Jim Fetzer: Can the Ghost of JFK Save Obama, Call Out Papa Bush, & Expose Texas’Treason? + LBJ-Texas-CIA Assassination RECAP

07 Other Atrocities, 09 Justice, 11 Society, Civil Society, Commerce, Corruption, Cultural Intelligence, Government, Law Enforcement, Peace Intelligence
Jim Fetzer
Jim Fetzer

JFK 50th: The keys to understanding his assassination

On 22 November 2013, the Oswald Innocence Campaign will be hosting the premiere event to commemorate the 50th observance of the JFK assassination. Presenting cutting-edge research on the death of our 35th President that holds the keys to understanding what took place, it will feature some of the best authors on some the most important evidence that clarifies and illuminates that tragic event in Dallas, 50 years ago. 

The research presented will advance extensive, detailed evidence establishing that the assassination of JFK was a “national security event”, which involved crucial elements of the most powerful institutions in the American government, including the CIA, the Joint Chiefs, the FBI and the Secret Service, who conspired with the Mafia, anti-Castro Cubans and Texas oil men to remove JFK from office and replace his policies with those of Lyndon Baines Johnson.

As Ralph Cinque has observed, this November 22nd, the government and the media are going to be going all out with the official lie about JFK–and with extreme prejudice. They are going to pull all the stops to promote the indefensible and long-disproven lie–one more stomach-churning time. What can we do to stand up to this evil pomposity? We can literally stand together–in Santa Barbara. We can come together and evoke the call for JFK truth.  A coup d-etat took place in 1963, and we have been living with the results of it for half a century–with millions of dead across the globe. With the death of John Kennedy, the US became a perpetual warfare state, and we live every day of our lives with the consequenes of that monstrous fact. So, join us on this very special day to find strength in numbers, to make a blip on the national radar and take personal responsibility for disseminating the truth about JFK.

What you weren’t supposed to ever know

The evidence that substantiates the scenario of the assassination as a national security event is extensive and compelling.  It has generate enormous resistance even within the JFK community, where several of those who will present their findings have been banned in a massive effort to suppress the truth and preserve the illusion that it was an event of a different kind, where the view that “the Mafia did it” or “the Cubans did it” or “the KGB did it” are frequently advanced, but where none of them could have effected the cover-up that was indispensable to convey the false impressions this conference will correct:

*  Lee Harvey Oswald was working for the government when he was framed for the death of JFK

* Photos and films allegedly taken during the assassination were altered to conceal the truth 

* Autopsy photos and X-rays were altered and faked to support a false account of the murder

* LBJ was a pivotal player–perhaps the pivotal player–who brought about the assassination

* George H.W. Bush was not only in Dealey Plaza but took an active role in carrying out the plot

* There were multiple shooters who tied the conspirators together to insure their mutual silence

* They included a Deputy Sheriff, an Air Force expert, an anti-Casto Cuban, a Police Officer and a Mafia shooter 

* LBJ’s personal hit-man, who killed a dozen people for Lyndon, also appears to have been directly involved

* The Mafia could not have extended its reach into Bethesda Naval Hospital to alter X-rays and photographs

* Anti-Castro Cubans would have been unable to substitute someone else’s brain for that of JFK

* While the KBG had the capability to alter films, it could not have gained access to the Zapruder film

The experts assembled for this unique conference–which will explain how it was done, who was responsible and why, and how it was covered up–have invested decades upon decades of their lives to research on crucial aspects of the case, including the medical, the ballistic, and the film and photographic evidence.  They include the leading authorities on the role of Lyndon Baines Johnson, on the involvement of George H.W. Bush, on the management of the cover-up, on the death of key witnesses intimately related to JFK and by others who personally knew the man accused of killing him.  If you are there, you will understand what went down.

Continue reading “Jim Fetzer: Can the Ghost of JFK Save Obama, Call Out Papa Bush, & Expose Texas'Treason? + LBJ-Texas-CIA Assassination RECAP”

Owl: Are You One of the Eight Million in the US Government’s Priority One “Neutralization” Database?

07 Other Atrocities, 10 Security, 11 Society, Civil Society, Corruption, DHS, Government, Idiocy, Ineptitude, Law Enforcement, Military
Who?  Who?
Who? Who?

While the Ed Snowden story getting all the attention, another story came and went never got enough attention when it first came out, but perhaps this older story is more relevant now than when it first came out. It's the story of “Main Corp,” which was first written by Christopher Ketchum of Radar Magazine. The roots of this program go back to the 1980's. Ketchum wrote:

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect.

Continue reading “Owl: Are You One of the Eight Million in the US Government's Priority One “Neutralization” Database?”

Berto Jongman: Top Three Government Spyware Tools – PRISM, FinSpy, BlueCoat

Advanced Cyber/IO, Government, Law Enforcement
Berto Jongman
Berto Jongman

TOP 3 Government Spyware tools: PRISM, FinSpy and BlueCoat

EXTRACT

FinFisher, also known as FinSpy, is surveillance software marketed by Gamma International, a software firm with a UK-based branch Gamma International Ltd in AndoverUnited Kingdom, and a Germany-based branch Gamma International GmbH in Munich[2][3] which markets the spyware through law enforcement channels.[1] Gamma International is a subsidiary of the Gamma Group, specializing in surveillance and monitoring, including equipment, software and training services, reportedly owned by William Louthean Nelson through a shell corporation in the British Virgin Islands.

Blue Coat got in the news when the Hacktivist cluster Telecomix released a 54GB censorship log that had been found on the Syrian domain.  The data was collected from seven of 15 Bluecoat SG-9000 HTTP proxies used by Syrian government telco and ISP STE in #opSyria. This is not the first time that government tools end up in environments where the regime has the last word.

Citizinlab had a nice research done about the Blue Coat software that you can find here.

Read full article.

Berto Jongman & Jon Rappoport: NSA & Big Money — Could Wall Street, Elite Pedophiles, CIA, Political Crime Families & the Vatican Want NSA Crippled?

Civil Society, Commerce, Corruption, Government, Law Enforcement, Military
Berto Jongman
Berto Jongman

Big Money and the NSA Scandal … How Dangerous is the “Security/Digital Complex”?

Richard Eskow

Institute of Ethics & Emerging Technologies, June 10, 2013

It should be self-evident that recent NSA revelations bring up some grave concerns about civil liberties. But they also raise other profound and troubling questions – about the privatization of our military, our inflated expectations for digital technology, and the increasingly cozy relationship between Big Corporations (including Wall Street) and Big Defense.

Are these corporations perverting our political process? The campaign war chest for Sen. Dianne Feinstein, who today said NSA whistleblower Edward Snowden committed “treason,” is heavily subsidized by defense and intelligence contractors that include General Dynamics, General Atomic, BAE Systems, Northrop Grumman, and Bechtel.  One might argue that a politician with that kind of backing is in no moral position to lecture others about “treason.”

But Feinstein’s funders are decidedly old-school Military/Industrial Complex types. What about the new crowd? This confluence of forces hasn’t been named yet, so for the time being we’ll use a cumbersome label: the “Security/Digital Complex.”  With computers and communications encompassing an ever-larger portion of human activity, we may someday learn that this new force dwarfs even its predecessors in the Feinstein camp when it comes to its impact on our democracy, our economy and our values.

There’s much we don’t know yet, so it’s wise to be cautious in describing this new force. But Edward Snowden’s revelations, and the reactions to them, are offering us a glimpse into rarely-seen intersections of Wall Street wealth, information technology, and the national security state.

Read full article.

Jon Rappoport
Jon Rappoport

Did someone help Ed Snowden punch a hole in the NSA?

by Jon Rappoport

June 11, 2013

Ed Snowden, NSA leaker. Honest man. Doing what was right. Bravo.

That still doesn’t preclude the possibility that, unknown to him, he was managed by people to put him the right place to expose NSA secrets.

Snowden’s exposure of NSA was a righteous act, because that agency is a RICO criminal. But that doesn’t mean we have the whole story.

How many people work in classified jobs for the NSA? And here is one man, Snowden, who is working for Booz Allen, an outside contractor, but is assigned to NSA, and he can get access to, and copy, documents that expose the spying collaboration between NSA and the biggest tech companies in the world—and he can get away with it.

If so, then NSA is a sieve leaking out of all holes. Because that means a whole lot of other, higher NSA employees can likewise steal these documents. Many, many other people can copy them and take them. Poof.

If the NSA is not a sieve, it’s quite correct to suspect Snowden, a relatively low-level man, was guided and helped.

Does that diminish what Snowden accomplished? No. But it casts it in a different light.

Continue reading “Berto Jongman & Jon Rappoport: NSA & Big Money — Could Wall Street, Elite Pedophiles, CIA, Political Crime Families & the Vatican Want NSA Crippled?”

Doug Rushkoff on CNN: Edward Snowden is a hero — uncovering the MACHINE

Corruption, Government, Idiocy, Ineptitude, Law Enforcement, Military
Douglas Rushkoff
Douglas Rushkoff

Editor's note: Douglas Rushkoff writes a regular column for CNN.com. He is a media theorist and the author of the new book “Present Shock: When Everything Happens Now.”

(CNN) — When I was a kid, I remember a guy named Daniel Ellsberg leaking some classified documents to the New York Times about the Vietnam War called “the Pentagon Papers.”

When the whistle-blower finally stood trial for espionage, my parents weren't quite sure how to feel. But when Richard Nixon's crew was revealed to have been conducting illegal wiretaps in an effort to discredit the former intelligence contractor, well, they were outraged and decided Ellsberg was a hero. So did the judge and most of America.

I wonder whether Ed Snowden, the 29-year-old Booz Allen Hamilton employee behind last week's series of leaks about National Security Agency surveillance on the American public, will be rewarded with the same admiration. You'd think we would be even more outraged by what he uncovered than we were by the surveillance of Ellsberg. After all, it's not just one lone loose cannon being wiretapped here, it's all of us being monitored.

Douglas Rushkoff

Snowden has not uncovered a human conspiracy here but the workings of the machine itself. And it's a machine that really does require some human intervention.

Continue reading “Doug Rushkoff on CNN: Edward Snowden is a hero — uncovering the MACHINE”

Owl: Is DHS Using NSA to Create a Domestic “Red List”? + DHS RECAP

Ethics, Government, Law Enforcement, Military

Who?  Who?
Who? Who?

This writer claims a “threat matrix” has been secretly developed in anticipation of a martial law declaration in the possibly near future. It will be for readers here to decide whether this is plausible or not, but it offers some interesting details on how the “threat score” will work that gives it some air of plausibility:

If you are in the alternative media, you are at the top of the list. When the DHS goon squads arrive at our homes at 3AM, we in the alternative media will not be going to a FEMA Camp. We are on the “red list” and will be summarily executed along with our families.  In order to get the goon squads to go along with this holocaust, all law enforcement and military will be required to send their families “for protection” to a centralized area. In actuality, if these “safe areas” are hostage centers to enforce compliance on all law enforcements. Sorry, no Oathkeepers allowed.

Continue reading “Owl: Is DHS Using NSA to Create a Domestic “Red List”? + DHS RECAP”

Rickard Falkvinge: Further Analysis of NSA PRISM, Limited Liability of Service Providers

Commerce, Corruption, Government, Ineptitude, Law Enforcement, Military
Rickard Falkvinge
Rickard Falkvinge

So Just Exactly What Is NSA’s Prism, More Than Reprehensibly Evil?

Privacy: The US NSA’s PRISM program appears to be a set of specialized deep-packet inspection filters combined with pre-existing wiretapping points at high-level Internet carriers in the United States. Since the program’s revelation the day before yesterday, speculations have ranged far and wide about who does what to make this surveillance state nightmare possible. Adding it all together, it would appear that the social tech companies did not, repeat not, supply bulk data about their users at the US Government’s will – but that the situation for you as an end user remains just as if they had.

The day before yesterday, news broke – no, detonated – that the NSA named nine social communications companies as “providers” for spy data. Among them were Microsoft, Hotmail, Skype, Apple, and Facebook – no surprises there, activists in repressive countries say “Use once, die once” about Skype – but also companies like Google and Gmail. This raised a lot of eyebrows, not to say fury.

The idea that the companies you trust with your most private data were handing that data wholesale to today’s Stasi equivalents was mind-bogglingly evil and cynical. As the news of this broke, the companies would have been a lot better off if they had just been found out doing something like eating live children.

The impression that companies were playing an active part in providing private data to the NSA was strengthened by the precision of the presentation – that there were dates when each company had, as it seemed, voluntarily joined the surveillance program.

Seeing the companies in question scramble to deny the allegations of the NSA deck – first from on-duty spokespeople with their polished façade, then from CEOs – was the inevitable next step. But this is where things became interesting. While the initial polished façade was barely credible, the response from the CEOs came across as surprised, open, and candid.

So far, there are three parties to this story: the NSA with its leaked slide deck naming the nine companies as data providers, the media who reported on it, and the companies denying any active part in NSA spy activities. The first reaction is that at least one of them must be lying. But I don’t think any of them are. I think the leaked deck from the NSA is genuine, I think the Washington Post and Guardian didn’t conspire to make shit like this up, and I have come to believe the response from the companies. How could this be possible?

At this point, there are three possibilities of what PRISM is:

Read full story and see specific PRISM slide showing traffic flow.

Continue reading “Rickard Falkvinge: Further Analysis of NSA PRISM, Limited Liability of Service Providers”