• Like

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Obama worse than bush .. ndaa, patriot act, surveillance#sarkozy

  • 1,923 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,923
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] NewsFollowUp.com search Franklin Scandal Omaha pictorial index sitemap home 'War on Terrorism' NFU Go to Alphabetic list Academic Freedom Conference Obama Death List Rothschild Timeline Bush / Clinton Body Count MOST ACTIVE PA mirror below The privacy consequences of the 'war on terror' War on Terror research links WMR  Bin Laden: Body buried at sea, shoddy proof of death more . Military Commissions Act of 2006  (Bush Torture Law)   . Guantanamo, Abu Ghraib, sexual torture . Neil Entwistle 9/11, silenced. . Domestic Spying News links   Facebook 1 million against NDAA Indefinite Detention ...................................Refresh F5...archive  home 50th Anniversary of JFK assassination "Event of a Lifetime" at the Fess Parker Double Tree Inn. JFKSantaBarbara.  News for the 99%   = go to NFU pages  FEMA concentration camps list   Rex84 The Privacy Consequences of the War on Terror Advanced Research and Development Activity Office  TIA replacement. Administrative subpoena p.2 Amdocs, Israel Telecom Immunity American Telecommunications Co's Apple, Iphone, Android Google Appliance surveillance,   Army, spying on blogs Automobile, Black Boxes, NTSB Automatic License Plate Recognition, Entersect, Certifion, LocatePlus, Multilateration EZPass, toll road systems tracking, surveillance, yes FBI tracking devices Facial Recognition Facebook, Israel, Jewish co. FDIC Bank Transaction Surveillance FEMA Townsend, Comey, Ashcroft FEMA secret databases FIRSTFRUITS media wiretap surveillance Foreign Intelligence Surveillance Court (FISC) wmr NIST and NSA integration Northcom, Northern Command National Applications Organization National ID Card, drivers license Open BSD  FBI backdoor, operating system Police Departments tracking protesters, NSA Precrime surveillance, body language    Patriot Act, database compilation on 'terrorists' and civilians Perfect Citizen domestic surveillance, NSA
  • 2. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Avatar Identity Program, DHS more Behavior Recognition, DARPA Blog Tracking Biosurveillance, Biowatch, Biometrics Biometric cataloging Bioport, Anthrax Vaccine, Court-Martial. CALEA Communications Assistance for Law Enforcement Act CAPPS, color coding airline passengers Carnivore, DCS 1000, EtherPeek Cell Phone wiretapping, mic remote activation Cell-Site Tracking  Warantless Census Bureau  more Chertoff Watch 'Homeland  Security' CODIS, collect DNA every federal arrest cofee1 Computer Online Forensic Evidence Extractor Controlled Drug Users, DEA Covert U.S. intelligence operation to steal personal data, TIA  wmr Credit Card Information Databases Cubic Corporation DARPA Defense Advanced Research Project Agency   IPTO, BICA, LifeLog, Forester, Virat, RSTA Deep Packet Inspection Digital TV, Interactive DNA Databases, insurance cherry picking Drones, Balloons Drug Testing DSL Service Echelon Einstein cyber-security intrusion detection system Electronic Passports Email Surveillance, Google Fusion Centers, Entersect Garden Plot antiwar group surveillance Geographic Information Systems GIS GPS, Location Technology GROUNDBREAKER Eagle Alliance, outsourcing, NSA Google Guantanamo HART / HURT aerial surveillance Health Information Systems Operation Hylander NSA wiretaps on Americans abroad. Infragard Infrastructure security Insurance Inspection, satellite Israel, Pedophilia Israel, Amdocs Israel , ...  Amdocs US Telephone Billing Systems ISP surveillance, profit Liberty Alliance Project MATRIX Multistate Anti-Terrorism Information Exchange Microsoft, IE Explorer, cookies, surf tracking, SSL Bots, Spies Murdoch, Rupert  phone hacking, Israel, Rebecca Brooks NAIS National Animal Identification System Narus, ISP, Semantic Traffic Analysis National Security Agency National Security letter NCTC  National Counter Terrorism Center NSA  Administrative subpoena NSA Narus / Amdocs links, ISP, Semantic Traffic Analysis Negroponte watch Neil Entwistle, 911, FAA, NORAD, Ptech Printer Tracking dots and below Prison Ships Real ID Federal ID Restroom taping RFID Tech product tags, wireless transmissions Road Sensors Sarkozy, pedophile statement Satellites, National Geospatial Intelligence Agency. Search engines Secret Prisons, Rendition Sneak and Peak search warrant Stellar Wind illegal NSA surveillance program Stoplight Cameras Streetlight cameras Televison sets, cable tv Trailblazer SWIFT,  Society for Worldwide Interbank Financial Telecommunication TALON Terahertz Spectroscopy  TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead." Trailblazer / NSA TRAPWIRE US-VISIT fingerprinting foreign visitors Utah, Camp Williams data mining Video Analysis and Content Extraction Voice Grid Nation, VoiceGrid speech recognition White House Wifi, see through walls Zawahiri, Negroponte hoax letter X-ray, airports Related topics:   Internet             'War on Terrorism'                Communications             Fear             Boycotts related topics     related topics     related topics     BushWatch Domestic Surveillance Nonviolence Poverty Protest Africa Iraq Iran Religion Deregulation Military Privatization. Tax Reduction 'War on Terror' Zionism   War on Terror PROGRESSIVE  REFERENCE CONSERVATIVE 1%*
  • 3. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Amnesty International Anthrax Vaccination Immunization Program Army cover-up, search court martial Arms Sales Monitoring   Carlyle Group.net Center for Constitutional Rights, watching the events of Guantanamo, detainees, Supreme Court decisions. Center for Defense Information weekly defense monitor  Center for Peace and Liberty, The Independent Institute Center for Public Integrity midwife a terrorist Conciliation Resources PTZ point tilt, zoom Daily KOS DissidentVoice 13 myths about case for war against Iraq Ethical Spectacle  Free speech, Bush fascism, what's next.  Eurolegal Services International institutions, news, comment, Middle East affairs, Iraq Body Count, Iraqi resistance to occupation.   FAS search National Intelligence estimate Findlaw, War on Terrorism Special coverage Fired UP  search terms:  American Turkish Council, Hastert, Sibel Edmonds, FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW Glasgow Media Group promote new research Summary,  Daily Newscaster Martial Law Training, Indianapolis --- June, 2008 What is Tearerism ? Neil Entwistle, 911, FAA, NORAD, Ptech Walsh Report, National Archives search: Robert Gates, nominee for Secretary of Defense and go to NFU 'War on Terrorism' pages for more Emp-zan)  Iraq  -- NFU visitor American Immigration Lawyers Association search Patriot Act Center for Strategic and International Studies   Conflict Watch IAEA International Atomic Energy Association Institute for Defence and Strategic Studies, Singapore, Thailand, links and thing tanks Intel Daily, Sarkozy, "people are born pedophiles",  International Committee of the Red Cross, why did they wait months to report Iraq prison abuse. International Relations and Security Network, Swiss Contribution to the Partnership for Peace International Terrorism Observatory, Paris, France Legislation related to 9/11 National CFIDS Foundation Chronic Fatigue Immune Dysfunction,  ME, Myalgic Encephalopathy National Security Archive in periodically releases unclassified docs.  North American Freedom Foundation "Advocating for U.S. and Canadian victims and survivors of mind control, torture, slavery, and related terror through education and remembrance." Strategic Intelligence, from Loyola College Department of Political Science Times Online The US is helping Morocco to build a new interrogation and detention facility for Al-Qaeda suspects near its capital, Rabat.  search terms: Ain Aouda, Direction de la Securité du Territoire (DST), Temara, Moroccan secret police, rendition, CIA, Rumsfeld UN NewsCentre   American Service-Members' Protection Act Anti Terrorism Coalition, Islam is taking over the world American Turkish Council Battelle Memorial Institute develops new tech, commercializes products CISAC Stanford links CNS News search, flushed Quran down toilet, US, Guantanamo FEMA Concentration Camp, Beech Grove, Indiana YouTube   enlarge for full map and FEMA Concentration Camps list and Liberty Post Council on Foreign Relations  corporate power to rural poor Republicans Danger Zone Jobs.com DARPA Defense Advanced Research Projects Agency DefendAmerica Dept of Homeland Security Dept of State, International Info Prg Response to Terror FEMA fake news conference YouTube  and more below Fox news FBI War on Terrorism, most wanted list,  Gyre.org tracking the next military & tech revolutions. Iraq, Facing the Threat International Policy Institute for Counter-Terrorism, Terrorism database Institute for Science and International Security
  • 4. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] methodologies on the media Global Policy Watching Guantanamo Global Witness International  GlobalVision News Network news / info from the inside out Guardian "Israel accused of using deadly new weapon in Gaza.   death due to unseen injuries, severe burning, deep internal wounds, 'dusting' on severely damaged internal organs, bodies severely fragmented, melted, disfigured.  DIME weapon: carbon fibre casing and contains fine tungsten particles, limited blast radius, Dense Inert Metal Explosive. Human Rights Watch Human Rights First, formerly Lawyers Committee for Human Rights IACenter Founded by Ramsey Clark Indymedia.uk anthrax Bush, Bin Laden, search Go to NewsFollowup.com Intervention Magazine, "War, Politics, Culture",  Liberty Dogs, the Homeland Security Watchdogs Military Corruption.com anthrax vaccine info, court martial Multinational Monitor  column on corporate power New American Bargain blog, politics: Oliver North was central figure in Reagon Iran-Contra scandal, a convicted felon for funneling arms and money to Nicaraguan Contras in violation of 1984 Bolland Amendment.  Conviction overturned by Laurence Silberman, the chairman of the Bush's WMD committee. News from Russia  Pravda, Israel, search Not in Our Name NoWarIraq Pacific Life Research Center Understanding the 'war on terrorism'.pdf  ProgresoWeekly UN has learned of allegations of terrorist prison ships, Indian Ocean, Diego Garcia island    Refuse & Resist  RightWeb, American Turkish Council Sibel Edmonds, Just a Citizen, official  Office of Managing Risk and Public Safety Urban Institute UCLA, Dept of Epidemiology, School of Public Health URUKnet Abu Ghraib Web Index, 9/11, Johns Hopkins notes Office of Special Plans? Mother Jones, on Pentagon intelligence unit built case for Iraq war.  more search words: Kwiatkowski, NESA, Wolfowitz, Feith, Committee for the Liberation of Iraq.  Ignore Palestinians, go for regime change in region.  Harold Rhode,  American Enterprise Institute, Defense Policy Board, David Wurmser.  They all knew there was no noteworthy link between Al Qaeda and Iraq.   Pedophilia, White House, 1989, YouTube topic map   NATIONAL SECURITY PRESIDENTIAL DIRECTIVE / NSPD 51 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE / HSPD-20 notes Chad, War on Terror, oil, France, Sarkozy   Wikipedia Idriss Deby  At the end of August 2006, Déby made international news after calling for his country to have a 60 per cent stake in its oil output after receiving "crumbs" from foreign companies running the industry. He said Chevron and Petronas were refusing to pay taxes totalling $486.2 million. Recently, Chad passed a World Bank-backed oil revenues law that required most of its oil revenue to be allocated to health, education and infrastructure projects. The World Bank had previously frozen an oil revenue account in a dispute over how Chad spent its oil profits. 12]  ...Corruption In October 2006, Chad International Committee of the Red Cross, why did they wait months to report Iraq prison abuse. Lt. Gen William G. Boykin, Pentagon investigation has concluded that he violated regulations by failing to make clear he was not speaking in an official capacity, when he made church speeches casting the "war on terrorism" in religious terms.  In most cases he was wearing his uniform.  Search CBS News for more information. Justice Dept  Patriot Act  National Intelligence Council Iraq War estimate. NBC Industry Group CB Defense systems National Strategy to Secure Cyberspace Whitehouse, Bush, Cheney, 'war on terrorism' FEMA Concentration Camp, Beech Grove, Indiana YouTube     New York Times force feeding detainees NTI WMD411 preventing spread of  wmd PNNL, neural network, protein research, operated by Battelle, with Agilent  Patterns of Global Terrorism US State Dept Harvard, Risk of death, bioterroism, 1 in 56 million State Dept Counter Terrorism Office, Counterterrorism Office, codewords Solutions North America,, Charles P. Sexton, Terrorism Q&A Terrorism Research Center  security analysis, terrorist profiles, links,  TIP Terrorist Interdiction Program State Dept War on Terrorism American Enterprise Institute War on Terrorism, Chicago Sun Times   Weldon: Atta papers destroyed on orders, letter Weekly Defense Monitor  Wilmer Cutler & Pickering Chi
  • 5. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] SourceWatch on Sibel Edmonds, search terms: translator hired by FBI after 9/11, Washington D.C. U.S. Court of Appeals, unable to open hearings, whistleblower,   Stanton, Madsen   Talking Points Memo Third World Traveler alternate view of democracy The Fire This Time Weapons of Mass Deception Transparency International Who Dies for Bush Lies World Peace Herald, on Pentagon stops Weldon / Atta file destruction probe. On July 11, 1990, Gary Caradori was killed along with his 6-year old son in the crash of his small plane, after a mid-air explosion, the cause of which was never discovered. He had told friends repeatedly in the weeks before his death that he was afraid his plane would be sabotaged. GeorgeWalkerBush, death list was placed at the top of the list of the world's most corrupt nations by Forbes magazine for "what may turn out to be the single most piggish use of philanthropic funds". Proceeds from a project, funded in part by the World Bank, to build an oil pipeline through Chad and Cameroon were supposed to have been ring-fenced by Déby's government to assist and feed "the desperately poor people of these nations. Instead, some $30 million was diverted to buy arms to keep in power the government of President Idriss Déby Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy. 2] 3] 4] 5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture. 6] Winds of Change 'Covering the War on Terror' Wisconson Project Korea, 1945, Cheju Massacre, American Involvement WMR is pleased to offer a new public service for former members of the US military, federal law enforcement, and intelligence community who refused to "cook the intelligence books," engage in extra-constitutional and illegal activities, and brought to light fraudulent and other illegal activity by the military-intelligence-industrial complex. WMR offers a resume service for individuals who are now seeking employment and offering their specialized training to potential employers. and from 2005:  More on Firstfruits. The organization partly involved in directing the National Security Agency program to collect intelligence on journalists -- Firstfruits -- is the Foreign Denial and Deception Committee (FDDC), a component of the National Intelligence Council. The last reported chairman of the inter-intelligence agency group was Dr. Larry Gershwin, the CIA's adviser on science and technology matters, a former national intelligence officer for strategic programs, and one of the primary promoters of the Iraqi disinformation con man and alcoholic who was code named "Curveball." Gershwin was also in charge of the biological weapons portfolio at the National Intelligence Council where he worked closely with John Bolton and the CIA's Alan Foley -- director of the CIA's Office of Weapons Intelligence, Nonproliferation, and Arms Control (WINPAC) -- and Frederick Fleitz -- who Foley sent from WINPAC to work in Bolton's State Department office -- in helping to cook Iraqi WMD "intelligence" on behalf of Vice President Dick Cheney and Scooter Libby. In addition to surveilling journalists who were writing about operations at NSA, Firstfruits particularly targeted State Department and CIA insiders who were leaking information about the "cooking" of pre-war WMD intelligence to particular journalists, including those at the New York Times, Washington Post, and CBS 60 Minutes.  full story New York Times, FEMA got caught in fake news conference, John P. Philbin, fired two days before leaving  FEMA as public relations chief,  will now not work for  Michael McConnell,  televised news conference on California fires,  audience composed of agency staff, pretending to be reporters, easy questions, other search terms: R. David Paulison, Admiral Harvey E. Johnson, Russ Knocke, Katrina Wikipedia: "Rex 84, short for Readiness Exercise 1984, was a plan by the United States federal government to test their ability to detain large numbers of American citizens in case of massive civil unrest or national emergency. Exercises similar to Rex 84 happen periodically. 1] Plans for roundups of persons in the United States in times of crisis are constructed during periods of increased political repression such as the Palmer Raids and the McCarthy Era. For example, from 1967 to 1971 the FBI kept a list of persons to be rounded up as subversive, dubbed the "ADEX" list. 2]  According to scholar Diana Reynolds: The Rex-84 Alpha Explan (Readiness Exercise 1984, Exercise Plan), otherwise known as a continuity of government plan], indicates that FEMA in association with 34 other federal civil departments and agencies conducted a civil readiness exercise during April 5-13, 1984. It was conducted in coordination and simultaneously with a Joint Chiefs exercise, Night Train 84, a worldwide military command post exercise (including Continental U.S. Forces or CONUS) based on multi-emergency scenarios operating both abroad and at home. In the combined exercise, Rex-84 Bravo, FEMA and DOD led the other federal agencies and departments, including the Central Intelligence Agency, the Secret Service, the Treasury, the Federal Bureau of Investigation, and the Veterans Administration through a gaming
  • 6. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] exercise to test military assistance in civil defense. The exercise anticipated civil disturbances, major demonstrations and strikes that would affect continuity of government and/or resource mobilization. To fight subversive activities, there was authorization for the military to implement government ordered movements of civilian populations at state and regional levels, the arrest of certain unidentified segments of the population, and the imposition of martial rule. 3] Existence of a master military contingency plan, "Garden Plot" and a similar earlier exercise, "Lantern Spike" were originally revealed by alternative journalist Ron Ridenhour, who summarized his findings in "Garden Plot and the New Action Army." 4]  Rex 84 was mentioned during the Iran-Contra Hearings in 1987, and subsequently reported on by the Miami Herald on July 5th, 1987. 5]A number of websites and alternative publications that span the political spectrum have hypothesized upon the basic material about Rex 84, and in many cases hyperbolized it into a form of urban legend or conspiracy theory. Nonetheless, the basic facts about Rex 84 and other contingency planning readiness exercises--and the potential threat they pose to civil liberties if fully implemented in a real operation--are taken seriously by scholars and civil liberties activists."   WMR  March 20, 2008 -- Bush's secretive pal's airline connections to torture flight network  ...  The CIA's current network of CIA torture flight airlines and companies has its roots in the shadowy past network created by the CIA under George H, W. Bush's tutelage to secretly arm Iran's mullahs, support the Nicaraguan contras, and fly cocaine from Colombia to the United States during the 1980s. ... In the 1980s, much of the CIA's secret airline business centered around James R. Bath, George W. Bush's Texas Air National Guard friend who later represented the interests of the Bin Laden family in the United States. ... Bath's core airline in the CIA proprietary airline business was Skyways Aircraft Leasing, which was originally registered in 1980 in the Cayman Islands as Cotopax Investments. Skyways was linked to another Cayman firm, IC Inc., that was linked to Oliver North's illegal support network for the Nicaraguan contras code-named the "Enterprise."  full story McClatchy  Torture, 'War Council' ...  "The framework under which detainees were imprisoned for years without charges at Guantanamo and in many cases abused in Afghanistan wasn't the product of American military policy or the fault of a few rogue soldiers.  ...  It was largely the work of five White House, Pentagon and Justice Department lawyers who, following the orders of President Bush and Vice President Dick Cheney, reinterpreted or tossed out the U.S. and international laws that govern the treatment of prisoners in wartime, according to former U.S. defense and Bush administration officials.  ...   The Supreme Court now has struck down many of their legal interpretations. It ruled last Thursday (Jun 08) that preventing detainees from challenging their detention in federal courts was unconstitutional.  ...  The quintet of lawyers, who called themselves the “War Council," drafted legal opinions that circumvented the military's code of justice, the federal court system and America's international treaties in order to prevent anyone — from soldiers on the ground to the president — from being held accountable for activities that at other times have been considered war crimes." and search terms: Carl Levin, investigating origin of harsh interrogation techniques, not a 'few bad apples',  twisted law, international conventions, secret meetings, memorandums not public, Judge Advocate General, War Council members: David Addington, Alberto Gonzales, John Yoo, Timothy E. Flanigan, William J. Haynes II, ....  "Treaties that were relevant to U. S. criminal code were not relevant. That was the trick", circumvent the law, Geneva Conventions, Common Article Three forbidding humiliating and degrading treatment and torture didn't cover al Quida or Taliban, Military Commissions Act, Uniform Code of Military Justice, kangaroo court, JAG, Office of Legal Council, outside the courts, Navy warships, Yoo wanted Indian wars laws, due process is mumbo jumbo, presumed guilty if caught as a 'terrorist',   History Commons "Human rights groups claim that the US is operating “floating prisons” as detention facilities for prisoners taken in the “war on terror.” The groups claim that the US is keeping prisoners aboard ships such as the USS Ashland, the USS Bataan, and the USS Peleliu (see December 27, 2001), and say that the Americans refuse to admit to the existence of such detainees. The human rights group Reprieve has asked that the US list the names and whereabouts of such “ghost detainees” held aboard US vessels. The existence of the detainees has come to light from a number of sources, including statements from US military officials, information provided by the Council of Europe and other parliamentary bodies, and prisoner testimonies (see June 2, 2008). Details of Detentions - Reprieve says the US has used as many as 17 ships as “floating prisons” since 2001. While aboard, the prisoners are interrogated, then rendered to undisclosed locations. Fifteen of those ships may have operated around the British territory of Diego Garcia, which hosts a large British- American military base (see July 27, 1971-May 26, 1973 and After February 7, 2002). According to information obtained by Reprieve, in early 2007, the Ashland was involved in the detention and rendering of over 100 individuals abducted by Somali, Kenyan, and Ethiopian forces during an upsurge of fighting in Somalia, and then interrogated by FBI and CIA agents. Those individuals have now disappeared, but many are believed to be held in prisons in Kenya, Somalia, Ethiopia, Djibouti and Guantanamo Bay, among other possible sites. One prisoner released from Guantanamo has retold the account of a fellow inmate’s detention: “ H]e was in the cage next to me. He told me that there were about 50 other people on the ship. They were all closed off in the bottom of the ship. The prisoner commented to me that it was like something you see on TV. The people held on the ship were beaten even more severely than in Guantanamo.” Clive Stafford Smith, Reprieve’s legal director, says the US military “choose ships to try to keep their misconduct as far as possible from the prying eyes of the media and lawyers. We will eventually reunite these ghost prisoners with their legal rights.… By its own admission, the US government is currently detaining at least 26,000 people without trial in secret prisons, and information suggests up to 80,000 have been ‘through the system’ since 2001 (see November 17, 2005). The US government must show a commitment to rights and basic humanity by immediately revealing who these people are, where they are, and what has been done to them.” British Officials Ask for Accountability - Andrew Tyrie, the CONSERVATIVE 1% MP who chairs the all-party parliamentary group on extraordinary rendition, says both the US and British governments must own up to their practices of rendition and “ghost detainees.” “Little by little, the truth is coming out on extraordinary rendition,” he says. “The rest will come, in time. Better for governments to be candid now, rather than later. Greater transparency will provide increased confidence that President Bush’s departure from justice and the rule of law in the aftermath of September 11 is being reversed, and can help to win back the confidence of moderate Muslim communities, whose support is crucial in tackling dangerous extremism.” Tyrie has requested that an investigation into the use of Diego Garcia as a rendition refueling stop be undertaken (see June 2, 2008). Liberal Democrat MP Edward Davey adds: “If the Bush administration is using British territories to aid and abet illegal state abduction, it would amount to a huge breach of trust with the British government. Ministers must make absolutely clear that they would not support such illegal activity, either directly or indirectly.” A US Naval spokesman says that none of its vessels have “detention facilities,” but admits that some detainees had been put on ships “for a few days” during their initial days of detention. He refuses to comment on reports that US Naval vessels stationed in or near Diego Garcia had been used as “prison ships.” Guardian, 6/2/2008] Entity Tags: Council of Europe, Andrew Tyrie, Central Intelligence Agency, Clive Stafford Smith, Federal Bureau of Investigation, Edward Davey, Reprieve Timeline Tags: Torture in Iraq, Afghanistan and elsewhere"  Bush - Neo-con / pedophile sex scandals ... NFU page index
  • 7. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] HOME     go to research Abramoff / corruption  Washington D.C. Dept of Interior, emails, corruption MORE   The Franklin Scandal     home  Omaha, Nebraska, Lawrence King, BoysTown, sexual abuse,White House  1989 MORE   Texas, Rove, youth prisons  Rove, Gonzales, Sutton, implicated in failure to prosecute sodomy MORE  Secret prisons, sexual torture  Extraordinary Rendition, Bush, sexual torture, prisoner abuse MORE CIA, Iran-Contra, Franklin  $38 million missing, Franklin Credit Union, CIA, Iran-Contra MORE Ronald Roskens, USAID  Chancellor, U of Nebraska, fired, homosexual orgies, MORE  8 U.S. Attorneys fired  Carole Lam fired, Abramoff, Cunningham, Foggo, Wilkes, Hookergate MORE DiBiagio, Palfrey, Luna  Gov. Ehrlich,  DiBiagio fired, Luna murdered, Palfrey investigation, Hookergate MORE Caging lists, USAttorneys fired   link: Rove assistant: Timothy Griffin, 2004 voter suppression, Goodling MORE Sen. Mark Foley  Senate Page program email sex scandal / hypocrisy MORE Ted Haggard  Gay male prostitute, cover-up, White House conference calls  MORE Jeff Gannon  White House visits, gay porn sites, Gosch? MORE Blunt, Boehner, Hastert  Foley cover-up, Abramoff, Dept of the Interior, FBI Investigation MORE Brian Doyle, DHS,  arrested on charges of use of a computer to seduce a child MORE Pope Benedict, Ratzinger  Catholic priest sexual abuse cover-up MORE   Alphabetic Subject Index, Franklin Scandal Omaha   Tony Blair  Pedophile investigations, D-Notices, cover-up MORE Barney Frank    Franklin Scandal cover-up, Steve Gobie, Boston, Cardinal Law, Creighton U. MORE Sen. Larry Craig  Long list of anti-gay, anti same-sex marriage votes, homophobia MORE Michael Aquino  Presidio, sexual abuse investigation, day care centers, Reagan ties.  MORE Covenant House  Father Bruce Ritter, pedophilia, Iran Contra, Bush family connections MORE KoreaGate  Sun Myung Moon  MORE Sarkozy statement:  "I'm inclined personally to think that you are born paedophile .."  MORE Deborah Jeane Palfrey   D.C. Madam... threat to identify high-profile clients, Ullman, Cheney MORE Venezuela  War on drugs? elections funding, pedophile networks MORE Sagiv, Israeli diplomat  Israeli, Consulate in Atlanta, charged, exploitation of children MORE Gen. William Boykin  Guantanamo, Abu Ghraib, sexual abuse of prisoners MORE John Mark Karr  Thailand, child sex rings, Bush connections MORE John Lehman  "Coos Bay" cover-up 1982, 9/11 Commission, Franklin cover-up MORE Southern Baptist Convention  Failure to deal with clergy sexual abuse info   Fascism and pedophilia  ... disturbing similarities ..German Christian Church and the Nazi Party .. MORE Victor Ashe  Bush's bi-sexual?, Yale roommate, Ambassador to Poland MORE Ed McAteer  Knowledge of Bush / Ashe Las Vegas sexual encounter MORE  Washington Times, Casseday  Huffington Post ... Soliciting sex over internet with what he believed was 13 yr old. 2006   Mormons  Unreported sexual abuse, lawsuits abound MORE   GOP Pedophile list   GOP Dirty Tricks  GOP Dirty Tricks, 50 years, hundreds of entries MORE  
  • 8. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM]   Sarkozy, and the Chad Children Abductions, ...  &   Bush 'relationship' PROGRESSIVE  REFERENCE CONSERVATIVE 1%* AllAfrica  reprint of Inter Press News Service article:  Authorities and civil society organisations in Spain have roundly condemned an apparent case of trafficking of children from Chad. Antislavery  Anti-Slavery International joined with Amnesty International and La Strada International to welcome the entry into force of the Council of Europe Convention on Action against Trafficking in Human Beings on 1 February 2008 Child Soldiers.org steering committee, ECPAT End Child Pornography and Trafficking of Children for Sexual Purposes.  Protect Children from Exploitation. Guardian "Row over Sarkozy's paedophilia comment refuses to go away  ...  Mr Sarkozy defended his view, outlined in a philosophy magazine, that individuals might be genetically predisposed to molest children. "What part is innate and what part is acquired? At least let's debate it, let's not close the door to all debate," he said.  He added: "I'm inclined personally to think that you are born paedophile and it's a problem that we don't know how to treat this pathology."  and Guardian Online Journal Superficiel "he linked pedophilia and genes. A pedophile would thus be determined at his birth. This theory is directly in connection with 19th century discourses of "born-criminals" that would lead to eugenists theories, later justifying concepts such as the "purity of race", notably in national-socialism" Terra Daily Sixteen Europeans charged over the alleged abduction of 103 children faced abuse from angry protesters in eastern Chad Tuesday, as a row escalated in France over the government's failure to prevent their operation. Nine French nationals, including six members of the charity Zoe's Ark and three journalists, were charged late Monday with "kidnapping minors" and "fraud" for trying to fly the children from the Chad-Darfur border to France, prosecutors in the eastern town of Abeche said. WMR file  WMR, Child Trafficking linked to Elysee Palace  " October 29, 2007 -- Child trafficking scandal linked to Elysee Palace ... He is short, tempestuous, mercurial, has called "scum" the faithful of a Middle East religion, and he possesses nuclear weapons. He is not Iran's Mahmoud Ahmadinejad. He is French President Nicolas Sarkozy and American viewers of CBS 60 Minutes last night got a view of the bizarre behavior of Sarkozy, one of the newest neocons to Summary, Chad Children Abductions Chadian and French authorities accused Zoe's Ark personnel in attempting to spirit 103 children out of Chad to France, they were first believed to be orphans, but this was not the case. Sarkozy has a curious interest in this case.  He flew to Ndjamena to intercede on behalf of French, Belgian and Spanish nationals who had been arrested.   The group has been under investigation by French police since July 2007.   Zoe's Ark started in the aftermath of the 2006 Indonesian tsunami, where orphan trafficking and prostitution is on-going. Libya's Muammar Qaddiafi offered to get involved in mediations with Sarkozy to try the case outside of Chad.  Sarkozy estranged wife was had recently traveled to Libya to successfully negotiate the freeing of jailed Bulgarian nurses.   theBoyLoveBlog from clayboy "I know that Sarkozy is not proposing this because he is an open-minded guy who sympathises with minor-attracted people; in fact, he probably wants to push for some kind of genetic profiling to abort fetuses who may be pedophiles. But I think he is right that sexual orientation, including pedophilia, is formed some time between conception and birth. I only wonder what happens the day the technology exists to identify pedophile fetuses." Guardian Sarkozy GVNet, Human Trafficking Website 2007-2008. Country by country reports of human trafficking, modern day slavery, contemporary slavery, debt bondage, serfdom, forced labor, forced marriage, transferring of wives, inheritance of wives, and transfer of a child for purposes of exploitation. Human Rights Watch and  ABC News  Chad Frees Seven in Child Abduction Case Seven Europeans released after President Sarkozy flies in.  MORE BELOW Nicolas Sarkozy ...he was criticised for putting forward legislation which can be questioned as an infringement on civil rights, and adversely affected disadvantaged sections of the population. now divorcing his wife.   Likes Bush.  known as Sarko le Pedo. Abramoff, Northern Mariannas, child labor, exploited, illegally, White House visits.  Burger King CIA World Fact Book NAMBLA  North American Man Boy Love Association search: DeLay, Abramoff, Northern Marianas, child labor, child trafficking, pedophilia, White House, visits denied.... IHT Intel Daily, Sarkozy, "people are born pedophiles", reprint of Wayne Madsen "Sarkozy has, in a major blow to his fortunes, tipped his hand on a theme common to neo-con politicians in France, the United States, Canada, Australia, Britain, and other countries -- their fascination with, defense of, and participation in pedophilia and pedophilic rituals."  file USA Today notes: October, 2007, Chadian police arrested nine
  • 9. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] occupy a seat of power in the world. ... On October 24, Chadian police arrested nine French citizens who were trying to fly 103 children from Darfur, Sudan and Chad to France. The children, who were between ages 1 and 9, were being flown by a three-year old non-profit group called l'Arche de Zoe, or "Zoe's Ark" and another affiliated group called Children Rescue. contiued World Prout Assembly  Child trafficking, Chad Operation Condor's links with Colonia Dignidad pedophilia in Chile in the 1970s?  HRW,  Child trafficking and Borderline Slavery, Child Trafficking in Togo  This report implicates both child traffickers and government officials in grave abuses of the human rights of children ... IslamOnline  trafficked children and IslamOnlne Wikipedia, Sarkozy "is a French politician, and the head of the right-of-centre party UMP, the French CONSERVATIVE 1% party. He is often nicknamed Sarko by both his French supporters and opponents." Japan Today Sarkozy: "inclined to think that people are born pedophiles, and that it is also a problem that we do not know how to manage." Yahoo   ephebophilia French citizens, flying 103 children (ages 1-9) from Darfur, Sudan and Chad to France, l'Arche de Zoe", "Zoe's Ark", Children Rescue, involved, no official records, not orphans, had families, bribed, groups said they had support of Sarkozy, Sarkozy spokesman denied this.  source  Monsters & Critics  and "granted access to French military aircraft' Breitbart   Homosexual prostitution inquiry ensnares VIPs with Reagan, Bush Wikipedia, Sarkozy search terms: Nicolas Paul Stephane Sarkozy de Nagy-Bocsa, President of France, defeated Segolene Royal's Socialist Party, was leader of the Union for a Popular Movement, (UMP), right wing party, served as Minister of the Interior in Chirac government, and mayor of one of France's wealthiest communes. Nickname Sarko le Pedo, got a medical discharge from the French Foreign Legion to avoid duty in Indochina, death, Vietminh.  Hungarian, Catholic, mediocre pupil, became a lawyer specializing business law and family law.  Skilled politician and striking orator,  Wayne Madsen Report   French families, according to the October 27 New York Times, had paid some $3500 per child to obtain custody. There were no records of any legal agreements made for French families to take custody of the children. Many of the children are not orphans and have families. ... Moreover, the BBC reported that the organizers of the mass kidnapping offered the children candy, biscuits, and money to entice them into going to France. The argument by the French charity that the care for the African children was only to be "temporary," was countered by a BBC report that some children were told that if they went to France, they would be given cars to drive when they were 19 years of age. ... After Chadian and French authorities accused Zoe's Ark of criminal activity, the group said it had the support of President Sarkozy, his now-estranged wife Cecilia, and the Elysee Palace. Sarkozy's spokesman quickly denied any association with the group. ... On April 9, 2007, WMR reported: "With the French presidential election on April 22 and neo-cons everywhere anxious to see one of their own, Nicolas Sarkozy, garner a majority of the vote in the first of two elections, Sarkozy has, in a major blow to his fortunes, tipped his hand on a theme common to neo-con politicians in France, the United States, Canada, Australia, Britain, and other countries -- their fascination with, defense of, and participation in pedophilia and pedophilic rituals. In an interview with a French magazine, Sarkozy said he is 'inclined to think that people are born pedophiles, and that it is also a problem that we do not know how to manage.'" ... The French handled the "problem" by electing Sarkozy President of France. Wherever neocons go, degenerate behavior is not far behind." ABC News  French President Nicolas Sarkozy, left, with at his side French journalists Jean-Daniel Guillou, center, Marie-Agnes Peleran, right, and Marc Garmirian, waving in background, steps down from his plane at his arrival at Villacoublay airport, outside Paris, Sunday Nov. 4, 2007. French President Nicolas Sarkozy traveled to Chad to bring home seven Europeans jailed over a charity's attempt to fly some 100 children to France. A Chadian judge ordered the release of three French journalists and four Spanish air hostesses who were among 17 Europeans accused of attempted kidnapping in the case Visible at background left is Secretary of State for Human Right Ramada Yade. BBC Profile: Zoe's Ark  ... The group says it is "dedicated to orphaned children" Six workers from French charity Arche de Zoe (Zoe's Ark) are facing charges of child abduction after attempting to fly 103 children out of Chad.  ..The group was formed by motoring enthusiasts from the French four-wheel-drive community to aid victims of the December 2004 Asian tsunami. ... Its founder, Eric Breteau, is a volunteer firefighter and former president of the French 4x4 Federation. ... Zoe's Ark says it is motivated by the firefighter's sprit and sense of duty, as well as the catchphrase "courage and devotion". ... The group, which describes itself as a non-profit organisation "dedicated to orphaned children", is now focusing its activities on children caught in the four-year war in Sudan's Darfur region. ... 'Evacuation campaign' In April, Zoe's Ark announced a campaign to evacuate 10,000 orphans from Darfur alongside other French charities including Sauver le Darfour (Save Darfur). ... It said it wanted to place orphaned Darfuri children aged under five in foster care with French families, invoking its right to do so under international law. ... Zoe's Ark founder Eric Breteau (left) is one of those held in Chad  ...But the charity has been accused of child trafficking in the case of the 103 children it attempted to fly out of Chad. ... UN officials say many of the children are from Chad, not Sudan, and there is no evidence that they are orphans. ... Zoe's Ark insists tribal leaders in Sudan told them all the children were Darfuri orphans. It says it wanted to save the children's lives and was carrying out a medical evacuation - not an adoption operation. ... And it has proudly stated that its operations did not have official support. ... On its website, the group says its plans will "surely expose us] to the wrath of Khartoum, of certain politicians... who will cry scandal, speaking of ethics, illegality or the psychological traumas of uprooted
  • 10. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] children". . .. Police investigation French Secretary of State for Foreign Affairs and Human Rights Rama Yade has accused the group of hiding its identity by registering in Chad under the name of Children Rescue. Mr Breteau heads both organisations. Ms Yade says the government warned Zoe's Ark months ago that it risked breaking the law. She told Chadian officials of the group's plans back in July.  ... French police have been investigating the charity since then, and Mr Breteau was questioned by police in August about suspected plans to adopt children from Darfur.  Other aid and adoption groups have criticised the group's plans as "irresponsible" and amateurish.  WayneMadsenReport: Sarkozy, pedophilia:  Sarkozy has, in a major blow to his fortunes, tipped his hand on a theme common to neo-con politicians in France, the United States, Canada, Australia, Britain, and other countries -- their fascination with, defense of, and participation in pedophilia and pedophilic rituals. In an interview with a French magazine, Sarkozy said he is "inclined to think that people are born pedophiles, and that it is also a problem that we do not know how to manage."  In one sentence, Sarkozy has echoed the furtive beliefs of the North American Man-Boy Love Association (NAMBLA) and its neo-con adherents in the Republican Party, fraternal secret societies, and the seamier side of the Judeo-Christian fundamentalist Right that pedophilia is somehow genetic and, therefore, more common than thought and acceptable. Sarkozy goes so far as to suggest that society does not know how to "manage" pedophiles -- a signal that Sarkozy, who has demonized Muslims and African immigrants in France and has called for their "management" through registration and detention, puts them into a category lower than pedophiles. Sarkozy has done more to expose the bizarre and reprehensible sexual beliefs of the neo-cons than has any other right-wing politician since the Nazi racialist perverts ruled Germany.  The willful decisions of both Bush administrations, the Blair government in the UK, and the Howard government in Australia in failing to curtail pedophilia activities among top office holders, military officers, and diplomats is a result of their belief that child sex, including child prostitution, is as acceptable as less socially taboo sexual deviancies.  full text Wikipedia, Sarkozy Israel, Pedophilia Ynet News ... Israel, pedophilia, ... "WASHINGTON– An Israeli diplomat, Yosef Sagiv, was arrested Friday in the American city of Atlanta on suspicion of computer related offences linked to pornography and the sexual exploitation of children.  Captain Steve Morris, of the Columbia District Police in Georgia, told Ynet that the arrestee was a worker in the Israeli Consulate. He was arrested upon leaving his home and transferred into custody at a distance from Atlanta.  Daniel Craig, the District Attorney of Augusta, in the state of Georgia, announced that Sagiv used the internet and email in order to persuade a child to carry out illegal acts such as sodomy and severe sexual abuse.  The investigation has been going on for a considerable time by the Sherriff's Department of the Columbia district in Georgia, as well as other government agencies such as the FBI. With that, the suspect was arrested only on Thursday after an indictment was approved. According to the decree, a search of the suspect's home was also carried out. Koreagate Sun Myung Moon (deceased) PROGRESSIVE  REFERENCE CONSERVATIVE 1%* CommonDreams Moon CongressionalBadBoys, Koreagate "Tongsun Park described himself as an "American success story," when he came to the attention of the FBI in 1977. Park, a Korean businessman, gave out gifts of thousands of dollars to prominent politicians and an influence peddling scheme known as "Koreagate." IApproveThisMessiah Tarpley Bush biography and Tarpley Chapter 15 American Law Library  American Mafia CannonFire "to Koreagate, and Moon's proven history of using sex to dig up dirt on politicians?" EIR prostitutes, blackmail KMF Bushbook Spitfirelist search pedophile ... Terpil claims, was run by his former partner, Ed Wilson. Wilson’s base of operations for arranging trysts for the politically powerful was, Terpil says, Korean agent Ton Sun Park’s George Town Club. Wikipedia Koreagate Wikipedia U.S. Political Scandals but does not mention Franklin Scandal, Omaha Nebraska. Fellowship The Georgetown Club GOPUSA Washington Post Koreagate tied to Oil-for-Food scandal Washington Times, Sun Myung Moon
  • 11. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] topic map   ephebophilia ...instances of child sexual and physical abuse linked to the Franklin Community Credit Union (Omaha, Nebraska) scandal....  boys and girls, some from foster homes were transported around the country by airplane to provide sexual favors.... tracked to the White House.  MORE   American Law Library = In 1977 Jaworski reluctantly agreed to serve as special counsel to the House Ethics Committee's investigation to determine whether members of the House had indirectly or directly accepted anything of value from the government of the Republic of Korea. The investigation, known as Koreagate or the Tongsun Park investigation, potentially involved hundreds of members of Congress and their families and associates, and charges of BRIBERY and influence peddling sought by way of envelopes stuffed with $100 bills. Tongsun Park was a central figure in the Korean LOBBYING scandal, but exactly who he was remains unclear. U.S.-educated, at times he may have posed as a South Korean ambassador and may have been employed by the Korean CIA or been an agent of the Korean government. He was found trying to enter the United States with a list containing the names of dozens of members of Congress including information regarding contributions. Jaworski's work was thwarted by difficulties getting key Korean figures to testify under oath, as well as the difficulties inherent when a body investigates itself. Jaworski was disappointed with the fruits of his labor. Only two former members of Congress faced criminal charges, two private citizens were indicted and convicted, and three members of Congress were reprimanded.   = go to NFU pages  Gannon, Guckert, spent many nights in the White House,  ... visits when no news briefings, many with no record of entry or exit YouTube  How does this relate to Congress, Clergy, military sex   ephebophilia Insider Magazine, Wayne Madsen Gannongate ...instances of child sexual and physical abuse linked to the Franklin Community Credit Union (Omaha, Nebraska) scandal....  boys and girls, some from foster homes were transported around the country by airplane to provide sexual favors.... tracked to the White House.
  • 12. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] scandals?   FEMA    top             Fran Townsend, Whitewash? PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Katrina report:  "compiled by Stephen Henthorne, a former professor of the US Army's War College ..... and deputy-director in the Louisiana relief efforts.... the bulk of the Louisiana and Mississippi National Guard was deployed in Iraq,... endemic corruption"  were major causes to Katrina failures.  Common Dreams Democracy Now search Chertoff, Kissinger, Argentina, 'dirty war'. Talking Points Memo Daily KOS FOI, Missouri.edu Iran Contra Islam Online Otto Juan Reich, Oliver North, Nicaragua The Nation search Reagan, North, Negroponte, Poindexter, Abrams Bush Whitehouse FEMA Global Security Guantanamo Bay, Fran Townsend, to lead Katrina investigation New York Times WayneMadsenReport "Details emerge of electronic surveillance system opposed by Ashcroft and Comey  ...  On March 10, 2004, White House Chief of Staff Andrew Card and then-White House Counsel Alberto Gonzales, over the objections of Janet Ashcroft and acting Attorney General James Comey, paid a bedside visit to Attorney General John Ashcroft while he was in the intensive card unit at George Washington Hospital recovering from surgery. According to Comey's testimony before the Senate Judiciary Committee, Janet Ashcroft received a phone call from a high White House official, likely President Bush himself, that Card and Gonzales were on the way to her husband's hospital room to get him to approve and sign a surveillance plan. Mrs. Ashcroft quickly alerted Comey.  ...  FBI Director Robert Mueller instructed FBI agents not to evict Comey from Ashcroft's room when he arrived to confront Card and Gonzales. Comey, with a full security motorcade, sirens wailing and lights a blazing, sped to George Washington hospital and told Card and Gonzales that the surveillance program instituted by the White House had been ruled illegal by the Justice Department. Card and Gonzales were adamant about continuing the surveillance. Ashcroft, who was barely conscious, lifted his head from his pillow and told Card and Gonzales that he agreed with his acting Attorney General on the illegality of the surveillance and that it did not really matter because Comey was the Attorney General. more search terms: Comey concerned with personal safety, Whitehouse, Solicitor General Ted Olson, 'Wednesday Night Massacre', mass resignation, March 2004, FEMA, domestic intelligence files, 1980, Reagan, William Webster, General Louis Giuffrida, American citizens, opposition to U. S. policies in Central America, Oliver North, REX-84, Readiness Exercise 1984, martial law, Attorney General William French Smith, Mount Pony in Culpepper, Virginia, warrantless surveillance of American citizens, Main Core database, National Security Agency, Freedom of Information Act,  FEMA database, protesters, American citizens, NSA,  Reagan era cronie California National Guard commander Gen. Louis Giuffrida created list, Webster demanded he return all copies to FBI, but Oliver North had a copy and used it to develop a 'continuity of government' contingency plan, REX-84, Readiness Exercise 1984, martial law, round up citizens, William French Smith protested, all this tied to recent March 2004 confrontation of Andrew Card, Alberto Gonzales, Ashcroft and James Comey, in a hospital room, Bush wanted subversive database.  Madsen working on Texas Observer article, ADEX, Edwin Meese, McFarlane.   WayneMadsenReport Military Commissions Act of 2006  (Bush Torture Law)   top PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Democracy Now search Chertoff, Kissinger, Argentina, 'dirty war'. Feingold MediaMonitors "The Act passed the House on September 29th with 96% of Republicans supporting and 83% of Democrats opposing legislation that allows American citizens to be labeled “enemy combatants,” incarcerated, and tortured. Senator Arlen Specter warned before he inexplicably voted for the bill that the Act would “take our civilization back 900 years.” Zmag MCA 2006, Unchecked Powers Balkin blog "Does Military Commissions Act apply to citizens?  Yes, and it's probably unconstitutional, and some applications are deeply troubling. FOI, Missouri.edu Iran Contra From the Wilderness "U.S. Government Targeting of American Dissidents"  ...  by Carolyn Baker, Ph. D.  history  Jurist "The father of Australian Guantanamo Bay JURIST news archive] detainee David Hicks JURIST news archive] has said that Hicks' defense team will challenge the Military Commissions Act of 2006" Bush Whitehouse Fox News "A three officer military panel will determine a detainee's status. If the person is deemed to be an "enemy combatant," he can be held indefinitely." Military Commissions Act of 2006 (searchable TEXT FILE) 240kb New York Times "a dangerously broad definition of "illegal enemy combatant..." Republican Senatorial   Military Commissions Act of 2006  exerpt: “LAWFUL ENEMY COMBATANT.-The term ‘lawful enemy combatant’ means an individual determined by or under the authority of the President or Secretary of Defense (whether on an  individualized or collective basis) to be: (i) a member of the regular forces of a State party engaged in hostilities against the United States or its 4 co-belligerents; (ii) a member of a militia, volunteer corps, or organized resistance movement belonging to a State party engaged in such hostilities, which are under responsible command, wear a fixed distinctive sign recognizable at a distance, carry their arms openly, and abide by the law of war; or (iii) a member of a regular armed forces
  • 13. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] who professes allegiance to a government engaged in such hostilities, but not recognized by the United States.  “SECRETARY.-The term ‘Secretary’means the Secretary of Defense. " UNLAWFUL ENEMY COMBATANT.-The term ‘unlawful enemy combatant’ means an individual determined by or under the authority of the President or the Secretary of Defense “(A) to be part of or affiliated with a force or organization-including but not limited to al Qaeda, the Taliban, any international terrorist organization, or associated forces-engaged in hostilities against the United States or its co-belligerents in violation of the law of war; “(B) to have committed a hostile act in aid of such a force or organization so engaged; or “(C) to have supported hostilities in aid of such a force or organization so engaged."   COULD THIS BE INTERPRETED TO INCLUDE ANTI-WAR PROTESTORS?  YES But Ali Saleh Kahlah al-Marri is a U.S. resident being held in a South Carolina military brig; he is the only enemy combatant held on U.S. soil. That makes his case very different. ... Authorities say he was an al-Qaida sleeper agent living in middle America, researching poisonous gasses and plotting a cyberattack.  To justify holding him, the government claimed a broad interpretation of the president's wartime powers, one that goes beyond warrantless wiretapping or monitoring banking transactions. Government lawyers told federal judges that the president can send the military into any U.S. neighborhood, capture a citizen and hold him in prison without charge, indefinitely. Negroponte Watch    top PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Democracy Now search Chertoff, Kissinger, Argentina, 'dirty war'. Global Exchange search Reagan, North, Negroponte, Poindexter, Abrams Third World Traveler International war crimes, Iran- Contra. Workers Bush packs government with criminals FOI, Missouri.edu Iran Contra Islam Online Otto Juan Reich, Oliver North, Nicaragua The Nation search Reagan, North, Negroponte, Poindexter, Abrams   Anti Terrorism Coalition, Islam is taking over the world CNS News search, flushed Quran down toilet, US, Guantanamo Debka File search Global Security Guantanamo Bay, Camp X-Ray. Pics of Sadam clad only in underwear NewsFollowUp:  Iran Contra, Iraq War Connections     pages index Ledeen, Fascism 'War on Terrorism' War Israel CIA, FBI Corporate Fraud Bush Watch Nicaragua Chertoff Watch Martial Law   top PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Democracy Now search Chertoff, Kissinger, Argentina, 'dirty war'. Investigative Journalism.com search Chertoff, DOJ, Israel, Iran Michigan Indymedia, Israel's foreign policy is U.S. foreign policy,  Chertoff, Likud, Sharon, Perle,  Wolfowitz,  Moldea, Bush II administration, search Chertoff, Whitewater, National Whistleblower Center advocates the right of employees to blow the whistle on fraud, corruption, govt waste, and violations of environmental laws. New American Bargain blog NucNews search Rigorous Institution search Chertoff, BCCI, Bush, banking scandal. DOJ Detroit News U.S. Attorney Jeffrey G. Collins ordered to review docs and ensure nothing held back, by U.S. District Judge Gerald E. Rosen. FOI, Missouri.edu Iran Contra search Chertoff, Kissinger, Nixon Search web: Chertoff, BCCI, Bush, banking scandal Free Republic CIA, ghost detainees Argentina believed it had U.S. approval for its assault on leftists. 1976,  Guzetti.   National Security Archive.   American Nationalist Union  links include: Council of CONSERVATIVE 1% Citizens, Heritage and Destiny, The Propaganda Matrix.  search Kissinger, Chertoff..   DOJ Sen Charles Grassley "Justice Dept has retaliated against prosecutors in a Detroit terror trial because they cooperated with Congress" Chertoff, Michael    search: Israel, Carlyle Group, Iran Contra, Clinton impeachment, chief counsel Whitewater,  Zacarias Moussaoui, U.S. Patriot Act, Vincent Foster,  Chertoff, Michael University Star more search terms:  ties to 9/11 financiers, Bergen County, New Jersey, Chertoff defended accused terrorist financier Dr Magdy Elamir.  Elamir,  Osama iin Laden, Operation
  • 14. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Scoop Tampa Indymedia search: Kissinger, Chertoff. Timnews, search Chertoff, BCCI, Bush, banking scandal. Spitfirelist Village Voice Chertoff  What Really Happened Chertoff, search Diamondback, FBI/ATF, Operation Green Quest, Title III, USA Patriot Act, Chertoff career path not ordinary.   Liberty-Antigone poster:  "Just who these enemies might be is one of the scariest things about Rep. Harman’s singular focus on terror prevention. Much like predicting in advance who will become a criminal, predicting who among us might become a terrorist is a difficult task. Harman has taken to it aggressively, sponsoring a bill which sailed through the House last year called the “Violent Radicalization & Homegrown Terrorism Prevention Act of 2007“, ominously subtitled “to prevent homegrown terrorism, and for other purposes.” The act establishes a commission to hold hearings around the country and a “Center of Excellence” to study the findings on what might make individuals “born and raised” in the US tend towards violence in support of their ideological leanings, or “to advance political, religious, or social change.” The bill has earned the nickname “The Thought Crimes Bill” because of its Orwellian language and its focus on dissent as an indicator of potential violent radicalization. The RAND corporation, which has close ties to Rep. Harman and is rumored to have written the bill, has long studied this issue and identifies environmentalists and anti-globalization activists as target groups to watch for ideologically-based violence. ... Jane Harman is a “Blue Dog” Democrat who is reported to have once called herself “The best Republican in the Democratic Party.” She is a multi- millionaire (Harman/Kardon electronics) and a pro-war hawk who voted twice for the PATRIOT Act. She was in line to become the chair of the House Permanent Select Committee on Intelligence when the Democrats regained Congress in 2006 but was passed over by Speaker Nancy Pelosi when it was reported that Harman was under federal investigation for allegedly improper dealings with AIPAC lobbyists." AP Dept Homeland Security, Chertoff, Guards say HQ building unsafe:  "For instance, when an envelope with suspicious powder was opened last fall at Homeland Security Department headquarters, guards said they watched in amazement as superiors carried it by the office of Secretary Michael Chertoff, took it outside and then shook it outside Chertoff's window without evacuating people nearby."   and click on pic for full size CIA Rendition flights, tail number list pic, large file Valparaiso, Indymedia report on Amnesty International work Anti-Imperialist "The SOA/WHINSEC is used by the U.S. government as a training ground for foreign military officers. Labeled by many as the "School of the Assassins," the school has produced thousands of officers subsequently linked with assassinations, "death squads," drug-trafficking, and human rights abuses in Latin America. Tens of thousands of military and police officials have trained at the school. Many of its graduating officers have become some of the most notorious leaders of death-squads and have been implicated in numerous war crimes, human rights abuses, and drug-trafficking. The school's official training manuals openly condone torture, blackmail, and assassination. A 1996 report by a U.S. government oversight board admitted that the school's "instruction materials.... condone practices such as executions of guerrillas, extortion, physical abuse, coercion and false imprisonment." Brian Doyle, Dept of Homeland Security, arrested   top            PROGRESSIVE  REFERENCE CONSERVATIVE 1%* TaylorMarsh "The Boy, His List, the Pedophile and Bush ... It's quite amazing that the story about Brian Doyle broke the same day that Justin Berry was on Capitol Hill, with Kurt Eichenwald, talking about sexually exploited children and the pedophiles..." TPMuckraker on Brian Doyle arrest...and  Now we discover -- that law enforcement agent, Frank Figueroa, used to run Operation Predator.  The victim, a 16-year-old girl, said Figueroa pulled up a leg of his shorts, exposed himself and masturbated for about 10 minutes, according to the Tampa Tribune.  Figueroa was in court this morning; he pleaded no contest to charges of exposure of sexual organs and disorderly conduct He had formerly said he was not guilty. His trial is expected to begin tomorrow. MSNBC "The deputy press secretary for the U.S. Department of Homeland Security was arrested Tuesday for using the Internet to seduce what he thought was a teenage girl, ..." MORE Below Wikipedia Brian Doyle, Bush, Deputy Press Secretary, Washington news desk -Time Magazine, use of computer to seduce a child, 23 charges, undercover detective, AOL chat room, sexually explicit conversation, sending hardcore porn clips, Polk County sheriff Grady Judd, sentenced to five years, Department of Homeland Security Public Affairs Office, registered Democrat, FBI, DOJ, online predators Bush Whitehouse Department of Homeland Security Doyle, Brian, Deputy Press Secretary, arrested sex charges. FEMA
  • 15. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] topic map   ephebophilia MIAMI - The deputy press secretary for the U.S. Department of Homeland Security was arrested Tuesday for using the Internet to seduce what he thought was a teenage girl, authorities said. Brian J. Doyle, 55, was arrested at his residence in Maryland on charges of use of a computer to seduce a child and transmission of harmful material to a minor. The charges were issued out of Polk County, Fla.  Authorities said he was online with the “girl,” a Florida undercover sheriff’s deputy, when police arrived at his Silver Spring, Md., house to arrest him. Doyle had a sexually explicit conversation with what he believed was a 14-year-old girl whose profile he saw on the Internet on March 14, the Polk County Sheriff’s Office said in a statement.  The girl was really an undercover Polk County Sheriff’s Computer Crimes detective, the sheriff’s office said.  Pornographic movie clips Doyle sent pornographic movie clips and had sexually explicit conversations via the Internet, the statement said. During other online conversations, Doyle revealed his name, that he worked for the Homeland Security Department, and offered his office and government issued cell phone numbers, the sheriff’s office said.  Doyle also sent photos of himself that were not sexually explicit, authorities said. One photo, which authorities released to the news media, shows Doyle in what appears to be homeland security headquarters. He is wearing a homeland security pin on his lapel and a lanyard that says “TSA.”  The Transportation Security Administration is part of the Homeland Security Department. On several occasions, Doyle instructed the girl to perform a sexual act while thinking of him and described explicit activities he wanted to have with her, investigators said.  Doyle later had a telephone conversation with an undercover deputy posing as the teenager and encouraged her to purchase a Web camera to send graphic images of herself to him, the sheriff’s office said. Web cam Carrie Rodgers, a sheriff’s spokeswoman, said an undercover detective posing as the girl call Doyle at work Tuesday and said “she had gotten the web camera like he told her and her mom wouldn’t be home that night and she wanted to try it out.”  “He said he would get on the computer when he got home from work so we knew he would be on,” Rodgers said. “When (police) went to his door, he was on the computer in the middle of a conversation with the girl.” He was booked into Maryland’s Montgomery County jail where he was waiting to be extradited to Florida, the sheriff’s office said.  There was no immediate response to messages left on Doyle’s government-issued cell phone and his e-mail, and he could not be reached by phone at the jail for comment.  Homeland Security press secretary Russ Knocke in Washington said he could not comment on the details of the investigation. “We take these allegations very seriously, and we will cooperate fully with the ongoing investigation,” Knocke said.  Washington television stations showed footage of police escorting Doyle from his home in handcuffs. One arresting officer carried a large box. Doyle was bent over in the front seat of the police vehicle in an apparent attempt to hide his face.  Doyle, who is the fourth-ranking official in the department’s public affairs office, was expected to be placed on administrative leave Wednesday morning." WMR  Bin Laden: Body buried at sea, shoddy proof of death -- another "Made in Hollywood" performance from "Ari Gold"  May 2-3, 2011 -- Years after Public Enemy Number One, Osama Bin Laden, was reportedly killed in the mountains of the Afghan-Pakistani border region or died from kidney failure in his native Hadhramaut region of Yemen, President Obama pulled the Bin Laden rabbit out of his political hat during a Sunday late- night television address, when many Americans were already watching the tube, thus increasing Obama's market share for his "surprise announcement." After all, Obama, who has close links to Oprah Winfrey and Rahm Emanuel's super-Hollywood agent brother, Ari Emanuel, depicted as the vile "Ari Gold" in fiction, is well-aware of TV Sunday prime time ratings. So, in a few words, Obama announced that Bin Laden had been killed by a U.S. team that caught the wily Saudi Arabian terrorist mastermind by surprise. Bin Laden was not caught in a cave or some other underground facility in Waziristan but in a $1 million walled-off estate in Abbottabad, a military cantonment where a number of active and retired members of Pakistan's military and intelligence community lived. Abbottabad is also home to
  • 16. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Pakistan's version of West Point, the Kakul Military Academy, where the firefight between U.S. Navy SEALS and Bin Laden's security guards allegedly took place a mere 800 meters away. Up until the 1980s, the mountains around Abbottabad were dotted with small U.S. National Security Agency (NSA)/U.K. Government Communications Headquarters (GCHQ) listening posts in places like Bada Bier and Parachinar were used to eavesdrop on signals from the Soviet Union and China. It was a time period when Bin Laden was operating his mujaheddin forces in Afghanistan under the aegis of Pakistan's Inter-Services Intelligence (ISI) agency and its CIA overseers. Abbottabad is also very familiar to the CIA and U.S. Special Forces, which operated from the nearby Kalabagh air force base, which has reportedly been used in the past by U.S. Special Operations forces, including U.S. Marines. Why Bin Laden would want to locate a massive safe house in the heart of Pakistani and American counter-insurgency and intelligence activity is curious. Bin Laden's body was reported by the Pentagon to have been buried somewhere in the north Arabian Sea from the aircraft carrier, USS Carl Vinson. The Pentagon has assured the public that they confirmed Bin Laden's identity through DNA sampling and are "100 percent" certain that the body they buried in the sea was that of Bin Laden. The question remains as to where Bin Laden's comparative DNA samples were obtained over the past several years when the terrorist mastermind was supposedly a phantom-like fugitive. However, the word from WMR sources at NSA is that no signals intercepts, from Pakistan or U.S. military sources, indicate that the man shot to death in Abbottabad was Osama Bin Laden. After the so-called killing of Bin Laden, operators were deluged with intercepted chatter about Bin Laden having been killed. However, not once did signals intercept operators, linguists and intelligence analysts based in Pakistan, Afghanistan, NSA headquarters at Fort Meade, Maryland, or on ships offshore -- who would have been cleared for and involved with the top secret mission to kill Bin Laden -- pick up any intelligence about Bin Laden prior to his reported assassination by the U.S. Special Forces "kill" team acting on the direct orders of President Obama. George W. Bush and other neo-con leaders, like Obama, have often pulled the Bin Laden rabbit out of their hat, years after reports of the Al Qaeda leader's death in either thr Afghanistan-Pakistan border region or Yemen. On September 7, 2007, WMR reported: "'Osama bin Laden' supposedly appears in a new videotape with a dyed and trimmed beard and talking about Democratic control of Congress and the coming to power of Nicolas Sarkozy in France and Gordon Brown in Britain. 'Bin Laden' also refers to George W. Bush as the 'leader of Texas.' He also talks of the Democrats' failure to 'stop the war.' "Bin Laden,' who once recommended William Blum' s book 'Rogue State,' is back in the Book-of-the-Month Club business in plugging Noam Chomsky and ex-CIA 'Bin Laden Unit' chief Michael Scheuer. 'Bin Laden' also mentions 'neoCONSERVATIVE 1%s' like Dick Cheney, Donald Rumsfeld, and Richard Pearl sic], meaning Richard Perle. He also refers to Colin Powell and Richard Armitage and 'their blood history of murdering humans.' Former British Prime Minister Tony Blair also gets honorable mention. 'Bin Laden' also states that President John Kennedy was killed and 'corporations were the primary beneficiary of his killing.' Days before a huge anti-war march in Washington, on September 15, Bin Laden states that carrying 'anti-war placards' in the streets is of no use. As if expecting that many people will view the tape as a fake, the neocon media and their usual 'sources' and 'experts' are already claiming that it is quite common for Arab mean to dye their beards to make themselves look younger." On September 9, 2007, WMR reported on how "Al Qaeda" video and audiotapes are transmitted to the news media as authentic: "The so-called 'Osama Bin Laden tape' was not only transmitted via the auspices of the Search for International Terrorist Entities (SITE) Institute, a Washington, DC-based research institute with links to Israeli right-wing Likud elements, but U.S. intelligence officials are now claiming that large portions of the 'Bin Laden' speech were written by Los Angeles native Adam Gadahn, born Adam Pearlman, (aka Azzam the American), the number three man in charge of Al Qaeda, whose grandfather, Carl K. Pearlman, was a member of the board of the Anti Defamation League (ADL), an important component of the Israeli Lobby in the United States. Carl Pearlman, a prominent California urologist, was the chairman of the Orange County Bonds for Israel campaign and the United Jewish Welfare Fund. SITE and an Israeli intelligence front operation in Washington, MEMRI (the Middle East Media Research Institute), are closely linked. MEMRI has been responsible for mis-translating several speeches made by Iranian President Mahmoud Ahmadinejad. SITE's director is Rita Katz, an Iraq-born Jew who moved to Israel after her father was executed by Saddam Hussein's government for spying for the Mossad. She emigrated to the United States from Israel in 1997. Katz worked for the U.S. Treasury Department in its pursuit of Muslim charity funds in the United States in Operation Green Quest and as a consultant for the FBI. The main coordinator for Green Quest was the then-head of the Justice Department's Criminal Division, Michael Chertoff. Not surprisingly, the Zawahiri tape ridiculing Obama was made available by the SITE Intelligence Group in Washington.
  • 17. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Our September 9, 2007 report continued: "The delivery of the latest 'Bin Laden' video was reported by the Associated Press as follows: 'the 30-minute video was obtained by the SITE Institute, a Washington-based group that monitors terrorist messages, and provided to the Associated Press.' In the past, Bin Laden videos were sent to Al Jazeera and other Arab media sources directly. The first news of the video's release came on the al-Sahab web site, where 'Al Qaeda' has previously posted messages. Last year, a leaked French intelligence report stated that Bin Laden died of typhoid fever in Pakistan. There are other reports that after the US attack on Afghanistan, Bin Laden was spirited out of Afghanistan to his native Hadhramaut region of Yemen, where he later died of kidney failure surrounded by his close and extended family members. Bin Laden's post-9/11 presence in Hadhramaut was hinted to by reputable Israeli intelligence sources in discussions with this editor in 2002. The speed at which the corporate media accepted the obviously bogus 'Bin Laden makeover' tape is amazing. However, considering the links between the neocon disinformation machinery in Washington, DC and the corporate media, it may not be so surprising when put into context." After years of lies from the U.S. government about Saddam Hussein's non-existent weapons of mass destruction, including "intelligence" about mobile biological weapons trailers from a known fraudster code named "Curveball"; bogus Niger documents on Iraq's possession of yellow cake uranium; bogus Iraq Oil Ministry documents on Iraqi payoffs to Western political leaders under the UN's Oil-for-Food program; and, more recently, false charges from Obama's ambassador to the UN that Muammar Qaddafi's troops in Libya were ingesting Viagra tablets before raping women, the public should be wary of a president who shows every tendency to lie as much as his three immediate predecessors: Bush II, Clinton, and Bush I. The White House is, perhaps, the greatest source of lies and disinformation in the world today, topping anything similar that may emanate from Pyongyang or Tripoli. There is no reason for any sane person to believe that anything Mr. Obama says is true. But Obama's supporters wasted no time in proclaiming that Bin Laden's killing ensures Obama's re-election next year.   Israel   top PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Alternet search, 9/11 Center for Defense Information arms trade, children in war, missile defense info Findlaw, War on Terrorism Special coverage Global Policy Watching Zionism, 9/11 News from Russia  Pravda, Israel, search Non Violence USA   International Relations and Security Network, Swiss Contribution to the Partnership for Peace Newstrove, Guantanamo Bay Wikipedia, Israeli spies World Court, International Court of Justice American Center for Law and Justice search American CONSERVATIVE 1% Union  Action Alert lobbyists  Anti Terrorism Coalition, Islam is taking over the world BioPort anthrax vaccine manufacturer KOLIsrael Danger Zone Jobs.com Debka File search National Review search on zionist, 9/11  National Strategy to Secure Cyberspace Whitehouse, Bush, Cheney, 'war on terrorism' Israeli spies: Rosen, Stev; Weissman, Keith; Kadish, Ben-ami; Pollard, Jonathan; Israeli Art Students; Berger, Sandy;  Bioport, Vaccinations, Court Martial    top PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Anthrax Vaccination Immunization Program Army cover-up Carlyle Group.net Center for Defense Information arms trade, children in war, missile defense info Gulf War Vets Anthrax vaccine deaths info News from Russia  Pravda, Israel, search News Insider search FDA search Murat Kurmaz, tortured at Gitmo UCLA dept of Epidemiology, Bioterrism National CFIDS Foundation Chronic Fatigue Immune Dysfunction,  ME, Myalgic Encephalopathy Safety Alerts consumer product safety recall info, news UCLA, Dept of Epidemiology, School of Public Health ABCnews  A French terrorism trial was thrown into turmoil on Wednesday by a report French agents secretly interviewed the six accused during their detention at a U.S. military camp on Cuba's Guantanamo Bay. Agilent gate16-norfolk.nmci.navy.mil (Nctc) New York  -- nfu visitor Anthrax Vaccine Immunization Program  Official
  • 18. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] New World Peace FBI incriminated in anthrax mailings NucNews you send articles, news, search BioPort Palestinian Non-Governmental Organization's Network rule of law, social justice, respect for Human Rights, links Vaccination Liberation hoax info, links Vaccination News vaccines, autism, shaken baby syndrome. links What Really Happened anthrax hoax Did Dick Cheney call Deborah Jeane Palfrey, escort service?   guide U.S. site Battelle Memorial Institute develops new tech, commercializes products Bayer, has Cipro patent, anthrax. BioMed Central the-Scientist.com, news, BS, Research BioPort anthrax vaccine manufacturer CIDRAP Center for Infectious Disease Research & Policy FDA search FDA News Drug industry news, daily Gulf War Medical Research Library  Harvard,  Risk of death, bioterroism, 1 in 56 million Hollister-Stier Labs in partnership with BioPort National Acadamies Press articles on Agent Orange, dioxins, TCDD National Center for Biotechnology Information National Library of Medicine, NIH NTI Security News PNNL, neural network, protein research, operated by Battelle, with Agilent  TEVA Pharma, Cipro, patent, anthrax vaccine Yoo, John, Bush admin lawyer who provided legal basis for torture, brutal interrogation methods, called to testify, Conyers, supporting details, Bioport court martial, refuse vaccine   Bioport, Carlyle, anthrax Cipro FDA gives BioPort ok to use quarantined anthrax vaccine on public BioPort timeline Maj. Glenn MacDonald USAR, sold Sadam Hussein anthrax warfare tech Fuad El-Hibril, close to Bin Laden, was CEO of BioPort El-Hibril operated a vaccine manf co. in England in 90's. Porton Products International, UK. U.S. attack anthrax named Porton strain?? Sept 98, BioPort gets $45 million contract for vaccine. Nov 98, Crowe & Bush sr. meet with Bin Laden BioPort fails inspections, sterility tests, Bush jr oks vaccine use. Hollister-Stier Labs subcontract vaccine  Only forces not to get any Gulf War Syndrome were French, who did not get Porton vaccine. BioPort fired, used Enron bookeeping tactics. all these links above Aug 2001, Whitehouse gets Cipro Anthrax Vaccination Immunization Program Army cover-up, search court martial Canadian Military drops court martial FAS search Gulf War Vets Anthrax vaccine deaths info, court martial MajorBates.com refused anthrax vaccine. LINKS, last updated 2002 Mercola search, soldiers illnesses Military Corruption.com anthrax vaccine info, court martial Dr. Buck, 1st to be court martialled for refusing vaccine. Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy. 2] 3] 4] 5] MKUltra involved the use of many methodologies to manipulate people's Acambis Asa Hutchinson, Dept of Homeland Security, Israel links, from Clinton impeachment demonizing efforts by CONSERVATIVE 1%s BioPort anthrax vaccine manufacturer National Guard, in Natural Disaster?..."The review advocated more disaster-relief training and equipping of the National Guard, who are part-time troops under the command of state governors but can also be mobilized by the Pentagon in times of emergency.  "In truly catastrophic events state and locals may be incapacitated or overwhelmed or even worse," Townsend said.  "It may be that our military is the last and only resort. We need to plan and prepare for the Department of Defense to play a significant supporting role during future catastrophic events," she said Townsend said the "bright lines" should be preserved, referring to an 1878 law, The Posse Comitatus Act, which restricts the government from using the military in a law enforcement capacity within the United States. But the president can waive the law in an emergency.  The National Guard can support law enforcement functions in a way active duty military do not, Townsend said. "So you can preserve the bright lines and not seek additional
  • 19. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Battelle Memorial Institute, Operation Jefferson, develops anthrax strain.  Hires William C. Patrick III to weaponize thru postal syst.  Battelle involved with BioPort BioPort manuals found in caves in Afghanistan Bush oks BioPort vaccine Jan 2002 Institute of Medicine says vaccine ok.   Aug 2002, Timothy Read says anthrax from attack can be differentiated, arrests Stephen Hatfill, but all fake out. American Free Press, see anthrax article. individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture. 6] authorities."  A change in law was not required for deploying military forces to help in disasters, she said. "We did not believe the president needed additional authority."   Guantanamo, Abu Ghraib, sexual torture top    PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Alternet search, Guantanamo Amnesty International, UK Guantanamo Bay, latest news, releases On July 11, 1990, Gary Caradori was killed along with his 6-year old son in the crash of his small plane, after a mid-air explosion, the cause of which was never discovered. He had told friends repeatedly in the weeks before his death that he was afraid his plane would be sabotaged. GeorgeWalkerBush, death list Center for Constitutional Rights, watching the events of Guantanamo, detainees, Supreme Court decisions. Center for Defense Information arms trade, children in war, missile defense info Cooperative Research, Stephen Cambone, ritualistic sexual abuse CounterPunch, "Secret World of Stephen Cambone ...  FAS search National Intelligence estimate Global Policy Watching Guantanamo Guantanamobile Project Here-Now, Supreme Court decision on Guantanamo  and related stories. Boston NPR News Source Human Rights Watch Insider Magazine, Wayne Madsen article, Expose the Christian Mafia Discourse.net CIA, Pentagon inquiry EIR search terms: spoon-benders, rape, sodomy, murder, deliberate systematic policy, first tried in Guantanamo, links to Presidio and Offutt Franklin Scandal, naked prisoners being forced  into sexual acts with one another, 'Darby photos', incite increased  terrorist recruitment, humiliate Muslims, young boys sodomized, at Abu Ghraib, Maj. Gen. Geoffrey Miller, Lt. Gen. William Boykin, Muslim-hating, Behavioral Science Consultation Teams, BSCT, SERE, sexual embarrassment, religious dilemma, desecration of the Bible, Koran, Undersecretary of Intelligence Stephen Cambone, Boykin is assistant, Task Force 20, Gitmo- ize Iraq, JFK Special Warfare School,    Fay Report Flocco, Cambone TopSecretNotes Findlaw, War on Terrorism Special coverage Griggs, Kay "Kay, a self-declared Christian, became privy to the real workings of the United States military, leadership training, drug-running and weapons sales, and the secret worldwide camps that train professional assassins." Guantanamo.com from World News International Relations and Security Network, Swiss Contribution to the Partnership for Peace American Center for Law and Justice search American CONSERVATIVE 1% Union  Anti Terrorism Coalition, Islam is taking over the world Action Alert help ACU lobby Congress on these issues   Boykin, William Lt. Gen. ... said God put George Bush in the White House,  Cambone, Stephen, Clairemont Graduate School, notes: undersecretary of defense for intelligence, Rumsfeld's chief henchmen, neo-con, PNAC, Wolfowitz, Germany, war crimes prosecution, Feith, Douglas, Stephen Cambone, Office of Analysis and Evaluation, threat to Generals, "Gray Fox", assassinations, circumvent Geneva Conventions, soften up Iraqi prisoners, interrogators, private contractors, Camp Cropper, Baghdad, Delta Force, abusive interrogations, Boykin, Christian warrior, Oregon revival tour, "a war against Satan", Christian God is mightier than Allah", Islamophobe, central role in torture scandal, General Miller, Col, Pappas, Israeli advice, Council on Foreign Relations  corporate power to
  • 20. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Karpinski, Janus,  Ladlass, search: Boykin, Cambone, Nebraska, BSCT, sexual torture News from Russia  Pravda, Israel, search New Yorker, Seymour Hersh, May 2004,  New Yorker, Jane Mayer, article: 'The Experiment', techniques of sexual and religious  humiliation of prisoners, developed by military behavioral scientists Palast, Greg, UK  Guantanamo search. Slate "Name: Mild, non-injurious physical contact, e.g. grabbing, poking, or light pushing (aka "a little bit of smacky face") Source: Decision Memorandum from Defense Department General Counsel William Haynes II to Secretary of Defense Donald Rumsfeld, for commander, U.S. Southern Command, Dec. 2, 2002 SourceWatch (Center for Media and Democracy) David S. Addington,"Rumsfeld to Cheney to- Addington-to-Torture Lawrence Wilkerson, former chief of staff to Secretary of State Colin L. Powell, told NPR November 3, 2005, that "he had uncovered a 'visible audit trail' tracing the practice of prisoner abuse by U.S. soldiers directly back to Vice President Cheney's office SourceWatch, Boykin The7thfire, Zionism, Zionists support of torture, Abu Ghraib "The most vitriolic systematic denigration of Arabs and Muslims in the Middle East is found in the writings an speeches of influential US-based Zionist ideologues, like the Pipes (father and son), the Kristols (senior and junior), the Kagans, Cohens, Goldhagens, ..." Truthout BSCT, Behavioral Science Consultation Teams, Veterans for Common Sense, Abu Ghraib, Rumsfeld Yurica Report Guantanamo Bay WSWS Lt. Gen. William Boykin, prisoner sexual abuse.   MORE below      WSWS Intellibriefs, Mindwars, Boykin, Somalia, intelligence International Committee of the Red Cross, why did they wait months to report Iraq prison abuse. Newstrove, Guantanamo Bay Human Rights First, formerly Lawyers Committee for Human Rights Justice, Dept of  press releases   Judicial Watch   PBS "SCOTT HORTON: Well, I think there is a direct line that run from Secretary Rumsfeld to Abu Ghraib and that runs through Maj. Gen. Miller. I think the major unanswered questions have to do with what led the secretary to decide to send Maj. Gen. Miller there. What is the role of Lt. Gen. Boykin and Steve Cambone in that process and why did that visit have the consequences we saw, not just in Abu Ghraib but also in other facilities in terms of violent treatment of detainees and use of sexual humiliation and military dogs?"   Taguba Report, SourceWatch Tearerism, that concept of tearing down the phrase ' war on terror',  it has started in Great Britain. Wikipedia, Abu Ghraib, sexual abuse, search terms: 2004, torture, Iraq, Baghdad Correctional Facility, 372nd Military Police, Taguba Report, 90% of the prisoners were innocent of any crime,  Wikipedia Stephen Cambone, Germany, war crimes MORE World Court, International Court of Justice Gannon, Guckert, spent many nights in the White House,  ... visits when no news briefings, many with no record of entry or exit YouTube  How does this relate to Congress, Clergy, military sex scandals? Insider Magazine, Wayne Madsen Gannongate rural poor Republicans Counter-Intelligence Field Activity, Stephen Cambone, CSIS, Center for Strategic and International Studies, Stephen Cambone Defense Security Service, controlled by Stephen Cambone Debka File search Defense Intelligence Agency, controlled by Stephen Cambone,  EthicsDaily "Controversial Christian General Named in Prisoner-Abuse Scandal .. " Global Security Guantanamo Bay, Camp X-Ray. GospelGrace, Kay Griggs "Colonel's Wife Names Names In Military Homosexual Pedophile Underground ...Fags have a 3 point agenda: 1) decriminalize sodomy, 2) add fags to the protected classes as victims like blacks, and 3) criminalize Gospel preaching against fags. Guantanamo Bay Naval Station official site. Israeli Minister of Foreign Affairs Military Religious Freedom Foundation, Cambone, Boykin National Imagery and Mapping Agency, controlled by Stephen Cambone National Reconnaisance Organization, controlled by Stephen Cambone,   National Review search on Guantanamo Bay, Rich Lowry National Security Agency, controlled by Stephen
  • 21. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Cambone, National Security Agency, Stephen Cambone Southern Baptist Convention, Bobby Welch, defends Boykin EthicsDaily  and sex offender registry EthicsDaily Townhall search US Army Criminal Investigation Command, UCMJ, Washington Institute for Near East Policy US Washington Post Washington Post "Interrogators at the U.S. detention facility at Guantanamo Bay, Cuba, forced a stubborn detainee to wear women's underwear on his head ... The report shows that they were used on Qahtani several months before the United States invaded Iraq.  The investigation also supports the idea that soldiers believed that placing hoods on detainees, forcing them to appear nude in front of women and sexually humiliating them were approved interrogation techniques for use on detainees. " SourceWatch,"'The idea was to get a handle on what worked in Cuba and to apply it to Iraq," WSWS "On September 16, Jonathan Idema was convicted in Afghanistan on counts of torture and other crimes. Idema was arrested after Afghan police found eight men tied up or hanging in his private prison in Kabul. Idema, a former member of the Special Forces, has claimed that he was acting at the behest of sections of the CIA and the Defense Department, including Deputy Undersecretary of Defense for Intelligence William Boykin. Idema claims that he was left out to dry after his case became politically problematic for the administration. The Afghan judge refused to consider evidence of high-level American support for the operation." Hidden Mysterious Soon afterwards, Boykin’s Pentagon intelligence group was discovered to have been involved with the torture and sexual molestation of prisoners in Iraq, Afghanistan, and Guantanamo Bay, Cuba. The sexual molestation of prisoners included male and female teens being held in Iraq. Also of note is the current head executive director of the OCF. He is retired Lt. Gen. Bruce Fister, the former head of the U.S. Air Force Special Operations Command. Center for Constitutional Rights  "CCR TO FILE WAR CRIMES COMPLAINT AGAINST DONALD RUMSFELD  Opinions and Documents Background Brief on the Case Against Donald Rumsfeld (PDF) 177KB    Synopsis: On November 14, 2006, CCR will file a criminal complaint against former Secretary of Defense Donald Rumsfeld in German Court. The complaint requests the German Federal Prosecutor open an investigation and, ultimately, a criminal prosecution that will look into the responsibility of high-ranking U.S. officials for authorizing war crimes in the context of the so-called "War on Terror." Former White House Counsel (and current Attorney General) Alberto Gonzalez, former Director of Central Intelligence George Tenet, and other high-ranking U.S. officials are also charged in the complaint. The complaint is brought on behalf of 12 torture victims – 11 Iraqi citizens who were held at Abu Ghraib prison and one Guantánamo detainee – and is being filed by the Center for Constitutional Rights (CCR), the International Federation for Human Rights (FIDH), the Republican Attorneys' Association (RAV) and others, all represented by Berlin Attorney Wolfgang Kaleck. The complaint is related to a 2004 complaint that was dismissed, but the new complaint is filed with substantial new evidence, new defendants and plaintiffs, a new German Federal Prosecutor and, most important, under new circumstances that include the resignation of Donald Rumsfeld as Secretary of Defense and the passage of the Military Commissions Act of 2006 in the U.S. granting officials retroactive immunity from prosecution for war crimes. For full background on the complaint, please see the attached briefing paper." Wikipedia "On 10 November 2006, the German Federal Government announced that it had decided, within the legal framework of universal jurisdiction, to permit the war crimes prosecution of Stephen A. Cambone for his alleged role in condoning the abuse of prisoners in Abu Ghraib prison during his tenure from 2001 to 2003 as U.S. Undersecretary of Defense for Intelligence." WayneMadsenReport "Blackwater was founded in 1997 by Erik Prince, a former US Navy SEAL and right-wing fundamentalist Christian from Michigan. Prince's father is Edgard Prince, who founded the Family Research Council with Gary Bauer. Erik Prince's sister is Betty DeVos, who is married to Dick DeVos, the son of Amway co-founder and Mormon bigwig Richard DeVos. The General Counsel for Erik Prince's Blackwater parent company, the Prince Group, is Joseph Schmitz, the Pentagon's former Inspector General. Schmitz's brother, John Schmitz, Jr. deputy counsel to George H. W. Bush and who is married to the sister of Columba Bush, Jeb Bush's wife. The father of John and Joseph was extreme right-wing Republican Congressman John Schmitz, Sr. Their sister is Mary Kay Letourneau, a former Washington State schoolteacher jailed for having sex with a thirteen year old American Samoan student who she later married." MSNBC GUANTANAMO BAY, Cuba - The Defense Department's former chief prosecutor for terrorism cases appeared Monday at the controversial U.S. detention facility here to argue on behalf of a terrorism suspect that the military justice system has been corrupted by politics and inappropriate influence from senior Pentagon officials. Sitting just feet from the courtroom table where he had once planned to make cases against military detainees, Air Force Col. Morris Davis instead took the witness stand to declare under oath that he felt undue pressure to hurry cases along so that the Bush administration could claim before political elections that the system was working.  His testimony in a small, windowless room -- as a witness for Salim Ahmed Hamdan, an alleged driver for Osama bin Laden -- offered a harsh insider's critique of how senior political officials have allegedly influenced the system created to try suspected terrorists outside existing military and civilian courts." USA Today An Iraqi man who says he was tortured while detained at the Abu Ghraib prison is suing two U.S. military contractors. Emad al-Janabi claims in a federal lawsuit filed Monday in Los Angeles that he was abused for 10 months beginning in September 2003 by employees of CACI International Inc. and L-3 Communications, formerly Titan Corp. Al-Janabi says his jailers punched him, slammed him into walls, hung him from a bed frame and kept him naked and handcuffed in his cell. He claims contractors conspired to cover up the torture by destroying documents and other information. Pictures of prisoner abuse by U.S. soldiers at Abu Ghraib ignited international outrage.
  • 22. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Secret Prisons for 'Terrorists',  Rendition   top PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Amnesty International Democracy Rising "Congressman Edward J. Markey (D-MA) has taken the lead on working toward ending torture by U.S. officials or by "rendition" of suspects to foreign governments for torture there.  He has introduced, along with 48 colleauges, H.R. 952 the Torture Outsourcing Prevention Act Eurolegal Services International institutions, news, comment, Middle East affairs, Iraq Body Count, Iraqi resistance to occupation.   FAS search National Intelligence estimate FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW Glasgow Media Group promote new research methodologies on the media Global Policy Watching Guantanamo Global Witness International  Notes: Shannon Airport, Ireland, rendition flights,  March 2008, also Norway Hungary, Iceland, Gulfstream IV jet, N475LC, N478GS,  see also Tel Aviv, Bucharest, Stuttgart, Tbilisi Georgia, Glasgow, see also N71PG, N54PA Lear jets,  Secret prisons, prison ships, planes, Italy, kidnapping. CBS News Extraordinary Rendition..."the government policy wherein terror suspects are transferred from U.S. control into the control of foreign governments, so that interrogation methods that are not permitted under U.S. law may be applied to the suspects" CBS The CIA ran secret prisons in Poland and Romania from 2003 to 2005 to interrogate detainees in its war on terror, Council of Europe investigator Dick Marty said in a report released Friday. Council of Europe   see below Findlaw, War on Terrorism Special coverage Griggs, Kay "Kay, a self-declared Christian, became privy to the real workings of the United States military, leadership training, drug-running and weapons sales, and the secret worldwide camps that train professional assassins." Guardian: "Al-Libi, the New York Times claims, had been subjected to such rendition when he told his interrogators that Iraq had trained al-Qaida in the use of chemical and biological weapons. An assessment from the US Defence Intelligence Agency cast doubt on the claims because of the conditions of his captivity, according to both Mr Wilkerson and the New York Times's sources. Mr Wilkerson told the BBC the assessment was made before Mr Powell made his now discredited claims to the UN security council on contacts between Saddam Hussein and al-Qaida, but neither the then secretary of state or his office were told of it. Before the Iraq war, George Bush, Dick Cheney and Mr Powell frequently cited Mr Libi's statement as "credible evidence" that Iraq was training al-Qaida. If correct, the claims would suggest that rendition and the reliance on third country interrogations had played a role in the unreliability of intelligence before the March 2003 invasion of Iraq by US-led coalition.  Andrews Air Force Base, rendition flights,   Braxton Management Services, purported CIA front   International Criminal Court Protection New York Times : Bush: Iraq War prisoners not entitled to Geneva Convention rules Anti Terrorism Coalition, Islam is taking over the world Action Alert help ACU lobby Congress on these issues   Council on Foreign Relations  corporate power to rural poor Republicans Debka File search Global Security Guantanamo Bay, Camp X-Ray. Godman Army Air Field, Kentucky, rendition flights,  GospelGrace, Kay Griggs "Colonel's Wife Names Names In Military Homosexual Pedophile Underground ...Fags have a 3 point agenda: 1) decriminalize sodomy, 2) add fags to the protected classes as victims like blacks, and 3) criminalize Gospel preaching against fags. Guantanamo Bay Naval Station official site. Israeli Minister of Foreign Affairs National Review search on Guantanamo Bay, Rich Lowry Phoenix Air Group, Inc, Cartersville, Georgia,  VPC Planes, Wilmington, Delaware,    Council of Europe   "Swiss Senator Dick Marty, Council of Europe Parliamentary Assembly rapporteur, will present his report on alleged secret detentions and unlawful inter-state transfers involving Council of Europe member states to the Committee on Legal Affairs and Human Rights in Paris on Wednesday 7 June.  The report is scheduled for debate during the plenary session of the 630-members-strong Parliamentary Assembly in Strasbourg on Tuesday 27 June 2006. The Council of Europe's action follows allegations revealed by the Washington Post and the NGO Human Rights Watch in 2005 about the existence of secret CIA detention centres in Council of Europe member states. On 1 November 2005, the Parliamentary Assembly launched an investigation for which Swiss Senator Dick Marty was appointed rapporteur. On 21 November 2005, the Secretary General, Mr Terry Davis, acting under Article 52 of the European Convention on Human Rights (see box), sent a questionnaire to the 45 States Parties to this convention (the 46th letter was sent to Monaco on 15 December following that country's ratification of the convention). On 15 December 2005, the Parliamentary Assembly requested an opinion from the Venice Commission on the legality of secret detention in the light of the member states' international legal obligations, particularly under the European Convention on Human Rights.  On 1 March 2006, the Secretary General released his report based on the official replies from all 46 member states. Report of the Secretary General Addendum to the report of the Secretary General Statement Speaking notes  On 22 March 2006, the Venice Commission published its opinion on the international legal obligations of Council of Europe member states in respect of secret detention facilities and inter-state transport of prisoners. Venice Commission opinion  " Age, The -- RAAF, The Royal Australian Air Force (RAAF) allegedly asked a woman to cover up the fact her children (aged eight and 12)  were sexually assaulted by a senior
  • 23. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] officer --- Wing Commander Terry Morgan.--- Fairfax newspaper.  ... Morgan was convicted  of four counts of indecent acts on a child under 16, and possession of child pornography ... attempted cover-up didn't work. WMR "The so-called "Australian Taliban," David Hicks, the Adelaide-born horse trader and kangaroo skinner imprisoned by the U.S. military for the past five years in Guantanamo Bay, Cuba after being picked up by U.S. forces in Afghanistan, was flown to Australia from Guantanamo on a CIA rendition aircraft with an interesting history.  The Gulfstream Aerospace G550 that flew Hicks to Australia is registered to Time Works Leasing LLC, 223 Industrial Avenue, Teterboro, New Jersey. Time Works Leasing is being reported in some Australian media as a CIA front company. The Gulfstream's current tail number is N90AM. Previously, the plane's U.S. tail number was N592GA and it was transferred from Raven Acquisition Technologies of Washington state to Time Works on January 31, 2001. The plane has also been registered as tail number VP-CI, a Cayman Islands registration. However, FAA records indicate that the Gulfstream was transferred to the Caymans on April 5, 2006. WMR "On May 22, WMR reported on the Gulfstream Aerospace G550 (Tail Number N90AM) that flew "Australian Taliban" David Hicks to Australia from incarceration in Guantanamo Bay, Cuba. The Gulfstream's travel itinerary over the past 7 years closely matches those of other CIA rendition aircraft.  A Securities and Exchange Commission EDGAR database search reveals that the actual owner of N90AM is ProFlite LLC, an air charter company that is a Delaware limited liability company. ProFlite's principal place of business is 233 Industrial Avenue, Teterboro, New Jersey, the same address listed in FAA records for Time Works LLC. ProFlite's SEC filings also reveal that N90AM has been leased to Monster Worldwide, Inc., a Delaware corporation having its principal place of business at 622 Third Avenue, New York, New York, 10017.  A search of the New Jersey State Business Gateway Services reveals that Time Works LLC is a Foreign Limited Liability Corporation whose home jurisdiction is Delaware. Time Works' corporation filing papers were submitted on December 21, 2000 and its last annual report was filed on December 16, 2005. The corporation's status is "Active." There are two other entities listed in New Jersey's business registration database but they are spelled "Timeworks."  Time Works LLC's President is listed as Christopher Cummings of 222 N.E. Monroe Street, 8th Floor, Peoria, Illinois 61602. Listed under Officers/Directors/Members is Jeffrey Corron of the same Peoria address. Cummings and Corron are also listed as officers of the Marquette Group, a marketing group with offices at 222 N.E. Monroe Street, 8th Floor, Peoria, IL 61602.  Corron is listed as a contributor to the Bush-Cheney 2004 primary campaign under CFO, "Market Group," 222 N.E. Monroe St., Peoria, IL 61602."   Israeli Spy List  Pollard is hardly the only Israeli spy operating in the United States. He just had the misfortune to get caught. Here are just a few examples of the Israeli spy operations that have been detected. 1947. Information collected by the ADL in its spy operations on US citizens is used by the House Select Committee on Unamerican Activities. Subcommittee Chair Clare Hoffman dismisses the ADL’s reports on suspected communists as “hearsay." 1950 John Davitt, former chief of the Justice Department's internal security section notes that the Israeli intelligence service is the second most active in the United States after the Soviets. 1954 A hidden microphone planted by the Israelis is discovered in the Office of the US Ambassador in Tel Aviv. 1956 Telephone taps are found connected to two telephones in the residence of the US military attaché in Tel Aviv. 1954 "The Lavon Affair". Israeli agents recruit Egyptian citizens of Jewish descent to bomb Western targets in Egypt, and plant evidence to frame Arabs, in an apparent attempt to upset US-Egyptian relations. Israeli defense minister Pinchas Lavon is eventually removed from office, though many think real responsibility lay with David Ben-Gurion. 1965 Israel apparently illegally obtains enriched uranium from NUMEC Corporation. (Washington Post, 6/5/86, Charles R. Babcock, "US an Intelligence Target of the Israelis, Officials Say.") 1967 Israel attacks the USS Liberty, an intelligence gathering vessel flying a US flag, killing 34 crew members. See "Assault on the Liberty," by James M. Ennes, Jr. (Random House). In 2004, Captain Ward Boston, Senior Legal Counsel for the Navy’s Court of Inquiry into the attack swears under oath that President Lyndon Johnson ordered the investigation to conclude accident, even though the evidence indicates the attack was deliberate. Given the use by Israel of unmarked boats and planes, and the machine-gunning of USS Liberty’s lifeboats, the most likely explanation is that USS Liberty was to be sunk with all hands, with evidence left to frame Egypt for the sinking. This would have dragged the US into the war on Israel’s side. 1970 While working for Senator Henry “Scoop” Jackson, Richard Perle is caught by the FBI giving classified information to Israel. Nothing is done. 1978, Stephen Bryen, then a Senate Foreign Relations Committee staffer, is overheard in a DC hotel offering confidential documents to top Israeli military officials. Bryen obtains a lawyer, Nathan Lewin, and the case heads for the grand jury, but is mysteriously dropped. Bryen later goes to work for Richard Perle. 1979 Shin Beth the Israeli internal security agency] tries to penetrate the US Consulate General in Jerusalem through a “Honey Trap”, using a clerical employee who was having an affair with a Jerusalem girl. 1985 The New York Times reports the FBI is aware of at least a dozen incidents in which American officials transferred classified information to the Israelis, quoting former Assistant Director of the F.B.I.] Mr. Raymond] Wannal. The Justice Department does not prosecute.
  • 24. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] 1985 Richard Smyth, the owner of MILCO, is indicted on charges of smuggling nuclear timing devices to Israel (Washington Post, 10/31/86). 1987 April 24 Wall Street Journal headline: "Role of Israel in Iran-Contra Scandal Won't be Explored in Detail by Panels" 1992 The Wall Street Journal reports that Israeli agents apparently tried to steal Recon Optical Inc's top-secret airborne spy-camera system. 1992 Stephen Bryen, caught offering confidential documents to Israel in 1978, is serving on board of the pro-Israeli Jewish Institute for National Security Affairs while continuing as a paid consultant -- with security clearance -- on exports of sensitive US technology. 1992 "The Samson Option," by Seymour M. Hersh reports, “Illicitly obtained intelligence was flying so voluminously from LAKAM into Israeli intelligence that a special code name, JUMBO, was added to the security markings already on the documents. There were strict orders, Ari Ben-Menashe recalled: "Anything marked JUMBO was not supposed to be discussed with your American counterparts." 1993. The ADL is caught operating a massive spying operation on critics of Israel, Arab-Americans, the San Francisco Labor Council, ILWU Local 10, Oakland Educational Association, NAACP, Irish Northern Aid, International Indian Treaty Council, the Asian Law Caucus and the San Francisco police. Data collected was sent to Israel and in some cases to South Africa. Pressure from Jewish organizations forces the city to drop the criminal case, but the ADL settles a civil lawsuit for an undisclosed sum of cash. 1995 The Defense Investigative Service circulates a memo warning US military contractors that "Israel aggressively collects US] military and industrial technology." The report stated that Israel obtains information using "ethnic targeting, financial aggrandizement, and identification and exploitation of individual frailties" of US citizens. 1996 A General Accounting Office report "Defense Industrial Security: Weaknesses in US Security Arrangements With Foreign-Owned Defense Contractors" found that according to intelligence sources "Country A" (identified by intelligence sources as Israel, Washington Times, 2/22/96) "conducts the most aggressive espionage operation against the United States of any US ally." The Jerusalem Post (8/30/96) quoted the report, "Classified military information and sensitive military technologies are high-priority targets for the intelligence agencies of this country." The report described "An espionage operation run by the intelligence organization responsible for collecting scientific and technologic information for Israel] paid a US government employee to obtain US classified military intelligence documents." The Washington Report on Middle East Affairs (Shawn L. Twing, April 1996) noted that this was "a reference to the 1985 arrest of Jonathan Pollard, a civilian US naval intelligence analyst who provided Israel's LAKAM Office of Special Tasks] espionage agency an estimated 800,000 pages of classified US intelligence information." The GAO report also noted that "Several citizens of Israel] were caught in the United States stealing sensitive technology used in manufacturing artillery gun tubes." 1996 An Office of Naval Intelligence document, "Worldwide Challenges to Naval Strike Warfare" reported that "US technology has been acquired by China] through Israel in the form of the Lavi fighter and possibly SAM surface-to-air] missile technology." Jane's Defense Weekly (2/28/96) noted that "until now, the intelligence community has not openly confirmed the transfer of US technology via Israel] to China." The report noted that this "represents a dramatic step forward for Chinese military aviation." (Flight International, 3/13/96) 1997 An Army mechanical engineer, David A. Tenenbaum, "inadvertently" gives classified military information on missile systems and armored vehicles to Israeli officials (New York Times, 2/20/97). 1997 The Washington Post reports US intelligence has intercepted a conversation in which two Israeli officials had discussed the possibility of getting a confidential letter that then- Secretary of State Warren Christopher had written to Palestinian leader Yasir Arafat. One of the Israelis, identified only as “Dov”, had commented that they may get the letter from "Mega”, the code name for Israel’s top agent inside the United States. 1997 US ambassador to Israel, Martin Indyk, complains privately to the Israeli government about heavy-handed surveillance by Israeli intelligence agents. 1997 Israeli agents place a tap on Monica Lewinsky’s phone at the Watergate and record phone sex sessions between her and President Bill Clinton. The Ken Starr report confirms that Clinton warned Lewinsky their conversations were being taped and ended the affair. At the same time, the FBI’s hunt for “Mega” is called off. 2001 It is discovered that US drug agents’ communications have been penetrated. Suspicion falls on two companies, AMDOCS and Comverse Infosys, both owned by Israelis. AMDOCS generates billing data for most US phone companies and is able to provide detailed logs of who is talking to whom. Comverse Infosys builds the tapping equipment used by law enforcement to eavesdrop on all American telephone calls, but suspicion forms that Comverse, which gets half of its research and development budget from the Israeli government, has built a back door into the system that is being exploited by Israeli intelligence and that the information gleaned on US drug interdiction efforts is finding its way to drug smugglers. The investigation by the FBI leads to the exposure of the largest foreign spy ring ever uncovered inside the United States, operated by Israel. Half of the suspected spies have been arrested when 9-11 happens. On 9-11, 5 Israelis are arrested for dancing and cheering while the World Trade Towers collapse. Supposedly employed by Urban Moving Systems, the Israelis are caught with multiple passports and a lot of cash. Two of them are later revealed to be Mossad. As witness reports track the activity of the Israelis, it emerges that they were seen at Liberty Park at the time of the first impact, suggesting a foreknowledge of what was to come. The Israelis are interrogated, and then eventually sent back to Israel. The owner of the moving company used as a cover by the Mossad agents abandons his business and flees to Israel. The United States Government then classifies all of the evidence related to the Israeli agents and their connections to 9-11. All
  • 25. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] of this is reported to the public via a four part story on Fox News by Carl Cameron. Pressure from Jewish groups, primarily AIPAC, forces Fox News to remove the story from their website. Two hours prior to the 9-11 attacks, Odigo, an Israeli company with offices just a few blocks from the World Trade Towers, receives an advance warning via the internet. The manager of the New York Office provides the FBI with the IP address of the sender of the message, but the FBI does not follow up. 2001 The FBI is investigating 5 Israeli moving companies as possible fronts for Israeli intelligence. 2001 JDL’s Irv Rubin arrested for planning to bomb a US Congressman. He dies before he can be brought to trial. 2002 The DEA issues a report that Israeli spies, posing as art students, have been trying to penetrate US Government offices. 2002 police near the Whidbey Island Naval Air Station in southern Washington State stop a suspicious truck and detain two Israelis, one of whom is illegally in the United States. The two men were driving at high speed in a Ryder rental truck, which they claimed had been used to "deliver furniture." The next day, police discovered traces of TNT and RDX military-grade plastic explosives inside the passenger cabin and on the steering wheel of the vehicle. The FBI then announces that the tests that showed explosives were “false positived” by cigarette smoke, a claim test experts say is ridiculous. Based on an alibi provided by a woman, the case is closed and the Israelis are handed over to INS to be sent back to Israel. One week later, the woman who provided the alibi vanishes. 2003 The Police Chief of Cloudcroft stops a truck speeding through a school zone. The drivers turn out to be Israelis with expired passports. Claiming to be movers, the truck contains junk furniture and several boxes. The Israelis are handed over to immigration. The contents of the boxers are not revealed to the public. 2003 Israel deploys assassination squads into other countries, including the United States. The US Government does not protest. 2004 Police near the Nuclear Fuel Services plant in Tennessee stop a truck after a three mile chase, during which the driver throws a bottle containing a strange liquid from the cab. The drivers turn out to be Israelis using fake Ids. The FBI refuses to investigate and the Israelis are released. 2004 Two Israelis try to enter Kings Bay Naval Submarine Base, home to eight Trident submarines. The truck tests positive for explosives. This brings us to the present scandal. Two years into an investigation of AIPAC’s possible role as a spy front for Israel, Larry Franklin, a mid-level Pentagon Analyst is observed by the FBI giving classified information to two officials of AIPAC suspected of being Israeli spies. AIPAC hires lawyer Nathan Lewin to handle their legal defense, the same lawyer who defended suspected Israeli spy Stephen Bryen in 1978. Larry Franklin worked in the Pentagon Office of Special Plans, run by Richard Perle, at the time Perle (who was caught giving classified information to Israel back in 1970) was insisting that Iraq was crawling with weapons of mass destruction requiring the United States to invade and conquer Iraq. There were no WMDs, of course, and Perle has dumped the blame for the “bad intelligence” on George Tenet. But what is known is that the Pentagon Office of Special Plans was coordinating with a similar group in Israel, in Ariel Sharon’s office. With two suspected Israeli spies (at least) inside the office from which the lies that launched the war in Iraq originated, it appears that the people of the United States are the victims of a deadly hoax, a hoax that started a war. The leaking of the investigation of AIPAC to the media on August 28th, 2004 gave advance warning to other spies working with Franklin. The damage to the FBI’s investigation was completed when United States Attorney General John Ashcroft ordered the FBI to stop all arrests in the case. Like the Stephen Bryen case and the hunt for “Mega”, this latest spy scandal seems destined by officials who have their own secret allegiances to protect, barring a massive public outcry. The organization at the heart of the latest spy investigation, AIPAC, wields tremendous influence over the US Congress. Through its members and affiliated PACs, AIPAC directs a huge flow of campaign cash in favor of, and occasionally against, Senators and Representatives solely on the basis of their willingness to support Israel. As an example, in 2002, U.S. Rep. Artur Davis, D-Birmingham received so much help from pro-Israeli pacs that 76% of his campaign budget came from OUTSIDE the state of Alabama, mostly from New York. Let me repeat that. A Congressman AIPAC wanted elected received more money from pro-Israel groups outside his state than from his own constituents inside his state. Who is that Congressman going to be thinking of when he votes in Congress? So here is the mother of all scandals. For two years, the FBI has suspected AIPAC of spying for a foreign country, and for those two years (and for decades before) that group suspected of spying for Israel has been reshaping the US Congress for the benefit of a foreign government.    
  • 26. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] common franklingate terms: Ak Sar Ben, Albert foods Alberto Gonzalez Alisha Owen, Amato, Andersen, Harold, Michael Aquino, Army of the Night, Dennis Baack,  Max Baer, Max Baird, holz zeilinger, bi-sexual, bobby Eberle, Bonacci, Boystown bradford brian burzynski BSCT byrnne randall call-boy carlton-ritz casseday catholic cia citron, peter clatty commercial federal savings conagra coos bay Lehman copple Cornwall Craig Spence Creager credit union Crist David Ambrose, David Hinton Decamp Dick Roth discovery channel Duke Cunningham Dwight Harris Ed Wwens Eisenstatt Ernie Chambers Fbi Foggo Fort Bragg Foster care review board Frank Figueroa franklin advisory board gannon guckert gannongate gerry falwell gopusa hambright hitler youth hotmilitarystud iran-contra james dobson james duffy james gannon james kelly john queen john stevens barry johnny sutton jubilation day care julie walters kay griggs kimbrough king, lawrence labedz libby apprentice lonnie latham lustfull utterances lynch male prostitution mark grossman mcconnell methamphetamine midnight tour mike jones murray state bank nambla nebraska nelson, rusty northern natural gas northwest bell offutt ogen, utah omaha omaha national bank orr case pagegate pedophigate poindexter presidio probe ensnares protestant ratzinger reagan, ronald rendition rick perry R-lynn robert kirchner robert spire rove, karl samuel vanpelt sarkozy paedophilia satanism schoedinger scott mcclellan secret service shawn vassel sodomy southern baptist convention stephen cambone stitt strategic air command talon news tarpley temple of set texas youth commission the colonel the fellowship thomas reynolds thompson, hunter tom delay tongsun park tripp schweer union pacific railroad urbom wadman, robert washington times weber state university west texas state school westin crown center hotel william boykin williams energy world herald world vision yorkshire television yosef sagiv franklin cover-up mcateer  libby book apprentice homoeroticism, bestiality and incestuous themes, with an unspeakably gross passage where a ten-year-old girl is abused.  Caged, and forced to have sex with bears, to become a prostitute, search terms: a scene of incest between two uncles and their niece; fukk a freshly killed deer, prepubescent girl's painted 'mound', lack of vaginal odor ronald roskens kent state 1970 cfr usaid chancellor uno board of regents caradori homosexual orgies ed mccateer leola Mcconnell roundtable falwell bisexual lustfull utterances tennessee knoxville victor ashe kitty kelly las vegas mayor tang yale bulldog lips sodomite nevada governor .........................gopusa gay porn sites mcclellan austin gay bars bypassed secret service security controls background check fleischer press credential mcclendon inr bureau of intelligence and research state department wilson plame endeavor media group llc houston theCONSERVATIVE 1%guy.com exposejessejackson militaryescorts bedrock corporation wilmington delaware j. daniels dividezero.net gkg.net college station bush presidential library lawrence king elizabeth doles liaison to the white house rove fundamentalist Christian politics operation rescue bible reading by guckert reverend rob schenk american center for law and justice pat robertson justice roy moore pentacostal national community church giddings school Washington Ashcroft congregant Gannon Schenk friends park bench plan righttalk.com leadership institute's broadcast school of journalism arlington virginia morton blackwell head of college republicans south dakota politics thune on gannon's radio webcasts daschle free speech foundation probush.com james abourezk mike marino west point pennsylvania traitors list carter sarandon mortensen gore stern kerry kennedy MLKing mckinney moore dixie chicks aei gannon article march 2004 anti-gay rights  ....Deborah Jeane Palfrey, Pamela Martin & Associates, legal escort service, Tobias, Brandy Britton, 07-046-GK, Catherine Connelly, racketeering, Ulman, Dick Morris, adult fantasy, Miz Julia, prostitution, pimping, Montgomery Blair Sibley, ABC, Disney, Akin Gump Strauss Hauer Feld LLP, Eli Lilly, Quale, NASA, Kessler, Shirlington limousine, poker parties, Watergate, Westin Grand, hookergate whoregate, D. C. madam, Duke-stir, Langley, .... Letterman about Cheney ""I can't believe a good-looking guy like that would ever have to pay for sex, you know what I'm saying?"  ....  Thomas DiBiagio, Jonathan Luna, Ed Norris, Governor Ehrlich, Watergate, Westin Grand, James Comey, Ashcroft, ABC producers Rhonda Schwartz, Justin Rood, defense contractors, AIPAC, World Bank, IMF, Halliburton, smokinggun, Wells Fargo Bank, Troy Burrus, John Stendrinni, Wilkes / Michael indictment. ....  Barney Frank, Steve Gobie, Thomas Foley, Edwin Cassem, Massachusetts General Hospital, Paul Shanley, Creighton University, Dobson, homophobia, Val Peter, archdiocese, Boston, house ethics committee, Warren Buffett, Cardinal law  Senator Larry Craig, Idaho, plainclothes officer, lewd behavior, airport men's room, tapped foot, anti same-sex marriage votes, homophobia, anti-gay rights, Romney campaign, Offutt, Barney Frank Neil Entwistle    top PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Global Research    CASMI Dark Government Deep Journal FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW Greg Palast privatization of FBI, see InQtel, Choicepoint IncogPress, Zakheim  There is also evidence that a possible headquarters for this remote control was located at the Boston Airport, in the offices of a major Military/Industrial complex player, the Mitre Corporation: A company sharing offices with them named Ptech. The reporter Joe Bergantino of WBZ- TV, was following the story, but it was squelched by Michael Chertoff, dual-citizen of Israel and Zionist. PTECH INFO  more Islamic Intelligence Dov Zakheim has served more than two decades at the highest level of the Dept. of Defense, since the Reagan administration came to power in 1981. Before that he was at the Congressional Budget Office in the department overseeing National Security and International Affairs from 1975 until 1981. ... These Israeli enterprise software products, like Ptech and Mitre, were key to the execution of 9-11. LookingGlassNews, Abramoff, Hillman ... Top 25 censored stories 2007 RumorMillNews    IS DEFENSE CONTRACTOR MITRE CORP. THE TROJAN HORSE OF 9/11?  By Christopher Bollyn American Free Press American Free Press Did a central controller with "super user" privileges of the command and control systems of the Summary A Massachusetts jury found British computer specialist Neil Entwistle guilty of murdering his wife and baby daughter on January 19, 2006. Entwistle fled the United States for Britain after the double homicide.  notes WBZTV Neil Entwistle's attorney says he will raise constitutional issues in his appeal of guilty verdict. WayneMadsenReport "has recently learned from knowledgeable U.S. Intelligence Community sources that Entwistle's contract for P-Tech involved "wiring backdoors" into the computer systems of the FAA, more below, NORAD, Pentagon, and White House to bring about the operational collapse of the computer systems during the morning of 9/11.      full article Wikipedia, PTech Wikipedia, Operation Green Quest  more below Cooperative Research PTech RumorMillNews  Mitre Corporation, 911, Trojan Horse, file Judith Miller,  Foreign Affairs, The Challenge of Radical Islam by Judith Miller, Muslim Brotherhood Embedded New  Technologies Company Overview" Embedded New Technologies (ENT) offers Intellectual Property cores for Xillinx, Altera and Actel FPGAs. DSP systems and system-on-chip, SoC, embedded systems can be provided using our floating- AP  Entwistle linked to escort services, smear campaign? pornography, set-up.  Google search on murder. video Ron Paul names neo-cons video Boston Globe   ... he will be transferred to the maximum-security Souza-Baranowski Correctional Center in Shirley. There he will undergo medical and physical tests, which include obtaining a sample of his DNA, as is the case for all inmates, said Diane Wiffin, a spokeswoman for the state Department of Correction. Boston Herald A juror who carefully watched a curiously grinning Neil Entwistle over 12 days of testimony by 46 witnesses said the perfectly coiffed wife-and-baby killer is nothing but a narcissist. CBSNews Entwistle CIA FBI Ember Ember Corporation’s wireless semiconductor solutions help automate homes, lower buildings’ energy consumption, reduce manufacturing plants’ breakdowns, and keep the country’s borders and infrastructure safe and secure. With more than 120 customers, Headquartered in Boston, Massachusetts, with offices and distributors worldwide, the company is a lead promoter of the ZigBee Alliance; its platform is the National Technical Systems’ (NTS) “Golden Suite”  FoxNews  We know that our son Neil is innocent, and we are devastated to learn that the evidence points to Rachel murdering our grandchild and then committing suicide. I knew Rachel was depressed. Our son will
  • 27. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Department of Defense, NORAD, the Air Force, and the FAA, control the aerial attacks of 9/11? There is only one agency that has that capability – a little- known private company known as  continued below  and file WayneMadsenReport Entwistle's firm, Embedded New Technologies (ENT), reportedly had connections to the Braintree, Massachusetts-based firm P-Tech, which was investigated subsequent to 911 by the FBI for ties to Muslim Brotherhood financiers linked to Al Qaeda. P-Tech also had software contracts for the FAA, NORAD, Pentagon, and White House during the 9-11 terrorist attacks. According to Entwistle's mother-in-law, he also told his wife that he had large amounts of money held in 'offshore' accounts. What Really Happened notes: poster: '. Ember, founded by MIT alumni Robert Poor and Andrew Wheeler, Ember Corporation began operations in 2001. In-Q-Tel initially invested in Ember in September 2005.  .  ENT stand for Embedded Technical Networking - ENT (which we All think is short for ENTtwistle thanks to court TV ) this is what his job was - not looking for escorts, but encoding these sites for the FBI . Global Report The Center for Public Integrity and the Fund for Independence in Journalism determined, through a collective study and breakdown of Bush administration speeches, press briefings and interviews, that Bush and other top officials "led the nation to war on the basis of erroneous information." and OpEdNews Neil Entwistle, and 911 'inside job'  ... follow the trail: P-Tech, command and control, terrorist financing, Bush / Clinton, Afghanistan, Mujahideen, Kosovo, oil, 911, Iraq War.  more point, fp, fast fourier transform, fft, fir filter and digital down converter cores NPR  Joe Bergantino, a CBS journalist who will be the first to report on Ptech, will say of Ptech in 2002, “The worst-case scenario is that this is a situation where this was planned for a very long time to establish a company in this country and in the computer software business that would target federal agencies and gain access to key government data to essentially help terrorists launch another attack.” National Public Radio, 12/8/2002] International Extradition Blog Trials & Tribulations TrueCrimeWeblog Wikipedia, Neil Entwistle   On June 25, 2008, Neil Entwistle was found guilty on two counts of first degree murder and sentenced to life imprisonment without the option of parole. Jurors at Middlesex County Superior Court in Woburn, Massachusetts, had deliberated for 13 hours before finding Entwistle guilty. As well as being found guilty of the murders, he was convicted of two other charges - illegal possession of a firearm and illegal possession of ammunition - and sentenced to probation which forbids him from gaining profit from the sale of his story to the media. ...  Entwhistle is serving his life sentences at Massachusetts Correctional Institution - Cedar Junction supermax prison. WebSlueths Wikio Neil Entwistle now go to jail for loving, honoring, and protecting his wife's memory. In-Q-tel, CIA company Mitre Corporation Norquist, Grover P-Tech WBZTV, laptop, Google search  Judge Diane Kottmyer agreed to allow prosecutors to present evidence suggesting Neil Entwistle trolled the internet for sex in the days before the murders and logged into his account at Adult Friend Finder after the murders. notes: BMI / PTech  Yassin al-Qadi, a Saudi multimillionaire. He will invest $5 million of Ptech’s start-up money. The US will declare him an al-Qaeda financier shortly after 9/11 (see October 12, 2001). In 1998, al-Qadi will come under investigation by FBI agent Robert Wright (see October 1998) for potential ties to the 1998 US embassy bombings (see August 7, 1998). Al-Qadi is also a major investor in BMI Inc., an investment firm with connections to a remarkable number of suspected terrorist financiers (see 1986- October 1999). Al-Qadi later will claims that he sold his investment in Ptech in 1999, but there will be evidence he may continue to hold a financial stake after that year, and even after the US will officially declare him a terrorism financier (see 1999-After October 12, 2001). Jewish Virtual Library, Dov Zakheim, mastermind of 911 WayneMadsenReport Entwistle's firm, Embedded New Technologies (ENT), reportedly had connections to the Braintree, Massachusetts-based firm P-Tech, which was investigated subsequent to 911 by the FBI for ties to Muslim Brotherhood financiers linked to Al Qaeda. P-Tech also had software contracts for the FAA, NORAD, Pentagon, and White House during the 9-11 terrorist attacks. According to Entwistle's mother-in-law, he also told his wife that he had large amounts of money held in 'offshore' accounts. ......  WMR has recently learned from knowledgeable U.S. Intelligence Community sources that Entwistle's contract for P-Tech involved "wiring backdoors" into the computer systems of the FAA, NORAD, Pentagon, and White House to bring about the operational collapse of the computer systems during the morning of 9/11.  more search terms: Gatwick Airport, Hanscom Air
  • 28. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Force Base, Gulfstream rendition aircraft, full article notes: Neil Entwistle (born 18 September 1978) is an English-born man accused of murdering his wife, Rachel Entwistle, and their infant daughter Lillian on January 20, 2006 in the United States. ... The bodies of 27-year-old Rachel and 9-month-old Lillian were found on January 22, in the master bedroom of the couple's rented Hopkinton, Massachusetts home where the Entwistles had been living for only ten days. Autopsy results showed that Rachel died of a gunshot wound to the head, and the baby died of a gunshot wound to the stomach Wikipedia  Ptech Inc. was a Quincy, Massachusetts-based provider of business process modelling software that was closed down in the wake of a December 5, 2002 raid by federal authorities under the auspices of Operation Green Quest.  ... Business domain Describing itself as a "provider of enterprise architecture, business modeling, analysis and integration software solutions, "the privately-held corporation was founded in 1994, and known for its technology, which was based on a unique implementation of neural net and semantic technologies. Ptech was recognized as one New England Technology's "Fast 50" by Deloitte Touche Tohmatsu in 2001. For four years in row (from 2000 to 2003), Ptech was also recognized, for their velocity of innovation in the knowledge economy, as one of the hundred companies that matters in the world of IT and Business  with the major names in Technology companies such as Microsoft, IBM, HP and Oracle Corporation..  The CEO of Ptech Oussama Ziade appeared on different television shows in the USA and has been featured on the cover of several magazines. . The company was once part of UML Partners, the consortium that was convened to develop standards for UML, the Unified Modeling Language.  ...  Federal investigation Ptech was brought to the front of the spotlight following the visit of law enforcement officials to its Headquarters in the middle of the night of December 5th 2002, under the operation of Operation Green Quest, a U.S. Customs Services unit charged with the investigation of alleged terrorist funding networks. The December raid brought a rush of media sources to Ptech's Boston headquarters 7] amid allegations of Ptech's involvement in terrorist financing, which the White House and the Federal Attorney General of Massachusetts later rebuffed  ...  Notable clientele Ptech's roster of clients included several governmental agencies, including the United States Armed Forces, NATO, Congress, the Department of Energy, the Department of Justice, the Federal Bureau of Investigation, Customs, the FAA, the IRS, the Secret Service, and the White House. Despite the media allegation that the company's was connected to terrorism, an allegation that both the US government and the company's official denied, as of May 2004 they were still contracted by several federal agencies, including the White House.  ...  Ptech had a security clearance to work on sensitive military projects dating to 1997.  ... edit] Notable personnel Yaqub Mirza, angel investor, board member. Hussein Ibrahim, VP, Chief Scientist    ..........Ymette St guillen murder and her father's ties to Venezuela via the infamous "School of the Americas" Wikipedia  "Operation Green Quest was a United States Customs Service-sponsored interagency investigative unit formed in October of 2001, and concerned with the surveillance and interdiction of terrorist financing sources. The FBI refused to participate in the raid and to date, no charges have ever been filed.  ... SAAR   ...    Synopsis Led by the U.S. Customs Service, and included agents and analysts from the Internal Revenue Service (IRS), the Secret Service, the Bureau of Alcohol, Tobacco and Firearms (ATF), the Federal Bureau of Investigation (FBI), the Office of Foreign Assets Control (OFAC), the Financial Crimes Enforcement Network (FinCEN), the U.S. Postal Inspection Service, and the Naval Criminal Investigative Service. Federal prosecutors from the U.S. Justice Department's Criminal Division also formed an integral part of Operation Green Quest. The director of Operation Green Quest was a senior special agent from U.S. Customs and the deputy director is a senior special agent from the IRS.  ....  According to Customs, by its fourth month of operation Operation Green Quest had initiated more than 300 probes into terrorist finances, seizing about $10.3m in smuggled US currency and $4.3m in other assets. Its work resulted in 21 searches, 12 arrests and four indictments.  SAAR network raid:  Its most spectacular operation of was March 20, 2002 raid ... 19 interrelated business and non-profit entities in Herndon, VA associated with an umbrella corporation known as the SAAR Foundation, looking for ties to the Al Taqwa Bank and the Muslim Brotherhood. No arrests were made and no organizations were shut down, but over 500 boxes of files and computer files were confiscated, filling seven trucks. Finding no incriminating evidence, much of the confiscated material has been returned.   The raid would raise concerns of unfair persecution within the American Muslim community, 2] leading to an April 4, 2002 meeting (arranged by Grover Norquist) in which several notable Muslim figures, including Palestinian-American financier and Republican organizer Talat M. Othman and Islamic Institute head Khaled Saffuri were received by Treasury Secretary Paul O'Neill as representatives of the Muslim-American community, and to voice complaints about the raid Cooperative Research  On December 3, 2001, New York Times reporter Judith Miller telephones officials with the Holy Land Foundation charity in Texas and asks them to comment about what she says is a government raid on the charity planned for the next day. Then in a December 4, 2001, New York Times article, Miller writes that President Bush is about to announce that the US is freezing the assets of Holy Land and two other financial groups, all for supporting Hamas. US officials will later argue that Miller’s phone call and article “increased the likelihood that the foundation destroyed or hid records before a hastily organized raid by agents that day.” Later in the month, a similar incident occurs. On December 13, New York Times reporter Philip Shenon telephones officials at the Global Relief Foundation in Illinois and asks them to comment about an imminent government crackdown on that charity. The FBI learns that some Global Relief employees may be destroying documents. US attorney Patrick Fitzgerald had been investigating the charities. He had been wiretapping Global Relief and another charity in hopes of learning evidence of criminal activity, but after the leak he changes plans and carries out a hastily arranged raid on the charity the next day (see December 14, 2001). Fitzgerald later seeks records from the New York Times to find out who in the Bush administration leaked information about the upcoming raids to Miller and Shenon. However, in 2005 Fitzgerald will lose the case. It is still not known who leaked the information to the New York Times nor what their motives were. Ironically, Fitzgerald will succeed in forcing Miller to reveal information about her sources in another extremely similar legal case in 2005 involving the leaking of the name of CIA agent Valerie Plame. New York Times, 12/4/2001; New York Times, 12/15/2001; Washington Post, 9/10/2004; Washington Post, 2/25/2005] The 9/11 Commission will later conclude that in addition to the above cases, “press leaks plagued almost every raid on Muslim charities] that took place in the United States” after 9/11. Washington Post, 9/10/2004  full research Cooperative Research “Investigators tried to prove Alamoudi was a terror middleman but could not find ‘smoking gun’ evidence. That allowed Alamoudi to became a politically connected Muslim activist and co-founder of the American Muslim Armed Forces and Veteran Affairs Council, which helps the US military select Muslim chaplains.” New York Post, 10/1/2003] This same year, Alamoudi will be one of the founders of Ptech, a US computer company with suspected terrorism ties (see 1994). It will later be alleged that he was able to operate with impunity for years due to his close ties to Grover Norquist, a powerful Republican lobbyist (see March 20, 2002). In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004). RumorMillNews   continue:   MITRE Corp. ... There are basically two versions of events surrounding the terror attacks of September 11, 2001. There is the government version,
  • 29. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] propagated by the controlled media, which claims that 19 Arab terrorists, organized by Osama Bin Laden in Afghanistan, hijacked 4 passenger aircraft and used them to attack the World Trade Center and the Pentagon. This version, used to launch the "war on terror" and two invasions in the Middle East, is challenged by a lack of evidence. On the other hand, a host of unofficial explanations, based on available evidence, make up what can be called the "inside job" or anti-government version. This version basically claims that agents embedded within the U.S. military and intelligence organizations conspired to carry out the terror attacks. IncogPress Ptech was financed by the Guardium Corporation of Israel, a hi-tech investment company with ties to the Mossad through the front groups Cedar Firm, Veritas Venture Partners and StageOne, all located in Herzelia, the same as Mossad’s headquarters. Also, these companies are tied to AMDOCS and COMVERSE INFOSYS, who builds the digital- switching telecomm equipment, used all over the US and in the government and thought to have a back door for intelligence gathering. ...  This was the subject to Carl Cameron’s banned FOX report, from December, 2001, that showed phone information of LA undercover Drug agents and DEA were given to an Israeli Ecstasy Drug ring. Abe Foxman of the ADL forced FOX to discontinue the reports and to remove them from their website. These reports may be seen here (for now): FOX REPORTS  ...  Ptech was owned by Lebanese and Arab front men; but appears that one Michael Goff, the son of a member of Commonwealth lodge 600 of the B’nai B’rith Worcester, Massachussets and who strangely left his job as a lawyer to go run a Hi-Tech start-up company. Was he a Sayan (Jew Mossad collaborator)? More on Ptech coming up in another Blog posting.   PTECH & 9-11  source: z13.invision forum The subject of computer sabotage in relation to the aerial attacks of 9-11 was brought to the fore by Indira Singh, who spoke at early 9-11 truth events organized by Kyle Hence. During these early 9-11 "truth" events, a small Massachusetts-based software company called Ptech was brought up by Singh, who sought to link it to Arab terrorists. Ptech was said to be a start-up company from Quincy, Mass. whose software was loaded onto the most sensitive computer systems across the U.S. government, including those of the Federal Aviation Administration (FAA) and the U.S. Air Force, two agencies whose systems failed miserably on 9-11. Singh, a senior consultant with JP Morgan Chase on 9-11, is described as a "whistle-blower" because of her revelations about Ptech's involvement with the critical computer systems that failed on 9-11. "Ptech was with MITRE Corporation in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the case of an emergency. If anyone was in a position to know that the FAA -- that there was a window of opportunity or to insert software or to change anything -- it would have been Ptech along with MITRE." Singh has spoken extensively about Ptech's alleged connections with Saudi Arabia, for example with Pacifica Radio in 2005: "Maybe those organizations don’t fully know who their masters are. And Ptech is the one thread, the one golden thread you pull on and all of this is unraveled, because it goes into the corporations, it goes into these government entities, it goes into the terrorism financing entities that were, that none of which have been, by the way, taken to task. There are just so many questions about what does this all mean. And as we investigated, as I investigated further, we found that the origins of Ptech were very interesting – where did this company come from obviously is the first question. And how did they get to be so powerful, who were the people, who were the organizations that brought them in, who knew, who gave them the power?" Ptech software "is utilized at the highest levels of almost every government and military and defense organization in this country," Singh said, "including the Secret Service, the FBI, the Department of Defense, the House of Representatives, the Treasury Department, the IRS, the U.S. Navy, the U.S. Air Force, and, last but not least, the Federal Aviation Administration." I found it hard to believe that the most sensitive government and military computers would run enterprise software from a Lebanese-owned start-up company called Ptech from Quincy, Mass. All the talk about the Saudi-financier behind Ptech being linked to Osama bin Laden smelled like a "cut out" to me. It simply did not make sense that the most secure computer systems of the U.S. government would be running software written by a Lebanese Muslim financed by a Saudi who happened to be on the most-wanted list of global terrorists. When I turned my attention to Ptech, I soon discovered that the real key person involved in the development of the company was a Zionist Jewish lawyer named Michael Goff from Worcester, Mass. Goff also worked for an Israeli-run computer security company called Guardium. This confirmed my suspicion that Ptech was probably an Arab "cut out" controlled by the Mossad, and that Goff was their point man in Ptech. Goff's father and grandfather had been high-level Masons in the Worcester lodge of B'nai B'rith, a secret Jewish Masonic group formed in New York City in 1843. Goff obviously lied to me about how he had gotten involved with Ptech in 1994 when he said that he had wound up becoming the manager of the company through a temporary agency. It seemed to me that the Ptech cut-out had been exposed. My revelations about Ptech's Zionist roots were published in a newspaper based in Washington, D.C. Singh, however, ignored the evidence of Israeli involvement with the creation of Ptech and continued to accuse the company of being linked to Saudi sponsors of terror. Meanwhile, Ptech software is still running on U.S. government and military computers. Singh and I were asking the same questions: How did Ptech get to be so powerful? Who were the people, who were the organizations that brought them in? Who knew? Who gave them the power? After 9-11, the crucial question was how did Ptech's software get loaded onto the critical U.S. government networks – particulary those of the FAA, the U.S. Air Force, and NORAD. Who, in their right mind, would have allowed Ptech personnel and software anywhere near the FAA's core air traffic control system computers in Herndon, Virginia? During my research about the military exercises that were on-going when 9-11 occurred, I read documents about how the FAA and NEADS computer systems failed. The FAA, in particular, was extremely slow to contact the military about the rogue aircraft of 9-11. In one case, one of the rogue aircraft had been allowed to fly without communication for nearly 30 minutes before the military was notified. "THE HEART OF THE MATTER" The flawed and delayed FAA procedures and communications with the military are at "the heart of the matter," as 9-11 relative Kristen Breitweiser said:"You know, it is very upsetting that the 9/11 Commission had to subpoena the Federal Aviation Administration FAA]. According to news reports, there are 150,000 documents that were left out of what the FAA sent to the commission. Those documents went toward the time line of when the FAA notified the North American Aerospace Defense Command NORAD], when the fighter jets were scrambled and the communications between air-traffic control and the pilots. These are threshold issues that go to the heart of the matter. How did the FAA overlook 150,000 documents pertaining to these issues? It is more than mildly upsetting that they would leave out these documents." MONTE BELGER – FAA DEPUTY ADMINISTRATOR In the documents about the FAA failures on 9-11, I came across the name of a Monte R. Belger, acting deputy administrator of the FAA at the time. A long-term FAA official who began his career with the FAA in Chicago, Monte Belger was the senior official who oversaw the upgrading of the FAA air traffic computer systems that began in the late 1990s and which was on-going in 2001. Belger, as the Acting Deputy Administrator for Air Traffic Services and System Operations, was the key man at the FAA making the executive decisions about these upgrades. As the New York Times of June 7, 2001, reported:"The aviation agency is installing a computer system that controllers can use to determine whether airplanes can depart from established traffic lanes and fly long distances, and whether they will conflict with other airplanes by doing so." Belger was the key decision maker at the Federal Aviation Administration, responsible for the software and computer upgrades that involved Ptech, the suspicious upgrades which were being done during the years prior to 9-11. Documents
  • 30. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] and reports from the MITRE Center for Advanced Aviation System Development in McLean, Virginia, show that Ptech was working with MITRE on FAA computer systems. As his on-line biography says, Belger, a 30-year veteran of the FAA, was Acting Deputy Administrator for the FAA for five years, from 1997-2002, leading the 49,000-person team and in charge of operating the world's safest aviation system. During his tenure with the FAA, Belger was the Associate Administrator for Air Traffic Services, responsible for day- to-day operations of the nation's airspace system, and supervised the FAA's modernization plan aimed at improving aviation capacity, safety and service to airlines. Belger played a pivotal role in assisting in the transition of aviation security responsibilities from the FAA to the new Transportation Security Administration, and he co-chaired the FAA's successful efforts to adopt acquisition and personnel reform. Belger retired from the FAA in September 2002. U.S. AVIATION TECHNOLOGY LLC      After he left the FAA, Belger became the "Vice President, Government Connection" of a small Israeli-run company based in the Fort Lauderdale area called U.S. Aviation Technology. The company was founded by Ehud "Udi" Mendelson, who described himself as "a captain in the prestigious Army Intelligence Unit of the Israel Defense Force." "Ehud received his BS Degree in Business and Economics from the Bar-Elan sic] University in Tel-Aviv, Israel. He holds a computer Network Engineer certification from Microsoft and Novel," according to his webpage. Company documents and information from the Israel Venture Capital Research Center website specifically name Monte Belger of Centreville, Virginia, as a Vice President and Government Connection of U.S. Aviation Technology LLC. Federal Whistleblower Mary Schneider www.maryschneider.us gets bogus mocking email from a 9-11 connected p-tech software company (Mitre) that was used to over ride the Pentagon computers on 9-11-2005 It was then Asst. Attorney General Michael Chertoff, now head of US Dept. of Homeland Security, that helped lobby for P-Tech Software pre-9-11.   Note: P-Tech Software is now linked to the destabilization of the US Radar and Defense Shield on 9-11 in which US Dept of Justice War games were used to masquerade and turn a mock drill into the real Black Op aka the 9-11 Attack on America. Reference: Both Vanity Fair and Lou Dobbs of CNN have now fingered the 9-11 Treason and Norad in disarray 911review  THE PTECH CUTOUT       Ptech, a mysterious software company has been tied with the events of 9/11. The Quincy, Massachusetts-based company was supposedly connected to "the Muslim Brotherhood" and Arab financiers of terrorism.  The firm's suspected links with terrorism resulted in a consensual examination by the FBI in December 2002, which was immediately leaked to the media. The media reports of the FBI "raid" on Ptech soon led to the demise of the company.  Ptech "produced software that derived from PROMIS, had an artificial intelligence core, and was installed on virtually every computer system of the U.S. government and its military agencies on September 11, 2001," according to Michael Ruppert's From the Wilderness (FTW) website.  "This included the White House, Treasury Dept. (Secret Service), Air Force, FAA, CIA, FBI, both houses of Congress, Navy, Dept. of Energy, IRS, Booz Allen Hamilton, IBM, Enron and more," FTW reported.  "Whoever plotted 9/11 definitely viewed the FAA as the enemy that morning. Overriding FAA systems would be the most effective way to ensure the attacks were successful," FTW reported. "To do this, the FAA needed an evolution of PROMIS software installed on their systems and Ptech was just that; the White House and Secret Service had the same software on their systems - likely a superior modified version capable of 'surveillance and intervention' systems."  But did the U.S. government unwittingly load software capable of "surveillance and intervention" operations and produced by a company linked to terrorism onto its most sensitive computer networks, or was Ptech simply a Mossad "cutout" company?  Oussama Ziade, a Lebanese Muslim immigrant who came to the U.S. in 1985, founded Ptech in 1994. But the company's original manager of marketing and information systems was Michael S. Goff, whose PR firm, Goff Communications, currently represents Guardium, a Mossad-linked software company.  And Goff comes from a well-to-do line of Jewish Masons who have belonged to Worcester's Commonwealth Lodge 600 of B'nai Brith for decades. So, why would a recently graduated Juris Doctor in Law leave a promising law career to join forces with a Lebanese Muslim's upstart company sponsored with dodgy funders in Saudi Arabia?  "As information systems manager for Ptech], Michael handled design, deployment and management of its Windows and Macintosh, data, and voice networks," Goff's website says. "Michael also performed employee training and handled all procurement for software, systems and peripherals."      AFP asked Goff, who left the Worcester law firm of Seder & Chandler in 1994, how he wound up working at Ptech. "Through a temp agency," Goff said. Asked for the name of the agency, Goff said he could not remember.  Could it be Mossad Temps, or maybe Sayan Placement Agency?  Goff, the original marketing manager for Ptech software, said he did not know who had written the code that Ptech sold to many government agencies. Is this believable?  Goff leaves a legal practice in his home town to take a job, through a temp agency, with a Lebanese Muslim immigrant who is selling software, and he doesn't know who even wrote the code?  AFP contacted the government agencies that reportedly have Ptech software on their computers, and IBM, to ask if they could identify who had written the source code of the Ptech software.  By press time, only Lt. Commander Ron Steiner of the U.S. Navy's Naval Network Warfare Command had responded. Steiner said he had checked with an analyst and been told that none of the Ptech software has been approved for the Navy's enterprise networks. http://911review.org/companies/Odigo/Mossa...Odigo_9-11.html  Sites.Google When compared to the media circus that surrounded the pretrial investigation and ultimate trial and conviction of Scott Peterson in 2005 for the murder of his wife Laci and unborn child Conner, the just concluded Neil Entwistle murder case doesn’t even register a whisper. This is very curious. The Neil Entwistle case had all the elements necessary for a media circus…a wife shot to death in her home along with her 9-month old daughter, plus an international angle where the suspect husband flees back home to England. One would think that programs such as Nancy Grace, Anderson Cooper 360, Verdict with Dan Abrams and Larry King Live would have milked the tragedy for all it was worth as they had the Scott Peterson case or the still unsolved 2005 disappearance of Natalee Holloway in Aruba incident, but there was no coverage. This silence is a story in itself. Except for periodic coverage of the trial on Court TV, the only mention in the media of Neil Entwistle after wife Rachel and daughter Lillian were found dead were two curt dispatches announcing Neil’s arrival back in the United States in February 2006 to stand trial, and his conviction on June 25, 2008. That’s it! What caused this self-imposed media blackout costing valuable advertising dollars? Before we get to that story, let’s first examine the many oddities that swirl around the Neil Entwistle case. The first sign that something was amiss was Neil Entwistle’s extradition flight back to the United States. Instead of flying coach on a commercial airliner as is usual in extradition cases, Neil, in the custody of United States marshals, was "…returning to the U.S. on a private flight" according to British police.1 Hold on, though. The flight back to the United States gets even more interesting. It would seem not only were authorities in Massachusettes interested in getting Neil Entwistle back to the United States, and in a comfortable fashion no less, but so was the Central Intelligence Agency, because the "private flight" Neil flew back on was, according to former NSA officer Wayne Madsen, a "CIA
  • 31. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Gulfstream…previously used to fly "renditioned" Al Qaeda suspects around the world."2 Madsen reports "After questions were raised from reporters] about the use of the Gulfstream, Massachusetts authorities claimed it had merely "rented" the U.S. government’s aircraft for the sole purpose of transporting Entwistle."3 This explanation is, of course, ludicrous. Agency aircraft are not lent out. Such an action would constitute a serious security breach even if the temporary passengers were Americans. The story gets even odder! After initially landing at "Bangor, Maine, to pass customs, Neil Entwistle] then flew to…Hanscom Air Force Base in Bedford, Mass."4 So instead of flying directly to Boston Logan Airport, first the CIA Gulfstream lands at Bangor, Maine to pass customs then proceeds to Hamscom Air Force Base. Of course, this round about process could have been handled more expeditiously by landing at Boston Logan Airport in the first place. Then again if Neil Entwistle had landed at Boston Logan Airport, reporters there would not have been so restrained in their coverage of his return as they would be on a military base. Madsen notes one aspect of the media’s restraint at Hamscom as "TV footage of the aircraft CIA Gulfstream] studiously avoided showing the plane’s tail number."5 You’re probably thinking to yourself this is one strange story, and it couldn’t get any stranger. Wrong. Like a good thriller (or a bad thriller), the odyssey of Neil Entwistle goes seriously serpentine. Madsen reports, "Entwistle’s firm, Embedded New Technologies (ENT), reportedly had connections to the Braintree, Massachusetts-based firm P-Tech, which was investigated subsequent to 911 by the FBI for ties to Muslim Brotherhood financiers linked to Al Qaeda. P-Tech also had software contracts for the FAA, NORAD, Pentagon, and White House during the 9-11 terrorist attacks."6 Well, well, well, that would certainly explain the keen interest the CIA had in Neil Entwistle. If you remember, during the 9/11 attacks FAA radar was continuing to pick up false contacts after the NORAD war games going on that morning were called off, confusing Air Traffic Control’s response to the attacks.7 Was this the work of P-Tech who we learn had a software contract with the FAA during the 9/11 attacks? Before we answer that question, we need to know who was behind P-Tech - where did P-Tech get its financing - and how did P-Tech become such an influential provider of software to departments and agencies of the United States government? A senior consultant to JPMorganChase and Risk, Indira Singh was tasked in April 2002 with developing a next-generation, operational, risk blueprint that "would proactively identify exposures, including money laundering, rogue trading, and illicit financing patterns."8 Indira reached out to the top people in her profession for recommendations on software companies that could assist her on the project. The responses Indira got were unanimous. P-Tech, a software company based in Quincy, Massachusetts, would fit the job Indira was told. Indira invited representatives from P-Tech to pay a visit to her firm for a demonstration of the company’s software. When they arrived alarm bells immediately started to go off in Indira’s head. P-Tech hadn’t brought the software to the demonstration, but assured Indira that they could develop the software on the laptop they had brought with them. All they needed to do was hook onto the Internet at the workstation Indira had prepared for the demonstration. This is a serious breach of standard operating procedure in the software business, for at the end of the day, according to Indira, "he’s walking out the door and I don’t have anything and he’s walking away with pretty much enough of how we’re thinking about doing operational risk. Operational Risk is about how to spot bad things that are going on in a financial institution, things like rogue trading, money laundering, and so on and so forth."9 With the P-Tech representatives still on site, Indira excused herself and called several colleagues who had initially recommended P-Tech to her. When she informed one individual that P-Tech was on site, the individual asked why she brought them to her work place. The individual advised Indira to watch them closely. These responses were not what Indira expected, especially from individuals who had recommended P-Tech to her. And so started an eight month odyssey where Indira learned from P-Tech employees and FBI agents that P-Tech was a "cutout", "a front…a regular CIA front…"10 Indira also learned that P-Tech’s main financing came from Yassin Al-Kadi, a Saudi businessman, according to Jeff Goins, Vice President of Sales for P-Tech. With this information, Indira went online and discovered that Yassin Kadi had been placed on the FBI terror list in October, 2001.11 On June 28, 2002 Indira Singh was fired from JPMorganChase because she refused to stop investigating P-Tech and warning other businesses and clients of P-Tech’s terrorist linked financing. On December 5, 2002 U.S. Customs, FBI, IRS, Secret Service, INS and the Massachusetts State Police raided the Ouincy, Massachusetts offices of P-Tech.12 The raid, however, was a fraud. The only reason P-Tech was raided was due to the incessant and embarrassing questions Indira was asking about the company and its terrorist linked financing. After the raid P-Tech changed its name to Go Agile, and the FBI investigation fizzled out. One can now begin to appreciate the reason for the media blackout on the Entwistle case. P-Tech was a "protected" company used by elements within the United States intelligence community. P-Tech’s software allowed the United States intelligence community to manipulate computer networks, such as placing phantom radar contacts on FAA radar monitors during the 9/11 attacks. Just the type of work Entwistle was involved with according to the latest from Wayne Madsen: " Madsen] has recently learned from knowledgeable U.S. Intelligence Community sources that Entwistle's contract for P-Tech involved "wiring backdoors" into the computer systems of the FAA, NORAD, Pentagon, and White House to bring about the operational collapse of the computer systems during the morning of 9/11."13 So did Neil Entwistle kill his wife? The forensic evidence supports what Neil Entwistle and defense council maintained at the trial, that Rachel Entwistle murdered her nine-month old child and then killed herself. The police found no gunshot residue in Neil’s car,15 but did find gunshot residue on Rachel’s hands.16
  • 32. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] So why did Neil Entwistle flee to England? If he was innocent, certainly fleeing the country is a good indicator that he was guilty, one might conclude. Fleeing the scene of a crime, or the country where the crime was committed, is not proof of guilt. For instance, an innocent individual who witnessed a murder but didn’t know the murder victim, or an innocent individual that witnessed a murder and did know the victim, but knows that the authorities would have no reason to believe he/she witnessed the murder, flee such crime scenes all the time, and usually do so because the witness doesn’t want to be wrongly implicated in the crime. Running in this instance, however, would present more problems for Neil Entwistle than remaining to face the authorities’ questions. Since Neil Entwistle was the husband and father of the victims, there is every reason for the authorities to suspect that he was the murderer, and therefore there would be no good reason for him to run if he didn’t want to compound the authorities’ suspicions. Unless. Unless you worked for a terrorist funded software company that sabotaged the United States defense computer network on September 11, 2001, thereby resulting in the deaths of 3,000 individuals. With such knowledge, and now with the spotlight thrown on you thanks to your wife’s suicide and the murder of your baby, you might get the feeling that someone out there may try to silence you, not necessarily because they think you will give something away, but because you might give something away. One can understand how Neil Entwistle would feel safer in England. Ironically enough the dearth of media attention in the Neil Entwistle case may afford him better prospects in a new trial. If Neil Entwistle does get a new trial, let it not take place in Middlesex. Emotions there are just too high to afford Neil Entwistle a fair and impartial hearing. One final note. What of the adult websites Neil Entwistle visited days before the deaths of Rachel and Lillian?17 Well, before you jump to conclusions, could Neil Entwistle have been encoding those sites for the FBI? You find that difficult to believe? Then why didn’t the prosecution present the witnesses that Neil Entwistle had extramarital relationships with? Those witnesses would have been quite easy to find. The reason no such witnesses were presented by the prosecution is because Neil Entwistle wasn’t trolling those websites for personnel reasons. He was literally on the job when he was in those adult websites!     Zawahiri_Negroponte Letter    top PROGRESSIVE  REFERENCE CONSERVATIVE 1%* Dailykos   "Zawahiri Letter to Zarqawi: A Shiite Forgery?  The Arabic text of the recently released letter alleged to be by Zawahiri (al-Qaeda's number two man) to Abu Musab al-Zarqawi in Iraq raises questions for me as to its authenticity.  The very first element of the letter is the blessing on the Prophet. It says: al-salah wa al-salam `ala rasuli'llahi wa a-lihi wa suhubihi . . . (peace and blessings be upon the Messenger of God and his family and his companions . . .)  the phrase "salla Allahu `alayhi wa alihi wa sallam" (the blessings and peace of God be upon him and his family) is a Shiite form of the salutation, because of the emphasis of the Shiites on the House or descendants of the Prophet. Because of the cultural influence of Shiism in South Asia, one does find that form of the salutation in Pakistan and India among Sunni Muslims." Juan Cole search Zawahiri hoax letter, Negroponte Washington Post  "The 6,000-word letter from Osama bin Laden's chief lieutenant, Ayman Zawahiri, to Iraqi insurgent leader Abu Musab Zarqawi amounts to a detailed portrait of al Qaeda's long-term goals in Iraq and the Middle East, and includes a striking critique of how Zarqawi has gone about waging his war against not only U.S. troops but also Iraqi civilians. The letter was posted yesterday on the Web site of Director of National Intelligence John D. Negroponte -- http://www.dni.gov/ -- after senior intelligence officials released excerpts of it last week." CNN Zarqawi says the letter is a fake GOPUSA Zawhiri Letter Draws Increasing Skepticism Office of the Director of National Intelligence, Negroponte Zawahiri, Zarqawi hoax letter, copy "Among the letter's highlights are discussions indicating: & The centrality of the war in Iraq for the global jihad.  &  From al Qa'ida's point of view, the war does not end with an American departure.  &  An acknowledgment of the appeal of democracy to the Iraqis.  &  The strategic vision of inevitable conflict, with a tacit recognition of current political dynamics in Iraq; with a call by al-Zawahiri for political action equal to military action.  &  The need to maintain popular support at least until jihadist rule has been established.  &  Admission that more than half the struggle is taking place "in the battlefield of the media."   .... Al-CIA-duh Al-CIA-duh: Is Patrick Fitzgerald a Zealous "Independent" Prosecutor or Experienced Cover-up Artist? Tuesday, October 25, 2005 - 03:22 AM, - Posted by valis (7751 Reads) SOURCE
  • 33. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] W/LINKS: http://valis.cjb.cc/index.php?name=News&file=article&sid=100 "Coincidentally, the U.S. Attorney for Chicago, Patrick Fitzgerald, on the job for only a couple of weeks, had extensive experience as a terrorism prosecutor and immediately became involved in the investigation of BIF Benevolence International Foundation] and GRF Global Relief Foundation]"  # National Commission on Terrorist Attacks Upon the United States Terrorist Financing Staff Monograph Chapter 6 - The Illinois Charities Case Study PDF | HTML] And "Fitzgerald immersed himself in the case and took a major role"? Well, this was quite a "coincidence." In this post Re: FRANK RICH: It's Bush-Cheney, Not Rove-Libby!!!!, I explained that Fitzgerald also was part of the prosecution team in the Omar Abdel Rahman case. Just to recap this, the prosecutors in the Rahman case didn't want their case thrown out on "national security" grounds, so they were careful to totally leave the CIA out of the picture. The leading prosecutor even claimed that when they discovered this "mujahideen" paramilitary training by Rahman's followers, "the FBI’s concern was that the group could be violating federal 'neutrality' laws." Of course, everybody knows that the US was not "neutral" in the Afghan war, and US officials publicly eulogized the "mujahideen" as "freedom fighters." I think that Fitzgerald's role in the Rahman case indicates that the Valerie Plame case will remain as matter of "Rove-Libby," and not "Bush-Cheney." After examining Fitzgerald's role in the GRF & BIF cases, I am even more convinced that this Valerie Plame case will not reach the "Bush-Cheney" level. Just look at the outcome of the BIF & GRF cases. As soon as the investigations reached those close to higherups in Washington, the prosecutors seemed to spend more time on a coverup, than on pursuing a bona fide investigation. Then attorney general Ashcroft kept a tight rein on the BIF-Arnaout case. "The case fell apart and Arnaout was convicted only of fraud." The terrorism charges were dropped and the DOJ reached this plea deal with Arnaout. It doesn't look like the feds ever even intended to bring a criminal case against the Haddad or the GRF. The plan seemed to be to lock him up until they got him out of the country. "The decision to deport him rather than continue the criminal investigation was made in Washington, without consultation with the Detroit case agent who had investigated Haddad"? I think that the feds opted to skip a public trial and to get Haddad deported because Haddad had worked directly with the Bin Laden, Azzam, & MAK. With Arnaout, he did work for MAK, but there was more distance between him & the hierarchy of the MAK. GRF co-founder "Rabih Haddad had worked for years for bin Laden‘s and Azzam's] Makhtab al-Khidamat, which supported the tens of thousands of Arabs who rushed to Afghanistan to join the anti-Soviet resistance in the 1980s." A GRF attorney said "The United States also supported that organization Makhtab al-Khidamat] then." This is true. A BIF attorney also correctly stated that "Mr. Arnaout's activities in war-torn regions like Afghanistan in the 1980's and Bosnia in the 1990's came on behalf of many of the same rebel fighters the United States was backing then." I think this is the main reason why Fitzgerald came to have such a "major role" in these cases. He had already proved himself in the Rahman case, as someone who knew when to limit the scope of these inquiries. Quite frankly, if he didn't have this reputation, I think that the Bush administration would have found a way to get him off the Valerie Plame case. It came out in the Kifah Waed Jayyousi case that Rahman's followers had "a network across North America to fund-raise for and recruit mujahedeen to train and fight in various areas including but not limited to Bosnia, Kosovo, Chechnya, and Somalia." Jayyousi "was transferring money intended for Chechen militants through the Global Relief Foundation." Fitzgerald would have been well aware of a connection between the GRF and the followers of Sheikh Omar Abdel Rahman through Alkifah and Wadih El Hage: "At the beginning of the Afghan war against the Soviet Union, El Hage left Louisiana and traveled to Pakistan to enroll in mujahedeen war training programs. Thousands of young Arab men from around the world flocked to Pakistan to help the Afghans expel the Soviets. Sources told FRONTLINE that El Hage was a follower of Sheik Abdullah Azzam, one of the most important spiritual leaders of the Arab mujahedeen forces. Azzam preached that the war in Afghanistan was a jihad, or holy war, and that those who participated would have a special place in heaven... In early 1991, according to El Hage's grand jury testimony, he was called to New York to help direct the Alkifah Refugee Center, a Brooklyn-based group that raised money to support veterans of the Afghan war. According to documents from the World Trade Center case, Alkifah had a Tucson office and contacts with the main mosque in Arlington, Texas, and family members confirmed that El Hage had been in contact with the group." " Azzam was also involved with Brooklyn's Alkifah group. During the CIA’s Jihad, to the “US intelligence community,” "Azzam was considered a prime asset because of his close connections to the Muslim Brotherhood, Saudi intelligence, and the Muslim World League." Note that Rahman himself had received four visas from "CIA agents acting as consular officers at American embassies in Khartoum and Cairo." Alkifah in Brooklyn “became the de facto headquarters of” Rahman. This was the springboard for building up this "string of jihad offices that had been set up across America with the help of Saudi and American intelligence.” This network didn't dry up after the Cold War ended. It came out in Rahman's trial that his followers were receiving funds from the Saudi embassy in Washington to recruit for Bosnia. See: Al Qaeda Recruited U.S. Servicemen: Testimony Links Plot To Saudi Gov't. Alkifah followed suit: ARAB VETERANS OF AFGHANISTAN WAR LEAD NEW ISLAMIC HOLY WAR Oct. 1994] "The Al-Kifah, or Struggle, Refugee Center in New York, which used to recruit and raise funds for Mujahedeen headed for Afghanistan, last year announced it was switching its operations to Bosnia. It was established in the mid-1980s by Egyptian Mustafa Rahman as a joint venture with Sheikh Omar Abdel-Rahman, spiritual leader of Gamaat al-Islamiya." If the FBI wanted to know what the GRF & BIF were doing and where the money was going, they didn't have to rely on what they found in trash bins. The GRF & BIF didn't exactly keep their agenda a secret. It was known for years that these "charities" did a lot more just than feed starving kids. This List of Muslim Relief Organizations was published by the Muslim Students Association of the USA and Canada in the 1990's. The BIF & GRF are listed:
  • 34. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Benevolence International Foundation PO Box 548, Worth, IL 60482 USA Tel. 708-233-0062 Fax. 708-233-0069 Email: bif@benevolence.org URL: www.benevolence.org Focus: Benevolence International Foundation (BIF) is a humanitarian organization dedicated to helping those afflicted by wars. BIF first provides short-term relief such as emergency food distribution, and then moves on to long term projects providing education and self-sufficiency to the children, widowed, refugees, injured and staff of vital governmental institutions. Current list of projects include running refugee camps, hospitals and clinics, sponsoring orphans, operating vocational and computer centers, and conducting seasonal projects. Established in 1987, BIF is currently conducting projects in five countries including Azerbaijan, Bosnia, Chechnya, Daghestan, and Tajikistan. BIF is incorporated in the state of Illinois, USA as a non-profit, humanitarian organization and coordinates its efforts through an office in Chicago. BIF is solely supported by private donations and does not receive any governmental assistance. Entry updated: Apr 1999. ....... Global Relief Foundation PO Box 1406, Bridgeview, IL 60455 Phone: 1-888-256-2532 (1-888-ALNAJDA) Phone: 708-233-1473 Fax: 708-233-1474 Email: talk2grf@aol.com Email: info@grf.org URL: www.grf.org US Tax ID#: 36-3804626 Focus: Chechnya, Kosova (Kosovo) and other places. You can ask for a documentary illustrating the genocide in Kosovo. You can use this documentary to create awareness and raise funding for Kosvo. You can order English/Arabic. Entry updated: Dec 1999." In 1992, the GHW Bush administration decided that Izetbegovic was their man to lead the Bosnia "jihad." Warren Zimmerman, U.S. Ambassador in Belgrade "persuade d] Izetbegovic to renege on the Lisbon peace] agreement, promising him all political, diplomatic and military aid if he agreed to do so." The GHW Bush & Clinton administrations "pulled the strings from the background, encouraging the world-wide Moslem agitation in favor of Izetbegovic." Many of these "strings" were in the Bin Laden network. As to Kosovo, Kosovo Liberation Army (KLA) training camps in Albania were "run by Osama bin Laden, and various other foreign mujahedeen" and also by the "CIA and British intelligence." And "the CIA seems to have provided monetary support." There was a civil war in Kosovo with atrocities on all sides, but there was no "genocide." Kosovo - the site of a genocide that never was. In other words, after the Cold War, the CIA & the Pentagon continued to use this same network of "charities," like the BIF & GRF, to serve US strategic aims. Batterjee was "affiliated with a group of wealthy donors from the Persian Gulf region known as the 'Golden Chain'"? This Golden Chain was a huge Pandora's box, which shows that the BCCI never was really shut down. Just some of the names of the fronts changed. After Fitzgerald took on a leading role in the BIF investigation, the feds made a plea deal with Arnaout, dropping the terrorism charges and ending any further investigation of the case. Now the last time I looked, Bin Laden's Al Qaeda was officially called a "terrorist organization." So there was no lack of evidence. The evidence just led to directions where the higherups in Washington didn't want to go. How many references do you see to the Muslim World League MWL], the Binladens, Bin Mahfouz, & Abdullah Taha Bakhish on this Golden Chain? According to the DOJ's own documents in the Arnaout case, this is "a list of people referred to within Al Qaida as the 'Golden Chain,' wealthy donors to mujahideen efforts." This was found in a file called "Osama's history" in the BIF office in Bosnia. The CIA had used the BCCI to channel the funds "to CIA client Osama bin Laden, part of the $2 billion Washington sent to the Afghani mujahideen." Bill Clinton's old pal in Arkansas, Jackson Stephens, arranged a BCCI "bailout" for George W. Bush's Harken. "A board seat was given to Harken shareholder Sheikh Abdullah Taha Bakhsh, whose chief banker was BCCI shareholder Bin Mahfouz." You may also remember Jackson Stephens and the Riadys from the Clinton "China-gate" scandal. In 1984, Mochtar Riady bought "a stake in the Worthen holding company whose assets include the Stephens- controlled Worthen Bank....Other Worthen co-owners will eventually include BCCI investor Abdullah Taha Bakhish." Jackson Stephen had bankrolled both Republican and Democratic campaigns. It is also clear from this 9-11 Commission's staff report account that the CIA was working with the FBI on both the BIF & GRF cases prior to 9-11 and the Patriot Act. Apologists for the Patriot Act claim that this was needed to authorize communications and "intelligence sharing" between the FBI and CIA or other intelligence agencies. Of course, since the BIF & GRF involved the protection of former and current CIA "assets," the "CIA held back some information" in dealing with the FBI. Also one way to kill an investigation is to make inflated claims, which if disproved, can bring down the entire case. I think that the WMD in these "charity" cases was really a stretch, and I think that when the investigation was diverted into this direction, that it was headed for a deadend. Also this could have served as a rationale for Haddad's deportation. Unproven weapons claim led to Islamic charity raid in '01 "This plan went awry when word of the impending action apparently leaked to GRF. FBI personnel learned that some of the targets of the investigations may be destroying documents"? There is some question as to Judith Miller's involvement in "alerting" the GRF of action to freeze their assets. We do know that Judith Miller had connections to the Pentagon & other top Bush officials and that she did play a role in the disinformation about Saddam's WMD. Last year, Chicago U.S. Attorney Patrick J. Fitzgerald "informed the New York] Times by letter...that his office has subpoenaed telephone company records" of reporters Philip Shenon and Judith Miller. "The move is part of an effort to determine whether anyone in the government told Times reporters of planned federal asset seizures in December 2001" at the GRF's office. "The FBI believes that a call from a reporter to a representative of the charity, the Illinois-based Global Relief Foundation, may have led to the destruction of documents there the night before the government's raid, according to findings by the Sept. 11 commission." It is possible that Shenon & Miller were the channel for this "alert" to the GRF. However, this "alert" could have come from a number of sources through channels in the US "intelligence community," in ways that could not be traced back to the source. There is also a question of exactly how much damage that this destruction of evidence may have done to the prosecutors' case. It is very unlikely that there was ever any serious intent to prosecute Haddad or anyone else in the GRF. The Bush administration certainly seemed in a rush to get him out of the country, and this plan was brought to fruition after "Fitzgerald immersed himself in the case and took a major role." By BlackJade   Zawahiri 'Letter' Draws Increasing Skepticism  By Sherrie Gossett  CNSNews.com Staff Writer  http://www.gopusa.com/news/2005/october/1018_zawahiri_letter2.shtml  October 18, 2005  file (CNSNews.com) -- A letter purportedly written by a senior al Qaeda leader -- and said to be authentic by U.S. intelligence officials who released it last week -- may be a forgery, according
  • 35. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] to Washington analysts who cite numerous anomalies in the text.  Some analysts have gone so far as to label the letter a likely U.S. government "influence operation," which, if exposed, threatens American credibility in the Middle East.  "If this is a forgery, then either it was designed to blow up in the face of the American government; or someone in the 'coalition of the willing' has been caught with their pants down," said one analyst, who spoke with Cybercast News Service on the condition of anonymity.  The 6,000-word letter was dated July 9 and released Oct. 11 by the U.S. Office of the Director of National Intelligence. Intelligence officials said the letter, purportedly penned by Osama bin Laden's chief deputy Ayman al-Zawahiri and addressed to Iraqi terror mastermind Abu Musab al-Zarqawi, was intercepted in a counter-terrorism operation in Iraq.  Stephen Ulph, from the foreign policy think tank, The Jamestown Foundation, noted that despite the confidence U.S. officials expressed in the letter's authenticity -- namely that it had been verified by "multiple sources over an extended period of time" -- there was little in the way of independent corroboration offered.  The anonymous source remarked that the U.S. "apparently found the original letter, suggesting we 'closed the loop' and have been reading mail of senior al Qaeda for months, yet we appear to not know where al Qaeda leaders] are at."  Christopher Brown, research associate at the Hudson Institute's Transitions to Democracy program, doubts that Zarqawi was even in Iraq at the time the letter was purportedly written to him, an opinion shared by a retired U.S. intelligence operative who spoke recently with Cybercast News Service.  In email communications with Cybercast News Service last week, Brown also pointed out that Zawahiri uses both Muslim and Christian dates in his letter. The use of Western dual dates is customarily done only for material designed for western consumption, not for internal communications, he said.  The letter, dated July 9, also makes no reference to the July 7 London bombings, Brown noted.  Zawahiri purportedly mentions in the letter that he has a daughter named "Nawwar," which he explains "means the timid female gazelle and the woman who is free from suspicion ..." But Brown questioned why Zawahiri would feel the need to explain the meaning of an Arab word to another Arab.  Furthermore, Zawahiri's alleged definition of "Nawwar" as "timid female gazelle" is incorrect, according to translators with Transperfect Translations, a global translation firm. "Nawwar means: blossom, flower, bright as in illuminated. It also could be a nice female's name, and by extension could be the beginning of the spring season," said the translators.  >> Continued -- Page 1 2 Page 2 of 2 The letter notes the effectiveness of Pakistani military operations, yet there is little evidence to support that idea, Brown said, except for a three- to four-week period in May when Pakistani anti-terrorist operations were conducted with U.S. assistance.  The Zawahiri letter, if genuine, makes no mention of al Qaeda working "within Iranian strategy" in Iraq, Brown said. That strategy and the accompanying tactics, he added, are serving the terror network's own goals in Iraq as well as those of Iran.  " B]y declaring all-out war on the Shi'a, al Qaeda is] driving the Shi'a population further into the hands of the Iranians, who can provide them with security through both their own organizations and what I would venture to say is their either formal or informal control over al Qaeda," Brown said.  "Therefore, the areas that cooperate with the U.S. get hit and the areas that cooperate with Iran become safe havens. This is in addition to their increasing control over the social services, security organizations and most importantly, the political institutions on both the national and local levels," he added.  Aegis Defense Services, a London-based consultancy, has argued that the letter, addressed to Zarqawi, was actually sent to Abu Musab al-Suri, a Syrian who acted as an intermediary for al Qaeda in Europe during the 1990s and whose whereabout are unknown, according to the Financial Times of London.  A Washington Post editorial by David Ignatius cited skepticism voiced by Juan Cole, professor of history at the University of Michigan. Cole had contended on his website that the salutation of the letter was Shiite, not Sunni and may have been the work of Iranian operatives.  There is speculation about the potential political fallout, especially for John Negroponte, U.S. director of national intelligence, if the letter is discovered to be propaganda generated by the U.S.  The cabinet-level position that Negroponte holds coordinates all 15 components of the American intelligence community. It was created in response to one of the recommendations of the 9/11 commission. Negroponte serves as the principal intelligence adviser to the president and the statutory intelligence advisor to the National Security Council.  "If and when this breaks, the blowback of this kind of American hand-in-the-cookie jar could severely hurt us in the Middle East, Europe and with an already skeptical American media that would likely declare all-out war on the administration over this," the Cybercast News Service source requiring anonymity said.  Ulph added that "pending further confirmation of origin, it would be wise to treat the letter with skepticism."  Copyright © 1998-2005 CNSNews.com - Cybercast News Service fair use   Guantanamo, retraction, from APFN email May 16, 2005 - Bill Moyers' speech to the National Conference for Media Reform Call it preventive capitulation. —FREEPRESS.NET, Tue May 17 17:57 ATTN: STAFF OF NEWSWEEK: About your retraction.... —Eric A. Smith, Tue May 17 http://disc.server.com/Indices/149495.html   Eric A. Smith ATTN: STAFF OF NEWSWEEK: About your retraction.... Tue May 17, 2005 18:13 http://disc.server.com/discussion.cgi?disc=149495;article=83899;title=APFN -------- Original Message -------- Subject: About your retraction.... Date: Wed, 18 May 2005 04:38:56 +0900 From: Eric Smith snowdog@juno.ocn.ne.jp To: constitution@ajc.com CC: apfn@apfn.org, "t r u t h o u t" messenger@truthout.org, To Mark Whitaker and the staff of Newsweek: If you back down from the truth, you'll send a very clear message to the billions worldwide who are really paying attention to what this "Administration" is doing. Incidents
  • 36. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] of guards flushing copies of the Quran have been documented on multiple previous occasions by people who were released -- because they were innocent. For example: (ABC Radio Australia, August 5, 2004) Guantanamo Bay freed ex-prisoners David Hicks and Mamdouh Habib are quoted as saying that "guards would throw detainees' Korans down the toilet and shave them, to try to get them to abandon their Muslim faith." (ABC News's John Berman, August 3, 2004) Another British citizen also released from Guantanamo Bay is quoted: "Asif Iqbal says guards would 'kick the Koran, throw it in the toilet, and generally disrespect it.'" (Lawsuit, October, 2004) Four Britons wrongly detained by the U.S. repeated the charge in court proceedings. (Houston Chronicle, March 2003) 18 released Afghanis said "American soldiers insulted Islam by sitting on the Koran or dumping their sacred text into a toilet." (Washington Post, March, 2003) "Ehsannullah, 29, said American soldiers who initially questioned him in Kandahar before shipping him to Guantanamo hit him and taunted him by dumping the Koran in a toilet. 'It was a very bad situation for us,' said Ehsannullah, who comes from the home region of the Taliban leader, Mohammad Omar. 'We cried so much and shouted, "Please do not do that to the Holy Koran." (Seattle Times, January 9, 2005) Captain James Yee, quoting Guantanamo Bay former superintendent Command Sgt. Maj. John VanNatta: "One of their biggest complaints was of guards kicking their Qurans, flushing them down the toilets and disrespecting their religion." It is very, very frightening to see a major force of journalism so patently buckle under pressure,,, this nudges us one step closer to the precipice of fascism. sincerely, Eric A. Smith Tokyo ===================== Newsweek must do more about Koran case: White House ABC News - 4 hours ago May 17, 2005 — WASHINGTON (Reuters) - The White House called on Newsweek magazine on Tuesday to help repair damage to the US image in the Muslim world by its ... Newsweek retracts story that killed 16 Australian State Dept. Tries to Undo Newsweek Damage San Francisco Chronicle Newsweek Retraction Has Hollow Ring for Some Pakistanis Washington Post NPR (audio) - Arizona Republic - 'Newsweek' article a traitorous act Arizona Republic, AZ - 14 hours ago I am upset and dismayed at the report that Newsweek published an article about the desecration of the Koran by US interrogators. ... http://www.azcentral.com/arizonarepublic/opinions/articles/0517tuelets172.html White House: Newsweek Story Did Great Harm Guardian Unlimited, UK - 21 minutes ago By TERENCE HUNT. WASHINGTON (AP) - The White House said Tuesday the United States' image abroad had suffered irreparable damage from ... http://www.guardian.co.uk/worldlatest/story/0,1280,-5012689,00.html Free Press is a nonpartisan organization working to involve the public in media policymaking and to craft policies for more democratic media. Learn more» http://www.freepress.net/   Democracy Rising "Congressman Edward J. Markey (D-MA) has taken the lead on working toward ending torture by U.S. officials or by "rendition" of suspects to foreign governments for torture there. He has introduced, along with 48 colleauges, H.R. 952 the Torture Outsourcing Prevention Act FAS Italy kidnappings, torture, U.S.  Secret prisons, prison ships, planes, Italy, kidnapping. CBS News Extraordinary Rendition..."the government policy wherein terror suspects are transferred from U.S. control into the control of foreign governments, so that interrogation methods that are not permitted under U.S. law may be applied to the suspects" International Criminal Court Protection New York Times : Bush: Iraq War prisoners not entitled to Geneva Convention rules Alternet search, 9/11 Center for Defense Information arms trade, children in war, missile defense info Findlaw, War on Terrorism Special coverage  Global Policy Watching
  • 37. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Zionism, 9/11 News from Russia  Pravda, Israel, search Non Violence USA International Relations and Security Network, Swiss Contribution to the Partnership for Peace Newstrove, Guantanamo Bay World Court, International Court of Justice American Center for Law and Justice search American CONSERVATIVE 1% Union Action Alert lobbyists  Anti Terrorism Coalition, Islam is taking over the orld  BioPort anthrax vaccine manufacturer KOLIsrael Danger Zone Jobs.com Debka File search National Review search on zionist, 9/11  National Strategy to Secure Cyberspace Whitehouse, Bush, Cheney, 'war on terrorism' Alternet search, Guantanamo Amnesty International, UK Guantanamo Bay, latest news, releases Center for Constitutional Rights, watching the events of Guantanamo, detainees, Supreme Court decisions. Center for Defense Information arms trade, children in war, missile defense info FAS search National Intelligence estimate  Global Policy Watching Guantanamo Here-Now, Supreme Court decision on Guantanamo  and related stories. Boston NPR News Source  Human Rights Watch News from Russia  Pravda, Israel, search Palast, Greg, UK  Guantanamo search. Discourse.net CIA, Pentagon inquiry  Findlaw, War on Terrorism Special coverage Guantanamo.com from World News International Relations and Security Network, Swiss Contribution to the Partnership for Peace International Committee of the Red Cross, why did they wait months to report Iraq prison abuse.  Newstrove, Guantanamo Bay Human Rights First, formerly Lawyers Committee for Human Rights Justice, Dept of  press releases  Judicial Watch   World Court, International Court of Justice American Center for Law and Justice search American CONSERVATIVE 1% Union  Anti Terrorism Coalition, Islam is taking over the world Action Alert help ACU lobby Congress on these issues   Council on Foreign Relations corporate power to rural poor Republicans Debka File search Global Security Guantanamo Bay, Camp X-Ray. Guantanamo Bay Naval Station official site. Israeli Minister of Foreign Affairs National Review search on Guantanamo Bay, Rich Lowry Townhall search Washington Institute for Near East Policy US   Anthrax Vaccination Immunization Program Army cover-up Carlyle Group.net Center for Defense Information arms trade, children in war, missile defense info Gulf War Vets Anthrax vaccine deaths info IACenter Founded by Ramsey Clark News from Russia  Pravda, Israel, search  News Insider search New World Peace FBI incriminated in anthrax mailings NucNews you send articles, news, search BioPort Palestinian Non-Governmental Organization's Network rule of law, social justice, respect for Human Rights, links Vaccination Liberation hoax info, links Vaccination News vaccines, autism, shaken baby syndrome. links What Really Happened anthrax hoax  FDA search UCLA dept of Epidemiology, Bioterrism National CFIDS Foundation Chronic Fatigue Immune Dysfunction, ME, Myalgic Encephalopathy Safety Alerts consumer product safety recall info, news UCLA, Dept of Epidemiology, School of Public Health  Agilent Anthrax Vaccine Immunization Program  Official U.S. site Battelle Memorial Institute develops new tech, commercializes products  Bayer, has Cipro patent, anthrax. BioMed Central the-Scientist.com, news, BS, Research BioPort anthrax vaccine manufacturer  CIDRAP Center for Infectious Disease Research & Policy FDA search FDA News Drug industry news, daily Gulf War Medical Research Library  Harvard, Risk of death, bioterroism, 1 in 56 million Hollister-Stier Labs in partnership with BioPort National Acadamies Press articles on Agent Orange, dioxins, TCDD National Center for Biotechnology Information National Library of Medicine, NIH NTI Security News  PNNL, neural network, protein research, operated by Battelle, with Agilent  TEVA Pharma, Cipro, patent, anthrax vaccine NFU visitors: altaec233.nbcuni.com (Nbc Universal) New York, New York,  sc215019.robins.af.mil (78 Cs/scsc), dma-cs-proxy.dm.af.mil (355th Communications Squadron,pomproxy.monterey.army.mil (Presidio Of Monterey, wdcsun17.usdoj.gov (Us Dept Of Justice), gao-ng.gao.gov (U.s. General Accounting Office) Maryland, Upper Marlboro, Maryland, Potomac, cheetah.usafa.hpc.mil (Dod Network Information Center)Ohio, Columbus, wdcsun24.usdoj.gov (Us Dept Of Justice) Maryland, Potomac, The Washington Post- Kaplan Inc)      ip68-13-155-193.om.om.cox.net (Cox Communications Inc) Nebraska, Boys Town   pc24-27.apg.army.mil (Headquarters Usaaisc) Maryland, Aberdeen  hqvf.centcom.mil (U.s. Central Command (uscentcom))  athena.afrc.af.mil (Hq Afrc/sco) Georgia, Warner Robins   intziabcizn01.iraq.centcom.mil (Dod Network Information Center --NewsFollowUp.com visitor,  blv-proxy-05.boeing.com (The Boeing Company) Washington, Seattle   proxya.scott.af.mil (Air Mobility Command Comp/systems Squadron) Illinois, Scott common franklingate terms: ak sar ben albert foods alberto gonzalez alisha owen amato andersen, harold aquino, michael army of the night baack dennis baer, max baer, max baird holz zeilinger bi-sexual bobby eberle bonacci boystown bradford brian burzynski BSCT byrnne randall call-boy carlton-ritz casseday catholic cia citron, peter clatty commercial federal savings conagra coos bay lehman copple cornwall craig spence creager credit union crist david ambrose david hinton decamp dick roth discovery channel duke cunningham dwight harris ed owens eisenstatt ernie chambers fbi foggo foley fort bragg foster care review board frank figueroa franklin advisory board gannon guckert gannongate gerry falwell gopusa hambright hitler youth hotmilitarystud iran-contra james dobson james duffy james gannon james kelly john queen john stevens barry johnny sutton jubilation day care julie walters kay griggs kimbrough king, lawrence labedz libby apprentice lonnie latham lustfull utterances lynch male prostitution mark grossman mcconnell methamphetamine midnight tour mike jones murray state bank nambla nebraska nelson, rusty northern natural gas northwest bell offutt ogen, utah omaha omaha national bank orr case pagegate pedophigate poindexter presidio probe ensnares protestant ratzinger reagon, ronald rendition rick perry R-lynn robert kirchner robert spire rove, karl samuel vanpelt sarkozy paedophilia satanism schoedinger scott mcclellan secret service shawn vassel sodomy southern baptist convention stephen cambone stitt strategic air command talon news tarpley temple of set texas youth commission the colonel the fellowship thomas reynolds thompson, hunter tom delay tongsun park tripp schweer union pacific railroad urbom wadman, robert washington times weber state university west texas state school westin crown center hotel william boykin williams energy world herald world vision yorkshire television yosef sagiv franklin cover-up mcateer  libby book apprentice homoeroticism, bestiality and incestuous themes, with an unspeakably gross passage where a ten-year-old girl is abused.  Caged, and forced to have sex with bears, to become a prostitute, search terms: a scene of incest between two uncles and their niece; fukk a freshly killed deer, prepubescent girl's painted 'mound', lack of vaginal odor ronald roskens kent state 1970 cfr usaid chancellor uno board of regents caradori homosexual orgies ed mccateer leola mcconnell roundtable falwell bisexual lustfull utterances tennessee knoxville victor ashe kitty kelly las vegas mayor tang yale bulldog lips sodomite nevada governor ...Deborah Jeane Palfrey, Pamela Martin & Associates, legal escort service, Tobias, Brandy Britton, 07-046-GK, Catherine Connelly, racketeering, Ulman, Dick Morris, adult fantasy, Miz Julia, prostitution, pimping, Montgomery Blair Sibley, ABC, Disney, Akin Gump Strauss Hauer Feld LLP, Eli Lilly, Quale, NASA, Kessler, Shirlington limousine, poker parties, Watergate, Westin Grand, hookergate whoregate, D. C. madam, Duke-stir, Langley,   Letterman about Cheney ""I can't believe a good-looking guy like that would ever have to pay for sex, you know what I'm saying?"  ....  Thomas DiBiagio, Jonathan Luna, Ed Norris, Governor Ehrlich, Watergate, Westin Grand, James Comey, Ashcroft, ABC producers Rhonda Schwartz, Justin Rood, defense contractors, AIPAC, World Bank, IMF, Halliburton, smokinggun, Wells Fargo Bank, Troy Burrus, John Stendrinni, Wilkes / Michael indictment.  Warren Buffett, Cardinal law, Senator Larry Craig, Idaho, plainclothes officer, lewd behavior, airport men's room, tapped foot, anti same-sex marriage votes, homophobia, anti-gay rights, Romney campaign, Offutt, Barney Frank  follow up, the act of following up. 2. an action or thing that serves to increase the effectiveness of a previous one, as a second or subsequent letter, phone call, or visit. 3. Also called follow. Journalism. a. a news story providing additional information on a story or article previously published. b. Also called sidebar, supplementary story. a minor news story used to supplement a related story of major importance. Compare feature story (def. 1), human-interest story, shirttail. –adjective 4. designed or serving to follow up, esp. to increase the effectiveness of a previous action: a follow-up interview; a follow-up offer. 5. of or pertaining to action that follows an initial treatment, course of study, etc.: follow-up care for mental patients; a follow-up survey. fol·low –verb (used with object) 1. to come after in sequence, order of time, etc.: The speech follows the dinner. 2. to go or come after; move behind in the same direction: Drive ahead, and I'll follow you. 3. to accept as a guide or leader; accept the authority of or give allegiance to: Many Germans followed Hitler. 4. to conform to, comply with, or act in accordance with; obey: to follow orders; to follow advice. 5. to imitate or copy; use as an exemplar: They follow the latest fads. 6. to move forward along (a road, path, etc.): Follow this road for a mile. 7. to come after as a result or consequence; result from: Reprisals often follow victory. 8. to go after or along with (a person) as companion. 9. to go in pursuit of: to follow an enemy. 10. to try for or attain to: to follow an ideal. 11. to engage in or be concerned with as a pursuit: He followed the sea as his true calling. 12. to watch the movements, progress, or course of: to follow a bird in flight. 13. to watch the development of or keep up with: to follow the news. 14. to keep up with and understand (an argument, story, etc.): Do you follow me? –verb (used without object) 15. to come next after something else in sequence, order of time, etc. 16. to happen or occur after something else; come next as an event: After the defeat great disorder followed. 17. to attend or serve. 18. to go or come after a person or thing in motion. 19. to result as an effect; occur as a consequence: It follows then that he must be innocent. –noun 20. the act of following. 21. Billiards, Pool. follow shot (def. 2). 22. follow-up (def. 3). —Verb phrases23. follow out, to carry to a conclusion; execute: They followed out their orders to the letter. 24. follow through, a. to carry out fully, as a stroke of a club in golf, a racket in tennis, etc. b. to continue an effort, plan, proposal, policy, etc., to its completion. 25. follow up, a. to pursue closely and tenaciously. b. to increase the effectiveness of by further action or repetition. c. to pursue to a solution or conclusion. —Idiom26. follow suit. suit (def. 13). fol·low·a·ble, adjective — Synonyms 3. obey. 4. heed, observe. 8. accompany, attend. 9. pursue, chase; trail, track, trace. 19. arise, proceed. Follow, ensue, result, succeed imply coming after something else, in a natural sequence. Follow is the general word: We must wait to see what follows. A detailed account follows. Ensue implies a logical sequence, what might be expected normally to come after a given act, cause, etc.: When the power lines were cut, a paralysis of transportation ensued. Result emphasizes the connection between a cause or event and its effect, consequence, or outcome: The accident resulted in injuries to those involved. Succeed implies coming after in time, particularly coming into a title, office, etc.: Formerly the oldest son succeeded to his father's title. —Antonyms 1. precede. 2, 3. lead. 4. disregard. 9. flee.  news follow up
  • 38. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM]     PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  safe and free Senator Daniel Akaka (D-Hawaii).  Choicepoint and Acxiom companies are data aggregators.  Nuala O'Connor Kelly is head of privacy for Dept of Homeland Security.  Alternet, Patriot II, details, search, government surveillance, spying Center for Democracy and Technology, domestic spying watch  Center for a Legitimate Government     Commercial Alert, protecting children from corporate predation Cryptorights.org human rights for security workers. SF Disinfo  New Surveillance Camera Can Search 36 Million Faces For Matches Per Second Dissenter / FireDogLake Federal Judge’s Injunction Finds NDAA Is Worse Than Material Support Law Echelon Watch discuss civil liberty threats Electronic Privacy Information Center lawsuits, FBI, FOI   Electronic Frontier Foundation working to protect civil and free speech EFF Is Your Printer Spying on YOu EFF  List of Printers Which Do or Do Not Display Tracking Dots, search terms: yellow tracking dots, printer models, output, Machine Identification Code Technology Project, forensic watermarking, dithering technique, blue light, microscope, Brother, Canon, Dell, Epson, Hewlett-Packard, Fuji, Xerox, IBM, Konica / Minolta, Kyocera, Lanier, Lexmark, Okidata, Panasonic, Ricoh, Savin, Samsung, Tektronix, Toshiba, color laser printers. 3-eye  imagery consultants, info BBC George W Bush personally stopped an inquiry into a controversial programme to monitor the phone calls and e-mails of Americans, a top official has said. Attorney General Alberto Gonzales said internal investigators wanted to look at the role justice department lawyers had played in drafting the programme Thought Crime legislation: hr1955.info CERT Coordination Center net security, info, response Cnet Tech News First, search Carnivore CICenter Counterintelligence, NGO, UK CNN, Technology Earthdata sea Earthdata International satellite images company FAS Project on Government Security  Freedom of Information Act Global Security Foundation  Intelligence Resource  History of the Internet   Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective LawFare  Legal News Search search LexisNexis  online legal, news and business info services LexisOne  The Resource for Small Law Firms. Mountbatten Centre for International Studies National Clearinghouse for Alcohol and Drug Information NCADI, info on alcohol, tobacco, and illicit drugs National Cyber Security Alliance se National Security Archive George Washington U. govt security research, FOI Newsbits technews Open Society Institute Internet policy, independent media, human rights OS News Operating system news PrivacyDigest privacy news Privacy Marketing News UK, into privacy and video Ron Paul names neocons video ---------------------- Albright College, Patriot Act Arlington Institute, John Peterson, Dave Snowden,  ASP Solutions, internet monitoring and surveillance,  Basis Technology, Asian, Middle East, EU intelligence gathering from unstructured text,  Booz Allen Hamilton, major intelligence contractor, first fruit, monitor journalists, BrightPlanet, search Sioux Falls, data mining, works with Lockheed Martin, Factiva,  Carnivore, Cato also known as DCS1000, Etherpeek Chartered Institute of Marketing, UK, info resource for marketing / sales. Service, News. FEMA Concentration Camp, Beech Grove, Indiana YouTube
  • 39. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Buy Wayne Madsen's book Overthrow a Fascist Regime on $15 a Day. Epic  Electronic Privacy Information Center F-Secure, info on CD rootkits  Eyeballing TIA Freedom Scorecard, ACLU Future of Freedom First Amendment Rights  Global Issues.org Google-Watch Google search engine is spyware High Tech Billboards  domestic surveillance Human Rights Watch briefing paper on MCIS Internet Democracy Project enhance open participation, public accountability and hr of internet KeepAmericaFree  Yes, Pres. Obama, The NDAA DOES Authorize Warrantless, No Due Process, Indefinite Military Detention by the Military of American Civilians MediaFilter covert action quarterly MediaRoots the Clark County Republican Party Central Committee of Nevada unanimously called for its appeal while legislators in Michigan are currently considering a bill that could virtually revoke the federal law in that state. NoNAIS.com Protect Traditional Rights to Farm, stop RFID privicacy intrusion by Bush corporate America. OpManning Free Bradley Manning Privacy International Human rights group, watchdog on surveillance by govt/biz Privacy   PrivacyToday  news Refuse & Resist the device formerly known as Carnivore, Salon  Israeli art students, DEA, Amdocs searchable file Smirking Chimp Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA Southwest Research and Information Center  Energy, Environment research analysis.  Total Information Awareness Resource Center VeritasVirtualVengeance Righteous Negative Publicity and Black PR: Exposing the terrible truths to take down corrupt corporations.  Surveillance relationship marketing. Privacy & Security Law Report BNA Project on Government Oversight exposing corruption, exploring solutions Salaam.co.uk Big Brother in Britain, national id cards, high cost and hype.  SearchSecurity news, consulting Security Focus News Microsoft Scientific Working Group on Friction Ridge Analysis fingerprinting, forensic id. Slashdot TechLawJournal news, analysis of legislation, litigation, regulation IT Vera Institute of Justice prisoner rights, justice system innovation, links Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter. Wired Magazine, search Poindexter, TIA, Total Information Awareness, IAO, WMR Army spying on soldiers' blogs according to leaked Army regulation During a time when the morale of US Army personnel is at an all- time low from a protracted war in Iraq and a de facto draft in the guise of a stop-loss program that keeps soldiers on active duty after their commitments expire, the Army is also spying on the personal blogs of its personnel. This surveillance program has been revealed in a leaked Army Regulation on Operations Security (AR-580-1). ... The regulation was issued almost a year ago, on April 19, 2007. It prohibits the publication of "critical or sensitive" information, a wide-open caveat that could include anything not deemed to be "classified" national security information. The regulation also covers information that has already been disclosed, or "compromised" as stated in the regulation. Yahoo, Spyware new ZDNet, UK news   enlarge for full map  or go to Google map and enter: Emerson Ave, Beech Grove, Indiana CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department CIA Central Intelligence Agency Cognitive Edge, Singapore, RAHS, data mining, medical info, raw surveillance data mining. Convera, video, image, audio search, multiple languages,  Cybersecurity Enhancement Act DARPA Defense Advanced Research Projects Agency Dept of Homeland Security  domestic spying EZPass, E-Z Pass, E-ZPass, E-Z Pass, who really has access to this information? Factiva, Dow Jones company, gathers open source news,  ECHELON, US, Australia, New Zealand, UK, see Israel, Federal Bureau Of Investigation FBI, Carnivore, Diagnostic Tool FBI FreeRepublic.com News by keyword Global Security.org CBS News FB Government Executive,  Poindexter... Whitehouse support. Klinx, deep web content,  Infragard  FBI Institute for Intergovernmental Research  serving law enforcement, justice community Lockheed Martin US personal database, defense contractor, Bush Microsoft, Security Bulletins: Microsoft  Microsoft National Intelligence Council CIA National Communications System, US Threat Advisory National Consumers Coalition  info on 'big brother', national ID card, govt spycams, supports global
  • 40. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] White Dot find out how to free yourself from television. notes: Wayne Madsen Report ... cell phone  "The "echoing" is not limited to particular cell phone service providers or cell phone types. Customers of AT&T, Verizon, and T-Mobile are reporting the same problem with phones from Nokia, Samsung, Nokia, Motorola, and Ericsson.  ...  Technicians report that echos occur when there is not a complete connection or if there is a third party connection on the call. While echoing has been a minor problem in the past, the frequency of complaints is increasing and affecting journalists and political activists from Washington, DC to New York City and California to Texas.  ...  Government agencies are already able to remotely activate a cell phone and use the microphone to listen in on conversations. The only way to prevent this surveillance is to agree to "batteries out" conversations, something that is employed more and more among journalists while talking to sources as well as others concerned about high-tech snooping from "roving bugs." Similarly, removing the battery from a cell phone also disables the Global Positioning System and cell tower triangulation capabilities used by law enforcement and intelligence agencies to track the location of the user, according to U.S. intelligence sources."   warming.org National Infrastructure Protection Center net threat assessment, warning, response, US National Strategy to Secure Cyberspace Whitehouse, Bush, Cheney, 'war on terrorism' New York Times NSA executive order authorizing data mining of phone calls and file. Office of Total Information Awareness Patriot Act compliance software, Attus Tech Phoenix Global Intelligence Systems, globalization technologists, unrestrained by nationality,  Presearch, Inc.  mass data surveillance PrivacyExchange privacy protection resource, sponsored by Equifax, AE, Guardent, systran etc... Risk Assessment and Horizon Scanning (RAHS) Saffron Technology, Inc.  mass data surveillance, Securius.com  defending cyberspace security Seisint Inc  MATRIX database, controlling company. SYNTEC, Inc, Poindexter, Senior Vice President, mass data surveillance,  Technology Transfer Information Center TTIC Terrorists Threat Integration Center, TTIC U.S. Departmant of State, Consular Affairs US- VISIT, info Virage Inc Video analysis and contact extraction. Part of the Autonomy Group Wikipedia The Disruptive Technology Office (DTO) is a funding agency within the United States Intelligence Community. It was until recently known as Advanced Research and Development Activity (ARDA).  ARDA was created in 1998 after the model of the Defense Advanced Research Projects Agency (DARPA) by theDirector of Central Intelligence and the Department of Defense, and took responsibility for funding some of DARPA's projects. ARDA evaluates proposals and funds speculative research, particularly in the fields of data mining, video processing, and quantum computing.  There has been speculation that the DTO is continuing research efforts started under the Total Information Awareness program (TIA) in DARPA's Information Awareness Office (IAO). Data-mining activities within the US Department of Defense are controversial and have met with public and congressional disapproval.  Although ARDA's budget is presumably classified as part of the intelligence budget, the New York Times quoted an unnamed former government official saying the agency spent about $100 million a year in 2003. The Associated Press reports that ARDA had a staff of only eight in 2004.  Headquartered at Fort George G. Meade in Maryland, site of the headquarters of the National Security Agency, ARDA/DTO has kept a low profile, quietly funding research of interest to the intelligence community.  In December 2007, DTO was folded into the newly created IARPA  1] . A move to a research park near the University of Maryland, College Park was announced at about the same time  2] . Wikipedia Real ID The REAL ID Act of 2005, Pub.L. 109-13, 119 Stat. 302, enacted May 11, 2005, was an Act of Congress that modified U.S. federal law pertaining to security, authentication, and issuance procedures standards for the state driver's licenses and identification (ID) cards, as well as various immigration issues pertaining to terrorism. The law set forth certain requirements for state driver's licenses and ID cards to be accepted by the federal government for "official purposes", as defined by the Secretary of Homeland Security. The Secretary of Homeland Security has currently defined "official purposes" as presenting state driver's licenses and identification cards for boarding commercially operated airline flights and entering federal buildings and nuclear power plants. The REAL ID Act implements the following: Title II of the act establishes new federal standards for state-issued driver licenses and non-driver identification cards. Changing visa limits for temporary workers, nurses, and Australian citizens. Funding some reports and pilot projects
  • 41. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] related to border security. Introducing rules covering "delivery bonds" (similar to bail bonds but for aliens who have been released pending hearings). Updating and tightening the laws on application for asylum and deportation of aliens for terrorist activity. Waiving laws that interfere with construction of physical barriers at the borders. As of April 2, 2008, all 50 states have either applied for extensions of the original May 11, 2008 compliance deadline or received unsolicited extensions. 4] As of October 2009, 25 states have approved either resolutions or binding legislation not to participate in the program, and with President Obama's selection of Janet Napolitano (a prominent critic of the program) to head the Department of Homeland Security, the future of the law remains uncertain, 5] and bills have been introduced into Congress to amend or repeal it. 6] The most recent of these, dubbed PASS ID, would eliminate many of the more burdensome technological requirements but still require states to meet federal standards in order to have their ID cards accepted by federal agencies.  Wired Random numbers are critical for cryptography: for encryption keys, random authentication challenges, initialization vectors, nonces, key-agreement schemes, generating prime numbers and so on. Break the random-number generator, and most of the time you break the entire security system. Which is why you should worry about a new random- number standard that includes an algorithm that is slow, badly designed and just might contain a backdoor for the National Security Agency. Wikipedia NAIS The National Animal Identification System, (NAIS) is a government-run program in the United States intended to extend government animal health surveillance by identifying and tracking specific animals. Administered at the federal level by the Animal and Plant Health Inspection Service, a branch of the United States Department of Agriculture, NAIS will also be overseen by state animal health boards. While the federal program is voluntary, money received by some states, 2] tribes, and non-profit entities from the USDA through cooperative agreements has been used to make parts or all of the program mandatory. Critics claim the system will put small farmers out of business, by requiring that farmers pay the cost of registration devices of between $1 and $20 for each animal. Large, corporate factory farms which are connected to vertically integrated, birth-to-death factory systems ID and pay by the herd (and not the individual animal), while small farmers must pay it for each animal.  Finally, fears persist about plans to make NAIS mandatory on the federal level, which would threaten the religious freedom of those who believe that making a “mark” is sinful, such as the Amish. The Amish also object to the use of electronic devices such as microchips. 24] If microchip implants were required, as has been proposed in a 2004 report by the United States Animal Health Association’s Committee on Livestock Identification, it would also violate the rights of those who believe that this practice is morally wrong. PressTV U.S. companies are involved in providing technology that helps the Egyptian government to crack down on communications and monitor protestors on the Internet and mobile phones. ... A U.S. company appears to have sold Egypt technology to monitor Internet and mobile phone traffic that is possibly being used by the ruling regime to crack down on communications as protests erupt throughout the country. ... Boeing-owned, California-based company Narus sold Telecom Egypt, the state-run Internet service provider, "real-time traffic intelligence" equipment, more commonly known as Deep Packet Inspection (DPI) technology. Common Dreams ,,, HIGHLIGHTS The company is also known for creating "NarusInsight," a supercomputer system allegedly used by US' National Security Agency and other entities to perform mass surveillance and monitoring of public and corporate Internet communications in real time. Common Dreams ... Telecom Egypt, the nation's dominant phone and Internet service provider, is a state-run enterprise, which made it easy on Friday morning for authorities to pull the plug and plunge much of the nation into digital darkness. .... Narus provides Egypt Telecom with Deep Packet Inspection equipment (DPI), a content-filtering technology that allows network managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers on the information superhighway. ... "Anything that comes through (an Internet protocol network), we can record," Steve Bannerman, Narus' marketing vice president, once boasted to Wired about the service. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls.” ... Earlier this week, Secretary of State Hillary Clinton urged Egypt's government "not to prevent peaceful protests or block communications, including on social media.” Huffington Post .... FACTS & FIGURES Narus, now owned by Boeing, was founded in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and large corporate clients. ... In addition to Narus, there are a number of companies, including many others in the United States, that produce and traffic in similar spying and control technology: Zeugma Systems (Canada), Camiant (USA), Procera Networks (USA), Allot (Israel), Ixia (USA), Advanced IO (Canada) and Sandvine (Canada), among others. ... When commercial network operators use DPI, the privacy of Internet users is compromised. But in government hands, the use of DPI can crush dissent and lead to human rights violations. ... Virtually all internet access in Egypt is cut off as the government battles to contain the street protests that threaten to topple President Hosni Mubarak. Telegraph HJ/KA/DB... more search terms: Egypt, Elbaradai, Tunisia, Algeria, Tunisia, protest, regime change, WMR  "January 30-February 1, 2009 -- Stellar Windblows Democratic governors out of office  WMR has previously reported on the malfeasance of the U.S. Attorney for Northern Illinois, Patrick Fitzgerald, in his investigation of the 1993 World Trade Center bombing and the outing of CIA covert agent Valerie Plame Wilson. In the case of the 1993 attack, Fitzgerald sat on critical signals intelligence (SIGINT) evidence that would have tied the bombing to Osama bin Laden in exile in Sudan. Bin Laden remained a U.S. intelligence asset at the time of the World Trade Center bombing so Fitzgerald, following orders from Langley, simply failed to enter into evidence wiretaps communications between the Sudanese Mission to the United Nations in New York and the Sudanese Foreign Ministry in Khartoum that contained references to Bin Laden. In the outing of Plame, Fitzgerald refused to enter as evidence tapped phone calls of Vice President Dick Cheney's Chief of Staff I. Lewis "Scooter" Libby and others that would have proven the severe damage of Libby's actions to the covert counter-proliferation operation involving Plame and her Brewster Jennings & Associates cover firm. Fitzgerald's actions in covering up the World Trade Center link to Sudan and Bin Laden was so significant that Libby's New York Times interlocutor, Judith Miller, once asked this editor for my sources on the Sudanese wiretap story. I told her that one was well known, the late ABC News reporter John McWethy had reported on the Sudan UN mission wiretaps by the National Security Agency (NSA) in 1993. The other, a confidential source in Khartoum, remains confidential. McWethy died in a February 2008 skiing accident in Colorado.   full story Wikipedia Stellar Wind Stellar Wind is the open secret code name for certain information collection activities performed by the United States' National Security Agency and revealed by Thomas M. Tamm to New York Times reporters James Risen and Eric Lichtblau. 1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001. 2] The program's activities involve data mining of a large database of the communications of American citizens, including e-mail communications,
  • 42. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] phone conversations, financial transactions, and Internet activity. 1] There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants. 3] In March 2004, the Justice Department under Attorney General John Ashcroft ruled that the program was illegal. The day after the ruling, Ashcroft became critically ill with acute pancreatitis. President Bush sent White House counsel Alberto Gonzales and Chief of Staff Andrew Card, Jr. to Ashcroft's hospital bed, where Ashcroft lay semiconscious, to request that he sign a document reversing the Justice Department's ruling. However, Ashcroft was incapable of signing the document. Bush then reauthorized the operation, over formal Justice Department objections. Federal Bureau of Investigation (FBI) director Robert Mueller, Acting Attorney General James Comey, and many prominent members of the Justice Department were prepared to resign over the matter. Valerie Caproni the FBI general counsel, said, "From my perspective, there was a very real likelihood of a collapse of government." Bush subsequently reversed the authorization. 2] During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as "pizza cases" because many seemingly suspicious cases turned out to be food takeout orders. Approximately 99 percent of the cases led nowhere, but 1 percent bore fruit. 2] One of the known uses of these data were the creation of suspicious activity reports, or "SARS", about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Elliot Spitzer's use of prostitutes, even though he was not suspected of terrorist activities. 1] In March 2012 Wired Magazine published "The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)" talking about a new NSA facility and says "For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail." Naming the official William Binney a former NSA code breaker. Binney goes on to say that the NSA has highly secured rooms that tap into major switches, and satellite communications at AT&T and Verizon both. 4] The article suggests that the otherwise dispatched Stellar Wind is actually an active program. WMR Bush / Clinton complicity in NSA illegal wiretapping.  A problem for Hillary? ...  1999 docs show NSA and Clinton White House hiding information about Foreign Intelligence Surveillance Act (FISA) compliance.  Illegal request for NSA wiretapping made in February 27, 2001 meeting ... Nacchio refused, then indicted for insider stock trading... 10th Circuit Court of Appeals, (they're all crooks?).  search terms: AT&T switching center, Folsom Street, San Francisco, 4ESS equipment, Mark Klein (whistleblower), see  HPSCI, Porter Goss, attorney client privilege, Executive Order 12333, all concerning hiding  documents referring to legality of NSA activities, ... and Wilma A. Lewis, Mark Nagle, Marina Utgoff Braswell, Electronic Privacy Information Center, (Civil No. 99-3197 PLF), information withheld from FOIA, domestic wiretapping  full story Economist "Security experts reckon the latest technology can detect hostile intentions before something bad happens. Unless it is perfect, though, that may be bad in itself   ...   MONITORING surveillance cameras is tedious work. Even if you are concentrating, identifying suspicious behaviour is hard. Suppose a nondescript man descends to a subway platform several times over the course of a few days without getting on a train. Is that suspicious? Possibly. Is the average security guard going to notice? Probably not. A good example, then—if a fictional one—of why many people would like to develop intelligent computerised surveillance systems.   ...   The perceived need for such systems is stimulating the development of devices that can both recognise people and objects and also detect suspicious behaviour. Much of this technology remains, for the moment, in laboratories. But Charles Cohen, the boss of Cybernet Systems, a firm based in Ann Arbor, Michigan, which is working for America’s Army Research Laboratory, says behaviour-recognition systems are getting good, and are already deployed at some security checkpoints"  According to Associated Press, the director of CIA's Open Source Intelligence, Doug Naquin, admitted the existence of a secret facility and a team of operatives for exclusive monitoring of social networks such as Facebook and Twitter. But I've found evidence pointing out that these online communities might actually have been created by CIA for data mining and COINTELPRO operations on the internet.   Hosted  FEMA Concentration Camp, Beech Grove,  Indiana YouTube & Google Map: Emerson Ave, Beech Grove, Indiana and lists Domestic Spying, FBI, AT&T page Prodigal email, im, text scanning Darpa Domestic Spying News    top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* 9/11 Citizens Watch  challenging the official story of 9/11 911Dosier.co.uk last update 2004. ACLU AfroCubaWeb Israeli actions in the Americas Guardian.UK weblogs Global News Headlines, GreenPeace mail list Global Witness Corruption watchdog Internet Democracy Project ACLU, EPIC, CPSR NSAWatch formerly EchelonWatch, resources, ABC News Disney American Zionist Information Network CDI Center for Defense Information headlines DARPA Defense Advanced Research Projects Agency Defence-data.com
  • 43. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] The Agonist American Free Press The Truth about 9/11, Israel... American Friends Service Committee search Anti-Imperialist News Service and archives, books Big Class Action New class actions, search, info Center for Science in the Public Interest Center for CooperativeResearch Civil Liberties Digest, Pacific News News, Pacific News CounterPunch Ashcroft turned down request to search Moussaoui computer Center for Democracy and Technology, domestic spying watch  Center for Democratic Communications National Lawyers Guild CICenter Counterintelligence, NGO, UK ClassActionAmerica Coalition for Global Solidarity News links Common Cause  Soft Money issues, govt watchdog Consortium News  watchdog Consumer Action covering banking, credit, privacy, insurance, HMO's.  in English, Chinese, and Spanish.  Consumers Union consumer advocate, watchdog, news CorpWatch, news, Holding corporations accountable Cryptorights.org human rights for security workers. SF Earthrights International the power of law, people in defense of human rights Electronic Frontier Foundation working to protect civil and free speech Enduring Freedoms, pressroom, Reporters Without Borders FAS Secrecy News FattyBoomBatty, news, Echelon, Big Brother FindLaw News Freedom of Information Center Univ of Missouri, news Free Expression Network Government Accountability Project News,  Green Party News circulator surveillance networks, documents. Pacific News, Pacific Pulse,  Project Censored undercovered news Rocky Mountain News World news People for the American Way Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Salon  Israeli art students, DEA, Amdocs searchable file Total Information Awareness Resource Center World Socialist Web Site search ZDNet, UK news .. .Reference CBS down C/Net downloads, spyware Freedom of Information Center Univ of Missouri, news Findlaw, Dean Info / Law, Harvard Blog filtering, modes of internet regulation: code, law, markets, and social norms  LINKS IT-Analysis internet news analysis, research Legal News Search search LexisNexis  online legal, news and business info services MSNBC  VOIP Blocking OpenNet Initiative, search Narus Privacy Digest, news PrivacyToday  news Rumormill News Science Daily news Silicon Valley blog news, Good Morning Silicon Valley USA Today NSA has massive database of Americans' phone calls Wired News, Defence-Aerospace  Dept of Defense News transcripts, search Muqtada al- Sadr. Chalabi, Najaf, Defense Tech Telcos Deny NSA Ties - and Allowed to Lie? Family.org, Dobson Homeland Security NCS Threat Advisory IT Security  Encyclopedia of Computer Security Jihad Unspun war on terrorism, Bush  Institute for Advanced Strategic & Political Studies and Hebrew site National Communications System, US Threat Advisory NewsMax Mathaba search content based billing, VOIP  blocking New York Times NSA executive order authorizing data mining of phone calls and file Dec 16, 2005 North Carolina Consortium of Internet Service Providers legislation page Online Republican Activist Political USA Chicago sun-times PR Newswire business news distribution Regulatory News Converge Digest Senate Republican Conference Washington Times U.S. Department of Justice Civil Rights Division U.S. Commission on Civil Rights   Chairperson of the Commission on Civil Rights Washington Institute for Near East Policy US ZOA press releases Advanced Research and Development Activity Office     top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  objects to CAPPS, no due process, easily circumvented. Electronic Frontier Foundation working to protect civil and free speech  CDC Center for Disease Control and Prevention. Dept of Health and Human Services. PrivacyDigest privacy news Softswitch.org  to develop universal communications solutions over packet-based voice, data and video. Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter. Biowatch, detect biological warfare threats. fear Bush. Dept of Health and Human Services. Dept of Homeland
  • 44. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] & lawsuit   Epic  Electronic Privacy Information Center FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW   Security domestic spying New York Times NSA executive order authorizing data mining of phone calls and file. Virage Inc Video analysis and contact extraction. Part of the Autonomy Group Wikipedia IARPA Intelligence Advanced Research Projects Activity From Wikipedia, the free encyclopedia (Redirected from IARPA) The Intelligence Advanced Research Projects Activity (IARPA) is a United States research agency under the Director of National Intelligence's responsibility. In January 2008, Lisa Porter, an administrator at NASA with experience at DARPA, was appointed director 1] of the activity formed in 2006 from the National Security Agency's Disruptive Technology Office (DTO), the National Geospatial- Intelligence Agency’s National Technology Alliance and the Central Intelligence Agency’s Intelligence Technology Innovation Center. 2] Contents hide] 1 Goals 2 Program offices 3 The Metaphor Program 4 See also 5 References 6 Further reading 7 External links edit]Goals   ...   "IARPA's mission is] to invest in high-risk/high-payoff research programs that have the potential to provide the United States with an overwhelming intelligence advantage over future adversaries." – FBI National Press Release, 2009 3] The Director of National Intelligence in a September 2006 speech stated that the goal of the agency 4] is to conduct research that Cuts across multiple IC agencies; Targets new opportunities that lie in the white spaces between agencies; Provides innovations that agencies avoid because of current business models; and Generates revolutionary capabilities that will surprise our adversaries and help us avoid being surprised. Program offices    ...   IARPA is divided into three program offices, Smart Collection, Incisive Analysis, and Safe & Secure Operations. The goal of the Office of Smart Collection is to "dramatically improve the value of collected data from all sources." The Office of Incisive Analysis exists to "maximize insight from the information we collect, in a timely fashion." IARPA's third division, the Office of Safe & Secure Operations, exists to "counter new capabilities implemented by our adversaries that would threaten our ability to operate freely and effectively in a networked world." edit]The Metaphor Program    ...  The Metaphor Program is a two-phase project designed to first develop automated techniques for recognizing, defining and categorizing linguistic metaphors and then use that information to characterize differing cultural perspectives. The Program is headed by Heather McCallum-Bayliss. On May 2011, IARPA issued an open solicitation for private sector parties to participate in the Program Wikipedia The Disruptive Technology Office (DTO) is a funding agency within the United States Intelligence Community. It was until recently known as Advanced Research and Development Activity (ARDA). ARDA was created in 1998 after the model of the Defense Advanced Research Projects Agency (DARPA) by the Director of Central Intelligence and the Department of Defense, and took responsibility for funding some of DARPA's projects. ARDA evaluates proposals and funds speculative research, particularly in the fields of data mining, video processing, and quantum computing. There has been speculation that the DTO is continuing research efforts started under the Total Information Awareness program (TIA) in DARPA's Information Awareness Office (IAO). Data-mining activities within the US Department of Defense are controversial and have met with public and congressional disapproval. Although ARDA's budget is presumably classified as part of the intelligence budget, the New York Times quoted an unnamed former government official saying the agency spent about $100 million a year in 2003. The Associated Press reports that ARDA had a staff of only eight in 2004. Headquartered at Fort George G. Meade in Maryland, site of the headquarters of the National Security Agency, ARDA/DTO has kept a low profile, quietly funding research of interest to the intelligence community. In December 2007, DTO was folded into the newly created IARPA  A move to a research park near the University of Maryland, College Park was announced at about the same time 2].   Amdocs, Israel Telecom Immunity   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Cryptome search Narus spy DailyKOS EFF lawsuit, nationwide class action, AT&T Technician stepped forward to disclose installation of NSA equipment (Narus ST-6400)  in San Francisco trunk facility, NarusInsight EFF State Secrets Act invoked on wiretapping lawsuit.  National Security Agency Cryptome search Narus spy C/Net downloads Findlaw NSA Eric Umansky Findlaw, Dean Hoover's Narus Liquid Matrix China asks Narus for tech to block VOIP calls.   EFF State Secrets Act invoked on wiretapping lawsuit.  National Security Agency Wired search Narus, Amdocs Amdocs search Narus American National Union Should Hayden be confirmed or court-martialed Comverse and Information Clearing House Carl Cameron report  and see CALEA Comverse CEO resigns amid options probe, MORE below Center for Strategic and International  Defense Tech Telcos Deny NSA Ties - and Allowed to Lie? FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down. Narus see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems. Narus Partners see Pen-Link, Man-tech, Verisign, Datacraft, Giza
  • 45. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] DailyKOS EFF lawsuit, nationwide class action, AT&T Technician stepped forward to disclose installation of NSA equipment (Narus ST-6400)  in San Francisco trunk facility, NarusInsight Moon of Alabama search terms: CDR, call detail records, usage behavior, mortgate data, credit card data, addresses, names, NSA took over Total Information Awareness Project, if you're against Bush are you a terrorist? Datamining, small groups, false tips,  NoGW CIA Scoop ISP, black box, NARUS, Model ST- 6400,  Notes, search terms: internet protocol Detail Record, analyzes data 'meaning' impeach bush Serendipity: Timeline of CIA atrocities, School of the Americas,  Notes, search terms, EFF lawsuit against AT&T over their secret work with NSA, ST-6400, content triggers, Narus Insight, Ori Cohen, VDONet, JP Morgan Partners, Mayfied, NeoCarta, Presidio Venture Partners, Walden International, Intel, NTT Software, Sumisho Electronics, William P. Crowell,  Schema-Root AIPAC, Weisman, search Rosen Franklin, Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links New York Times NSA executive order authorizing data mining of phone calls and file Dec 16, 2005 Wired  stepped forward to disclose installation of NSA equipment (Narus ST- 6400)  in San Francisco trunk facility, NarusInsight Notes, search terms: internet protocol Detail Record, analyzes data 'meaning', voice recognition, business cards, social network analysis, Systems...more Republicans who are against Bush spying are an irrelevant impotent and small group. New York Times  NSA executive order authorizing data mining of phone calls and file Dec 16, 2005 Narus Board of Directors  Notes on Narus: Narus is a private company founded in 1997 by Ori Cohen, was  in charge of tech development for VDONet,  media streaming pioneer. It has venture funding from  investors including JP Morgan Partners, Mayfield, NeoCarta, Presidio Venture Partners, Walden International, Intel, NTT Software and Sumisho Electronics WMR At first blush, the recent adoption by the House of Representatives of the Foreign Intelligence Surveillance Act Amendments Act, which gives telecommunications companies that illegally eavesdropped on the telephone conversations, faxes, text messages, and emails of Americans retroactive immunity from lawsuits from privacy-violated and aggrieved customers, would see to have little to do with the powerful American Israel Public Affairs Committee (AIPAC).  ...  However, the support for the bill by AIPAC's biggest boosters, including House Majority Leader Steny Hoyer of Maryland, whose sister, Bernice Manocherian, was an executive president of AIPAC, and Jane Harman, who was slated to become chair of the House Permanent Select Committee on Intelligence (HPSCI) but whose nomination was nixed by Speaker Nancy Pelosi after a Justice Department investigation of Harman's contacts with AIPAC  ....    To ensure a lock on the no retroactive lawsuit provisions, the man who became HPSCI chair, Sylvestre Reyes, supported the measure. He was joined by other AIPAC sure bets, including Brad Sherman (D-CA), Gary Ackerman (D-NY), Ellen Tauscher (D-CA), John Yarmuth (KY), Rahm Emanuel (D-IL), Jason Altmire (D-PA), and, for added measure Pelosi. full article Auto Black Box     top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  objects to CAPPS, no due process, easily circumvented. Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center CDC Center for Disease Control and Prevention. ComputerWorld When you are car shopping, how many times has a salesman pitched the 15 to 30 specific data elements constantly being collected by the car's black box as you drive?   Biowatch, detect biological warfare threats. fear Bush. Dept of Health and Human Services. Dept of Homeland Security domestic spying New York Times NSA executive order authorizing data mining of phone calls and file. Virage Inc Video
  • 46. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] analysis and contact extraction. Part of the Autonomy Group ComputerWorld When you are car shopping, how many times has a salesman pitched the 15 to 30 specific data elements constantly being collected by the car's black box as you drive? Probably never, but there's electronic data everywhere and that includes your car collecting digital evidence which might turn into the star witness to testify against you. You may not think about or be aware of your vehicle's event data recorder (EDR), yet it is constantly recording evidence like a plane's "black box" and is being used after a crash to explain why it happened.   Way back in 2006, the National Highway Traffic Safety Administration (NHTSA) mandated that all new vehicles be equipped with EDR "black boxes" by the 2013 model year PDF]. 85% of U.S. vehicles now have EDR devices that "must capture and preserve at least 15 types of crash data, including pre-crash speed, engine throttle, changes in forward velocity and airbag deployment times." Some capture 30 types of data.   What cars are equipped to narc on you? According to Crash Forensics, "As of 2011, GM vehicles as old as 1994 have accessible data, Ford vehicles as old as 2001 have accessible data, Chrysler vehicles as old as 2005 have accessible data, Toyota and Lexis vehicles as old as 2006 have accessible data, as well as some Isuzu, Fiat, Mitsubishi, Scion, Sterling, and Suzuki vehicles." You can also check this list PDF] or this list PDF] for vehicles with accessible EDRs.  Does that data about your driving belong to you or to insurance companies? It really depends where you have an accident since some courts have ruled the info belongs to the insurance companies and others have ruled the data belongs to drivers. As IEEE pointed out, "In the 37 states without EDR laws, there are no ground rules preventing insurance companies from obtaining the data-sometimes without the vehicle owner ever knowing that the data existed." John Tomaszewski, general counsel at TRUSTe, said "People should not relinquish their Fourth Amendment rights merely because of the location of their information." What about your right to plead the Fifth Amendment and not witness against yourself? Automatic License Plate Recognition     top    MORE PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Salon  Israeli art students, DEA, Amdocs searchable file DeathandTaxes Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  Wikipedia Automatic number plate recognition (ANPR; AP  Dept of Homeland Security domestic spying Microsoft  Seattle Times COFEE Motorola Wikipedia Automatic number plate recognition (ANPR; see also other names below) is a mass surveillance method that uses optical character recognition on images to read vehicle registration plates. They can use existing closed-circuit television or road-rule enforcement cameras, or ones specifically designed for the task. They are used by various police forces and as a method of electronic toll collection on pay-per-use roads and cataloging the movements of traffic or individuals. ANPR can be used to store the images captured by the cameras as well as the text from the license plate, with some configurable to store a photograph of the driver. Systems commonly use infrared lighting to allow the camera to take the picture at any time of the day. 1] 2] ANPR technology tends to be region-specific, owing to plate variation from place to place. Concerns about these systems have centered on privacy fears of government tracking citizens' movements, misidentification, high error rates, and increased government spending. DeathandTaxes  NEWS License plate readers enhance Big Brother’s intrusive gaze By DJ Pangburn 51 days ago This month the ACLU has launched a nationwide effort to demand information from police departments and other authorities about automatic license plate readers (ALPRs), arguing that they violate privacy. Are ALPRs yet another eye of Big Brother or is the ACLU’s freedom of information request much ado about nothing? “ALPRs are cameras mounted on stationary objects (telephone poles, the underside of bridges, etc.) or on patrol cars,” writes the ACLU. “The cameras snap a photograph of every license plate that passes them by – capturing information on up to thousands of cars per minute. The devices convert each license plate number into machine-readable text and check them against agency-selected databases or manually-entered license plate numbers, providing an alert to a patrol officer whenever a match or ‘hit’ appears.” As with drone technology, no longer do the watchmen have to try to be everywhere at once—they are everywhere at once. According to the ACLU, “When the ALPR system captures an image of a car, it also meta-tags each file with the GPS location and the time and date showing where and when the photograph was snapped.” The ACLU notes that often And often, the photograph of the license plate is also stored in a database. “The system gathers this information on every car it comes in contact with, not simply those to which some flag or ‘hit’ was attached.”   American Telecommunications Companies     top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech  Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter. AP  NSA U.S. domestic wiretaps, using unnamed American
  • 47. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] & lawsuit FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW   Salon  Israeli art students, DEA, Amdocs searchable file telecommunications companies..file AT&T lawsuit $200 billion CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department Dept of Homeland Security domestic spying Microsoft  Seattle Times COFEE Narus   More New York Times NSA executive order authorizing data mining of phone calls and file. EFF NSA Spying  The U.S. government with assistance from major telecommunications carriers including AT&T has engaged in a massive program of illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001.   ...   News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports plus a USA Today story in May 2006 and the statements of several members of Congress revealed that the NSA is also receiving wholesale copies of their telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution.    ...   The evidence also shows that the government did not act alone. EFF has obtained whistleblower evidence PDF] from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed “this isn’t a wiretap it’s a country-tap.” Apple, Iphone, Google Android     top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Salon  Israeli art students, DEA, Amdocs searchable file Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter. AP  NSA U.S. domestic wiretaps, using unnamed American telecommunications companies..file AT&T lawsuit $200 billion CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department Dept of Homeland Security domestic spying Microsoft  Seattle Times COFEE
  • 48. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] WMR April 22-24, 2011 -- I-Phone, Android back doors are courtesy of the NSA.    ...   News reports that Apple's I-Phone and I-Pads, as well as Google's Android operating system-enabled phones can track a user's location, as well as Internet activities, is nothing new, according to a well-placed intelligence source. In fact, the Apple and Google "spy ware" is courtesy of a deal struck with the U.S. National Security Agency (NSA), which is the ultimate recipient of the location and web data being collected by Apple and Google.    ...   NSA's aggressive insistence that it have "back door" access to state-of-the-art commercial communications products was on display in the 1990s when Britain's Ministry of Defense discovered eight different back doors installed in Windows 98 and subsequent releases of the operating system. Microsoft is a long-time partner of the NSA in ensuring that its products are accessible by the American eavesdropping agency.    ...   Although Britain's Government Communications Headquarters is a signals intelligence (SIGINT) partner of the NSA, a "rainbow team" representing computer security experts, drawn from multiple British government agencies. discovered the NSA back doors while conducting a security evaluation of Britain's latest tank battlefield system. While back engineering the Microsoft source code at their research facility at Farnborough, the team discovered the eight NSA back doors.    ...   Microsoft threatened legal action against the British government for what the firm considered to be the illegal examination of its source code. However, after the British government claimed Crown immunity and threatened to leak the information about the NSA back doors to the media, Microsoft backed down. Britain removed the eight back doors and was able to secure its tank and other battlefield systems from the NSA.    ...   Apple and Google, like Microsoft, have remained quiet about the surveillance capabilities of their products. WMR's intelligence source stresses that the silence from Apple and google is being directed by the actual developer of the surveillance back doors, the NSA.    CNN  2012 Under Apple's patent, a traveler's phone would automatically send electronic identification to a TSA agent as soon as the traveler gets in line. While each traveler waits in line, TSA agents would examine the electronic ID at an electronic viewing station. Next, at the X-ray stations, a traveler's phone would confirm to security agents that the traveler's ID had already been checked. Throughout the process, the phone photo could be displayed on a screen for comparison with the traveler. Facial recognition software could be included in the process. (See details on Apple's proposal in the photo gallery above.) The patent documents offer a surprising number of details which open doors to key questions about the system, but Apple declined to discuss the patent. The TSA wouldn't comment either on the viability of Apple's plan. But other government officials, aviation authorities and longtime industry experts say Apple faces at least three high hurdles if they want to see this idea to fruition. Verification Several experts say a key question that must be answered is: How would you prove that the phone is yours? In other words, how would you prove that the e-passport is actually you? To get around this problem, future phones or electronic ID may require some form of biometric security function -- like fingerprint matching. In general, passports must be designed to be difficult to copy. Recent security changes to U.S. passports have included a hidden radio frequency identification chip to hinder counterfeiters. The chip includes the same data as the paper passport, a unique chip ID number, a digital version of the passport holder's photo "which will facilitate the use of face recognition technology at ports-of-entry," according to the State Department website. EFF NSA Spying  The U.S. government with assistance from major telecommunications carriers including AT&T has engaged in a massive program of illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001.   ...   News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports plus a USA Today story in May 2006 and the statements of several members of Congress revealed that the NSA is also receiving wholesale copies of their telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution.    ...   The evidence also shows that the government did not act alone. EFF has obtained whistleblower evidence PDF] from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed “this isn’t a wiretap it’s a country-tap.” Biosurveillance, Biowatch     top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  objects to CAPPS, no due process, easily circumvented. Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center CDC Center for Disease Control and Prevention. Dept of Health and Human Services. PrivacyDigest privacy news   Biowatch, detect biological warfare threats. fear Bush. Dept of Health and Human Services. Dept of Homeland Security domestic spying National Consumers Coalition  info on 'big brother', national ID card, govt spycams, supports global warming.org
  • 49. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] CALEA Communications Assistance for Law Enforcement Act    top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center Salon  Israeli art students, DEA, Amdocs searchable file Smirking Chimp Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  ZD Net  search: Communications Assistance for Law Enforcement Act. VOIP wiretapping Wired  Fed step up push to tap internet phone calls Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.   CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department Dept of Homeland Security domestic suveillance New York Times NSA executive order authorizing data mining of phone calls and file. CAPPS   color coding airline passengers    top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit ACLU  objects to CAPPS, no due process, easily circumvented. Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center Cnet Tech News First, search Carnivore PrivacyDigest privacy news Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.   Center for Strategic and International Studies   Critical Infrastructure Assurance Office  internet, infrastructure, surveillance, code words. Dept of Homeland Security domestic spying Carnivore, DCS 1000, EtherPeek       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit CyberArmy  chat, forums Carta de Cuba  Internet  in USA Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center Googlewatch  watch how Google undermines net  Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First, search Carnivore PrivacyDigest privacy news Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.   CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department Center for Strategic and International Studies   CIA Central Intelligence Agency Critical Infrastructure Assurance Office  CIAO.gov, info Cybersecurity
  • 50. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Salon  Israeli art students, DEA, Amdocs searchable file Smirking Chimp Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA Stop Carnivore FBI, What Carnivore can do ZDNet, UK news Enhancement Act DARPA Defense Advanced Research Projects Agency FBI, Carnivore, Diagnostic Tool FBI New York Times NSA executive order authorizing data mining of phone calls and file. Seisint Inc  MATRIX database, controlling company. Cell Site Tracking      top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit CyberArmy  chat, forums Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center Googlewatch  watch how Google undermines net  Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog ZDNet, UK news Cnet Tech News First, search Carnivore PrivacyDigest privacy news Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter. Wired Court OKs Warrantless Cell-Site Tracking BY DAVID KRAVETS EMAIL AUTHOR 09.07.10 6:33 PM A federal appeals court said Tuesday the government may obtain cell-site information that mobile phone carriers retain on their customers without a probable-cause warrant under the Fourth Amendment.  ... CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department Center for Strategic and International Studies   CIA Central Intelligence Agency Critical Infrastructure Assurance Office  CIAO.gov, info Cybersecurity Enhancement Act DARPA Defense Advanced Research Projects Agency FBI, Carnivore, Diagnostic Tool FBI New York Times NSA executive order authorizing data mining of phone calls and file. Seisint Inc  MATRIX database, controlling
  • 51. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] company. Wired Court OKs Warrantless Cell-Site Tracking BY DAVID KRAVETS EMAIL AUTHOR 09.07.10 6:33 PM A federal appeals court said Tuesday the government may obtain cell- site information that mobile phone carriers retain on their customers without a probable-cause warrant under the Fourth Amendment.  ...   The decision by the 3rd U.S. Circuit Court of Appeals (.pdf) was not, however, an outright Obama administration victory. Lower courts, the three-judge panel wrote, could demand the government show probable cause — the warrant standard — before requiring carriers to release such data to the feds.    ...   The opinion does leaves the privacy issue in a legal limbo of sorts. The standard by which the government can access such records — which can be used in criminal prosecutions — is left to the whims of district court judges. Historical cell-site location information, which carriers usually retain for about 18 months, identifies the cell tower to which the customer was connected at the beginning of a call and at the end of the call.    ...   Lower courts across the country have issued conflicting rulings on the topic and will continue to do so without appellate guidance or congressional action. The Philadelphia-based court was the first appeals court to address the issue.    ...   The Obama administration argued a judge could force a carrier to produce cell-site data on a showing that the information was “relevant and material” to an investigation.   ...   But the appeals court, ruling in a narcotics case, said the Stored Communications Act, the law in question, was vague as to what standard was required.    ...   The court left open the possibility that it would revisit the case again and decide whether the constitution requires a warrant for the cell site data. The court said the statute itself could be interpreted as not requiring one.   ...   The judges did not directly address the constitutionality of the statute, said Kevin Bankston, a privacy lawyer with the Electronic Frontier Foundation, which weighed in on the case with a friend-of-the-court brief. Census Bureau      top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit CyberArmy  chat, forums Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center Googlewatch  watch how Google undermines net  Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog ZDNet, UK news Cnet Tech News First, search Carnivore PrivacyDigest privacy news Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter. CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department Center for Strategic and International Studies   CIA Central Intelligence Agency Critical Infrastructure Assurance Office  CIAO.gov, info Cybersecurity Enhancement Act DARPA Defense Advanced Research Projects Agency FBI, Carnivore, Diagnostic Tool FBI New York Times NSA executive order authorizing data mining of phone calls and file. Seisint Inc  MATRIX database, controlling company.
  • 52. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] WMR By Wayne Madsen According to US Census Bureau documents, the U.S. Census Bureau shared confidential census data files with the Department of Homeland Security (DHS). Of particular interest to DHS were census files on U.S. citizens of Arab ancestry sorted by individual ZIP code tabulation areas. In a U.S. Census Bureau memo dated April 23, 2004, a senior systems analyst with the Population Division writes to DHS that "my superiors are now asking questions about the usage of the data, given the sensitivity of different data requests we have received about the Arab population." The Branch Officer of the DHS Customs and Border Protection Bureau's Container Security Division Operational Support and Oversight Branch responds to the Census Bureau concern by stating that the information on Americans of Arab ancestry is required for "U.S. Outbound operations; which include both cargo and passenger operations." The Branch Chief continues by stating, "at U.S. International airports, U.S. Customs posts signage informing various nationalities of the U.S. Customs regulations to report currency brought into the US upon entry. Current regulations require passengers bringing more than $10,000 into the U.S. to claim it on a currency entry declaration . . . My reason for asking for U.S. demographic data is to aid the Outbound Passenger Program Officer in identifying which language of signage, based on U.S. ethnic nationality population, would be best to post at the major International airports. Some cases this would identify multiple copies needed of a specific language sign versus other cities only one copy." more CODIS Collect DNA from every arrest     top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security CyberArmy  chat, forums Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW Wikipedia CODIS The Combined DNA Index System (CODIS) is a DNA database funded by the United States Federal Bureau of Investigation (FBI). It is a computer system that stores DNA profiles created by federal, state, and local crime laboratories in the United States, with the ability to search the database to assist in the identification of suspects in crimes DARPA Defense Advanced Research Projects Agency FBI, Carnivore, Diagnostic Tool FBI New York Times NSA executive order authorizing data mining of phone calls and file. Wikipedia CODIS The Combined DNA Index System (CODIS) is a DNA database funded by the United States Federal Bureau of Investigation (FBI). It is a computer system that stores DNA profiles created by federal, state, and local crime laboratories in the United States, with the ability to search the database to assist in the identification of suspects in crimes. CODIS was an outgrowth of the Technical Working Group on DNA Analysis Methods (TWGDAM, now SWGDAM) which developed guidelines for standards of practice in the United States and Canadian crime laboratories as they began DNA testing in the late 1980s. TWGDAM was sponsored by the FBI Laboratory which hosted several scientific meetings a year at Quantico, Virginia, to accelerate development of laboratory guidelines and peer-reviewed papers to support forensic DNA testing which was, to some, an unproven forensic tool. TWGDAM completed a white paper in October 1989 which provided conceptual and operational concepts for a Combined DNA Index System to share DNA profiles among crime laboratories similarly to automated fingerprint identification which had become commonplace in law enforcement during the 1980s. The FBI Laboratory began a pilot project with six state and local crime laboratories to develop software to support each laboratory's DNA testing and allow sharing of DNA profiles with other crime laboratories. The DNA Identification Act of 1994 formally authorized the FBI to operate CODIS and set national standards for forensic DNA testing. The TWGDAM guidelines served as interim standards until recommendations were provided by a DNA Advisory Board required under the Act. Although the Act was passed in 1994, CODIS did not become fully operational until 1998.  The CODIS database originally was primarily used to collect DNA of convicted sex offenders. Over time, this has expanded. Currently all fifty states have mandatory DNA collection from certain felony offenses such as sexual assault and homicide, and 47 states collect DNA from all convicted felons. Other states have gone further in collecting DNA samples from juveniles and all suspects arrested. In California, as a result of Proposition 69 in 2004, all suspects arrested for a felony, as well as some individuals convicted of misdemeanors, will have their DNA collected starting in 2009. In addition to this, all members of the US Armed Services who are convicted at a Special court martial and above are ordered to provide
  • 53. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] DNA samples, even if their crime has no civilian equivalent (for example adultery). Currently, the ACLU is concerned with the increased use of collecting DNA from arrested suspects rather than DNA testing for convicted felons. Along with the ACLU, civil libertarians oppose the use of a DNA database for privacy concerns as well as possible institutionalized discrimination policies in collection. COFEE Computer Online Forensic Evidence Extractor      top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security CyberArmy  chat, forums Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW DARPA Defense Advanced Research Projects Agency FBI, Carnivore, Diagnostic Tool FBI New York Times NSA executive order authorizing data mining of phone calls and file. Microsoft has developed a small plug-in device that investigators can use to quickly extract forensic data from computers that may have been used in crimes.  The COFEE, which stands for Computer Online Forensic Evidence Extractor, is a USB "thumb drive  Seattle Times  The device contains 150 commands that can dramatically cut the time it takes to gather digital evidence, which is becoming more important in real-world crime, as well as cybercrime. It can decrypt passwords and analyze a computer's Internet activity, as well as data stored in the computer.  Controlled Drug Users       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security CyberArmy  chat, forums Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center WMR The Drug Enforcement Agency says it does track prescriptions of so-called controlled substances — including some mood-altering medications — but not all prescriptions made in the United States." The issue is to what extent does the DEA track prescription drug users and what prompted the government to check on records pertaining to Cho Seung-hui, who was reported to have been treated for mental problems in the past? The Psychotropic Substances Act of 1978 added mind-altering drugs to the list of official Controlled Substances. Prescriptions for these controlled substances have a "DEA Number" used for tracking controlled substances. The Cho incident and the comments and quick retractions by "senior federal officials" indicate that there is a secret federal government capability to track controlled drug users. Advanced Research and Development    DARPA, IPTO, BICA, LifeLog, Forester, Virat, RSTA       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security CyberArmy  chat, forums Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center Googlewatch  watch how Cnet Tech News First History of the Internet DARPA ISP Planet news Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  Netsys the Intelligent Hackers Choice Senate Commerce, Science and Transportation Committee    Advanced Research and Development Activity Office ARDA, data mining alive and well CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department
  • 54. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Google undermines net  Homeland Security Law threatens privacy Smirking Chimp Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA Center for Strategic and International Studies   Critical Infrastructure Assurance Office  ciao.gov Cybersecurity Enhancement Act DARPA Defense Advanced Research Projects Agency Dept of Defense DIOR contract awards Dept of Homeland Security domestic spying New York Times NSA executive order authorizing data mining of phone calls and file. Pentagon Virage Inc Video analysis and contact extraction. Part of the Autonomy Group Wikipedia Information Innovation Office) Despite the withdrawal of funding for the TIA and the closing of the IAO, the core of the project survived. 3] 4] 25] Legislators included a classified annex to the Defense Appropriations Act that preserved funding for TIA's component technologies, if they were transferred to other government agencies. TIA projects continued to be funded under classified annexes to Defense and Intelligence appropriation bills. However, the act also stipulated that the technologies only be used for military or foreign intelligence purposes against foreigners. 26] TIA's two core projects are now operated by Advanced Research and Development Activity (ARDA) located among the 60-odd buildings of "Crypto City" at NSA headquarters in Fort Meade, MD. ARDA itself has been shifted from the NSA to the Disruptive Technology Office (run by to the Director of National Intelligence). They are funded by National Foreign Intelligence Program for foreign counterterrorism intelligence purposes. One technology, codenamed "Basketball" is the Information Awareness Prototype System, the core architecture to integrate all the TIA's information extraction, analysis, and dissemination tools. Work on this project is conducted by SAIC through its former Hicks & Associates consulting arm run by former Defense and military officials and which had originally been awarded US$19 million IAO contract to build the prototype system in late 2002. 27] The other project has been re-designated "TopSail" (formerly Genoa II) and would provide IT tools to help anticipate and preempt terrorist attacks. SAIC has also been contracted to work on Topsail, including a US$3.7 million contract in 2005. edit]Media coverage and criticism  ....   The first mention of the IAO in the mainstream media came from The New York Times reporter John Markoff on February 13, 2002. 28] Initial reports contained few details about the program. In the following months, as more information emerged about the scope of the TIA project, civil libertarians became concerned over what they saw as the potential for the development of an Orwellian mass surveillance system. On November 14, 2002, The New York Times published a column by William Safire in which he claimed " TIA] has been given a $200 million budget to create computer dossiers on 300 million Americans." 29] Safire has been credited with triggering the anti-TIA movement. 30] BICA: project to create "Biologically Inspired Cognitive Architectures" Bootstrapped Learning: a project to bring about "instructable computing" by driving the creation of machine learning algorithms that are responsive to models of human-to-human instruction LifeLog, an IPTO project "to trace the 'threads' of an individual's life in terms of events, states, and relationships" by creating "an ontology-based (sub)system that captures, stores, and makes accessible the flow of one person’s experience in and interactions with the world in order to support a broad spectrum of associates/assistants and other system
  • 55. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] capabilities." FORESTER: a program to develop a helicopter-borne radar system that can detect soldiers and vehicles moving underneath folliage cover VIRAT: analysis and storage of video surveillance data Deep Green: U.S. Army battlefield decision-making support system Heterogeneous Urban RSTA Team: aerial surveillance program designed to monitor cities with self-directed UAVs High Productivity Computing Systems: project for developing a new generation of economically viable high productivity computing systems for national security and industry in the 2007 to 2010 timeframe Digital TV       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Electronic Privacy Information Center lawsuits, FBI, FOI   White Dot find out how to free yourself from television. Spy TV,  Interactive TV, . Googlewatch  watch how Google undermines net  Homeland Security Law threatens privacy Privacy International Human rights group, watchdog on surveillance by govt/biz ZDNet, UK news Cnet Tech News First ISP Planet news PrivacyDigest privacy news Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter. Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy.   Ad-ID Ad-ID.org Advertising Digital Identification, LLC American Advertising Federation legislative news, Judy Hu, of General Electric on Board of Directors, Secretary. Association of National Advertisers help develop Ad-ID,  Self Regulation Guidance,  American Association of Advertising Agencies Management oriented trade organization reps advertising agency biz in U.S.  likely to endorse Bush. Chartered Institute of Marketing, UK, info resource for marketing / sales. Service, News.  Worlds largest marketing body   There is a connection between NSA phone records database , Amdocs and 9/11.
  • 56. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] The pic on left is a composite of Government photos (download) of Pentagon 9/11. Where's the airliner wreckage? The collapse of the building section did not occur until 30 minutes after the impact The lawn was not touched by the attack aircraft. almost no 2nd floor damage. Generator trailer (fire) holds significant clues. See National Fire Protection Association analysis. See event summary See alphabetic index of terms DNA databases       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security CDI Center for Defense Information Center for Democracy and Technology, domestic spying watch  Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Electronic Privacy Information Center lawsuits, FBI, FOI   Epic  Electronic Privacy Information Center Privacy International Human rights group, watchdog on surveillance by govt/biz World Watch Daily  Christian perspective on Cnet Tech News First ISP Planet news Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  PrivacyDigest privacy news   Center for Strategic and International Studies   CIA Central Intelligence Agency Engelhart Institute of Molecular Biology  sear Rutherford Institute  in defense of civil liberties and human rights   Drones & Balloons, HART/HURT   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU   and NSA lawsuit drones, unmanned, Armed Services Committee ISP Planet news Senate Commerce, Science and Transportation CIA Central Intelligence Agency FCC, Powell
  • 57. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Big Brother and the ministry of Homeland Security CyberArmy  chat, forums Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW PrivacyToday  news Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Committee  Senate Committee on Commerce, Science and Transportation AUVSI   Assc. for Unmanned Vehicle Systems Intenational GovExec:  Surveillance drones protect pipelines, monitor traffic on highways, and 'aid in other homeland security missions'. 12/02.  Transportation Department Research and Special Programs Administration   House Armed Services Committee  News Lockheed Martin US personal database, defense contractor, Bush Janes Headlines Defense news Pentagon Securius.com  defending cyberspace security Whitehouse.gov Bush war on the internet Wikipedia The Heterogeneous Aerial Reconnaissance Team (HART) -- formerly known as the "Heterogeneous Urban RSTA Team (HURT)" -- program was an aerial surveillance project funded by the Information Processing Technology Office (which was merged into the Wikipedia Information Innovation Office)of the Defense Advanced Research Projects Agency with program managers John Bay and Michael Pagels. The purpose of the program was to develop systems that could provide continuous, real-time, three-dimensional surveillance of large urbanized areas, using unmanned aerial vehicles. The project team was led by Northrop Grumman corporation, and involved several other academic and corporate researchers.The unique features of the HART program are that it developed systems to "decouple soldiers from flight control" -- that is, the UAVs automatically pilot themselves—taking care of flight control, collision prevention, and camera/sensor control automatically. When the drones notice suspicious activity, they notify the person with the HART control panel so that they can monitor the situation. Another feature of HART was to design handheld devices, to display surveillance video to small unit leaders in the field (as opposed to only being available to officers/agents in a control room). A third significant feature is that troops can request surveillance in an area, and a set of drones will automatically come over and take care of it themselves—all the soldiers have to do is ask for it, and then they can forget about it. and also see Totse Suspicious Activities Involving Israeli Art Students at DEA Facilities by DEA Remember FBI wiretaps of Martin Luther King,  What are connections between Amdocs, Narus (Semantic Traffic Analysis) and NSA phone records database?  Tony Snow, Carl Cameron, FoxNews report on Israeli art students removed?  Why? Drug Testing       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Privacy Watch, Cotse.net Internet Privacy Website, ISP Planet news National Clearinghouse for Alcohol and Drug Information NCADI, info on alcohol, tobacco, and illicit drugs Government Executive,  Poindexter... Whitehouse support. National Clearinghouse for Alcohol and Drug Information NCADI, info on alcohol, tobacco, and
  • 58. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Civil liberty watchdog Substance Abuse and Mental Health Services Administration U.S. Dept of Health and Human Services illicit drugs Prevention.org supports No Child Left Behind, Bush Whitehouse.gov Bush war on the internet DSL Internet Service  top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog ISP Planet news DSL Reports news FCC, Powell New York Times NSA executive order authorizing data mining of phone calls and file. Whitehouse Echelon       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First Austrian Research Center, European Union, Echelon, encryption, to develop unbreakable code that Echelon cant' break. History of the Internet DARPA Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  Center for Strategic and International Studies   Cybersecurity Enhancement Act Critical Infrastructure Assurance Office  ciao.gov New York Times NSA executive order authorizing data mining of phone calls and file. Einstein, Network Infrastructure Security, Deep Packet Inspection PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog WayneMadsenReport on Entersect, Certifion, LocatePlus, Bush data mining RipoffReport Certifion   Certifion Corporation - Locate America ripoff company made additional charges of $60+ to my credit card without my permission Internet *Editor's Suggestions on how to get your money back into your bank account! notes: Accurint, ChoicePoint's Autotrack or LexisNexis GlobalResearch  Under the rubric of cybersecurity, the Obama administration is moving forward with a Bush regime program to screen state computer traffic on private-sector networks, including those connecting people to the Internet, The Washington Post revealed July 3. Certifion Entersect a subsidiary of Certifion, LocatePlus  claims it maintains 12 billion records about 98 percent of Americans. Washington Post notes Despite protests to the contrary by securocrats, like other Bush and Obama “cybersecurity” initiatives the Einstein program is a backdoor for pervasive state surveillance. Government Computer News reported in December 2008 that Marc Rotenberg, the executive director of the Electronic Privacy Information Center (EPIC) said that “the misuse or exposure of sensitive data from such a program Einstein] could undermine the security arguments for surveillance.” WMR "... WMR has learned from government sources that the Bush administration has authorized massive surveillance of the Internet using as cover a cyber-security multi-billion
  • 59. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] dollar project called the "Einstein" program.  ...   Billed as a cyber-security intrusion detection system for federal computer systems and networks, WMR has been told that the actual intent of Einstein is to initially monitor the email and web surfing activities of federal employees and contractors and not in protecting government computer systems from intrusion by outsiders.   ...  In February 2008, President Bush signed a directive that designated the National Security Agency (NSA) as the central administrator for the federal government's computer and network security.   ...   Although Einstein is primarily a program under the aegis of the Computer Emergency Readiness Team (US-CERT) of the National Cyber Security Division of the Homeland Security Department, WMR has learned that it has the personal support of Director of National Intelligence (DNI) Mike McConnell, a former NSA director. Einstein is advertised as merely conducting traffic analysis within the dot (.) gov and dot (.) mil domains, including data packet lengths, protocols, source and destination IP addresses, source and destination ports, time stamp information, and autonomous system numbers. However, WMR has learned that Einstein will also bore down into the text of email and analyze message content. In fact, most of the classified budget allotted to Einstein is being used for collecting information from the text of messages and not the header data." full story ... more search terms: PINWHEEL, PINWALE, GCSB, New Zealand, private sector surveillance, black projects, .com, .edu, .int, .gov, .mil, FCC, black budgets, Vodaphone, cellular phone eavesdropping, Greece, locked field, trap door, sub system, GlobalResearch Called the “flagship system” in the national security state’s cyber defense arsenal, The Wall Street Journal reports that Einstein is “designed to protect the U.S. government’s computer networks from cyberspies.” In addition to cost overruns and mismanagement by outsourced contractors, the system “is being stymied by technical limitations and privacy concerns.” According to the Journal, Einstein is being developed in three stages: Einstein 1: Monitors Internet traffic flowing in and out of federal civilian networks. Detects abnormalities that might be cyber attacks. Is unable to block attacks. Einstein 2: In addition to looking for abnormalities, detects viruses and other indicators of attacks based on signatures of known incidents, and alerts analysts immediately. Also can’t block  attacks. Einstein 3: Under development. Based on technology developed for a National Security Agency program called Tutelage, it detects and deflects security breaches. Its filtering technology can read the content of email and other communications. (Siobhan Gorman, “Troubles Plague Cyberspy Defense,” The Wall Street Journal, July 3, 2009) Electronic Passport, top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security Center for Democracy and Technology  Elect Epic  Electronic Privacy Information Center The Nation History and structure of global telegraphic surveillance  Cnet Tech News First Notes: search terms, carrier-grade networks, NetDiscovery, IP-based, intelligent infrastructure services, IP security and compliance management, NarusSecure, monitoring, VOIP, IMS, IPTV, real- time traffic insight, NarusInsight,  Center for Strategic and International Studies   Cybersecurity Enhancement Act FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut probe down. New York Times NSA executive order authorizing data mining of phone calls and file. Email Surveillance, top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security Center for Democracy and Technology  Elect Epic  Electronic Privacy Information Center The Nation History and structure of global telegraphic surveillance  Salon  Israeli art students, DEA, Amdocs searchable file Cnet Tech News First Notes: search terms, carrier-grade networks, NetDiscovery, IP-based, intelligent infrastructure services, IP security and compliance management, NarusSecure, monitoring, VOIP, IMS, IPTV, real- time traffic insight, NarusInsight,  Are Republicans opposed to Bush's warrantless wiretapping  irrelevant and impotent? Center for Strategic and International Studies   Cybersecurity Enhancement Act FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut probe down. New York Times NSA executive order authorizing data mining of phone calls and file.
  • 60. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Entersect       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Big Brother and the ministry of Homeland Security Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog WayneMadsenReport on Entersect, Certifion, LocatePlus, Bush data mining RipoffReport Certifion   Certifion Corporation - Locate America ripoff company made additional charges of $60+ to my credit card without my permission Internet *Editor's Suggestions on how to get your money back into your bank account! notes: Accurint, ChoicePoint's Autotrack or LexisNexis Certifion Entersect a subsidiary of Certifion, LocatePlus  claims it maintains 12 billion records about 98 percent of Americans. Washington Post   WayneMadsenReport An April 2, 2008 article in The Washington Post by Robert O'Harrow that reported on the expansion of intelligence "fusion centers" around the country that are compiling personal information on Americans from a CIA database called "Proton," the FBI, police departments, and private data mining firms referred to a little-known private data company called Entersect, which is routinely tapped by Maryland law enforcement and homeland security entities.  ...  The Post article stated that Entersect has 12 billion files on 98 percent of Americans. Entersect is headquartered in Santa Ana, California and is a subsidiary of Certifion Corporation, which is, in turn, a wholly-owned subsidiary of LocatePlus Holdings Corporation. LocatePlus' other subsidiaries are LocatePlus Corp., Dataphant, Inc. (which acquired Voice Power Technology, Inc.), and Metrigenics, Inc., a biometrics firm. WMR  NSA / Trailblazer   More high-level fraud at NSA uncovered    January 18-19, 2012 --   WMR's sources at the National Security Agency (NSA) have reported more high-level fraud at the agency that now combines signals intelligence and cyber-warfare functions under one officer, Army General Keith Alexander, the NSA director and commander of the U.S. Cyber Command.    ...   When Alexander's predecessor at NSA, Air Force General Michael Hayden, was shopping for his own replacement, Alexander was the Deputy Chief of Staff for G-2 for the U.S. Army. Alexander would only take the job, according to our sources who were embedded in the Director of NSA's office, if Dr. James Heath became the senior science adviser to Alexander at NSA.    ...   There was only one problem. Heath had his own company, Object Sciences Corporation, a firm which was intimately involved with tracking "Al Qaeda" operatives prior to the 9/11 attacks. Object Sciences provided deep data mining services to the Army's Land Information Warfare Agency's and Defense Intelligence Agency's ABLE DANGER and its affiliated DORHAWK GALLEY data mining programs.    ...   At the same time, Hayden had shown favoritism to Science Applications International Corporation (SAIC) in awarding the firm, as prime contractor, the over one billion dollar signals intelligence overhaul program known as TRAILBLAZER. Hayden hired William Black, a former NSA official who had retired and went to work for SAIC, as his Deputy Director at NSA. The issue with Heath was solved when SAIC purchased Object Sciences, providing a handsome profit to Heath prior to his taking the science adviser position under his friend Alexander. Black eventually returned to SAIC from his stint as NSA deputy director.    ...   The following press release was issued on May 12, 2005: "Science Applications International Corp. has completed its acquisition of Object Sciences Corp., the company announced today. Terms of the deal were not disclosed . . . OSC's involvement in reshaping how intelligence surveillance and reconnaissance information is processed and analyzed has provided critical assistance to combat forces in specific theaters, such as Iraq and Korea, as well as the war on global terrorism in general, SAIC said."    ...   Alexander took over as NSA director on August 1, 2005, a few months after the SAIC-OSC deal. Heath then became Alexander's chief science adviser.     ...   Another former SAIC principal who, like Black, transitioned from SAIC to NSA and back again to SAIC was Sam Visner. After joining NSA from SAIC, Visner was the senior acquisition manager for NSA and was key to the award of the TRAILBLAZERcontract to SAIC. A less expensive signals intelligence re- engineering solution code-named THIN THREAD, was rejected by NSA in favor of the TRAILBLAZER, which was later canceled after SAIC pocketed hundreds of millions of dollars.    ...   Hayden went on to become the first deputy Director of National Intelligence and, ultimately, the CIA director. He now works with former Homeland Security Secretary Michael Chertoff at Chertoff Group. His pet project, TRAILBLAZER, was canceled due to cost overruns and failed deliveries and was replaced by another reported contractor boondoggle called TURBULENCE. A number of senior NSA, Justice Department, and congressional officials were harassed and one, Thomas Drake, prosecuted for revealing the corruption. Those coming under NSA and FBI scrutiny, all subjected to harassment and threat of prosecution, included, in addition to Drake, Justice Department prosecutor Thomas Tamm, House Intelligence Committee budget specialist Diane Roark, NSA officials William Binney, Kirk Wiebe, and Ed Loomis, and others, never mentioned in press accounts, who were interviewed by WMR.    ...   One former NSA official who was terminated and then placed under NSA Security and FBI surveillance after reporting through proper channels fraud, waste, and abuse with TRAILBLAZER and associated contracts, told WMR, "we are not whistleblowers but witnesses to major crimes committed by NSA and contractors."    ...   Among the spin-offs of TRAILBLAZERwas the unconstitutional STELLAR WIND program that permitted NSA to engage in wholesale warrantless wiretapping of phone calls, emails, and faxes, particularly journalists and elected political leaders.    ...   Hayden, who has become a national security adviser to Mitt Romney and would be assured a top-level job in a Romney administration, perhaps National Security Adviser, is also involved with a subscription web service called LIGNet, or "Langley Intelligence Group Network" as a "LIGNet adviser." WMR has been told by intelligence community insiders that LIGNet is an operational security (OPSEC) problem because a wealth of borderline classified information appears on the web site.    ...   Some of the LIGNet information makes what was released in the WikiLeaks Department of State cable release pale in comparison. As for charges that Private First Class Bradley Manning was responsible for downloading over a quarter million classified cables from the Secret Internet Protocol Router Network (SIPRNet), a former senior NSA official told WMR: "That is impossible. All SIPRNet drives are non-writable for CDs and as far as thumb drives are concerned, install one and security alarms are immediately set off." EZPass       top
  • 61. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech Big Brother and the ministry of Homeland Security Epic  Electronic Privacy Information Center Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog WayneMadsenReport on Entersect, Certifion, LocatePlus, Bush data mining Cnet Tech News First Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  AP Yahoo story below MotorAuthority  Kapsch has a ten-year agreement in place to provide transponders for 22 electronic toll systems across the United States. Kapsch’s latest patent filing is for a transponder equipped with a multi-function camera system, for the purpose of verifying the number of occupants within a vehicle. In other words, future Kapsch transponders may have the ability to monitor the inside of your car. FBI New York Times NSA executive order authorizing data mining of phone calls and file. Whitehouse  Bush Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.  MotorAuthority  Automated toll transponder systems, like EZ Pass used in the Northeast, make life easier for those who commute on toll roads, across bridges and through tunnels. Despite initial paranoia over the devices’ ability to track your speed from one point to another, no tickets have ever been issued to motorists who arrived at a toll plaza early, courtesy of a heavy right foot. With that in mind, there are two ways to look at the latest advance in transponder systems: it’s either no big deal, or it’s the stuff of an Oliver-Stone- film-induced nightmare. Kapsch TrafficCom AG is an Austrian company that manufactures transponders for programs such as EZ Pass. In fact, Kapsch has a ten-year agreement in place to provide transponders for 22 electronic toll systems across the United States. Kapsch’s latest patent filing is for a transponder equipped with a multi-function camera system, for the purpose of verifying the number of occupants within a vehicle. In other words, future Kapsch transponders may have the ability to monitor the inside of your car. Facial Recognition       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech Big Brother and the ministry of Homeland Security Epic  Electronic Privacy Information Center Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog WayneMadsenReport on Entersect, Certifion, LocatePlus, Bush data mining Cnet Tech News First Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  AP Yahoo story below FBI New York Times NSA executive order authorizing data mining of phone calls and file. Whitehouse  Bush Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.  FBI Tracking Devices      top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech Big Brother and the ministry of Homeland Security Epic  Electronic Privacy Information Center Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog WayneMadsenReport on Entersect, Certifion, LocatePlus, Bush data mining Cnet Tech News First Ifixit We partnered with Wired to bring you a peek inside an FBI car-tracking device. The device is similar to the one Yasir Afifi found underneath his car. Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  AP Yahoo story below FBI New York Times NSA executive order authorizing data mining of phone calls and file. Whitehouse  Bush Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.  Ifixit We partnered with Wired to bring you a peek inside an FBI car-tracking device. The device is similar to the one Yasir Afifi found underneath his car. If you're curious where this one came from, Wired has posted a writeup about Kathy Thomas, the woman who found this tracker under her car. They've also posted a video of Kyle doing the teardown.   ... 
  • 62. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] The device comprises of a GPS unit for receiving the car's position, an RF transmitter for relaying your location to the interested authority (aka the FBI), and a set of sweet D-cell batteries that power the whole enchilada. But we didn't stop there, of course. Read on to find out exactly what components make this secretive device tick.    ...   Disclaimer: We love the FBI. We've worked with them on several occasions to fight crime and locate criminals. We've helped them with instructions on gaining entry into certain devices. We have nothing against them, and we hope they don't come after us for publishing this teardown. FBI Surveillance      top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech Big Brother and the ministry of Homeland Security Cnet Tech News First Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  AP Yahoo story below FBI New York Times NSA executive order authorizing data mining of phone calls and file. Whitehouse  Bush Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.  FEMA secret databases    top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech Big Brother and the ministry of Homeland Security Epic  Electronic Privacy Information Center Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog WayneMadsenReport on Entersect, Certifion, LocatePlus, Bush data mining Cnet Tech News First FBI FDIC New York Times NSA executive order authorizing data mining of phone calls and file. Whitehouse  Bush Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.  FDIC The FDIC has prescribed in its regulations, Section 326, Subpart B- Procedures for Monitoring Bank Secrecy Act Compliance (12 CFR Part 326.8) a requirement that depository institutions establish and maintain procedures reasonably designed to assure and monitor the compliance with the BSA and the implementing regulations 31 CFR 103. The FDIC monitors compliance with the BSA-related regulations by conducting on-site examinations of every FDIC-supervised depository institutions. BSA compliance is a safety and soundness issue due to the reputational, regulatory, legal, and financial risk exposure to the bank for being involved in money laundering schemes or willfully violating the BSA statute. Civil money penalties and regulatory enforcement actions may be imposed for noncompliance with money laundering regulations which can endanger capital and earnings. Furthermore, banks may be criminally prosecuted for willful violations of money laundering statutes, which could ultimately lead to termination of FDIC insurance. Wikipedia The Bank Secrecy Act of 1970 (or BSA, or otherwise known as the Currency and Foreign Transactions Reporting Act) requires financial institutions in the United States to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, and file reports of cash purchases of these negotiable instruments of more than $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. Many banks will no longer sell negotiable instruments when they are purchased with cash, requiring the purchase to be withdrawn from an account at that institution. The BSA was originally passed by the Congress of the United States in 1970, and amended several times since then, including provisions in title III of the USA PATRIOT Act. (See 31 USC 5311-5330 and 31 CFR Chapter X.) The BSA is sometimes referred to as an "anti-money laundering" law ("AML") or jointly as “BSA/AML”. 1] FDIC Bank Transaction Surveillance    top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation working to protect civil and free speech Big Brother and the ministry of Homeland Security Epic  Electronic Privacy Information Center Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog WayneMadsenReport on Entersect, Certifion, Cnet Tech News First FBI FDIC New York Times NSA executive order authorizing data mining of phone calls and file. Whitehouse  Bush Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent. 
  • 63. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] LocatePlus, Bush data mining FDIC The FDIC has prescribed in its regulations, Section 326, Subpart B- Procedures for Monitoring Bank Secrecy Act Compliance (12 CFR Part 326.8) a requirement that depository institutions establish and maintain procedures reasonably designed to assure and monitor the compliance with the BSA and the implementing regulations 31 CFR 103. The FDIC monitors compliance with the BSA-related regulations by conducting on-site examinations of every FDIC-supervised depository institutions. BSA compliance is a safety and soundness issue due to the reputational, regulatory, legal, and financial risk exposure to the bank for being involved in money laundering schemes or willfully violating the BSA statute. Civil money penalties and regulatory enforcement actions may be imposed for noncompliance with money laundering regulations which can endanger capital and earnings. Furthermore, banks may be criminally prosecuted for willful violations of money laundering statutes, which could ultimately lead to termination of FDIC insurance. Wikipedia The Bank Secrecy Act of 1970 (or BSA, or otherwise known as the Currency and Foreign Transactions Reporting Act) requires financial institutions in the United States to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, and file reports of cash purchases of these negotiable instruments of more than $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. Many banks will no longer sell negotiable instruments when they are purchased with cash, requiring the purchase to be withdrawn from an account at that institution. The BSA was originally passed by the Congress of the United States in 1970, and amended several times since then, including provisions in title III of the USA PATRIOT Act. (See 31 USC 5311-5330 and 31 CFR Chapter X.) The BSA is sometimes referred to as an "anti-money laundering" law ("AML") or jointly as “BSA/AML”. 1] FirstFruits, Warrantless Surveillance of American Journalists        top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Arstechnica  evesdropping on American Journalists, for data mining,. Electronic Frontier Foundation working to protect civil and free speech Big Brother and the ministry of Homeland Security DailyKOS Insider Magazine reprint Madsen  Bill Gertz of The Washington Times features prominently in the database. Before Hayden's reign and during the Clinton administration, Gertz was often leaked classified documents by anti-Clinton intelligence officials in an attempt to demonstrate that collusion between the administration and China was hurting U.S. national security. Arstechnica  evesdropping on American Journalists, for data mining,. What is Tearerism ? Summary,  NSA listening to private conversations of  Americans, data mining, blackmail? ABCNews , Senate Intelligence Committee, Jay Rockefeller investigating.  FIRSTFRUITS NSA wiretaps of American Journalists, program revealed by Wayne Madsen, name of program then changed.  WMR  Higher Than Top Secret Daily Newscaster Martial Law Training, Indianapolis --- June, 2008 Neil Entwistle, 911, FAA, NORAD, Ptech, foreknowledge of 911 communication systems role in 911, convicted of murder, questionable trial, proceedings.   Cnet Tech News First Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  AP Yahoo story below notes: WMR has learned from additional National ABCNews   FBI New York Times NSA executive order authorizing data mining of phone calls and file. Whitehouse  Bush Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.  UPI  file  In order that the database did not violate United States Signals Intelligence Directive (USSID) 18, which specifies that the names of "U.S. persons" are to be deleted through a process known as minimization, the names of subject journalists were blanked out. However, in a violation of USSID 18, certain high level users could unlock the database field through a super-user status and view the "phantom names" of the journalists in question. Some of the "source" information in FIRSTFRUITS was classified—an indication that some of the articles in database were not obtained through open source means. In fact, NSA insiders report that the communications monitoring tasking system known as ECHELON is being used more frequently for purely political eavesdropping having nothing to do with national security or counter terrorism.
  • 64. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Security Agency (NSA) sources that this editor's (Madsen) communications -- cell phone, e-mail, text messages, and faxes -- are under a full digital interception order by the NSA. Previously, I was informed by NSA sources that a "full digital" surveillance package was authorized on all my communications.  ...   It is becoming apparent that the "Eyes Only"/compartmented code word program authorized by President George W. Bush and Vice President Dick Cheney in the wake of the 9/11 attacks included warrantless surveillance of American journalists and their sources. WMR exposed the existence of a database containing journalist surveillance data that was code-named "FIRSTFRUITS" before the code name was changed after our disclosure. WMR  Higher Than Top Secret  "One of the most classified surveillance programs in the Bush administration was so limited in access only very few individuals, including President George W. Bush, Vice President Dick Cheney, Cheney Chief of Staff David Addington, CIA director Michael Hayden, FBI director Robert Mueller, then-White House Chief of Staff Andrew Card, and three successive Attorneys General -- John Ashcroft, Alberto Gonzales, and Michael Mukasey -- know of its existence.  ...   Known by a code word, sometimes abbreviated, following the classification TOP SECRET - EYES ONLY and which was contained on some files that Gonzales took home with him and kept in an unsecured manner against Justice Department regulations, the warrantless National Security Agency (NSA) surveillance program was so beyond legality that acting Attorney General James Comey refused to re-certify it upon its expiration in March 2004. There is a strong possibility that the code word program was connected to the NSA surveillance program aimed at tracking down leaks of classified information to the media from government sources. The leak tracking program was code named FIRSTFRUITS. Due the program's revelations by WMR, NSA has renamed the operation with a new code word. Previously, WMR learned from an informed source that part of the domestic surveillance system may have also involved a Federal Emergency Management Agency (FEMA) database of suspect Americans. The database is called Main Core. " DailyKOS "Apparently, they've also been spying on other members of the government who may have been potential whistleblowers, journalists and even members of Congress. ... NSA spied on its own employees, other U.S. intelligence personnel, and their journalist and congressional contacts. WMR has learned that the National Security Agency (NSA), on the orders of the Bush administration, eavesdropped on the private conversations and e- mail of its own employees, employees of other U.S. intelligence agencies -- including the CIA and DIA -- and their contacts in the media, Congress, and oversight agencies and offices. ... The journalist surveillance program, code named "Firstfruits," was part of a Director of Central Intelligence (DCI) program that was maintained at least until October 2004 and was authorized by then-DCI Porter Goss. Firstfruits was authorized as part of a DCI "Countering Denial and Deception" program responsible to an entity known as the Foreign Denial and Deception Committee (FDDC). Since the intelligence community's reorganization, the DCI has been replaced by the Director of National Intelligence headed by John Negroponte and his deputy, former NSA director Gen. Michael Hayden."  Wired blog  "Inside Operation Highlander: the NSA's Wiretapping of Americans Abroad  ...   A top secret NSA wiretapping facility in Georgia accused of spying on Americans illegally was hastily staffed with inexperienced reservists in the months following September 11, where they worked under conflicting orders and with little supervision, according to three former workers at the spy complex.   ...    "Nobody knew exactly what the heck we were doing," said a former translator for the project, code named Highlander, who spoke on condition of anonymity. "We were figuring out the rules as we were going along."   ...   Former Army Reserve linguist Adrienne Kinne, who worked at the facility at Fort Gordon, won new attention this week for her year-old claim that she and her group intercepted and transcribed satellite phone calls of American civilians in the Middle East for the National Security Agency. Senate intelligence committee chair Jay Rockefeller (D-W.Va.) opened a probe into the alleged abuses after ABC News reported on them Thursday." Oct 2008 Garden Plot, Blog Tracking        top
  • 65. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Amnesty International Anthrax Vaccination Immunization Program Army cover-up, search court martial Arms Sales Monitoring Carlyle Group.net Center for Constitutional Rights, watching the events of Guantanamo, detainees, Supreme Court decisions. Center for Defense Information weekly defense monitor  Center for Peace and Liberty, The Independent Institute Center for Public Integrity midwife a terrorist Conciliation Resources Daily KOS DissidentVoice 13 myths about case for war against Iraq Ethical Spectacle  Free speech, Bush fascism, what's next.  Eurolegal Services International institutions, news, comment, Middle East affairs, Iraq Body Count, Iraqi resistance to occupation.   Go to Bush / Obama warrantless surveillance of American Journalists...program: FirstFruits FAS search National Intelligence estimate Findlaw, War on Terrorism Special coverage Fired UP  search terms:  American Turkish Council, Hastert, Sibel Edmonds,  Glasgow Media Group promote new research methodologies on the media Global Policy Watching Guantanamo Global Witness International  GlobalVision News Network news / info from the inside out Guardian "Israel accused of using deadly new weapon in Gaza.   death due to unseen injuries, severe burning, deep internal wounds, 'dusting' on severely damaged internal organs, bodies severely fragmented, melted, disfigured.  DIME weapon: carbon fibre casing and contains fine tungsten particles, limited blast radius, Dense Inert Metal Garden Plot  Summary,  Daily Newscaster Martial Law Training, Indianapolis --- June, 2008 What is Tearerism ? Neil Entwistle, 911, FAA, NORAD, Ptech Walsh Report, National Archives search: Robert Gates, nominee for Secretary of Defense and go to NFU 'War on Terrorism' pages for more Emp-zan)  Iraq  -- NFU visitor American Immigration Lawyers Association search Patriot Act Center for Strategic and International Studies   Conflict Watch FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW IAEA International Atomic Energy Association Institute for Defence and Strategic Studies, Singapore, Thailand, links and thing tanks Intel Daily, Sarkozy, "people are born pedophiles",  International Committee of the Red Cross, why did they wait months to report Iraq prison abuse. International Relations and Security Network, Swiss Contribution to the Partnership for Peace International Terrorism Observatory, Paris, France Legislation related to 9/11 National CFIDS Foundation Chronic Fatigue Immune Dysfunction,  ME, Myalgic Encephalopathy National Security Archive in periodically releases unclassified docs.  North American Freedom Foundation "Advocating for U.S. and Canadian victims and survivors of mind control, torture, slavery, and related terror through education and remembrance." Strategic Intelligence, from Loyola College Department of Political Science Times Online The US is helping Morocco to build a new American Service-Members' Protection Act Anti Terrorism Coalition, Islam is taking over the world American Turkish Council Battelle Memorial Institute develops new tech, commercializes products CISAC Stanford links CNS News search, flushed Quran down toilet, US, Guantanamo FEMA Concentration Camp, Beech Grove, Indiana YouTube   enlarge for full map and FEMA Concentration Camps list and Liberty Post Council on Foreign Relations  corporate power to rural poor Republicans Danger Zone Jobs.com DARPA Defense Advanced Research Projects Agency DefendAmerica Dept of Homeland Security Dept of State, International Info Prg Response to Terror FEMA fake news conference YouTube  and more below Fox news FBI War on Terrorism, most wanted list,  Gyre.org tracking the next military & tech revolutions. Iraq, Facing the Threat International Policy Institute for Counter-Terrorism, Terrorism database Institute for Science and International Security
  • 66. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Explosive. Human Rights Watch Human Rights First, formerly Lawyers Committee for Human Rights IACenter Founded by Ramsey Clark Indymedia.uk anthrax Bush, Bin Laden, search Go to NewsFollowup.com Economy Page Intervention Magazine, "War, Politics, Culture",  Liberty Dogs, the Homeland Security Watchdogs Military Corruption.com anthrax vaccine info, court martial Multinational Monitor  column on corporate power New American Bargain blog, politics: Oliver North was central figure in Reagon Iran-Contra scandal, a convicted felon for funneling arms and money to Nicaraguan Contras in violation of 1984 Bolland Amendment.  Conviction overturned by Laurence Silberman, the chairman of the Bush's WMD committee. News from Russia  Pravda, Israel, search Not in Our Name NoWarIraq Pacific Life Research Center Understanding the 'war on terrorism'.pdf  ProgresoWeekly UN has learned of allegations of terrorist prison ships, Indian Ocean, Diego Garcia island    Refuse & Resist  RightWeb, American Turkish Council Sibel Edmonds, Just a Citizen, official  SourceWatch on Sibel Edmonds, search terms: translator hired by FBI after 9/11, Washington D.C. U.S. Court of Appeals, unable to open hearings, whistleblower,   Stanton, Madsen   Talking Points Memo Third World Traveler alternate view of democracy The Fire This Time Weapons of Mass Deception Transparency International Who Dies for Bush Lies World Peace Herald, on Pentagon stops Weldon / Atta file destruction probe. interrogation and detention facility for Al-Qaeda suspects near its capital, Rabat.  search terms: Ain Aouda, Direction de la Securité du Territoire (DST), Temara, Moroccan secret police, rendition, CIA, Rumsfeld UN NewsCentre   Office of Managing Risk and Public Safety Urban Institute UCLA, Dept of Epidemiology, School of Public Health URUKnet Abu Ghraib Web Index, 9/11, Johns Hopkins notes Office of Special Plans? Mother Jones, on Pentagon intelligence unit built case for Iraq war.  more search words: Kwiatkowski, NESA, Wolfowitz, Feith, Committee for the Liberation of Iraq.  Ignore Palestinians, go for regime change in region.  Harold Rhode,  American Enterprise Institute, Defense Policy Board, David Wurmser.  They all knew there was no noteworthy link between Al Qaeda and Iraq.   NATIONAL SECURITY PRESIDENTIAL DIRECTIVE / NSPD 51 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE / HSPD-20 notes Chad, War on Terror, oil, France, Sarkozy   Cnet Tech News First AngelBabe43 Operation Cable Splicer and Garden Plot are the two sub programs which will be implemented once the Rex 84 program is initiated for its proper purpose. Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy. 2] 3] 4] 5] MKUltra involved the use of many methodologies to manipulate people's individual mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture. 6]   International Committee of the Red Cross, why did they wait months to report Iraq prison abuse. Lt. Gen William G. Boykin, Pentagon investigation has concluded that he violated regulations by failing to make clear he was not speaking in an official capacity, when he made church speeches casting the "war on terrorism" in religious terms.  In most cases he was wearing his uniform.  Search CBS News for more information. National Intelligence Council Iraq War estimate. NBC Industry Group CB Defense systems National Strategy to Secure Cyberspace Whitehouse, Bush, Cheney, 'war on terrorism' FEMA Concentration Camp, Beech Grove, Indiana YouTube     New York Times force feeding detainees NTI WMD411 preventing spread of  wmd PNNL, neural network, protein research, operated by Battelle, with Agilent  Patterns of Global Terrorism US State Dept Harvard, Risk of death, bioterroism, 1 in 56 million State Dept Counter Terrorism Office, Counterterrorism Office, codewords Solutions North America,, Charles P. Sexton, Terrorism Q&A Terrorism Research Center  security analysis, terrorist profiles, links,  TIP Terrorist Interdiction Program State Dept War on Terrorism American Enterprise Institute War on Terrorism, Chicago Sun Times   Weldon: Atta papers destroyed on orders, letter Weekly Defense Monitor  Wilmer Cutler & Pickering Chi Winds of Change 'Covering the War on Terror' Wisconson Project Cybersecurity Enhancement Act FCC, Powell Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.  
  • 67. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Wikipedia The Operation Garden Plot is a map of the U.S. Army and the National Guard of the United States to respond to major disasters in civil society within the United States. The plan was developed in the 1960s to respond to civil disorder and is now under the control of Northern Command ( NORTHCOM ). It allows the military to help U.S. federal law enforcement to assist local governments in the States of the United States for public order problems. Operation Garden Plot was implemented to provide military assistance to civil authorities during the attacks of September 11, 2001 in New York triggering the operation Noble Eagle Protection airspace. The Pentagon has also developed this project to restore public order during the 1992 riots in Los Angeles . "The monitoring of these missions on national security should be provided by the NGB (National Guard Bureau) based on the model" Garden Plot "to which National Guard units are trained and equipped to support our missions to the civil authorities Crowd control problems and maintaining public order. " 1 AngelBabe43 Operation Cable Splicer and Garden Plot are the two sub programs which will be implemented once the Rex 84 program is initiated for its proper purpose. Garden Plot is the program to control the population. Cable Splicer is the program for an orderly takeover of the state and local governments by the federal government. FEMA is the executive arm of the coming police state and thus will head up all operations. The Presidential Executive Orders already listed on the Federal Register also are part of the legal framework for this operation. WMR has been investigating a covert operation involving active duty and reserve U.S. military personnel who infiltrate anti-war groups in the United States, particularly Iraq and Afghanistan veterans groups opposed to the Bush administration's war policies.  The move by the Bush administration appears to be a resurrection of Operation Garden Plot, a 1960s program that saw the use of National Guard units to quell civil disturbances in the United States, in addition to the infiltration of anti-war groups by National Guard and Reserve intelligence personnel.   WMR On April 11, 2002, Major General (ret.) Richard Alexander, the executive director of the National Guard Association of the United States, tipped his hand on Garden Plot when he testified before the Senate Appropriations Committee on Homeland Defense. Alexander stated, "Oversight of these homeland security missions should be provided by the National Guard Bureau based on the long-standing Garden Plot model in which National Guard units are trained and equipped to support civil authorities in crowd control and civil disturbance missions."  The governing directive for Garden Plot is Department of Defense Civil Disturbance Plan 55-2, Garden Plot. The Air Force implements Garden Plot in United States Air Force Civil Disturbance Plan 55-2, Garden Plot, dated July 11, 1984, while the Army implements Garden Plot with Department of the Army (DA) Civil Disturbance Plan - GARDEN PLOT, dated March 1, 1984.  Acting in coordination with the FBI's Domestic Counter-Intelligence Program (COINTELPRO), military intelligence agents infiltrated anti-war groups like the Vietnam Veterans Against the War (VVAW).     Geographic Information Systems GIS       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  and NSA lawsuit Electronic Frontier Foundation digital rights NGO, info, news Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First History of the Internet DARPA Space Today Satellite wars, Space Daily Cybersecurity Enhancement Act FCC, Powell Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.   GPS Location Technology       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%*
  • 68. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] ACLU  and NSA lawsuit Electronic Frontier Foundation digital rights NGO, info, news Highbeam search Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First History of the Internet DARPA GPS-enabled cell phones Wherify police tagging cars of suspects in criminal investigations Rental car tracking Satellite Security Systems, Inc Center for Strategic and International Studies   Cybersecurity Enhancement Act FCC, Powell Whitehouse, Bush Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.  Health Information Systems       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU   The Nation History and structure of global telegraphic surveillance  Health Privacy Project raise public awareness of health info privacy Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First History of the Internet DARPA Tetradyne Jeffrey Engel, M.D. State Epidemiologist NC DHHS, Division of Public health  Presentation – NC initiatives Homeland Security Presidential Directive-21 October 18,, 2007 Calls on the federal DHHS to "establish an operational national epidemiologic surveillance system for human health, with international connectivity where appropriate, American Health Information Association  provide medical records professionals with educational resources and programs Cybersecurity Enhancement Act Tetradyne Biosurveillance:: Big Brother or Homeland Security? Jeffrey Engel, M.D. State Epidemiologist NC DHS, Division of Public health  Presentation – NC initiatives Homeland Security Presidential Directive-21 October 18,, 2007 Calls on the federal DHS to "establish an operational national epidemiologic surveillance system for human health, with international connectivity where appropriate, that is predicated on State, regional, and community-level capabilities and creates a networked system to allow for two-way information flow between and among Federal, State, and local government public health authorities and clinical health care providers." Key Terms Operational: organizational expertise and resources that produce real information products as early as possible National: emphasis is on the national picture and reflects a gap in nationwide perspective International connectivity: this national picture should look toward early detection and characterization of external threats to human health that could be imported Predicated on…build first on what exists and establish current capabilities Insurance Inspection, satellite       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU Consumer Watchdog, Insurance search, satellite surveillance. Electronic Frontier Foundation working to protect civil and free speech Cnet Tech News First Space Today Satellite wars, Space Daily Marsh & McLennan see campaign contributions AIG search Elliot Spitzer, fraud investigation. ACE Hartford Munich American Risk Partners  search Elliot Spitzer, fraud investigation. Internet Traffic Analysis   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU Center for Democracy and Technology, domestic spying watch  Council of Ethics-Based Organizations Associated with The Department of Public Information of the United Nations. Censorship page   Cryptorights.org human rights for security workers. SF Electronic Frontier Foundation working to protect civil and free speech Echelon Watch discuss civil liberty threats Epic  Electronic Privacy Information Center Internet Democracy Project enhance open participation, CBS down C/Net downloads, spyware Findlaw, Dean History of the Internet DARPA Info / Law, Harvard Blog filtering, modes of internet regulation: code, law, markets, and social norms  LINKS Jurist University of Pittsburg, School of Law,   Primary sources. Global perspective  MSNBC  VOIP Blocking Narus Bill Crowell,  past positions have included President and Chief Executive Officer of Cylink, a Are Republicans who oppose Bush warrantless spying  irrelevant and impotent? Center for Strategic and International Comda Ltd. Israel ComSign, Israel Narus Partners see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems...more Republicans who are against Bush warrantless spying are an irrelevant impotent. Defense Tech Telcos Deny NSA Ties - and Allowed to Lie? Mathaba search content based billing, VOIP  blocking
  • 69. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] public accountability and hr of internet The Nation History and structure of global telegraphic surveillance  NSAWatch formerly EchelonWatch, resources, surveillance networks, documents. Privacy International Human rights group, watchdog on surveillance by govt/biz PlanetFriendly Open source movement Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Salon  Israeli art students, DEA, Amdocs searchable file Total Information Awareness Resource Center White Dot find out how to free yourself from television. ZDNet, UK news     leading provider of e-business security solutions as well as a series of senior positions at the National Security Agency, including Deputy Director of Operations and Deputy Director of the Agency New York Times NSA executive order authorizing data mining of phone calls and file Dec 16, 2005 OpenNet Initiative, search Narus Notes: search terms, carrier-grade networks, NetDiscovery, IP-based, intelligent infrastructure services, IP security and compliance management, NarusSecure, monitoring, VOIP, IMS, IPTV, real-time traffic insight, NarusInsight,  Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links Skype VOIP blocking USA Today NSA has massive database of Americans' phone calls Vonage search VOIP blocking Wired News, Mark Klein, "Whistleblower Outs NSA Spy Room  ... Klein's job eventually included connecting internet circuits to a splitting cabinet that led to the secret room. During the course of that work, he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego." Narus see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems. Narus / Verisign  IP lawful intercept NICE, Shami, Shamir, Oz, Cohen, Huberman,  Menkes, Shaul, Zaltzman, Eidelman, Gorev, Ginat ... Verisign Sclavos, Evan, Korzenliewski, Lin, Balogh, Haddad, McLaughlin, Ulam, Bidzos, Chenevich,  Verso Technologies Inc, VOIP Blocking   PressTV U.S. companies are involved in providing technology that helps the Egyptian government to crack down on communications and monitor protestors on the Internet and mobile phones. ... A U.S. company appears to have sold Egypt technology to monitor Internet and mobile phone traffic that is possibly being used by the ruling regime to crack down on communications as protests erupt throughout the country. ... Boeing-owned, California-based company Narus sold Telecom Egypt, the state-run Internet service provider, "real-time traffic intelligence" equipment, more commonly known as Deep Packet Inspection (DPI) technology. Common Dreams ,,, HIGHLIGHTS The company is also known for creating "NarusInsight," a supercomputer system allegedly used by US' National Security Agency and other entities to perform mass surveillance and monitoring of public and corporate Internet communications in real time. Common Dreams ... Telecom Egypt, the nation's dominant phone and Internet service provider, is a state-run enterprise, which made it easy on Friday morning for authorities to pull the plug and plunge much of the nation into digital darkness. .... Narus provides Egypt Telecom with Deep Packet Inspection equipment (DPI), a content-filtering technology that allows network managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers on the information superhighway. ... "Anything that comes through (an Internet protocol network), we can record," Steve Bannerman, Narus' marketing vice president, once boasted to Wired about the service. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls.” ... Earlier this week, Secretary of State Hillary Clinton urged Egypt's government "not to prevent peaceful protests or block communications, including on social media.” Huffington Post .... FACTS & FIGURES Narus, now owned by Boeing, was founded in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and large corporate clients. ... In addition to Narus, there are a number of companies, including many others in the United States, that produce and traffic in similar spying and control technology: Zeugma Systems (Canada), Camiant (USA), Procera Networks (USA), Allot (Israel), Ixia (USA), AdvancedIO (Canada) and Sandvine (Canada), among others. ... When commercial network operators use DPI, the privacy of Internet users is compromised. But in government hands, the use of DPI can crush dissent and lead to human rights violations. ... Virtually all internet access in Egypt is cut off as the government battles to contain the street protests that threaten to topple President Hosni Mubarak. Telegraph HJ/KA/DB... more search terms: Egypt, Elbaradai, Tunisia, Algeria, Tunisia, protest, regime change, Infragard   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU Big Brother and the ministry of Homeland Security Epic  Electronic Privacy Information Center Center for Democracy and Technology search, Infraguard, info Cnet Tech News First FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, BellSouth Center for Strategic and International Studies   Critical Infrastructure Assurance Office  ciao.gov Infragard  FBI Justice Technology Information Network, National Law
  • 70. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] The Nation History and structure of global telegraphic surveillance  PrivacyToday  news Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Indian RAW History of the Internet DARPA ISP Planet news Security Focus News Microsoft SecureLab Computer security news and consulting USA Today NSA has massive database of Americans' phone calls Enforcement and Corrections Technology Center.   House Armed Services Committee  News Pentagon ISP Surveillance   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU Big Brother and the ministry of Homeland Security Epic  Electronic Privacy Information Center Center for Democracy and Technology search, Infraguard, info The Nation History and structure of global telegraphic surveillance  PrivacyToday  news Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First DigitallyMediatedSurveillance Ohm asserts that we should focus on individual harms stemming from surveillance and recognize that technological, economic, and ethical forces all point towards a “storm of unprecedented, invasive ISP monitoring” History of the Internet DARPA ISP Planet news Security Focus News Microsoft SecureLab Computer security news and consulting USA Today NSA has massive database of Americans' phone calls BellSouth Center for Strategic and International Studies   Critical Infrastructure Assurance Office  ciao.gov Infragard  FBI Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.   House Armed Services Committee  News Pentagon DigitallyMediatedSurveillance Ohm asserts that we should focus on individual harms stemming from surveillance and recognize that technological, economic, and ethical forces all point towards a “storm of unprecedented, invasive ISP monitoring” (4). He maintains that ISPs oversell their ability to anonymize collected data, that providers’ claims of needing to more deeply inspect content are suspect, and that we should distrust suggestions that users and ISPs have entered consensual agreements around DPI-based surveillance. To determine the risk of individual harms stemming from surveillance, ISPs and regulators should adopt a three-step process that asks how sensitive is the information at risk, whether there there been harmful breaches in the past and if so, requires policymakers to make predictions about the future. ...   Critically, “anonymity cannot effectively address the harm to the sense of repose. The harm comes from the fear that one is being watched. It can result in self-censorship. It is not the kind of harm that is easily offset by hypertechnical arguments about encryption and one-way hash functions” (49). Thus, novel surveillance systems like DPI must be (largely) restricted to preventing hacking and viral outbreaks and traditional monitoring systems that cannot capture personal information relied upon for network management. Most importantly, Ohm argues that privacy, freedom, liberty, and autonomy must be introduced into the otherwise technocratic discussions of network neutrality and management to ensure that ISPs’ networks facilitate these key democratic values. Libery Alliance Project   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU Big Brother and the ministry of Homeland Security Epic  Electronic Privacy Information Center Center for Democracy and Technology search, Infraguard, info The Nation History and structure of global telegraphic surveillance  PrivacyToday  news Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First History of the Internet DARPA ISP Planet news Wikipedia  The Liberty Alliance was formed in September 2001 by approximately 30 organizations to establish open standards, guidelines and best practices for identity management. Today it has a global membership of more than 150 organizations, including technology vendors, consumer-facing companies, Security Focus News Microsoft SecureLab Computer security news and consulting USA Today NSA has massive database of Americans' phone calls AT&T Center for Strategic and International Studies   Critical Infrastructure Assurance Office  ciao.gov Infragard  FBI Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.   House Armed Services Committee  News Pentagon Wikipedia  The Liberty Alliance was formed in September 2001 by approximately 30 organizations to establish open standards, guidelines and best practices for identity management. Today
  • 71. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] it has a global membership of more than 150 organizations, including technology vendors, consumer-facing companies, educational organizations and governments from around the world, as well as hundreds of additional organizations that participate in Liberty's various open community Special Interest Groups (SIGs). It has released Frameworks that address Federation (since contributed to OASIS for the SAML standard), Identity Assurance, Identity Governance, and Identity Web Services, as various services applications. It has also been active in privacy and policy issues relative to identity. As of 2006, the Liberty Alliance has tracked well over one billion Liberty-enabled identities and devices in fields as diverse as defense & law enforcement to telecommunications to egovernment. Management Board members include AOL, British Telecom, Computer Associates (CA), Fidelity Investments, Intel, Internet Society (ISOC), Novell, Nippon Telegraph and Telephone (NTT), Oracle Corporation and Sun Microsystems. As of June 2009, the work of the Liberty Alliance is transitioning to the Kantara Initiative. MATRIX  Multi-State Anti-Terrorism Information Database, NCTC top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU ACCS-Net security, links Disinfopedia  search, Seisint, Multistate Anti-Terrorism Information Database, MATRIX database, controlling company. Electronic Frontier Foundation digital rights NGO, info, news OccupyCorporatism American has quickly grown into a big brother control and surveillance nation. Internet Service Providers (ISP) will begin the biggest civilian surveillance operation in history. Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Security Focus News Microsoft C/Net downloads CodeMonkeyX  security and news GreyMagic security research, news MyFlorida  search Seisint, Security Focus News Microsoft SecureLab Computer security news and consulting USA Today NSA has massive database of Americans' phone calls Advanced Research and Development Activity Office ARDA, data mining alive and well BellSouth Institute for Intergovernmental Research  serving law enforcement, justice community Multi-State Anti-Terrorism Information Exchange   New York Times NSA executive order authorizing data mining of phone calls and file. Seisint Inc  MATRIX database, controlling company. OccupyCorporatism American has quickly grown into a big brother control and surveillance nation. Internet Service Providers (ISP) will begin the biggest civilian surveillance operation in history. On July 12, 2012, your ISP will be watching your movements on the internet. They will profile your activity and report to the Motion Picture Association of American (MPAA), Recording Industry Association of America (RIAAA) and National Security Agency (NSA) under direction of the Obama administration. Their goal: to penalize as many internet users as it takes to justify their infringement on our right to freedom of information.   ...   A facility in Utah has been built to assist the NSA and CIA in spying more efficiently on Americans. Every mode of communication (i.e. text messages, emails, phone calls, internet activity, etc . . . ) will be recorded, deciphered and filed for use at the distraction of the US government.   ...   Department of Justice Attorney General Eric Holder has signed new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies. Microsoft Explorer   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACCS-Net security, links LUGOD Linux Users Group of Davis news Insecure news PlanetFriendly Open source movement Security Focus News Microsoft C/Net downloads CodeMonkeyX  security and news GreyMagic security research, news ISP Planet news Java, Sun news Security Focus News Microsoft SecureLab Computer security news and consulting Center for Strategic and International Studies   CIO Insight strategies for IT Business Leaders   ENTNews  Enterprise Windows. Microsoft, Security Bulletins: Microsoft Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.  Rupert Murdoch   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU Deadly.org search, Open BSD Journal Electronic Frontier Foundation working to protect civil C/Net downloads History of the Internet DARPA ISP Planet news Center for Strategic and International Studies   CIO Insight strategies for IT Business Leaders   ENTNews  Enterprise Windows.
  • 72. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] and free speech LUGOD Linux Users Group of Davis news PlanetFriendly Open source movement Java, Sun news Wikipedia Murdochgate  The News International phone- hacking scandal — dubbed "Hackgate", "Rupertgate", or "Murdochgate" Wikipedia Murdochgate The News International phone-hacking scandal — dubbed "Hackgate", "Rupertgate", or "Murdochgate" by the press — is an ongoing controversy involving the defunct News of the World and other British newspapers published by News International, a subsidiary of News Corporation. Employees of the newspaper were accused of engaging in phone hacking, police bribery, and exercising improper influence in the pursuit of publishing stories. Investigations conducted from 2005–2007 concluded that the paper's phone hacking activities were limited to celebrities, politicians and members of the British Royal Family. In July 2011, it was revealed that the phones of murdered schoolgirl Milly Dowler, relatives of deceased British soldiers, and victims of the 7/7 London bombings were also accessed, resulting in a public outcry against News Corporation and owner Rupert Murdoch. Advertiser boycotts contributed to the closure of the News of the World on 10 July, ending 168 years of publication. 1] Continued public pressure later forced News Corporation to cancel its proposed takeover of the British telecommunications company BSkyB. British prime minister David Cameron announced on 6 July 2011, that a public inquiry would look into the affair after police investigations had ended. On 13 July 2011, Cameron named Lord Justice Leveson as chairman of the inquiry, with a remit to look into phone hacking and police bribery by the News of the World, while a separate inquiry would consider the culture and ethics of the wider British media. 2] He also said the Press Complaints Commission would be replaced "entirely". 1] The inquiries led to several high-profile resignations, including Dow Jones chief executive Les Hinton; News International legal manager Tom Crone; and chief executive Rebekah Brooks. The commissioner of London's Metropolitan Police Service, Sir Paul Stephenson, also resigned his post. Former News of the World managing editor Andy Coulson, former executive editor Neil Wallis, and Brooks were all arrested. Murdoch and his son, James, were summoned to give evidence before the Leveson Inquiry. WMRJuly 14-15, 2011 -- Murdoch intelligence-gathering network extended to U.S. Congress   ...   U.S. Congressional sources have confirmed to WMR that the U.S. Capitol Police and other congressional officials shared sensitive information on members of Congress with Rupert Murdoch's media outlets in Washington, including Fox News, in a manner similar to the situation in the United Kingdom where reporters for Murdoch's now-defunct News of the World bribed British law enforcement officials for sensitive information on public officials and private citizens.     ....   Representative Peter King (R-NY) has already leveled charges that News of the World reporters tried to bribe U.S. law enforcement officials for phone records and transcripts of wiretaps of victims of the 9/11 attack. King did not elaborate on why law enforcement would have found it necessary, in the first place, to wiretap the conversations of 9/11 victims and their surviving next-of-kin.    ...   On March 28, 2007, WMR first reported the relationship between the newly-appointed U.S. Senate Sergeant-at-Arms Terrance Gainer, who was formerly the chief of the U.S. Capitol Police, and Fox News in three highly-publicized incidents involving only Democratic members of the U.S. Senate and House of Representatives. The three incidents involved Fox News receiving information directly from Gainer on incidents involving then-Representative Cynthia McKinney (D-GA), then- Representative Patrick Kennedy (D-RI), and an aide to Senator Jim Webb (D-VA).    ...   After a highly-publicized scuffle involving McKinney and an aggressive U.S. Capitol Police officer, one in which McKinney was physically assaulted by the officer, Fox News was the first to report the incident. The media hype resulting from the incident resulted in a criminal referral to the US Attorney for the District of Columbia. Shortly after Gainer resigned as chief and his being appointed by Senate Democratic Majority Leader Harry Reid, Representative Kennedy was involved in a minor automobile accident on Capitol Hill. Again, Fox News was the first to receive the information about the incident and Gainer stated publicly that Kennedy should have been given a sobriety test by the Capitol cops.    ...   The third incident involved Phillip Thompson, the executive assistant to Virginia Democratic Senator Jim Webb, who was arrested by the Capitol Police at the Russell Senate Office Building for carrying a loaded pistol allegedly given to him by Webb. The Capitol Police enforced a DC law in force at the time that prohibited anyone other than law enforcement officers from carrying weapons in the District. Webb said he has a license to carry a concealed weapon in Virginia and Thompson, an ex-Marine, inadvertently carried the weapon into the building after dropping Webb off at the airport. WMR's March 2007 report stated: "Details of the Thompson] incident were leaked by the cops to Fox News and other neo-con outlets." WMR also reported that the leaks by US Capitol Police and Sergeant-at-Arms staff also occurred in the cases of McKinney and Kennedy.    ...    Gainer is a long-time Republican who unsuccessfully challenged incumbent Richard M. Daley, Jr. as the Republican candidate for Cook County (Illinois) State's Attorney in 1988. Gainer got his start in law enforcement as a rookie Chicago cop in 1968 where he helped put down riots at the Democratic National Convention, a melee that saw Chicago cops clubbing anti-Vietnam War protesters.    ...   As U.S. Senate Sergeant-at-Arms, Gainer is responsible for the installation and maintenance of the Senate's telecommunications networks and computer and other equipment, including those that handle Senators' e-mail, phone calls, faxes, Blackberry tweets, and photocopies of documents.    ...   Some members of Congress have indicated the investigation of Murdoch's News Corporation's information-gathering practices warrant a full-scale investigation in the United States. Senator Jay Rockefeller (D-WV) told CNN, "My bet is we'll find some criminal stuff . . . This is going to be a huge issue." Rockefeller said he may launch his own investigation. Perhaps he might want to start with the Senate's Sergeant-at-Arms and ask Harry Reid why he chose to appoint Gainer, a Republican, to the post after evidence surfaced that tied Gainer to leaks of law enforcement information to Fox News.    ...    In Britain, law enforcement officials, including royal guards, reportedly asked the News of the World for money in exchange for personal information about the Royal family, including Queen Elizabeth II, Prince Philip, Prince Charles, Duchess of Cornwall Camilla, Duchess of Cambridge Catherine, and others. While he was Chancellor of the Exchequer and Prime Minister, Gordon Brown was also subjected to private communication surveillance by private detectives who had a close relationship with law enforcement agencies, including Scotland Yard.  NIST / NSA integration   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Deadly.org search, Open BSD Journal FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW C/Net downloads FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW Center for Strategic and International Studies   CIO Insight
  • 73. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] LUGOD Linux Users Group of Davis news PlanetFriendly Open source movement History of the Internet DARPA ISP Planet news Java, Sun news strategies for IT Business Leaders   ENTNews  Enterprise Windows. SANS  2012 NIST Issues (Flawed) Draft Updates to Cybersecurity Guides (July 30, 2012) The National Institute of Standards and Technology (NIST) has issued updated versions of two publications aimed at helping federal agencies and private organizations protect their networks from attacks, intrusions, and malware infections. The Guide to Intrusion Detection and Prevention Systems and the Guide to Malware Incident Prevention and Handling for Desktop and Laptops have been updated to incorporate current best practices in cybersecurity. NIST is accepting public comment on the documents through August 31, 2012. The intrusion detection publication was originally released in February 2007 and has not been updated since then.   and NSA  NSA Director Asks Defcon Attendees to Help Defend Cyberspace (July 27 & 29, 2012) Speaking at the Defcon hacker conference, General Keith Alexander, who heads both the National Security Agency (NSA) and the US Cyber Command, asked attendees for help securing cyberspace. Alexander told those present that "In this room right here is the talent our nation needs to secure cyberspace," and spoke about the "superb" program called Defcon Kids, which guides kids in the direction of white-hat hacking. Alexander also told his audience that the NSA does not compile dossiers on US citizens. However, a former NSA employee speaking on a panel at the same conference said that the NSA does collect information about US citizens' email messages, tweets, online searches and other information. Epic  New NIST/NSA Revelations Less than three weeks after the White House announced a controversial initiative to secure the nation's electronic communications with government- approved cryptography, newly released documents raise serious questions about the process that gave rise to the administration's proposal. The documents, released by the National Institute of Standards and Technology (NIST) in response to a Freedom of Information Act lawsuit, suggest that the super-secret National Security Agency (NSA) dominates the process of establishing security standards for civilian computer systems in contravention of the intent of legislation Congress enacted in 1987.    ...   The released material concerns the development of the Digital Signature Standard (DSS), a cryptographic method for authenticating the identity of the sender of an electronic communication and for authenticating the integrity of the data in that communication. NIST publicly proposed the DSS in August 1991 and initially made no mention of any NSA role in developing the standard, which was intended for use in unclassified, civilian communications systems. NIST finally conceded that NSA had, in fact, developed the technology after Computer Professionals for Social Responsibility (CPSR) filed suit against the agency for withholding relevant documents. The proposed DSS was widely criticized within the computer industry for its perceived weak security and inferiority to an existing authentication technology known as the RSA algorithm. Many observers have speculated that the RSA technique was disfavored by NSA because it was, in fact, more secure than the NSA-proposed algorithm and because the RSA technique could also be used to encrypt data very securely. ...   The newly-disclosed documents -- released in heavily censored form at the insistence of NSA -- suggest that NSA was not merely involved in the development process, but dominated it. NIST and NSA worked together on the DSS through an intra-agency Technical Working Group (TWG). The documents suggest that the NIST-NSA relationship was contentious, with NSA insisting upon secrecy throughout the deliberations. A NIST report dated January 31, 1990, states that    ...   The members of the TWG acknowledged that the efforts expended to date in the determination of a public key algorithm which would be publicly known have not been successful. It's increasingly evident that it is difficult, if not impossible, to reconcile the concerns and requirements of NSA, NIST and the general public through using this approach. more Wikipedia  TIDES Translingual Information Detection, Extraction and Summarization (TIDES) developing advanced language processing technology to enable English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages. 16] Outside groups (such as universities, corporations, etc.) were invited to participate in the annual information retrieval, topic detection and tracking, automatic content extraction, and machine translation evaluations run by NIST. 16]   NSA, Domestic phone records database,  NFU pages index US surveillance of citizens page 1 Amdocs  Israeli art students  9/11  9/11 Investigation 'Terrorism' Urban Moving Systems, WTC, 9/11 and Summary below and News and related research Abramoff / Tom Delay Watch BushWatch Iran Israel Middle East Judiciary RiceWatch
  • 74. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Issues to research How is the internet and phone system tapped?   Narus Are there ties between the recent NSA warrantless wiretapping and the old 'Israeli art students' revelations?  How does Comverse Infosys (Verint), Amdocs, Telrad, Israel fit? How does it all tie back to 9/11?  FoxNews, Carl Cameron, Israeli art students? What lawsuits are now pending?  What are administrative subpoenas, National Security letters? William T. Crowell, Narus Board of Directors, was Deputy Director of Operations of NSA. Wired News, Mark Klein, Whistleblower Outs NSA Spy Room  ...more  Israeli companies dominate phone billing and firewall markets News   National Security Agency  NSA   top       and go to Amdocs PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU  lawsuit, wiretap without a warrant on U.S. soil.  and NSA lawsuit Center for Constitutional Rights New York, letter to Senate Intelligence Committee, CommonDreams search terms: lawsuit, AT&T, submitted under seal, illegal electronic surveillance, Negroponte, Lt. General Keith Alexander (director of NSA), state secrets privilege used to deny info on NSA, phone and internet records turned over illegally without a warrant or suspicion of wrongdoing. class action,  CommonDreams "In a 72-page written ruling (.pdf), U.S. District Court Chief Judge Vaughn Walker rejected the government's argument that merely allowing the case to proceed would cause critical harm to U.S. national security. Constant Pated, blog Narus STA-6400, state secrets, prove Bush broke the law. John Conyers CounterPunch, Bush wiretaps to identify whistleblowers.  Dailykos Narus ST-6400 Detroit Free Press "U.S. District Judge Anna Diggs Taylor declared the administration's secret spying program unconstitutional and blocked the government from intercepting calls into this country from abroad that might involve terrorists without getting warrants from the Foreign Intelligence Surveillance Court. Electronic Frontier Foundation working to protect civil and free speech, search AT&T lawsuit.  Huffington Post NSA, amdocs, Hayden and Hayden "the sudden resignation of Goss as the Foggo sex scandal comes creeping centerwise provided the Department of Defense its best-yet opportunity to finally seize its long-time intelligence and covert operations rival for itself" Indymedia The Nation History and structure of global telegraphic surveillance  NSAWatch formerly EchelonWatch, resources, surveillance networks, documents. OpEdNews "Amdocs, Hayden, CIA, phone records, database, billing data, Israeli-based company, 9/11, students, Bobby Ray Inman, AT&T, BellSouth, BBC George W Bush personally stopped an inquiry into a controversial programme to monitor the phone calls and e-mails of Americans, a top official has said. Attorney General Alberto Gonzales said internal investigators wanted to look at the role justice department lawyers had played in drafting the programme Findlaw, Dean, Bush's impeachability.. search terms: Amdocs, Hayden, CIA, phone records, database, billing data, Israeli-based company, Use NSA data to mine all of Karl Rove's phone calls....right.... search terms: Hayden was architect of Bush's domestic spying program. The Federal Intelligence Security Act (FISA) is prohibited in monitoring people inside the U.S. without express permission of a federal judge.  Nixon era controls.  2005 Bush issued executive order undermining FISA.   State secrets privilege defense says a lawsuit must be dismissed if it can't be litigated without the risk of exposing military secrets.  But there is political fallout from this. How does all this tie back to Israel spying: Jonathon Pollard, Pentagon, Douglas Feith, Mega,  Jurist, legal news and research, Bush used argument that warrantless was implicitly authorized by the resolution for the Authorization for the Use of Military Force in Afghanistan, but....more Rense All US Phone Call Records And Billing Done In Israel - Part 2 Carl Cameron Investigates FoxNews.com 12-13-1 Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links Yahoo, BellSouth denies working with NSA.  Included in $200 billion lawsuit Wikipedia Are Republicans who oppose Bush warrantless spying are an irrelevant impotent group? AT&T lawsuit $200 billion Amdocs  Israel, phone records database, Hayden BellSouth Cato Institute Defense Tech Telcos Deny NSA Ties - and Allowed to Lie? FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down. GOP search GOP Insight search Haaretz search
  • 75. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Verizon, legality of surveillance, Sen. Spector RawStory,  Salon  Israeli art students, DEA, Amdocs searchable file TimesOnline.UK "A report in the newspaper USA Today, which claimed that since the 9/11 attacks the National Security Agency (NSA) has secretly collected the records of billions of domestic calls, also cast doubt on the confirmation prospects for General Michael Hayden, Mr Bush’s choice to head the CIA" TomPaine search: Bush's NSA Spying Defense Wayne Madsen Report, exclusive1 Wired News, Mark Klein, "Whistleblower Outs NSA Spy Room  ... Klein's job eventually included connecting internet circuits to a splitting cabinet that led to the secret room. During the course of that work, he learned from a co- worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego." go to Amdocs search internet: Tony Snow, FoxNews, Carl Cameron, Israeli Art Students. also see Jonathan Pollard.com Heritage.org "....this critical counterterrorism effort isn't intrusive, illegal or unnecessary...?  commentary.  see Smith v. Maryland 1979.  Markle Foundation MiddleEast Info  discussion Middle East Intelligence Bulletin  Daniel Pipes Narus Semantic Traffic Analysis Narus & Amdocs more below Narus Board of Directors: William T. Crowell (DARPA, Markle Foundation, Cylink, Deputy Director of Operations NSA, Presidents Export Council on Encryption.  Also Yogen K. Dalal (Mayfield Fund), Andrew Kau (Walden International), Greg Oslan (CNET Inc, AT&T),  Tony Pantuso ( NeoCarta, GE), Shahan D. Soghikian (JP
  • 76. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Morgan Partners). National Institute for Public Policy, Iran policy New York Times NSA executive order authorizing data mining of phone calls and file. TMCnet  Amdocs, Israeli Business Arena Via Thomson Dialog NewsEdge, Topix Amdocs DOX page US-Israel.org US News & World Report , Gergen rebuttal to "The Israel Lobby and U.S. Foreign Policy" NSA  Verizon Walden Media, Walden International, Walden Israel Ventures II, Walden VC II, Ambex Whitehouse  Bush   Summary of NSA issues ABC News  Exclusive: Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted; Senate Demanding Answers By BRIAN ROSS, VIC WALTER, and ANNA SCHECTER Oct. 9, 2008— Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. The chairman of the Senate Intelligence Committee, Jay Rockefeller (D-WV), called the allegations "extremely disturbing" and said the committee has begun its own examination. "We have requested all relevant information from the Bush Administration," Rockefeller said Thursday. "The Committee will take whatever action is necessary." continued below
  • 77. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] New York Times  and file   A  senior government official, granted anonymity to speak for publication about the classified program, confirmed on Friday that the security agency (NSA) had access to records of most telephone calls in the United States. The official said the call records were used for the limited purpose of identifying regular contacts of "known bad guys." The official would not discuss the details of the program, including the identity of companies involved.  lawsuit  (EFFsuit) see Amdocs / Narus  New York Times  and file In 2004, more than 80 percent of the 463 billion domestic calls made in the United States were local, according to the Federal Communications Commission. Verizon said yesterday that "phone companies do not even make records of local calls in most cases because the vast majority of customers are not billed per call for local calls.".    but see Narus  New York Times Because federal law protects the privacy of phone records in the absence of warrants, companies providing such records could face legal action. Yesterday in Manhattan, a class-action suit filed against Verizon after the USA Today article appeared was expanded to include BellSouth and AT&T as defendants, The Associated Press reported. It asked $200 billion in damages. ACLU "The American Civil Liberties Union today strongly condemned a new proposal drafted by Senate Judiciary Committee Chairman Arlen Specter (R-PA) that embraces the president’s claims of inherent power to secretly wiretap Americans without meaningful checks. Also today, the organization renewed its request to the Justice Department’s Inspector General to open an investigation into the involvement of the department in the warrantless spying on Americans by the National Security Agency  ....  Specter’s new draft would replace a bill he had previously introduced, S.2453, the National Security Surveillance Act of 2006. The new version would pardon the president for authorizing the warrantless wiretapping of Americans, in violation of current criminal and intelligence laws. Specifically, the new bill would amend the Foreign Intelligence Surveillance Act (FISA) and the criminal code by allowing wiretapping at the direction of the president outside of those existing laws. This move would create a retroactive exception to criminal liability when warrantless wiretapping is done at the president’s direction under a claim of inherent authority." ACLU v. NSA lawsuit:  "The ACLU is suing the National Security Agency for violating the U.S. Constitution. The illegal NSA spying program authorized by President Bush just after September 11, 2001, allows the NSA to intercept vast quantities of the international telephone and Internet communications of innocent Americans without court approval.  Without a system of checks and balances, the government can monitor any phone call or e-mail they want, and they can collect and disseminate any data they find however they like. Just knowing that the government is spying without cause on innocent Americans sends a chilling message to all of us that our conversations are not our own.  The NSA's warrantless surveillance must end and checks and balances be restored." Information Clearing House on Fox News (Carl Cameron) investigative report and Eric Umansky BellSouth subcontracts with an Israeli company known as Amdocs to handle its billing, as do several other U.S. phone companies. In 2001, U.S. intelligence officials were on record as saying that the information that Amdocs handled was so valuable that a great deal could be learned if sophisticated data-mining techniques were used against that information -- Brit?    Information Clearing House  search Amdocs, Israeli art students.   Information Clearing House Fox News has learned that the N.S.A has held numerous classified conferences to warn the F.B.I. and C.I.A. how Amdocs records could be used. At one NSA briefing, a diagram by the Argon national lab was used to show that if the phone records are not secure, major security breaches are possible. see Amdocs / Narus  relationship Information Clearing House, Carl Cameron report:  Comverse works closely with the Israeli government, and under special programs, gets reimbursed for up to 50 percent of its research and development costs by the Israeli Ministry of Industry and Trade. But investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying through Comverse is considered career suicide. Wired Blog:  One of the questions to emerge in press analysis of Wednesday's court hearing in the EFF's case against AT&T is whether the company might be legally immunized if the attorney general wrote a secret letter authorizing the alleged internet wiretaps.  Declan McCullagh at CNET News.com parsed the AT&T lawyer's oral arguments carefully, and concluded that the company may have received certification from the Justice Department under this section of Title 18 U.S.C. 2511 London's 7/7 where Visor Consulting headed up by the ex-spokesman of Scotland Yard Peter Power was conducting drills of a terrorist attack at the exact locations at the exact times where Verint Systems (Comverse) was running security and hasn't released the videos from inside the tube, CommonDreams "FBI Plans New Net-Tapping Push"  search terms: new legislation that would require ISP's to create wiretapping hubs for police surveillance...introduced by Sen. Mike DeWine, Ohio Republican, CALEA CommonDreams "In a 72-page written ruling (.pdf), U.S. District Court Chief Judge Vaughn Walker rejected the government's argument that merely allowing the case to proceed would cause critical harm to U.S. national security.  search terms: Case 3:06-cv-00672-VRW  Document 308, Northern District of California, Tash Hepting et al Plaintiffs,v AT&T CORPORATION, et al Defendants.  AT&T Inc., violate First and Fourth Amendments to the Constitution, by illegally intercepting, disclosing, divulging and/or using plaintiffs' communications.  collaborating with the National Security Agency NSA in a massive warrantless surveillance program.  Section 109 of FISA, Section 802 of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, Section 705 of Title VII of the Communications Act of 1934, Section 201 of Title II of the ECPA, Seciton 201 of the Stored Commications Act, California Unfair Competition Law, Mark Klein, J. Scott Marcus, state secrets privilege, Negroponte, Alexander, 
  • 78. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM]      Click on pic to go to NFU Internet page NSA ISP data mining, Narus   source:  Scoop  Are We Paranoid Enough Yet?  utunga.blogspot.com On 26 Jan 2006 I wrote:   Particularly scary is that the Patriot act gives the feds the right to basically march up to every ISP in the country and install special 'black boxes' doing] God only knows what and the ISP's cannot even mention this fact publicly let alone not comply... ********* Now we have confirmation from a whistleblower that this is exactly what they've been doing. "I learned that the person whom the NSA interviewed for the secret job was the person working to install equipment in this room," Klein wrote. "The regular technician work force was not allowed in the room." .. he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego."While doing my job, I learned that fiber optic cables from the secret room were tapping into the Worldnet (AT&T's internet service) circuits by splitting off a portion of the light signal," Klein wrote.The split circuits included traffic from peering links connecting to other internet backbone providers, meaning that AT&T was also diverting traffic routed from its network to or from other domestic and international providers, according to Klein's statement.The secret room also included data-mining equipment called a Narus STA 6400... "  And what can we find out about the Narus 6400? Well the google cache appeared busted on the subject but the preview gives us this one sentence.. Fully configured, the Model 6400 captures application-layer usage details via NARUS Semantic Traffic Analysis (STA) on up to six full-duplex 100 BaseTADVERTISEMENT (Update: Dailykos has since published an artice All About NSA's and AT&T's Big Brother Machine, the Narus 6400 which fills out a lot of the details).  In my opinion the key words here are "Semantic Traffic Analysis".   As I wrote previously:  Many people think ECHELON simply targets 'keywords'. However, based on patents filed by various government agencies you can assume it is *much* more sophisticated than that, for instance rudimentary 'language recognition' patents as well as 'topic classification' patents. The topic classification patent is especially interesting, because, if they are able to create a map of all the types of people / types of conversations that people have, then they can more easily filter out the 'Jana's having a baby!' conversations and zero in on the 'lets organize a march' conversation of radicals and other undesirables - oh, yeah, and those] "terrorists" and "drug dealers" - the only problem here is that to find the largest number of these in the most cost effective way all they would need to do is walk down the hall start arresting people.. The words semantic analysis are used somewhat differently in the patents I mention than in the technical specs for the Naurus 6400, but forgive me for assuming that the NSA has technology that is more advanced (by a small margin and in the same direction) than what is available to the general public. ********* I guess this casts the Google action in preventing DOJ into their data centers in a quite different light. As I said previously, this isn't about reading the query log - this was always about the right to install a room of 'black servers' right in the middle of the google data center. Google's actions in standing up to that are all the more laudable.  ********* Just to be crystal clear on this; at this time what we now have is clear evidence of (sophisticated) *monitoring and analysis* of internet and phone traffic - something we pretty much knew for a long time.  Thats very scary (and illegal, in my opinion), but its certainly better than actual direct government censorship of content on the internet ('chilling effects' on free speech aside).  On the pessimistic side, however, direct (but covert) censorship is probably the next obvious step once you have the right hardware installed in the key data centers. It may be that if you want to actually directly censor and block information all you need to do is control the choke points - which means ISP's (like AT&T) and not the search engines (like Google). However, it could well be that a more sophisticated (and probably more practical) form of censorship is to control the search engines. Certainly the Chinese found that controlling the search engine content was more effective (and subtle) form of censorship than outright blocks on entire search engines or particular websites. My suspicion (OK, its a total guess) is that, in the States at least, the NSA and other parts of the state/non-state military-technological apparatus are probably experimenting with the censorship of certain specifc pieces of information even right now. A good place for them to start might be, for instance, information about themselves, their methods and what they plan to do next. At this time I'm pretty sure that direct censorship or control of political discourse on the internet is something that organisations such as the NSA wouldn't consider themselves able to do. Despite all their technology and hardware, the number of bits to flip and the sheer volume of content to mechanically 'understand' and filter makes that effectively impossible. It can be argued that have achieved a high degree of success in the mass media - ask someone who's actually lived in the states for a few years and I'm sure you'll see what i mean - but its still too hard for them to control the discourse of 'blogosphere' directly at this stage - but you just wait and see.. as soon as they believe they can do this - they will. Furthermore, if 'they' are smart they won't give any indication that this is their next step until they are ready to go.  "The internet" may be the last truly free bastion of political free speech in the States at ths time.. and if that were to be closed down via a more sophisticated version of 'the chinese firewall" .. well God help us all. ENDS
  • 79. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider The Register  NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider ....   By Lewis Page • , 8th July 2010 09:20 GMT    ...   The US National Security Agency (NSA) is embarking on a secret domestic surveillance project dubbed "Perfect Citizen", intended to monitor and protect important national infrastructure such as power grids and transport systems.    ...   The Wall Street Journal, citing unnamed government and industry sources, says that the NSA has awarded a "black" (classified) $100m contract to defence contractor Raytheon which will see secret monitoring equipment installed within US networks deemed to be of national importance.    ...   According to the WSJ, Perfect Citizen has caused some disquiet among those in the know. It could be seen as the NSA - a military combat support agency whose focus is supposed to be on external threats - carrying out massive automated surveillance of American companies and citizens. The paper quotes an internal Raytheon email as saying that "Perfect Citizen is Big Brother".    ...   The stated purpose of the project is to get a clear idea of the level of threat facing American infrastructure IT. Many older systems, designed in the pre-network world, have since been hooked up to the internet for ease of use and maintenance. It is feared by some in the US intelligence / defence community that unfriendly powers and organizations are already engaged in probing these systems with a view to learning how to attack them.    ...   The NSA's Perfect Citizen equipment would be designed to flag up unusual network events indicating an impending cyber attack, according to the WSJ's sources.    ...   "You've got to instrument the network to know what's going on, so you have situational awareness to take action," an unnamed military source told the paper.    ...   Many of the networks that the NSA would wish to place Perfect Citizen equipment on are privately owned, however, and some could also potentially carry information offering scope for "mission creep" outside an infrastructure-security context. For instance, full access to power company systems might allow the NSA to work out whether anyone was at home at a given address. Transport and telecoms information would also make for a potential bonanza for intrusive monitoring.    ...   The full scope of the project remains to be determined, according to the WSJ report, with no certainty as yet on which companies or types of companies would be asked to cooperate - or how much information the NSA would get access to.    ...   The NSA - whose boss has now also been confirmed as head of the Pentagon's uniformed Cyber Command - apparently got the job by default, as it is considered the only US agency with enough network and cyber savvy to take the task on.    ... The Reg has contacted Raytheon and the NSA for comment on Perfect Citizen, but thus far has not received any reply. ® Open BSD FBI Backdoor  top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU Deadly.org search, Open BSD Journal Electronic Frontier Foundation working to protect civil and free speech LUGOD Linux Users Group of Davis news PlanetFriendly Open source movement C/Net downloads History of the Internet DARPA ISP Planet news Java, Sun news Center for Strategic and International Studies   CIO Insight strategies for IT Business Leaders   ENTNews  Enterprise Windows. ArsTechnica FBI accused of planting backdoor in OpenBSD IPSEC stack  ... In an e-mail sent to BSD project leader Theo de Raadt, former NETSEC CTO Gregory Perry has claimed that NETSEC developers helped the FBI plant "a number of backdoors" in the OpenBSD cryptographic framework approximately a decade ago.   ...  Perry says that his nondisclosure agreement with the FBI has expired, allowing him to finally bring the issue to the attention of OpenBSD developers. Perry also suggests that knowledge of the FBI's backdoors played a role in DARPA's decision to withdraw millions of dollars of grant funding from OpenBSD in 2003.   ...   "I wanted to make you aware of the fact that the FBI implemented a number of backdoors and side channel key leaking mechanisms into the OCF, for the express purpose of monitoring the site to site VPN encryption system implemented by EOUSA, the parent organization to the FBI," wrote Perry. "This is also probably the reason why you lost your DARPA funding, they more than likely caught wind of the fact that those backdoors were present and didn't want to create any derivative products based upon the same."   ...  The e-mail became public when de Raadt forwarded it to the OpenBSD mailing list on Tuesday, with the intention of encouraging concerned parties to conduct code audits. To avoid entanglement in the alleged conspiracy, de Raadt says that he won't be pursuing the matter himself. Several developers have begun the process of auditing the OpenBSD IPSEC stack in order to determine if Perry's claims are true. Patriot Act       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Patriot II, details, Alternet, ACLU, Civil Liberties in the Post 9/11 World Council of Ethics-Based Organizations Associated with The Department of Public Information of the United Nations. search Patriot Act.  Epic  Electronic Privacy Information Center ALA, American Library Association Cnet Tech News First FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Advanced Research and Development Activity Office ARDA, data mining alive and well BellSouth CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department Critical Infrastructure Assurance Office  ciao.gov
  • 80. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] FAS Project on Government Security Big Brother and the ministry of Homeland Security The Nation History and structure of global telegraphic surveillance  National Immigration Law Center protect rights and opportunities of low-income immigrants Patriot II, details PrivacyToday  news Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog (Veterans for Peace) article: Sami Omar Al-Hussayen, Idaho, grad student who set up websites for Hamas,  charged with Patriot Act violations.  Also charged with setting up banking accounts and visa fraud. Veterans for Peace  Sami Omar Al-Hussayen, article The Israel Lobby and U.S. Foreign, Policy  John J. Mearsheirmer, University of Chicago, Stephen Walt  Harvard University Indian RAW ISP Planet news PrivacyDigest privacy news Security Focus News Microsoft SecureLab Computer security news and consulting Military seeks student data from schools name, address, phone # to recruiters USA Today NSA has massive database of Americans' phone calls Click on pic to go to NFU Internet page FCC, won't investigate warrantless wiretapping because Bush effectively used the State Secrets defense to shut them down. Infragard  FBI New York Times NSA executive order authorizing data mining of phone calls and file. Securius.com  defending cyberspace security U.S. Departmant of State, Consular Affairs US-VISIT, info Pentagon Whitehouse.gov Bush war on the internet Republicans opposed to Bush Warrantless wiretapping are irrelevant and impotent.        Patriot Act       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Patriot II, details, Alternet, ACLU, Civil Liberties in the Post 9/11 World Council of Ethics-Based Organizations Associated with The Department of Public Information of the United Nations. search Patriot Act.  Epic  Electronic Privacy Information Center FAS Project on Government Security Big Brother and the ministry of Homeland Security National Immigration Law Center protect rights and opportunities of low-income immigrants Patriot II, details PrivacyToday  news Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog (Veterans for Peace) article: Sami Omar Al- Hussayen, Idaho, grad student who set up websites for ALA, American Library Association Cnet Tech News First FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW ISP Planet news PrivacyDigest privacy news Security Focus News Microsoft SecureLab Computer security news and consulting Military seeks student data from schools name, address, phone # to recruiters Advanced Research and Development Activity Office ARDA, data mining alive and well Critical Infrastructure Assurance Office  ciao.gov Infragard  FBI Securius.com  defending cyberspace security U.S. Departmant of State, Consular Affairs US-VISIT, info Pentagon Whitehouse.gov Bush war on the internet
  • 81. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Hamas,  charged with Patriot Act violations.  Also charged with setting up banking accounts and visa fraud. Veterans for Peace  Sami Omar Al-Hussayen, article Police Depts tracking protesters, Pre-crime surveillance       top    top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Common Dreams Police depts tracking local protesters Cnet Tech News First , info National Security Agency  RFID Technology       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Center for Democracy and Technology search, Epic  Electronic Privacy Information Center Electronic Frontier Foundation digital rights NGO, info, news NoNAIS.com Protect Traditional Rights to Farm, stop RFID privicacy intrusion by Bush corporate America. Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First eWeek EETimes Intelnet news from 500 sources automated   InfoWorld  for IT Managers Internet News  for IT Managers RFID, remotely storing and retrieving info from product stickers, tags, via radio signals. Axalto, BearingPoint, Infineon, Supercom, passport chips contracts.  ICAO, Enhanced Border Security Act Wikpedia, definition, info AIM Global Association for Automatic Identification and Mobility CIO Insight strategies for IT Business Leaders   Wal-mart at the forefront of RFID Technology RFID Journal, search Wal-mart,  Restroom taping       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* FreePeoplesFifthEstate  CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of Journalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian RAW Employment Law Information Network, Articles, Human Resources, Experts, Newsletter Privacy & Security Law Report BNA Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy Road Sensors       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Avia Inc, distributor of speed, red light and rr crossing surveillance equip Columbia Telecommunications Corporation, Telecommunications Systems Engineering. EPA, Environmental Protection Agency National Research Council Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.  
  • 82. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] EPA, Environmental Protection Agency National Research Council Sensors Inc, vehicle surveillance.  Oak Ridge National Laboratory, Science, Technlogy, Government, Business. Right Wing News Universities Research Association, consortium of 60 universities, UT-Battelle, University of Tennesse, DOE, ORNL   Satellites       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* FAS, Federation of American Scientists Project on Government Secrecy. Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First Wikipedia, National Geospatial Intelligence Agency search Beaulieu, Arctic Slope Regional Corp, Chenega Corp, ANSCA, NIMA, no bid contracts, roads in Alaska. American Federation of Government Employees, Bush gave no-bid contracts for mapping project to Native Indian contractors.  (Union busting) Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.   National Imagery and Mapping Agency, nima, mil, in support of national security.  Burt Beaulieu Search engines       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Electronic Frontier Foundation digital rights NGO, info, news Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First Google Desktop Search automatically reads and records locally Outlook e-mail, also saves copies of web pages, chat conversations in AOL IM, and finds Word Powerpoint and Excel files on your computer.  Google says it has no access.   But its multi-user  capabilities reveal security flaws.  Wikipedia, National Geospatial Intelligence Agency Google Desktop Search automatically reads and records Outlook e-mail, Outlook Express or Microsoft Internet Explorer.  Microsoft Internet Explorer see Microsoft campaign contributions, anti trust defense.  Stoplight Cameras       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First Wikipedia, National Geospatial Intelligence Agency Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.   National Imagery and Mapping Agency, nima, mil, in support of national security. Synchronization, Knowledge Management and Intelligence Fusion       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Code Pink under surveillance by SKMIF,      Schema-Root military intelligence, news feeds Sen. Joe Dunn, tracking California National Guard spying on citizens Veterans for Peace San Jose Mercury News SignOnSanDiego search notes: National Guard Bureau investigating if SKMIF spied on citizens, protesters.  similar to Viet Nam era surveillance? National Guard Bureau search legal division. Synchronization, Knowledge Management and Intelligence Fusion unit.  Schwarzenegger
  • 83. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] SWIFT,  Society for Worldwide Interbank Financial Telecommunication        top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU, National ID card, EPIC  Electronic Privacy Information Center, National ID card, Privacy International, Swift violated European and Asian data protection rules, fishing expedition, not a legally authorized investigation,    Council of Europe, Strasbourg,  San Jose Mercury News European Union, Stras Financial Times, SWIFT, bank transaction data mining,  "Tens of thousands of electronic searches have been conducted under a secret US programme to monitor global financial transfers for signs of terrorist activity" more search terms: Stuart Levy (under- secretary for terrorism and financial intelligence, US Treasury), SWIFT (Society for Worldwide Interbank Financial Telecommunication),  Bush used International Emergency Economic Powers Act to gain access to the data.  People's Party, largest and most influential bloc in the European Parliament,  demand compensation, Swift did not seek approval from European authorities. Wikipedia SWIFT, Terrorist Finance Tracking Program CIA FBI  New York Times Senate Republicans support warrantless wiretaps of international financial transactions. SWIFT Society for Worldwide Interbank Financial Telecommunication, Brussels, Terrorist Finance Tracking Program TALON, Threat and Local Observation Notice       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Common Dreams TALON  government surveillance of anti-war protesters, Defense Dept, search: Stephen Cambone.   Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog   Wikipedia, National Geospatial Intelligence Agency Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.   Lockheed Martin US personal database, defense contractor, Bush Dept of Homeland Security  domestic spying TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead." Washington Post "TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead."  TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead."  ...   In 2006, authorities quietly launched Railhead, a project worth as much as $500 million over five years, to improve TIDE and eventually replace it and some related systems with technology that would significantly expand their capabilities.   ...  After more than a year and about $100 million, the Railhead project has become the focus of criticism from some counterterrorism analysts and contractors, who have said it does not provide the search capabilities they expected and appears to be behind schedule. One lawmaker has taken up those questions and publicly asked for an investigation by the inspector general of the Office of the Director of National Intelligence, saying his congressional staff has information from a contractor whistle-blower that shows the project is on the "brink of collapse," possibly threatening national security. Terahertz Spectroscopy       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Widipedia Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.   Wikipedia Typically, the terahertz pulses are generated by an ultrashort pulsed laser and last only a few picoseconds. A single pulse can contain frequency components covering the whole terahertz range from 0.05 to 4 THz. For detection, the electrical field of the terahertz pulse is sampled and digitized, conceptually similar to the way an audio card transforms electrical voltage levels in an audio signal into numbers that describe the audio waveform. In THz-TDS, the electrical field of the THz pulse interacts in the detector with a much- shorter laser pulse (e.g. 0.1 picoseconds) in a way that produces an electrical signal that is proportional to the electric field of the THz pulse at the time the laser pulse gates the
  • 84. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] detector on. By repeating this procedure and varying the timing of the gating laser pulse, it is possible to scan the THz pulse and construct its electric field as a function of time. Subsequently, a Fourier transform is used to extract the frequency spectrum from the time-domain data. edit]Advantages of THz radiation THz radiation has several distinct advantages over other forms of spectroscopy: many materials are transparent to THz, THz radiation is safe for biological tissues because it is non-ionizing (unlike for example X- rays), and images formed with terahertz radiation can have relatively good resolution (less than 1 mm). Also, many interesting materials have unique spectral fingerprints in the terahertz range, which means that terahertz radiation can be used to identify them. Examples which have been demonstrated include several different types of explosives, polymorphic forms of many compounds used as Active Pharmaceutical Ingredients (API) in commercial medications as well as several illegal narcotic substances. Since many materials are transparent to THz radiation, these items of interest can be observed through visually opaque intervening layers, such as packaging and clothing. Though not strictly a spectroscopic technique, the ultrashort width of the THz radiation pulses allows for measurements (e.g., thickness, density, defect location) on difficult to probe materials (e.g., foam). The measurement capability shares many similarities to that observed with pulsed ultrasonic systems. Reflections from buried interfaces and defects can be found and precisely imaged. THz measurements are non-contact however. Traffic Stop, drug sniffing  dogs       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First Wikipedia, National Geospatial Intelligence Agency Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.   TRAPWIRE       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog Cnet Tech News First Wikipedia, National Geospatial Intelligence Agency Justice Technology Information Network, National Law Enforcement and Corrections Technology Center.   US-VISIT       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* National Immigration Forum, embrace and uphold America's tradition as a nation of immigrants. National Network for Immigrant and Refugee Rights National Immigrants' Rights Project Privacy Watch, Cotse.net Internet Privacy Website, Civil liberty watchdog National Network for Immigrant and Refugee Rights U.S. English National Immigrants' Rights Project Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy Dept of Homeland Security ID all immigrants, potential terrorists? FAIR Federation for American Immigration.  Reform, mass immigration to the U.S. should stop U.S. Departmant of State, Consular Affairs US-VISIT, info US Info search: collect biometric data on foreigners White House, 'web tracking bug'       top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ... AP  White House Tracking Bug CAMERA AP “Israeli spying” story an “Urban Myth” according to Justice Department Dept of Homeland Security ID all immigrants, potential terrorists? Fox US Info search: collect biometric data on foreigners
  • 85. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM]   Smile - You're on Candid Cable Surveillance Camera!  http://www.tbrnews.org/Archives/a2734.htm  The Voice of the White House  Washington, D.C., August 10, 2007: “How do they watch you? Let me count the ways. With the new surveillance law being voted in by a weak-kneed Congress, the useless AG, Gonzales can now listen to any conversation or read any email without a court order. I have several additional comments to be made on this subject. Let’ s consider a means by which you can be spied on without a warrant. The first is by using your very own television set to listen to you.Sounds fantastic? Another nutty blog idea? Think again. Here I am quoting from an in- house memorandum: ‘The methodology of using a commercial television set connected to a cable network system being used as a transmitter as well as a receive, allowing other parties to hear conversations conducted in the vicinity of the set utilizes the medium of a digital oscillator installed in television sets. This use is only for a set itself connected to a cable system. The additional use of a cable box connected to the television set is the only means by which the set can be used to listen to nearby conversations because these boxes are designed to feed back information through the cable system. This feedback makes it possible for a subscriber to cable to use his telephone to call the cable company for the inclusion of a special program to the subscriber’s system. The cable company is automatically able to ascertain the telephone number from the call and using that information, send the desired program to the television set via their network and the box. The subscriber code of the subscriber matches the data on the subscriber’s box. This makes the use of the box as an instrument of clandestine surveillance possible.. It is then possible for such information to be fed into other channels, including investigative ones. The use by private parties of the cable system to obtain clandestine information in this manner would be difficult if not impossible but the NSA and FBI techniques in other electronic surveillance matters are more than sufficient to ensure electronic eavesdropping. ••••••••••••    WMRHow 9/11 began the process of a massive grab by the government of personal data.  January 28-30, 2011 With the neo-fascist Republican Party now in charge of the House of Representatives, there is proposed data retention legislation that would give the FBI virtual unfettered access to stored Internet transactional data from a variety of service providers with or without a criminal predicate. Democrats like Debbie Wasserman-Shultz from Florida also support the proposed mandatory data retention legislation. Government "fishing expeditions" for personal data had its beginning in the weeks after 9/11. This hunger for personal data has culminated in a massive $1.5 billion National Security Agency data warehouse now under construction at Camp Williams in Utah. Although NSA insists that it will have few analysts at its new data warehouse, the NSA Utah Data Center, the government's grab for Internet user data clearly shows intent by NSA to conduct more sophisticated forms of data mining, extraction, and analysis than NSA and other federal agencies sought in the weeks and months after 9/11. JetBlue provided passenger data to a firm called Torch Concepts, a defense contractor based in Huntsville, Alabama, that had major plans to apply military- and intelligence-level data analysis programs to the American public. American and Delta Airlines had rejected requests for their passenger data by Torch. Torch's conclusions were that poorer people who did not live in their homes for a long period of time time posed a greater terrorist risk (passenger stability indicator) than wealthier long-term homeowners. The Census Bureau is also vulnerable to seeing its massive databases acquired by NSA Utah for data mining purposes. This editor previously reported on the value of U.S. Census data to intelligence analysts in 2004: HOMELAND SECURITY MINES CENSUS DATA FILES Possible Violation of Federal Law By Wayne Madsen According to US Census Bureau documents, the U.S. Census Bureau shared confidential census data files with the Department of Homeland Security (DHS). Of particular interest to DHS were census files on U.S. citizens of Arab ancestry sorted by individual ZIP code tabulation areas. In a U.S. Census Bureau memo dated April 23, 2004, a senior systems analyst with the Population Division writes to DHS that "my superiors are now asking questions about the usage of the data, given the sensitivity of different data requests we have received about the Arab population." The Branch Officer of the DHS Customs and Border Protection Bureau's Container Security Division Operational Support and Oversight Branch responds to the Census Bureau concern by stating that the information on Americans of Arab ancestry is required for "U.S. Outbound operations; which include both cargo and passenger operations." The Branch Chief continues by stating, "at U.S. International airports, U.S. Customs posts signage informing various nationalities of the U.S. Customs regulations to report currency brought into the US upon entry. Current regulations require passengers bringing more than $10,000 into the U.S. to claim it on a currency entry declaration . . . My reason for asking for U.S. demographic data is to aid the Outbound Passenger Program Officer in identifying which language of signage, based on U.S. ethnic nationality population, would be best to post at the major International airports. Some cases this would identify multiple copies needed of a specific language sign versus other cities only one copy." The Branch Chief then assures Census, "the data obtained from Census was used only for the above purpose and subsequently has been purged from my files!" Although the Branch Chief's name was blocked out in the released documents, the names of two DHS officials involved in the Census data request, Jerome A. Walfish and Mark S. Ziner, were not redacted.
  • 86. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Privacy experts point out that the reasoning given by DHS for obtaining the Arab ancestry files has some major flaws. One, is why someone involved with Outbound operations would be concerned with entry currency declarations. Another is why DHS requested data files on Arab ancestry populations in New England that include a number of second, third, and fourth generation Maronite Christian Lebanese whose language is English and would, therefore, not require airport signage written in Arabic. The confidentiality of U.S. Census data is established in federal law. Title 13 U.S.C. Section 9, states that U.S. census data is confidential. In addition, Title 13, U.S.C. Section 9 (a) (a) states that non-employees of the Census Bureau must take an "oath of non disclosure," and must be special sworn status (SSS) officers if they are from another department or agency. There is no indication that DHS personnel who viewed the confidential Census records were special sworn status officers of the Census Bureau. DHS was particularly interested in a 2000 Census file denoting the "population of Arab ancestry" from all places in the United States with 10,000 or more population. The information would be helpful in the possible targeting by DHS of cities with large percentages of Arab-American citizens, particularly Dearborn, Michigan with a 30.01 percent Arab-American population; Bailey's Crossroads, Virginia, 0.69 percent; Hamtramck, Michigan, 9.39 percent; Dearborn Heights, Michigan, 7.86 percent; Bridgeview, Illinois, 7.18; Tyson's Corner, Virginia, 6.53 percent; and Lackawanna, New York, 5.83. Lackawanna is home to the "Lackawanna Six," six Yemeni-Americans who were convicted of aiding Al Qaeda. There were allegations of U.S. Justice Department prosecutorial misconduct in the case against the six, mainly that the government threatened to indefinitely jail the six in a military detention facility unless they voluntarily pleaded guilty to terrorism charges. In addition, DHS was provided with very detailed Arab-American demographic data from the states of Massachusetts, Rhode Island, and New Hampshire, and the commonwealth territory of Puerto Rico. In the case of New Hampshire, the census data yielded some very definitive information on Arab-Americans broken down by ZIP codes into small towns and cities. In the case of Nashua, New Hampshire, the combined ZIP codes of 03060,03062, 03063, and 03064 indicates the presence of 269 Lebanese-Americans. This community of Maronite Christian Catholics includes some of New Hampshire's best-known politicians and their families, including current Republican Senator John E. Sununu and his three children and former Nashua Mayor Brenda Elias. In the case of Salem, New Hampshire (ZIP code 03079), the 594 Lebanese Americans include former New Hampshire Republican Governor and chief of staff to former President George H. W. Bush, John H. Sununu, the father of Senator Sununu. In Bedford (ZIP code 03110), the 44 Lebanese-Americans in the town include members of the Sununu family. In the case of Dover (ZIP Code 03820), the Lebanese-American community includes Bill Shaheen, the husband of former Democratic Governor Jeanne Shaheen, and their three children. Jeanne Shaheen is currently the national co-chair of Senator John Kerry's presidential campaign.* DHS also obtained specific breakdowns of Iraqi-Americans and Palestinian-Americans. In certain towns, where their respective populations are low, it would not be difficult for DHS to ascertain the identities of the individuals by family unit. Such are the cases with the Iraqi-American populations of the Massachusetts towns of Longmeadow (7 people), Andover (8 people), Cambridge (6 people), Chelsea (8 people), and East Providence, Rhode Island (5 people). The same situation applies to Palestinian-Americans in the census records where the breakdown shows 5 members of that ancestry in Springfield, Massachusetts and 3 in Londonderry, New Hampshire. * Shaheen is now the senior Senator from New Hampshire.         anonymous This administration likes to write memos to itself, justifying the most horrendous acts. Wars of aggression, torture, assassination, the destruction of 800 years of our common law heritage (habeas corpus), and 250 years of American law in the body of our Constitution. Some of these are public. Two more have recently come partially into the light. The first is an awareness of some kind of communication surveillance. Currently some groups believe that this is limited to the data mining of so called pen register information. But, pen register data does not require a warrant for access. This data is composed of basic information about individual calls like date, time, length, and number called. There is no need for the NSA to collect this data either. All most all billing of American phone calls is done by an Israeli company called Amdocs. This data would be most cheaply and conveniently purchased directly from Amdocs. NSA also has the legal "right" to collect basic email data without a warrant as well. This includes the information in the email header including but not limited to sender, recipients, data, time, length, attachment names, etc. The legal precedent for the NSAs gathering of basic email data without a warrant was actually based on its existing "right" to pen register data.
  • 87. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] So this current debacle is over something more than pen register data. For around two decades, academic publication of much optical computing theory and technology has been suppressed by our government. The suppression of academic information is nothing new. I specifically recall that during the 1970's our government prevented the publication of biomedical research because the research referred to unapproved uses of FDA cleared drugs. Specialized optical units and array processors will massively increase the parallel processing capacities of the real time capacity required to effectively provide voice recognition capabilities on a large scale. The NSA has been rumored to have these capacities for some time. It is much more likely that the contents of the phone calls themselves are being monitored and data mined. Otherwise, there would be no furor over this whole issue. The other significant Constitutional attack that is presently coming into the light is about a program of warrant-less sneak and peek searches of Muslim owned homes, businesses and property. These illicit searches are reputed to center around searches for radioactive material. At first 100 such searches were said to have taken place, but more recent reports have upped that number to over 500. It is clear that this tyrant president will not accept any limitations on his power. Even though the law is clear, his minions tout the line that his war powers are unlimited. Our entire legal and societal heritage as well as our way of life is under viscious attack from our own leaders.   Wired   Appeals Court Allows Classified Evidence in Spy Case By David Kravets February 27, 2009 | 3:49:39 PMCategories: Surveillance A federal appeals court dealt a blow to the Obama administration Friday when it refused to block a judge from admitting top secret evidence in a lawsuit weighing whether a U.S. president may bypass Congress, as President George W. Bush did, and establish a program of eavesdropping on Americans without warrants. The legal brouhaha concerns U.S. District Judge Vaughn Walker's decision in January to admit as evidence a classified document allegedly showing that two American lawyers for a now-defunct Saudi charity were electronically eavesdropped on without warrants by the Bush administration in 2004. The lawyers — Wendell Belew and Asim Ghafoor — sued the Bush administration after the U.S. Treasury Department accidentally released the top secret memo to them. The courts had ordered the document, which has never been made public, returned and removed from the case after the Bush administration declared it a state secret. The document's admission to the case is central for the two former lawyers of the Al-Haramain Islamic Foundation charity to acquire legal standing so they may challenge the constitutionality of the warrantless-eavesdropping program Bush publicly acknowledged in 2005. Absent intervention from the U.S. Supreme Court, the one-line decision (.pdf) by the 9th U.S. Circuit Court of Appeals means the lawyers' case is the only lawsuit likely to litigate the merits of a challenge to Bush's secret eavesdropping program adopted in the aftermath of the Sept. 11 terror attacks. "We're trying to establish a legal precedent: A rule that the president must comply with legislation passed by Congress," said Jon Eisenberg, the attorney for the two lawyers. "The president is not above the law. This case is important to establish a legal precedent." The lawyers' suit looked all but dead in July when they were initially blocked from using the document to prove they were spied on. They were forced to return it to the government after it was declared a state secret. But last month, Walker said the document could be used in the case because there was sufficient, anecdotal evidence unrelated to the document that suggests the lawyers for the Al-Haramain charity were spied upon. Without the document, the lawyers didn't have a case. The Bush and the Obama administration's said the document's use in the trial was a threat to national security. The document at issue isn't likely to ever become public.  Walker's Jan. 5 order only allows lawyers in the case to view it, and they are forbidden to publicly discuss its contents. Bush acknowledged the existence of the so-called Terror Surveillance Program in 2005. It authorized the NSA to intercept, without warrants, international communications to or from the United States that the government reasonably believed involved a member or agent of al-Qaeda, or affiliated terrorist organization. Congress authorized such spying activity in July. The Electronic Frontier Foundation claims the TSP went further, and accuses the nations' telecommunication companies of funneling all electronic communications to the National Security Agency without warrants. However, as part of the spy bill approved in July, the government immunized the telcos from lawsuits accusing them of being complicit with the Bush administration. The Obama administration on Thursday urged Judge Walker, the same judge in the Al-Haramain case, to dismiss the EFF's challenge to the immunity legislation. Walker's decision is pending. The U.S. government had designated Al-Haramain a terror organization.  The Justice Department declined comment.  
  • 88. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] Warrantless searches by FBI WASHINGTON - The FBI secretly sought information last year on 3,501 U.S. citizens and legal residents from their banks and credit card, telephone and Internet companies without a court's approval, the Justice Department said Friday. It was the first time the Bush administration has publicly disclosed how often it uses the administrative subpoena known as a National Security Letter, which allows the executive branch of government to obtain records about people in terrorism and espionage investigations without a judge's approval or a grand jury subpoena.  Friday's disclosure was mandated as part of the renewal of the Patriot Act, the administration's sweeping anti-terror law. The FBI delivered a total of 9,254 NSLs relating to 3,501 people in 2005, according to a report submitted late Friday to Democratic and Republican leaders in the House and Senate. In some cases, the bureau demanded information about one person from several companies. The numbers from previous years remain classified, officials said.  The department also reported it received a secret court's approval for 155 warrants to examine business records last year under a Patriot Act provision that includes library records. However, Attorney General Alberto Gonzales has said the department has never used the provision to ask for library records. The number was a significant jump over past use of the warrant for business records. A year ago, Gonzales told Congress there had been 35 warrants approved between November 2003 and April 2005.  The spike is expected to be temporary, however, because the Patriot Act renewal that President Bush signed in March made it easier for authorities to obtain subscriber information on telephone numbers captured through certain wiretaps. The Foreign Intelligence Surveillance Court, the same panel that signs off on applications for business records warrants, also approved 2,072 special warrants last year for secret wiretaps and searches of suspected terrorists and spies. The record number is more than twice as many as were issued in 2000, the last full year before the terrorist attacks of Sept. 11, 2001. The FBI security letters have been the subject of legal battles in two federal courts because, until the Patriot Act changes, recipients were barred from telling anyone about them.  Ann Beeson, the associate legal counsel for the American Civil Liberties Union, said the report to Congress "confirms our fear all along that National Security Letters are being used to get the records of thousands of innocent Americans without court approval."  The number disclosed Friday excludes requests for subscriber information, an exception written into the law. It was unclear how many FBI letters were not counted for that reason. Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted Exclusive: Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted; Senate Demanding Answers By BRIAN ROSS, VIC WALTER, and ANNA SCHECTER Oct. 9, 2008— Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. The chairman of the Senate Intelligence Committee, Jay Rockefeller (D-WV), called the allegations "extremely disturbing" and said the committee has begun its own examination. "We have requested all relevant information from the Bush Administration," Rockefeller said Thursday. "The Committee will take whatever action is necessary." "These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones," said Adrienne Kinne, a 31-year old US Army Reserves Arab linguist assigned to a special military program at the NSA's Back Hall at Fort Gordon from November 2001 to 2003. Kinne described the contents of the calls as "personal, private things with Americans who are not in any way, shape or form associated with anything to do with terrorism." WATCH Kinne discuss why it was 'awkward' listening to her fellow Americans. She said US military officers, American journalists and American aid workers were routinely intercepted and "collected on" as they called their offices or homes in the United States. Watch "World News Tonight with Charles Gibson" and "Nightline" for more of Brian Ross' exclusive report. Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad's Green Zone from late 2003 to November 2007. "Calling home to the United States, talking to their spouses, sometimes their girlfriends, sometimes one phone call following another," said Faulk. WATCH Faulk discuss what a day on the job was like listening to Americans. The accounts of the two former intercept operators, who have never met and did not know of the other's allegations, provide the first inside look at the day to day operations of the huge and controversial US terrorist surveillance program. "There is a constant check to make sure that our civil liberties of our citizens are treated with respect," said President Bush at a news conference this past February. But the accounts of the two whistleblowers, which could not be independently corroborated, raise serious questions about how much respect is accorded those Americans whose conversations are intercepted in the name of fighting terrorism. US Soldier's 'Phone Sex' Intercepted, Shared Faulk says he and others in his section of the NSA facility at Fort Gordon routinely shared salacious or tantalizing phone calls that had been intercepted, alerting office mates to certain time codes of "cuts" that were available on each operator's computer. "Hey, check this out," Faulk says he would be told, "there's good phone sex or there's some pillow talk, pull up this call, it's really funny, go check it out. It would be some colonel making pillow talk and we would say, 'Wow, this was crazy'," Faulk told ABC News. Faulk said he joined in to listen, and talk about it during breaks in Back Hall's "smoke pit," but ended up feeling badly about his actions. "I feel that it was something that the people should not have done. Including me," he said. In testimony before Congress, then-NSA director Gen. Michael Hayden, now director of the CIA, said private conversations of Americans are not intercepted. "It's not for the heck of it. We are narrowly focused and drilled on protecting the nation
  • 89. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] against al Qaeda and those organizations who are affiliated with it," Gen. Hayden testified. He was asked by Senator Orrin Hatch (R-UT), "Are you just doing this because you just want to pry into people's lives?" "No, sir," General Hayden replied. Asked for comment about the ABC News report and accounts of intimate and private phone calls of military officers being passed around, a US intelligence official said "all employees of the US government" should expect that their telephone conversations could be monitored as part of an effort to safeguard security and "information assurance." "They certainly didn't consent to having interceptions of their telephone sex conversations being passed around like some type of fraternity game," said Jonathon Turley, a constitutional law professor at George Washington University who has testified before Congress on the country's warrantless surveillance program. "This story is to surveillance law what Abu Ghraib was to prison law," Turley said. Listening to Aid Workers NSA awarded Adrienne Kinne a NSA Joint Service Achievement Medal in 2003 at the same time she says she was listening to hundreds of private conversations between Americans, including many from the International Red Cross and Doctors without Borders. "We knew they were working for these aid organizations," Kinne told ABC News. "They were identified in our systems as 'belongs to the International Red Cross' and all these other organizations. And yet, instead of blocking these phone numbers we continued to collect on them," she told ABC News. WATCH Kinne describe how listening to aid workers was part of the job. A spokesman for Doctors Without Borders, Michael Goldfarb, said: "The abuse of humanitarian action through intelligence gathering for military or political objectives, threatens the ability to assist populations and undermines the safety of humanitarian aid workers." Both Kinne and Faulk said their military commanders rebuffed questions about listening in to the private conversations of Americans talking to Americans. "It was just always, that , you know, your job is not to question. Your job is to collect and pass on the information," Kinne said. Some times, Kinne and Faulk said, the intercepts helped identify possible terror planning in Iraq and saved American lives. "IED's were disarmed before they exploded, that people who were intending to harm US forces were captured ahead of time," Faulk said. NSA job evaluation forms show he regularly received high marks for job performance. Faulk left his job as a newspaper reporter in Pittsburgh to join the Navy after 9/11. Kinne says the success stories underscored for her the waste of time spent listening to innocent Americans, instead of looking for the terrorist needle in the haystack. "By casting the net so wide and continuing to collect on Americans and aid organizations, it's almost like they're making the haystack bigger and it's harder to find that piece of information that might actually be useful to somebody," she said. "You're actually hurting our ability to effectively protect our national security." The NSA: "The Shadow Factory" Both former intercept operators came forward at first to speak with investigative journalist Jim Bamford for a book on the NSA, "The Shadow Factory," to be published next week. "It's extremely rare," said Bamford, who has written two previous books on the NSA, including the landmark "Puzzle Palace" which first revealed the existence of the super secret spy agency. "Both of them felt that what they were doing was illegal and improper, and immoral, and it shouldn't be done, and that's what forces whistleblowers." WATCH Bamford describe how the NSA missed signals leading up to 9/11. A spokesman for General Hayden, Mark Mansfield, said: "At NSA, the law was followed assiduously. The notion that General Hayden sanctioned or tolerated illegalities of any sort is ridiculous on its face." NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider The Register  NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider ....   By Lewis Page • , 8th July 2010 09:20 GMT    ...   The US National Security Agency (NSA) is embarking on a secret domestic surveillance project dubbed "Perfect Citizen", intended to monitor and protect important national infrastructure such as power grids and transport systems.    ...   The Wall Street Journal, citing unnamed government and industry sources, says that the NSA has awarded a "black" (classified) $100m contract to defence contractor Raytheon which will see secret monitoring equipment installed within US networks deemed to be of national importance.    ...   According to the WSJ, Perfect Citizen has caused some disquiet among those in the know. It could be seen as the NSA - a military combat support agency whose focus is supposed to be on external threats - carrying out massive automated surveillance of American companies and citizens. The paper quotes an internal Raytheon email as saying that "Perfect Citizen is Big Brother".    ...   The stated purpose of the project is to get a clear idea of the level of threat facing American infrastructure IT. Many older systems, designed in the pre-network world, have since been hooked up to the internet for ease of use and maintenance. It is feared by some in the US intelligence / defence community that unfriendly powers and organizations are already engaged in probing these systems with a view to learning how to attack them.    ...   The NSA's Perfect Citizen equipment would be designed to flag up unusual network events indicating an impending cyber attack, according to the WSJ's sources.    ...   "You've got to instrument the network to know what's going on, so you have situational awareness to take action," an unnamed military source told the paper.    ...   Many of the networks that the NSA would wish to place Perfect Citizen equipment on are privately owned, however, and some could also potentially carry information offering scope for "mission creep" outside an infrastructure-security context. For instance, full access to power company systems might allow the NSA to work out whether anyone was at home at a given address. Transport and telecoms information would also make for a potential bonanza for intrusive monitoring.    ...   The full scope of the project remains to be determined, according to the WSJ report, with no certainty as yet on which companies or types of companies would be asked to cooperate - or how much information the NSA would get access to.    ...   The NSA - whose boss has now also been confirmed as head of the Pentagon's uniformed Cyber Command - apparently got the job by default, as it is considered the only US agency with enough network and cyber savvy to take the task on.    ... The Reg has contacted Raytheon and the NSA for comment on Perfect Citizen, but thus far has not received any reply. ® Electronic Frontier Foundation   AP SAN FRANCISCO - The Justice Department said Friday it was moving to dismiss a federal lawsuit challenging the Bush administration's secretive domestic wiretapping program.   The lawsuit, brought by the Internet privacy group, Electronic Frontier Foundation, does not include the government.  Instead, it names AT&T, which the San Francisco-based group accuses of colluding with the National Security Agency to make communications on AT&T networks available to the spy agency without warrants. The government, in a filing here late Friday, said the lawsuit threatens to expose government and military secrets and therefore should be tossed. The administration
  • 90. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] added that its bid to intervene in the case should not be viewed as a concession that the allegations are true.  As part of its case, the EFF said it obtained documents from a former AT&T technician showing that the NSA is capable of monitoring all communications on AT&T's network, and those documents are under seal. The former technician said the documents detail secret NSA spying rooms and electronic surveillance equipment in AT&T facilities. Next month, U.S. District Judge Vaughn Walker will hold a hearing on whether they should be divulged publicly.  President Bush confirmed in December that the NSA has been conducting the surveillance when calls and e-mails, in which at least one party is outside the United States, are thought to involve al-Qaida terrorists.  In congressional hearings earlier this month, Attorney General Alberto Gonzales suggested the president could order the NSA to listen in on purely domestic calls without first obtaining a warrant from a secret court established nearly 30 years ago to consider such issues. Gonzales said the administration, assuming the conversation related to al-Qaida, would have to determine if the surveillance were crucial to the nation's fight against terrorism, as authorized by Congress following the Sept. 11 attacks.  The EFF lawsuit, alleging AT&T violated U.S. law and its customers' privacy, seeks to stop the surveillance program.  The San Antonio-based telecommunications giant said it follows all applicable laws.     60 Minutes on NSA corruption and incompetence. Report follows WMR report by six years   May 24, 2011 -- WayneMadsenReport CBS "60 Minutes" reported on May 22 on former National Security Agency (NSA) official Thomas Drake's charges of high-level corruption and incompetence within the eavesdropping agency. WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J. Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer Diane Roark, Justice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by Jane Mayer fails to mention this important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli espionage in the United States, it's "see no evil, hear no evil, say no evil." NSA and selling the nation's prized secrets to contractors June 1, 2005 On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off- shore locations like India. CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere. In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million.
  • 91. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States. NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud. CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden. Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan. When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel. According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee. What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence. With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets. Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows
  • 92. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!" According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non- operational administrative support functions originally specified in the GROUNDBREAKER contract. The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems. The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms: CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO HALF HEALYMINK LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT. A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms: ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA) GALLEYMAN GALLEYPROOF JAGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II, III, and KL TEXTA SPOT In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS
  • 93. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM,
  • 94. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT UMORPH, UNLIMITED VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP XVTUBA YELLOWSTONE, YETLING ZENTOOLS, ZIGZAG, and ZIRCON   Terahertz Spectroscopy Wikipedia Typically, the terahertz pulses are generated by an ultrashort pulsed laser and last only a few picoseconds. A single pulse can contain frequency components covering the whole terahertz range from 0.05 to 4 THz. For detection, the electrical field of the terahertz pulse is sampled and digitized, conceptually similar to the way an audio card transforms electrical voltage levels in an audio signal into numbers that describe the audio waveform. In THz-TDS, the electrical field of the THz pulse interacts in the detector with a much-shorter laser pulse (e.g. 0.1 picoseconds) in a way that produces an electrical signal that is proportional to the electric field of the THz pulse at the time the laser pulse gates the detector on. By repeating this procedure and varying the timing of the gating laser pulse, it is possible to scan the THz pulse and construct its electric field as a function of time. Subsequently, a Fourier transform is used to extract the frequency spectrum from the time-domain data. edit]Advantages of THz radiation THz radiation has several distinct advantages over other forms of spectroscopy: many materials are transparent to THz, THz radiation is safe for biological tissues because it is non-ionizing (unlike for example X-rays), and images formed with terahertz radiation can have relatively good resolution (less than 1 mm). Also, many interesting materials have unique spectral fingerprints in the terahertz range, which means that terahertz radiation can be used to identify them. Examples which have been demonstrated include several different types of explosives, polymorphic forms of many compounds used as Active Pharmaceutical Ingredients (API) in commercial medications as well as several illegal narcotic substances. Since many materials are transparent to THz radiation, these items of interest can be observed through visually opaque intervening layers, such as packaging and clothing. Though not strictly a spectroscopic technique, the ultrashort width of the THz radiation pulses allows for measurements (e.g., thickness, density, defect location) on difficult to probe materials (e.g., foam). The measurement capability shares many similarities to that observed with pulsed ultrasonic systems. Reflections from buried interfaces and defects can be found and precisely imaged. THz measurements are non-contact however. Prodigal Cherie Anderson runs a travel company in southern California, and she’s convinced the federal government is reading her emails. But
  • 95. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] she’s all right with that. “I assume it's part of the Patriot Act and I really don't mind,” she says. “I figure I'm probably boring them to death.” It's likely Anderson is not alone in her concerns that the government may be monitoring what Americans say, write, and read. And now there may be even more to worry about: a newly revealed security research project called PRODIGAL -- the Proactive Discovery of Insider Threats Using Graph Analysis and Learning -- which has been built to scan IMs, texts and emails . . . and can read approximately a quarter billion of them a day. “Every time someone logs on or off, sends an email or text, touches a file or plugs in a USB key, these records are collected within the organization,” David Bader, a professor at the Georgia Tech School of Computational Science and Engineering and a principal investigator on the project, told FoxNews.com. PRODIGAL scans those records for behavior -- emails to unusual recipients, certain words cropping up, files transferred from unexpected servers -- that changes over time as an employee "goes rogue." The system was developed at Georgia Tech in conjunction with the Defense Advanced Research Projects Agency (DARPA), the Army's secretive research arm that works on everything from flying cars to robotic exoskeletons. Initially, PRODIGAL will scan only the communications of military volunteers and people who work in federal agencies. But the very existence of such a project is sure to unnerve citizens like Anderson. Is the government reading my emails? Are they already monitoring me? "Some people say it's one step further toward a police state," said Anthony Howard, a book author and security expert who has consulted for the Department of Homeland Security. But Bader and other experts are quick to dismiss the idea that PRODIGAL could be used to monitor everyone in America. The scans work only on internal systems, they say -- not across the entire Internet. And the experts say such a project is long overdue: by monitoring for "anomalies" and predicting extreme behavior, catastrophes can be prevented, such as a soldier in good mental health becoming homicidal or a government employee sharing key classified information. “Today, an analyst may receive tens of thousands of 'anomalies' per day, where an anomaly is an unexplained event,” Bader said. The new system is designed to aid analysts in processing those anomalies. And it's not alone. Bader equated the PRODIGAL system to Raytheon SureView, an internal scanning system that looks for suspicious activity and alerts federal agencies about possible threats. Another system is the Einstein project, which was developed after 9/11 and scans government employees for key words and links suspicious activity to National Security Agency databases. But PRODIGAL scans vastly more data than those systems: as much as a terabyte or more per day, what Georgia Tech described as "massive data sets." PRODIGAL is part of an existing DARPA security project called Anomaly Detection at Multiple Scales (ADAMS), which was announced earlier this year. Details about how ADAMS works are not widely known; Georgia Tech's recent announcement is one of the first reports to explain how these detection engines work. According to Bader, PRODIGAL uses complex "graph-processing" algorithms to analyze threats and piece together a jigsaw puzzle of communications. The system then ranks the unusual activity before feeding the most suspicious threats to agents. Cyber-security expert Joseph Steinberg, CEO of Green Armor Solutions, said ADAMS is unique in that it scans through a massive stream of data. He says the new project, which will take about two years to develop and will cost $9 million, will be more effective at analyzing threats and determining if they are valid. But the issue is not the scanning technology itself; it’s how the information is interpreted -- and whether it ultimately helps at all, Howard told FoxNews.com. "Since there is no real data publicly available to substantiate that any of this technology is preventing terrorist attacks or strengthening our borders from within, we can't] really say definitively that this technology is doing any good," he said. The challenge, he said, is that criminals and terrorists often use multiple channels of communication, some encrypted -- and know how to avoid existing detection systems. Nevertheless, PRODIGAL’s ability to scan reams of data is clearly the next step in tracking unusual activity, and it’s guaranteed to raise a red flag for Anderson and others. "Since people tend to be imperfect, the data captured can easily be mishandled. Where does it end?" Howard said. Read more: http://www.foxnews.com/scitech/2011/12/03/could-us-government-start-reading-your-emails/#ixzz1fUgqaOeA   WMR  NSA spying operation targeting journalists focused but massive April 20-22, 2012 -- NSA spying operation targeting journalists focused but massive  National Security Agency (NSA) sources have reported the following to WMR: The NSA has conducted a targeted but massive surveillance operation against certain journalists who have routinely exposed NSA's illegal domestic communication surveillance program, code named STELLAR WIND.    ...   NSA has, for some time, kept
  • 96. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] tabs on journalists who wrote about the communication spying agency. In its embryonic stage, the journalist surveillance system, originally code-named FIRSTFRUITS, was basically a clipping service that provided NSA and CIA analysts with copies of newspaper, magazine, and Internet articles that mentioned one or both of the two agencies.    ...   Shortly after the September 11, 2001 attacks, Vice President Dick Cheney's legal counsel, David Addington, visited NSA headquarters at Fort Meade, Maryland with a list of individuals he wanted NSA to spy on and provide Cheney's office with transcripts of phone calls and e-mails. From that visit, STELLAR WIND was developed as an illegal surveillance system targeting journalists, members of Congress, and other "persons of interest" for the White House.    ...   In March 2004, Attorney General John Ashcroft ruled STELLAR WIND illegal but the next day he became critically ill with pancreatitis. When White House chief of staff Andrew Card and White House counsel Alberto Gonzales visited Ashcroft in his hospital room to demand he sign off on the program, Ashcroft deferred to his deputy James Comey and FBI director Robert Mueller who both refused to authorize the program. George W. Bush overruled Ashcroft, Comey, and Mueller and continued to authorize STELLAR WIND. President Obama has continued to authorize STELLAR WIND, according to NSA sources.    ...   Although STELLAR WIND continues to generally target journalists who write about intelligence and national security matters, NSA has concentrated its efforts on three journalists, in particular. They are New York Times' reporter and author of State of War James Risen, journalist and author of The Puzzle Palace and Body of Secrets James Bamford, and WMR editor Wayne Madsen. Risen continues to fight a grand jury subpoena to testify about his sources on Operation Merlin, a CIA program to deliver flawed nuclear design technology to Iran. Former CIA officer Jeffrey Sterling has been indicted and charged under the Espionage Act for revealing details of the program. Risen's subpoena was quashed by Judge Louise Brinkema of the U.S. District Court for the Eastern District of Virginia, but the Obama administration has appealed the decision to the U.S. Appeals Court for the Fourth Circuit in Richmond, Virginia and oral arguments in the case are scheduled for next month.    ...   NSA sources report: Wayne Madsen's e-mails and phone conversations back to 2002 are in the possession of the NSA. The phone calls range from those with his mother to those with government sources. All passwords to social networking websites, banks, phone companies, credit card companies, and his website, WayneMadsenReport, are held by the NSA. The data includes the list of his subscribers to WayneMadsenReport, as well.    ...   The same level of detailed data is maintained on Risen and Bamford.    ...   Personal observation: It is very clear that a number of individuals who contacted this editor over the past several years to pass on information were stymied at the last minute from maintaining contact. These individuals were willing to provide information on: the movement and temporary "loss" of nuclear weapons from Minot Air Force Base in North Dakota to Barksdale Air Force Base in Louisiana in 2007 coupled with the murder of Air Force special operation Captain John Frueh in Washington state; documents proving Canadian military involvement in torture of detainees in Afghanistan; information on the 2000 attack on the USS Cole in Aden harbor being a "false flag" attack; evidence that there were no human remains found at the crash site of United flight 93 in Shanksville, Pennsylvania; and evidence showing that Harvard virologist Dr. Don Wiley, who was investigating the initial anthrax attacks, was murdered in Memphis in November 2001.    ...   In all these cases, individuals who contacted this editor and were willing to provide information ceased contact after their initial phone calls, letters, and email.    ...   NSA also maintains mail covers on addresses of certain individuals in the event that contact is made via the U.S. Postal Service or private companies such as FedEx or DHL.    ...   FIRSTFRUITS, which is now known by a different cover name, contains, in addition to articles, complete transcripts of phone calls, e-mails, faxes, and letters, in addition to the numbers and names of all individuals who have been in contact with targeted journalists. In addition to the three high priority targets -- Risen, Bamford, and Madsen -- other journalists who are a subject of the NSA warrantless surveillance include Bill Gertz of The Washington Times, Eric Lichtblau and Scott Shane of The New York Times, Siobhan Gorman, formerly of The Baltimore Sun and now with The Wall Street Journal, and Seymour Hersh with The New Yorker.   ..   So far, the Obama administration has brought Espionage Act charges against six individuals for contact with the media. They are charged with providing classified information to journalists and "aiding the enemy."    ...   However, the Justice Department may take an even more draconian turn. This editor has heard from NSA insiders that there is a willingness by some quarters to charge two of the three key targeted journalists under the Espionage Act. Since Bamford and Madsen both once worked at NSA and both signed non-disclosure agreements -- Bamford in the 1960s and Madsen in the mid-1980s -- there has been talk of indicting them also for violations of the Espionage Act, along with their sources in the intelligence community.   RT Stratfor emails reveal secret, widespread TrapWire surveillance system Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology —
  • 97. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous. Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it's the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation's ties are assumed to go deeper than even documented. The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing. Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails. On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning. Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site. According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be "analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.” In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces. What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf). “Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.” In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product “can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.” An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “ walk] back and track the suspects from the get go w/facial recognition software.” Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the "See Something, Say Something" program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have
  • 98. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well. In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the eleven months. News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas. FBI / BioMetric   Facial Recognition and Identification Initiative.pdf text and RT Facial Recognition and Identification Initiatives Richard W. Vorder Bruegge Federal Bureau of Investigation 2 Image Technology in the Forefront • Unparalleled ease of capturing, storing, copying, and sharing images • Proliferation of surveillance cameras, expanding global media enterprises, and average citizens with mobile phone still and video camera capabilities • Unprecedented level of sharing images and videos via the internet and other advanced communication methods • Photographs and videos depicting victims, suspects, and eyewitnesses are becoming the subject of investigations Face: Forensic Discipline And Biometric 3 Biometrics Forensics • A measurable biological (anatomical and physiological) or behavioral characteristic used for identification – Facial Recognition (FR) - the automated searching of a facial image in a computer database, typically resulting in a group of facial images ranked by computer evaluated similarity computer- evaluated • Visible physical characteristics one can use for the purposes of measurements or comparisons that are collected after an event – Facial Identification (FI) - the manual examination of the differences and similarities between two facial images for the purpose of determining if they represent different persons or the same person Event 4 FI & FR Address Multiple Missions • Mission Areas: – Access control – Automated identity verification – Human identification – Screening – Surveillance – Law enforcement & national security investigations – Identity intelligence to understand intent 5 FBI Facial Use Cases • Identifying fugitives and missing persons in FR systems • Identifying unknown persons of interest from images (1:N) • Tracking subjects movements to/from critical events (e.g., 9/11) • Conducting automated surveillance at lookout locations (1:M, where 1<M<<N) • Identifying subjects in public datasets • Identifying subjects from images in seized systems • Verifying mug shots against National Criminal Information Center (NCIC) records (1:1) • Controlling access 6 Identifying Subjects from Images for 40 Years • The FBI’s Facial Recognition/Identification work is performed within the Forensic Audio, Video, and Image Analysis Unit (FAVIAU) • The FAVIAU is one of only a few accredited laboratories in the world that conducts examinations in the disciplines of video, image, and audio analysis The Biometric Center of Excellence (BCOE) is the Federal Bureau of Investigation’s (FBI) program for exploring and advancing the use of new and enhanced biometric technologies and capabilities for integration into operations 7 Driving New FBI Biometric Capabilities 8 Sponsoring Applied Research • Ongoing applied research, development, test & evaluation: – Universal Face & Iris Workstation – FBI Facial Collaboration-Facial Land marking/Facial Aging – Automated Face Detection and Recognition in Video – FI/FR of Twins (blemishes) – Obscuring Identity in Video – Repro Face (2D-3D-2D) – Facial Image and Camera Certification Process – Automated Retrieval of Scars, Marks, and Tattoos – Ear Recognition – Multiple Biometric Grand Challenge/Multiple Biometric Evaluation/ III Data Set Testing 9 Sponsoring Standards Development • Facial Identification Scientific Working Group (FISWG) • Sponsored by the BCOE and established in 2009 • Mission - “develop consensus standards, guidelines, and best practices for the discipline of image-based comparisons of human features” • Participants include federal, state, local, and international government agencies, as well as invited non-governmental organizations • Next meeting scheduled for November 15-18 in San Antonio, Texas • Visit www.FISWG.org Deepening FR Collaboration • Sponsored the International Face Collaboration Meeting – 5 foreign countries and 11 U.S. agencies participated • Participated in the FR workshop “From Bones to Bits” – 55 U.S. government and 47 contractor attendees • Sponsored the U.S. Government Facial Collaboration Meeting – 88 attendees representing numerous law enforcement, intelligence, and military agencies 10 Analyzing Legal And Privacy Concerns Tasks associated with this analysis include: • Identifying databases external to the FBI to which the FBI has legal access • Defining policy for both automated and human-tandem searching of databases and methods of how the images
  • 99. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] are used in searching and how they are destroyed or retained • Identifying privacy implications of applied research using images of human subjects 11 Developing Training Curriculum 12 Preparing for FR incorporation into Next Generation Identification (NGI) • The NGI system: – Incremental replacement of the current IAFIS – Improving current functionality and providing new functionality – Developing multimodal collection and search identification services ? An upgrade to IAFIS – The FBI is developing an automated, interoperable multimodal biometric system 13 Enhanced ten print services 2011 Palmprints and latents 2012 Photos/Facial, scars, marks, and tattoos 2013 Iris 2014 13 Value Of the FBI-DMV Pilot Operational Results FR System Testing Identification of Follow-On Projects The BCOE-sponsored FR pilot program with NC DMV led to more than 700 leads including: • One federal fugitive apprehension • Six state fugitive apprehensions • One missing person resolution FACEMASK has also served as an opportunity for FBI analysts to operationally test a FR system and determine its strengths and weaknesses. This aids the FBI as it develops its own FR capability Due to this success, the FBI took advantage of an ongoing survey of U.S. DMVs and used it as an opportunity to identify other prospective state DMVs for follow-on projects Purpose Of The DMV Survey Initial Purpose • Collect DMV FR POC Information • Identify DMVs that have implemented FR systems Expanded Purpose • Gather data about FR vendors, state laws, and search protocol to help the FBI identify a DMV for a potential follow-on project • Technical systems information • Receptiveness to collaborating with the FBI • Various concerns and suggestions voiced by the DMVs and trends were recorded The FBI wanted to identify key FR POC in order to direct inquiring investigators and agencies. The original DMV survey focuses around contact information; however, with the success of the original pilot the purpose and scope of the data gathering effort changed. Potential FBI-DMV FR Pilot Expansion Active FR System NO FR System Unknown/No Response Key Takeaway: More than half of all state DMVs have FR systems. Their main goal is to detect and combat fraud Responses current as of (05/28/2010) 16 * * * * * * * * * * * * * * * * * * Permit Law Enforcement Access to Data * DMV Survey High Level Findings Specific Findings ? The vast majority of states that have FR Systems use L1 Technologies Technology Vendors Legal Requirements Funding Knowledge ? Many DMV image databases are maintained and searched by their vendors. This presents privacy issues that should be explored ? ? Across the nation, there are widely varying legal requirements. To initiate searches, some DMVs require Memorandums of Understanding (MOU) while some just require the requesting agency to buy their vendor’s software ? Due to a lack of funding, some states who had planned to develop FR systems had to delay or cancel their plans due to budgetary constraints ? Many DMV POCs lacked technical knowledge about their systems and the legal issues involved in their use. Since most POCs were unable or unwilling to nominate alternative POCs, more in-depth research may be required before FBI collaboration can be considered (i.e., researching state laws that apply to the DMV’s FR system or interviewing a DMV’s vendor for more specific systems information) ? Questions / Comments Contact Information: Richard Vorder Bruegge Email: Richard.VorderBruegge@ic.fbi.gov Additional Resources: www.BiometricCoE.gov Email: BiometricCoE@leo.gov WMRGROUNDBREAKER   NSA and selling the nation's prized secrets to contractors June 1, 2005 On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-shore locations like India. CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made
  • 100. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere. In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under John Negroponte, opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600 million. But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear strike on the United States. NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud. CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden. Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in Jerusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah Judaism Party's Jerusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S. delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General Janis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan. When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish Jewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster Jennings & Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New Jersey to South Africa and Pakistan and Turkey to Israel. According to the Jewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's
  • 101. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American Jewish Committee. What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy Jonathan Pollard compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New Jersey and apart from the main NSA developmental center at RCA's facility in Camden, New Jersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few American Jewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding the American Jewish engineers, the Reagan Justice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence. With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets. Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!" According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information Technology services, tools, and capabilities for all emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non- operational administrative support functions originally specified in the GROUNDBREAKER contract. The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities.
  • 102. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and domestic) in the contractors' revamping of NSA's operational systems. The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned various cover terms: CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO HALF HEALYMINK LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT. A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms: ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA) GALLEYMAN GALLEYPROOF JAGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II, III, and KL TEXTA SPOT In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST
  • 103. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF- WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING,
  • 104. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT UMORPH, UNLIMITED VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP XVTUBA YELLOWSTONE, YETLING ZENTOOLS, ZIGZAG, and ZIRCON   National Security letter,  Administrative subpoena   color coding airline passengers    top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%*
  • 105. Obama worse than Bush .. NDAA, Patriot Act, surveillance#Sarkozy http://www.newsfollowup.com/warterror.htm#Sarkozy[5/28/2014 3:21:43 PM] ACLU  and NSA lawsuit ACLU  objects to CAPPS, no due process, easily circumvented. Electronic Frontier Foundation working to protect civil and free speech  & lawsuit   Epic  Electronic Privacy Information Center TomPaine search: Bush's NSA Spying Defense Cnet Tech News First, search Carnivore Findlaw, Dean Jurist, legal news and research, University of Pittsburg PrivacyDigest privacy news Wikipedia  NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security letter.   Center for Strategic and International Studies   Critical Infrastructure Assurance Office  internet, infrastructure, surveillance, code words. Dept of Homeland Security domestic spying GWU NSA Declassified Transistion 2001, National Security Archive Electronic Briefing Book No. 24 National ID Card   top PROGRESSIVE  REFERENCE CONSERVATIVE 1% 1%* ACLU, National ID card, EPIC  Electronic Privacy Information Center, National ID card, NoNAIS.com Protect Traditional Rights to Farm, stop RFID privicacy intrusion by Bush corporate America. Privacy.org Association of Motor Vehicle Administrators Security Focus News Microsoft National Conference of State Legislatures International Biometric Group National Intelligence Reform Act, requires drivers license standardization. Lockheed Martin US personal database, defense contractor, Bush DLC, Democratic Leadership Council supports national ID card. Dept of Homeland Security  domestic spying National Intelligence Council CIA National Communications System, US Threat Advisory National Consumers Coalition  info on 'big brother', national ID card, govt spycams, supports global warming.org Terrorists Threat Integration Center, TTIC       TransparencyPlanet Google Analytics