Police Departments Use Secret Tool to Spy on Mobile Phones

Posted on Updated on

The New American
by C. Mitchell Shaw

stingray

Local police all over the country are using highly sophisticated, very expensive surveillance tools to capture information from cell tower traffic from the innocent and the guilty alike. The devices they use were originally touted as “tools for combating terrorism.” Now they are being used as the shortest path in solving even the most petty crimes.

USA Today is reporting that cell-site simulators, known as “stingrays” are being used at an increasingly alarming rate to capture information about all mobile phones within the area where the device is being used. There are obvious issues with the use of these devices as it relates to privacy. The stingray does not target particular phones, but instead vacuums up all data from all phones in the radius of the coverage of the device. That means that even if police were using it in the most extreme situations — say to track a kidnapper or known terrorist — there would still be legitimate privacy concerns.

Those concerns are amplified by the fact that police use stingrays for everything from serious crimes, such as those mentioned above, to petty crimes such as simple burglary and prank phone calls. Police are using these devices as the shortest path because it is easier than conducting an old-fashioned investigation. The result is that police are becoming accustomed to the ease and convenience of these tools and are using them more and more. The city of Baltimore alone has used its stingray 4,300 times since 2007. That is at least 11 times per week. The majority of those cases were for petty crimes.

If Baltimore is any indication of the frequency with which police across the country are using these tools, the problem is gargantuan. More than 50 police departments have and use stingrays. It is certain that other departments are overusing these surveillance tools. Often there is no search warrant obtained for their use — a direct violation of the Fourth Amendment’s guarantee of freedom from “unreasonable searches and seizures” and the requirement that police have “probable cause, supported by Oath or affirmation” to obtain a warrant which must “particularly [describe] the place to be searched, and the persons or things to be seized.”

Joel Hruska wrote in his piece for extremetech.com:

Police often fail to submit a warrant request — one police department in Florida has admitted to using a stingray more than 200 times since 2010 without ever getting a warrant for its use. These devices are indiscriminate — in rare cases, such as a stolen cell phone, police may know in advance precisely which device to target, but in the majority of scenarios they’re fishing for bait to see what they can find.

The stingray — which is about the size of a large suitcase — is transported in either a surveillance van or a police car. It acts as a “man-in-the-middle” by mimicking a cell tower and fooling any mobile phone in the area into connecting to it. It then harvests info from the phone including the number of the phone, the number the phone is calling or texting, the location of the phone, and information about the phone itself. Once the stingray has that information, it relays the connection to the nearest real tower in the area. The only things that might alert a mobile phone user to the “man-in-middle” attack by a stingray would be a sudden dip in battery power or a slight delay in network speeds. The stingray sends a command to the phone to increase antennae power to maximum, and it takes an extra bit of time to grab what it wants and forward the connection to a real tower.

USA Today interviewed one officer in Baltimore about the use of these devices and their effectiveness. He said the stingrays help solve cases. “We’re out riding around every day,” said one officer assigned to the surveillance unit, who spoke on the condition of anonymity because of the department’s non-disclosure agreement with the FBI. “We grab a lot of people, and we close a lot of cases.”

But the reality is that there is more to the story than that.

While the use of stingrays does bring about arrests, many of the cases are dropped or reduced to get a conviction on lesser charges in exchange for a confession. Why is that? Because police departments have to sign non-disclosure agreements with the FBI to even obtain or use stingrays. As a result, police often do not — cannot — disclose (even to prosecutors) that they used the device. This means that police are caught between a rock and a hard place when it comes to testifying in court. If the officer discloses the fact that the reason he knew where to find the suspect was that he used a stingray to sniff out his phone, the officer could be liable for violating the non-disclosure agreement. If he testifies falsely, he would be guilty of perjury. So the case is either dropped or the charges are reduced.

One example of this was highlighted in the article and shows the futility of relying on these devices.

Prosecutors have certainly agreed to forgo evidence officers gathered after using a stingray. At a court hearing in November, a lawyer for a robbery suspect pressed one of the detectives assigned to the surveillance team, for information about how the police had found a phone and gun prosecutors wanted to use as evidence against his client. Haley refused to explain, citing the non-disclosure agreement. “You don’t have a non-disclosure agreement with the court,” Judge replied and threatened to hold the detective in contempt if he did not answer.

Prosecutors quickly agreed to forgo the evidence rather than let the questioning continue. “I don’t think Det. Haley wants to see a cell today,” Assistant State’s Attorney Patrick Seidel said.

The lesson many defendants and lawyers will take away from this is to press that same question in their cases. The likelihood is great that if such a device was used at all, the case will disintegrate.

The electronic Frontier Foundation (EFF) — an organization dedicated to preserving digital liberty — has been working for years to expose the use of these surveillance tools. EFF lawyer Hanni Fakhoury said, “The problem is you can’t have it both ways. You can’t have it be some super-secret national security terrorist finder and then use it to solve petty crimes.”

EFF has launched a fairly aggressive campaign against all “street-level surveillance.” The Street-Level Surveillance Project (SLS) encourages citizens to hold police accountable and provides tools to do just that. EFF lists stingrays, automatic license plate readers, biometrics, and other technologies used by police which threaten privacy and liberty.

Their website says:

The SLS Project addresses an information gap that has developed as law enforcement agencies deploy sophisticated technology products that are supposed to target criminals but that in fact scoop up private information about millions of ordinary, law-abiding citizens who aren’t suspected of committing crimes. Government agencies are less than forthcoming about how they use these tools, which are becoming more and more sophisticated every year, and often hide the facts about their use from the public.

Hopefully, as more cases fall apart because of questions about the use of stingrays, and as the public becomes more aware, their use will fall out of favor, and police will get back to conducting investigations the way they used to. Citizens need to demand it.

The New American

Connected Dots Reveal that UN Military Forces Are Now Prepared to Invade the United States

Posted on Updated on

The Common Sense Show
by Dave Hodges

 The United Nations Is positioning for the takeover of the United States.

The United Nations Is positioning for the takeover of the United States.

 

Yesterday, and despite being a speed reader, I spent almost three hours reviewing a mountain of material that I have been sent by people from around the country. About half way through my review, I had an epiphany. I began to see the interconnections between events unlike I have ever seen before.

Previously, some of the material stood out as stand alone information. However, as I moved from one item to another, I began to connect the dots like I have never done before. Please allow me to provide for you the dot connections followed by a comprehensive analysis of what is coming in a more precise manner than I have previously reported.

DOT CONNECTION #1: Secretary of State, John Kerry, Signs the UN Small Arms Treaty In Violation of the US Constitution

Secretary of State, John Kerry, signing away America's freedom, security and longevity by putting his name on the UN Smalls Arms Treaty in violation of the Constitution which states that any treaty must be approved by the Senate on a two-thirds vote.

Secretary of State, John Kerry, signing away America’s freedom, security and longevity by putting his name on the UN Smalls Arms Treaty in violation of the Constitution which states that any treaty must be approved by the Senate on a two-thirds vote.

The above photo of Kerry signing the UN Small Arms Treaty reminds me of Neville Chamberlain’s infamous quote about having “peace in our time” after he signed the Munich Accords with Hitler just prior to World War II. Inside of these “accords” contained the seeds for World War II.  Inside this UN treaty lies the destruction of American culture and society as we have known it.

 

Sometimes a picture is worth a 1000 words.

Sometimes a picture is worth a 1000 words as this will be the net effect of the UN Smalls Treaty.

 

Secretary of State, John Kerry, and President Obama are "yucking it up" after setting up Americans up to be totally defenseless in the face of tyranny by obliterating the Second Amendment.

Secretary of State, John Kerry, and President Obama are “yucking it up” after setting up Americans up to be totally defenseless in the face of tyranny by obliterating the Second Amendment and a citizenry’s right to self-defense.

The clear intent of President Obama’s administration to disarm the American people should be very concerning to all Americans who know and appreciate their knowledge of world history. According to the University of Hawaii’s Democide Project, there were 19 genocides in the 20th Century. Everyone of them was preceded by gun confiscation. President Obama is a Harvard man and, as such, should we not assume that the President has some working knowledge about this aspect of history.

DOT CONNECTION #2: Humvee Vehicles Needed to Fix Walmart Plumbing Issues

UN Vehicles Being Transported to Texas

The following video shows Humvee vehicles in a Texas Walmart. Additionally, UN vehicles have been photographed as they are being shipped into Texas. Texans, prepare to defend yourselves!

The following video presents the aforementioned information beginning 5 minutes into the presentation.

 

This action commenced in April of 2015 and continues through today. In fact, The Common Sense Show has been reporting on the sightings of UN military vehicles in this country, in significant numbers, for longer than a year.

 

DOT CONNECTION #3: The American Military Is Being Systematically Being Disarmed

Not only does the Obama administration plan to disarm the people of America, they are systematically disarming the military as well while, at the same time, beefing up the foreign troop presence on United States soil.

