Dec 11

- NSA uses Google cookies to pinpoint targets for hacking (Washington Post, Dec 10, 2013):

A slide from an internal NSA presentation indicating that the agency uses at least one Google cookie as a way to identify targets for exploitation. (Washington Post)

The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using “cookies” and location data to pinpoint targets for government hacking and to bolster surveillance.

The agency’s internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government. The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations.

Continue reading »

Tags: , , , , , , , , , , , , , , ,

Dec 06

- Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet (Wired, Dec 5, 2013)

Tags: ,

Dec 04

- The Government’s Secret Plan to Shut Off Cellphones and the Internet, Explained (Mother Jones, Nov 26, 2013)

Tags: , , , , , , , ,

Nov 19

- The Rise of the Decentralized Web Continues (LibertyBlitzkrieg, Nov 15, 2013):

I know I must sound like a broken record by now, but decentralization is without question the key to humanity’s future freedom and prosperity on planet earth. The good news is that many of our smartest minds are aware of this and are actively working on solutions at the grassroots level. It goes without saying that the Internet itself is one of the most revolutionary advances our species has ever achieved, and decentralization of this information flow and access must be one of our key objectives, particularly in light of NSA spy revelations.

One of the ways that communities across the world are fighting for ownership of the Internet is through localized meshnets, a topic I covered in my piece back in August: Meet The Meshnet: A New Wave of Decentralized Internet Access.

This has been one of the more interesting themes I have learned about in 2013, and one that is only likely to spread in the years ahead. The New York Times recently wrote an article on it with some great new information. Some key excerpts are below: Continue reading »

Tags: , , ,

Nov 16

- The Internet Is Now Weaponized, And You Are The Target (ZeroHedge, Nov 15, 2013):

By now, thanks to Edward Snowden, it is common knowledge and not just conspiracy theory, that every bit of information sent out into the wired or wireless ether is scanned, probed, intercepted and ultimately recorded by the NSA and subsequently all such information is and can be used against any US citizen without a court of law (because the president’s pet secret NISA “court” is anything but). Sadly, in a country in which courtesy of peak social networking, exhibitionism has become an art form, the vast majority of Americans not only could not care less about Snowden’s sacrificial revelations, but in fact are delighted the at least someone, somewhere cares about that photo of last night’s dinner. However, it turns out that far from being a passive listener and recorder, the NSA is quite an active participant in using the internet. The weaponized internet.

Because as Wired reports, “The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks.” And the primary benefactor: the NSA – General Keith Alexander massive secret army – which has now been unleashed against enemies foreign, but mostly domestic.

Enter the QUANTUM program…. Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Nov 11

- The U.S. Secret State and the Internet: “Dirty Secrets” and “Crypto Wars” from “Clipper Chip” and ECHELON to PRISM (Global Research, Nov 10, 2013):

Back in the 1990s, security researchers and privacy watchdogs were alarmed by government demands that hardware and software firms build “backdoors” into their products, the millions of personal computers and cell phones propelling communication flows along the now-quaint “information superhighway.”

Never mind that the same factory-installed kit that allowed secret state agencies to troll through private communications also served as a discrete portal for criminal gangs to loot your bank account or steal your identity.

Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Nov 11

- UK spies continue “quantum insert” attack via LinkedIn, Slashdot pages (Ars Technica, Nov 10, 2013):

Targets included engineers at Global Roaming Exchange providers and OPEC

According to a new report (German) by Der Spiegel, the British signals intelligence spy agency has again employed a “quantum insert” technique as a way to target employees (Google Translate) of two companies that are GRX (Global Roaming Exchange) providers.

The lead author of the story in the German magazine is Laura Poitras, one of the journalists known to have access to the entire trove of documents leaked by former National Security Agency contractor Edward Snowden.

GRX is roughly analogous to an IX (Internet Exchange), and it acts as a major exchange for mobile Internet traffic while users roam around the globe. There are only around two dozen such GRX providers globally. This new attack specifically targeted administrators and engineers of Comfone and Mach (which was acquired over the summer by Syniverse), two GRX providers.

