Feeds:
Posts
Comments

Posts Tagged ‘Media Censorship’

Susan Lindauer was a major CIA asset leading up to the 9/11 attacks. She was the main person in charge of communicating back-channel relations between Iraq and the U.S. Because she had inside knowledge that the U.S. knew for months in advance that the 9/11 attack was coming, the U.S. government had her detained under the Patriot Act and imprisoned in a military facility for a year. And then she remained under legal indictment for five years. She was apparently very close to having her brain scrambled via drugs by the government. Hers is a tragic and harrowing story, but her story proves beyond doubt, that corruption exists at the highest levels of the U.S. government. She is a real American Hero.

See this interview with former CIA intelligence asset Susan Lindauer.

And this followup interview: Former CIA Asset Susan Lindauer on naysayers, her post 9/11 story, the Patriot Act, NDAA, and more.

(The text below was taken from the followup interview above, as located on the ActivistPost.com website. Thanks!)

Back in September, we spoke to former CIA asset Susan Lindauer (here and here), in an interview that generated a lot of discussion online. Ms. Lindauer’s story, which completely counteracts the idea that there was no specific intelligence regarding the 9/11 attacks in advance, was received extremely positively by the majority of our audience.

With some message board chatter centering around questions of credibility, we decided to give her the opportunity to set the record straight on her CIA involvement and, in particular, a character assassination piece from the New York Times in April 2004. Susan also picks up her story from where she left off last time, and touches on the Patriot Act and the NDAA 2012.

Advertisements

Read Full Post »

Note: While I agree with the article below in general, I have not personally verified all of the particulars of the claimed details.

Also see Wake Up Citizens! and New World Order, and this video: 3/01/12 Michael Parenti: The Face of Imperialism, U.S. Empire – OneRadioNetwork.com

(The following article was taken from the educate-yourself.org website. Thanks!)

The New World Order (NWO) – An Overview

By Ken Adachi <Editor@educate-yourself.org>
http://educate-yourself.org/nwo/

Google Translator: Convert English into 51 Different Languages
http://translate.google.com/?prev=hp#sl|en|

Introduction

There is a worldwide conspiracy being orchestrated by an extremely powerful and influential group of genetically-related individuals (at least at the highest echelons) which include many of the world’s wealthiest people, top political leaders, and corporate elite, as well as members of the so-called Black Nobility of Europe (dominated by the British Crown) whose goal is to create a One World (fascist) Government, stripped of nationalistic and regional boundaries, that is obedient to their agenda. Their intention is to effect complete and total control over every human being on the planet and to dramatically reduce the world’s population by 5.5 Billion people. While the name New World Order is a term frequently used today when referring to this group, it’s more useful to identify the principal organizations, institutions, and individuals who make up this vast interlocking spiderweb of elite conspirators.

The Illuminati is the oldest term commonly used to refer to the 13 bloodline families (and their offshoots) that make up a major portion of this controlling elite. Most members of the Illuminati are also members in the highest ranks of numerous secretive and occult societies which in many cases extend straight back into the ancient world. The upper levels of the tightly compartmentalized (need-to-know-basis) Illuminati structural pyramid include planning committees and organizations that the public has little or no knowledge of. The upper levels of the Illuminati pyramid include secretive committees with names such as: the Council of 3, the Council of 5, the Council of 7, the Council of 9, the Council of 13, the Council of 33, the Grand Druid Council, the Committee of 300 (also called the “Olympians”) and the Committee of 500 among others.

In 1992, Dr John Coleman published  Conspirators’ Hierarchy: The Story of the Committee of 300. With laudable scholarship and meticulous research, Dr Coleman identifies the players and carefully details the Illuminati agenda of worldwide domination and control. On page 161 of the Conspirators Hierarchy, Dr Coleman accurately summarizes the intent and purpose of the Committee of 300 as follows:

“A One World Government and one-unit monetary system, under permanent non-elected hereditary oligarchists who self-select from among their numbers in the form of a feudal system as it was in the Middle Ages. In this One World entity, population will be limited by restrictions on the number of children per family, diseases, wars, famines, until 1 billion people who are useful to the ruling class, in areas which will be strictly and clearly defined, remain as the total world population.

     There will be no middle class, only rulers and the servants. All laws will be uniform under a legal system of world courts practicing the same unified code of  laws, backed up by a One World Government police force and a One World unified military to enforce laws in all former countries where no national boundaries shall exist. The system will be on the basis of a welfare state; those who are obedient and subservient to the One World Government will be rewarded with the means to live; those who are rebellious will simple be starved to death or be declared outlaws, thus a target for anyone who wishes to kill them. Privately owned firearms or weapons of any kind will be prohibited.”

