Secret Justice Dept. Interceptor Flights Scoop Up Cell Data From U.S. Cities

The Daily Sheeple

cessna-justice-dept

Remember when President Obama told Jay Leno (and the world) with a smiling face that “there is no spying on Americans”? Not only was that untrue, but it is now clear that it was blatantly false on so very many levels.

The cell phone interceptor scandal has now become scales worse, with revelations that the Justice Dept. has been scooping Americans’ data in major cities across the nation with secret flights by the tens of thousands, continuously. And that’s without them admitting how far this has gone. Yikes.

As if the state of the surveillance society wasn’t bad enough, this has come to light, via Fox News:

The Justice Department is scooping up data from thousands of cellphones through fake communications towers deployed on airplanes, a high-tech hunt for criminal suspects that is snagging large number of innocent Americans, according to people familiar with the operations.

The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

Planes are equipped with devices—some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. unit that produces them—which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.

The technology in the two-foot-square device enables investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location, these people said.


Click to see full sized image
.

That just follows the series of revelations concerning secretive on-the-ground interceptors – known as Sting Ray – that also mimic cell phone towers and force devices to share data with police departments, the FBI and/or various other unknown entities (perhaps foreign governments, the NSA or private firms?).

According to the Electronic Privacy Information Center (EPIC):

A StingRay is a device that can triangulate the source of a cellular signal by acting “like a fake cell phone tower” and measuring the signal strength of an identified device from several locations. With StingRays and other similar “cell site simulator” technologies, Government investigators and private individuals can locate, interfere with, and even intercept communications from cell phones and other wireless devices. The Federal Bureau of Investigation (“FBI”) has used such cell site simulator technology to track and locate phones and users since at least 1995.

As Melissa Melton previously wrote:

According to the Associated Press, the Obama Administration has been actively advising police departments to refuse disclosure about certain cell phone surveillance technologies, including the widely used “StingRay” device, even in routine state records requests.

Instead, police are bypassing company assistance and collecting unique information on suspects, persons of interests, and – as the AP reports – they can even “sweep up basic cellphone data from entire neighborhoods,” all without any court orders or oversight.

The Edward Snowden leaks proved beyond a shadow of a doubt that the NSA has zero regard for the privacy of Americans.

Now, it is also crystal clear that the Justice Department and FBI (and perhaps likely most assuredly other law enforcement agencies) have no regard, either. Not for Americans. Not for privacy. Not for the law. Not for due process. And certainly not for the constitutional republic they were ostensibly created to serve.

In these troubled times, it is at least good to know that former NSA chief Gen. Keith Alexander has found a lucrative gig advising Wall Street on cybersecurity using NSA data and employees who are also simultaneously top NSA officials.

No conflict of interest, no breach of duty to see here. Move along.

Gulp. Sigh.

The Daily Sheeple

Is the NSA Grabbing All Americans’ Phone Call Content?

The New American
by Thomas R. Eddlem

nsa snooping

The NSA and the National Director of Intelligence have consistently denied that they listen to the content of Americans’ telephone calls, but the history of intelligence agency claims about the scope of its spying on Americans is one of lies and more lies. So the question must be asked: Are they lying again with respect to recording the content of Americans’ phone calls?

The answer to that question may be “yes,” and it may be “no.” But there’s also a possible “technically, no” response to that question that’s even more frightening, for which there is a substantial amount of circumstantial evidence. First, here are a few of the blatant lies the U.S. intelligence apparatus has publicly told to the American people:

Lie #1: We are not keeping Americans’ phone data.
During a March 12, 2013 Senate hearing, Senator Ron Wyden asked U.S. Intelligence Director James Clapper: “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?” Admiral James Clapper replied: “No, sir.”

Several months later, NSA contractor Edward Snowden revealed to the American people that Clapper’s statement was a bold-faced lie. The NSA had, in fact, been collecting data on hundreds of millions of Americans under a program named PRISM, a program NSA documents revealed that also collected Internet traffic “directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” And copies of that database, it was later learned, are sent to the U.S. Drug Enforcement Agency. James Bamford over at The Intercept likewise revealed on October 2, 2014 a 40-year history of the NSA releasing documented lies to both the American people and to Congress. 

Lie #2: We can’t grab Americans’ e-mails.
NSA Director General Keith Alexander told U.S. House investigators on March 20, 2012, that the NSA didn’t have the “ability” to wiretap Americans’ telephone calls:

Representative Hank Johnson (D-Ga.): General Alexander, if Dick Cheney were elected president and wanted to detain and incessantly waterboard every American who sent an email making fun of his well-known hunting mishaps, what I’d like to know is, does the NSA have the technological capacity to identify those Cheney bashers based upon the content of their emails? Yes or no.
General Alexander: No. Can I explain that?
Representative Johnson: Yes.
General Alexander: The question is where are the emails and where is NSA’s coverage. I assume by your question that those emails are in the United States.
Representative Johnson: Correct.
General Alexander: NSA does not have the ability to do that in the United States.

The reality is that the NSA does possess the technical ability to record Americans, and former NSA contractor Edward Snowden’s revelations proved that hundreds of thousands of Americans’ telephone conversations have been “legitimately” recorded by the NSA because one party of the call was abroad. Moreover, thousands of innocent Americans’ e-mails have been monitored by the NSA, according to information provided by whistleblower Edward Snowden. Indeed, the capacity to wiretap American’s phone lines and record the full audio from them is present on a widespread basis, as the NSA program SOMALGET wiretaps the full audio from every call in and out of the nation of the Bahamas (and the NSA grabs metadata from the same program from all calls in Mexico, Kenya, and the Philippines).

Lie #3: CIA wouldn’t hack into U.S. Senate computers.
As the U.S. Senate conducted its oversight of the Bush-era detention policies under the CIA, Senator Dianne Feinstein (D-Calif.) charged the CIA with spying on Senate computers and deleting material on those U.S. Senate computers. “As far as the allegations of the CIA hacking into Senate computers, nothing could be further from the truth,” CIA Director John Brennan told Andrea Mitchell at a Council on Foreign Relations forum March 11, 2014. It later came out that Feinstein’s charges were the precise truth, and Brennan had told a bold-faced lie.

Lie #4: NSA wiretapping authority has never been abused.
“There is no abuse,” former NSA Director Michael Hayden told NBC’s Meet the Press on December 15, 2013. President Obama himself denied the NSA had abused its surveillance capabilities in an address to the nation on August 9, 2013: “If you look at the reports — even the disclosures that Mr. Snowden has put forward — all the stories that have been written, what you’re not reading about is the government actually abusing these programs and listening in on people’s phone calls or inappropriately reading people’s emails. What you’re hearing about is the prospect that these could be abused. Now, part of the reason they’re not abused is because these checks are in place, and those abuses would be against the law and would be against the orders of the FISC.”

But it soon came out that there have been thousands of cases of abuse of that intelligence on American citizens from internal NSA reviews of the information. In some cases, this involved taking audio from telephone calls of Americans by suspicious lovers in the employ of the NSA, according to a summary provided to Senator Charles Grassley (R-Iowa): “In 2004, upon her return from a foreign site, the subject reported to NSA Security that, in 2004, she tasked a foreign telephone number she had discovered in her husband’s cellular telephone because she suspected that her husband had been unfaithful. The tasking resulted in voice collection of her husband.”

So in light of the many lies of our intelligence officials and the politicians overseeing them, it’s quite possible that the NSA could be lying — again — with respect to its gathering, retention and search of Americans’ conversations as it did with phone records “metadata.” 

Tag-team Approach to Surveilling Americans
But there’s another possible explanation for the NSA following legal protocol, as claimed in public, where it nevertheless has indirect access to Americans’ phone calls: It’s possible the NSA has an agreement with foreign intelligence agencies to spy on Americans in exchange for U.S. surveillance of their populations, with an agreement to exchange the information. Consider the possibility that the NSA — which like the all-seeing eye of Sauron in the Lord of the Rings trilogy — is faced outward surveilling the world while the other two pairs of the “Five Eyes” partners (the U.K., Canada, Australia, and New Zealand) are focused inward on the NSA’s one blind spot: the United States. This may sound like a far-out conspiracy theory, but statements of partnership between the United States and it allies — especially its Anglo “Five Eyes” allies — make such an arrangement plausible in light of existing legal restrictions against surveilling American citizens.

The NSA has paid hundreds of millions of dollars to “Five Eyes” partner GCHQ in Britain because GCHQ is “less constrained by NSA’s concerns about compliance,” according to intelligence officials who talked off the record with London’s The Guardian for August 1, 2013. Of course, there are no restrictions whatsoever on NSA surveillance of foreigners; the only surveillance restrictions on the NSA are those against recording the audio of Americans’ phone calls. According to The Guardian, the federal funding of British intelligence “exploited to the full our unique selling points of geography, partnerships [and] the UK’s legal regime.” The chief benefit of geography is that Britain is not constrained by legal restrictions on spying on Americans. A British Cabinet official told The Guardian after the Edward Snowden revelations that “joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”

GCHQ has already acknowledged collecting massive Internet information on British citizens under its blanket authority under U.K. law to collect “external communications.” What’s to stop them from also collecting the Facebook and Google traffic of Americans? Clearly, Americans’ phone calls and e-mails are “external” to the U.K. But without American assistance, the British government likely lacked the technical capability for such massive surveillance, or perhaps lacked the will to invest this level of funds to surveil the people of an ally. In this light, the massive NSA aid to GCHQ and the close partnership with the Five Eyes countries could be explained. Two pair of the Five Eyes are quite possibly charged with surveilling Americans, and then coordinating with their American counterparts in order to skate around what little is left of the Fourth Amendment to the U.S. Constitution prohibiting warrantless searches. In exchange, the NSA shares information on their people, as well as information on other nations where the United States surveils and our allies don’t have surveillance capabilities.

Similar relationships have been reported among America’s other allies. The Washington Post reported on October 30, 2013, “In France, the daily Le Monde reported Wednesday that France’s external intelligence agency collaborated with the United States starting at the end 2011 or beginning of 2012 to provide a window into Internet traffic flowing via underwater cables that surface in France…. The cables carry much of the Internet traffic that flows to Africa and Afghanistan, the newspaper said. In exchange for allowing access to the traffic, the NSA provided information about areas of the world where France has no intelligence presence, the newspaper reported.” What areas that involved, the article didn’t specify. Clearly there are many areas the massive resources of the NSA could help the French intelligence agencies. But if the French intelligence agencies are willing to sell out the privacy of their people in exchange for more intelligence sharing, why should American intelligence agencies be immune from such a deal?

Indeed, American intelligence officials have publicly expressed a rather blasé attitude toward foreign intelligence agencies spying on Americans. In an October 29, 2013, hearing before the House Select Committee on Intelligence, Director of Intelligence James Clapper responded to this question from Chairman Mike Rogers (R-Mich.):

Mike Rogers: Do you believe that the allies have conducted or at any time any type of espionage activity against the United States of America — our intelligence services, our leaders, otherwise?
Clapper: Absolutely…. And I have to say, Chairman Rogers, that some of this reminds me a lot of the movie Casablanca. “My God, there’s gambling going on here!” You know, it’s the same kind of thing.
The statement above proves that Clapper is aware of allied intelligence agencies spying on Americans, an activity the agencies he controls are prohibited from doing. But it also leaves open the question of how much of that spying (and sharing of that intelligence) is done on a formalized partnership basis, and how much is done on an ad hoc basis. If the NSA is lying about its restraint from collecting the audio of Americans’ phone calls, a vigorous partnership of “we’ll spy on you, if you’ll spy on us” would be unnecessary, as would hundreds of millions of dollars in aid to GCHQ. But if the NSA wants to surveil Americans while at the same time formally complying with their public pronouncements, focusing two pair of the “Five Eyes” back on Americans becomes a real possibility.

The extent of foreign surveillance of American phone calls is not known, and won’t be known without an Edward Snowden-like whistleblower from GCHQ or one of the other Five Eyes partners. But it’s clear that Congress should not take the NSA’s public pronouncements at face value, but should investigate the level of foreign surveillance of Americans.

The New American

Censorship Alert: the Alternative Media Getting Harassed by the NSA

New Eastern Outlook
by Christof Lehmann

345345345Google’s Safe Browsing List that blocks websites and flags them as containing malware is increasingly used as mechanism for the censoring of independent media and the falsification of history. It is an alarming development that, left unchallenged, puts the survival of any independent newspaper, blog, TV or radio station at risk.. Over the past months the list has apparently been used to target websites critical of U.S.’ involvement in the wars in the Middle East, U.S.’ involvement in Ukraine and independent media who are publishing material that is critical of Zionism.

Google’s Safe Browsing List translates into the blocking of websites which allegedly contain malware. Instead of showing the website one is presented with a red-colored Google page that warns that the URL in question has been blocked because it contains malware. Ultimately, being flagged on the list can also result in the removal of the flagged websites from Google’s search engine. Being flagged, blocked or removed from search engines can have devastating results for independent journalists and media who are struggling to finance investigative journalism, rather than regurgitating alternative versions of Reuters and other major news agencies. The targeting of independent media and journalists is especially noteworthy when one considers Google’s close cooperation with the United States’ National Security Agency (NSA).

Incestuous Relationships between Google, Apple, Microsoft, their Subsidiaries, and the NSA.

Google’s close cooperation with the NSA is a well-documented fact. An article from May 7, entitled ”Is Google in cahoots with the NSA? Email leak reveals close relationship”, published in Tech Times, reveals that the close cooperation between Google and the NSA was documented long before NSA whistleblower Edward Snowden told the world what most who cared to investigate already knew. The article quotes emails between NSA Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt from 2011 and 2012. Tech Times states:

In the mails, the Google executives sound friendly and cooperative. Alexander’s emails hint at the importance of ´Google’s participation in refinement, engineering and deployment of solutions`to cyber threats”.

The article also details the fact that the NSA chief had invited CEOs of key companies including Google, Apple, and Microsoft to classified briefings. What is important about these three key corporations cooperation with the NSA is that they are economically interrelated with most other, commercial Internet providers, including web-hosting companies, firms which provide Internet security products, as well as advertising companies who sell advertising on everything from blogs over smaller independent media to major corporate newspapers. The following are recent examples, which demonstrate how this incestuous relationship translates into the targeting of independent media, censorship and the falsification of history.

October 6, nsnbc received an e-mail from the Internet security provider SiteLock, warning that there was a serious malware issue pertaining some articles published in nsnbc. SiteLock stressed that the issue had to be resolved within 72 hours if nsnbc international wanted to avoid being added to Google’s Safe Browsing List and have the site withdrawn from nsnbc’s web-host, which among many other web hosts is a business partner of Site Lock.

So what was the alleged threat and what is the real threat – to the USA?

A full security scan conducted by nsnbc with the newspaper’s own security software revealed that several articles had been flagged as containing malware. Among them were six articles which had been published on the renown independent on-line newspaper Voltairenet. All of the articles which had been flagged as containing malware dealt with illegal U.S. Involvement in the Syria war and illegal U.S. Involvement in Ukraine.

Another article that was flagged as containing malware was the article Palestine Israel History and Theirstory. The article was originally published in nsnbc and it has been republished in numerous other independent media, including the International Middle East Media Center (IMEMC), Sabbah Report, and about 100 independent blogs. The reason why this particular article was flagged as containing malware was that it contained a link to the publication ”Der Ewige Jude” a racist, supremacist propaganda book published by the German Nazi Party during WWII.. The article documents the systematic dehumanization of Arabs by Zionists and Hollywood, and compares the dehumanization with that Nazis practiced against Jews and Slavic people.

Our scan further revealed that an article by the Bangkok based, independent analyst, editor of LandDetstroyer Report, and contributor to New Eastern Outlook, nsnbc and other, Tony Cartalucci, also was on the list of flagged articles. The article is entitled ”America’s Nazis in Kiev: ”Russians are Subhuman”. The article was published in New Eastern Outlook, and was republished in LandDestroyer and nsnbc international. Tony Cartalucci demonstrates the Nazi ideology of post-coup Ukrainian PM Arseny Yatzenyuk by quoting Yatzenyuk, and referring to the Nazi pamphlet ”Der Untermensch”, so one could understand that Yatzenyuk’s quote directly reflects the racist and supremacist ideology that was spread in ”Der Untermensch”, which translates into ”The Subhuman”. Also here, nsnbc has to remove the URL to the pamphlet and any media that continues carrying the URL risks, knowingly or not, to be added to Google’s ”Safe Browsing List” to have the newspaper’s, journal’s or blogs website flagged as containing malware, and to be removed or at the very least significantly down-graded in Google’s search engine.

The real threat is, in other words, the threat that direct U.S. Collaboration with terrorists in Syria and Nazis in Ukraine is disclosed to a growing number of readers who have become suspicious about the accuracy of mainstream, corporate, state and foundation funded media. nsnbc did not respond to the initial SiteLock email but received a second email from SiteLock, late at night on October 8. In the mail SiteLock’s Website Security Consultant Hubert Robinson wrote:

My name is Hugh with SiteLock I recently left you a message regarding the status of your web domain, nsnbc.me During a recent SiteLock security scan of your website, malware was detected that could jeopardize the safety of your website and your data. I wanted to reach out before Google blacklist the site or before your Hosting provider pulls the site down for being infected. …. Please contact me immediately at 602-753-3929, so that I can help you secure your website as soon as possible”.

We conducted an additional security scan with nsnbc’s own software and didn’t identify additional ”threats”, other than those articles by Voltairenet, nsnbc, LandDestroyer Report and New Eastern Outlook which documented U.S.’ collaboration with wanted Al-Qaeda terrorists in Syria and Iraq, the article that documented that Zionist and Nazi ideology in large parts are identical, and the article which disclosed the Nazi ideology of Ukrainian PM Arseny Yatzenyuk whom the U.S.’ administrations attempt to pass off as ”house trained”.

After nsnbc had de-activated the links to the URLs which allegedly contain malware, nsnbc wrote three mails to SiteLock’s Website Security Consultant Huge Grant, asking, among others, whether they could be more specific about which malware the flagged sites allegedly contained. We also asked whether SiteLock has a direct or indirect corporate partnership with Google, and for the name and contact details of SiteLock’s CEO. SiteLock failed to respond. SiteLock also failed to inform nsnbc whether the deactivation of the flagged URL’s was ”sufficient” or whether they perceived other ”threats” to our ”security”.

Infecting Independent Media with Malware via Add Companies.

In February 2013, nsnbc was suddenly taken off-line and flagged as containing malware by Google’s Safe Browsing List. The incident occurred about 20 minutes after nsnbc published an article entitled ”US’ Victoria Nuland about Ukraine ´Fuck the EU`. The article contained a covertly recorded and leaked phone conversation between the U.S. State Department’s Victoria Nuland and U.S. Ambassador to Ukraine Geoffrey Pyatt. The conversation revealed that the U.S.’ was directly involved in the micro-management of the coup d’état in Ukraine.

nsnbc immediately investigated the reason for the closure of the newspaper’s website. The result of the investigation was that nsnbc’ at that time advertising partner, MadAdsMedia, which is heavily economically dependent on cooperation with Google and Google’s AdSense, had inserted an add that contained a Java Script with malware”. Contacting MadAdsMedia resulted in their consultant explaining that they were ”terribly sorry for the incident and any inconvenience it had caused us, assured that they were removing the add that contained malware and advised us how to contact Google to have the newspaper removed from Google’s Safe Browsing List”.

nsnbc contacted MadAdsMedia and politely asked whether they would be so kind to send us detailed information about which add it was that had contained the malware, and documentation for who it was that had placed the malware, and on which websites. MadAdsMedia failed to respond to at least three polite reminders by email and several phone calls. What MadAdsMedia did, however, was to inform nsnbc that it had decided not to serve any adds to nsnbc any longer and that they had moved us to another company whom we could contact if we wanted. In practical terms, the incident translates into this:

A minor advertising company that is heavily dependent on serving adds via a partnership with Google denies to answer justified questions and responds to the audacity to continue asking them by withdrawing an independent newspaper’s only source of income, from one day to the other, without prior notice.

Facebook’s ”soft” censorship?

On September 5, New Eastern Outlook contributor and editor of LandDestroyer, Tony Cartalucci, published an article entitled ”Beware: Facebook’s ´Soft Censorship`”. Cartalucci stressed that LandDestroyer Report had maintained a Facebook page under the name Anthony Cartalucci since 2009. Many of the readers of LandDestroyer Report used Facebook as a means of accessing the LD Reports articles. Tony Cartalucci wrote:

Today, Facebook, without prior warning or opportunity to appeal, decided that the Facebook account must be changed over to a page. By doing so, all those following my account no longer would receive updates, because of Facebook’s ´news feeds`filter”.

Note that one of Tony Cartalucci’s articles also was among those flagged by SiteLock as containing malware. Moreover, Tony Cartalucci’s experience with Facebook’s ”soft censorship” as he described it, is not unprecedented. Two of nsnbc editor Christof Lehmann’s Facebook accounts were closed or blocked by Facebook within a period of less than twelve months. The accounts were not only used personally, but as a basis for a nsnbc Facebook page – one of that type Facebook demanded that Tony Cartalucci should open.

Facebook’s way of blocking these two accounts were simple. Facebook demanded that a large number of ”friend’s” profile photos were matched with the correct names of these ”friends”. Now, consider 1,000 ”friends or followers”, and many of them using anything but their own portrait as profile photo. It is needless to say that solving that ”quiz” is impossible.

A concerted U.S.’ effort to censor, target independent media economically, withdraw their reader base, and falsify history.

Let us sum up some of the main issues. The incestuous relationship between the NSA and major corporations like Google, Apple, Facebook and Microsoft is a well-documented fact. Many of the smaller companies, including web-hosting companies, Internet security providers, and advertising companies are either in part owned by one of these major corporations ore they are heavily dependent on cooperation and partnerships with them for their economic survival. nsnbc has already experienced being closed down and have its only source of income withdrawn from one day to the other. Others, including Voltairenet have regularly been flagged as containing malware. Media like New Eastern Outlook, IMEMC, and others risk being targeted in similar manner. Others whom Google and a U.S. Senate Hearing falsely accused of containing malware are The Drudge Report and Infowars. One can only guess how many of the smaller blogs, who are too small to raise alarm bells have been targeted. The conclusion is that the United States is engaged in an aggressive campaign that targets independent media and falsifies history. The question is, whether independent media have the political will to stand united and addressing the problem and in using the fact that they serve a growing part of , for example, the advertising market as leverage.

Dr. Christof Lehmann an independent political consultant on conflict and conflict resolution and the founder and editor in chief of nsnbc, exclusively for the online magazine “New Eastern Outlook”.

New Eastern Outlook

Washington Menaces America With Its ISIS Creation

New Eastern Outlook
by Tony Cartalucci

4535121The Washington Times in an article titled, “Intel believes 300 Americans fighting with Islamic State, posing threat to U.S.,” makes the incredible claim that:

The U.S. government is tracking and gathering intelligence on as many as 300 Americans who are fighting side by side with the Islamic State group in Iraq and Syria and are poised to become a major threat to the homeland, according to senior U.S. officials.

Officials say concern is widespread in Washington that radicalized foreign fighters could return to the homeland and commit terrorist attacks with skills acquired overseas, according to officials who spoke on condition of anonymity due to the sensitivity of the information. Those concerns were heightened by the disclosure Tuesday that a California man was killed fighting alongside militants with the group, also known as ISIS.

It is incredible because the United States’ National Security Agency (NSA) has not only been tapping and recording phone conversations of Americans for years, but also tracking phone locations as well. How is it that this massive, invasive, illegal, abhorrent surveillance control grid can be put in place, sold to the public as a necessity to “protect Americans” and “national security,” yet miss entire battalions of Americans signing up for and joining overseas, a terrorist organization like the Islamic State in Iraq and Syria (ISIS)?

If the very scenarios the NSA uses to justify its abhorrent means have unfolded unimpeded, revealed only by “chance” with the passport of an American turning up in the pockets of dead terrorists upon an alleged battlefield in Syria, either the NSA’s existence serves another purpose, or the narrative we are being fed regarding the true nature of ISIS is a lie, or the most likely scenario – both.

Not the First Fit of Feigned Ignorance 

The very appearance of ISIS on the battlefields of Iraq and Syria allegedly took the US intelligence community by surprise. The unlikely narrative was designed entirely to maintain plausible deniability between ISIS mercenaries and their paymasters in Washington, London, Brussels, Riyadh, Doha, and Ankara respectively. In reality, headlines over the past 3-4 years such as, “C.I.A. Said to Aid in Steering Arms to Syrian Opposition,” “First Syria rebels armed and trained by CIA ‘on way to battlefield’,” “Arms Airlift to Syria Rebels Expands, With Aid From C.I.A.,” and “Official says CIA-funded weapons have begun to reach Syrian rebels; rebels deny receipt,” indicate precisely how and from where the immense, multinational ISIS mercenary force originated.

The US has yet to account how its CIA could be operating within territory held by ISIS – including all along the Turkish-Syrian border and within Turkish territory itself – and neither know the existence, movements, or intentions of ISIS forces.

Between NSA surveillance at home, and the CIA operating side-by-side with ISIS and other Al Qaeda-linked terrorist organizations, the sudden revelations that Americans are fighting within ISIS’ ranks seem to be more a matter of politically-motivated propaganda, timed perfectly to justify US military intervention in Syria, than a case of yet another convenient lapse in American intelligence.

Washington Menacing America With Its Own Mercenaries 

Indeed, in order for the US to begin military operations in Syria under the guise of fighting ISIS forces, it must first demonstrate the threat ISIS poses to America. Already, likely false flags serving ISIS no benefit, but giving the US the green light to begin military operations in Syria have begun making their rounds across Western media. A CBS/Associated Press story titled, “Former Deputy CIA Director: ‘I Would Not Be Surprised’ If ISIS Member Shows Up To US Mall Tomorrow With AK-47,” claims:

“The short-term concern is the Americans that have gone to fight with ISIS and the west Europeans that have gone to fight with ISIS could be trained and directed by ISIS to come to the United States to conduct small-scale attacks,” Morell stated. “If an ISIS member showed up at a mall in the United States tomorrow with an AK-47 and killed a number of Americans, I would not be surprised.”

Morell warned that over the long-term the extremist group could be planning for a 9/11-style attack that killed thousands of Americans.

The same report would also claim:

The United States launched a new barrage of airstrikes Wednesday against the Islamic State extremist group that beheaded American journalist James Foley and that has seized a swath of territory across Iraq and Syria. President Barack Obama vowed relentless pursuit of the terrorists and the White House revealed that the U.S. had launched a secret rescue mission inside Syria earlier this summer that failed to rescue Foley and other Americans still being held hostage.

The current justification for ongoing preparations against Syria has been the Foley execution video, which experts have agreed upon was staged. The London Telegraph in its article, “Foley murder video ‘may have been staged’,” would state:

Analysts believe the British jihadi in the video may not have been James Foley’s killer, although it is accepted that the journalist was murdered.

Of course, if the video was staged, and every claim about it made by ISIS thus far proven a fabrication, no evidence at all suggests when and where, or even if Foley was murdered. If he was, no evidence suggests by whom. And despite this revelation, the US continues building momentum to intervene in Syria.

Imperialism Hiding Behind Righteousness 

Several years and hundreds of millions of dollars later, ISIS is clearly the product of long-laid Western designs to overthrow the Syrian government and reorder the Middle East as warned by the prophetic 2007 9-page report titled, “The Redirection: Is the Administration’s new policy benefitting our enemies in the war on terrorism?,” written by Seymour Hersh and published in the New Yorker. In it Hersh warned about a cataclysmic sectarian war that would ravage the entire region, targeting not only Syria and neighboring Lebanon, but also Iran. He also warned that it was an intentionally engineered conspiracy between the United States, Saudi Arabia, and Israel, with many smaller regional players serving in supporting roles.

With the emergence of ISIS creating the very cataclysmic sectarian conflagration warned about in Hersh’s 2007 report, with no other credible explanation to account for ISIS’ incredible size, strength, and success beyond multinational state-sponsorship, Hersh’s reportage has once again been vindicated.

It is clear that the US has created ISIS, and is to this day using it as both a means to target and attack its enemies across the Middle East, as well as serve as a pretext for direct US military intervention when proxy wars flounder. It is also being used in a third context – on the domestic front – as a manufactured and perpetual threat with which to further justify the militarization and centralization of America’s police forces and the continued expansion of the NSA’s invasive domestic spying.

It is also clear that all of this adds up not to promoting freedom and democracy abroad while ensuring national security at home, but rather achieving full-spectrum domination in regions abroad and over the population at home. It is naked hegemony and imperialism playing dress-up in the wardrobe of righteousness.

New Eastern Outlook

Top NSA Whistleblower: We Need a New 9/11 Investigation Into the Destruction of the World Trade Center

Washington’s Blog

The Observable Facts Were Ignored …

Bill Binney is the NSA’s former senior technical director, 32-year NSA veteran widely regarded as a “legend” within the agency, one of the world’s top crypto-mathematicians, who managed thousands of employees at the agency.