Der Spiegel suggests that the Government Communications Headquarters (GCHQ), the British sister agency to the NSA, used spoofed versions of LinkedIn and Slashdot pages to serve malware to targets. This type of attack was also used to target “nine salaried employees” of the Organization of Petroleum Exporting Countries (OPEC), the global oil cartel.

Continue reading »

Tags: , , , , , ,

Nov 07

- 14 Facts About The Absolutely Crazy Internet Stock Bubble That Could Crash And Burn In 2014 (Economic Collapse, Nov 5, 2013):

Shouldn’t Internet companies actually “make a profit” at some point before being considered worth billions of dollars?  A lot of investors laugh when they look back at the foolishness of the “Dotcom bubble” of the late 1990s, but the tech bubble that is inflating right in front of our eyes today is actually far worse.  For example, what would you say if I told you that a seven-year-old company that has a long history of not being profitable and that actually lost 64 million dollars last quarter is worth more than 13 billion dollars?  You would probably say that I was insane, but the company that I have just described is Twitter and Wall Street is going crazy for it right now.  Please don’t get me wrong – I actually love Twitter.  On my Twitter account I have sent out thousands of “tweets”.  Twitter is a lot of fun, and it has had a huge impact on the entire planet.  But is it worth 13 billion dollars?  Of course not.

When it comes to the Internet, what is hot today will probably not be hot tomorrow. Continue reading »

Tags: , , , , , ,

Nov 07

FYI.


- Silk Road 2.0 Has Been Born…New Website Mocks the Feds (Liberty Blitzkrieg, Nov 6, 2013):

The “authorities” can shut down website after website, but the tide of new technology and the human spirit itself cannot and will not be overcome. This is the hard lesson that statists and collectivists will be learning the hard way in the years to come, as decentralization and freedom stage a gigantic, peaceful revolution. A revolution that is already in full swing and gaining tremendous momentum with each passing day.

It took only a little over a month for Silk Road 2.0 to launch on the “dark web,” and there are already close to 500 illegal drug listings. As part of the new service there is even a new security feature that allows users to use their PGP encryption key as an extra authentication measure. The login page itself is even a parody of the Department of Justice’s seizure of the original site in early October. This is what you see when you visit:

More from Forbes:

On Wednesday morning, Silk Road 2.0 came online, promising a new and slightly improved version of the anonymous black market for drugs and other contraband that the Department of Justice shut down just over a month before. Like the old Silk Road, which until its closure served as the Web’s most popular bazaar for anonymous narcotics sales, the new site uses the anonymity tool Tor and the cryptocurrency Bitcoin to protect the identity of its users. As of Wednesday morning, it already sported close to 500 drug listings, ranging from marijuana to ecstasy to cocaine. It’s even being administered by a new manager using the handle the Dread Pirate Roberts, the same pseudonym adopted by the previous owner and manager of the Silk Road, allegedly the 29-year-old Ross Ulbricht arrested by the FBI in San Francisco on October 2nd.

Continue reading »

Tags: , , , , ,

Oct 31

- How The NSA Spies On Your Google And Yahoo Accounts (ZeroHedge, Oct 30, 2013):

It’s quite simple really, and as the WaPo explains, the NSA “has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials. By tapping those links, the agency has positioned itself to collect at will from among hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.”

In a nutshell – 181,280,466 new records in 1 month:

Continue reading »

Tags: , , , , , , , , , , , , , , , , ,

Oct 13

- Brazil to host global internet summit in ongoing fight against NSA surveillance (RT, Oct 10, 2013):

Brazilian leaders have announced they plan to host an international conference on internet governance next year, a declaration that comes after the nation has lobbied without success to change NSA policies used by the US to monitor Brazil.

President Dilma Rousseff, after consulting with Fadi Chehade, chief executive of the Internet Corporation for Assigned Names and Numbers (ICANN), announced via Twitter a conference would be held in April.

We have decided that Brazil will host in April 2014 an international summit of government, industry, civil society and academia,” she wrote tweeted Wednesday.