The sheer magnitude and complex web of deceit surrounding the individuals and organizations involved in this conspiracy is mind boggling, even for the most astute among us. Most people react with disbelief and skepticism towards the topic, unaware that they have been conditioned (brainwashed) to react with skepticism by institutional and media influences that were created by the Mother of All mind control organizations: The Tavistock Institute of Human Relations in London. Author and de-programmer Fritz Springmeier (The Top 13 Illuminati Bloodlines ) says that most people have built in “slides” that short circuit the mind’s critical examination process when it comes to certain sensitive topics. “Slides”, Springmeier reports, is a CIA term for a conditioned type of response which dead ends a person’s thinking and terminates debate or examination of the topic at hand. For example, the mention of the word “conspiracy” often solicits a slide response with many people. (Springmeier has co-authored three books on trauma-based programming which detail how the Illuminati employs highly tuned and extremely sophisticated Mind Control (MC) training programs that begin the programming process while the intended victim is still within the womb. Mind Control is a much greater problem than most people realize. According to Cisco Wheeler, a former Illuminati mind control programmer, there are 10 million people who have been programmed as mind controlled slaves using trauma-based MC programs with names like Monarch and MK Ultra. The newer, non-trauma, electronic means of MC programming that grew out of the Montauk Project, may include millions more. Al Bielek, who played a principle role in the development of the Montauk Project, said that there likely 10 million victims of Montauk style mind control programming worldwide, the majority located in the USA. He also said that there are covert Montauk Programming ‘Centers’ in every major city in the U.S. )

What most Americans believe to be “Public Opinion” is in reality carefully crafted and scripted propaganda designed to elicit a desired behavioral response from the public. Public opinion polls are really taken with the intent of gauging the public’s acceptance of the Illuminati’s planned programs. A strong showing in the polls tells the Illuminati that the programing is “taking”, while a poor showing tells the NWO manipulators that they have to recast or “tweak” the programming until the desired response is achieved. While the thrust and content of the propaganda is decided at Tavistock, implementation of the propaganda is executed in the United States by well over 200 ‘think tanks’ such as the Rand Corporation and the Brookings Institute which are overseen and directed by the top NWO mind control organization in the United States, the Stanford Research Institute (SRI) in Menlo Park, California.

The NWO global conspirators manifest their agenda through the skillful manipulation of human emotions, especially fear. In the past centuries, they have repeatedly utilized a contrivance that NWO researcher and author David Icke has characterized in his latest book, The Biggest Secret, as Problem, Reaction, and Solution.

The technique is as follows: Illuminati strategists create the Problem- by funding , assembling, and training an “opposition” group to stimulate turmoil in an established political power (sovereign country, region, continent, etc.) that they wish to impinge upon and thus create opposing factions in a conflict that the Illuminati themselves maneuvered into existence. In recent decades, so called “opposition” groups are usually identified in the media as ‘freedom fighters’ or ‘liberators’ (recently the KLA-Kosovo Liberation Army).

At the same time, the leader of the established political power where the conflict is being orchestrated is demonized and, on cue, referred to as ‘another Hitler’ (take your pick: Saddam Hussein, Milosevic, Kadaffi, etc.). The ‘freedom fighters’ are not infrequently assembled from a local criminal element (i.e. KLA, drug traffickers). In the spirit of true Machiavellian deceit, the same NWO strategists are equally involved in covertly arming and advising the leader of the established power as well (the Illuminati always profits from any armed conflict by loaning money, arming, and supplying all parties involved in a war).

The conflict is drawn to the world stage by the controlled  media outlets with a barrage of photos and video tape reports of horrific and bloody atrocities suffered by innocent civilians. The cry goes up “Something has to be done!” And That is the desired Reaction (note: the  same technique is presently being used to bring about gun control in the United States).

The NWO puppeteers then provide the Solution by sending in UN ‘Peace Keepers’ (Bosnia) or a UN ‘Coalition Force’ (Gulf War) or NATO Bombers and then ground troops (Kosovo). Once installed, the ‘peace keepers’ never leave (Bosnia, Kosovo).  The idea is to have NWO controlled ground troops in all major countries or strategic areas where significant resistance to the New World Order takeover is likely to be encountered.

East Timor, Indosnesia. (9/14/99) Virtually , the same strategy used to occupy Kosovo with UN/NATO troops was applied by the NWO manipulators to take military control of  East Timor. Once again, the same morality play is trotted out for public consumption: the local evil and demonic Indonesian Army trained militias responsible for the slaughter of innocent civilians following the August 30 vote for Independence (from Indonesian control), must be stopped at all costs. This time, Australia (to keep up the appearance of an ‘international’ humanitarian effort) will lead the charge with ‘peacekeeping’ troops. Of course, it didn’t take long for Madeline Albright to announce that US ‘support assets’ will be part of the “UN Peacekeeping Team”. In a  front page story in the LA Times (9/13/99), Mike Jendrzejczyk  of Human Rights Watch (an Illuminati front group)in Washington DC  said that it’s “crucial” that “peacekeepers have the authority to disarm militia forces and any Indonesian soldiers actively working with them”. ]

The local, sovereign military force is either defeated (i.e. Yugoslavia) or, as in the case of the United States itself, replaced by foreign UN “Partnership For Peace” (PFP) troops who take over the jobs of  US soldiers who have been sent overseas on  ‘peacekeeping’ missions. In addition to being killed in ground conflicts on foreign soil, US military forces will likely be reduced in the next few years through disease induced attrition (i.e. from mandatory Anthrax Vaccinations required of all US military personnel). These vaccinations will, in all probability, eventually produce the symptoms of the so-called Gulf War Illness, which was acquired by a certain percentage of Gulf War soldiers who were given a “special” anthrax vaccine (intended by the Illuminati/CIA as a test run to ascertain how quickly (and fatally) the disease would progress with a substantial population of healthy young men and women).

