espionage

NSA Boundless Informant explicated - for moar efficient flat databases of all yr phone records

Just had to crosspost this relatively down-to-earth explanation of how all the cell phone data is hoarded in the NSA mass data mining system. What this lacks in documentation it makes up for with relative plausibility & general lack of fancifulness.
SOURCE: Cryptome.org : http://cryptome.org/2013/11/nsa-boundless-informant-explicated.htm

25 November 2013

NSA BOUNDLESS INFORMANT Explicated


Date: Mon, 25 Nov 2013 15:37:33 -0800 (PST)
From: xxxxx[at]efn.org
To: cryptome[at]earthlink.net
Subject: A very interesting forum post on electrospaces

This was written from a person who purports to actually use the Boundless Informant tool. The email address is fake of course, but it sounds both knowledgeable and credible.

If the source is genuine, it provides considerable insight into the use and capabilities of the tool. It seems to do a lot more than we've seen so far, including the ability to see individual call detail records.

It also gives us clues to how mobile interception is accomplished.

http://electrospaces.blogspot.com/2013/11/screenshots-from-boundlessinformant-
can.html

http://www.blogger.com/comment.g?blogID=4559002410879446409&postID=
2273467319728111778&isPopup=true

---------------------------

Anonymous jbond@MI5.mil.gov.uk said...

I'm seeing a great deal of confusion out there about NSA databases and how reports are generated from their architecture. Here is how it works:

Let's begin with rows and columns making up a matrix, variously called a table, array, grid, flatfile database, or spreadsheet. In the database world, rows are called records, columns are called fields, and the individual boxes specified by row and column coordinates -- which hold the actual data -- are called cells.

For cell phone metadata, each call generates one record. NSA currently collects 13 fields for that call, such as To, From, IMEI, IMSI, Time, Location, CountryOrigin, Packet etc etc, primarily from small Boeing DRTBOXs placed on or near cell towers.

Because metadata from a single call can be intercepted multiple times along its path, generating duplicative records, NSA runs an ingest filtering tool to reduce redundancy, which is possible but not trivial because metadata acquisitions may not be entirely identical (eg timing). After this refinement, one call = one metadata record = one row x 13 columns in the BOUNDLESS INFORMANT's matrix.

Cell phone metadata is structured, unlike content (he said she said). However, as collected from various provider SIGADs, it is not cleanly or consistently structured -- see the messy example at wikipedia IMSI. So another refinement is needed: NSA programmers write many small extractors to get the metadata out of its various native protocols into the uniformly formatted taut database fields that it wants.

After all this, for a hundred calls, a metadata database such as BOUNDLESS INFORMANT consists of 100 records and 13 fields so 100 x 13 = 1300 cells. A counting field (all 1's) and consecutive serial numbers (indexing field) for each record may be added to facilitate report generation and linkage to other databases, see below.

-1- The first point of confusion is between BOUNDLESS INFORMANT as a flatfile database (we've never seen a single row, column or cell of it) and the one-page summary reports that can be generated using BOUNDLESS INFORMANT as the driving database (eg, the Norway slide).

These BOUNDLESS INFORMANT reports give the number of records (rows) in the table after various filters have been applied (eg country, 1EF = one end foreign, specified month, DNR type, intercept technology used, legal authority cited FISA vs FAA vs EO 12333).

BOUNDLESS INFORMANT does NOT report the number of cells nor gigabytes of storage taken up. It easily could, but it doesn't. Instead, it reports the main object of interest: the number of calls, after some filtering scheme has been applied.

-2- The second point of confusion arises over database viewing options. Myself, I like scrolling down row after row, page after page, plain black text in 8 pt courier font, lots of records per screen, thin lines separating cells, no html tables. A lot of people don't.

So a cottage industry has evolved around generating pretty monitor displays, web pages, and ppts from databases; these typically display one record per screen. All database views are equivalent: given a presentation, you can recover the database; given the database, you can make the pretty user interface.

Views are dressed up injecting the data fields into a fixed but fancy template (eg dept of motor vehicles putting your picture field into an antique wood frame and your name field into drop-shadow text). Nothing but a warmed-over version of spewing out form letters by mail-merging an address database into a letter template.

We've not seen *any* view of BOUNDLESS INFORMANT records to date, only summary reports it has generated. You cannot recover the underlying database from a few summary reports, only information about the number of records and a few of the 13 fields.

November 25, 2013 at 2:34 PM

Anonymous jbond@MI5.mil.gov.uk said...

-3- The third point of confusion: a given database like BOUNDLESS INFORMANT is capable of self-generating many summary reports about itself. Summary reports can have views too -- injections into templates. We've seen 3 of them for BOUNDLESS INFORMANT, Aggregate, DNI and DNR.

Databases can be sorted, according to the values in any column. For example, if NSA sorted by IMSI, that would pull together all the call records made from a particular cell phone with that id. Using the counting field, allowing the activity of each phone to be tallied. Or they could sort to pull up the least active phones-- to identify the user who tosses her 'burner' phones in the trash after one use.

Databases can be restricted. If NSA wanted to count the number of distinct cell phone calls during a given month that originated in Norway and terminated abroad (1EF one end foreign), it can restrict the records to the relevant time and location fields, masking out the others. They could compress each cell phone to a single line and count rows to get summary data on the number of phones doing 1EF. That summary data could be injected into a template for a BOUNDLESS INFORMANT slide.

Databases can be queried (tasked) to pull out only those records satisfying some string of selector logic. For example, you could submit a FOIA request to NSA in the form of a query that consisted of your selectors and a database like BOUNDLESS INFORMANT to see what call metadata they have on you in storage.

Here you would be wise to request simple output (rows of plain text with column values separated by commas,CSV format), to keep file size down. Then you could make your own mail-merge templates and spew out colorful BOUNDLESS INFORMANT graphs and reports about yourself, or just use the default templates provided by Excel.

November 25, 2013 at 2:36 PM

Anonymous jbond@MI5.gov.uk said...

-4- Next up on confusion, relational databases. NSA maintains hundreds of separate flatfile databases that might however share a field or two in common, for example someone texting, google searching, or shopping as well as making phone calls with with a given phone, the number or IMSI being the common field.

Those other activities involve different fields from those already in BOUNDLESS INFORMANT, such as your login to eBay or search term text instead of email subject line.

It could all be put into BOUNDLESS INFORMANT by expanding the number of fields. However this doesn't scale very well : it results in the voice call fields being massively blank for an IMSI making lots of google searches, creating a huge sparse table that is very slow to process, wasting analysts time (called high latency by NSA).

Instead, BOUNDLESS INFORMANT will just link to all the other databases which share a field. And those in turn could link to other simple databases sharing some other field that BOUNDLESS INFORMANT might lack. And so on -- it's how all the little constituent databases can be seamlessly integrated..

A query now calls through to this whole federation of linked databases, which can reside geographically anywhere on the Five Eyes network (though NSA is moving to one stop shopping from their Bluffdale cloud to improve security and reduce latency).

The primary provider of relational database software of this complexity is Oracle. However you can do about all of it free and friendly with open source MySQL. The Q is for querying -- what NSA calls tasking -- sending off some long-winded boolean logic string of field selector values and constituent databases that does the filtering you want.

The result of the query is a new little database, usually temporary, that you can use to generate fancy views and summary reports. The databases being updated continuously and storage retention varying, the same query tomorrow will give a slightly different outcome.

Your all-about-me FOIA request could be formulated in MySQL (first need to know names of linked databases) and surprisingly, the query string would be recognized and fulfilled by Oracle or whatever big relational database NSA ended up using/developing, it's that standardized.

If you're online or call a lot, that could still be a big file given 12 agencies keeping tabs, notably NSA, Homeland Security, and FBI's DITU. But if you wrote the query right, it would only take a small data center in the garage to host the response.

November 25, 2013 at 2:37 PM

9-11 FBI Foreknowledge Nibbles with Ali Soufan; Who is Rich Blee? and other recent new elements; Balkans, Cacuasus, CIA-Al Qaeda Islamist joint ops in Central Asia, consistent policy of support for Islamic radicals

Ah so it's been a decade eh comrades? The skrewing over of emergency personnel has gone almost unnoticed. FDNY member on 9/11 Truth “I support you guys” | We Are Change -- some new stuff has been trickling out -- pretty solid stuff, at that. The glorious official narrative got its booster shot, but noticeably absent from the necro-political media spectacle were all those sickly and/or dead 9-11 first responders. Over time we find more elements that are obviously pretty credible against the official narrative, but it's still difficult to get a larger picture. Let's nosh on some new goodies -- what better time than now?

Ali Soufan describes the situation behind the scenes with the FBI and 9-11 foreknowledge as well as the torture nightmare going on.... obviously Soufan was able to get better intel from captured militants by persuasion than cruel & unusual coercion, but what else is new?

CIA Threats of Federal Prosecution Delay 9/11 Documentary | 911 Truth News - this newly unearthed Rich Blee figure is one of the latest twists on the 9-11 CIA front. This is the project which the Richard Clarke speculation about hoping to flip al-Hazmi and al-Mihdhar to the CIA was the reason their identities were buried... however that also doesn't track entirely because they were already in touch with another government operative or 2 (an FBI informant and a likely Saudi government operative)

I'm posting the whole bit as it's one of the more substantial elements in the scheme to surface lately.

*********

September 14, 2011

Author: Kyle Hence

Source: secrecykills.com

On Thursday, the CIA threatened the journalists behind Who Is Rich Blee? with possible federal prosecution if their investigative podcast reveals the names of two CIA analysts at the center of a pattern of obstruction and mishandling of intelligence that many feel would have stopped the 9/11 attacks.

Like FBI agent Ali Soufan and Lt. Col. Anthony Shaffer before them, the podcast team, including John Duffy and Ray Nowosielski, are being subjected to intimidation and censorship by government officials over blowing the whistle on the true story surrounding two alleged 9/11 hijackers, Nawaf al-Hazmi and Khalid al-Mihdhar.

The podcast originally scheduled for September 11th release presents a narrative of how three CIA analysts working under Richard Blee, the long unknown former head of CIA’s Bin Laden Station, deliberately misled their colleagues and withheld key intelligence from FBI and the White House regarding the presence of two known Al-Qaeda operatives in the U.S.

