20120428

The Black Budget Report: An Investigation into the CIA’s ‘Black Budget’ and the Second Manhattan Project

Pastedgraphic-1

This report examines the existence of a CIA ‘black budget’ and an extensive network of ‘deep black projects’ that it funds. The report identifies the legal framework established by the US Congress for the creation of a CIA ‘black budget’ from the appropriations earmarked for other federal agencies that are siphoned through the CIA as the sole conduit of black budget funds. 

The report investigates the legal challenges to the constitutionality of the CIA’s black budget; how the CIA uses its legal authority to extract appropriations from government agencies such as HUD; how the CIA launders non-appropriated money through other federal agencies; and the efforts the CIA goes to prevent these financial transfers from being exposed.  Using as a case study the legal difficulties faced by an innovative mortgage finance company, Hamilton Securities, the report will argue that the CIA’s covert role in Hamilton’s demise is compelling evidence that the CIA was involved in funding irregularities in HUD. 

It will be finally argued that the size of black budget, the secrecy surrounding it, the extent senior officials in Federal agencies go to targeting individuals and companies that threaten to reveal where congressional appropriations are ultimately going, suggest a vast number of ‘deep black projects’ that collectively form a highly classified second Manhattan Project whose existence, goals and budget are kept secret....

http://www1.american.edu/salla/Articles/BB-CIA.htm

20120427

Full Disclosure: RuggedCom - Backdoor Accounts in my SCADA network? You don't say...

Author: jc
Organization: JC CREW
Date: April 23, 2012
CVE: CVE-2012-1803

Background:
RuggedCom is one of a handful of networking vendors who capitalize on
the market for "Industrial Strength" and "Hardened" networking
equipment. You'll find their gear installed in traffic control
systems, railroad communications systems, power plants, electrical
substations, and even US military sites. Beyond simple L2 and L3
networking these devices are also used for serial-to-ip converstion in
SCADA systems and they even support modbus and dnp3. RuggedCom
published a handy guide to some of their larger customers at
www.ruggedcom.com/about/customers/. My favorite quote is from a
contractor who installed RuggedCom equipment at a US Air Force base:
"Reliability was not an option." How unfortunately apropos.

Problem:
An undocumented backdoor account exists within all released versions
of RuggedCom's Rugged Operating System (ROS®). The username for the
account, which cannot be disabled, is "factory" and its password is
dynamically generated based on the device's MAC address. Multiple
attempts have been made in the past 12 months to have this backdoor
removed and customers notified...

http://seclists.org/fulldisclosure/2012/Apr/277

Star Chamber - Wikipedia, the free encyclopedia

The Star Chamber (Latin: Camera stellata) was an Englishcourt of law that sat at the royal Palace of Westminster until 1641. It was made up of Privy Counsellors, as well as common-law judges and supplemented the activities of the common-law and equity courts in both civil and criminal matters. The court was set up to ensure the fair enforcement of laws against prominent people, those so powerful that ordinary courts could never convict them of their crimes. Court sessions were held in secret, with no indictments, no right of appeal, no juries, and no witnesses. Evidence was presented in writing. Over time it evolved into a political weapon, a symbol of the misuse and abuse of power by the English monarchy and courts.

In modern usage, legal or administrative bodies with strict, arbitrary rulings and secretive proceedings are sometimes called, metaphorically or poetically, star chambers. This is a pejorative term and intended to cast doubt on the legitimacy of the proceedings. The inherent lack of objectivity of any politically motivated charges has led to substantial reforms in English law in most jurisdictions since that time.,,,

http://en.wikipedia.org/wiki/Star_chamber

PGP Creator Phil Zimmermann Has a New Venture Called Silent Circle - AllThingsD

Prz-in-dublin-feature-380x285
It has been a long time since anyone thought seriously about the encryption debate that hung over the discussion around privacy rights in the 1990s. It has also been a long time since Phil Zimmermann — creator of the Pretty Good Privacy software that so many people adopted to encrypt their email — was the target of a federal criminal investigation that derived from his making it widely available for download. The government dropped its case in 1996. 

Today, PGP is the most widely used encryption program in the world. PGP, the company, is part of Symantec, and encrypting your email is now super easy, though most people don’t go to the trouble of doing it.

PGP is the reason Zimmermann is going to be inducted into the Internet Hall of Fame today, at a dinner in Geneva. Which, of course, raises the question: What is he doing these days?...

Pentagon establishes Defense Clandestine Service, new espionage unit - The Washington Post

History is pretty consistent in the result of combining foreign and domestic intelligence services.  That is, it never ends well.

Pastedgraphic-4

"The Pentagon is planning to ramp up its spying operations against high-priority targets such as Iran under an intelligence reorganization aimed at expanding on the military’s espionage efforts beyond war zones, a senior defense official said Monday.

The newly created Defense Clandestine Service would work closely with the CIA — pairing two organizations that have often seen each other as rivals — in an effort to bolster espionage operations overseas at a time when the missions of the agency and the military increasingly converge.

The plan, the official said, was developed in response to a classified study completed last year by the director of national intelligence that concluded that the military’s espionage efforts needed to be more focused on major targets beyond the tactical considerations of Iraq and Afghanistan..."

The Illusion of Choice

K0pv0

20120426

TSA defends pat-down of 4-year-old at Kan. airport - Yahoo! News

Great job.

"WICHITA, Kan. (AP) — The grandmother of a 4-year-old girl who became hysterical during a security screening at a Kansas airport said Wednesday that the child was forced to undergo a pat-down after hugging her, with security agents yelling and calling the crying girl an uncooperative suspect.

The incident has been garnering increasing media and online attention since the child's mother, Michelle Brademeyer of Montana, detailed the ordeal in a public Facebook post last week. The Transportation Security Administration is defending its agents, despite new procedures aimed at reducing pat-downs of children.

The child's grandmother, Lori Croft, told The Associated Press that Brademeyer and her daughter, Isabella, initially passed through security at the Wichita airport without incident. The girl then ran over to briefly hug Croft, who was awaiting a pat-down after tripping the alarm, and that's when TSA agents insisted the girl undergo a physical pat-down…."

http://news.yahoo.com/tsa-defends-pat-down-4-old-kan-airport-231522461.html;_...

LiveLeak.com - Drunk Marines fighting

20120424

Lawless Land - Libya - YouTube

Great job guys. Great job.

What Transformed the WTC Buildings to DUST on 9/11? - YouTube

Hypnotic Mind Altering Mass Media - YouTube

Australian Police Accused of Mass Software Piracy | TorrentFreak

Australian police are involved in a massive piracy lawsuit. Software company Micro Focus is claiming that the police are making unauthorized use of its ViewNow software, which they use to access the COPS criminal intelligence database. In addition, it’s alleged that the police shared the proprietary software with third parties. Micro Focus is fighting the case in court and is demanding at least $10 million in damages.