The corporate portion of the NWO pyramid seems to be dominated by international bankers and the big pharmaceutical cartels, as well as other major multinational corporations. The Royal Family of England, namely Queen Elizabeth II and the House of Windsor, (who are, in fact, descendants of the German arm of European Royalty -the Saxe-Coburg-Gotha family-changed the name to Windsor in 1914 ), are high level players, along with the British oligarchy which controls the upper strata of the Illuminati. The decision making Illuminati nerve centers of  this effort are in the London (especially the City of London), Basel Switzerland, and Brussels (NATO headquarters).

The United Nations, along with all the agencies working under the UN umbrella, such as the World Health Organization (WHO), are full time players in this scheme. Similarly, NATO is a military tool of the NWO.

The leaders of all major industrial countries like the United States, England, Germany, Italy, Australia, New Zealand, etc. (E.g. members of the “G7/G8” ) are active and fully cooperative participants in this conspiracy. In this century, the degree of control exerted by the Illuminati has advanced to the point that only certain hand-picked individuals, who are groomed and selected by the Illuminati are even eligible to become the prime minister or president of countries like England, Germany, or The United States. It didn’t matter whether Bill Clinton or Bob Dole won the Presidency  in 1996, the  results would have been the same (except maybe for Zipper Gate ). Both men are playing on the same team for the same ball club. Anyone who isn’t a team player is taken out: i.e.President Kennedy, Ali Bhutto (Pakistan) and Aldo Moro (Italy). More recently, Admiral Borda and William Colby were also killed because they were either unwilling to go along with the conspiracy to destroy America, weren’t cooperating in some capacity, or were attempting to expose/ thwart the Takeover agenda.

Most of the major  wars, political upheavals,  and economic depression/recessions of the past 100 years (and earlier)  were carefully planned and instigated by the machinations of these elites. They include The Spanish-American War (1898), World War I and World War II; TheGreat Depression; the Bolshevik Revolution of 1917; the Rise of Nazi Germany; the Korean War; the Vietnam War; the 1989-91″fall” of Soviet Communism, the 1991 Gulf War;  and the recent War in Kosovo. Even the French Revolution was an orchestrated into existence by the Barvaian Illuminati and the House of Rothchild.

FEMA

In America, the Federal Emergency Management Administration (FEMA) was created in 1979 under Presidential Memorandum 32 authored for President Carter by Prof. Samuel P. Huntington, a Harvard professor and former FEMA Advisory Board chairman. Huntington wrote the Seminal Peace for the Trilateral Commission in the mid 70’s, in which he criticized democracy and economic development as outdated ideas. As co-author of another report prepared for the Trilateral Commissiosn, The Crisis of Democracy, Huntington wrote:

We have come to recognize that there are potential desirable limits to economic growth. There are also potentially desirable limits to the indefinite extension of political democracy. A government which lacks authority will have little ability short of cataclysmic crisis to impose on its people the sacrifices which may be necessary.”

Huntington’s ideas were rewritten into National Security Decision Directive #47 (NSDD47), which was enacted in July 1982 by President Reagan. Treated as a passing footnote by the media, this law identified legitimate areas to be upgraded to maintain national defense, but it also laid the groundwork for Emergency Mobilization Preparedness, a plan under which existing socioeconomic regulations or other legal constraints would be waived in the event of a national emergency. This plan was further strengthened in Public Law 101-647, signed by President Bush in November 1990.What it boils down to is this: in the event that the President declares a national emergency, for any reason (from major earthquakes to increased international tensions or economic /financial crisis of any stripe), FEMA can then, at their discretion, implement Executive Orders 10995 through 11005. These Executive Orders permit a takeover by FEMA of local, state, and national governments and the suspension of constitutional guarantees. FEMA will have the authority to exert any sort of control that it deems necessary upon the American public. Atrained National Police Force, formally referred to by the name of Multi Jurisdictional Task Force (MJTF), wearing black uniforms and composed of:

1. specially selected US military personnel
2. foreign military units carrying United Nations ID cards, and
3. specially trained existing police groups from larger metropolitan American cities.

These members of the MJTF will implement and enforce martial law under the direction and control of FEMA. The President and Congress are out of the loop.

FEMA is the Trojan Horse by which the New World Order will implement overt, police-state control over the American populace.

War on Drugs

The “War on Drugs” is a cruel joke. The US government, specifically the CIA, is the biggest ‘drug lord’ on the planet. Drug money is used to pay for innumerable ‘black projects’, including the construction of huge underground cities housing both humans and aliens working with the secret US government.

The instigation of a trumped-up war as a cover for amassing  fortunes can be dated back to at least the 12th Century when only a core group of nine members of an Illuminati group called the Knights Templar, the military arm of an Illuminati secret society known as the Priory of Sion, kicked off the The Crusades that lasted for over a century and a half. A rift later developed between the Templars and the Priory of Sion when Jerusalem was lost to Saracen Turks in 1187. In 1307, the king of France, Philippe the Fair (a Merovingian Illuminati), coveted the wealth and was jealous of the Templars’ power. The French king, being a puppet of the Priory of Sion, set out to arrest all the Templars in France on October 13. While many Templars were seized and tortured, including their Grand Master, Jacques de Molay, many other Templars (who had been tipped off) escaped. They eventually resurfaced in Portugal, in Malta (as the Knights of Malta) and later in Scotland as The Scottish Rites of Free Masonry.

The acquisition and consolidation of ever greater wealth, natural resources, total political power, and control over others are the motivating forces which drives the decisions of the Illuminati. The toll in human suffering and the loss of innocent lives are non issues for these individuals, who are aligned with very dark and malevolent 4th dimensional aliens. The dominant group of 4th dimentional malevolent aliens controlling and manipulating the human Iluminati are known as Draconians or Drakos Reptilians. Not all alien reptilians are of a negative spiritual orientation.

Mind Control

Recent revelations from deprogrammed Illuminati (government) mind controlled individuals such as Arizona Wilder (The Biggest Secret), Cisco Wheeler( The Illuminati Formula to Create an Undetectable Total Mind Control Slave),Cathy O’Brien (Trance Formation of America), and Brice Taylor (Thanks for the Memories) leave NO DOUBT that the upper levels of the  Illuminati engage in Satanic rituals which usually include the killing of young children, the drinking of  human blood and the consuming of flesh and human organs.

The details of the Illuminati conspiracy are brilliantly laid out in the books of David Icke (Tales from the Time Loop, Children of the Matrix, Alice in Wonderland and the World Trace Center Disaster, The Biggest Secret, The Truth Shall Set You Free, and I am Me, I am Free; and in three books by Dr. John Coleman (Conspirators’ Hierarchy: The Story of The Committee of 300; One World Order: Socialist Dictatorship; and  Diplomacy by Deception

To be Continued & Expanded…

Read Full Post »

This whole subject of disinformation is a very tricky business. The elite that are in control are exceptionally good at deception in many ways, so you really have to be on your toes when researching a subject. See CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information for starters.

You really have to be careful where you put your trust because there are many places, prominently placed on search engine results, that are there to “debunk” the truth for you. While the truth can’t really be debunked, they make a good try at it. These sites can be well funded and provide convincing arguments against the truth. They seem to tend to do this in a way that, if you’re not watching carefully, can make you feel foolish for believing whatever it is that you are investigating. They will also provide true information as well so the site looks legit until you investigate a bit more closely. If you use the Snopes.com website to vet information, see the article below.

Similarly, there are sites that sound like they’re going to talk about what you’re interested in, and they do, only they tell you a fabricated or misleading story, craftily bending the details to suit their ends. In fact, mainstream media is quite adept at this. From my perspective, I have to carefully pick and choose only very specific parts of mainstream media articles because (with occasional exceptions) they produce highly biased, government and corporate approved, “news”. Propaganda is closer to the truth of it.

There are also other sites that appear to provide alternative news, and they actually do so, but they also produce propaganda along with this already discovered news. Assuming the latest information regarding the VeteransToday.com website is true, and I’m gathering from numerous sources that it is true, the main man there, Gordon Duff, admitted in a video interview that about 40% of the content on the website is knowingly and intentionally not true. The video has been removed from YouTube for copyright issues, and Duff has since denied that he said it, and/or that it was actually the Israeli Mossad that modified the video! This does not ring true for numerous reasons if you do the research.

There are other sites that seem to only report the truth, and may perhaps even break new stories, but they steer clear of the real issues with Israel. There are two persons where I (and others) find this to be true: Alex Jones (infowars.com prisonplanet.tv) and Jesse Ventura. There are probably others. I can only speculate as to the reason that they steer clear of outing Israel for what it is. Maybe they have been threatened or bribed, or maybe they’re really working for the “other side”. I really don’t know, but I do know that something is gigantically wrong when Israel is not shown to be what it is – a terrorist state that is essentially in control of the U.S. government.

As I point out in my main page for Israel, Israel has invaded the U.S. government like a virus, to the point of being in complete control of U.S. foreign policy, and it is, with rare exception, the gatekeeper for every President, Senator and Representative and most likely, the heads of other agencies like the CIA – see this. In other words, if the Israeli lobby group of AIPAC and the JDL and Anti-Defamation League watchdog groups don’t like you, you will not be elected. Period. And if you say anything against Israel, they won’t like you, they’ll brand you as anti-Semitic, and they’ll work to destroy you, and they’re damn good at doing just that. I’m sure there are exceptions to this rule, but this is, without exaggeration, the rule accepted by almost every politician. For this reason, almost every person that is in congress, is by necessity, in league with these Israeli groups, and these groups don’t give a shit about what’s good for America. Those groups, along with many, many very high ranking self-professed Zionist government officials, are there to make sure that anything and everything that happens in the American government is, first and foremost, to the direct benefit of Israel. This is why the American government continues to vote, time after time, against the interests of America, and for the interests of Israel. Insanity. It’s just like a virus or a cancer that has invaded a body.

There are websites that do go against Israel, which I still find to be suspect. David Icke’s site falls into this category. I can’t say for sure whether his website is legit or not. I like quite a bit of what he has to say, and find some of his messages to be downright inspiring. On the other hand, his beliefs regarding what’s actually going on are so far out that it sounds ridiculous; this detracts from the overall believability of his messages. However, I also have to say, I’ve seen many things that initially sound completely crazy, that I eventually discover to be true. So I have to admit that he may be correct, I really don’t know. He may present completely legitimate information, and those in power are using his site (or any and every alternative news site) to gather names and information of people that are interested in following this type of information. Tracking the names of the believers, the people that actually know the truth. David may or may not be in on such an effort. As I said before, I really don’t know, but I feel that caution is warranted. As you’ll see, on this site and others, Big Brother IS listening, looking, recording, researching, harassing, arresting, detaining, torturing, maiming, murdering…

The following article was taken from the rense.com website. Thanks!)

