Monday, June 17, 2013

NSA Boss Asks Congress For Blanket Immunity For Companies That Help NSA Spy On Everyone

from the but-of-course dept

This will come as no surprise to anyone, but NSA boss General Keith Alexander is pestering Congress for a new law which would provide blanket immunity for companies helping the NSA collect data on everyone.
Gen. Keith Alexander has petitioned Capitol Hill for months to give Internet service providers and other firms new cover from lawsuits when they rely on government data to thwart emerging cyberthreats.
Basically, he's arguing that if the NSA orders companies to do something illegal, the companies shouldn't be liable for that. There's some logic behind that, because when you get an order from the government, you often feel compelled to obey. But, of course, the reality is that this will give blanket cover for companies voluntarily violating all sorts of privacy laws in giving the NSA data. And, theoretically you could then sue the government over those violations, but we've seen in the past how well that goes over. First, the courts won't give you "standing" if you can't prove absolutely that your data was included. Then, if you get past that hurdle, the government will claim "national security" or sovereign immunity to try to get out of the case. And, even if it gets past all of that, and you win against the government, the feds shrug their shoulders and say "now what are you going to do?"

And, of course, rather than narrowly target this immunity, it appears that Alexander would like it as broad as possible.
One former White House aide told POLITICO that Alexander has been asking members of Congress for some time to adopt bill language on countermeasures that’s “as ill-defined as possible” — with the goal of giving the Pentagon great flexibility in taking action alongside Internet providers. Telecom companies, the former aide said, also have been asking Alexander for those very legal protections.
Given the revelations of the past few weeks, this seems like the exact wrong direction for Congress to be heading. We should want companies to push back against overaggressive demands from the government for information. Giving them blanket immunity would be a huge mistake and only enable greater privacy violations.

Retired Federal Judge Explains Why The FISA Court Should Not Be Trusted

from the secret-courts-do-bad-things dept

Retired federal judge Nancy Gertner, who has appeared in stories here for years (she was the original judge in the Tenenbaum trial, and also spoke out about how US attorney Carmen Ortiz handled the Aaron Swartz case), has now highlighted a very important point about all of the NSA surveillance stories: at the heart of much of it is the secretive FISA court, and that court should not be trusted.
As a former Article III judge, I can tell you that your faith in the FISA Court is dramatically misplaced.

Two reasons: One … The Fourth Amendment frameworks have been substantially diluted in the ordinary police case. One can only imagine what the dilution is in a national security setting. Two, the people who make it on the FISA court, who are appointed to the FISA court, are not judges like me. Enough said....

It’s an anointment process. It’s not a selection process. But you know, it’s not boat rockers. So you have a [federal] bench which is way more conservative than before. This is a subset of that. And it’s a subset of that who are operating under privacy, confidentiality, and national security. To suggest that there is meaningful review it seems to me is an illusion.
The "judges" on the FISA Court are appointed by the Chief Justice of the Supreme Court. And that's it. As we were just discussing, they hear only one side of a case, and their rulings are kept secret. When you have a party that only hears one side of things and never, ever has to be subject to public review or criticism of decisions, take a wild guess what happens? You get a court that is judicially captured, and sides very much with the intelligence infrastructure that it spends most of its time dealing with.

On top of that, there's a very big question: why are these rulings secret? Something like an interpretation of the law should never, ever be considered secret. Yes, it makes sense to keep something secret if it exposes direct information on a specific case that is being worked on, but basic rulings about what the law actually says should never be. But they are, because the FISA court can do that sort of thing. And that's a huge problem. Late last year, we had a post linking to a story by another former judge, Andrew Napolitano, explaining why the entire FISA court was almost certainly unconstitutional:
The constitutional standard for all search warrants is probable cause of crime. FISA, however, established a new, different and lesser standard -- thus unconstitutional on its face since Congress is bound by, and cannot change, the Constitution -- of probable cause of status. The status was that of an agent of a foreign power.... Over time, the requirement of status as a foreign agent was modified to status as a foreign person. This, of course, was an even lesser standard and one rarely rejected by the FISA court.
With everything that's been going on, most of the attention has been on the administration -- including both the NSA and the DOJ -- as well as some companies participating in the various surveillance programs. But, increasingly, it seems that perhaps a lot more attention should be paid to the entire concept and structure of the FISA court.

CISPA's Sponsors Can't Keep Their Story Straight: If Snowden's Leaks Are False, How Do They Harm America?

from the keep-trying dept

We already discussed how bizarre it is to see NSA defenders trying to claim both that this story is nothing new and a huge danger to America, but that kind of thing continues. Witness two of Congress' biggest NSA defenders, Rep. Mike Rogers and Rep. Dutch Ruppersberger -- the two sponsors of CISPA -- try to claim that Snowden was both lying and exposing secrets that harm us all.
"He was lying," Rogers said. "He clearly has over-inflated his position, he has over-inflated his access and he's even over-inflated what the actually technology of the programs would allow one to do. It's impossible for him to do what he was saying he could do."

"He's done tremendous damage to the country where he was born and raised and educated," Ruppersberger said.
So, um, if he's lying and the information he leaked is not true, then how is he doing "tremendous damage" to the country? I guess the "damage" could be to our reputation as a freedom loving country that respects the 4th Amendment and basic rights to privacy, but that doesn't seem to be what Ruppersberger is claiming.
"Some people are saying that he's a hero. He's broken the law," Ruppersberger said. "We have laws in the United States for whistle-blowers, for people that think there's an injustice being done. All he had to do was raise his hand. ... Under the whistle-blower law, he is protected. Yet he chose to go to China."
Er... except we've seen exactly what happens to NSA whistleblowers who go that route. They get completely ignored and then charged with trumped up claims of leaking secrets anyway, and threatened with over 30 years in jail. It's pretty clear that just "raising his hand" doesn't work and actually puts you even more at risk. Furthermore, the current "whistle-blower" law is rarely used and even more rarely successful, with whistleblowers almost never winning their cases.
"I hope that we don't decide that our national security interests are going to be determined by a high-school dropout who had a whole series of both academic troubles and employment troubles," Rogers said.
Yup. The best Rogers can do is try to smear the guy, rather than respond to what he actually leaked, which is apparently all lies, but threatens us all. Sorry, Rogers, but the story doesn't hold up.

The New Prostitution: Surrogate Pregnancy



The New Prostitution: Surrogate Pregnancy
June 10, 2013 By Rebecca Hamilton 
I’m going to be writing about the “new” prostitution a lot in the months ahead. One of these new ways to objectify and exploit women is commercial surrogate pregnancy.
Jennifer Lahl, president of the Center for Bioethics and Culture, is a stalwart battler for women’s human rights in the face of the new forms of dehumanization and exploitation that medical technology has placed in the hands of doctors. She has fought a hard and often futile battle against a money-hungry medical establishment which supports doctors in exploiting and harming their patients for monetary gain.
Preview of  surrogate mother  Google Search
Simple Google Search Returned Pages of Hits Offering to Sell Women’s Bodies for Surrogacy

This technology is marketed as a solution for desperate families who can’t have children. In truth, what we have is the buying and selling of women and babies over the internet in what can only be described as a mass market for a new and virulent form of prostitution. The purchasers are wealthy people, including many powerful celebrities, who don’t want to be bothered with having children themselves, and homosexuals, especially gay men.
In  my opinion, one reason this misogynist abuse of women has been allowed to flourish is that the churches are, even now, tone deaf about women’s human rights. They focus on the lives of the embryos that are mass produced by harvested eggs without considering that the women whose bodies are being farmed, and whose health and dignity as human being is being comprised, are also human beings whose human rights as well as their health and well-being are compromised by this practice.
In truth, egg harvesting and surrogacy is a one-two punch of human rights violations. It reduces both the babies and the women to the level of commodities to be bought and sold with no regard for their well-being.
It comes as no surprise to me that a lawmaker in Washington DC wants to swing the doors wide open on the abuse of women and children with this egregious practice. The lawmaker is Councilman David Catania and he says he does not expect any serious opposition since all he’s doing is “remedying … an imperfection in the law.”
Preview of  Surrogate Mother Egg Donors and Sperm Donors In Oklahoma City 73101
Oklahoma City Ads for Buying Women’s Bodies to Use as Surrogates. 
I just love the casual way people who are tone deaf to human rights, especially as they apply to women, decide that buying and selling women, using their bodies like appliances, and farming them like they were animals is not only an A-OK thing to do, it’s all for the greater good. Misogyny is truly a wonderment, isn’t it?
Surrogate Pregnancy Bill in D.C. Draws Criticism (725)
Women and children are exploited through this popular ‘rent-a-womb’ practice, Jennifer Lahl charges.

Jennifer Lahl, president of the Center for Bioethics and Culture Network

WASHINGTON — A lack of information about the dangers of surrogate pregnancy could soon allow the
practice to become legal in Washington, D.C., warned the founder of one bioethics organization.
“These issues aren’t on anyone’s radar,” said Jennifer Lahl, president of the Center for Bioethics and Culture. “By and large, people have accepted third-party reproduction. It’s not seen as controversial … because people are woefully misinformed.”
Lahl told Catholic News Agency that the average person sees nothing wrong with surrogacy, which is the practice of a woman carrying and delivering a baby for someone else. This could explain the lack of opposition to a new bill in the nation’s capital, she said.
Legislation introduced June 3 by D.C. Councilman David Catania would legalize surrogacy in the District. If passed, it would wipe away current local legislation prohibiting surrogacy contracts, which carry penalties of up to $10,000 in fines or a year in jail.
“I don’t expect there to be any significant opposition,” Catania told the Washington Examiner. “This is about remedying what I believe to be an imperfection in our law.”
Lahl, who worked as a pediatric nurse for 20 years, said most people are unaware of the negative repercussions of surrogacy. She noted that concerns with legalized surrogacy include a lack of research in the field and a failure to consider the impact on the child and the woman whose womb is being “rented.”
One of the biggest concerns, she warned, is that the relationship between a mother and a child in her womb is ignored.
“So much is going on in that womb,” Lahl explained. “The surrogate mom and child will be linked genetically, and there’s so much we’re learning about genetic diseases and how much the womb plays into that child’s health.”
The connection is more than simply physical, she continued.
“Newborns know one thing — they know who their mother is,” she said. “I’ve known of mothers who sing to their children in the womb or read them books. What happens when you tell a mother to intentionally not bond with a child in their womb?”
California lawyer Stephanie Caballero handles surrogacy cases and says 30% of her clients are homosexual. She told the Washington Examiner that, with proper screening, money is not the only reason women decide to become surrogates.
“The first reason is because they want to help someone,” she said. “They do it [in part] because they love being pregnant.”
However, as part of a new documentary for the Center for Bioethics and Culture, Lahl has interviewed numerous women who were surrogate mothers. By and large, she said, surrogate women “are women who have financial need — wealthy women are going to be buying the surrogacy contract.”
- See more at: http://www.patheos.com/blogs/publiccatholic/2013/06/the-new-prostitution-surrogate-pregnancy/#sthash.nsAFDxbR.dpuf

How Spies May One Day Predict The Future

[Rachael King]
The Intelligence Advanced Research Projects Activity, a little-known U.S. government organization, is developing analytic programs for the National Security Agency that could make recent revelations about the NSA’s activities look antiquated by comparison. Rather than reviewing archival data, it may use current data to predict the future.
IARPA is modeled after the Defense Advanced Research Projects Agency, which develops new technology for the military. “IARPA does for NSA what DARPA does for the military,” said James A. Lewis, director and senior fellow of the technology and public policy program at the Center for Strategic and International Studies. “A lot of their programs are black,” he told CIO Journal, meaning that they’re classified and funded from a classified budget. 
Certain of its programs are not classified. One such program is Open Source Indicators, which reviews a range of publicly available sources, such as Tweets, Web queries, oil prices and daily stock market activity, to gauge the likelihood of certain “significant societal events,” according to a program announcement posted on FedBizOpps.gov. The goal of the program is to develop continuously automated systems that use information from these sources to predict when and where a disease outbreak, riot, political crisis or mass violence might occur. Currently, the project is focusing on events in Latin America. IARPA did not respond to requests for comment. 
It may sound like a far-fetched idea, but already that project has correctly predicted events, days in advance. For example, researchers were able to accurately forecast sudden protests that occurred in Paraguay when the president was impeached, said Naren Ramakrishnan, the Thomas L. Phillips Professor of Engineering at Virginia Tech. 
Mr. Ramakrishnan is leading a team of about 60 people from the University of Maryland, Cornell University, Children’s Hospital of Boston, San Diego State University, University of California at San Diego and Indiana University and two companies CACI International Inc. and Basis Technology. The team can earn up to $13.3 million if it’s funded over the full three-year term of the project.
The project was also able to accurately predict a Hantavirus outbreak in Argentina last year, said Mr. Ramakrishnan. The team is trying to find which pieces of data most accurately forecast an outbreak. For example, project team members are looking at the numbers of cars parked in hospital parking lots from satellite images and trying to figure out if an increased number of cars in the parking lot can be an early indication of an increase in disease outbreak, he said. IARPA keeps a log of all the predictions forecast by researchers and checks them against articles in local newspapers to determine which ones were accurate. Each month, his group gets a report card from IARPA telling the researchers how well they performed.
Mr. Ramakrishnan says his researchers are trying to preserve individual privacy as they create their algorithms to mine this data. “In the case of civil unrest, we haven’t come to the point of modeling government opposition groups,” he said. His group is trying to predict when and where a protest might occur, but not the individuals who are participating in that protest. But Mr. Ramakrishnan acknowledges that somebody could potentially use this information in ways that are not intended.

The eighth wonder: developments in synthetic biology

Test tubes
There is a whole suite of opportunities to deploy synthetic biology for the benefit of not just humans, but in animal health and the environment as well.
Dr Belinda Clarke
Synthetic Biology Lead Technologist Dr Belinda Clarke describes the role of the Technology Strategy Board in the development of this key field with Editor Amy Caddick...

The UK life science industry has become a significant focus area for research and development in recent years, which is hardly surprising given that the industry generates a turnover of just over £50bn.1

Recognising the significance of the sector, the Department for Business, Innovation and Skills (BIS) published the ‘Strategy for UK Life Sciences’ in December 2011, setting out a series of directives aimed at advancing life sciences. A progress report released a year later showed that in 12 months £1bn in revenue had been generated through industry and private sector investment,2 further highlighting the importance of life sciences to the economy.

A number of key disciplines have garnered significant attention within the sector, particularly synthetic biology. A mix of biology and engineering, synthetic biology involves the design and build of new biological systems or the redesign of existing ones. While running the risk of sounding more science fiction than science fact, the ability to write a new genetic code for an organism, or even construct new biological systems from scratch is a growing sector that is potentially worth millions. As an emerging technology with vast applications, it has the potential for significant disruption across many sectors. As such, Science Minister David Willetts has named synthetic biology as one of his eight key technologies.

'Focus for UK funding'


As a focus for UK funding, much of the drive to advance the synthetic biology industry has been and will continue to be facilitated by the government’s innovation organisation, the Technology Strategy Board, which, along with research councils, has assisted in a number of new technologies reaching commercialisation over the years. Outlining the role of her organisation in assisting growth and pushing the field forward, Synthetic Biology Lead Technologist Dr Belinda Clarke discusses why continued support is so important.

"Synthetic biology currently sits within the emerging technology area. This means the Technology Strategy Board is looking at how to provide the field with additional support to help accelerate innovation so it can become a more mature, robust industry in the long term."

Knowledge transfer and collaboration are familiar themes across the majority of research spheres; it is common practice for mathematicians to help physicists for example, but synthetic biology is the amalgamation of a number of fields and relies on this synergy. Drawing on the expertise of biologists, engineers, computer scientists and software engineers, synthetic biology is a truly collaborative sector.

'Truly multidisciplinary community'


"We need a whole raft of both ‘wet’ and ‘dry’ techniques, from gene sequencing and synthesis to IT capabilities to enable predictive design and modelling," says Clarke. "Synthetic biology requires a truly multidisciplinary community. There really has to be a number of crucial technology strands pulled together, helped by a common vocabulary and mutual understanding, to make synthetic biology a success. We also need standards, an enabling regulatory environment and a confident investor community."

While collaboration and knowledge transfer is undoubtedly a vital part of ensuring the advancement of the synthetic biology community, the move from research to commercialisation – as with a number of technologies – is a challenge. Bridging the dreaded ‘Valley of Death’ –the process of getting research to commercial market – is something the Technology Strategy Board has been working on across a spectrum of technologies, including synthetic biology. Clarke outlines what tools are in place to assist with this.

"There are technology transfer activities in the research community as well as the higher education institutes, but there are also a number of tools that the Biotechnology and Biological Sciences Research Council (BBSRC) and Engineering and Physical Sciences Research Council (EPSRC) have at their disposal, such as standalone LINK awards, industrial partnership awards, etc.

"The Technology Strategy Board also works to find ways of encouraging collaborative research and development between academia and industry, whether that’s through our competitions or knowledge transfer partnerships, for example.

"There’s a lot going on, and there is always more we’d like to do, but these are just some of the tools we’re deploying to bridge that gap. The Special Interest Group run by the Biosciences Knowledge Transfer Network is key to helping facilitate the collaborations and build consortia."

Support for synthetic biology


Support for synthetic biology has certainly been forthcoming in regards to funding. On 7th March this year, the government announced £5.3m would be made available to further advance the field. Clarke recognises that support for synthetic biology has been significant.

"We’re delighted with the support from the government for life sciences in general, but for synthetic biology to have been named as one of the top eight technologies by David Willetts is incredibly pleasing," says Clarke. "Because of this we’re seeing strong financial commitment coming through. There’s been a substantial amount of funding put into the synthetic biology community by the research councils, and the Technology Strategy Board."

Innovation with the potential oppurtunities that synthetic biology offers needs to be developed within the culture and mindset that it is for the public good...
Dr Belinda Clarke
Despite strong support from government, there is still an onus on funding bodies to ensure that money is being spent well and is creating economic opportunities.

"I think the challenge is to now show the Treasury that their confidence and investment in the synthetic biology community is well placed," believes Clarke. "We have to realise the potential value of the sector, in terms of new jobs, revenues from technology commercialisation, and R&D spend, for example. It’s not easy. By definition, the timescale over which emerging industries evolve and mature don’t necessarily map onto the shorter government timescales," she adds.

The scope of synthetic biology is one reason why investment and interest from government and funding bodies has been so considerable. While a relatively new field within biology, the possibilities are vast. Synthetic biology can manipulate DNA to create bespoke organisms, it can be used to build new pharmaceutical therapies from scratch, produce bulk and fine chemicals in a more sustainable manner, and synthetic biologists can also potentially lessen the burden on the energy industry. The full capabilities of this field are yet to be fully explored, but it is recognised that it could revolutionise many sectors in the future.

"There is a whole suite of opportunities to deploy synthetic biology for the benefit of not just humans, but in animal health and the environment as well," says Clarke. "For that reason it is really important that the funding continues. UK researchers are now at the point of undertaking some very sophisticated and elegant experiments to really understanding what organisms can do, given the right instruction."

As with all cutting-edge research, synthetic biology raises a number of ethical queries. Building and rebuilding biological organisms could be used for nefarious purposes. Biosecurity and biosafety are two of the main areas that are cause for concern. Could synthetic biology be used to create biological weapons and could synthesising new biological systems, which are not naturally produced, have unforeseen consequences? Safety and ethics, therefore, have to be at the centre of synthetic biology to ensure peace of mind and ‘responsible innovation’.

'For the public good'


"We are going to great lengths to ensure that the funding we allocate goes into projects that have been scrutinised and assessed by a panel of experts who have looked at the social, ethical, regulatory and business-governance of the research," assures Clarke. "Innovation with the potential opportunities that synthetic biology offers needs to be developed within the culture and mindset that it is for the public good, and we have to be comfortable that they really are being developed in the context of doing good, not harm."

Innovation, particularly on the cutting edge, often faces significant challenges. Uncertainty over the ‘unknown’ and the idea of ‘playing God’ with biological systems can cause concern. Responsible research and innovation is therefore absolutely vital.

To ensure this, the Technology Strategy Board has published a ‘Responsible Innovation Framework’, a set of guidelines to determine how synthetic biology studies should be carried out. The framework is designed to ensure the innovator has considered any societal, ethical, legal and regulatory issues that could arise during their project and to ensure that innovation is ultimately conducted responsibly.

'Commercially useful products'


Irrespective of the nature of research – whether controversial or not – it can be a challenge to ensure quality innovation occurs and that this is timely as well as relevant to the global marketplace. Overcoming the wider challenges of commercialisation is still a concern, although significant headway has already been made.

"The successful translation of research into commercially useful products, is one that the UK is looking at very closely across the innovation landscape," concludes Clarke. "There are some great examples where government support has really effectively facilitated this journey."


www.gov.uk/government/organisations/office-for-life-sciences
2 www.gov.uk/government/news/life-sciences-strategy-one-year-on


Dr Belinda Clarke
Synthetic Biology Lead Technologist
Technology Strategy Board

www.innovateuk.org



[This article was originally published on 10th June 2013 as part of Science Omega Review UK 02]

Read more: http://www.scienceomega.com/article/1127/the-eighth-wonder-developments-in-synthetic-biology#ixzz2WVgdyi00

Meet The Horrible Florida Woman Who Filmed Herself Berating Dunkin' Donuts Workers

what a douche bag!    where's my hammer  :0     are you crazy is that your problem   LMMFAO    ....welcome folks, to the FB generation    

Meet The Horrible Florida Woman Who Filmed Herself Berating Dunkin' Donuts Workers


6/10 UPDATE: Meet the polite 18-year-old Dunkin' Donuts worker who endured the rantings of crazy Dunkin’ Donuts lady.
The customer seen berating Dunkin’ Donuts employees in that viral video your friend sent you today is a 27-year-old Florida woman who has previously worked as a video spokesperson for such establishments as Happy Wok restaurant and an auto repair shop.
For some unexplained reason, Taylor Chapman walked into a Dunkin’ Donuts Saturday morning--iPhone in hand--to record a complaint about not being provided a receipt for a prior purchase. “This is all being under video surveillance,” she warned one employee (who was unfailingly polite).
Chapman’s 8:09 video can be seen above.
Since she had not purportedly been given a receipt, the Broward County resident cited a store policy that supposedly guaranteed her free food as a result of the oversight. Over eight minutes, the boorish, arrogant, and cursing Chapman (seen at right) records herself berating workers and even accosting fellow customers.
As she waited for her food, Chapman remarked, “Even if they hock a loogie and shit in it I don’t even care.” She added, “‘Cause one time they pissed in my fries…literally I could smell the piss in it.”
At one point, Chapman notes that she has a “business degree” and had previously received exemplary service at the Dunkin’ Donuts. Until, of course, a “dumb bitch” female employee “completely pissed me off” and “decided to cross my fucking line.”
During the video, Chapman refers to the female worker as “a complete cunt sand nigger whore.” When she spots the woman--who is named Nithi--Chapman moves down the counter to confront the worker.
“Well, guess what? This shit’s about to go live, bitch. Right on Facebook,” Chapman announces. “‘Cause I already posted what your dumb ass did last night. So I hope you’re happy with your little fucking sand nigger self. Cause I’m about to nuke your whole fucking planet from Mars. You think ya’ll are tough big fat Arabs bombin’ the Trade Center? I’ll show you tough.”
Before ending her recording, Chapman tells another customer that her video was heading for YouTube, where she hoped it would “get a million fucking hits.” Which, as it turns out, might have been an underestimation on Chapman’s part.
Prior to her Dunkin’ Donuts production, Chapman--who attended Nova Southeastern University in Davie--appeared in several marketing videos for local Florida businesses (including, as seen above, Happy Wok in Lauderhill). While her LinkedIn page lists her current employee as a medical device firm, an employee there said Chapman has not worked for the company in over a year.
On her Twitter page, Chapman writes that, “I have my bachelor's degree in Business & Marketing and I am working towards my JD in Law now.” She adds that she is “happily engaged” to her boyfriend, with whom she lives.
Chapman who has deleted her Facebook page, could not be reached for comment.

Are the Boston Marathon Bombings Tied to a New American Campaign into the Caucasus?

Boston Deals With Aftermath Of Marathon Explosions
Many questions remain unanswered about the Boston Marathon Bombings that took place on April 15, 2013. Three people were killed and two hundred and sixty-four others were injured during the tragedy. Originally, the mainstream media reported that an arrest had been made and that «a dark skinned man» (ignorantly assumed by many to be of Arab background) was the suspected perpetrator of the attacks in Boston. John King from the Cable News Network (CNN) would insist that he was personally told that «a dark skinned man» was the one. Then reports that a suspected had been caught and arrested began. Journalists and interested people would gather around Boston’s federal courthouse with the hopes of finding out more and getting a glimpse of the detained suspect. In a case of odd timing, after the media reports about an arrest began, a bomb threat was called into Boston’s federal courthouse and the journalists around the building, as well as most people, were forced to evacuate the area.
The Federal Bureau of Investigation (FBI) would then release photographs of the Tsarnaev brothers and publicly state that they were the suspects behind the bombings at the Boston Marathon. Soon after, the Tsarnaev brothers would allegedly kill a university policeman at the Massachusetts Institute of Technology (MIT) and then carjack a Mercedes sports utility vehicle (SUV). Reports that they robbed a 7-Eleven convenience store would also surface, but be denied by the 7-Eleven franchise as wrong. It would later be reported that a shootout between the two brothers and the pursuing police in the suburb of Watertown, which is part of Greater Boston, would take place.
It was reported that during the fighting a law enforcement officer from the Massachusetts Bay Transportation Authority (MBTA) Police would be injured and Tamerlan, the older of the Tsarnaev brothers, would be killed by police fire. Tamerlan’s aunt and family, however, say that this is not true because they identified seeing him «naked, cuffed, clearly alive and well detainee seen in video aired by CNN» to Dan Dicks of Press For Truth. The multiple bullet wounds on Tamerlan’s body have also led to many questions. Furthermore, it would later be reported that Tamerlan Tsarnaev actually died under police custody and not while fighting police.
The police reported that Dzhokhar, the younger of the two brothers, escaped with injuries during the shootout. Hours later, Dzhokhar was found hiding inside a boat without any weapons and taken to the hospital under armed guard. Because he was shot in the throat, he could not talk or disclose anything. It was surprising that the teenager could survive and function normally on his own for such a long length of time after he took a bullet to the throat. Others questioned how he became unconscious (for a period of days) only after police arrested him and how he seemed unaffected in police footage of him inside the boat.  It was also later reported that Dzhokhar shot himself in the throat in a botched suicide attempt during his last stand with the police.

Domestic Firing Squads?
There are many strange twists and turns tied to the Boston Marathon Bombings that give rise to more questions. The strange features in the event include the suspect’s background and the odd chain of happenings after the arrest of the Tsarnaevs. What the parents of the Tsarnaev brothers in Russia, which adamantly say their two sons were framed, have disclosed has also added to suspicions.
Then there is the string of deaths after the arrest of Dzhokhar Tsarnaev. The FBI’s Special Agent Christopher Lorek and Special Agent Stephen Shaw, who arrested Dzhokhar, were mysteriously killed on May 17, 2013. In a case of strange timing, during what is presented as a freak accident, the two FBI agents where killed during a training mission when they were reported to have fallen out of their helicopter off the Atlantic coast of Virginia. Officially, bad weather was reported to be the cause of their deaths.
The death of the FBI special agents can be compared to the death of the team of US Navy SEALs who allegedly killed Osama bin Laden on May 2, 2011. The story of Osama bin Laden’s death is another story full of inconsistencies. The Obama Administration was caught being deceitful about watching the killing live and then there is the case of Osama’s missing body that was supposedly and clumsily justified by the wrong claim that it was dumped into the ocean to respect Muslim customs. The British Broadcasting Corporation (BBC) also released a short interview with a Pakistani resident living near the home saying that the man who was killed was not Osama bin Laden. Nor were any pictures of Osama bin Laden ever provided.
The irregularities did not end there. The group of US Navy SEALs involved with the operation would all end up dying on August 6, 2011 when their helicopter was shot down in NATO-garrisoned Afghanistan. SEAL Team VI, which was the unit’s name, actually had their identities and area of operations in Afghanistan revealed by the Obama Administration while they were serving, which is believed to have made them targets. SEAL Team VI was also oddly put into an old and vulnerable Chinook helicopter on the day that they were killed.  As a result of this, the families of the dead Navy SEAL commandos have blamed the US federal government for their deaths, saying that the shooting of the helicopter was planned by the US government as part of a cover-up for its own lies.
Moving on, the death of the two FBI special agents adds to the suspicion around the death of a friend of Tamerlan Tsarnaev named Ibragim Todashev.  Todashev was killed in his own apartment while under police supervision by the FBI in Orlando, Florida. He was killed by police fire after being interrogated for days about the Boston Marathon Bombings. He was also «unarmed» and killed by a shot to the centre of the head, or by a «kill shot.» His friend, Khusen Taramov, said that Todashev was planning on returning to Russia, but voluntarily stayed to cooperate with investigators because the FBI had asked him to stay in Florida.
It was originally claimed by the FBI that Todashev’s death happened when he «flipped out» and attacked the police with a knife during the interview. This, however, contradicts character statements about him and the fact that he was voluntarily cooperating with US authorities. His father, Abdulbaki Todashev, would hold a press conference in Moscow shortly after his shooting to tell the world that his son was shot six times in the torso and once in his head. Todashev’s father would accuse US authorities of executing his son.
The Plot Thickens in Canada and Western Europe
The Boston Marathon Bombings were followed by other peculiar events outside the United States. The Royal Canadian Mounted Police (RCMP) in Canada would declare that it had stopped a terrorist attack from taking place on Canadian soil by arresting two men on April 22. The RCMP would keenly point out that the suspects were linked to a branch of Al-Qaeda oddly working inside of Iran of all places. The timing of the arrests, after the Boston Marathon Bombings, was announced in a high-profile RCMP press conference which virtually refused to comment on anything because it said that the investigation was inconclusive and ongoing.
In London, a British soldier from the Royal Regiment of Fusiliers would be hit by a car and publicly lacerated and stabbed to death with knives on the street outside the Royal Artillery Barracks by Michael Adebolajo and Michael Adebowale on May 22. Britain’s Prime Minister David Cameron was in France, across the English Channel, during the savage murder. It just so happened that a French soldier was also stabbed at around the same time, but French authorities made statements saying that there seemed to be no connection between the two attacks.
Both the British and French cases have been linked to British and French militarism and foreign policy either directly or indirectly. In the case of Britain the attackers talked about Britain’s roles in the wars in Afghanistan and Iraq. In the case of France, the attack on the French soldier was speculated to be the result of France’s military intervention in Mali. The effects of these attacks, however, merit more attention than the actual causes.
Militarization of the So-Called Democracies?
Because of the Boston Marathon Bombing the city of Boston was placed under martial law and civil liberties were suspended as a manhunt was conducted. This is an important dimension of the dangerous ramifications that the event has had for decisive and unconstitutional domestic security measure being taken inside the United States. It comes at a time when the Department of Homeland Security has been assembling a massive weapons arsenal and all checks and balances on domestic spying have been destroyed.
The Associated Press has reported that Homeland Security has been stockpiling ammunition by buying more than 1.6 billion rounds of ammunition. The same AP report has also said that Homeland Security has already bought a staggering 1.5 billion rounds of ammunition in 2012. This amount of ammunition amount to more bullets than the Pentagon has used collectively in all the wars that the US has been involved in the last decade.
Aside from martial law in Boston, the US federal government also considered taking the illegal step of charging Dzhokhar Tsarnaev as an enemy combatant in front of a military tribunal. This quickly scared civil liberties organizations in the United States, because they understood what it could lead towards. Such a move would equate to the suspension of the rights of American citizens and putting them on trial in virtual secrecy. This would set a very dangerous precedent. It should be added that this is part of the same pattern of developments that has seen the US government use killer drones to kill its own citizens overseas illegally without any due process to determine their guilt legally.
After the ridiculousness of the assertions that Al-Qaeda was working inside Iran was pointed out in Canada, it was posited that it could have been the terrorist group Jundallah that was guiding the perpetrators against the Canadian province of Ontario’s V IA Rail train line going to New York in the United States. Jundallah has been linked to Al-Qaeda and this has been used to explain the inconsistency in the claims that put Iran into the picture. Very importantly, it should be pointed out that Jundallah is a US-supported terrorist organization that has been working to destabilize Iran from the borders of Pakistan and Afghanistan with US assistance. In this context, the trail leads back to the US government itself. Moreover, the Canadian government has opportunistically used the event to harden its policing and surveillance programs, which allow it to violate the civil liberties of Canadians.
In the case of Britian, Michael Adebolajo it would turn out had a connection to the British secret services. Adebolajo had been approached turn six months earlier to work for MI5, but refused. A friend of his, Abu Nusaybah, wrote the following on his Twitter account: «Did u know­ Woolwich suspect Michael Adebolajo was approached by MI5 Just over 6months [sic.] ago to work as a Spy, He refused?» The BBC would interview Adebolajo’s friend on Newsnight where he would make the same comments about MI5. Abu Nusaybah would then be arrested for revealing that MI5 had been trying to recruit Michael Adebolajo afterwards and charged under the UK’s Terrorism Act. Moreover, the British government has used the event to expand its internal policing and surveillance programs like Canada.
There is a major political context tied to all these events. In both Boston and London we now see that charges of terrorism are being introduced in a way that sidelines civil rights in an Orwellian sense. The crude homemade bomb used in Boston was labeled a weapon of mass destruction (WMD) on par with chemical and nuclear weapons. A disgusting act of murder was labeled as an act of terrorism In the United Kingdom when in reality a charge of homicide should have been pressed. The label of terrorism is now being used to give the US government and its allies a licensee to act outside of their laws and dramatically expand their domestic and overseas screening programs.
Blaming Russia: America Intending to Start a New Fire in the Caucasus?
Indirectly Russia is being blamed for the Boston Marathon Bombings. The Tsarnaev brothers, who are half ethnic Chechen and half ethnic Avar, are being identified with Russia even though they spent a great deal of their lives outside the Russian Federation and are US citizens. Dzhokhar was born in Kyrgyzstan, where he spent his childhood years.
In some ways the string of events following the Boston Marathon Bombings are making Russia and Iran look like countries that cannot control their own borders. Russia has being presented as a breeding ground for terrorists and militants, while Iran has been portrayed as a new base for Al-Qaeda. Neither of these portrayals is accurate. Little is mentioned about the role of the US in destabilizing the border regions of either country.
Zubeidat Tsarnaeva, the mother of the two Tsarnaev brothers, told the world that she believed that her sons were set up by the US government. She has challenged the official narrative about the terrorist attack in Boston. She has let it be known that her family knew that the FBI was always watching them and that her sons were under constant police surveillance.  She even said that the police use to come to their home in the US all the time to talk to them and that her sons were under «police control».
What Zubeidat Tsarnaeva said about her sons being under police surveillance was true. Tamerlan Tsarnaev had been on a US federal government database of potential terrorism suspects. According to US officials, they were twice warned by Russia that he may have been tied toCaucasian militants. In 2011, Russians security officials requested that the US investigate Tamerlan’s activities. The FBI would make a brief investigation and then close the case leading to unsatisfied Russian security officials making the same request in four months later in September 2011. Tamerlan was actually being watched by the Russian secret services whenever he visited the Russian Federation.
The possibility exists that Tamerlan Tsarnaev may well have been working for US interests to destabilize Russia and the Caucasus. According to Russian sources he attended an anti-Russian workshop in the Caucasus called the Fund of the Caucasus that was supported by Georgia and the United States. All the small details that have come up about him show that he had been interacting with US authorities and that he was suspected of espionage in Russia.
The arrest of the CIA’s station head, Ryan C. Fogle, in Moscow adds an additional layer to the story. Fogle, the third secretary of the Political Section of the US Embassy in Moscow and a career diplomat, was arrested while he was trying to recruit an agent of the Russian Federal Security Service (FSB) who worked on the North Caucasus. Fogle’s espionage effort was portrayed in the US as an effort to learn more about the Boston Marathon Bombings. Benjamin Dillon, another third secretary at the US Embassy in Moscow, was expelled for trying to recruit Russian security officials prior to Fogle’s expulsion from Russia as a spy. According to Russia’s FSB, even earlier several other CIA agents were caught doing the same thing, but left voluntarily.
The murder of Russia’s Muslim leaders in the North Caucasus coincides with notions that the United States is planning to destabilize Russia’s North Caucasus. After Syria, in fact, there are strong fears that Russia’s North Caucasus, along with Lebanon and Iraq, will be the next targets of anti-government militants in Syria. Furthermore, there has been a steady campaign to demonize Russia in the US mainstream media as an undemocratic global supporter of authoritarianism and genocide. In the last few years there have been terrorist attacks that have targeted Muslim spiritual leaders in the Caucasus, particularly Dagestan. All these leaders have called for harmony and co-existence among Russia’s Muslim and Christian populations; they have opposed militarism and violence. While the Tsarnaev case may have direct ramifications for civil liberties inside the United States, it is also tied to longstanding US encroachment on the Caucasus that seeks to destabilize the Russian Federation.
Mahdi Darius Nazemroaya is a social scientist, award-winning writer, columnist, and researcher. His works have been carried internationally in a broad series of publications and have been translated into more than twenty languages including German, Arabic, Italian, Russian, Turkish, Spanish, Portuguese, Chinese, Korean, Polish, Armenian, Persian, Dutch and Romanian. His work in geopolitical sciences and strategic studies has been used by various academic and defense establishments in their papers and defense colleges for military officers. He is also a frequent guest on international news networks as a geopolitical analyst and expert on the Middle East.

United Stasi of America through the Echelon Prism




United Stasi of America through the Echelon Prism
Strappado Wrack

http://www.batr.org/wrack/061613.html



“As someone who knows GCHQ very well… the idea that in GCHQ people are sitting working out how to circumvent a UK law with another agency in another country is fanciful. It is nonsense.” - William Hague
United Stasi of America through the Echelon Prism
Signals collection has a long secretive and enigmatic history. The very definition of espionage implies spying, most closely associated with foreign sources. Since the Echelon network, the unified function of data retrieval became a given during the cold war. With the revelation of Prism, advances in sophisticated electronic devices and software algorithms provide a major leap. The article, Is PRISM the US version of Echelon?, sums up the evolution. "With this kind of setup and ambition to capture and evaluate private conversations (well, not so private now), makes Echelon that much more believable, and that PRISM is a reflection of the infamous project, but focused solely on the US."
Bankwatch takes a sanguine attitude towards Why PRISM? ECHELON has been around since 1948 supported by US, UK, Canada, Australia. At the same time, the publication references the capacities of the original analogue technology.
"The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON Dictionary) that will prompt the computers to flag the message for recording and transcribing for future analysis. Intelligence analysts at each of the respective listening stations maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept."
This machinery of electronic snooping has no instinctive restraint on the subject or content, when the technocratic engineers are left to design the next level of the "All Seeing Eye". The notion that the Prism program is shocking certainly does not conform to the even increasing capacity of surveillance society that has already discarded the presumption of privacy.
The Wall Street Journal forecasts the total integration of data because Technology Emboldened the NSA, to capture all that is digital.
"At a 2009 conference on so-called cloud computing, an NSA official said the agency was developing a new system by linking its various databases and using Hadoop software to analyze them, according to comments reported by the trade publication InformationWeek.
The system would hold "essentially every kind of data there is," said Randy Garrett, who was then director of technology for the NSA's integrated intelligence program. "The object is to do things that were essentially impossible before."
Nonetheless, the Director of National Intelligence issues fact sheet on PRISM in response to leaks, wants you to accept that the government is adhering to stature authority and protecting vital national security interests. "While focusing on the letter of the law and the government's good intentions, Clapper dodges any mention of how much information (or what kind) is actually collected with the PRISM program."
OK, only a blood brother operative of the intelligence community will challenge the proposition that the collection of electronic information is the main function of their Skynet self-aware artificial intelligence system. The true debate is whether the data collected is destined for use against targeted American citizens, for nefarious purposes.
Mashable attempts to explain the methodology of PRISM: Does the NSA Really Get Direct Access to Your Data?, and how the "so called" judicial review function of FISA Court approval is processed.
"For Ashkan Soltani, an independent privacy researcher and technologist, this is "a process for submitting [Section] 702 requests and getting responses in a machine-readable form."
The 41-page PRISM Powerpoint presentation "could be seen as a business development deck indicating all the various providers that they currently have 'relationships with,'" he told Mashable.
The system is "basically a data-ingestion API," he said.
Soltani speculated that based on what we know now, PRISM is a "streamlined way" to submit Section 702 orders to the companies for them to review the requests, and it gives the NSA the ability to handle and process the response "in an automated fashion," just like an app like TripIt, which automatically parses information from your flight reservations."
According to the American Dream, the terminator assignment is being assembled. The disturbing use of a database maintained since the 1980s by the federal government, Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law, is the ultimate application of the individual dossiers that are generated from signals collection.
"Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database's name derives from the fact that it contains "copies of the 'main core' or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community."
Looking through the historic prism and behavioral pattern of the shadow government agencies, the lack of dramatic public outrage seems to be the only consistent factor out of the denial denizens that love to salute the flag, while willingly forfeiting their bill of right protections. This regretful conduct is seen in the example from, "Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core. At the time, the shocking information that he revealed did not get that much attention. That is quite a shame, because it should have sent shockwaves across the nation…"
Now we are all supposed to empathize with the hysteria of the political careerist class over the disclosures of Edward Snowden. The bipartisan spots of the carnivore leopards never change. When John Boehner Calls Snowden a Traitor, he speaks for much of the establishment and equates loyalty to the state as the very definition of nationalism.
Again, the chronicle of the military-industrial-intelligence-complex is replete with treasonous deeds against the constitutional republic. Remember the Carnivore system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications? Maybe your memory goes back to the archetype whistleblower. None other than the iconic Daniel Ellsberg speaks out on the current scandal in the Guardian letter, Edward Snowden: saving us from the United Stasi of America.
"In 1975, Senator Frank Church spoke of the National Security Agency in these terms:
"I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."
The dangerous prospect of which he warned was that America's intelligence gathering capability - which is today beyond any comparison with what existed in his pre-digital era - "at any time could be turned around on the American people and no American would have any privacy left."
That has now happened. That is what Snowden has exposed, with official, secret documents. The NSA, FBI and CIA have, with the new digital technology, surveillance powers over our own citizens that the Stasi - the secret police in the former "democratic republic" of East Germany - could scarcely have dreamed of. Snowden reveals that the so-called intelligence community has become the United Stasi of America."
Yes, Virginia our great founding fathers came from not only this old dominion, but had a state of mind that fought the revolutionary war against tyranny. The United Stasi of America is the definitive meaning of the evil empire that protects the globalist criminals that control the political apparatus, known as the federal government.
The echelon network of subversion and espying is but a rung on a ladder of a coercive control. The prism of deception is the false reality your controllers use to relinquish your will to oppose the repression. The secret intelligence agencies only serve their own bureaucratic interests as they obey their master operative superiors.
The disinformation culture is the permanent realism and the snitch society is an essential requirement necessary to keep the imperium in power. With the Americanization of domestic terrorists, Tea Party activists and the Patriotic Truth movement are in the sights of totalitarian gangsters.
Is there any doubt that the NSA, FBI and CIA act as if they are above the law and unaccountable? The great divide between legitimate authority and clandestine oppression is narrow and fragile. The essential question is who is the true enemy? As the surveillance technology perfects their reach and assimilates the application of their data assets, the military option under martial law intensifies. No one is safe. Big Brother has become the impending Terminator.
The Stasi Skynet engulfs everyone. There is no way out of the matrix as long as the globalists operate their spy network. The system is designed to eliminate any and all dissent. Overload the data collectors by intensifying the practice of liberty at every opportunity.
SARTRE – June 16, 2013

United Stasi of America through the Echelon Prism
Strappado Wrack

Provocative Satire - Intoxicating Creative Wit
banner09.gif
Unlock the Meaning of Current Affairs
hr19.jpg
“As someone who knows GCHQ very well… the idea that in GCHQ people are sitting working out how to circumvent a UK law with another agency in another country is fanciful. It is nonsense.” - William Hague
NSA-us-secret-police.jpg
United Stasi of America through the Echelon Prism
Signals collection has a long secretive and enigmatic history. The very definition of espionage implies spying, most closely associated with foreign sources. Since the Echelon network, the unified function of data retrieval became a given during the cold war. With the revelation of Prism, advances in sophisticated electronic devices and software algorithms provide a major leap. The article, Is PRISM the US version of Echelon?, sums up the evolution. "With this kind of setup and ambition to capture and evaluate private conversations (well, not so private now), makes Echelon that much more believable, and that PRISM is a reflection of the infamous project, but focused solely on the US."
Bankwatch takes a sanguine attitude towards Why PRISM? ECHELON has been around since 1948 supported by US, UK, Canada, Australia. At the same time, the publication references the capacities of the original analogue technology.
"The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON Dictionary) that will prompt the computers to flag the message for recording and transcribing for future analysis. Intelligence analysts at each of the respective listening stations maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept."
This machinery of electronic snooping has no instinctive restraint on the subject or content, when the technocratic engineers are left to design the next level of the "All Seeing Eye". The notion that the Prism program is shocking certainly does not conform to the even increasing capacity of surveillance society that has already discarded the presumption of privacy.
The Wall Street Journal forecasts the total integration of data because Technology Emboldened the NSA, to capture all that is digital.
"At a 2009 conference on so-called cloud computing, an NSA official said the agency was developing a new system by linking its various databases and using Hadoop software to analyze them, according to comments reported by the trade publication InformationWeek.
The system would hold "essentially every kind of data there is," said Randy Garrett, who was then director of technology for the NSA's integrated intelligence program. "The object is to do things that were essentially impossible before."
Nonetheless, the Director of National Intelligence issues fact sheet on PRISM in response to leaks, wants you to accept that the government is adhering to stature authority and protecting vital national security interests. "While focusing on the letter of the law and the government's good intentions, Clapper dodges any mention of how much information (or what kind) is actually collected with the PRISM program."
OK, only a blood brother operative of the intelligence community will challenge the proposition that the collection of electronic information is the main function of their Skynet self-aware artificial intelligence system. The true debate is whether the data collected is destined for use against targeted American citizens, for nefarious purposes.
Mashable attempts to explain the methodology of PRISM: Does the NSA Really Get Direct Access to Your Data?, and how the "so called" judicial review function of FISA Court approval is processed.
"For Ashkan Soltani, an independent privacy researcher and technologist, this is "a process for submitting [Section] 702 requests and getting responses in a machine-readable form."
The 41-page PRISM Powerpoint presentation "could be seen as a business development deck indicating all the various providers that they currently have 'relationships with,'" he told Mashable.
The system is "basically a data-ingestion API," he said.
Soltani speculated that based on what we know now, PRISM is a "streamlined way" to submit Section 702 orders to the companies for them to review the requests, and it gives the NSA the ability to handle and process the response "in an automated fashion," just like an app like TripIt, which automatically parses information from your flight reservations."
According to the American Dream, the terminator assignment is being assembled. The disturbing use of a database maintained since the 1980s by the federal government, Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law, is the ultimate application of the individual dossiers that are generated from signals collection.
"Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database's name derives from the fact that it contains "copies of the 'main core' or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community."
Looking through the historic prism and behavioral pattern of the shadow government agencies, the lack of dramatic public outrage seems to be the only consistent factor out of the denial denizens that love to salute the flag, while willingly forfeiting their bill of right protections. This regretful conduct is seen in the example from, "Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core. At the time, the shocking information that he revealed did not get that much attention. That is quite a shame, because it should have sent shockwaves across the nation…"
Now we are all supposed to empathize with the hysteria of the political careerist class over the disclosures of Edward Snowden. The bipartisan spots of the carnivore leopards never change. When John Boehner Calls Snowden a Traitor, he speaks for much of the establishment and equates loyalty to the state as the very definition of nationalism.
Again, the chronicle of the military-industrial-intelligence-complex is replete with treasonous deeds against the constitutional republic. Remember the Carnivore system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications? Maybe your memory goes back to the archetype whistleblower. None other than the iconic Daniel Ellsberg speaks out on the current scandal in the Guardian letter, Edward Snowden: saving us from the United Stasi of America.
"In 1975, Senator Frank Church spoke of the National Security Agency in these terms:

"I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."
The dangerous prospect of which he warned was that America's intelligence gathering capability - which is today beyond any comparison with what existed in his pre-digital era - "at any time could be turned around on the American people and no American would have any privacy left."
That has now happened. That is what Snowden has exposed, with official, secret documents. The NSA, FBI and CIA have, with the new digital technology, surveillance powers over our own citizens that the Stasi - the secret police in the former "democratic republic" of East Germany - could scarcely have dreamed of. Snowden reveals that the so-called intelligence community has become the United Stasi of America."
Yes, Virginia our great founding fathers came from not only this old dominion, but had a state of mind that fought the revolutionary war against tyranny. The United Stasi of America is the definitive meaning of the evil empire that protects the globalist criminals that control the political apparatus, known as the federal government.
The echelon network of subversion and espying is but a rung on a ladder of a coercive control. The prism of deception is the false reality your controllers use to relinquish your will to oppose the repression. The secret intelligence agencies only serve their own bureaucratic interests as they obey their master operative superiors.
The disinformation culture is the permanent realism and the snitch society is an essential requirement necessary to keep the imperium in power. With the Americanization of domestic terrorists, Tea Party activists and the Patriotic Truth movement are in the sights of totalitarian gangsters.
Is there any doubt that the NSA, FBI and CIA act as if they are above the law and unaccountable? The great divide between legitimate authority and clandestine oppression is narrow and fragile. The essential question is who is the true enemy? As the surveillance technology perfects their reach and assimilates the application of their data assets, the military option under martial law intensifies. No one is safe. Big Brother has become the impending Terminator.
The Stasi Skynet engulfs everyone. There is no way out of the matrix as long as the globalists operate their spy network. The system is designed to eliminate any and all dissent. Overload the data collectors by intensifying the practice of liberty at every opportunity.
SARTRE – June 16, 2013
- See more at: http://www.batr.org/wrack/061613.html#sthash.VNAmOKEe.dpuf

United Stasi of America through the Echelon Prism
Strappado Wrack

Provocative Satire - Intoxicating Creative Wit
banner09.gif
Unlock the Meaning of Current Affairs
hr19.jpg
“As someone who knows GCHQ very well… the idea that in GCHQ people are sitting working out how to circumvent a UK law with another agency in another country is fanciful. It is nonsense.” - William Hague
NSA-us-secret-police.jpg
United Stasi of America through the Echelon Prism
Signals collection has a long secretive and enigmatic history. The very definition of espionage implies spying, most closely associated with foreign sources. Since the Echelon network, the unified function of data retrieval became a given during the cold war. With the revelation of Prism, advances in sophisticated electronic devices and software algorithms provide a major leap. The article, Is PRISM the US version of Echelon?, sums up the evolution. "With this kind of setup and ambition to capture and evaluate private conversations (well, not so private now), makes Echelon that much more believable, and that PRISM is a reflection of the infamous project, but focused solely on the US."
Bankwatch takes a sanguine attitude towards Why PRISM? ECHELON has been around since 1948 supported by US, UK, Canada, Australia. At the same time, the publication references the capacities of the original analogue technology.
"The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON Dictionary) that will prompt the computers to flag the message for recording and transcribing for future analysis. Intelligence analysts at each of the respective listening stations maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept."
This machinery of electronic snooping has no instinctive restraint on the subject or content, when the technocratic engineers are left to design the next level of the "All Seeing Eye". The notion that the Prism program is shocking certainly does not conform to the even increasing capacity of surveillance society that has already discarded the presumption of privacy.
The Wall Street Journal forecasts the total integration of data because Technology Emboldened the NSA, to capture all that is digital.
"At a 2009 conference on so-called cloud computing, an NSA official said the agency was developing a new system by linking its various databases and using Hadoop software to analyze them, according to comments reported by the trade publication InformationWeek.
The system would hold "essentially every kind of data there is," said Randy Garrett, who was then director of technology for the NSA's integrated intelligence program. "The object is to do things that were essentially impossible before."
Nonetheless, the Director of National Intelligence issues fact sheet on PRISM in response to leaks, wants you to accept that the government is adhering to stature authority and protecting vital national security interests. "While focusing on the letter of the law and the government's good intentions, Clapper dodges any mention of how much information (or what kind) is actually collected with the PRISM program."
OK, only a blood brother operative of the intelligence community will challenge the proposition that the collection of electronic information is the main function of their Skynet self-aware artificial intelligence system. The true debate is whether the data collected is destined for use against targeted American citizens, for nefarious purposes.
Mashable attempts to explain the methodology of PRISM: Does the NSA Really Get Direct Access to Your Data?, and how the "so called" judicial review function of FISA Court approval is processed.
"For Ashkan Soltani, an independent privacy researcher and technologist, this is "a process for submitting [Section] 702 requests and getting responses in a machine-readable form."
The 41-page PRISM Powerpoint presentation "could be seen as a business development deck indicating all the various providers that they currently have 'relationships with,'" he told Mashable.
The system is "basically a data-ingestion API," he said.
Soltani speculated that based on what we know now, PRISM is a "streamlined way" to submit Section 702 orders to the companies for them to review the requests, and it gives the NSA the ability to handle and process the response "in an automated fashion," just like an app like TripIt, which automatically parses information from your flight reservations."
According to the American Dream, the terminator assignment is being assembled. The disturbing use of a database maintained since the 1980s by the federal government, Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law, is the ultimate application of the individual dossiers that are generated from signals collection.
"Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database's name derives from the fact that it contains "copies of the 'main core' or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community."
Looking through the historic prism and behavioral pattern of the shadow government agencies, the lack of dramatic public outrage seems to be the only consistent factor out of the denial denizens that love to salute the flag, while willingly forfeiting their bill of right protections. This regretful conduct is seen in the example from, "Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core. At the time, the shocking information that he revealed did not get that much attention. That is quite a shame, because it should have sent shockwaves across the nation…"
Now we are all supposed to empathize with the hysteria of the political careerist class over the disclosures of Edward Snowden. The bipartisan spots of the carnivore leopards never change. When John Boehner Calls Snowden a Traitor, he speaks for much of the establishment and equates loyalty to the state as the very definition of nationalism.
Again, the chronicle of the military-industrial-intelligence-complex is replete with treasonous deeds against the constitutional republic. Remember the Carnivore system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications? Maybe your memory goes back to the archetype whistleblower. None other than the iconic Daniel Ellsberg speaks out on the current scandal in the Guardian letter, Edward Snowden: saving us from the United Stasi of America.
"In 1975, Senator Frank Church spoke of the National Security Agency in these terms:

"I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."
The dangerous prospect of which he warned was that America's intelligence gathering capability - which is today beyond any comparison with what existed in his pre-digital era - "at any time could be turned around on the American people and no American would have any privacy left."
That has now happened. That is what Snowden has exposed, with official, secret documents. The NSA, FBI and CIA have, with the new digital technology, surveillance powers over our own citizens that the Stasi - the secret police in the former "democratic republic" of East Germany - could scarcely have dreamed of. Snowden reveals that the so-called intelligence community has become the United Stasi of America."
Yes, Virginia our great founding fathers came from not only this old dominion, but had a state of mind that fought the revolutionary war against tyranny. The United Stasi of America is the definitive meaning of the evil empire that protects the globalist criminals that control the political apparatus, known as the federal government.
The echelon network of subversion and espying is but a rung on a ladder of a coercive control. The prism of deception is the false reality your controllers use to relinquish your will to oppose the repression. The secret intelligence agencies only serve their own bureaucratic interests as they obey their master operative superiors.
The disinformation culture is the permanent realism and the snitch society is an essential requirement necessary to keep the imperium in power. With the Americanization of domestic terrorists, Tea Party activists and the Patriotic Truth movement are in the sights of totalitarian gangsters.
Is there any doubt that the NSA, FBI and CIA act as if they are above the law and unaccountable? The great divide between legitimate authority and clandestine oppression is narrow and fragile. The essential question is who is the true enemy? As the surveillance technology perfects their reach and assimilates the application of their data assets, the military option under martial law intensifies. No one is safe. Big Brother has become the impending Terminator.
The Stasi Skynet engulfs everyone. There is no way out of the matrix as long as the globalists operate their spy network. The system is designed to eliminate any and all dissent. Overload the data collectors by intensifying the practice of liberty at every opportunity.
SARTRE – June 16, 2013
- See more at: http://www.batr.org/wrack/061613.html#sthash.VNAmOKEe.dpuf
United Stasi of America through the Echelon Prism
Strappado Wrack

Provocative Satire - Intoxicating Creative Wit
banner09.gif
Unlock the Meaning of Current Affairs
hr19.jpg
“As someone who knows GCHQ very well… the idea that in GCHQ people are sitting working out how to circumvent a UK law with another agency in another country is fanciful. It is nonsense.” - William Hague
NSA-us-secret-police.jpg
United Stasi of America through the Echelon Prism
Signals collection has a long secretive and enigmatic history. The very definition of espionage implies spying, most closely associated with foreign sources. Since the Echelon network, the unified function of data retrieval became a given during the cold war. With the revelation of Prism, advances in sophisticated electronic devices and software algorithms provide a major leap. The article, Is PRISM the US version of Echelon?, sums up the evolution. "With this kind of setup and ambition to capture and evaluate private conversations (well, not so private now), makes Echelon that much more believable, and that PRISM is a reflection of the infamous project, but focused solely on the US."
Bankwatch takes a sanguine attitude towards Why PRISM? ECHELON has been around since 1948 supported by US, UK, Canada, Australia. At the same time, the publication references the capacities of the original analogue technology.
"The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON Dictionary) that will prompt the computers to flag the message for recording and transcribing for future analysis. Intelligence analysts at each of the respective listening stations maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept."
This machinery of electronic snooping has no instinctive restraint on the subject or content, when the technocratic engineers are left to design the next level of the "All Seeing Eye". The notion that the Prism program is shocking certainly does not conform to the even increasing capacity of surveillance society that has already discarded the presumption of privacy.
The Wall Street Journal forecasts the total integration of data because Technology Emboldened the NSA, to capture all that is digital.
"At a 2009 conference on so-called cloud computing, an NSA official said the agency was developing a new system by linking its various databases and using Hadoop software to analyze them, according to comments reported by the trade publication InformationWeek.
The system would hold "essentially every kind of data there is," said Randy Garrett, who was then director of technology for the NSA's integrated intelligence program. "The object is to do things that were essentially impossible before."
Nonetheless, the Director of National Intelligence issues fact sheet on PRISM in response to leaks, wants you to accept that the government is adhering to stature authority and protecting vital national security interests. "While focusing on the letter of the law and the government's good intentions, Clapper dodges any mention of how much information (or what kind) is actually collected with the PRISM program."
OK, only a blood brother operative of the intelligence community will challenge the proposition that the collection of electronic information is the main function of their Skynet self-aware artificial intelligence system. The true debate is whether the data collected is destined for use against targeted American citizens, for nefarious purposes.
Mashable attempts to explain the methodology of PRISM: Does the NSA Really Get Direct Access to Your Data?, and how the "so called" judicial review function of FISA Court approval is processed.
"For Ashkan Soltani, an independent privacy researcher and technologist, this is "a process for submitting [Section] 702 requests and getting responses in a machine-readable form."
The 41-page PRISM Powerpoint presentation "could be seen as a business development deck indicating all the various providers that they currently have 'relationships with,'" he told Mashable.
The system is "basically a data-ingestion API," he said.
Soltani speculated that based on what we know now, PRISM is a "streamlined way" to submit Section 702 orders to the companies for them to review the requests, and it gives the NSA the ability to handle and process the response "in an automated fashion," just like an app like TripIt, which automatically parses information from your flight reservations."
According to the American Dream, the terminator assignment is being assembled. The disturbing use of a database maintained since the 1980s by the federal government, Main Core: A List Of Millions Of Americans That Will Be Subject To Detention During Martial Law, is the ultimate application of the individual dossiers that are generated from signals collection.
"Main Core contains personal and financial data of millions of U.S. citizens believed to be threats to national security. The data, which comes from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database's name derives from the fact that it contains "copies of the 'main core' or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community."
Looking through the historic prism and behavioral pattern of the shadow government agencies, the lack of dramatic public outrage seems to be the only consistent factor out of the denial denizens that love to salute the flag, while willingly forfeiting their bill of right protections. This regretful conduct is seen in the example from, "Christopher Ketchum of Radar Magazine that first reported on the existence of Main Core. At the time, the shocking information that he revealed did not get that much attention. That is quite a shame, because it should have sent shockwaves across the nation…"
Now we are all supposed to empathize with the hysteria of the political careerist class over the disclosures of Edward Snowden. The bipartisan spots of the carnivore leopards never change. When John Boehner Calls Snowden a Traitor, he speaks for much of the establishment and equates loyalty to the state as the very definition of nationalism.
Again, the chronicle of the military-industrial-intelligence-complex is replete with treasonous deeds against the constitutional republic. Remember the Carnivore system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications? Maybe your memory goes back to the archetype whistleblower. None other than the iconic Daniel Ellsberg speaks out on the current scandal in the Guardian letter, Edward Snowden: saving us from the United Stasi of America.
"In 1975, Senator Frank Church spoke of the National Security Agency in these terms:

"I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return."
The dangerous prospect of which he warned was that America's intelligence gathering capability - which is today beyond any comparison with what existed in his pre-digital era - "at any time could be turned around on the American people and no American would have any privacy left."
That has now happened. That is what Snowden has exposed, with official, secret documents. The NSA, FBI and CIA have, with the new digital technology, surveillance powers over our own citizens that the Stasi - the secret police in the former "democratic republic" of East Germany - could scarcely have dreamed of. Snowden reveals that the so-called intelligence community has become the United Stasi of America."
Yes, Virginia our great founding fathers came from not only this old dominion, but had a state of mind that fought the revolutionary war against tyranny. The United Stasi of America is the definitive meaning of the evil empire that protects the globalist criminals that control the political apparatus, known as the federal government.
The echelon network of subversion and espying is but a rung on a ladder of a coercive control. The prism of deception is the false reality your controllers use to relinquish your will to oppose the repression. The secret intelligence agencies only serve their own bureaucratic interests as they obey their master operative superiors.
The disinformation culture is the permanent realism and the snitch society is an essential requirement necessary to keep the imperium in power. With the Americanization of domestic terrorists, Tea Party activists and the Patriotic Truth movement are in the sights of totalitarian gangsters.
Is there any doubt that the NSA, FBI and CIA act as if they are above the law and unaccountable? The great divide between legitimate authority and clandestine oppression is narrow and fragile. The essential question is who is the true enemy? As the surveillance technology perfects their reach and assimilates the application of their data assets, the military option under martial law intensifies. No one is safe. Big Brother has become the impending Terminator.
The Stasi Skynet engulfs everyone. There is no way out of the matrix as long as the globalists operate their spy network. The system is designed to eliminate any and all dissent. Overload the data collectors by intensifying the practice of liberty at every opportunity.
SARTRE – June 16, 2013
- See more at: http://www.batr.org/wrack/061613.html#sthash.VNAmOKEe.dpuf