Four government investigations into CIA handling of pre-911 intelligence included personal details of the two CIA analysts and their actions. Nowosielski and Duffy deduced the identities of the two as yet unnamed CIA employees from internet research based on details provided from these and other open sources. When the producers used their full names in interviews, interviewees offered no correction. The CIA response provided the final confirmation.

In project updates posted at SecrecyKills.com the producers announced the delay of the podcast and posted background of a complicated case that involves dozens of violations of protocol, intimidation, and incidents of obstruction by the CIA, with the two yet named CIA analysts at the center of many of them.

Author and expert on the subject, Kevin Fenton, documents 35 such incidents between January 2000 and September 11th in his book, Disconnecting the Dots: How 9/11 Was Allowed to Happen.

Pulitzer-prize winner Lawrence Wright, interviewed for the podcast, told producers the actions of one of the unnamed CIA analysts still employed at CIA amounts to obstruction of justice in the FBI’s criminal investigation of the deaths of 17 seaman aboard the USS Cole.

The producers are not the first subject to government censorship over this case. Last month The New York Times reported on CIA efforts to censor an autobiography by Ali Soufan, a front-line FBI counter-terrorism special agent. Prior to 9/11, Soufan was interested in Mihdhar and Hazmi because of links to the bombing of the USS Cole in Yemen. The CIA censored references to a passport photo of Mihdhar the CIA had withheld from Soufan, despite three written requests.

Scott Shane of the New York Times reports today that, “Mr. Soufan accuses C.I.A. officials of deliberately withholding crucial documents and photographs of Qaeda operatives from the F.B.I. before Sept. 11, 2001, despite three written requests, and then later lying about it to the 9/11 Commission.”

Lt. Colonel Anthony Shaffer, interviewed for the podcast, was himself intimidated, demoted and smeared by the Pentagon after he came forward to the 9/11 Commission with details of how, on three occasions, unnamed DoD officials prevented his Able Danger operation from meeting with the FBI prior the attacks.

In 2000 the Able Danger data-mining program placed Mohammed Atta in a Brooklyn terrorist cell but had also placed Hazmi and Mihdhar in a San Diego cell, the epicenter of intrigue around Alec Station’s Rich Blee, Tom Wilshere and the two as yet unnamed subordinates who themselves repeatedly withheld intelligence from the FBI. Though Shaffer was interviewed by 9/11 Commission’s Director Philip Zelikow and staffer Dieter Snell, the Commission left any mention of Able Danger from its final report.

In the planned podcast, 9/11 Commission Chair Tom Kean is asked about a scant footnote to Chapter 6 of the 9/11 Report referring to an intelligence cable, seen by 50 at the CIA, but prevented from reaching the FBI. For Kean the incident was not a case of bungling or intel ‘stovepiping’: “Oh, it wasn’t careless oversight. It was purposeful. No question about that in mind. It was purposeful.”

Whereas Kean explains it as a penchant for secrecy, Richard Clarke, the former head of counter-terrorism at the Bush White House, goes farther suggesting malfeasance and the possibility of illegal CIA-led domestic spying activity. Comments by Clarke released in a video in August led to a formal statement from George Tenet, Cofer Black and Richard Blee, and a response from the producers.

“This was perhaps the closest U.S. intelligence got to foiling the 9/11 plot,” explains Nowosielski, “but instead of stopping the attack, the CIA stopped intel on two high-value targets from getting to the right people, repeatedly. And still the CIA protects the individuals responsible by intimidating those who simply want to know the truth behind a shocking and possibly criminal pattern of obstruction”

In an email Thursday the CIA warned Nowosielski he could be subject to prosecution under the Intelligence Identities Protection Act, a law intended to apply to government employees who violate their security clearance and never used to convict journalists.

The producer’s online response: “The Society of Professional Journalists’ code of ethics states that ‘journalists should be free of obligation to any interest other than the public’s right to know’ and should ‘be vigilant and courageous about holding those with power accountable.’ The day that journalists’ exposés of wrongdoing within government agencies require the approval of those government agencies before release, that is the day that transparency and accountability are lost.”

John Duffy and Ray Nowosielski, both graduates of Chicago’s Columbia College Film School, produced the critically acclaimed 2006 documentary “9/11: Press for Truth.”

***********

More developments on this line noted by Sibel Edmonds today. Finally, here is part three of the interview with Paul Thompson featuring hard-core covered-up goodies of Al Qaeda, covert geopolitics, Central Asia and protected operatives! Too Legit to Quit!!

This is Part 3 of our three-part one-of-a-kind interview series with author and researcher Paul Thompson. For additional background information please visit the complete 9/11 Timeline Investigative Project at HistoryCommons.Org.

Paul Thompson joins us to discuss one of the most blacked-out and censored aspects of Al-Qaeda-CIA connections: The partnership and alliance between the CIA and Al Qaeda and their joint operations in Central Asia, Balkans and Caucasus throughout the 1990’s. Mr. Thompson talks about Al-Qaeda’s Balkans operations, running training camps, money-laundering, and drug running networks in the region, Ayman Al-Zawahiri and his residence in Bulgaria in order to help manage the Al Qaeda effort in nearby Bosnia, the Al Qaeda cells in Chechnya and Azerbaijan, BCCI and more!

Big ups to James Corbett for the Boiling Frogs Post video about 9-11, the CIA & the Art of the Hangout - including the ready-preloaded "blame the Saudis" narrative.

Also commentary posted on the fun YT channel IranContraScumDid911: 9/11 Richard Clarke: The CIA Tried To Recruit The 'Hijackers' As Al-Qaeda Agents Before 9/11 - YouTube - pointing out there is some mix of CIA disinfo in this mix, to basically downplay the patsy dimension of it all. (i.e. Richard Clarke is not going to be candid about the actual level of patsy madness)

Frankly I think at this point it should be noted that George Tenet is just one of many intelligence establishment figures who are members of the Knights of Malta - a key authoritarian little nest of establishment weasels, probably more relevant to geopolitical happenings than, say, the Freemasons :)

2004: 9 11 Prior Knowledge Richard Clarke Testimony 3 28 2004 NBC - YouTube

Meanwhile other pins are poppin in the middle east: AFP: US risks being 'toxic' over Palestinian veto: Saudi prince - also Corbett on the mideast happenings.

Americans Need The Truth About 9/11 :   Information Clearing House News

Even Sen Graham sez WTF: Re-investigate 9/11? - Fox Business Video - Fox Business.....

Anyway that's all for now!

Pawlenty promotes Mossad plane crash/bombing operations vs Iran scientists & trashing internets with Stuxnet offensive computer operations

UPDATE Sunday Aug14: LOLSo long and thanks for all the mullet. Theory: TPaw was not supposed to brag about Mossad ops at the debate - lol his campaign is Over Like Clover in an Iowa pasture. Why not? :-D


Our former Governor Tim Pawlenty plays for the ruthless neo-Cheneyite role in a future Republican presidency by touting the covertly staged plane crashes of Russian scientists & also Stuxnet industrial machinery hacking (SCADA and industrial control hacking).

As usual the embrace of criminal thuggery goes over well with the great unwashed.

Pawlenty's embrace & promotion of this criminal stuff, Mossad covert ops in particular, won't really do him much good as he tips the hand too readily. Maybe it's some weird way of putting some nasty intelligence cadre on notice.

This also immediately reminded me of poor Senator Paul Wellstone, who like GOP voting-IT guru Mike Connell and others since, suffered an abrupt sketchy plane crash which put an end to their political & legal meddling.

It reminds me that Cheney ordered Pawlenty to run for governor in the 2002 cycle while the already-weak-looking Norm Coleman was placed into the race against Wellstone.

It's so heartening to see a new generation of fine professional conservative leaders using covert ops to kill people taking shape. Also more evidence that the entire electoral political system has been subsumed into the intelligence industry. Jesse Ventura surprised the CIA, Pawlenty pushes the outward side of an assassination campaign. Hard times, friends.

By Anon request: A few loose ends on foreign espionage networks on the United States, Chicago false flag risks, Mr Veitch checks out, and the 9/11 mini-nuke theory that's out of bounds!

Time to check in with the Big Weird!

I was requested by some anonymous person to post this. I don't personally conclude that 9-11 was triggered by Mini-Nukes but it's interesting that videos featuring a Russian guy with that view named Dimitri Khalezov are automatically blocked from upload on youtube. I confirmed this auto-censorship back in February & re-encoded a video to get it to stick here: YouTube - ‪911 WTC nuclear demolition Dimitri Khalezov part01‏. Here's his site: Welcome to the personal web site of Dimitri A. Khalezov & video_Dimitri_Khalezov_911thology_download_links.

So here is our mysterious random submission...

This is the truth: The WTC was destroyed by 3 underground thermo-nuclear explosions. They were detonated by the US government who used this as an excuse to lead the US and its allies into invading Afghanistan and Iraq. All these wars and deaths were based on a lie.

Goebbels: “If you tell a lie big enough and keep repeating it, people will eventually come to believe it.”

Will you help to tell the truth to the world?

www.mathaba.net/news/?x=625926

www.911-truth.net/

Be sure to watch the 26 part video there.

#4 is on the built-in nuclear demolition scheme of the WTC

www.911-truth.net/911_WTC_nuclear_demolition_Dimitri_Khalezov_part04.mp4

#14 in on Building 7, which collapsed even though no plane hit it.

www.911-truth.net/911_WTC_nuclear_demolition_Dimitri_Khalezov_part14.mp4

#24/25 is on the chronic radiation sickness of the WTC responders)

www.911-truth.net/911_WTC_nuclear_demolition_Dimitri_Khalezov_part24.mp4

www.911-truth.net/911_WTC_nuclear_demolition_Dimitri_Khalezov_part25.mp4

www.youtube.com/watch?v=sNh1Isb20tw&feature=player_embedded

careandwashingofthebrain.blogspot.com/2011/05/911-comparing-building-implosions.html

Again I am not subscribing to this theory but it might be worth considering.
They also sent a pretty solid story about Phil Giraldi's efforts to flush out Israeli intelligence networks penetrating the US political system. Phil Giraldi Spills Beans on Israeli Espionage in America | Veterans Today. A quote from Jim Dean, editor at VT:

And when a lot of our young aspiring counter intel people learn that our political system protects Israeli espionage here, they leave government service in disgust, as have many of our best FBI people. It’s a national disgrace. They sold your country out from under you folks. And to get it back, they will need to be hunted down and removed…all of them who have worked with the Israelis. The numbers are huge and the names involved are big. So its not going to be pretty. And if you haven’t figured it out already, they have tons of money, their own private intelligence resources, and they are not going out quietly. They have bet you will be the losers…and to date they have been correct.

