Sunday, July 26, 2015

HistoryCommons: Complete 9/11 Timeline

Open-Content investigative project managed by matt, Paul, KJF, mtuck, paxvector
This is the home page for the Complete 911 Timeline investigative project, one of several grassroots investigations being hosted on the History Commons website. The data published as part of this investigation has been collected, organized, and published by members of the public who are registered users of this website...

http://www.historycommons.org/project.jsp?project=911_project

Thursday, July 23, 2015

“I Might Have Some Sensitive Files”

The government says Matt DeHart is an online child predator. He says that’s a ruse created because he discovered shocking CIA secrets and claims he was tortured by federal agents. The only thing that’s clear is that he’s in deep trouble.

On the evening of April 3, 2013, a battered blue pickup truck slowly crossed a bridge from International Falls, Minnesota, to the border station at Fort Frances, Ontario. The family inside — a clean-cut middle-aged couple and their dark-haired 28-year-old son — looked like any other vacationers heading north. The father handed over their IDs to the border guards. “We need the protection of the Canadian government under the U.N. convention against torture,” he said. “Because our son was tortured by the FBI.”

It sounded like something out of a Soviet-era spy thriller. Yet the family making the request couldn’t have been more all-American. Paul DeHart, a church pastor, was a retired Air Force intelligence analyst whose work was overseen by the National Security Agency. His wife, Leann, was a former Army voice interceptor. Paul explained that Matthew, their only child, had followed in their footsteps, poring over spy data gathered by drones in the Middle East for the Indiana Air National Guard. They had just driven through the night from their home in Indiana, Paul said, because they were fleeing the country they had once pledged to serve.

Matt, he explained, was a member of the hacktivist collective Anonymous and had created a repository on the Dark Web for leaked government files. After stumbling on a file that he believed detailed an FBI investigation into the CIA, Matt, the family was convinced, was subject to what Paul described as an elaborate and increasingly frightening ruse: raided and tortured by the FBI, hit with bogus child porn charges, shuttled between prisons for nearly two years...

http://www.buzzfeed.com/davidkushner/matt-dehart

Saturday, July 18, 2015

NSA's Google for the World's Private Communications

One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.

The NSA’s XKEYSCORE program, first revealed by The Guardian, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers.

These servers store “full-take data” at the collection sites — meaning that they captured all of the traffic collected — and, as of 2009, stored content for 3 to 5 days and metadata for 30 to 45 days. NSA documents indicate that tens of billions of records are stored in its database. “It is a fully distributed processing and query system that runs on machines around the world,” an NSA briefing on XKEYSCORE says. “At field sites, XKEYSCORE can run on multiple computers that gives it the ability to scale in both processing power and storage...”

https://firstlook.org/theintercept/2015/07/01/nsas-google-worlds-private-communications/

54GB FBI VAULT FOIA PDF ARCHIVES V1.0

54GB FBI VAULT FOIA PDF ARCHIVES V1.0

SOURCE: https://vault.fbi.gov

ABOUT THIS DOWNLOAD SET (4 PARTS):

– four downloadable .zip files uncompress to roughly 54GB total

– complete FBI Vault online archives (up to July 15 2015)
– meticulous folder structure
– all individual PDF files renamed accordingly & logically
– utilizes long file/folder names on Mac OS X 10.10.4
– archive created on Mac OS X 10.10.4 – master folders
compressed to .zip files via standard system compression utility

[SPECIAL NOTE: This version of the archive is much better than the original FBI downloadable components. This took much time to methodically download, compile and cleanup.]

https://archive.org/details/COMPLETE_FBI_VAULT_FOIA_PDF_ARCHIVES_07_15_15

Monday, June 22, 2015

Videos and slides for "Security in Times of Surveillance" 2015

"Announcement:

The Eindhoven Institute for the Protection of Systems and Information (Ei/PSI) organizes a 1-day event on Security in Times of Surveillance on Friday, 08 May 2015. The event will take place at the Technische Universiteit Eindhoven in the Blauwe Zaal. It features eight invited talks covering technical as well as legal and political aspects of security and surveillance. The program closes with a viewing of the CITIZENFOUR film..."

https://projectbullrun.org/surveillance/2015/video-2015.html

FRANK TERPIL - CONFESSIONS OF A DANGEROUS MAN