Nsw-pirates
The Aussie police are clearly not setting the right example when it comes to copyright infringement. In 2008 computers of the South Australian police force’s IT branchwere found to contain hundreds of pirated movies.

There is, however, an even ongoing bigger case in which the New South Wales police are accused of massive software piracy involving its criminal intelligence database...

The World Tomorrow - The World Tomorrow: Slavoj Zizek and David Horowitz - YouTube

20120422

National Security Agency Whistleblower William Binney on Growing State Surveillance

< Headlines | Next Story >

Friday, April 20, 2012 Whole Show

Exclusive: National Security Agency Whistleblower William Binney on Growing State Surveillance

Javascript is required to watch video inline on this page.
You can choose another option on the listen/watch page if you prefer.

William_binney

In his first television interview since he resigned from the National Security Agency over its domestic surveillance program, William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower. Binney was a key source for investigative journalist James Bamford’s recent exposé in Wired Magazine about how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain near-bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls, Google searches and other personal data.

Binney served in the NSA for over 30 years, including a time as technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could "create an Orwellian state." Today marks the first time Binney has spoken on national television about NSA surveillance. This interview is part of a 4-part special. Click here to see segment 2, 3, and 4. [includes rush transcript]

Guest:

William Binney, served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could "create an Orwellian state."

Rush Transcript

This transcript is available free of charge. However, donations help us provide closed captioning for the deaf and hard of hearing on our TV broadcast. Thank you for your generous contribution.Donate >

Transcript

JUAN GONZALEZ: Today we bring you a Democracy Now! special on the growing domestic surveillance state and the Department of Homeland Security’s efforts to spy on dissident journalists and activists. In a national broadcast exclusive, we’re joined by National Security Agency whistleblower William Binney. He was a key source for James Bamford’s recent [exposé] in Wired Magazine about the NSA—how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain nearly bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls and Google searches and other personal data.

Binney served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the agency’s data-mining program has become so vast that it could, quote, "create an Orwellian state." Today marks the first time Binney has spoken on national television about surveillance by the National Security Agency.

AMY GOODMAN: We’re also joined by two individuals who have been frequent targets of government surveillance: Laura Poitras, the Academy Award-nominated filmmaker, and Jacob Appelbaum, a computer security researcher who has volunteered with WikiLeaks. Poitras is the director of the documentary films My Country, My Country and The Oath. Both Poitras and Appelbaum have been repeatedly detained and interrogated by federal agents when entering the United States. Their laptops, cameras and cell phones have been seized, and presumably their data has been copied.

The Justice Department has also targeted Applebaum’s online communications. In November, a federal judge ordered Twitter to hand over information about his account. In October, the Wall Street Journal revealed the Justice Department had obtained a secret court order to force Google and the internet provider Sonic.net to turn over information about Appelbaum’s email accounts.

William Binney, Laura Poitras and Jacob Appelbaum will be speaking tonight at the Whitney Museum here in New York for a teach-in on surveillance. The three of them join us here in our studio together in a broadcast for the first time. We’re going to begin with William Binney.

You worked for the National Security Agency for more than three decades.

WILLIAM BINNEY: Almost four.

AMY GOODMAN: Almost four decades.

WILLIAM BINNEY: Yeah.

AMY GOODMAN: You, for a time, directed the NSA’s World Geopolitical and Military Analysis Reporting Group. Tell us what you did and then why you left and what happened to you afterwards.

WILLIAM BINNEY: Well, I was the technical director of that group, that basically looked at the world, so we looked at all the technical problems of—in the world, and see how we could solve collection, analysis and reporting on military and geopolitical issues all around the world, every country in the world. So, it was a rather large technical problem to tackle, but it—and one of the largest problems we thought we had was looking at the World Wide Web and all the ballooning and mushrooming communications in the world. And our ability to deal with that was diminishing over time, so I kind of referred to it as our inability to keep up with the rate of change. So, we were falling behind the rate of change.

So we—I had a very small group of people in a lab, and we decided to attack that problem. And we did it by looking at how we could graph the network of communications and all the communications in the world, and then—and then focus in on that graph and use the graph to limit what we wanted to attack. And we basically succeeded at that, but in the process, of course, we scooped up Americans from different places, so we had to protect their identities, according to our laws and privacy rights of U.S. citizens. So, under USSID 18, we built in protections to anonymize their identities, so you couldn’t really tell who you were looking at.

JUAN GONZALEZ: And that’s because the NSA could do surveillance from abroad, but not of U.S. citizens.

WILLIAM BINNEY: Well, and, you see, the World Wide Web routes things all over, so you never really know where U.S. citizens’ communications are going to be routed. So, you—if you were collecting somewhere else on another continent, you could still get U.S. citizens. That’s—see, that was a universal problem. So we devised how to do that and protect U.S. citizens. So—and this was all before 9/11. And we devised how to do that, made that effective and operating. So we were actually prepared to deploy about eight months before 9/11 and actually have a system that would run and manage the—what I call 20 terabytes a minute of activity.

So—but after 9/11, all the wraps came off for NSA, and they decided to—between the White House and NSA and CIA, they decided to eliminate the protections on U.S. citizens and collect on domestically. So they started collecting from a commercial—the one commercial company that I know of that participated provided over 300—probably, on the average, about 320 million records of communication of a U.S. citizen to a U.S. citizen inside this country.

AMY GOODMAN: What company?

WILLIAM BINNEY: AT&T. It was long-distance communications. So they were providing billing data. At that point, I knew I could not stay, because it was a direct violation of the constitutional rights of everybody in the country. Plus it violated the pen register law and Stored Communications Act, the Electronic Privacy Act, the intelligence acts of 1947 and 1978. I mean, it was just this whole series of—plus all the laws covering federal communications governing telecoms. I mean, all those laws were being violated, including the Constitution. And that was a decision made that wasn’t going to be reversed, so I could not stay there. I had to leave.

JUAN GONZALEZ: And I wanted to get back to, for a moment, when you say that you were developing a way to cope with the fact that the agency was falling behind, just because the sheer volume of the material that they were sweeping up was so great, that it was impossible, at times, to find the important intelligence material.

WILLIAM BINNEY: Yes.

JUAN GONZALEZ: So you, in essence, were creating a program that filtered out the valuable stuff.

WILLIAM BINNEY: Right. That’s right.

JUAN GONZALEZ: What—did it have a name, the program?

