TOKYO MASTER BANNER

MINISTRY OF TOKYO
US-ANGLO CAPITALISMEU-NATO IMPERIALISM
Illegitimate Transfer of Inalienable European Rights via Convention(s) & Supranational Bodies
Establishment of Sovereignty-Usurping Supranational Body Dictatorships
Enduring Program of DEMOGRAPHICS WAR on Europeans
Enduring Program of PSYCHOLOGICAL WAR on Europeans
Enduring Program of European Displacement, Dismemberment, Dispossession, & Dissolution
No wars or conditions abroad (& no domestic or global economic pretexts) justify government policy facilitating the invasion of ancestral European homelands, the rape of European women, the destruction of European societies, & the genocide of Europeans.
U.S. RULING OLIGARCHY WAGES HYBRID WAR TO SALVAGE HEGEMONY
[LINK | Article]

*U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR*

Who's preaching world democracy, democracy, democracy? —Who wants to make free people free?
[info from Craig Murray video appearance, follows]  US-Anglo Alliance DELIBERATELY STOKING ANTI-RUSSIAN FEELING & RAMPING UP TENSION BETWEEN EASTERN EUROPE & RUSSIA.  British military/government feeding media PROPAGANDA.  Media choosing to PUBLISH government PROPAGANDA.  US naval aggression against Russia:  Baltic Sea — US naval aggression against China:  South China Sea.  Continued NATO pressure on Russia:  US missile systems moving into Eastern Europe.     [info from John Pilger interview follows]  War Hawk:  Hillary Clinton — embodiment of seamless aggressive American imperialist post-WWII system.  USA in frenzy of preparation for a conflict.  Greatest US-led build-up of forces since WWII gathered in Eastern Europe and in Baltic states.  US expansion & military preparation HAS NOT BEEN REPORTED IN THE WEST.  Since US paid for & controlled US coup, UKRAINE has become an American preserve and CIA Theme Park, on Russia's borderland, through which Germans invaded in the 1940s, costing 27 million Russian lives.  Imagine equivalent occurring on US borders in Canada or Mexico.  US military preparations against RUSSIA and against CHINA have NOT been reported by MEDIA.  US has sent guided missile ships to diputed zone in South China Sea.  DANGER OF US PRE-EMPTIVE NUCLEAR STRIKES.  China is on HIGH NUCLEAR ALERT.  US spy plane intercepted by Chinese fighter jets.  Public is primed to accept so-called 'aggressive' moves by China, when these are in fact defensive moves:  US 400 major bases encircling China; Okinawa has 32 American military installations; Japan has 130 American military bases in all.  WARNING PENTAGON MILITARY THINKING DOMINATES WASHINGTON. ⟴  
Showing posts with label Surveillance. Show all posts
Showing posts with label Surveillance. Show all posts

January 03, 2016

Various Intel & Surveillance

Article
SOURCE
as marked


Intelligence / Surveillance


Kashmir Islamist Attack India Airbase
Terrorists
who attacked #India Air Force (IAF) base
at #Pathankot
were detected by aerial #surveillance platforms
http://www.business-standard.com/article/news-ians/terrorists-at-pathankot-were-detected-immidiately-iaf-116010200408_1.html

[read elsewhere that terrorists entered base & fired indiscriminately, so aerial detection means jack.]


Spy Arrest - India

last week: ex-IAF official Ranjith KK
arrested re passing secrets to #Pakistan
subsequent attack on base
Ranjith, 30, honey-trapped
Inter-Services Intelligence (IS) operative
posed as a journalist on Facebook & befriended.

#India
Crime Branch
arrested x5
incl. Border Security Force + Rashtriya Rifles
re alleged espionage
http://www.thestatesman.com/news/india/pathankot-attack-linked-to-arrest-of-iaf-spy/114122.html

#India
Pathankot air base
terror attack by x7 -  Jaish-e-Mohammad
13 hours encounter
x4 each, killed (not final figure)

#India JeM stormed airbase & fired indiscriminately
Garuda commandos, Army troops + police deployed. Airfields on high alert.
http://www.ibnlive.com/news/india/pathankot-terror-strike-how-the-attack-unfolded-1184452.html


Jaish-e-Mohammed (JeM)
(ie  Army of Muhammad)
Islamist militant, based Kashmir
https://en.wikipedia.org/wiki/Jaish-e-Mohammed

---------------------- ꕤ ----------------------

L-3
USA intel contractor
revenue of $2.80 billion - Oct quarter
/ quarterly revenue down -  4.2%

L-3
VP Curtis Brunson sold 55,465 shares
@ total:  $6,861,020.50
--> still has 75,201 shares in company.
http://www.wkrb13.com/markets/990171/fy2015-eps-estimates-for-l-3-communications-holdings-inc-lll-raised-by-analyst/

---------------------- ꕤ ----------------------
Vodafone
lawful interception / #Surveillance #Ireland
@ 7,973 in 2015
--> no push-back possible / mandated

#Ireland
Garda (police) Síochána Ombudsman Commission
Feb. 2014 - was bugged / surveillance (suspected)
--> security sweep done (& was leaked to press).

UK govt published draft text of new Investigatory Powers bill Dec 2015
/ if passed:  12 months phone & internet data storage

#UK investigatory powers bill:
lets intel & police to hack into PCs & phones
/ legal obligation on carriers to help them

“The UK government is seeking the power to compel companies, many of them based in Ireland, to hack users on their behalf."

#UKpolitics ... stand by for #Facebook & #Apple UK government malware.

http://www.irishexaminer.com/viewpoints/analysis/future-of-mobile-the-intelligence-behind-tracking-digital-evidence-374065.html

---------------------- ꕤ ----------------------

GCHQ spy boss Sir Brian Tovey has died aged 89
Director -  1978 to 1983
army intel
U. London, deg Mod. Chinese

** there's a ban on union membership for GCHQ staff.

http://www.westerndailypress.co.uk/Spy-boss-eye-fine-Renaissance-art/story-28450497-detail/story.html

---------------------- ꕤ ----------------------

Count Alexandre de Marenches
1921-1995
French intel Director / Reagan adviser
{Norman knights origin}
quit army in protest Algerian policy

Factions in French intel.
circulating defamatory reports re de Gaulle
/alleged affair Alain Delon + dead Delon bodyguard.

Medhi Ben Barka

French intel kidnapping of Ben Barka (Morocco left-wing)
died interrogation #Paris / CIA involved
/ won't release documents.

Ben Barka (Morocco)
son says French withholding docs implicating  French secret services (SDECE) + potentially CIA & Mossad.

Jan 1969
French actor Alain Delon held for questioning
/ murder bodyguard Yugoslav, Stefan Markovic
x3 interrogations prior

Mavkovic's body
--> inside a sack on garbage dump
--> shot in head & beaten skull to cover wound

Alain Delon
Navy in Indo-China
Marseilles waterfront
criminal connections

Bodyguard Stefan Markovic
alleged drug ring involvement
alleged politician drug parties
(spread by French intel?)

Theory of photos of politicians in compromising positions
& attempted blackmail by bodyguard.

Bodyguard Stefan Markovic:
Letter -
"If I get killed, it's 100% the fault of Alain Delon" + "godfather François Marcantoni"

François Marcantoni
charged as accessory to murder.
Released after 11 months.
Guilt could not be established.

François Marcantoni
Corsican gangster.
French resistance.
Bank robber + writer.
Died Paris 2010
Link | Wikipedia


Mehdi Ben Barka
major figure in Third World movement
supported revolutionary anti-colonial action
--> angered USA & France.

OSPAAAL
Asia, Africa + #LatAm solidarity
fm. Havana Tricontinental Conference
pro socialism 3rd World

anti:  globalisation, imperialism, neoliberalism & pro defending human rights

Medhi Ben Barka involved re:  OSPAAAL

Link | Wikipedia




---------------------- ꕤ ----------------------

COMMENT

Some of what I looked at.

The attack on the Indian air base sounded exciting.

But it got even better when I got onto the French intelligence stuff ... they sound like total rogues.



December 18, 2015

Juniper Networks ScreenOS / Netscreen Firewalls - VPN Traffic Decryption - NSA Backdoor?

Article
SOURCE


Extracts Ars Technica
“Unauthorized code” in Juniper firewalls decrypts encrypted VPN traffic
Backdoor in NetScreen firewalls gives attackers admin access, VPN decrypt ability.

by Dan Goodin - Dec 18, 2015 10:50am AEDT

An operating system used to manage firewalls sold by Juniper Networks contains unauthorized code that surreptitiously decrypts traffic sent through virtual private networks, officials from the company warned Thursday.

...  Release notes published by Juniper suggest the earliest vulnerable versions date back to at least 2012 and possibly earlier. There's no evidence right now that the backdoor was put in other Juniper OSes or devices.

"... Juniper discovered unauthorized code in ScreenOS ... administrative access to NetScreen devices and to decrypt VPN connections," Juniper Chief Information officer Bob Worrall wrote.

A separate advisory from Juniper says there are two separate vulnerabilities, but stops short of describing either as "unauthorized code." The first flaw allows unauthorized remote administrative access to an affected device over SSH or telnet. Exploits can lead to complete compromise. "The second issue may allow a knowledgeable attacker who can monitor VPN traffic to decrypt that traffic," the advisory said.

Whodunit?

Word that the VPN-breaking code was the result of unauthorized code, as opposed to an inadvertent programming flaw, touched off immediate concern that ScreenOS had been deliberately tampered with. The most likely culprit for such tampering would be the NSA or one of its many counterparts around the world. Classified documents leaked by former NSA subcontractor Edward Snowden showed NSA agents intercepting network gear from Cisco Systems as it was being shipped to a customer. They installed covert implant firmware onto the device before sending it to its final destination.

As involved as that process was, getting unauthorized code covertly installed into an official operating system and keeping it there for years would appear to be an even more complicated—and brazen—undertaking. This 2013 article published by Der Spiegel reported that an NSA operation known as FEEDTHROUGH
worked against Juniper firewalls and gave the agency persistent backdoor access.

"This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers," the article reported. "Thanks to FEEDTROUGH, these implants can, by design, even survive 'across reboots and software upgrades.' In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH 'has been deployed on many target platforms.'"

Of course, it's also possible the backdoor was installed some other way. Juniper's advisory makes no mention who it suspects is behind the move or what steps it's taking to find out. Ars has asked Juniper for more details and will update this post as warranted.
ScreenOS
-- operating system for NetScreen firewalls




Juniper Networks
Juniper Networks
multinational corporation
HQ, Sunnyvale, California

develops and markets networking products

  • routers
  • switches
  • network management software
  • network security products
  • software-defined networking tech
-- efforts to establish an ecosystem of technologies, software & applications
Juniper Networks - Market Share
-- 2001 - 37% share of core routers market
-- challenging Cisco, who previously dominated market
-- 2014 - USD$419.7 BILLION revenue
Pradeep Sindhu
Indian-American entrepreneur
VP, Board Directors
co-founded Juniper in 1996
B.Tech. in Electrical Engineering (1974)
Indian Institute of Technology, Kanpur
M.S. in Electrical Engineering (1976)
University of Hawaii
Ph.D (1982) in Computer Science
Carnegie Mellon University
Studied under Bob Sproull
Sproull
Oracle Corp
was Associate Prof of Computer Science
Carnegie Mellon
est. consulting firm
consulting firm bought by
Sun Microsystems 1990
--> creation Sun Microsystems labs
Sproull worked on design & director
2010 Sun bought by Oracle
--> bcm Oracle Labs
Pradeep Sindhu
-- scientist with Xerox Paolo Alto Research Centre
-- f. Juniper Networks 1996
Routers
-- early routers for internet traffic
-- intended for phone calls
-- dedicated circuits for each caller
-- Sindhu envisaged packet-based routers
-- optimised for internet traffic
-- joined by Sun Microsystems & MCI Communications engineers
-- $2-million SEED FUNDING
-- $12-million FUNDING in first year of ops
Funding - $40-Million (1997)
-- from a group of OEMs and service providers
-- OEMs - 'original equipment manufacturers' -- are in fact re-sellers of another company's product under own name

Contributors to 1997 funding:

  • Northern Telecom
  • 3Com
  • Ericsson's Infocom Systems group
  • Siemens/Newbridge Networks alliance
  • WorldCom's UUNet Technologies subsidiary
https://business.highbeam.com/3094/article-1G1-19746999/startup-snags-40m-bid-redefine-routers

Spreading Control / Influence

2010 - Junos Innovation Fund
Juniper Networks Establishes $50 Million Venture Fund
will invest in companies 2010 - 2012
focusing on:

  • networking tech
  • applications
  • security infrastructure services
  • mobility services
  • video solutions
  • virtualisation
  • network automation
  • optical tech
  • green networking
investment as at 2010 article, in x11 companies - incl:
  • Ankeena Networks
  • Blade Network Technologies
  • Cyan Optics
  • FireEye
  • Packet Design
Vulture Fund - 'Activist Investor'
Elliot Management Corporation hedge fund
{billionaire Paul E. Singer}
Dec. 2014 - Elliot owns 10% stake Juniper Networks
x2 hedge fund directors appointed to Juniper board
hedge fund guru Singer
wants to cut this and that & increase share price
-- eg operating costs & potential stock buy-backs in the billion
--> basically wants to tell a successful, enormous tech company how to operate
* I think the hedge fund may operate as a take-over merchant

ACTIVIST INVESTORS
-- include:
    -- hedge funds
    -- private equity firms
    -- wealthy individuals

well-known activist investors:

Carl Icahn

-- targets:  Yahoo, Blockbuster, Time Warner, RJR Nabisco & other

NOTE
  Company filing of SEC Form 13D
-- investor purchases 5% or more shares notification
-- indicative of possible 'activist investor' target


'activist hedge funds'
-- term to describe hedge funds that:

-- buy large public company shares
-- seek to obtain seats on company's board
-- aim to effect major changes in company
-- attracted to companies that are:
-- mismanaged
-- have excessive costs
-- could be run ore profitably as private company
-- or other problem seen as fixable, to add value
 

'ACTIVIST INVESTORS' 
TAKE-OVER MERCHANTS
  • Paul Singer
  • Carl Icahn
  • Kirk Kerkorian
  • Bill Ackman
  • Eddie Lampert
  • Nelson Peltz
============
1 -- https://en.wikipedia.org/wiki/Juniper_Networks
2 -- http://techcrunch.com/2010/02/23/juniper-networks-fund/

3 -- http://www.investopedia.com/terms/a/activist-investor.asp
5 --  Juniper Networks Reaches Pact With 'Activist' Hedge Fund
http://www.nytimes.com/2015/02/25/business/dealbook/juniper-networks-reaches-pact-with-activist-hedge-fund.html?_r=0



Mainframe
aka  'big iron'
-- high-performance computer
-- large-scale computing
-- large orgs for critical apps
-- bulk data processing
-- defined by high availability
-- (ie higher than norm performance for higher than normal period)
-- typically used in apps where downtime costly or catastrophic
-- RAS (reliability, availability & serviceability) characteristic
-- can run multiple operating systems
-- pioneered virtualisation
-- virtual machine mode (OS's running as if distinct computers)
-- single mainframe eliminates conventional servers {I think}
-- designed to handle very high volume input / output (I/O)
-- emphasis on:  throughput computing
-- subsidiary hardware (channels, periphery processors) - manage I/O devices
-- CPU freed for high-speed memory

MARKET SHARE - MAINFRAMES
-- IBM mainframes:  90% market share
-- software apps to manage performance
-- 2010:  mainframe technology = less than 3% of IBM's revenues

MARKET SHARE - MAINFRAMES SOFTWARE
-- IBM - USA multinational, Revenue:  US$92.793 billion (2014)
-- BMC - USA, Revenue:  US$2.172 billion (FY 2012)
-- Computware  - USA, Revenue: private company
-- CA Technologies - USA, multinational, Revenue: US$4.515 billion (2014)
-- early models:
-- punched cards, tape, magnetic tape
-- batch mode operations (eg billing)
-- 1970s  acquired interactive user interfaces
-- operated as time-sharing computers
-- able to then run batch processing + support of users
-- early user access by special terminals
-- later, from personal computers

FURTHER HISTORY

-- early manufacturers - IBM & the Seven Dwarfs

  •     Burroughs
  •     UNIVAC
  •     NCR
  •     Conctrol Data
  •     Honeywell
  •     General Electric
  •     RCA
-- Notable non-USA manufacturers
Germany:
  • Siemens
  • Telefunken
Britain:
  • ICL
Italy:
  • Olivetti
Japan:
  • Fujitsu
  • Hitachi
  • Oki
  • NEC
Soviet Union
-- close copies of IBM mainframes

-- examples:
    • BESM series
      • Strela (ie 'arrow')
        1980s, minicomputer-based systems
        -- more sophisticated
        -- displaced lower-end mainframes
        -- lower ends (aka 'departmental computers') - eg DEC VAX
        1990s, servers based on microcomputer designs
        -- cheaper
        -- greater control
        -- interface terminals re mainframes eventually replaced by PCs

        Emerging Markets
        -- esp. People's Republic of China
        -- spurring innovation
        -- eg unified high volume transaction processing database / multiple industry access
        -- (eg banking, insurance, credit reporting, govt)

        2012, NASA (space) powered down its last mainframe (IBM System z9)

        Supercomputers
        -- measured in - floating point operations per second (FLOPS)
        -- measured in (more recently) - traversed edges per second or TEPS
        -- frontline of current processing capacity
        -- esp. speed of calculation
        -- scientific & engineering probs (high-performance computing)
        versus
        Mainframes
        -- measured in millions of instructions per second (MIPS)
        -- data crunching & number crunching
        -- transaction processing
        -- {microprocessor-based servers & online networks also transaction process}

        HYBRID 
        Gameframe - 2007
        -- hybrid computer system
        -- first used online video games industry
        -- blend of technologies & architectures for supercomputers & mainframes
        -- high computing power & high throughput
        -- Hoplon (Brazilian, multiplayer online games) & IBM joint project 2007
        -- game server system
        -- offload of computation-intensive tasks from expensive CPU cycles of System z
        -- to economical 'Cell blades' (PowerXCell multicore processors)
        -- https://en.wikipedia.org/wiki/Gameframe
        Mainframe info source
        https://en.wikipedia.org/wiki/Mainframe_computer
        System z
        --  ie - IBM z Systems
        -- family name used by IBM for all of its mainframe computers
        throughput
        -- rate of production of processing
        https://en.wikipedia.org/wiki/Throughput

         {I'm stopping here, or the look-ups could go on forever ... lol}






        ---------------------- ꕤ ----------------------

        COMMENT

        Wow, who's responsible?
        I'm going with NSA, even though I don't know what I'm talking about.  lol
        But if past history is anything to go by, it's likely an NSA infiltration, I think.





        December 16, 2015

        Video - Julian Assange - 'The End of Democracy' - Angela Richter & Srećko Horvat


        ASSANGE
        VIDEO

        The End of Democracy
        Julian Assange (via video)
        in conversation with Angela Richter & Srećko Horvat







        Das Ende der Demokratie
        Julian Assange (per Video)
        im Gespräch mit Angela Richter und Srećko Horvat
        from Volksbühne Berlin

        The end of democracy
        Julian Assange (via video)
        in conversation with
        Angela Richter & Srećko Horvat
        from Volksbühne Berlin




        Introduction
        Sebastian Kaiser
        Volksbühne at the Rosa-Luxemburg-Platz

        Written intro along the lines that:
        the ideal of 'democracy' has figured prominently in the post WWII West.

        However, the reality is that "powerful corporations act like states" and wars are waged in the name of freedom, while "our digital activities are tapped and recorded almost entirely".

        WikiLeaks

        "taking the promise of democracy seriously under advanced technological conditions"
        -- transparency
        -- exposure of secret data flows
        -- platform for whistleblower information
        -- redeeming internet freedom
        -- online and active
        Assange
        -- hailed as a hero and cypherpunk genius by many
        -- denounced as high-tech terrorist
        -- exposed to public death threats
        -- persecuted by governments and intelligence services
        -- for 'damages' allegedly suffered
        ---------------------- ꕤ ----------------------

        Assange

        9 December 2015 discussion

        -- Volksbühne via live stream from Ecuador embassy
        -- theatre director Angela Richter
        -- Croatian philosopher Srećko Horvat

        Discussion
        -- Transatlantic Trade & Investment Partnership (TTIP)
        -- geopolitical implications
        -- of  huge influx of refugees into Europe
        -- reflecting on democracy’s criminal history
        -- potentially opening an alternative view on Europe

        --------------------- ꕤ ----------------------




        COMMENT

        About to watch/listen to this latest video (link at top page). 

        Sounds an interesting talk.

        ---------------------- ꕤ ----------------------



        Julian Assange 



        WikiLeaks Website
        https://wikileaks.org/index.en.html 

        Latest Book
        'The WikiLeaks Files'
        http://www.versobooks.com/books/1931-the-wikileaks-files




        December 11, 2015

        Video - Assange - Security or Surveillance: Privacy vs Anti-Terror Security in Digital Age - RT10


        Security or Surveillance: Privacy vs anti-terror security in digital age (#RT10 Panel Discussion)




        Published 10 Dec 2015
        RT News
        https://www.youtube.com/watch?v=k3rFNQ8ytnE&feature=youtu.be

        ---------------------- ꕤ ----------------------
        Security or Surveillance:
        Privacy vs anti-terror security in digital age
        (#RT10 Panel Discussion  /  Celebrating RT's 10-Year Anniversary)

        Moderator, Raymond Snoddy introduces:

        Philip Giraldi
        -- former CIA counter-terrorism specialist
        -- former military intelligence officer
        -- served 19 years abroad:  Turkey, Italy, Germany, Spain
        -- CIA chief of base, Barcelona Olympics, 1992
        -- one of first Americans to enter Afghanistan, 2001
        -- Exec. Dir. Council for National Interests (CNI)
        -- CNI - WA-based - to promote US foreign policy in Middle East
        -- based on 'American values & interests'

        Ray McGovern
        -- former US army intelligence officer
        -- joined Analysis Division of CIA & served
        -- from Kennedy Admin to G.W. Bush Admin.
        -- chief of CIA's Soviet foreign policy branch, 1970s
        -- chaired national intelligence estimates
        -- prepared Presidential daily briefing
        -- for Reagan senior national security advisers
        -- 2003 - co-est. Veteran Intelligence Professionals for Sanity (VIPS)
        -- to expose: intelligence fraud to justify 2003 US invasion of Iraq
        -- protested CIA involvement in torture activities
        -- publicly questioned Defence Secretary Donald Rumsfeld
        -- re misleading American public in run-up to war (Invasion of Iraq, 2003)

        Gregory R. Copley
        -- Australian-born
        -- President of Strategic International Studies Association, WA-DC
        -- serves as adviser on strategic studies to a number of govts & leaders [40 years]
        -- authored / co-authored 32 books on strategic & geopolitical issues,
        -- history, energy, aviation & defence, incl:
            -- 'Un-Civilization: Urban Geopolitics in a Time of Chaos (2013)'
            -- 'The Art of Victory (2006)'

            [ Yikes!  see:   http://www.brusselsjournal.com/node/5132  ]

        ---------------------- ꕤ ----------------------

        Issue:
        Security or Surveillance
        Can right to privacy & effective anti-terror security co-exist in the digital age?
        ---------------------- ꕤ ----------------------

        Julian Assange
        -- arguably one of the most influential people in world
        -- on bringing forward these specific issues

        Moderator
        -- seeks Assange thoughts on right of privacy
        -- how that is defined around world
        -- anti-terror security definition
        -- what the relationship of these two factors are to each other
        -- and the relationship to this new digital world in which we live

        Assange:  mass-surveillance is here to stay
        & privacy is gone for normal population
        (not for experts, incl. terrorists (who are experts))
         underlying costs of surveillance - rapidly decreasing

        Five-Eyes (FVEY) - surveillance pervasive

        ---------------------- ꕤ ----------------------


        COMMENT

        About to watch --  or listen to -- this ...
        (depending on whether I also plan to get around to doing anything practical as I listen ... like maybe the dishes or some grooming or something practical (for a change) ... lol)




        December 03, 2015

        Totalitarian American Domestic Surveillance

        Article
        SOURCE
        http://tenthamendmentcenter.com/2015/12/02/the-spies-who-ruin-us/
        December 2, 2015
        By Judge Andrew Napolitano


        'The Spies Who Ruin Us'

        SUMMARY
        Post 9/11 intelligence failure to protect:
        --> principle target 4th Amendment right to privacy
        -->  Patriot Act 2001

        Unread & undebated legislation
        -->  US Congress unaware re liberties they were sacrificing
        --> US domestic spying unleashed

        USG secret mass data gathering
        + warrants not based on probable cause

        Lapsed law ... but:
        USA telecoms + Internet service providers to retain records for five (5) years
        --> NSA instant access.

        Patriot Act
        + USA Freedom Act:
        unconstitutionally do away with probable cause requirement for warrants

        USA Freedom Act warrants:
        unconstitutionally do away with probable cause requirement
        -->  based on standard of “govt'l needs”

        Reality:
         “governmental needs”
        = no standard whatsoever, as USG will always claim that it needs what it wants.

        USG using same basis for warrants as British colonialists for raids that provoked Revolution & 4th Amendment.

        propaganda that NSA have been shut down is false
        / operate remotely --> telecoms & ISPs
        s.702 FISA & EO is valid

        s.702 FISA & Bush EO
        both bypass US Constitution
        & continue to permit mass #surveillance data collection

        s.702 FISA
        --> permits warrantless surveillance of Americans speaking to foreigners.
        --> FISA court issues warrants / intercept

        FISA court:
        --> issue warrants to intercept calls of third parties (to Americans speaking to foreigners) ... encompasses all.

        Bush Executive Order (EO)
        to military intelligence (NSA is one of more)
        --> to intercept calls of anyone - NO WARRANT.

        Andrew Napolitano
        asserts that secret USA spying:
        produces too much material for the government to evaluate
        / Paris failure eg.

        General warrants:
        hallmark of totalitarian government
        {article US example}
        http://tenthamendmentcenter.com/2015/12/02/the-spies-who-ruin-us/
        ---------------------- ꕤ ----------------------

        COMMENT

        Good overview.
        As Napolitano said, with all of France's surveillance capabilities (and infringements of civil liberties that accompany these capabilities), both France and America, who spy on France, missed the opportunity to prevent the Paris attacks -- because they are not conducting target-specific surveillance, and their manpower is bound up in blanket surveillance of entire populations.
        What goes on in the US pretty much goes on elsewhere.  The same principles apply, save for the lack of constitutional protections that are supposed to be in place for Americans.

        The mention of British colonialists raiding homes on basis of warrantless searches ahead of the American Revolution, is an interesting detail I wasn't aware of.  Ironically, what led to revolution and Fourth Amendment rights being enshrined in the American Constitution, is present day state totalitarianism being repeated by those that exercise behind-the-scenes control of the usurped American state.



        September 07, 2015

        Suppressive Police State - USA

        SOURCE
        http://www.austinchronicle.com/news/2015-09-04/apd-tracks-social-media/
        APD Tracks Social Media
        Local social media monitoring software company met with shady digital spying group
        By John Anderson, Fri., Sept. 4, 2015
        Snaptrends software can assign a geographical digital boundary which allows the user "to see conversation clusters and activity heat maps" within the defined area, according to Snap Trends' Matthew Hammer.

        As the world increasingly becomes glued to social media, it comes as little surprise that law enforcement would join in. But what some Facebook users or Twitter followers may not be aware of is how local law enforcement is using software to monitor their posts and tweets.

        Founded in 2012 as a private company and located just off Capital of Texas High­way, Snap Trends develops software that aggregates public information collected from social media. The company's website claims their software "builds a clear view of social conversations when and where they occur, the influencers driving them, and why." A Feb. 13 letter from Snap Trends Director of Sales Ken Ross to APD Sgt. Jeff Greenwalt, discovered in a Chron­icle open records request to APD and DPS, asserts that Snap Trends "developed its software intelligence system to serve public safety organization [sic] and national intelligence agencies in the United States."

        Ross further explained the "system uses advance [sic] algorithms and processes to procure this high density social data footprint." Other documents reveal that both APD and DPS have current subscriptions to Snaptrends software, spending $6,370 and $24,200 respectively in the past year. APD Public Information Specialist Jenni­fer Herber informed the Chronicle that APD began using Snaptrends software on March 1, 2013. DPS began using it one month later, according to DPS Public Information Officer Tom Vinger. DPS currently has 13 employees licensed to use the software, while APD has 25 officers with access.

        Emails obtained from APD demonstrate the Snaptrends software "makes it easy to share profiles, groups and persons-of-interests" and "can even integrate custom Facebook accounts." But its main feature is using geolocation to narrow a search using a "Poly Tool" which, according to a Snap Trends email, allows law enforcement "to gather pertinent information from social media platforms over specific areas without drawing in irrelevant content from unwanted areas .... This allows you to monitor precise locations such as parade routes, major highways or areas where protests are occurring." When asked if APD purchased the software for such events, Herber explained: "Real­-time analysis of open sources such as social media has been used to predict crimes and to help law enforcement respond more quickly as needed including, for example, stopping active shooters, tracking gang activity, and anticipating public protests that could escalate into violence." Additionally, she said the mission of the Austin Regional Intelligence Center (ARIC), where the software is used, "is to maximize the region's ability to detect, prevent, apprehend, and respond to criminal/terrorist activity."

        Other documents show Snap Trends partnered with a private company called Esri, which develops mapping software called ArcGIS and has also been used by APD in the past. According to internal emails obtained via open records request, APD Senior Crime Analyst Tess Sherman used the Esri software to monitor Occupy Austin's first demonstration at City Hall in October 2011. Sherman pointed out the mapping function "would be neat-o to try. Although it may just end up as a bunch of dots downtown since a lot of it is real-time comments from the scene." Despite receiving tech support from the company, APD Police Planner Nora Evans replied to Sherman, "I don't know a lot about Twitter so maybe you can figure it out." But Snap Trends' emails indicate the company offered to provide tech support for its own software to at least 16 APD employees.

        What were the police looking for? In one email, Snap Trends Account Manager Mark Klasson sent APD a document titled "Keywords." Assist­ant City Attorney Cary Grace has asked the Texas Attorney General's office to exempt that document and others from public disclosure. As of press time, the AG's office has not made a decision regarding the exemption.

        Expanded surveillance remains a possibility, and a hack in July of the Italian surveillance software company Hacking Team gave hints of what could be on the horizon. The hack shed light on some of the darker sides of digital spying, including conversations between Hacking Team and Snap Trends that revolved around a potential partnership. Instead of monitoring public information, Hacking Team's Remote Control Sys­tem software infects remote computers and mobile phones, allowing control over them. Reporters Without Borders has called Hacking Team "digital mercenaries" and "corporate enemies of the Internet."

        According to the hacked emails, available on the Wikileaks website, in March, Snap Trends CEO Eric Klasson met in Dubai for the "first exploratory meeting" with members of Hacking Team. Emails show the Dubai meeting was also attended by Snap Trends' partner Chenega, which resells Snap Trends' software internationally. After the meeting, Hacking Team's Philippe Vinci summarized: "The combination of each parties [sic] capabilities, Massive Social Media monitoring and Tactical Targets' Device interception, could bring a lot of value to customers and prospective customers of each party." Replying to that email, Klasson wrote, "I agree that a joint effort to sort this is something the market will respond to favorably (and quickly)."

        The three companies kept up their contact through at least early June, including a meeting in Prague, but the emails lack specific details about the collaboration. Asked by the Chronicle to describe Snap Trends' relationship with Hacking Team, however, Snap­ Trends Marketing Director Matthew Ham­mer wrote via email that "Snap Trends knows of the Hacking Team, but has no relationship with them, and we don't plan on doing any business with them in the future." Open records requests did not yield documents indicating that APD or DPS have purchased Hacking Team's software; nor is there is any evidence that Snaptrends software currently operates as malware.

        A LexisNexis 2014 "Social Media Use in Law Enforcement" report (available on the Snap Trends' website) which surveyed "federal, state and local law enforcement professionals" found that 81% "actively use social media as a tool in investigations," and 78% of current users plan "to use it even more in the coming year." Snap Trends' Hammer claims "hundreds" of U.S. law enforcement departments or agencies have bought their software. But raising questions about the effectiveness and accountability of this type of monitoring, the LexisNexis study also concluded that "52% of agencies still don't have a formal process for using social media for investigations."
        SOURCE
        http://www.austinchronicle.com/news/2015-09-04/apd-tracks-social-media/
        ---------------------- ꕤ ----------------------
        COMMENT
        APD = Austin Police Dept

        DPS = Dept of Public Safety (I'm guessing)


        Check out the policing techniques at work in totalitarian, surveillance & militarised police-state, USA:  straight out of the Czarist-Russia style suppression tools manual -- with a modern, digital technology, mapping & harnessing social media data, twist.
        The power to grossly violate the civil liberties of ordinary Americans is at the disposal of Texas police (and has been exercised since 2013).  But it is not limited to Texas:  many other US law enforcement agencies have adopted these same practices. 
        It's primarily for maintenance of plutocratic power, although law enforcement representatives will, of course, argue otherwise ... while they make application, seeking to hide their violations of freedom and democracy.
        Note, particularly, the intention to keep this secret police monitoring from public knowledge.
        So much for what is supposed to be accountability and democratic government transparency -- which is intended to also extend to government agencies, such as the police. 
        Abuses of civil liberties such as this go a long way towards explaining why resistant activists, hacktivists, whistleblowers, and whistleblower journalists and publishers, such as WikiLeaks, are so vital.
        I Imagine that this information would be relevant to protesters, activists, unionists, political groups, students, and all and any other persons exercising rightful political freedoms, in what is supposed to be democratic society.
        PS

        In case you think this is limited to USA and doesn't apply to you, think again ... and maybe do some Freedom of Information applications.  lol


        September 05, 2015

        Video - State Repression | Political Policing | Undercover Tactics | Surveillance | Mark Kennedy, Police & Private Spy





        State Repression | Political Policing 
        Undercover Tactics - #surveillance 

        Resisting Surveillance: it's is not just about the metadata [cccamp15]

        "Infiltrators have been uncovered within political mobilisations in the UK, Germany, the USA, New Zealand, Spain etc., showing us that understanding offline security is just as vital as making our hardware and software secure.
        No matter how many layers of encryption we use, if our closest companions are infiltrators, sharing our homes, our lives, and our computers, there is nowhere to hide."


        ---------------------- ꕤ ----------------------
         

        Notes
        More intense version of state surveillance of the metadata kind is:

        Targeted Undercover Policing

        entering most intimate sphere of life

        Undercover Policing
        = not a new phenomenon

        Victor Serge

        What everyone should know about repression (1926)



        Undercover policing tactics go back 
        at least to the 1890s
        Book (above) is re Czarist Russia
        / efforts to neutralise threats to power
        / Czarist tactics are same as tactics we see today, eg

        going into a social movement
        • dividing & conquering
        • spreading lies
        • causing diversion
        to neutralise threats to power


        Use of undercover police is
        POLITICAL & PROJECT POLICING



        Outing of British Undercover Cop:  Mark Kennedy - 2011

        see  book:

        Undercover: The True Story of Britain's Secret Police Paperback (2013)



        Film 'Spied Upon'
        in the making | financing leads appreciated
        Link | here



        Various relevant books
        worth reading mentioned in video

        FBI Undercover
        Op THERMCON | here
        selling LSD to gain trust
        sex with activists
        EMETIC protester group chair lift damage
        + two other attacks against
        targets causing ecological damage
        1987 to 1989
        Undercover FBI Michael Fain {undercover name, Mike Tait}
        recruitment Ron Fraizer {friend of those to be arrested}
        as informant
        Result:  multiple arrests
        Other purpose:  discrediting associated group


        Entrapment
        FOI files documented:
        1996 - FBI agents provocateurs associated with THERMCON
        spent 2 years winning trust of Prescott group
        actively encouraging them to sabotage powerlines
        attempting - unsuccessfully - to convince group
        to use (& even offering to buy) explosives

        FBI agents also selected the site, purchased &
        transported cutting equipment prior to 
        power line sabotage attempt on 1989

        USA - FBI 
        efforts range from 1960s to present day
        efforts to smash/silence
        radical environmental movements

        Germany
        see Book:  Spitzel   |  here

        Germany

        Private cops unregulated

        Believe the video also refers to 'Verfassungsschutz'
        Bundesamt für Verfassungsschutz (BfV)


        English: Federal Office for the Protection of the Constitution

        Rather a misleading name, given this is Germany's domestic 'security agency':
        "tasked with intelligence-gathering on threats concerning the democratic order, the existence and security" 
        and, by the sound of it, is in fact a state police tasked with the maintaining the power of the corporate-controlled state, one would think.

        Source | here

        Social Network Infiltration
        Map social network
        Target 'top influencer'
        see Stratfor (Occupy Oakland) - thanks, Jeremy Hammond

        Placement on Watch Lists
        (along with those known to person)

        US:  File for a Lawyer
        Obtain FOI docs

        FBI - B6 & B7C exclusions
        [result:  targets do not know FBI talking to associates]

        Associates
        = under severe pressure from secret police (FBI)

        UK 
        Harassment of Teachers / School
        Friends harassed at travel points / questioned

        Snitch-jacketing
        (paranoia, calling people police & destabilising
        / attacking own movement; thus doing the work of the police)

        Placement on Terrorist Lists
        Problems at border crossings

        National Security Exemption
        results from seeking remedy re placement on Lists
        / state of exception
        / application of law is completely arbitrary
        / anyone can be called 'terrorist' at any time

        UK
        National security exemptions
        used to legitimise undercover political policing
        & information refusal

        Targets want RIPA & IPT gone
        / smash them whenever you get the chance


        Pervasive Surveillance
        = results in targeted surveillance


        Myth
        Myth that back-doors might be needed by police
        the point of mass surveillance is targeted surveillance
        / targets people who are activists
        / targeted analysis can target anyone at any time

        Resist
        / must be 100% against what results in targeted surveillance
         & undercover police, as this prevents protesting for change
         {laws difficult to change once in place}

        Germany
        Address / apply pressure at:
        • EU 
        • Parliament
        help get rid of Germany's political police

        Detection
        If you think someone is an undercover operative,
        do not whisper about it:  find out.  

        Check background


        Usually, not the weirdo in the group that makes you feel uncomfortable. 

        These are 'close friends' (from target's experience)


        Recommended BOOK

        War at Home: Covert action against U.S. activists and what we can do about it (South End Press Pamphlet Series) | here


        UK Police
        Having sex with activists is seen a 'perk of the job'

        Decades of undercover police
        in political movement in UK

        Long-term relationships
        used as part of cover story by undercover cops
        *only happened to women

        Undercover actions
        considered:
        embedded in institutionalised sexism British legal system & other

        Effects of Surveillance 
        / creates a culture of fear and paranoia
        / large-scale social suicide
        / damaging to entire society
        / creation of police state is responsible for this damage


        September 04, 2015

        FBI, Burning Man, Area 51, Land Theft, & KFC From Space


        EXTRACT

        "A cultural and artisan event" FBI files on Burning Man


        "The greatest known threat in this event is crowd control issues and the use of illegal drugs by participants." 

        The 29th annual Burning Man festival kicks off this week in Nevada's Black Rock Desert. Among those paying close attention to the festivities will be the FBI's Special Events Management unit, who have kept files on "burners" since at least 2010.


        ---------------------- ꕤ ----------------------


        Updated 

        Family rejects Air Force's $5.2 million bid for land near Area 51

        By Keith RogersLas Vegas Review-Journal

        Members of the Sheahan family said Monday they have rejected the Air Force's $5.2 million offer to buy their land and mining claims near Groom Mine, next to the secret Area 51 installation where the U.S. military and CIA have tested spy planes and stealth aircraft for six decades.

        [...]

        ... stake in the combined 400 acres of property and unpatented mining claims is worth considerably more, not counting the reparations they say they are owed by the Air Force and Department of Energy for "abuses and atrocities" that date back to the early 1950s. That's when they said their ore processing mill was fire-bombed by a military jet and their property was showered by radioactive fallout from numerous above-ground nuclear weapons tests.
        Most recently, when some family members visited the property in the restricted area 90 miles northwest of Las Vegas — as the Air Force has allowed them to do about once a month — guards held them at gunpoint, including a 7-year-old girl who was "traumatized" by the show of force, Danny Sheahan said.

        "It seems like machine guns solve anything on the property out there. That's not the American way," he said.

        A Nellis Air Force Base spokesman said in an email Monday that the Air Force "is unaware of any evidence to support this claim."

        The Air Force claims the family's activities over the past several years have impeded its efforts to use the range for flight tests like those that have spawned the nation's stealth aircraft at Area 51. The airstrip on the Groom Dry Lake bed, known as Watertown, began operation in 1955 to test the U-2 spy plane.

        Nellis officials have said the presence of civilians in the restricted area poses safety and security risks and results in costly delays of flight operations.

        "We're interrupting their operations? Really?" Joe Sheahan said. "We didn't parachute into their backyard. They parachuted into our backyard."

        The Sheahan's ancestors established mining for silver, lead, copper, zinc and small amounts of gold dating back to 1889. Manning said the family owns six patented claims in addition to 15 unpatented claims that are leased to the Bureau of Land Management.

        She said the family's ore processing mill exploded and burned in June 1954 when a jet's wing fuel tank was dropped on it.

        The Air Force said the incident was adjudicated in the United States Court of Claims.

        Manning said, however, "Our grandparents ran out of money trying to fight it."

        http://www.reviewjournal.com/news/military/family-rejects-air-forces-52-million-bid-land-near-area-51




        ꕤ COPYRIGHT DISCLAIMER
        Copyright Disclaimer under section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research.

        COMMENT
        Wondering why FBI were at some hippy festival had me wondering if it had anything to do with whatever military testing they do out there in the desert, or whether they simply monitor groups of gathered people as a matter of course.
        Burning Man Festival 
        Black Rock Desert, about 177km north of Reno

        "Our community values creative cooperation and collaboration. ..."
        Well, that's me out.  I didn't inherit the collaboration gene.

        Area 51
        aka
        • Homey Airport
        • Groom Lake
        • Dreamland
        • Paradise Ranch
        • Base
        • Watertown
        Area 51 
        134 km
        north-northwest of Las Vegas 
        southern shore of Groom Lake, is a large military airfield 
        acquired by the United States Air Force in 1955 ...  
        ... area around Area 51 
        incl. the small town of Rachel (pop. 54, 2010 census)
        on "Extraterrestrial Highway" (Nevada Highway 375) = popular tourist destination.
        2006 KFC
        installed a giant company logo on the ground
        north edge of Rachel
        claims it is first logo visible from space [here]
        [memo written in 1974 to CIA director William Colby by an unknown CIA official]
        ... the CIA considered no other spot on Earth to be as sensitive as Groom Lake

        Theories for secrecy:  alien craft reverse engineering & alien viruses work. 
        https://en.wikipedia.org/wiki/Area_51

        Well, that was an interesting diversion.

        The desert looks beautiful.  The record high temperature doesn't seem all that high, but the lows look really low.

        I still haven't figured out why the FBI is conducting surveillance ops, but I feel sorry for the family in the above story.

        Look how long the US government has screwed that family over.  They're still waiting on reparations from the 1950s.  And this is a family that settled there in the late 1800s.

        The government could easily cut this family a fair deal if they want their land, but they're screwing this family and have done so for decades, while using American taxpayer money to fund wars on behalf of corporate interests and using taxpayer money to bail out corporations and financial institutions.

        Disgusting.  Oh, and so is that tacky KFC graffiti that can be seen from space.