Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Applied-Research-Associates

Rss Feed Group items tagged

Gary Edwards

Google: Applied Research Associates - Directed Energy and 911 - 0 views

  •  
    Forensic engineer and scientis Dr Judy Wood argues that the evidence of the 911 building collapse points to a directed energy source capable of turning the buildings to dust. Not thermal or heat. Not a thermal explosive style controlled demolition. Nor was it a structural collapse from the impact of the planes. Dr Wood rules out the official story and let's the facts speak for themselves and the facts point directly at Applied Research Associates, and Directed Energy Weapons having been used on 911 to bring down several buildings. What an incredible story. There is an interview of Dr Judy Wood on CoasttoCoastAM.com. If you want to listen, leave me a note and I will send the link. If you have note heard this woman speak, or read her book, "What happened to the Buildings on 911?", you are in for one special, eye opening treat.
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Mastermind of The Bamako Terror Attack Mokhtar Belmokhtar: A CIA Sponsored "Intelligenc... - 0 views

  • In response to the tragic Paris events of November 13, Central Intelligence Agency director  John Brennan  warned that “ISIL is planning additional attacks… It is clear to me that ISIL has an external agenda, that they are determined to carry out these types of attacks.” (Quoted in Daily Telegraph, November 16, 2015) Five days later following the CIA Chief’s  premonition, the Bamako Radisson Hotel Blu in Mali’s capital was the object of a terrorist attack, resulting in  21 people dead. Following the attack and the taking of hostages by the terrorists, French and Malian special forces raided the hotel. US. Africa Command (AFRICOM) also confirmed that US special forces were involved.
  • The Bamako terror operation was allegedly coordinated by Mokhtar Belmokhtar (aka Khaled Abu al-Abbas), leader of an affiliate of Al Qaeda in the Islamic Maghreb (AQIM), the Islamist al-Mulathameen (Masked) Brigade, or “Those who Sign with Blood.” Belmokhtar’s group was created in 2012 in the wake of the war on Libya. His organization has also allegedly been involved in the drug trade, smuggling as well kidnapping operations of foreigners in North Africa.  While his whereabouts are said to be known, French intelligence has dubbed Belmokhtar “the uncatchable”. In June he was reported dead  as a result in a U.S. air strike in Libya. His death was subsequently denied. Based on shaky evidence, The New York Times report below (November 20) concludes that Belmokhtar’s group (together with AQIM) is unequivocally behind the Bamako attacks:
  • A member of Al Qaeda in Africa confirmed Saturday that the attack Friday on a hotel in Bamako, Mali, had been carried out by a jihadist group loyal to Mokhtar Belmokhtar, an Algerian operative for Al Qaeda. The Qaeda member, who spoke via an online chat, said that an audio message and a similar written statement in which the group claimed responsibility for the attack were authentic. The SITE Intelligence Group, which monitors jihadist groups, also confirmed the authenticity of the statement. The Qaeda member, who refused to be named for his protection, said that Mr. Belmokhtar’s men had collaborated with the Saharan Emirate of Al Qaeda in the Islamic Maghreb, … In the audio recording, the group, known as Al Mourabitoun, says it carried out the operation in conjunction with Al Qaeda’s branch in the Islamic Maghreb. The recording was released to the Al Jazeera network and simultaneously to Al Akhbar, … The recording states: “We, in the group of the Mourabitoun [Arabic Rebel Group], in cooperation with our brothers in Al Qaeda in Islamic Maghreb, the great desert area, claim responsibility for the hostage-taking operation in the Radisson hotel in Bamako.” (emphasis added)
  • ...7 more annotations...
  • In turn, the French Minister of Defense acknowledged –prior to the conduct of a police investigation– that the authors of the attack were “most likely” led by Mokhtar Belmokhtar’s group in association with Al Qaeda in the Islamic Maghreb (AQIM). What Defense Minister Jean-Yves Le Drain failed to mention was that both Belmokhtar and AQIM have longstanding links to the CIA, which in turn has a working relationship with France’s  General Directorate for External Security, Direction générale de la sécurité extérieure (DGSE).  Casually ignored by the Western media, the leaders of Al Qaeda in the Islamic Maghreb (AQIM) including Belmokhtar were trained and recruited by the CIA in Afghanistan. Acknowledged by the Washington based Council on Foreign Relations (CFR): Most of AQIM’s major leaders are believed to have trained in Afghanistan during the 1979-1989 war against the Soviets as part of a group of North African volunteers known as “Afghan Arabs” that returned to the region and radicalized Islamist movements in the years that followed. The group is divided into “katibas” or brigades, which are clustered into different and often independent cells. The group’s top leader, or emir, since 2004 has been  Abdelmalek Droukdel, also known as Abou Mossab Abdelwadoud, a trained engineer and explosives expert who has fought in Afghanistan and has roots with the GIA in Algeria. (Council on Foreign Relations, Al Qaeda in the Islamic Maghreb, cfr.org, undated)
  • Mokhtar Belmokhtar: Post Cold War CIA intelligence asset?  The Council on Foreign Relations erroneously describes “Mokhtar Belmokhtar as the one-eyed veteran of the anti-Soviet Afghan insurgency.” (CFR, op cit, emphasis added). Belmokhtar (born in 1972) did not fight in the Soviet-Afghan war (1979-1989). He was recruited in 1991 at the age of 19 in the immediate wake of the Cold War. CIA recruitment continued in the wake of the Cold War. It was in large part directed against the Russian Federation and the former Soviet Republics as well as the Middle East. The purpose of this later CIA recruitment was to establish a network of “intelligence assets” to be used in the CIA’s post-cold war insurgencies. Leaders of the Chechen Islamist insurgencies were also trained in CIA camps in Afghanistan and Pakistan, including the notorious leader of the Chechen insurrection Ibn al-Khattab (a citizen of Saudi Arabia).
  • Following his training and recruitment and a two year stint in Afghanistan (1991-1993), Mokhtar Belmokhtar was sent back to Algeria in 1993 at age 21 where he joined the  Salafist Group for Preaching and Combat (GSPC) (emblem left). The latter was initially part of the so-called Armed Islamic Group  (Groupe islamique armé (GIA)) in Algeria which sought to overthrow the secular Algerian Government with a view to installing a theocratic Islamic State. Supported covertly by the CIA, Belmokhtar fought in Southern Algeria in the civil war opposing Islamist forces and the secular government. He was also  instrumental in the integration and merging of “jihadist” forces. In January 2007,  the Armed islamic Group (GIA) which had been prominent in the 1990s, officially changed its name to the Al-Qaeda Organization in the Islamic Maghreb (AQIM). In turn, as of 2007, the newly formed AQIM established a close relationship with the Libya Islamic Fighting Group (LIFG), which was directly supported by NATO during the 2011 war on Libya, “providing weapons, training, special forces and even aircraft to support them in the overthrow of Libya’s government.” (Tony Cartalucci, The Geopolitical Reordering of Africa: US Covert Support to Al Qaeda in Northern Mali, France “Comes to the Rescue”, Global Research, January 2013). British SAS Special Forces had also been brought into Libya prior to the onset of the insurrection, acting as military advisers to the LIFG. In fact, what has unfolded since the war on Libya is the merging of LIFG and AQIM forces. In turn, many of the LIFG operatives have been dispatched to Syria to fight within the ranks of Al Nusrah and the ISIS.
  • It is worth noting that the 2007  restructuring  of jihadist forces in Algeria and the Maghreb coincided with  the appointment of Robert Stephen Ford as US ambassador to Algeria in August 2006. Ford had been reassigned by the State Department from Baghdad to Algiers. From 2004 to 2006, he worked closely with Ambassador John Negroponte at the US embassy in Baghdad in supporting the creation of  both Shia and Sunni death squads in Iraq. This project consisted in recruiting and training terrorists modelled on the so-called “Salvador Option” which had been applied by the CIA in Central America. Negroponte as we recall played a central role in supporting the Contras terrorists in Nicaragua as ambassador to Honduras from 1981-1985. For further details see Michel Chossudovsky, “The Salvador Option For Syria”: US-NATO Sponsored Death Squads Integrate “Opposition Forces”, Global Research,  May 28, 2012) The 2006 appointment of Robert Stephen Ford to head the US Embassy in Algeria was timely. It coincided with the consolidation of jihadist groups within Algeria and the Maghreb. It preceded the 2011 US-NATO sponsored insurrections in Libya and Syria. In 2010, Ford was approved by the US Congress as US Ambassador to Syria. He presented his credentials to president Bashar al Assad in January 2011, barely two months prior to the onslaught of the terrorist insurrection in the border city of Daraa in mid-March 2011. Ford played a central role in assisting the channelling of US and allied support to Syrian “opposition” groups including Al Nusrah and the ISIS.
  • Belmokhtar’s history and involvement in Afghanistan confirms that from the very outset he was an instrument of US intelligence. While, he operates with a certain degree of independence and autonomy in relation to his intelligence sponsors, he and his organization are bona fide CIA “intelligence assets”, which can be used by the CIA as part of a covert agenda. There are various definitions of  an “intelligence asset”. From the standpoint of US intelligence, “assets” linked up to terrorist organizations must not be aware that they are supported and monitored by Western intelligence. With regard to Al Qaeda, from the outset in 1979, the CIA chose to operate through various front organizations as well as indirectly through its Saudi, Qatari and Pakistani intelligence partners. CIA’s Milton Beardman who played a central role in the Soviet Afghan war confirms that members of Al Qaeda including Osama bin Laden were not aware of the role they were playing on behalf of Washington. In the words of bin Laden (quoted by Beardman): “neither I, nor my brothers saw evidence of American help”(Michel Chossudovsky, Who is Osama bin Laden, Global Research, September 12, 2001): Motivated by nationalism and religious fervor, the Islamic warriors were unaware that they were fighting the Soviet Army on behalf of Uncle Sam. While there were contacts at the upper levels of the intelligence hierarchy, Islamic rebel leaders in theatre had no contacts with Washington or the CIA.  (Ibid) Amply documented, Al Qaeda in the Islamic Maghreb (AQIM)and its affiliated groups including the Libya Islamic Fighting Group (LIFG) was serving the interests of the Western military alliance. Confirmed by the Washington Post, June 29, 2011 (See below), France was supplying weapons to the LIFG at the height of NATO’s bombing raids.
  • AQIM in turn was receiving weapons from the LIFG, which was supported by NATO. Moreover, LIFG mercenaries had integrated AQIM brigades. According to alleged Terror Mastermind Mokhtar Belmokhtar, who also coordinated the 2013 In Amenas Mali kidnapping operation: “We have been one of the main beneficiaries of the revolutions in the Arab world. As for our benefiting from the (Libyan) weapons, this is a natural thing in these kinds of circumstances.” http://www.hanford.gov/c.cfm/oci/ci_terrorist.cfm?dossier=174 Al Qaeda in the Islamic Maghreb (AQIM) is indelibly tied into a Western intelligence agenda. While it is described  as  ”one of the region’s wealthiest, best-armed militant groups”, financed covertly by Saudi Arabia and Qatar. France’s  Canard enchaîné revealed (June 2012) that Qatar (a staunch ally of the United States) has been funding various terrorist entities in Mali: The original report cites a French military intelligence report as indicating that Qatar has provided financial support to all three of the main armed groups in northern Mali: Iyad Ag Ghali’s Ansar Ed-Dine, al-Qa’ida in the Islamic Maghreb (AQIM) and the Movement for Unity and Jihad in West Africa (MUJWA). The amount of funding given to each of the groups is not mentioned but it mentions that repeated reports from the French DGSE to the Defense Ministry have mentioned Qatar’s support for ‘terrorism’ in northern Mali. (quoted by Jeune Afrique June 2012)
  • Qatar is a proxy state, a de facto Persian Gulf territory largely controlled by Washington. It hosts  a number of Western military and intelligence facilities. The Emir of Qatar does not finance terrorism without the consent of the CIA. And with regard to Mali, the CIA coordinates its activities in liaison with its French intelligence partners and counterparts, including la Direction du renseignement militaire (DRM) and the Direction générale de la sécurité extérieure (DGSE). The implications are obvious and should be carefully understood by Western public opinion. Inasmuch as Belmokhtar and AQIM are “intelligence assets”, both US and French intelligence are (indirectly) behind the Bamako attacks. Both US and French intelligence are complicit in the State sponsorship of terrorism.
Gary Edwards

Applied Research Associates - The evidence of 911 and Directed Energy Weapons - 0 views

  •  
    The official web site of Dr Judy Wood and her investigation into how the buildings came down on 911.
Paul Merrell

Congress Seeks to undermine Iran Deal by Linking Iran with ISIS | Global Research - Cen... - 0 views

  • One of the consequences of the Iran Deal was the declaration by countless politicians that they were going to crack down on Iran’s sponsorship of terrorism. Even the White House signed on to this idea. Well now some of the backlash has officially begun: Congress is linking Iran with ISIS, even though Iran is fighting ISIS. [and ISIS is supported by the US, GR ed.] Few mainstream publications have picked up on the fact that in a response to the San Bernardino killings, the Congress last week passed legislation, which the president duly signed, that puts Iran in an axis of international-terrorist evil along with Syria, Iraq and Sudan. The legislation amends our country’s visa waiver program. Iranian dual nationals, as well as US citizens who have visited Iran, will need visas to get into the U.S. Reuters: Iranian Foreign Minister Mohammad Javad Zarif on Friday said it was “absurd” that Tehran should be included on the list. “No Iranian nor anybody who visited Iran had anything to do with the tragedies that have taken place in Paris or in San Bernardino or anywhere else,” he said in an interview with Middle East-focused website Al Monitor. Secretary of State John Kerry promptly met with Zarif, his Iranian counterpart, to assure him that the new law doesn’t undercut the Iran deal. But the Iranians say that the legislation is the result of pro-Israel lobbying. And even the State Department describes Iran as a state sponsor of terrorism.  
  •  Iranians say the bill reflects pro-Israel lobbying. Reuters: Iran said on Monday that Israeli lobbying was behind a new measure passed by the U.S. Congress that will prevent visa-free travel to the United States for people who have visited Iran or hold Iranian nationality. The measure, which President Barack Obama signed into law on Friday, also applies to Iraq, Syria and Sudan, and was introduced as a security measure after the Islamic State attacks in Paris and a similar attack in San Bernardino, California.
  • More from Reuters‘ description of the Israel lobby angle: Iran, a Shi’ite Muslim theocracy staunchly opposed to Sunni radicalism espoused by groups like Islamic State, says its inclusion on the list is intended to undermine a deal on its nuclear programme that Tehran reached with world powers, including the United States, in July, known as the JCPOA. Iranian Foreign Ministry spokesman Hossein Jaberi Ansari said in a televised news conference that the U.S. measure had been passed “under pressure from the Zionist lobby and currents opposed to the JCPOA”. The administration wants to have it both ways on blaming Iran. Yesterday on National Public Radio, Adam Szubin, the counter-terrorism finance under secretary at the Treasury Department, also put Iran in the category of ISIS, as an international terror deliverer: if you are familiar with the model of how al-Qaida or groups like Hamas and even Hezbollah have financed themselves, they’ve typically been heavily reliant on foreign donations, whether from state sponsors like Iran or whether from wealthy what we call deep-pocket donors, often in the Gulf. But that financing model is not ISIL. When you have a group that’s raising hundreds of millions of dollars in a year from internal sources, we don’t have those same chokepoints to go after in terms of the foreign flows.
  • ...2 more annotations...
  • Meanwhile John Kerry is doing fancy footwork, explaining the legislation away, in a letter to Javad Zarif. we remain fully committed to the sanctions lifting provided for under the JCPOA. We will adhere to the full measure of our commitments, per the agreement. At the State Department briefing Monday, reporters questioned why the legislation didn’t amount to a violation of the Iran Deal:
  • Here is some more blindness in the media on these issues. NPR has continually deceived listeners about Sheldon Adelson’s agenda, and it did so again yesterday. Adelson is a leading opponent of the Iran Deal, as a supporter of Israel. He has called on President Obama to nuke Iran. But in a report on Adelson’s purchase of a Nevada newspaper, NPR once again leaves out the Israel angle of Adelson’s interests. It says blandly: Adelson is also prominently involved in national politics. That link is to a story about his on-line gambling concerns. But as Cory Bennett of the Hill said on CSPAN the other day– something I did not know till now– Iran is said to have undertaken a cyber-attack on Sheldon Adelson’s casino last year because of his call to nuke Iran.  The alleged cyber-attack:  Investigators determined that hacker activists were the ones who broke into servers belonging to the Las Vegas Sands Corporation in February 2014, costing the company more than $40 million in damages and data recovery costs, Bloomberg Businessweek reported Thusday citing a report by cybersecurity firm Dell SecureWorks. The hackers were acting in retaliation to the company’s CEO, casino magnate Sheldon Adelson’s statement that Obama should detonate a nuclear bomb in Tehran, which stirred controversy around the world. This is the battle behind the headlines. And in a transparent effort to get Adelson’s backing, as well as that of the Andrew Herenstein’s of the world, the neoconservative favorite in the Republican race, Senator Marco Rubio, has vowed to tear up the Iran deal on his first day in the White House if he’s elected. Thus the ideological war over how much the U.S. should support Israel is playing out in global terms; and our media are shying away from the story.
  •  
    It's preposterous for Congress to say that Iran is associated with ISIL and for Obama to sign such a bill. Iran is one of the major military forces in the fight against ISIL in both Syria and Iraq.
Gary Edwards

Doug Casey on American Socialism - Casey Research - 0 views

  •  
    "Doug Casey on American Socialism"  .  Awesome interview, especially the discussion on Liberalism and how the socialist Norman Thomas decided to co-opt the term as an effective replacement for the disreputable socialism.  Links to the Thomas 1932 socialist platform that Casey points out has pretty much been put into place.   Good discussion.  Focus on an article published by socialist apologist and idiot, Allan Colmes.
  •  
    I agree that Colmes is far from the sharpest knife in the drawer. In my opinion, he was largely a Fox News invention to give Shawn Hannity a far weaker opponent to argue against that Hannity's idiocy could still overcome. There are in reality liberals that Hannity could never have gone toe-to-toe with. (That's not an endorsement of liberalism; it's commentary on the quality of Hannity's arguments.) The show was mostly a variant of the straw man logical fallacy; the fact that Colmes lacked the ability to think critically or communicate effectively made Hannity "win" the pseudo-debate in the eyes of those unable to think critically themselves. I have some criticism of Casey's remarks that apply more generally to my experience of strict Libertarians and perhaps even farther to strict adherents to any "ism." My criticism boils down to a couple of examples of hard issues usually avoided by strict Libertarians. -- The Disabled: When discussing Social Security disability benefits, Casey changes the subject from the genuinely disabled to a short rant about those whose disability claims are bogus and the "ambulance chasing" lawyers who pursue their claims. But if pressed to the wall and forced to answer, I strongly suspect that Casey would admit that there are people, likely the majority of Social Security disability benefits, whose claims are genuine. The net effect of his relevant argument: an impression that he has a Darwinian view that he would leave the disabled dying in the streets without sustenance or medical care. That kind of society is unacceptable to me. Perhaps it is to Casey too, but if so I think it was incumbent on him to offer a solution for the genuinely disabled. (In fairness, I'll note that at one point Casey hinted but did not forthrightly say that he would favor financial assistance for single mothers in Harlem.) -- Medical Care: I agree that our health care system is badly broken. But again Casey is long on criticism but short on realistic idea
Paul Merrell

DARPA seeks the Holy Grail of search engines - 0 views

  • The scientists at DARPA say the current methods of searching the Internet for all manner of information just won't cut it in the future. Today the agency announced a program that would aim to totally revamp Internet search and "revolutionize the discovery, organization and presentation of search results." Specifically, the goal of DARPA's Memex program is to develop software that will enable domain-specific indexing of public web content and domain-specific search capabilities. According to the agency the technologies developed in the program will also provide the mechanisms for content discovery, information extraction, information retrieval, user collaboration, and other areas needed to address distributed aggregation, analysis, and presentation of web content.
  • Memex also aims to produce search results that are more immediately useful to specific domains and tasks, and to improve the ability of military, government and commercial enterprises to find and organize mission-critical publically available information on the Internet. "The current one-size-fits-all approach to indexing and search of web content limits use to the business case of web-scale commercial providers," the agency stated. 
  • The Memex program will address the need to move beyond a largely manual process of searching for exact text in a centralized index, including overcoming shortcomings such as: Limited scope and richness of indexed content, which may not include relevant components of the deep web such as temporary pages, pages behind forms, etc.; an impoverished index, which may not include shared content across pages, normalized content, automatic annotations, content aggregation, analysis, etc. Basic search interfaces, where every session is independent, there is no collaboration or history beyond the search term, and nearly exact text input is required; standard practice for interacting with the majority of web content, which remains one-at-a-time manual queries that return federated lists of results. Memex would ultimately apply to any public domain content; initially, DARPA  said it intends to develop Memex to address a key Defense Department mission: fighting human trafficking. Human trafficking is a factor in many types of military, law enforcement and intelligence investigations and has a significant web presence to attract customers. The use of forums, chats, advertisements, job postings, hidden services, etc., continues to enable a growing industry of modern slavery. An index curated for the counter-trafficking domain, along with configurable interfaces for search and analysis, would enable new opportunities to uncover and defeat trafficking enterprises.
  • ...1 more annotation...
  • DARPA said the Memex program gets its name and inspiration from a hypothetical device described in "As We May Think," a 1945 article for The Atlantic Monthly written by Vannevar Bush, director of the U.S. Office of Scientific Research and Development (OSRD) during World War II. Envisioned as an analog computer to supplement human memory, the memex (a combination of "memory" and "index") would store and automatically cross-reference all of the user's books, records and other information. This cross-referencing, which Bush called associative indexing, would enable users to quickly and flexibly search huge amounts of information and more efficiently gain insights from it. The memex presaged and encouraged scientists and engineers to create hypertext, the Internet, personal computers, online encyclopedias and other major IT advances of the last seven decades, DARPA stated.
  •  
    DoD announces that they want to go beyond Google. Lots more detail in the proposal description linked from the article. Interesting tidbits: [i] the dark web is a specific target; [ii] they want the ability to crawl web pages blocked by robots.txt; [iii] they want to be able to search page source code and comments. 
Paul Merrell

EXCLUSIVE: Chase to Charge Customers Fees For Handing Cash Deposits - Top US World News... - 0 views

  • Beginning August 1st of this year, JP Morgan & Chase Co. will charge their customers for depositing cash into their accounts. According to an internal document sent to account holders, in less than a month from now “the fee for all types of Cash Deposit Processing (CDP) will be $0.25 per $100 [deposited]. The CDP fee will only apply after you exceed your account’s cash deposit limit.” One reason for Chase to charge their customers a fee on cash deposits may reside in the fact that the major banks are “charging customers who deposit lots of cash.” Wherein Chase is charging customers for every $100 in cash deposited, other banks are charging on every cash deposit of $10,000; or $0.20 on every $100 deposited. Kris Dawsey, economist for Goldman Sachs, warned about banks charging customers fees for simply depositing cash into their account in 2013.
  • When asked about a meeting of the Federal Reserve (Fed) Board and the Federal Open Market Committee (FOMC), wherein it was revealed that the 0.25% annual interest rate on money that the banks keep in the Fed would be reduced, Dawsey said: “One risk is that the move could prompt charges … on bank deposits.” Last November, Kristin Lemkau, spokesperson for JP Morgan & Chase Co said: “We have no intention of charging for retail customer deposits.” However this promise has not been kept. David George, analyst for Robert W. Baird & Co, explains that the financial institutions “would need to find alternative revenue sources to compensate” because of this decline in the Fed’s interest rate and fees on deposits “would be the most likely” option.
  • George said: “Having a bank account is a service, like the water and electric bill. And it has become less and less profitable.” Wayne Abernathy, executive vice president of the American Bankers Association confirmed: “Banks could respond to a drop in the Fed’s interest rate by charging a fee to large business customers that hold millions of dollars in savings accounts. Banks must bear the expense of managing that money.” Analysts say the Durbin Amendment within the Dodd Frank Act which limited fees imposed by merchant retailers onto banks who issue debit cards “has effectively hit consumer-banking revenues pretty hard.” When accessing debits, banks view checking accounts as high-risk and costing “a lot of money” to the banks.
  •  
    Remember the days when banks' only source of money to lend was customer deposits?
Paul Merrell

Hackers Stole Secrets of U.S. Government Workers' Sex Lives - The Daily Beast - 0 views

  • It was already being described as the worst hack of the U.S. government in history. And it just got much worse.A senior U.S. official has confirmed that foreign hackers compromised the intimate personal details of an untold number of government workers. Likely included in the hackers’ haul: information about workers’ sexual partners, drug and alcohol abuse, debts, gambling compulsions, marital troubles, and any criminal activity.Those details, which are now presumed to be in the hands of Chinese spies, are found in the so-called “adjudication information” that U.S. investigators compile on government employees and contractors who are applying for security clearances. The exposure suggests that the massive computer breach at the Office of Personnel Management is more significant and potentially damaging to national security than officials have previously said.
  • Three former U.S. intelligence officials told The Daily Beast that the adjudication information would effectively provide dossiers on current and former government employees, as well as contractors. It gives foreign intelligence agencies a roadmap for finding people with access to the government’s most highly classified secrets.Obama administration officials had previously acknowledged the breach of information that applicants voluntarily disclose on a routine questionnaire, called Standard Form 86, but the theft of the more detailed and wide-ranging adjudication information appears to have gone overlooked.
  • “Whoever compromised the adjudication information is going to have clear knowledge, beyond what’s in the SF86, about who the best targets for espionage are in the United States,” Michael Adams, a computer security expert who served more than two decades in the U.S. Special Operations Command, told The Daily Beast. “This is the most successful cyber attack in the history of the United States,” owing to the amount and quality of the information that was stolen, Adams said. U.S. intelligence officers spend years trying to recruit foreign spies to gather the kinds of details and insights that are contained in adjudication information, one former senior U.S. official said. This official, who requested anonymity, added that adjudication information would give foreign intelligence services “enormous leverage” over U.S. personnel whom they might forcibly interrogate for information or try to recruit.
  • ...4 more annotations...
  • The adjudication process had a broad scope, taking into account the SF86 questionnaire, reports from background investigations, interviews with the applicant's family members and associates, his or her employment history, and for people seeking high-level clearances, the results of polygraph investigations.Seymour said such records “span an employee’s career” and could stretch back as far as 30 years. Officials have said that as many as 18 million people may have been affected by the breach. Asked specifically what information the hackers had obtained, Seymour told lawmakers that she preferred to answer later in a “classified session.” Seymour didn’t specify how many people’s information was stolen. But the OPM oversees background investigations, which comprise a key part of the adjudication process, for more than 90 percent of security clearance applicants, according to the Congressional Research Service. An OPM spokesman didn’t respond to a request for comment in time for publication.
  • A former senior U.S. intelligence official, who asked to remain anonymous, said the OPM breach would cause more damage to national security operations and personnel than the leaks by Edward Snowden about classified surveillance by the National Security Agency.“This is worse than Snowden, because at least programs that were running before the leaks could be replaced or rebuilt,” the former official said. “But OPM, that’s the gift that keeps on giving. You can’t rebuild people.”Adjudicators are in a powerful position because in deciding whether to recommend granting a security clearance, they have access to the entire scope of an applicant’s file and are told to make a subjective analysis.“The adjudication process is the careful weighing of a number of variables known as the whole-person concept,” according to official guidelines. “Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination.”
  • By design, adjudication is an invasive process, meant to unearth risk factors including drug and alcohol abuse, extramarital affairs, a history of violence, and other events that speak to a person’s “trustworthiness” and their susceptibility to blackmail or being recruited to spy for a foreign government.For instance, “compulsive gambling is a concern, as it may lead to financial crimes including espionage,” the guidelines say. Adjudicators are told to note “a pattern of compulsive, self-destructive, or high risk sexual behavior,” “relapse after diagnosis of alcohol abuse,” and “emotionally unstable, irresponsible, dysfunctional, violent, paranoid, or bizarre behavior,” among other warning signs in 13 categories. Some of the embarrassing personal details found in some adjudications have been made public. That’s what happens after an applicant who was denied a security clearance launched an appeal.
  • Armed with such intimate details of a person’s worst moments, foreign spies would have unprecedented advantage against their U.S. adversaries. And the news is especially bad for people who hold the highest levels of clearance, which require more rigorous background checks, noted Adams, the computer security expert. “The higher up you go in your sensitivity levels, the more data that’s in your adjudication file,” he said.
Paul Merrell

U.S. Solar Is Producing 50 Percent More Electricity Than We Thought - Plugged In - Scie... - 0 views

  • Actual solar electricity production in the United States is 50% higher than previous estimates, according to new analysis by the Solar Energy Industries Association (SEIA) and kWh Analytics. All told, analysts found that solar energy systems in the U.S. generated 30.4 million megawatt-hours (MWh) of electricity in the 12 months ending in March 2015. Three states - California, Arizona, and Hawaii – can now say that solar provides more than 5% of their total annual electricity demand. The new estimate includes generation from behind-the-meter solar systems, which is not included in estimates produced by the Energy Information Administration (EIA). The EIA uses solar power generation information collected with their Form 923 survey, which only applies to utility-scale power plants that have more than 1,000 kW in solar generation capacity (i.e. are larger than 1,000 kWac). Given that the average solar PV system that you will find on the rooftops of houses in the U.S. has just 5 kWac of generation capacity, the electricity that they produce is not captured in EIA statistics. 
  • As a result, the EIA estimated that solar power produced 20.2 million MWh of electricity over the 12 months ending in March 2015 compared to the 30.4 million MWh published in the analysis from SEIA and kWh Analytics. 
Paul Merrell

AP Exclusive: Expert calls for Diablo Canyon shutdown | www.ktvu.com - 0 views

  • A senior federal nuclear expert is urging regulators to shut down California's last operating nuclear plant until they can determine whether the facility's twin reactors can withstand powerful shaking from any one of several nearby earthquake faults.Michael Peck, who for five years was Diablo Canyon's lead on-site inspector, says in a 42-page, confidential report that the Nuclear Regulatory Commission is not applying the safety rules it set out for the plant's operation.The document, which was obtained and verified by The Associated Press, does not say the plant itself is unsafe. Instead, according to Peck's analysis, no one knows whether the facility's key equipment can withstand strong shaking from those faults — the potential for which was realized decades after the facility was built.
  • Continuing to run the reactors, Peck writes, "challenges the presumption of nuclear safety."Peck's July 2013 filing is part of an agency review in which employees can appeal a supervisor's or agency ruling — a process that normally takes 60 to 120 days, but can be extended. The NRC, however, has not yet ruled. Spokeswoman Lara Uselding said in emails that the agency would have no comment on the document.The NRC, which oversees the nation's commercial nuclear power industry, and Diablo Canyon owner Pacific Gas and Electric Co., say the nearly three-decade-old reactors, which produce enough electricity for more than 3 million people annually, are safe and that the facility complies with its operating license, including earthquake safety standards.
  • The disaster preparedness of the world's nuclear plants came into sharp focus in 2011, when the coastal Fukushima Dai-ichi plant in Japan suffered multiple meltdowns after an earthquake and tsunami destroyed its power and cooling systems. The magnitude-9 earthquake was far larger than had been believed possible. The NRC has since directed U.S. nuclear plants to reevaluate seismic risks, and those studies are due by March 2015.The important of such an analysis came into sharp focus on Sunday when a magnitude 6.0-earthquake struck in Northern California's wine country, injuring scores of residents, knocking out power to thousands and toppling wine bottles at vineyards.
  • ...2 more annotations...
  • What's striking about Peck's analysis is that it comes from within the NRC itself, and gives a rare look at a dispute within the agency. At issue are whether the plant's mechanical guts could survive a big jolt, and what yardsticks should be used to measure the ability of the equipment to withstand the potentially strong vibrations that could result.The conflict between Peck and his superiors stems from the 2008 discovery of the Shoreline fault, which snakes offshore about 650 yards from the reactors. A larger crack, the Hosgri fault, had been discovered in the 1970s about 3 miles away, after the plant's construction permits had been issued and work was underway. Surveys have mapped a network of other faults north and south of the reactors.According to Peck's filing, PG&E research in 2011 determined that any of three nearby faults — the Shoreline, Los Osos and San Luis Bay — is capable of producing significantly more ground motion during an earthquake than was accounted for in the design of important plant equipment. In the case of San Luis Bay, it is as much as 75 percent more.Those findings involve estimates of what's called peak ground acceleration, a measurement of how hard the earth could shake in a given location. The analysis says PG&E failed to demonstrate that the equipment would remain operable if exposed to the stronger shaking, violating its operating license.
  • The agency should shut the facility down until it is proven that piping, reactor cooling and other systems can meet higher stress levels, or approve exemptions that would allow the plant to continue to operate, according to Peck's analysis.Peck disagreed with his supervisors' decision to let the plant continue to operate without assessing the findings. Unable to resolve his concerns, Peck in 2012 filed a formal objection, calling for PG&E to be cited for violating the safety standards, according to his filing. Within weeks, the NRC said the plant was being operated safely. In 2013 he filed another objection, triggering the current review.
Paul Merrell

Impending Threat to Canadian Democracy: Harper Government's "Anti-Terrorism Act" isn't ... - 0 views

  • The Harper government’s Bill C-51, or Anti-Terrorism Act, has been in the public domain for over a month. Long enough for us to know that it subverts basic principles of constitutional law, assaults rights of free speech and free assembly, and is viciously anti-democratic. An unprecedented torrent of criticism has been directed against this bill as the government rushes it through Parliament. This has included stern or at least sceptical editorials in all the major newspapers; an open letter, signed by four former Prime Ministers and five former Supreme Court judges, denouncing the bill for exposing Canadians to major violations of their rights; and another letter, signed by a hundred Canadian law professors, explaining the dangers it poses to justice and legality. As its critics have shown, the bill isn’t really about terrorism: it’s about smearing other activities by association—and then suppressing them in ways that would formerly have been flagrantly illegal. The bill targets, among others, people who defend the treaty rights of First Nations, people who oppose tar sands, fracking, and bitumen-carrying pipelines as threats to health and the environment, and people who urge that international law be peacefully applied to ending Israel’s illegal occupation of Palestinian territories. (Members of this latter group include significant numbers of Canadian Jews.)
  • But the Anti-Terrorism Act is more mortally dangerous to Canadian democracy than even these indications would suggest. A central section of the act empowers CSIS agents to obtain judicial warrants—on mere suspicion, with no requirement for supporting evidence—that will allow them to supplement other disruptive actions against purported enemies of Harperland with acts that directly violate the Charter of Rights and Freedoms and other Canadian laws. The only constraints placed on this legalized law-breaking are that CSIS agents shall not “(a) cause, intentionally or by criminal negligence, death or bodily harm to an individual; (b) wilfully attempt in any manner to obstruct, pervert or defeat the course of justice; or (c) violate the sexual integrity of an individual.”
  • The second of these prohibitions—occurring in the midst of a bill that seeks systematically to obstruct citizens in the exercise of their rights, pervert justice, and defeat democracy—might tempt one to believe that there is a satirist at work within the Department of Justice. (Note, however, that CSIS agents can obstruct, pervert and defeat to their hearts’ content, so long as they do so haphazardly, rather than “wilfully.”) But the first and third clauses amount to an authorization of torture.
  •  
    U.S. government's excesses metastasize to Canada.
1 - 12 of 12
Showing 20 items per page