Skip navigation

Monthly Archives: July 2013

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

• XKeyscore gives ‘widest-reaching’ collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
NSA’s XKeyscore program – read one of the presentations

theguardian.com, Wednesday 31 July 2013 08.56 EDT

XKeyscore map

One presentation claims the XKeyscore program covers ‘nearly everything a typical user does on the internet’

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst’s ability to query the databases at any time.

KS1 

The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSA parlance) associated with the individual being targeted.

Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”

The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.

A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.

Email monitoring

In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual’s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

KS2 

KS3edit2 

The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, “communications that transit the United States and communications that terminate in the United States”.

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

KS4 

Chats, browsing history and other internet activity

Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.

An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.

KS55edit 

An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.

KS6 

Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.

KS7 

As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.

KS8 

The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.

KS9 

The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.

William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20tn transactions about US citizens with other US citizens”, an estimate, he said, that “only was involving phone calls and emails”. A 2010 Washington Post article reported that “every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.”

The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”

To solve this problem, the NSA has created a multi-tiered system that allows analysts to store “interesting” content in other databases, such as one named Pinwale which can store material for up to five years.

It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.

KS10 

In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.

KS11 

Legal v technical restrictions

While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA’s foreign targets.

The ACLU’s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans’ communications without individualized warrants.

“The government doesn’t need to ‘target’ Americans in order to collect huge volumes of their communications,” said Jaffer. “The government inevitably sweeps up the communications of many Americans” when targeting foreign nationals for surveillance.

An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.

KS12 

In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.

Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. “It’s very rare to be questioned on our searches,” Snowden told the Guardian in June, “and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification’.”

In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.

Acknowledging what he called “a number of compliance problems”, Clapper attributed them to “human error” or “highly sophisticated technology issues” rather than “bad faith”.

However, Wyden said on the Senate floor on Tuesday: “These violations are more serious than those stated by the intelligence community, and are troubling.”

In a statement to the Guardian, the NSA said: “NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.

“XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.

“Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”

“Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

“These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”

Advertisements

Hackers Demonstrate How Easy it is to Carjack a Vehicle Remotely

Demonstration supports theory that journalist Michael Hastings car was remotely hijacked

Adan Salazar
Infowars.com
July 25, 2013

Forbes Magazine has produced a short video report demonstrating how easy it is for computer hackers to assume control of a vehicle remotely, a fascinating revelation in light of theories claiming Rolling Stone journalist Michael Hastings may have been assassinated using remote carjacking technology already well within the government’s disposal.

Forbes journalist Andy Greenburg recently met with two hackers who re-wired a Toyota Prius to be controlled via an Apple MacBook. Once the pair of hackers attached to the correct set of ports, they were able to input commands spoofing the car’s various sensors, making it to perform a wide range of seemingly impossible stunts.

“They sent commands from their laptops that killed power steering, spoofed the GPS and made pathological liars out of speedometers and odometers,” wrote Greenberg. “Finally they directed me out to a country road, where Valasek showed that he could violently jerk the Prius’ steering at any speed, threatening to send us into a cornfield or a head-on collision.”

Map outlines a few of the features that can be controlled via computer commands. / image courtesy of Forbes Magazine.

Map outlines a few of the features that can be controlled via computer commands. / Image courtesy of Forbes Magazine.

One of the digital carjackers, Chris Valasek, 31, is a director of security intelligence at the Seattle computer security services consulting firm IOActive, a company specializing in industrial smart grid technologies and software assurance. The company recently received an $80,000 grant from the Department of Defense’s DARPA program to “root out security vulnerabilities in automobiles,” according to Greenburg.

“Imagine you’re driving down a highway at 80,” Valasek says. “You’re going into the car next to you or into oncoming traffic. That’s going to be bad times.”

The hackers are also able to kill or initiate the car’s brakes and control the car’s horn and headlights, as well as tighten the passengers’ and driver’s seat belts at will.