WILLIAM BINNEY: Well, it was called Thin Thread. I mean, Thin Thread was our—a test program that we set up to do that. By the way, I viewed it as we never had enough data, OK? We never got enough. It was never enough for us to work at, because I looked at velocity, variety and volume as all positive things. Volume meant you got more about your target. Velocity meant you got it faster. Variety meant you got more aspects. These were all positive things. All we had to do was to devise a way to use and utilize all of those inputs and be able to make sense of them, which is what we did.

JUAN GONZALEZ: And when they didn’t use your system, they—the NSA developed another or attempted to develop another system to do the same?

WILLIAM BINNEY: Well, that one failed. They didn’t produce anything with that one.

AMY GOODMAN: And that one was called?

WILLIAM BINNEY: Trailblazer, yeah.

AMY GOODMAN: Trailblazer, and—

WILLIAM BINNEY: I called it—I called it five-year plan number one. Five-year plan number two was Turbulence. Five-year plan number three is—

AMY GOODMAN: And Trailblazer cost how much money?

WILLIAM BINNEY: That was, I think, in my—my sense, was a little over $4 billion.

AMY GOODMAN: Four billion dollars.

WILLIAM BINNEY: Right.

AMY GOODMAN: But it was scuttled. It was done away with in 2006?

WILLIAM BINNEY: Yes, '05, I think it was. But yes, that's right. And we developed our program with $3 million, roughly.

JUAN GONZALEZ: And Trailblazer was largely developed by SAIC, the—

WILLIAM BINNEY: Well, they were contributing contractors, yeah. But they—I think they had the lead—they were the lead contractors in some of contracts, yeah.

AMY GOODMAN: And why did they go with this one, though, ultimately, they did not use it? This is under Michael Hayden at the time?

WILLIAM BINNEY: Yes. Well—

AMY GOODMAN: Under the Bush administration?

WILLIAM BINNEY: Well, I thought—my sense was it was a good employment program. And it was a large budget program. It would spend money, a lot of money, so it would build the budget and—

AMY GOODMAN: Go to a major weapons manufacturer.

WILLIAM BINNEY: Right.

AMY GOODMAN: And heads of the agency, National Security Agency, would go back and forth working at NSA, working at SAIC.

WILLIAM BINNEY: It was—we called it an incestuous relationship, yeah.

AMY GOODMAN: What happened to you after you quit? You quit within a month of the 9/11 attacks.

WILLIAM BINNEY: Thirty-first of October of 2001, yeah.

AMY GOODMAN: And then what happened?

WILLIAM BINNEY: Well, we tried to form out the company to at least help the government to deal with some of the massive data problems they had, like in—even in the FBI, and also Customs and Border Protection and NRO and various other agencies. And every time we went somewhere to try to develop something, why, we got canceled, our contract got canceled, for—basically because, we have heard, anyway, that they were told that certain agencies didn’t want them hiring us, so they didn’t want us working for them, so...

JUAN GONZALEZ: And before you left, in that short period when it became obvious to you the direction that the NSA was going to, did you—when you raised objections or raised concerns, what was the response?

WILLIAM BINNEY: Well, I went directly to the Intelligence Committee, because it was their job to—because, first of all, when that happened, I mean, the people they had to use to set it up—since they used part of the program we developed to set it up, they had to use our people to set it up, initially, because no one else knew the code, and no one else knew how to get it operating. So, when they did that, they came—those people came to me and said, "You know, they’re doing this," you know, and they told me what they were doing. And so I immediately went to the Intelligence Committee, because they were—the intelligence committees were formed to have oversight over the intelligence community to make sure they didn’t monitor U.S. citizens. This was a fallout of the Church Committee back in the '70s. And the member of the staff that I went to went to Porter Goss, who was chairman of that committee at the time, and he referred her to General Hayden for any further. When it was the job of that committee to do the oversight on all this domestic spying, they weren't doing it, OK? Basically, the—at the time, according to Dick Cheney’s interview on the 10th anniversary of 9/11, he said the—at that time, only the majority or minority leaders, the HPSCI and the SSCI, were involved in having knowledge about this program, Stellar Wind, which you had talked with Tom Drake about.

AMY GOODMAN: The former NSA—

WILLIAM BINNEY: Right, right.

AMY GOODMAN: —employee who was also a whistleblower.

WILLIAM BINNEY: And that was the program, of course, that Director Mueller reported was the issue that—with the hospital visit with Ashcroft. So—

AMY GOODMAN: And explain that, very briefly, for—to remind people.

WILLIAM BINNEY: Well, the whole program, I guess, had to be reauthorized every 45 days, and they had to have the director of NSA, director of CIA and the attorney general sign an affidavit that they still needed the program and that it was legal. And when Comey and Goldsmith in the DOJ decided that this really was a violation of the Constitution and was illegal, then that issue came up. And that’s what—that’s what got everybody kind of disturbed and ready to—ready, actually, to resign in 2004, early 2004, I believe that was. And as a part of it was coming up for reauthorization, and so Gonzales left the White House, along with one other person I can’t remember, and went to the hospital where Ashcroft was, because he was—had pancreatitis, I believe, and was in the hospital, and Comey was the acting attorney general. And so, at that point, they went to Ashcroft to see if he would overrule Comey, who had denied reauthorization and declared it basically illegal. And so, they tried to get Ashcroft to overrule that and went to the hospital to do that. And Director Mueller, I think, also quickly got to the hospital to help ensure that Ashcroft was not taken advantage of, I guess. So...

AMY GOODMAN: When was your home raided?

WILLIAM BINNEY: Twenty-sixth of July of 2007.

AMY GOODMAN: What happened? Where did you

WILLIAM BINNEY: I should—I should say that it was the morning of the second day after Gonzales’s testimony, the then-Attorney General Gonzales’s testimony, to the Senate Judiciary Committee on the TSP, the—what was called the TSP, which I refer to as a fabricated plan. It was created to cover a number of plans, one of which was Stellar Wind, and the others—which they didn’t want to discuss. And the others were wiretapping. And so, they picked on the wiretapping ones, because the public would generally say, "Yes, anybody that was potentially a terrorist, a foreign terrorist, communicating with anybody in the United States, we want you to monitor their communications." So that was the acceptable part of it. But it was grouped with Stellar Wind and some other programs, so that they could give cover to it, talk about some programs, say they’re talking about the Terrorist Surveillance Program, but it was basically a group of programs, some of which they did not want to talk about. And he did not testify to that at the—and I believe some of the—Whitehouse and Feingold, I think, were the two who were on the Senate Intelligence Committee that did challenge him at the time, saying he wasn’t being truthful, and that was—he wasn’t being completely honest. So...

AMY GOODMAN: You live where?

WILLIAM BINNEY: I live in Maryland, actually four miles from NSA.

AMY GOODMAN: And what happened?

WILLIAM BINNEY: They came busting in.

AMY GOODMAN: Who’s "they"?

WILLIAM BINNEY: The FBI. About 12 of them, I think, 10 to 12. They came in with the guns drawn, on my house.

AMY GOODMAN: Where were you?

WILLIAM BINNEY: I was in the shower. I was taking a shower, so my son answered the door. And they of course pushed him out of the way at gunpoint and came running upstairs and found me in the shower, and came in and pointed the gun at me while I was, you know—

AMY GOODMAN: Pointed a gun at your head?

WILLIAM BINNEY: Oh, yeah. Yes. Wanted to make sure I saw it and that I was duly intimidated, I guess.

JUAN GONZALEZ: And what did they—what did they do at that point? Did they begin questioning you? Or they just took you to headquarters? Or—

WILLIAM BINNEY: No, no. Yeah, they basically separated us from—I was separated from my family. Took me on the back porch, and they started asking me questions about it. They were basically wanting me to tell them something that would implicate someone in a crime. And so, I told them that I didn’t really know—they wanted to know about certain people, that was—they were the ones that were being raided at the same time, people who—we all signed—those who were raided that day, all of us signed the DOD-IG complaint. We were the ones who filed that complaint.

AMY GOODMAN: The Pentagon—

WILLIAM BINNEY: The Pentagon DOD-IG, against—

AMY GOODMAN: —inspector general complaint.

WILLIAM BINNEY: Against NSA, yes, talking about fraud—basically corruption, fraud, waste and abuse. And then—

AMY GOODMAN: Tom Drake was raided at the same time?

WILLIAM BINNEY: No, he was raided in November of that year. We were just the ones who signed it, were raided.

JUAN GONZALEZ: So, and who were the other people that were raided that same day?

WILLIAM BINNEY: Diane Roark, Kirk Wiebe and Ed Loomis.

AMY GOODMAN: Diane Roark worked for the Senate committee?

WILLIAM BINNEY: Diane was the senior staffer. She had the NSA account on the HPSCI side, on the House side. So she was monitoring. She was doing oversight. She was doing real oversight; the others weren’t. Basically, the others were simply taking what the NSA said verbatim and taking them at their word. So, basically, that was not oversight. But Diane would probe and be prying into what they were saying to find out really clearly what was going on. And—

JUAN GONZALEZ: And ostensibly, they were searching for who was leaking information to the—who had leaked information to the New York Times.

WILLIAM BINNEY: That was the pretext, yes. But I accused them of being sent there by someone outside the FBI. And that—their body language told me that I hit it right on the head. So—and I also—after a while, they were questioning me, and I couldn’t tell them anything, because I didn’t know anything that would implicate any of the four of us, so—

AMY GOODMAN: They were looking for leaks.

WILLIAM BINNEY: Well, that was the pretext, the leak on the—to give the New York Times thing. The real thing—what they were really doing was retribution and intimidation so we didn’t go to the Judiciary Committee in the Senate and tell them, "Well, here’s what Gonzales didn’t tell you, OK." That was what it was really all about. And also, it was retribution for that DOD-IG complaint, because it was a rather embarrassing report that they gave, so...

JUAN GONZALEZ: And what is it that Gonzales didn’t tell them, in your perspective, in terms of what is happening to our national security surveillance situation?

WILLIAM BINNEY: Well, it was about—it was about Stellar Wind and all of the domestic spying.

AMY GOODMAN: We’re going to break and come back to this conversation. William Binney was the technical director of the National Security Agency, which, by the way, is a number of times larger than the CIA, the National Security Agency’s World Geopolitical and Military Analysis Reporting Group. When we come back, we’ll also speak with a well-known hacker, Jacob Appelbaum, who has volunteered for WikiLeaks—he’s a computer security researcher—and Laura Poitras, whose films, My Country, My Country and The Oath, are well known. She’s been nominated for an Oscar. This is Democracy Now! Back in a minute.

This interview is part of a 4-part special. Click here to see segment 2, 3, and 4.

Recent ShowsMore Shows

Full News Hour

Headlines

Creative Commons License

The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

CIA Speaks - The Phoenix Tapes

Phoenix_header

In cooperation with Author/Journalist Douglas Valentine, Cryptocomb is publishing over 8GB's of audio recordings that Mr. Valentine collected throughout his personal interviews with former CIA and U.S. Military Officers while researching for his book, "The Phoenix Program". The Phoenix Program for the unacquainted was a CIA generated operation that sponsored mass arrests, terrorism, torture, murder and lies during the war in Vietnam. Many of the players went on to walk the halls of the Pentagon, Congress, the Department of Homeland Security, and major National Security Corporations…

Google Chrome behind the scenes

Pastedgraphic-3

From:  Todd Heberlein <todd_heberlein@mac.com>
Subject:  [Fed-Talk] Google Chrome behind the scenes
Date:  April 17, 2012 8:20:59 PM PDT
To:  fed-talk@lists.apple.com Talk <fed-talk@lists.apple.com>

 "If you've ever wondered how Google keeps Chrome up-to-date behind the scenes, I took some time deconstructing its activities and writing it up. In many ways it acts very similarly to malware used in Advanced Persistent Threats (APTs), so I gave the article a purposely provocative title.  Actually... the whole article is a little provocative. I guess I was feeling a little punchy after too many long hours.

If you want to jump straight to the hairy graphic, here it is:

The full article (along with a link to a PDF version) can be found here:

The Advanced Persistent Threat You Have: Google Chrome
http://www.netsq.com/Documents_html/GoogleAPT/

Todd"

20120421

Police Brutality 15 Year Old Girl Brutally Knocked Over By Cop

Derivatives - The Unregulated Global Casino for Banks

SHORT STORY: Pick something of value, make bets on the future value of "something", add contract & you have a derivative.Banks make massive profits on derivatives, and when the bubble bursts chances are the tax payer will end up with the bill.This visualizes the total coverage for derivatives (notional). Similar to insurance company's total coverage for all cars.

LONG STORY: A derivative is a legal bet (contract) that derives its value from another asset, such as the future or current value of oil, government bonds or anything else. Ex- A derivative buys you the option (but not obligation) to buy oil in 6 months for today's price/any agreed price, hoping that oil will cost more in future. (I'll bet you it'll cost more in 6 months). Derivative can also be used as insurance, betting that a loan will or won't default before a given date. So its a big betting system, like a Casino, but instead of betting on cards and roulette, you bet on future values and performance of practically anything that holds value. The system is not regulated what-so-ever, and you can buy a derivative on an existing derivative.
Most large banks try to prevent smaller investors from gaining access to the derivative market on the basis of there being too much risk. Deriv. market has blown a galactic bubble, just like the real estate bubble or stock market bubble (that's going on right now). Since there is literally no economist in the world that knows exactly how the derivative money flows or how the system works, while derivatives are traded in microseconds by computers, we really don't know what will trigger the crash, or when it will happen, but considering the global financial crisis this system is in for tough times, that will be catastrophic for the world financial system since the 9 largest banks shown below hold a total of $228.72 trillion in Derivatives - Approximately 3 times the entire world economy. No government in world has money for this bailout. Lets take a look at what banks have the biggest Derivative Exposures and what scandals they've been lately involved in. Derivative Data Source: ZeroHedge...

http://demonocracy.info/infographics/usa/derivatives/bank_exposure.html

9-11 Mossad 'Mural Van' - NYPD Police Radio - YouTube

Physicists Create First Long-Distance Quantum Link | Wired.com

For more than a decade, physicists have been developing quantum mechanical methods to pass secret messages without fear that they could be intercepted. But they still haven’t created a true quantum network — the fully quantum-mechanical analog to an ordinary telecommunications network in which an uncrackable connection can be forged between any two stations or “nodes” in a network. Now, a team of researchers in Germany has built the first true quantum link using two widely separate atoms. A complete network could be constructed by combining many such links, the researchers say.

“These results are a remarkable achievement”, says Andrew Shields, applied physicist and assistant managing director at Toshiba Research Europe Ltd. in Cambridge, U.K., who was not involved in the work. “In the past we have built networks that can communicate quantum information, but convert it into classical form at the network switching points. [The researchers] report preliminary experiments towards forming a network in which the information remains in quantum form.”

Quantum communications schemes generally take advantage of the fact that, according to quantum theory, it’s impossible to measure the condition or “state” of a quantum particle without disturbing the particle. For example, suppose Alice wants to send Bob a secret message. She can do the encrypting in a traditional way, by writing out the message in the form of a long binary number and zippering it together in a certain mathematical way with a “key,” another long stream of random 0s and 1s. Bob can then use the same key to unscramble the message...

http://www.wired.com/wiredscience/2012/04/quantum-long-distance-link/

FBI: Smart Meter Hacks Likely to Spread — Krebs on Security

A series of hacks perpetrated against so-called “smart meter” installations over the past several years may have cost a single U.S. electric utility hundreds of millions of dollars annually, the FBI said in a cyber intelligence bulletin obtained by KrebsOnSecurity. The law enforcement agency said this is the first known report of criminals compromising the hi-tech meters, and that it expects this type of fraud to spread across the country as more utilities deploy smart grid technology.

Smart meters are intended to improve efficiency, reliability, and allow the electric utility to charge different rates for electricity at different times of day. Smart grid technology also holds the promise of improving a utility’s ability to remotely read meters to determine electric usage.

But it appears that some of these meters are smarter than others in their ability to deter hackers and block unauthorized modifications. The FBI warns that insiders and individuals with only a moderate level of computer knowledge are likely able to compromise meters with low-cost tools and software readily available on the Internet...

http://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/

U.S. Food Policy: Imidacloprid linked to bee colony collapse

Pastedgraphic-2

Harvard scientists recently tested the effects of the pesticide imidacloprid on bee colonies in situ, meaning out in the field instead of in a laboratory.  At each site, four hives were treated with four different amounts of the pesticide.  Beginning with the hives that received the highest doses, and continuing to the hives that received low doses, the bees died in a fashion symptomatic of colony collapse disorder (CCD).

Reactions: The scientists say their findings show that even low doses of imdacloprid, similar to those used in real agriculture, can cause CCD.  The pesticide's manufacturer, Bayer, says the low doses used in the study remained too high to be realistic.  The EPA still considers CCD to result from a mix of factors, possibly including pesticide exposure as just one factor.  That may still be a reasonable summary of the balance of current evidence, but the new study strengthens the case that pesticides -- imidacloprid in particular -- have a big role.

5 Secrets Anonymous Should Steal From China - By Adam Segal | Foreign Policy

Pastedgraphic-1

Over the last few weeks, the hacker collective Anonymous has shifted its attention to China. On March 30, Anonymous China defaced the first five of what would soon be hundreds of business and a few minor official websites, warning the Chinese government that it is "not infallible, today websites are hacked, tomorrow it will be your vile regime that will fall." The Who's "Baba O'Riley" (commonly known as "Teenage Wasteland") played on many of the sites, and Chinese netizens were directed to a link that explained how to get around Internet controls. Another hacker associated with the group LulzSec told Reuters that he breached the China National Import & Export Corporation, a defense contractor, and downloaded company documents to several file-sharing websites.

The group is apparently not based in China, and appears to rely on translation tools to work through Chinese networks. So far Anonymous China hasn't exposed anything particularly damaging. But China is a great country in which to dig: lacking a free press and ruled by the intensely paranoid Communist Party since 1949, it holds many secrets stored in fusty computer files across the Web.

Knocking down the Chinese regime is a tall order, but Anonymous China could certainly damage the Communist Party's reputation. Here are five websites the group could hack for real secrets, Chinese-style:...

DoD SERE Pre-Academic Laboratory (PREAL) Enhanced Interrogation Techniques Manual | Public Intelligence

The following manual was recently released by the Department of Defense. The manual was produced by the DoD’s Joint Personnel Recovery Agency (JPRA) and used by instructors in the JPRA’s Survival Evasion Resistance Escape (SERE) courses to train participants for the potential experience of detention. According to Jason Leopold and Jeffrey Kaye of Truthout, the manual was reportedly consulted during high-level discussions in the Bush administration regarding potential “enhanced interrogation techniques.” Several techniques described in the manual are mentioned in a series of controversial memos commonly referred to as the “Torture memos” authored by Justice Department Office of Legal Counsel attorney John Yoo...

http://publicintelligence.net/dod-pre-academic-laboratory-preal-enhanced-inte...

DARPA Doubling Down on Spy Technologies

CHARLESTON, S.C. — The Defense Advanced Research Projects Agency plans to increase investments in aerial surveillance systems. Long-endurance aerostats, autonomous sensors and other ISR (intelligence, reconnaissance and surveillance) technologies are among the agency's top priorities, said Ellison “Dick” Urban, special assistant for strategic execution and analysis at DARPA.
Declining budgets mean that DARPA has had narrow down its wish list, and agency leaders have determined global ISR to be one of the most important study areas, Urban said April 17 at the National Defense Industrial Association’s annual science and engineering technology conference.

U.S. drones in Iraq and Afghanistan have been relatively unchallenged, but the next conflict may require ISR operations in contested airspace. So DARPA is looking into sensors that would be powerful enough to fly in friendly airspace and peer into countries where access is denied.

In addition to persistence, DARPA is focusing on higher resolution imagery and wider view sensors...

http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?List=7c996c.../blog/Lists/Posts

Ex-CIA officer sheds light on 1977 spy arrests in Moscow « intelNews.org

A recently retired CIA officer has spoken publicly for the first time about the 1977 arrest and eventual suicide of a Soviet double agent considered one of the Central Intelligence Agency’s most important assets during the Cold War.
Aleksandr Dmitryevich Ogorodnik was an official in the Soviet diplomatic service who, while stationed at the Soviet embassy in Bogotá, Colombia, was compromised and later blackmailed by Colombian intelligence into spying on Moscow. Ogorodnik was initially handled by the Colombians, with little success. Later, however, when he was moved to a sensitive post in the Soviet Ministry of Foreign Affairs in Moscow, the Colombians turned him over to the CIA.
He was handled by CIA officerAldrich Ames —himself a double spy for the Soviet KGB— who gave Ogorodnik the codename TRIGON...
http://intelnews.org/2012/04/16/01-970/
http://en.wikipedia.org/wiki/Aleksandr_Dmitrievich_Ogorodnik

BP Blow-out Cover-Up - EcoWatch.org - YouTube

Covert History » Coming Soon: The Million Page ‘Leak’

On April 20th, Covert History will begin publishing over 1,000,000 pages of Government Documents, drawing on sources from:

Federal Bureau of Investigation (FBI)
Central Intelligence Agency (CIA)
National Security Council
National Security Agency (NSA)
Department of Defense
Defense Intelligence Agency (DIA)
Joint Chiefs of Staff
Department of Justice
Secret Service
National Archive Records Administration
Presidential Libraries and more!...

http://www.coverthistory.com/2012/04/08/coming-soon-the-million-page-leak/

The Rise of the Killer Drones: How America Goes to War in Secret | Rolling Stone

One day in late November, an unmanned aerial vehicle lifted off from Shindand Air Base in western Afghanistan, heading 75 miles toward the border with Iran. The drone's mission: to spy on Tehran's nuclear program, as well as any insurgent activities the Iranians might be supporting in Afghanistan. With an estimated price tag of $6 million, the drone was the product of more than 15 years of research and development, starting with a shadowy project called DarkStar overseen by Lockheed Martin. The first test flight for DarkStar took place in 1996, but after a crash and other mishaps, Lockheed announced that the program had been canceled. According to military experts, that was just a convenient excuse for "going dark," meaning that DarkStar's further development would take place under a veil of secrecy.

The drone that was headed toward Iran, the RQ-170 Sentinel, looks like a miniature version of the famous stealth fighter, the F-117 Nighthawk: sleek and sand-colored and vaguely ominous, with a single domed eye in place of a cockpit. With a wingspan of 65 feet, it has the ability to fly undetected by radar. Rather than blurting out its location with a constant stream of radio signals – the electronic equivalent of a trail of jet exhaust – it communicates intermittently with its home base, making it virtually impossible to detect. Once it reached its destination, 140 miles into Iranian airspace, it could hover silently in a wide radius for hours, at an altitude of up to 50,000 feet, providing an uninterrupted flow of detailed reconnaissance photos – a feat that no human pilot would be capable of pulling off...

http://www.rollingstone.com/politics/news/the-rise-of-the-killer-drones-how-a...

20120420

Right Wing Billionaires Push Israel's Agenda in 2012 Elections - YouTube

First Man Arrested With Drone Evidence Vows to Fight Case - US News and World Report

Fe_pr_120409brossart225x169

Rodney Brossart was arrested in June.

The tiny town of Lakota, N.D., is quickly becoming a key testing ground for the legality of the use of unmanned drones by law enforcement after one of its residents became the first American citizen to be arrested with the help of a Predator surveillance drone.

The bizarre case started when six cows wandered onto Rodney Brossart's 3,000 acre farm. Brossart, an alleged anti-government "sovereignist," believed he should have been able to keep the cows, so he and two family members chased police off his land with high powered rifles...

Child camel jockeys in the Middle East - Ansar Burney - YouTube


BBC News - Alan Turing papers on code breaking released by GCHQ

Two 70-year-old papers by Alan Turing on the theory of code breaking have been released by the government's communications headquarters, GCHQ.

It is believed Turing wrote the papers while at Bletchley Park working on breaking German Enigma codes.

A GCHQ mathematician said the fact that the contents had been restricted "shows what a tremendous importance it has in the foundations of our subject".

It comes amid celebrations to mark the centenary of Turing's birth...

http://www.bbc.com/news/technology-17771962

Mossad & War Against Iran 2011/2012

Full Signal - 52 minute documentary - trailer - YouTube

20120418

Karzai wants 'at least $2 billion' a year from US - Yahoo! News

Karzai_money

Afghan President Hamid Karzai on Tuesday said he wanted "at least $2 billion" a year from the United States after it withdraws its troops in 2014.

Karzai said the US should specify in a partnership agreement to be signed between his country and the US how much money it will give to Afghanistan after they leave.
"They (US) say we will give you money, but will not specify the amount. We say give us less, but write it down," Karzai told a group of university professors and students in Kabul.

"We want them to write down that America will give for Afghanistan's security $2 billion a year -- or at least two billion a year", he said. "If they want to give us more, they are welcome…"

WTC Demolition Explained - Debunking the Debunkers - Chapter 1 - YouTube

Michael Harari - Wikipedia,

Pastedgraphic-2

Michael "Mike" Harari (born 1927) was an Israeli intelligence officer in the Mossad. Harari was involved in several notable operations, including the failed Lillehammer affair and the rescue of hostages at Entebbe.

Harari began his intelligence work facilitating illegal Jewish immigration to Palestine after World War II. He then spent time in the army and Shin Bet before being recruited by the Mossad in the 1960s. During his time in the Mossad he ran agents in Europe, eventually advancing to the head of the Operations Branch. It was during this time that he helped build and lead teams in Operation Wrath of God, the Israeli response to the Munich Massacre in 1972. In what became known as the Lillehammer affair, Harari led a team into Norway where they believed Ali Hassan Salameh, the chief of Black September operations was living. After identifying and assassinating the target, it was revealed that they had killed an innocent waiter, Ahmed Bouchiki, who only resembled Salameh. While authorities arrested many of Harari's team, he escaped back to Israel. A Norwegian case against him was dismissed in January 1999 because of a lack of evidence.[1]...

Please Help Defend John Kiriakou

Dear Friends and Colleagues:

-john6
We write to ask you to join us in supporting, protecting and materially helping our friend and colleague, John Kiriakou, a long-time former C.I.A. official and case officer. Incredibly, John has been accused by the Department of Justice of crimes under the 1917 Espionage Act, a charge historically reserved for persons who betrayed their country to foreign governments for money.

Why? The prosecutors have not claimed that John talked to any foreign government, passed any government documents or accepted funds from anyone hostile to the United States. Instead, according to the facts asserted in the indictment, he committed the "crime" of responding honestly to a query from theNew York Times related to the agency's interrogation program under the Bush Administration, which included water boarding...

Protecting Psychologists Who Harm: The APA's Latest Wrong Turn

040712-eidelson

Camp Delta, where detainees on the war on terrorism are kept, at the U.S. Naval base in Guantanamo, October 9, 2003. (Photo: Angel Franco / The New York Times)

Shortly after learning about the American Psychological Association's (APA) late February announcement of its new Member-Initiated Task Force to Reconcile Policies Related to Psychologists' Involvement in National Security Settings, I found my thoughts turning to the School of the Americas, Blackwater and perhaps even more surprisingly, the Patagonian toothfish. Those may seem like a strange threesome, but they share one important thing in common. All have undergone a thorough repackaging and renaming in a marketing effort aimed at obscuring - but not altering - some ugly truth.

The School of the Americas in Fort Benning, Georgia, became infamous for training Latin American soldiers who returned home and engaged in repressive campaigns involving rape, torture and murder of political dissidents. To combat its negative image, the school was renamed the Western Hemisphere Institute for Security Cooperation, but the nature of its activities remain largely unchanged. During the Iraq War, Blackwater, a private military company supported by hundreds of millions of dollars in US government contracts, gained international notoriety on many counts, including its use of excessive and often deadly force against Iraqi civilians. The company therefore renamed itself - twice - first as Xe Services and then again as Academi, with essentially the same core businesses. As for the Patagonian toothfish, it's wrong to blame the fish itself. But in an effort to spur sales, merchants renamed it Chilean sea bass (for similar reasons, the slimehead fish is now known as orange roughy instead)...

CIA Committed 'War Crimes,' Bush Official Says | Wired.com

Is Zelikow trying to reframe his complicity? 
Pastedgraphic-1

"A top adviser to former Secretary of State Condoleezza Rice warned the Bush administration that its use of “cruel, inhuman or degrading” interrogation techniques like waterboarding were “a felony war crime.”

What’s more, newly obtained documents reveal that State Department counselor Philip Zelikow told the Bush team in 2006 that using the controversial interrogation techniques were “prohibited” under U.S. law — “even if there is a compelling state interest asserted to justify them.”

Zelikow argued that the Geneva conventions applied to al-Qaida — a position neither the Justice Department nor the White House shared at the time. That made waterboarding and the like a violation of the War Crimes statute and a “felony,” Zelikow tells Danger Room. Asked explicitly if he believed the use of those interrogation techniques were a war crime, Zelikow replied, “Yes.”

Zelikow first revealed the existence of his secret memo, dated Feb. 15, 2006, in an April 2009 blog post, shortly after the Obama administration disclosed many of its predecessor’s legal opinions blessing torture. He brieflydescribed it (.pdf) in a contentious Senate hearing shortly thereafter, revealing then that “I later heard the memo was not considered appropriate for further discussion and that copies of my memo should be collected and destroyed...”

"Zelikow has also written about terrorism and national security, including a set of Harvard case studies on "Policing Northern Ireland." In the November–December 1998 issue of Foreign Affairs, he co-authored an article Catastrophic Terrorism, with Ashton B. Carter, and John M. Deutch, in which they speculated that if the 1993 bombing of the World Trade Center had succeeded, "the resulting horror and chaos would have exceeded our ability to describe it. Such an act of catastrophic terrorism would be a watershed event in American history. It could involve loss of life and property unprecedented in peacetime and undermine America’s fundamental sense of security, as did the Soviet atomic bomb test in 1949. Like Pearl Harbor, the event would divide our past and future into a before and after. The United States might respond with draconian measures scaling back civil liberties, allowing wider surveillance of citizens, detention of suspects and use of deadly force. More violence could follow, either future terrorist attacks or U.S. counterattacks. Belatedly, Americans would judge their leaders negligent for not addressing terrorism more urgently..."

Washington’s high-powered terrorist supporters - Salon.com

We now have an extraordinary situation that reveals the impunity with which political elites commit the most egregious crimes, as well as the special privileges to which they explicitly believe they — and they alone — are entitled. That a large bipartisan cast of Washington officials got caught being paid substantial sums of money by an Iranian dissident group that is legally designated by the U.S. Government as a Terrorist organization, and then meeting with and advocating on behalf of that Terrorist group, is very significant for several reasons. New developments over the last week make it all the more telling. Just behold the truly amazing set of facts that have arisen:

In June, 2010, the U.S. Supreme Court issued its 6-3 ruling in the case ofHolder v. Humanitarian Law. In that case, the Court upheld the Obama DOJ’s very broad interpretation of the statute that criminalizes the providing of “material support” to groups formally designated by the State Department as Terrorist organizations. The five-judge conservative bloc (along with Justice Stevens) held that pure political speech could be permissibly criminalized as “material support for Terrorism” consistent with the First Amendment if the “advocacy [is] performed in coordination with, or at the direction of, a foreign terrorist organization” (emphasis added). In other words, pure political advocacy in support of a designated Terrorist group could be prosecuted as a felony — punishable with 15 years in prison — if the advocacy is coordinated with that group...

http://www.salon.com/2012/03/12/washingtons_high_powered_terrorist_supporters...

Jamming the NSA | Scholars and Rogues

James Bamford, author of The Shadow Factory: the Ultra-Secret NSA from 9/11 to the Eavesdropping on America (Doubleday, 2008), is the foremost chronicler of illegal surveillance in the United States. His latest post at Wired’s Threat Level is Shady Companies With Ties to Israel Wiretap the U.S. for the NSA. In his previous lengthy and widely read post, The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say), he wrote:

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013.

Since illegal surveillance has become one of America’s greatest growth industries, one is almost reluctant to rain on the NSA’s “job-creating” parade. There’s a sense of impending inevitability to it as with globalization a decade ago...

http://www.scholarsandrogues.com/2012/04/08/jamming-the-nsa/

20120417

Tim Berners-Lee urges government to stop the snooping bill| The Guardian

Tim-berners-lee-monitorin-008

Sir Tim Berners-Lee said that it was moves by governments to control or spy on the internet that 'keep him up most at night'. Photograph: Sarah Lee for the Guardian

The government's controversial plans to allow intelligence agencies to monitor the internet use and digital communications of every person in the UK suffered a fresh blow on Tuesday when the inventor of the world wide web warned that the measures were dangerous and should be dropped.

Sir Tim Berners-Lee, who serves as an adviser to the government on how to make public data more accessible, says the extension of the state's surveillance powers would be a "destruction of human rights" and would make a huge amount of highly intimate information vulnerable to theft or release by corrupt officials. In an interview with the Guardian, Berners-Lee said: "The amount of control you have over somebody if you can monitor internet activity is amazing.

"You get to know every detail, you get to know, in a way, more intimate details about their life than any person that they talk to because often people will confide in the internet as they find their way through medical websites … or as an adolescent finds their way through a website about homosexuality, wondering what they are and whether they should talk to people about it."

The British computer engineer, who devised the system that allows the creation of websites and links, said that of all the recent developments on the internet, it was moves by governments to control or spy on the internet that "keep me up most at night"...

20120408

9/11 as sequel to Iran-Contra: Armitage, Carlucci and friends | Dig Within

Dick Cheney and Donald Rumsfeld are among the leading suspects in the crimes of September 11, 2001. Reasons for this include that they were in the most powerful positions in the U.S. that day, that there is evidence they had foreknowledge of the attacks, and that they did not respond effectively. Other people who were closely associated with Dick and Don should also be investigated if they were in positions to be involved. Richard Armitage and Frank Carlucci are two such people. They both played important roles with respect to the events of September 11, 2001 and, prior to that, both had a colorful history of covert operations which intertwined and was aligned with the careers of Dick and Don. Armitage and Carlucci both also benefited from the War on Terror by way of profits made after the attacks.

For the twelve years prior to the attacks, Frank Carlucci ran the Carlyle Group, an investment firm with close ties to the most powerful members of the Reagan and Bush I administrations, and to the Saudi Arabian oil industry. The two major operating subsidiaries of that company were BDM international, for which Carlucci was chairman, and the Vinnell Corporation. Working for Carlucci at BDM from 1989 to 1996 was its vice president, Barry McDaniel, who left to become the Chief Operating Officer for a an alarmingly suspicious company. That was Stratesec, the security company that had contracts for so many of the facilities associated with the 9/11 attacks...

http://digwithin.net/2012/04/08/911-as-a-sequel-to-iran-contra/

US government hires company to hack into video game consoles | ZDNet

The U.S. government recently posted a project asking for the “Development of Tools for Extracting Information from Video Game Systems.” The listing was posted just two months ago, and last week a contract was signed with the California-based company Obscure Technologies. The U.S. is paying $177,237.50 for the job.

The U.S. Navy says it is looking to hack into used consoles to extract any sensitive information exchanged through their messaging services. The organization says it will only use the technology on consoles belonging to nations overseas, because the law doesn’t allow it to be used on any “US persons.”

Here’s the official description from the U.S. Navylisting, posted on February 15: “This project involves furnishing video game systems, both new and used, and creating prototype rigs for capturing data from the video game systems.” Obscure Technologies responded three days later...

http://www.zdnet.com/blog/security/us-government-hires-company-to-hack-into-v...

CIA Whistleblower Kiriakou Indicted for Exposing Waterboarding Practices - Sibel Edmonds' Boiling Frogs Post

0407_prosecute1
No one can accuse Barack Obama of not tackling our government’s still-continuing torture practices. No sir. The man has made it clear – he is going to hunt, prosecute and cage those involved … in exposing them. In fact he has just tuckedone under his belt. Former CIA officer John Kiriakou was indicted Thursday for allegedly disclosing classified information to journalists. The following is what triggered the administration’s resolve in pursuing, hunting and finally indicting him yesterday:..

http://www.boilingfrogspost.com/2012/04/07/barack-obama-tackles-us-torture-head-on-he-hunts-cages-those-who-expose-it/

20120407

NRO Launches Top Secret Payload Into Orbit | Top Secret Writers

On Tuesday, April 3rd, the National Reconnaissance Office launched another above top secret payload into orbit over the Earth. The payload was put into orbit using a Delta IV rocket launched by United Launch Alliance at Vandenberg Air Force Base.

The launch, designated as NROL-25, took place at 4:12 p.m.,a dn the official reason provided for the launch was that it was “in support of national defense.”

Only a few hints were provided by Mission Operations regarding the purpose for the payload. Jim Ponnick, the Vice President of United Launch Alliance told the press, “ULA is proud to have supported this mission and delivered critical capabilities to the mena nd women defending our freedom throughout the world.” (1)...

http://www.topsecretwriters.com/2012/04/nro-launches-top-secret-payload-into-...

U.S. Army Domestic Quick Reaction Force Riot Control Training Photos | Public Intelligence

544501-1024x680

Soldiers assigned to 3rd Squadron, 38th Cavalry Regiment, 201st Battlefield Surveillance Brigade, conduct riot training March 13 at Joint Base Lewis-McChord, Wash. The unit is conducting civil disturbance training in preparation as a domestic quick reaction force...

The Navy's New Robot Playground

NSA Director Names China Responsible for RSA Assaults - SPAMfighter

Pastedgraphic-1

Gen. Keith Alexander, Director of National Security Agency and Commander of U.S. Cyber Command recently informed the Senate Armed Services Committee that China was siphoning plentiful intellectual property of the U.S. military out of the country and had a role in the 2011 assaults on RSA the cyber-security agency, published informationweek.com dated March 27, 2012.

Alexander opined that the RSA assault, which involved one spear-phishing scam, suggested an extreme form of sophistication the Chinese invaders exuded as they dispatched camouflaged e-mails having malicious software, which planted backdoors through an exploit for 0-day vulnerability in Adobe Flash.

He stated that the hackers' capability for doing what they did was of such an elevated level that their act, which was against a company like RSA, proved other organizations weak...

http://www.spamfighter.com/News-17601-NSA-Director-Names-China-Responsible-for-RSA-Assaults.htm

The TSA Blog: Hidden Compartments Found in Everyday Items

Hiddencompartmentspwm

Hidden Compartments Found in Everyday Items:  On the surface, the items looked like a bottle of water, a flashlight, an energy drink and a can of spray lubricant. However, each of these items had secret compartments. The flashlight compartment contained a baggie of cocaine. These items were discovered in checked baggage at Portland, Maine (PWM). It’s just another example to show you how everyday household items can be used to conceal prohibted items...

http://blog.tsa.gov/2012/04/tsa-week-in-review-hidden-compartments.html