Dec 12

nsa-321

- Congress quietly expands NSA powers for spying on Americans (RT, Dec 12, 2014):

The campaign to rein in the surveillance of Americans by the National Security Agency (NSA) has become even more difficult. Instead, Congress has used a set of provisions to expand the agency’s data-gathering power.

By way of two pieces of legislation, Congress maintained and expanded the NSA’s surveillance powers. In a bill now headed for President Barack Obama’s desk, Congress gave the agency what civil liberties advocates argue is an unprecedented authority to collect and store data belonging to American citizens.
Continue reading »

Tags: , , , , , , , , , ,

Dec 07

- New Snowden Docs Reveal NSA Spy Tactic – A new report by The Intercept, exposes a massive program called Operation Aurora-Gold. (InvestmentWatch, Dec 5, 2014):

It’s been a popular topic in recent years. Now, we’re starting to learn even more. Edward Snowden blew the lid off of the NSA and their secret spy programs when he leaked their documents to the public. The federal government has been reeling ever since, looking for new ways to re-assert their grip on communications. Since Snowden leaked those documents, he’s been forced to seek political asylum in Russia, with threats of jail or imprisonment back here in the States. Continue reading »

Tags: , , , , , , , ,

Oct 29

- FBI Raids Federal Contractor’s Home – Has the Government Identified the “Second Leaker”? (Liberty Blitzkrieg, Oct 27, 2014):

Anyone who has been following Edward Snowden’s heroic whistleblowing, and the reporting of Glenn Greenwald on the classified documents that prove egregious violations of the United States Constitution by the NSA, will also be aware of speculation that a “second leaker” had emerged earlier this year. It appears this person may have been identified by the FBI.

Yahoo News’ Michael Isikoff reports that:

The FBI has identified an employee of a federal contracting firm suspected of being the so-called “second leaker” who turned over sensitive documents about the U.S. government’s terrorist watch list to a journalist closely associated with ex-NSA contractor Edward Snowden, according to law enforcement and intelligence sources who have been briefed on the case. Continue reading »

Tags: , , , , , , , ,

Oct 29

… which is why Barry Trower has no computer & internet:

- Former Royal Navy Microwave Weapons Expert And UK Intelligence Services Agent Dr. Barrie Trower: Dangers And Lethality Of Microwave Technology (Video – 2:19:36)

- Former Royal Navy Microwave Weapons Expert: NWO TECHNOLOGY UPDATE – Deadly Mobile Phones & The Worst Genocide Ever Committed – The Dangers Of Wi-Fi To Women And Children (Video)


- Former CBS Reporter Accuses Government of Secretly Planting Classified Docs on Her Computer (Liberty Blitzkrieg, Oct 27, 2014):

Attkisson speculated on how the Nixon controversy would have been handled in a world filled with today’s television and social media obsessions.

“Nixon would basically refuse to turn over tapes to Congress, his aides would refuse to testify to Congress or would take the Fifth or would lie to Congress with fair amount of impunity,” she said. “Woodward and Bernstein would be controversialized on social media by special and political interests. … Then at the end Nixon would go on a popular late-night comedy show, during which time he would humorously refer to his attackers as people who were political witch-hunters who believed in Area 51-type conspiracy theories.”

– From the Huffington Post article: Sharyl Attkisson Says Journalists Have ‘Gone Backwards’ Since Watergate Scandal

In case you forgot, Sharyl Attkisson is the former CBS News reporter who resigned from the network in March after expressing frustration that her stories covering the Obama Administration’s role in the Benghazi and Fast and Furious scandals were being spiked due to a desire to protect the President.

In 2013, Attkisson also expressed her belief that her computer had been hacked, which CBS News subsequently confirmed. CBS reported at the time: Continue reading »

Tags: , , , , , , , , ,

Oct 28



HLS Professor Lawrence Lessig interviewed Edward Snowden at Harvard Law School on Oct. 20.

Tags: , , , , , ,

Oct 24

- It’s Not Just Spying – How the NSA Has Turned Into a Giant Profit Center for Corrupt Insiders (Liberty Blitzkrieg, Oct 20, 2014):

Dear NSA Employees, You Now Have a Green Light to Loot and Pillage. It’s Time to Get Paid:

Are you just another one of those frustrated NSA employees who feels that unconstitutionally spying on your fellow citizenry under false pretenses isn’t giving you same thrill it once did? If so, have no fear.

Are you are sick and tired of having to spilt your precious working hours defending the destruction of our nation’s founding document to those pesky terroristic media dinosaurs who still think investigative journalism belongs in Amerika? If so, have I got a solution for you. 

While it may sound too good to be true, trust me it’s not. You see, in recent years almost all crony-capitalist criminal activities have been deemed legal in the land of the free (to pillage). This incredible opportunity allows you to directly leverage your intelligence skill-set to earn the big bucks you know you’ve always deserved. You can now do just that by working in the private sector without having to give up that cushy government day job! I mean if we’re going to have this banana republic thing going we may as well GET PAID. Am I right?

Keep at it patriots,
Michael Krieger

If the above sounds like a joke, unfortunately it is not. Last week, two very important stories came out; one from Reuters and the other from Buzzfeed. They both zero in on how current NSA employees are using their expertise and connections to make big money in the private sector while still working at the NSA. Let’s start with the Reuters story, which covers former NSA-head Keith Alexander’s business relationship with the NSA’s current Chief Technical Officer, Patrick Dowd. Continue reading »

Tags: , , , , , , ,

Oct 15

From the article:

“But she did learn that Snowden was running more than one Tor exit node, and that he was trying to get some of his buddies at “work”to set up additional Tor nodes…

H’mmm….So Snowden running powerful Tor nodes and trying to get his NSA colleagues to run them, too?

I reached out to Sandvik for comment. She didn’t reply. But Wired’s Poulsen suggested that running Tor nodes and throwing a crypto party was a pet privacy project for Snowden. “Even as he was thinking globally, he was acting locally.”

But it’s hard to imagine a guy with top secret security clearance in the midst of planning to steal a huge cache of secrets would risk running a Tor node to help out the privacy cause. But then, who hell knows what any of this means.

I guess it’s fitting that Tor’s logo is an onion — because the more layers you peel and the deeper you get, the less things make sense and the more you realize that there is no end or bottom to it. It’s hard to get any straight answers — or even know what questions you should be asking.

In that way, the Tor Project more resembles a spook project than a tool designed by a culture that values accountability or transparency.”

That’s how you can easily know that you may be investigating a CIA/NSA project run by TPTB.

Everything with them is utterly and totally compartmentalized.

NWO-Illuminati-All-Seeing-Eye-Novus-Ordo-Seclorum


tor-logo

- Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government (Pando Daily July 16, 2014):

“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.”—Roger Dingledine, co-founder of the Tor Network, 2004

***

In early July, hacker Jacob Appelbaum and two other security experts published a blockbuster story in conjunction with the German press. They had obtained leaked top secret NSA documents and source code showing that the surveillance agency had targeted and potentially penetrated the Tor Network, a widely used privacy tool considered to be the holy grail of online anonymity. Continue reading »

Tags: , , , , , , , , , , , , , , , ,

Oct 14

Tags: , , , , , , , , , , ,

Oct 12

Did he tell us anything we didn’t knew?


linsay-mills-snowden2

- ‘Citizenfour': Documentary shows Snowden reunited with dancer girlfriend in Moscow (RT, Oct 11, 2014):

Edward Snowden is not “skulking” in a secret Russian bunker but is living an ordinary life in Moscow with his longtime girlfriend, Lindsay Mills. “Citizenfour,” a documentary about the whistleblower, premiered Friday at the New York Film Festival.

It has been three months since Lindsay Mills, whom Snowden had to leave behind in Hawaii in May 2013, was reunited with him in Moscow in July, “Citizenfour” reveals. The documentary was directed by investigative journalist and filmmaker Laura Poitras, an associate of former Guardian reporter Glenn Greenwald, who has been Snowden’s primary media contact throughout the NSA revelations campaign.

Lindsay Mills-Snowden
Image from Lindsay Mills’ instagram (lsjourney)

More than a year ago, in August 2013, Snowden’s Russian lawyer Anatoly Kucherena told the media that his client had no immediate plans to leave Russia and was really missing Mills, his girlfriend since 2009. Continue reading »

Tags: , , , , , , , ,

Oct 05

- New docs show how Reagan-era executive order unbounded NSA (Ars Technica, Sep 30, 2014):

Newly declassified info sheds light on EO 12333 and the feds’ obscuring tactics.

A set of newly declassified documents shows definitively and explicitly that the United States intelligence community relies heavily on what is effectively unchecked presidential authority to conduct surveillance operations, as manifested through the Reagan-era Executive Order (EO) 12333.

And at a more basic level, the new documents illustrate that the government is adept at creating obscure legalistic definitions of plain language words, like “collection of information,” which help obfuscate the public’s understanding of the scope and scale of such a dragnet. Continue reading »

Tags: , , , , ,

Sep 19

H/t reader M.G.:

“Since when is truth so dangerous?
This story I am posting chills me to the bone.
We have a truly evil government that abhors the truth…….”


pentagon

- Pentagon increasing surveillance to prevent another Snowden-style leak  (RT, Sep 18, 2014):

On the heels of two of the largest intelligence breaches in American history, the Pentagon reportedly plans to roll out new rules requiring military contractors to more stringently monitor the activities of employees who work with sensitive materials.

Although the intelligence leaks attributed to United States Army Private Chelsea Manning and former contractor Edward Snowden have already spawned significant changes in the way sensitive information is seen and shared by workers with access to classified data, Politico’s Joseph Marks reported this week that the Pentagon plans to put into place further mechanisms intended to diminish the odds of another major breach anytime soon. Continue reading »

Tags: , , , , , , ,

Sep 19

H/t reader M.G.:

“If this were even remotely a nation of law, this SOB would be in prison………………..”


- Intelligence Director Clapper insists he didn’t lie to Congress — but ‘misspoke’ about NSA spying (RT, Sep 18, 2014):

The United States’ top intelligence official said Thursday that he’s disappointed to continuously have his integrity disputed over an unsound remark he made before Congress more than a year ago concerning the National Security Agency’s spy tactics.

Eighteen months after he told lawmakers that the NSA does “not wittingly” collect and store data pertaining to US citizens, Director of National Intelligence James Clapper said during an event Thursday morning in Washington, DC that he still takes heat for his infamous answer.

The gaffe in question occurred when Sen. Ron Wyden (D-Oregon) asked DNI Clapper during an intelligence hearing in March 2013 if American citizens are immune to surveillance programs undertaken by the NSA. Although Clapper responded “not wittingly,” classified documents leaked to the media by former contractor Edward Snowden later that year proved that Americans’ communications are indeed collected by the NSA.

“It has been very disappointing to have my integrity questioned because of a mistake,” Clapper said during an event on Thursday, according to the Associated Press.

Dan Froomkin, a reporter for The Intercept, tweeted that Clapper complained “bitterly” of being “accused of lying.” Continue reading »

Tags: , , , , , , ,

Sep 19

- Nowhere To Hide As Minority Report-Style Facial Recognition Technology Spreads Across America (Economic Collapse, Sep 17, 2014):

What is our society going to look like when our faces are being tracked literally everywhere that we go?  As part of the FBI’s new Next Generation Identification System, a facial recognition database known as the Interstate Photo System will have collected 52 million of our faces by the end of 2015.  But that is only a small part of the story.  According to Edward Snowden, the NSA has been using advanced facial recognition technology for years.  In addition, as you will see below, advertising companies are starting to use Minority Report-style face scanners in their billboards and many large corporations see facial recognition technology as a tool that they can use to serve their customers better.  Someday soon it may become virtually impossible to go out in public in a major U.S. city without having your face recorded.  Is that the kind of society that we want? Continue reading »

Tags: , , , , , , , , , , , , ,

Sep 07

Related info:

- Creepy US Spy Agency Flings WORLD SLURPING OCTOPUS Into Orbit: NROL-39 NOTHING IS BEYOND OUR REACH


US Corporate Espionage (Washington’s Blog, Sep 6, 2014):

Glenn Greenwald documented yesterday that, last August, the US government announced that it:

… does ***not*** engage in economic espionage in any domain, including cyber. [emphasis original]

Right after that, the US government was revealed to be, as Greenwald documents: Continue reading »

Tags: , , , , , , , , , , , , ,

Sep 02

- Top NSA Whistleblower: We Need a New 9/11 Investigation Into the Destruction of the World Trade Center (Washington’ Blog, Aug 31, 2014):

The Observable Facts Were Ignored …

Bill Binney is the NSA’s former senior technical director, 32-year NSA veteran widely regarded as a “legend” within the agency, one of the world’s top crypto-mathematicians, who managed thousands of employees at the agency.

Binney was the original NSA whistleblower, and one of two NSA veterans whose example inspired Edward Snowden.

Binney recently signed Architects and Engineers for 9/11 Truth’s petition, stating: Continue reading »

Tags: , , , , , , ,

Sep 01

-
A demonstrator holds a placard depicting German chancellor’s Angela Merkel and US President Barck Obama reading “That does not work” (Das geht gar nicht) during a demonstration against governmental surveillance on August 30, 2014 in Berlin. (AFP/DPA)

It could also be translated as … “This is totally unacceptable”

- Thousands of Germans rally to end government spying (RT, Aug 31, 2014):

The rally in Berlin against federal surveillance gathered thousands of people under the motto ‘Freedom not fear,’ who were calling for stricter control of German intelligence agencies.The organizers said about 6,500 demonstrators, a broad coalition of pro-transparency, anti-surveillance and civil rights groups including the Electronic Frontier Foundation, Reporters Without Borders, Digital Courage, and Amnesty International joined the rally as they marched from the Brandenburg Gate to the Federal Chancellery. Continue reading »

Tags: , , , , , , , , , , , , ,

Aug 19

- NSA BIOS Backdoor a.k.a. God Mode Malware Part (Infosec Institute):

This article is the first part of a series on NSA BIOS backdoor internals. Before we begin, I’d like to point out why these malwares are classified as “god mode.” First, most of the malware uses an internal (NSA) codename in the realms of “gods,” such as DEITYBOUNCE, GODSURGE, etc. Second, these malwares have capabilities similar to “god mode” cheats in video games, which make the player using it close to being invincible. This is the case with this type of malware because it is very hard to detect and remove, even with the most sophisticated anti-malware tools, during its possible deployment timeframe.

Tags: , , , , , , , ,

Aug 17

- One of NSA’s Biggest Contractors Will Now Be Recording Your License Plate Numbers (Alternet, Aug 16, 2014):

Raytheon was recently awarded a huge contract to install all-electronic tolling systems.

Technology and defense giant Raytheon was recently awarded a $130 million contract to install all-electronic tolling systems on the Massachusetts Turnpike and at several local tunnels. A unit of the company’s Integrated Defense Systems business will install the system over the next year and a half. By replacing manual and electronic toll-collection booths with a system that will automatically charge vehicles, cars will be able to maintain highway speeds as they pass through the station, easing traffic congestion and cutting down driving time for commuters. Continue reading »

Tags: , , , , , , , , , ,

Aug 16

Privacy-Black-Paper

PDF: NSA-Black-Paper

- CIA spies on Senate. Here’s how to take back your digital privacy [FREE] (Sovereign Man, Aug 14, 2014):

Back in March serious allegations came out of the Senate that the CIA was monitoring and even hacking Senate computers. They were denied vehemently at the time by CIA director John Brennan, who went so far as to say “that’s just beyond the scope of reason.”

Unsurprisingly, of course, the CIA has now come out saying that, yes, they did in fact spy on Senate aides’ computers. Oh, and that they’re sorry. Very sorry.

This is stuff that would have been a major scandal not too long ago, causing a public outcry for the heads of those responsible.

Today, it seems par for the course. It’s taken for granted that governments around the world, spearheaded by Uncle Sam, monitor communication via email, phone, social networks, webcam etc. en masse. Continue reading »

Tags: , , , , , , , , , , ,

Aug 11

nsa-1234

- NSA asked judge to delete ‘classified’ testimony without public awareness (RT, Aug 10, 2014):

The National Security Agency worked behind the scenes to remove a section of a court transcript after suspecting one of its lawyers inadvertently disclosed secret information in a court case over alleged illegal surveillance.

Has the wall of secrecy protecting US intelligence-gathering methods become so severe and repressive that even to acknowledge the redaction of sensitive information from public documents is now thought to be revealing too much?

It seems the United States may be heading in that dark direction following a recent session of the Jewel v. NSA case, in which the Electronic Frontier Foundation (EFF) is challenging the NSA’s power to monitor foreign citizens’ US-based communications and social media accounts. Continue reading »

Tags: , , , , , , , ,