Skip navigation

Tag Archives: DHS

DHS Insider: “Preparations Have Been Finalized to Respond to a Crisis of Unprecedented Magnitude Within the United States”

Douglas J. Hagmann
SHTF plan
December 28, 2013

Editor’s Note: One of the questions oft asked in alternative news circles is why, if elements within the U.S. government intend to collapse our economy and implement martial law, no one within these circles has spoken out.

Image: DHS (Wikimedia Commons).

The fact is that scores of people have made it their duty to alert the American people to what’s going on behind the scenes. They’ve told us of the corruption and backroom deals. They’ve given us the warning signs to look for, many of which have already come to pass. They’ve even made us aware of the government’s response should the worst come to pass. Detractors often dismiss the warnings and insider reports as bogus, often claiming that if the sources are anonymous they can’t be legitimate. But do we blame them for taking extreme steps to protect their identities? Edward Snowden and Bradley Manning showed their faces, and now they will spend their lives as targets. Given what happened to these whistle blowers, is it any surprise that others with insider knowledge refuse to speak out in an official capacity?

The following warning comes to us from an anonymous source embedded deep within the Department of Homeland Security who has taken it upon himself to share his knowledge with our audience through the generous contrtributions of the Hagmann and Hagmann Report via the Northeast Intelligence Network. The insider has taken extraordinary measures to remain anonymous, but given what we know the government is up to and the signs we see all around us, does his desire for anonymity make his claims any less legitimate than if he had included his name?

We’ve long argued that any manufactured event would be telegraphed to the general public by whistle blowers on the inside. Deny the possibility if you so choose, but this insider, along with others who have shared their information may well be the only warning you’ll ever receive. As the Insider notes, most people simply have no idea what’s coming, nor do they care to. One morning they’ll wake up and all hell will have broken loose.

 

Under the cover and amid the distraction of the Christmas bustle, I had my last “official” contact with a source inside the Department of Homeland Security known as “Rosebud” in my writings. My source is leaving his position, retiring along with numerous others choosing to leave this bureaucratic monstrosity. For this contact, my source took unprecedented measures to be certain that our contact was far off the radar of prying government eyes and ears. I was stunned at the lengths he employed, and even found myself somewhat annoyed by the inconvenience that his cloak-and-dagger approach caused. It was necessary, according to my source, because all department heads under FEMA and DHS are under orders to identify anyone disclosing any information for termination and potential criminal prosecution.

“DHS is like a prison environment, complete with prison snitches,” he said, referring to the search for leaks and leakers. And the warden is obsessed. Ask anyone in DHS. No one trusts anyone else and whatever sources might be left are shutting up. The threats that have been made far exceed anything I’ve ever seen. Good people are afraid for their lives and the lives of their families. We’ve all been threatened. They see the writing on the wall and are leaving. It’s not a joke and not hype.”

The following is a narrative from my source, prefaced with the instructions to “take it or leave it,” and “disregard it at your own peril.” He added that it’s now up to each American to act on the information themselves or suffer the consequences. “I’ve resigned myself to the fact that most [Americans] will never be convinced of the reality that is taking place right in front of them.”

 

The plan explained

“According to every internal document I’ve seen and read, and from the few people I’ve spoken with who understand what’s going on, preparations have been finalized to respond to a crisis of unprecedented magnitude within the United States. The response will include the use of lethal force against U.S. citizens under the instructions of Barack Obama.” But why?

“‘It’s the economy, stupid,’” he began, paraphrasing a campaign slogan coined by James Carville for Bill Clinton’s 1992 campaign. ”Just as I disclosed in our first meeting, the crisis will be rooted in an economic collapse. I told you last year, at a time when gold and silver were setting record highs, one specific indicator that time is very short. It is the final ‘smack down’ of the metals, gold and silver, that will presage the orchestrated economic collapse that is being planned by the bankers of Wall Street. Everybody needs to understand that this is a deliberate collapse of the U.S. economy with the oversight of the White House and the full knowledge of the Justice Department. Everyone seems to be waiting for some big, history making event that will signal the start of the collapse. The fact is that the collapse has already started. It’s incremental, like a snowball rolling down a hill. It gets bigger and rolls faster. Well, this snowball is well on its way down the hill.”

“I don’t mean to sound repetitive, by I can’t stress this enough. Contrary to what you hear, we’re already in an economic collapse, except that most people haven’t a clue. The ‘big bang’ comes at the end, when people they wake up one morning and can’t log in to their bank accounts, can’t use their ATM cards, and find out that their private pension funds and other assets have been confiscated,” he stated.

“I’ve seen documentation of multiple scenarios created outside of DHS. Different plans and back-up plans. Also, please understand that I deliberately used the word ‘created,’ as this is a completely manufactured event. In the end it won’t be presented that way, which is extremely important for everyone to understand. What is coming will be blamed on some unforeseen event out of everyone’s control, that few saw coming or thought would actually happen. Then, another event will take place concurrent with this event, or immediately after it, to confuse and compound an already explosive situation.” I asked for specifics.

“As I said, there are several scenarios and I don’t know them all. I know one calls for a cyber-attack by an external threat, which will then be compounded by something far removed from everyone’s own radar. But it’s all a ruse, or a pretext. The threat is from within,” he stated. “Before people can regain their footing, a second event will be triggered.” Again, I asked for specifics.

“I’ve seen one operational plan that refers to the federal government’s response to a significant terrorist attack on U.S. soil. Information at these levels is compartmentalized. I don’t have specifics, just plans for the response. The response will be controls and restrictions on travel, business, and every aspect of our lives, especially gun ownership and speech that incites people against the government. I guess some people would call it Martial Law, and they would not be incorrect. But understand that this will be a process deployed in stages. How quickly of a process remains to be seen.”

