Skip navigation

Category Archives: Big Brother

Feds Investigate “Racist” Depiction of Obama as a Zombie

Making fun of the president is now considered a domestic threat requiring DOJ intervention
 
Feds Investigate "Racist" Depiction of Obama as a Zombie

by Paul Joseph Watson | July 11, 2014


Following complaints by the NAACP, the Department of Justice is investigating a parade float, labeled “racist” by the Nebraska Democratic Party, which featured President Obama depicted as a zombie.

The float, which featured in last week’s July 4th annual Independence Day parade in Norfolk, Nebraska, depicted a zombie stood outside a hut adorned with the words “Obama Presidential Library.”

The Nebraska Democratic Party responded by describing the float as among the “worst shows of racism and disrespect for the office of the presidency that Nebraska has ever seen.”

What makes the controversy even more ludicrous is that the creator of the float, a local farmer, said the zombie wasn’t even supposed to represent Obama, but instead was a depiction of a victim of the recent VA health care scandal.

After the NAACP complained about the float to the Department of Justice, the DOJ demanded a meeting with Mayor Fuchtman and city administrators before the two parties met with NAACP representatives and parade organizers, who “plan to reevaluate the policies for what is allowed in the parade,” according to KTVI.

“The DOJ apparently told the city it had received concerns, including from the NAACP, regarding the float,” reports KMTV.

Since the float has nothing whatsoever to do with criminal behavior or a criminal investigation, we can only assume that the Justice Department’s involvement is related to its function, “to ensure public safety against threats foreign and domestic.”

Are we now to assume that depicting Obama as a zombie or any other fictional character, or indeed merely having people think that he is being depicted as a fictional character, represents some kind of major domestic threat that requires federal government intervention?

In addition, making fun of Obama in a manner which has no connection to race whatsoever is now apparently considered racist anyway, just as previous depictions of Obama as the Joker out of Batman were also labeled racist, despite George W. Bush having been depicted as the very same character.

The notion that a parade float which represents creative criticism of the way the Obama administration has handled the VA scandal could represent some kind of a threat which requires the attention and resources of the federal government sounds like something straight out of North Korea.

Facebook @ https://www.facebook.com/paul.j.watson.71
FOLLOW Paul Joseph Watson @ https://twitter.com/PrisonPlanet

Visiting Websites About Privacy Gets You Put in an NSA Database of “Extremists”

Posted By Paul Joseph Watson On July 3, 2014

Searching for online articles about privacy is enough to get someone put in an NSA database of “extremists,” according to new revelations published today.

In an article for German news outlet Tagesschau (translation here), Lena Kampf, Jacob Appelbaum and John Goetz reveal how the NSA’s “deep packet inspection” rules, which it uses to determine who to target for deep surveillance, include looking for web users who search for articles about Tor and Tails, an anonymous browser and a privacy-friendly operating system.

Those whose Internet traffic patterns suggest merely an interest in Tor or Tails are immediately put on a list of “extremists,” as is anyone who actually uses the Tor network.

 “Tor and Tails have been part of the mainstream discussion of online security, surveillance and privacy for years. It’s nothing short of bizarre to place people under suspicion for searching for these terms,” writes Boing Boing’s Cory Doctorow, adding that the NSA’s goal is, “to split the entire population of the Internet into “people who have the technical know-how to be private” and “people who don’t” and then capture all the communications from the first group.”

The revelation once again highlights the fact that the NSA’s data dragnet has little to do with catching terrorists and everything to do with targeting anyone who values their right to privacy. The mass collection of such information only serves to make it easier for actual bad guys to evade detection since the federal agency is building such vast and unwieldy databases.

Earlier this week, journalist Glenn Greenwald announced that he was set to release new information based on leaked documents obtained by whistleblower Edward Snowden which would reveal which individuals and institutions were the targets of NSA spying.

However, at the last minute Greenwald said the story would be postponed as a result of the U.S. government, “suddenly began making new last-minute claims which we intend to investigate before publishing.”

Facebook @ https://www.facebook.com/paul.j.watson.71
FOLLOW Paul Joseph Watson @ https://twitter.com/PrisonPlanet

*********************

Paul Joseph Watson is the editor at large of Infowars.com and Prison Planet.com.

Government Spies On Innocent People Via Webcams, Laptops, Xbox

Latest Snowden Leak confirms story Infowars first broke EIGHT YEARS AGO

Steve Watson
Infowars.com
February 27, 2014

The latest revelation concerning mass government spying confirms an issue that Infowars has been covering for close to a decade. British and American governments are spying on people in their own homes via web cams, laptop microphones and devices such as the X-box.

The London Guardian has the details in a report based on information leaked by NSA whistleblower Edward Snowden.

The British surveillance agency GCHQ, with help from the NSA, actively spied on nearly 2 million Yahoo users via webcams built into their computers. The documents show that the agency intercepted millions of images as part of a secret program codenamed OPTIC NERVE.

The report also states that Americans were almost certainly targeted as part of the bulk collection of data, and that there is no law to prevent such activity in Britain.

NSA ragout 4

The documents show that images were collected from webcams at regular intervals, one image every five minutes, and were used by the spy agency to trial automated facial recognition programs.

The Guardian describes the process as “eerily reminiscent of the telescreens evoked in George Orwell’s 1984.”

NSA ragout 3

The documents dub the practice as “bulk access to Yahoo webcam images/events”, and spies working at GCHQ compared it to a police database of mugshots. “Face detection has the potential to aid selection of useful images for ‘mugshots’ or even for face recognition by assessing the angle of the face,” the papers read. “The best images are ones where the person is facing the camera with their face upright.”

Essentially, the spy agency appear to have been building a huge digital database containing the faces of Yahoo users.

The documents advise employees at GCHQ on how to use the system, noting “[I]f you search for similar IDs to your target, you will be able to request automatic comparison of the face in the similar IDs to those in your target’s ID”.

In one presentation contained within the documents, more technologically advanced systems, such as iris recognition cameras, are discussed as potential surveillance tools. The paper even chillingly states “think Tom Cruise in Minority Report”.

The documents state that Yahoo users were specifically singled out because “Yahoo webcam is known to be used by GCHQ targets”.

The papers also note that a large quantity of the data collected contained nudity or sexually explicit imagery. The spy agency seemingly made no effort to prevent the collection of such images.

Yahoo described the practice as “a whole new level of violation of our users’ privacy,” and strenuously denied having any knowledge of the program.

Infowars first reported in 2006, EIGHT YEARS AGO, that innocent people were being spied on through their computers. We specifically described the practice as Minority Report style technology, as the GCHQ had done.

We have since covered the issue consistently, warning that “Hundreds of millions of Internet-active Americans will all be potential targets for secret surveillance.”

Of course, some quarters dismissed our reports as “conspiracy theories”, while worried internet users questioned whether the reports were accurate.

The GCHQ program was seemingly not limited to Yahoo user web cams either. Another presentation within the leaked internal papers discusses the capabilities of the Xbox 360′s Kinect camera, saying it generated “fairly normal webcam traffic” and that it was being evaluated as a potential surveillance tool.

We have also documented the potential use of Xbox for surveillance purposes, noting that Skype calls made on the devices can be intercepted. We have also warned that the ‘always on’ camera of the new Xbox One, which is so powerful it can see through clothing, is wide open to abuse by hackers and government agencies.

According to the leaked documents, the OPTIC NERVE program began as a prototype in 2008 and was still active in 2012. There is no indication that the program has been deactivated.

Security expert Bruce Schneier writes that this latest revelation highlights how there is no distinction between actively spying on a person and what he called “Eavesdropping by algorithm”, in other words, automated computer surveillance. The NSA and the Obama administration have attempted to argue that what they are doing cannot be called “spying” or even “collecting” data, because when the data is gathered, a person is not looking at it. Director of National Intelligence James Clapper still uses this explanation to claim he never lied to Congress when he answered ‘no’ to the question “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?”

The fallout from the OPTIC NERVE program, the creation of facial recognition databases, and the fact that spooks provably looked at images of people, even NAKED images of people, highlights the fact, Schneier argues, that the “NSA’s definition of ‘collect’ makes no sense whatsoever”, and that our governments are indeed actively spying on us.

—————————————————————-

Steve Watson is the London based writer and editor for Alex Jones’ Infowars.com, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from Nottingham Trent University.

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

By 24 Feb 2014, 6:25 PM EST
Featured photo - How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations A page from a GCHQ top secret document prepared by its secretive JTRIG unit

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations”.

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world”, including “information ops (influence or disruption)”.

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the newly created NSA review panel announced by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell”, devoted to “online human intelligence” and “strategic influence and disruption”:

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack”, while dissecting how human being can be manipulated using “leaders”, “trust, “obedience” and “compliance”:

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

Think Tank: “Extraordinary Crisis” Needed to Preserve “New World Order”

Author of ‘shock and awe’ doctrine says elite threatened by non-state actors like Edward Snowden

Paul Joseph Watson
Infowars.com
January 17, 2014

Writing for the Atlantic Council, a prominent think tank based in Washington DC, Harlan K. Ullman warns that an “extraordinary crisis” is needed to preserve the “new world order,” which is under threat of being derailed by non-state actors like Edward Snowden.

Image: Atlantic Council Meeting (Wikimedia Commons).

The Atlantic Council is considered to be a highly influential organization with close ties to major policy makers across the world. It’s headed up by Gen. Brent Scowcroft, former United States National Security Advisor under U.S. Presidents Gerald Ford and George H. W. Bush. Snowcroft has also advised President Barack Obama.

Harlan K. Ullman was the principal author of the “shock and awe” doctrine and is now Chairman of the Killowen Group which advises government leaders.

In an article entitled War on Terror Is not the Only Threat, Ullman asserts that, “tectonic changes are reshaping the international geostrategic system,” arguing that it’s not military superpowers like China but “non-state actors” like Edward Snowden, Bradley Manning and anonymous hackers who pose the biggest threat to the “365 year-old Westphalian system” because they are encouraging individuals to become self-empowered, eviscerating state control.

“Very few have taken note and fewer have acted on this realization,” notes Ullman, lamenting that “information revolution and instantaneous global communications” are thwarting the “new world order” announced by U.S. President George H.W. Bush more than two decades ago.

“Without an extraordinary crisis, little is likely to be done to reverse or limit the damage imposed by failed or failing governance,” writes Ullman, implying that only another 9/11-style cataclysm will enable the state to re-assert its dominance while “containing, reducing and eliminating the dangers posed by newly empowered non-state actors.”

Ullman concludes that the elimination of non-state actors and empowered individuals “must be done” in order to preserve the new world order. A summary of their material suggests that the Atlantic Council’s definition of a “new world order” is a global technocracy run by a fusion of big government and big business under which individuality is replaced by transhumanist singularity.

Ullman’s rhetoric sounds somewhat similar to that espoused by Trilateral Commission co-founder and regular Bilderberg attendee Zbigniew Brzezinski, who in 2010 told a Council on Foreign Relations meeting that a “global political awakening,” in combination with infighting amongst the elite, was threatening to derail the move towards a one world government.

Ullman’s implied call for an “extraordinary crisis” to reinvigorate support for state power and big government has eerie shades of the Project For a New American Century’s 1997 lament that “absent some catastrophic catalyzing event – like a new Pearl Harbor,” an expansion of U.S. militarism would have been impossible.

In 2012, Patrick Clawson, member of the influential pro-Israel Washington Institute for Near East Policy (WINEP) think tank, also suggested that the United States should launch a staged provocation to start a war with Iran.

Ullman’s concern over failing state institutions having their influence eroded by empowered individuals, primarily via the Internet, is yet another sign that the elite is panicking over the “global political awakening” that has most recently expressed itself via the actions of people like Edward Snowden, Julian Assange, Bradley Manning and their growing legion of supporters.

Facebook @ https://www.facebook.com/paul.j.watson.71
FOLLOW Paul Joseph Watson @ https://twitter.com/PrisonPlanet

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

This article was posted: Friday, January 17, 2014 at 6:09 am

DHS Insider: “Preparations Have Been Finalized to Respond to a Crisis of Unprecedented Magnitude Within the United States”

Douglas J. Hagmann
SHTF plan
December 28, 2013

Editor’s Note: One of the questions oft asked in alternative news circles is why, if elements within the U.S. government intend to collapse our economy and implement martial law, no one within these circles has spoken out.

Image: DHS (Wikimedia Commons).

The fact is that scores of people have made it their duty to alert the American people to what’s going on behind the scenes. They’ve told us of the corruption and backroom deals. They’ve given us the warning signs to look for, many of which have already come to pass. They’ve even made us aware of the government’s response should the worst come to pass. Detractors often dismiss the warnings and insider reports as bogus, often claiming that if the sources are anonymous they can’t be legitimate. But do we blame them for taking extreme steps to protect their identities? Edward Snowden and Bradley Manning showed their faces, and now they will spend their lives as targets. Given what happened to these whistle blowers, is it any surprise that others with insider knowledge refuse to speak out in an official capacity?

The following warning comes to us from an anonymous source embedded deep within the Department of Homeland Security who has taken it upon himself to share his knowledge with our audience through the generous contrtributions of the Hagmann and Hagmann Report via the Northeast Intelligence Network. The insider has taken extraordinary measures to remain anonymous, but given what we know the government is up to and the signs we see all around us, does his desire for anonymity make his claims any less legitimate than if he had included his name?

We’ve long argued that any manufactured event would be telegraphed to the general public by whistle blowers on the inside. Deny the possibility if you so choose, but this insider, along with others who have shared their information may well be the only warning you’ll ever receive. As the Insider notes, most people simply have no idea what’s coming, nor do they care to. One morning they’ll wake up and all hell will have broken loose.

 

Under the cover and amid the distraction of the Christmas bustle, I had my last “official” contact with a source inside the Department of Homeland Security known as “Rosebud” in my writings. My source is leaving his position, retiring along with numerous others choosing to leave this bureaucratic monstrosity. For this contact, my source took unprecedented measures to be certain that our contact was far off the radar of prying government eyes and ears. I was stunned at the lengths he employed, and even found myself somewhat annoyed by the inconvenience that his cloak-and-dagger approach caused. It was necessary, according to my source, because all department heads under FEMA and DHS are under orders to identify anyone disclosing any information for termination and potential criminal prosecution.

“DHS is like a prison environment, complete with prison snitches,” he said, referring to the search for leaks and leakers. And the warden is obsessed. Ask anyone in DHS. No one trusts anyone else and whatever sources might be left are shutting up. The threats that have been made far exceed anything I’ve ever seen. Good people are afraid for their lives and the lives of their families. We’ve all been threatened. They see the writing on the wall and are leaving. It’s not a joke and not hype.”

The following is a narrative from my source, prefaced with the instructions to “take it or leave it,” and “disregard it at your own peril.” He added that it’s now up to each American to act on the information themselves or suffer the consequences. “I’ve resigned myself to the fact that most [Americans] will never be convinced of the reality that is taking place right in front of them.”

 

The plan explained

“According to every internal document I’ve seen and read, and from the few people I’ve spoken with who understand what’s going on, preparations have been finalized to respond to a crisis of unprecedented magnitude within the United States. The response will include the use of lethal force against U.S. citizens under the instructions of Barack Obama.” But why?

“‘It’s the economy, stupid,’” he began, paraphrasing a campaign slogan coined by James Carville for Bill Clinton’s 1992 campaign. ”Just as I disclosed in our first meeting, the crisis will be rooted in an economic collapse. I told you last year, at a time when gold and silver were setting record highs, one specific indicator that time is very short. It is the final ‘smack down’ of the metals, gold and silver, that will presage the orchestrated economic collapse that is being planned by the bankers of Wall Street. Everybody needs to understand that this is a deliberate collapse of the U.S. economy with the oversight of the White House and the full knowledge of the Justice Department. Everyone seems to be waiting for some big, history making event that will signal the start of the collapse. The fact is that the collapse has already started. It’s incremental, like a snowball rolling down a hill. It gets bigger and rolls faster. Well, this snowball is well on its way down the hill.”

“I don’t mean to sound repetitive, by I can’t stress this enough. Contrary to what you hear, we’re already in an economic collapse, except that most people haven’t a clue. The ‘big bang’ comes at the end, when people they wake up one morning and can’t log in to their bank accounts, can’t use their ATM cards, and find out that their private pension funds and other assets have been confiscated,” he stated.

“I’ve seen documentation of multiple scenarios created outside of DHS. Different plans and back-up plans. Also, please understand that I deliberately used the word ‘created,’ as this is a completely manufactured event. In the end it won’t be presented that way, which is extremely important for everyone to understand. What is coming will be blamed on some unforeseen event out of everyone’s control, that few saw coming or thought would actually happen. Then, another event will take place concurrent with this event, or immediately after it, to confuse and compound an already explosive situation.” I asked for specifics.

“As I said, there are several scenarios and I don’t know them all. I know one calls for a cyber-attack by an external threat, which will then be compounded by something far removed from everyone’s own radar. But it’s all a ruse, or a pretext. The threat is from within,” he stated. “Before people can regain their footing, a second event will be triggered.” Again, I asked for specifics.

“I’ve seen one operational plan that refers to the federal government’s response to a significant terrorist attack on U.S. soil. Information at these levels is compartmentalized. I don’t have specifics, just plans for the response. The response will be controls and restrictions on travel, business, and every aspect of our lives, especially gun ownership and speech that incites people against the government. I guess some people would call it Martial Law, and they would not be incorrect. But understand that this will be a process deployed in stages. How quickly of a process remains to be seen.”

The mechanics explained

As I said, people continue to look for something big to happen first, followed by a militaristic response by the federal government against U.S. citizens. Based on what I’ve seen, I don’t believe it will happen this way, although there is one unthinkable exception. That exception would involve a ‘decapitation’ of our leadership, but I’ve seen nothing even remotely suggestive of that. But I’ve heard and even read articles where that is mentioned. Frankly, though, that’s always been a threat. I suppose that if the leadership is deemed useless, or becomes a liability to the larger agenda in some manner, it could happen. The precedent exists. Let’s pray that it’s not the case now.”

“I don’t think anyone except the initiated few know the precise series of events or the exact timing, just a general overview and an equally general time period. I think we’re in that period now, as DHS has their planned responses finalized. Also, the metals are important because it’s real money, not Ponzi fiat currency. The U.S. has no inventory of gold, so the prices are manipulated down to cause a sell-off of the physical assets. China is on a buying spree of gold, and other countries want their inventory back. The very people causing the prices to drop are the ones who are also buying the metals at fire sale prices. They will emerge extremely wealthy when the prices rise after the U.S. currency becomes wallpaper. A little research will identify who these people and organizations are.”

“I’d like to add a bit of perspective that might help explain the events as I described. Do you remember former Defense Secretary Donald Rumsfeld announcing that the Pentagon was unable to account for $2.3 trillion in the defense budget? That was on September 10, 2001, the day before the attacks of 9/11. Some suggest that 9/11 was orchestrated, in part to cover up the missing money, which is ludicrous. The result, however, was that suddenly the accounting issue took a back seat because of the attacks. The result will be the same. That’s a perfect example of the mechanics of what we are about to experience. It’s going to take years to sort out, and when it’s finally sorted out, the damage will have long been done.”

“Please note a few final things. The relationship that exists between DHS today and the executive branch is well beyond alarming. DHS and other organizations have become the private army of the Oval Office. The NSA, and I’ve got contacts there, is taking orders from the Oval Office. The IRS is under the virtual control of the Oval Office in a manner that would make Nixon cower. Even though all roads appear to lead to the Oval Office, they lead through the Oval Office. It’s not just Obama, but the men behind him, the people who put him there. The people who put him there are the ones who created him.” I asked who created him.

“First, ask yourself why there was such an all out effort to marginalize anyone talking about Obama’s eligibility in 2008. Even so-called conservatives pundits fell for the lie that such questions were nothing more than a diversion. They were following a specific drumbeat. That should tell every rational adult that he is a creation of the globalists who have no allegiance to any political party. He is the product of decades of planning, made for this very time in our history. He was selected to oversee the events I just disclosed. Who has that ability? He’s a product of our own intelligence agencies working with the globalists. He should be exhibit ‘A’ to illustrate the need to enforce the Logan Act. Need I say more?”

As often said by another of my sources, the U.S. is a captured operation. The lie is bigger than most people realize or are willing to confront. That is, until there is no other option. By then, it might be too late.

This article was posted: Saturday, December 28, 2013 at 6:38 am

Congress Backs Terrorists In Syria, Says We Need NSA Spying Because There are Terrorists In Syria

Washington’s Blog
December 4, 2013

The civil war in Syria started in March 2011. And see this.

However, the U.S. has been funding the Syrian opposition since 2006 … and arming the opposition since2007. (In reality, the U.S. and Britain considered attacking Syrians and then blaming it on the Syrian government as an excuse for regime change … 50 years ago (the U.S. just admitted that they did this to Iran) . And the U.S. has been planning regime change in Syria for 20 years straight. And see this.)

The New York Times, (and here and here) , Wall Street Journal, USA Today, CNN, McClatchy (andhere), AP, Time, Reuters, BBC, the Independent, the Telegraph, Agence France-Presse, Asia Times, and the Star (and here) confirm that supporting the rebels means supporting Al Qaeda and two other terrorist groups.

Indeed, the the New York Times has reported that virtually all of the rebel fighters are Al Qaeda terrorists.

The Syrian rebels are now calling for terrorist attacks on America. And we’ve long known that most of the weapons we’re shipping to Syria are ending up in the hands of Al Qaeda. And they apparently have chemical weapons.

And yet the U.S. is stepping up its support for the Islamic extremists.

The chair of the House Intelligence Committee – Mike Rogers – voted for arming the Syrian rebels. And the chair of the Senate Intelligence Committee – Diane Feinstein – has apparently quietly let arms flow to the rebels.

So are they admitting their mistake?

Heck, no! They’re using the specter of Syrian terrorists to justify mass surveillance by the NSA on innocent Americans …

And now he’s trying to use rebel Al Qaeda as an excuse for mass surveillance by the NSA.

As Juan Cole notes:

Senator Diane Feinstein and Rep. Mike Rogers took to the airwaves on Sunday to warn that Americans are less safe than two years ago and that al-Qaeda is growing and spreading and that the US is menaced by bombs that can’t be detected by metal detectors.

Call me cynical, but those two have been among the biggest detractors of the American citizen’s fourth amendment rights against unreasonable search and seizure of personal effects and papers. I think their attempt to resurrect Usama Bin Laden is out of the National Security Agency internal playbook, which specifically instructs spokesmen to play up the terrorist threat when explaining why they need to know who all 310 million Americans are calling on our phones every day. [Here’s what he’s talking about. Andhere.]

CNN’s Candy Crowley interviews them

Now, obviously there are violent extremists in the world and the US like all other societies is likely to fall victim to further attacks by terrorists. But if they could not inflict significant damage on us with 9/11 (and economically and in every other way except the horrible death toll, they could not), then it is a little unlikely that this kind of threat is existential.

In fact the number of terrorist attacks in the US has vastly declined since the 1970s (as has violent crime over-all), as WaPo’s chart shows:

(The chart shows each attack as a number and does not show fatalities; obviously the Oklahoma City bombing and 9/11 would be prominent in that case. But the fact is that foreign terrorist attacks kill almost no one in America these days. You’re far more likely to fall in your bathtub and die than to face terrorism).

Rogers makes a big deal out of the fighting in northern Syria as a threat to the United States and says “thousands” of “Westerners” have gone to fight there. But Rogers is just obfuscating by mentioning vastly exaggerated statistics.

The number of Americans estimated by the FBI to be fighting in Syria? 24. Two dozen. That’s it.

The Syrian civil war has nothing to do with the US, and is a local struggle rather unlikely to involve hitting America (more especially since, as Rogers carefully avoids mentioning, the US is committed to arming these rebels to fight against al-Assad.)

That’s right. Mike Rogers voted to give arms to the Syrian rebels. And while he may hope they don’t go to the al-Qaeda affiliates (as happened when Ronald Reagan gave $5 billion to the Afghan Mujahidin in the 1980s) [oops], he has no guarantee that won’t happen and is willing to take the risk. If Rogers were really, really concerned about the Jabhat al-Nusra, he wouldn’t be risking upping its firepower with Americans’ tax dollars as a justification for monitoring who your 15 year old daughter calls on her cell phone.

Let us say that again. Feinstein and Rogers just came on television to scaremonger the American people with the Syrian jihadis, and both of them voted to give the Syrian rebels millions of dollars in arms.

That’s a pretty good racket. You support the jihadis abroad and then point to jihadis abroad as the reason for which you have to get into the underwear of the American people.

Then they brought up Iraq, which is another local struggle. Dick Cheney repeatedly warned that if the US left Iraq, the terrorists created by the US Occupation (he didn’t put it that way) would follow us home. But it was never very likely an allegation. You could easily get an attack in the US by a disgruntled Sunni Iraqi. But that the Sunni Arabs of Iraq are gunning for the US? No sign of it.

Indeed, Al Qaeda wasn’t even in Iraq until the U.S. invaded that country.

And U.S. policy has lead to a world-wide increase in terrorism.

Of course, mass surveillance doesn’t really have much to do with terrorism in the first place.

No wonder Americans have such a low opinion of Congress. But people like Feinstein and Rogers couldn’t care less.

This article was posted: Wednesday, December 4, 2013 at 6:32 am

Directive Provides Government With Intelligence After Declaration of Martial Law

James Clapper’s directive fires up NSPD 51 providing Department of Homeland Security with ominous police state authority.

Kurt Nimmo
Infowars.com
November 2, 2013

A constellation of federal government intelligence agencies.

A constellation of federal government intelligence agencies.

Even in the unlikely event there is a nuclear war or some other catastrophic event, a directive issued by the director of the Office of the Director of National Intelligence, James Clapper, will make sure the NSA still listens in on your calls, that is if there are any phones or cell towers left following Armageddon.

The directive, issued on November 12, makes certain the “President, the Vice President, statutory successors, and other national leaders, as appropriate, are provided with timely, insightful, objective, and relevant national intelligence wherever they are located and in all conditions.”

Clapper’s directive sets in motion NSPD 51, which provides the Department of Homeland Security with ominous police state authority.

“The new Directive implements the Bush Administration’s 2007 National Security Presidential Directive 51 on ‘National Continuity Policy.’ Presidential directives remain in force unless or until they are superseded or rescinded,” the FAS Project on Government Secrecy reported on December 2.

The directive falls under COG, or Continuity of Government, and draws on the National Security Act of 1947 (creating the current national security state and the CIA), a number of executive orders, NSPD-51, Homeland Security Presidential Directive 20, and “other applicable provisions of law.”

COG Designed to Establish Police State Following Declaration of Martial Law

During the Iran-Contra hearings in 1987, COG was exposed as a plan to suspend the Constitution and impose martial law in America.

According to a report published in the Miami Herald, the plan called for taking over federal, state and local government functions during a national emergency. COG, as envisioned by the National Security Council, called for “suspension of the Constitution, turning control of the government over to the Federal Emergency Management Agency, emergency appointment of military commanders to run state and local governments and declaration of martial law,” writes Peter Dale Scott.

Initially established as a response to nuclear war, COG planning underwent a critical transformation during the Reagan administration. Under Reagan, it was modified to be a police state response for any “national security emergency,” a move that was codified in Executive Order 12656.

“In other words extraordinary emergency measures, originally designed for an America devastated in a nuclear attack, were now to be applied to anything the White House considered an emergency,” writes Scott.

The Boston Globe spelled out the new parameters: “Lt. Col. Oliver North was working with officials of the Federal Emergency Management Agency… to draw up a secret contingency plan to surveil political dissenters and to arrange for the detention of hundreds of thousands of undocumented aliens in case of an unspecified national emergency. The plan, part of which was codenamed Rex 84, called for the suspension of the Constitution under a number of scenarios, including a U.S. invasion of Nicaragua.”

In the wake of Hurricane Katrina, we witnessed a FEMA beta test of the extraordinary powers under COG and Rex 84, the latter a military readiness exercise designed to round-up and intern in concentration camps dissidents and other elements considered threatening to the government.

“These camps are to be operated by FEMA should martial law need to be implemented in the United States and all it would take is a presidential signature on a proclamation and the attorney general’s signature on a warrant to which a list of names is attached,” the Miami Herald reported on July 5, 1987.

“And there you have it — the real purpose of FEMA is to not only protect the government but to be its principal vehicle for martial law,” writes Allen L. Roland.


Rep. Jack Brooks questions COG and REX-84.

COG was implemented during the attacks of September 11, 2001, by Donald Rumsfeld and Dick Cheney, two of the original planners.

“What few have recognized is that, nearly a decade later, some aspects of COG remain in effect,” Scott continues. “COG plans are still authorized by a proclamation of emergency that has been extended each year by presidential authority, most recently by President Obama in September 2009. COG plans are also the probable source for the 1000-page Patriot Act presented to Congress five days after 9/11, and also for the Department of Homeland Security’s Project Endgame — a ten-year plan, initiated in September 2001, to expand detention camps, at a cost of $400 million in Fiscal Year 2007 alone.”

Laws passed since the 9/11 attacks, including the Patriot Act, the John Warner Defense Authorization Act of 2007, and the Military Commissions Act, are designed top compliment and enhance COG operations that are more tightly focused on responding to internal dissent and palatable threats to the status quo than maintaining government cohesion after a nuclear attack.

Jerome Corsi talks about NSPD-51:

This article was posted: Monday, December 2, 2013 at 1:31 pm

Snowden Level Documents Reveal Stealth DHS Spy Grid

Government documents obtained exclusively by Infowars expose massive DHS domestic spy grid designed to track citizens in real time through mega government databases.

Anthony Gucciardi & Mikael Thalen
Infowars.com
November 12, 2013

Exclusive documents obtained by Infowars from an insider government source have revealed the true origin and nature of the highly secretive ‘mesh network’ spy grid that has garnered massive media attention due to the fact that the network’s strange downtown Seattle spy boxes can track the last 1,000 GPS locations of cellphone users. But as new documents reveal, the grid is far deeper than the media is telling you. The Seattle DHS spy system ultimately ties in with an enormous stealth database that acts as an intelligence hub for all of your personal data.

On page 55 of the “Port Security Video Surveillance System with Wireless Mesh Network” project document that we have obtained, a diagram reveals the system’s basic communication abilities in regards to the Port of Seattle that the DHS has refused to comment on despite funding with millions in taxpayer dollars:

DHS spy system’s basic communication abilities in regards to the Port of Seattle ‘mesh network’ tracking system.

The Infowars team is closely reviewing the document and will publish it in whole soon. More images seen in the extensive documentation:

dhs-spy-pdf-2

A documented image of the actual spy system put in place, highlighted in the original document itself.

seattle-dhs-spy-1

A further breakdown of the spy operation.

The wireless mesh network, which allows for private communication between wireless devices including cell phones and laptops, was built by California-based Aruba Networks, a major provider of next-generation mobile network access solutions.

Labeled by their intersection location such as “1st&University” and “2nd& Seneca,” the multiple network devices are easily detected in Seattle’s downtown area through a simple Wi-Fi enabled device, leading many residents to wonder if they are being detected in return.

“How accurately can it geo-locate and track the movements of your phone, laptop, or any other wireless device by its MAC address? Can the network send that information to a database, allowing the SPD to reconstruct who was where at any given time, on any given day, without a warrant? Can the network see you now?” asked Seattle newspaper The Stranger.

According to reports from Kiro 7 News, the mesh network devices can capture a mobile user’s IP address, mobile device type, apps used, current location and even historical location down to the last 1,000 places visited.

So far Seattle police have been tight-lipped about the network’s roll-out, even denying that the system is operational. Several groups including the ACLU have submitted requests to learn the programs intended use, but days have turned to months as the mesh network continues its advancement.

According to The Stranger’s investigation, Seattle Police detective Monty Moss claims the department has no plans to use the mesh network for surveillance… unless given approval by city council. Despite a recently passed ordinance requiring all potential surveillance equipment to be given city council approval and public review within 30 days of its implementation, the network has remained shrouded in secrecy.

Unknown to the public until now, information regarding the system has been hiding in plain view since last February at minimum. Diagrams attached to a March 2012 proposal request (# DIT-2996), which have since been approved, updated and finalized, are publicly viewable at the Seattle.gov website.

Several connections can be made by studying the diagram, including its now apparent link to Seattle’s public waterfront. The recent instillation of 30 Department of Homeland Security-funded surveillance cameras on Seattle’s popular waterfront, complete with mesh network devices attached, were purported to increase the Port of Seattle’s protection against such acts as terrorism. Residents soon discovered multiple cameras facing inward toward Seattle homes, not towards the coast line as allegedly intended. The “accident” was later remedied by city officials.

While unknown members of multiple law enforcement agencies will have access to the mesh network, so will the Seattle Fusion Center, where FBI and Homeland Security gather data on Americans deemed “extremist” for such crimes as “loving liberty.” Incredibly, even the U.S. Senate called the Fusion Centers a “useless and costly effort that tramples on civil liberties” in a 2012 bi-partisan report.

Page 65 of the public document details the information-collecting capabilities of the Mesh Network Mesh System (NMS), revealing its ability to collect identifying data of anyone “accessing the network.” Although the document details an alert system for reporting unauthorized access, a public user guide from a similar Aruba software program lists the ability to collect “a wealth of information about unassociated devices,” validating fears of local residents who walk through the mesh network’s perimeter.

“The NMS also collects information about every Wi‐Fi client accessing the network, including its MAC address, IP address, signal intensity, data rate and traffic status,” the document reads. “Additional NMS features include a fault management system for issuing alarms and logging events according to a set of customizable filtering rules, along with centralized and version‐controlled remote updating of the Aruba Mesh Operating System software.”

The bottom left of the diagram shows what may be the Seattle Department of Transportation Intelligent Transportation Systems Network, linked directly into the mesh network. According to the Department of Transportation website, the system controls several surveillance related items such as license plate readers and closed circuit TV (CCTV) systems.

An early draft of the diagram appears to show Seattle police vehicle’s ability to receive and “control” certain aspects of the mesh network. Whether police were originally intended to control surveillance cameras from their vehicles, including their panning, tilting and zooming abilities, remains unclear. According to statements made by Seattle’s Assistant Chief Paul McDonagh last February regarding the waterfront cameras specifically, “only a few people would have that capability, so the officer on the street would just have the ability to view it.”

In reality, Seattle is only one of countless cities across the country being flooded with a sea of surveillance equipment. While the public has focused mainly on surveillance issues relating to the NSA, the federal government has continued its 20-plus year dragnet surveillance grid roll out of covert conversation-recording microphones.

As recently reported by Storyleak, multiple cities including Las Vegas have begun using “Intellistreets” light fixtures capable of recording conversations. The device has received increased scrutiny since 2011 when their “Homeland Security” application, which shouts government messages from a loudspeaker system, was widely revealed to the public.

Other audio recording devices like the ShotSpotter microphones, allegedly used to analyze the location of gun shots, have been found to record conversations of unsuspecting city residents.

Despite the federal government’s constant justification of throwing away civil liberties in the name of fighting terrorism, which kills less Americans than bee stings, continued NSA revelations show that the federal government’s continued surveillance system build-up is aimed at everyday Americans, not foreign Al Qaeda admittedly supported by the U.S. government in Syria.

<p  style=” margin: 12px auto 6px auto; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none; display: block;”>   <a title=”View “Port Security Video Surveillance System with Wireless Mesh Network” –
Seattle on Scribd” href=”http://www.scribd.com/doc/183600279″  style=”text-decoration: underline;” >“Port Security Video Surveillance System with Wireless Mesh Network” –
Seattle</a></p>

——-

Anthony Gucciardi is the acting Editor and Founder of alternative news website Storyleak.com. He is also a news media personality and analyst who has been featured on top news, radio, and television organizations including Drudge Report, Michael Savage’s Savage Nation, Coast to Coast AM, and RT.

Mikael is an accomplished writer and lead features writer at Storyleak whose articles have been featured on sites such as the Drudge Report and others. During his time at Examiner.com, he was frequently ranked the number one political writer.

This article was posted: Tuesday, November 12, 2013 at 12:54 pm