Marcus Aurelius: Reuel Marc-Gerecht on NSA High Cost – Low Return — Robert Steele Comments

03 Economy, 07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Corruption, Director of National Intelligence et al (IC), DoD, Government, Idiocy, Ineptitude, IO Deeds of War, IO Impotency, Military, Office of Management and Budget, Officers Call
Marcus Aurelius
Marcus Aurelius

The Costs And Benefits Of The NSA

The data-collection debate we need to have is not about civil liberties.

By Reuel Marc Gerecht

Weekly Standard, June 24, 2013

Should Americans fear the possible abuse of the intercept power of the National Security Agency at Fort Meade, Maryland? Absolutely. In the midst of the unfolding scandal at the IRS, we understand that bureaucracies are callous creatures, capable of manipulation. In addition to deliberate misuse, closed intelligence agencies can make mistakes in surveilling legitimate targets, causing mountains of trouble. Consider Muslim names. Because of their commonness and the lack of standardized transliteration, they can befuddle scholars, let alone intelligence analysts, who seldom have fluency in Islamic languages. Although one is hard pressed to think of a case since 9/11 in which mistaken identity, or a willful or unintentional leak of intercept intelligence, immiserated an American citizen, these things can happen. NSA civilian employees, soldiers, FBI agents, CIA case officers, prosecutors, and our elected officials are not always angels. Even though encryption is mathematically easier to accomplish than decryption, the potential for abuse of digital communication is always there—all the more since few Americans resort to encryption of their everyday emails.

But fearing the NSA, which has been a staple of Hollywood for decades, requires you to believe that hundreds, if not thousands, of American employees in the organization are in on a conspiracy. In the Edward Snowden-is-a-legitimate-NSA-whistleblower narrative, it also requires that very liberal senators and congressmen are complicit in propagating a civil-rights-chewing national surveillance system.

Continue reading “Marcus Aurelius: Reuel Marc-Gerecht on NSA High Cost – Low Return — Robert Steele Comments”

Jim Fetzer: Can the Ghost of JFK Save Obama, Call Out Papa Bush, & Expose Texas’Treason? + LBJ-Texas-CIA Assassination RECAP

07 Other Atrocities, 09 Justice, 11 Society, Civil Society, Commerce, Corruption, Cultural Intelligence, Government, Law Enforcement, Peace Intelligence
Jim Fetzer
Jim Fetzer

JFK 50th: The keys to understanding his assassination

On 22 November 2013, the Oswald Innocence Campaign will be hosting the premiere event to commemorate the 50th observance of the JFK assassination. Presenting cutting-edge research on the death of our 35th President that holds the keys to understanding what took place, it will feature some of the best authors on some the most important evidence that clarifies and illuminates that tragic event in Dallas, 50 years ago. 

The research presented will advance extensive, detailed evidence establishing that the assassination of JFK was a “national security event”, which involved crucial elements of the most powerful institutions in the American government, including the CIA, the Joint Chiefs, the FBI and the Secret Service, who conspired with the Mafia, anti-Castro Cubans and Texas oil men to remove JFK from office and replace his policies with those of Lyndon Baines Johnson.

As Ralph Cinque has observed, this November 22nd, the government and the media are going to be going all out with the official lie about JFK–and with extreme prejudice. They are going to pull all the stops to promote the indefensible and long-disproven lie–one more stomach-churning time. What can we do to stand up to this evil pomposity? We can literally stand together–in Santa Barbara. We can come together and evoke the call for JFK truth.  A coup d-etat took place in 1963, and we have been living with the results of it for half a century–with millions of dead across the globe. With the death of John Kennedy, the US became a perpetual warfare state, and we live every day of our lives with the consequenes of that monstrous fact. So, join us on this very special day to find strength in numbers, to make a blip on the national radar and take personal responsibility for disseminating the truth about JFK.

What you weren’t supposed to ever know

The evidence that substantiates the scenario of the assassination as a national security event is extensive and compelling.  It has generate enormous resistance even within the JFK community, where several of those who will present their findings have been banned in a massive effort to suppress the truth and preserve the illusion that it was an event of a different kind, where the view that “the Mafia did it” or “the Cubans did it” or “the KGB did it” are frequently advanced, but where none of them could have effected the cover-up that was indispensable to convey the false impressions this conference will correct:

*  Lee Harvey Oswald was working for the government when he was framed for the death of JFK

* Photos and films allegedly taken during the assassination were altered to conceal the truth 

* Autopsy photos and X-rays were altered and faked to support a false account of the murder

* LBJ was a pivotal player–perhaps the pivotal player–who brought about the assassination

* George H.W. Bush was not only in Dealey Plaza but took an active role in carrying out the plot

* There were multiple shooters who tied the conspirators together to insure their mutual silence

* They included a Deputy Sheriff, an Air Force expert, an anti-Casto Cuban, a Police Officer and a Mafia shooter 

* LBJ’s personal hit-man, who killed a dozen people for Lyndon, also appears to have been directly involved

* The Mafia could not have extended its reach into Bethesda Naval Hospital to alter X-rays and photographs

* Anti-Castro Cubans would have been unable to substitute someone else’s brain for that of JFK

* While the KBG had the capability to alter films, it could not have gained access to the Zapruder film

The experts assembled for this unique conference–which will explain how it was done, who was responsible and why, and how it was covered up–have invested decades upon decades of their lives to research on crucial aspects of the case, including the medical, the ballistic, and the film and photographic evidence.  They include the leading authorities on the role of Lyndon Baines Johnson, on the involvement of George H.W. Bush, on the management of the cover-up, on the death of key witnesses intimately related to JFK and by others who personally knew the man accused of killing him.  If you are there, you will understand what went down.

Continue reading “Jim Fetzer: Can the Ghost of JFK Save Obama, Call Out Papa Bush, & Expose Texas'Treason? + LBJ-Texas-CIA Assassination RECAP”

Rickard Falkvinge: NSA as Poster Child for Government & Corporate Corruption, Collusion, & Treason

03 Economy, 07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Civil Society, Corruption, Director of National Intelligence et al (IC), Government, Idiocy, Ineptitude, IO Deeds of War, IO Impotency, Law Enforcement, Military

Rickard Falkvinge
Rickard Falkvinge

Told You So: If You Have Been Using A Centralized Comms Service, You Were Wiretapped

Privacy:  This night, news broke that the USA’s security agencies have been wiretapping essentially every major centralized social service for private data. Photos, video conferences, text chats, and voice calls – everything. We have been saying this for years and been declared tinfoil hat and conspiracy nuts; it’s good to finally see the documents in black on white.

This night, European time, the news broke that the USA’s National Security Agency (NSA) has had direct access to pretty much every social network for the past several years, dating back to 2007, under a program named PRISM. Under the program, a number of social services voluntarily feed people’s private data to the NSA. In short, if you have been using/uploading

  • e-mail
  • video or voice chat
  • videos
  • photos
  • stored data
  • VoIP calls
  • file transfers
  • video conferencing
  • (and more)

…from any of…

  • Microsoft (incl. Hotmail et al), since Sep 11, 2007
  • Google, since Jan 14, 2009
  • Yahoo, since Mar 12, 2008
  • Facebook, since June 3, 2009
  • PalTalk, since Dec 7, 2009
  • YouTube, since Sep 24, 2010
  • Skype, since Feb 6, 2011
  • AOL, since Mar 31, 2011
  • Apple, since Oct 2012

…then you have been wiretapped, and still are.

Continue reading “Rickard Falkvinge: NSA as Poster Child for Government & Corporate Corruption, Collusion, & Treason”

Berto Jongman: (YouTube 1:04:07) Christian Film on Muslim Terrorist Camps in USA (Part 1) – Part 2 (9:29) Also

07 Other Atrocities, 08 Immigration, 09 Justice, 09 Terrorism, 11 Society, Civil Society, DHS, Government, IO Deeds of War, Law Enforcement, Movies, YouTube
Berto Jongman
Berto Jongman

35 Islmaic comunes across 22 states

Published on Dec 9, 2012

http://www.christianaction.org/

Scattered around the United States, unknown by most Americans, are dozens of Islamic terrorist-training compounds known as “Muslims of the Americas.” Under the leadership of a radical Pakistani cleric, Sheikh Mubarik Gilani, Muslims of the Americas has thousands of devoted followers who are being groomed for homegrown jihad.

In never-before-seen video footage, Christian Action Network exposes these dangerous terrorist compounds and reveals for the first time a secret training tape in which American Muslims are recruited to “join one of the most advanced training courses in Islamic military warfare”… right here in America.

Part 2:

Continue reading “Berto Jongman: (YouTube 1:04:07) Christian Film on Muslim Terrorist Camps in USA (Part 1) – Part 2 (9:29) Also”

Berto Jongman: Case for an International Tribunal for Cyber-Space

03 Economy, 04 Inter-State Conflict, 05 Civil War, 07 Other Atrocities, 09 Justice, 10 Transnational Crime, IO Impotency
Berto Jongman
Berto Jongman

Peace and Justice in Cyberspace

Potential new global legal mechanisms against global cyberattacks and other global cybercrimes

An International Criminal Tribunal for Cyberspace (ICTC)
International cybercrime law
Prosecution for the Tribunal
Police investigation for the Tribunal

by

Judge Stein Schjolberg

PDF 40 Pages

EXTRACT:

Cyberspace, as the fifth common space, after land, sea, air and outer space, is in great need for coordination, cooperation and legal measures among all nations.

Berto Jongman: Amy Goodman on Obama’s Sledgehammer

09 Justice, 11 Society, Civil Society, Corruption, Cultural Intelligence, Government
Berto Jongman
Berto Jongman

Being read (and heard in podcast form) in Europe.

Hammond, Manning, Assange and Obama’s Sledgehammer Against Dissent

By Amy Goodman

One cyberactivist’s federal case wrapped up this week, and another’s is set to begin. While these two young men, Jeremy Hammond and Bradley Manning, are the two who were charged, it is the growing menace of government and corporate secrecy that should be on trial.

Continue reading “Berto Jongman: Amy Goodman on Obama's Sledgehammer”