Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged radio

Rss Feed Group items tagged

Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Gary Edwards

Do You Want To Be RFID Chipped? Another Hidden Secret in Obama-Care | Pakalert Press - 0 views

  •  
    "Modern technology is growing by leaps and bounds. The corporate-controlled media extolls its virtues, but does not cover the known harm of its dark side. Most of this technology goes unchecked for human safety. The following is a short synopsis of the hazards of several invisible technologies that are already an unreported and grave danger to all of us." Article covers these emerging technology threats: ... Nano-Technology This technology is also in the highly toxic Chemtrails aerosols, as nano-coated fiber Aluminum, that, for the past 15 years, are poisoning us daily.  The coating includes nano particalized BARIUM and Fluoride.  The Air Force has admitted to using them. Documents have been published on the Internet, over many years, listing various patents for these covert and criminal programs. And most recently, a former Air Force Industrial Hygienist has confirmed this stealth geo-engineering program from first-hand knowledge. ... RFID Chips RFID [Radio Frequency Identification] chips. They are made of a two-way radio antenna, and some encasement or support, such as small glass vial implanted under the skin. The origins of this technology go back to 1948 when the idea was first conceived. They are now found in ATM and credit cards, and some "enhanced" driver's licenses, highway toll systems, and inventory tracking systems. The latest direction in chipping the human population comes from the hidden part of the Obama "health care" reform. Who reads more than 1,000 pages of mostly incomprehensible "doublethink" drivel? The Senate Healthcare bill HR3200 was passed in 2010, and requires the implant of an RFID chip in every American. This chip will be inserted into our skin and linked to all our banking, medical, and other personal documents. Here is a short quote: "The Secretary shall establish a national medical device registry (in this subsection referred to as the 'registry') to facilitate analysis of postmarket safety and outcomes d
Paul Merrell

Here's What a Man Who Studied Every Suicide Attack in the World Says About ISIS' Motive... - 0 views

  • espite the existence of a good deal of research about terrorism, there’s a gap between the common understanding of what leads terrorists to kill and what many experts believe to be true. Ad Policy Terrorist groups like ISIS and Al Qaeda are widely seen as being motivated by their radical theology. But according to Robert Pape, a political scientist at the University of Chicago and founder of the Chicago Project on Security and Terrorism, this view is too simplistic. Pape knows his subject; he and his colleagues have studied every suicide attack in the world since 1980, evaluating over 4,600 in all. He says that religious fervor is not a motive unto itself. Rather, it serves as a tool for recruitment and a potent means of getting people to overcome their fear of death and natural aversion to killing innocents. “Very often, suicide attackers realize they have instincts for self-preservation that they have to overcome,” and religious beliefs are often part of that process, said Pape in an appearance on my radio show, Politics and Reality Radio, last week. But, Pape adds, there have been “many hundreds of secular suicide attackers,” which suggests that radical theology alone doesn’t explain terrorist attacks. From 1980 until about 2003, the “world leader” in suicide attacks was the Tamil Tigers, a secular Marxist group of Hindu nationalists in Sri Lanka.
  • espite the existence of a good deal of research about terrorism, there’s a gap between the common understanding of what leads terrorists to kill and what many experts believe to be true. Ad Policy Terrorist groups like ISIS and Al Qaeda are widely seen as being motivated by their radical theology. But according to Robert Pape, a political scientist at the University of Chicago and founder of the Chicago Project on Security and Terrorism, this view is too simplistic. Pape knows his subject; he and his colleagues have studied every suicide attack in the world since 1980, evaluating over 4,600 in all. He says that religious fervor is not a motive unto itself. Rather, it serves as a tool for recruitment and a potent means of getting people to overcome their fear of death and natural aversion to killing innocents. “Very often, suicide attackers realize they have instincts for self-preservation that they have to overcome,” and religious beliefs are often part of that process, said Pape in an appearance on my radio show, Politics and Reality Radio, last week. But, Pape adds, there have been “many hundreds of secular suicide attackers,” which suggests that radical theology alone doesn’t explain terrorist attacks. From 1980 until about 2003, the “world leader” in suicide attacks was the Tamil Tigers, a secular Marxist group of Hindu nationalists in Sri Lanka.
  • According to Pape’s research, underlying the outward expressions of religious fervor, ISIS’s goals, like those of most terrorist groups, are distinctly earthly: What 95 percent of all suicide attacks have in common, since 1980, is not religion, but a specific strategic motivation to respond to a military intervention, often specifically a military occupation, of territory that the terrorists view as their homeland or prize greatly. From Lebanon and the West Bank in the 80s and 90s, to Iraq and Afghanistan, and up through the Paris suicide attacks we’ve just experienced in the last days, military intervention—and specifically when the military intervention is occupying territory—that’s what prompts suicide terrorism more than anything else.
  • ...1 more annotation...
  • Pape’s analysis is consistent with what Lydia Wilson found when she interviewed captured ISIS fighters in Iraq. “They are woefully ignorant about Islam and have difficulty answering questions about Sharia law, militant jihad, and the caliphate,” she recently wrote in The Nation. “But a detailed, or even superficial, knowledge of Islam isn’t necessarily relevant to the ideal of fighting for an Islamic State, as we have seen from the Amazon order of Islam for Dummies by one British fighter bound for ISIS.”
  •  
    Note that this article's unquoted portions in large part stem from the unproved and dubious hypothesis -- claimed as undisputed fact -- that the motives of "terrorist groups" like ISIL stem from within those organizations rather than from the governments that maintain and control them.
Paul Merrell

Cover Story: How NSA Spied on Merkel Cell Phone from Berlin Embassy - SPIEGEL ONLINE - 0 views