Also a Giraldi presentation: Paying Off Israel’s Military Bills:

“The Israeli government is actively engaged in military and industrial espionage in the United States.” That was the conclusion of a Pentagon administrative judge in 2006. One very good reason why Israel should not receive billions of dollars in military assistance annually is its espionage against the United States. Israel, a Socialist country where government and business work hand in hand, has obtained significant advantage by systematically stealing American technology with both military and civilian applications. US-developed technology is then reverse engineered and used by the Israelis to support their own exports with considerably reduced research and development costs, giving them a huge advantage against foreign competitors. Sometimes, when the technology is military in nature and winds up in the hands of a US adversary, the consequences can be serious. Israel has sold advanced weapons systems to China that incorporated technology developed by American companies—including the Python-3 air-to-air missile and the Delilah cruise missile. There is evidence that Tel Aviv has also stolen Patriot missile avionics to incorporate into its own Arrow system and that it used US technology obtained in its Lavi fighter development program—which was funded by the US taxpayer to the tune of $1.5 billion—to help the Bejing government develop their own J-10 fighter.

The reality of Israeli spying is indisputable. Israel always features prominently in the annual FBI report called “Foreign Economic Collection and Industrial Espionage.” The 2005 report, for example, states:

“Israel has an active program to gather proprietary information within the United States. These collection activities are primarily directed at obtaining information on military systems and advanced computing applications that can be used in Israel’s sizable armaments industry.”

And also: Ex-CIA Phil Giraldi…The Proper Place for Americans | Veterans Today.

Our anonymous person added a link for this: Jimstonefreelance.com - Did the Dimona Dozen murder the Fukushima 50? & Goon Squad: 'Lucky' Larry's Chicago's Sears/Willis Tower Tenants are Moving out and it has an Asbestos Problem.

I don't really agree with the content at either of these, however there is an uptick in sketchiness & weird tea leaves for Chicago, so I hope that nothing bad befalls the good residents of the Windy City.

DC alternative journalist Wayne Madsen posted this back in April: April 14-15, 2011 -- UPDATE 1X. Sudden flurry of maritime lien activity in Chicago - Wayne Madsen Report

April 14-15, 2011 -- UPDATE 1X. Sudden flurry of maritime lien activity in Chicago
Maritime liens are filed on vessels for various reasons, including insuring cargo or for non-payment of stevedoring and other port fees. It is all fairly standard fare except for when a dozen or so Chicago and Illinois politicians and other officials file $100 million in maritime liens against the U.S. Department of Treasury.
WMR has discovered that although less than 100 maritime liens had been filed in Cook County since 1985, since March 28 of this year, 11 maritime liens have been filed in Cook County against the U.S. Treasury Department.
Such a development could be easily explained away, except when examining the names of the maritime lien filers in the order that they were filed. It is not known who some of the individuals are who filed the liens since March 28, but they are also listed:
W. Smith (unknown affiliation)Lisa Madigan (Attorney General of Illinois)C. Wallace (unknown affiliation)Richard Michael Daley (outgoing Mayor of Chicago)Chicago Police DepartmentThomas G. Byrne (Commissioner of the Chicago Streets & Sanitation Department; ex-Chicago Police Department)Catherine Hennessy (affiliation unknown, possibly Chicago Police Department)Pat Quinn (Governor of Illinois)Milton R. Sees (former Illinois Department of Transportation Secretary)Jesse White (Secretary of State of Illinois)Ernie Dannenberger (Director of Vehicle Service Department of the Illinois Secretary of State's office)
Filing maritime liens against the US Treasury Department might indicate the future movement of U.S. Navy and/or Coast Guard vessels into Chicago's ports. However, the question looms: As Rahm Emanuel prepares to take over as mayor of Chicago, why was there a sudden flurry of maritime liens filed by top city and state officials a few weeks after Emanuel captured the mayor's seat in the election? With 9/11 rogue Larry Silverstein owning the former Sears, now Willis, Tower; Sam Zell running the Chicago Tribune; Emanuel soon sitting in the mayor's office; and Chicago-based President Obama kicking off his re-election campaign, the seemingly innocent filing of liens may indicate that something else is afoot.
UPDATE 1: Although maritime liens represent a relatively specialized area of the law, the American Bar Association Journal from October 1957 stated in an article that a recognized maritime tax lien has priority over a federal tax lien. Maritime liens can also cover non-vessel property, including buildings.

Unfortunately Chicago is now slated for the G8/NATO summit in 2012, which will likely be another beta test for martial law in America hosted by FEMA, the Secret Service, and of course NORTHCOM (which will apply their shady contingency plans, USNORTHCOM CONPLAN 3501 / 3502 like they did at the 2008RNC & 2009 G20.) With Larry "pull it" Silverstein & Rahm Emanuel in the mix, things look chancy!

Charlie Veitch checks out of 9/11 skepticism: Another issue burbling up is the departure of one highly visible British lolcat, Charlie Veitch (part of the Love Police protest org), from 9-11 issues. Here's his video breaking off from the lolfleet. (reaction from Truthergirls was pretty good)

It's sort of odd for someone to oppose the 9-11 official story and then jump back aboard the fine ship HMS EstablishmentNarrative, but stranger things have happened. It prompted some people to conclude that either A) he's being tongue-in-cheek B) he's 'controlled opposition'. Here's one guy making a similar case earlier with hilarious narration - seems like BarbarianRebellion is a pretty solid dude.

It's too bad, I have followed a bit of Charlie's views in recent months. We can hope that prominent individuals speaking out against various establishment agendas like Veitch and Alex Jones aren't controlled opposition, or provocateurs placed to send us awry. Unfortunately I have bumped into far too many FBI operatives in recent years to have a non-jaded opinion about anyone.... sail on with your unique blend of ornery British weird politics Charlie, and don't let the documentation against the official story faze you, I guess.

It reminds me a bit of Michael Ruppert, who got kind of fed up with diverging & assorted weird 9/11 stories, even though Crossing the Rubicon still stands as an exceptionally strong & critical work against the official narrative. I find it a bit funny when people set out on Conspiracy Patrol, deeming the hairiest theories (namely, mini nukes, holograms, and the ever popular Space Lazors) Out of Bounds, saying we must keep our 9/11 Truth inquiries into certain avenues. If there is a vast 9/11 coverup still rolling along, surely its establishment controllers must chuckle over the spats and in-fighting that all detract from "decolonizing" our minds entirely :)

There are many other concerns out there today besides an absurdly shady and complicated terrorist attack in New York a decade ago. However it is one of those barometers that you have to place people by... Perhaps South Park was right & the 9/11 conspiracy was itself a government conspiracy :) Used to funnel our concerns into divided dead ends & so forth.

Till next time, keep ya tinfoil tuned to Nibiru!

Two murky major elements of covert American power: The US Treasury Exchange Stabilization Fund (ESF) & the FBI's little "S Drive" of deleted filez

Truth trickles out a little bit at a time. People have to dig around diligently for stuff like this... then nasty patterns emerge. Here are two really nifty ones I spotted just recently. Nosh on this as you will...

Back in the Depression, the US Treasury Department got a mysterious office called the Exchange Stabilization Fund, which actually kickstarted the International Monetary Fund. It was funded initially with all the gold they jacked from the American public in the Gold Reserve Act of 1934, and specifically has just about zero oversight in law.

The case is made pretty clearly by Eric deCarbonnel / MarketSkeptics, rapidly tracing the history of a very overlooked, and very important player. The ESF has no oversight, it's the place the CIA has kept the credit card rolling all these years. The slush fund for National Security America's most corrupt endeavors? Maybe this comes back around to Leo Wanta and covert Treasury operations of the 1980s.

Why not? At this point....

Tons of old stories dug up in this impressive overview video set, with links : What I have been afraid to blog about: The ESF and Its History (Part 1-3) | Market Skeptics

image001.jpg

Look at all that American gold vanish :-P Now the ESF is full of billions of dollars of those damn IMF Special Drawing Rights (SDRs). image002.jpg

First saw this on Cryptogon: U.S. Treasury Exchange Stabilization Fund - Part 1 of 3. Even includes financial clues in the classic CIA covert domestic propaganda program, financing of the Voice of America / other assorted CIA wurlitzer media networks. Makes sense that something like the ESF is churning through everything... what's amazing is that as soon as the ESF started rolling, the value of the dollar. Really interesting.

And check YouTube - What I have been afraid to blog about: The ESF and Its History_Part 2 & YouTube - What I have been afraid to blog about: The ESF and Its History_Part 3. Also posted in April: YouTube - FRAUD: Federal Reserve Is Selling Put Options On Treasury Bonds To Drive Down Yields selling put options on debt!

Exchange Stabilization Fund and gold market manipulation // Exchange Stabilization Fund - Fedpoints - Federal Reserve Bank of New York // Exchange Stabilization Fund - Wikipedia

*************

Also: Hidden OKC evidence, Boiling Frogs Post goes into video: James Corbett is a pretty good guy for videos on various weird subjects, and does a good turn here with Coleen Rowley and Jesse Trentadue! The EyeOpener: Secret FBI Storage Drive to Shield Evidence from FOIA? Corbett thus is teaming up with Sibel Edmonds & Peter B Collins, we can expect a lot of interesting stuff from that crew wrkign together :)

Trentadue flushed out that they are probably using remote volumes on Oracle or something -- called the 'S Drive' like any horrible corporation would -- to hide data from discovery for defendants and plaintiffs (Trentadue's brother was killed in the OKC coverup). From Boiling Frogs:

A recent court case in Utah has uncovered yet more evidence that the FBI is hiding key documents from the public by placing them in a separate, hitherto unknown electronic storage medium known as an “S-drive.” The fact that this drive was previously unknown has raised the specter that the FBI is using it as a place to hide requests for sensitive documents through the Freedom of Information Act. Now, a federal judge has given the FBI until the end of the month to explain what the S-drive is, how it is being used, and whether it contains key documents related to the case in question.