The ongoing leaks from whistleblower Edward Snowden revealed that Brazil has become a favorite target of the National Security Agency since the US intelligence program launched the PRISM electronic surveillance program in 2007. Along with monitoring the online activity of Brazilian citizens, the NSA has quietly kept watch on diplomatic activity and the South American nation’s oil giant Petrobras.

Continue reading »

Tags: , , , , , , , , , , ,

Oct 10

- Warning: Enrolling in Obamacare allows government to link your IP address with your name, social security number, bank accounts and web surfing habits (Natural News, Oct 10, 2013):

We have already established that Healthcare.gov is not a functioning database application that allows people to shop for competing health plans. It is actually a government-run Trojan Horse that suckers people into creating accounts where they hand over:

• Name and address
• Email address and password
• Social security number
• Private bank account details
• Employer details and other information

During the enrollment process, your computer also hands over your IP address which is then tied to your social security number.

This IP address is then handed over to the NSA thanks to its new mega-black-hole data center in Utah, where your IP is cross-referenced with all website visits, including:

• “Anti-government” websites
• Porn sites
• Gambling sites
• File sharing sites
• “Terrorism” support sites
• Encryption service sites like Hushmail
• Chat rooms, message boards and more

Armed with this information, the NSA can then link your seemingly-anonymous online chats, comments and posts with your social security number. Linguistic algorithms can “score” your online posts to create red flags that call for additional investigations of anyone using words like “liberty” or “patriot.”

Continue reading »

Tags: , , , , , , , , , , , , , , ,

Oct 09

FYI.

Related info:

- NSA Chief Admits: ‘Only One Or PERHAPS Two’ Terror Plots Stopped By Spy Program


Sir Andrew Parker mounts strident defence of UK intelligence and denies MI5 seeks ‘all-pervasive security apparatus’


The Snowden files revealed GCHQ, pictured, was harvesting vast quantities of personal information from mobile phones and apps. Photograph: GCHQ/MoD/EPA

- MI5 chief: GCHQ surveillance plays vital role in fight against terrorism (Guardian, Oct 9, 2013):

The new head of MI5 launched a robust defence of the techniques used by Britain’s intelligence agencies in his first speech since taking the job and warned they would not be able to sustain current levels of counter-terrorism work without the help of surveillance from GCHQ.

However, Sir Andrew Parker also acknowledged that the growth of the internet, technology and big data was “transforming our society” and that significant choices had to be made about which capabilities were required to track terrorists in this new and different world.

Continue reading »

Tags: , , , , , , , , , , , ,

Oct 05

- Government Lies About Spying Again and Again … Here’s What’s REALLY Going On (ZeroHedge, Oct 4, 2013):

Government Officials Fail Honesty Standards of 12 Year Olds

Government leaders have been caught in lie after lie about spying … but keep on spouting new lies:

The Government Is Spying On Everything

Despite dishonest proclamations to the contrary, the government is – in reality – spying on everything: Continue reading »

Tags: , , , , , , , , , , , , , , ,

Sep 30

Any computer metadata picked up by NSA collection systems is routed to the Marina database, the guide explains. Photograph: Felix Clay

- NSA stores metadata of millions of web users for up to a year, secret files show (Guardian, Sep 30, 2013):

• Vast amounts of data kept in repository codenamed Marina
• Data retained regardless of whether person is NSA target
• Material used to build ‘pattern-of-life’ profiles of individuals
What is metadata? Find out with our interactive guide

The National Security Agency is storing the online metadata of millions of internet users for up to a year, regardless of whether or not they are persons of interest to the agency, top secret documents reveal.

Metadata provides a record of almost anything a user does online, from browsing history – such as map searches and websites visited – to account details, email activity, and even some account passwords. This can be used to build a detailed picture of an individual’s life.

The Obama administration has repeatedly stated that the NSA keeps only the content of messages and communications of people it is intentionally targeting – but internal documents reveal the agency retains vast amounts of metadata.

