Friday, August 23, 2013

New Zealand appears to have used NSA spy network to target Kim Dotcom

"Everything goes into the US-based spy cloud," Kim Dotcom tells Ars.

Kim "Billy Big Steps" Dotcom poses beside a car in Hong Kong.
Kim Dotcom
A new examination of previously published affidavits from the Government Communications Security Bureau (GCSB)—the New Zealand equivalent of the National Security Agency (NSA)—appears to suggest that the GCSB used the “Five Eyes” international surveillance network to capture the communications of Kim Dotcom, the founder of Megaupload.
The new analysis was posted by New Zealand journalist Keith Ng in a Thursday blog post. If the link proves to be true, it would seem that the NSA’s vast international surveillance capability can be turned against individuals unrelated to the NSA’s stated mission to aid military, counterintelligence, or counterterrorism objectives.
Kim Dotcom has been charged in the United States with copyright infringement rather than terrorism or any other violent crime. The German-born entrepreneur is currently fighting extradition from New Zealand to the United States. Separately, he has launched a civil suit in New Zealand against the GCSB for what the New Zealand government has already admitted was unlawful surveillance.

REL TO NZL, FVEY

On Page 21 of the GCSB’s Affadavit of Disclosure (PDF), in an internal e-mail dated February 17, 2012, the document is marked: "TOP SECRET//COMINT//REL TO NZL, FVEY."
The last section of that classification (REL TO NZL, FVEY)—“Relevant to New Zealand, Five Eyes”—refers to the vast intelligence and data sharing program between the United States, the United Kingdom, Canada, Australia, and New Zealand, known as “Five Eyes.” Given new disclosures about the capabilities of PRISM and XKeyscore as a result of the documents provided by former NSA contractor Edward Snowden, a close examination of this affidavit seems to suggest that the Five Eyes infrastructure was used in Dotcom’s case. (In a slide published last month by The Guardian, XKeyscore is clearly shown to have a presence in New Zealand.)
The affadavit also provides a redacted list of “selectors” for Kim Dotcom, his wife Monica Dotcom, and Bram Van Der Kolk, one of Dotcom’s co-defendants.
“We intercepted [REDACTED] from the first two selectors on the list," the document states. "Obviously only a small fraction of them were used in the reports that were generated. We had no [REDACTED] collection on Dotcom, and I’m advised we saw a little [REDACTED] none of which was used in reporting.”
“All Five Eyes partners have access [to the NSA's systems], including GCSB,” Dotcom told Ars. “GCSB doesn’t even operate their own spy cloud. Everything goes into the US-based spy cloud. Including all the surveillance they have done on me. They typed in the selector and got access to everything the Five Eyes spy cloud had on me. Then the GCSB started real-time surveillance of all my communications, IP, mobile, etc. and was feeding that into the spy cloud.”
Neither the GCSB nor a spokesperson for the Embassy of New Zealand in the United States immediately responded to Ars’ request for comment. In June 2013, New Zealand Prime Minister John Key evaded answering whether the GCSB uses or has access to the NSA’s PRISM system.
"I can't tell you how the United States gather all of their information, what techniques they use, I just simply don't know,” Key told TV3’s Firstline. “But if the question is do we use the United States or one of our other partners to circumvent New Zealand law then the answer is categorically no. We do exchange—and it's well known—information with our partners. We do do that. How they gather that information and whether they use techniques or systems like PRISM, I can't comment on that.''

"What was done was illegal"

As we reported in March 2013, a New Zealand appeals court ruled (PDF) that Kim Dotcom has the right to sue the government of New Zealand for illegal surveillance. As we reported further last year, the NZ government admitted after the fact that Dotcom should not have been subjected to government surveillance due to his having obtained permanent resident status.
According to new documents acquired earlier this year by a New Zealand TV channel, the GCSB already had information as of December 16, 2011 (before the January 2012 raid) showing that Dotcom was a permanent resident of New Zealand and that the agency knew Dotcom should not have been targeted at all. Interestingly, the documents also show Dotcom’s government code name: “Billy Big Steps.”
Still, Ira Rothken, Dotcom’s California-based attorney, seemed to be a bit more cautious about drawing any new implications from the NZ affidavit.
“We’re in the process of litigating a civil case that implicates the New Zealand government for their illegal spying,” he told Ars. “At this point, while we have a healthy appreciation for whatever informal analysis is being done, our goal in this case is to actually get the information directly from New Zealand government sources. I don’t want to prejudge the very thing that we’re litigating now.”
Still, Rothken seemed to indicate that it was within the realm of possibility that Five Eyes was turned against Dotcom illegally.
“I think it’s axiomatic that New Zealand has access to the Five Eyes infrastructure because it’s a member of Five Eyes and it has network points in New Zealand, including a large installation in New Zealand,” he added. “I think that that’s common knowledge. We know that the spy machinery was misused because what was done was illegal. The interesting thing about this case is that it shows how not having sufficient checks and balances against the spy machinery can come back to hurt and impact the rights of innocent residents. Here, the Prime Minister has already apologized and admitted that what happened was illegal. We are litigating for what damages and remedies should be provided.”
Mark Rumold, a staff attorney at the Electronic Frontier Foundation, said that it wasn’t clear how much New Zealand authorities obtained via the NSA.
“It would all be dependent on New Zealand law,” he told Ars. “There’s nothing in here that looks like a slam dunk. It doesn't seem like it’s outside the realm of possibility, but if everything is based on a single classification, it seems possible.”

Meanwhile, NZ expands GCSB spying domestically

At the time of the surveillance against Dotcom, the GCSB was only allowed to engage in surveillance of non-resident foreigners. However, earlier this week, the New Zealand parliament voted 61-59 to expand the GCSB’s powers to encompass citizens and legal residents.
"This is not, and never will be, about wholesale spying on New Zealanders," Prime Minister John Key told parliament on Thursday. "There are threats our government needs to protect New Zealanders from. Those threats are real and ever-present, and we underestimate them at our peril."

The Confidential Memo at the Heart of the Global Financial Crisis

truther August 23, 2013
When a little birdie dropped the End Game memo through my window, its content was so explosive, so sick and plain evil, I just couldn’t believe it.
The Memo confirmed every conspiracy freak’s fantasy: that in the late 1990s, the top US Treasury officials secretly conspired with a small cabal of banker big-shots to rip apart financial regulation across the planet. When you see 26.3 percent unemployment in Spain, desperation and hunger in Greece, riots in Indonesia and Detroit in bankruptcy, go back to this End Game memo, the genesis of the blood and tears.
The Confidential Memo at the Heart of the Global Financial Crisis
The Treasury official playing the bankers’ secret End Game was Larry Summers. Today, Summers is Barack Obama’s leading choice for Chairman of the US Federal Reserve, the world’s central bank. If the confidential memo is authentic, then Summers shouldn’t be serving on the Fed, he should be serving hard time in some dungeon reserved for the criminally insane of the finance world.
The memo is authentic.
I had to fly to Geneva to get confirmation and wangle a meeting with the Secretary General of the World Trade Organisation, Pascal Lamy. Lamy, the Generalissimo of Globalisation, told me,
“The WTO was not created as some dark cabal of multinationals secretly cooking plots against the people… We don’t have cigar-smoking, rich, crazy bankers negotiating.”
Then I showed him the memo.
It begins with Larry Summers’ flunky, Timothy Geithner, reminding his boss to call the Bank bigshots to order their lobbyist armies to march:
“As we enter the end-game of the WTO financial services negotiations, I believe it would be a good idea for you to touch base with the CEOs…”
To avoid Summers having to call his office to get the phone numbers (which, under US law, would have to appear on public logs), Geithner listed the private lines of what were then the five most powerful CEOs on the planet. And here they are:
Goldman Sachs: John Corzine (212)902-8281
Merrill Lynch: David Kamanski (212)449-6868
Bank of America: David Coulter (415)622-2255
Citibank: John Reed (212)559-2732
Chase Manhattan: Walter Shipley (212)270-1380
Lamy was right: They don’t smoke cigars. Go ahead and dial them. I did, and sure enough, got a cheery personal hello from Reed – cheery until I revealed I wasn’t Larry Summers. (Note: The other numbers were swiftly disconnected. And Corzine can’t be reached while he faces criminal charges.)
It’s not the little cabal of confabs held by Summers and the banksters that’s so troubling. The horror is in the purpose of the “end game” itself.
Let me explain:
The year was 1997. US Treasury Secretary Robert Rubin was pushing hard to de-regulate banks. That required, first, repeal of the Glass-Steagall Act to dismantle the barrier between commercial banks and investment banks. It was like replacing bank vaults with roulette wheels.
Second, the banks wanted the right to play a new high-risk game: “derivatives trading”. JP Morgan alone would soon carry $88 trillion of these pseudo-securities on its books as “assets”.
Deputy Treasury Secretary Summers (soon to replace Rubin as Secretary) body-blocked any attempt to control derivatives.
But what was the use of turning US banks into derivatives casinos if money would flee to nations with safer banking laws?
The answer conceived by the Big Bank Five: eliminate controls on banks in every nation on the planet — in one single move. It was as brilliant as it was insanely dangerous.
How could they pull off this mad caper? The bankers’ and Summers’ game was to use the Financial Services Agreement (or FSA), an abstruse and benign addendum to the international trade agreements policed by the World Trade Organisation.
Until the bankers began their play, the WTO agreements dealt simply with trade in goods – that is, my cars for your bananas. The new rules devised by Summers and the banks would force all nations to accept trade in “bads” – toxic assets like financial derivatives.
Until the bankers’ re-draft of the FSA, each nation controlled and chartered the banks within their own borders. The new rules of the game would force every nation to open their markets to Citibank, JP Morgan and their derivatives “products”.
And all 156 nations in the WTO would have to smash down their own Glass-Steagall divisions between commercial savings banks and the investment banks that gamble with derivatives.
The job of turning the FSA into the bankers’ battering ram was given to Geithner, who was named Ambassador to the World Trade Organisation.
Bankers Go Bananas
Why in the world would any nation agree to let its banking system be boarded and seized by financial pirates like JP Morgan?
The answer, in the case of Ecuador, was bananas. Ecuador was truly a banana republic. The yellow fruit was that nation’s life-and-death source of hard currency. If it refused to sign the new FSA, Ecuador could feed its bananas to the monkeys and go back into bankruptcy. Ecuador signed.
And so on – with every single nation bullied into signing.
Every nation but one, I should say. Brazil’s new President, Inacio Lula da Silva, refused. In retaliation, Brazil was threatened with a virtual embargo of its products by the European Union’s Trade Commissioner, one Peter Mandelson, according to another confidential memo I got my hands on. But Lula’s refusenik stance paid off for Brazil which, alone among Western nations, survived and thrived during the 2007-9 bank crisis.
China signed – but got its pound of flesh in return. It opened its banking sector a crack in return for access and control of the US auto parts and other markets. (Swiftly, two million US jobs shifted to China.)
The new FSA pulled the lid off the Pandora’s box of worldwide derivatives trade. Among the notorious transactions legalised: Goldman Sachs (where Treasury Secretary Rubin had been co-chairman) worked a secret euro-derivatives swap with Greece which, ultimately, destroyed that nation. Ecuador, its own banking sector de-regulated and demolished, exploded into riots. Argentina had to sell off its oil companies (to the Spanish) and water systems (to Enron) while its teachers hunted for food in garbage cans. Then, Bankers Gone Wild in the Eurozone dove head-first into derivatives pools without knowing how to swim – and the continent is now being sold off in tiny, cheap pieces to Germany.
Of course, it was not just threats that sold the FSA, but temptation as well. After all, every evil starts with one bite of an apple offered by a snake. The apple: the gleaming piles of lucre hidden in the FSA for local elites. The snake was named Larry.
Does all this evil and pain flow from a single memo? Of course not: the evil was The Game itself, as played by the banker clique. The memo only revealed their game-plan for checkmate.
And the memo reveals a lot about Summers and Obama.
While billions of sorry souls are still hurting from worldwide banker-made disaster, Rubin and Summers didn’t do too badly. Rubin’s deregulation of banks had permitted the creation of a financial monstrosity called “Citigroup”. Within weeks of leaving office, Rubin was named director, then Chairman of Citigroup – which went bankrupt while managing to pay Rubin a total of $126 million.
Then Rubin took on another post: as key campaign benefactor to a young State Senator, Barack Obama. Only days after his election as President, Obama, at Rubin’s insistence, gave Summers the odd post of US “Economics Tsar” and made Geithner his Tsarina (that is, Secretary of Treasury). In 2010, Summers gave up his royalist robes to return to “consulting” for Citibank and other creatures of bank deregulation whose payments have raised Summers’ net worth by $31 million since the “end-game” memo.
That Obama would, at Robert Rubin’s demand, now choose Summers to run the Federal Reserve Board means that, unfortunately, we are far from the end of the game.
Special thanks to expert Mary Bottari of Bankster USA www.BanksterUSA.org without whom our investigation could not have begun.
The film of my meeting with WTO chief Lamy was originally created for Ring of Fire, hosted by Mike Papantonio and Robert F. Kennedy Jr.
Further discussion of the documents I laid before Lamy can be found in “The Generalissimo of Globalization,” Chapter 12 of Vultures’ Picnic by Greg Palast (Constable Robinson 2012).

Obama’s HHS: Now Hiring for the Obamacare Police

truther August 23, 2013
In the wake of Jeff Duncan’s reporting of IRS agents being trained with AR-15s, I think we should be at least somewhat concerned with a breaking news story about the new “ObamaCare” Police. It would seem that the IRS implementation will not be the only strong arm of ObamaCare but that Health and Human Services will have a substantial number of investigative storm troopers as well.
Obama’s HHS Now Hiring for the Obamacare Police
The Daily Mail reports:
More than 1,600 new employees hired by the U.S. Department of Health and Human Resources in the aftermath of Obamacare’s passage include just two described as ‘consumer safety’ officers, but 86 tasked with ‘criminal investigating’ – indicating that the agency is building an army of detectives to sleuth out violations of a law that many in Congress who supported it still find confusing.
On the day President Obama signed the Affordable Care Act into law in 2010, HHS received authority from the Office of Personnel Management(OPM) to make as many as 1,814 new hires under an emergency ‘Direct Hiring Authority’ order.
We are going to need more hollow point bullets it would seem. Is anyone really shocked by the fact that we have a brand new enforcement branch of HHS? I doubt it. This seems to be the norm in Washington these days. Last week we featured the story of a retired Marine Colonel who claims that a domestic army is being built. And who could blame anyone for thinking that? It is happening right in front of us.
The Daily Mail article goes on to say:
The fleet of 86 new criminal investigators are earning a range of compensation between $51,800 and $89,350, according to the 2010 salary tables and differential payment guidelines.
Judicial Watch, a nonprofit that has told MailOnline it files ‘hundreds’ of FOIA requests, first published evidence in July of the HHS hiring binge.
‘Sounds like we now have the Obamacare police,’ said the group’s president, Tom Fitton, after MailOnline showed him the new data.
So is someone going to come and bust my door down if I am too poor to provide health insurance for my family?
Come on.
This is America.
What a silly question.
- See more at: http://www.thedailysheeple.com/obamas-hhs-now-hiring-for-the-obamacare-police_082013#sthash.RVeWZ3Do.dpuf

More Confirmation: NSA Analysts Willfully Abused Surveillance Powers

More Confirmation: NSA Analysts Willfully Abused Surveillance Powers

The NFL Will Feel The Streisand Effect After Pressuring ESPN To Pull Out Of Frontline Documentary

The NFL Will Feel The Streisand Effect After Pressuring ESPN To Pull Out Of Frontline Documentary

Did New Zealand Spooks Tap Into PRISM To Spy On Dotcom?

Did New Zealand Spooks Tap Into PRISM To Spy On Dotcom?

Megaupload Shutdown Hurt Smaller Films, Helped Blockbusters

While the major movie studios have all praised the demise of Megaupload, new data suggests that the shutdown has impacted part of the industry negatively. Extending previous work, European researchers show that the closure of the service had both positive and negative effects on box office revenues. Using weekly data from 10,272 movies in 50 countries spanning over several years, the researchers found that the Megaupload shutdown actually hurt smaller movies.
megauploadIt is no secret that the MPAA was one of the instigators of the Megaupload investigation, which ultimately led to the shutdown of the company January last year.
According to the Hollywood studios the file-hosting site kept people away from the box office, resulting in hundreds of millions in losses. However, new data shows that this claim may not hold ground, at least not for all movies.
This week researchers from Munich School of Management and Copenhagen Business School published new data that reveals how the effects of the shutdown vary based on the size of the movie, defined by the number of cinema screens it shows on.
The researchers extended a previous paper and the new analysis is based on 10,272 movies showing in 50 countries. Based on this data they found that only very large movies benefited from the shutdown, while revenue for most smaller and medium-sized movies decreased.
“We find that box office revenues of a majority of movies did not increase. While for a mid-range of movies the effect of the shutdown is even negative, only large blockbusters could benefit from the absence of Megaupload,” the researchers write.
We contacted Christian Peukert, one of the authors, who confirms the counter-intuitive finding.
“The results of our analysis suggest that the shutdown of Megaupload did not – as one might expect – generally increase box office revenues of movies,” Peukert tells TorrentFreak.
Looking at the overall picture the data suggests that average post-shutdown revenues are roughly 12% lower. This is also visible in the figure below which clearly shows a drop in revenue after January 2012.

Box office revenues before and after the shutdown
revenuesovertime
What’s striking about the findings is that the shutdown effects are not the same for all movies. According to the researchers the negative impact on smaller movies can be explained by a drop in word-of-mouth promotion from pirates, which affects smaller movies more.
“Smaller movies usually have smaller marketing campaigns, making word-of-mouth therefore a more important success driver. If some of this word-of-mouth effect is then taken away with the shutdown of illegal content, performance of smaller movies is likely to be hit harder,” the paper notes.
The increase in blockbuster revenues, on the other hand, is the classic replacement effect the MPAA had expected. That is, people pay for a box office ticket instead of downloading the movie for free. Word-of-mouth promotion may also occur for blockbusters, but the data shows that it’s outweighed by the replacement effect
“It could be that for most movies both effects balance, but for some movies the promotional effect outweighs the replacement effect and vice versa. If the promotional effect was especially important for smaller movies with lower traditional marketing budgets, this would explain our findings,” Peukert tells TorrentFreak.
The researchers ruled out several alternative explanations and also looked into the impact of Megaupload’s demise on the availability of pirated titles. Using The Pirate Bay as a comparison, they find that the shutdown had no significant effect on the availability of pirated movies on the Internet.
“The one striking implication of this study is that it is difficult to reduce negative effects of online piracy by shutting down the supply of illegal downloads,” Peukert says.
As any study of this kind, however, the statistical findings have to be used with caution.
“It is important to keep in mind that any statistical analysis can only provide estimates. The precision of an estimation always depends on a number of factors, such as method and type of data. We therefore prefer the most conservative, qualitative interpretation of our findings,” Peukert notes.
It will be interesting to see how Hollywood interprets the findings. When the researchers published an early working paper last year based on a limited set of movies, the MPAA said the results were “not clear or compelling” and that it would reserve comment until the full paper is published.
For Kim Dotcom and his team the research is not likely to change much. They continue their legal battles in the United States and New Zealand, which may take a few more years.

Censoring The Pirate Bay Is Futile, Research Shows

All around the world the copyright lobby is pushing for increased censorship of ‘pirate’ websites, The Pirate Bay in particular. Thus far this has resulted in court-ordered blockades in several countries including the UK and the Netherlands. The question that remains is whether these measures have any effect. Researchers from the University of Amsterdam suggest they don’t, and in a new report they show that the court-ordered Pirate Bay block has had no impact on local piracy rates.
tpbThe Pirate Bay is arguably the most censored website on the Internet. Courts all around the world have ordered Internet providers to block subscriber access to the torrent site, and more are expected to follow.
The idea behind these blockades is that they will help to decrease online piracy. However, research increasingly suggests that this aim is not being fulfilled. In fact, the blocking attempts may actually be having the opposite effect.
Today, University of Amsterdam researchers, together with Tilburg University’s CentERdata, released a new report which evaluates how the Dutch Pirate Bay blockade affected local piracy habits.
Titled “Baywatch,” the paper uses survey results as well as data from BitTorrent trackers to assess the effectiveness of the blocking measures.
The report finds that of all respondents who admit that they’ve downloaded files from illegal sources over the past half-year, between 20 and 25 percent say they stopped or downloaded less after the Pirate Bay blockade came into effect.
While this could be interpreted as a clear success for the blockade, the researchers don’t see any evidence for this in the rest of the data.
“This would suggest a small negative effect of the intervention on the percentage of the population who download copyright protected content from illegal sources. However, no such effect is found.”
In fact, the percentage of UPC, KPN, Tele2 and T-Mobile subscribers who admit to downloading or streaming from illegal sources over the past six months went up from 15.7% before the blockade, to 18.4% after. For two other ISPs, Ziggo and XS4ALL, the percentage increased over time as well, settling at 25.2%.

Downloading & streaming from illegal sources per blocking situation
ivir-block
The researchers believe that the increased piracy rates can in part be explained by people who picked up the downloading or streaming habit after the blockades went into effect.
“[Although] a small share of downloaders report a decrease in their downloading activities after the blocking, this effect is not reflected in the overall numbers, possibly because there are other consumers who have started downloading from illegal sources,” the researchers write.
In addition, they note that affected Pirate Bay users may have simply started using other means to get unauthorized content. In any case, there appears to be no negative long-term effect of the court ordered-blockade on the overall piracy rate.
“Blocking access to TPB has had no lasting net impact on the overall number of downloaders from illegal sources, as people learn to use alternatives to TPB.”
In addition to the survey data the researchers also monitored several popular BitTorrent swarms. Here they also found no clear impact of the blockade. Initially the market share of blocked ISPs appeared to decline, but this picked up later.
The researchers believe that this can be explained by the fact that subscribers find ways to circumvent the blockades.
The above, paired with the survey responses, leads the researchers to conclude that after an initial decrease in piracy the “market” quickly returned to the old situation. In other words, censoring The Pirate Bay proves to be ineffective in the long run.
This is not the first research to come to this conclusion. Previously the ineffectiveness of the blockades was highlighted by several Dutch and UK Internet providers, who claimed that BitTorrent traffic didn’t decline after the blockades were implemented.
Whether this will stop copyright holders’ efforts to demand additional and wider blockades is doubtful though – thus far it certainly hasn’t.

Larry Lessig Threatened With Copyright Infringement Over Clear Fair Use; Decides To Fight Back

Larry Lessig Threatened With Copyright Infringement Over Clear Fair Use; Decides To Fight Back

Orders To Destroy Guardian Hard Drives Came Directly From PM David Cameron

Orders To Destroy Guardian Hard Drives Came Directly From PM David Cameron

Administration Can't Let Go: Wants To Bring Back Felony Streaming Provisions Of SOPA

Administration Can't Let Go: Wants To Bring Back Felony Streaming Provisions Of SOPA

BUT WHY EGYPT? …THAT ANTIQUITIES THING AGAIN….

We’ve all been watching the melt-down in the Middle East and the bizarre meddling of the West in general, and America in particular, backing “rebels” in their grizzly and brutal attempts to overthrow the “moderate authoritarian” regimes. We all saw the wickedly cackling Hilary Clinton gloating over Qaddafi’s murder. Granted, Qaddafi was no gentleman, but given the revelations about his financial and monetary plans for Libya, and how he was actually spending that nation’s treasure to help its people, it’s little wonder he ran afoul of the oligarchs of the West. The Iraq mess is well-known, and the Syrian one, as well.
I confess in Syria’s case almost complete befuddlement. The geopolitical objectives seem clear, but, for the effort, paltry in comparison for what might be gained by a change from yet another “moderate, secular, authoritarian” regime like Assad’s, and the head-chopping butchery of the Western-sponsored “rebels.”  The geopolitical goal, I suspect, is to pry loose the last tenuous Russian toeholds in the region, and we can fully expect that after Syria is settled – if it ever is – the next domino on the West’s hit list will be, of course, Iran. I get that the West is desperately trying to set up Huntington’s “clash of civilizations”, a new post Cold War bogeyman to demonize, and a radicalized Islamic world would fit the requirements nicely, much more nicely then the uncooperative Russians, with their shared European and “Judeo-Christian” culture ever did.
But all along, I’ve sensed that at some profound and visceral level that the interest of the Anglosphere oligarchs in the region lies at a much deeper level, a level transcending the vicissitudes of geopolitics, energy policy and politics, petrodollars, or all the conventional explanations found in the types of journals that people like Henry Kissinger of Zbigniew Brzezinski like to read. I sense that the involvement has much to do with the region that lies at the ultimate root of what we call western civilization, and of the indications of technological sophistication in High Antiquity that its antiquities indicate.
Which brings us to Egypt… to Giza, as it were, the premier symbol of Egyptian antiquities. Egyptian antiquities are not, of course, restricted to Giza. There is Sakkara, Heliopolis, Memphis, Edfu, Luxor… but say the phrase “ancient Egypt” and the image that will pop instant and principally to the mind of the hearer are the pyramids of Giza.
Why the unrest in Egypt…beyond the stupidity of the Obama Administration, which never saw a radical Islamist regime it didn’t like, in pushing for the ouster of Mubarek? What’s the goal? Egypt has no appreciable oil supplies or reserves; it has little to offer on the spectrum of geopolitical concerns save position.
But it does have antiquities…. lots of them. I have long suspected that one of the deeply hidden agendas for Western Meddling in the region is precisely to seek and gain control of key antiquities, and also to remove key antiquities from public view and scrutiny. Let it be remembered that even under Mubarek, Egypt moved, inexplicably, to wall off the Giza compound, ostensibly in an effort to “secure” the site against vandals and terrorists. I suspected then, and suspect now, that the Egyptians found something, and that they weren’t sharing. I have made no secret that I suspected antiquities were a deeply hidden agenda of the Anglosphere in the invasion of Iraq: kick the French and Germans out, and take over the sites. Then the Baghdad Museum looting occurred, “American” soldiers were seen going in and out of the building and removing things….a story broken by – coincidentally? - Der Spiegel. Then we learned the museum looting had all the hallmarks of “an inside job.” But by whom?
So back to Egypt:
Looters ransack Egyptian antiques museum and snatch priceless artefacts as armed police move inside stormed Cairo mosque
Egypt may not have been sharing its recent antiquities discoveries, and where ancient high technology or indications thereof might be concerned, I suspect the western oligarchs pull no punches: out with Mubarek, and, with careful placement of agents provocateur, a few riots, and well-placed “looters,” and antiquities can “disappear.”
Of course, I grant you that this is all high octane speculation once more, speculation that, if one remains focused on this story alone, and does not view it in the context of the strange stories of Giza antiquities that preceded it, nor in the context of the Baghdad Museum looting, vastly exceeds the evidence. But when one does view this story in those contexts, then the lineaments of a disturbing outline begin to emerge, the outlines of a possible real, though very covert, “antiquities war” being fought beneath the guises of “radical” versus “moderate” Islamicists, behind the veil of geopolitics, oil, and petrodollars.

Read more: BUT WHY EGYPT? ...THAT ANTIQUITIES THING AGAIN....

NEWS AND VIEWS FROM THE NEFARIUM AUG 22 2013

NEWS AND VIEWS FROM THE NEFARIUM AUG 22 2013

America: Home of the Brave, Land of the… Jailed?

America: Home of the Brave, Land of the… Jailed?

Declassified Secret Rulings Found NSA Spying Program Unconstitutional

Declassified Secret Rulings Found NSA Spying Program Unconstitutional

Must See: Obama Birth Issue! On Fox… Video. “Why Media Bias On Birther Issue?”

Friday, August 23, 2013 6:39

.

Lou Dobbs Rips Media Birther Bias: Why'd It Take Obama So Long To Release Birth Certificate   http://www.youtube.com/watch?v=u2u01QfaWj8

It’s not just Fox.
It’s Lou Dobbs who has fired from CNN for bringing up the birth issue non-stop. The Southern Poverty Law Center had an ax to grind with Dobbs, so the SPLC took advantage of the birther witchhunt, to get rid of Dobbs.
Now that Ted Cruz is under fire for his birth issue, naturally Dobbs is reacting strongly. He’s still disgusted with the treatment he has dealt with and smarting from the witchhunt lynching he endured.
Look at the two reporters who are dumbfounded by Dobbs recalling how he was hunted down by the MSM and the hate campaign from hate-spewing, fascist liberal groups like the SPLC. The two journalists are speechless.
CNN President Jon Klein fired Dobbs for the birther statements and thus caved in to SPLC President Richard Cohen demanding CNN fire Lou Dobbs. Lou Dobbs is a collateral victim of Obama’s refusal to show his birth certificate.
Now the birther issue has progressed a lot and Joe Arpaio’s done a two-year probe into the birth issue.
Joe Arpaio’s Team has gotten lots of new people onboard, like Mike Zullo and Carl Gallups of PPSImmons fame, who made a slew of videos, saying Obama’s proven to be the Antichrist.
4 Videos Mainstream Media Banned For You Not To See. Video. Did God Give Us The Name Of The Antichrist?
/prophecy/2013/08/4-videos-mainstream-media-banned-for-you-not-to-see-video-did-god-give-us-the-name-of-the-antichrist-2452914.html

Antichrist Obama: 5 Pictures Banned by the Mainstream Media (Pics and Video)

This is a good ressource to know about Obama.
Here’s the letter J. Richard Cohen sent to CNN to demand Dobbs’ firing.
——————————————————
07/24/2009

SPLC President Calls on CNN to Remove Lou Dobbs from Air, Cites Newsman’s Support for Extremist-Inspired ‘Birther’ Claims

The following is a letter from SPLC President Richard Cohen to CNN President Jonathan Klein.
July 24, 2009
Jonathan Klein
President
CNN/U.S.
1 Time Warner Center
New York, N.Y. 10019-6038
Dear Mr. Klein,
As an important and respected news organization, CNN has a special responsibility to ensure the accuracy of its reporting. We have written to you before about our concern that Lou Dobbs repeatedly fails to live up to this standard in his reporting on immigration. Now, Mr. Dobbs is again trading in falsehoods and racist conspiracy theories, questioning President Obama’s American citizenship.
On the July 15 edition of “Lou Dobbs Tonight,” Mr. Dobbs questioned the official certificate provided by the president and the State of Hawaii and complained that President Obama has not made public the “original document.” On his radio program, Mr. Dobbs has repeatedly questioned the president’s fitness for office, demanding he “show the documents” and, at one point, jokingly suggesting President Obama may be “undocumented.”
The truth about the president’s birth is not in dispute. It has been verified by Factcheck.org, among many other serious news organizations, and his official birth documents have been made public. CNN itself has repeatedly reported on the falsity of the claims of the “birthers,” and the network’s esteemed legal analyst, Jeffrey Toobin, recently called those claims “a joke.” As you know, even Mr. Dobbs’ frequent fill-in anchor, Kitty Pilgrim, debunked the birthers on the July 17 edition of Mr. Dobbs’ own CNN show. The fact that Mr. Dobbs suggests otherwise on CNN — while real CNN reporters tell the truth — is both deplorable and an embarrassment to all serious journalists.
As he has in several other instances, Mr. Dobbs, in taking up the birthers’ claims, is adopting an unsubstantiated conspiracy theory that originated on the radical racist right. As Gawker.com has reported, this particular conspiracy theory was first developed by an open anti-Semite and circulated by right-wing extremists who cannot accept the fact that a black man has been elected president of the United States. Among its adherents was neo-Nazi James von Brunn, the alleged murderer of a security guard at the U.S. Holocaust Memorial Museum in Washington, D.C., this June. Von Brunn had helped spread the birthers’ claims on the Internet and attacked the “dishonest & conspiratorial Media” for not taking them up.
This is not the first time Mr. Dobbs has pushed racist conspiracy theories or defamatory falsehoods about immigrants. We wrote you in 2007 to bring to your attention his utterly false claim that 7,000 new cases of leprosy had appeared in the United States in a recent three-year period, due at least in part to immigrants. (The real number, according to official statistics, was about 400. Mr. Dobbs took his spurious information from the late right-wing extremist, Madeleine Cosman.) In addition, Mr. Dobbs has reported as fact the so-called Aztlan conspiracy, which claims that undocumented Mexican immigrants are part of a plot to “reconquer” the American Southwest. He has suggested there is something to a related conspiracy theory that claims the governments of Mexico, the United States and Canada are secretly planning to merge into the “North American Union.” He has falsely claimed that “illegal aliens” fill one third of American prison and jail cells. And Mr. Dobbs has routinely disparaged, on CNN’s air, those who have had the integrity to point out the falsity of these and similar claims.
Respectable news organizations should not employ reporters willing to peddle racist conspiracy theories and false propaganda. It’s time for CNN to remove Mr. Dobbs from the airwaves.
Sincerely,
J. Richard Cohen
President
————————-
http://www.splcenter.org/get-informed/news/splc-president-calls-on-cnn-to-remove-lou-dobbs-from-air-cites-newsmans-support-fo

SPLC has been fighting Lou Dobbs since back in 2007 and had nothing to do with the birth issue. They just used the birth issue to destroy Lou Dobbs.


Bill O’Reilly: Southern Poverty Law Center Got Lou Dobbs Fired?  O’Reilly takes on SPLC President J. Richard Cohen for their responsability in getting Dobbs fired. The SPLC is guilty.

But now Dobbs is out to get Obama for good, and finish up this mess and put America back on the track of truth. SPLC won’t stop him this time. Indeed,  the SPLC has been sentenced for inciting murder in the shooting of a security guard following SPLC putting the address of a right-wing organization on their website’s “Hate groups-map of America.” They call it the “Hate Map”.
But it’s a tribute to their own hatred.
 Indeed, they don’t say that they’re the real haters, in all this. The SPLC are the Hitlerian haters. They’re the ones who were sentenced in Colorado by Judge Tafaya, in SPLC VS Delgaudio, in Jan. 2013. They’re the dangerous ones, not anyone else.
http://www.wnd.com/2013/01/leftist-lawyers-accused-of-exposing-opponent-to-danger/

Obama Naked Pics: Was His Mom The Naked Woman On The Alter? You Decide

Wednesday, August 21, 2013 2:19


Rumours have been circulating that this picture is allegedly obamas mother. Anton La vay who is in the picture was the leader of the church of satan and a leading Mind controller of hollywood mk ultra victims. We know Obama’s mom appeared in naked pictures which amazingly NOT ONE MAINSTREAM PUBLICATION IN THE WHOLE WORLD HAS HIGHLIGHTED OR PUBLISHED. THIS ALONE WOULD BARR ANYONE FROM SUCH A HIGH OFFICE. if they can cover up the biggest sex scandal in the world then have a look at the two pictures and contrast and compare ask yourself IS THIS OBAMA’S MOM IN BOTH PICTURES



more http://countdowntozerotime.com/2013/08/20/she-is-not-psychotic-randy-jackson-infuriates-debbie-rowe-as-he-claims-that-his-niece-paris-is-being-kept-in-a-psychiatric-hospital-for-no-reason/

Hedge funds, insider traders begin dumping Monsanto stock as reality of GMOs sinks in across Wall Street

Hedge funds, insider traders begin dumping Monsanto stock as reality of GMOs sinks in across Wall Street

The 10 false assumptions of modern science (and how to set science free with new paths to discovery)

The 10 false assumptions of modern science (and how to set science free with new paths to discovery)

Must Read: Glimmerglass Intercepts Undersea Cable Traffic for Spy Agencies

Source: CorpWatch
Glimmerglass, a northern California company that sells optical fiber technology, offers government agencies a software product called “CyberSweep” to intercept signals on undersea cables. The company says their technology can analyze Gmail and Yahoo! Mail as well as social media like Facebook and Twitter to discover “actionable intelligence.”
Could this be the technology that the U.S. National Security Agency (NSA) is using to tap global communications? The company says it counts several intelligence agencies among its customers but refuses to divulge details. One thing is certain – it is not the only company to offer such capabilities – so if such data mining is not already taking place, that day is not far off.
“Revolutions in communications technologies are usually followed by revolutions in collection capabilities,” Jeffrey Richelson, a senior fellow at the National Security Archives and the author of the definitive guide to the U.S. intelligence agencies, told CorpWatch.
The recent leaks by whistleblower Edward Snowden to the Guardian newspaper specifically suggest that the NSA is tapping undersea cables although no details on the specific technology have yet been published. Notably Snowden has revealed evidence that the NSA paid £15.5 million ($25 million) in 2009 to “radically” upgrade a listening station operated by its U.K. equivalent – the Government Communications Head Quarters (GCHQ) in Bude, north Cornwall, England, where many of the cables surface.
If GCHQ and the NSA installed Glimmerglass’s commercial optical fiber switching technology on the undersea cables to tap the torrent of data that crosses the Atlantic, they will be able to pair it up with CyberSweep to make sense of the information, according to advertising claims made in a treasure trove of documents on dozens of surveillance contractors released by Wikileaks.
Privacy experts say that if the NSA is using this Glimmerglass technology, it will prove whistleblower Edward Snowden’s claim that the government is collecting everyone’s communications, regardless of their citizenship or innocence.
Vanee Vines, a spokesperson for the NSA, declined to comment to CorpWatch on either Glimmerglass or the tapping of the undersea cables. Glimmerglass officials did not return multiple email and phone calls.
CyberSweep

On the Glimmerglass website, the company claims that CyberSweep can process optical signals to “extract the data source format” and aggregate the data for “probes” to uncover “actionable information from the flood of data on persons of interest, known and unknown targets, anticipated and known threats.”
More details on what Glimmerglass claims CyberSweep can do are explained in “Paradigm Shifts” – a confidential 18 page Powerpoint presentation made in 2011 by Jim Donnelly, the Glimmerglass vice president of North American sales. The document was released by Wikileaks as part of the Spy Files series in December of that year.
On page five of the presentation, Glimmerglass notes that CyberSweep is an “end to end cyber security solution” that can “select, extract and monitor” all “mobile and fixed line data, voice and video, internet, web 2.0 and social networking” with “probes and sniffers.” On the following page, it notes that its product can be used at “submarine landing stations” – a reference to the locations where the undersea cables are connected to terrestrial systems.
On page eight, Glimmerglass provides specific examples of what it can gather – like Gmail, Yahoo! Mail as well as Facebook and Twitter. Over the next four pages it offers screenshots of these capabilities.
One display of what CyberSweep is capable of is a visual grid of Facebook messages of a presumably fictional person named John Smith. His profile is connected to a number of other individuals with arrows indicating how often he connected to each of them. Each individual can be identified with images, user names and IDs. Another pane shows the detailed chat records. Yet another graphic shows Facebook connections between multiple individuals, presumably to identify networks.
A third graphic is a grid of phone calls made by an individual with a pane that allows an operator to select and listen to audio of any specific conversation. Other images show similar demonstrations of monitoring webmail and instant message chats.
Where is this product being used? In a product video on the company website, Glimmerglass states that their optical data management products have been used by the U.S. intelligence agencies for the last five years. The video specifically mentions data transmissions from Predator drones and well as the tapping of undersea fiber optic cables, but it does not go into any details.
“The challenge of managing information has become the challenge of managing the light,” says an announcer. “With Glimmerglass, customers have full control of massive flows of intelligence from the moment they access them.”
The description mirrors the technology described in documents provided by Edward Snowden to the Guardian newspaper.

Collecting All the Signals

The GCHQ AdvantageWhy go overseas to collect the data? Well, there are legal obstacles in the U.S. to collecting phone calls made by U.S. citizens – such a program would violate the fourth amendment to the U.S. constitution that protects individuals against invasion of privacy. (Exceptions are granted for communications with foreigners if government agencies suspect terrorism under a 1981 presidential executive order, although they still need approval of the U.S. Attorney General). But given that U.S. laws stop at the border, foreign spy agencies like GCHQ can legally pick up and store any and all information from data that travels outside the country, suggest reporters at the Guardian newspaper.
“We know the NSA is forbidden from spying on American citizens; in the case of (Faizal) Shahzad (the would-be Times Square bomber in New York), this question remains – was GCHQ doing it for them?” ask the Guardian reporters, noting that the GCHQ now has the “opportunity to build such a complete record of someone’s life through their texts, conversations, emails and search records” allowing it to make a “unique contribution to the NSA in providing insights into some of their highest priority targets.”
In a document released by Snowden, Lieutenant General Keith Alexander, the NSA director, was quoted on a June 2008 visit to an intelligence facility in the U.K., saying: “Why can’t we collect all the signals all the time? Sounds like a good summer project.”
According to the leaked documents, a three year trial project was soon set up with a $25 million grant from the NSA to “radically enhance the infrastructure” at the Cyber Development Centre in Bude, Cornwall, as well as potentially at other sites like the GCHQ base in Cheltenham.
Probes were installed on 200 undersea cables and in the fall of 2011, a project code-named Tempora was launched with the help of NSA analysts who came to help at the Bude site. At least seven companies took part in the project -British Telecom, Global Crossing, Interoute, Level 3, Viatel, Verizon Business and Vodafone Cable – according to the German paper Suddeutsche Zeitung, all of whom manage major undersea cable systems.
Under Tempora, a three day buffer of global internet traffic was held at any given time – totaling some 600 million “telephone events” a day or as much as 21 petabytes (million gigabytes) of data. While much of it was deleted through a process called Massive Volume Reduction for reasons of space, the meta-data (such as the details of who called whom, and when, but not the content) was held for as long as 30 days.
Snowden’s documents suggest that GCHQ now “produces larger amounts of metadata than NSA” which was being analyzed by 300 U.K. analysts in addition to 250 NSA analysts, as of last May. The U.K. analysts were encouraged to dig deep since they had a less onerous oversight regime compared to the U.S.
“Over the last five years, GCHQ’s access to ‘light’ (has) increased by 7,000%,” a Tempora official is quoted as saying in another Powerpoint document cited in the Guardian. “We will have exploited to the full our unique selling points of geography, partnerships, the UK’s legal regime and our skilled workforce.”
A recent interview of a “senior intelligence official” by the New York Times confirmed that “the N.S.A. is temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border” by making a “clone of selected communication links.” The official did not state where the communications were being intercepted.
Optical Tapping
It so happens that the undersea cables are an extremely convenient place to collect all the signals all the time: An estimated 90 percent of trans-border telecommunications data travels along the transatlantic cables, even if they are merely connections between an individual in Asia and another in Africa, especially if they are using services like Skype.
These cables date back in history to 1858 when they were first installed to support the international telegraph system, with the British taking the lead to wire the far reaches of its empire. Today a multi-billion dollar shipping industry continues to lay and maintain hundreds of such cables that crisscross the planet – overhalf a million miles of such cables are draped along the ocean floor and snaked around coastlines – to make landfall at special locations to be connected to national telecommunications systems.
The original cables were made of copper but about 25 years ago, they were replaced by fiber-optic cables. The oldest undersea cable was Trans Atlantic-8 (installed in 1988 by AT&T to transmit data from Tuckerton, New Jersey to Bude, Cornwall) which transmitted data at 280 megabits per second. The latest cables like Yellow/Atlantic Crossing 2 (installed in 2000 and upgraded in 2007 by Level Three Communications from Brookhaven, New York to Bude, Cornwall) is capable of transmitting data at an astonishing 640 gigabits per second, which is roughly equal to 7.5 million simultaneous phone calls.
In order to make sure that data and voice are transmitted quickly and accurately across the world even if cables break or equipment fails, cable companies break the data into separate tiny packets that are dispatched over what they call “redundant fiber optic paths” across the ocean before it is captured and re-assembled on the other side, where it also becomes easy to intercept the data unobtrusively.
This is where Glimmerglass comes in. In September 2002, the company started to ship a pioneering technology to help transmit data accurately over multiple optical paths. Their patented “3D Micro-Electro-Mechanical-System (MEMS) mirror array” is composed of 210 gold-coated mirrors mounted on microscopic hinges, each measuring just one millimeter in diameter, etched on a single wafer of silicon.
Each mirror can be individually managed by remote operators anywhere in the world to capture or bounce the light signals and even more importantly, communicate with the other mirrors to make sure that the rest of the array stays in place, allowing very accurate data transmission. This technology slashed the cost of optical switching by a factor of 100, and the company claims that the switches are very robust with an expected failure rate of once in 30 years.
For telecommunication companies, Glimmerglass offers three hardware racks to handle optical data – the entry level “100” system which can handle as many as 96×96 fiber ports for traffic as high as 100 gigabits per second all the way up to the “600” system which can handle 192×192 fiber ports. It also offers the “3000” system which can hold up to 12 racks.
Another major advantage of the Glimmerglass technology, according to the company, is that operators can “monitor and test remote facilities” at undersea cable landings from a central office and then select any one of multiple optical signals to distribute it to multiple recipients, as well as ability to redirect any signal.
“With Glimmerglass Intelligent Optical Systems,any signal travelling over fiber can be redirected in milliseconds, without adversely affecting customer traffic. At a landing site, this connectivity permits optical layer connections between the wet side and dry side to be re-provisioned in milliseconds from the Network Operations Center with a few clicks of a mouse.”
In another section of the public website the company also promotes a product named Glimmerglass Intelligent Optical System (IOS) that combines the 3D-MEMS switches with CyberSweep into an integrated product that has the ability to “monitor and selectively intercept communications.”
“Service Providers can use the speed and flexibility of the IOS to select and deliver signals to Law Enforcement Agencies (LEA),” add company brochures uncovered by Wikileaks. “The agency gains rapid access, not just to signals, but to individual wavelengths on those signals (and) make perfect photonic copies of optical signals … for comprehensive analysis.”
Glimmerglass does not deny that its equipment can be used to capture global internet traffic by intelligence agencies, in fact it assumes that this is probably happening.
“If you are going to monitor (communications traffic), you need to do much of it optically. But clearly, the massive top of the (intelligence gathering) funnel is coming through optically and you need to manage that,” Robert Lundy, the CEO of Glimmerglass for the last nine years, told AviationWeek in 2010. “If we were (installed) at an operations center of some country, our systems could be used to look at all the international entry and exit points for fiber optics. Once you have extracted the wavelengths, you can dynamically select the ones you are interested in and do it all from a remote location.”
Keith May, his deputy in charge of business development, has gone even further. “We believe that our 3D MEMS technology – as used by governments and various agencies – is involved in the collection of intelligence from sensors, satellites and undersea fiber systems,” May told the magazine. “We are deployed in several countries that are using it for lawful interception.”

Cashing in on the Fiber Boom

Lundy is a graduate of the U.S. Military Academy at West Point, with two degrees from Stanford University in the heart of northern California’s high technology Silicon Valley – a Master’s degree in Electrical Engineering and a Masters in Business Administration – making him well placed to ride the fiber optic boom.
In addition to the right degrees from the right military and technology colleges, Lundy retired as an Army lieutenant colonel after working for the U.S. Army in Europe where his job was managing contracts for “tactical data systems.” He worked as the first general manager of IBM’s wireless business unit and then he helped found three successful start-ups: Wavtrace, a pioneer in manufacturing wireless broadband access systems for business; Optos, a company that builds optical switches for metropolitan networks; as well as Xtera, a company that provides equipment to push data via submarine cables.
Lundy was hired as chief operating officer for Glimmerglass in 2004 when it was a five year old start-up that had patented dozens of 3D MEMS inventions, from its offices in Hayward on the eastern edge of Silicon Valley. Initially the company made its money selling testing and measurement equipment for what Lundy calls their “core optical switch or engine” to a couple of dozen customers in the telecommunications industry like Cisco and Sandvine, but was unable to expand in a major way because of the collapse of the telecommunications industry at the time. (Global Crossing, a major cable operator, had just gone bankrupt, as had WorldCom)
The company branched out to make most of its profits from the software to manage the optical switches, rather than the physical hardware which sold for under $100,000 in competition with similar products from companies like Calient. Glimmerglass quickly landed contracts with AMS-IX, the largest internet exchange in Europe, and with Cable & Wireless in the UK.
Eavesdropping On The Whole WorldAnalysis of bulk telecommunications data to track as yet unknown targets has long been on the NSA wish list. For decades, the agency stuck to following specific individuals because there was no way to capture and analyze everything. In 2000, two rival projects were commissioned to try to collect “all the signals all the time.” Science Applications International Corporation, based in Tyson’s Corner, Virginia, was given a contract to design a collection system called TrailBlazer, while the NSA’s in-house Signals Intelligence (SIGINT) Automation Research Center (SARC) worked on a project called ThinThread.
Trailblazer was eventually jettisoned as unworkable after $1.2 billion had been spent. ThinThread was more successful, according to its proponents, because it was able to selectively process important information and dump the rest. The designers also created controls to anonymize the data collection to avoid violating privacy laws.
ThinThread could “correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other ‘attributes’ that an analyst might find useful in pinpointing ‘the bad guys,’” writes Jane Mayer in the New Yorker magazine, based on her interviews with former NSA staff.
Unfortunately for the SARC team, ThinThread was vetoed by upper management at the NSA in August 2001. But after the September 11, 2001 attacks, the NSA is believed to have returned to the drawing board. Rumor has it that the project was restarted, stripped of any privacy controls.
Recently William Binney, a former NSA staffer who helped design ThinThread and has now become a whistleblower, says that the project was a mistake. “I should apologize to the American people,” Binney who was once the technical director for the 6,000 employees of the NSA’s World Geopolitical and Military Analysis Reporting Group told Mayer. “It’s violated everyone’s rights. It can be used to eavesdrop on the whole world.”
In May 2005, Lundy was promoted to CEO of the company. Four months later – on September 21, 2005 – Glimmerglass Networks was awarded ano-bid contract of $769,600 for telecommunications support equipment for the U.S. Navy Sea Systems Command.
Lundy’s experience managing data contracts for the U.S. Army in Europe would not have hindered the sale. Nor would the deep connections ofGlimmerglass board member Alan Rogers, a retired U.S. Air Force Major General, who had previously been in charge of planning for the Pentagon at the North Atlantic Treaty Organization (NATO) Supreme Headquarters Allied Powers Europe (SHAPE) headquarters in Brussels.
By 2010, Lundy had successfully expanded Glimmerglass’ business by marketing “lawful interception systems” to seven international customers outside the U.S., which appear to include Germany, Israel and the UK as well as two unnamed countries in Asia.
We’ve become as a result a gold standard in the intel and defense community … they’re managing these optical signals so they can acquire, split, move and obtain the necessary information to protect the country,” Lundy told Fierce Telecom, an industry blog, in an interview about global malware threats. “At their undersea landing locations, their major points of presence, on a selective basis they need to acquire and monitor those optical signals … rather than wait to get it off somebody’s, when it hits a PC or cellphone.”
Questions remain as to how well the Glimmerglass product works. Ed Loomis, who worked on the NSA’s ThinThread signal collection and monitoring project in the 1990s, (see box: Eavesdropping On The Whole World) told CorpWatch that the company claim that they can extract “actionable information” would be limited to little more than selecting from a customer-supplied list of phone numbers, IP addresses, and DNS email addresses.
“In order to replicate an analyst’s deductive reasoning process to create an artificial intelligence equivalent requires an immense amount of cooperation by an analyst and an understanding of analytic processes by the programmer,” said Loomis. “Unless the two have acquired years of experience in the intelligence production business, I doubt the ‘target analytics’ is as robust as Glimmerglass would have its clients believe.”
Are Companies Helping Invade Privacy?
Civil liberties experts have denounced the practice of wholesale data collection. “By injecting the N.S.A. into virtually every crossborder interaction, the U.S. government will forever alter what has always been an open exchange of ideas,” says Jameel Jaffer, the deputy legal director of the American Civil Liberties Union.
Such collection would also violate numerous legal principles that safeguard individual privacy. In addition to the fourth amendment to the U.S. constitution, human rights experts say that it would violate Article 8 of the European Convention on Human Rights and Article 12 of the Universal Declaration of Human Rights.
The big questions now are what role did the telecommunication companies play in the data interception and are intelligence contractors like Glimmerglass helping to design the collection and analysis system?
“Tempora would not have been possible without the complicity of these undersea cable providers,” says Eric King, head of research at Privacy International. “What we, and the public, deserve to know is this: Towhat extent are companies cooperating with disproportionate intelligence gathering, and are they doing anything to protect our right to privacy?”
The Glimmerglass brochures can be downloaded here:http://www.wikileaks.org/spyfiles/docs/glimmerglass/55_glimmerglass-cybersweep.html and http://www.wikileaks.org/spyfiles/docs/glimmerglass/275_transparent-signal-access-and-monitoring.html

Government Perfects Crowd-Scanning Facial Recognition Tech for Use by Your Local Cops

Source: BetaBeat
The federal government is perfecting software that will be able to pick suspects out of a crowd through facial recognition, and while we’re sure it’ll prove itself very useful for finding terrorists, it’s kind of horrifying all the same–especially since they might make it available for use by your neighborhood police.
The crowd-scanning project is called the Biometric Optical Surveillance System, the New York Times reports, and will be known as BOSS, because if there’s one thing our government loves more than chipping away at our privacy, it’s hyper-masculine acronyms.
The tech could be used to “help match faces in a crowd with names on a watch list — whether in searching for terrorism suspects at high-profile events like a presidential inaugural parade, looking for criminal fugitives in places like Times Square or identifying card cheats in crowded casinos,” the Times reports.
The documents show that the tech was originally developed for use in Afghanistan and Iraq, but eventually oozed over to the Department of Homeland Security to be used by police stateside.
One specialist says the technology could be accessible in “at least five years,” the Times reports, but is still not reliable enough. We’re guessing that means it could result in suspects being misidentified, which would clearly open up quite the can of worms for anybody who resembles someone on a terrorist watch list.
“Although the system is not ready for use, researchers say they are making significant advances,” the Times reports. “That alarms privacy advocates, who say that now is the time for the government to establish oversight rules and limits on how it will someday be used.”
Okay, we’re waiting.

Creating a secure, private Internet and cloud at the tactical edge

Source: Physorg
Squads of Soldiers or Marines on patrol in remote forward locations often don’t have the luxury of quickly sharing current intelligence information and imagery on their mobile devices, because they can’t access a central server. Troops frequently have to wait until they’re back at camp to download the latest updates. In the meantime, mission opportunities may erode because the information needed at the tactical edge isn’t immediately available.
 DARPA’s Content-Based Mobile Edge Networking (CBMEN) program aims to provide an alternative approach to the top down focus of most , which provide content over a common  from the strategic to tactical level. Unfortunately, the tactical level is still a severely constrained communications environment, and often when deployed, networks may not have connectivity to higher headquarters and servers needed to provide the latest updates from other units in the area.
CBMEN turns this world upside down and starts the content sharing at the individual Soldier or Marine level. If a set of radios or cell phones are disconnected from higher headquarters units, the individuals can still generate and share critical content on their own, significantly improving their common  and the ability to carry out their mission. This concept moves past the Internet’s “hub-and-spoke” paradigm of requiring point-to-point communications to first go through a central server.
DARPA successfully field-tested CBMEN software loaded on Android-based smartphones and Army Rifleman Radios recently at Fort A.P. Hill, Va., marking the completion of Phase 1 of the program.
“CBMEN may not sound revolutionary, because people take server access for granted when cell towers, fiber-optic connections and 4G/LTE networks are so widely available worldwide,” said Keith Gremban, DARPA program manager. “But when that infrastructure is not available, CBMEN technology enables real-time information sharing where it hasn’t been possible before. CBMEN puts secure, private collaboration and cloud storage in your pocket.”
The program aims to make each squad member’s mobile device function as a server, so content is generated, distributed and maintained at the tactical edge where it’s needed. As long as troops are within communication range—whether by radio, cellular, Wi-Fi or other radio frequency devices—CBMEN software automatically replicates and shares updates, causing the tactical cloud to grow and diminish as users move in and out of range of each other. Any connected collection of warfighters can store and share information in many places right at the tactical edge, making the system tolerant of communications disruptions. In essence, CBMEN creates secure frontline cloud storage services that provide content with decreased latency and increased availability.
The field tests proved the concept works and highlighted the potential benefits of real-time . At one point in the testing, two squads on foot patrol came within communication range of each other. One squad had information about a simulated person of interest that the other squad was seeking. The CBMEN software, working in the background on the troops’ mobile devices, automatically transferred the information from the first squad to the other, without the second squad having to ask for it. As the second squad entered a building where the person of interest was, the squad used that information to immediately identify and apprehend its target.
The testing also identified areas that need further development such as enhancing security and improving efficiency of information exchange, which will be the focus of the next phase of the program. The goal is to reduce the number of transmissions required, which would save power, and to also reduce the bandwidth needed.
A key factor that enables CBMEN is the tremendous computing power available in current . “There’s more computing power and memory in my smartphone than the supercomputer I used in college,” Gremban said. “With 64 gigabytes of storage in a single smartphone, a squad of nine troops could have more than half a terabyte (500 GB) of cloud storage. CBMEN taps into that huge capacity.”
Beyond supporting troops on the frontlines, CBMEN technology may also be useful for civilian applications, especially disaster response, where the established communication infrastructure is unavailable or destroyed. Like forward-deployed troops with no established communications infrastructure, firefighters, police, medical personnel, National Guard members and others responding to a major disaster could quickly share imagery and vital information amongst each other.
Phase 2 of CBMEN program kicked off this month to mature the technology. The objective is to demonstrate improved warfighting mission support in a complex joint-content sharing environment between United States Marine Corps and Army networks using both military radios and commercial  Wi-Fi capabilities.
“Content sharing, starting at the tactical edge, is changing the world in the way information can be shared for warfighters who need it most,” Gremban said.