Despite the relative ease by which the hackers are able to take command of the vehicle, car companies have remained virtually silent regarding their automobiles’ potential to be remotely accessed and manipulated.

The hackers’ road test not only highlights the serious vulnerabilities built-in to modern cars, it also lends credence to statements made by Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke.

As learned last month, Clarke told The Huffington Post that Rolling Stone journalist Michael Hastings’ car crash was “consistent with a car cyber attack.”

“What has been revealed as a result of some research at universities is that it’s relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn’t want acceleration, to throw on the brakes when the driver doesn’t want the brakes on, to launch an air bag,” Clarke told The Huffington Post. “You can do some really highly destructive things now, through hacking a car, and it’s not that hard.”

“I’m not a conspiracy guy. In fact, I’ve spent most of my life knocking down conspiracy theories,” said Clarke. “But my rule has always been you don’t knock down a conspiracy theory until you can prove it

. And in the case of Michael Hastings, what evidence is available publicly is consistent with a car cyber attack. And the problem with that is you can’t prove it.”

33-year-old BuzzFeed and Rolling Stone reporter Michael Hastings died in a fiery car wreck in Hollywood on June 20 when his Mercedes C250 Coupe allegedly hit a tree at high speed, supposedly causing his engine to fly out 100 feet from the site of the crash.

Friends of Hastings say the circumstances surrounding his death don’t add up as he drove “like a grandma,” making the explanation that he would barrel down the road in the middle of the night at high speed highly suspicious.

According to one of his books, Hastings had been the target of multiple death threats following his coverage of the war in Afghanistan, which ultimately led to the resignation of Gen. Stanley A. McChrystal.

The deceased writer is said to have been working on his “biggest story yet” about the CIA, according to his close friend Staff Sgt. Joe Biggs.

Role Reversal: How the US Became the USSR

Paul Craig Roberts
Infowars.com
July 24, 2013

I spent the summer of 1961 behind the Iron Curtain. I was part of the US-USSR student exchange program. It was the second year of the program that operated under auspices of the US Department of State. Our return to the West via train through East Germany was interrupted by the construction of the Berlin Wall. We were sent back to Poland. The East German rail tracks were occupied with Soviet troop and tank trains as the Red Army concentrated in East Germany to face down any Western interference.

Fortunately, in those days there were no neoconservatives. Washington had not grown the hubris it so well displays in the 21st century. The wall was built and war was avoided. The wall backfired on the Soviets. Both JFK and Ronald Reagan used it to good propaganda effect.

In those days America stood for freedom, and the Soviet Union for oppression. Much of this impression was created by Western propaganda, but there was some semblance to the truth in the image. The communists had a Julian Assange and an Edward Snowden of their own. His name was Cardinal Jozef Mindszenty, the leader of the Hungarian Catholic Church.

Mindszenty opposed tyranny. For his efforts he was imprisoned by the Nazis. Communists also regarded his as an undesirable, and he was tortured and given a life sentence in 1949.

Freed by the short-lived Hungarian Revolution in 1956, Mindszenty reached the American Embassy in Budapest and was granted political asylum by Washington. However, the communists would not give him the free passage that asylum presumes, and Mindszenty lived in the US Embassy for 15 years, 79% of his remaining life.

In the 21st century roles have reversed. Today it is Washington that is enamored of tyranny. On Washington’s orders, the UK will not permit Julian Assange free passage to Ecuador, where he has been granted asylum. Like Cardinal Mindszenty, Assange is stuck in the Ecuadoran Embassy in London.

Washington will not permit its European vassal states to allow overflights of airliners carrying Edward Snowden to any of the countries that have offered Snowden asylum. Snowden is stuck in the Moscow airport.

In Washington politicians of both parties demand that Snowden be captured and executed. Politicians demand that Russia be punished for not violating international law, seizing Snowden, and turning him over to Washington to be tortured and executed, despite the fact that Washington has no extradition treaty with Russia.

Snowden did United States citizens a great service. He told us that despite constitutional prohibition, Washington had implemented a universal spy system intercepting every communication of every American and much of the rest of the world. Special facilities are built in which to store these communications.