Binney was the original NSA whistleblower, and one of two NSA veterans whose example inspired Edward Snowden.

Binney recently signed Architects and Engineers for 9/11 Truth’s petition, stating:

There is clearly evidence that needs to be considered in a review of what happened in 9/11. We the public deserve an honest complete review of the facts with scientific interpretation and implications as to what really happened.

Two days ago, Binney said in an interview that speaking with physicists and controlled demolition experts convinced him that the investigations to date have – at best - been incompetent, and failed to address the observable facts:

Binney said:

They felt they had to have something drastic happen so they could get a lot more money and build up an empire and do the things they wanted to do.

Washington’s Blog asked Binney what he meant by that statement, and he explained:

I had several reasons for saying that. First, Gen Minihan when he was Dirnsa [Director of the National Intelligence Agency] was internally in NSA quoted to say that we will have to have a drastic event occur before we could change the way we were doing things. Then Hayden took over as Dirnsa.

And, on 27 February 2001 he or someone from NSA approached the CEO of Quest requesting Quests’ subscriber data – meaning billing data. This is in court records. [Background here, here and here.]

This all smacked of waiting for something to happen so they could leverage it to do what they really wanted to do – which was evidenced by the request to Quest.

Also, I would add that the 9/11 Commission left out data that Tom Drake passed to them showing vital data prior to 11 Sep giving warning of an attack. This should also not be acceptable. [Background.]

Binney joins many high-level officials – including military leaders, intelligence officials and 9/11 commissioners – who are dissatisfied with the 9/11 investigations to date.

For background on Architects and Engineers for 9/11 Truth, watch this C-Span interview and this documentary.

Postscript:  Government officials agree that 9/11 was state-sponsored terrorism … they just disagree on which state was responsible.

Washington’s Blog

What Are the Spy Agencies Actually DOING with their Dirty Tricks?

Washington’s Blog

SPIES ARE MANIPULATING THE WEB

Newly-released documents from Edward Snowden show that the British spy agency GCHQ has developed numerous offensive digital tools.

In part one, we quote verbatim in black the names and descriptions of some of these tools – some of which Glenn Greenwald didn’t highlight in his report – and provide descriptions in blue of potential misuses of such tools.

In part two, we discuss how likely such misuses really are.

TOOLS AND POTENTIAL MISUSES

CHANGELING: Ability to spoof any email address and send email under that identity

Fake an email from a privacy advocate to make it look like he’s proposing terrorism.

SCRAPHEAP CHALLENGE: Perfect spoofing of emails from Blackberry targets

Fake an email from an opponent of unregulated fracking to make it look like she’s proposing blowing up a well.

BURLESQUE: The capacity to send spoofed SMS messages

Fake a message from an environmental activist to make it look like he’s advocating sabotage.

IMPERIAL BARGE : For connecting two target phone together in a call

Fake a telephone connection to make it look like an anti-war campaigner spoke with a bigwig in Al Qaeda.

BADGER : Mass delivery of email messaging to support an Information Operations campaign

Send out a fake, mass email pretending to be from a whistleblower “admitting” that he’s mentally unstable and vindictive.

WARPATH: Mass delivery of SMS messages to support an Information Operations campaign.

Send out a fake, mass message pretending to be from a whistleblower “admitting” he’s a Russian spy.

SPACE ROCKET: A programme covering insertion of media into target networks.

Insert a fake video calling for jihad on a peaceful Muslim lawyer’s website .

CLEAN SWEEP Masquerade Facebook Wall Posts for individuals or entire countries.

Put up a bunch of fake Wall Posts praising Al Qaeda on the Facebook page of a reporter giving first-hand reports of what’s really happening in a country that the U.S. is trying to demonize.

HAVOK Real-time website cloning technique allowing on-the-fly alterations

Hack the website of a state politician critical of those who trash the Constitution.

SILVERLORD: Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.

Disrupt websites hosting alternative energy videos.

SUNBLOCK: Ability to deny functionality to send/receive email or view material online

Block the emails and web functionality of a government insider who is about to go public on wrongdoing.

ANGRY PIRATE: A tool that will permanently disable a target’s account on their computer

Disable the accounts of an anti-nuclear activist.

PREDATORS FACE: Targeted Denial Of Service against Web Servers

Take down a website which is disclosing hard-hitting information on illegal government actions.

UNDERPASS: Change outcome of online polls

Change the results of an online poll from one showing that the American people overwhelmingly oppose a new war to showing that they support it.

GATEWAY: Ability to artificially increase traffic to a website

Make a website spreading pro-NSA propanda appear hugely popular.

BOMB BAY: The capacity to increase website hits, rankings

Make it look like a hate site is popular among a targeted local population which actually despises its views.

SLIPSTREAM: Ability to inflate page views on websites

Make it appear that a pro-war article is widely popular.

GESTATOR: Amplification of a given message, normally video, on popular multimedia websites (Youtube)

Make a propaganda video go viral.

WHAT IS THE LIKELIHOOD OF MISUSE?

We don’t know which of the above hypothetically forms of misuse are actually occurring.  However, as we wrote in February:

We’ve warned since 2009 (and see this) that the government could be launching cyber “false flag attacks” in order to justify a crackdown on the Internet and discredit web activists.

A new report from NBC News – based on documents leaked by Edward Snowden – appear to confirm our fears, documenting that Britain’s GCHQ spy agency has carried out cyber false flag attacks:

In another document taken from the NSA by Snowden and obtained by NBC News, a JTRIG official said the unit’s mission included computer network attacks, disruption, “Active Covert Internet Operations,” and “Covert Technical Operations.” Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a “false flag” operation. The same document said GCHQ was increasing its emphasis on using cyber tools to attack adversaries.

Later that month, we noted:

A new report from NBC News shows that the British spy agency used “false flag attacks” and other dirty tricks:

British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

***

The agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.

Sound familiar? It should:

Between 1956 and 1971, the FBI operated a program known as COINTELPRO, for Counter Intelligence Program. Its purpose was to interfere with the activities of the organizations and individuals who were its targets or, in the words of long-time FBI Director J. Edgar Hoover, to “expose, disrupt, misdirect, discredit or otherwise neutralize” them.

NBC continues:

[The agency] also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.

***

JTRIG used negative information to attack private companies, sour business relationships and ruin deals.

***

Changing photos on social media sites and emailing and texting colleagues and neighbors unsavory information.

And reporter Glenn Greenwald noted that Snowden documents showed:

Western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction.

***

These agencies are attempting to control, infiltrate, manipulate, and warp online discourse …. Among the core self-identified purposes … are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

***

The discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes….

***

***

… no conceivable connection to terrorism or even national security threats.

***

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell”, devoted to “online human intelligence” and “strategic influence and disruption”….***

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack”, while dissecting how human beings can be manipulated using “leaders”, “trust, “obedience” and “compliance”:

The U.S. government is also spending millions to figure out how to manipulate social media to promote propaganda and stifle dissenting opinions.

And top NSA whistleblowers say that the NSA is blackmailing and harassing opponents with information that it has gathered – potentially even high-level politicians – just like FBI head J. Edgar Hoover blackmailed presidents and Congressmen.

You may think you have “nothing to hide”, but you’re breaking the law numerous times every day … without even knowing it (update).

Any criticism of government policies is considered “extremist” and potential terrorism.  For 5,000 years straight, mass surveillance has always been used to crush dissent.    For example, the CIA director in 1972.   The NSA is now collecting and retaining the most intimate personal details of Americans, including nude and suggestive pictures and medical and financial records … even though it is admitted that they have no conceivable security purpose

Moreover, if the NSA takes a dislike to someone, it can frame them.  This has been CONFIRMED by top NSA whistleblowers.

And the following facts make it likely that British and U.S. spy agencies are misusing their powers:

Washington’s Blog

NSA Whistleblower Speaks: “The Ultimate Goal is Total Population Control”

Liberty Blitzkrieg
by Michael Krieger

At least 80% of fibre-optic cables globally go via the U.S. This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.

 

- NSA Whistleblower Bill Binney

Long-time readers of Liberty Blitzkrieg will be no strangers to Bill Binney, one of the earliest NSA whistleblowers. Well before anyone had ever heard of Edward Snowden, in July 2012, I posted the following: NSA Whistleblower: U.S. Government Creating Dossiers on Millions of Citizens. In it, I noted:

Bill Binney is no joke. He worked for the NSA for 30 years before resigning because of concerns he had regarding illegal spying on U.S. citizens in 2001. It seems that the claim I and many others have made for years, that the “War on Terror” is a gigantic fraud used to instill fear and further the creation of an unconstitutional surveillance state in America is absolutely true. The “terrorists” they have declared war on are the American people themselves. 

Mr. Binney thankfully has never stopped fighting for The Constitution that he swore to defend, unlike most other government officials who happily stomp all over the basic civil liberties enshrined in our founding document. He had some very choice words recently and it would be wise for all of us on planet earth to pay very close attention. We learn from the Guardian that:

William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.

 

“At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”

 

The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.

 

He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.

 

It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”

Yep, as noted in the post: NSA Chief Admits “Only One or Perhaps Two” Terror Plots Stopped by Spy Program. Now back to the Guardian article.

“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”

 

Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the “greatest threat” to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.

Well, I question the entire ISIS story and personally wonder if the U.S. is not perfectly fine with what is happening over there as a justification to future crackdown on civil liberties in the name of “fighting ISIS.”
With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
Now watch this interview of Bill Binney from 2012:
 

Full article here.

Liberty Blitzkrieg

Follow

Get every new post delivered to your Inbox.

Join 1,324 other followers

%d bloggers like this: