Wednesday, April 17, 2013

Obama and Neocons Openly Back Terrorism

WARNING GRAPHIC !!!    WARNING !!!  

 America Using Proxy States for Terror is a Thin Veil to Hide Behind


… by Jim W. Dean, VT Editor          … with Press TV

 -  first published April 13th 2013  -



This pilot was dead before they took his head
The tragic comedy of the phony War on Terror is being exposed as never before for the sham that it is. Press TV reported yesterday the opening of the MKO terrorist organization office a block away from the White House.
 What a message that sends to the world…that we look out for our terrorists and take good care of them, but it just might take a little time to do it.
This is the group who inflicted four 911′s on Iran by murdering 12,000 in terrorist attacks, much of it under Saddam, and then under US protection when we took over Iraq. Israel was involved, also…no surprise there.
We had no boots on the ground inside Iran for Intel collection so the War on Terror stopped at the border of the MKO Camp Ashraf. Terrorists who worked for us were given effect immunity while keeping them on the terrorist list, I assume until a day when maybe nobody would remember what they did. We did not forget, about MKO, or the others.
I was shocked when our State Dept. under Hillary Clinton announced last fall that MKO was being rehabilitated by taking them off the terror list. It seems the International Criminal Court might be off the hook for doing absolutely nothing about this group, thinking I guess that mass murderers only lived in the Balkans or Africa.
So the powers that we think they have slipped this one by on us. Here we have our Nobel Peace Prize winner President effectively pardoning the killing of four times the 911 victims when he has no authority to do so because the MKO are not American citizens.
I did not mention aiding and abetting terrorism because that obviously was not a concern to his administration or the NeoCons.

General James (ret), Bush regime national security adviser helps open the MKO terror office in Washington.
We are all put at risk if terrorist groups with well connected big bad brothers can provide them with not only material support but protect them from prosecution.
The status of a country doing so is lowered to that of a Mafia chief, Murder Incorporated. This is not a fitting robe to wear for America…or is it?
I was shocked, but not too much so, to find John Bolton and retired general Jim Jones, a Bush regime national security adviser, welcoming the MKO to Washington, DC.
Does this mean that Jones was running a terror operation out of the White House? Aren’t there some big laws against that…where even a former government official can be prosecuted for crimes against humanity?
I can only think that they felt that with the public’s attention on the big terrorist training camp going up in the Middle East, the one also under US protection and allowed to train with live fire weapons and actually kill people that no one would notice.
This training camp is Syria, of course. We have a repeat of the Afghanistan Mujahedin fiasco in the works going on here, but in a powder keg region.
Oh yes, we have reports that the only reason that the CIA is handling the arms shipments to the rebels is to try to make sure they do not fall into the hands of these extremist terrorists. But using the Saudi Arabia and Qatari terrorist regimes as proxies is a very thin veil indeed.

Nine year old gets to take his first head – compliments of Saudi backed Wahhabi extremists
Americans know they are supporting these groups in Syria because they are good killers. They are even taking heads to prove it and bringing young teens into their ranks to use as future cannon fodder.
Strategically, they know they cannot topple Assad without them so they are shedding crocodile tears over their false concerns about unleashing a new wave of terror on the regime.
Assad has not been an angel and might himself see the inside of a court room, but it would be a huge injustice if the dock did not contain at least a hundred others from the leadership of those we know who have been engaged in terrorism but claim diplomatic immunity. That did not work for the WWII Germans, the Serbians, nor any of the Africans.
If the world is going to give out free passes for terrorism, I would at least like to see some kind of vote so the rest of us can participate in playing God regarding who gets to kill and who does not. The reputation of Western jurisprudence, what is left of it, is squarely on the line.
This was a hot topic at the UN this week with the Thematic Debate on International Justice. This issue of certain countries issuing themselves free terrorism passes while seeking punishment for those doing the same was viewed as possibly needing a bit of reform. Imagine that. If the UN in its infinite non-wisdom would not mention who these countries were, but we all know.
Iran’s conference representative, Gholam Hossein Dehqani said, “Iran believes that the prosecution and punishment of aggressors and perpetrators of horrific international crimes will promote international peace and security and bring peace and tranquility to world nations.”
Dehqani is right of course. But our current international justice, or injustice system…depending on the case, which is corrupted and outdated, requires a complete overhaul.
Right off the bat the first improvement I would make is that any country giving itself a free pass from terrorism prosecution would go to the top of the list for being prosecuted. And you can forget the ICC. It moves at a snail’s pace where we will all be dead and buried before they finish. They can be used for the slow motion cases…maybe the older ones.
In America, we have a statute called the Speedy Trial Act that once you are arrested the government has to take you to trial within a reasonable period or in effect you are serving a conviction for a crime when you have not been found guilty. And no, Guantanamo does not have this.

Oh why did you do it Uncle Sam? Was Syria going to nuke us?
Syria provides us a perfect example. The crime is happening now. We don’t want a trial initiated ten years down the road.
We want investigators and prosecutors in the field collecting evidence while it is fresh so those aiding and abetting in terrorism can be quickly identified and arrested to stop the crimes in progress.
If such an entity were found to be a country, then they would be subject to sanctions, and something called asset confiscation, starting with all the hidden offshore accounts.
When drug dealers are arrested all of their cash and property are seized so ill gotten gains cannot be used by the defense. In the US they will go to a drug dealer’s house and even collect up the children’s toys and clothes.
As always, some would say this could never be possible as those most guilty would not go along with it. But then that would just trigger a dual justice system development…the older corrupted one and then a new one that can…yes, issue arrest warrants, capture, detain, and put on trial those guilty of these crimes.
Let’s invent a new reason for having wars, a better one, to arrest and prosecute crimes against humanity people. War would be popular overnight. And all of those who protect the guilty would then become accessories after the fact. We have all these empty FEMA camps over here. Let’s use them toward a good purpose.

Has America bought a ticket for Nuremberg?
Oh, and one other thing. No multinational corp. has ever been brought into court for crimes against humanity…nor a single bank.
Do you really think that not one ever committed these crimes? Of course they have.
But they also have put themselves on the immunity list, other than fines that their stockholders pay.
Financial crimes against humanity should warrant the death penalty for the lives they destroy.
So laugh all you want at my ideas, and don’t feel bad either. I am laughing at all of you who think you have some system of justice to punish mega crimes against humanity where those countries doing the judging give themselves immunity.
I laugh not out of disrespect for their victims but at the silliness of it all for those who think they are involved in international justice when they are really providing cover for the bad guys.
Huge numbers of lives are at stake and Syria is going to be the big demonstrator.  was going through his confirmation hearings yesterday as the new NATO cmdr. and said he supports giving lethal weapons to the rebels. Because we all know they already have them I suspect he meant heavy weapons.

General Breedlove
His only concern was their not falling into the wrong hands.
OK Mr. Breedlove, if you think that is such a cool idea, what if you, your family, grand kids and parents all had to die if you are wrong…just like the Syrians? Would you still think it was a cool idea?
Syria would become a wasteland of death and destruction if that happened and maybe some other places, also. There have already been enough crimes committed to keep the gallows going for a long time.
Such crimes require an industrial scale justice system, not the slow motion shake and bake kind we have now.
We need to replace or convert General Breedlove’s command to a new ICC Justice NATO…called JATO, maybe.
Let us save the heavy lethal weapons for them as we will all get a bigger bang for our buck. And rather than watching the innocent on TV die, let us watch the guilty ones for a change. It won’t be so sad.
I am including the following video link because these head choppings are widely flowing around the Internet and generally being censored from American news so as to not stimulate too many pesky questions. I would advise the ladies to move on to reading something else because this is most unpleasant.
But America’s fingerprints are on this because those of a close ally the Saudis are, just like we are co-responsible for the Israeli horrors against the Palestinians because we have aided and abetted with our funding and ‘other things’. Muslims took lots of heads, of Serbs, in the Balkan Wars, and those photos were never shown in Western media…the pesky question problem again.

YouTube - Veterans Today - -Wahhabi beheading, the hard way     

Researcher: Vulnerabilities in aircraft systems allow remote airplane hijacking

The following article may shed some light on the possibility of aircraft remote control on 9/11. It´s from April 10th, and it led to an article in Germany´s most read online newspaper. ( http://www.bild.de/digital/handy-und-telefon/hacker/per-app-ein-flugzeug... )
Here is the original story:
http://www.pcworld.com/article/2033807/vulnerabilities-in-aircraft-syste...
Researcher: Vulnerabilities in aircraft systems allow remote airplane hijacking
Lucian Constantin, IDG News Service
The lack of security in communication technologies used in the aviation industry makes it possible to remotely exploit vulnerabilities in critical on-board systems and attack aircraft in flight, according to research presented Wednesday at the Hack in the Box security conference in Amsterdam.
The presentation, by Hugo Teso, a security consultant at consultancy firm N.runs in Germany, who has also had a commercial pilot license for the past 12 years, was the result of the researcher’s three-yearlong research into the security of avionics.
Teso showed how the absence of security features in ADS-B (automatic dependent surveillance-broadcast), a technology used for aircraft tracking, and ACARS (Aircraft Communications Addressing and Reporting System), a datalink system used to transmit messages between aircraft and ground stations via radio or satellite, can be abused to exploit vulnerabilities in flight management systems.
He did not experiment on real airplanes, which would be both dangerous and illegal, according to his own account. Instead Teso acquired aircraft hardware and software from different places, including from vendors offering simulation tools that use actual aircraft code and from eBay, where he found a flight management system (FMS) manufactured by Honeywell and a Teledyne ACARS aircraft management unit.
Using these tools, he set up a lab where he simulated virtual airplanes and a station for sending specifically crafted ACARS messages to them in order to exploit vulnerabilities identified in their flight management systems—specialized computers that automate in-flight tasks related to navigation, flight planning, trajectory prediction, guidance and more.
The FMS is directly connected to other critical systems like navigation receivers, flight controls, engine and fuel systems, aircraft displays, surveillance systems and others, so by compromising it, an attacker could theoretically start attacking additional systems. However, this aspect was beyond the scope of this particular research, Teso said.
Identifying potential targets and gathering basic information about them via ADS-B is fairly easy because there are many places online that collect and share ADS-B data, such as flightradar24.com, which also has mobile apps for flight tracking, Teso said.
ACARS can be used to gather even more information about each potential target, and by combining this information with other open-source data, it is possible to determine with a fairly high degree of certainty what model of FMS a specific aircraft is using, Teso said.
After this is done, an attacker could send specifically crafted ACARS messages to the targeted aircraft to exploit vulnerabilities identified in the code of its FMS. In order to do this, the attacker could build his own software-defined radio system, which would have a range limit depending on the antenna being used, or he could hack into the systems of one of the two main ground service providers and use them to send ACARS messages, a task that would probably be more difficult, Teso said.
Either way, sending rogue ACARS messages to real aircraft would most likely lead to the authorities searching and eventually locating you, the researcher said.
Teso created a post-exploitation agent dubbed SIMON that can run on a compromised FMS and can be used to make flight plan changes or execute various commands remotely. SIMON was specifically designed for the x86 architecture so that it can only be used in the test lab against virtual airplanes and not against flight management systems on real aircraft that use different architectures.
The researcher also created an Android app called PlaneSploit that can automate an entire attack, from discovering targets using Flightradar24 to exploiting vulnerabilities in their FMS, installing SIMON and then performing various actions, like modifying the flight plan.
As previously mentioned, the research and demonstrations were performed against virtual planes in a lab setup. However, the FMS vulnerabilities identified and the lack of security in communication technologies like ADS-B and ACARS are real, Teso said
In a real-world attack scenario, the pilot could realize that something is wrong, disengage the auto-pilot and fly the plane like in the old days using analog systems, Teso said. However, flying without auto-pilot is becoming increasingly difficult on modern aircraft, he said.
Teso did not reveal any specifics about the vulnerabilities he identified in flight management systems because they haven’t been fixed yet. The lack of security features like authentication in ADS-B and ACARS is also something that will probably take a lot of time to address, but the researcher hopes that it will be done while these technologies are still being deployed. In the U.S., the majority of aircraft are expected to use ADS-B by 2020.
N.runs has been in contact with the European Aviation Safety Agency (EASA) for the past few weeks about the issues identified during this research, Teso said, adding that he has been pleasantly surprised by their response so far. “They haven’t denied the issues, they listened to us and they offered resources,” he said. “They’re trying to help us to take this research on a real plane.”

Links

Forbes Magazine has official statements

I found out only now, in the following article (Forbes Magazine, April 10th) there are also statements by the FAA, and Flight Management Systems manufacterer Rockwell Collins and Honeywell. Not surprisingly they disagree. Yet, if they wouldn´t, it would be a huge PR damage of course for them...
http://www.forbes.com/sites/andygreenberg/2013/04/10/researcher-says-hes...
Researcher Says He's Found Hackable Flaws In Airplanes' Navigation Systems (Update: The FAA Disagrees)
Andy Greenberg, Forbes Staff
Here’s an uncomfortable image to keep in mind during your next flight: A rogue hacker who can redirect planes at will with the touch of an Android phone’s screen.
That’s the frightening scenario laid out by Hugo Teso, a security researcher for the German IT consultancy N.Runs, in a presentation at the Hack In The Box security conference in Amsterdam Wednesday. By hijacking a protocol used to send data to commercial aircraft and exploiting bugs in flight management software built by companies including Honeywell, Thales and Rockwell Collins, Teso told the crowd that he could send radio signals to planes that would cause them to execute arbitrary commands such as changes in direction, altitude, speed, and the pilots’ displays.
“You can use this system to modify approximately everything related to the navigation of the plane,” Teso told me in an phone interview following his talk. “That includes a lot of nasty things.”
Update: Several companies and aviation safety organizations now claim that Teso’s research wouldn’t work on actual airplanes. See their comments below.
Hackers and security researchers have warned for years of vulnerabilities in next-generation air traffic control protocols. But Teso focused on a different protocol called Aircraft Communications Addressing and Report System, (ACARS) a simple data exchange system that has evolved over decades to now include everything from weather data to airline schedules to changes to the plane’s flight management system. (FMS)
Teso says that ACARS still has virtually no authentication features to prevent spoofed commands. But he spent three years reverse engineering the flight navigation software that receives ACARS signals to find bugs that allowed him to send his own commands to the systems, either from a software-defined radio that can be tuned to use ACARS or from a compromised airline system. In his talk, Teso demonstrated an Android application he built that allowed him to redirect a virtual plane with just a tap on a map application running on his Samsung Galaxy phone. “ACARS has no security at all. The airplane has no means to know if the messages it receives are valid or not,” he says. “So they accept them and you can use them to upload data to the airplane that triggers these vulnerabilities. And then it’s game over.”
In his presentation, Teso explained that he experimented on used FMS hardware he bought from eBay and FMS training simulation software that was advertised as containing some or all of the same code as the systems in real planes. In our interview he declined to specify exactly what vulnerabilities he discovered in that code, saying that he has instead contacted the Federal Aviation Administration (FAA) and the European Aviation Safety Administration, (EASA) and is working with the affected aerospace companies to fix the problems.
Honeywell, for its part, confirms that it’s been talking to Teso’s employer. But spokesperson Scott Sayres argues that Teso’s work doesn’t necessarily prove any real vulnerabilities in Honeywell’s equipment or software. “We take this seriously and we’re going to work with N.Runs to assess this,” says Sayres. “But as Teso readily admits, the version he used of our flight management system is a publicly available PC simulation, and that doesn’t have the same protections against overwriting or corrupting as our certified flight software.”
Teso’s supervisor at N.Runs, fellow security researcher Roland Ehlies, counters that the vulnerabilities
Teso found in the FMS software weren’t related to the PC version he was testing, but rather to functions that would also exist in real planes. “From our perspective it would work with at minimum a bit of adaptation,” he says.
I’ve reached out to Rockwell Collins, Thales, the EASA and the FAA for comment and will offer an update if I hear back from them.
Update: Spokespeople for the EASA, FAA and Rockwell Collins all echo Honeywell’s statement that while Teso’s attack works on PC simulation software, it wouldn’t give him control of a real plane’s certified flight management system. I’ve included their statements at the bottom of the story.
The increased use of mobile devices in the flight deck, however has introduced new risks. To minimize and eliminate these potential vulnerabilities, we’re prototyping enhanced security features and collaborating with industry regulators, customers and suppliers to develop new standards that will assure the highest levels of protection.”
Both Honeywell’s Sayres and Teso agree that even if a hacker were able to alter the FMS through commands remotely sent over ACARS, the pilots of the plane should be able to override those malicious commands with their own valid ones. Nonetheless, Teso said in his presentation that at the very least, a hacker could perform disruptive stunts like causing the cockpits’ lights to blink wildly or the passengers’ pressurized air masks to drop.
Teso’s presentation is far from the first to raise the potential for hackers to disrupt air travel. Two talks at the Black Hat and Defcon security conferences last summer suggested that hackers could spoof or intercept signals sent using the next-generation air traffic control system Automated Dependent Surveillance-Broadcast or ADS-B. That trick might allow an attacker to suddenly generate the appearance of a non-existent plane in a pilot’s direct path, potentially causing chaos in the air.
Tricks with ACARS to disrupt or hijack planes’ flight management systems–if they bear out in real world tests beyond those Teso has performed–could be far more dangerous. Teso believes that the bugs he’s discovered in those navigation systems can be fixed. In the meantime, those in the cockpit would be wise to keep an eye on their autopilot.
Update: As noted above, aviation safety groups and the FMS software makers have taken issue with Teso’s claims. Their statements are copied below.
The EASA: “For more than 30 years now, the development of certifiable embedded software has been following strict guidance and best practices that include in particular robustness that is not present on ground-based simulation software.”
Rockwell Collins: “”Today’s certified avionics systems are designed and built with high levels of redundancy and security.  The research by Hugo Teso involves testing with virtual aircraft in a lab environment, which is not analogous to certified aircraft and systems operating in regulated airspace.
The FAA: “The FAA is aware that a German information technology consultant has alleged he has detected a security issue with the Honeywell NZ-2000 Flight Management System (FMS) using only a desktop computer. The FAA has determined that the hacking technique described during a recent computer security conference does not pose a flight safety concern because it does not work on certified flight hardware. The described technique cannot engage or control the aircraft’s autopilot system using the FMS or prevent a pilot from overriding the autopilot. Therefore, a hacker cannot obtain “full control of an aircraft” as the technology consultant has claimed.”

Researcher: Vulnerabilities in aircraft systems allow remote airplane hijacking

                                                                      

Researcher: Vulnerabilities in aircraft systems allow remote airplane hijacking


The lack of security in communication technologies used in the aviation industry makes it possible to remotely exploit vulnerabilities in critical on-board systems and attack aircraft in flight, according to research presented Wednesday at the Hack in the Box security conference in Amsterdam.
The presentation, by Hugo Teso, a security consultant at consultancy firm N.runs in Germany, who has also had a commercial pilot license for the past 12 years, was the result of the researcher’s three-yearlong research into the security of avionics.
Teso showed how the absence of security features in ADS-B (automatic dependent surveillance-broadcast), a technology used for aircraft tracking, and ACARS (Aircraft Communications Addressing and Reporting System), a datalink system used to transmit messages between aircraft and ground stations via radio or satellite, can be abused to exploit vulnerabilities in flight management systems.
He did not experiment on real airplanes, which would be both dangerous and illegal, according to his own account. Instead Teso acquired aircraft hardware and software from different places, including from vendors offering simulation tools that use actual aircraft code and from eBay, where he found a flight management system (FMS) manufactured by Honeywell and a Teledyne ACARS aircraft management unit.
Using these tools, he set up a lab where he simulated virtual airplanes and a station for sending specifically crafted ACARS messages to them in order to exploit vulnerabilities identified in their flight management systems—specialized computers that automate in-flight tasks related to navigation, flight planning, trajectory prediction, guidance and more.
The FMS is directly connected to other critical systems like navigation receivers, flight controls, engine and fuel systems, aircraft displays, surveillance systems and others, so by compromising it, an attacker could theoretically start attacking additional systems. However, this aspect was beyond the scope of this particular research, Teso said.
Identifying potential targets and gathering basic information about them via ADS-B is fairly easy because there are many places online that collect and share ADS-B data, such as flightradar24.com, which also has mobile apps for flight tracking, Teso said.
ACARS can be used to gather even more information about each potential target, and by combining this information with other open-source data, it is possible to determine with a fairly high degree of certainty what model of FMS a specific aircraft is using, Teso said.
After this is done, an attacker could send specifically crafted ACARS messages to the targeted aircraft to exploit vulnerabilities identified in the code of its FMS. In order to do this, the attacker could build his own software-defined radio system, which would have a range limit depending on the antenna being used, or he could hack into the systems of one of the two main ground service providers and use them to send ACARS messages, a task that would probably be more difficult, Teso said.
Either way, sending rogue ACARS messages to real aircraft would most likely lead to the authorities searching and eventually locating you, the researcher said.
Teso created a post-exploitation agent dubbed SIMON that can run on a compromised FMS and can be used to make flight plan changes or execute various commands remotely. SIMON was specifically designed for the x86 architecture so that it can only be used in the test lab against virtual airplanes and not against flight management systems on real aircraft that use different architectures.
The researcher also created an Android app called PlaneSploit that can automate an entire attack, from discovering targets using Flightradar24 to exploiting vulnerabilities in their FMS, installing SIMON and then performing various actions, like modifying the flight plan.
As previously mentioned, the research and demonstrations were performed against virtual planes in a lab setup. However, the FMS vulnerabilities identified and the lack of security in communication technologies like ADS-B and ACARS are real, Teso said
In a real-world attack scenario, the pilot could realize that something is wrong, disengage the auto-pilot and fly the plane like in the old days using analog systems, Teso said. However, flying without auto-pilot is becoming increasingly difficult on modern aircraft, he said.
Teso did not reveal any specifics about the vulnerabilities he identified in flight management systems because they haven’t been fixed yet. The lack of security features like authentication in ADS-B and ACARS is also something that will probably take a lot of time to address, but the researcher hopes that it will be done while these technologies are still being deployed. In the U.S., the majority of aircraft are expected to use ADS-B by 2020.
N.runs has been in contact with the European Aviation Safety Agency (EASA) for the past few weeks about the issues identified during this research, Teso said, adding that he has been pleasantly surprised by their response so far. “They haven’t denied the issues, they listened to us and they offered resources,” he said. “They’re trying to help us to take this research on a real plane.”

The FBI Fosters, Funds and Equips American Terrorists

Interview: 'The Terror Factory: Inside The FBI's Manufactured War On Terrorism'

FBI investigators remove evidence from the former home of Pakistani-American Faisal Shahzad, who was sentenced to life imprisonment for terror offenses in 2010. (file photo)
FBI investigators remove evidence from the former home of Pakistani-American Faisal Shahzad, who was sentenced to life imprisonment for terror offenses in 2010. (file photo)
Since September 11, 2001, the U.S. Federal Bureau of Investigation (FBI) has claimed many victories in the war on terror.

Each time a domestic terror suspect is arrested, the public is told that another horrific plot has been averted.

But after combing through thousands of pages of court documents, investigative journalist Trevor Aaronson came to a different conclusion -- that most of the men arrested could never have done what they were accused of if the FBI hadn’t given them the tools to do so.

In his new book, "The Terror Factory: Inside the FBI’s Manufactured War on Terrorism," Aaronson argues that the U.S. government is responsible for "hatching and financing more terrorist plots in the United States than any other group." He spoke to RFE/RL’s Heather Maher.

RFE/RL: You began your research by asking whether the FBI is “busting terrorist plots -- or leading them?” What did you find out?

Trevor Aaronson: The FBI is looking for what they term "a lone wolf terrorist," which is someone holed up in an apartment somewhere who sympathizes with Al-Qaeda but may lack the specific means to do that. And so the FBI uses sting operations to [find] these people -- these people who may want to commit an act of terrorism, are right on that line from moving from sympathizer to operator -- and then through these sting operations, lure them out and get them involved in a terrorism plot that they’re ultimately prosecuted for.

But what I found is that of these cases, we can point to a handful of real, dangerous terrorists, like Faisal Shahzad, who came close to bombing [New York's] Times Square, or Najibullah Zazi, who came close to bombing the New York City subway system. But so many more of them, more than 150 people, were these men who were caught in sting operations who never had the means and, in some cases, never had the idea for the terrorism plot, and it was the FBI that provided them with everything -- the bomb, the transportation, everything they needed to move forward in a terrorism plot that on their own, they never would have been able to do.

And certainly evidence suggests that in most of these cases, they never had any specific connections to terrorism. So it’s really hard to believe that they ever would have had or acquired the means to commit some sort of act of terrorism.

RFE/RL: How do these FBI sting operations go down?

Aaronson: In a terrorism sting operation, the FBI informant or undercover agent poses as an Al-Qaeda operative or an operative of another terrorist group and says to the target, "You know, I have what you need if you want to move forward on a terrorist plot. I can provide the bomb, I can provide the transportation, everything you need I can give you."

And when they move forward in that plot, when they get the bomb together, and they put it in a car, and they drive it to a location and the target of the sting operation dials the cell phone that he believes is going to detonate the bomb and kill dozens of people, he’s then arrested. And so in sting operations, essentially the government becomes part of the plot and then ultimately prosecutes the target of the sting operation based on his involvement in that plot, the actions that he took as part of that plot.

RFE/RL: You write that key to these sting operations are informants who find terror sympathizers and bring them to the FBI’s attention. Who are these informants and what’s in it for them?

Trevor AaronsonTrevor Aaronson
Aaronson: The FBI has an unprecedented number of informants -- there’s a total of 15,000 informants. And they are paid -- in some cases handsomely; $100,000 in some cases, $400,000 in a case in California – they are paid to find people who are interested in committing an act of terrorism, people who are espousing some sort of violence, who say they want to commit some sort of violent act but may not have the means to do that, and it’s their job to target them and to get them involved in these sting operations.

But the problem I found in a lot of these cases is that there’s a real question of whether the informant is actually a worse criminal than the target of the sting operation could ever be. In these sting operations, the FBI has used drug dealers frequently as informants; they’ve used an accused murderer, in a Seattle case; they’ve used a child molester -- people who are just odious in every way. And they also have a direct incentive to find terrorists and see them prosecuted because they can make so much money as informants.

So when they enter mosques and they look for people who are interested in committing acts of terrorism, they know there’s a lot of money riding on it for them to find that person. And as a result of that, what they’re ultimately finding in most of these cases are people on the fringes of society who are economically desperate, in some cases mentally ill, and these are people who are easily susceptible to a strong-willed informant.

RFE/RL: Is the FBI’s informant program at all related to the New York City Police Department operation that paid informants to infiltrate mosques and spy on Muslims?

Aaronson: While they’re not connected, there are a lot of similarities. The New York Police Department used taxi shields as leverage to recruit informants from within New York City Muslim communities. The FBI does a similar thing, but instead of using taxi shields, they use immigration. So, many of the informants who have been recruited from Muslim communities since 9/11 have been recruited under duress; that is, the FBI comes to them and says, "Unless you work with us, you may face deportation." Or, "‘We know your family wants to come over from Syria, or Lebanon, and unless you work with us, that’s not going to happen."

(Editor's note: The Associated Press, which broke the story of the NYPD program, reported the following:

“Early in the intelligence division's transformation, police asked the taxi commission to run a report on all the city's Pakistani cab drivers, looking for those who got licenses fraudulently and might be susceptible to pressure to cooperate, according to former officials who were involved in or briefed on the effort.”)

RFE/RL: How does the "entrapment" argument play in court? And are you the only journalist scrutinizing the FBI’s approach to terrorism?

Aaronson: In all of these cases, the issue of entrapment is front and center. And so far the courts have been unwilling to agree that these are entrapment cases. We’ve had 11 defendants go to trial so far and formally argue entrapment, and none has been successful. At the same time, I think you’re beginning to see a growing skepticism, criticism of these cases by the press.

For example, when the U.S. government announces these cases, they often announce how horrific and awful the plot would have been had it moved forward and really downplay the fact that the people accused of the crime never could have committed it on their own. And it’s taken a long time, but now we’re beginning to see a real criticism of these cases by the media.

RFE/RL: Your book has been out a few weeks now. Has the FBI reacted, either directly or indirectly?

Aaronson: The only official response of sorts was a [book] review by a former [FBI] agent, Ali Soufan, who wrote a review of my book in “The Wall Street Journal” that was very critical. And Ali Soufan’s response to my book is typical of the FBI’s response, which is to say that there are real dangerous terrorists out there and these sting operations get them off the street.

But the problem with that is that Ali Soufan, in his review, and other agents I’ve talked to, consistently cite Faisal Shahzad, for example -- he’s the man who came close to bombing Times Square -- or Najibullah Zazi, who came close to bombing the subway system. They cite these men as examples of real terrorists and why sting operations are so necessary.

But the problem with their argument, I think, is that neither of those men was actually caught in a terrorism sting operation. To date, we have yet to find the real would-be terrorist: Someone who was about to strike, who had the weapon, who had the means, who is thwarted by a sting operation.

(Editor’s note: RFE/RL requested comment from the U.S. Justice Department. Dean Boyd, a spokesman for its national security division, said he has not read Aaronson’s book, but he sent the following statement:

First, it is important to note that undercover sting operations have been used by law enforcement for decades to combat all types of crimes, including child pornography, public corruption, financial fraud, murder-for-hire, drug trafficking, and others. 

Second, it should be noted that sting operations are just one of many different tools that law enforcement may use to neutralize a violent plot. Many counter-terrorism cases do not involve undercover operations. The use of this technique depends entirely on the facts and circumstances of each case and is determined during the course of the investigation. Undercover sting operations have been used, where appropriate, to thwart certain violent plots and protect the public.

Third, there are strict guidelines governing the use of undercover sting operations, which involve extensive legal reviews and senior-level approvals. Furthermore, U.S. laws provide a robust defense against entrapment. Legally, a person is entrapped when he or she is induced or persuaded by law enforcement to commit a crime that he or she had no previous intent to commit. Whenever an undercover operation is used in the counter-terrorism arena, the government works diligently to ensure that entrapment does not occur.

Fourth, there is a lengthy public record of guilty pleas and convictions in such cases. Federal courts and juries have overwhelmingly upheld the use of undercover operations in terrorism sting cases. While entrapment may routinely be cited as a defense in these cases, to date, no terrorism defendant since 9/11 has won acquittal using such a defense.

Finally, whenever an individual concocts a plan to commit violence – and is determined to follow through – law enforcement has an obligation to take action to protect the public. Allowing individuals intent on committing violence to proceed without a response is not an option, given that they may take action on their own or find others willing to assist them.)

UFO Attack at Naval Base, Proofs Star Wars is here !

WORLD NEWS TOMORROW -CAPE TOWN-  The new footage released by World News Tomorrow USA caused  havoc in the UFO world, as it seems to prove that there was indeed some aggressive firing, on what seems to appear as a giant UFO. This event took place on the evening of 6th April 2013 in a small Naval Based village called Simonstown in the heart of False Bay, Cap Town.
Triangular craft possibly a TR-3B shooting in the Air
When contacted by Media, the naval base first dismissed that there was any firing of any sort, however they later changed their statements by saying it was only a navy drill, scheduled months in advance to take place between the hours of 8 pm and 9 pm. The video shown, is clearly different as it was shot between 9 pm and 10 pm on the evening of 6th April 2013, the same night as the supposed Navy drill ? (Please click on photos to enlarge)
This raises the questions as to why the Naval base at first dismissed any news of firing, and then later changed their tune to sing a different song. Above all and according to a Military commentary that told World News Tomorrow – that the Naval base don’t have the funds to run such a kind of drills at present times. More important there was never a recorded drill at night inside the harbor of the Naval Base according to the residents spoken to.  There were reported orange fireball sightings in the Bay the night before, and one can only wonder if they were related.
Triangular craft possibly a TR-3B shooting in the Air
What at first, only appeared like ordinary lights, later showed after the video footage was analyzed, aggressive firing at something in the skies of Flase Bay on the night of the 6th April . The 60 min video was sent for a proper forensic analysis and it seems that the firing might not have been from the Naval base at all, but rather from what appeared to be a triangular shaped object, shooting at another large object that seems to be a UFO. Is this star-wars or not, and if so, why the coverup ?
Both the UFO’s seems to have some stealth capability as they were not visible with the naked eye till captured with a Night vision AX Professional IR camcorder. One thing is certain, that something were firing at something that appeared to be a UFO or USO of about 4 miles in length according to the analytical results.
Triangular craft possibly a TR-3B shooting at the UFO / USO
The video certainly proof something was going on at the Naval Base in Simonstown last Saturday night. World News only posted just a 6 minutes clip of the original footage to test viewers at first. While it gained over 17 000  views on YouTube in only a few days, it seemed that many criticized it to be a hoax however, the new footage shows a very different story and possibly a revelation of Star Wars to come.
The Counter Intelligence Agency of South Africa said that it has the original footage and it is analyzing it. They commented and said, so far it raises grave concerns since the video footage were shot by  a credible law enforcement witness and further shows no signs of any alterations or tampering.
They said that what makes this alarming is the fact that foreign entities could be in protected territorial space without any notice and more important, that this could poses a threat to security.
Exclusive for World News Tomorrow.
The original story was at Naval base in Cape Town fires hundreds of rounds in the air and attracts UFO

YouTube - Veterans Today -

Feds Knew About Boston Bombings Before Attacks

Tuesday, April 16, 2013 12:54


While the Feds knew about the Boston Massacre 2013 terror plot before the attacks the corporate media continues to avoid the topic instead focusing the vilification of domestic patriot groups.
In fact, it took less than hour for the mainstream media to demonize constitution loving patriots yesterday after a pair of bombs rocked the Boston Marathon around 2:50 pm yesterday even though all evidence indicates the attacks were the work of Muslim extremists.

As the story continues to unfold the evidence appears to indicate Muslim extremists who take up Saudi Arabia’s fundamentalist view of Islam, which include the likes of Al Qaeda and the Taliban, are behind the attack.
In fact, investigators are closing guarding a person of interest, Abdul Rahman Ali Alharb a 20-year-old Saudi national in America on a student visa, whose apartment has been searched.
While investigators have confirmed Abdul is a person of interest, they stress he is only believed to have a connection to the bombing and is not considered a suspect at this point.
Yet that hasn’t stopped the media to plant seeds of propaganda against constitution loving Americans and float a wide range of theories suggesting 2nd amendment advocates, tax reformers, or other patriot groups may behind the attacks hence planting fear in the minds of the masses against such groups.
While propaganda machine kicks their fear mongering into hyper drive one fact that is not being discussed by the media is by all indications the federal government knew there was a terror attack planned and, just like we saw during 9-11, failed to stop it.
In fact there are numerous eyewitness accounts detailing a heavy military presence on the ground at the marathon while bomb drills where being conducted on the ground.
People in the crowd where repeatedly told the drills were just an exercise as bomb sniffing dogs canvassed the area.
There are multiple sources reporting that a bomb drill was being conducted:

Eyewitness: Authorities Announced “Drill” Before Boston Explosions

An eyewitness to the two explosions at the Boston Marathon today said that a “drill” was repeatedly announced before the bombs exploded and that he “thought it was odd” bomb sniffing dogs were in place before the blast.
University of Mobile’s Cross Country Coach Ali Stevenson told Local 15 News, “They kept making announcements on the loud speaker that it was just a drill and there was nothing to worry about. “It seemed like there was some sort of threat, but they kept telling us it was just a drill.”
The news station also reports that Stevenson “thought it was odd there were bomb sniffing dogs at the start and finish lines.”
And this:

Boston marathon bombing happened on same day as ‘controlled explosion’ drill by Boston bomb squad

What’s not yet being reported by the mainstream media is that a “controlled explosion” was under way on the same day as the marathon explosion.
As the Boston Globe tweeted today, “Officials: There will be a controlled explosion opposite the library within one minute as part of bomb squad activities.”
Some people believe this explosion might have been part of the demolition of another bomb. It seems unlikely, however, that a bomb at the library, one mile away, could be so quickly located and rigged to be exploded by the bomb squad in less than one hour following the initial explosions at the marathon.
Yet despite the heavy military presence and the presence of multiple bomb squads the feds failed to find a single one of the bombs before they detonated littering the streets with bloody dead bodies and injured people missing limbs.
Eventually, the topic of how the government failed to stop the tragedy when they knew it was going to happen before will become the center of discussion in the mainstream media.
But until then the shadow government will not let a good crisis go to waste and will instead use this tragedy as leverage to push Orwellian political agendas including capitalizing on the opportunity to further chip away at the civil liberties of patriotic Americans.
As the pointed out on The Daily Sheeple:
Not unlike the horrible shootings at Sandy Hook Elementary School, the Boston Marathon bombing has become a ”blame-it-on-patriots” media event. Without any proof whatsoever, speculation in the mainstream media is pointing the finger directly at people who believe in independence and freedom from tyranny.

None of the mainstream outlets is asking why a person against paying taxes or someone who is pro-Constitution would attempt to harm people out enjoying a race. They are simply looking for a scapegoat. And no kid on the playground is more unpopular than the one who refuses to be herded along with the other children.
Instead of pulling together in solidarity to support the victims of this horrible attack, the “divide-and-conquer” campaign was underway within an hour of the first bomb detonating.
You don’t require my narrative – I’ll just supply the evidence that an unfounded attack on Patriots is underway. Is the stage being set to present a patsy to further an agenda? You be the judge:
Just over an hour after the attack, CNN’s Wolf Blitzer suggested that tax protesters and Patriot’s Day may have been to blame. “One intriguing thought here…it is a state holiday in Massachusett’s called Patriot’s Day and who knows if that had anything at all to do with these explosions.” Correspondent: “That’s always a possibility, you know, especially with it being deemed “Patriot’s Day” there in Boston, Wolf. ”               
Next, also from CNN, National Security Analyst Peter Bergen suggested that “right wing extremists” were likely culprits.         
Huffington Post blogger and Al Sharpton radio producer Nida Khan speculated on Twitter that an anti-government group may be responsible for the deadly bombings at the Boston Marathon.
“We don’t know anything yet of course, but it is tax day & my first thought was all these anti-gov groups, but who knows.
David Axelrod, former Obama advisor, told CNN that Obama was thinking about tax day. “And I’m sure what was going through the president’s mind is — we really don’t know who did this — it was tax day. Was it someone who was pro–you know, you just don’t know…”
A former FBI agent speculated that “It would not surprise me if this is some local extremist group trying to make a statement.” Brad Garrett mentioned Patriot groups, domestic extremists, neo-Nazis, anti-tax demonstrators and anti-government groups.       
Not to be left out, Chris Matthews of MSNBC pointed out that it was “tax day” and “Patriot’s Day”, suggesting the attack had to be domestic.
This morning, not surprisingly, CNN was at it again. The media mouthpiece published a lengthy article making baseless comparisons between this horrific attack and other violent incidents that took place in the United States, linking “domestic terrorism”, “right wing extremism” and “militia activity.”                     
It’s now a day that will go down in history along with other violent U.S. incidents in April, including the 1993 FBI siege of David Koresh’s compound in Waco, Texas, the 1995 Oklahoma City bombing, a mass shooting at Columbine High School in 1999 and the Virginia Tech massacre in 2007.
Only the Waco siege and the Oklahoma City bombing actually occurred on April 19, the anniversary of the Battles of Lexington and Concord. Still, to many following developments in Boston online, the proximity of Monday’s attack to the April 19 anniversaries was enough to suggest an act of domestic terrorism.
“Obviously, nobody knows anything yet,” Esquire magazine’s Charles Pierce said, “but I would caution folks jumping to conclusions about foreign terrorism to remember that this is the official Patriots Day holiday in Massachusetts … and that the actual date (April 19) was of some significance to, among other people, Tim McVeigh, because he fancied himself a waterer of the tree of liberty and the like.”
McVeigh and Oklahoma City bombing co-conspirator Terry Nichols were associated with the extreme right-wing and militant Patriot Movement, which rejects the legitimacy of the federal government and law enforcement. Adherents sometimes form armed militia groups and claim the right to armed self-defense against what they believe to be an oppressive government.
McVeigh said he targeted the Federal Building in Oklahoma City to avenge the raid on Waco. Despite commonly held beliefs, it’s unclear whether the Columbine shooters timed that attack to mark either Adolf Hitler’s birthday or the Waco incident.
Time Washington correspondent Alex Altman also noted Patriots Day’s “significance” to the “militia movement” in a tweet that was shared 507 times. He also mentioned the Oklahoma City bombing anniversary. In a subsequent tweet, he clarified that “OKC was on Apr. 19, anniversary of the Battles of Lexington & Concord, which are celebrated in Mass as Patriots Day.”
But is there really something about this time of the year that makes domestic terrorism more prevalent?              
Even the British media has jumped into the blame game, with this article suggesting that the Tea Party was responsible:
The right-wing extremist theory was strengthened by fact April 15 is tax day, an event that in recent years has been used as a rallying date for members of the Tea Party group.
The Tea Party movement is, of course, named after the famous Boston Tea Party political protest of 1773 and, with President Obama’s taxation policies widely criticised by many conservative groups – both moderate and extreme – the date is increasingly seen as a focal point for right-wing protest.
Never let a good crisis go to waste, seems to be the theme of the Powers That Be in the United States.  Brandon Smith wrote an excellent analysis:
Along with the immediate strangeness of the attack, the timing is also rather perfect for the establishment.
April 15th is tax day across the nation, and Tax Protest Day sponsored annually by Tea Party organizations across the country also just happened to fall on the 15th this year.  On top of this, in Massachusetts, Patriots Day (a civic holiday celebrating the battles of Lexington and Concord) is held on the third Monday of April every year, which just happened to be the 15th this year.  Oath Keepers, a constitutional organization often wrongly attacked as a “domestic extremist group” by the DHS and SPLC, just happened to have a large pro-freedom rally scheduled for the 19th of April at Lexington Green in Massachusetts.  Are we starting to get the picture here?
With the Senate in the midst of the most blatant attack on our 2nd Amendment rights in history following the passage of the absurdly fascist NDAA and the White House’s unwillingness to remove American citizens as potential targets for executive ordered assassination,  and with multiple states now implementing draconian gun restrictions and even confiscations, public opinion is quickly moving against the Federal Government.  Wouldn’t it be beneficial for their agenda if it turned out that the Boston Marathon Bombing was executed by a group of “pro-gun anti-income tax anti-government domestic terrorists”, or maybe just Constitutionalists and Liberty Movement activists that are labeled as such?
Wouldn’t that be a big turn-off for those on the fence but shifting towards gun rights and constitutionalism?  Wouldn’t it be great for the DHS and the SPLC if all their anti-Constitutionalist propaganda was suddenly proven “correct”?  Maybe the TSA could even suggest roving street checkpoints and random searches so that such a calamity “never happens again”.

Since we live in a day an age where the alternative media must force the corporate media to discuss the topics which really matter, let’s turn the topic of this discussion away from one that is centered around vilifying patriot groups.
Instead, we need to be discussing what the American Gestapo (formerly known as the Department of Homeland Security) knew, when the knew it, and why they failed to stop the bombings.
Perhaps more telling is yet another incident of predictive programming in which the 2013 Boston Massacre was predicted right before the attack in the TV show Family guy.
WATCH: Family Guy Episode Predicts The Boston Marathon Attack

The short clip from the Family Guy episode Turban Cowboy.
UPDATE – Already banned by Youtube.
Info Wars
An episode of the popular show Family Guy, which was first aired less than a month ago, eerily predicted the Boston Marathon bombings, depicting the main character, Peter, detonating two bombs in addition to winning the marathon by killing the rest of the participants.  It is important to note that the video shows two clips from different points of the show edited together, but they are from the same episode.

The complete episode:

Did a Family Guy episode inspire the Boston Marathon attack?
Watch and decide for yourself.
Season 11  Episode 16 | Aired on 03/17/2013
http://www.hulu.com/watch/468323

Is This The Bomber? Man With Black Backpack Before Bombing Then Without Backpack Moments Before Blast (Updated)

Wednesday, April 17, 2013 9:04

Thegatewaypundit.com

Posted by Jim Hoft on Tuesday, April 16, 2013, 12:51 PM
These photos from yesterday’s marathon were forwarded to me from a trusted source and came from a Japanese Flickr account.
This photo here shows the Boston crowd before the bombing… And then after the bombing.
Group photo:
before pack
Closeup of man with backpack.
gp crowd
Young men with backpacks in crowd.
pack 2
Crowd shot – the backpack may be missing