In other words, Snowden did what Americans are supposed to do–disclose government crimes against the Constitution and against citizens. Without a free press there is nothing but the government’s lies. In order to protect its lies from exposure, Washington intends to exterminate all truth tellers.

The Obama Regime is the most oppressive regime ever in its prosecution of protected whistleblowers. Whistleblowers are protected by law, but the Obama Regime insists that whistleblowers are not really whistleblowers. Instead, the Obama Regime defines whistleblowers as spies, traitors, and foreign agents. Congress, the media, and the faux judiciary echo the executive branch propaganda that whistleblowers are a threat to America. It is not the government that is violating and raping the US Constitution that is a threat. It is the whistleblowers who inform us of the rape who are the threat.

The Obama Regime has destroyed press freedom. A lackey federal appeals court has ruled that NY Times reporter James Risen must testify in the trial of a CIA officer charged with providing Risen with information about CIA plots against Iran. The ruling of this fascist court destroys confidentiality and is intended to end all leaks of the government’s crimes to media.

What Americans have learned in the 21st century is that the US government lies about everything and breaks every law. Without whistleblowers, Americans will remain in the dark as “their” government enserfs them, destroying every liberty, and impoverishes them with endless wars for Washington’s and Wall Street’s hegemony.

Snowden harmed no one except the liars and traitors in the US government. Contrast Washington’s animosity against Snowden with the pardon that Bush gave to Dick Cheney aide, Libby, who took the fall for his boss for blowing the cover, a felony, on a covert CIA operative, the spouse of a former government official who exposed the Bush/Cheney/neocon lies about Iraqi weapons of mass destruction.

Whatever serves the tiny clique that rules america is legal; whatever exposes the criminals is illegal.

That’s all there is to it.

Dr. Paul Craig Roberts is the father of Reaganomics and the former head of policy at the Department of Treasury. He is a columnist and was previously the editor of the Wall Street Journal. His latest book, “How the Economy Was Lost: The War of the Worlds,” details why America is disintegrating.

FEMA Camps: Kingwood, WV

Located just north of the WV I-68 rest area

kingwood-camp-i68-restarea-1e-lbl

A closer look at the compound:

kingwood-camp-i68-restarea-2e

A look at a completed prison:

kingwood-camp-i68-restarea-3e

Google Maps images, the secondary and tertiary camps are more than likely completed at this point.  Having seen the site myself (from a distance), the towers and fencing are completed for site 2.  The site is surrounded by hills on all sides, making it difficult to get any meaningful ground-based pictures.  I would assume that site 2 is complete with site 3 already at, or nearing completion.

 

Stand up, Speak Out, and Talk HARD!!!

 

-Prometheus Unchained
7/20/2013

prometheus@prometheusunchained.us
https://prometheusunchainedus.wordpress.com

 

Coup d’etat

An unconstitutional government is an illegitimate government.

Paul Craig Roberts
Infowars.com
July 17, 2013

The American people have suffered a coup d’etat, but they are hesitant to acknowledge it. The regime ruling in Washington today lacks constitutional and legal legitimacy. Americans are ruled by usurpers who claim that the executive branch is above the law and that the US Constitution is a mere “scrap of paper.”

An unconstitutional government is an illegitimate government. The oath of allegiance requires defense of the Constitution “against all enemies, foreign and domestic.” As the Founding Fathers made clear, the main enemy of the Constitution is the government itself. Power does not like to be bound and tied down and constantly works to free itself from constraints.

The basis of the regime in Washington is nothing but usurped power. The Obama Regime, like the Bush/Cheney Regime, has no legitimacy. Americans are oppressed by an illegitimate government ruling, not by law and the Constitution, but by lies and naked force. Those in government see the US Constitution as a “chain that binds our hands.”

The South African apartheid regime was more legitimate than the regime in Washington. The apartheid Israeli regime in Palestine is more legitimate. The Taliban are more legitimate. Muammar Gaddafi and Saddam Hussein were more legitimate.