Is Snopes A Disinformation Operation?
4-3-12

For those of you that put your trust in Snopes…

Many of the emails that have been sent or forwarded that had any anti Obama in it were negated by Snopes. I thought that was odd. Check this out.

Snopes, Soros and the Supreme Court’s Kagan.   We-l-l-l-l now, I guess the time has come to check out Snopes! You don’t suppose it might not be a good time to take a second look at some of the stuff that got kicked in the ditch by Snopes, do you?

We’ve known that it was owned by a lefty couple but hadn’t known it to be financed by Soros!

Snopes is heavily financed by George Soros, a big time supporter of Obama! In our Search for the truth department, we find what I have suspected on many occasions.

I went to Snopes to check something about the dockets of the new Supreme Court Justice. Elena Kagan, who Obama appointed, and Snopes said the email was false and there were no such dockets. So I Googled the Supreme Court, typed in Obama-Kagan, and guess what? Yep, you got it; Snopes Lied! Everyone of those dockets are there.

So Here is what I wrote to Snopes:

Referencing the article about Elana Kagan and Barak Obama dockets:

The information you have posted stating that there were no such cases as claimed and the examples you gave are blatantly false. I went directly to the Supreme Courts website, typed in Obama Kagan and immediately came up with all of the dockets that the article made reference to. I have long suspected that you really slant things but this was really shocking. Thank You. I hope you will be much more truthful in the future, but I doubt it.

That being said, Ill bet you didn’t know this.

Kagan was representing Obama in all the petitions to prove his citizenship. Now she may help rule on them. Folks, this is really ugly.

Chicago Politics and the beat goes on and on and on. Once again the US Senate sold us out!

Now we know why Obama nominated Elana Kagan for the Supreme Court. Pull up the Supreme Courts website, go to the docket and search for Obama. She was the Solicitor General for all the suits against him filed with the Supreme Court to show proof of natural born citizenship. He owed her big time. All of the requests were denied of course. They were never heard. It just keeps getting deeper and deeper, doesn’t it? The American people mean nothing any longer.It’s all about payback time for those who compromised themselves to elect someone who really has no true right to even be there.

Here are some websites of the Supreme Court Docket: You can look up some of these hearings and guess what?

Elana Kagan is the attorney representing Obama!

Check out these examples:

http://www.supremecourt.gov/Search.aspx?FileName=/docketfiles/09-8857.htm

http://www.supremecourt.gov/Search.aspx?FileName=/docketfiles/09-6790..htm

http://www.supremecourt.gov/Search.aspx?FileName=/docketfiles/09-724.htm

Read Full Post »

(This article was taken from the occupycorporatism.com website. Thanks!)

CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information

Nov 29th, 2012 0 Comment

Susanne Posel
Occupy Corporatism
November 29, 2012

In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.

David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”

Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.

The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.

Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:

• Finances
• Stock transactions
• Business deals
• Foreign military
• Diplomatic secrets
• Legal documents
• Personal civilian communications

This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen. The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures. By collecting intelligence on every American citizen, the US government is treating everyone as if they were a potential foreign or domestic terrorist. Whether this assumption is valid or not, under the US constitution, Americans are supposed to be protected from intrusion of government; even if that government is their own.

At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.

The Obama administration empowered the NCTC with the authority afforded Obama under Presidential Executive Order 13354. This EO was codified by the Intelligence Reform and Terrorism Prevention Act of 2004. The NCTC reports directly to the President and director of National Intelligence as instructed by the President and Department of Homeland Security (DHS). Sen. John McCain was integral in the creation of this combination of military strength and governmental power culminating in all-encompassing tyranny.

Both private and public corporations will be employed to mine the data. Silicon Valley and other technology giants in the private sector will have open access to private information on any and all American citizens.

Since the manufactured attack on 9/11, the US government has created a “vast domestic intelligence apparatus” that spies on Americans and collects massive amounts of data to be profiled and used at the discretion of the Federal Bureau of Investigations (FBI), local law enforcement, DHS and military criminal investigators. The FBI and NSA house more than 1.5 billion government and private sector profiles. The information on average citizens includes all sources of criminal and non-criminal databases that assist the US government in creating a filing system on each American.

The NSA has a comprehensive program to search out our schools into scouting grounds for a team of American grown hacker community. The Obama administration has made it a concern of theirs that the future of cybersecurity rest with the college graduates of tomorrow. The NSA is focusing on colleges and universities within the US. Four schools have already been singled out as official Centers of Academic Excellence in Cyber Operations (CAE-COP).

The CAE-COP focuses on recruiting persons with “particular emphasis on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response), to enhance the national security posture of our Nation.”

Those chosen for this program become vital researchers expected to assist the NSA in:

• Global communications and computing networks
• Developing a digital strategic advantage
• Collaboration with the US government on cyber issues
• Carry out directives on designated targets at the discretion of the US government

These “cyber operators” are trained to become an elite team of “computer geniuses” that are experts in computer hacking, digital communications, cyber intelligence – for the purpose of spying on Americans; as well as conducting interactive digital psy-ops with users of the internet.

Earlier this month, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the National Initiative for Cybersecurity Education (NICE).

NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”

In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”

Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.

In August, the DHS was central in the taking of domain names for websites without due process or explanation – simply using the blanket claim of copyright infringement. Holder and Napolitano received correspondence from several members of the House of Representatives who were in protest of the domain name seizures, citing that the copyright claims were questionable and that the websites were clearly being censored for alternative reasons.

The letter stated that: “Our concern centers on your Department’s methods, and the process given, when seizing the domain names of websites whose actions and content are presumed to be lawful, protected speech.”

According to Lynnae Williams, former CIA clandestine service trainee and DIA analyst, the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web. Williams explains that the CIA provides training videos to new recruits on how to troll the internet. Once a target is locked-in, all open source information is obtained on the individual, and then any angle to discredit them in public forum is used on social media sites.

Software is used to sift through the “mountains” of users on social networking sites. At the Atlanta CIA branch where Williams was trained, she personally witnessed CIA-sponsored and sanctioned trolling of Americans on social networking sites.

In 2011, the CIA revealed its Open Source Center where recruited personnel are used as government trolls to “analyze” websites for information pertinent to the objective of the US government – meaning discrediting targets on certain websites. Under the guise of conducting business intelligence (i.e. cyberespionage), the Open Source software gathers digital data on targets; including all Facebook posts, Twitter posts, comments on website threads. Those assigned to monitor this data can interact with users online through anonymous portals. Agents are designated to surveillance operations to message anyone, analyze political and religious speech, assess trends and conduct electronic eavesdropping through cell phones, satellites and other digital apparatus.

Agents not only survey the internet and interact as anonymous persons through directed postings, but also are deployed to wander through the streets domestically and in foreign nations to monitor newspaper and other printed media to extract useful information about the temperament of the general public.

When professional trolls want to attack for copyright infringement, they may combine defamatory comments across the internet with a fraudulent DMCA notice of takedown, to discredit a source of information that they feel threatened by.

The EFF have reported on copyright trolls that experiment with claiming copyright infringement to “extract settlements from individuals.” These trolls “try to grow businesses out of suing Internet users.”

Professional trolls litter the court system with frivolous lawsuits based on wild accusations of copyright infringement in order to wear down the victim as well as hoping to squeeze monetary restitution for fraudulent claims. The members of the alternative media as well as readers need to be aware of these individuals who are cloaked in truth yet rife with disinformation. Their intention is to cut off the free flow of information on the internet and stifle voices that are exposing truth for their own selfish gains.

Read Full Post »

(This article was taken from Amber Lyon’s blog. Thanks!)

President Obama Has Turned Journalists into Criminals

  • Posted on October 16, 2012

Will tonight’s presidential debate moderator have the balls to address this crucial issue?

If by “change” President Obama meant criminalizing journalism in the United States, then he’s succeeded.

Why should you care?  The investigative journalism that Obama has silenced could have exposed more corruption in the U.S. government, military, banking industry; corruption that has caused anguish to numerous Americans.  The reports that will never be heard, read, or seen on TV may have led to positive change.

The Obama administration is suffocating investigative journalism at an alarming rate through the abuse of the Espionage Act of 1917, an act more prone to be used to protect government secrecy than national security.  Before Obama, the act had been used only three times total since 1917.  The current administration has used it six times to go after whistleblowers and the journalists who protect and reveal their information.

President Obama was bold enough to use the Espionage Act to  subpoena New York Times journalist James Risen in an attempt to force him to ‘give up’ information on a CIA whistleblower.  Risen accused the administration of trying to silence journalists and refused to acquiesce stating,

“Can you have a democracy without aggressive investigative journalism? I don’t believe you can, and that’s why I’m fighting.”

Risen predicted Obama’s attack against him would have an unprecedented chilling effect on mainstream investigative journalism in the US.  He was right.

I was on the brunt end of the Obama-generated censorship while employed at CNN as an investigative correspondent.

On at least a weekly basis, and to my constant frustration, my superiors and CNN’s lawyers were quick to remind me that we need to be extra careful because “President Obama has gone after more journalists and whistleblowers than any president in history”.  The leash around my neck began to tighten.

Whether I was allowed to embark on future stories or even interview sensitive sources for potential investigations, eventually became an ‘Obama subpoena risk assessment’ and potential court cost calculation, rather than a pure evaluation of the report’s contribution to public good or our journalistic duty to cover the story.

Some of my most crucial investigations were killed before they started because they were too high a risk of an Obama subpoena.

One boss told me quote “we know how the FBI feels about your source, if we have information the FBI will want we become a target”.

David Carr of The New York Times noted Obama’s war on journalism may have more to do with secrecy than national security and is harming press freedom in the U.S.:

As journalists we vow never to reveal our confidential sources, so to this administration we are criminals.  It’s time President Obama focused his time hunting down the real law breakers rather than attacking the messengers.

For more information please check out these articles:

Huffington Post: Obama’s War on Journalism 

NY Times: Blurred Line Between Espionage and Truth

Salon.com : Obama Targets Journalists 

Read Full Post »

This is an excellent example of how the government, or in this case, a corporation, can seriously fuck with your life without any good (reasonable) legal premise to do so. If you have comparatively unlimited resources, like government and large corporations do as compared to the average person, you can seriously damage a person’s work life, reputation, finances, family, etc. practically at will. They may not ultimately win the case, but they’ve essentially destroyed the person’s life in the meantime. And perhaps more importantly, they’ve sent a chilling message to anyone else that dares to blow the whistle on the government or a corporation.

This is judicial system fraud perpetrated by elite arrogant pricks that are essentially above the law because they have money. There is no way to stop it because it is built into our legal system. In other words, this is legal fraud. The elite have spent, and continue to spend, lots of money in the effort of writing laws and protecting laws ensuring they have and keep this option with impunity.

And where is the mainstream press when it comes to cases like this? The press should be putting things like this on the front page, pounding on it until resolved. But generally, if they talk about it at all, they’ll present the story in a way that’s ultimately twisted towards the side of the corporation or government. In other words, since the press is largely controlled by the government and corporations, they run away with their tail between their legs rather than stand up for what is right and fair and just. Cowards. But to be fair, because of their bosses, they don’t have much of a choice unless someone is willing to give up their career to stand up and fight. Even then, it’s generally just a little flair-up int the news that also gets twisted by mainstream media, and/or is quickly forgotten, ignored and buried.

(The article below was taken from the ActivistPost.com website. Thanks!)

Years in Jail for Exposing A Corporate Mistake?

Luke Rudkowski got a chance to meet and interview well-known hacker, Andrew Auernheimer, also known by his pseudonym, Weev. Weev was recently convicted for two felonies and currently is free on bail until sentencing, The court convicted him on one count of identity fraud and one count of conspiracy to access a computer without authorization. In this interview Weez explains what lead to these charges and how he is dealing with the situation.

View the YouTube Video. To find out more about Weev check out his website: http://freeweev.info/

(The following article was taken from the freeweev.info site. Thanks!)

I know this guy, “weev”. Real name: Andrew Auernheimer. He is almost always offensive. He constantly says things that brutally offend my liberal sensibilities. He never takes anything seriously and generally treats life as a piece of performance art. He’s undisciplined and lazy. I can’t believe I count him amongst my acquaintances, but he’s very charming and funny at a dinner party. That doesn’t really change how gigantic of a jackass he is. As the world’s most notorious Internet troll, his ability to repulse is quite high.

Unfortunately, it has become essential to our first amendment freedoms to keep this jackass troll out of jail.

In June of 2010, there was a public AT&T webserver that was publishing iPad 3G user email addresses. When I say “publishing”, I mean it. This thing had no password, no firewall, no authorization mechanism stopping any member of the public from collecting this data. One man, Daniel Spitler, collected a sample of this data. He brought it to Andrew Auernheimer. Andrew gave it to a journalist because he feels that when a big company puts you at risk, you deserve to know about it and the company responsible deserves to be held to account and publicly shamed.

As his reward for performing a public service, Andrew is now facing two consecutive 5-year felonies. No good deed goes unpunished.

Much more worrisome than the injustice that Andrew is receiving is the precedent it creates against us. The Computer Fraud and Abuse Act, or CFAA, isn’t just a criminal statute, it is civil. Andrew’s co-defendant accessed a publicly available webserver and Andrew gave the data to a single journalist. This means that any time you visit a URL if the web operator later decides they just don’t like you, you may face prison.

You may also just get sued by a gigantic company with more resources than you.

 THE CHARGES

Andrew is indicted on two charges, USC 1030 “Conspiracy to access a computer device without authorization” in furtherance of a violation of a New Jersey state statute. The New Jersey state statute includes the language “discloses”, which means the federal government is saying that the very act of giving something to a journalist to inform the public is a criminal act. This represents an extremely dangerous prior restraint upon free speech. Beyond that, if you run any sort of business that touches the Internet at all, you should be concerned about the language behind USC 1030. If you query an API that a company makes public as part of their web app, and later they decide that your technology is too disruptive or you provide competition to a feature they’re planning, they can have you imprisoned or sued.

Andrew is also charged with USC 1028, “identity theft”, for possessing a list of email addresses. The statute is so broad that it criminalizes possessing home addresses, which means you’re a criminal every time you walk down the block of a suburb and look at house numbers.

“He that would make his own liberty secure, must guard even his enemy from oppression; for if he violates this duty, he establishes a precedent that will reach to himself.” – Thomas Paine, Dissertation on First Principles of Government

Regardless of what you think of Andrew’s identity, associations or politics, you must understand the urgency of helping fight the case against him. The interpretation the justice department is putting forward in this case affects everyone that opens a web browser, writes a web app that references external APIs or talks to a journalist about any externally acquired data. This case reeks of dangerous prior restraint upon free speech, and a guilty verdict that sticks will harm the free and open internet as badly as SOPA/PIPA would have.

Legal defense costs money. Federal criminal defense generally takes a hundred thousand dollars. By helping Andrew you safeguard your own liberties from the assault of a tyrannical government. Andrew needs a large amount of money. Please consider giving a donation or a loan.

Read Full Post »

(This article was taken from the globalresearch.ca website. Thanks!)

Hamas is a Creation of Mossad

by Hassane Zerouky

Global Outlook, No 2, Summer 2002
www.globalresearch.ca   23 March 2004

The URL of this article is: http://globalresearch.ca/articles/ZER403A.html


Thanks to the Mossad, Israel’s “Institute for Intelligence and Special Tasks”, the Hamas was allowed to reinforce its presence in the occupied territories. Meanwhile, Arafat’s Fatah Movement for National Liberation as well as the Palestinian Left were subjected to the most brutal form of repression and intimidation

Let us not forget that it was Israel, which in fact created Hamas. According to Zeev Sternell, historian at the Hebrew University of Jerusalem, “Israel thought that it was a smart ploy to push the Islamists against the Palestinian Liberation Organisation (PLO)”.

Ahmed Yassin, the spiritual leader of the Islamist movement in Palestine, returning from Cairo in the seventies, established an Islamic charity association. Prime Minister Golda Meir, saw this as a an opportunity to counterbalance the rise of Arafat’s Fatah movement. .According to the Israeli weekly Koteret Rashit (October 1987), “The Islamic associations as well as the university had been supported and encouraged by the Israeli military authority” in charge of the (civilian) administration of the West Bank and Gaza. “They [the Islamic associations and the university] were authorized to receive money payments from abroad.”

The Islamists set up orphanages and health clinics, as well as a network of schools, workshops which created employment for women as well as system of financial aid to the poor. And in 1978, they created an “Islamic University” in Gaza. “The military authority was convinced that these activities would weaken both the PLO and the leftist organizations in Gaza.” At the end of 1992, there were six hundred mosques in Gaza. Thanks to Israel’s intelligence agency Mossad (Israel’s Institute for Intelligence and Special Tasks) , the Islamists were allowed to reinforce their presence in the occupied territories. Meanwhile, the members of Fatah (Movement for the National Liberation of Palestine) and the Palestinian Left were subjected to the most brutal form of repression.

In 1984, Ahmed Yassin was arrested and condemned to twelve years in prison, after the discovery of a hidden arms cache. But one year later, he was set free and resumed his activities. And when the Intifada (‘uprising’) began, in October 1987, which took the Islamists by surprise, Sheik Yassin responded by creating the Hamas (The Islamic Resistance Movement): “God is our beginning, the prophet our model, the Koran our constitution”, proclaims article 7 of the charter of the organization.

Ahmed Yassin was in prison when, the Oslo accords (Declaration of Principles on Interim Self-Government) were signed in September 1993. The Hamas had rejected Oslo outright. But at that time, 70% of Palestinians had condemned the attacks on Israeli civilians. Yassin did everything in his power to undermine the Oslo accords. Even prior to Prime Minister Rabin’s death, he had the support of the Israeli government. The latter was very reluctant to implement the peace agreement.

The Hamas then launched a carefully timed campaign of attacks against civilians, one day before the meeting between Palestinian and Israeli negotiators, regarding the formal recognition of Israel by the National Palestinian Council. These events were largely instrumental in the formation of a Right wing Israeli government following the May 1996 elections.

Quite unexpectedly, Prime Minister Netanyahu ordered Sheik Ahmed Yassin to be released from prison (“on humanitarian grounds”) where he was serving a life sentence. Meanwhile, Netanyahu, together with President Bill Clinton, was putting pressure on Arafat to control the Hamas. In fact, Netanyahu knew that he could rely, once more, on the Islamists to sabotage the Oslo accords. Worse still: after having expelled Yassin to Jordan, Prime Minister Netanyahu allowed him to return to Gaza, where he was welcomed triumphantly as a hero in October 1997.

Arafat was helpless in the face of these events. Moreover, because he had supported Saddam Hussein during the1991 Gulf war, (while the Hamas had cautiously abstained from taking sides), the Gulf states decided to cut off their financing of the Palestinian Authority. Meanwhile, between February and April 1998, Sheik Ahmad Yassin was able to raise several hundred million dollars, from those same countries. The the budget of The Hamas was said to be greater than that of the Palestinian Authority. These new sources of funding enabled the Islamists to effectively pursue their various charitable activities. It is estimated that one Palestinian out of three is the recipient of financial aid from the Hamas. And in this regard, Israel has done nothing to curb the inflow of money into the occupied territories.

The Hamas had built its strength through its various acts of sabotage of the peace process, in a way which was compatible with the interests of the Israeli government. In turn, the latter sought in a number of ways, to prevent the application of the Oslo accords. In other words, Hamas was fulfilling the functions for which it was originally created: to prevent the creation of a Palestinian State. And in this regard, Hamas and Ariel Sharon, see eye to eye; they are exactly on the same wave length.


Email this article to a friend

To express your opinion on this article, join the discussion at Global Research’s News and Discussion Forum , at http://globalresearch.ca.myforums.net/index.php

The Centre for Research on Globalization (CRG) at www.globalresearch.ca grants permission to cross-post original Global Research (Canada) articles in their entirety, or any portions thereof, on community internet sites, as long as the text & title of the article are not modified. The source must be acknowledged as follows: Centre for Research on Globalization (CRG) at www.globalresearch.caFor cross-postings, kindly use the active URL hyperlink address of the original CRG article. The author’s copyright note must be displayed. (For articles from other news sources, check with the original copyright holder, where applicable.). For publication of Global Research (Canada) articles in print or other forms including commercial internet sites, contact: editor@globalresearch.ca .

© Copyright H ZEROUKY  2004. For fair use only/ pour usage équitable seulement. This article originally appeared in French in L’Humanité. Translation by Global Outlook, 2002.

Read Full Post »

Older Posts »

JONATHAN TURLEY

Res ipsa loquitur ("The thing itself speaks")

Amber Lyon

"Well-behaved women seldom make history..."

Writings of J. Todd Ring

Independent Research and Analysis, Essays in Politics and Philosophy.

________________Child Health Safety_________________

The facts about vaccine safety your government won't give you