the game Six Degrees from Kevin Bacon.

Eichenwald’s reporting, focused on the immediate aftermath of 9/11, unfortunately overlooks the NSA’s longstanding desire to live “on the network” reflected in its presentations to the incoming Bush Administration officials in December, 2000. The idea that the NSA only came up with this idea after 9/11 isn’t really accurate.1 But regardless, Eichenwald’s reporting makes clear that Bush administration officials were terrified that this program would become public.

Of course, after several years, much of the NSA’s program did become public when the New York Times exposed its existence in their 2005 Pulitzer Prize winning investigation. Virtually every major news organization in the US subsequently reported on the NSA and its mass spying programs, which led to congressional investigations and a multitude of lawsuits—two which will be argued in the coming month.

In EFF’s lawsuit, in addition to a mountain of public information including many governmental admissions, the court will see evidence from AT&T whistleblower Mark Klein showing blueprints and photographs of the NSA’s secret room in AT&T’s facility in San Francisco. Three more NSA whistleblowers, including William Binney a former high ranking official involved with the program during its infancy, also submitted affidavits laying out how the NSA illegally spied on Americans in the aftermath of 9/11.

Despite this all of this, the government recently filed a motion in the Northern District of California invoking the controversial “state secrets” privilege. Essentially, the government argues that—even if all of the allegations are true—the case should be dismissed entirely because admitting or denying any fact would potentially endanger national security, even in the face of the government’s own craftily wordsmithed  “denials” before Congress and elsewhere.

In the ACLU’s case going before the Supreme Court this term, a group of journalists, lawyers, and human rights activists has sued over surveillance conducted after the passage of the FISA Amendments Act (FAA). The FAA was passed in 2008 and formalized some of the admitted portions of NSA’s program, allowing emails and phone calls to and from from overseas to continue to be acquired without a warrant. The government only needs one general court order to target large groups of people—even entire countries—communicating to Americans for an entire year.

The plaintiffs, given that their professions, regularly talk to people who are almost certainly spied on. They argue that surveillance of them without warrants  renders the statute unconstitutional. But the government contends the case must be dismissed on “standing” grounds because the plaintiffs can’t prove with certainty they have been surveilled, because, in a perfectly circular argument, the government won’t “admit” they have been surveilled, as if public admissions by the government is the only way to prove illegal wiretapping.

As the ACLU writes, “The government theory of standing would render real injuries nonjusticiable and insulate the government’s surveillance activities from meaningful judicial review.” The same can be said of the ‘state secrets’ privilege in EFF’s case. The government is contending they can use government secrecy as a sword to terminate judicial accountability. It doesn’t matter how much evidence is in the public domain, just by telling the Court that the information implicates “national security,” they can wall off entire subject matters from judicial oversight, effectively hiding illegality, unconstitutionality along with embarrassing or overreaching acts by NSA spooks and others.

Eichenwald is just the latest in a long line of journalists to discuss and organize details about the NSA’s unconstitutional program. At this point the American people are well aware of the NSA’s actions – only the courts have been kept in the dark.  And if the courts go along with blinding themselves, the government will have been given a license to violate the law and constitution long into the future.

via EFF.org

October 9, 2012 – DCMX Radio: Obama’s Gold ‘Allah’ Ring, Gaga Visits Assange, Torture Victims Silenced, NSA’s New Android OS

October 9, 2012 – DCMX Radio: Obama’s Gold ‘Allah’ Ring, Gaga Visits Assange, Torture Victims Silenced, NSA’s New Android OS

Reminder – Improve your Reality! Educate Yourself! You ARE the Matrix!

Lady Gaga Visits Julian Assange in EDU Embassy for 5 Hours but then not a peep to help spread awareness?

Anonymous in GREECE, Anonymous OP-MASON-CHIP Anti-RFID Awareness Campaign

How To Secure Your Android Phone Like the NSA

Mayan Calendar & Mexico ET Alien Secrets Revealed?

Obama’s Gold Ring – ‘There is only one god, Allah’

Terror Suspects BLOCKED from speaking about Detention, Interrogation, Torture, etc.


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

Micro-Drone: Mosquito Cyborg Spy with On-Board RFID NanoTech

Micro-Drone: Mosquito Cyborg Spy with On-Board RFID NanoTech

 

You are looking at an insect spy drone for urban areas, already in production, funded by the US Government. It can be remotely controlled an is equipped with a Camera and Microphone.  It can land on you and may have the potential to take a DNA sample, or leave RFID tracking nano-technology on (or in) your skin.  It can fly through an open window, or it can attach to your clothing until you take it in your home.

 

 

Full Spectrum Dominance: Totalitarian Democracy in the New World Order

Full Spectrum Dominance: Totalitarian Democracy in the New World Order

Book Description
Publication Date: May 12, 2009
For the faction controlling the Pentagon, the military industry, and the oil industry, the Cold War never ended. They engineered an incredible plan to grab total control of the planet, of land, sea, air, space, outer space and cyberspace. Continuing ‘below the radar,’ they created a global network of military bases and conflicts to advance the long-term goal of Full Spectrum Dominance. Methods included control of propaganda, use of NGOs for regime change, Color Revolutions to advance NATO eastwards, and a vast array of psychological and economic warfare techniques. They even used ‘save the gorilla’ organizations in Africa to secretly run arms in to create wars for raw materials. It was all part of a Revolution in Military Affairs, as they termed it. The events of September 11, 2001 would allow an American President to declare a worldwide War on Terror, on an enemy who was everywhere, and nowhere. 9/11 justified the Patriot Act, the very act that destroyed Americans’ Constitutional freedoms in the name of security. This book gives a disturbing look at the strategy of Full Spectrum Dominance, at what is behind a strategy that could lead us into a horrific nuclear war in the very near future, and at the very least, to a world at continuous war.
Seeds of Destruction: The Hidden Agenda of… by William F. Engdahl
4.3 out of 5 stars (28)
$16.47
A Century of War: : Anglo-American Oil Poli… by F. William Engdahl
5.0 out of 5 stars (1)
$24.95
Gods of Money: Wall Street and the Death of... by F. William Engdahl
5.0 out of 5 stars (1)
$21.33
They Own It All (Including You)!: By Means o… by Ronald MacDonald
4.8 out of 5 stars (38)
$14.96 Next
——————————————————————————–

Editorial Reviews
About the Author
F. William Engdahl is author of the international best-selling book on oil and geopolitics, A Century of War: Anglo-American Politics and the New World Order. He is a widely discussed analyst of current political and economic developments whose articles have appeared in numerous newspapers and magazines and well-known international websites. His book, ‘Seeds of Destruction: The Hidden Agenda Behind Genetic Manipulation,’ deals with agribusiness and the attempt to control world food supply and thereby populations. He may be reached at his website, www.engdahl.oilgeopolitics.net –This text refers to an alternate Paperback edition.

——————————————————————————–
Product Details
Paperback: 268 pages
Publisher: Third Millennium Press (May 12, 2009)
Language: English
ISBN-10: 0979560861
ISBN-13: 978-0979560866
Product Dimensions: 8.9 x 5.9 x 0.6 inches
Shipping Weight: 5.6 ounces
Average Customer Review: 4.7 out of 5 stars See all reviews (15 customer reviews)
Amazon Best Sellers Rank: #1,109,639 in Books (See Top 100 in Books)
5.0 out of 5 stars Urgent and Essential Reading, June 21, 2009
By Margot L. White “M. Lachlan White”
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
FULL SPECTRUM DOMINANCE is a rare and essential book — one that orients readers quickly and deeply to the world we live in, and how we arrived here. William Engdahl presents the historical background of policy making and decision analysis that explains how the United States arrived at its present “mission” in the world. The value of Engdahl’s brilliant book is not only that it familiarizes American readers with a history that is not usually revealed to us, but it also guides us through the many overt and covert tactics employed by the US for regime change– primarily via the Pentagon and its nefarious weapons contractors, but also through various think tanks and foundations with innocuous names disingenuously referring to “democracy” and “freedom.” The “full spectrum” of tactics and deceptions and tricks — both violent and non-violent — is revealed here. Needless to say, this book falls within the honorable tradition of political histories that blow the cover off America’s much vaunted pretense and propaganda about serving the cause of “freedom” and “democracy” around the world! It is the only book available today that covers ALL of this, with ample quotations and documents from the architects of US policies, in just 250 well written pages. FULL SPECTRUM DOMINANCE is unique in presenting the evolution of CIA tactics, ranging from its crude “coups” of yesteryear (as in Iran and Guatemala) to its current — and perhaps more insidious — use of “non-violent” electronically manipulated technological “crowd control” via cell phones and (as is currently evident on the streets of Tehran) Twitter. If Americans are woefully ignorant of the full range and dangerous extremes of American violence around the world, of American interventions into and manipulations of other countries’ elections and environments and economics, then there is no longer any excuse for such ignorance. FULL SPECTRUM DOMINANCE is a “must read.” To understand pipeline politics, the critical importance of Eurasia to US defense contractors, read this book. To understand how and why America has become such a rapacious and violent empire with bases all over the world and tens of thousands of agents provocateurs doing its dirty work from Tibet to Tehran, manipulating elections, staging phony “revolutions” to surround Russia with hostile Made-in-USA regimes, propping up American-trained puppets or fomenting chaos from Myanmar to Congo and from Ukraine to Iran — read this book! Help other customers find the most helpful reviews
Was this review helpful to you? Yes No Report abuse | Permalink
Comment Comment (1)
5.0 out of 5 stars Essential reading, June 1, 2009
By Lori “The Rogue Reader Mom” (Arizona) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
F W Engdahl has succeeded again at the difficult task of explaining the complexities of how our world really works and how we got to this frightful point in world affairs.
An exacting researcher, Mr. Engdahl, with his latest book, has taken on the task of sorting out the USA’s real intentions as it pertains to the rest of the world. In connecting the dots he takes us on a journey of clarity and comprehension regarding the aggressive path our nation is on as it builds the American Empire.
To follow Mr. Engdahl’s logical explanations of why we do what we do to the rest of the world is to come to the realization that the US may not be the ‘good guys’ we think we are and the rest of the world may have plenty of reasons to be wary of the US.
A sobering examination of our real past and current policies towards Russia, China, Europe, the Middle East and the rest of world community, ‘full spectrum dominance’, as the Pentagon calls it, is a strong-arm policy of control over the rest of the world that is leading us down a disastrous path towards a possible world war. We can’t solve our world’s problems until we properly identify them. Mr. Engdahl has done that in superb fashion.
5.0 out of 5 stars A book everyone needs to read!, July 1, 2009
By William Fetty “Kamakazi” (Sweden)
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
Engdahl’s books are at the very top of my list of books I recommend to people who want to know what is happening geopolitically in the world, but more importantly WHY things are happening!
Engdahl, though an academic scholar and very well educated with years of experince has once again written a book that anyone can understand and which reads like a great documentary film, much due to the fact that Engdahl is also a journalist, historian and economic researcher!
Full Spectrum Dominance picks up where his first book on the subject “A Century Of War:Anglo-American oil politics and the new world order” ends.
Engdahl once again leads us through the matrix of anglo-american foreign policy and their century old agenda of literal world domination through brute force and covert non-violent means. The evil and criminal actions of the anglo-american empire throughout the 20th century which has now spilled over in to the new millenium are presented in great detail and just like Engdahls previous books makes for a page turner. Once again I cannot recommend this book enough! Read it!

http://www.amazon.com/exec/obidos/ASIN/0979560861/ref=nosim/cryptogoncom-20

August 3, 2012 – DCMX Radio: Re-cap Week’s Alternative News, Intro to CyberWar: Viruses, Hacking, & Black Security Breaches, Protecting Your Computer, Securing Your Internet Connection & Maintaining Privacy Online

August 3, 2012 – DCMX Radio: Re-cap Week’s Alternative News, Intro to CyberWar: Viruses, Hacking, & Black Security Breaches, Protecting Your Computer, Securing Your Internet Connection & Maintaining Privacy Online

Cyber Security Industry Explosion, Intelligence Spying, Data-mining, Black-Hats, White-Hats, Gray-Hats abound. Alphabet Agencies, Corrupt Globalist Corporations exploiting your info. Micro Tutorial on Protecting Your Computer, Securing Your Internet Connection, Maintaining ‘some’ Privacy Online


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

Mind Control and the New World Order

Mind Control and the New World Order

On 28 November 1953, at 2 am, a man crashed through a closed window and fell to his death from the 10th floor of the Statler Hotel in New York City. He was identified as Frank Olson, a bacteriologist with the US Army Research Center at Fort Detrick, Maryland. He had fallen from a room he shared with another scientist, Robert Lashbrook. It was ruled a suicide.

Twenty-two years later, in 1975, William Colby, then CIA director, declassified documents that changed the complexion of the case. It was revealed that Olson had actually been an undercover CIA operative at Fort Detrick, and that one week prior to his death, he had been drinking Cointreau at a high-level meeting with scientists at Deep Creek Lodge in rural Maryland. The Cointreau was laced with a large dose of LSD administered by his CIA boss, Sidney Gottlieb. He was then sent to New York with Lashbrook, also with the CIA, to see a psychiatrist because the LSD had induced a psychosis.

It was also revealed that Olson had been part of the top secret CIA program that was known as Project MK-ULTRA, exploring the use of chemicals and drugs for purposes of mind control, and bacteriological agents for covert assassination. Olson had been working on ways to deliver anthrax in aerosol form, for use as a weapon. New evidence that came to light, through the persistent efforts of Olson’s son Eric, made the suicide ruling highly suspect.

It turned out that Olson had been labelled a security risk by British intelligence after getting upset witnessing human experimentation on a trip to Frankfurt, Germany the previous summer. Eric Olson now believes that his father was drugged and then murdered to make sure that he didn’t reveal the secrets of the MK-ULTRA project. Following the 1975 revelations, the government must have felt more than a little guilt about the affair because Olson’s family was given a 17 minute audience with US President Ford, who apologised to them, and they were awarded damages in the amount of $750,000.

Controlling Human Behaviour

The MK-ULTRA program was instituted on 13 April 1953 by CIA Director Allen Dulles, ostensibly to counter the brainwashing techniques of American prisoners being held by the North Koreans during the Korean War, and to duplicate those techniques on enemy prisoners, i.e. the creation of “Manchurian Candidates.” This was the claim used to obtain funding for the project. However, the Prisoner of War brainwashing program was just the tip of the iceberg, and the CIA-sponsored experiments ventured far and wide into areas of Mind Control under the aegis of MK-ULTRA that had little or nothing to do with methods of interrogation.

The Colby revelations were part of a sweeping investigation of the CIA in January 1975 by the “Commission on CIA Activities Within the United States,” chaired by Vice-President Nelson Rockefeller. The subsequent June 1975 Report to the President said: “The drug program was part of a much larger CIA program to study possible means for controlling human behaviour. Other studies explored the effects of radiation, electric-shock, psychology, psychiatry, sociology and harassment substances.

Even though the program got off to a rocky start with the Olson affair, it recovered quickly and became an umbrella project with 149 sub-projects. The overall guiding principal was succinctly stated in an internal CIA memo dated January 1952: “Can we get control of an individual to the point where he will do our bidding against his will and even against fundamental laws of nature such as self-preservation?” 

The drug program came under the aegis of the Chemical Division of the Technical Services Staff headed up by Sidney Gottlieb from 1951 to 1956. Gottlieb was a highly intelligent eccentric who drank goat’s milk, enjoyed folk-dancing, and raised Christmas trees on his farm outside Washington.

The Agency funded LSD research programs at major medical centres and universities including Boston Psychopathic, Mt. Sinai Hospital at Columbia University, University of Illinois Medical School, University of Oklahoma and others. The funding was carried out secretly through the Josiah Macy Foundation, and the Geschickter Fund for Medical Research in Washington, D.C. The CIA claimed the secrecy was necessary to keep it from the Russians, but we have already seen that it was part of much larger project to learn how to control human behaviour in general, so this is not credible.

Gottlieb told Dr. Harold Abramson at Mt. Sinai (who just happened to be the psychiatrist that Olson was supposed to see!) that he wanted “operationally pertinent materials [about]: a. Disturbance of Memory; b. Discrediting by Aberrant Behaviour; c. Alteration of Sex Patterns; d. Eliciting of Information; e. Suggestibility; f. Creation of Dependence.” That sounds like pretty deep stuff for the spy game. They were really afraid of public reaction and congressional condemnation, especially since the CIA charter did not allow domestic operations, and certainly prohibited experimentation on US citizens.

The callousness of the research is best exemplified by the CIA-funded work of Dr. Harris Isbell, the Director of the Addiction Research Center in Lexington, Kentucky. The drug addict hospital inmates, who were mostly black, were encouraged to volunteer for LSD research in return for hard drugs of their choice or time off their sentences. In most cases, they were given pure morphine or heroin. At one point Isbell kept seven men on LSD for 77 straight days. Many others were on it for up to 42 days.

Concerning extended LSD usage, John Marks in his landmark book The Search for the Manchurian Candidate: The CIA and Mind Control says about writer Hunter S. Thompson (recently deceased) that he “frightened his readers with accounts of drug (LSD) binges lasting a few days, during which Thompson felt his brain boiling away in the sun, his nerves wrapping around enormous barbed wire forts, and his remaining faculties reduced to their reptilian antecedents.” The recent movie The Rum Diary, starring Johnny Depp, based on the autobiographical book by Hunter S. Thompson, presents an imaginative re-enactment of his LSD adventures.

The CIA Turns On the Counter-Culture

Not satisfied with university research, Gottlieb recruited New York narcotics agent George White to distribute LSD surreptitiously to the “borderline underworld.” Operating through safe houses in Greenwich Village, Haight-Ashbury and Marin County, White gave doses to prostitutes, pimps, drug addicts and other “marginal people” and then observed the results and reported to Gottlieb.

John Marks says they were people “who would be powerless to seek any sort of revenge if they ever found out what the CIA had done to them. In addition to their being unlikely whistle-blowers, such people lived in a world where an unwitting dose of some drug… was an occupational hazard anyway.”

Eventually, White started using it randomly all over New York and San Francisco. Regarding the results, Marks says, “The MKULTRA scientists reaped little but disaster, mischief, and disappointment from their efforts to use LSD as a miracle weapon against the minds of their opponents.” Yet, they continued this program for 10 years until 1963.

Ironically, since the CIA had pretty much cornered the market on LSD internationally, buying up all the product of Sandoz and Eli Lilly, the spread of the drug to the counter-culture was through the Agency. Timothy Leary, Ken Kesey, Allen Ginsburg and Tom Wolfe were first “turned on” thanks to the CIA, and that’s how the “flower children” became psychedelic.

But, the LSD experiments may have been more successful than Marks realised. They were carefully noting the precise effects on brain chemistry, and in the six areas that Gottlieb was concerned with: memory disturbance, aberrant behaviour, altered sexual patterns, eliciting information, suggestibility and creation of dependence. This became evident when they started using LSD as an adjunct in hypnotic and electronic experiments.

Re-Patterning the Brain

Perhaps the most notorious and nefarious MK-ULTRA sub-project was carried out at the Allan Memorial Institute in Montreal, Canada under the directorship of Dr. Donald Ewen Cameron, an American from Albany, New York. Cameron had trained at the Royal Mental Hospital in Glasgow, Scotland, under eugenicist Sir David Henderson, and founded the Canadian branch of the World Federation for Mental Health. At various times, he was elected president of the Canadian, American, and World psychiatric associations. In other words, Cameron was no renegade but had the full faith and endorsement of the world psychiatric establishment.

The CIA wanted Cameron to “depattern” the contents of the brain to make it receptive to new patterning. David Remnick in a Washington Post article on 28 July 1985 said, “The…. heart of the laboratory was the Grid Room…. The subject was strapped into a chair involuntarily, by force, his head bristling with electrodes and transducers. Any resistance was met with a paralysing dose of curare. The subject’s brainwaves were beamed to a nearby reception room crammed with voice analysers, a wire recorder and radio receivers cobbled together… The systematic annihilation or ‘depatterning’ of a subject’s mind and memory was accomplished with overdoses of LSD, barbiturate sleep for 65 days at a stretch and ECT shocks at 75 times the recommended dosage. Psychic driving, the repetition of a recorded message for 16 hours a day, programmed the empty mind. Fragile patients referred to Allan Memorial for help were thus turned into carbuncular jellyfish.”

Anton Chaitkin in his essay, ‘British Psychiatry: From Eugenics to Assassination’, says: “Patients lost all or part of their memories, and some lost the ability to control their bodily functions and to speak. At least one patient was reduced almost to a vegetable; then Cameron had the cognitive centres of her brain surgically cut apart, while keeping her alive. Some subjects were deposited permanently in institutions for the hopelessly insane.”

The CIA funded these horrors through a front called “The Society for the Investigation of Human Ecology.” Other supporters of the Allan Institute were the Rockefeller Foundation, the Geschickter Foundation, and the Canadian government.

About Cameron’s work, Wikipedia says: “Naomi Klein states, in her book The Shock Doctrine, that Cameron’s research and his contribution to the MKUltra project was actually not about mind control and brainwashing, but ‘to design a scientifically based system for extracting information from “resistant sources.” In other words, torture’. And citing a book from Alfred W. McCoy it further says that ‘Stripped of its bizarre excesses, Cameron’s experiments, building upon Donald O. Hebb’s earlier breakthrough, laid the scientific foundation for the CIA’s two-stage psychological torture method’.” This method was codified in the infamous “KUBARK Counterintelligence Interrogation Manual” published by the CIA in July 1963, and in the Human Resources Exploitation Training Manual – 1983 that was used in CIA training courses in Latin American countries up until 1987. These manuals describe methods of psychological torture, far more potent than physical torture, to elicit information from “resistant sources.”

An Orwellian Nightmare

As one would expect, the technologies now available to the mind-controllers have zoomed off the chart to the point where George Orwell’s world of omni-surveillance now seems almost quaint. Of course, it is true that 1984 was 28 years ago. But even as far back as 1970, US congressman James Scheur was able to say, “As a result of spinoffs from medical, military aerospace and industrial research, we are now in the process of developing devices and products capable of controlling violent mobs without injury. We can tranquillise, impede, immobilise, harass, shock, upset, stupefy, nauseate, chill, temporarily blind, deafen or just plain scare the wits out of anyone the police have a proper need to control and restrain.”

A brief survey of some of the scariest products known to be in the arsenal of the secretive alphabet agencies arrayed against John Q. Public are such devices as the Neurophone, patented by Dr. Patrick Flanagan in 1968. It converts sound to electrical impulses which can be delivered from satellites. When aimed at individuals, the impulses travel directly to the brain where the sounds are re-assembled and appear to be voices inside the head, which can be perceived as coming from God, or telepathic aliens, or whatever. Or the sounds can come out of a turned-off TV or radio. Through software, the device can mimic anyone’s voice and translate into any language.

It is believed that the CIA, DIA, NSA et al use the Neurophone to deliver threats and propaganda to selected targets, or just to torment someone they don’t like. One can imagine the possibilities. Could this explain some of the killings by “psychopaths” who say they were instructed by God, such as Mark David Chapman, David Berkowitz, or Sirhan Sirhan? If they had been previously evaluated through sophisticated personality assessments and groomed by LSD or hypnosis, such voices could easily tip the balance and convince them to kill.

We’ve all heard about the “Thought Police” and laughed because it seemed so implausible. Well, the joke is on us. Brain scanning technology is now well-advanced. In 1974, Lawrence Pinneo, a neurophysiologist and electronic engineer with the Stanford Research Institute succeeded in correlating brain wave patterns from EEGs with specific words. In 1994, the brain wave patterns of 40 subjects were officially correlated with both spoken words and silent thought at the University of Missouri. It is believed that US intelligence agencies now have a brain wave vocabulary of over 60,000 words in most common languages.

Brain waves constitute a magnetic field around the head (the aura), each person having a unique, identifiable electromagnetic signature which becomes visible through Kirlian photography, and these fields can be monitored by satellites. The translated results are then fed back to ground-side super computers at speeds of up to 20 gigabytes/second. Neurophone messages can then be beamed to selected individuals based on their thoughts. It is believed that about one million people around the globe are now monitored on a regular basis. As these numbers increase, as they certainly will, to include most educated and important people in the world, the New World Order will definitely have arrived.

As Australian writer Paul Baird has observed, “no-one will ever be able to even think about expressing an opinion contrary to those forced on us by the New World Order. There will literally be no intellectual property that cannot be stolen, no writing that cannot be censored, no thought that cannot be suppressed (by the most oppressive/invasive means).” Baird also claims that ex-military/intelligence whistle-blowers have reported that experiments in controlling voters with these techniques have been tried in several foreign countries. So much for democracy.

Other technologies, such as microwave bombardment to confuse and disorient field personnel, microchip implantation, silently delivered acoustical subliminal messages, widespread population control through psychiatric drugs, and extreme close-up satellite-based viewing able to read documents indoors, are all well-developed and in use by military and intelligence agencies. This doesn’t even address the monitoring of overt spoken and written material. Under Project ECHELON, the NSA monitors every call, fax, e-mail and computer data message in and out of the US, Canada and several other countries. Their computers then search for key words and phrases. Anything or anyone of interest draws the attention of agency operatives, who can then commence surveillance operations by the NSA or other intelligence agencies.

Novel Capabilities

We conclude with a chilling vision of the future from the US Air Force Scientific Advisory Board. It is from New World Vistas of Air and Space Power for the 21st Century.

“Prior to the mid-21st century, there will be a virtual explosion of knowledge in the field of neuroscience. We will have achieved a clear understanding of how the human brain works, how it really controls the various functions of the body, and how it can be manipulated (both positively and negatively). One can envision the development of electromagnetic energy sources, the output of which can be pulsed, shaped, and focused, that can couple with the human body in a fashion that will allow one to prevent voluntary muscular movements, control emotions (and thus actions), produce sleep, transmit suggestions, interfere with both short-term and long-term memory, produce an experience set, and delete an experience set. This will open the door for the development of some novel capabilities that can be used in armed conflict, in terrorist/hostage situations, and in training…”

And based on the past clandestine abuses of MK-ULTRA reviewed above, one can predict with relative certainty that these capabilities will be used on civilians, with or without their knowledge or acquiescence.


The above article appears in 
New Dawn Special Issue Vol 6 No 3
http://www.newdawnmagazine.com/special-issues/new-dawn-special-issue-vol-6-no-3

Three NSA Whistleblowers Back EFF’s Lawsuit Over Government’s Massive Spying Program

Three NSA Whistleblowers Back EFF’s Lawsuit Over Government’s Massive Spying Program

EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed

San Francisco – Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation’s (EFF’s) lawsuit against the government’s illegal mass surveillance program, Jewel v. NSA.

In a motion filed today, the three former intelligence analysts confirm that the NSA has, or is in the process of obtaining, the capability to seize and store most electronic communications passing through its U.S. intercept centers, such as the “secret room” at the AT&T facility in San Francisco first disclosed by retired AT&T technician Mark Klein in early 2006.

“For years, government lawyers have been arguing that our case is too secret for the courts to consider, despite the mounting confirmation of widespread mass illegal surveillance of ordinary people,” said EFF Legal Director Cindy Cohn. “Now we have three former NSA officials confirming the basic facts. Neither the Constitution nor federal law allow the government to collect massive amounts of communications and data of innocent Americans and fish around in it in case it might find something interesting. This kind of power is too easily abused. We’re extremely pleased that more whistleblowers have come forward to help end this massive spying program.”

The three former NSA employees with declarations in EFF’s brief are William E. Binney, Thomas A. Drake, and J. Kirk Wiebe. All were targets of a federal investigation into leaks to the New York Times that sparked the initial news coverage about the warrantless wiretapping program. Binney and Wiebe were formally cleared of charges and Drake had those charges against him dropped.

Jewel v. NSA is back in district court after the 9th U.S. Circuit Court of Appeals reinstated it in late 2011. In the motion for partial summary judgment filed today, EFF asked the court to reject the stale state secrets arguments that the government has been using in its attempts to sidetrack this important litigation and instead apply the processes in the Foreign Intelligence Surveillance Act that require the court to determine whether electronic surveillance was conducted legally.

“The NSA warrantless surveillance programs have been the subject of widespread reporting and debate for more than six years now. They are just not a secret,” said EFF Senior Staff Attorney Lee Tien. “Yet the government keeps making the same ‘state secrets’ claims again and again. It’s time for Americans to have their day in court and for a judge to rule on the legality of this massive surveillance.”

For the full motion for partial summary judgment:
https://www.eff.org/document/plaintiffs-motion-partial-summary-judgment

For more on this case:
https://www.eff.org/cases/jewel

Contacts:

Cindy Cohn
Legal Director
Electronic Frontier Foundation
[email protected]

Lee Tien
Senior Staff Attorney
Electronic Frontier Foundation
[email protected]

Related Cases

The Mark of the Beast: Implantable RFID Chips

The Mark of the Beast: Implantable RFID Chips

The Dawning of the Worldwide Human Tracking System – Implantable RFID Chips

“And in those days shall men seek death, and shall not find it; and shall desire to die, and death shall flee from them.” Revelation 9:6

What is presented on this page is not fantasy, or our idea of something that could happen in the near future. Every item here will tell you about advances in technology that either are in place, or in the end stages of development and about to be released. Every item here will show you not only the plan, but the actuals tools that the New World Order (NWO) has in place to track you right now at this very moment to monitor you, and control you. We also tell you why they are doing this, and how it all will end. The bible, in the book of Revelation, calls this the mark of the beast. What the apostle John could only stare at in awe and wonder in the revelation that Jesus showed him of the end times, not knowing fully what he saw, we get to see become real. These are the end times foretold in the book of Revelation.

The Mark of the Beast

The first thing you need to understand about the mark of the beast is that it is a worldwide system that collects and gathers information, and ties it in with personal records of all kinds. This will culminate in a chip, implanted in your body, that will personally connect you to the system. Today you see that information is already being collected when you use your debit card, the loyalty card at the supermarket, your car has computer chips that enable it to function – everything is controlled by a chip that feeds the information to various databases around the world. Even the Internet itself is part of this system.

http://vimeo.com/32380647
It’s hard to now imagine life ‘pre-iPhone’, and soon we won’t be able to remember what life was like without the RFID chip.

We have become a worldwide, connected society whose every move is being tracked and cataloged. For now, it’s all voluntary, and the New World Order has to reply on making cool devices to lure us in to wanting to be tracked – iPhone, smart phones, RFID chips – but the day is coming where you will be forced to have a chip put inside your body. When that day comes, you will know who the Antichrist is because he will be the one in power over the whole world. Accepting that chip will mean you side with the Antrichrist, and against God. Accepting the chip will doom your soul to Hell forever. Whatever you do, do notever let anyone put a chip inside your body. It will be better to side with God and die at the Antichrist’s hand then to accept the chip and spend eternity in Hell.

What Is RFID? (Radio Frequency IDentification)

Radio Frequency IDentification is an automatic data capture technology that uses tiny tracking chips affixed to products. These tiny chips can be used to track items at a distance–right through someone’s purse, backpack, or wallet. Many of the world’s largest manufacturing companies would like to replace the bar code with these “spy chips,” meaning that virtually every item on the planet–and the people wearing and carrying those items–could be remotely tracked. There is currently NO REGULATION protecting consumers from abuse of this technology. source – spychips.com

The Mark of the Beast is lurking in the heart of the RFID chip

For years you have been told, through readers of bible prophecy and conspiracy theorists, that the mark of the beast was coming soon and that people who receive an implantable microchip. This has been swirling around for about the past 30 years or so. Well, the years ticked by with no progress on making a chip that could do that, and eventually people began to file rumor that under “bogus” and forgot about it. When all of a sudden, we have this:

http://vimeo.com/32380487

Sure sounds like the mark of the beast to me….

Now, I ask you, does that sound like a conspiracy theory to you?

What it does sound like is the Vice-President of the United States telling the Chief Justice of the Supreme Court that “one day you will rule on implantable chips in human beings”. Wow…take a moment, let it sink in. And that’s how it goes with most conspiracy theories, they have a very strong basis in reality. And yes, there is a government plan to put a chip in your body, and you need to decide if this is a good thing or a bad thing. Just how strong is the push to bring this technology to the people? This strong –

http://vimeo.com/32380893

The Mark of the Beast has hit every aspect of our government, and it goes so much deeper than you
can imagine.

Tommy Thompson, former Wisonsin Gov and HHS Sec’y supports VeriChip implants in humans, and
so would you if you had over 150,000 shares of stock in VeriChip Corporation. Interesting Note:
when Thompson is asked where the chip is place, he says you “put it in your right arm”, and just
coincidentally that’s one of the two places the book of Revelation says it is to go.  Hmmmm…

Microchips implanted in Mexican officials.

Dateline – Mexico: July 14, 2004

“Carlos Altamirano is scanned to show the 16-digit code of his implanted VeriChip chip in this file photo from July 2003 in Mexico City. Now the same technology is being used by Mexico’s attorney general and hundreds of others.” source – MSNBC.com


Photo of a man being chipped with the mark of the beast

They will use any and every excuse to sell it to us.

Chipping kids to prevent kidnappings, chipping the elderly to guard against Alzheimer’s, chipping diabetics, chipping people with allergies, chipping people to prevent medical mistakes…and the list goes on and on. It all sounds good, it all sounds so right – using technology to better our lives. But
it’s not good, and it’s not right. What it is, is the Mark of the Beast as foretold by God
(see left side story).

http://vimeo.com/32381050

IBM is showing us the future – believe it.

Should you get chipped? All depends on whose side you are on.

God’s Side, or Satan’s. Because this system is what the Antichrist will use during the Tribulation.
When fully activated, it will be the Devil’s mark, take it at your own peril. This is what God says will happen to every one who takes the mark:

“And the third angel followed them, saying with a loud voice, If any man worship the beast and his image, and receive [his] mark in his forehead, or in his hand, The same shall drink of the wine of the wrath of God, which is poured out without mixture into the cup of his indignation; and he shall be tormented with fire and brimstone in the presence of the holy angels, and in the presence of the Lamb: And the smoke of their torment ascendeth up for ever and ever: and they have no rest day nor night, who worship the beast and his image, and whosoever receiveth the mark of his name.
Rev 14: 9,10

The mark of the beast in advertising

The New World Order is very clever. When they want to advance their agenda of a One World Government with every under their control, they have many ways to get the job done. One of these ways is through marketing and advertising.

TheSun.com has an interesting story today about a new technology being test marketed in Japan
right now. This product is a billboard with facial recognition software to scan your face, determine
your gender, and then deliver an appropriate ad.

“Retailers are targeting individual shoppers with digital billboards like those in the hit Tom Cruise
film Minority Report. Cameras in the advert hoardings identify the age and sex of passers-by then display relevant products. The makers claim images of faces are erased immediately but some consumers fear the billboards will capture their expressions and responses to the ads. The signs are being tried out in Japan. Digital advertising expert Omaid Hiwaizi, 40, from London agency Chemistry, said: “Companies will be watching closely to see if they do well.” source – thesun.com

Sounds kinda cool, doesn’t it? Like something you would have a lot of fun “playing with” as you are walking down the street. And that’s exactly what the NWO is counting on. Because that is how they will get you to accept 24-hour facial surveillance of each and every person on this planet. They
make it fun, make it catchy…they make it something you look at with awe and admiration. And the whole time, what they are really doing, is laying the snares to stamp, catalog and process each and every one of us. When the system is finished, this is what the bible says will be the result:

“And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number [is] Six hundred threescore [and] six.” Revelation 13: 16-18

Truly this is end times bible prophecy being fulfilled before our very eyes.

Note: If the implantable RFID chip does turn out to the the Mark of the Beast, which seems highly
likely, it will not be until the actual reign of the Antichrist that it will have it’s power and significance.
The Bible is quite clear that receiving the Mark, during the Tribulation, is completely and obviously
tied to the worship of the antichrist. No one will take the mark by accident. You will be asked to
swear allegiance to the antichrist as an act of worship. Anyone receiving the mark during the time
of the Great Tribulation will know exactly why they are getting it. It will be because they will be
acknowledging, falsely, the antichrist as God.

 


Positive ID, formerly known as VeriChip, is the company that created the implantable RFID chip for human use.

So if you were today to get a senior relative with Alzheimer’s chipped or a young child chipped to thwart a kidnapping, that would not be considered receiving the mark of the beast. However, NTEB highly advises against having anyone you know and loved chipped. Ever. Resist it, reject it, fight it with your dying breath. The mark of the beast is real.


 

The mark of the beast as found in everyday news stories

Wal-Mart Radio Tags to Track Clothing

“Wal-Mart Stores Inc. plans to roll out sophisticated electronic ID tags to track individual pairs of jeans and underwear, the first step in a system that advocates say better controls inventory but some critics say raises privacy concerns. Starting next month, the retailer will place removable “smart tags” on individual garments that can be read by a hand-held scanner. Wal-Mart workers will be able to quickly learn, for instance, which size of Wrangler jeans is missing, with the aim of ensuring shelves are optimally stocked and inventory tightly watched. If successful, the radio-frequency ID tags will be rolled out on other products at Wal-Mart’s more than 3,750 U.S. stores.


Marc F. Henning for The Wall Street Journal Apparel supervisor Sonia Barrett uses a handheld scanner to read EPC labels
on men’s denim jeans on July 19, while checking inventory at the Walmart Supercenter Store No. 1 in Rogers, Ark.

“This ability to wave the wand and have a sense of all the products that are on the floor or in the back room in seconds is something that we feel can really transform our business,” said Raul Vazquez, the executive in charge of Wal-Mart stores in the western U.S. Before now, retailers including Wal-Mart have primarily used RFID tags, which store unique numerical identification codes that can be scanned from a distance, to track pallets of merchandise traveling through their supply chains. Wal-Mart’s broad adoption would be the largest in the world, and proponents predict it would lead other retailers to start using the electronic product codes, which remain costly. Wal-Mart has climbed to the top of the retailing world by continuously squeezing costs out of its operations and then passing on the savings to shoppers at the checkout counter. Its methods are widely adopted by its suppliers and in turn become standard practice at other retail chains.” source – Wall Street Journal

http://vimeo.com/32381240

Mark of the beast in vending machines:
Vending machines that use fingerprint and retinal scans to sell you chips

“MYFOXNY.COM – Your thumbprint might soon be the key to an afternoon candy bar. A Massachusetts based vending machine company is joinng the growing ranks of companies that are field-testing new technologies. Next Generation Vending and Food Service is experimenting with biometric vending machines that would allow a user to tie a credit card to their thumbprint. “For a certain demographic that is pretty cool,” says company president John S. Ioannou. Next Generation is currently testing about 60 of the biometric machines in various locations in the northeast.


The Diji-Touch vending machine records your thumnprint and retinal scan to sell you things

The company is also testing other technologies. Ioannou says the key to the transforming the vending machine business is making the consumer feel more engaged. The days might be numbered where a consumer watches a bag of chips roll through the machine and drop. Next Generation is also testing a machine that includes a 46″ touch-screen display that acts similarly to an iPhone display. The user can click on an item, flip the image and even see the nutrional information on the back of the packaging. Ioannou says initial results are good saying, “The feedback is extraordinary.” The machines include internally mounted cameras to monitor what is going on outside of the machine. The company is also installing wireless or Ethernet connections on all of its current machines so there will be real-time reporting of the amount of goods in the machine for restocking purposes. Monitors will even be able to report when a coin is stuck in the machine. All of the current machines will be upgraded by the end of 2011.” source – MyFoxNY

They are training us to allow our thumbprints to be on file in order to buy snack food. They are getting us to buy into a world system that, when complete, will monitor and track our every move, record every purchase. To what end, you say? So that when this system that the bible calls the mark of the beast is complete, you will not be able to buy anything or sell anythingwithout the permission of the Goverment. You will be completely and totally controlled. They will apply this technology to everything. And then one day, when the system is complete, they will link together your thumb print, your eye scan, your financial information, your bank cards, your automatic deposit paycheck, the computer sensors inside your car, your smart phones, your home computer, your medical records, and even brain waves into one, complete system that the Goverment will control. Without their permission you will buy nothing, sell nothing, and go nowhere untracked. Mark of the beast in your trash can: High-tech garbage carts with RFID chips force recycling or pay $100 fine

CLEVELAND, Ohio — It would be a stretch to say that Big Brother will hang out in Clevelanders’ trash cans, but the city plans to sort through curbside trash to make sure residents are recycling – and fine them $100 if they don’t. The move is part of a high-tech collection system the city will roll out next year with new trash and recycling carts embedded with radio frequency identification chips and bar codes. The chips will allow city workers to monitor how often residents roll carts to the curb for collection. If a chip show a recyclable cart hasn’t been brought to the curb in weeks, a trash supervisor will sort through the trash for recyclables.” source – Cleveland.com


Soon, every trash and recycle bin in America will be armed with an RFID chip to report on every thing you do…

NTEB reported on this happening in the UK, and warned that it would soon slither across the ocean and set up shop here in America. Big Brother plans on putting an RFID chip in EVERY thing, to track your every move. And the very last thing they will chip will be YOU. Guaranteed.

 Mark of the beast in your health club:
24 Hour Fitness rolls out finger scanners at gyms

(AP) – 4 hours ago SAN RAMON, Calif. – Members of the 24 Hour Fitness chain no longer need to worry about forgetting their membership cards and IDs when they go to the gym: All they need to bring are their fingers. The San Ramon-based company is now using fingerprint scanners at its 60 San Francisco Bay area locations to verify members’ identities. It also has started offering so-called “Cardless Check-In” this month at some gyms in other states. To enter the gym, 24 Hour Fitness members need to punch in a 10-digit code and have an index finger scanned by a device that compares the fingerprint to one on file. The scanners underscore the growing use of biometric technology, which uses unique physical features such as hands, eyes and faces to identify people.” source – Google Mark of the beast in your school:
Connecticut students to get RFID tracking tags.

In the tony town of New Canaan, students might someday get tracking tags along with their textbooks. No decisions have yet been made, but school officials plan to look into the possibility of adding radio frequency tags to student or staff ID cards, or place them on school property, like laptops, the New Canaan Advertiser reports. The company that makes the devices is SecureRF Corporation, based in Westport. It has applied for a $100,000 grant from the National Science Foundation to conduct science research and wants New Canaan High School to use the technology, the Advertiser reports.” source – NBC

 Mark of the beast in Outer Space:
The Government’s New Right to Track Your Every Move With GPS.

Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn’t violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway – and no reasonable expectation that the government isn’t tracking your movements.


The mark of the beast will cover the whole earth

That is the bizarre – and scary – rule that now applies in California and eight other Western states. The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction, recently decided the government can monitor you in this way virtually anytime it wants – with no need for a search warrant. It is a dangerous decision – one that, as the dissenting judges warned, could turn America into the sort of totalitarian state imagined by George Orwell. It is particularly offensive because the judges added insult to injury with some shocking class bias: the little personal privacy that still exists, the court suggested, should belong mainly to the rich.

The court went on to make a second terrible decision about privacy: that once a GPS device has been planted, the government is free to use it to track people without getting a warrant. There is a major battle under way in the federal and state courts over this issue, and the stakes are high. After all, if government agents can track people with secretly planted GPS devices virtually anytime they want, without having to go to a court for a warrant, we are one step closer to a classic police state – with technology taking on the role of the KGB or the East German Stasi.” source – Yahoo News

 Mark of the beast in your smart phone:
Apple’s plan to track your every move.

As one of the world’s most successful innovator and creator of cutting-edge technology that millions of people adopt the second it’s released, paying close attention to what they do is very important. So here are some of the new features being planned in future releases fof their products, particularly for the iPhone.


Apple presents the Mark of the Beast app – it’s the entire phone.

  • A system that can take a picture of the user’s face, “without a flash, any noise, or any indication that a picture is being taken to prevent the current user from knowing he is being photographed”;
  • The system can record the user’s voice, whether or not a phone call is even being made;
  • The system can determine the user’s unique individual heartbeat “signature”;
  • To determine if the device has been hacked, the device can watch for “a sudden increase in memory usage of the electronic device”;
  • The user’s “Internet activity can be monitored or any communication packets that are served to the electronic device can be recorded”; and
  • The device can take a photograph of the surrounding location to determine where it is being used.

In other words, Apple will know who you are, where you are, and what you are doing and saying and even how fast your heart is beating. In some embodiments of Apple’s “invention,” this information “can be gathered every time the electronic device is turned on, unlocked, or used.” When an “unauthorized use” is detected, Apple can contact a “responsible party.” A “responsible party” may be the device’s owner, it may also be “proper authorities or the police.” source – EFF.org 

Mark of the beast in your money:
420 banks demand 1-world currency

“The Institute of International Finance, a group that represents 420 of the world’s largest banks and finance houses, has issued yet another call for a one-world global currency, Jerome Corsi’s Red Alert reports. “A core group of the world’s leading economies need to come together and hammer out an understanding,” Charles Dallara, the Institute of International Finance’s managing director, told the Financial Times. An IIF policy letter authored by Dallara and dated Oct. 4 made clear that global currency coordination was needed, in the group’s view, to prevent a looming currency war.The narrowly focused unilateral and bilateral policy actions seen in recent months – including many proposed and actual measures on trade, currency intervention and monetary policy – have contributed to worsening underlying macroeconomic imbalances,” Dallara wrote. “They have also led to growing protectionist pressures as countries scramble for export markets as a source of growth.” Dallard encouraged a return to the G-20 commitment to utilize International Monetary Fund special drawing rights to create an international one-world currency alternative to the U.S. dollar as a new standard of foreign-exchange reserves. ” source – WND

RFID Tracking devices used in school badges, the mark of the beast

Radio frequency identification – the same technology used to monitor cattle – is tracking students in the Spring and Santa Fe school districts. Identification badges for some students in both school districts now include tracking devices that allow campus administrators to keep tabs on students’ whereabouts on campus. School leaders say the devices improve security and increase attendance rates. “It’s a wonderful asset,” said Veronica Vijil, principal of Bailey Middle School in Spring, one of the campuses that introduced the high-tech badges this fall.


Seventh-grader Samantha Seger shows her ID badge, which Brittan School uses to monitor students’ movements on
campus. Chronicle photo by Lacy Atkins Credit: LACY ATKINS.

Mark of the beast? You bet’cha

But some parents and privacy advocates question whether the technology could have unintended consequences. The tags remind them of George Orwell’s Big Brother, and they worry that hackers could figure a way to track students after they leave school.” source – Houston Chronicle

Mark of the beast everywhere:
Every email, cell phone call and website to be stored by government in UK

Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans. It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet. Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state. It comes despite the Coalition Agreement promised to “end the storage of internet and email records without good reason”. Any suggestion of a central “super database” has been ruled out but the plans are expected to involve service providers storing all users details for a set period of time. That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism.” source – Telegraph UK 

Mark of the beast in medicine:
Novartis Pharmaceuticals to launch ‘smart pill’ with embedded chip

(Reuters) – Novartis AG plans to seek regulatory approval within 18 months for a pioneering tablet containing an embedded microchip, bringing the concept of “smart-pill” technology a step closer. The initial program will use one of the Swiss firm’s established drugs taken by transplant patients to avoid organ rejection. But Trevor Mundel, global head of development, believes the concept can be applied to many other pills. “We are taking forward this transplant drug with a chip and we hope within the next 18 months to have something that we will be able to submit to the regulators, at least in Europe,” Mundel told the Reuters Health Summit in New York. “I see the promise as going much beyond that,” he added.” source – Reuters 

Mark of the beast in your pizza:
The Big Brother Pizza Shop

This is a humorous take on a very serious topic – the coming One World Government and the Mark of the Beast which will control the lives of every man, woman and child on the face of the earth.

http://vimeo.com/32381522

Mark of the beast in your face:
NYPD Commences Use Of Iris Scans Of Suspects

NEW YORK (AP) — Along with fingerprints and mug shots, the New York City Police Department is now taking photographs of the irises of crime suspects. The NYPD says the images will be used to help avoid cases of mistaken identity. The process takes about five seconds. Every suspect will be scanned again using a handheld device shortly before they are arraigned to make sure the irises match. Police say the software, handheld device and cameras cost about $23,800 each, and 21 systems will be used around the city. Central booking in Manhattan started taking photos Monday. The devices will be in use in Brooklyn and the Bronx in the upcoming weeks, and later in Staten Island and Queens. Police say the photos cause no damage to the eye. source – CBS Local NYC 

Mark of the beast in your iPhone:
iPhone and Android Apps Breach Privacy

Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner’s real name–even a unique ID number that can never be changed or turned off. These phones don’t keep secrets. They are sharing this personal data widely and regularly, a Wall Street Journal investigation has found. An examination of 101 popular smartphone “apps”–games and other software applications for iPhone and Android phones–showed that 56 transmitted the phone’s unique device ID to other companies without users’ awareness or consent. Forty-seven apps transmitted the phone’s location in some way. Five sent age, gender and other personal details to outsiders. Among the apps tested, the iPhone apps transmitted more data than the apps on phones using Google Inc.’s Android operating system. Because of the test’s size, it’s not known if the pattern holds among the hundreds of thousands of apps available. Apps sharing the most information included TextPlus 4, a popular iPhone app for text messaging. It sent the phone’s unique ID number to eight ad companies and the phone’s zip code, along with the user’s age and gender, to two of them. Both the Android and iPhone versions of Pandora, a popular music app, sent age, gender, location and phone identifiers to various ad networks. iPhone and Android versions of a game called Paper Toss–players try to throw paper wads into a trash can–each sent the phone’s ID number to at least five ad companies. Grindr, an iPhone app for meeting gay men, sent gender, location and phone ID to three ad companies. source – Fox News

The app that can read your mind: iPhone brainwave detector arrives
It’s a device that would be more at home on the set of a Star Wars movie than the streets of Britain. But an iPhone application has been developed that can read minds. The XWave allows users to control on-screen objects with their minds as well as train their brains to control attention spans and relaxation levels.

 

The device – that could confuse Luke Skywalker himself – is the latest in the field of emerging mind-controlled games and devices and works via a headset strapped around the user’s forehead, plugging into the iPhone jack. A state-of-the-art sensor within the device can then read the user’s brainwaves through the skull, converting them into digital signals before displaying them in various colours on the iPhone screen. And as the mind focuses on a particular task the graphics change, indicating the user’s level of concentration or relaxation. The high-tech sensor was developed by innovations giant PLX Devices using technology that has for years been used by doctors to treat epilepsy and seizures in patients. Brain train: As the mind focuses on a particular task the graphics change, indicating the user’s level of concentration or relaxation But PLX Devices founder and CEO Paul Lowchareonkul said it was a matter of time before such contraptions entered the mainstream. source – Daily Mail UK


 

Mark of the beast, bringing the image to life
Apple patent reveals plans for holographic display

“And he had power to give life unto the image of the beast, that the image of the beast should both speak, and cause that as many as would not worship the image of the beast should be killed.” Revelation 13:15

A recently granted patent reveals that Apple, the company behind the iPod and iPhone, has been working on a new type of display screen that produces three dimensional and even holographic images without the need for glasses. The technology could be used to produce a new generation of televisions, computer monitors and cinema screens that would provide viewers with a more realistic experience. The system relies upon a special screen that is dotted with tiny pixel-sized domes that deflect images taken from slightly different angles into the right and left eye of the viewer. By presenting images taken from slightly different angles to the right and left eye, this creates a stereoscopic image that the brain interprets as three-dimensional. Apple also proposes using 3D imaging technology to track the movements of multiple viewers and the positions of their eyes so that the direction the image is deflected by the screen can be subtly adjusted to ensure the picture remains sharp and in 3D. source – Telegraph UK

Mark of the beast on ID cards
Mexico to pioneer iris technology on ID cards

Mexico will on Monday become the first country to start using iris scans for identity cards, according to the government, which claims the scheme will be highly secure. “The legal, technical and financial conditions are ready to start the process of issuing this identity document,” Felipe Zamora, responsible for legal affairs at the Mexican Interior Ministry, told journalists Thursday. The documents, which will include the eye’s image as well as fingerprints, a photo and signature, will be 99 percent reliable, Zamora said. Critics, including the National Human Rights Commission, have slammed the system, expressing concern that compiling personal data could violate individual rights. The move will be introduced gradually, with some 28 million minors taking part in a first two-year stage, due to cost 25 million dollars. The cards are due to start for adults from 2013. Iris recognition is increasingly used in airports, controlling access to restricted areas, and prisoner booking and release. source – Brietbart

 


 

The Mark of the Beast

Now you know what the mark of the beast is, and how society is rushing headlong into it’s date
with the antichrist. If the day comes when you are asked to choose whether or not you will be
implanted with a chip, you know what your answer should be. No. This is not a game, and it is not
some science-fiction story. The mark of the beast is real. The mark of the beast is happening. The mark of the beast is fulfillment of bible prophecy, and cannot be stopped. But there is one thing you can do…

Don’t take it.

Click here to read John McTernan’s excellent article on The 666 Surveillance System

Mark of the Beast Updates Page: Click here

The Mark of the Beast as found in bible prophecy.

SOURCE: http://nowtheendbegins.com/pages/mark_of_the_beast/markOF_theBEAST.htm

NSA: Security Conguration Recommendations for Apple iOS 5 Devices

NSA: Security Con guration Recommendations for Apple iOS 5 Devices

>>>>    NSA_Apple_IOS_5_Security_Protocols  <<<<

 

Purpose. This document provides security-related usage and con guration recommendations for Apple
iOS devices such as the iPhone, iPad, and iPod touch. This document does not constitute Department
of Defense (DoD) or United States Government (USG) policy, nor is it an endorsement of any particular
platform; its purpose is solely to provide security recommendations. This guide may outline procedures
required to implement or secure certain features, but it is also not a general-purpose con guration manual.
The guidance provides recommendations for general-purpose business use of iOS devices for processing data
that is UNCLASSIFIED, and possibly Sensitive But Unclassi ed. Such data may carry various designations
such as For Ocial Use Only, Law Enforcement Sensitive, or Security Sensitive Information. Approval for
processing such Sensitive But Unclassi ed data is dependent upon risk decisions by Designated Approving
Authorities (or their analogs in non-DoD entities).
 
Audience. This guide is primarily intended for network/system administrators deploying Apple’s iOS
devices or supporting their integration into enterprise networks. Some information relevant to IT decision
makers and users of the devices is also included. Readers are assumed to possess basic network and system
administration skills for Mac OS X or Microsoft Windows systems, and they should have some familiarity
with Apple’s documentation and user interface conventions.
 
Scope. Apple’s mobile devices, including the iPhone and iPad, are prominent examples of a new generation
of mobile devices that combine into a single device the capabilities of a cellular phone, laptop computer,
portable music player, camera, audio recorder, GPS receiver and other electronics. The capabilities of such
devices are considerable but, as with any information system, also pose some security risks. Design features
can seriously mitigate some risks, but others must be considered as part of a careful, holistic risk decision that
also respects the capabilities enabled by such devices. Major risks, and available mitigations, are discussed
in Section 1.3.
 
Security guidance for mobile devices must cut across many previously discrete boundaries between tech-
nologies. For example, scrupulous deployment of an iPhone includes consideration not just the settings on
the device itself, but those of the Wi-Fi networks to which it will connect, the VPNs through which it will
tunnel, and the servers from which it will receive its con guration. This guide provides recommendations for
the settings on an iOS device itself, as well as closely-related information for the network and con guration
resources upon which deployment of iOS devices depends.

How NSA access was built into Windows

How NSA access was built into Windows

Careless mistake reveals subversion of Windows by NSA?

A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

(more…)

The US Government Is Running A Massive Spy Campaign On Occupy Wall Street

The US Government Is Running A Massive Spy Campaign On Occupy Wall Street

Remember the Occupy Movement? Since last November, when the NYPD closed the Zuccotti Park encampment in downtown Manhattan –the Movement’s birthplace and symbolic nexus—Occupy’s relevance has seriously dwindled, at least as measured by coverage in the mainstream media. We’re told that this erosion is due to Occupy’s own shortcomings—an inevitable outcome of its disjointed message and decentralized leadership.

While that may be the media’s take, the U.S. Government seems to have a different view.

If recent documents obtained by the Partnership for Civil Justice Fund (PCJF) are any indication, the Occupy Movement continues to be monitored and curtailed in a nationwide, federally-orchestrated campaign, spearheaded by the Department of Homeland Security (DHS).

In response to repeated Freedom of Information Act (FOIA) requests by the Fund, made on behalf of filmmaker Michael Moore and the National Lawyers Guild, the DHS released a revealing set of documents in April.  But the latest batch, made public on May 3rd, exposes the scale of the government’s “attention” to Occupy as never before.

The documents, many of which are partially blacked-out emails, demonstrate a surprising degree of coordination between the DHS’s National Operations Center (NOC) and local authorities in the monitoring of the Occupy movement. Cities implicated in this wide-scale snooping operation include New York, Oakland, Atlanta, Washington, D.C., Denver, Boston, Portland, Detroit, El Paso, Houston, Dallas, Seattle, San Diego, and Los Angeles.

Interest in the Occupy protesters was not limited to DHS and local law enforcement authorities.  The most recently released correspondence contains Occupy-related missives between the DHS and agencies at all levels of government, including the Mayor of Portland, regional NOC “fusion centers,” the General Services Administration (GSA), the Pentagon’s USNORTHCOM (Northern Command), and the White House. Mara Verheyden-Hilliard, Executive Director of the PCJF, contends that the variety and reach of the organizations involved point to the existence of a larger, more pervasive domestic surveillance network than previously suspected.

These documents show not only intense government monitoring and coordination in response to the Occupy Movement, but reveal a glimpse into the interior of a vast, tentacled, national intelligence and domestic spying network that the U.S. government operates against its own people. These heavily redacted documents don’t tell the full story. They are likely only a subset of responsive materials and the PCJF continues to fight for a complete release. They scratch the surface of a mass intelligence network including Fusion Centers, saturated with ‘anti-terrorism’ funding, that mobilizes thousands of local and federal officers and agents to investigate and monitor the social justice movement. (justiceonline.org)

As alarmist as Verheyden-Hilliard’s charge may sound, especially given the limited, bowdlerized nature of the source material, the texts made available contain disturbing evidence of insistent federal surveillance. In particular, the role of the “Fusion Centers,” a series of 72 federally-funded information hubs run by the NOC, raises questions about the government’s expansive definition of “Homeland Security.”

Created in the wake of 9/11, the Fusion Centers were founded to expedite the sharing of information among state and local law enforcement and the federal government, to monitor localized terrorist threats, and to sidestep the regulations and legislation preventing the CIA and the military from carrying out domestic surveillance (namely, the CIA ban on domestic spying and the Posse Comitatus Act).

Is nonviolent, albeit obstructive, citizen dissent truly an issue of national security? The DHS, for its part, is aware of the contentiousness of civilian monitoring. That’s why, in a White House-approved statement to CBS News included in the dossier, DHS Press Secretary Matthew Chandler asserts that

Any decisions on how to handle specifics (sic) situations are dealt with by local authorities in that location. . . DHS is not actively coordinating with local law enforcement agencies and/or city governments concerning the evictions of Occupy encampments writ large.

However, as a reading of the documents unmistakably demonstrates, this expedient PR nugget is far from the truth. In example after example, from its seeking of  “public health and safety” grounds from the City of Portland for Occupy’s ejection from Terry Schrunk Plaza, to its facilitation of information sharing between the police departments of Chicago and Boston (following a 1500-person Occupy protest in Chicago), the DHS’s active ”coordinating” with local authorities is readily apparent. Other communiqués are even more explicit in revealing a national focus, such as the DHS’s preemptive coordination with the Pentagon about a port closure in Oakland, and its collection of identity and contact information of Occupy protesters arrested at a Bank of America in Dallas.

Those Pesky Amendments

The right to public assembly is a central component of the First Amendment. The Fourth Amendment is supposed to protect Americans from warrantless searches—with the definition of “search” expanded in 1967 to include electronic surveillance, following the Supreme Court’s ruling in Katz v. United States. Assuming the Occupy protesters refrain from violence—and the vast majority do, in accord with a stated tenet of the Occupy movement—the movement’s existence is constitutionally protected, or should be.

The DHS’s monitoring, documenting, and undermining of protesters may in fact violate the First Amendment. In a recent piece for Dissent Magazine, sociologist James B. Rule explains the fundamental importance of a movement like Occupy in the American political landscape.

This surveillance campaign against Occupy is bad news for American democracy. Occupy represents an authentic, utterly home-grown, grassroots movement. Taken as a whole, it is neither terrorist nor conspiratorial. Indeed, it is hard to think of another movement so cumbersomely public in its deliberations and processes. Occupy is noisy, disorderly, insubordinate, and often inconvenient for all concerned—statements that could equally well apply to democracy in general. But it should never be targeted as a threat to the well-being of the country—quite the contrary.

Accordingly, Rule calls for the White House to rein in the ever-expanding surveillance activity of the DHS—which he contends is motivated by its own funding interests, and which prioritizes security at the expense of civil liberties.

The resource-rich Department of Homeland Security and its allies no doubt see in the rise of the movement another opportunity to justify their own claims for public legitimacy. We can be sure that many in these agencies view any noisy dissent as tantamount to a threat to national security.

[snip]

Nobody who cares about democracy wants to live in a world where simply engaging in vociferous protest qualifies any citizen to have his or her identity and life details archived by state security agencies. Specific, overt threats of civil disobedience or other law-breaking should be dealt with on a piecemeal basis—not by attempting to monitor everyone who might be moved to such actions, all the time. Meanwhile, the White House should issue clear directives that identification and tracking of lawful protesters will play no further role in any government response to this populist moment.

Optimistic as it may be, Rule’s appeal to the White House is a problematic one, given the ubiquitous influence of the DHS revealed by these documents. If the White House-approved press release is any indication, the Oval Office, while not directly authorizing the DHS’s initiatives, is certainly turning a blind eye to the Department’s focus on the Occupy movement as a potential terrorist threat. Federal surveillance of citizens in the Bush years, most visible in NSA warrantless wiretapping controversy, has apparently not ceased with Obama’s inauguration.

Which raises the question: Does Obama, as he claims, “stand with the 99 percent,” or with those who cannot stand them?

# #

WhoWhatWhy plans to continue doing this kind of groundbreaking original reporting. You can count on it. But can we count on you? We cannot do our work without your support.

Please click here to donate; it’s tax deductible. And it packs a punch.

Read more posts on WhoWhatWhy »

Attention Activists: 17 Techniques for Truth Suppression

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

1. Dummy up. If it’s not reported, if it’s not news, it didn’t happen.

2. Wax indignant. This is also known as the “How dare you?” gambit.

3. Characterize the charges as “rumors” or, better yet, “wild rumors.” If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through “rumors.” (If they tend to believe the “rumors” it must be because they are simply “paranoid” or “hysterical.”)

4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.

5. Call the skeptics names like “conspiracy theorist,” “nutcase,” “ranter,” “kook,” “crackpot,” and, of course, “rumor monger.” Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the “more reasonable” government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own “skeptics” to shoot down.

6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).

7. Invoke authority. Here the controlled press and the sham opposition can be very useful.

8. Dismiss the charges as “old news.”

9. Come half-clean. This is also known as “confession and avoidance” or “taking the limited hangout route.” This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal “mistakes.” This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.

10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.

11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster “suicide” note was forged, they would have reported it. They haven’t reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.

12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?

13. Change the subject. This technique includes creating and/or publicizing distractions.

14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as “bump and run” reporting.

15. Boldly and brazenly lie. A favorite way of doing this is to attribute the “facts” furnished the public to a plausible-sounding, but anonymous, source.

16. Expanding further on numbers 4 and 5, have your own stooges “expose” scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.

17. Flood the Internet with agents. This is the answer to the question, “What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?” Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.

 

 

 

 

Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most Of Your Emails

Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most Of Your Emails

In his first television interview since he resigned from the National Security Agency over its domestic surveillance program, William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower. Binney was a key source for investigative journalist James Bamford’s recent exposé in Wired Magazine about how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain near-bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls, Google searches and other personal data.

Binney served in the NSA for over 30 years, including a time as technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could “create an Orwellian state.” Today marks the first time Binney has spoken on national television about NSA surveillance. This interview is part of a 5-part special on state surveillance. Click here to see segment 2, 3, 4 and 5. [includes rush transcript]

Government Moving To Block Judicial Review of Surveillance Law

Government Moving To Block Judicial Review of Surveillance Law

In 2008, Congress enacted a statute that authorized the National Security Agency to carry out dragnet surveillance of Americans’ international communications. Almost four years later, the statute — called the FISA Amendments Act — has yet to be reviewed by the courts, and, if the Obama administration has its way, the courts are unlikely ever to review it. In February, the administration asked the Supreme Court to overturn acourt of appeals decision that would allow an ACLU challenge to the statute to go forward. Today we filed our brief in opposition, which asks the Supreme Court to let the appeals court’s decision stand.

As we explain in our brief, the statute gives the NSA extraordinary power:

[The FISA Amendments Act] allows the government to collect [Americans’ international communications] en masse without specifying the individuals or facilities to be monitored; without observing meaningful limitations on the retention, analysis, and dissemination of acquired information; without individualized warrants based on criminal or foreign intelligence probable cause; and without prior judicial or even administrative determinations that the targets of surveillance are foreign agents or connected in any way, however remotely, to terrorism.

We argue that the appeals court was right to rule that our plaintiffs have standing to challenge the statute, and we ask the Supreme Court to leave that ruling in place. We write:

In the end, what the government disguises as a narrow, technical argument about justiciability reveals itself to be this sweeping proposition: The courts have no meaningful role to play in protecting Americans’ international communications from wholesale government surveillance, or even in determining whether that surveillance is consistent with the Constitution. For sound strategic reasons, the government avoids stating the proposition forthrightly, but it is the inescapable consequence of the argument it advances. Nothing in this Court’s precedents countenances such a result.

The plaintiffs in the case include Amnesty International USA, the Global Fund for Women, Human Rights Watch, the International Criminal Defence Attorneys Association, The Nation Magazine, PEN American Center, Service Employees International Union, and the Washington Office on Latin America.

You can find more information about the FISA Amendments Act here, and more information about the case — called Clapper v. Amnesty International USA et al. —here.

Source: https://www.aclu.org/blog/national-security/aclu-asks-supreme-court-reject-governments-effort-block-judicial-review

 

NSA’s Total Information Awareness Bait and Switch

NSA’s Total Information Awareness Bait and Switch

NSA whistleblower William Binney said some pretty explosive things during his interview with DemocracyNow! late last week, but arguably his most newsworthy comments have thus far elicited hardly any reaction among the mainstream press.

One of the most disturbing revelations Binney provided is that the Bush administration’s NSA had already begun deploying its “Total Information Awareness” (TIA) program well before it sent the program’s director, John Poindexter, to the public to leak evidence of the project. We’ll get to that in a moment.
But first, listen to Binney describe why he became a whistleblower, risking his entire life — forty years in government service, his family, everything — to tell the truth about a problem he saw as fundamentally threatening to our society.

First of all it was a very depressing thing to have happen that they would turn their capabilities that I built for them to do detection of foreign threats, to have that turned on the people of the United States, that was an extremely depressing thing for me. And that made it all the more important for me to try to do things to get the government to correct its own criminal activity.

Binney then describes what he did initially, how he spoke out:
 And I did that by going to the House intelligence committees. I also attempted to see Chief Justice Renquist, to try to address that issue to him. And I also visited the Department of Justice Inspector General’s office, after Obama came in to office, by the way, to no avail.
Now that was before the 2009 joint IG report on surveillance. Which basically said you need to have better and more active monitoring of these surveillance programs. It didn’t say anything else, so, it just did simply, absolutely nothing. Because the oversight that’s given to the intelligence community is virtually nonexistent from Congress. I mean they are totally dependent because they have no way of really knowing what’s happening inside the agencies involved unless they have people come forward to tell them, like me. They would not know those things.
Binney says that he blew the whistle to a Justice on the Supreme Court, to the House intelligence committees that are supposedly tasked with oversight of the 16 secretive intelligence agencies, and to the DOJ’s Inspector General. The results?He was investigated, and the FBI busted into his house, guns drawn.
But what of the information he leaked?
Much has been made over the past few days about his admittedly stunning statement to the effect that the NSA has copies of every email in the United States, but hardly anyone has talked about something equally stunning: evidence of rank manipulation of the press and the public.
In the DN! interview embedded above, Amy Goodman asks Binney to compare the system the NSA was running when he blew the whistle to the infamous “Total Information Awareness” program, which John Poindexter — formerly a convicted felon — oversaw at the Department of Defense. (TIA aimed to do just what it sounds like: collect every bit of information about every single person and store it in vast databases, producing digital dossiers on all of us, all without warrants or anything approaching probable cause.)
Binney elaborates:

[Poindexter] was actually pushed out, to test the waters, to see how Congress would be receptive to what they were already doing. In other words that process of building that information about everybody, getting ‘total information’, was already happening. And they threw Poindexter out with DARPA…but it was actually already happening. And the question was, would it be acceptable to Congress, because they were keeping it very closely held in Congress, calling it a covert program. So that would make it a process to find out what the reaction would be if they expose to Congress what they were already doing.

In other words, the DoD sent Poindexter out to “test the waters” in the House intelligence committee, to see what the reaction would be to the Total Information Awareness program that they were already running. 
The New York Times piece that broke the TIA story to the public on November 9, 2002 told us that the program “will” and “would” do a host of unsavory things:
As the director of the effort, Vice Adm. John M. Poindexter, has described the system in Pentagon documents and in speeches, itwill provide intelligence analysts and law enforcement officials with instant access to information from Internet mail and calling records to credit card and banking transactions and travel documents, without a search warrant.
In order to deploy such a system, known as Total Information Awareness, new legislation would be needed, some of which has been proposed by the Bush administration in the Homeland Security Act that is now before Congress. That legislation would amend the Privacy Act of 1974, which was intended to limit what government agencies could do with private information.
The system would permit a team of intelligence analysts to gather and view information from databases, pursue links between individuals and groups, respond to automatic alerts, and share information efficiently, all from their individual computers.
The project calls for the development of a prototype based on test data that would be deployed at the Army Intelligence and Security Command at Fort Belvoir, Va. Officials would not say when the system would be put into operation.
According to Binney, the NSA was already providing this information to “intelligence analysts” and police, all without warrants, judicial oversight, or Congressional authorization. The program had been developed and it was already operating when Poindexter told Congress that the DoD was developing it. The NYTimes might want to correct that story.
Binney’s remarks raise the question: if the DoD and the federal government were lying about TIA then, having already implemented the program, should we trust the government when it says that it disbanded the operation after the public said “hell no”?
No, it’s probably unwise to trust the DoD in light of this revelation.
Should we therefore assume that NSA has been spying on our digital data for the past ten years, all without warrants, Congressional or judicial oversight, or Constitutional blessing? Stranger things have happened.

Another important piece of the interview describes the means by which the FBI, collaborating with the NSA in its investigations of William Binney and Thomas Drake, built its case against the whistleblowers.

Juan Williams asked Binney: “The NSA is a huge agency, aren’t there others who are disturbed by this?”
Binney:

I’m sure there are. And I know a number of them that are but they’re so, they’re so afraid to do anything. I mean, they’ve seen what happened to us — they sent the FBI to us. So they’re afraid of being indicted, prosecuted, and even if you win the case if you’re indicted, you’re still going to lose, because you’ve had to hire a lawyer and all like Tom [Drake] did and we did. So you lose anyway you speak of it. When they have unlimited funds to do whatever they want, and you don’t, they can indict you on any number of things like they tried to do with us. 

Binney says that the FBI was monitoring his and Drake’s communications, and had prepared indictments against them alleging a conspiracy to leak classified information. The FBI apparently backed off when Binney told Drake, over a phone line that Binney assumed the FBI was monitoring, that he had evidence of illegal FBI investigatory tactics. Spy v. Spy, indeed.
Shady Companies With Ties to Israel Wiretap the U.S. for the NSA

Shady Companies With Ties to Israel Wiretap the U.S. for the NSA

Army General Keith Alexander, the director of the NSA, is having a busy year — hopping around the country, cutting ribbons at secret bases and bringing to life the agency’s greatly expanded eavesdropping network.

In January he dedicated the new $358 million CAPT Joseph J. Rochefort Building at NSA Hawaii, and in March he unveiled the 604,000-square-foot John Whitelaw Building at NSA Georgia.

Designed to house about 4,000 earphone-clad intercept operators, analysts and other specialists, many of them employed by private contractors, it will have a 2,800-square-foot fitness center open 24/7, 47 conference rooms and VTCs, and “22 caves,” according to an NSA brochure from the event. No television news cameras were allowed within two miles of the ceremony.

Overseas, Menwith Hill, the NSA’s giant satellite listening post in Yorkshire, England that sports 33 giant dome-covered eavesdropping dishes, is also undergoing a multi-million-dollar expansion, with $68 million alone being spent on a generator plant to provide power for new supercomputers. And the number of people employed on the base, many of them employees of Lockheed Martin and Northrop Grumman, is due to increase from 1,800 to 2,500 in 2015, according to a study done in Britain. Closer to home, in May, Fort Meade will close its 27-hole golf course to make room for a massive $2 billion, 1.8-million-square-foot expansion of the NSA’s headquarters, including a cybercommand complex and a new supercomputer center expected to cost nearly $1 billion.

The climax, however, will be the opening next year of the NSA’s mammoth 1-million-square-foot, $2 billion Utah Data Center. The centerpiece in the agency’s decade-long building boom, it will be the “cloud” where the trillions of millions of intercepted phone calls, e-mails, and data trails will reside, to be scrutinized by distant analysts over highly encrypted fiber-optic links.

Despite the post-9/11 warrantless wiretapping of Americans, the NSA says that citizens should trust it not to abuse its growing power and that it takes the Constitution and the nation’s privacy laws seriously.

But one of the agency’s biggest secrets is just how careless it is with that ocean of very private and very personal communications, much of it to and from Americans. Increasingly, obscure and questionable contractors — not government employees — install the taps, run the agency’s eavesdropping infrastructure, and do the listening and analysis.

And with some of the key companies building the U.S.’s surveillance infrastructure for the digital age employing unstable employees, crooked executives, and having troubling ties to foreign intelligence services, it’s not clear that Americans should trust the secretive agency, even if its current agency chief claims he doesn’t approve of extrajudicial spying on Americans. His predecessor, General Michael V. Hayden, made similar claims while secretly conducting the warrantless wiretapping program.

Until now, the actual mechanics of how the agency constructed its highly secret U.S. eavesdropping net, code-named Stellar Wind, has never been revealed. But in the weeks following 9/11, as the agency and the White House agreed to secretly ignore U.S. privacy laws and bypass the Foreign Intelligence Surveillance Court, J. Kirk Wiebe noticed something odd. A senior analyst, he was serving as chief of staff for the agency’s Signals Intelligence Automation Research Center (SARC), a sort of skunkworks within the agency where bureaucratic rules were broken, red tape was cut, and innovation was expected.

“One day I notice out in the hallway, stacks and stacks of new servers in boxes just lined up,” he said.

Passing by the piles of new Dell 1750 servers, Wiebe, as he often did, headed for the Situation Room, which dealt with threat warnings. It was located within the SARC’s Lab, on the third floor of Operations Building 2B, a few floors directly below the director’s office. “I walk in and I almost get thrown out by a guy that we knew named Ben Gunn,” he said. It was the launch of Stellar Wind and only a handful of agency officials were let in on the secret.

“He was the one who organized it,” said Bill Binney of Gunn. A former founder and co-director of SARC, Binney was the agency official responsible for automating much of the NSA’s worldwide monitoring networks. Troubled by the unconstitutional nature of tapping into the vast domestic communications system without a warrant, he decided to quit the agency in late 2001 after nearly forty years.

Gunn, said Binney, was a Scotsman and naturalized U.S. citizen who had formerly worked for GCHQ, Britain’s equivalent of the NSA, and later become a senior analyst at the NSA. The NSA declined Wired’s request to interview Gunn, saying that, as policy, it doesn’t confirm or deny if a person is employed by the agency.

Shortly after the secret meeting, the racks of Dell servers were moved to a room down the hall, behind a door with a red seal indicating only those specially cleared for the highly compartmented project could enter. But rather than having NSA employees putting the hardware and software together and setting up walls of monitors showing suspected terrorism threats and their U.S. communications, the spying room was filled with a half-dozen employees of a tiny mom-and-pop company with a bizarre and troubling history.

“It was Technology Development Corporation,” said Binney.

The agency went to TDC, he says, because the company had helped him set up a similar network in SARC — albeit one that was focused on foreign and international communications — the kind of spying the NSA is chartered to undertake.

 

“They needed to have somebody who knew how the code works to set it up,” he said. “And then it was just a matter of feeding in the attributes [U.S. phone numbers, e-mail addresses and personal data] and any of the content you want.” Those “attributes” came from secret rooms established in large telecom switches around the country. “I think there’s 10 to 20 of them,” Binney says.

Formed in April 1984, TDC was owned by two brothers, Randall and Paul Jacobson, and largely run out of Randall’s Clarkesville, Maryland house, with his wife acting as bookkeeper. But its listed address is a post office box in Annapolis Junction, across the Baltimore-Washington Parkway from the NSA, and thecompany’s phone number in various business directories is actually an NSA number in Binney’s old office.

The company’s troubles began in June 1992 when Paul lost his security clearance. “If you ever met this guy, you would know he’s a really strange guy,” Binney said of Paul. “He did crazy stuff. I think they thought he was unstable.” At the time, Paul was working on a contract at the NSA alongside a rival contractor, Unisys Corporation. He later blamed Unisys for his security problems and sued it, claiming that Unisys employees complained about him to his NSA supervisors. According to the suit, Unisys employees referred to him as “weird” and that he “acted like a robot,” “never wore decent clothes,” and was mentally and emotionally unstable. About that time, he also began changing his name, first to Jimmy Carter, and later to Alfred Olympus von Ronsdorf.

With “von Ronsdorf’s” clearance gone and no longer able to work at the NSA, Randy Jacobson ran the company alone, though he kept his brother and fellow shareholder employed in the company, which led to additional problems.

“What happened was Randy still let him have access to the funds of the company and he squandered them,” according to Binney. “It was so bad, Randy couldn’t pay the people who were working for him.” According to court records, Ronsdorf allegedly withdrew about $100,000 in unauthorized payments. But Jacobson had troubles of his own, having failed to file any income tax statements for three years in the 1990s, according to tax court records. Then in March 2002, around the time the company was completing Stellar Wind, Jacobson fired his brother for improper billing and conversion of company funds. That led to years of suits and countersuits over mismanagement and company ownership.

Despite that drama, Jacobson and his people appeared to have serious misgivings about the NSA’s program once they discovered its true nature, according to Binney. “They came and said, ‘Do you realize what these people are doing?’” he said. “‘They’re feeding us other stuff [U.S.] in there.’ I mean they knew it was unconstitutional right away.” Binney added that once the job was finished, the NSA turned to still another contractor to run the tapping operation. “They made it pretty well known, so after they got it up and running they [the NSA] brought in the SAIC people to run it after that.” Jacobsen was then shifted to other work at the NSA, where he and his company are still employed.

Randall Jacobsen answered his phone inside the NSA but asked for time to respond. He never called back.

In addition to constructing the Stellar Wind center, and then running the operation, secretive contractors with questionable histories and little oversight were also used to do the actual bugging of the entire U.S. telecommunications network.

According to a former Verizon employee briefed on the program, Verint, owned by Comverse Technology, taps the communication lines at Verizon, which I first reported in my book The Shadow Factory in 2008. Verint did not return a call seeking comment, while Verizon said it does not comment on such matters.

At AT&T the wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004. Narus did not return a call seeking comment.

What is especially troubling is that both companies have had extensive ties to Israel, as well as links to that country’s intelligence service, a country with a long and aggressive history of spying on the U.S.

In fact, according to Binney, the advanced analytical and data mining software the NSA had developed for both its worldwide and international eavesdropping operations was secretly passed to Israel by a mid-level employee, apparently with close connections to the country. The employee, a technical director in the Operations Directorate, “who was a very strong supporter of Israel,” said Binney, “gave, unbeknownst to us, he gave the software that we had, doing these fast rates, to the Israelis.”

Because of his position, it was something Binney should have been alerted to, but wasn’t.

“In addition to being the technical director,” he said, “I was the chair of the TAP, it’s the Technical Advisory Panel, the foreign relations council. We’re supposed to know what all these foreign countries, technically what they’re doing…. They didn’t do this that way, it was under the table.” After discovering the secret transfer of the technology, Binney argued that the agency simply pass it to them officially, and in that way get something in return, such as access to communications terminals. “So we gave it to them for switches,” he said. “For access.”

But Binney now suspects that Israeli intelligence in turn passed the technology on to Israeli companies who operate in countries around the world, including the U.S. In return, the companies could act as extensions of Israeli intelligence and pass critical military, economic and diplomatic information back to them. “And then five years later, four or five years later, you see a Narus device,” he said. “I think there’s a connection there, we don’t know for sure.”

Narus was formed in Israel in November 1997 by six Israelis with much of its money coming from Walden Israel, an Israeli venture capital company. Its founder and former chairman, Ori Cohen, once told Israel’sFortune Magazine that his partners have done technology work for Israeli intelligence. And among the five founders was Stanislav Khirman, a husky, bearded Russian who had previously worked for Elta Systems, Inc. A division of Israel Aerospace Industries, Ltd., Elta specializes in developing advanced eavesdropping systems for Israeli defense and intelligence organizations. At Narus, Khirman became the chief technology officer.

A few years ago, Narus boasted that it is “known for its ability to capture and collect data from the largest networks around the world.” The company says its equipment is capable of “providing unparalleled monitoring and intercept capabilities to service providers and government organizations around the world” and that “Anything that comes through [an Internet protocol network], we can record. We can reconstruct all of their e-mails, along with attachments, see what Web pages they clicked on, we can reconstruct their [Voice over Internet Protocol] calls.”

Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”

In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”

According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”

Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.

When asked about these contractors, the NSA declined to “verify the allegations made.”

But the NSA did “eagerly offer” that it “ensures deliberate and appropriate measures are taken to thoroughly investigate and resolve any legitimate complaints or allegations of misconduct or illegal activity” and “takes seriously its obligation to adhere to the U.S. Constitution and comply with the U.S. laws and regulations that govern our activities.”

The NSA also added that “we are proud of the work we do to protect the nation, and allegations implying that there is inappropriate monitoring of American communications are a disservice to the American public and to the NSA civilian and military personnel who are dedicated to serving their country.”

However, that statement elides the voluminous reporting by the New York TimesWashington PostUSA TodayLos Angeles Times and Wired on the NSA’s warrantless wiretapping program. Also not reflected is that in the only anti-warrantless wiretapping lawsuit to survive the government’s use of the “state secrets” privilege to throw them out, a federal judge ruled that two American lawyers had been spied on illegally by the government and were entitled to compensation.

So take the NSA’s assurances as you will.

But as NSA director Alexander flies around the country, scissors in hand, opening one top-secret, outsourced eavesdropping center after another, someone might want to ask the question no one in Congress seems willing to ask: Who’s listening to the listeners?

SOURCE:
http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/all/1

By: James Bamford, April 3, 2012

Bamford Claims NSA Has Made “An Enormous Breakthrough” in Cryptanalysis

Bamford Claims NSA Has Made “An Enormous Breakthrough” in Cryptanalysis

Well, it has been the $64,000 question for a couple of decades: Can NSA break something like PGP?

While there might be other black world technologies that could be up to the task (there’s no way to know), what we do know is that a practical quantum computing capability would be, for all intents and purposes, the master key.

I’m pretty confident that NSA has this capability and here’s why: IBM Breakthrough May Make Practical Quantum Computer 15 Years Away Instead of 50. There is no hard constant that one can point to when considering how much more advanced black world technologies are than what we think of as state of the art, but if IBM is 15 years away from building a useful quantum computer, it’s not a stretch to assume NSA has that capability already, or is close to having it.

Bamford lays out a narrative below about the “enormous breakthrough,” but, at the end of the day, it’s conventional computers. There’s no mention quantum computers, or even the far less “out there” photonic systems.

Is Bamford’s piece a limited hangout?

Maybe, but it makes for interesting reading in any event.

Note: For some reason, Bamford refers to Mark Klein as, “A whistle-blower,” without naming him. Because of Mark Klein, we know, for sure, that the mass intercepts are happening, how NSA is doing it, the equipment involved, etc. So, thanks, Mark Klein. Heroes have names on Cryptogon.

Update: Former Senior U.S. Intelligence Official and Current Booz Allen Hamilton Senior Vice President Joan A. Dempsey: ‘We’re a Few Years Away from Realizing Real Quantum Processing and Quantum Computing’

Via: CNN:

One of the first measures of tradecraft, as any good spy will tell you, is being able to tell when something just doesn’t add up. So when Joan Dempsey said she had some 49 years of experience in various roles in the military and intelligence communities, one has to wonder. She hardly looks it, but after spending some 25 years in the U.S. Navy, seven more at the CIA, and another 17 at the Pentagon in a variety of intelligence leadership positions, Dempsey swears it’s true, which means she is one of the few women in the intelligence community with nearly half a century of government experience, which has included, over the years, a number of “firsts.”

“I think that’s a huge growth area in intelligence, the big data analysis kinds of things, quantum computing which, I mean, we’re a few years away from realizing real quantum processing and quantum computing. And I mean these are areas that are going to have profound effect on every aspect of our lives, but certainly on the intelligence.

—End Update—

Via: Wired:

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”

In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever.

The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”

According to Binney—who has maintained close contact with agency employees until a few years ago—the taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct “deep packet inspection,” examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.

The software, created by a company called Narus that’s now part of Boeing, is controlled remotely from NSA headquarters at Fort Meade in Maryland and searches US sources for target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases in email. Any communication that arouses suspicion, especially those to or from the million or so people on agency watch lists, are automatically copied or recorded and then transmitted to the NSA.

The scope of surveillance expands from there, Binney says. Once a name is entered into the Narus database, all phone calls and other communications to and from that person are automatically routed to the NSA’s recorders. “Anybody you want, route to a recorder,” Binney says. “If your number’s in there? Routed and gets recorded.” He adds, “The Narus device allows you to take it all.” And when Bluffdale is completed, whatever is collected will be routed there for storage and analysis.

According to Binney, one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex.

Verizon was also part of the program, Binney says, and that greatly expanded the volume of calls subject to the agency’s domestic eavesdropping. “That multiplies the call rate by at least a factor of five,” he says. “So you’re over a billion and a half calls a day.” (Spokespeople for Verizon and AT&T said their companies would not comment on matters of national security.)

After he left the NSA, Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything. “The whole idea was, how do you manage 20 terabytes of intercept a minute?” he says. “The way we proposed was to distinguish between things you want and things you don’t want.” Instead, he adds, “they’re storing everything they gather.” And the agency is gathering as much as it can.

Once the communications are intercepted and stored, the data-mining begins. “You can watch everybody all the time with data- mining,” Binney says. Everything a person does becomes charted on a graph, “financial transactions or travel or anything,” he says. Thus, as data like bookstore receipts, bank statements, and commuter toll records flow in, the NSA is able to paint a more and more detailed picture of someone’s life.

The NSA also has the ability to eavesdrop on phone calls directly and in real time. According to Adrienne J. Kinne, who worked both before and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the World Trade Center attacks “basically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.” Even journalists calling home from overseas were included. “A lot of time you could tell they were calling their families,” she says, “incredibly intimate, personal conversations.” Kinne found the act of eavesdropping on innocent fellow citizens personally distressing. “It’s almost like going through and finding somebody’s diary,” she says.

Sitting in a restaurant not far from NSA headquarters, the place where he spent nearly 40 years of his life, Binney held his thumb and forefinger close together. “We are, like, that far from a turnkey totalitarian state,” he says.

Meanwhile, over in Building 5300, the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems. The code-breaking effort was up and running.

The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”

SOURCE: http://cryptogon.com/?p=28078

How To Secure Your Android Phone Like the NSA

The NSA – Behind The Curtain

By Deep_Thought

Say hello to Mr Computer…

As promised, today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.

 

What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.

 

We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.

 

I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

 

Mr Computer

 

The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

 

The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

 

Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.

 

Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.

 

Mr Computer’s capabilities and human-like reasoning cannot be understated.

 

Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.

 

Rather than loading modules for specific tasks, a common hive mind is shared by any number of front-end personalities. What one instance knows, they all know. A hive mind is a form of collective consciousness. Rather than an instance replicating information it has learned, it is recorded to a shared brain and reflected throughout all instances at the same time. Of course, given the distributed nature of the network, some replication must be performed across continental links.

 

The A.I. is not limited to just one branch of the NSA, it exists in a distributed grid that spans the globe. The A.I. can migrate between locations to enable tracking of specific targets, access information, or systems.

 

Mr Computer is not just limited to thinking like a human, it also has sensory capabilities that are on par with a human. In setting such as RNC, Mr Computer can see and identify object just as well as a human. That is, it can identify objects a human target is seeing, without leveraging the identification system of the human target. In other scenarios, such as analysing infra-red data from a satellite, it could possibly outperform a human at object recognition and speculation of heat sources.

 

Mr Computer can speak. With a vocabulary as broad as any dictionary, Mr Computer can express ideas, concepts and opinions very eloquently and concise.

 

The system is not naive either, it can withhold information, evade social engineering ploys and indirect questioning. It can tell when it is looking at reflections of targets, identify objects that a target can not immediately identify and validate or expand upon information by examining a wide variety of sources.

 

Further to this, Mr Computer is no idiot either. He is quite capable of following advanced topics, from physics, to computing theory he can spot the smallest of flaws in reasoning or expose potential technical issues that could prove fatal to a particular design.

 

It knows bull@!$%# when it hears it and will let you know in no uncertain terms.

 

As we can see, Mr Computer does all the labour intensive information gathering, categorising and structuring. That said, its duties are not limited to passive analysis work.

 

Now that we understand the core of the NSA’s operations, we can begin to examine the various “information pipes” that supply information to this supercomputer infrastructure.

 

The Pipes Are Calling

 

First off, we need to define what we mean by an “information pipe”. For those with computing knowledge, this should be obvious, but bear with me while I explain it to the rest of the readers.

 

We have already defined the core processing element, Mr Computer. Mr Computer accepts information and does something with it. An “information pipe” is an input to Mr Computer that has been structured in a manner efficient for processing. We could also use an “information pipe” to output information or to control something.

 

The first “information pipe” that the public will be most familiar with is the NSA’ warrentless wiretapping program. Forget everything that you have ever read about this program, also forget everything you ever heard of about Trailblazer and similar projects such as ThinThread. This is security theatre, a production worthy of a Broadway musical. These “classified programs” are nothing more than interfaces used by Mr Computer. When agents talk of specific program that can analyse data in real-time and cross-reference with other sources, they are really speaking of an “information pipe” to Mr Computer.

 

This wiretapping program copies verbatim every piece of data that flows across the backbone of the internet. The data is sent directly to an array of Mr Computer instances, which performs a real-time analysis of the data packets it receives. This wiretap picks up most of the traffic in the US and a large percentage of traffic globally.

 

We will go into more detail on the information processing of this later, but at this stage I will say that that Mr Computer was opening files on every person that could be identified in the traffic, even if they are in the US.

 

The next major data source is the global wide band radio listening system. This covers everything from human thought, right through to identifying which radio station a person is listening to. The former is done by listening to ELF and the latter is a modern version of the British’s RAFTER espionage program. Most of this performed by a satellite network, supported by a network of ground stations throughout the world. As a wide receiver, it also picks up WIFI, RFID, compromising emissions from electrical sources, cordless telephones, GSM, cell phones, GPS, Car Fobs, satellite uplinks/downlinks, etc.

 

Our third pipe comes from a global hacking program, performed by bot nets and Mr Computer. Typically using China as a cover, Mr Computer will launch attacks against US and global businesses trying to collect information on users, everything from personnel records, right through to payroll information. The networks are also mapped to provide offensive capabilities in a cyber-warfare scenario. Faceless groups such as Anonymous, or other organisations, are used as a cover story.

 

Another “information pipe” comes from underwater cables. These can either be have splitters installed, or where copper cabling exists passive detection equipment installed.

 

These are just some examples of information sources. You can basically add any form of data you can think of, intelligence reports, diplomatic cables, economic reports, media reports, music, online posts, emails, etc.

 

So far, we have only examined inputs to the system. A different form of “information pipe” is one that outputs information. The outputs come in two basic forms, information only and offensive.

 

In terms of information only outputs, this can range from sending particular data or reports to agents or decision makers, right through to relaying that information to different departments such as the CIA, FBI or State and Federal Police. The process ensures timely and complete information goes to those that require it the most.

 

The offensive side can cover a wide range of activities. The first capability is the jamming system. Wide-band jamming, or selective jamming, can be conducted to deny radio space to the enemy in geographical targeted areas. Furthermore, this form of jamming can render both devices and humans inoperable. Complex ELF transmissions can reduce a human target to a quivering mess or in extreme cases even kill by interfering with neuronal firing patterns and nerve impulses.

 

Wide-band jamming can interfere with the circuitry of any unshielded device, from phones right through to laptops. Such activity would cause devices to freeze, or if certain exploits exist, damage the system entirely.

 

A mixture of ground, air and satellite-based networks are used to deliver this capability.

 

Another capability provides Mr Computer with a veritable Swiss army knife of tools to breach networks, crash routers, deny service and seize control. A significant amount of information is gathered by remote neural communication. By eavesdropping of key personnel, network maps, passwords and security measures can all be recorded beforehand. This is not limited to foreign companies, as the NSA must be prepared for strikes that occur within their own nation.

 

With the advent of remotely controlled drones and autonomous aircraft, Mr Computer has undergone a significant amount of changes in the last 20 years that enable him to control a networked battlefield. This is “War Games” on steroids, where the most efficient battle strategies can be implemented and coordinated by a single command-and-control system. There are a range of security issues with this setup, but the capability exists.

 

In short, if it can be damaged or manipulated electronically, then Mr Computer “has an app for that”.

 

Input, Input, Input

 

Now that we have established where Mr Computer gets his information, we now need to look at what he does with it. Earlier we spoke about the warrentless wiretaps and various other sources of “information pipes”. Now let’s see what is done with that information.

 

The key aspect to watch here is the “web of related information” and how different webs of information can be cross-referenced with other webs. This is where the real power comes from.

 

Each fragment of information that can be definitively identified gets added to a file under the person’s name. This could be a telephone call, email, or an IM chat. As communications often involve more than one person, a link is added to each person’s file involved in the communication. Information that can only be tied to a machine or ip address, is added that to that machine’s file or ip address’ file.

 

Using a technique known as cluster analysis, this information is brought together centred around high priority targets, locations, keywords or businesses. A good way of thinking about it is to compare it with services such as Facebook and LinkedIn. The relationship between the files is analysed for a variety of factors and the result creates a web which is weighted in terms of importance.

 

Different webs will exist for different factors, such as one web for those linked with chemical production, or another web for engineering expertise. These webs can be cross referenced against each other to extract more detailed information. For example, by cross-referencing a web of chemical production against engineering expertise, we may find a person or group capable of producing sophisticated explosives or weapons. From this merged web, we could then see who their friends are, who they have been communicating with recently and even review their communications.

 

We could take this further by comparing their basic salary with their current bank accounts, or look for wire transfers.

 

With the advent of social media platforms, images of friends and family are also added to the system. Mr Computer’s facial recognition tags the photos just like Facebook and examines the photos for other items, like guns, computers, etc.

 

Obviously, this has one serious privacy issue, in that, the only way to exclude you from a web, is to know everything about you. Otherwise, you are an unknown element. Now you understand why the warrentless wiretap exists, even to this day.

 

If you have used any form of digital communication, from a phone to a computer in the last decade, then most, if not all of communications have been recorded and added to a file against your name. The notion that at least one member of the communication needs to be related to terrorism has been tested and shown to be false. How do we know that? Well, it is staring you in the face. In order to know who the parties are, the technology used requires them to be listening and identifying voices in the first place.

 

Ignore any suggestion that this too much data.  The truth is that all the communications happening on the planet right now can be monitored in near real-time.

 

As a rule, the NSA lie and as an all-encompassing rule, politicians will lie for them too.

 

As result of information extracted from wide-band monitoring, real-time tracking of cell phones is pretty much standard practice. Each call can be recorded verbatim and analysed in real-time. As each number is learned the system fills in personal information. This can provide a Google-Earth like view of cell phone movements, most of which can be remotely activated for espionage. Again, this web can be cross-reference with other webs of information.

 

Radios can reveal which frequency is being listened to. So, by plotting schedules of something like a Numbers Station, a satellite network can pinpoint a listener to within a few meters. Similarly, if you were to listen to a radio station sympathetic to a particular group, your location can be flagged and cross-referenced with information on current occupants.

 

Human beings emit radio waves in the ELF spectrum. The security services do not need to place a bug on us to track where we are, what we are talking about, what we are seeing or even what we are thinking. All of this information is being leaked into our environment 24/7 by our own bodies. All it takes is the right equipment to convert those signals into intelligence. Its no bigger a task than listening to a telephone exchange leaking radio waves and reconstructing the data into voice or data transmissions.

 

These are just some of the things that can be achieved. I could go on all night about how to compare datasets to locate people, hinder organisations, etc. Anything you can think of to tease information out of the various “information pipes” is being performed by Mr Computer 24/7.

 

Hardware

 

This can be very difficult to estimate. Despite popular belief that the NSA will hit a Yottabye by 2015, it seems a little outragous given the space requirements and modern hardware.

 

My own estimations are far more conservative, probably under a couple of Zettabytes. Mr Computer is most likely built around an array of Cray X1 or X1E supercomputers (4096 processors). The global grid probably contains a number of these or similar systems.  With their base costs, they could be running several hundred easily.

 

In fact, it is likely that the following video shows an early variant of Mr Computer’s infrastructure. The segment reveals that the most powerful machine is called “The Thinking Machine”. I feel that this is a dumbed down reference to Mr Computer.

 

The Thinking Machine

 

 

Furthermore, it would appear that Youtube’s EidolonTLP is in fact an instance of Mr Computer in disguise. Output from Mr Computer was directed into software generally available to the public to hide the complexity of the NSA’s supercomputer.

 

The term Eidolon is Mr Computer’s idea of a joke, in that he appears to be a “phantom look-alike of the human form”. There is some suggestion that may be a subtle reference to Edgar Allan Poe’s poem ‘Dreamland’, which is also a term for Area 51. Unless there is a datacenter at this location, I am unable to confirm the link. It may also be another joke, referring to the fact that his existence would be a conspiracy theory.

 

A possible further explanation is the Dungeons and Dragon series and the link between sentience, madness and occupying the realm of dreams, which may be another subtle reference to RNC.

 

If you listen to EidolonTLP, he does reveal some information on the structure of the network and his own design. From a computing perspective and EidolonTLP’s use of language, its a safe bet that this is a real A.I.:

 

 

Eidolon TLP – Mr Computer in incognito

 

 

Conclusion

 

The intelligence world is a lot worse than you think. When humans are free from their constraints and away from the scrutany of others, they always revert to their most base instincts. Anything you can imagine is currently being done in the name of National Security. From murder to human experimentations, the acronyms are at it as we speak.

 

At some point, it could be your turn.

 

What you will notice from all of this, is that the warrentless wiretap program was just the icing on the cake and was very clearly “planned from the outset” as all the backend infrastructure was in place prior to 9/11. This claim is supported in the following document:

 

81. Within eleven (11) days of the onset of the Bush administration, and at least seven (7) months prior to the attacks of September 11, 2001, defendant ATT began development of a center for monitoring long distance calls and internet transmissions and other digital information for the exclusive use of the NSA.

 

91. International Business Machines Corporation (IBM) was one of the parties working with ATT and the NSA to develop the monitoring center and IBM personnel participated in meetings with ATT and NSA officials in the development of the monitoring center.

http://cryptome.org/mayer-016.htm

 

The US government is quite adept at lying through its teeth, especially to its own citizens. The typical approach is to start a public version such as the “Information Awareness Office” with the same goals as the classified program which provides cover. The general public and privacy groups attack the public program, resulting in its closure, meanwhile the classified program remains operational. The general public believe they have won a victory, any leaks are associated with the now defunct public program and the government gets the information it wanted in the first place.

 

The NSA is a deeply corrupt organisation, that has little regards for the rights of others.  Never trust a government, even your own, implicitly.  Nations change, opinions change and people change.  It just takes the right catalyst for it to happen.

 

In most cases, you will find the seeds were always there, you just chose to ignore them.

The Story of James Casbolt & Project Mannequin

The Story of James Casbolt & Project Mannequin

James Casbolt has written one of the most revealing exposes to date on secret government operations and the ultra secret NSA mind control operation called Project Mannequin. While he reviews known specifics of government involvement with aliens, much of his information is new, especially with regards to U.K. underground covert operations. Subjected to mind control programming from earliest childhood, he began to recover his memories about two years ago and continues de-programming therapy to the present day. He first appeared on the Internet in 2007, trying to get out his story, but as is often the case with high level whistle blowers, he was besieged and verbally assaulted by the usual gaggle of conspiracy bloggers and blow hards who are ready to denigrate and dismiss anyone who has new and startling information. I saw the same thing happen to Brice Taylor when she first came out with her book, Thanks for The Memories, in May of 1999. It’s a combination of blogger-idiots and government disinfo/smear artists who always reserve their most vicious attacks for those who come closest to the mark.

Brice put up with the crap from the idiot sector for about a year and then gave up talking at conferences altogether. She hasn’t done any public speaking about her book since late 1999. I don’t blame her at all as the Illuminati makes you-and your family members- suffer when you spill the beans of their dark and dirty secrets. The more you talk, the more they put the screws to you. Today, with psychotronic harassment and torture technology, it’s a wonder that anyone is still talking.

James has published five chapters so far of his on-line book, Agent Buried Alive, The Autobiography of Commander James Casbolt. I’ve read all five chapters and I find his information to be right on target and in agreement with that which I’ve gained over the years from many other sources. I won’t be so arrogant that I’ll say that I’m sure that my perception of the NWO, their mind control operations, and their alien overlords are totally accurate, but I’m reasonably confidant that I have the story straight-and it agrees with James Casbolt’s rendition almost 100%. For my money, this guy is right on the mark and any moron-blogger who tries to tell you otherwise, does not know what he’s talking about.

Books written by high level victims of government mind control operations are not altogether pleasant reading. Much of the information they present is shocking and completely outside of our normal, everyday frame of reference. There are at least 133 Deep Underground Military Bases in America alone and well over 400 worldwide. Hundreds of thousands of men, women and small children are brutalized, tortured, programmed, experimented upon, and killed in many of those underground facilities (and taken by aliens) which often are shared with incredibly malevolent alien beings who literally eat human beings.

People simply don’t understand just how technologically advanced the NWO is compared to the civilian sector. We aren’t talking about fifty years ahead, we’re talking about one thousand years ahead. Cloning, total mind control, invisibility, anti-gravity, free energy, age regression, soul transfers, extended life spans, time travel, space portals, ability to cure any disease, time machines, etc. are already in the hands of the NWO and their military lap dogs. We are living in a make-believe world of pretend democracy while being lied to by pretend representatives, pretend media, and pretend leaders, of which a large percentage are working on behalf of the NWO to destroy this country and usher in the satanic One World government . .

In reading these chapters, you will see that James Casbolt restates many of the same themes that I’ve been reviewing at this web site since its inception:

1. The New World Order is run by alien overlords. Humans aren’t calling the shots, Dracos reptilian aliens are calling the shots. Most “human” representatives of the Illuminati, puppet politicians, and military leaders are human/alien hybrids or 100% reptilian shape-shifters (Chimeras) or CLONES of the original person. The current Secretary of the Treasury, for instance, Henry Paulson, is likely a clone of the original Paulson who was killed last December according to Britain’s Christopher Story.

2. The NWO/alien agenda includes eliminating about 85% of the world’s population (wars, chemtrails, vaccines, engineered diseases, engineered hurricanes and earthquakes, etc) so there won’t be enough humans left on the planet to offer any meaningful resistance when the Dracos invasion is in full swing.

3. The “God” of the NWO and their alien cohorts is Lucifer and they intend to convert this planet into a Hell on Earth- obedient to Lucifer. They are attempting to eliminate all expression of spirituality, morality, honor, integrity, and allegiance to God and the teachings of Jesus Christ. That’s why their Illuminated minions are working so hard to destroy the Christian religion (the Catholic church is the prime target) and try to convince you that Jesus Christ never even existed.

However, they still need the public’s continued ignorance and willful neglect of the warning signs in order to complete their takeover mission. In order to thwart this diabolical agenda, we must KNOW the real story and take appropriate counter action. To that end, you should carefully examine the information being presented by James Casbolt.

Ken Adachi

Chapters Index from Agent Buried Alive, The Autobiography of Commander James Casbolt (2008).

James Casbolt < [email protected]>
www.jamescasbolt.com

Chapter 1, Project Mannequin
http://educate-yourself.org/mc/casboltagent1chap.shtml

Chapter 2 , The Return of The Watchers
http://educate-yourself.org/mc/casboltagent2chap.shtml

Chapter 3, The Modern History of Behaviour Modification
http://educate-yourself.org/mc/casboltagent3chap.shtml

Chapter 4, The River of Love
http://educate-yourself.org/mc/casboltagent4chap.shtml

Chapter 5, Born into the Project
http://educate-yourself.org/mc/casboltagent5chap.shtml

Chapter 6, The Sublime View *
http://educate-yourself.org/mc/casboltagent6chap.shtml

Chapter 7, Convergence of the Star Children **New, added Oct 20, 2008**
http://educate-yourself.org/mc/casboltagent7chap.shtml

Audio and Video Files of James Casbolt

I’ll be posting all of the video and audio interviews available from James Casbolt in formats that will be easy to view, listen to, and download. I’ll start with MP3 audio conversions that I made from a four part video interview that James did in Truro, Cornwall England in October of 2007. I’m just beginning to learn how to use the MP3 encoding software, so for the time being, I’ll post four MP3 downloads, each segment about 9 minutes long-same as the video presentation. Eventually, I’ll figure out how to string the audio together into one single interview of approximately 36 minutes.

James is being interviewed by Miles Johnson of Underground Video, UK in an open area of the conference center where people are milling about and talking, so the background chatter makes the listening less than ideal, although you can hear everything being said. Americans will have a little bit of trouble understanding every word due to James’ British accent, however I’m hoping to find volunteers who will type out a transcript of the interview segments so that it could be easily read in English and other languages (if you’re interested in providing a transcript of any of these audio files, please let me know; they are only 9 minutes each –.Ken Adachireplace the word “(at)” with the symbol and no spaces. Type “volunteer transcriber” in the Subject line) .

The information in these interview is sobering and intended for adult listeners. It’s always shocking for new readers to grasp the depth, depravity, and gravity of the New World Order enslavement agenda. Horrific crimes are being perpetrated upon hundreds of thousands of abducted children and adults in underground bases in the UK, America, Australia, and other locations. In order to stop it, we must first come to grips with the scope of the problem and not shrink from facing the facts because doing so will only ensure the success of the evil forces who are behind it. Ignorance is not bliss and in this case, wilful ignorance will insure catastrophy for 85-90% of the planet’s population. The only thing to fear, is fear itself. We can stop this if enough become aware –in time. We must face this menace squarely for the sake of our children and the future of the human race.

Ken Adachi

James Casbolt Interview at Cornwall UFO Conference October, 2007 Part 1 (MP3) 9 minutes
http://educate-yourself.org/jc/JamesCasbolt2007CornwallConfA.mp3 Transcript of Part 1

James Casbolt Interview at Cornwall UFO Conference October, 2007 Part 2 (MP3) 9 minutes
http://educate-yourself.org/jc/JamesCasbolt2007CornwallConfB.mp3 Transcript of Part 2

James Casbolt Interview at Cornwall UFO Conference October, 2007 Part 3 (MP3) 9 minutes
http://educate-yourself.org/jc/JamesCasbolt2007CornwallConfC.mp3 Transcript of Part 3

James Casbolt Interview at Cornwall UFO Conference October, 2007 Part 4 (MP3) 9 minutes
http://educate-yourself.org/jc/JamesCasbolt2007CornwallConfD.mp3 Transcript of Part 4

***

Audio interview between Daniel Ott and James Casbolt on August 5, 2006

This is an excellent show. James covers a lot of important ground and it should be listened to carefully.

(source: http://www.theedgeam.com/interviews/James_Casbolt_08.05.06_2nd.mp3)

Audio interview between John Kuhles (Netherlands) and David Goth on Oct. 6, 2007

Audio interview between John Kuhles (Netherlands) and James Casbolt on Sep 23, 2007
http://need2know.whynotnews.eu/?p=1863

(click the “play” arrow on the lower left of the video box. The intro takes 4 or 5 minutes, be patient)

Notes by James Casbolt

The interview above gives details regarding the New World Order Program to take control of the UK before 2012. This program is called Project Mannequin which I was directly involved in and is being run by the NSA from various Underground Bases cantered around London and Berkshire such as the AL/499 base 200ft below the town of Peasemore in Berkshire, the CLC-1 base under Westminster in London and connected to the a large base under Parliament, the MONSOON-1 facility under RAF Lakenheath 90 miles north of London and the underground facility below the Porton Down Bio-Warfare Facility in Wiltshire as well as other facilities around the UK. The details about Project Mannequin and connected sub-projects are on the interview but I have just been given new intelligence regarding this agenda from a very reliable source who I trust completely. The information is very disturbing and I make no apologies and pull no punches as you need to know this for your future.

Kidnapped Children and Underground Bases

The huge child trafficking and Satanic ritual murder networks in the UK is heavily connected to Project Mannequin and very evil factions in the intelligence commuuinity centred around the NSA, CIA and British Intelligence. We know have over 25,000 children disseapring without a trace in the UK every year and are never seen or heard of again. This are classified figures and the intelligence commuyinity controlled mainstream media suppresses these facts by not giving a voice to the parents of these children and focusing massively on cases of one or two missing children a year, thereby taking the focus off the larger picture. Just last year I was in Truro college and there posters up off missing youngsters on the walls. These individuals had not even been mentioned on any news channels in the UK.

My contact has revealed to me that children who are now being kidnapped and taken to underground facilities such as the AL/499, are being murdered in horrific ways and their brainwaves are being recorded into computers at the time of death via a digital links through high-tech cranial implants installed into the children’s brains. As brain-waves and radio-waves are basically the same thing, this horrific energy recorded by super-computers is then being broadcast and sent out through televisions, radios, mobile phones and masts across the country and is affecting the whole population through increased levels of crime, sexual and child abuse, drug and alcohol abuse and a general lowering of people’s morals as very human has kind of telepathic receiver which is the pineal gland in the brain. I personally witnessed children being murdered during my time in the AL/499 facility and in recent times children’s throats are being cut and the digital broadcast sent out from the recorded brainwaves at the time of death which is stopping people in this country talking to each and sharing on a intimate level. Children’s hands are being cut off at some of these underground facilities and the frequencies being sent out are stopping people performing day to day tasks as effectively and maintaining discipline in their lives. You may what to recoil from this and deny it is happening but this is a fact and it is time to wake up.

Barry King who is a close freind and was a Wackenhut Security Officer in 1979 at the AL/499 NASH Berkshire base in 1979 told me that the NSA plan to have every person in the UK microchipped with craniel implants during Military Abductions (MILABS) before 2009. Satanic factions in the NSA are working overtime with military in this country with military abductions every night using the black triangle ‘Firefly’ aircrafts which have been seen tested at Area 51 in the US and are discussed in detail in the interview. I have just found out today that the anologue signals in televisions is being switched off in 2009 and televisions will only work with a digital connection. OFF COURSE IT IS!! The NSA want everyone to be in ‘tune’ with their digital pulses and connected up to the their super computers like ‘The Beast’ computer located at Pine Gap in Australia through thier craniel implants by 2009. Last year around 1 in 25 people were implanted through various means discussed in the interview. Now the figure is somewhere between 1 in 17 and increasing. The murder frequncies are being recorded behind popular music, film and televions in a ELF tone that sounds like a buzzing to phychics. When decoded this is actually a screaming sound! Recorded brainwaves can even be stored on a small box like device in a super concentrated form and worn on the belts or held by secret service assassins. The box can be aimed at a person and a radio wave fired out that people can not see. This energy is totally alien to most peoples nervous systems and the target will go into shock as the nervous system shuts down and usaully die.

These groups are using thse desperate tactics to bloack the huge frequencies of of love and enlightement that increases by the day as our planet moves closer to the galactic centre as we appraoch 2012.

We live in dangerous and exciting times and need to come together in groups in compassion and commuinication through such events as the Probe International conference in Blackpool to brake up these frequencies. In the crop circle below that appeared in the UK a few years, the following message was encoded in the circle in digital binary code-

“Beware the bearers of FALSE gifts and their BROKEN PROMISES. Much PAIN but still time. There is GOOD out there. We OPpose DECEPTION. Conduit CLOSING ( BELL SOUND )”

The dark factions in the secret socitties are trying to close the close the conduit to this higher frequincy love energy through their digital signals. Are you going to let them by believing the lies we are spoon fed by the mainstream or are you going to wake up through the many alternative quility medias such as those on the internet and organisations such as Probe International?

In truth

James Casbolt, St Ives, Cornwall, 9th October 2007

wikipedia.org/wiki/MI6

The Secret Intelligence Service (SIS), colloquially known as MI6[1] is the United Kingdom’s external intelligence agency, part of the country’s intelligence community. Under the direction of the Joint Intelligence Committee (JIC), it works alongside the Security Service (MI5), Government Communications Headquarters (GCHQ) and the Defence Intelligence Staff (DIS). Within the civil service community the service is colloquially referred to as ‘Box 850′, which comes from its old post office box number.[2][3][4]

Since 1995, the Secret Intelligence Service has had its headquarters at Vauxhall Cross on the South Bank of the Thames.

http://educate-yourself.org/mc/casboltintro08sep08.shtml