The only constitutional protection that the Bush/Obama regime has left standing is the Second Amendment, a meaningless amendment considering the disparity in arms between Washington and what is permitted to the citizenry. No citizen standing with a rifle can protect himself and his family from one of the Department of Homeland Security’s 2,700 tanks, or from a drone, or from a heavily armed SWAT force in body armor.

Like serfs in the dark ages, American citizens can be picked up on the authority of some unknown person in the executive branch and thrown in a dungeon, subject to torture, without any evidence ever being presented to a court or any information to the person’s relatives of his/her whereabouts. Or they can be placed on a list without explanation that curtails their right to travel by air. Every communication of every American, except face-to-face conversation in non-bugged environments, is intercepted and recorded by the National Stasi Agency from which phrases can be strung together to produce a “domestic extremist.”

If throwing an American citizen in a dungeon is too much trouble, the citizen can simply be blown up with a hellfire missile launched from a drone. No explanation is necessary.
For the Obama tyrant, the exterminated human being was just a name on a list.

The president of the united states has declared that he possesses these constitutionally forbidden rights, and his regime has used them to oppress and murder US citizens. The president’s claim that his will is higher than law and the Constitution is public knowledge. Yet, there is no demand for the usurper’s impeachment. Congress is supine. The serfs are obedient.

The people who helped transform a democratically accountable president into a Caesar include John Yoo, who was rewarded for his treason by being accepted as a law professor at the University of California, Berkeley, Boalt school of law. Yoo’s colleague in treason, Jay Scott Bybee was rewarded by being appointed a federal judge on the US Court of Appeals for the Ninth Circuit. We now have a Berkeley law professor teaching, and a federal circuit judge ruling, that the executive branch is above the law.

The executive branch coup against America has succeeded. The question is: will it stand? Today, the executive branch consists of liars, criminals, and traitors. The evil on earth seems concentrated in Washington.

Washington’s response to Edward Snowden’s evidence that Washington, in total contravention of law both domestic and international, is spying on the entire world has demonstrated to every country that Washington places the pleasure of revenge above law and human rights.

On Washington’s orders, its European puppet states refused overflight permission to the Bolivian presidential airliner carrying President Morales and forced the airliner to land in Austria and be searched. Washington thought that Edward Snowden might be aboard the airliner. Capturing Snowden was more important to Washington than respect for international law and diplomatic immunity.

How long before Washington orders its UK puppet to send in a SWAT team to drag Julian Assange from the Ecuadoran embassy in London and hand him over to the CIA for waterboarding?

On July 12 Snowden met in the Moscow airport with human rights organizations from around the world. He stated that the illegal exercise of power by Washington prevents him from traveling to any of the three Latin American countries who have offered him asylum. Therefore, Snowden said that he accepted Russian President Putin’s conditions and requested asylum in Russia.

Insouciant americans and the young unaware of the past don’t know what this means. During my professional life it was Soviet Russia that persecuted truth tellers, while America gave them asylum and tried to protect them. Today it is Washington that persecutes those who speak the truth, and it is Russia that protects them.

The American public has not, this time, fallen for Washington’s lie that Snowden is a traitor. The polls show that a majority of Americans see Snowden as a whistleblower.
It is not the US that is damaged by Snowden’s revelations. It is the criminal elements in the US government that have pulled off a coup against democracy, the Constitution, and the American people who are damaged. It is the criminals who have seized power, not the American people, who are demanding Snowden’s scalp.

The Obama Regime, like the Bush/Cheney Regime, has no legitimacy. Americans are oppressed by an illegitimate government ruling, not by law and the Constitution, but by lies and naked force.

Under the Obama tyranny, it is not merely Snowden who is targeted for extermination, but every truth-telling American in the country. It was Department of Homeland Security boss Janet Napolitano, recently rewarded for her service to tyranny by being appointed Chancellor of the of the University of California system, who said that Homeland Security had shifted its focus from Muslim terrorists to “domestic extremists,” an elastic and undefined term that easily includes truth-tellers like Bradley Manning and Edward Snowden who embarrass the government by revealing its crimes. The criminals who have seized illegitimate power in Washington cannot survive unless truth can be suppressed or redefined as treason.

If Americans acquiesce to the coup d’etat, they will have placed themselves firmly in the grip of tyranny.

Dr. Paul Craig Roberts is the father of Reaganomics and the former head of policy at the Department of Treasury. He is a columnist and was previously the editor of the Wall Street Journal. His latest book, “How the Economy Was Lost: The War of the Worlds,” details why America is disintegrating.

Report: Michael Hastings’ Body Cremated Against Family’s Wishes

Journalist feared big story could make him a target

Paul Joseph Watson
Infowars.com
July 17, 2013

Rolling Stone journalist Michael Hastings’ body was cremated against his family’s wishes, destroying potential evidence that could have contradicted the explanation that he died as a result of an accident, according to San Diego 6 reporter Kimberly Dvorak.

Hastings was killed in the early hours of June 18 in the Hancock Park neighborhood of Los Angeles when his Mercedes crashed into a tree at high speed and exploded into flames, sparking theories that the journalist, who was working on a major exposé of the CIA, could have been assassinated.

Stating that she had spoken with several close friends of the family, including Alex Jones Show guest Staff Sergeant Joe Biggs, Dvorak said, “A close family friend did confirm that Michael’s body was sent home in an urn, meaning he was cremated and it wasn’t the request of the family….in fact the family wanted Michael’s body to go home.”

Dvorak said the decision to cremate Hastings against his family’s wishes was “shocking” because it ensured that evidence of any substance (or indeed the absence of any substance) inside his body was lost. According to Hastings’ family, the journalist had not drunk alcohol for five years.

Dvorak added that Hastings had spoken with an attorney before his death who has all the details about the story Hastings was working on. Hastings refrained from telling his wife about the story “because he said he wanted to protect her from knowing anything so if anything were to happen to him nothing could happen to her,” said Dvorak.

Hastings wife has now hired a private investigator to look into the writer’s death, according to Dvorak.

Dvorak also revealed that she had personally been threatened as a result of her efforts to investigate Hastings’ death on behalf of San Diego 6. Aside from Infowars, the news channel is the only media organization asking questions about what happened.

“Despite the LAPD’s categorization of the Hasting fatal accident as a “no (evidence of) foul play,” LAPD continues to ignore FOIA (CPRA in Calif.) requests made by San Diego 6 News for the police report, 9/11 call, autopsy, bomb squad and toxicology reports, or make the Mercedes available for inspection which only fuels conjecture,” writes Dvorak.

As we reported earlier this month, Dvorak’s investigation also uncovered the fact that police and firefighters in the area have been given a gag order and told not to talk to the media about Hastings’ death.

Although the LAPD ruled out foul play days after the incident, automotive experts questioned why Hastings’ brand new Mercedes exploded into flames with such ferocity and why the engine was found 150 feet behind the vehicle.

Former counter-terror czar Richard Clarke reacted to the news by telling the Huffington Post that the fatal crash was “consistent with a car cyber attack.” Academic studies show that it is relatively easy to hack and remote control a modern day vehicle.

Hastings sent out an email to friends and colleagues 15 hours before his car crash stating he was “onto a big story” and needed “to go off the rada[r] for a bit.”

According to colleagues, Hastings was “incredibly tense and very worried, and was concerned that the government was looking in on his material,” and also a “nervous wreck” in response to the surveillance of journalists revealed by the AP phone tapping scandal and the NSA PRISM scandal.

After Wikileaks reported that Hastings had contacted them a few hours before his death complaining that he was under FBI investigation, other friends confirmed that the journalist was “very paranoid” about the feds watching him.

Hastings routinely received death threats as a result of his hard-hitting journalism, particularly in relation to his 2010 exposé of Gen. Stanley A. McChrystal.