Continue reading »

Tags: , , , , , , , , , , , , ,

Sep 27

- The Ugly Face of Tyranny: Feinstein Comes For Your Right To Speak Freely Online (SHFTplan, Sep 26, 2013):

Senator Dianne Feinstein has taken up the fight for truth and liberty, just as she has done for health care and the widespread disarmament of American citizens.

This month Congess has been debating a new media shield law, which according to its authors, aims to protect journalists and bloggers from being forced to testify about their work should their sources or information come into question.

Continue reading »

Tags: , , , , , , , , , , ,

Sep 14

- Hackers For Government Hire: A Growing and Deeply Disturbing Industry (Liberty Blitzkrieg, Sep 14, 2014):

Wikileaks recently continued the release of what they refer to as the “Spy Files.” These files provide a look into some of the companies behind the rapid commercialization of the spy equipment industry, who’s clients include repressive governments and dictatorial regimes around the world. In a press release announcing these files Wikileaks states:

Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale.

The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights.

One of the companies highlighted is an Italian based company called Hacking Team, a firm I had never heard of or read about until I came across an article from The Verge yesterday. What I read was pretty terrifying.

The Verge explains that: Continue reading »

Tags: , , , , , ,

Sep 13

- Google knows nearly every Wi-Fi password in the world (Compputerworld, Sep 12, 2013):

If an Android device (phone or tablet) has ever logged on to a particular Wi-Fi network, then Google probably knows the Wi-Fi password. Considering how many Android devices there are, it is likely that Google can access most Wi-Fi passwords worldwide.

Recently IDC reported that 187 million Android phones were shipped in the second quarter of this year. That multiplies out to 748 million phones in 2013, a figure that does not include Android tablets.

Many (probably most) of these Android phones and tablets are phoning home to Google, backing up Wi-Fi passwords along with other assorted settings. And, although they have never said so directly, it is obvious that Google can read the passwords.

Sounds like a James Bond movie.

Continue reading »

Tags: , , , , , ,

Sep 13

- Behold Twitter’s Thought Leader Titans (ZeroHedge, Sep 13, 2013):

500 million users, 170 billion tweets, $10 billion valuation… and these are the four people whose 140-character enunciations are followed the most…

Tags: , , , , ,

Sep 13


YouTube Added: 14.08.2013

From the article:

“… a girl who does not reveal her identity, talks with heartbreaking candour about how she would do anything for her BlackBerry; when a gang of boys takes it from her she recounts how she endured sexual assault in order to have it back.”


Beeban Kidron, at her Suffolk home: ‘There is a new world order and our children are carrying it around in their pockets.’ Photograph: Suki Dhanda for the Observer

- Beeban Kidron: ‘We need to talk about teenagers and the internet’ (Guardian, Sep 8, 2013):

The boy addicted to porn; the girl who endured sexual assault to get her BlackBerry back… In Beeban Kidron’s sobering documentary British teenagers open up about how they use and feel about their smartphones and the internet

When Beeban Kidron makes a film, she says, she always tends to start on the street. InRealLife, which is a film no parent and no teenager should miss, began in exactly that way. She went out with her camera and started talking to a group of lads in London. “What is the best thing about the internet?” Kidron wondered. One of the boys, a 15-year-old called Ryan, answered her without hesitation. “Porn,” he said. The following day Kidron – who began her film-making career more than 30 years ago when she took a camera with her to Greenham Common – phoned Ryan to see if he might want to talk further about his answer; she talked, too, to his mother, and eventually she was invited into the great terra incognita of contemporary life, the teenage bedroom.

Continue reading »

Tags: , , , , , , ,

Sep 08

German Chancellor Angela Merkel holds a BlackBerry Z10 smart phone: Will the company face a setback following claims the NSA can spy on its phones? (REUTERS)

- Privacy Scandal: NSA Can Spy on Smart Phone Data (Spiegel, Sep 7, 2013):

SPIEGEL has learned from internal NSA documents that the US intelligence agency has the capability of tapping user data from the iPhone, devices using Android as well as BlackBerry, a system previously believed to be highly secure.

The United States’ National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. Top secret NSA documents that SPIEGEL has seen explicitly note that the NSA can tap into such information on Apple iPhones, BlackBerry devices and Google’s Android mobile operating system.

The documents state that it is possible for the NSA to tap most sensitive data held on these smart phones, including contact lists, SMS traffic, notes and location information about where a user has been.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , ,

Sep 08

FYI.


- Why I think the NSA is lying (Sovereign Man, Sep 6, 2013):

“At what point do we just start calling these guys the Stasi,” asked a friend of mine over coffee today.He was, of course, referring to the latest news out of the Guardian– the same British paper that published Edward Snowden’s original whistleblowing interview.

First the world learning that the NSA’s PRISM program monitors almost ALL Internet traffic, worldwide. Now the Guardian reports that the NSA and its British counterpart GCHQ have ‘cracked codes’ across the Internet that were once thought uncrackable.

Continue reading »

Tags: , , , , , , , , , ,

Sep 07

- Rolling Stone Profiles Barrett Brown: Journalist, Activist and American Political Prisoner (Liberty Blitzkrieg, Sep 7, 2013):

“I mean Texans and indictments…it’s like a Texas Bar Mitzvah.  My dad was indicted, you know, I have friends that have been indicted, have gone to prison…it happens.
- Barret Brown during an RT Interview, a year before being raided by the FBI and subsequently incarcerated.

Barrett Brown is one of those figures that immediately captured my attention after first learning about him while watching the Anonymous documentary We are Legion. I soon realized that he had been incarcerated a mere three months prior to me serendipitously stumbling upon the film. It wasn’t difficult to see that he must have been onto something very, very big for the Feds to go after him so aggressively. You don’t charge a person with 105 years in prison merely as revenge for a youtube video in which you threaten an FBI agent. No, there was something much deeper going on here.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , ,

Sep 03


Screenshot from Reddit.com

- Reddit moderator pushed for RT ban ‘simply because it’s Kremlin’ (RT, Sep 1, 2013):

The reason RT.com was banned on Reddit’s /r/news section may not be spam or vote manipulation, as was stated officially, but “simply because it’s Kremlin.” This was revealed by a user from his discussion with one of the subreddit’s moderators.

RT.com was banned from /r/news this Thursday on accusations of “spam and vote manipulation”, with no evidence of the violations being presented by the moderators, who said that this information was only for “internal” use.

The move caused uproar among the reddit users as the drama was then taken to another subforum, /r/worldnews, where several things were eventually revealed.

Continue reading »

Tags: , , , , , , , ,

Sep 01

- Brzezinski: ‘Global Political Awakening’ Making Syrian War Difficult (Storyleak, Aug 29, 2013):

During a short interview with Germany’s DW News last Monday, former US National Security Adviser and Trilateral Commission co-founder Zbigniew Brzezinski commented on the growing inefficiency of war due to the increased political knowledge of the public.

“Given the contemporary reality of what I have called in my writings ‘Global Political Awakening,’ a policy of force based primarily on Western and in some cases former colonial powers does not seem to me a very promising avenue to an eventual solution to the regional problem,” said Brzezinski, referring to the situation in Syria.

Despite Brzezinski’s noted long-term relationship with Obama which included a top foreign policy adviser position, Brzezinski denied any specific knowledge of his plans regarding Syria, saying that if the administration has a strategy, it’s a “very well-kept secret.”

Obama’s Middle Eastern strategy has been a mere continuation of the policies seen under Bush, exemplified by former four star general and NATO commander Wesley Clark’s admission of the Bush-era Pentagon plan to overthrow several countries including Libya and Syria.

Continue reading »

Tags: , , , , , , , , , , , , , , , , ,

Aug 31

- What To Expect During The Next Stage Of Collapse (Alt-Market, Aug 29, 2013):

For years now at Alt-Market (and Neithercorp.us) I have carefully outlined the most likely path of collapse to take place within the U.S., and a vital part of that analysis included economic destabilization caused by a loss of the dollar’s world reserve status and petro-status.  I have also always made clear that this fiscal crisis event would not occur in the midst of a political vacuum.  The central banks and international financiers that created our ongoing and developing disaster are NOT going to allow the destruction of the American economy, the dollar, or global markets without a cover event designed to hide their culpability.  They need something big.  Something so big that the average citizen is overwhelmed with fear and confusion.  A smoke and mirrors magic trick so raw and soul shattering it leaves the very population of the Earth mesmerized and helpless to understand the root of the nightmare before them.  The elites need a fabricated Apocalypse. Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Aug 31

- India Moves to Ban Gmail (Liberty Blitzkrieg, Aug 31, 2013):

The fallout from the Snowden revelations continue. While India has already been attempting to fight economic reality with import duties on gold in an desperate move to reduce buying, they are now also trying to take further control of their technology infrastructure. Although this may appear to be a good thing on the surface, perhaps it is merely a move to further consolidate their own domestic snooping powers, which we already know they are trying to do.

In the latest news, it is being reported that the government will soon ask its employees to stop using Google’s Gmail due to the presence of the company’s servers within the U.S.

More from The Times of India:

BANGALORE/NEW DELHI: The government will soon ask all its employees to stop using Google’s Gmail for official communication, a move intended to increase security ofconfidential government information after revelations of widespread cyberspying by the US.

A senior official in the ministry of communications and information technology said the government plans to send a formal notification to nearly 5 lakh employees barring them from email service providers such as Gmail that have their servers in the US, and instead asking them to stick to the official email service provided by India’s National Informatics Centre.

Continue reading »

Tags: , , , , , , , , , , , , ,

Aug 31

And as you can see, the U.S. government told the Washington Post what to print and what not.

Another important & transparent leak you can believe in.

What real NSA whistleblower would trust the Washington Post anyway???

“There is no such thing, at this date of the world’s history, in America, as an independent press. You know it and I know it. There is not one of you who dares to write your honest opinions, and if you did, you know beforehand that it would never appear in print. I am paid weekly for keeping my honest opinion out of the paper I am connected with. Others of you are paid similar weekly salaries for similar things, and any of you who would be so foolish as to write honest opinions would be out on the streets looking for another job. If I allowed my honest opinions to appear in one issue of my paper, before twenty-four hours my occupation would be gone. The business of the journalists is to destroy the truth; to lie outright; to pervert; to vilify; to fawn at the feet of mammon, and to sell his country and his race for his daily bread. You know it and I know it, and what folly is this toasting an independent press? We are the tools and vassals of rich men behind the scenes. We are the jumping jacks, they pull the strings and we dance. Our talents, our possibilities, and our lives are all the property of other men. We are intellectual prostitutes.”
- John Swinton, former New York Times Chief of Staff


- New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking (Wired, Aug 29, 2013):

The latest published leak from NSA whistleblower Edward Snowden lays bare classified details of the U.S. government’s $52.6 billion intelligence budget, and makes the first reference in any of the Snowden documents to a “groundbreaking” U.S. encryption-breaking effort targeted squarely at internet traffic.

Snowden, currently living in Russia under a one-year grant of asylum, passed The Washington Post the 178-page intelligence community budget request for fiscal year 2013. Among the surprises reported by Post writers Barton Gellman and Greg Miller is that the CIA receives more money than the NSA: $14.7 billion for the CIA, versus $10.8 billion for the NSA. Until this morning it’s generally been believed that the geeky NSA, with its basements full of supercomputers, dwarfed its human-oriented counterparts.

The Post published only 43 pages from the document, consisting of charts, tables and a 5-page summary written by Director of National Intelligence James Clapper. The Post said it withheld the rest, and kept some information out of its reporting, in consultation with the Obama administration to protect U.S. intelligence sources and methods.

Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Aug 29

- Tor Usage Doubles Globally in the Wake of Snowden Revelations (Liberty Blitzkrieg, Aug 29, 2013)

Tags: , , , , ,

Aug 29

Flashback:

- Bilderberg 2013: Full List Of Attendees:

  • Peter A. Thiel, President, Thiel Capital

- Ron Paul’s Biggest Supporter Is Bilderberger, International Financier Peter Thiel

For your entertainment.


Tags: , , , , , , , ,