As UN vehicles continue to deploy into the United States, we are witnessing the systematic disarming of the American Military. DAHBOO 777 first published the following account of the American military disarming itself by putting what everyone thought was excess military equipment into mothballs at underground munitions storage areas such as the one featured below at the Red River facility. The reason that it is quite clear that this is a disarming is that if a rapid deployment of this equipment were ever needed in time of war, the grid lock that would result at a facility like this or any other storage facility constructed in this manner, would prevent the timely and proper deployment of men and equipment.

 

DOT CONNECTION #4: We Now Have the Lens of Historical Perspective

DAHBOO 777 first published the above featured video on March 2, 2015. At the time, I wasn’t initially that suspicious of this activity. We were reducing our military operating size in the Middle East and subsequently, at the time, this seemed like an outgrowth of this activity. Please keep in mind this video was published almost a full month before the public revelation of Jade Helm 15.

The first time that most had heard of Jade Helm is when the following photos were released from a March 27, 2015 Ft. Lauderdale Special Operations Forces dissident extraction drill in which the following photos were captured by concerned local citizens.

 Ft. Lauderdale dissident extraction drill executed on March 27, 2015.

Ft. Lauderdale dissident extraction drill executed on March 27, 2015.

 

Also on March 27, we witnessed waiting white vans designed to transport these (actors) political dissidents to their new residences at the nearby FEMA camps. These van have also been seen traveling through select neighborhoods through out the country. This political extraction drilll, held in Ft. Lauderdale, FL. exposed to two lies: (1) Jade Helm was not supposed to start until July 15 and (2) Jade Helm was only in 7 states. Florida was not on the original Jade Helm maps and documents.

Also on March 27, we witnessed waiting white vans designed to transport these (actors) political dissidents to their new residences at the nearby FEMA camps. These van have also been seen traveling through select neighborhoods through out the country. This political extraction drilll, held in Ft. Lauderdale, FL. exposed to two lies: (1) Jade Helm was not supposed to start until July 15 and (2) Jade Helm was only in 7 states. Florida was not on the original Jade Helm maps and documents.

The the country was quickly introduced  to Jade Helm maps and the infamous and mysterious logo.

Jade Helm 15 Color Coded Legend Red Denotes a "hostile state" Brown is uncertain, leaning towards hostile. Dark Blue is "Permissive" meaning supportive of the government. Light Blue is "Uncertain, leaning friendly". .

Jade Helm 15  map.
.

 

If this won't wake up the nation, then nothing will.

If this won’t wake up the nation, then nothing will.

 

There is a reason why Obama is downsizing the military at a time when we are facing the strong possibility of going to war with China and Russia. This action by Obama is highly suspicious. Further, the military movement of equipment in this country is unprecedented and has been covered, in detail, on this site for the past six months.

The strategy seems clear: Reduce the size of the military, disarm much of the military as we see with Red River and as you will take note of in the next section, there is a growing foreign troop presence that is very well documented. Further, these events have caused me to view Jade Helm in, yet, another light. What Jade Helm also accomplishes besides dissident extraction and the implementation of martial law, is the mobilization and control of most of our domestically based military under one central authority, Jade Helm. If I wanted to neutralize the American military prior to a take over, this is exactly what I would do.

DOT CONNECTION#5:

THE CONTINUING AND INCREASING FOREIGN TROOP PRESENCE IN AMERICA

 

On August 29, 2015, I received a very disturbing email from a reader.

Dave,

My son-in-law is a wild land firefighter based in Chelan, WA. As I’m sure you are aware the fires in Washington are some of the worst in the nation right now. I spoke with him last night after he came off of a 20 day shift. He has been battling the Wolverine fire which lies in a very remote part of the county only accessible by Boat or Helicopter. This is the same remote area that the U.S. Army Airborne division has been using to practice helicopter mountain training. (https://www.wenatcheeworld.com/news/2015/jul/06/army-considers-helicopter-training-in-ncw/) While battling the fire and establishing fie lines around Holden Village, he and his crew came upon two Blackhawk helicopters on the ground in a remote part of the forest. He said that soldiers drew their weapons on his US Forest service fire crew and told them they couldn’t be in the area because it was a restricted Military zone.  He said all of the soldiers were in US Army uniforms, but two of them appeared to be Russian (wearing US Army uniforms) and in his opinion the Russian soldiers seemed to be in charge. My son-in-law challenged the soldiers stating they were there to save structures threatened by the fire and they would continue to do their job, at which point all the rifles in the company pointed at him. At this point he said he actually felt threatened for his life and he and his crew retreated going around the helicopter crew. This led to a discussion as to whether or not the US Army had been involved in possibly starting the fires which now burn approximately 135,000 acres.
Please withhold my name for obvious reasons.

This is not the only time we have seen, or heard of Russian troops in places where they should not be. As far back as 2011, Sherrie Wilcox sent to me a video of Russian soldiers training inside of DHS vehicles.

To one more of hundreds of documented incidents of this type, here are pictures of Russian commandos at Ft. Carson.

This picture and depicts Russian soldiers at Ft. Carson. The Russians and other foreign troops (e.g. Germans, Canadians, Danes) are part of Jade Helm. They are here to carry out the mission should American troops stand down.

This picture and depicts Russian soldiers at Ft. Carson. The Russians and other foreign troops (e.g. Germans, Canadians, Danes) are part of Jade Helm. They are here to carry out the mission should American troops stand down.

They are not coming, they are here.

They are not coming, they are here.

 

The Russians have even been depicted the Mural at Denver International Airport near baggage.

The Russians have even been depicted the Mural at Denver International Airport near baggage.

 

Don't forget about Obama's 2010 great giveaway of oil-rich Alaskan Islands which could be used as a prelude to invasion.

Don’t forget about Obama’s 2010 great giveaway of oil-rich Alaskan Islands which could be used as a prelude to invasion.

 

Soon this will be a familiar sight in our communities only their helmets will be blue.

Soon this will be a familiar sight in our communities only their helmets will be blue.

Please allow me to remind the readers that Steve Quayle, Doug Hagmann and myself have been on the front line warning about these events over the past several years. And through Agenda 21, America will soon lose control over 90% of its land as depicted below in a biodiversity map. Agenda 21 is synonymous with the United Nations.

Put this map into your GPS, it will tell where you soon cannot go. The UN's manifestation of forcing people into stack and pack cities.

Put this map into your GPS, it will tell where you soon cannot go. The UN’s manifestation of forcing people into stack and pack cities.

The Impetus for the Take Over of the United States

All of these connected dots will coalesce along the lines of a catastrophe which would legitimize the use of UN aid in the form of blue-helmeted troops and their military equipment which is already being stored on US soil.

Most people would point to a false flag which would be needed to set the take over into motion. However, I do not think that a false flag will be needed. All the globalists have to do is let nature

Who are the massive amounts of DHS acquired bullets for?

Who are the massive amounts of DHS acquired bullets for?

take its course and let the economy collapse and the ensuing chaos would provide the backdrop to justify the placement of UN troops on the street. And these UN troops would be a buffer against a military that may not cooperate with the give away of the country by the current President.

 

The new enemies of the state.

The new enemies of the state.

 

DHS tipped its hand about the direction this was going several years ago when they acquired 2700 armored vehicles and over two billion rounds of ammunition. And let’s not forget that DHS has not only acquired ammunition and armored vehicles, they have been practicing. And who have they been practicing for? You are not going to like the answer to this question as depicted in the above target shooting poster created by DHS.

CSS Offical-New-Logo2

The Common Sense Show

How the US Can Stop ISIS Without Setting Foot in Syria

Posted on Updated on

New Eastern Outlook
by Tony Cartalucci

4543222Increasingly difficult to cover-up or spin, it is becoming apparent even in Western media coverage that the so-called “Islamic State” (ISIS) is not sustaining its fighting capacity from within Iraq or Syria, but rather through supply lines that lead to and from adjacent nations. These nations include Jordan, Lebanon, Israel, and most obviously, NATO-member Turkey.

It was in Germany’s international broadcaster Deutsche Welle (DW)’s report, “‘IS’ supply channels through Turkey,” that hundreds of trucks destined for ISIS held territory were videotaped waiting at Oncupinar, Turkey to cross over into Syria with apparently no oversight by the Turkish government. Later, TIME magazine would admit ISIS’ dependence on the Syrian town of Tal Abyad, just across the border from Turkey, for supplies and the significance of its loss to Kurdish fighters in sustaining their fighting capacity both at the border and beyond.

AP’s June 2015 report, “Kurds move to cut off ISIS supply lines in Syria,” would state:

Syrian Kurdish fighters closed in on the outskirts of a strategic Islamic State of Iraq and Syria-held town on the Turkish border Sunday, Kurdish officials and an activist group said, potentially cutting off a key supply line for the extremists’ nearby de facto capital. 

Taking Tal Abyad, some 50 miles from the Islamic State of Iraq and Syria (ISIS) stronghold of Raqqa, would mean the group wouldn’t have a direct route to bring in new foreign militants or supplies. The Kurdish advance, coming under the cover of intense U.S.-led coalition airstrikes in the area, also would link their two fronts and put even more pressure on Raqqa as Iraqi forces struggle to contain the group in their country.

And while US airstrikes are credited for Kurdish advances against ISIS, one wonders why the US, whose military including a US airbase at Incirlik, Turkey and US special forces as well as the CIA are operating along and across the Syrian border in Turkey – hasn’t done more to interdict ISIS supply lines before they reach Syria and awaiting terrorists.

The Kurds and Syria’s military both realize the importance of stemming terrorist armies within Syria by cutting them off from their supplies at Syria’s borders. However, both the Kurds and Syrian forces are increasingly limited from securing these borders due to an ever-expanding “safe haven” the US and its regional allies are carving out of Syrian territory. Turkey and Israel have both attacked Syrian forces in these “safe havens” creating a virtual sanctuary for Al Qaeda affiliates including Al Nusra and ISIS.

Efforts to “assist” the Kurds appear only to have been a pretext to violate Syrian airspace first, then Syrian territory on the ground second. America’s meager “Division 30″ of less than 60 fighters trained in Turkey then sent to fight the thousands upon thousands of terrorists the US and its allies have been arming, training, and sending over Syria’s borders for years was yet another attempt to make ISIS and Al Nusra’s gains appear a result of Western folly rather than of Western design.

How the West Can Stop ISIS Without Setting Foot in Syria 

An old military maxim states: “an army marches on its stomach.” Logic dictates that an army with empty stomachs is unable to march. Napoleon Bonaparte who is credited with this quote, found out first hand just how true these words were when his army found itself deep within Russia without supplies, leading to its ultimate and catastrophic defeat.

Likewise, ISIS’ fighting capacity depends entirely on its supply lines. Cutting these supply lines will lead to its inevitable defeat. For the United States, who is either allied with or has troops operating in all nations bordering Syria, cutting ISIS’ supply lines would be a simple matter – that is – if the United States was truly interested in defeating ISIS and other Al Qaeda affiliates.

While the United States has assisted Turkey in erecting missile defenses along its border with Syria in order to create a defacto no-fly-zone providing Al Nusra and ISIS with an invaluable sanctuary, little to no effort has been spent in increasing border security – specifically the searching for and interdiction of terrorist fighters, weapons, and other supplies. As German DW’s report illustrated, it appears Turkey’s borders are not only dangerously wide open, but intentionally so, with little or no effort at all by Turkey to stem the torrent of obvious ISIS supply convoys from passing through.

DW would likely videotape a similar situation unfolding in Jordan near its border with Syria, close to Syrian cities like Daraa which have become battle-torn as Syrian forces desperately try to stem the torrent of fighters and weapons flowing over the borders there, aimed ultimately at Damascus.

The US Can Stop ISIS in One Month… If it Wanted

By cutting off ISIS from its money, supplies, additional fighters, weapons, and essential equipment, it would quickly be overwhelmed by Syrian and Iraqi forces. Without cash to pay fighters, and without new fighters to replace those lost in fighting, morale would quickly falter. Without a constant torrent of weapons, ammunition, and fuel, ISIS and other Al Qaeda affiliates would quickly lose their tactical capabilities. Fighters unable to flee would be encircled and destroyed as has happened deep within Syria’s interior where Syrian forces have been able to cut supply lines to key cities and starve out terrorist armies.

Syria is intentionally prevented from securing its borders through an increasingly overt “buffer zone” or “safe haven” the US and its regional allies are creating for the purpose of sheltering clearly non-existent “moderate rebels.” What these “safe havens” are in actuality doing, is ensuring ISIS’ supply lines remain intact. With the Kurds – the only effective force near the Turkish-Syrian border able to threaten ISIS’ supply lines – now being attacked by Turkish forces directly, what little obstacles supplies had in reaching ISIS through Turkey is being swiftly negated.

The US and its allies could easily increase security along Syria’s borders and permanently cut ISIS and other Al Qaeda affiliates supply lines without having to enter Syrian airspace or cross onto Syrian soil. Just as easily as the US built a line of missile defenses facing Syria, it could create border checkpoints and patrols within Turkey to interdict and effectively stem all weapons and fighters flowing to ISIS. It could, but it intentionally doesn’t.

The implications are obvious. ISIS is both a creation and intentional perpetuation of US foreign policy. Just as the US so many years ago colluded with Saudi Arabia in the creation of Al Qaeda in the mountains of Afghanistan in the first place, it to this day colludes with its regional allies to use Al Qaeda and its various rebrandings – including ISIS – to fight wars Western troops cannot fight. This includes dividing and destroying Syria – the overtly stated, true objective of US policymakers.

Could Syria and its allies create their own “buffer zone” in northern Syria? Could international troops be brought in, with the inclusion of UN observers to secure the Syrian border and put in check attempts by both Turkey and the US to engage Syrian and Kurdish fighters attempting to restore order there?

The incremental strategy of carving out northern Syria, claiming to shelter “moderate rebels” while in reality securing further ISIS’ supply lines and providing them an increasingly unassailable safe haven from which to launch operations deeper into Syria, is inching along and will inevitably pay off at the expense of Syrian territorial integrity, stability, and perhaps even its existence as a functioning state if no measures are taken to counter this conspiracy.

The basics of logistics and the simple fact that the US can both fight and defeat ISIS by simply securing Turkey and Jordan’s borders must be repeatedly brought up by non-Western media and diplomatic circles – highlighting the fact that Syria’s conflict is one of foreign invasion, not civil war. The conflict can be brought to an end, along with all the horrors associated with it, by simply checking ISIS’ bags at the Turkish border. If the US and Turkey refuse to do this, someone must check them on the other side, someone the US and Turks may hesitate to attack as they have the Syrians and Kurds.

Tony Cartalucci, Bangkok-based geopolitical researcher and writer, especially for the online magazineNew Eastern Outlook”.

New Eastern Outlook

Climate Issues We Need To Address

Posted on Updated on

Watts Up With That
by Paul Driessen

We need to fix the climate of fraud, corruption, and policies that kill jobs, hope and people

climate

Reeling stock markets across the globe hammered savings, pension funds, innovation and growth. US stocks lost over $2 trillion in market value in eight days, before rallying somewhat, while the far smaller Shanghai Composite Index lost $1 trillion in four days of trading, the Wall Street Journal reports.

Battered economies continue to struggle. Investment banks are pulling out of developing countries. An already exploding and imploding Middle East now confronts a nuclear arms race and human exodus.

Complying just with federal regulations already costs American businesses and families $1.9 trillion per year, the Competitive Enterprise Institute calculates. That’s more than all 2014 personal and corporate income tax receipts combined – and Obama bureaucrats issued 3,554 new rules and regulations last year.

EPA’s 2,691-page Clean Power Plan is designed to eliminate coal mining and coal-fired power plants – and minimize natural gas substitutes. The CPP requires that gas use can increase by only 22% above 2012 levels by 2022, and just 5% per year thereafter. On top of that, new natural gas-fueled generating units that replace coal-fired power plants absurdly do not count toward state CO2 reduction mandates.

That means millions of acres of new wind and solar installations that generate expensive, unreliable electricity – and survive only because of subsidies, tariffs, anti-fossil fuel mandates, and exemptions from endangered species, environmental impact and other requirements that block fossil fuel projects.

Anti-energy, anti-growth policies imposed in name of preventing “dangerous manmade climate change” impact everything we do. For minority, elderly and working class families, they bring soaring electricity costs, rising unemployment, unproductive lives on government assistance, diminished health and welfare, and shorter life spans. They hogtie economies and kill jobs, prolong and worsen economic quagmires, crush aspirations and opportunities, perpetuate poverty, and foster anger, unrest and conflict.

None of these hard realities seems to bother President Obama, though. In fact, he is determined to use the December climate conference in Paris to lock the United States into binding treaty commitments to slash the common folks’ fossil fuel use, CO2 emissions, economic growth and job creation even further.

Anyone who cares about living standards, lifting billions of people out of abject poverty, and reining in the power of unaccountable US, EU and UN bureaucrats needs to pay attention and get involved.

Earth’s climate is doing pretty much what it always has: responding to powerful natural forces, changing, and driving atmospheric patterns and weather events that benefit some, harm others and sometimes wreak devastation. It is not doing what gloom-and-doom computer models and headlines predicted.

We do not need to “fix” or “control” the climate. We couldn’t if we tried. We do need to fix the climate of fraud, corruption and destructive policies that kill jobs, dreams and people. We need to realize that most countries will not commit economic suicide. They may sign a climate treaty – but for reasons that have nothing to do with environmental protection … and only if their obligations are distant and ephemeral.

Mr. Obama has said from the outset that he would use executive decrees to “fundamentally transform” the United States and ensure that electricity prices “necessarily skyrocket.” He has kept his word.

He and his friends in the UN, EU, Big Green and Climate Crisis Industry have also made it clear that they intend to use the Paris conference to negotiate the future distribution of the world’s wealth and resources, determine what economic growth and living standards are “ecologically feasible,” and transform the global economic development model: replacing sovereign nations and free enterprise capitalism with global governance and decision-making based on “sustainable development” and “dangerous manmade climate change” mantras. 1992 climate conference organizers even said saving the world requires that they cause “industrialized civilization to collapse.” They intend to keep their promises.

Impoverished people in developing countries reject this agenda. They want sustained development, not sustainable development. They want decent jobs and modern houses, hospitals and living standards.

Thus, under the proposed Paris treaty, only developed countries will be required to slash fossil fuel use. “Poor” nations (including China, India, Brazil, Indonesia and Russia) will not be obligated to reduce their carbon-based energy use or carbon dioxide/greenhouse gas emissions by any specific amounts or dates – though some say they “intend to try” to reduce emissions or may present non-binding targets some years from now. Most will dramatically increase their oil, gas and coal use, and CO2/GHG emissions.

The real bribe to induce poor nations to sign a new treaty is a binding commitment that increasingly less developed, less energy-powered, less rich countries will give “poor” nations (or at least their ruling elites) $100 billion per year in climate adaptation, mitigation and reparation payments. That’s to cover damages that developed nations have supposedly inflicted on Earth’s climate. FRCs (Formerly Rich Countries) will also be required to give “poor” nations advanced energy and other technologies, at no cost.

Even more insane, the entire basis for this agenda, this treaty, these commitments and non-commitments, is bald assertions – driven by garbage in/garbage out computer models and deceptive, fraudulent science – that humanity faces “unprecedented” global warming, rising ocean, weather and other calamities.

About the only unprecedented event in the past century is that no category 3-5 hurricane has hit the USA in nearly a decade. Climate alarmists refuse to discuss that. Their other assertions are pure fiction.

Claims that 2014 was the “hottest year on record,” and July 2015 was “the hottest July” since “at least 1880,” are based on city and airport temperatures that are always several degrees higher than those at nearby rural sites. (Satellite data show no warming for 18 years.) The “superheated planet” alarums involve hundredths of a degree: less than the margin of error. They are based mainly on only 1,200 measuring stations for Earth’s entire surface – with few in the coldest regions, and millions of acres of missing data simply extrapolated from urban numbers. The “hottest ever” charade also assumes reliable temperature data exist for the entire USA and planet all the way back to 1880! It defies belief.

(For more examples of climate scare deceit, see Climate Hype Exposed, Heartland’s Top 10 Global Warming Lies, the Aussie temperature scam, the Gore-a-thon analysis, and much more.

Imagine your life without electricity, or only when it’s available, or costing so much you can’t afford it and your now-bankrupt former employer couldn’t afford either. Imagine the EPA and UN controlling the juice that powers everything in your life: transportation, manufacturing, communications, entertainment, life after dark, life in hot and cold weather, the enormous infrastructure and energy demands that feed your smart phone. No wonder Google scientists finally admitted renewable energy is a pipedream.

Too many environmental laws no longer focus on protecting the environment. They have become bureaucratic weapons to protect chosen industries and destroy those connected to carbon-based fuels.

Denying people access to abundant, reliable, affordable hydrocarbon energy is immoral – and often lethal. It is an unconscionable crime against humanity to implement policies that pretend to protect the world’s energy-deprived masses from hypothetical manmade climate dangers decades from now – by perpetuating energy deprivation, poverty, malnutrition and disease that kill millions of them tomorrow.

Letting this climate fear mongering continue also means fewer jobs, more welfare, lower living standards, and deteriorating health and welfare – except for ruling elites. But so far too few politicians, candidates, clergy and business leaders have shown the courage to speak out – even as every Democratic would-be successor to Mr. Obama seems hell-bent on going even further than he has on all these policies.

Our next president and congress must focus on job and economic growth, and overall human welfare. They must review and roll back destructive regulations, root out the fraud and corruption, and restore honesty, transparency and real science to our political and regulatory system.

­­­­­­­­­­­­­­­­­­­­Paul Driessen is senior policy analyst for the Committee For A Constructive Tomorrow, author of Eco-Imperialism: Green power – Black death, and coauthor of Cracking Big Green: Saving the world from the Save-the-Earth money machine.

Watts Up With That

Study: 15% Of Wireless Users Now Tracked By Stealth Headers, Or ‘Zombie Cookies’

Posted on Updated on

Tech Dirt
by KARL BODE

Earlier this year AT&T and Verizon were caught modifying wireless user traffic to inject unique identifier headers (UIDH). This allowed the carriers to ignore a user’s privacy preferences on the browser level and track all online behavior. In Verizon’s case, the practice wasn’t discovered for two years after implementation, and the carrier only integrated a working opt out mechanism only after another six months of public criticism. Verizon and AT&T of course denied that these headers could be abused by third parties. Shortly thereafter it was illustrated that it was relatively easy for these headers to be abused by third parties.

While the fracas over these “stealth” or “zombie” cookies has quieted down since, a new study suggests use of such stealth tracking is increasing around the world as carriers push to nab their share of the advertising pie. Consumer advocacy group Access has been running a website called AmiBeingTracked.com, which analyzes user traffic to determine whether or not carriers are fiddling with their packets to track online behavior. According to a new study from the group (pdf) examining around 200,000 such tests, about 15% of site visitors were being tracked by the carriers in this fashion all over the globe:
Globally, the report notes that AT&T, Bell Canada, Bharti Airtel, Cricket, Telefonica de España, Verizon, Viettel Peru S.a.c., Vodafone NL, and Vodafone Spain are all now using stealth headers. In many of these instances there’s no opt-out mechanisms in place for users, or the opt-in mechanisms that exist don’t actually work. Most regulators meanwhile don’t even realize this technology exists, much less have any plan to protect user privacy via hard opt-out requirements. The practice itself, and the stored data, the group’s authors note, makes a delicious target for hackers and the intelligence community alike:

“Using tracking headers also raises concerns related to data retention. When “honey pots” of sensitive information, such as data on browsing, location, and phone numbers, are collected and stored, they attract malicious hacking and government surveillance. This kind of collection and retention of user data is unsustainable and unwise, and creates unmanageable risks for businesses and customers alike.”

The W3C Consortium recently agreed, noting that stealth carrier tracking header injection is basically a privacy nightmare in the making that undermines user trust in the entire Internet:

“The aggregate effect of unsanctioned tracking is to undermine user trust in the Web itself. Moreover, if browsers cannot isolate activity between sites and offer users control over their data, they are unable to act as trusted agents for the user. Notably, unsanctioned tracking can be harmful even if non-identifying data is shared, because it provides the linkage among disparate information streams across contextual boundaries. For example the sharing of an opaque fingerprint among a set of unrelated online purchases can provide enough information to enable advertisers to determine that user of that browser is pregnant — and hence to target her with pregnancy-specific advertisements even before she has disclosed her pregnancy.

This is what has been happening while the marketing, tech and telecom industries bickered, prattled and grandstanded over do not track protections — that this technology makes irrelevant anyway. And while companies like Verizon have repeatedly claimed that no privacy or transparency guidelines are necessary because “public shame” will keep them honest, keep in mind that it took security researchers two years before they even realized that the telco was doing this. It took another six months of pressure for Verizon to heed calls for basic opt-out mechanisms most Verizon users don’t know exist. It makes you wonder: just how long will it take the press and public to realize future iterations of stealth tracking technology are being used?

Document: The Rise of Mobile Tracking Headers: How Telcos Around the World Are Threatening Your Privacy

Tech Dirt

The Case For Retiring Another ‘Barbarous Relic’

Posted on Updated on

Financial Times

Could a world without cash make for a much-improved economy?

cash

The fact that people treat cash as the go-to safe asset when banks are teetering is heavy with historical irony. Paper money was once the symbol of monetary irresponsibility. But even as individuals have taken recent crises as reasons to stock up on banknotes, authorities would do well to consider the arguments for phasing out their use as another “barbarous relic”, the moniker Keynes gave to gold.

Already, by far the largest amount of money exists and is transacted in electronic form — as bank deposits and central bank reserves. But even a little physical currency can cause a lot of distortion to the economic system.

The existence of cash — a bearer instrument with a zero interest rate — limits central banks’ ability to stimulate a depressed economy. The worry is that people will change their deposits for cash if a central bank moves rates into negative territory. The Swiss, Danish and Swedish central banks have pushed rates lower than many thought possible; but most policymakers still believe in an “effective” lower band not far below zero.

With a recovery under way in most rich countries this may seem academic. The talk is now of when to raise rates. But the fear of the lower band is still causing damage. The dominant argument for beginning the tightening cycle is to have enough “ammunition” for a new stimulus when the next downturn comes. Removing the lower band would leave central banks well equipped to deal with a slowdown even from near-zero starting points.

The second feature of cash is that, unlike electronic money, it cannot be tracked. That means cash favours anonymous and often illicit activity; its abolition would make life easier for a government set on squeezing the informal economy out of existence.

It is in this spirit that Kenneth Rogoff, the former chief economist of the International Monetary Fund, has argued in these pages for abolishing high-denomination banknotes such as the €100 and €500 notes.

Electronic money also permits innovations to reward law-abiding businesses. Value added tax, for example, could be automatically levied — and reimbursed — in real time on transactions between liable bank accounts. Countries that struggle with tax collection could go a long way in solving their problems by restricting the use of cash. Greece, in particular, could make lemonade out of lemons, using the current capital controls to push the country’s cash culture into new habits.

The technological and practical obstacles for using cash have largely disappeared. In Scandinavian countries, cards are regularly used even for tiny transactions. Sweden reached “peak cash” almost a decade ago: the amount of currency in circulation has shrunk by more than a quarter since 2007, even though the population and economy are both larger.

The anonymity that cash uniquely affords is, however, an argument for keeping it as well as for abolishing it. It is not only criminals and money launderers who prefer cash. Especially in the post-Snowden era, many ordinary citizens legitimately want the option of not leaving digital footprints.

Fortunately some benefits of electronic money can be reaped without banning all cash outright. Cash could remain accessible but at a cost, so that its users pay for the privilege of anonymity — and remain affected by monetary policy. Dated banknotes could see their value as legal tender gradually fall over time; banks could be charged for swapping electronic reserves for physical cash and vice versa. The benefits of cash are significant — but they need not be offered for free.

Financial Times

The CIA and the Media: 50 Facts the World Needs to Know

Posted on Updated on

Global Research
By Prof. James F. Tracy

media-brainwash

Since the end of World War Two the Central Intelligence Agency has been a major force in US and foreign news media, exerting considerable influence over what the public sees, hears and reads on a regular basis. CIA publicists and journalists alike will assert they have few, if any, relationships, yet the seldom acknowledged history of their intimate collaboration indicates a far different story–indeed, one that media historians are reluctant to examine.

Kennedy_CIAWhen seriously practiced, the journalistic profession involves gathering information concerning individuals, locales, events, and issues. In theory such information informs people about their world, thereby strengthening “democracy.” This is exactly the reason why news organizations and individual journalists are tapped as assets by intelligence agencies and, as the experiences of German journalist Udo Ulfkotte (entry 47 below) suggest, this practice is at least as widespread today as it was at the height of the Cold War.

Consider the coverups of election fraud in 2000 and 2004, the events of September 11, 2001, the invasions Afghanistan and Iraq, the destabilization of Syria, and the creation of “ISIS.” These are among the most significant events in recent world history, and yet they are also those much of the American public is wholly ignorant of. In an era where information and communication technologies are ubiquitous, prompting many to harbor the illusion of being well-informed, one must ask why this condition persists.

Further, why do prominent US journalists routinely fail to question other deep events that shape America’s tragic history over the past half century, such as the political assassinations of the 1960s, or the central role played by the CIA major role in international drug trafficking?

Popular and academic commentators have suggested various reasons for the almost universal failure of mainstream journalism in these areas, including newsroom sociology, advertising pressure, monopoly ownership, news organizations’ heavy reliance on “official” sources, and journalists’ simple quest for career advancement. There is also, no doubt, the influence of professional public relations maneuvers. Yet such a broad conspiracy of silence suggests another province of deception examined far too infrequently—specifically the CIA and similar intelligence agencies’ continued involvement in the news media to mold thought and opinion in ways scarcely imagined by the lay public.

The following historical and contemporary facts–by no means exhaustive–provides a glimpse of how the power such entities possess to influence if not determine popular memory and what respectable institutions deem to be the historical record.

  1. The CIA’s Operation MOCKINGBIRD is a long-recognised keystone among researchers pointing to the Agency’s clear interest in and relationship to major US news media. MOCKINGBIRD grew out of the CIA’s forerunner, the Office for Strategic Services (OSS, 1942-47), which during World War Two had established a network of journalists and psychological warfare experts operating primarily in the European theatre.
  2. Many of the relationships forged under OSS auspices were carried over into the postwar era through a State Department-run organization called the Office of Policy Coordination (OPC) overseen by OSS staffer Frank Wisner.
  3. The OPC “became the fastest-growing unit within the nascent CIA,” historian Lisa Pease observes, “rising in personnel from 302 in 1949 to 2,812 in 1952, along with 3,142 overseas contract personnel. In the same period, the budget rose from $4.7 million to $82 million.” Lisa Pease, “The Media and the Assassination,” in James DiEugenio and Lisa Pease, The Assassinations: Probe Magazine on JFK, MLK, RFK and Malcolm X, Port Townsend, WA, 2003, 300.
  4. Like many career CIA officers, eventual CIA Director/Director of Central Intelligence (DCI) Richard Helms was recruited out of the press corps by his own supervisor at the United Press International’s Berlin Bureau to join in the OSS’s fledgling “black propaganda” program. “‘[Y]ou’re a natural,” Helms’ boss remarked. Richard Helms, A Look Over My Shoulder: A Life in the Central Intelligence Agency, New York: Random House, 2003, 30-31.
  5. Wisner tapped Marshall Plan funds to pay for his division’s early exploits, money his branch referred to as “candy.” “We couldn’t spend it all,” CIA agent Gilbert Greenway recalls. “I remember once meeting with Wisner and the comptroller. My God, I said, how can we spend that? There were no limits, and nobody had to account for it. It was amazing.” Frances Stonor Saunders, The Cultural Cold War: The CIA and the World of Arts and Letters, New York: The New Press, 2000, 105.
  6. When the OPC was merged with the Office of Special Operations in 1948 to create the CIA, OPC’s media assets were likewise absorbed.
  7. Wisner maintained the top secret “Propaganda Assets Inventory,” better known as “Wisner’s Wurlitzer”—a virtual rolodex of over 800 news and information entities prepared to play whatever tune Wisner chose. “The network included journalists, columnists, book publishers, editors, entire organizations such as Radio Free Europe, and stringers across multiple news organizations.” Pease, “The Media and the Assassination,” 300.
  8. A few years after Wisner’s operation was up-and-running he “’owned’ respected members of the New York Times, Newsweek, CBS, and other communication vehicles, plus stringers, four to six hundred in all, according to a CIA analyst. Each one was a separate ‘operation,’” investigative journalist Deborah Davis notes, “requiring a code name, a field supervisor, and a field office, at an annual cost of tens or hundreds of thousands of dollars—there has never been an accurate accounting.” Deborah Davis, Katharine the Great: Katharine Graham and the Washington Post, Second Edition, Bethesda MD: National Press Inc, 1987, 139.
  9. Psychological operations in the form of journalism were perceived as necessary to influence and direct mass opinion, as well as elite perspectives. “[T]he President of the United States, the Secretary of State, Congressmen and even the Director of the CIA himself will read, believe, and be impressed by a report from Cy Sulzberger, Arnaud de Borchgrave, or Stewart Alsop when they don’t even bother to read a CIA report on the same subject,” noted CIA agent Miles Copeland. Cited in Pease, “The Media and the Assassination,” 301.
  10. By the mid-to-late 1950s, Darrell Garwood points out, the Agency sought to limit criticism directed against covert activity and bypass congressional oversight or potential judicial interference by “infiltrat[ing] the groves of academia, the missionary corps, the editorial boards of influential journal and book publishers, and any other quarters where public attitudes could be effectively influenced.” Darrell Garwood, Under Cover: Thirty-Five Years of CIA Deception, New York: Grove Press, 1985, 250.
  11. The CIA frequently intercedes in editorial decision-making. For example, when the Agency proceeded to wage an overthrow of the Arbenz regime in Guatemala in 1954, Allen and John Foster Dulles, President Eisenhower’s Secretary of State and CIA Director respectively, called upon New York Times publisher Arthur Hays Sulzberger to reassign reporter Sydney Gruson from Guatemala to Mexico City. Sulzberger thus placed Gruson in Mexico City with the rationale that some repercussions from the revolution might be felt in Mexico. Pease, “The Media and the Assassination,” 302.
  12. Since the early 1950s the CIA “has secretly bankrolled numerous foreign press services, periodicals and newspapers—both English and foreign language—which provided excellent cover for CIA operatives,” Carl Bernstein reported in 1977. “One such publication was the Rome Daily American, forty percent of which was owned by the CIA until the 1970s.” Carl Bernstein, “The CIA and the Media,” Rolling Stone, October 20, 1977.
  13. The CIA exercised informal liaisons with news media executives, in contrast to its relationships with salaried reporters and stringers, “who were much more subject to direction from the Agency” according to Bernstein. “A few executives—Arthur Hays Sulzberger of the New York Times among them—signed secrecy agreements. But such formal understandings were rare: relationships between Agency officials and media executives were usually social—’The P and Q Street axis in Georgetown,’ said one source. ‘You don’t tell William Paley to sign a piece of paper saying he won’t fink.’” Director of CBS William Paley’s personal “friendship with CIA Director Dulles is now known to have been one of the most influential and significant in the communications industry,” author Debora Davis explains. “He provided cover for CIA agents, supplied out-takes of news film, permitted the debriefing of reporters, and in many ways set the standard for the cooperation between the CIA and major broadcast companies which lasted until the mid-1970s.” Deborah Davis, Katharine the Great: Katharine Graham and the Washington Post, Second Edition, Bethesda MD: National Press Inc, 1987, 175.
  14. “The Agency’s relationship with the Times was by far its most valuable among newspapers, according to CIA officials,” Bernstein points out in his key 1977 article. “From 1950 to 1966, about ten CIA employees were provided Times cover under arrangements approved by the newspaper’s late publisher, Arthur Hays Sulzberger. The cover arrangements were part of a general Times policy—set by Sulzberger—to provide assistance to the CIA whenever possible.” In addition, Sulzberger was a close friend of CIA Director Allen Dulles. “’At that level of contact it was the mighty talking to the mighty,’ said a high‑level CIA official who was present at some of the discussions. ‘There was an agreement in principle that, yes indeed, we would help each other. The question of cover came up on several occasions. It was agreed that the actual arrangements would be handled by subordinates…. The mighty didn’t want to know the specifics; they wanted plausible deniability.’” Bernstein, “The CIA and the Media.”
  15. CBS’s Paley worked reciprocally with the CIA, allowing the Agency to utilize network resources and personnel. “It was a form of assistance that a number of wealthy persons are now generally known to have rendered the CIA through their private interests,” veteran broadcast journalist Daniel Schorr wrote in 1977. “It suggested to me, however, that a relationship of confidence and trust had existed between him and the agency.” Schorr points to “clues indicating that CBS had been infiltrated.” For example, “A news editor remembered the CIA officer who used to come to the radio control room in New York in the early morning, and, with the permission of persons unknown, listened to CBS correspondents around the world recording their ‘spots’ for the ‘World News Roundup’ and discussing events with the editor on duty. Sam Jaffe claimed that when he applied in 1955 for a job with CBS, a CIA officer told him that he would be hired–which he subsequently was. He was told that he would be sent to Moscow–which he subsequently was; he was assigned in 1960 to cover the trial of U-2 pilot Francis Gary Powers. [Richard] Salant told me,” Schorr continues, “that when he first became president of CBS News in 1961, a CIA case officer called saying he wanted to continue the ‘long standing relationship known to Paley and [CBS president Frank] Stanton, but Salant was told by Stanton there was no obligation that he knew of” (276). Schorr, Daniel. Clearing the Air, Boston: Houghton Mifflin, 1977, 277, 276.
  16. National Enquirer publisher Gene Pope Jr. worked briefly on the CIA’s Italy desk in the early 1950s and maintained close ties with the Agency thereafter. Pope refrained from publishing dozens of stories with “details of CIA kidnappings and murders, enough stuff for a year’s worth of headlines” in order to “collect chits, IOUs,” Pope’s son writes. “He figured he’d never know when he might need them, and those IOUs would come in handy when he got to 20 million circulation. When that happened, he’d have the voice to be almost his own branch of government and would need the cover.” Paul David Pope, The Deeds of My Fathers: How My Grandfather and Father Built New York and Created the Tabloid World of Today, New York: Phillip Turner/Rowman & Littlefield, 2010, 309, 310.
  17. One explosive story Pope’s National Enquirer‘s refrained from publishing in the late 1970s centered on excerpts from a long-sought after diary of President Kennedy’s lover, Mary Pinchot Meyer, who was murdered on October 12, 1964. “The reporters who wrote the story were even able to place James Jesus Angleton, the CIA’s head of counterintelligence operations, at the scene.” Another potential story drew on “documents proving that [Howard] Hughes and the CIA had been connected for years and that the CIA was giving Hughes money to secretly fund, with campaign donations, twenty-seven congressmen and senators who sat on sub-committees critical to the agency. There are also fifty-three international companies named and sourced as CIA fronts .. and even a list of reporters for mainstream media organizations who were playing ball with the agency.” Pope, The Deeds of My Fathers, 309.
  18. Angleton, who oversaw the Agency counterintelligence branch for 25 years, “ran a completely independent group entirely separate cadre of journalist‑operatives who performed sensitive and frequently dangerous assignments; little is known about this group for the simple reason that Angleton deliberately kept only the vaguest of files.” Bernstein, “The CIA and the Media.” 
  19. The CIA conducted a “formal training program” during the 1950s for the sole purpose of instructing its agents to function as newsmen. “Intelligence officers were ‘taught to make noises like reporters,’ explained a high CIA official, and were then placed in major news organizations with help from management. These were the guys who went through the ranks and were told ‘You’re going to he a journalist,’” the CIA official said.” The Agency’s preference, however, was to engage journalists who were already established in the industry. Bernstein, “The CIA and the Media.” 
  20. Newspaper columnists and broadcast journalists with household names have been known to maintain close ties with the Agency. “There are perhaps a dozen well known columnists and broadcast commentators whose relationships with the CIA go far beyond those normally maintained between reporters and their sources,” Bernstein maintains. “They are referred to at the Agency as ‘known assets’ and can be counted on to perform a variety of undercover tasks; they are considered receptive to the Agency’s point of view on various subjects.” Bernstein, “The CIA and the Media.” 
  21. Frank Wisner, Allen Dulles, and Washington Post publisher Phillip Graham were close associates, and the Post developed into one of the most influential news organs in the United States due to its ties with the CIA. The Post managers’ “individual relations with intelligence had in fact been the reason the Post Company had grown as fast as it did after the war,” Davis (172) observes. “[T]heir secrets were its corporate secrets, beginning with MOCKINGBIRD. Phillip Graham’s commitment to intelligence had given his friends Frank Wisner an interest in helping to make the Washington Post the dominant news vehicle in Washington, which they had done by assisting with its two most crucial acquisitions, the Times-Herald and WTOP radio and television stations.” Davis, Katharine the Great: Katharine Graham and the Washington Post, 172.
  22. In the wake of World War One the Woodrow Wilson administration placed journalist and author Walter Lippmann in charge of recruiting agents for the Inquiry, a first-of-its-kind ultra-secret civilian intelligence organization whose role involved ascertaining information to prepare Wilson for the peace negotiations, as well as identify foreign natural resources for Wall Street speculators and oil companies. The activities of this organization served as a prototype for the function eventually performed by the CIA, namely “planning, collecting, digesting, and editing the raw data,” notes historian Servando Gonzalez. “This roughly corresponds to the CIA’s intelligence cycle: planning and direction, collection, processing, production and analysis, and dissemination.” Most Inquiry members would later become members of the Council on Foreign Relations. Lippmann would go on to become the Washington Post’s best known columnists. Servando Gonzalez, Psychological Warfare and the New World Order: The Secret War Against the American People, Oakland, CA: Spooks Books, 2010, 50.
  23. The two most prominent US newsweeklies, Time and Newsweek, kept close ties with the CIA. “Agency files contain written agreements with former foreign correspondents and stringers for both the weekly newsmagazines,” according to Carl Bernstein. “Allen Dulles often interceded with his good friend, the late Henry Luce, founder of Time and Life magazines, who readily allowed certain members of his staff to work for the Agency and agreed to provide jobs and credentials for other CIA operatives who lacked journalistic experience.”  Bernstein, “The CIA and the Media.” 
  24. In his autobiography former CIA officer E. Howard Hunt quotes Bernstein’s “The CIA and the Media” article at length. “I know nothing to contradict this report,” Hunt declares, suggesting the investigative journalist of Watergate fame didn’t go far enough. “Bernstein further identified some of the country’s top media executives as being valuable assets to the agency … But the list of organizations that cooperated with the agency was a veritable ‘Who’s Who’ of the media industry, including ABC, NBC, the Associated Press, UPI, Reuters, Hearst Newspapers, Scripps-Howard, Newsweek magazine, and others.” E. Howard Hunt, American Spy: My Secret History in the CIA, Watergate, and Beyond, Hoboken NJ: John Wiley & Sons, 2007, 150.
  25. When the first major exposé of the CIA emerged in 1964 with the publication of The Invisible Government by journalists David Wise and Thomas B. Ross, the CIA considered purchasing the entire printing to keep the book from the public, yet in the end judged against it. “To an extent that is only beginning to be perceived, this shadow government is shaping the lives of 190,000,000 Americans” authors Wise and Ross write in the book’s preamble. “Major decisions involving peace and war are taking place out of public view. An informed citizen might come to suspect that the foreign policy of the United States often works publicly in one direction and secretly through the Invisible Government in just the opposite direction.”Lisa Pease, “When the CIA’s Empire Struck Back,” Consortiumnews.com, February 6, 2014.
  26. Agency infiltration of the news media shaped public perception of deep events and undergirded the official explanations of such events. For example, the Warren Commission’s report on President John F. Kennedy’s assassination was met with almost unanimous approval by US media outlets. “I have never seen an official report greeted with such universal praise as that accorded the Warren Commission’s findings when they were made public on September 24, 1964,” recalls investigative reporter Fred Cook. “All the major television networks devoted special programs and analyses to the report; the next day the newspapers ran long columns detailing its findings, accompanied by special news analyses and editorials. The verdict was unanimous. The report answered all questions, left no room for doubt. Lee Harvey Oswald, alone and unaided, had assassinated the president of the United States.” Fred J. Cook, Maverick: Fifty Years of Investigative Reporting, G.P. Putnam’s Sons, 1984, 276.
  27. In late 1966 the New York Times began an inquiry on the numerous questions surrounding President Kennedy’s assassination that were not satisfactorily dealt with by the Warren Commission. “It was never completed,” author Jerry Policoff observes, “nor would the New York Times ever again question the findings of the Warren Commission.” When the story was being developed the lead reporter at the Times‘ Houston bureau “said that he and others came up with ‘a lot of unanswered questions’ that the Times didn’t bother to pursue. ‘I’d be off on a good lead and then somebody’d call me off and send me out to California on another story or something. We never really detached anyone for this. We weren’t really serious.’” Jerry Policoff, “The Media and the Murder of John Kennedy,” in Peter Dale Scott, Paul L. Hoch and Russell Stetler, eds., The Assassinations: Dallas and Beyond, New York: Vintage, 1976, 265.
  28. When New Orleans District Attorney Jim Garrison embarked on an investigation of the JFK assassination in 1966 centering on Lee Harvey Oswald’s presence in New Orleans in the months leading up to November, 22, 1963, “he was cross-whipped with two hurricane blasts, one from Washington and one from New York,” historian James DiEugenio explains. The first, of course, was from the government, specifically the Central Intelligence Agency, the FBI, and to a lesser extent, the White House. The blast from New York was from the major mainstream media e.g. Time-Life and NBC. Those two communication giants were instrumental in making Garrison into a lightening rod for ridicule and criticism. This orchestrated campaign … was successful in diverting attention from what Garrison was uncovering by creating controversy about the DA himself.”  DiEugenio, Preface, in William Davy, Let Justice Be Done: New Light on the Jim Garrison Investigation, Reston VA: Jordan Publishing, 1999.
  29. The CIA and other US intelligence agencies used the news media to sabotage Garrison’s 1966-69 independent investigation of the Kennedy assassination. Garrison presided over the only law enforcement agency with subpoena power to seriously delve into the intricate details surrounding JFK’s murder. One of Garrison’s key witnesses, Gordon Novel, fled New Orleans to avoid testifying before the Grand Jury assembled by Garrison. According to DiEugenio, CIA Director Allen “Dulles and the Agency would begin to connect the fugitive from New Orleans with over a dozen CIA friendly journalists who—in a blatant attempt to destroy Garrison’s reputation—would proceed to write up the most outrageous stories imaginable about the DA.” James DiEugenio, Destiny Betrayed: JFK, Cuba, and The Garrison Case, Second Edition, New York: SkyHorse Publishing, 2012, 235.
  30. CIA officer Victor Marchetti recounted to author William Davy that in 1967 while attending staff meetings as an assistant to then-CIA Director Richard Helms, “Helms expressed great concerns over [former OSS officer, CIA operative and primary suspect in Jim Garrison’s investigation Clay] Shaw’s predicament, asking his staff, ‘Are we giving them all the help we can down there?’” William Davy, Let Justice Be Done: New Light on the Jim Garrison Investigation, Reston VA: Jordan Publishing, 1999.
  31. The pejorative dimensions of the term “conspiracy theory” were introduced into the Western lexicon by CIA “media assets,” as evidenced in the design laid out by Document 1035-960 Concerning Criticism of the Warren Report, an Agency communiqué issued in early 1967 to Agency bureaus throughout the world at a time when attorney Mark Lane’s Rush to Judgment was atop bestseller lists and New Orleans DA Garrison’s investigation of the Kennedy assassination began to gain traction.
  32. Time had close relations with the CIA stemming from the friendship of the magazine’s publisher Henry Luce and Eisenhower CIA chief Allen Dulles. When former newsman Richard Helms was appointed DCI in 1966 he “began to cultivate the press,” prompting journalists toward conclusions that placed the Agency in a positive light. As Time Washington correspondent Hugh Sidney recollects, “‘[w]ith [John] McCone and [Richard] Helms, we had a set-up when the magazine was doing something on the CIA, we went to them and put it before them … We were never misled.’ Similarly, when Newsweek decided in the fall of 1971 to do a cover story on Richard Helms and ‘The New Espionage,’ the magazine, according to a Newsweek staffer, went directly to the agency for much of the information. And the article … generally reflected the line that Helms was trying so hard to sell: that since the latter 1960s … the focus of attention and prestige within CIA’ had switched from the Clandestine Services to the analysis of intelligence, and that ‘the vast majority of recruits are bound for’ the Intelligence Directorate.” Victor Marchetti and John D. Marks, The CIA and the Cult of Intelligence, New York: Alfred A. Knopf, 1974, 362-363.
  33. In 1970 Jim Garrison wrote and published the semi-autobiographical A Heritage of Stone, a work that examines how the New Orleans DA “discovered that the CIA operated within the borders of the United States, and how it took the CIA six months to reply to the Warren Commission’s question of whether Oswald and [Jack] Ruby had been with the Agency,” Garrison biographer and Temple University humanities professor Joan Mellen observes. “In response to A Heritage of Stone, the CIA rounded up its media assets” and the book was panned by reviewers writing for the New York Times, the Los Angeles Times, the Washington Post, the Chicago Sun Times, and Life magazine. “John Leonard’s New York Times review went through a metamorphosis,” Mellen explains. “The original last paragraph challenged the Warren Report: ‘Something stinks about this whole affair,’ Leonard wrote. ‘Why were Kennedy’s neck organs not examined at Bethesda for evidence of a frontal shot? Why was his body whisked away to Washington before the legally required Texas inquest? Why?’ This paragraph evaporated in later editions of the Times. A third of a column gone, the review then ended: ‘Frankly I prefer to believe that the Warren Commission did a poor job, rather than a dishonest one. I like to think that Garrison invents monsters to explain incompetence.’” Joan Mellen, A Farewell to Justice: Jim Garrison, JFK’s Assassination, and the Case That Should Have Changed History, Washington DC: Potomac Books, 2005, 323, 324.
  34. CIA Deputy Director for Plans Cord Meyer Jr. appealed to Harper & Row president emeritus Cass Canfield Sr. over the book publisher’s pending release of Alfred McCoy’s The Politics of Heroin in Southeast Asia, based on the author’s fieldwork and Yale PhD dissertation wherein he examined the CIA’s explicit role in the opium trade. “Claiming my book was a threat to national security,” McCoy recalls, “the CIA official had asked Harper & Row to suppress it. To his credit, Mr. Canfield had refused. But he had agreed to review the manuscript prior to publication.” Alfred W. McCoy, The Politics of Heroin: CIA Complicity in the Global Drug Trade, Chicago Review Press, 2003, xx.
  35. Publication of The Secret Team, a book by US Air Force Colonel and Pentagon-CIA liaison L. Fletcher Prouty recounting the author’s firsthand knowledge of CIA black operations and espionage, was met with a wide scale censorship campaign in 1972. “The campaign to kill the book was nationwide and world-wide,” Prouty notes. “It was removed from the Library of Congress and from college libraries as letters I received attested all too frequently … I was a writer whose book had been cancelled by a major publisher [Prentice Hall] and a major paperback publisher [Ballantine Books] under the persuasive hand of the CIA.” L. Fletcher Prouty, The Secret Team: The CIA and Its Allies in Control of the United States and the World, New York: SkyHorse Publishing, 2008, xii, xv.
  36. During the Pike Committee hearings in 1975 Congressman Otis Pike asked DCI William Colby, “Do you have any people paid by the CIA who are working for television networks?” Colby responded, “This, I think, gets into the kind of details, Mr. Chairman, that I’d like to get into in executive session.” Once the chamber was cleared Colby admitted that in 1975 specifically “the CIA was using ‘media cover’ for eleven agents, many fewer than in the heyday of the cloak-and-pencil operations, but no amount of questioning would persuade him to talk about the publishers and network chieftains who had cooperated at the top.” Schorr, Clearing the Air, 275.
  37. “There is quite an incredible spread of relationships,” former CIA intelligence officer William Bader informed a US Senate Intelligence Committee investigating the CIA’s infiltration of the nation’s journalistic outlets. “You don’t need to manipulate Time magazine, for example, because there are Agency people at the management level.” Bernstein, “The CIA and the Media.”
  38. In 1985 film historian and professor Joseph McBride came across a November 29, 1963 memorandum from J. Edgar Hoover, titled, “Assassination of President John F. Kennedy,” wherein the FBI director stated that his agency provided two individuals with briefings, one of whom was “Mr. George Bush of the Central Intelligence Agency.” ” When McBride queried the CIA with the memo a “PR man was tersely formal and opaque: ‘I can neither confirm nor deny.’ It was the standard response the agency gave when it dealt with its sources and methods,” journalist Russ Baker notes. When McBride published a story in The Nation, “The Man Who Wasn’t There, ‘George Bush,’ C.I.A. Operative,” the CIA came forward with a statement that the George Bush referenced in the FBI record “apparently” referenced a George William Bush, who filled a perfunctory night shift position at CIA headquarters that “would have been the appropriate place to receive such a report.” McBride tracked down George William Bush to confirm he was only employed briefly as a “probationary civil servant” who had “never received interagency briefings.” Shortly thereafter The Nation ran a second story by McBride wherein “the author provided evidence that the Central Intelligence Agency had foisted a lie on the American people … As with McBride’s previous story, this disclosure was greeted with the equivalent of a collective media yawn.” Since the episode researchers have found documents linking George H. W. Bush to the CIA as early as 1953. Russ Baker, Family of Secrets: The Bush Dynasty, America’s Invisible Government, and the Hidden History of the Last Fifty Years, New York: Bloomsbury Press, 2009, 7-12.
  39. Operation Gladio, the well-documented collaboration between Western spy agencies, including the CIA, and NATO involving coordinated terrorist shootings and bombings of civilian targets throughout Europe from the late 1960s through the 1980s, has been effectively expunged from major mainstream news outlets. A LexisNexis Academic search conducted in 2012 for “Operation Gladio” retrieved 31 articles in English language news media—most appearing in British newspapers. Only four articles discussing Gladio ever appeared in US publications—three in the New York Times and one brief mention in the Tampa Bay Times. With the exception of a 2009 BBC documentary, no network or cable news broadcast has ever referenced the state-sponsored terror operation. Almost all of the articles referencing Gladio appeared in 1990 when Italian Prime Minister Giulio Andreotti publicly admitted Italy’s participation in the process. The New York Times downplayed any US involvement, misleadingly designating Gladio “an Italian creation” in a story buried on page A16. In reality, former CIA director William Colby revealed in his memoirs that covert paramilitaries were a significant agency undertaking set up after World War II, including “the smallest possible coterie of the most reliable people, in Washington [and] NATO.” James F. Tracy, “False Flag Terror and Conspiracies of Silence,” Global Research, August 10, 2012.
  40. Days before the April 19, 1995 bombing of the Alfred P. Murrah Federal Building in Oklahoma City DCI William Colby confided to his friend, Nebraska State Senator John DeCamp his personal concerns over the Militia and Patriot movement within the United States, then surging in popularity due to the use of the alternative media of that era–books, periodicals, cassette tapes, and radio broadcasts. “I watched as the Anti-War movement rendered it impossible for this country to conduct or win the Vietnam War,” Colby remarked. “I tell you, dear friend, that the Militia and Patriot movement in which, as an attorney, you have become one of the centerpieces, is far more significant and far more dangerous for American than the Anti-War movement ever was, if it is not intelligently dealt with. And I really mean this.” David Hoffman, The Oklahoma City Bombing and the Politics of Terror, Venice CA: Feral House, 1998, 367.
  41. Shortly after the appearance of journalist Gary Webb’s “Dark Alliance” series in the San Jose Mercury News chronicling the Agency’s involvement in drug trafficking, the CIA’s public affairs division embarked on a campaign to counter what it termed “a genuine public relations crisis for the Agency.” Webb was merely reporting to a large audience what had already been well documented by scholars such as Alfred McCoy and Peter Dale Scott, and the 1989 Kerry Committee Report on Iran-Contra—that the CIA had long been involved in the illegal transnational drug trade. Such findings were upheld in 1999 in a study by the CIA inspector general. Nevertheless, beginning shortly after Webb’s series ran, “CIA media spokesmen would remind reporters seeking comment that this series represented no real news,” a CIA internal organ noted, “in that similar charges were made in the 1980s and were investigated by the Congress and were found to be without substance. Reporters were encouraged to read the “Dark Alliance’ series closely and with a critical eye to what allegations could actually be backed with evidence.” http://www.foia.cia.gov/sites/default/files/DOC_0001372115.pdf
  42. On December 10, 2004 investigative journalist Gary Webb died of two .38 caliber gunshot wounds to the head. The coroner ruled the death a suicide. “Gary Webb was MURDERED,” concluded FBI senior special agent Ted Gunderson in 2005. “He (Webb) resisted the first shot [to the head that exited via jaw] so he was shot again with the second shot going into the head [brain].” Gunderson regards the theory that Webb could have managed to shoot himself twice as “impossible!” Charlene Fassa, “Gary Webb: More Pieces in the Suicided Puzzle,” Rense.com, December 11, 2005.
  43. The most revered journalists who receive “exclusive” information and access to the corridors of power are typically the most subservient to officialdom and often have intelligence ties. Those granted such access understand that they must likewise uphold government-sanctioned narratives. For example, the New York Times’ Tom Wicker reported on November 22, 1963 that President John F. Kennedy “was hit by a bullet in the throat, just below the Adam’s apple.” Yet his account went to press before the official story of a single assassin shooting from the rear became established. Wicker was chastised through “lost access, complaints to editors and publishers, social penalties, leaks to competitors, a variety of responses no one wants.” Barrie Zwicker, Towers of Deception: The Media Coverup of 9/11, Gabrioloa Island, BC: New Society Publishers, 2006, 169-170.
  44. The CIA actively promotes a desirable public image of its history and function by advising the production of Hollywood vehicles, such as Argo and Zero Dark Thirty. The Agency retains “entertainment industry liaison officers” on its staff that “plant positive images about itself (in other words, propaganda) through our most popular forms of entertainment,” Tom Hayden explains in the LA Review of Books. “So natural has the CIA–entertainment connection become that few question its legal or moral ramifications. This is a government agency like no other; the truth of its operations is not subject to public examination. When the CIA’s hidden persuaders influence a Hollywood movie, it is using a popular medium to spin as favorable an image of itself as possible, or at least, prevent an unfavorable one from taking hold.” Tom Hayden, “Review of The CIA in Hollywood: How the Agency Shapes Film and Television by Tricia Jenkins,” LA Review of Books, February 24, 2013,
  45. Former CIA case officer Robert David Steele states that CIA manipulation of news media is “worse” in the 2010s than in the late 1970s when Bernstein wrote “The CIA and the Media.” “The sad thing is that the CIA is very able to manipulate [the media] and it has financial arrangements with media, with Congress, with all others. But the other half of that coin is that the media is lazy.” James Tracy interview with Robert David Steele, August 2, 2014,
  46. A well-known fact is that broadcast journalist Anderson Cooper interned for the CIA while attending Yale as an undergraduate in the late 1980s. According to Wikipedia Cooper’s great uncle, William Henry Vanderbilt III, was an Executive Officer of the Special Operations Branch of the OSS under the spy organization’s founder William “Wild Bill” Donovan. While Wikipedia is an often dubious source, Vanderbilt’s OSS involvement would be in keeping with the OSS/CIA reputation of taking on highly affluent personnel for overseas derring-do. William Henry Vanderbilt III, Wikipedia.
  47. Veteran German journalist Udo Ulfkotte, author of the 2014 book Gekaufte Journalisten (Bought Journalists) revealed how under the threat of job termination he was routinely compelled to publish articles written by intelligence agents using his byline. “I ended up publishing articles under my own name written by agents of the CIA and other intelligence services, especially the German secret service,” Ulfkotte explained in a recent interview with Russia Today. “German Journo: European Media Writing Pro-US Stories Under CIA Pressure,” RT, October 18, 2014.
  48. In 1999 the CIA established In-Q-Tel, a venture capital firm seeking to “identify and invest in companies developing cutting-edge information technologies that serve United States national security interests.” The firm has exercised financial relationships with internet platforms Americans use on a routine basis, including Google and Facebook. “If you want to keep up with Silicon Valley, you need to become part of Silicon Valley,” says Jim Rickards, an adviser to the U.S. intelligence community familiar with In-Q-Tel’s activities. “The best way to do that is have a budget because when you have a checkbook, everyone comes to you.” At one point IQT “catered largely to the needs of the CIA.” Today, however, “the firm supports many of the 17 agencies within the U.S. intelligence community, including the National Geospatial-Intelligence Agency (NGA), the Defense Intelligence Agency (DIA) and the Department of Homeland Security Science and Technology Directorate.” Matt Egan, “In-Q-Tel: A Glimpse Inside the CIA’s Venture Capital Arm,” FoxBusiness.com, June 14, 2013.
  49. At a 2012 conference held by In-Q-Tel CIA Director David Patraeus declared that the rapidly-developing “internet of things” and “smart home” will provide the CIA with the ability to spy on any US citizen should they become a “person of interest’ to the spy community,” Wired magazine reports. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,’ Patraeus enthused, ‘particularly to their effect on clandestine tradecraft’ … ‘Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Patraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.” Spencer Ackerman, “CIA Chief: We’ll Spy on You Through Your Dishwasher,” Wired, March 15, 2012.
  50. In the summer of 2014 a $600 million computing cloud developed by Amazon Web Services for the CIA began servicing all 17 federal agencies comprising the intelligence community. “If the technology plays out as officials envision,” The Atlantic reports, “it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks.” “The Details About the CIA’s Deal With Amazon,” The Atlantic, July 17, 2014.

 

Global Research