Hastings’ close friend Staff Sergeant Joe Biggs, who told Fox News that the journalist “drove like a grandma” and was working on “the biggest story yet” about the CIA before his death, joined Alex Jones yesterday to discuss latest developments and his plans to personally investigate Hastings’ death on behalf of Infowars.

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

» ‘Heroic effort at great personal cost’: Edward Snowden nominated for Nobel Peace Prize Alex Jones’ Infowars: There’s a war on for your mind!.

A Swedish sociology professor has nominated Edward Snowden for the Nobel Peace Prize. He says the NSA whistleblower could help “save the prize from the disrepute incurred by the hasty and ill-conceived decision” to give the 2009 award to Barack Obama.

In his letter addressed to the Norwegian Nobel Committee, Stefan Svallfors praised Snowden for his “heroic effort at great personal cost.” He stated that by revealing the existence and the scale of the US surveillance programs, Snowden showed “individuals can stand up for fundamental rights and freedoms.”

Police, Firefighters Ordered Not To Speak About Michael Hastings Crash

LAPD refuses to release police report to journalists

Paul Joseph Watson
Infowars.com
July 9, 2013

Police and firefighters in Los Angeles have been ordered not to speak to the media about the deadly crash involving Rolling Stone journalist Michael Hastings, fueling speculation that some form of cover-up could be underway.

San Diego 6 journalist Kimberly Dvorak says she was unable to obtain the police report concerning the crash despite the fact that the LAPD already ruled out “foul play” days after the incident.

A gag order has also been placed on cops and firefighters who both responded to and investigated the crash, which occurred in the early hours of June 18 in the Hancock Park neighborhood of Los Angeles.

“When you go to the LA police department and you go to the fire department….they all said they couldn’t comment and some of them said they were told not to comment on this story,” said Dvorak.

The journalist added that she talked to “military personnel” who commented that the inferno which consumed Hastings’ Mercedes was an extremely hot fire that “is not something you normally see with a car like this,” and that Mercedes itself was waiting to hear from the LAPD but has not been contacted.

Dvorak also noted that the engine from Hastings’ vehicle was found 150 feet behind the car, contradicting testimony from two university physics professors who said that “the engine would go with the forward velocity of the (vehicle).”

HIghlighting the absence of skid marks on the road, Dvorak said she was inclined to surmise that the car either malfunctioned or “there was something on the car that allowed that to trigger and blow up,” noting that Mercedes denied their vehicle could have exploded in the manner seen in the incident that killed Hastings.

Dvorak also mentioned two separate academic studies out of the University of Washington and the University of California, San Diego which both detail how modern cars can easily be hacked and remote controlled, a premise also raised by former counter-terror czar Richard Clarke, who told the Huffington Post that the fatal crash of Hastings’ Mercedes C250 Coupe was “consistent with a car cyber attack.”

As we previously reported, questions surrounding Hastings’ untimely death have emerged primarily because the journalist was working on “the biggest story yet” about the CIA before he was killed.

The writer also sent out an email 15 hours before his car crash stating he was “onto a big story” and needed “to go off the rada[r] for a bit.”

According to colleagues, Hastings was “incredibly tense and very worried, and was concerned that the government was looking in on his material,” and also a “nervous wreck” in response to the surveillance of journalists revealed by the AP phone tapping scandal and the NSA PRISM scandal.

After Wikileaks reported that Hastings had contacted them a few hours before his death complaining that he was under FBI investigation, other friends confirmed that the journalist was “very paranoid” about the feds watching him.

Another close friend of Hastings, Staff Sergeant Joseph Biggs, told Fox News that Hastings “drove like a grandma” and that it was totally out of character for him to be speeding in the early hours of the morning.

Hastings had made numerous powerful enemies as a result of his exposure of Gen. Stanley A. McChrystal in 2010, receiving several death threats in the process.

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

This article was posted: Tuesday, July 9, 2013 at 5:49 am

Snowden Claims: NSA Ties Put German Intelligence in Tight Spot

The German foreign intelligence service knew more about the activities of the NSA in Germany than previously known. “They’re in bed together,” Edward Snowden claims in an interview in SPIEGEL. The whistleblower also lodges fresh allegations against the British.

For weeks now, officials at intelligence services around the world have been in suspense as one leak after another from whistleblower Edward Snowden has been published. Be it America’s National Security Agency, Britain’s GCHQ or systems like Prism or Tempora, he has been leaking scandalous information about international spying agencies. In an interview published by SPIEGEL in its latest issue, Snowden provides additional details, describing the closeness between the US and German intelligence services as well as Britain’s acquisitiveness when it comes to collecting data.

In Germany, reports of the United States’ vast espionage activities have surprised and upset many, including politicians. But Snowden isn’t buying the innocence of leading German politicians and government figures, who say that they were entirely unaware of the spying programs. On the contrary, the NSA people are “in bed together with the Germans,” the whistleblower told American cryptography expert Jacob Appelbaum and documentary filmmaker Laura Poitras in an interview conducted with the help of encrypted emails shortly before Snowden became a globally recognized name.

Snowden describes the intelligence services partnerships in detail. The NSA even has a special department for such cooperation, the Foreign Affairs Directorate, he says. He also exposes a noteworthy detail about how government decision-makers are protected by these programs. The partnerships are organized in a way so that authorities in other countries can “insulate their political leaders from the backlash” in the event it becomes public “how grievously they’re violating global privacy,” the former NSA employee says.

Intensive Cooperation with Germany

SPIEGEL reporting also indicates that cooperation between the NSA and Germany’s foreign intelligence service, the BND, is more intensive than previously known. The NSA, for example, provides “analysis tools” for the BND to monitor signals from foreign data streams that travel through Germany. Among the BND’s focuses are the Middle East route through which data packets from crisis regions travel.

BND head Gerhard Schindler confirmed the partnership during a recent meeting with members of the German parliament’s control committee for intelligence issues.

But it’s not just the BND’s activities that are the focus of the interview with Snowden.

The 30-year-old also provides new details about Britain’s Government Communications Headquarters (GCHQ). He says that Britain’s Tempora system is the signal intelligence community’s first “full-take Internet buffer,” meaning that it saves all of the data passing through the country.

Data Remains Buffered for Three Days

The scope of this “full take” system is vast. According to Snowden and Britain’s Guardian newspaper, Tempora stores communications data for up to 30 days and saves all content for up to three days in a so-called Internet buffer. “It snarfs everything in a rolling buffer to allow retroactive investigation without missing a single bit,” Snowden says.

Asked if it is possible to get around this total surveillance of all Internet communication, he says: “As a general rule, so long as you have any choice at all, you should never route through or peer with the UK under any circumstances.”

In other words, Snowden says, one can only prevent GCHQ from accessing their data if they do not send any information through British Internet lines or servers. However, German Internet experts believe this would be almost impossible in practice.

Metadata Provide Orientation in Sea of Data

The attempt to conduct total data retention is noteworthy because most of the leaks so far in the spying scandal have pertained to so-called metadata. In the interview, Snowden reiterates just how important metadata — which can include telephone numbers, IP addresses and connection times, for example — really are. “In most cases, content isn’t as valuable as metadata,” Snowden says.Those in possession of metadata can determine who has communicated with whom. And using the metadata, they can determine which data sets and communications content they would like to take a closer look at. “The metadata tells you what out of their data stream you actually want,” Snowden says.

It is becoming increasingly clear to recognize the way in which surveillance programs from the NSA and GCHQ — including Prism, Tempora and Boundless Informant — cooperate. The metadata provides analysts with tips on which communications and content might be interesting. Then, Snowden says, with the touch of a button they can then retrieve or permanently collect the full content of communications that have already been stored for a specific person or group, or they can collect future communications. But a person can also be “selected for targeting based on, for example, your Facebook or webmail content.”

jok/cis/dsl

 

%d bloggers like this: