Rickard Falkvinge: NSA as Poster Child for Government & Corporate Corruption, Collusion, & Treason

03 Economy, 07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Civil Society, Corruption, Director of National Intelligence et al (IC), Government, Idiocy, Ineptitude, IO Deeds of War, IO Impotency, Law Enforcement, Military

Rickard Falkvinge
Rickard Falkvinge

Told You So: If You Have Been Using A Centralized Comms Service, You Were Wiretapped

Privacy:  This night, news broke that the USA’s security agencies have been wiretapping essentially every major centralized social service for private data. Photos, video conferences, text chats, and voice calls – everything. We have been saying this for years and been declared tinfoil hat and conspiracy nuts; it’s good to finally see the documents in black on white.

This night, European time, the news broke that the USA’s National Security Agency (NSA) has had direct access to pretty much every social network for the past several years, dating back to 2007, under a program named PRISM. Under the program, a number of social services voluntarily feed people’s private data to the NSA. In short, if you have been using/uploading

  • e-mail
  • video or voice chat
  • videos
  • photos
  • stored data
  • VoIP calls
  • file transfers
  • video conferencing
  • (and more)

…from any of…

  • Microsoft (incl. Hotmail et al), since Sep 11, 2007
  • Google, since Jan 14, 2009
  • Yahoo, since Mar 12, 2008
  • Facebook, since June 3, 2009
  • PalTalk, since Dec 7, 2009
  • YouTube, since Sep 24, 2010
  • Skype, since Feb 6, 2011
  • AOL, since Mar 31, 2011
  • Apple, since Oct 2012

…then you have been wiretapped, and still are.

Continue reading “Rickard Falkvinge: NSA as Poster Child for Government & Corporate Corruption, Collusion, & Treason”

Eagle: Pentagon destroys replica of underground nuclear facility — Israel assured budget cuts will not stop attack on Iran

04 Inter-State Conflict, 05 Iran, 07 Other Atrocities, 08 Proliferation, Corruption, DoD, Government, Idiocy, IO Deeds of War, Military, Officers Call
300 Million Talons...
300 Million Talons…

US experiment: Pentagon destroys replica of underground nuclear facility

Pentagon uses advanced bunker buster bombs to destroy replica of underground facility as part of experiment whose results were relayed to friendly nations

The Pentagon has recently completed a series of field exercises on US soil as part of which a replica of an underground nuclear facility was destroyed, Yedioth Ahronoth reported Friday. The tests were declared a resounding success having exceeded all expectations.

The results of the experiment were relayed to friendly nations with the aim of reassuring them as to the US's ability to destroy Iranian nuclear facilities in a single strike. It was also meant to convey that the US is serious in its intentions to attack Iran should circumstances allow it.

Continue reading “Eagle: Pentagon destroys replica of underground nuclear facility — Israel assured budget cuts will not stop attack on Iran”

Mini-Me: Obama Goes to Cyber-War, Not Realizing The Depth and Breadth of the Lies He Hears and Reads — Professional Interrogation of General Alexander and Others Recommended

04 Inter-State Conflict, 07 Other Atrocities, 08 Proliferation, Corruption, Idiocy, Ineptitude, IO Deeds of War, IO Impotency, Military
Who?  Mini-Me?
Who? Mini-Me?

Huh?

White House: Obama adjusting use of cyber offense in response to threats

EXTRACT:

Gen. Keith Alexander, the top officer at U.S. Cyber Command and the National Security Agency, testified March 12 before the Senate Armed Services Committee that the potential for an attack against the nation’s electric grid and other essential systems is real and that the federal government needed to take more aggressive steps.

At the time, Alexander said 13 cyber teams were being formed to guard the nation against destructive attacks in cyberspace, stressing that their role would be offensive. He also said the teams would work outside the United States, but he did not say where.

Read full article.

Continue reading “Mini-Me: Obama Goes to Cyber-War, Not Realizing The Depth and Breadth of the Lies He Hears and Reads — Professional Interrogation of General Alexander and Others Recommended”

Winslow Wheeler: F-35 Corruption, Costs, & Consequences (All Five Parts)

Corruption, Government, Idiocy, Ineptitude, Military
Winslow Wheeler
Winslow Wheeler

This series reveals a political and military system that is sick in its core.  This toxic stew of the F-35's high cost, abetted by concurrent production, lagging performance and continuing design problems, has put U.S. and allied air power into a dive. The dive will steepen so long as F-35 production at the currently-projected rates continues.  I recommend starting with Part 5, the summary by Mark Thompson of TIME Battleland Blog.

Owl: NSA Perfect Storm — Time to Clean House — Fire Alexander, Close DNI Down (Restore DCI), Cancel CIA Drone Program (“A Thousand Genocides”), Fund Open Source Agency….

Ethics, Government, Military
Who?  Who?
Who? Who?

MS, Yahoo FB, Apple and the rest all deny they know anything the NSA's program – implemented with these tech giant's cooperation – called “PRISM.” It's evident from this article they are all lying:

” America, here's hoping you've had enough time to be come to terms with the National Security Agency scooping up all of your metadata pertaining to all of the phone calls you've been making with Verizon, because here comes the next fun news about the government's far-reaching panopticon of total information surveillance, courtesy of Barton Gellman and Laura Poitras of The Washington Post:

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.

The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who know about PRISM were bound by oaths of office to hold their tongues.

The Washington Post obtained “briefing slides” from an “internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA’s Signals Intelligence Directorate,” from a “career intelligence officer” who cited “firsthand experience with these systems, and horror at their capabilities,” as the reason for the disclosure. These materials described PRISM as “the most prolific contributor to the President's Daily Brief” and the NSA's “leading source of raw material, accounting for nearly 1 in 7 intelligence reports.” The Post, goes on to report that while PRISM allows the NSA to collect “anything it likes” from the available data, it is in practice not utilized as a “dragnet” per se:

Analysts who use the system from a Web portal at Fort Meade key in “selectors,” or search terms, that are designed to produce at least 51 percent confidence in a target’s “foreignness.” That is not a very stringent test. Training materials obtained by the Post instruct new analysts to submit accidentally collected U.S. content for a quarterly report, “but it’s nothing to worry about.”

One may nevertheless worry about this thing that is “nothing to worry about/”

More:

NSA Prism Data Mining Is All Up In Ur Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple [UPDATE]

RELATED

Continue reading “Owl: NSA Perfect Storm — Time to Clean House — Fire Alexander, Close DNI Down (Restore DCI), Cancel CIA Drone Program (“A Thousand Genocides”), Fund Open Source Agency….”

GO ARMY: War College Speaker Videos on YouTube Channel

04 Education, Military, Officers Call
Click on Image to Enlarge
Click on Image to Enlarge

Even if you can’t make it to the Army War College you can still take advantage of its world-class faculty, wide breadth of guests speakers and internationally attended conference via our YouTube page.

Located at www.youtube.com/usarmywarcollege the site boasts nearly 400 videos and is updated regularly with new content.

Want to know the best part? You don’t need an account to access the site and watch the videos. Simply click the link above and scroll down the selection of videos available.  You can even watch these on your mobile devices.

If you do want to be notified when a new video is posted it’s easy. Simply log-in YouTube using a Google or YouTube account and click the “subscribe” button on the top of the page.  Now each time we add

Berto Jongman: Deviant Globalization + Legalized Crime Meta-RECAP

01 Poverty, 02 Infectious Disease, 03 Environmental Degradation, 04 Inter-State Conflict, 05 Civil War, 06 Genocide, 07 Other Atrocities, 08 Proliferation, 09 Terrorism, 10 Transnational Crime, Academia, Civil Society, Commerce, Commercial Intelligence, Corruption, Cultural Intelligence, Government, Idiocy, Ineptitude, Law Enforcement, Media, Military, Non-Governmental
Berto Jongman
Berto Jongman

Not new, but now becoming more transparent to the public.

Book: Deviant Globalization: Black Market Economy in the 21st Century (2011)

Criminals of the World Unite: A smart member of the global warrior elite “discovers” the next big threat

Myths of Terrorism

Continue reading “Berto Jongman: Deviant Globalization + Legalized Crime Meta-RECAP”

noble gold