  • According to SPIEGEL research, United States intelligence agencies have not only targeted Chancellor Angela Merkel's cellphone, but they have also used the American Embassy in Berlin as a listening station. The revelations now pose a serious threat to German-American relations.
  • Research by SPIEGEL reporters in Berlin and Washington, talks with intelligence officials and the evaluation of internal documents of the US' National Security Agency and other information, most of which comes from the archive of former NSA contractor Edward Snowden, lead to the conclusion that the US diplomatic mission in the German capital has not merely been promoting German-American friendship. On the contrary, it is a nest of espionage. From the roof of the embassy, a special unit of the CIA and NSA can apparently monitor a large part of cellphone communication in the government quarter. And there is evidence that agents based at Pariser Platz recently targeted the cellphone that Merkel uses the most. The NSA spying scandal has thus reached a new level, becoming a serious threat to the trans-Atlantic partnership. The mere suspicion that one of Merkel's cellphones was being monitored by the NSA has led in the past week to serious tensions between Berlin and Washington.
  • A "top secret" classified NSA document from the year 2010 shows that a unit known as the "Special Collection Service" (SCS) is operational in Berlin, among other locations. It is an elite corps run in concert by the US intelligence agencies NSA and CIA. The secret list reveals that its agents are active worldwide in around 80 locations, 19 of which are in Europe -- cities such as Paris, Madrid, Rome, Prague and Geneva. The SCS maintains two bases in Germany, one in Berlin and another in Frankfurt. That alone is unusual. But in addition, both German bases are equipped at the highest level and staffed with active personnel. The SCS teams predominantly work undercover in shielded areas of the American Embassy and Consulate, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. They just can't get caught.
  • ...5 more annotations...
  • This would correspond to internal NSA documents seen by SPIEGEL. They show, for example, an SCS office in another US embassy -- a small windowless room full of cables with a work station of "signal processing racks" containing dozens of plug-in units for "signal analysis." On Friday, author and NSA expert James Bamford also visited SPIEGEL's Berlin bureau, which is located on Pariser Platz diagonally opposite the US Embassy. "To me, it looks like NSA eavesdropping equipment is hidden behind there," he said. "The covering seems to be made of the same material that the agency uses to shield larger systems." The Berlin-based security expert Andy Müller Maguhn was also consulted. "The location is ideal for intercepting mobile communications in Berlin's government district," he says, "be it technical surveillance of communication between cellphones and wireless cell towers or radio links that connect radio towers to the network."
  • Campbell refers to window-like indentations on the roof of the US Embassy. They are not glazed but rather veneered with "dielectric" material and are painted to blend into the surrounding masonry. This material is permeable even by weak radio signals. The interception technology is located behind these radio-transparent screens, says Campbell. The offices of SCS agents would most likely be located in the same windowless attic.
  • Wiretapping from an embassy is illegal in nearly every country. But that is precisely the task of the SCS, as is evidenced by another secret document. According to the document, the SCS operates its own sophisticated listening devices with which they can intercept virtually every popular method of communication: cellular signals, wireless networks and satellite communication. The necessary equipment is usually installed on the upper floors of the embassy buildings or on rooftops where the technology is covered with screens or Potemkin-like structures that protect it from prying eyes. That is apparently the case in Berlin, as well. SPIEGEL asked British investigative journalist Duncan Campbell to appraise the setup at the embassy. In 1976, Campbell uncovered the existence of the British intelligence service GCHQ. In his so-called "Echelon Report" in 1999, he described for the European Parliament the existence of the global surveillance network of the same name.
  • Apparently, SCS agents use the same technology all over the world. They can intercept cellphone signals while simultaneously locating people of interest. One antenna system used by the SCS is known by the affable code name "Einstein." When contacted by SPIEGEL, the NSA declined to comment on the matter. The SCS are careful to hide their technology, especially the large antennas on the roofs of embassies and consulates. If the equipment is discovered, explains a "top secret" set of classified internal guidelines, it "would cause serious harm to relations between the United States and a foreign government." According to the documents, SCS units can also intercept microwave and millimeter-wave signals. Some programs, such as one entitled "Birdwatcher," deal primarily with encrypted communications in foreign countries and the search for potential access points. Birdwatcher is controlled directly from SCS headquarters in Maryland.
  • With the growing importance of the Internet, the work of the SCS has changed. Some 80 branches offer "thousands of opportunities on the net" for web-based operations, according to an internal presentation. The organization is now able not only to intercept cellphone calls and satellite communication, but also to proceed against criminals or hackers. From some embassies, the Americans have planted sensors in communications equipment of the respective host countries that are triggered by selected terms.
  •  
    A must-read article offering an in-depth, 3-page view of how badly the Snowden disclosures have poisoned trust between the U.S. and its NATO allies that are not favored members of the Five Eyes club. Details of NSA's surveillance operations in Germany and strong circumstantial evidence that Obama knew -- as recently as June 2013 -- of spy operations being conducted against hundreds of world leaders but denied it.  
Gary Edwards

BOMBSHELL! Jim Garrow Reveals Career As Covert CIA Operative, Says Breitbart ... - 1 views

  •  
    Links to radio interview. Excerpts below: "As a long-time friend and guest on NTEB Radio, we know Dr. Garrow to be a previous Nobel Peace Prize nominee and executive director of the Bethune Institute's Pink Pagoda Girls school and rescue outreach in China. But on our show tonight, Dr. Garrow made the amazing revelation that he had, in fact, right up until this past Wednesday night at midnight, spent 45 years as a covert CIA operative. Garrow said that as a result of his "litmus test" statement in January, he was outed from the agency by Obama, and forced to accept early retirement. But the revelations didn't stop there. In addition to revealing that Andrew Breitbart had been killed under orders from Obama administration officials, he also said that spy thriller novelist Tom Clancy had also be killed in much the same way, and for the same reasons. Garrow said that Clancy had been spoon fed inside information for years from covert operatives for his novels, and he knew too much. Interestingly, when asked about where he got his ideas for his novels, Clancy had said this before he died: ""I hang my hat on getting as many things right as I can," Mr. Clancy once said in an interview. "I've made up stuff that's turned out to be real - that's the spooky part." NY Times A little too real, as it turns out. Dr. Garrow said the reason no autopsy was performed for the first 5 days is that it 'takes that long for the chemicals he was poisoned with to work their way out of his body'. Lastly, he revealed that Obama's administration was made up of Marxist Muslims who all take their orders from Senior Adviser to the President, Iranian-born Valerie Jarrett. Dr. Garrow said that it is well known to intelligence agencies all over the world that Obama is a foreign plant who was placed on the path to the presidency by ultra-rich Saudi nationals This is why, Garrow said, that all of Obama's education records have been permanently sealed. Garrow p
Paul Merrell

Russia's 'superweapon' can switch off satellites and enemy weapons | Daily Mail Online - 0 views

  • Russia has claimed to have built a revolutionary new weapon system that can render enemy satellites and weapons useless.Its Russian makers say it is a 'fundamentally new electronic warfare system' which can be mounted on ground-based as well as air- and sea-borne carriers.However, it has refused to reveal how the system works.
  • Russia has claimed to have built a revolutionary new weapon system that can render enemy satellites and weapons useless.Its Russian makers say it is a 'fundamentally new electronic warfare system' which can be mounted on ground-based as well as air- and sea-borne carriers.However, it has refused to reveal how the system works.Scroll down for video 
  • It is described as 'a fundamentally new electronic warfare system capable of suppressing cruise missile and other high-precision weaponry guidance systems and satellite radio-electronic equipment.''The system will target the enemy's deck-based, tactical, long-range and strategic aircraft, electronic means and suppress foreign military satellites' radio-electronic equipment,,' Russia's Radio-Electronic Technologies Group (KRET) Deputy CEO Yuri Mayevsky told Russian news agency TASS. To comply with international weapons laws, the system will be mounted on ground-based, air-and seaborne carriers and not on satellites. 'It will fully suppress communications, navigation and target location and the use of high-precision weapons,' said adviser to the KRET first deputy CEO Vladimir Mikheyev. 'The system will be used against cruise missiles and will suppress satellite-based radio location systems. 
  • ...2 more annotations...
  • 'It will actually switch off enemy weapons.'The system's ground component will be tested soon, he claims. 'Ground tests are now going on in workshops. '
  • 'At the end of the year, the system's component will leave the factory gates for trials at testing ranges,' he said. Earlier this month, the Russian military test-fired a short-range anti-missile system, which successfully destroyed a simulated target at the designated time.'The launch was aimed at confirming the performance characteristics of missile defense shield anti-missiles operational in the Aerospace Defense Forces,' the Russian defense ministry said at the time. 
  •  
    Recall the report about a year ago of a U.S. naval destroyer in the Black Sea having its entire Aegis defense control system electronically disabled by a Russian jet that made a dozen or so low-level passes over the ship. 
Paul Merrell

Intel chief quits House for talk radio | TheHill - 0 views

  • The chairman of the House Intelligence Committee is leaving Congress for a career in talk radio.Rep. Mike Rogers (R-Mich.) said Friday he will not seek reelection in 2014, and will instead take a job as a syndicated talk radio host with Cumulus Radio.
  •  
    FBI's bribery investigation getting too close?
Paul Merrell

US "Easing Into" War with Syria Using ISIS Boogeyman | New Eastern Outlook - 0 views

  • he US is a few “accidental” airstrikes away from total war with Syria. The US is reportedly working with Turkey to provide militants inside of Syria with radios to call in US airstrikes to help in their “fight against ISIS.” Despite the obvious reality that these militants are in fact fighting alongside ISIS and are primarily fighting the Syrian Arab Army, and that such airstrikes are inevitably going to be called in on Syrian, not ISIS targets, the US is nonetheless attempting to assure the world this is not the case. The London Telegraph declared in its article, “Moderate Syrian rebels ‘to be given power to call in US air strikes’,” that: The US is planning to train some 5000 Syrian fighters a year under the plan as part of an effort to strengthen the fractured rebel movement against the government of President Bashar al-Assad and extremist groups.  The Wall Street Journal reported that the initial training would focus on helping rebels hold ground and resist fighters allied with the Islamic State in Iraq and the Levant (Isil). The Telegraph would also report: Four to six-man units will be equipped with rugged Toyota Hilux vehicles, GPS and radios so they can identify targets for airstrikesFirst appeared: http://journal-neo.org/2015/02/21/us-easing-into-war-with-syria-using-isis-boogeyman/
  • he US is a few “accidental” airstrikes away from total war with Syria. The US is reportedly working with Turkey to provide militants inside of Syria with radios to call in US airstrikes to help in their “fight against ISIS.” Despite the obvious reality that these militants are in fact fighting alongside ISIS and are primarily fighting the Syrian Arab Army, and that such airstrikes are inevitably going to be called in on Syrian, not ISIS targets, the US is nonetheless attempting to assure the world this is not the case. The London Telegraph declared in its article, “Moderate Syrian rebels ‘to be given power to call in US air strikes’,” that: The US is planning to train some 5000 Syrian fighters a year under the plan as part of an effort to strengthen the fractured rebel movement against the government of President Bashar al-Assad and extremist groups.  The Wall Street Journal reported that the initial training would focus on helping rebels hold ground and resist fighters allied with the Islamic State in Iraq and the Levant (Isil). The Telegraph would also report: Four to six-man units will be equipped with rugged Toyota Hilux vehicles, GPS and radios so they can identify targets for airstrikes.First appeared: http://journal-neo.org/2015/02/21/us-easing-into-war-with-syria-using-isis-boogeyman/
  •  
    Reading the entire article is recommended. Keep in mind that Balkanizing Iraq and Syria into four nations divided along religious lines has been a long-term goal of Israel.  
Gary Edwards

Freedom to Fascism - the movie - 0 views

  •  
    "Are you aware the money in your pocket is printed by a private bank? Are you aware the REAL ID law will require you to carry a national identification card? Are you aware that there are plans being developed to have all Americans embedded with a Radio Frequency Identification (RFID) computer chip under their skin so they can be tracked wherever they go? Are you aware the Supreme Court has ruled that the government has no authority to impose a direct unapportioned tax on the labor of the American people, and the 16th Amendment does not give the government that power? Are you aware that computer voting machines can be rigged and there is no way to ensure that vote is counted Our Friend and Hero, Aaron Russo Has Passed Esteemed filmmaker, ardent activist and loyal patriot Aaron Russo lost his battle to cancer on August 24, 2007 at the age of 64. Aaron will be profoundly missed but always remembered. He was a husband, father, friend, mentor, and inspiration to many. Aaron's long list of achievements includes his work in the areas of filmmaking and political activism. His documentary film, "America: From Freedom to Fascism", debunked the justification of both the IRS and the Federal Reserve as well as exposed their crooked basis. This movie received widespread acclaim, including opening to standing ovations at the Cannes Film Festival. Congressman Ron Paul was also featured in the documentary, in which he presents his views on the economy and the Federal Reserve. Aaron's work in the realm of activism proved to be invaluable and selfless. He will be perpetually revered as a true patriot and tireless fighter for our freedom. We must continue to venerate Aaron's legacy as we move forward by honoring his great words: "There are no boundaries one must adhere to when preserving one's liberty"."
Paul Merrell

Clintons Are Under Multiple FBI Investigations as Agents Are Stymied - 0 views

  • Current and former FBI officials have launched a media counter-offensive to engage head to head with the Clinton media machine and to throw off the shackles the Loretta Lynch Justice Department has used to stymie their multiple investigations into the Clinton pay-to-play network. Over the past weekend, former FBI Assistant Director and current CNN Senior Law Enforcement Analyst Tom Fuentes told viewers that “the FBI has an intensive investigation ongoing into the Clinton Foundation.” He said he had received this information from “senior officials” at the FBI, “several of them, in and out of the Bureau.” (See video clip from CNN below.) That information was further supported by an in-depth article last evening in the Wall Street Journal by Devlin Barrett. According to Barrett, the “probe of the foundation began more than a year ago to determine whether financial crimes or influence peddling occurred related to the charity.” Barrett’s article suggests that the Justice Department, which oversees the FBI, has attempted to circumvent the investigation. The new revelations lead to the appearance of wrongdoing on the part of U.S. Attorney General Loretta Lynch for secretly meeting with Bill Clinton on her plane on the tarmac of Phoenix Sky Harbor International Airport on the evening of June 28 of this year. Not only was Bill Clinton’s wife under an FBI investigation at the time over her use of a private email server in the basement of her New York home over which Top Secret material was transmitted while she was Secretary of State but his own charitable foundation was also under investigation, a fact that was unknown at the time to the public and the media.
  • The reports leaking out of the FBI over the weekend came on the heels of FBI Director James Comey sending a letter to members of Congress on Friday acknowledging that the investigation into the Hillary Clinton email server was not closed as he had previously testified to Congress, but had been reopened as a result of “pertinent” emails turning up. According to multiple media sources, those emails were found on the laptop of Anthony Weiner, estranged husband of Hillary Clinton’s longtime aide, Huma Abedin. Weiner was forced to resign from Congress in 2011 over a sexting scandal with more sexting scandals to follow. Early this month, on October 3, the FBI raided Weiner’s apartment in New York with a search warrant in hand and seized multiple electronic devices. At least one of those devices had been used by both Weiner and Abedin to send email messages. The search warrant had been obtained following a detailed report that had appeared in the Daily Mail newspaper in the U.K. in September, showing sordid, sexual emails that Weiner had allegedly sent to a 15-year old girl in North Carolina. According to the content of the published emails, Weiner was aware that the girl was underage. While examining the hard drive of a laptop seized from Weiner, the FBI found metadata showing that thousands of the emails were exchanged between the private server located in Hillary Clinton’s basement in Chappaqua, New York. Since the FBI had only a search warrant to examine emails and documents related to the Weiner matter, it was not able to read the other emails but simply tallied up the metadata linked to the private server in Chappaqua to show how many potentially new emails might be in the trove on the laptop. (It is also possible that the FBI agents could have used a program to compare subject headings against those emails previously turned over by Abedin to make their case that Abedin had perjured herself when she testified to them that she had turned over all of her work-related emails from her time as Deputy Chief of Staff for Operations when Hillary Clinton served as Secretary of State.)
  • The FBI officials briefed FBI Director James Comey last Thursday on the new trove of emails and he went public with his letter to Congress the next day – leading the Clinton camp to immediately launch a media assault on his motives. As if all of this wasn’t enough for the public to digest over the weekend, yesterday morning James Kallstrom, the former Assistant Director in Charge of the FBI’s New York Division and 25-year veteran of the FBI, went on the John Catsimatidis radio program to call the Clintons a “crime family.” (You can hear the full program here.) Kallstrom’s comments were further amplified when the New York Daily News reported on his criticisms that the FBI had been hamstrung from conducting a real investigation. The Daily News quoted Kallstrom from the radio program as follows: “ ‘This investigation was never a real investigation, they never had grand jury empaneled…This investigation was without the ability to serve subpoenas, serve search warrants, and obtain evidence … It was just ludicrous.’ ” On Wednesday of last week, just two days before FBI Director Comey issued his public letter to Congress, WikiLeaks released a devastating memo from Douglas Band, at the time a key figure at the Clinton Foundation and President of his own corporate consulting firm, Teneo. The memo was rife with suggestions of pay-to-play and personal enrichment schemes at the Clinton Foundation. The same day, Washington Post reporters Rosalind Helderman and Tom Hamburger reported the story, including the following details:
  • ...1 more annotation...
  • “The memo, made public Wednesday by the anti-secrecy group WikiLeaks, lays out the aggressive strategy behind lining up the consulting contracts and paid speaking engagements for Bill Clinton that added tens of millions of dollars to the family’s fortune, including during the years that Hillary Clinton led the State Department. It describes how Band helped run what he called ‘Bill Clinton Inc.,’ obtaining ‘in-kind services for the President and his family — for personal travel, hospitality, vacation and the like.’… Band wrote that Teneo partners had raised in excess of $8 million for the foundation and $3 million in paid speaking fees for Bill Clinton. He said he had secured contracts for the former president that would pay out $66 million over the subsequent nine years if the deals remained in place.” The memo was likely the final straw for the FBI agents and officials who had been thwarted by the Justice Department in mounting an aggressive investigation of the Clinton Foundation using the full FBI arsenal typically available like subpoenas, witness interviews and wiretaps. Given the weekend leaks, it now appears that the FBI understands that the only hope for a real investigation is to shine some much needed sunlight on how Loretta Lynch’s Justice Department cowers before politically powerful people.
Paul Merrell

Russian Parliament Calls For Inquiry Into US Media Outlets - 0 views

  • In a move designed to retaliate against efforts in Congress to start an investigation into Russian media outlet RT, the Russian State Duma has called for the information and telecommunication committee to launch its own investigation into US media outlets to see if they are violating Russian law in any way. The order singled out three outlets, Voice of America and Radio Free Europe, both run by the federal government, and CNN, which is owned by major US media outlet Time Warner. The order came at the behest of Konstantin Zatulin, from the ruling United Russia party, and he was quite clear this was a response to the moves against RT. While CNN is sort of a wild card in all of this, Voice of America and Radio Free Europe are roughly the American equivalent of RT, and were launched by the US government back during the Cold War specifically with an eye toward shifting international public opinion in a way favorable to the US, and unfavorable to the Soviet Union.
  • It’s unclear whether the Russian inquiry will go anywhere, though since it is overtly an attempt to retaliate, it will likely depend heavily on whether the US ends up doing anything against RT, and likely will just remain in motion as a threatened tit-for-tat move.
Gary Edwards

Conservatism and Talk Radio Iowa Winners - 0 views

  •  
    Meanwhile, back in the real world, the CNN entry/exit polling of Iowa caucus attendees demonstrates conclusively that Ron Paul ran away with the under 40 years of age vote! Does that mean that the conservative talk-show-troika, that tried to put the Libertarian darling into the dirt with their constant barrage of negative slams and pounding slurs, are baby boomer has beens? According to CNN, (one of troikite Mark Levin's favorite news orgs), Ron Paul won 48% of voters 17-29 yrs of age, and 26% of voters 30-44 yrs of age. In fact, RP swept all age brackets under 40 yrs. I been a daily Rush listener since 1989. Cant's take much of Sean Hannity, but have listened to every Mark Levin broadcast thanks to his pod cast. Had to shut off his show though when his recent guest host Mark Simone launched into the most disgusting and offensive assault on Ron Paul and Libertarians everywhere. Awful stuff. The truth is that, when threatened, Social conservatives can be just as rabid, offensive and demanding to wield the Constitution as cudgel to force individuals to live by their chosen values as the Socialist cabal they abhor. The distance between protecting your values from the clear and present danger of socialist attempts to outlaw conservative values, and using the Rule of Law yourself to similarly force your values on others seems to be a very short. So i choose the only "value" protected by the Constitution and Declaration of Independence: individual liberty, in the context of a system Mark Levin calls "ordered liberty", that promotes individual freedom and the God given right to life, liberty and the pursuit of happiness.
Paul Merrell

Remarks by Director David H. Petraeus at In-Q-Tel CEO Summit - Central Intelligence Agency - 0 views

  • In any event, our partnership with In-Q-Tel is essential to helping identify and deliver groundbreaking technologies with mission-critical applications to the CIA and to our partner agencies.
  • As you know, our Agency has a global charter to collect intelligence. It’s our job to ensure that challenges that arise in any corner of the world are not surprises to the President or to other policymakers. Certainly, we will continue relentlessly to pursue terrorists and support the troops in several different theaters. That is imperative, and the last year has seen considerable achievement in the fight against al-Qa‘ida and its affiliates. But, to use the kids’ soccer analogy, we cannot turn the counterterrorist fight into a game of magnetball, in which the leadership is always focused on the counterterror mission. Everyone can’t flock to the ball and lose sight of the rest of the field—the whole rest of the world. And it’s an enormous field to cover:  again, the whole world, with proliferation of weapons and technology, cyber threats, counterintelligence threats, the next developments in the evolution of the Arab Spring, Iran, North Korea, China, illegal narcotics, emerging powers, non-state organizations, and even lone wolves. Our duty is nothing less than to be on top of every potential foreign challenge and opportunity facing the United States—and we now have to do it without the steady budget growth we saw in the years after 9/11. And this is why my job is so intellectually stimulating.
  • First, given the digital transparency I just mentioned, we have to rethink our notions of identity and secrecy. In the digital world, data is everywhere, as you all know well. Data is created constantly, often unknowingly and without permission. Every byte left behind reveals information about location, habits, and, by extrapolation, intent and probable behavior. The number of data points that can be collected is virtually limitless—presenting, of course, both enormous intelligence opportunities and equally large counterintelligence challenges. We must, for example, figure out how to protect the identity of our officers who increasingly have a digital footprint from birth, given that proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come. Moreover, we have to figure out how to create the digital footprint for new identities for some officers. As you all know, exploiting the intelligence opportunities—which is an easier subject to discuss in an unclassified setting than the counterintelligence challenges—will require a new class of in-place and remote sensors that operate across the electromagnetic spectrum. Moreover, these sensors will be increasingly interconnected.
  • ...2 more annotations...
  • The current “Internet of PCs” will move, of course, toward an “Internet of Things”—of devices of all types—50 to 100 billion of which will be connected to the Internet by 2020. As you know, whereas machines in the 19th century learned to do, and those in the 20th century learned to think at a rudimentary level, in the 21st century, they are learning to perceive—to actually sense and respond. Key applications developed by our In-Q-Tel investment companies are focused on technologies that are driving the Internet of Things. These include: Item identification, or devices engaged in tagging; Sensors and wireless sensor networks—devices that indeed sense and respond; Embedded systems—those that think and evaluate; And, finally, nanotechnology, allowing these devices to be small enough to function virtually anywhere.
  • Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters—all connected to the next-generation Internet using abundant, low cost, and high-power computing—the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing. In practice, these technologies could lead to rapid integration of data from closed societies and provide near-continuous, persistent monitoring of virtually anywhere we choose. “Transformational” is an overused word, but I do believe it properly applies to these technologies, particularly to their effect on clandestine tradecraft. Taken together, these developments change our notions of secrecy and create innumerable challenges—as well as opportunities.
  •  
    I missed this gem before, from March 1, 2012. Speech by then-CIA chief Gen. David Patraeus to a group of reps. from ICT startups who are employed by CIA through its In-Q-Tel technology development non-profit corp. See https://www.iqt.org/about-iqt/ Patraeus announces that the Internet of Things (devices of all kinds) is becoming an intelligence target. And that boils down to everything from your clock radio to your home's climate control system and more becoming a potential intelligence source. If the CIA is investing in this, you can bit your bippy that NSA is too; Patraeus mentions that "partner agencies" are also receiving applications via the In-Q-Tel investments.  Finally, Patraeus also acknowledges that the intelligence mission extends far beyond counter-terrorism, offering some detail. So it seems that before the Snowden leaks his the press, the intelligence mission was not all about counter-terrorism.
Gary Edwards

Blog: Radio Host Mark Levin suggests the States call an Article Five Amendment Convention - 0 views

  •  
    The Wednesday July 10th, 2013 "Mark Levin" radio show was his best ever.  During the show he announced the August release of his new book, "The Liberty Amendments, Restoring the American Republic,"   Then he went on to explain what an Article V Amendment Convention is, and how the founding fathers intended it to be used, in the case of government tyranny, to save the American Republic.  That time is NOW! excellent show:
Paul Merrell

Eric Cantor's Opponent Beat Him By Calling Out GOP Corruption | - 0 views

  • “All of the investment banks, up in New York and D.C., they should have gone to jail.” That isn’t a quote from an Occupy Wall Street protester or Senator Elizabeth Warren. That’s a common campaign slogan repeated by Dave Brat, the Virginia college professor who scored one of the biggest political upsets in over a century by defeating Majority Leader Eric Cantor in the Republican primary last night. The national media is buzzing about Brat’s victory, but for all of the wrong reasons.
  • Did the Tea Party swoop in and help Brat, as many in the Democratic Party are suggesting? Actually, the Wall Street Journal reports no major Tea Party or anti-establishment GOP group spent funds to defeat Cantor. Did Cantor, the only Jewish Republican in Congress, lose because of his religion, as some have suggested? There’s no evidence so far of anti-Semitism during the campaign. Was Cantor caught flatfooted? Nope; Cantor’s campaign spent close to $1 million on the race and several outside advocacy groups, including the National Rifle Association, the National Realtors Association and the American Chemistry Council (a chemical industry lobbying association) came in and poured money into the district to defeat Brat. The New York Times claims that Brat focused his campaign primarily on immigration reform. Brat certainly made immigration a visible topic in his race, but Republic Report listened to several hours of Brat stump speeches and radio appearances, and that issue came up far less than what Brat called the main problem in government: corruption and cronyism. Brat told Internet radio host Flint Engelman that the “number one plank” in his campaign is “free markets.” Brat went on to explain, “Eric Cantor and the Republican leadership do not know what a free market is at all, and the clearest evidence of that is the financial crisis … When I say free markets, I mean no favoritism to K Street lobbyists.” Banks like Goldman Sachs were not fined for their role in the financial crisis — rather, they were rewarded with bailouts, Brat has said.
  • rat, who has identified with maverick GOP lawmakers like Representative Justin Amash of Michigan, spent much of the campaign slamming both parties for being in the pocket of “Wall Street crooks” and D.C. insiders. The folks who caused the financial crisis, Brat says, “went onto Obama’s rolodex, the Republican leadership, Eric’s rolodex.” During several campaign appearances, Brat says what upset him the most about Cantor was his role in gutting the last attempt at congressional ethics reform. “If you want to find out the smoking gun in this campaign,” Brat told Engelman, “just go Google and type the STOCK Act and CNN and Eric Cantor.” (On Twitter, Brat has praised the conservative author Peter Schweizer, whose work on congressional corruption forced lawmakers into action on the STOCK Act.) The STOCK Act, a bill to crack down on insider trading, was significantly watered down by Cantor in early 2012. The lawmaker took out provisions that would have forced Wall Street “political intelligence” firms to register as traditional lobbyists would, and removed a section of the bill to empower prosecutors to go after public officials who illegally trade on insider knowledge. And Brat may be right to charge that Cantor’s moves on the STOCK Act were motivated by self interest. Cantor played a leading role in blocking legislation to fix the foreclosure crisis while his wife and his stock portfolio were deeply invested in mortgage banks.
  • ...2 more annotations...
  • Most self-described Tea Party Republicans, including Rand Paul and Ted Cruz, have railed against Washington in a general sense without calling out the powerful – often Republican-leaning — groups that wield the most power. Not Brat. “Eric is running on Chamber of Commerce and Business Roundtable principles,” Brat told a town hall audience, later clarifying that he meant the U.S. Chamber of Commerce, the largest lobbying trade group in the country. He also called out the American Chemistry Council for funding ads in his race with Cantor, telling a radio host that his opponent had asked his “crony capitalist friends to run more ads.” Brat repeats his mantra: “I’m not against business. I’m against big business in bed with big government.” Indeed, Cantor has been a close ally to top lobbyists and the financial industry. “Many lobbyists on K Street whose clients include major financial institutions consider Cantor a go to member in leadership on policy debates, including overhauling the mortgage finance market, extending the government backstop for terrorism insurance, how Wall Street should be taxed and flood insurance,” noted Politico following Cantor’s loss last night. In 2011, Cantor was caught on video promising a group of commodity speculators that he would roll back regulations on their industry. 
  • There are many lessons to be learned from the Cantor-Brat race. For one, it’s worth reflecting on the fact that not only did Cantor easily out raise and outspend Brat by over $5 million to around $200,000 in campaign funds, but burned through a significant amount on lavish travel and entertainment instead of election advocacy. Federal Election Commission records show Cantor’s PAC spent at least $168,637 on steakhouses, $116,668 on luxury hotels (including a $17,903 charge to the Beverly Hills Hotel & Bungalows) and nearly a quarter million on airfare (with about $140,000 in chartered flights) — just in the last year and a half! But on the policy issues and political ramifications of this race, it’s not easy to box Brat into a neat caricature of an anti-immigration zealot or Tea Party demagogue, or, in TIME’s hasty reporting, a “shopworn conservative boilerplate.” If Brat ascends to Congress, which is quite likely given the Republican-leaning district that he’ll run in as the GOP nominee, he may actually continue taking on powerful elites in Washington.  
  •  
    The Cantor defeat was not a Tea Party upset victory as claimed by MSM, according to this article. Instead, Brat's stump speeches were about crony capitalism, bankster corruption of Congress, and libertarian principles. So if this article is correct, then MSM would rather claim that Cantor was a victim of the Tea Party than acknowledge the issues that Brat actually raised, Congressional corruption and big government/big corporation cronyism.  Very interesting food for thought.
Paul Merrell

Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global ... - 0 views

  • One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens  all without a court order or judicial warrant.
  • The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
  • GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
  • ...3 more annotations...
  • GCHQ vacuums up the website browsing histories using “probes” that tap into the international fiber-optic cables that transport Internet traffic across the world. A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events”  a term the agency uses to refer to metadata records  with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held  41 percent  was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it saidwould be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.” HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
  • The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
Paul Merrell

Syria: US Success Would Only Be the End of the Beginning | nsnbc international - 0 views

  • An October 7, 2015 hearing before the US Senate Committee on Armed Forces (SASC) titled, “Iranian Influence in Iraq and the Case of Camp Liberty,” served as a reaffirmation of America’s commitment to back the terrorist organization Mujahedeen e-Khalq (MEK) and specifically 2,400 members of the organization being harbored on a former US military base in Iraq.
  • Providing testimony was former US Senator Joseph I. Lieberman, former US Marine Corps Commandant and former Supreme Allied Commander Europe General James Jones, USMC (Ret.), and Colonel Wesley Martin, US Army (Ret.). All three witnesses made passionate pleas before a room full of nodding senators for America to continue backing not only MEK terrorists currently harbored on a former US military base in Iraq, but to back groups like MEK inside of Iran itself to threaten the very survival of the government in Tehran. In the opening remarks by Lieberman, he stated: It was not only right and just that we took them off the foreign terrorist organization list, but the truth is now that we ought to be supportive of them and others in opposition to the government in Iran more than we have been.
  • Lieberman would also state (emphasis added): Here’s my point Mr. Chairman, we ought to compartmentalize that agreement also, that nuclear agreement. We ought to put it over there, and not let it stop us from confronting what they’re doing in Syria. Continuing the sanctions for human rights violations in Iran in support of terrorism. And here’s the point I want to make about the National Council of Resistance of Iran and other democratic opposition groups that are Iranian – we ought to be supporting them.  This regime in Tehran is hopeless. It’s not going to change. There’s no evidence … every piece of evidence says the contrary. So I hope we can find a way, we used to do this not so long ago, supporting opposition groups in Iran. They deserve our support, and actually they would constitute a form of pressure on the government in Tehran that would unsettle them as much as anything else we could do because it would threaten the survival of the regime which from every objective indicator I can see is a very unpopular regime in Iran.  The United States, unrepentant regarding the arc of chaos, mass murder, terrorism, civilizational destruction it has created stretching from Libya to Syria, now seeks openly to extend it further into Iran using precisely the same tactics – the use of terrorist proxies – to dismantle and destroy Iranian society.
  • ...6 more annotations...
  • MEK has carried out decades of brutal terrorist attacks, assassinations, and espionage against the Iranian government and its people, as well as targeting Americans including the attempted kidnapping of US Ambassador Douglas MacArthur II, the attempted assassination of USAF Brigadier General Harold Price, the successful assassination of Lieutenant Colonel Louis Lee Hawkins, the double assassinations of Colonel Paul Shaffer and Lieutenant Colonel Jack Turner, and the successful ambush and killing of American Rockwell International employees William Cottrell, Donald Smith, and Robert Krongard. Admissions to the deaths of the Rockwell International employees can be found within a report written by former US State Department and Department of Defense official Lincoln Bloomfield Jr. on behalf of the lobbying firm Akin Gump in an attempt to dismiss concerns over MEK’s violent past and how it connects to its current campaign of armed terror – a testament to the depths of depravity from which Washington and London lobbyists operate. To this day MEK terrorists have been carrying out attacks inside of Iran killing political opponents, attacking civilian targets, as well as carrying out the US-Israeli program of targeting and assassinating Iranian scientists. MEK terrorists are also suspected of handling patsies in recent false flag operations carried out in India, Georgia, and Thailand, which have been ham-handedly blamed on the Iranian government.
  • MEK is described by Council on Foreign Relations Senior Fellow Ray Takeyh as a “cult-like organization” with “totalitarian tendencies.” While Takeyh fails to expand on what he meant by “cult-like” and “totalitarian,” an interview with US State Department-run Radio Free Europe-Radio Liberty reported that a MEK Camp Ashraf escapee claimed the terrorist organization bans marriage, using radios, the Internet, and holds many members against their will with the threat of death if ever they are caught attempting to escape. Not once is any of this backstory mentioned in the testimony of any of the witnesses before the senate hearing, defiling the memories of those who have been murdered and otherwise victimized by this terrorist organization. The de-listing of MEK in 2012 as a foreign terrorist organization by the US State Department is another indictment of the utter lack of principles the US clearly hides behind rather than in any way upholds as a matter of executing foreign policy.
  • MEK has already afforded the US the ability to wage a low-intensity conflict with Iran. MEK’s role in doing so was eagerly discussed in 2009, several years before it was even de-listed as a terrorist organization by the US State Department in the Brooking Institution’s policy paper “Which Path to Persia? Options for a New American Strategy Toward Iran” (PDF). The report stated (emphasis added): Perhaps the most prominent (and certainly the most controversial) opposition group that has attracted attention as a potential U.S. proxy is the NCRI (National Council of Resistance of Iran), the political movement established by the MEK (Mujahedin-e Khalq). Critics believe the group to be undemocratic and unpopular, and indeed anti-American.
  • In contrast, the group’s champions contend that the movement’s long-standing opposition to the Iranian regime and record of successful attacks on and intelligence-gathering operations against the regime make it worthy of U.S. support. They also argue that the group is no longer anti-American and question the merit of earlier accusations. Raymond Tanter, one of the group’s supporters in the United States, contends that the MEK and the NCRI are allies for regime change in Tehran and also act as a useful proxy for gathering intelligence. The MEK’s greatest intelligence coup was the provision of intelligence in 2002 that led to the discovery of a secret site in Iran for enriching uranium.   Despite its defenders’ claims, the MEK remains on the U.S. government list of foreign terrorist organizations. In the 1970s, the group killed three U.S. officers and three civilian contractors in Iran. During the 1979-1980 hostage crisis, the group praised the decision to take America hostages and Elaine Sciolino reported that while group leaders publicly condemned the 9/11 attacks, within the group celebrations were widespread. Undeniably, the group has conducted terrorist attacks—often excused by the MEK’s advocates because they are directed against the Iranian government. For example, in 1981, the group bombed the headquarters of the Islamic Republic Party, which was then the clerical leadership’s main political organization, killing an estimated 70 senior officials. More recently, the group has claimed credit for over a dozen mortar attacks, assassinations, and other assaults on Iranian civilian and military targets between 1998 and 2001. At the very least, to work more closely with the group (at least in an overt manner), Washington would need to remove it from the list of foreign terrorist organizations.
  • Proof that Brookings’ policy paper was more than a mere theoretical exercise, in 2012 MEK would indeed be de-listed by the US State Department with support for the terrorist organization expanded. The fact that former senators and retired generals representing well-funded corporate think tanks even just this week are plotting to use MEK to overthrow the Iranian government should raise alarms that other criminality conspired within the pages of this policy paper may still well be in play. Lieberman himself suggests that proxy war and regime-change should proceed regardless of the so-called “nuclear deal” – with the 2009 Brookings report itself having stated that (emphasis added): …any military operation against Iran will likely be very unpopular around the world and require the proper international context—both to ensure the logistical support the operation would require and to minimize the blowback from it. The best way to minimize international opprobrium and maximize support (however, grudging or covert) is to strike only when there is a widespread conviction that the Iranians were given but then rejected a superb offer—one so good that only a regime determined to acquire nuclear weapons and acquire them for the wrong reasons would turn it down. Under those circumstances, the United States (or Israel) could portray its operations as taken in sorrow, not anger, and at least some in the international community would conclude that the Iranians “brought it on themselves” by refusing a very good deal.  Clearly, both Brookings in 2009, and Lieberman this week have conspired to use the so-called “Iranian Nuclear Deal” as cover for betrayal and regime change.
  • For those wondering why Russia has intervened in Syria in the matter that it has, it should be plainly obvious. The US has no intention to stop in Syria. With Iraq, Afghanistan, and Libya behind it, and Syria within its clutches, it is clear that Iran is next, and inevitably this global blitzkrieg will not stop until it reaches Moscow and Beijing. Even as the US adamantly denies the obvious – that is has intentionally created and is currently perpetuating Al Qaeda, the so-called “Islamic State,” and other terrorist groups in Syria, it is openly conspiring to use another army of terrorists against neighboring Iran, live before a US Senate hearing. Should the US succeed in Syria, it would not be the end of the conflict, but only the end of the beginning of a much wider world war.
Gary Edwards

DEMOCRATS  AGAINST  U. N.  AGENDA  21 - OK, So what is Agenda 21? And why sho... - 0 views

  •  
    "UN Agenda 21/Sustainable Development is implemented worldwide to inventory and control all land, all water, all minerals, all plants, all animals, all construction, all means of production, all information, and all human beings in the world.   INVENTORY AND CONTROL. Have you wondered where these terms 'sustainability' and 'smart growth' and 'high density urban mixed use development' came from?  Doesn't it seem like about 10 years ago you'd never heard of them and now everything seems to include these concepts?  Is that just a coincidence?  That every town and county and state and nation in the world would be changing their land use/planning codes and government policies to align themselves with...what? First, before I get going, I want to say that yes, I know it's a small world and it takes a village and we're all one planet etc.  I also know that we have a government of the people, by the people, and for the people, and that as cumbersome as that can be sometimes (Donald Rumsfeld said that the Chinese have it easy; they don't have to ask their people if they agree.  And Bush Junior said that it would be great to have a dictator as long as he was the dictator), we have a three branch government and the Bill of Rights, Constitution, and self-determination.  This is one of the reasons why people want to come to the US, right?  We don't have Tiananmen Square here, generally speaking (yes, I remember Kent State--not the same, and yes, an outrage.) So I'm not against making certain issues a priority, such as mindful energy use, alternative energy sponsorship, recycling/reuse, and sensitivity to all living creatures. But then you have UN Agenda 21.  What is it?  See our videos and radio shows at the bottom of this page (or search YouTube for Rosa Koire) or buy BEHIND THE GREEN MASK: U.N. Agenda 21 by Rosa Koire click here"
Gary Edwards

Podcasts | John Batchelor Show - 0 views

  •  
    Commercial free podcast of John Bathelor's daily radio broadcast.  Great interviews with interesting guests.  Kind of a Charlie Rose for conservative/libertarian Constitutionalists.  Lots of business, technology and world events coverage.  
Gary Edwards

25 Facts That The Mainstream Media Doesn't Really Want To Talk About - BlackListedNews.com - 1 views

  •  
    Excellent list!  Also check out "Who Owns the Media?" http://goo.gl/O18r excerpt: "For decades, the mainstream media in the United States was accustomed to being able to tell the American people what to think.  Unfortunately for them, a whole lot of Americans are starting to break free from that paradigm and think for themselves.  A Gallup survey from earlier this year found that 60 percent of all Americans "have little or no trust" in the mainstream media.  More people than ever are realizing that the mainstream media is giving them a very distorted version of "the truth" and they are increasingly seeking out alternative sources of information.  In the United States today, just six giant media corporationscontrol the mainstream media.  Those giant media corporations own television networks, cable channels, movie studios, radio stations, newspapers, magazines, publishing houses, music labels and even many prominent websites.  But now thanks to the Internet the mainstream media no longer has a complete monopoly on the news.  In recent years the "alternative media" has exploded in popularity.  People want to hear about the things that the mainstream media doesn't really want to talk about.  They want to hear news that is not filtered by corporate bosses and government censors.  They want "the truth" and they know that they are not getting it from the mainstream media. We are watching a media revolution happen, and many in the mainstream media are totally freaking out about it.  In fact, some in the mainstream media have even begun publishing articles that mock the American people for not trusting them. " Anyone that does not acknowledge that the mainstream media has an agenda is not being honest with themselves.  The mainstream media presents a view of the world that is very favorable to their big corporate owners and the big corporations that spend billions of dollars to advertise on their networks.  The mainstream media is the mo
1 - 20 of 119 Next › Last »
Showing 20 items per page