“D” Weapons Use Appliances to Spy on Homes, Internet as Cyber Battleground: “World War III is a Guerrilla Information War”

SHTFplan
by Mac Slavo

digital-cyberwar

Though it has remained officially unsaid, the powers that be have all-but-officially designated the American people as their enemy in a foggy battleground that has become global, nebulous, highly technological and extremely paranoid.

Homeland Security and FBI protocol have set the stage for profiling Americans as potential threats, while the rising police state have often cracked down with a heavy hand and perhaps a SWAT raid. The War on Terror, global jihad, cyber attacks and a new Cold War have all contributed the necessary pretexts for an atmosphere of control and preemptive suspicion that seemingly justifies total surveillance of the population.

USCYBERCOM, activated by the federal government in 2009 and operated by the director of the NSA, adds a whole new dimension to that, by bringing home – to computer screens and devices everywhere – the cyberwar.

And since that time, WikiLeaks founder Julian Assange became the first civilian designated, according to declassified information, as a military-designated “enemy of the state.” Many SWAT raids, FBI and police visits have now resulted from alleged threatening or offensive Internet activity. Likewise, StuxNet became the first major cyber attack against Iran, a (perceived) military threat. More recently, we’ve seen major cyber warfare exchanges with North Korea, resulting in an Internet blackout there following the SONY hacking scandal and diplomatic standoff over a Hollywood film.

As Daniel Taylor, of Old Thinker News, points out, the militarization and weaponization of the digital space has been a long time coming, and it might mutate into a conflict wide enough to involve you and your online activities. His article, “NSA Cyber War Will Use Internet of Things as Weapons Platform; Your Home is the Battlefield” argues:

As time goes on it will be readily apparent to the masses that the monumental surveillance architecture that will catalog and track the population is nothing more than an attempt at full spectrum domination.

[…]

New Snowden documents recently revealed that the NSA is getting ready for future digital wars as the agency postures itself in an aggressive manner towards the world. “The Five Eyes Alliance“, a cooperation between United States, Canada, Britain, Australia, and New Zealand, is working hard to develop these weapons of Cyber Warfare.

So called “D” weapons, as reported by Der Spiegel, will paralyze computer networks and infrastructure that they monitor. Water supplies, factories, airports, as well as the flow of money are all potential targets.

Simultaneously, while handing out tech goodies to consumers, the American people have also become their dupes, their sheep and their eyes. Through the digitalization of the planet, cyberspace has brought home a front that is equal parts transformative, enticing and eerily grim.

The Edward Snowden leaks constituted notice to the world that all things digital are subject to surveillance – a total and complete surveillance that includes the participation of the population who, through carrying various “smart” devices that capture data, images and audio for meta-analysis – are feeding the powers that be with vast catalogs of spy information – including valuable proprietary consumer data. Taylor notes:

The NSA’s Cyber Weapons program will undoubtedly exploit these devices, which include household appliances, and, frighteningly, medical devices that can be hacked. Pacemakers can be remotely stopped, and insulin pumps can be made to deliver a lethal dose of insulin. With the advent of implantable devices that communicate via Wifi, the potential for manipulation and hacking is growing exponentially.

If the developers of these internet connected devices don’t willingly work with the NSA to place back-doors in the technology, the agency is hard at work trying to find and exploit them.

Through the emerging Internet of Things (IoT), household appliances, smart meters, street lights and more will create a total digital picture of life, capturing real time data per appliance that creates a total information grid. Taylor writes:

The Der Spiegel report does not mention the wider issue of the expanding network of everyday objects and appliances that are connected to the internet. According to CIA chief David Patraeus the Internet of Things will have a monumental impact on “clandestine tradecraft.” Richard Adhikari writes for Tech News World that the Internet of Things is “…ripe for exploitation by the NSA”

Consumer appliances are now becoming activated and “smart.” RFID chips and wireless internet connections enable devices like televisions, refrigerators, printers, and computers to communicate with each other and generally make life easier for us. This comes at a price, however. Your privacy is eliminated.

[…]

Think the idea of your appliances spying on you is crazy? According to Samsung’s new privacy policy, their smart TV can monitor your conversation. The policy states, “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.”

This digital surveillance age does not make spying on persons of interest merely possible or probable in any theoretical sense. Instead, it is a living matrix that defaults to spying. It is set up to flag aberrant and eccentric behavior and patterns, and will prompt a due response – whether you have done anything wrong or not.

The scheduled blurring of legitimate military targets and average civilian members of the population will present a different type of war, with weaponized information and data. Putting it all in perspective, Taylor cites a media pioneer from a time before the digital age had dawned:

World War III is a guerrilla information war with no division between military and civilian participation.” – Marshall McLuhan, Culture is Our Business, 1970

Such a war will likely be the ultimate battle between the individual and the state. Unless stopped or slowed, it will  accomplish, systematically, what no Cold War secret agency working on the ground and in the shadows could ever hope to gain.

SHTFplan

US Social Surveillance Abuse Puts Civil Liberties in Jeopardy First

New Eastern Outlook
by Vladimir Platov

67674433

According to various publications in the American and foreign media, the United States has created a global system of cyber espionage that allows the interception and processing of personal data around the globe in violation of fundamental human rights. Tapped phones, intercepted short messages, supervised discussions in social networks and stolen emails – this is the ugly reality we are living in. The NSA and other units of the United States Intelligence Community are more than capable of breaching any mobile operating system, be it iOS, Android or BlackBerry OS.

In 2011 US intelligence agencies successfully finished the development of geo-location tracking software that allows the NSA to collect and save more than five billion location records of mobile users around the world on a daily basis, and then through a special program labeled CO-TRAVELER analyze and monitor the movement of certain individuals that could be of interest for Washington. In addition, since 2010  information on social contacts of US citizens, their personal data, including telephone calls, Internet logs, bank codes, insurance data is being processed by intelligence agencies on a regular basis.

The NSA’s secret project codenamed Boundless Informant seeks to establish control over “information space.” According to The Guardian it has been able to collect the data on 97 billion phone calls worldwide since March 2013.

The global electronic intelligence net Echelon (AUSCANNZUKUS or Five Eyes), that was established by the US in cooperation with the UK back in 1947, allowed the intelligence agencies of the the Untied States, the United Kingdom, Canada, Australia, New Zealand, Norway, Denmark, Germany, Turkey and other countries to exchange secret information, including the records on their respective citizens.

Yet another secret project codenamed Prism established by the NSA and Britain’s Government Communications Headquarters (GCHQ), allowed intelligence agencies to establish close partnerships with major IT companies back in 2007, including Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Such cooperation allows the secret services to read private e-mails and monitor the transfer of files throughout global information space. This allows the NSA to control sovereign leaders, business representatives and foreign diplomats as has been repeatedly reported on by various international media outlets.

However, Washington doesn’t seem to be satisfied with its “progress” since it continues funding and developing new secret projects that would not simply allow the United States to retain an effective control over global information space, but to influence  web users worldwide to its own advantage as well.

Thus, the Intelligence Advanced Research Projects Activity Agency (IARPA) in recent years has started a number of research programs to manipulate social networks.

Programs for analysis of the socio-cultural content of language (Socio-Cultural Content in Language – SCIL Program) is implemented in order to develop algorithms, methods and technologies that could enable the intelligence community to supervise the activities of various non-governmental organizations that do not agree with the social policies of certain governments. The development of this program is dictated by the need to recognize the content of messages transmitted over the Internet, taking into account linguistic differences and dialects.

IARPA in close collaboration with the National Institute of Standards and Technology is also developing a program codenamed Reynard, which aims at studying the phenomena of social dynamics in  so-called virtual worlds such as MMOs. This particular study is carried out in the interest of the security agencies in order to assess the political mood of the population and taking proactive measures once it changes.

The intelligence community is also sponsoring the development of the Aladdin program designed for automated analysis and description of video content (Automated Low-Level Analysis and Description of Diverse Intelligence Video – VACE). The main goal of this program is to provide intelligence analysts with automated search capabilities to track videos that could be of interest for them. Videos for analytical processing can come from different sources – television, surveillance cameras, regular pictures, interviews or even footage shot by drones. The footage is systematized by time and place to identify certain individuals and determine the sequence of their actions which may be in certain semantic relations to present-day events.

Currently, IARPA implemented a program called Babel, which aims at developing effective speech recognition software in different languages and dialects.

Washington and its agencies are literally spending billions of taxpayer dollars annually under the convenient guise of the “war on terror”, which in fact turns out to be a hidden war against its own citizens, now deprived of basic human rights. But what makes it even worse is that it’s pushing its satellite countries to launch an all-out offensive against the civil liberties of Europe and beyond.

Vladimir Platov, Middle East expert, exclusively for the online magazine “New Eastern Outlook”

New Eastern Outlook

Secret Justice Dept. Interceptor Flights Scoop Up Cell Data From U.S. Cities

The Daily Sheeple

cessna-justice-dept

Remember when President Obama told Jay Leno (and the world) with a smiling face that “there is no spying on Americans”? Not only was that untrue, but it is now clear that it was blatantly false on so very many levels.

The cell phone interceptor scandal has now become scales worse, with revelations that the Justice Dept. has been scooping Americans’ data in major cities across the nation with secret flights by the tens of thousands, continuously. And that’s without them admitting how far this has gone. Yikes.

As if the state of the surveillance society wasn’t bad enough, this has come to light, via Fox News:

The Justice Department is scooping up data from thousands of cellphones through fake communications towers deployed on airplanes, a high-tech hunt for criminal suspects that is snagging large number of innocent Americans, according to people familiar with the operations.

The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

Planes are equipped with devices—some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. unit that produces them—which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.

The technology in the two-foot-square device enables investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location, these people said.


Click to see full sized image
.

That just follows the series of revelations concerning secretive on-the-ground interceptors – known as Sting Ray – that also mimic cell phone towers and force devices to share data with police departments, the FBI and/or various other unknown entities (perhaps foreign governments, the NSA or private firms?).

According to the Electronic Privacy Information Center (EPIC):

A StingRay is a device that can triangulate the source of a cellular signal by acting “like a fake cell phone tower” and measuring the signal strength of an identified device from several locations. With StingRays and other similar “cell site simulator” technologies, Government investigators and private individuals can locate, interfere with, and even intercept communications from cell phones and other wireless devices. The Federal Bureau of Investigation (“FBI”) has used such cell site simulator technology to track and locate phones and users since at least 1995.

As Melissa Melton previously wrote:

According to the Associated Press, the Obama Administration has been actively advising police departments to refuse disclosure about certain cell phone surveillance technologies, including the widely used “StingRay” device, even in routine state records requests.

Instead, police are bypassing company assistance and collecting unique information on suspects, persons of interests, and – as the AP reports – they can even “sweep up basic cellphone data from entire neighborhoods,” all without any court orders or oversight.

The Edward Snowden leaks proved beyond a shadow of a doubt that the NSA has zero regard for the privacy of Americans.

Now, it is also crystal clear that the Justice Department and FBI (and perhaps likely most assuredly other law enforcement agencies) have no regard, either. Not for Americans. Not for privacy. Not for the law. Not for due process. And certainly not for the constitutional republic they were ostensibly created to serve.

In these troubled times, it is at least good to know that former NSA chief Gen. Keith Alexander has found a lucrative gig advising Wall Street on cybersecurity using NSA data and employees who are also simultaneously top NSA officials.

No conflict of interest, no breach of duty to see here. Move along.

Gulp. Sigh.

The Daily Sheeple

Is the NSA Grabbing All Americans’ Phone Call Content?

The New American
by Thomas R. Eddlem

nsa snooping

The NSA and the National Director of Intelligence have consistently denied that they listen to the content of Americans’ telephone calls, but the history of intelligence agency claims about the scope of its spying on Americans is one of lies and more lies. So the question must be asked: Are they lying again with respect to recording the content of Americans’ phone calls?

The answer to that question may be “yes,” and it may be “no.” But there’s also a possible “technically, no” response to that question that’s even more frightening, for which there is a substantial amount of circumstantial evidence. First, here are a few of the blatant lies the U.S. intelligence apparatus has publicly told to the American people:

Lie #1: We are not keeping Americans’ phone data.
During a March 12, 2013 Senate hearing, Senator Ron Wyden asked U.S. Intelligence Director James Clapper: “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?” Admiral James Clapper replied: “No, sir.”

Several months later, NSA contractor Edward Snowden revealed to the American people that Clapper’s statement was a bold-faced lie. The NSA had, in fact, been collecting data on hundreds of millions of Americans under a program named PRISM, a program NSA documents revealed that also collected Internet traffic “directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” And copies of that database, it was later learned, are sent to the U.S. Drug Enforcement Agency. James Bamford over at The Intercept likewise revealed on October 2, 2014 a 40-year history of the NSA releasing documented lies to both the American people and to Congress. 

Lie #2: We can’t grab Americans’ e-mails.
NSA Director General Keith Alexander told U.S. House investigators on March 20, 2012, that the NSA didn’t have the “ability” to wiretap Americans’ telephone calls:

Representative Hank Johnson (D-Ga.): General Alexander, if Dick Cheney were elected president and wanted to detain and incessantly waterboard every American who sent an email making fun of his well-known hunting mishaps, what I’d like to know is, does the NSA have the technological capacity to identify those Cheney bashers based upon the content of their emails? Yes or no.
General Alexander: No. Can I explain that?
Representative Johnson: Yes.
General Alexander: The question is where are the emails and where is NSA’s coverage. I assume by your question that those emails are in the United States.
Representative Johnson: Correct.
General Alexander: NSA does not have the ability to do that in the United States.

The reality is that the NSA does possess the technical ability to record Americans, and former NSA contractor Edward Snowden’s revelations proved that hundreds of thousands of Americans’ telephone conversations have been “legitimately” recorded by the NSA because one party of the call was abroad. Moreover, thousands of innocent Americans’ e-mails have been monitored by the NSA, according to information provided by whistleblower Edward Snowden. Indeed, the capacity to wiretap American’s phone lines and record the full audio from them is present on a widespread basis, as the NSA program SOMALGET wiretaps the full audio from every call in and out of the nation of the Bahamas (and the NSA grabs metadata from the same program from all calls in Mexico, Kenya, and the Philippines).

Lie #3: CIA wouldn’t hack into U.S. Senate computers.
As the U.S. Senate conducted its oversight of the Bush-era detention policies under the CIA, Senator Dianne Feinstein (D-Calif.) charged the CIA with spying on Senate computers and deleting material on those U.S. Senate computers. “As far as the allegations of the CIA hacking into Senate computers, nothing could be further from the truth,” CIA Director John Brennan told Andrea Mitchell at a Council on Foreign Relations forum March 11, 2014. It later came out that Feinstein’s charges were the precise truth, and Brennan had told a bold-faced lie.

Lie #4: NSA wiretapping authority has never been abused.
“There is no abuse,” former NSA Director Michael Hayden told NBC’s Meet the Press on December 15, 2013. President Obama himself denied the NSA had abused its surveillance capabilities in an address to the nation on August 9, 2013: “If you look at the reports — even the disclosures that Mr. Snowden has put forward — all the stories that have been written, what you’re not reading about is the government actually abusing these programs and listening in on people’s phone calls or inappropriately reading people’s emails. What you’re hearing about is the prospect that these could be abused. Now, part of the reason they’re not abused is because these checks are in place, and those abuses would be against the law and would be against the orders of the FISC.”

But it soon came out that there have been thousands of cases of abuse of that intelligence on American citizens from internal NSA reviews of the information. In some cases, this involved taking audio from telephone calls of Americans by suspicious lovers in the employ of the NSA, according to a summary provided to Senator Charles Grassley (R-Iowa): “In 2004, upon her return from a foreign site, the subject reported to NSA Security that, in 2004, she tasked a foreign telephone number she had discovered in her husband’s cellular telephone because she suspected that her husband had been unfaithful. The tasking resulted in voice collection of her husband.”

So in light of the many lies of our intelligence officials and the politicians overseeing them, it’s quite possible that the NSA could be lying — again — with respect to its gathering, retention and search of Americans’ conversations as it did with phone records “metadata.” 

Tag-team Approach to Surveilling Americans
But there’s another possible explanation for the NSA following legal protocol, as claimed in public, where it nevertheless has indirect access to Americans’ phone calls: It’s possible the NSA has an agreement with foreign intelligence agencies to spy on Americans in exchange for U.S. surveillance of their populations, with an agreement to exchange the information. Consider the possibility that the NSA — which like the all-seeing eye of Sauron in the Lord of the Rings trilogy — is faced outward surveilling the world while the other two pairs of the “Five Eyes” partners (the U.K., Canada, Australia, and New Zealand) are focused inward on the NSA’s one blind spot: the United States. This may sound like a far-out conspiracy theory, but statements of partnership between the United States and it allies — especially its Anglo “Five Eyes” allies — make such an arrangement plausible in light of existing legal restrictions against surveilling American citizens.

The NSA has paid hundreds of millions of dollars to “Five Eyes” partner GCHQ in Britain because GCHQ is “less constrained by NSA’s concerns about compliance,” according to intelligence officials who talked off the record with London’s The Guardian for August 1, 2013. Of course, there are no restrictions whatsoever on NSA surveillance of foreigners; the only surveillance restrictions on the NSA are those against recording the audio of Americans’ phone calls. According to The Guardian, the federal funding of British intelligence “exploited to the full our unique selling points of geography, partnerships [and] the UK’s legal regime.” The chief benefit of geography is that Britain is not constrained by legal restrictions on spying on Americans. A British Cabinet official told The Guardian after the Edward Snowden revelations that “joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”

GCHQ has already acknowledged collecting massive Internet information on British citizens under its blanket authority under U.K. law to collect “external communications.” What’s to stop them from also collecting the Facebook and Google traffic of Americans? Clearly, Americans’ phone calls and e-mails are “external” to the U.K. But without American assistance, the British government likely lacked the technical capability for such massive surveillance, or perhaps lacked the will to invest this level of funds to surveil the people of an ally. In this light, the massive NSA aid to GCHQ and the close partnership with the Five Eyes countries could be explained. Two pair of the Five Eyes are quite possibly charged with surveilling Americans, and then coordinating with their American counterparts in order to skate around what little is left of the Fourth Amendment to the U.S. Constitution prohibiting warrantless searches. In exchange, the NSA shares information on their people, as well as information on other nations where the United States surveils and our allies don’t have surveillance capabilities.

Similar relationships have been reported among America’s other allies. The Washington Post reported on October 30, 2013, “In France, the daily Le Monde reported Wednesday that France’s external intelligence agency collaborated with the United States starting at the end 2011 or beginning of 2012 to provide a window into Internet traffic flowing via underwater cables that surface in France…. The cables carry much of the Internet traffic that flows to Africa and Afghanistan, the newspaper said. In exchange for allowing access to the traffic, the NSA provided information about areas of the world where France has no intelligence presence, the newspaper reported.” What areas that involved, the article didn’t specify. Clearly there are many areas the massive resources of the NSA could help the French intelligence agencies. But if the French intelligence agencies are willing to sell out the privacy of their people in exchange for more intelligence sharing, why should American intelligence agencies be immune from such a deal?

Indeed, American intelligence officials have publicly expressed a rather blasé attitude toward foreign intelligence agencies spying on Americans. In an October 29, 2013, hearing before the House Select Committee on Intelligence, Director of Intelligence James Clapper responded to this question from Chairman Mike Rogers (R-Mich.):

Mike Rogers: Do you believe that the allies have conducted or at any time any type of espionage activity against the United States of America — our intelligence services, our leaders, otherwise?
Clapper: Absolutely…. And I have to say, Chairman Rogers, that some of this reminds me a lot of the movie Casablanca. “My God, there’s gambling going on here!” You know, it’s the same kind of thing.
The statement above proves that Clapper is aware of allied intelligence agencies spying on Americans, an activity the agencies he controls are prohibited from doing. But it also leaves open the question of how much of that spying (and sharing of that intelligence) is done on a formalized partnership basis, and how much is done on an ad hoc basis. If the NSA is lying about its restraint from collecting the audio of Americans’ phone calls, a vigorous partnership of “we’ll spy on you, if you’ll spy on us” would be unnecessary, as would hundreds of millions of dollars in aid to GCHQ. But if the NSA wants to surveil Americans while at the same time formally complying with their public pronouncements, focusing two pair of the “Five Eyes” back on Americans becomes a real possibility.

The extent of foreign surveillance of American phone calls is not known, and won’t be known without an Edward Snowden-like whistleblower from GCHQ or one of the other Five Eyes partners. But it’s clear that Congress should not take the NSA’s public pronouncements at face value, but should investigate the level of foreign surveillance of Americans.

The New American

Censorship Alert: the Alternative Media Getting Harassed by the NSA

New Eastern Outlook
by Christof Lehmann

345345345Google’s Safe Browsing List that blocks websites and flags them as containing malware is increasingly used as mechanism for the censoring of independent media and the falsification of history. It is an alarming development that, left unchallenged, puts the survival of any independent newspaper, blog, TV or radio station at risk.. Over the past months the list has apparently been used to target websites critical of U.S.’ involvement in the wars in the Middle East, U.S.’ involvement in Ukraine and independent media who are publishing material that is critical of Zionism.

Google’s Safe Browsing List translates into the blocking of websites which allegedly contain malware. Instead of showing the website one is presented with a red-colored Google page that warns that the URL in question has been blocked because it contains malware. Ultimately, being flagged on the list can also result in the removal of the flagged websites from Google’s search engine. Being flagged, blocked or removed from search engines can have devastating results for independent journalists and media who are struggling to finance investigative journalism, rather than regurgitating alternative versions of Reuters and other major news agencies. The targeting of independent media and journalists is especially noteworthy when one considers Google’s close cooperation with the United States’ National Security Agency (NSA).

Incestuous Relationships between Google, Apple, Microsoft, their Subsidiaries, and the NSA.

Google’s close cooperation with the NSA is a well-documented fact. An article from May 7, entitled ”Is Google in cahoots with the NSA? Email leak reveals close relationship”, published in Tech Times, reveals that the close cooperation between Google and the NSA was documented long before NSA whistleblower Edward Snowden told the world what most who cared to investigate already knew. The article quotes emails between NSA Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt from 2011 and 2012. Tech Times states:

In the mails, the Google executives sound friendly and cooperative. Alexander’s emails hint at the importance of ´Google’s participation in refinement, engineering and deployment of solutions`to cyber threats”.

The article also details the fact that the NSA chief had invited CEOs of key companies including Google, Apple, and Microsoft to classified briefings. What is important about these three key corporations cooperation with the NSA is that they are economically interrelated with most other, commercial Internet providers, including web-hosting companies, firms which provide Internet security products, as well as advertising companies who sell advertising on everything from blogs over smaller independent media to major corporate newspapers. The following are recent examples, which demonstrate how this incestuous relationship translates into the targeting of independent media, censorship and the falsification of history.

October 6, nsnbc received an e-mail from the Internet security provider SiteLock, warning that there was a serious malware issue pertaining some articles published in nsnbc. SiteLock stressed that the issue had to be resolved within 72 hours if nsnbc international wanted to avoid being added to Google’s Safe Browsing List and have the site withdrawn from nsnbc’s web-host, which among many other web hosts is a business partner of Site Lock.

So what was the alleged threat and what is the real threat – to the USA?

A full security scan conducted by nsnbc with the newspaper’s own security software revealed that several articles had been flagged as containing malware. Among them were six articles which had been published on the renown independent on-line newspaper Voltairenet. All of the articles which had been flagged as containing malware dealt with illegal U.S. Involvement in the Syria war and illegal U.S. Involvement in Ukraine.

Another article that was flagged as containing malware was the article Palestine Israel History and Theirstory. The article was originally published in nsnbc and it has been republished in numerous other independent media, including the International Middle East Media Center (IMEMC), Sabbah Report, and about 100 independent blogs. The reason why this particular article was flagged as containing malware was that it contained a link to the publication ”Der Ewige Jude” a racist, supremacist propaganda book published by the German Nazi Party during WWII.. The article documents the systematic dehumanization of Arabs by Zionists and Hollywood, and compares the dehumanization with that Nazis practiced against Jews and Slavic people.

Our scan further revealed that an article by the Bangkok based, independent analyst, editor of LandDetstroyer Report, and contributor to New Eastern Outlook, nsnbc and other, Tony Cartalucci, also was on the list of flagged articles. The article is entitled ”America’s Nazis in Kiev: ”Russians are Subhuman”. The article was published in New Eastern Outlook, and was republished in LandDestroyer and nsnbc international. Tony Cartalucci demonstrates the Nazi ideology of post-coup Ukrainian PM Arseny Yatzenyuk by quoting Yatzenyuk, and referring to the Nazi pamphlet ”Der Untermensch”, so one could understand that Yatzenyuk’s quote directly reflects the racist and supremacist ideology that was spread in ”Der Untermensch”, which translates into ”The Subhuman”. Also here, nsnbc has to remove the URL to the pamphlet and any media that continues carrying the URL risks, knowingly or not, to be added to Google’s ”Safe Browsing List” to have the newspaper’s, journal’s or blogs website flagged as containing malware, and to be removed or at the very least significantly down-graded in Google’s search engine.

The real threat is, in other words, the threat that direct U.S. Collaboration with terrorists in Syria and Nazis in Ukraine is disclosed to a growing number of readers who have become suspicious about the accuracy of mainstream, corporate, state and foundation funded media. nsnbc did not respond to the initial SiteLock email but received a second email from SiteLock, late at night on October 8. In the mail SiteLock’s Website Security Consultant Hubert Robinson wrote:

My name is Hugh with SiteLock I recently left you a message regarding the status of your web domain, nsnbc.me During a recent SiteLock security scan of your website, malware was detected that could jeopardize the safety of your website and your data. I wanted to reach out before Google blacklist the site or before your Hosting provider pulls the site down for being infected. …. Please contact me immediately at 602-753-3929, so that I can help you secure your website as soon as possible”.

We conducted an additional security scan with nsnbc’s own software and didn’t identify additional ”threats”, other than those articles by Voltairenet, nsnbc, LandDestroyer Report and New Eastern Outlook which documented U.S.’ collaboration with wanted Al-Qaeda terrorists in Syria and Iraq, the article that documented that Zionist and Nazi ideology in large parts are identical, and the article which disclosed the Nazi ideology of Ukrainian PM Arseny Yatzenyuk whom the U.S.’ administrations attempt to pass off as ”house trained”.

After nsnbc had de-activated the links to the URLs which allegedly contain malware, nsnbc wrote three mails to SiteLock’s Website Security Consultant Huge Grant, asking, among others, whether they could be more specific about which malware the flagged sites allegedly contained. We also asked whether SiteLock has a direct or indirect corporate partnership with Google, and for the name and contact details of SiteLock’s CEO. SiteLock failed to respond. SiteLock also failed to inform nsnbc whether the deactivation of the flagged URL’s was ”sufficient” or whether they perceived other ”threats” to our ”security”.

Infecting Independent Media with Malware via Add Companies.

In February 2013, nsnbc was suddenly taken off-line and flagged as containing malware by Google’s Safe Browsing List. The incident occurred about 20 minutes after nsnbc published an article entitled ”US’ Victoria Nuland about Ukraine ´Fuck the EU`. The article contained a covertly recorded and leaked phone conversation between the U.S. State Department’s Victoria Nuland and U.S. Ambassador to Ukraine Geoffrey Pyatt. The conversation revealed that the U.S.’ was directly involved in the micro-management of the coup d’état in Ukraine.

nsnbc immediately investigated the reason for the closure of the newspaper’s website. The result of the investigation was that nsnbc’ at that time advertising partner, MadAdsMedia, which is heavily economically dependent on cooperation with Google and Google’s AdSense, had inserted an add that contained a Java Script with malware”. Contacting MadAdsMedia resulted in their consultant explaining that they were ”terribly sorry for the incident and any inconvenience it had caused us, assured that they were removing the add that contained malware and advised us how to contact Google to have the newspaper removed from Google’s Safe Browsing List”.

nsnbc contacted MadAdsMedia and politely asked whether they would be so kind to send us detailed information about which add it was that had contained the malware, and documentation for who it was that had placed the malware, and on which websites. MadAdsMedia failed to respond to at least three polite reminders by email and several phone calls. What MadAdsMedia did, however, was to inform nsnbc that it had decided not to serve any adds to nsnbc any longer and that they had moved us to another company whom we could contact if we wanted. In practical terms, the incident translates into this:

A minor advertising company that is heavily dependent on serving adds via a partnership with Google denies to answer justified questions and responds to the audacity to continue asking them by withdrawing an independent newspaper’s only source of income, from one day to the other, without prior notice.

Facebook’s ”soft” censorship?

On September 5, New Eastern Outlook contributor and editor of LandDestroyer, Tony Cartalucci, published an article entitled ”Beware: Facebook’s ´Soft Censorship`”. Cartalucci stressed that LandDestroyer Report had maintained a Facebook page under the name Anthony Cartalucci since 2009. Many of the readers of LandDestroyer Report used Facebook as a means of accessing the LD Reports articles. Tony Cartalucci wrote:

Today, Facebook, without prior warning or opportunity to appeal, decided that the Facebook account must be changed over to a page. By doing so, all those following my account no longer would receive updates, because of Facebook’s ´news feeds`filter”.

Note that one of Tony Cartalucci’s articles also was among those flagged by SiteLock as containing malware. Moreover, Tony Cartalucci’s experience with Facebook’s ”soft censorship” as he described it, is not unprecedented. Two of nsnbc editor Christof Lehmann’s Facebook accounts were closed or blocked by Facebook within a period of less than twelve months. The accounts were not only used personally, but as a basis for a nsnbc Facebook page – one of that type Facebook demanded that Tony Cartalucci should open.

Facebook’s way of blocking these two accounts were simple. Facebook demanded that a large number of ”friend’s” profile photos were matched with the correct names of these ”friends”. Now, consider 1,000 ”friends or followers”, and many of them using anything but their own portrait as profile photo. It is needless to say that solving that ”quiz” is impossible.

A concerted U.S.’ effort to censor, target independent media economically, withdraw their reader base, and falsify history.

Let us sum up some of the main issues. The incestuous relationship between the NSA and major corporations like Google, Apple, Facebook and Microsoft is a well-documented fact. Many of the smaller companies, including web-hosting companies, Internet security providers, and advertising companies are either in part owned by one of these major corporations ore they are heavily dependent on cooperation and partnerships with them for their economic survival. nsnbc has already experienced being closed down and have its only source of income withdrawn from one day to the other. Others, including Voltairenet have regularly been flagged as containing malware. Media like New Eastern Outlook, IMEMC, and others risk being targeted in similar manner. Others whom Google and a U.S. Senate Hearing falsely accused of containing malware are The Drudge Report and Infowars. One can only guess how many of the smaller blogs, who are too small to raise alarm bells have been targeted. The conclusion is that the United States is engaged in an aggressive campaign that targets independent media and falsifies history. The question is, whether independent media have the political will to stand united and addressing the problem and in using the fact that they serve a growing part of , for example, the advertising market as leverage.

Dr. Christof Lehmann an independent political consultant on conflict and conflict resolution and the founder and editor in chief of nsnbc, exclusively for the online magazine “New Eastern Outlook”.

New Eastern Outlook

Washington Menaces America With Its ISIS Creation

New Eastern Outlook
by Tony Cartalucci

4535121The Washington Times in an article titled, “Intel believes 300 Americans fighting with Islamic State, posing threat to U.S.,” makes the incredible claim that:

The U.S. government is tracking and gathering intelligence on as many as 300 Americans who are fighting side by side with the Islamic State group in Iraq and Syria and are poised to become a major threat to the homeland, according to senior U.S. officials.

Officials say concern is widespread in Washington that radicalized foreign fighters could return to the homeland and commit terrorist attacks with skills acquired overseas, according to officials who spoke on condition of anonymity due to the sensitivity of the information. Those concerns were heightened by the disclosure Tuesday that a California man was killed fighting alongside militants with the group, also known as ISIS.

It is incredible because the United States’ National Security Agency (NSA) has not only been tapping and recording phone conversations of Americans for years, but also tracking phone locations as well. How is it that this massive, invasive, illegal, abhorrent surveillance control grid can be put in place, sold to the public as a necessity to “protect Americans” and “national security,” yet miss entire battalions of Americans signing up for and joining overseas, a terrorist organization like the Islamic State in Iraq and Syria (ISIS)?

If the very scenarios the NSA uses to justify its abhorrent means have unfolded unimpeded, revealed only by “chance” with the passport of an American turning up in the pockets of dead terrorists upon an alleged battlefield in Syria, either the NSA’s existence serves another purpose, or the narrative we are being fed regarding the true nature of ISIS is a lie, or the most likely scenario – both.

Not the First Fit of Feigned Ignorance 

The very appearance of ISIS on the battlefields of Iraq and Syria allegedly took the US intelligence community by surprise. The unlikely narrative was designed entirely to maintain plausible deniability between ISIS mercenaries and their paymasters in Washington, London, Brussels, Riyadh, Doha, and Ankara respectively. In reality, headlines over the past 3-4 years such as, “C.I.A. Said to Aid in Steering Arms to Syrian Opposition,” “First Syria rebels armed and trained by CIA ‘on way to battlefield’,” “Arms Airlift to Syria Rebels Expands, With Aid From C.I.A.,” and “Official says CIA-funded weapons have begun to reach Syrian rebels; rebels deny receipt,” indicate precisely how and from where the immense, multinational ISIS mercenary force originated.

The US has yet to account how its CIA could be operating within territory held by ISIS – including all along the Turkish-Syrian border and within Turkish territory itself – and neither know the existence, movements, or intentions of ISIS forces.

Between NSA surveillance at home, and the CIA operating side-by-side with ISIS and other Al Qaeda-linked terrorist organizations, the sudden revelations that Americans are fighting within ISIS’ ranks seem to be more a matter of politically-motivated propaganda, timed perfectly to justify US military intervention in Syria, than a case of yet another convenient lapse in American intelligence.

Washington Menacing America With Its Own Mercenaries 

Indeed, in order for the US to begin military operations in Syria under the guise of fighting ISIS forces, it must first demonstrate the threat ISIS poses to America. Already, likely false flags serving ISIS no benefit, but giving the US the green light to begin military operations in Syria have begun making their rounds across Western media. A CBS/Associated Press story titled, “Former Deputy CIA Director: ‘I Would Not Be Surprised’ If ISIS Member Shows Up To US Mall Tomorrow With AK-47,” claims:

“The short-term concern is the Americans that have gone to fight with ISIS and the west Europeans that have gone to fight with ISIS could be trained and directed by ISIS to come to the United States to conduct small-scale attacks,” Morell stated. “If an ISIS member showed up at a mall in the United States tomorrow with an AK-47 and killed a number of Americans, I would not be surprised.”

Morell warned that over the long-term the extremist group could be planning for a 9/11-style attack that killed thousands of Americans.

The same report would also claim:

The United States launched a new barrage of airstrikes Wednesday against the Islamic State extremist group that beheaded American journalist James Foley and that has seized a swath of territory across Iraq and Syria. President Barack Obama vowed relentless pursuit of the terrorists and the White House revealed that the U.S. had launched a secret rescue mission inside Syria earlier this summer that failed to rescue Foley and other Americans still being held hostage.

The current justification for ongoing preparations against Syria has been the Foley execution video, which experts have agreed upon was staged. The London Telegraph in its article, “Foley murder video ‘may have been staged’,” would state:

Analysts believe the British jihadi in the video may not have been James Foley’s killer, although it is accepted that the journalist was murdered.

Of course, if the video was staged, and every claim about it made by ISIS thus far proven a fabrication, no evidence at all suggests when and where, or even if Foley was murdered. If he was, no evidence suggests by whom. And despite this revelation, the US continues building momentum to intervene in Syria.

Imperialism Hiding Behind Righteousness 

Several years and hundreds of millions of dollars later, ISIS is clearly the product of long-laid Western designs to overthrow the Syrian government and reorder the Middle East as warned by the prophetic 2007 9-page report titled, “The Redirection: Is the Administration’s new policy benefitting our enemies in the war on terrorism?,” written by Seymour Hersh and published in the New Yorker. In it Hersh warned about a cataclysmic sectarian war that would ravage the entire region, targeting not only Syria and neighboring Lebanon, but also Iran. He also warned that it was an intentionally engineered conspiracy between the United States, Saudi Arabia, and Israel, with many smaller regional players serving in supporting roles.

With the emergence of ISIS creating the very cataclysmic sectarian conflagration warned about in Hersh’s 2007 report, with no other credible explanation to account for ISIS’ incredible size, strength, and success beyond multinational state-sponsorship, Hersh’s reportage has once again been vindicated.

It is clear that the US has created ISIS, and is to this day using it as both a means to target and attack its enemies across the Middle East, as well as serve as a pretext for direct US military intervention when proxy wars flounder. It is also being used in a third context – on the domestic front – as a manufactured and perpetual threat with which to further justify the militarization and centralization of America’s police forces and the continued expansion of the NSA’s invasive domestic spying.

It is also clear that all of this adds up not to promoting freedom and democracy abroad while ensuring national security at home, but rather achieving full-spectrum domination in regions abroad and over the population at home. It is naked hegemony and imperialism playing dress-up in the wardrobe of righteousness.

New Eastern Outlook

Top NSA Whistleblower: We Need a New 9/11 Investigation Into the Destruction of the World Trade Center

Washington’s Blog

The Observable Facts Were Ignored …

Bill Binney is the NSA’s former senior technical director, 32-year NSA veteran widely regarded as a “legend” within the agency, one of the world’s top crypto-mathematicians, who managed thousands of employees at the agency.

Binney was the original NSA whistleblower, and one of two NSA veterans whose example inspired Edward Snowden.

Binney recently signed Architects and Engineers for 9/11 Truth’s petition, stating:

There is clearly evidence that needs to be considered in a review of what happened in 9/11. We the public deserve an honest complete review of the facts with scientific interpretation and implications as to what really happened.

Two days ago, Binney said in an interview that speaking with physicists and controlled demolition experts convinced him that the investigations to date have – at best - been incompetent, and failed to address the observable facts:

Binney said:

They felt they had to have something drastic happen so they could get a lot more money and build up an empire and do the things they wanted to do.

Washington’s Blog asked Binney what he meant by that statement, and he explained:

I had several reasons for saying that. First, Gen Minihan when he was Dirnsa [Director of the National Intelligence Agency] was internally in NSA quoted to say that we will have to have a drastic event occur before we could change the way we were doing things. Then Hayden took over as Dirnsa.

And, on 27 February 2001 he or someone from NSA approached the CEO of Quest requesting Quests’ subscriber data – meaning billing data. This is in court records. [Background here, here and here.]

This all smacked of waiting for something to happen so they could leverage it to do what they really wanted to do – which was evidenced by the request to Quest.

Also, I would add that the 9/11 Commission left out data that Tom Drake passed to them showing vital data prior to 11 Sep giving warning of an attack. This should also not be acceptable. [Background.]

Binney joins many high-level officials – including military leaders, intelligence officials and 9/11 commissioners – who are dissatisfied with the 9/11 investigations to date.

For background on Architects and Engineers for 9/11 Truth, watch this C-Span interview and this documentary.

Postscript:  Government officials agree that 9/11 was state-sponsored terrorism … they just disagree on which state was responsible.

Washington’s Blog

Follow

Get every new post delivered to your Inbox.

Join 1,573 other followers

%d bloggers like this: