Who You Are – Collected information includes names, addresses, biometrics,
social media accounts .
What You Do – Travel history, communications, financial transactions and
movement of physical assets.
Who You Know – Relational information including family, friends, associates
Context – Contextual data such as demographics, politics, cultural norms
Acloser look at the upcoming Jade Helm
military exercise, specifically its “master the human domain” motto, reveals a larger agenda in regards to domestic
In current military terminology, the “human domain” or “human domain analytics” refers to the
“global understanding of anything associated with people.”
Breaking down into four specific categories, mastery of the human domain results from obtaining
total information awareness on a mass scale. (Shown Above)
“The importance of understanding the Human Domain has increased significantly over the past decade
and a half,” writes the US Geospatial Intelligence Foundation. “There has been a shift from concentration on
Nation-States, to smaller organizations, to individuals.”
...With modern technological advancements allowing anyone “with a video camera and a laptop
computer” to have “worldwide impact,” the federal government has not only hyper-incentivized the collection of
data, but the merging of all relevant agencies.
...“They’re building an infrastructure of tyranny,” stated Infowars David Knight. “There’s a legal
infrastructure with things like the NDAA, there’s a technical infrastructure with things like the capability to do
dragnet surveillance, and then of course there is going to be a military and law enforcement infrastructure, and
those are merging.”
...“If you understand the technologies, you will see that Jade Helm is more an intelligence operation using
Geospatial Intelligence mapping than a simple military exercise,” adds David Knight.
...“From the very beginning this has been the NSA, the U.S. Geological Service, law enforcement,
military, working to put together all this information…” David Knight said.
As information from low level surveillance technologies such as Stingrays and predictive policing
programs gets siphoned up to NSA data centers, a detailed global map will continue to grow with near-endless stats
on all individuals.
IBM and the Holocaust is the stunning story of IBM's strategic alliance with
Nazi Germany -- beginning in 1933 in the first weeks that Hitler came to power and continuing well into World War
II. As the Third Reich embarked upon its plan of conquest and genocide, IBM and its subsidiaries helped create
enabling technologies, step-by-step, from the identification and cataloging programs of the 1930s to the selections
of the 1940s.
Only after Jews were identified -- a massive and complex task that Hitler wanted done immediately
-- could they be targeted for efficient asset confiscation, ghettoization, deportation, enslaved labor, and,
ultimately, annihilation. It was a cross-tabulation and organizational challenge so monumental, it called for a
computer. Of course, in the 1930s no computer existed.
But IBM's Hollerith punch card technology did exist. Aided by the company's custom-designed and
constantly updated Hollerith systems, Hitler was able to automate his persecution of the Jews. Historians have
always been amazed at the speed and accuracy with which the Nazis were able to identify and locate European Jewry.
Until now, the pieces of this puzzle have never been fully assembled. The fact is, IBM technology was used to
organize nearly everything in Germany and then Nazi Europe, from the identification of the Jews in censuses,
registrations, and ancestral tracing programs to the running of railroads and organizing of concentration camp
IBM and its German subsidiary custom-designed complex solutions, one by one, anticipating the
Reich's needs. They did not merely sell the machines and walk away. Instead, IBM leased these machines for high
fees and became the sole source of the billions of punch cards Hitler needed.
IBM and the Holocaust takes you through the carefully crafted corporate collusion with the Third
Reich, as well as the structured deniability of oral agreements, undated letters, and the Geneva intermediaries --
all undertaken as the newspapers blazed with accounts of persecution and destruction.
Just as compelling is the human drama of one of our century's greatest minds, IBM founder Thomas
Watson, who cooperated with the Nazis for the sake of profit.
Only with IBM's technologic assistance was Hitler able to achieve the staggering numbers of the
Holocaust. Edwin Black has now uncovered one of the last great mysteries of Germany's war against the Jews -- how
did Hitler get the names?
TECHNOCRACY - A form of government in
which scientists and technical experts are in control "technocracy was described as that society in which those
who govern justify themselves by appeal to technical experts who justify themselves by appeal to scientific
forms of knowledge"
The Roots of Technocracy with Expert Patrick M.
24/7 surveillance. Smart grid controls. Carbon rationing. Today we talk to
"Technocracy Rising" author Patrick Wood about the hidden history of technocracy, the dark plan for a
resource-based economy that is being pushed by the Trilateral Commission, the UN, and other globalist institutions
in order to bring about a completely managed, controlled and regulated society.
Half a century ago, outgoing President Dwight D. Eisenhower coined the term "military-industrial
complex" to describe the fascistic collusion between the Pentagon and America's burgeoning armaments industry. But
in our day and age we are witnessing the rise of a new collusion, one between the Pentagon and the tech industry
that it helped to seed, that is committed to waging a covert war against people the world over. Now, in the 21st
century, it is time to give this new threat a name: the information-industrial complex.
The Ultimate Goal Of The NSA Is Total
At least 80% of all audio calls, not just metadata, are
recorded and stored in the US, says whistleblower William Binney – that's a 'totalitarian
by Antony Loewenstein
William Binney is one of the highest-level whistleblowers
to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but
resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.
On 5 July he spoke at a conference in London organised by the Centre for
Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama
“At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US
to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in
the US. The NSA lies about what it stores.”
The NSA will soon be able to collect 966
exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the
beginning of humankind until 2003 amount to only five exabytes.
Binney, who featured in a 2012 short film by
Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government
“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some
Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect
contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out
but fear retribution and exile, not unlike Snowden himself, who is likely to remain there
for some time.
Unlike Snowden, Binney didn’t take any documents with him when he left the NSA. He now says that hard evidence
of illegal spying would have been invaluable. The latest Snowden leaks, featured in the Washington Post, detail
private conversations of average Americans with no connection to extremism.
It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their
daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism
but inside the US it has stopped zero attacks.”
The lack of official oversight is one of Binney’s key concerns, particularly of the
secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the
surveillance scheme's constitutionality.
“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to
consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can
double that globally.”
A Fisa court in 2010 allowed the NSA to spy on 193 countries around the world,
plus the World Bank, though there’s evidence that
even the nations the US isn’t supposed to monitor – Five Eyes allies Britain, Canada, Australia and New
Zealand – aren’t immune from being spied on. It’s why encryption is today so essential to transmit information
Binney recently told the German NSA inquiry
committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US
society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked
the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over
The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The
Pew Research Centre released a report this month,
Digital Life in 2025, that predicted worsening state control and censorship,
reduced public trust, and increased commercialisation of every aspect of web culture.
It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of
Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy
it is for governments and corporations to capture our personal information without us even realising.
Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of
this money is
wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a
killing from the gross exaggeration of fear that permeates the public domain.
Wikileaks understands this reality better than most. Founder Julian Assange and
investigative editor Sarah Harrison both
remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week,
where he continues to work, release leaks, and fight various
legal battles. He hopes to
resolve his predicament soon.
At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work
with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where
there’s technical assistance from people like Jacob Appelbaum.”
A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group
news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison
With 8m documents on its website after years of leaking, the
importance of publishing and maintaining source documents for the media, general public and court cases can’t be
under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”
evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney
said: “I call people who are covering up NSA crimes traitors”.
New Computer Will ‘Decide If You Receive
Computer may soon decide if some receive
by Jefferey Jaxen
Posted on February 22, 2015
IBM’s Watson computer may soon decide if some individuals receive healthcare
or not. IBM, whose stock price has sunk to its lowest in four years, has recently “announced a $1 billion investment to establish the new Watson Group.”
IBM’s Watson computer processes large amounts of your information to make a better decision for you. Watson is
now embedded in the Department of Veteran’s Affairs Data Center in Austin, Texas to “advise doctors on
treatments for post-traumatic stress disorder.”
According to their press release, the technology
will “transform decision making.” Or said in a different way, if you are a Veteran in need of care,
IBM’s Watson will soon make the decision about your health care for you.
Big Data Used Against You
IBM’s Watson can “understand and respond to Big Data.” This is a catch-all phrase that encompasses medical
literature, clinical data, personal electronic records, and doctor’s personal comments on patients. For years, it
has been an open secret that all of our “Big Data” has been harvested and stored without our consent. This includes
every Facebook thought, phone conversation, every purchase, and even household conversations, to name a few. There is no doubt that this “Big Data” is waiting to
be used towards withholding or forcing medical treatment at the stroke of a bureaucratic pen in the future.
The role being given to IBM’s Watson represents the official shift to disempower the practicing medical
community and accelerate the mandates of Obamacare in your individual life. You could say IBM’s Watson is “common
core re-education for the mind of the medical community.” All personal medical records will be uploaded and
“delivered from the cloud” according to IBM’s press release. Presumably, the same cloud computing software that was
recently hacked resulting in the public release of nude celebrity photos taken from their trusted wireless devices and
computers linked to the cloud.
Recently, Charles Seife made major headlines when he published in the Journal of the American Medical
Association (JAMA) that research misconduct is often unreported in published medical studies. These
are the same medical studies that the IBM’s Watson will reference to issue orders on what treatment a patient
It is the insight, humanity, courage, and empathy to look for solutions outside this broken system that will
lead to better ways. While using data, old and new, from a Veteran’s Affairs system that has a treacherous public record for poor quality care, limited use for cures, and a
“profits-over-people” view shows further recklessness at best and perhaps a deeper agenda at play.
Fool Me Once
From the get go, IBM’s Watson is a slap in the face to anyone paying attention. IBM cemented its corporate
influence by making Hollerith, their big data punch card sorting machines for Germany during World War II in order
to better locate Jewish residents when Hitler came to power. In the words of Edwin Black, author of “IBM and the Holocaust: The Strategic Alliance between
Nazi Germany and America’s Most Powerful Corporation:”
“IBM Germany, using its own staff and equipment, designed, executed, and supplied the indispensable
technologic assistance Hitler’s Third Reich needed to accomplish what had never been done before—the automation
of human destruction.”