The mechanics explained

As I said, people continue to look for something big to happen first, followed by a militaristic response by the federal government against U.S. citizens. Based on what I’ve seen, I don’t believe it will happen this way, although there is one unthinkable exception. That exception would involve a ‘decapitation’ of our leadership, but I’ve seen nothing even remotely suggestive of that. But I’ve heard and even read articles where that is mentioned. Frankly, though, that’s always been a threat. I suppose that if the leadership is deemed useless, or becomes a liability to the larger agenda in some manner, it could happen. The precedent exists. Let’s pray that it’s not the case now.”

“I don’t think anyone except the initiated few know the precise series of events or the exact timing, just a general overview and an equally general time period. I think we’re in that period now, as DHS has their planned responses finalized. Also, the metals are important because it’s real money, not Ponzi fiat currency. The U.S. has no inventory of gold, so the prices are manipulated down to cause a sell-off of the physical assets. China is on a buying spree of gold, and other countries want their inventory back. The very people causing the prices to drop are the ones who are also buying the metals at fire sale prices. They will emerge extremely wealthy when the prices rise after the U.S. currency becomes wallpaper. A little research will identify who these people and organizations are.”

“I’d like to add a bit of perspective that might help explain the events as I described. Do you remember former Defense Secretary Donald Rumsfeld announcing that the Pentagon was unable to account for $2.3 trillion in the defense budget? That was on September 10, 2001, the day before the attacks of 9/11. Some suggest that 9/11 was orchestrated, in part to cover up the missing money, which is ludicrous. The result, however, was that suddenly the accounting issue took a back seat because of the attacks. The result will be the same. That’s a perfect example of the mechanics of what we are about to experience. It’s going to take years to sort out, and when it’s finally sorted out, the damage will have long been done.”

“Please note a few final things. The relationship that exists between DHS today and the executive branch is well beyond alarming. DHS and other organizations have become the private army of the Oval Office. The NSA, and I’ve got contacts there, is taking orders from the Oval Office. The IRS is under the virtual control of the Oval Office in a manner that would make Nixon cower. Even though all roads appear to lead to the Oval Office, they lead through the Oval Office. It’s not just Obama, but the men behind him, the people who put him there. The people who put him there are the ones who created him.” I asked who created him.

“First, ask yourself why there was such an all out effort to marginalize anyone talking about Obama’s eligibility in 2008. Even so-called conservatives pundits fell for the lie that such questions were nothing more than a diversion. They were following a specific drumbeat. That should tell every rational adult that he is a creation of the globalists who have no allegiance to any political party. He is the product of decades of planning, made for this very time in our history. He was selected to oversee the events I just disclosed. Who has that ability? He’s a product of our own intelligence agencies working with the globalists. He should be exhibit ‘A’ to illustrate the need to enforce the Logan Act. Need I say more?”

As often said by another of my sources, the U.S. is a captured operation. The lie is bigger than most people realize or are willing to confront. That is, until there is no other option. By then, it might be too late.

This article was posted: Saturday, December 28, 2013 at 6:38 am

Advertisements

20 Drills that Prove the DHS’ Official New Enemy is the American People

Kim M.
Planet Infowars
October 28, 2013

Drills for the Combat Marksmanship Program at Camp Pendleton, Calif.

Drills for the Combat Marksmanship Program at Camp Pendleton, Calif.

Out of 47 “scenarios” being practiced by first responders during Urban Shield 2013 this October 25 – 28 in the San Francisco Bay Area, at least 20 of them are “domestic” – either stated explicitly, or implied (see below in BOLD CAPS) – and possibly more.

Overall, the scenarios vary widely in scope – up to and including “odor investigation” – but the “domestic terrorists” are generally characterized as being anything from “anarchists” (Tea Partiers? Christians? Patriots?) to “homegrown” terrorists (recent American-Moslem converts duped into FBI-sting operations?)

Interesting to note that, as of this writing, the English “Urban Shield” Wikipedia entry has disappeared… but you can still get it in French. (Too bad for you if you don’t read French.)

However, there is still a brief mention of Urban Shield in the English Wikipedia entry for the Alameda County Sheriff’s Office (ASCO).

According to Wikipedia’s ASCO entry, Urban Shield is the largest urban “SWAT” exercise in America. Always held in autumn, it provides “opportunities” for first-responder teams from all over the nation to train in what appears to be mostly “terrorist” scenarios.

(As an aside – since I scan the news feeds daily – I’ve been noticing variations of ALL these “scenarios” making the news on a regular basis, including recently locking down an entire school district in Richmond, California due to an “odor investigation”… for an odor which turned out to be from a smelly barge starting its engine several miles outside the city limits. Oh, the hysteria.)

You should also be pleased and comforted to note that among the many “public/private partners” (and corporate sponsors) taking part in this year’s Urban Shield will be the Boy Scouts, FedEx and Verizon Wireless.

And, in addition to the 18 federal agencies listed (including Louisiana State University?), there will also be 12 foreign countries keeping us safe from domestic terrorists: Israel, Brazil, Guam, Israeli Yamam, Norway, Switzerland, France, Jordan, Bahrain, Singapore, Canada and Qatar.

With all this “help” – in what is turning out to be a huge multi-billion dollar industry – it makes you wonder who is keeping us safe from the “helpers?”