Under the Freedom of Information Act, the FBI is not required to say if a document exists, only that they searched their database and found no records responsive to the request. If these documents are placed in an external or disconnected storage drive, however, the agency can insure that they will never show up in any FOIA request. In fact, the FBI has been known to have used this very technique in the past. Going under such names as “June files,” “zero files” and “I-drive,” the agency has a long and documented history of placing key evidence in special, compartmentalized files that are reviewed by senior officials before the information is placed into the bureau’s official files.

Joining James Corbett this week to discuss the history and significance of the FBI’s secret storage drives are attorney Jesse Trentadue and the former privacy act coordinator at the Minneapolis FBI field office and noted FBI whistleblower, Coleen Rowley.

We have been watching out for more Trentadue/OKC developments for a while, as well as Sibel's case of course. see :

New 1995 Oklahoma City bombing conspiracy video from BBC! GOP's Rohrabacher rebukes FBI for coverup?? // 2010 Oklahoma City Bombing Conspiracy Notes for April 19; Eric Holder's Trentadue Mission; SPLC Cutout @ Elohim City; CIA, National Geospatial Intelligence Agency roles // etc.

******

A couple final points: With pockets of secrecy at various levels like the FBI S Drive and the Treasury Department's 1934-present office of Cloak and Dagger Global Covert Finance - The Exchange Stabilization Fund -- both really drop into a key spots in the landscape!

I really think that looking at the post-1934 ESF in terms of covert ops, the Cold War, Bretton Woods and the OSS/CIA/IMF/Federal Reserve complex would really form a more complete sense of what really happened – and how the power's flowing now.

I'm a bit surprised to consider this idea that the 1934 Gold Reserve Act in some ways gutted the Federal Reserve, making its operations subordinate entirely to the executive branch, without checks.

Another esoteric point -- the gold certificates. You always hear something about gold bearer bonds floating in the weird realms of international finance and confusing web forums. Bonds drawn on US gold could be re-hypothecated -- I think that's the idea of people like Al Martin and Leo Wanta -- using these priceless, excellent financial instruments to spawn new ones on top of them. (earlier: The biggest scandal in world history; WANTAGATE, Leo Wanta, the post-Soviet trillions and lots of tangled disinfo from shady operatives (or not). A peculiar take on the 9-11 Wanta ESF/IMF gold skimming from Marcos in 1986 type connection is here. It's from Benjamin Fulford who I really don't trust at all, but is one of few people writing anything about stuff along these lines. A murky subject....

My gut feeling is that we have something coherently related with the ESF, and its logs would tell a great many tales.

It would suck if a bunch of weasels cashed out America's gold reserves using the gold bearer bonds and left us with nothing....

Special Guest Column! CIA Whistleblower Susan Lindauer on the Patriot Act: "When Truth Becomes Treason" - Thuggish National Security Coverup & Grand Jury Mechanisms for Iraq & 9-11

Screen shot 2011-05-24 at 8.24.34 PM.pngSweet: CIA Whistleblower & 9/11 covert ops witness sends an important essay for HongPong.com!

National Security Whistleblowers are a tough bunch. Susan Lindauer worked as a CIA asset for many years before 9-11, including issues related to Libya & the Lockerbie bombing, as well as a major backchannel contact to Saddam Hussein's government. Lindauer was one of very few Americans charged under the PATRIOT Act, accused of acting as an agent of influence for Iraq after she tried to blow the whistle on Capitol Hill.

Lindauer fought tenaciously to clear her name and assert in the US court system that she was in fact in the service of the CIA, working the Iraq embassy back into the 1990s, even as coverup specialist handlers like the corrupt Michael Mukasey tried to make sure she fell down the memory hole.

Prosecuted for years, the Obama/Holder DOJ finally dropped the charges against Lindauer and she wrote a book about her experiences, 'Extreme Prejudice: The Terrifying Story of the Patriot Act and the Cover Ups of 9/11 and Iraq' which I really want to read.

Lindauer has been touring the alternative media in the last couple months but she's pretty thoroughly blacked out of mainstream coverage. She noticed that I have posted links about her story to HongPong.com and asked me to publish the following essay. No problem and thanks for asking! :-D

Previous HongPong.com Coverage: More Fun Notes: LinkDump for May 9 2011, Big Bad Pharma, Loose Ends of 9/11 Revisited (May 9 2011) // LinkDump March 27 2011 - We looked into the fire and the fire looked back // Russia & China not buying BIS Fractional Reserve Gold currency scheme pushed by the Ben Bernank (Dec 28 2010).

She's hoping that alternative media can raise more awareness of the way the PATRIOT Act works in conjunction with secret grand juries to crush decent people inside the system, not save Amurrca From Turrurists. Additional info about the scuttled peace deal with Saddam and 9/11 CIA foreknowledge and Mossad "complicity" disclosed by her CIA handler Dr. Fuisz in particular tie right into other alternative narratives for 9/11 already out there. (My general conclusion is that several foreign/military-industrial intelligence networks were involved & this has been covered up thoroughly)

More Lindauer links: Great interview with Kevin Barrett should be listened to! // Susan Lindauer - Political Prisoner // Russia Today interview: 'War for Libyan oil planned long ago, no one cares about people'. She was on the inside of the Lockerbie false-flag coverup (it was a CIA hit on DIA using PFLP patsies to coverup drugz opz in Lebanon roughly). Susan Lindauer | Veterans Today columns. // Explosive Revelations From 9/11 Whistleblower Susan Lindauer on Pre 9/11 Warnings and the Iraq War | The Intel Hub Radio // The Lockerbie Case: American Cassandra - Susan Lindauer’s Story. Solid review by Michael Collins (who gets credit for drawing my interest): The Hornet's Nest Kicked Back - A Review of Susan Lindauer's Extreme Prejudice | The Agonist & more Collins stories: American Cassandra.

Anyhow enough preamble - let's read a first-person account of this Patriot Act crackdown against an operative who know too much and wouldn't stay on script.

***********

The Patriot Act: When Truth Becomes Treason

By Susan Lindauer, former Asset covering Iraq & Libya and the second non-Arab American indicted on the Patriot Act

Many Americans think they understand the dangers of the Patriot Act, which Congress has vowed to extend 4 more years in a vote later this week. Trust me when I say, Americans are not nearly frightened enough.Unfortunately, Bradley Manning is also subject to some of these rules, so it's important for his supporters to understand what's ahead.

Ever wonder why the truth about 9/11 never got exposed? Why Americans don't have a clue about leadership fraud surrounding the War on Terror? Why Americans don't know if the 9/11 investigation was really successful? Why the Iraqi Peace Option draws a blank? Somebody has known the whereabouts of Osama bin Laden--- or his grave—for the past 10 years. But nobody's talking to the people.

In significant part, that's because of the Patriot Act--- a law that equates free speech with sedition. It's got a big agenda, with 7,000 pages of Machiavellian code designed to interrupt individual questioning of government policy. In this brave new world, free speech under the Bill of Rights effectively has been declared a threat to government controls for maintaining stability. And the Patriot Act has become the premiere weapon to attack whistle blowers and dissidents who challenge the comfort of political leaders hiding inconvenient truths from the public. It's all the rage on Capitol Hill, as leaders strive to score TV ratings, while demogauging their "outstanding leadership performance" on everything from national security to environmental policy.

Truth has Become Treason

But wait---Congress assures us the Patriot Act only targets foreigners, who come to our shores seeking to destroy our way of life through violent, criminal acts. Good, law abiding Americans have nothing to fear. The Patriot Act restricts its powers of "roving wiretaps" and warrantless searches to international communications among "bad guys." Congress has sworn, with hand on heart, it's only purpose is breaking down terrorist cells and hunting out "lone wolf" mad men.

That's what they told you, right? And you believed them? You trust the government. Well, that was your first mistake. With regards to the Patriot Act, it's a fatal one. Would the government lie to you? You betcha! And they have.

The Patriot Act reaches far beyond terrorism prevention. In my home state of Maryland, State Police invoked the Patriot Act to run surveillance on the Chesapeake Climate Action Network dedicated to wind power, recycling and protection of the Chesapeake Bay. They infiltrated the DC Anti War Network, suggesting the group might be a front for "white supremacists," and Amnesty International, claiming to investigate "civil rights abuses." Opponents of the death penalty also got targeted (in case they got violent).

Bottom line: truth tellers who give Americans too much insight on any number of issues are vulnerable to a vast arsenal of judicial weapons typically associated with China or Mynamar. In the Patriot Act, the government has created a powerful tool to hunt out free thinking on the left or right. It doesn't discriminate. Anyone who opposes government policy is at risk

How do I know all this? Because I was the second non-Arab American ever indicted on the Patriot Act. My arrest defied all expectations about the law. I was no terrorist plotting to explode the Washington Monument. Quite the opposite, I had worked in anti-terrorism for almost a decade, covering Iraq and Libya, Yemen, Egypt and Malaysia at the United Nations. At the instruction of my CIA handler, I had delivered advance warnings about the 9/11 attack to the private staff of Attorney General John Ashcroft and the Office of Counter-Terrorism in August, 2001. FBI wire taps prove that I carried details of a comprehensive peace framework with Iraq up and down the hallowed corridors of Capitol Hill for months before the invasion, arguing that War was totally unnecessary.

I delivered those papers to Democrats and Republicans alike; to my own second cousin, White House Chief of Staff Andrew Card; and to Secretary of State Colin Powell, who lived next door to my CIA handler. Gratis of the Patriot Act, we had the manila envelope and my hand written notes to Secretary Powell, dated a week before his infamous speech at the United Nations. My papers argued that no WMDs would be found inside Iraq, and that the peace framework could achieve all U.S. objectives without firing a shot.

In short, I was an Asset who loudly opposed War with Iraq, and made every effort to correct the mistakes in assumptions on Capitol Hill.

Then I did the unthinkable. I phoned the offices of Senator Trent Lott and Senator John McCain, requesting to testify before a brand new, blue ribbon Commission investigating Pre-War Intelligence. Proud and confident of my efforts, I had no idea Congress was planning to blame "bad intelligence" for the unpopular War.

Over night I became Public Enemy Number One on Capitol Hill.

Thirty days later I awoke to hear FBI agents pounding on my door. My nightmare on the Patriot Act lasted 5 years--- Four years after my arrest, the Court granted me one morning of evidentiary testimony by two supremely credible witnesses. Parke Godfrey verified my 9/11 warnings under oath. Otherwise, I never got my day in Court.

The Patriot Act's Arsenal to Stop Free Speech

If you care about America and the traditions of freedom, whether you're progressive or conservative, you should be angry about this law.

First come the warrantless searches and FBI tracking surveillance. My work in anti-terrorism gave me no protection. I got my first warrantless search after meeting an undercover FBI agent to discuss my support for free elections in Iraq and my opposition to torture and sexual humiliation of Iraqi detainees. (Sorry guys, body wires don't lie.)

If truth tellers don't get the message to shut their mouths, the Justice Department ratchets up the pressure. Defendants face secret charges, secret evidence and secret grand jury testimony. Throughout five years of indictment, my attorneys and I never got to read a single FBI interview or grand jury statement. Under the Patriot Act, the whistleblower/defendant has no right to know who has accused him or her of what criminal activities, or the dates of the alleged offenses, or what laws got broken.

Of course, I was able to piece together my activities. I knew that "sometime in October, 2001" an Iraqi diplomat gave me the English translation of a book on depleted uranium, which showed how cancer rates and birth defects had spiked in Iraqi children.

And I was quite certain that on October 14, 1999, an Iraqi diplomat asked me how to channel major financial contributions to the Presidential Campaign of George Bush and Dick Cheney. The Justice Department got the date from me, since I reported my conversation immediately to my Defense Intelligence handler, Paul Hoven.

It's unlikely the grand jury knew that, since the Justice Department has the prerogative to keep a grand jury in the dark. In this brave new world, a grand jury can be compelled to consider indictments carrying 10 years or more in prison, without the right to review evidence, or otherwise determine whether an individual's actions rise to the level of criminal activity at all.

That's just the beginning. Once Congress scores an indictment against a political opponent, the Justice Department can force Defense attorneys to undergo protracted security clearances, while the whistle blower cum defendant waits in prison--- usually in solitary confinement or the SHU. After the security clearance, prosecutors have an ironclad right to bar attorneys from communicating communications from the prosecution to the defendant, on threat of disbarment, stiff fines or prison sentence.

Scared yet? Once you get to trial, the situation gets much worse. The Patriot Act declares that a prosecutor has no obligation to show evidence of criminal activity to a jury at all. And the Defense can be denied the right to argue a rebuttal to those secret charges, because it requires speculation that might mislead the jury—or might expose issues that the government considers, well, secret. After all that a Judge can instruct a jury that the prosecution regards the secret evidence as sufficient to merit conviction on the secret charges. The Jury can be barred from considering the lack of evidence in weighing whether to convict.

Think I'm exaggerating? You would be wrong. That's what happened to me. All of it—with one major glitch. All of this presumes the whistle blower's lucky enough to get a trial. I was denied mine, though I fought vigorously for my rights. Instead, citing the Patriot Act, I got thrown in prison on a Texas military base without so much as a hearing—and threatened with indefinite detention and forcible drugging, to boot.

Americans are not nearly afraid enough.

Neither is Congress. As of this week, members of Congress should be very afraid. Anyone who votes to extend the Patriot Act should expect to pack their bags in 2012. They will be targeted for defeat. Above all, the words "freedom" and "Constitution" will never appear in their campaigns without suffering extreme public scorn—never, ever again.

   --- END---

Susan Lindauer is the author of Extreme Prejudice: The Terrifying Story of the Patriot Act and the Cover Ups of 9/11 and Iraq, which reveals details of her CIA team's 9/11 warnings and a comprehensive peace option with Iraq.

Bin Laden Stage Left, End Of An Era - Birthers Deathers Truthers and things no longer to be questioned. Assange: Facebook built-in interface to intelligence agencies

Pay no attention, drink ya beer: As Food Stamp Recipients Hit New Record, 400 Americans Account For 10% Of Capital Gains. // "Death By Water", Or The Start Of A Fresh Flood Of bin Laden Conspiracy Theories? Yet even the most grounded can not help by ask: why not at least present his body briefly to the "free world" and then shoot him into outer space if necessary (for all those who buy the "no shrine" theory). Although at the end of the day, the mission is more than successful: the population has a brand new and truly enveloping distraction to keep its preoccupied with largely irrelevant, although very emotionally charged, issues for a long time.
Well put, ZeroHedge. Let's roll.
Lead off with lolcats from Taiwan, no reason not to:

Amusing Al Jazeera video clip from Abbottabad, this guy sez it's not true, a guy who wandered back n forth at the compound sez no way:

Everyone's favorite old Pakistani general Hamid Gul says it's all fake suckaz:


Good times with big fans of Events at the White House, with who else but Luke Rudkowski:

Cryptome has the ol roundup: Al Qaeda Files. Also: USA v. Usama bin Laden Trial Transcripts. NO TIME FOR TEH CONSPIRACYLOLS demands VANITYFAIR, home of Yellowcake and other dubious trial balloons. “Truthers,” “Birthers,” Osama’s Death, and the Tin-Foil-Hat Brigade. Someone who had the misfortune of actually being involved with this mess, Sibel Edmonds, laughs.
Here's one of those paper trail nibbles you need to forget about: Foreign intelligence operatives? Forget about it!suter-fbi.jpg

Seems like a good time to take a few steps back and look at the last few decades of shady nonsense. Time for a video anthology... Most of these videos are from thefilmarchive's Channel. Really nice!
CIA MK ULTRA documentary 1979 touches on the major bases: (Part 1 of same vid)

The Invisible Sword: Psychological Operations in the US Military: (1995)

Psychological Operations in Support of Internal Defense Programs (1968)


PART 2:

This old Soviet KGB mind control guru, Yuri Bezmenov, tells us a bit how they subvert ideology over decades, and laughs at how strategic Communist subversion has destroyed America!

This one's a gem, Sekrit film declassified CIA Corona Program - the beginning 1970s complete w. classification warning, spy satellites, horn rimmed clean room scientists at General Electric and funky music!

CIA Archives Counter-Intelligence Special Operations - Raids and Searches (1969)

Oliver North At Iran Contra Hearings Parts 1-4 (1987)




More on the hearings: YouTube - Kerry Sanders WTVT-Iran Contra Hearings 1987 Sen. Warren Rudman-R NH

Laos and the not-so-secret war among Thailand, Vietnam etc (2 parts)


Warren Rudman tees up this coverup thang known as Iran Contra (3 parts)

SOUND WEAPONS FOR COLLEGE STUDENTS: Our nation is swinging evar more towards a police state, wherein counter-terrorism resources are dedicated to crushing drunken college students in Illinois. I saw goons from this structure at the G20. 4mins: "They're bringing the weapons they use in Afghanistan to the American people as we speak". Correct sir. More info on RTR.

Just funny: YouTube - The Chicken of Tomorrow: Scientific Agriculture and Poultry Farming (1948)

Mr Veitch has an earned rant from AirStrip One:

More fun notes from the ever-popular establishment viewpoint: The Paranoid Style in American Politics is at it again. Even if Wikileaks Founder: Facebook is the most appalling spy machine that has ever been invented. Built in interfaces for US intelligence, bingo.

Fun 1950s gender role flick: The Bright Young Newcomer (1958):

McFarlane Part 1-3:



BLAME THE HIPPIES! Destroying America From Within: Brink of Disaster - 1960s Activism (1/2) (1972)

...Anyway this collection is hard to beat! Take that you Iran-Contra mind control weasels. :-P Make new legend, audience requires a Emanuel Goldstein re-up!

Statecraft Horrorshow! Wikileaks State Department Leakin Loose Top Sekrits PKK US sponsoring of terrorism to moaning about the French, what's next?

Ahk a quick link dump here. Wikileaks is expected to drop the big diplomatic cables starting with Der Spiegel . There's a new Wikileaks blog out there - Assange talked to some Arab reporters over videochat so apparently the fuzz hasn't gotten him yet. 2010-11-28: ARIJ Conference | WL Central . Livebloggin from teh france too ..

Maybe all launches here around 2200 GermanyTime? International - SPIEGEL ONLINE - Nachrichten

Wikileaks: The gathering storm - leaks leave US with few friends - Scotsman.com News

WikiLeaks And Its Brave New World - Radio Free Europe / Radio Liberty © 2010 - from the CIA

IB Times to publish papers on global corruption - nice framing :)

McClatchy - Diplomats bracing!

j|turn » Next Up: The “War on Journalism”? - crackdown time, you know they are seizing domains these days! RawStory - Homeland Security

For more info see RapGodfather.com! Watch out all yr DNS belong to Homeland Security New IPR Rap Forum Fusion Center! I gotta throw this in:

thugnificent-rapgodfather.jpg

It looks like PKK Turkish /Kurdish militants going to get spilled out. The long running Ergenekon Deep State Network and the likes of corrupt ex-State operative Marc Grossman exposed in all their perfidy? We could hope... But how many hilarious new drug conspiracies?

Australian - http://www.theaustralian.com.au/news/world/wikileaks-breaking-us-laws-over-documents-state-department-tells-julian-assange/story-e6frg6so-1225962292953?from=public_rss

BBC cautious nibbles

The UK D-Notice is a show all its own! Statecraft Horrorshow! Guido Fawkes blog with DNotice Email is Hilarious!

Sunday Telegraph UK Floats this Theory:

The Sunday Telegraph has learnt that the first tranche of documents, to be published in full tomorrow after an initial release tonight, are expected to feature "lively commentaries" by US diplomats on world leaders, including Nelson Mandela, Robert Mugabe, the Zimbabwean president, Hamid Karzai, the president of Afghanistan, and Libya's Colonel Muammar Gaddafi of Libya.

Coalition sources say Tuesday's haul will deal with North and South Korea, as well as Guantánamo Bay, while Wednesday's tranche will include comments on Pakistan and counter-piracy operations in Djibouti.

Thursday will see attention focus on the Canadians and their "inferiority complex" while corruption allegations in Afghanistan will be under the spotlight on Friday. Saturday will cover Yemen while next Sunday will see the focus shift to China.

Video: Alex Jones vs. Wikileaks. Why does Alex Jones attack Wikileaks? : conspiracy

MORE FUN STUFF for the moment....


Mish's Global Economic Trend Analysis: To Ireland With Love

Many countries researching Killer Robots.

Federal False Flag Somali Bombing "attempt" in Portland: Another great moment in synthetic terrorism NY Times official narrative.   / Feds: Sting snares man planning to bomb tree-lighting ceremony | KATU.com / YouTube - "F.B.I. Cultivated Him For 18 Months" //

PAREvolution.com has the goods from the Pennsylvania Security bulletin data. file = here // Ruffalo on terror watch list | Celebrities | Entertainment | Toronto Sun

lol pitchfork media

why not buy a mac?

Silence Jesse FeMACamp episode? Jesse Ventura’s “Police State” Episode featuring Alex Jones and “We Are Change” Edited out of existence at truTV | We Are Change / forum

Revolutionary Politics::Revolutionary Politics : BP oil spill incident commander dies in small plane crash in FL - More children from Gulf with health problems — “Big, gaping wounds all over feet and inside of elbows” (VIDEO) | Florida Oil Spill Law

A Double POMO Fed Quantitative Ceremonial Magic is scheduled too!

//////

As for this messy post, sorry - Data Dumps: The Bane of E-Discovery — Slaw :-D .... Let the Cables Begin!

Big Brother GPS tracking nets Epic Dissent from 9th Circuit Chief Judge - 1984 Here At Last!

There is something creepy and un-American about such clandestine and underhanded behavior. To those of us who have lived under a totalitarian regime, there is an eerie feeling of déjà vu. This case, if any, deserves the comprehensive, mature and diverse consideration that an en banc panel can provide. We are taking a giant leap into the unknown, and the consequences for ourselves and our children may be dire and irreversible. Some day, soon, we may wake up and find we're living in Oceania.
--Kozinski Chief LOLcat of the 9th Circuit

Via Chief Judge of 9th Circuit: “1984 here at last,” especially for poor. | Dailycensored.com -

So frequently these authoritarians schemes get one greenlight after another. This dissent nails down a wide variety of problems, from GPS spying to the distinct pattern of only appointing rich people with rich friends to the judiciary. This is a really nice dissent from Chief Judge Kozinski, who is regarded apparently as a bomb-throwing libertarian.

I'll post it in full, because we gotta pay some respect when one of these cats actually earns his paycheck.

******

VIA Laws, Life, and Legal Matters - Court Cases and Legal Information at Leagle.com - All Federal and State Appeals Court Cases in One Search

See also: Judges Divided Over Growing GPS Surveillance - NYTimes.com

U.S. v. PINEDA-MORENO

UNITED STATES OF AMERICA, Plaintiff-Appellee,
v.
JUAN PINEDA-MORENO, Defendant-Appellant.

No. 08-30385.

United States Court of Appeals, Ninth Circuit.

Filed August 12, 2010.

Before: Diarmuid F. O'Scannlain and N. Randy Smith, Circuit Judges, and Charles R. Wolle, Senior District Judge.[1 ]

Order; Dissent by Chief Judge Kozinski, Dissent by Judge Reinhardt.

The petition for rehearing en banc is DENIED.

ORDER

Judges O'Scannlain and N.R. Smith have voted to deny the petition for rehearing en banc, and Judge Wolle has so recommended.

The full court was advised of the petition for rehearing en banc. A judge requested a vote on whether to rehear the matter en banc, and the matter failed to receive a majority of the votes of the nonrecused active judges in favor of en banc consideration. Fed. R. App. P. 35.

Chief Judge KOZINSKI, with whom Judges REINHARDT, WARDLAW, PAEZ and BERZON join, dissenting from the denial of rehearing en banc:

Having previously decimated the protections the Fourth Amendment accords to the home itself, United States v.Lemus, 596 F.3d 512 (9th Cir. 2010) (Kozinski, C.J., dissenting from the denial of rehearing en banc); United Statesv. Black, 482 F.3d 1044 (9th Cir. 2007) (Kozinski, J., dissenting from the denial of rehearing en banc), our court now proceeds to dismantle the zone of privacy we enjoy in the home's curtilage and in public. The needs of law enforcement, to which my colleagues seem inclined to refuse nothing, are quickly making personal privacy a distant memory. 1984 may have come a bit later than predicted, but it's here at last.

The facts are disturbingly simple: Police snuck onto Pineda-Moreno's property in the dead of night and attached a GPS tracking device to the underside of his car. The device continuously recorded the car's location, allowing police to monitor all of Pineda-Moreno's movements without the need for visual surveillance. The panel holds that none of this implicates the Fourth Amendment, even though the government concedes that the car was in the curtilage of Pineda-Moreno's home at the time the police attached the tracking device. The panel twice errs in very significant and dangerous ways.

1. The opinion assumes that Pineda-Moreno's driveway was part of his home's curtilage, yet concludes that Pineda-Moreno had no reasonable expectation of privacy there. Curtilage is a quaint word most people are not familiar with; even among judges and lawyers, the word is seldom well understood. Yet, it stands for a very important concept because it rounds out the constitutional protections accorded an individual when he is at home.

Curtilage comes to us by way of Middle English and traces its roots to the Old French courtillage, roughly meaning court or little yard. In modern times it has come to mean those portions of a homeowner's property so closely associated with the home as to be considered part of it. The walkway leading from the street to the house is probably part of the curtilage, and the stairs from the walkway to the porch almost certainly are, as is the porch where grandma sits and rocks most afternoons and watches strangers pass by. The attached garage on the side of the house is part of the curtilage, and so is the detached shed where dad keeps his shop equipment and mom her gardening tools—so long as it's not too far from the house itself. The front lawn is part of the curtilage, and the driveway and the backyard—if it's not too big, and is properly separated from the open fields beyond the house.

Whether some portion of property—the porch, the stairs, the shed, the yard, the chicken coop—is part of the curtilage is sometimes a disputed question. But once it is determined that something is part of the curtilage, it's entitled to precisely the same Fourth Amendment protections as the home itself. How do we know? Because the Supreme Court has said so repeatedly.

In Oliver v. United States, the Court said as follows:

[O]nly the curtilage . . . warrants the Fourth Amendment protections that attach to the home. At common law, the curtilage is the area to which extends the intimate activity associated with the "sanctity of a man's home and the privacies of life," and therefore has been considered part of home itself for Fourth Amendment purposes. Thus, courts have extended Fourth Amendment protection to the curtilage.

466 U.S. 170, 180 (1984) (quoting Boyd v. United States, 116 U.S. 616, 630 (1886)) (emphasis added). Three years later, the Court reiterated the same view in United States v. Dunn, 480 U.S. 294, 300 (1987):

[In Oliver] we recognized that the Fourth Amendment protects the curtilage of a house and that the extent of the curtilage is determined by factors that bear upon whether an individual reasonably may expect that the area in question should be treated as the home itself.

(Emphasis added). See also Dow Chemical Co. v. United States, 476 U.S. 227, 231 (1986) (citing Oliver, 466 U.S. at 170). There's no disputing that the Court considers the curtilage to stand on the same footing as the home itself for purposes of the Fourth Amendment.

While it can be unclear whether a particular portion of the homeowner's property is part of the curtilage, there's no doubt here because the government concedes that Pineda-Moreno's driveway is a part of his curtilage, and the panel expressly assumes that it is. United States v. Pineda-Moreno, 591 F.3d 1212, 1214-15 (9th Cir. 2010). Having made that assumption, Oliver and Dunn require the panel to "treat[ ] [it] as the home itself." Dunn, 480 U.S. at 300. Instead, the panel holds that Pineda-Moreno was required to separately establish a reasonable expectation of privacy in the curtilage. That— according to Oliver and Dunn—is like requiring the homeowner to establish a reasonable expectation of privacy in his bedroom. We are often reminded that we must follow Supreme Court precedent, see, e.g., Winn v. Ariz. Christian Sch. Tuition Org., 586 F.3d 649, 658-59 (9th Cir. 2009) (O'Scannlain, J., dissenting from denial of rehearing en banc), but the panel here forgets this advice.

The panel does cite California v. Ciraolo, 476 U.S. 207 (1986), but that case undermines its position. Ciraolo held that a homeowner has no reasonable expectation of visual privacy in his property as to activities that might be seen from a low-flying airplane. The activity there in question— cultivation of marijuana—took place in the homeowner's yard, so the Court could have limited its discussion to the curtilage. Instead, Ciraolo quoted a passage from Katz v.United States, 389 US. 347, 361 (1967), to the effect that "a man's home is, for most purposes, a place where he expects privacy, but objects, activities, or statements that he exposes to the `plain view' of outsiders are not `protected' because no intention to keep them to himself has been exhibited." Ciraolo, 476 U.S. at 215 (quoting Katz,389 U.S. at 361). This passage applies equally to a person's yard as his porch and his bedroom window: If what you do in your home is visible to the public, you have no reasonable expectation that it will remain private. Ciraolo citesOliver and follows its analysis by treating the curtilage and the home as exactly the same for Fourth Amendment purposes.

The panel's rationale for concluding that Pineda-Moreno had no reasonable expectation of privacy is even more worrisome than its disregard of Supreme Court precedent: According to the panel, Pineda-Moreno's driveway was open to the public in that strangers wishing to reach the door of his trailer "to deliver the newspaper or to visit someone would have to go through the driveway to get to the house." Pineda-Moreno, 591 F.3d at 1215. But there are many parts of a person's property that are accessible to strangers for limited purposes: the mailman is entitled to open the gate and deposit mail in the front door slot; the gas man may come into the yard, go into the basement or look under the house to read the meter; the gardener goes all over the property, climbs trees, opens sheds, turns on the sprinkler and taps into the electrical outlets; the pool man, the cable guy, the telephone repair man, the garbage collector, the newspaper delivery boy (we should be so lucky) come onto the property to deliver their wares, perform maintenance or make repairs. This doesn't mean that we invite neighbors to use the pool, strangers to camp out on the lawn or police to snoop in the garage. See United States v. Hedrick, 922 F.2d 396, 400, 402 (7th Cir. 1991) (Cudahy, J., dissenting).

The panel authorizes police to do not only what invited strangers could, but also uninvited children—in this case crawl under the car to retrieve a ball and tinker with the undercarriage. But there's no limit to what neighborhood kids will do, given half a chance: They'll jump the fence, crawl under the porch, pick fruit from the trees, set fire to the cat and micturate on the azaleas. To say that the police may do on your property what urchins might do spells the end of Fourth Amendment protections for most people's curtilage.

The very rich will still be able to protect their privacy with the aid of electric gates, tall fences, security booths, remote cameras, motion sensors and roving patrols, but the vast majority of the 60 million people living in the Ninth Circuit will see their privacy materially diminished by the panel's ruling. Open driveways, unenclosed porches, basement doors left unlocked, back doors left ajar, yard gates left unlatched, garage doors that don't quite close, ladders propped up under an open window will all be considered invitations for police to sneak in on the theory that a neighborhood child might, in which case, the homeowner "would have no grounds to complain." Id.

There's been much talk about diversity on the bench, but there's one kind of diversity that doesn't exist: No truly poor people are appointed as federal judges, or as state judges for that matter. Judges, regardless of race, ethnicity or sex, are selected from the class of people who don't live in trailers or urban ghettos. The everyday problems of people who live in poverty are not close to our hearts and minds because that's not how we and our friends live. Yet poor people are entitled to privacy, even if they can't afford all the gadgets of the wealthy for ensuring it. Whatever else one may say about Pineda-Moreno, it's perfectly clear that he did not expect— and certainly did not consent—to have strangers prowl his property in the middle of the night and attach electronic tracking devices to the underside of his car. No one does.

When you glide your BMW into your underground garage or behind an electric gate, you don't need to worry that somebody might attach a tracking device to it while you sleep. But the Constitution doesn't prefer the rich over the poor; the man who parks his car next to his trailer is entitled to the same privacy and peace of mind as the man whose urban fortress is guarded by the Bel Air Patrol. The panel's breezy opinion is troubling on a number of grounds, not least among them its unselfconscious cultural elitism.

2. After concluding that entering onto Pineda-Moreno's property and attaching a tracking device to his car required no warrant, probable cause, founded suspicion or by-your-leave from the homeowner, the panel holds that downloading the data from the GPS device, which gave police the precise locus of all of Pineda-Moreno's movements, also was not a search, and so police can do it to anybody, anytime they feel like it. Contra United Statesv. Maynard, No. 08-3030, slip op. at 19 (D.C. Cir. Aug. 6, 2010). Our panel relies on United States v. Knotts, 460 U.S. 276 (1983), a case from the early 1980s, which involved very different technology.

The Knotts Court refers to the device used there as a "beeper" and describes it as "a radio transmitter, usually battery operated, which emits periodic signals that can be picked up by a radio receiver." Id. at 277. The beeper helped police follow a vehicle by emitting a signal that got stronger the closer the police were to it. The Court considered the beeper to be an aid to following a vehicle through traffic: "The governmental surveillance conducted by means of the beeper in this case amounted principally to the following of an automobile on public streets and highways." Id. at 281. Individuals traveling on streets and highways can be seen by the public, so they have no reasonable expectation that they won't be followed. The beeper helped the police follow the suspect more effectively—the way binoculars enhance the ability to see what is otherwise visible. But the beeper could perform no tracking on its own, nor could it record its location. If no one was close enough to pick up the signal, it was lost forever.

The electronic tracking devices used by the police in this case have little in common with the primitive devices inKnotts. One of the devices here used GPS satellites to pinpoint the car's location on a continuing basis—much like the electronic maps that are now popular in cars. The other type of device was, essentially, a cell phone that tracked the car's movements by its proximity to particular cell towers.

Beepers could help police keep vehicles in view when following them, or find them when they lost sight of them, but they still required at least one officer—and usually many more—to follow the suspect. The modern devices used in Pineda-Moreno's case can record the car's movements without human intervention—quietly, invisibly, with uncanny precision. A small law enforcement team can deploy a dozen, a hundred, a thousand such devices and keep track of their various movements by computer, with far less effort than was previously needed to follow a single vehicle. The devices create a permanent electronic record that can be compared, contrasted and coordinated to deduce all manner of private information about individuals. By holding that this kind of surveillance doesn't impair an individual's reasonable expectation of privacy, the panel hands the government the power to track the movements of every one of us, every day of our lives.

The Supreme Court has recognized that advances in "police technology [can] erode the privacy guaranteed by the Fourth Amendment." Kyllo v. United States, 533 U.S. 27, 34 (2001). To guard against this, courts "must take the long view, from the original meaning of the Fourth Amendment forward." Id. at 40. Kyllo followed a line of cases going back to United States v. Karo, 468 U.S. 705 (1984), Katz, 389 U.S. at 353, and Silverman v. United States,365 U.S. 505, 512 (1961), which stemmed the erosion of personal privacy wrought by technological advances.

In Kyllo, the Court held that use of a thermal imager to detect the heat emanating from defendant's home was a search for purposes of the Fourth Amendment because the then-new technology enabled police to detect what was going on inside the home—activities the homeowner was entitled to consider private. Any other conclusion, the Court noted, "would leave the homeowner at the mercy of advancing technology—including imaging technology that could discern all human activity in the home." Kyllo, 533 U.S. at 35-36 (citing Karo, 468 U.S. at 705). "While the technology used in the present case was relatively crude," the Court continued, "the rule we adopt must take account of more sophisticated systems that are already in use or in development." Id. at 36. In determining whether the tracking devices used in PinedaMoreno's case violate the Fourth Amendment's guarantee of personal privacy, we may not shut our eyes to the fact that they are just advance ripples to a tidal wave of technological assaults on our privacy.

If you have a cell phone in your pocket, then the government can watch you. Michael Isikoff, The Snitch in Your Pocket, Newsweek, Mar. 1, 2010, available at http:// www.newsweek.com/id/233916. At the government's request, the phone company will send out a signal to any cell phone connected to its network, and give the police its location. Last year, law enforcement agents pinged users of just one service provider—Sprint—over eight million times. SeeChristopher Soghoian, 8 Million Reasons for Real Surveillance Oversight, Slight Paranoia (Dec. 1, 2009) http://paranoia/dubfire. net/2009/12/8-million-reasons-for-real-surveillance.html. The volume of requests grew so large that the 110-member electronic surveillance team couldn't keep up, so Sprint automated the process by developing a web interface that gives agents direct access to users' location data. Id. Other cell phone service providers are not as forthcoming about this practice, so we can only guess how many millions of their customers get pinged by the police every year. See Justin Scheck, Stalkers Exploit Cellphone GPS, Wall St. J., Aug. 5, 2010, at A1, A14 (identifying AT&T and Verizon as providing "law-enforcement[ ] easy access to such data").

Use LoJack or OnStar? Someone's watching you too. E.g., OnStar Stolen Vehicle Assistance, http://www.onstar.com/ us_english/jsp/plans/sva.jsp (last visited July 17, 2010). And it's not just live tracking anymore. Private companies are starting to save location information to build databases that allow for hyper-targeted advertising. E.g., Andrew Heining, What's So Bad About the Google Street View Data Flap?, Christian Sci. Monitor, May 15, 2010, available at http://www.csmonitor.com/USA/2010/0515/What-s-sobad-about-the-Google-Str.... Companies are amassing huge, ready-made databases of where we've all been. If, as the panel holds, we have no privacy interest in where we go, then the government can mine these databases without a warrant, indeed without any suspicion whatsoever.

By tracking and recording the movements of millions of individuals the government can use computers to detect patterns and develop suspicions. It can also learn a great deal about us because where we go says much about who we are. Are Winston and Julia's cell phones together near a hotel a bit too often? Was Syme's OnStar near an STD clinic? Were Jones, Aaronson and Rutherford at that protest outside the White House? The FBI need no longer deploy agents to infiltrate groups it considers subversive; it can figure out where the groups hold meetings and ask the phone company for a list of cell phones near those locations.

The panel holds that the government can obtain this information without implicating the Fourth Amendment because an individual has no reasonable expectation of privacy in his movements through public spaces where he might be observed by an actual or hypothetical observer. But that's quite a leap from what the Supreme Court actually held inKnotts, which is that you have no expectation of privacy as against police who are conducting visual surveillance, albeit "augmenting the sensory faculties bestowed upon them at birth with such enhancements as science and technology afford[s] them." 460 U.S. at 282.

You can preserve your anonymity from prying eyes, even in public, by traveling at night, through heavy traffic, in crowds, by using a circuitous route, disguising your appearance, passing in and out of buildings and being careful not to be followed. But there's no hiding from the all-seeing network of GPS satellites that hover overhead, which never sleep, never blink, never get confused and never lose attention. Nor is there respite from the dense network of cell towers that honeycomb the inhabited United States. Acting together these two technologies alone can provide law enforcement with a swift, efficient, silent, invisible and cheap way of tracking the movements of virtually anyone and everyone they choose. See, e.g., GPS Mini Tracker with Cell Phone Assist Tracker, http://www.spyville.com/passive-gps.html (last visited July 17, 2010). Most targets won't know they need to disguise their movements or turn off their cell phones because they'll have no reason to suspect that Big Brother is watching them.

The Supreme Court in Knotts expressly left open whether "twenty-four hour surveillance of any citizen of this country" by means of "dragnet-type law enforcement practices" violates the Fourth Amendment's guarantee of personal privacy. 460 U.S. at 283-84. When requests for cell phone location information have become so numerous that the telephone company must develop a self-service website so that law enforcement agents can retrieve user data from the comfort of their desks, we can safely say that "such dragnet-type law enforcement practices" are already in use. This is precisely the wrong time for a court covering one-fifth of the country's population to say that the Fourth Amendment has no role to play in mediating the voracious appetites of law enforcement. But see Maynard, slip op. at 19.

* * *

I don't think that most people in the United States would agree with the panel that someone who leaves his car parked in his driveway outside the door of his home invites people to crawl under it and attach a device that will track the vehicle's every movement and transmit that information to total strangers. There is something creepy and un-American about such clandestine and underhanded behavior. To those of us who have lived under a totalitarian regime, there is an eerie feeling of déjà vu. This case, if any, deserves the comprehensive, mature and diverse consideration that an en banc panel can provide. We are taking a giant leap into the unknown, and the consequences for ourselves and our children may be dire and irreversible. Some day, soon, we may wake up and find we're living in Oceania.

REINHARDT, Circuit Judge, dissenting from the denial of rehearing en banc:

I concur in Chief Judge Kozinski's dissent.

I have served on this court for nearly three decades. I regret that over that time the courts have gradually but deliberately reduced the protections of the Fourth Amendment to the point at which it scarcely resembles the robust guarantor of our constitutional rights we knew when I joined the bench. See Fisher v. City of San Jose, 558 F.3d 1069, 1089 (9th Cir. 2009) (en banc) (Reinhardt, J., dissenting); United States v. Ankeny, 502 F.3d 829, 841 (9th Cir. 2007) (Reinhardt, J., dissenting); United States v. Crapser, 472 F.3d 1141, 1149 (9th Cir. 2007) (Reinhardt, J., dissenting); United States v. Gourde, 440 F.3d 1065, 1074 (9th Cir. 2006) (en banc) (Reinhardt, J., dissenting);United States v. Kincade, 379 F.3d 813, 842 (9th Cir. 2004) (en banc) (Reinhardt, J., dissenting); United States v. Hudson, 100 F.3d 1409, 1421 (9th Cir. 1996) (Reinhardt, J., dissenting); Acton v. Vernonia Sch. Dist. 47J, 66 F.3d 217, 218 (9th Cir. 1995) (Reinhardt, J., dissenting); United States v. Barona, 56 F.3d 1087, 1098 (9th Cir. 1995) (Reinhardt, J., dissenting); United States v. Kelley, 953 F.2d 562, 566 (9th Cir. 1992) (Reinhardt, J., dissenting);United States v. Alvarez, 899 F.2d 833, 840 (9th Cir. 1990) (Reinhardt, J., dissenting); United States v. Flores, 679 F.2d 173, 178 (9th Cir. 1982) (Reinhardt, J., dissenting).

These decisions have curtailed the "right of the people to be secure . . . against unreasonable searches and seizures" not only in our homes and surrounding curtilage, but also in our vehicles, computers, telephones, and bodies — all the way down to our bodily fluids and DNA.

Today's decision is but one more step down the gloomy path the current Judiciary has chosen to follow with regard to the liberties protected by the Fourth Amendment. Sadly, I predict that there will be many more such decisions to come.

I dissent.

Young: "The Internet is a giant spying machine right now": Windows 7 Law Enforcement Sensitive Guide & more Lawful Interception compliance manuals: Welcome to the Machine!

Got BitLocker? Feel a bit r00ted???

201002282254.jpg

[It was later posted that this full Windows 7 law enforcement pack was actually originally posted on the very cool newer site PublicIntelligence.net: Microsoft Windows 7/Vista Advanced Forensics Guides for Law Enforcement | Public Intelligence ]

In a continuation of the excitement around Microsoft's confidential Law Enforcement guide hitting Cryptome.org, now several more Law Enforcement Sensitive PDFs about Windows 7 have been posted, including a lot of detailed information about examining BitLocker drive encryption and potentially cracking it: "We can also see the Recovery Key ID number" and a series of hex addresses, it says (win7-bit-spy.pdf p 67).

With all the guides Cryptome has posted for PayPal, MySpace, AOL, SKype, Yahoo! & others, one can certainly get a clearer picture of implementations of government demands, but also these training manuals created by the companies clearly illuminate their own intent. Also, who else has had this information? Isn't it deceptive marketing to peddle products with such backdoors or intended weaknesses?

[ I tried sending this into Slashdot ]

For now teh file is @ http://cryptome.org/isp-spy/win7-spy.zip

also: Microsoft Watch - Microsoft 'Spy Guide' Is Worth a Read

More Lawful Interception & Spying Guides: This should be more than enough for anyone! Thank you, Cryptome :)

facebook-spy.pdf Facebook Lawful Spying Guide February 20, 2010
aol-spy.pdf AOL Lawful Spying Guide February 20, 2010
skype-spy.pdf Skype Lawful Spying Guide February 20, 2010
cox-spy.pdf Cox Communications Lawful Spying Guide February 20, 2010
ning-spy.pdf Ning Lawful Spying Guide February 20, 2010
myyearbook-spy.pdf myYearbook Lawful Spying Guide February 20, 2010
stickam-spy.pdf Stickam Lawful Spying Guide February 20, 2010
usps-spy.pdf US Postal Service Mail Spy Request 1 February 20, 2010
usps-spy2.pdf (ok) US Postal Service Mail Spy Request 2 February 20, 2010
yahoo-preserve.pdf Lawful Yahoo Records Preservation Letter February 20, 2010

microsoft-spy.zip(ok) Microsoft Global Criminal Spy Guide February 20, 2010 (1.6MB)

cisco-spy.pdf Cisco Lawful Spying February 12, 2010
3gpp-spy.htm 3GPP Lawful Spying and Security February 11, 2010
ntia021110.htm Federal Radio Frequency Management Manual February 11, 2010
fincen021010.htm Expansion of Financial Spying February 10, 2010

fema021010.htm National Disaster Recovery Framework February 10, 2010

paypal-spy.zip PayPal Spying Guide February 25, 2010 (932KB)

myspace-spy.pdf MySpace Spying Guide February 25, 2010

dhs012110.pdf DHS Haiti Social Media Disaster Watch February 16, 2010

ms-decafme.htm Decafme Gets Microsoft COFEE Takedown Notice January 21, 2010

doj-isp-spy.pdf DoJ Reports Patriot Act ISP Spying Disclosures January 19, 2010

intercept-study.htm Vulnerability of Communications to Interception January 16, 2010
dodd-3020-40.pdf DoD Responsibilities for Critical Infrastructure January 16, 2010

att-spy-doc-01.pdf ATT Lawful Spying Document 1 December 6, 2009

att-spy-doc-02.zip ATT Lawful Spying Document 2 December 6, 2009 (2.9MB)
verizon-spy.pdf Verizon Lawful Spying Guide December 6, 2009
sprint-spy2.pdf Sprint CALEA Spying Delivery System December 6, 2009
sprint-spy.zip Sprint Lawful Spying Guide December 5, 2009 (600KB)
voicestream-spy.zip Voicestream Lawful Spying Guide December 5, 2009 (626KB)

yahoo-cryptome.htm Yahoo Cryptome Messages December 5, 2009

yahoo-demand.pdf Yahoo Demands Takedown of Yahoo Spying Guide December 2, 2009
spook-wishlist.htm The Modern Spook's Data Retention Wish List December 2, 2009

yahoo-spy.pdf Yahoo Lawful Spying Guide December 2, 2009
cox-spy.pdf Cox Lawful Spying Guide December 2, 2009
sbc-ameritech-spy.pdf SBC-Ameritech Lawful Spying Guide December 2, 2009
sbc-lea-spy.pdf SBC Lawful Spying Guide December 2, 2009
ameritech-spy.pdf Ameritech Lawful Spying Guide December 2, 2009
cingular-spy.pdf Cingular Lawful Spying Guide December 2, 2009
cricket-spy.pdf Cricket Lawful Spying Guide December 2, 2009
nextel-spy.pdf Nextel Lawful Spying Guide December 2, 2009
pactel-spy.pdf Pacific Telesis Lawful Spying Guide December 2, 2009
gte-spy.pdf GTE Lawful Spying Guide December 2, 2009
nsa061606.htm NSA Ion Trap on a Semiconductor Chip December 1, 2009

Moar Awesome Stuff:

fouo-docs.htm Cryptome For Official Use Only Docs Archive October 11, 2009
ak-hss-2009.pdf Alaska 2009 Homeland Security Strategy FOUO October 11, 2009
ar-hs-train.zip Arkansas Homeland Security Training FOUO October 11, 2009 (1.1MB)
mt-hs-train.zip Montana Homeland Security Training FOUO October 11, 2009 (387KB)
oh-fly-oplan.pdf Ohio Wing Flight Operations Plan FOUO October 11, 2009
cttso-brief.zip Combatting Terrorism Physical Security FOUO October 11, 2009 (378KB)
mcc-perform.pdf Millennium Challenge Bribery Performance FOUO October 11, 2009
mcc-fraud.pdf Millennium Challenge Bribery Fraud FOUO October 11, 2009
uscg-artic-rds.zip Coast Guard Operation Arctic Crossroads FOUO October 11, 2009 (402KB)
blm-fatality.zip BLM Freeman Reservoir Fatality Report FOUO October 11, 2009 (3.8MB)

sc-robbers.pdf South Carolina Retaurant Robberies FOUO October 11, 2009
vet-rural-health.pdf Veterans Rural Health Advisory Committee FOUO October 11, 2009
army-water.zip Army Portable Water Treatment Units FOUO October 11, 2009 (1.5MB)
h1n1-vacstrat.zip US 2009 H1N1 Vaccine Strategy October 11, 2009 (540KB)
consuls-files.zip The Consuls' Files (Zipped) October 9, 2009

dodi-5240-22.pdf Counterintelligence Support to Force Protection September 26, 2009

And don't miss DHS | Council Members, Critical Infrastructure Partnership Advisory Council

Celebrity Cybermilitantism Superficiality

Dear Ms. Camilien,

Suggested readings prior to taking on the far too glib topicality of Cryptome, Wikileaks and cybermilitantism:

National Security Archive: http://www.gwu.edu/~nsarchiv/

Electronic Freedom Foundation: http://www.eff.org

Federation of American Scientists and Secrecy News: http://www.fas.org

http://www.fas.org/blog/secrecy/

The Memory Hole: http://www.thememoryhole.org/

And many similar initiatives in other countries.

Then, properly armored against misbehavior, ponder risk:

Tim May's "Cyphernomicon:" http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html

Jim Bell's "Assassination Politics:" http://cryptome.org/jya/ap.htm

Jim Bell's Trial and Conviction Files: http://cryptome.org/jya/jdbfiles.htm

And many of the other hundreds of challenging and highly informative web sites. Be cautious about those cited in the news too readily for they are rightly suspected of overmuch self-promotion -- pity those condemned to fund-raising treadmills.

Regards,

John Young

Moar from John Young on the ol Alex Jones show:

...Meanwhile the Shadow Government by They Might Be Giants: Where's the Shadow Government When You Need It?

Unmarked helicopters, hovering....

Syndicate content