Black continues later in his historic analysis to state that IBM New York always understood from the outset in
1933 that they were courting and doing business with the Nazi party. The company leveraged its Nazi party
connections to continuously enhance its business relationship with the Third Reich, Germany, and Nazi-dominated
Europe. In addition, IBM and its German subsidiary Dehomag (IBM Europe) serviced the machines, including ones
located in concentration camps, regularly throughout the war.
Thomas A Watson, IBM’s founder, greatly admired his Nazi partners as evidence from correspondence, visits to
Germany during the war, and regular gifts to Reich command. On September 11th, 1934 Watson sent the following telegram to his IBM Berlin
“Confirming agreement reached between us in Berlin October 1933 we extend by that agreement your
company’s rights to manufacture and to sell our machines to all European Hollerith companies.”
Obama collecting personal data for a secret race
By Paul Sperry - July 18, 2015 | 4:00pm
A key part of President Obama’s legacy
will be the fed’s unprecedented collection of sensitive data on Americans by race. The government is prying into
our most personal information at the most local levels, all for the purpose of “racial and economic justice.”
Unbeknown to most Americans, Obama’s racial bean counters are furiously mining data on their
health, home loans, credit cards, places of work, neighborhoods, even how their kids are disciplined in school —
all to document “inequalities” between minorities and whites.
This Orwellian-style stockpile of statistics includes a vast and permanent
network of discrimination databases, which Obama already is using to make “disparate impact” cases against: banks
that don’t make enough prime loans to minorities; schools that suspend too many blacks; cities that don’t offer
enough Section 8 and other low-income housing for minorities; and employers who turn down African-Americans for
jobs due to criminal backgrounds.
Big Brother Barack wants the databases operational before he leaves office, and much of the data in
them will be posted online.
So civil-rights attorneys and urban activist groups will be able to exploit them to show patterns
of “racial disparities” and “segregation,” even if no other evidence of discrimination exists.
Obama is presiding over the largest consolidation of personal data in US history.
The granddaddy of them all is the
Affirmatively Furthering Fair Housing database, which the Department of Housing and Urban Development rolled out
earlier this month to racially balance the nation, ZIP code by ZIP code. It will map every US neighborhood by four
racial groups — white, Asian, black or African-American, and Hispanic/Latino — and publish “geospatial data”
pinpointing racial imbalances.
The agency proposes using nonwhite populations of 50% or higher as the threshold for classifying
Federally funded cities deemed overly segregated will be pressured to change their zoning laws to
allow construction of more subsidized housing in affluent areas in the suburbs, and relocate inner-city minorities
to those predominantly white areas. HUD’s maps, which use dots to show the racial distribution or density in
residential areas, will be used to select affordable-housing sites.
HUD plans to drill down to an even more granular level, detailing the proximity of black residents
to transportation sites, good schools, parks and even supermarkets. If the agency’s social engineers rule the
distance between blacks and these suburban “amenities” is too far, municipalities must find ways to close the gap
or forfeit federal grant money and face possible lawsuits for housing discrimination.
Civil-rights groups will have access to the agency’s sophisticated mapping software, and will
participate in city plans to re-engineer neighborhoods under new community outreach requirements.
“By opening this data to everybody, everyone in a community can weigh in,” Obama said. “If you want
affordable housing nearby, now you’ll have the data you need to make your case.”
Meanwhile, the Federal Housing Finance
Agency, headed by former Congressional Black Caucus leader Mel Watt, is building its own database for racially
balancing home loans. The so-called National Mortgage Database Project will compile 16 years of lending data,
broken down by race, and hold everything from individual credit scores and employment records.
Mortgage contracts won’t be the only financial records vacuumed up by the database. According to
federal documents, the repository will include “all credit lines,” from credit cards to student loans to car loans
— anything reported to credit bureaus. This is even more information than the IRS collects.
The FHFA will also pry into your personal assets and debts and whether you have any bankruptcies.
The agency even wants to know the square footage and lot size of your home, as well as your interest rate.
FHFA will share the info with Obama’s brainchild, the Consumer Financial Protection Bureau, which
acts more like a civil-rights agency, aggressively investigating lenders for racial bias.
The FHFA has offered no clear explanation as to why the government wants to sweep up so much
sensitive information on Americans, other than stating it’s for “research” and “policymaking.”
However, CFPB Director Richard Cordray was more forthcoming, explaining in a recent talk to the
radical California-based Greenlining Institute: “We will be better able to identify possible discriminatory lending
CFPB is separately amassing a database to
monitor ordinary citizens’ credit-card transactions. It hopes to vacuum up some 900 million credit-card accounts —
all sorted by race — representing roughly 85% of the US credit-card market. Why? To sniff out “disparities” in
interest rates, charge-offs and collections.
CFPB also just finalized a rule requiring all
regulated banks to report data on minority hiring to an Office of Minority and Women Inclusion. It will collect
reams of employment data, broken down by race, to police diversity on Wall Street as part of yet another fishing
Through its mandatory Civil Rights Data
Collection project, the Education Department is gathering information on student suspensions and expulsions, by
race, from every public school district in the country. Districts that show disparities in discipline will be
targeted for reform.
Those that don’t comply will be punished. Several already have been forced to revise their
discipline policies, which has led to violent disruptions in classrooms.
Obama’s educrats want to know how many blacks versus whites are enrolled in gifted-and-talented and
advanced placement classes.
Schools that show blacks and Latinos under-enrolled in such curricula, to an undefined
“statistically significant degree,” could open themselves up to investigation and lawsuits by the department’s
Civil Rights Office.
Count on a flood of private lawsuits to piggyback federal discrimination claims, as civil-rights
lawyers use the new federal discipline data in their legal strategies against the supposedly racist US school
Even if no one has complained about discrimination, even if there is no other evidence of racism,
the numbers themselves will “prove” that things are unfair.
Such databases have never before existed. Obama is presiding over the largest consolidation of
personal data in US history. He is creating a diversity police state where government race cops and civil-rights
lawyers will micromanage demographic outcomes in virtually every aspect of society.
The first black president, quite brilliantly, has built a quasi-reparations infrastructure
perpetually fed by racial data that will outlast his administration.
Paul Sperry is a Hoover Institution media fellow and author of “The Great American Bank Robbery,”
which exposes the racial politics behind the mortgage bust.
Help us spread the word about the liberty movement, we're reaching millions help us reach millions more.
Share the free live video feed link with your friends & family:http://www.infowars.com/show
Mastering The Human
Confirmed: Jade Helm Is For The
Published on May 8, 2015
David Knight and Rob Dew break down the sinister purpose behind Operation Jade Helm
detailing how it is part of a broader plan to have the military and police forces work together to control the
people in times of economic crisis and natural disaster.
Master the Human
Domain:The Domestic Plan Behind Jade
Pentagon goal of information domination hidden in plain
by Infowars.com | May 9, 2015
Acloser look at the upcoming
Jade Helm military exercise, specifically its “master the human domain” motto, reveals a larger agenda in regards
to domestic policy.
In current military terminology, the “human domain” or “human domain analytics” refers to the “global
understanding of anything associated with people.”
Breaking down into four specific categories, mastery of the human domain results from obtaining total
information awareness on a mass scale.
Who You Are – Collected information includes names, addresses, biometrics, social media
What You Do – Travel history, communications, financial transactions and movement of
Who You Know – Relational information including family, friends, associates and
Context – Contextual data such as demographics, politics, cultural norms and religion.
“The importance of understanding the Human Domain has
increased significantly over the past decade and a half,” writes the US Geospatial Intelligence Foundation. “There has been a shift from concentration on
Nation-States, to smaller organizations, to individuals.”
The USGIF also refers to Human Domain Analytics as “arrows in a quiver,” hence the prominent arrows on the Jade
“ABI and Human Domain Analytics are not the answer to every intelligence problem; they are merely new arrows in
a quiver of capabilities.”
With modern technological advancements allowing anyone
“with a video camera and a laptop computer” to have “worldwide impact,” the federal government has not only
hyper-incentivized the collection of data, but the merging of all relevant agencies.
“They’re building an infrastructure of tyranny,” stated Infowars David Knight. “There’s a legal infrastructure
with things like the NDAA, there’s a technical infrastructure with things like the capability to do dragnet
surveillance, and then of course there is going to be a military and law enforcement infrastructure, and those are
In fact, James Clapper, the current director of national intelligence, has been a frequent keynote speaker at
GEOINT conferences. Before famously lying to Congress on the existence of domestic NSA surveillance, Clapper was even the
director of national geospatial intelligence agency.
“Activity Based Surveillance, built on a strong foundation of Human Dimension analysis, will form the
intellectual underpinning of how we perform intelligence in the future,” Clapper said in 2009.
As noted on the Alex Jones Show Friday, a 2010 conference on mastering the human domain featuring high level military and
intelligence officials openly discussed gathering publicly available data to create detailed maps with layered
“We start out with a layered group level analysis… We
focus it on groups, ethnicities, religious groups and we start to map out and color code the different locations.”
said Lt. Col. Al Di Leonardo. “We start to characterize the location in a color coding simple way… and then we
start layering that on top of the tribal aspects and we start to see very distinct patterns…”
Stacking Leonardo’s statement up against the Jade Helm map reveals the event to be much more than a basic
“If you understand the technologies, you will see that
Jade Helm is more an intelligence operation using Geospatial Intelligence mapping than a simple military exercise,”
adds David Knight.
Leonardo’s speech goes on to note that the military would next focus in on “key leaders” and other members of
the community, a move already being carried out by Jade Helm operatives in Texas and other participating
“From the very beginning this has been the NSA, the U.S. Geological Service, law enforcement, military, working
to put together all this information…” David Knight said.
As information from low level surveillance technologies such as Stingrays and predictive policing programs gets
siphoned up to NSA data centers, a detailed global map will continue to grow with near-endless stats on all
The military leadership’s deception regarding the exercise was on display this week when Americans confronted
Col. John Petkosek on C-SPAN and demanded answers on Jade Helm. Despite the topic making international news,
Petkosek alleged that he was completely unaware of the massive multi-state drill.
As Infowars has argued for weeks, Jade Helm will not result in martial law, but will move
Americans one step closer to the larger agenda of total domination by the surveillance state and military
Meet the Psychopaths Calculating When To Put You In FEMA
Published on May 8, 2015
What does “Master the Human
Domain” on the Jade Helm 15 logo mean? “Human Domain”, like “Unconventional Warfare” are terms of art for military
and law enforcement. Painting Texas & Utah red and labeling them “hostile” is just the tip of the intel
icebertg that seeks to overlay a human geological map onto a physical geological map to track
Rob Dew and David Knight take a look at this obscure part of the military/police industrial
complex and how it relates to Jade Helm.
Help us spread the word about the liberty movement, we're reaching millions help us reach millions more.
Share the free live video feed link with your friends & family:http://www.infowars.com/show
"JADE" is an A.I. quantum computing
technology that produces holographic battlefield simulations and has the ability to use vast amounts of data being
collected on the human domain to generate human terrain systems in geographic population centric locations to
identify and eliminate targets, insurgents, rebels or whatever labels that can be flagged as targets in a Global
Information Grid for Network Centric Warfare environments.
The JADE II battle field system is cognitive and intuitive. It can examine prior executed battle
plans and and devise 'new and better' strategies to increase the 'kill chain'. The II generation of JADE has the
capability for two way communication with drones through the OCCOM technology which is one of the next generation
integrations to this system.
In short, JADE HELM will not be battles directed by Generals and Military Commanders, but by a
computer. It is a cognitive software program based on a Network Centric Warfare System at the HELM.
** Please get this information out, share, re-post. It would seem the Jade Helm 15 exercise is
actually a system roll out and more diabolical than we originally imagined. **
DARPA Wants a Searchable Database of All Your
The ultimate privacy killer
Paul Joseph Watson
March 4, 2013
DARPA is working on an embryonic project that
would store your every verbal conversation on an Internet server, creating a searchable chat database that would
represent the ultimate privacy killer.
Having failed to establish its infamous Total Information Awareness system, although the project
was continued under numerous different guises, DARPA is attempting to create a world in which your every utterance
is stored in perpetuity.
But don’t worry, the servers on which your conversations are stored will be owned by the individual
or their employer, and the government promises to never access the information using their vast new $2 billion dollar spying hub in the middle of the Utah desert. Honest.
“University of Texas computer scientist Matt Lease has studied crowdsourcing for years, including
for an earlier Darpa project called Effective Affordable Reusable Speech-to-text, or EARS, which sought to boost
the accuracy of automated transcription machines. His work has also attracted enough attention for Darpa to award
him a $300,000 award over two years to study the new project, called “Blending Crowdsourcing with Automation for
Fast, Cheap, and Accurate Analysis of Spontaneous Speech.” The project envisions a world that is both radically
transparent and a little freaky,” reports Wired’s Robert Beckhusen.
Described as being, “like a Twitter feed or e-mail archive for everyday speech,” day to day
conversations, “could be stored in archives and easily searched.”
Lease claims that the technology would represent a, “democratizing force of everyday people
recording and sharing their daily lives and experiences through their conversations,” and yet the Wired article
barely even scratches the surface on examining what a horrendous privacy threat this would pose, with governments
and police departments potentially obtaining the ability to Google-search speech.
Imagine a situation where, in the name of preventing terrorism, the Department of Homeland Security
is given access to the database and uses it to search for spoken keywords, as it already does online with social networks. Forget slippery slope, this would be a rapid
descent into the maelstrom of ubiquitous surveillance – the type George Orwell couldn’t even conjure up in his
The Wired piece glibly addresses concerns about “respecting the privacy rights of multiple people
involved,” as well as whether the conversations would be stored on remote or private servers, but doesn’t even
mention the chilling ramifications that could ensue once the state manufactures a justification to access the
To get a sense of the motivation behind DARPA’s latest attempt to drive the final nail into any
semblance of privacy, one only has to recall the furore over the agency’s Total Information Awareness program,
symbolized by its logo of an all-seeing eye atop a pyramid beaming its gaze upon
As the New York Times’ William Safire wrote in November 2002, the TIA program was based around
tracking, “Every purchase you make with a credit card, every magazine subscription you buy and medical
prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you
receive, every bank deposit you make, every trip you book and every event you attend — all these transactions
and communications will go into what the Defense Department describes as ”a virtual, centralized grand
The program was defunded and mothballed in 2003, but it continued to operate under a number of different sub-projects.
Brought to fruition, DARPA’s new attempt to record verbal communications would represent TIA on
steroids, but as long as it is sold to the public on a voluntary basis with a shiny, cool, hip veneer (Google
Glass-style), a million tech-heads and transhumanists will jump right on board with no hesitation, leaving
refusniks increasingly ostracized in a world where storing your every interaction and experience in some vast
database becomes as normal as having a Facebook page.
Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for
Infowars Nightly News.
DARPA Wants New Technology to Predict “Societal
Unrest” U.S. Defense Department looks to track "all human activities
that can be measured"
by Paul Joseph Watson | July 25, 2014
The Defense Advanced Research Projects Agency
(DARPA) is soliciting companies to provide new technology that would allow the U.S. Department of Defense to
predict future “societal unrest” by keeping track of “all human activities that can be measured.”
A solicitation posted on FedBizOpps outlines DARPA’s intent to fund research and development of “game-changing
technologies” that will “provide a decisive information advantage for the U.S. and its allies,” opening the door
to “powerful ways to gain insight into the world.”
“Essentially all human activities that can be measured, from mercantile to military, are being
quantitatively re-examined in the context of this new, “big data”, capability. Early demonstrations have produced
remarkable insights into human activities and enabled quantitative decision making,” states the solicitation,
adding that the agency is looking to develop new algorithms which can forecast “online correlation for societal
DARPA has already been heavily engaged in research aimed at forecasting social unrest, most notably
the agency’s Crisis Early Warning System (ICEWS), but the results have been patchy, with ICEWS only
successful in predicting four out of sixteen rebellions, political upheavals and incidents of ethnic violence
during the time period over which it was applied.
Over the past six years, the Pentagon has shown an increased interest in creating models that can
forecast domestic and international disorder.
A report produced in 2008 by the U.S. Army War College’s Strategic Institute warned that the United
States may experience massive civil unrest in the wake of a series of crises which it termed “strategic shock.”
Help us spread the word about the liberty movement, we're reaching millions help us reach
millions more. Share the free live video feed link with your friends & family:http://www.infowars.com/show
“Widespread civil violence inside the United
States would force the defense establishment to reorient priorities in extremis to defend basic domestic order and
human security,” stated the report, authored by [Ret.] Lt. Col. Nathan Freir, adding that the military may be
needed to quell “purposeful domestic resistance.”
We have also reported numerous times over the past several years on how the federal government is
gearing up for civil unrest, including the Department of
Homeland Security’s purchase last October of 240,000 pepper spray projectiles, 100 pepper spray launchers,
as well as 36 “riot expansion kits.”
In 2011, the DHS announced that it
would intensify its monitoring of social media in order to pre-empt social dislocation within the United
Back in 2012, we reported on FM 3-39.40
Internment and Resettlement Operations, a U.S. Army manual that describes how political activists in prison
camps will be indoctrinated by specially assigned psychological operations officers. The document makes numerous
references to how government agencies like the DHS, ICE and FEMA will be involved in the domestic internment of
U.S. citizens during “civil support operations.”
A second US
Army Military Police manual that was leaked months later also outlined how military assets would be used
domestically to quell riots, confiscate firearms and even kill Americans on U.S. soil during mass civil unrest in
the aftermath of a crisis.
"While there will be great advantages to broadening geolocation
services, there will undoubtedly bethosewho do not want to be part
of human-centric GEOINT.When everyone is
connected, conspicuous holes in thedata may draw more attention than the elements that fit in."
INTELLIGENCE AGENCIES CIRCA 2010
Click Image for 1092 x 1600...scroll to center of page
“This is the future if nothing is done to stop it,” is the
The Atlantic describes the recent Big Brother tactics used by LA County Sheriffs to “police” areas such as
Compton. Residents were unaware (“A lot of people do have a problem with the eye in the sky, the Big
Brother, so to mitigate those kinds of complaints we basically kept it pretty hush hush“)that, as the
police stated, “we literally watched all of Compton during the times that we were flying, so we could zoom in
anywhere within the city of Compton and follow cars and see people,” as they trialled a new system which if
adopted, would mean Americans can be policed like Iraqis and Afghanis under occupation. As
The Atlantic concludes, the sheriff didn’t conclude that the “wide area surveillance” wouldn’t be like
Big Brother after all, just that Big Brother capabilities would help to solve more crimes… so why not
tryout mass surveillance?
In a secret test of mass surveillance technology, the Los Angeles
County Sheriff’s Department sent a civilian aircraft over Compton, California, capturing high-resolution video of
everything that happened inside that 10-square-mile municipality.
Compton residents weren’t told about the spying, which happened in 2012. “We literally watched all of
Compton during the times that we were flying, so we could zoom in anywhere within the city of Compton and follow
cars and see people,” Ross McNutt of Persistence Surveillance Systems told the Center for
Investigative Reporting, which unearthed and did the first reporting on this important story. The technology
he’s trying to sell to police departments all over America can stay aloft for up to six hours. Like Google Earth,
it enables police to zoom in on certain areas. And like TiVo, it permits them to rewind, so that they can look back
and see what happened anywhere they weren’t watching in real time.
If it’s adopted, Americans can be policed like Iraqis and Afghanis under occupation…
Sgt. Douglas Iketani acknowledges that
his agency hid the experiment to avoid public opposition. “This
system was kind of kept confidential from everybody in the public,”he said. “A lot of people do have a problem with
the eye in the sky, the Big Brother, so to mitigate those kinds of complaints we basically kept it pretty hush
hush.” That attitude ought to get a public employee summarily terminated.
“Our first initial thought was, oh, Big Brother, we’re going to have a camera flying over us. But with the
wide area surveillance you would have the ability to solve a lot of the unsolvable crimes with no witnesses, no
videotape surveillance, no fingerprints.”
Notice that he didn’t conclude that the “wide area surveillance” wouldn’t be like Big Brother after all,
just that Big Brother capabilities would help to solve more crimes.
So why not try them out?
He later explains that while the public may think its against this, we’ll get used to it:
I’m sure that once people find out this experiment went on they might be a little upset. But knowing that we
can’t see into their bedroom windows, we can’t see into their pools, we can’t see into their showers. You know,
I’m sure they’ll be okay with it. With the amount of technology out in today’s age, with cameras in ATMs, at
every 7/11, at every supermarket, pretty much every light poll, all the license plate cameras, the red light
cameras, people have just gotten used to being watched.
Many Americans elect their own sheriffs. This is the future if
nothing is done to stop them.
This article was posted: Monday, May 5, 2014 at 5:45 am
Privacy group warns “even if you have never been arrested
you could be implicated as a criminal suspect”
April 15, 2014
A leading privacy watchdog has warned that the FBI
plans to have up to a third of all Americans on a facial recognition database by next year.
The Electronic Frontier Foundation notes in a communique that some 52 million Americans
could be on the Next Generation Identification (NGI) biometric database by 2015, regardless of whether they have
ever committed a crime or been arrested.
The group managed to obtain information pertaining to the program via a freedom of information request.
The database will also hold fingerprints, of which the FBI has around 100 million records, as well as retina
scans and palm prints. Profiles on the system will contain other personal details such as name, address, age and
The system will be capable of searching through millions of facial records obtained not only via mugshots, but
also via so called “civil images”, the origin of which is vague at best.
“[T]he FBI does not define either the ‘Special Population Cognizant’ database or the ‘new repositories’
category.” The EFF writes. “This is a problem because we do not know what rules govern these categories, where the
data comes from, how the images are gathered, who has access to them, and whose privacy is impacted.”
A map within the EFF’s piece shows which states are
already complying with the program, and which ones are close to agreeing deals to do so.
The EFF notes that currently, the FBI has access to fingerprint records of non-criminals who have submitted them
for any kind of background check, by an employer or government agency. Going forward, however, all records, both
criminal and non-criminal will be stored on the same database.
“This means that even if you have never been arrested for a crime, if your employer requires you to submit a
photo as part of your background check, your face image could be searched – and you could be implicated as a
criminal suspect, just by virtue of having that image in the non-criminal file,” notes the EFF.
EFF points to a disturbing assertion from the FBI that it will not “make positive identifications,” via the
database, but will use it to produce “investigative leads.” The Feds claim that “Therefore, there is no false
positive [identification] rate.”
“[T]he FBI only ensures that “the candidate will be returned in the top 50 candidates” 85 percent of the time
“when the true candidate exists in the gallery.”” EFF states.
“It is unclear what happens when the “true candidate” does not exist in the gallery—does NGI still return
possible matches?” the feature asks, noting that those identified could potentially be subjected to criminal
investigation purely because a computer has decided that their face is similar to a suspect’s.
EFF continues: “This doesn’t seem to matter much to the FBI—the Bureau notes that because ‘this is an
investigative search and caveats will be prevalent on the return detailing that the [non-FBI] agency is responsible
for determining the identity of the subject, there should be NO legal issues.’”
“This is not how our system of justice was designed and should not be a system that Americans tacitly consent to
move towards,” the EFF piece concludes.
It is somewhat remarkable that when Google announced the release of its Glass product, it was forced to
ban applications with the capability for facial recognition due to a huge privacy
backlash. The Federal government, however, continues to use such technology unhindered to create biometric
profiles on anyone and everyone.
The Department of Homeland Security also has its own facial recognition program, which it routinely outsources to police departments. Meanwhile, new innovations in facial recognition
technology continue to be billed as potential tools for law enforcement, including the prediction of future crime.
Steve Watson is a London based writer and editor for Alex Jones’ Infowars.com, andPrisonplanet.com. He has a Masters Degree in International Relations from the School of
Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from
Nottingham Trent University.
This article was posted: Tuesday, April 15, 2014 at 12:20 pm
Secret Spy Link between Fusion
Centers and Private Sector Exposed
Local law enforcement across the country are employing high-tech control grid
surveillance technology to "stop crime". This doesn't make sense considering most US cities are enjoying a huge
drop in violent crime. The truth is, police (and private sector businesses) are assisting in the implementation of
a total surveillance panopticon meant to control the American public.
Big Brother - InfraGard -
Surveillance on U.S. citizens - with Jesse Ventura
http://www.facebook.com/ConspiracyThe... Big Brother is watching and it's not who you think. Jesse Ventura's investigation of government
surveillance on its citizens tears the lid off a nationwide program that is thought to turn local businessmen and
office workers into spies, snooping on their neighbors and ratting on their friends in exchange for information and
special privileges from the FBI- including, some charge, a "license to kill."
era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite,
unrestrained by traditional values. Soon it will be possible to assert almost continuous surveillance over every
citizen and maintain up-to-date complete files containing even the most personal information about the citizen.
These files will be subject to instantaneous retrieval by the authorities."
Theintelligence community would have us believe it is
willing to move both heaven and earth to keep us secure; yet it can not simply secure our
It's time to
American Borders are Wide Open...Jade Helm 15 is not for our
Feds more concerned about running drills and spying on you than shutting down
How could there be aWar on Terror and actually say that we're having
awar against terrorism, and leave the
borders wide open? If you were the President of the United States, or I were the President of the United States,
and9/11 really happened the way they
want us to believe it happened, the first thing you would do is shut down the borders, so people couldn't get in
the country to harm you. But they left the borders wide open. Becausethe bankers want the borders open, because they want
aone-world government. They
want a North American Union. They don't want borders
here.9/11 was only a manifestation.
It was done to create afear in the
American public, so that we willobey what they want us to do.
Drug cartels across the border are
just as brutal as ISIS
Horrific violence not isolated to Middle
Ellen Weiss, Oct 23, 2014
WASHINGTON, D.C. - U.S. officials have argued that
atrocities committed by the militant group ISIS are barbaric and that the group is a threat to the homeland, but it’s worth remembering that the horrific violence
perpetrated just across the U.S. border by Mexican drug cartels is equally barbaric and the cartels also
pose a threat to Americans.
This week brought another bloody reminder of the cartel’s brutality. Mexican activist Maria Del Rosario Fuentes Rubio, a physician and citizen journalist
who had taken a prominent stand against Mexican cartels on social media, died with a bullet in her head. And
her killers, in an obvious effort to terrorize others, tweeted her murder.
Yes, as President Barack Obama noted in his Sept. 24 address to the UN General Assembly, ISIS is leaving a trail of rape, beheadings,
dead children and mass graves. The numbers are terrifying: More than 5,500 people have been killed in Iraq
since June, according to the United Nations.
But here are some numbers – also terrifying – from just across the U.S.-Mexico border: In 2013,
Mexican drug cartels murdered more than 16,000 people, andHuman Rights Watch estimates more than 60,000 people were
killed in drug-related violence from 2006 to 2012.
There is no disputing that Mexican cartels are operating in the United States. Drug policy analysts
estimate that about 90 percent of thecocaine, heroin, marijuana and methamphetamine on U.S. streets
came here courtesy of the cartels and their distribution networks in Mexico and along the Southwestern
border. DEA officials say they have documentednumerous cases of cartel activity in Houston, Los Angeles,
Chicago and Atlanta.
Cartel violence isn’t restricted to one side of the border. “Spillover violence” has taken thousands of U.S. lives, according to the FBI. In
other words, the cartel threat – while certainly different from the jihadist-style threat of ISIS – is
nevertheless a threat.
A whole stream of disturbing statistics about the Mexican drug cartels was brought to light in an
opinion piece written by Musa al-Gharbia, a research fellow at the Southwest
Initiative for the Study of Middle East Conflicts. This is not a list for the fainthearted:
Beheadings – Mexico is ranked directly below Iraq on the Reporters Without Borders World Press
Freedom Index. On May 13, 2012, Mexican authorities found at least 49 decapitated and
dismembered bodies along a highway in Nuevo Leon state, between the cities of Monterrey and Reynosa.
Killing children and
women - As if decapitations and hanging dead bodies from bridges wasn’t enough, the
drug cartels have made a practice of targeting women and children to further terrorize communities or prove they are tougher than the next
gang. Children are shot in cars, in their grandmother’s arms or sitting next to their parents.
Mass graves: Mexican
authorities have discovered several mass graves with hundreds of corpses of victims of the drug gangs
in recent years. Some are filled with victims of the drug wars, others with those
murdered for refusing to join the gangs. Most recently, as part of the search for 43 young Mexicans studying
to become teachers, searchers have found six mass graves but so far none of the bodies has been identified
as any of the missing students. Six mass graves, and they still haven’t found the
right mass grave.
As noted, the comparison between ISIS and the cartels
has its limits. Operation Inherent Resolve (the silly name the administration has given America’s military action against
ISIS) and the “War on Drugs” are about different threats. ISIS wants to vanquish all sorts of infidels,
including Americans. The drug cartels are about business – and anyone who gets in their way – including
Americans – is a target.
It comes down to this: If the U.S. is being spurred into action against ISIS because of indignation and a
threat to Americans, then it is worth remembering that a beheading in Mexico is just as horrifying as one in
Iraq or Syria – and a threat against Americans is still a threat whether it is the result of ideology or
criminal drug traffickers.
Want to keep up with all the latest DecodeDC stories and podcasts? Sign up for our weekly
newsletter at decodedc.com/newsletter
An independent agency of the United States government responsible for collecting and
coordinating intelligence and counterintelligence activities abroad in the national interest; headed by the
Director of Central Intelligence under the supervision of the President and National Security Council...There has
been considerable criticism of the CIA relating to security and counterintelligence failures, failures in
intelligence analysis, human rights concerns, external investigations and document releases, influencing public
opinion and law enforcement, drug trafficking, and lying to Congress. In 1987, the former CIA Station Chief in
Angola in 1976, John Stockwell, said the CIA is responsible for tens of thousands of covert actions and
destablization programs since it was created by Congress with the passage of the National Security Act of
1947.At the time, Stockwell estimated that over 6 million people had
died in CIA covert actions.
Secret Pentagon Report Reveals US
“Created” ISIS As A “Tool” To Overthrow Syria’s President Assad
by Dr Nafeez Ahmed | | May 24, 2015
From the first sudden, and quite dramatic, appearance of
the fanatical Islamic group known as ISIS which was largely unheard of until a year ago, on the world’s stage and
which promptly replaced the worn out and tired al Qaeda as the world’s terrorist bogeyman, we suggested that the
“straight to beheading YouTube clip” purpose behind the Saudi Arabia-funded Islamic State was a simple one: use the Jihadists as the vehicle of
choice to achieve a political goal: depose of Syria’s president Assad, who for years has stood in the way of a
critical Qatari natural gas pipeline, one which could dethrone Russia as Europe’s dominant –
and belligerent – source of energy, reaching an interim climax with the unsuccessful Mediterranean Sea military
build up of 2013, which nearly resulted in quasi-world war.
But it’s one thing to speculate; it’s something entirely different to have hard proof.
And while speculation was rife that just like the CIA-funded al Qaeda had been used as a facade by the US to achieve its own geopolitical
and national interests over the past two decades, so ISIS was nothing more than al Qaeda 2.0, there was no
actual evidence of just this.
That may all have changed now when a declassified secret US government document
obtained by the public interest law firm, Judicial Watch, shows that Western governments deliberately
allied with al-Qaeda and other Islamist extremist groups to topple Syrian dictator Bashir al-Assad.
According to investigative reporter Nafeez Ahmed in Medium, the “leaked document reveals that in
coordination with the Gulf states and Turkey, the West intentionally sponsored violent Islamist groups to
destabilize Assad, despite anticipating that doing so could lead to the emergence of an ‘Islamic State’ in Iraq
and Syria (ISIS).
According to the newly declassified US document, the Pentagon foresaw the likely rise of the
‘Islamic State’ as a direct consequence of the strategy, but described this outcome as a strategic
opportunity to “isolate the Syrian regime.”
And not just that: as we reported last week, now that ISIS is running around the middle east, cutting people’s
heads of in 1080p quality and Hollywood-quality (perhaps literally) video, the US has a credible justification
to sell billions worth of modern, sophisticated weapons in the region in order to “modernize” and “replenish”
the weapons of such US allies as Saudi Arabia, Israel and Iraq.
But that the US military-industrial complex is a winner every time war breaks out anywhere in
the world (usually with the assistance of the CIA) is clear to everyone by now. What wasn’t clear is just how the
US predetermined the current course of events in the middle east.
Now, thanks to the following declassified report, we have a far better understanding of not only
how current events in the middle east came to be, but what America’s puppermaster role leading up to it all,
From Nafeez Ahmed: Secret Pentagon report reveals West saw ISIS as strategic asset
Anti-ISIS coalition knowingly sponsored violent extremists to ‘isolate’ Assad, rollback ‘Shia
expansion’, originally posted in Medium.
The revelations contradict the official line of Western government on their policies in
Syria, and raise disturbing questions about secret Western support for violent extremists abroad, while
using the burgeoning threat of terror to justify excessive mass surveillance and crackdowns on civil
liberties at home.
The DIA provides military intelligence in support of planners, policymakers and
operations for the US Department of Defense and intelligence community.
So far, media reporting has focused on the evidence that the Obama administration knew
of arms supplies from a Libyan terrorist stronghold to rebels in Syria.
Some outlets have reported the US intelligence community’s internal prediction of the
rise of ISIS. Yet none have accurately acknowledged the disturbing details exposing how the West
knowingly fostered a sectarian, al-Qaeda-driven rebellion in Syria.
Charles Shoebridge, a former British Army and Metropolitan Police counter-terrorism
intelligence officer, said:
“Given the political leanings of the organisation that obtained these documents, it’s unsurprising
that the main emphasis given to them thus far has been an attempt to embarrass Hilary Clinton regarding
what was known about the attack on the US consulate in Benghazi in 2012. However, the documents also
contain far less publicized revelations that raise vitally important questions of the West’s
governments and media in their support of Syria’s rebellion.”
The newly declassified DIA document from 2012 confirms that the main component of the anti-Assad rebel
forces by this time comprised Islamist insurgents affiliated to groups that would lead to the emergence
of ISIS. Despite this, these groups were to continue receiving support from Western militaries and their
Noting that “the Salafist [sic], the Muslim Brotherhood, and AQI [al-Qaeda in
Iraq] are the major forces driving the insurgency in Syria,” the document states that “the West, Gulf
countries, and Turkey support the opposition,” while Russia, China and Iran “support
the [Assad] regime.”
The 7-page DIA document states that al-Qaeda in Iraq (AQI), the precursor to the
‘Islamic State in Iraq,’ (ISI) which became the ‘Islamic State in Iraq and Syria,’ “supported the Syrian
opposition from the beginning, both ideologically and through the media.”
The formerly secret Pentagon report notes that the “rise of the insurgency in Syria” has
increasingly taken a “sectarian direction,” attracting diverse support from Sunni “religious and tribal
powers” across the region.
In a section titled ‘The Future Assumptions of the Crisis,’ the DIA report
predicts that while Assad’s regime will survive, retaining control over Syrian territory, the crisis
will continue to escalate “into proxy war.”
The document also recommends the creation of “safe havens under international
sheltering, similar to what transpired in Libya when Benghazi was chosen as the command centre for the
In Libya, anti-Gaddafi rebels, most of whom were al-Qaeda affiliated militias, were
protected by NATO ‘safe havens’ (aka ‘no fly zones’).
‘Supporting powers want’ ISIS entity
In a strikingly prescient prediction, the Pentagon document explicitly forecasts
the probable declaration of “an Islamic State through its union with other terrorist organizations in
Iraq and Syria.”
Nevertheless, “Western countries, the Gulf states and Turkey are supporting these
efforts” by Syrian “opposition forces” fighting to “control the eastern areas (Hasaka and Der Zor),
adjacent to Western Iraqi provinces (Mosul and Anbar)”:
“… there is the possibility of establishing a declared or undeclared Salafist Principality in
eastern Syria (Hasaka and Der Zor), and this is exactly what the supporting powers to the opposition
want, in order to isolate the Syrian regime, which is considered the strategic depth of the Shia
expansion (Iraq and Iran).”
The secret Pentagon document thus provides extraordinary confirmation that the
US-led coalition currently fighting ISIS, had three years ago welcomed the emergence of an extremist
“Salafist Principality” in the region as a way to undermine Assad, and block off the strategic
expansion of Iran. Crucially, Iraq is labeled as an integral part of this “Shia expansion.”
The establishment of such a “Salafist Principality” in eastern Syria, the DIA document
asserts, is “exactly” what the “supporting powers to the [Syrian] opposition want.” Earlier on, the
document repeatedly describes those “supporting powers” as “the West, Gulf countries, and Turkey.”
Further on, the document reveals that Pentagon analysts were acutely aware of the dire
risks of this strategy, yet ploughed ahead anyway.
The establishment of such a “Salafist Principality” in eastern Syria, it says,
would create “the ideal atmosphere for AQI to return to its old pockets in Mosul and Ramadi.”
Last summer, ISIS conquered Mosul in Iraq, and just this month has also taken control of Ramadi.
Such a quasi-state entity will provide:
“… a renewed momentum under the presumption of unifying the jihad among Sunni Iraq and Syria, and
the rest of the Sunnis in the Arab world against what it considers one enemy. ISI could also declare an
Islamic State through its union with other terrorist organizations in Iraq and Syria, which will create
grave danger in regards to unifying Iraq and the protection of territory.”
The 2012 DIA document is an Intelligence Information Report (IIR), not a “finally
evaluated intelligence” assessment, but its contents are vetted before distribution. The report was
circulated throughout the US intelligence community, including to the State Department, Central Command,
the Department of Homeland Security, the CIA, FBI, among other agencies.
In response to my questions about the strategy, the British government simply
denied the Pentagon report’s startling revelations of deliberate Western sponsorship of violent
extremists in Syria. A British Foreign Office spokesperson said:
“AQ and ISIL are proscribed terrorist organisations. The UK opposes all forms of terrorism. AQ,
ISIL, and their affiliates pose a direct threat to the UK’s national security. We are part of a
military and political coalition to defeat ISIL in Iraq and Syria, and are working with international
partners to counter the threat from AQ and other terrorist groups in that region. In Syria we have
always supported those moderate opposition groups who oppose the tyranny of Assad and the brutality of
The DIA did not respond to request for comment.
Strategic asset for
Security analyst Shoebridge, however, who has tracked Western support for Islamist
terrorists in Syria since the beginning of the war, pointed out that the secret Pentagon intelligence
report exposes fatal contradictions at the heart of official pronunciations:
“Throughout the early years of the Syria crisis, the US and UK governments, and almost universally
the West’s mainstream media, promoted Syria’s rebels as moderate, liberal, secular, democratic, and
therefore deserving of the West’s support. Given that these documents wholly undermine this assessment,
it’s significant that the West’s media has now, despite their immense significance, almost entirely
According to Brad Hoff, a former US Marine who served during the early years of the Iraq
War and as a 9/11 first responder at the Marine Corps Headquarters in Battalion Quantico from 2000 to
2004, the just released Pentagon report for the first time provides stunning affirmation that:
“US intelligence predicted the rise of the Islamic State in Iraq and the Levant (ISIL or ISIS), but
instead of clearly delineating the group as an enemy, the report envisions the terror group as a US
Hoff, who is managing editor of Levant Report — ?an online publication
run by Texas-based educators who have direct experience of the Middle East?—?points out that the DIA
document “matter-of-factly” states that the rise of such an extremist Salafist political entity
in the region offers a “tool for regime change in Syria.”
The DIA intelligence report shows, he said, that the rise of ISIS only became possible
in the context of the Syrian insurgency?—?“there is no mention of US troop withdrawal from Iraq as a
catalyst for Islamic State’s rise, which is the contention of innumerable politicians and pundits.” The
report demonstrates that:
“The establishment of a ‘Salafist Principality’ in Eastern Syria is ‘exactly’ what the external
powers supporting the opposition want (identified as ‘the West, Gulf Countries, and Turkey’) in order
to weaken the Assad government.”
The rise of a Salafist quasi-state entity that might expand into Iraq, and fracture that
country, was therefore clearly foreseen by US intelligence as likely?—?but nevertheless strategically
useful?—?blowback from the West’s commitment to “isolating Syria.”
Critics of the US-led strategy in the region have repeatedly raised questions about the
role of coalition allies in intentionally providing extensive support to Islamist terrorist groups in
the drive to destabilize the Assad regime in Syria.
The conventional wisdom is that the US government did not retain sufficient oversight on
the funding to anti-Assad rebel groups, which was supposed to be monitored and vetted to ensure that
only ‘moderate’ groups were supported.
However, the newly declassified Pentagon report proves unambiguously that years before
ISIS launched its concerted offensive against Iraq, the US intelligence community was fully aware that
Islamist militants constituted the core of Syria’s sectarian insurgency.
Despite that, the Pentagon continued to support the Islamist insurgency, even while
anticipating the probability that doing so would establish an extremist Salafi stronghold in Syria and
As Shoebridge told me, “The documents show that not only did the US government at the
latest by August 2012 know the true extremist nature and likely outcome of Syria’s rebellion”?—?namely,
the emergence of ISIS?—?“but that this was considered an advantage for US foreign policy. This also
suggests a decision to spend years in an effort to deliberately mislead the West’s public, via a
compliant media, into believing that Syria’s rebellion was overwhelmingly ‘moderate.’”
Annie Machon, a former MI5 intelligence officer who blew the whistle in the 1990s on MI6 funding of al-Qaeda to assassinate Libya’s
former leader Colonel Gaddafi, similarly said of the revelations:
“This is no surprise to me. Within individual countries there are always multiple intelligence
agencies with competing agendas.”
She explained that MI6’s Libya operation in 1996, which resulted in the deaths of
innocent people, “happened at precisely the time when MI5 was setting up a new section to investigate
This strategy was repeated on a grand scale in the 2011 NATO intervention in Libya, said
Machon, where the CIA and MI6 were:
“… supporting the very same Libyan groups, resulting in a failed state, mass murder, displacement
and anarchy. So the idea that elements of the American military-security complex have enabled the
development of ISIS after their failed attempt to get NATO to once again ‘intervene’ is part of an
established pattern. And they remain indifferent to the sheer scale of human suffering that is
unleashed as a result of such game-playing.”
Divide and rule
Several US government officials have conceded that their closest allies in the anti-ISIS
coalition were funding violent extremist Islamist groups that became integral to ISIS.
US Vice President Joe Biden, for instance, admitted last year that Saudi Arabia, the UAE, Qatar and Turkey had funneled
hundreds of millions of dollars to Islamist rebels in Syria that metamorphosed into
But he did not admit what this internal Pentagon document demonstrates?—?that
the entire covert strategy was sanctioned and supervised by the US, Britain, France, Israel and other Western
The strategy appears to fit a policy scenario identified by a recent US
Army-commissioned RAND Corp report.
The report, published four years before the DIA document, called for the US “to
capitalise on the Shia-Sunni conflict by taking the side of the conservative Sunni regimes in a decisive
fashion and working with them against all Shiite empowerment movements in the Muslim world.”
The US would need to contain “Iranian power and influence” in the Gulf by “shoring up
the traditional Sunni regimes in Saudi Arabia, Egypt, and Pakistan.” Simultaneously, the US must
maintain “a strong strategic relationship with the Iraqi Shiite government” despite its Iran
The RAND report confirmed that the “divide and rule” strategy was already being deployed “to
create divisions in the jihadist camp. Today in Iraq such a strategy is being used at the tactical
The report observed that the US was forming “temporary alliances” with al-Qaeda
affiliated “nationalist insurgent groups” that have fought the US for four years in the form of “weapons
and cash.” Although these nationalists “have cooperated with al-Qaeda against US forces,” they are now
being supported to exploit “the common threat that al-Qaeda now poses to both parties.”
The 2012 DIA document, however, further shows that while sponsoring purportedly former
al-Qaeda insurgents in Iraq to counter al-Qaeda, Western governments were simultaneously arming
al-Qaeda insurgents in Syria.
The revelation from an internal US intelligence document that the very US-led
coalition supposedly fighting ‘Islamic State’ today, knowingly created ISIS in the first place, raises
troubling questions about recent government efforts to justify the expansion of state anti-terror
In the wake of the rise of ISIS, intrusive new measures to combat extremism including
mass surveillance, the Orwellian ‘prevent duty’ and even plans to enable government censorship of
broadcasters, are being pursued on both sides of the Atlantic, much of which disproportionately targets
activists, journalists and ethnic minorities, especially Muslims.
Yet the new Pentagon report reveals that, contrary to Western
government claims, the primary cause of the threat comes from their own deeply
misguided policies of secretly sponsoring Islamist terrorism for dubious geopolitical
DrNafeez Ahmed is an investigative journalist, bestselling author and international
security scholar. A former Guardian writer, he writes the ‘System Shift’ column for VICE’s Motherboard,
and is also a columnist for Middle East Eye. He is the winner of a 2015 Project Censored Award, known as
the ‘Alternative Pulitzer Prize’, for Outstanding Investigative Journalism for his Guardian work, and
was selected in the Evening Standard’s ‘Power 1,000’ most globally influential Londoners.
Nafeez has also written for The
Independent, Sydney Morning Herald, The Age, The Scotsman, Foreign Policy, The Atlantic, Quartz,
Prospect, New Statesman, Le Monde diplomatique, New Internationalist, Counterpunch, Truthout, among
others. He is the author ofA User’s Guide to the Crisis of Civilization: And
How to Save It (2010), and the scifi thriller
novelZERO POINT, among other books. His work on the root causes and covert operations linked
to international terrorism officially contributed to the 9/11 Commission and the 7/7 Coroner’s
US Intelligence Officer: “Every Single Terrorist Attack In
US Was A False Flag Attack”
“Most terrorists are false flag terrorists, or are created by our own security
by Liveleak | May 16, 2015
Apart from documents that have outlined supposed terrorist threats, like
Al-Qaeda, and their connection to US intelligence agencies, like the CIA, there are a number of whistleblowers that
have come out adding more fuel to the fire. Because not many are even aware of these documents, letting people know
about a truth that can be hard for people to accept, let alone ponder the possibility is very important. It’s just
one aspect of the veil that’s been blinding the masses for quite some time now.
The latest whistleblower is David Steele, a 20-year Marine Corps intelligence officer, and the
second-highest-ranking civilian in the U.S. Marine Corps Intelligence. He is a former CIA clandestine services case
officer, and this is what he had to say:
“Most terrorists are false flag terrorists, or are created by our own security services. In the United
States, every single terrorist incident we have had has been a false flag, or has been an informant pushed on by
the FBI. In fact, we now have citizens taking out restraining orders against FBI informants that are trying to
incite terrorism. We’ve become a lunatic asylum.”
What Is A “False Flag Attack?”
A great example of a false flag attack is 9/11, something that many people believe to be a creation of US
intelligence agencies, or some entity above the government (one that controls what Eisenhower called “the military
industrial complex”). The idea is that these so called terrorist attacks are created by this group, in order to
justify the infiltration of other countries, and to justify a heightened state of “national security.” As a result,
in the eyes of the citizenry, war and mass murder are justified, when the intentions behind these actions are
something the citizenry has no idea about. This is why we see a false sense of patriotism programmed into many
people, especially in the United States. Men and women join this massive military machine with good hearts,
thinking that they are serving their country and fighting terrorism, when they are doing the complete opposite.
They are only participating in a fabricated war based on lies and misinformation.
“The truth is, there is no Islamic army or terrorist group called Al-Qaeda, and any informed
intelligence officer knows this. But, there is a propaganda campaign to make the public believe in the presence of
an intensified entity representing the ‘devil’ only in order to drive TV watchers to accept a unified international
leadership for a war against terrorism. The country behind this propaganda is the United States.”
– Former British Foreign Secretary, Robin Cook
Today, we might be seeing the same thing with ISIS. Although there are no verified documents like there are when
it comes to Al-Qaeda, given what that information shows us, combined with Wikileaks documents and statements from
insiders, we could be looking at the same thing.
Not long ago, FBI whistleblower stated that:
“The US is reviving terror scare with ISIS to promote the terror war industry.”
Again, 9/11 is a great example and you can find out more information about that here.
Endless war corrupts
Ever since 9/11 America
has fought an endless war on terror, seeking enemies everywhere and never promising peace. In Pay
Any Price, James Risen reveals an extraordinary litany of the hidden costs of that war: from
squandered and stolen dollars, to outrageous abuses of power, to wars on normalcy, decency, and
truth. In the name of fighting terrorism, our government has done things every bit as shameful as
its historic wartime abuses — and until this book, it has worked very hard to cover them
Lincoln suspended habeas corpus. FDR authorized the internment of thousands of
Japanese Americans. Presidents Bush and Obama now must face their own reckoning. Power corrupts,
but it is endless war that corrupts absolutely.
An independent agency of the United States government responsible for
collecting and coordinating intelligence and counterintelligence activities abroad in the national
interest; headed by the Director of Central Intelligence under the supervision of the President and
National Security Council...There has been considerable criticism of the CIA relating to security
and counterintelligence failures, failures in intelligence analysis, human rights concerns,
external investigations and document releases, influencing public opinion and law enforcement, drug
trafficking, and lying to Congress. In 1987, the former CIA Station Chief in Angola in 1976, John
Stockwell, said the CIA is responsible for tens of thousands of covert actions and destablization
programs since it was created by Congress with the passage of the National Security Act of
1947.At the time, Stockwell estimated that over 6
million people had died in CIA covert actions.
The Federal Bureau of Investigation (FBI) is a governmental agency
belonging to the United StatesDepartment of Justice that serves as both a federal criminal
investigative body and an internal intelligence agency (counterintelligence). Also, it is the
government agency responsible for investigating crimes on Indian reservations in the United States
under the Major Crimes Act. The branch has investigative jurisdiction over violations of more than
200 categories of federal crime. The agency was established in 1908 as the Bureau of Investigation
(BOI). Its name was changed to the Federal Bureau of Investigation (FBI) in 1935. The agency
headquarters is the J. Edgar Hoover Building, located in Washington, D.C. The agency has fifty-six
field offices located in major cities throughout the United States, and more than 400 resident
agencies in lesser cities and areas across the nation. More than 50 international offices called
"legal attachés" exist in U.S. embassies and consulates general worldwide.
'Federal Bureau of Investigation organizes almost
all terror plots in the US' ...The report reveals that the FBI regularly infiltrates communities
where they suspect terrorist-minded individuals to be engaging with others. Regardless of their
intentions, agents are sent in to converse within the community, find suspects that could
potentially carry out “lone wolf” attacks and then, more or less, encourage them to do so. By
providing weaponry, funds and a plan, FBI-directed agents will encourage otherwise-unwilling
participants to plot out terrorist attacks, only to bust them before any events fully
Research: Cops KILL THOUSANDS More Americans Than
An estimated SIXTEEN THOUSAND
Americans killed by police in past 15 years
by Steve Watson | InfoWars | April 16, 2015
Americans are constantly warned every
day that there is a deadly threat from terrorists. From homegrown radical ‘extremists’ to ISIS camps in Mexico, the
fear is constantly pumped out to the masses via the mainstream media.
However, there is a much more immediate and deadly threat to Americans across the nation, one
that can strike at any time, and one that has killed untold thousands more than lost their lives on September 11th
2001 and every other ‘terrorist’ incident since.
Cops in the US are responsible for way more deaths on American soil than terrorism since the
year 2000. Indeed, in that time, police have killed at least 5,600 people via gunshots, taserings, beatings and
other forms of violence. That figure represents more than the total number of US combat deaths in all wars since 2000.
Those are the findings of Fatal Encounters, an impartial nonprofit organisation working to build a national database
of police killings in the US.
The organisation notes that the data it collect is largely “based on public information
requests, but the bulk of it–the part that will make it sustain after the structure is built–will use crowdsourcing
to update the database.”
“How many people are killed in interactions with law enforcement in the United States of
America? Are they increasing? What do those people look like?” the organisation asks on its website.
Vox took the data gathered by Fatal Encounters and created an interactive map of every
documented police killing over the past 15 years. It looks like this:
Fatal Encounters states in its mission
brief that while the FBI collects vast amounts of information on crime nationwide, it does not release collated
statistics on how often police use deadly force.
In addition, it is not even mandatory for local and state agencies to report the circumstances
of killings, and consequently, whether police were involved.
“Americans should have the ability to track that act.” the website notes.
Thus, the data collected and used to create the map of police killings is incomplete –
Indeed, the organisation estimates that it has only captured about 35 percent of
total police killings since 2000 so far. So at best, this map represents a minimum of police related
killings over the past 15 years.
By those calculations, around SIXTEEN THOUSAND Americans are likely to have been killed by
police in that time. Over 1000, every year.
In comparison with other first world nations; only three people were killed by police in 2014
in the UK; 12 people in Canada, and eight over the past two years in Germany. All this despite the fact
that the crime index highlights that countries like the UK aren’t that far behind
America in regards to overall crime rate.
The level of police killings only appears to be escalating into an epidemic. It is indicative
of an endemic societal divide between Americans and their government (yes police work for the government).
So are you still afraid of phantom ISIS camps on the border? Or does being shot dead merely
for having a broken tail light seem a more realistic threat?
Steve Watson is a London based writer and editor for Alex Jones’ Infowars.com, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of
Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from
Nottingham Trent University.
The NSA’s Technotyranny: One Nation Under
The police state is about to pass off the baton to the
by John Whitehead | LewRockwell.com | May 26, 2015
As I document in my new book Battlefield America: The War on the American People, this fourth branch came
into being without any electoral mandate or constitutional referendum, and yet it possesses superpowers,
above and beyond those of any other government agency save the military. It is all-knowing, all-seeing and
all-powerful. It operates beyond the reach of the president, Congress and the courts, and it marches in
lockstep with the corporate elite who really call the shots in Washington, DC.
You might know this branch of government as Surveillance, but I prefer “technotyranny,” a term coined by investigative journalist James Bamford to refer to an
age of technological tyranny made possible by government secrets, government lies, government spies and their corporate ties.
Beware of what you say, what you read, what you write, where you go, and with whom you communicate, because
it will all be recorded, stored and used against you eventually, at a time and place of the government’s
choosing. Privacy, as we have known it, is dead.
The police state is about to pass off the baton to the surveillance state.
Having already transformed local police into extensions of the military, the Department of Homeland
Security, the Justice Department and the FBI are preparing to turn the nation’s soldier cops into
techno-warriors, complete with iris scanners, body scanners, thermal imaging Doppler radar devices, facial
recognition programs, license plate readers, cell phone Stingray devices and so much more.
This is about to be the new face of policing in America.
The National Security Agency (NSA) has been a perfect red herring, distracting us
from the government’s broader, technology-driven campaign to render us helpless in the face of its prying
eyes. In fact, long before the NSA became the agency we loved to hate, the Justice Department, the FBI,
and the Drug Enforcement Administration were carrying out their own secret mass surveillance on an unsuspecting populace.
Just about every branch of the government—from the Postal Service to the Treasury Department and every
agency in between—now has its own surveillance sector, authorized to spy on the American people. Then
there are the fusion and counterterrorism centers that gather all of the data from the smaller government
spies—the police, public health officials, transportation, etc.—and make it accessible for all those in
power. And of course that doesn’t even begin to touch on the complicity of the corporate sector, which buys
and sells us from cradle to grave, until we have no more data left to mine.
The raging debate over the fate of the NSA’s blatantly unconstitutional, illegal and ongoing domestic
surveillance programs is just so much noise, what Shakespeare referred to as “sound and fury, signifying
It means nothing: the legislation, the revelations, the task forces, and the filibusters.
The government is not giving up, nor is it giving in. It has stopped listening to us. It has long since
ceased to take orders from “we the people.”
If you haven’t figured it out yet, none of it—the military drills, the surveillance, the militarized police,
the strip searches, the random pat downs, the stop-and-frisks, even the police-worn body cameras—is about
fighting terrorism. It’s about controlling the populace.
Legislation such as the USA Patriot Act serves only to legitimize the actions of a secret agency run by a
shadow government. Even the proposed and ultimately defeated USA Freedom Act, which purported to restrict the reach of the NSA’s phone surveillance
program—at least on paper—by requiring the agency to secure a warrant before surveillance could be carried
out on American citizens and prohibiting the agency from storing any data collected on Americans, amounted
to little more than a paper tiger: threatening in appearance, but lacking any real bite.
The question of how to deal with the NSA—an agency that operates outside of the system of checks and
balances established by the Constitution—is a divisive issue that polarizes even those who have opposed the
NSA’s warrantless surveillance from the get-go, forcing all of us—cynics, idealists, politicians and realists
alike—to grapple with a deeply unsatisfactory and dubious political “solution” to a problem that operates
beyond the reach of voters and politicians: how do you trust a government that lies, cheats, steals, sidesteps
the law, and then absolves itself of wrongdoing to actually obey the law?
Since its official start in 1952, when President Harry S. Truman issued a secret executive order establishing the NSA as the hub of the government’s foreign
intelligence activities, the agency—nicknamed “No Such Agency”—has operated covertly, unaccountable to
Congress all the while using taxpayer dollars to fund its secret operations. It was only when the agency
ballooned to 90,000 employees in 1969, making it the largest intelligence agency in the world with a significant footprint outside
Washington, DC, that it became more difficult to deny its existence.
In the aftermath of Watergate in 1975, the Senate held meetings under the Church Committee in order to
determine exactly what sorts of illicit activities the American intelligence apparatus was engaged in under the
direction of President Nixon, and how future violations of the law could be stopped. It was the first time the
NSA was exposed to public scrutiny since its creation.
The investigation revealed a sophisticated operation whose surveillance programs paid little heed to such
things as the Constitution. For instance, under Project SHAMROCK, the NSA spied on telegrams to and from the
U.S., as well as the correspondence of American citizens. Moreover, as the Saturday Evening
Postreports, “Under Project MINARET, the NSA monitored the communications of civil rights
leaders and opponents of the Vietnam War, including targets such as Martin Luther King, Jr., Mohammed Ali,
Jane Fonda, and two active U.S. Senators. The NSA had launched this program in 1967 to monitor suspected
terrorists and drug traffickers, but successive presidents used it to track all manner of political
Senator Frank Church (D-Ida.), who served as the chairman of the Select Committee on Intelligence that
investigated the NSA, understood only too well the dangers inherent in allowing the government to overstep its
authority in the name of national security. Church recognized that such surveillance powers “at any time could
be turned around on the American people, and no American would have any privacy left, such is the capability to
monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to
Noting that the NSA could enable a dictator “to impose total tyranny” upon an utterly defenseless American
public, Church declared that he did not “want to see this country ever go across the bridge” of constitutional
protection, congressional oversight and popular demand for privacy. He avowed that “we,” implicating both
Congress and its constituency in this duty, “must see to it that this agency and all agencies that possess this
technology operate within the law and under proper supervision, so that we never cross over that abyss. That is
the abyss from which there is no return.”
The result was the passage of the Foreign Intelligence Surveillance Act (FISA), and the creation of
the FISA Court, which was supposed to oversee and correct how intelligence information is collected and
collated. The law requires that the NSA get clearance from the FISA Court, a secret surveillance court,
before it can carry out surveillance on American citizens. Fast forward to the present day, and the
so-called solution to the problem of government entities engaging in unjustified and illegal
surveillance—the FISA Court—has unwittingly become the enabler of such activities, rubberstamping almost
every warrant request submitted to it.
The 9/11 attacks served as a watershed moment in our nation’s history, ushering in an era in which immoral
and/or illegal government activities such as surveillance, torture, strip searches, SWAT team raids are
sanctioned as part of the quest to keep us “safe.”
Nothing changed under Barack Obama. In fact, the violations worsened, with the NSA authorized to secretly collect internet and telephone
data on millions of Americans, as well as on foreign governments.
What this brief history of the NSA makes clear is that you cannot reform the NSA.
As long as the government is allowed to make a mockery of the law—be it the Constitution, the FISA Act or
any other law intended to limit its reach and curtail its activities—and is permitted to operate behind closed
doors, relaying on secret courts, secret budgets and secret interpretations of the laws of the land, there will
be no reform.
Presidents, politicians, and court rulings have come and gone over the course of the NSA’s 60-year history,
but none of them have done much to put an end to the NSA’s “technotyranny.”
The beast has outgrown its chains. It will not be restrained.
The growing tension seen and felt throughout the country is a tension between those who wield power on
behalf of the government—the president, Congress, the courts, the military, the militarized police, the
technocrats, the faceless unelected bureaucrats who blindly obey and carry out government directives, no matter
how immoral or unjust, and the corporations—and those among the populace who are finally waking up to the
mounting injustices, seething corruption and endless tyrannies that are transforming our country into a
technocrized police state.
At every turn, we have been handicapped in our quest for transparency, accountability and a representative
democracy by an establishment culture of secrecy: secret agencies, secret experiments, secret military bases,
secret surveillance, secret budgets, and secret court rulings, all of which exist beyond our reach, operate
outside our knowledge, and do not answer to “we the people.”
Thus, if this secret regime not only exists but thrives, it is because we have allowed it through our
ignorance, apathy and naïve trust in politicians who take their orders from Corporate America rather than the
If this shadow government persists, it is because we have yet to get outraged enough to push back against
its power grabs and put an end to its high-handed tactics.
And if this unelected bureaucracy succeeds in trampling underfoot our last vestiges of privacy and freedom,
it will be because we let ourselves be fooled into believing that politics matters, that voting makes a
difference, that politicians actually represent the citizenry, that the courts care about justice, and that
everything that is being done is in our best interests.
Indeed, as political scientist Michael J. Glennon warns, you can vote all you want, but the people you elect aren’t actually the ones calling the shots. “The American people are
deluded … that the institutions that provide the public face actually set American national security
policy,” stated Glennon. “They believe that when they vote for a president or member of Congress
or succeed in bringing a case before the courts, that policy is going to change. But … policy by and large
in the national security realm is made by the concealed institutions.”
In other words, it doesn’t matter who occupies the White House: the secret government with its secret
agencies, secret budgets and secret programs won’t change. It will simply continue to operate in secret until
some whistleblower comes along to momentarily pull back the curtain and we dutifully—and fleetingly—play the
part of the outraged public, demanding accountability and rattling our cages, all the while bringing about
little real reform.
Thus, the lesson of the NSA and its vast network of domestic spy partners is simply this: once you allow the
government to start breaking the law, no matter how seemingly justifiable the reason, you relinquish the
contract between you and the government which establishes that the government works for and obeys you, the
citizen—the employer—the master.
Once the government starts operating outside the law, answerable to no one but itself, there’s no way to
rein it back in, short of revolution. And by revolution, I mean doing away with the entire structure, because
the corruption and lawlessness have become that pervasive.
NSA Spying: False Hope vs. Real
(IMPORTANT - PLEASE SHARE)
In this special edition of The Boiling Frogs Post Eyeopener report, James introduces new members of the
irate minority to the problem, as well as the false hopes (and real solutions) that are available to
address that problem.
Description:This week on The Corbett Report we present a special audio and video edition of
the podcast/vodcast. This week we delve into the true history of the illegal NSA wiretap program and how it
connects to the bigger picture of government surveillance.
Documentation – CALEA and the Stellar Wind (video)
Begin watching the YouTube video version of this episode here.
Cryptome welcomes documents for publication that are prohibited by governments
worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use
technologies, national security, intelligence, and secret governance — open, sec
US agency would need a facility the size of Europe to store
physical copies of information it will hold
July 5, 2013
A stunning info-graphic put together by a German data
company reveals just how expansive the NSA’s data retention program has become.
In the wake of the Snowden revelations, eyes have been trained on the NSA and its almost completed new facility
in the Utah desert.
the NSA’s warrantless wiretapping program has grown in gargantuan proportions and now intercepts 1.7 billion US
electronic communications every single day. Those communications will soon all be funneled through the top secret $2 billion spy center, which the NSA has refused to provide Congress with details
Comparing the NSA to the East German Stasi, experts at Open Data City in Berlin, decided to visualize the scope of both spy agencies, to make
a point of how much further advanced the NSA is.
The shaded area on the left shows how much physical space the Stasi encompassed in Berlin, then compares the
space the NSA would need if it had physical copies of all the information it is capable of storing.
“They would have plenty of space with five zettabytes to store at least something on the order of 100 years
worth of the worldwide communications, phones and emails and stuff like that,” Binney asserts, “and then have
plenty of space left over to do any kind of parallel processing to try to break codes.”
Open Data City notes that a filing cabinet requires 0.4 m square, and can hold about 60 folders containing
roughly 30,000 pages of paper, which equates to somewhere in the region of 120 MB of data.
Given these facts, the Utah data center, if it were to store printed copies of all the information it can hold,
would consume about 17 million square kilometers of space. The shaded area in the image below shows you how much
space that is. It pretty much covers the entire continent of Europe.
In comparison, the Stasi Records Authority spanned a mere 200 kilometers at its facility in Berlin.
Consequently, the NSA can hold nearly 1 billion times more data than the Stasi could.
Of course, there is no need to worry, for the NSA vows that it only targets terrorists and extremists, just
liked the Stasi did.
Steve Watson is the London based writer and editor for Alex Jones’ Infowars.com, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of
Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from
Nottingham Trent University.
This article was posted: Friday, July 5, 2013 at 11:59 am
James Paul Warburg was a German-born American banker. He was notably well known for being the
financial adviser to Franklin D. Roosevelt. His father was banker Paul Warburg, member of the Warburg family and
"father" of the Federal Reserve system.
A failed attempt to recruit Aaron Russo resulted in recent
light being shed on the CFR, The Fake War On Terrorism,
And A Cashless Society
ago, after his popular video “Mad As Hell” was released and Aaron Russo began his campaign to become
Governor of Nevada, Russo was noticed by Nicholas Rockefeller and introduced to him by a female attorney. Seeing
Russo’s passion and ability to affect change, Rockefeller set about on a subtle mission to recruit Russo into the
elite’s CFR. Watch the full interview here: Reflections and
Aaron Russo talks about the CFR, The Fake War On Terrorism,
And A Cashless Society
For the New World Order, a world government is
just the beginning. Once in place they can engage their plan to exterminate 80% of the world's
population, while enabling the elites to live forever with the aid of advanced technology. For
the first time, crusading filmmaker Alex Jones reveals their secret plan for humanity's
extermination: Operation ENDGAME.
Jones chronicles the history of the global
elite's bloody rise to power and reveals how they have funded dictators and financed the
bloodiest wars – creating order out of chaos to pave the way for the first true world
Watch as Jones and his team track the
elusive Bilderberg Group to Ottawa and Istanbul to document their secret summits,
allowing you to witness global kingpins setting the world's agenda and instigating
World War III
Learn about the formation of the North
America transportation control grid, which will end U.S. sovereignty
Discover how the practitioners of the
pseudo-science eugenics have taken control of governments worldwide as a means to carry
View the progress of the coming
collapse of the United States and the formation of the North American
Support The Film Makers & Spread The Word : HQ