Scenario #1: Fitness Assessment/Confidence Course
Scenario #2: Medical Checkpoint #1
SCENARIO #3: INTELLIGENCE SURVEILLANCE RECONNAISSANCE
Tactical teams will be provided a scenario in which they must rescue a judge from a Homegrown Violent Extremists group. Teams will be tested on their ability to develop a plan of action.
Host: Alameda County Sheriff’s Office – Black Command
Location: Alameda County Firearms Training Facility
Sponsors: TCI Tactical Command Industries
Fulcrum Concepts LLC
ZMB Industries
Zistos Portable Video Systems
SCENARIO #4: COLLEGE CAMPUS HOSTAGE RESCUE
Tactical teams will be evaluated on their ability to transition between many different tactics based on a rapidly evolving, dynamic scenario.
Host: Livermore Police Department – Black Command
Location: Las Positas Community College
Sponsor: VieVu-Video Cameras
SCENARIO #5: SWAT & K9 INTEGRATION DURING DEPLOYMENT
Tactical teams will coordinate with K9 units to search a rural wooded area for suspected narco-terrorists who recently murdered one CHP officer and wounded another.
Host: Alameda County Sheriff’s Office – Black Command
Location: Del Valle Regional Park Property
Sponsor: None listed
SCENARIO #6: HIGH SCHOOL CAMPUS ASSAULT
Tactical teams will properly respond to a terrorist attack at a school, testing their ability to operate under fire, and rescue hostages.
Host: Fremont Police Department – Gold Command
Location: Coyote Hills Shooting Range, Fremont
Sponsor: 5.11 Tactical Series
TCI Tactical Command Industries
SCENARIO #7: ANARCHIST REFINERY BOMBER
Teams are presented with a scenario testing their ability to operate in a large open area and minimize damage to critical infrastructure.
Host: Redwood City Police Department – Silver Command
Location: Port of Redwood City
Sponsor: Digital Sandbox
Scenario #8: Water Treatment Facility WMD Attack
SCENARIO #9: DOMESTIC TERRORIST WATERSHED TAKEOVER
Tactical teams will be evaluated on their ability to respond to a chemical attack while mitigating further terrorist activity and rescuing hostages.
Host: San Mateo County Sheriff’s Office – Silver Command
Location: Crystal Springs Reservoir
Sponsor: Fraser Optics
Scenario #10: Medical Checkpoint #2
SCENARIO #11: HIGH RISK SEARCH WARRANT
Tactical teams will be presented with a scenario to work in conjunction with the Drug Enforcement Agency (DEA) to successfully execute a buy-bust search warrant.
Host: Drug Enforcement Agency – Silver Command
Location: Simunitions Training Warehouse, South San Francisco
Sponsor: None listed
SCENARIO #12: COMMUNITY JUSTICE CENTER TAKEOVER
Teams are provided a scenario testing their ability to work in a confined area under duress.
Host: San Francisco Sheriff’s Department – Green Command
Location: San Bruno Jail Complex
Sponsor: Securus Technologies
ATK Force On Force
SCENARIO #13: EXTREMIST MANHUNT
Tactical teams will respond to violent terrorist(s) who have gunned down an undercover agent and taken hostages.
Host: San Francisco Sheriff’s Department – Green Command
Location: San Bruno Jail Complex
Sponsor: Securus Technologies
ATK Force On Force
Scenario #14: Terrorist Attack on Public Transit
SCENARIO #15: TRANSAMERICA PYRAMID CENTER TAKEOVER
This scenario was developed to test tactical teams response to a homegrown terrorist attack on a San Francisco high rise building.
Host: San Francisco Sheriff’s Department – Green Command
Location: Transamerica Pyramid Center
Sponsor: Digital Sandbox
Scenario #16: Human Trafficking Interdiction
Scenario #17: Medical Checkpoint #3
Scenario #18: Laboratory Takeover
Scenario #19: Parking Structure WMD Dispersal Device
Scenario #20: Critical Infrastructure Assault (SF-Oakland Bay Bridge)
Scenario #21: Commuter Train Assault
Scenario #22: Maritime Interdiction
Scenario #23: Military Installation Assault
Scenario #24: Airplane Hijacking
Scenario #25: Medical Checkpoint #4
Scenario #26: Vehicle Assault (Old Mervyn’s Headquarters)
Scenario #27: Dignitary Rescue
Scenario #28: High Rise Rappelling
Scenario #29: Chemical Sabotage
SCENARIO #30: DOMESTIC TERRORIST SCHOOL TAKEOVER
Tactical teams will be provided an active shooter scenario testing their ability to effectively engage the terrorist(s) and effect a rescue of the hostage(s).
Host: Alameda County Sheriff’s Office – Blue Command
Location: Canyon Middle School, Castro Valley
Sponsor: Black OPS Airsoft
Applanix A Trimble Company
Scenario #31: Hospital Assault
Scenario #32: Technology Showcase
EOD Scenario #1: Explosive Ordnance Disposal Response 1
EOD Scenario #2: Explosive Ordnance Disposal Response 2
EOD SCENARIO #3: EXPLOSIVE ORDNANCE DISPOSAL RESPONSE 3
Two teams work together to enter a booby trapped apartment, render safe a number of booby traps, and analyze chemicals present for their use in IEDs.
Host: Alameda County Sheriff’s Office – Black Command
Location: Alameda County EOD Bomb Range
Sponsor: HazMasterG3
FIRE SCENARIO #1: ENVIRONMENTAL TERRORIST SABOTAGE
Responding US&R task force teams will be confronted with multiple and conflicting priorities while freeing two trapped construction workers.
Host: South San Francisco Fire Department – Red Command
Location: South San Francisco Fire Department Trench Rescue Training Site
Sponsor: MES Municipal Emergency Services Inc.
FIRE SCENARIO #2: IED EXPLOSION IN A CONFINED SPACE
An IED placed in a refinery pipe maze by environmental terrorists is accidentally detonated by bomb squad personnel while attempting to render the device safe.
Host: South San Francisco Fire Department – Red Command
Location: South San Francisco Vehicle and Equipment Maintenance Facility
Sponsor: FoxFury Personal Lighting Solutions
FIRE SCENARIO #3: BUILDING COLLAPSE
A member of the Sovereign Citizen movement has driven a truck into a government building which resulted in a partial building collapse and fire.
Host: South San Francisco Fire Department – Red Command
Location: South San Francisco Fire Department Collapse Structure Training Facility
Sponsor: Parrot AR Drone
FIRE SCENARIO #4: HIGH-ANGLE RESCUE
The sniper attack on a government high-rise building by a Homegrown Violent Extremist (HVE) has left two window washers injured.
Host: South San Francisco Fire Department – Red Command
Location: Boston Properties, South San Francisco
Sponsor: None listed
FIRE SCENARIO #5 AND 11: COOPERATIVE USAR/HAZMAT RESPONSE
US&R and Hazmat task-force teams will cooperatively respond to a car bomb detonated by extremists that has resulted in a collapse of a medical research facility.
Host: South San Francisco Fire Department – Red Command
Location: Alexandria Development Building, South San Francisco
Sponsor: Western Shelter Systems
Grainger
Applanix A Trimble Company
Fire Scenario #6: Terrorist Bus Hijacking/Low-Angle Rescue
FIRE SCENARIO #7: CLANDESTINE DRUG LAB EXPLOSION
An explosion of an IED at a clandestine drug lab has resulted in members of a SWAT team and other first responders becoming contaminated with unknown chemicals.
Host: South San Francisco Fire Department – Red Command
Location: South San Francisco Vehicle and Equipment Mainenance Facility
Sponsor: None listed
Fire Scenario #8: Odor Investigation
Fire Scenario #9: Cargo Container Sabotage
FIRE SCENARIO #10: MONITORING/DETECTION DIRTY BOMB ATTACK
Members of an anarchist group have detonated a dirty bomb in the mail room of a credit card processing facility, resulting in exposure to employees.
Host: South San Francisco Fire Department – Red Command
Location: Boston Properties, South San Francisco
Sponsor: MES Municipal Emergency Services Inc.
Fire Scenario #12: Arson Fire

SOURCES:

http://www.urbanshield.org

http://www.washingtonpost.com/ blogs/ on-leadership/ wp/ 2013/ 10/ 11/ the-tea-party-is-giving-anarchism-a-bad-name/

http://www.examiner.com/article/another-terrorism-report-demonizes-christian-patriots-preppers

http://www.investigativeproject.org/1341/the-creeping-homegrown-threat

http://www.activistpost.com/2010/12/why-are-feds-cultivating-their-own.html

https://fr.wikipedia.org/wiki/Urban_shield

https://en.wikipedia.org/wiki/Alameda_County_Sheriff%27s_Office

http://www.alamedacountysheriff.org/

http://publicintelligence.net/alameda-urban-shield-2013/

http://info.publicintelligence.net/AlamedaCountyUrbanShield2013.pdf

http://www.contracostatimes.com/west-county-times/ci_24267003/richmond-residents-report-strong-gas-odor

http://www.contracostatimes.com/west-county-times/ci_24276573/gas-smell-that-enveloped-richmond-came-from-disabled

This post appeared in the U.S. News category.

This article was posted: Monday, October 28, 2013 at 10:45 am

DHS Detains Oathkeepers Heading To Gun Rally

Infowars.com
September 18, 2013

Liberty lovers gathered at the Texas capitol building to show appreciation for the U.S. Constitution.

Some arrived late however, having been detained by the Department of Homeland Security for using a public walkway to pass by a federal building.

One of the DHS agents was not even aware that in Texas, it is legal to carry a longarm.

This article was posted: Wednesday, September 18, 2013 at 1:38 pm

Foreign Troops Are Already Operating Inside America

FEMA denies report of Russian forces providing security at US events

Paul Joseph Watson
Infowars.com
July 3, 2013

FEMA’s denial of a report that suggested Russian forces would be operating inside the United States at “mass events” ignores the manifestly provable fact that Russian and other foreign troops are already active inside the US and have been for at least two decades.

Russian troops training on US soil.

The federal agency was forced to deny a report published by Infowars on Monday which cited an official Russian government press release that detailed a plan for Russian authorities to be involved in the “provision of security at mass events” in the United States.

“There will be “no exchange of security or military personnel” under a recently renewed partnership between the US Federal Emergency Management Agency (FEMA) and Russia’s Emergency Situations Ministry, a FEMA spokesman told RIA Novosti.”

“The agreement continues information-sharing meetings and observation opportunities with first responders and emergency managers,” the spokesman said.

This contradicts a June 25 press release issued by the Ministry of the Russian Federation for Civil Defense and Emergencies which said that, “The Russian Emergency Situations Ministry and the USA Federal Emergency Management Agency (FEMA) are going to exchange experts during joint rescue operations in major disasters,” a deal that would include the “provision of security at mass events.” The dictionary definition of the word ‘provision’ is “the providing or supplying of something.”

The admission that FEMA and Russian authorities would “exchange experts” who would be active “during joint rescue operations in major disasters” clearly contradicts the claim that the deal was only about information sharing. Either the press release was inaccurate or FEMA is lying.

The accuracy of the Infowars report was then muddied by it being connected with an unrelated hoax published by a known disinformation website which falsely claimed Obama had requested 15,000 Russian troops for an “upcoming disaster” in America.

Even if we accept FEMA’s denial that Russian forces will be in place at “mass events” in the US, the fact that Russian forces are already operating inside America is proven.

Last year we reported on how Russian troops were invited to the US as part of a Fort Carson, Colorado drill focused around anti-terror training. Aside from learning how to target terrorists in America, the Russian soldiers were also told to go out and mingle with the local community by attending a baseball game in Colorado Springs.

The Department of Defense subsequently confirmed that 20 Russian Spetsnaz troops were set to train on US soil for a period of three weeks as part of a “formal bilateral exchange program between the U.S. and Russia.” Images of Russian troops working with US soldiers at Fort Carson can be seen above.

The process of acclimatizing Americans to accept the presence of foreign troops on US soil has been ongoing since the release of State Department Publication 7277, which is a blueprint for the harmonization of US and Russian forces under a United Nations framework.

There are numerous other instances where foreign troops have been active on U.S. soil as part of security exchange programs.

– In 2008, US and Canadian authorities signed an agreement that paves the way to using each other’s militaries on both sides of the border “during an emergency”.

– During FEMA’s 2009 NLE exercise, foreign troops from Mexico, Canada, Australia and the United Kingdom were involved in a major exercise focused on “terrorism prevention and protection.”

– Back in July 2010, our reporters covered the Operation Vigilant Guard exercises in Chicago which involved Polish troops training alongside U.S. National Guard troops in drills focused around raiding terrorists and drug dealers.

– Alex Jones has documented foreign troops being trained on U.S. soil to deal with “insurgents” since the late 1990′s as part of “urban warfare drills”.

– Only last month, foreign troops from Canada, New Zealand and Japan as well as observers from Australia, Chile, Colombia, Israel, Mexico, Peru and Singapore took part in multi-lateral exercises with US Marines under the banner of Operation Dawn Blitz, during which foreign soldiers staged a mock invasion of a beach in Southern California and then “moved inland for additional training ashore.”

– In addition, as Frank Drover details, “Troops and personnel under the command of the United Nations have been training all over the United States in joint exercises that include policing operations and terrorist suppression.”

Drover cites a 1994 UN training mission named Agile Provider (watch the clip above), during which 44,000 blue helmeted UN troops from nations such as France and the Netherlands trained in Georgia, North and South Carolina, Arkansas, and Tennessee.

– There were also fresh eyewitness reports of UN troops arriving for exercises in Texas, Florida, Mississippi and Georgia as recently as May of this year.

Watch a video report below from 2010′s Operation Vigilant Guard exercise where foreign troops trained with US Marines in a range of different security exercises.

Exercises involving foreign troops on US soil have become commonplace over the last 20 years as Americans become increasing acclimatized to seeing international forces prepared for involvement in domestic security operations, largely ignorant of the fact that this is a violation of the Posse Comitatus Act.

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

Michael Savage Covers Russian Forces on US Soil

Infowars.com
July 2, 2013

FEMA signs deal with Russian Emergency Situations Ministry to “exchange experts”

As part of a deal signed last week in Washington DC between the Russian Emergency Situations Ministry and FEMA, Russian officials will provide “security at mass events” in the United States, a scenario that won’t sit well with Americans wary of foreign assets operating on US soil.

According to a press release by the Ministry of the Russian Federation for Civil Defense and Emergencies, US and Russian officials met on June 25 at the 17th Joint U.S.-Russia Cooperation Committee on Emergency Situations.  In addition to agreeing with FEMA to “exchange experts during joint rescue operations in major disasters,” the Russian Emergency Situations Ministry will also be providing “security at mass events” in the United States…

Related: Russian Forces to Provide “Security” At US Events

Russian Forces to Provide “Security” At US Events

FEMA signs deal with Russian Emergency Situations Ministry to “exchange experts”

Paul Joseph Watson
Infowars.com
July 1, 2013

As part of a deal signed last week in Washington DC between the Russian Emergency Situations Ministry and FEMA, Russian officials will provide “security at mass events” in the United States, a scenario that won’t sit well with Americans wary of foreign assets operating on US soil.

According to a press release by the Ministry of the Russian Federation for Civil Defense and Emergencies, US and Russian officials met on June 25 at the 17th Joint U.S.-Russia Cooperation Committee on Emergency Situations.

In addition to agreeing with FEMA to “exchange experts during joint rescue operations in major disasters,” the Russian Emergency Situations Ministry will also be providing “security at mass events” in the United States.

This suggests that events designated as “National Special Security Events” by the Department of Homeland Security, which include the Super Bowl, international summits such as the G8 and presidential inaugurations, will now rely partly on Russian authorities to provide security.

The meeting last week also agreed on the conclusion that US and Russian emergency authorities will increase their co-operation, “in order to respond efficiently to all kinds of disasters.”

The use of foreign troops or other officials in a law enforcement capacity providing “security” inside the United States is illegal under Posse Comitatus. Capt. William Geddes of the U.S. Army Reserve acknowledged last year that it is against federal law to use US troops to conduct police patrols, despite the fact that such occurrences are becoming increasingly common. The use of foreign troops is an even more clear cut violation of Posse Comitatus.

Last year we reported on how Russian troops were invited to the US as part of a Fort Carson, Colorado drill focused around anti-terror training. Aside from learning how to target terrorists in America, the Russian soldiers were also out in the local community attending a baseball game in Colorado Springs.

As Mac Slavo writes, “Rumors have circulated for years about the possibility of foreign troops being deployed on U.S. soil in the event of a widespread declaration of a national emergency. For quite some time there have been anecdotal reports to support the claim that the U.N., Russia and other nations would be used in a policing capacity should some critical event befall our nation.”

“The fear should such a scenario take place has been that these soldiers would act under the banner of their own flags, ignoring the fundamental protections afforded to our citizens, leaving Americans under the jurisdiction of people who don’t speak our language or respect our fundamental rights to self defense, to be secure in our homes, and to be presumed innocent in the eyes of the law.”

Alex Jones has documented foreign troops being trained on U.S. soil to deal with “insurgents” since the late 1990′s as part of “urban warfare drills”.

Back in July 2010, our reporters covered the Operation Vigilant Guard exercises in Chicago which involved Polish troops training alongside U.S. National Guard troops in drills focused around raiding terrorists and drug dealers.

According to SFC Mark Ballard of the Illinois National Guard, the Polish forces were “integrating into some of the civil military units that are participating in this exercise” as part of Illinois’ partnership with the Republic of Poland, a relationship based around “integrative training” and blending military and civilian forces in the event of a national emergency, as well as making this process of integration with foreign troops more “visible”.

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

This article was posted: Monday, July 1, 2013 at 6:07 am

By KATIE GLUECK | 6/7/13 8:13 AM EDT

The journalist who broke the news that the government is monitoring vast quantities of American phone records is claiming the U.S. is building a “massive” snooping apparatus committed to destroying privacy worldwide.

“There is a massive apparatus within the United States government that with complete secrecy has been building this enormous structure that has only one goal, and that is to destroy privacy and anonymity, not just in the United States but around the world,” charged Glenn Greenwald, a reporter for the British newspaper “The Guardian,” speaking on CNN. “That is not hyperbole. That is their objective.”

Greenwald, speaking with CNN’s Piers Morgan, appeared during a week in which Americans learned that according to reports, the National Security Agency and other parts of the government have been monitoring the phone records of Verizon users and accessing Internet information as part of intelligence-gathering procedures. Some Republicans and Democrats have defended the phone records strategy, including the highest-ranking members of the Senate Intelligence Committee — Sens. Dianne Feinstein (D-Calif.) and Saxby Chambliss (R-Ga.). But Greenwald dismissed those arguments.

(PHOTOS: Pols, pundits weigh in on NSA report)

“So whatever the Justice Department wants to do, they can beat their chests all they want,” he said. “People like Dianne Feinstein and Saxby Chambliss can have press conferences threatening people for bringing … light to what it is they’re doing, but the only people who are going to be investigated are them. It’s well past time that these threats start to be treated with the contempt that they deserve. That’s certainly how I intend to treat them moving forward, with more investigation and disclosures.”

He also bashed the Obama administration for issuing “threats.”

“The Obama administration has been very aggressive about bullying and threatening anybody who thinks about exposing it or writing it or even doing journalism about it, and it’s well past time that come to an end,” he said.

Greenwald also told CNN’s Jake Tapper that the administration has taken a “warped and distorted” view of the PATRIOT Act, the legislation that authorized certain kinds of surveillance for security reasons in the wake of the Sept. 11, 2001, terrorist attacks.

“What the Obama administration is doing in interpreting the PATRIOT Act is so warped and distorted and it vests themselves with such extremist surveillance powers over the United States and American citizens that Americans, in their words, would be stunned to learn what the Obama administration is doing,” he said on CNN’s “The Lead.”

Speaking with MSNBC host Lawrence O’Donnell, Greenwald dared lawmakers to investigate how information about the Verizon phone records leaked, as Feinstein has said should happen.

“Let them go and investigate,” Greenwald said.

He added, “There is this massive surveillance state that the United States government has built up that has extraordinary implications for how we live as human beings on the earth and as Americans in our country, and we have the right to know what it is that that government and that agency is doing. I intend to continue to shine light on that, and Dianne Feinstein can beat her chest all she wants and call for investigations, and none of that is going to stop and none of it is going to change.”

*************************************************
The Tyrant Terrorizes and plots against “We The People”,
yet I am the TERRORIST for disapproving.

So Be It

Blood shall be repaid with Blood
as Tyrants and Traitors lose their heads.
Government Officials plagued with nightmares,
fearing they will feed the Tree of Liberty on the morrow
.
*************************************************

Documents: U.S. mining data from 9 leading Internet firms; companies deny knowledge

By Barton Gellman and Laura Poitras, Published: June 6

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.

The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.

Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.”

PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority.

Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. PRISM recruited its first partner, Microsoft, and began six years of rapidly growing data collection beneath the surface of a roiling national debate on surveillance and privacy. Late last year, when critics in Congress sought changes in the FISA Amendments Act, the only lawmakers who knew about PRISM were bound by oaths of office to hold their tongues.

The court-approved program is focused on foreign communications traffic, which often flows through U.S. servers even when sent from one overseas location to another. Between 2004 and 2007, Bush administration lawyers persuaded federal FISA judges to issue surveillance orders in a fundamentally new form. Until then the government had to show probable cause that a particular “target” and “facility” were both connected to terrorism or espionage.

In four new orders, which remain classified, the court defined massive data sets as “facilities” and agreed to certify periodically that the government had reasonable procedures in place to minimize collection of “U.S. persons” data without a warrant.

In a statement issue late Thursday, Director of National Intelligence James R. Clapper said “information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats. The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”

Clapper added that there were numerous inaccuracies in reports about PRISM by The Post and the Guardian newspaper, but he did not specify any.

Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said: “I would just push back on the idea that the court has signed off on it, so why worry? This is a court that meets in secret, allows only the government to appear before it, and publishes almost none of its opinions. It has never been an effective check on government.”

Several companies contacted by The Post said they had no knowledge of the program, did not allow direct government access to their servers and asserted that they responded only to targeted requests for information.

“We do not provide any government organization with direct access to Facebook servers,” said Joe Sullivan, chief security officer for Facebook. “When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”

“We have never heard of PRISM,” said Steve Dowling, a spokesman for Apple. “We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”

It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing “collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,” rather than directly to company servers.

Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.

An internal presentation of 41 briefing slides on PRISM, dated April 2013 and intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 items last year. According to the slides and other supporting materials obtained by The Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.

That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.

The technology companies, whose cooperation is essential to PRISM operations, include most of the dominant global players of Silicon Valley, according to the document. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted traffic of substantial intelligence interest during the Arab Spring and in the ongoing Syrian civil war.

Dropbox, the cloud storage and synchronization service, is described as “coming soon.”

Sens. Ron Wyden (D-Ore.) and Mark Udall (D-Colo.), who had classified knowledge of the program as members of the Senate Intelligence Committee, were unable to speak of it when they warned in a Dec. 27, 2012, floor debate that the FISA Amendments Act had what both of them called a “back-door search loophole” for the content of innocent Americans who were swept up in a search for someone else.

“As it is written, there is nothing to prohibit the intelligence community from searching through a pile of communications, which may have been incidentally or accidentally been collected without a warrant, to deliberately search for the phone calls or e-mails of specific Americans,” Udall said.

Wyden repeatedly asked the NSA to estimate the number of Americans whose communications had been incidentally collected, and the agency’s director, Lt. Gen. Keith B. Alexander, insisted there was no way to find out. Eventually Inspector General I. Charles McCullough III wrote Wyden a letter stating that it would violate the privacy of Americans in NSA data banks to try to estimate their number.

Roots in the ’70s

PRISM is an heir, in one sense, to a history of intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. The NSA calls these Special Source Operations, and PRISM falls under that rubric.

The Silicon Valley operation works alongside a parallel program, code-named BLARNEY, that gathers up “metadata” — technical information about communications traffic and network devices — as it streams past choke points along the backbone of the Internet. BLARNEY’s top-secret program summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”

But the PRISM program appears to more nearly resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over exponential growth in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques.

The Obama administration points to ongoing safeguards in the form of “extensive procedures, specifically approved by the court, to ensure that only non-U.S. persons outside the U.S. are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about U.S. persons.”

And it is true that the PRISM program is not a dragnet, exactly. From inside a company’s data stream the NSA is capable of pulling out anything it likes, but under current rules the agency does not try to collect it all.

Analysts who use the system from a Web portal at Fort Meade, Md., key in “selectors,” or search terms, that are designed to produce at least 51 percent confidence in a target’s “foreignness.” That is not a very stringent test. Training materials obtained by The Post instruct new analysts to make quarterly reports of any accidental collection of U.S. content, but add that “it’s nothing to worry about.”

Even when the system works just as advertised, with no American singled out for targeting, the NSA routinely collects a great deal of American content. That is described as “incidental,” and it is inherent in contact chaining, one of the basic tools of the trade. To collect on a suspected spy or foreign terrorist means, at minimum, that everyone in the suspect’s inbox or outbox is swept in. Intelligence analysts are typically taught to chain through contacts two “hops” out from their target, which increases “incidental collection” exponentially. The same math explains the aphorism, from the John Guare play, that no one is more than “six degrees of separation” from any other person.

A ‘directive’

In exchange for immunity from lawsuits, companies such as Yahoo and AOL are obliged to accept a “directive” from the attorney general and the director of national intelligence to open their servers to the FBI’s Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA. In 2008, Congress gave the Justice Department authority for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company “to comply.”

In practice, there is room for a company to maneuver, delay or resist. When a clandestine intelligence program meets a highly regulated industry, said a lawyer with experience in bridging the gaps, neither side wants to risk a public fight. The engineering problems are so immense, in systems of such complexity and frequent change, that the FBI and NSA would be hard pressed to build in back doors without active help from each company.

Apple demonstrated that resistance is possible when it held out for more than five years, for reasons unknown, after Microsoft became PRISM’s first corporate partner in May 2007. Twitter, which has cultivated a reputation for aggressive defense of its users’ privacy, is still conspicuous by its absence from the list of “private sector partners.”

Google, like the other companies, denied that it permitted direct government access to its servers.

“Google cares deeply about the security of our users’ data,” a company spokesman said. “We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a ‘back door’ for the government to access private user data.”

Microsoft also provided a statement: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”

Yahoo also issued a denial.

“Yahoo! takes users’ privacy very seriously,” the company said in a statement. “We do not provide the government with direct access to our servers, systems, or network.”

Like market researchers, but with far more privileged access, collection managers in the NSA’s Special Source Operations group, which oversees the PRISM program, are drawn to the wealth of information about their subjects in online accounts. For much the same reason, civil libertarians and some ordinary users may be troubled by the menu available to analysts who hold the required clearances to “task” the PRISM system.

There has been “continued exponential growth in tasking to Facebook and Skype,” according to the PRISM slides. With a few clicks and an affirmation that the subject is believed to be engaged in terrorism, espionage or nuclear proliferation, an analyst obtains full access to Facebook’s “extensive search and surveillance capabilities against the variety of online social networking services.”

According to a separate “User’s Guide for PRISM Skype Collection,” that service can be monitored for audio when one end of the call is a conventional telephone and for any combination of “audio, video, chat, and file transfers” when Skype users connect by computer alone. Google’s offerings include Gmail, voice and video chat, Google Drive files, photo libraries, and live surveillance of search terms.

Firsthand experience with these systems, and horror at their capabilities, is what drove a career intelligence officer to provide PowerPoint slides about PRISM and supporting materials to The Washington Post in order to expose what he believes to be a gross intrusion on privacy. “They quite literally can watch your ideas form as you type,” the officer said.

Poitras is a documentary filmmaker and MacArthur Fellow. Julie Tate, Robert O’Harrow Jr., Cecilia Kang and Ellen Nakashima contributed to this report.

—- Graphic: NSA slides explain the PRISM data-collection program Special Report: Top Secret America
© The Washington Post Company

************************************************
Big Brother is Right Here, Right Now
Now is the time to Stand Up, Speak Out,
and Talk HARD

************************************************

NSA taps in to internet giants’ systems to mine user data, secret files reveal

• Top secret PRISM program claims direct access to servers of firms including Google, Facebook and Apple
• Companies deny any knowledge of program in operation since 2007

Prism

A slide depicting the top-secret PRISM program

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers.

Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.

In a statement, Google said: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

Several senior tech executives insisted that they had no knowledge of PRISM or of any similar scheme. They said they would never have been involved in such a program. “If they are doing this, they are doing it without our knowledge,” one said.

An Apple spokesman said it had “never heard” of PRISM.

The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.

PrismThe program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.

It also opens the possibility of communications made entirely within the US being collected without warrants.

Disclosure of the PRISM program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers.

The participation of the internet companies in PRISM will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.

Some of the world’s largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan “Your privacy is our priority” – was the first, with collection beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.

Collectively, the companies cover the vast majority of online email, search, video and communications networks.

Prism 

The extent and nature of the data collected from each company varies.

Companies are legally obliged to comply with requests for users’ communications under US law, but the PRISM program allows the intelligence services direct access to the companies’ servers. The NSA document notes the operations have “assistance of communications providers in the US”.

The revelation also supports concerns raised by several US senators during the renewal of the Fisa Amendments Act in December 2012, who warned about the scale of surveillance the law might enable, and shortcomings in the safeguards it introduces.

When the FAA was first enacted, defenders of the statute argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the PRISM program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

A chart prepared by the NSA, contained within the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more.

PRISM slide crop
The document is recent, dating to April 2013. Such a leak is extremely rare in the history of the NSA, which prides itself on maintaining a high level of secrecy.

The PRISM program allows the NSA, the world’s largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.

With this program, the NSA is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users.

The presentation claims PRISM was introduced to overcome what the NSA regarded as shortcomings of Fisa warrants in tracking suspected foreign terrorists. It noted that the US has a “home-field advantage” due to housing much of the internet’s architecture. But the presentation claimed “Fisa constraints restricted our home-field advantage” because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the US.

“Fisa was broken because it provided privacy protections to people who were not entitled to them,” the presentation claimed. “It took a Fisa court order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all.”

The new measures introduced in the FAA redefines “electronic surveillance” to exclude anyone “reasonably believed” to be outside the USA – a technical change which reduces the bar to initiating surveillance.

The act also gives the director of national intelligence and the attorney general power to permit obtaining intelligence information, and indemnifies internet companies against any actions arising as a result of co-operating with authorities’ requests.

In short, where previously the NSA needed individual authorisations, and confirmation that all parties were outside the USA, they now need only reasonable suspicion that one of the parties was outside the country at the time of the records were collected by the NSA.

The document also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of US internet firms, claiming “access is 100% dependent on ISP provisioning”.

In the document, the NSA hails the PRISM program as “one of the most valuable, unique and productive accesses for NSA”.

It boasts of what it calls “strong growth” in its use of the PRISM program to obtain communications. The document highlights the number of obtained communications increased in 2012 by 248% for Skype – leading the notes to remark there was “exponential growth in Skype reporting; looks like the word is getting out about our capability against Skype”. There was also a 131% increase in requests for Facebook data, and 63% for Google.

The NSA document indicates that it is planning to add Dropbox as a PRISM provider. The agency also seeks, in its words, to “expand collection services from existing providers”.

The revelations echo fears raised on the Senate floor last year during the expedited debate on the renewal of the FAA powers which underpin the PRISM program, which occurred just days before the act expired.

Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding the various surveillance programs meant there was no way to know if safeguards within the act were working.

“The problem is: we here in the Senate and the citizens we represent don’t know how well any of these safeguards actually work,” he said.

“The law doesn’t forbid purely domestic information from being collected. We know that at least one Fisa court has ruled that the surveillance program violated the law. Why? Those who know can’t say and average Americans can’t know.”

Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without success, to find out any information on how many phone calls or emails had been intercepted under the program.

When the law was enacted, defenders of the FAA argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the PRISM program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

When the NSA reviews a communication it believes merits further investigation, it issues what it calls a “report”. According to the NSA, “over 2,000 PRISM-based reports” are now issued every month. There were 24,005 in 2012, a 27% increase on the previous year.

In total, more than 77,000 intelligence reports have cited the PRISM program.

Jameel Jaffer, director of the ACLU’s Center for Democracy, that it was astonishing the NSA would even ask technology companies to grant direct access to user data.

“It’s shocking enough just that the NSA is asking companies to do this,” he said. “The NSA is part of the military. The military has been granted unprecedented access to civilian communications.

“This is unprecedented militarisation of domestic communications infrastructure. That’s profoundly troubling to anyone who is concerned about that separation.”

Additional reporting by James Ball and Dominic Rushe

Checklist for a False Flag

infowars.com – Friday, May 3, 2013 at 4:39 pm

1. High profile event (Federal building, unique victims, etc)

The Boston marathon, which is always held on Patriots Day in Boston, MA, is the Super Bowl equivalent for runners; All participants must submit qualifying times from previous races and the most elite runners from around the world fly in to compete.

2. Was there a scheduled drill?

(Examples in history: 7/7, The Madrid Bombing, Gladio, . Government always has drills in case the compartmentalized group of mercenaries that are caring it out, while wearing police or FBI uniforms get caught, they can say “OH it was just part of the drill”) Bomb sniffing dogs were at start and finish lines, reported UM coach.

3. Did CIA or FBI have any prior connection with alleged suspect?

4. Suspicious events and/or Questions Go Unanswered

Individual was seen walking on roof directly overhead as bomb goes off

5. Government uses extreme tactics in the name of “justice,” “security,” or “public safety?”

6. Mainstream media promotes narrative to take liberties

7. Politicians further their agendas

8. “Suspects” receive no due process

9.Insider Trading

  • -Gold prices crash

Videos

%d bloggers like this: