Monday, September 9, 2013

Latest Leak Shows NSA Engaging In Economic Espionage -- Not Fighting Terrorism

the hidden finance "breakaway civ."  & the hidden network for when the "others"  come/attack ??? (off planet "others"  )  ...why do you  think "they"   are RELEASING 3~D Printing ( from the black world)  ..to restore /shore up  our manufacturing base ! ( & dispersing it (3~D ) over  an wide an area as possible ?  ...just like the nazi's did at the end of WWII .   folks something is going on !  ( out there)  ???          this isn't just about "spying"  on the People  :o             dig  connect dot's ,dot's dot's  "they" (elites ) r spooked about somethin ?

Latest Leak Shows NSA Engaging In Economic Espionage -- Not Fighting Terrorism

from the flying-pigs dept

As more and more information about the NSA's global surveillance capabilities emerges through leaks of material obtained by Edward Snowden, the US authorities have been playing the terrorist card heavily. That is, they concede that they have been spying on pretty much everyone, but claim that it was only to fight terrorism, and thus to save lives. In particular, the NSA insists it is not spying on anyone for the purposes of industrial espionage -- here's what it wrote in an email to the Washington Post on the subject just a couple of weeks ago:
"The Department of Defense does engage" in computer network exploitation, according to an e-mailed statement from an NSA spokesman, whose agency is part of the Defense Department. "The department does ***not*** engage in economic espionage in any domain, including cyber."
Despite the screaming asterisks, like many other statements on the subject from the NSA, this one turns out to be untrue, as the Brazlian TV program "Fantastico" revealed on Sunday, drawing on new leaked documents provided by Glenn Greenwald, who lives in the country:
The internal computer network of Petrobras, the Brazilian oil giant partly owned by the state, has been under surveillance by the NSA, the National Security Agency of the United States.



a top secret presentation dated May 2012 is used by the NSA to train new agents step-by-step how to access and spy upon private computer networks -- the internal networks of companies, governments, financial institutions -- networks designed precisely to protect information.

The name of Petrobras -- Brazil's largest company -- appears right at the beginning, under the title: "MANY TARGETS USE PRIVATE NETWORKS."



The name of Petrobras appears on several slides, as the training goes deeper in explaining how data from the target companies is monitored.
The Fantastico article goes on to give more information about the attacks on the company's internal networks, and points out that Petrobras is hardly a terrorist organization:
The yearly profits of Petrobras are over 280 billion reais -- US$ 120 billion. More than the GDP of many countries. And there are plenty of motives for spies to want access to the company's protected network.
Here's one of them:
For example, the details of each lot in an auction [of oil drilling rights] set for next month: for exploration of the Libra Field, in the Bay of Santos, part of the Pre-salt. Whether the spies had access to this information is one of the questions the Brazilian government will have to put to the United States.

Former Petrobras Director Roberto Villa considers this the greatest auction in the history of oil exploration. "It's a very peculiar auction. The auction of an area where we already know there's oil, there's no risk", he says. What no one else should know, Villa says, is which are the richest lots. "Petrobras knows. And I hope only they know." He considers that such information, if stolen, could give someone an advantage. "Someone would have an edge. If this information was leaked and someone else has obtained it, he would be in a privileged position at the auction. He'll know where to invest and where not to. It's a handy little secret."
Once again, the NSA's rebuttal of these claims is weak and unconvincing:
It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing.

We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries' economic policy or behavior which could affect global markets.
Or, you know, it could provide US companies with insights about which were the best lots in the forthcoming auction of seabed areas for oil exploration, or about highly-specialized deep-sea oil extraction technology, in which Petrobas is a world leader. After all, why wouldn't the NSA drop some useful hints about such things to US companies as a way of justifying its huge budget? This latest attack on Brazil's flagship enterprise will make the country's already strained relationship with the US even more difficult. But the Fantastico story on the NSA program, which is apparently called "Royal Net", is about much more than those bilateral relations:
Besides Petrobras, e-mail and internet services provider Google's infrastructure is also listed as a target. The company, often named as collaborating with the NSA, is shown here as a victim.

Other targets include French diplomats -- with access to the private network of the Ministry of Foreign Affairs of France -- and the SWIFT network, the cooperative that unites over ten thousand banks in 212 countries and provides communications that enable international financial transactions.
There are also first details of other, hitherto unknown, spying programs and capabilities:
The NSA presentation contains documents prepared by the GCHQ -- the British Spy agency, from a country that appears as an ally of the United States in spying. The British agency shows how two spy programs operate. "Flying Pig" and "Hush Puppy" also monitor private networks which carry supposedly secure information. These networks are known as TLS/SSL.

The presentation explains how data is intercepted, through an attack known as "Man in the Middle". In this case, data is rerouted to the NSA central, and then relayed to its destination, without either end noticing.
This confirmation that man-in-the-middle attacks are used by the NSA to intercept data, along with detailed information about the high-level economic espionage that is going on, underlines why the Fantastico report is so important, and why it is well-worth reading in its entirety.

Former FBI Lawyer Who Oversaw Years Of Fourth Amendment Violations By The Agency Nominated For Federal Judge Seat

Former FBI Lawyer Who Oversaw Years Of Fourth Amendment Violations By The Agency Nominated For Federal Judge Seat

Feds Had Court Reverse Ban On Warrantless Searches On Americans Because 'We Wanted To Be Able To Do It'

Feds Had Court Reverse Ban On Warrantless Searches On Americans Because 'We Wanted To Be Able To Do It'

Monsanto leading super-secret 'above Congress' Obama trade scheme to outlaw GMO labeling worldwide

Monsanto leading super-secret 'above Congress' Obama trade scheme to outlaw GMO labeling worldwide

Hacktivist Journo Barrett Brown And Lawyers Gagged

HD01-2
On September 4 in a Dallas courtroom, the prosecution and the defense in the Barrett Brown case agreed to a gag order. It prevents Brown, attorneys for both sides, as well as anyone representing them, from talking to the media about his prosecution.
Brown faces over a century in prison for allegedly sharing a hyperlink, concealing laptops, and threatening an FBI agent. The same Special Agent, Robert Smith, testified in court that Brown controlled a share of the publicity surrounding his case. In an ironic twist, the prosecution argued its concern for Brown’s right to a fair trial—and that pro-Brown publicity could rob him of it.
The media-savvy Brown has not been shy about his activities, both before and after his arrest. Beginning in 2007, he created a large persona for himself as a colorful and witty journalist and occasional self-described spokesperson for the hacker collective Anonymous—a banner under which like-minded activists advance internet freedom ideals.
The parties bound by the gag order remain free to talk to the media about matters of public record, such as filings and statements made in open court, and Brown’s lawyers can still communicate about finances with Kevin Gallagher of Free Barrett Brown Ltd., who is raising funds for Barrett’s defense. But that’s it.
An Outspoken Man Sits Mute
The three-hour hearing found Brown in a strikingly atypical role. Known for his loud, gonzo manner—which included publicly labeling himself “Cobra Commander” after a cartoon character and addressing fellow activists by video from bubble baths while drinking wine—Brown could only sit silently behind the defense table in his orange prison garb, stroking his chin and watching the proceedings intently.
Early in the hearing, Special Agent Smith took the stand. Smith, who is nearly as burly as the marshals who led Brown into the courtroom, is the FBI agent Brown allegedly threatened in a series of rambling YouTube videos back in 2012. As Brown looked on, Smith testified on the nature of the publicity surrounding the case and how in his view Brown had “controlled” the media.
Relying on Smith’s access to Mansfield city jail visitor logs, jail phone calls, and media publications, the prosecution painted a picture of Brown as manipulating public opinion from behind bars. For example, Smith described Brown cutting a deal with D Magazine to give them an interview if they published a letter from him. The interview itself was never published, though the letter was.
Again and again, Smith described Brown’s conversations with Kevin Gallagher, the director of Free Barrett Brown Ltd. He cited the duo’s reactions to publicity about Brown—and their plans for getting more publicity. This included working with such journalists as Glenn Greenwald, who broke this year’s National Security Agency stories (based on documents leaked by Edward Snowden) that garnered worldwide publicity.
“Some irony in all this”
In a conversation with WhoWhatWhy after the hearing, Gallagher disagreed with the prosecution’s characterization of the conversations, saying, “The government twisted Barrett’s communications to argue he was manipulating the media. In reality, the media is genuinely interested in him and his case.”
It is logical that defenders of Brown would see his interaction with the media as nothing more than an effort to put his best foot forward. But his critics see it as manipulation.
In pushing for the gag agreement, the US attorney’s office seemed to signal concern that the broader context of Brown’s story could lead jurors to render a “not guilty” verdict—even if they believe he committed the alleged crimes. Such context could include Brown’s celebrated work as a determined researcher of misconduct among intelligence and defense contractors. This work could well resonate both with the public and a jury, particularly in the current moment of heightened interest in NSA spying.
It’s not uncommon for a judge to instruct a jury to ignore a defendant’s extended circumstances. The reality, however, is that a favorable portrayal of Brown as a Robin Hood figure nonetheless could potentially help his case.
In particular, the prosecution expressed concern that the press was discussing matters for which Brown has not yet been charged, such as drug abuse and receiving data hacked by Anonymous. When the defense objected that those matters were not relevant to the charges at hand, the prosecution, as if arguing on behalf of Brown, said such press was highly prejudicial to Brown’s defense and was taking away his right to a fair trial. Highlighting the Kafkaesque nature of the proceedings, the defense snapped back that the prosecution itself was bringing attention to the matters by discussing them in open court.
“There does appear to be some irony in all this,” said District Judge Sam A. Lindsay.
Whispers, heated whispers
QQ截图20130908161806“The government and defense need to play by the same rules,” Judge Lindsay admonished.
The two sides then approached the bench, where the counsel engaged in a whispered discussion with Lindsay. The bench conference lasted twenty minutes and was followed by a twenty-minute recess for the prosecution and defense to hash out an agreement on the gag order.
When Charles Swift, Brown’s lead attorney, negotiated the order with prosecutor Candina Heath by the defense table, their conversation—almost none of which was initially audible—appeared at first collegial but slowly grew heated.
“That’s not what it says!” Swift told Heath at one point, jabbing his finger at the order paper. “The first time Kevin [Gallagher of Free Barrett Brown] writes something, you’re going to pull me in on a contempt! Of course you will!”
The recess was followed by another twenty-minute bench conference and another twenty-minute recess, leaving the public straining to hear the whispers. As Heath left the courtroom, WhoWhatWhy asked her if she was pleased with the gag order. “I can’t comment,” she said. “It would not be appropriate.”
Considering the stakes—civil liberties, the right to public discourse and a remarkably long prospective jail sentence for a nonviolent offense—the courtroom audience was notably small. About 15 people attended the hearing, ranging from members of both the establishment and the alternative press to an older couple who drove six hours to attend out of what they characterized as “public concern.”
Stratfor to the rescue? Background
Brown, the 32-year old author and activist, is awaiting two jury trials in April and May on three separate indictments, which could land him in prison for 105 years:
-       Threatening a federal law enforcement officer (3 felony counts)
-       Obstruction of justice, concealment of evidence (2 felony counts)
-       Access device fraud, trafficking in stolen identification information, and aggravated identity theft (12 felony counts)
It’s those last charges that have raised eyebrows among press freedom advocates who suggest his research was a public service rather than criminal conduct.
To be sure, in his work at ProjectPM, Brown functioned in the role of a journalist, not a hacker, though he did examine emails hacked from the cybersecurity firm HBGary Federal, a military and intelligence contractor.
He had made it his mission to map out the shadowy world of intelligence contracting in the post-9/11 era. Because of that—and his public advocacy for Anonymous—he had been on the federal government’s radar for some time.
When the Austin-based private intelligence firm Stratfor was later hacked in December 2011, emails from that haul were incorporated into ProjectPM’s studies. Brown copy-and-pasted a link to some of the data hacked out of Stratfor to share with other researchers in chat channels.
At the September 4 hearing, Agent Smith testified that the link led to credit card information possibly tied to Stratfor subscribers. The government argues this means Brown was engaging in identity theft and trafficking in stolen credit card data. It is these “crimes” that account for the majority of time Brown faces behind bars.
According to the indictment, Brown did this “on or about” December 25, 2011. But Stratfor founder George Friedman said in two statements on the hack that the FBI had given the credit card companies a list of compromised cards in early December 2011. So the credit card companies would surely have protected the accounts before Brown shared the link some weeks later.
In essence, Brown’s alleged action may not appreciably differ from that of the prosecutors, who also shared the link by putting it in the indictment.
“I can’t comment.”
WhoWhatWhy has been following the Brown case for some time. In February, it chronicled his travails; in May it described his heavyweight legal team and what appeared a fishing expedition by a prosecution seeking chargeable offenses. In August it detailed Brown’s intriguing connections with the late journalist Michael Hastings, whose mysterious death in a suspicious car accident is also being covered by WhoWhatWhy (read here, here, here, here, and here).
The government took note of WhoWhatWhy’s coverage, including articles from the site about Brown in its exhibit list for the hearing, and Agent Smith testified that our report “The Saga of Barrett Brown: Inside Anonymous and the War on Secrecy” discusses Brown’s role with Anonymous.
WhoWhatWhy will continue to cover Brown’s case—albeit now with limited comment from his newly (and consensually) gagged counsel. Charles Swift, the attorney spearheading Brown’s defense, told WhoWhatWhy the gag order met his objective of protecting Brown’s right to speak and publish from jail– on matters not relating to his case.
But when we asked why the defense agreed to the order rather than present evidence and arguments to the court in defense of Brown’s continued ability to express himself, he told us, “Under the terms of the order, I can’t comment.”

WoW! Hidden Image Exposed in The Last Supper Painting! (Video)

Sunday, September 8, 2013 10:29

By Susan Duclos
In a video by DAHBOO77, looking at the famous Da Vinci, “The Last Supper” picture, mirroring and inverting the picture, not the way the movie The Da Vinci Code did it, but the correct way, inverting it right down the middle, you get a hidden image that is unbelievable.
DAHBOO77 calls it “jaw dropping,” and it is.
[Update] In response to the video below, LogicBeforeAuthority created a video titled ‘The Last Supper’ Satanic Images Revealed- I write about that video here.
 



 

Bigger Than Watergate: Documented White House False Flag Terrorism & Brand New Evidence From 9/11

Sunday, September 8, 2013 18:53

The latest video below from Russia Today and The Truthseeker is earth shattering news. Calling this latest bombshell report ‘bigger than Watergate’, the United States government had regular meeting with Al-Qaeda’s leader and now we learn of ‘documented White House false flag terrorism’. When we throw brand new evidence from 9/11 into the mix, we have a can’t miss report. This video is now starting to go viral on YouTube. It’s time to take the ‘red pill’, America. This comes straight from CIA and White House whistleblowers.

Seek truth from facts with Bob McIlvane, whose son Bobby was killed in the lobby of the North Tower; NATO’s Secret Armies author Dr. Daniele Ganser; Elizabeth Woodworth of Consensus911; Journal of 9/11 Studies co-editor Dr. Graeme MacQueen; Dr. Kevin Barrett author of Questioning the War of Terror, civil engineer Jon Cole of Architects and Engineers for 9/11 Truth; and Rachel Maddow of The Rachel Maddow Show.

Published on Sep 8, 2013

MUST SEE! Syrian Christian woman wipes the floor with Senator John McCain at a Townhall meeting

MUST SEE! Syrian Christian woman wipes the floor with Senator John McCain at a Townhall meeting

Yemeni child bride, eight, dies of internal injuries on first night of forced marriage to groom five times her age

man is this what yer "Relig"  teaches you !

Yemeni child bride, eight, dies of internal injuries on first night of forced marriage to groom five times her age

  • 'Rawan' died in the tribal area of Hardh, which borders Saudi Arabia
  • Activists have called for groom and family to be arrested over her death
  • One activist: 'Groom is an animal who deserved to be punished severely'
By Matt Blake
|
An eight-year-old child bride has died in Yemen of internal bleeding sustained during her wedding night after being forced to marry a man five times her age, activists have claimed.
The girl, identified only as Rawan, died in the tribal area of Hardh in northwestern Yemen, which borders Saudi Arabia.
Activists are now calling for the groom, who is believed to be around 40 years old, and her family to be arrested so they can face justice in the courts.
Rural: The girl, identified only as Rawan, died in the tribal area of Hardh in northwestern Yemen, which borders Saudi Arabia
Rural: The girl, identified only as Rawan, died in the tribal area of Hardh in northwestern Yemen, which borders Saudi Arabia

They say arrests would help put a stop to the practice of marrying very young girls to older men in the impoverished region.

 
Angry Man, a blogger, posted that the man was 'an animal who deserved to be punished severely for his crime'. Child bride: The practice of marrying young girls is widespread in Yemen and has attracted the attention of international rights groups seeking to pressure the government to outlaw child marriages
Child bride: The practice of marrying young girls is widespread in Yemen and has attracted the attention of international rights groups seeking to pressure the government to outlaw child marriages

'All those who supported such a crime should also be punished,' he added.
Another blogger, called Omar, wrote: 'Rawan’s family members are not humans. They do not deserve to have children.'

CHILD BRIDES: A GLOBAL ISSUE

Jewish girl wears golden ceremonial dress and gold and silver jewelry necklaces traditionally worn by Jewish brides in Yemen
Despite numerous  campaigns from many of the world's largest charities and NGOs, the issue of child brides remains a global concern.
There are currently some 57.5 million child brides across the world, 40 per cent of which married in India.
Forty-six per cent of women in India were married before the age of 18, according to the National Family Health Survey-3.
Meanwhile, in Africa, 42 per cent of girls were married before turning 18 compared to 29 per cent in Latin America and the Caribbean.
But the number of child brides is estimated to rise to 140 million by 2020 if current trends continue, 18.5 million of which will be under 15 years old, analysts warn.
Statistics show that girls living in poor households are almost twice as likely to marry before 18 than girls in higher income households.
And girls younger than 15 are also five times more likely to die in childbirth than women in their 20s.
But another blogger, called 'Sad', appeared more sympathetic to the custom. He wrote: 'Her family and her groom could have waited for some time before having this marriage,' Sad said.
'It was not fair at all and the marriage should not have happened even if some tribes believe that it is a good custom.'

The practice of marrying young girls is widespread in Yemen and has attracted the attention of international rights groups seeking to pressure the government to outlaw child marriages.
Yemen's gripping poverty plays a role in hindering efforts to stamp out the practice, as poor families find themselves unable to say no to 'bride-prices' that can be hundreds of dollars for their daughters.
More than a quarter of Yemen's females marry before age 15, according to a report in 2010 by the Social Affairs Ministry.
Tribal custom also plays a role, including the belief that a young bride can be shaped into an obedient wife, bear more children and be kept away from temptation.
In September 2010, a 12-year-old Yemeni child-bride died after struggling for three days in labour to give birth, a local human rights organisation said.
Yemen once set 15 as the minimum age for marriage, but parliament annulled that law in the 1990s, saying parents should decide when a daughter marries.
  

The Ultimate False Flag Event

we got some difficult days ahead (ass pipes & their "elites"  handlers ARE gonna crash U.S. )   Americans   i am so :)  2 spent this brief moment in time together wit you my friend               Time to make America what it ought 2 b  :) r             

The Ultimate False Flag Event

As November 13th approaches, it is my sincere hope that America can place so much attentionbank collapse on the “terror attack drill” on our power grid, that is causes the globalists to delay their plans to embed a false flag event inside of this drill, as we have seen so many times before (e.g. 9/11, 7/7 bombings, Boston Marathon Bombings).
However, it is important to note that not only does the potential exist for a false flag terrorist drill on 11/13 which could result in a collapse of the power grid, I think it is likely that that a more sinister false flag attack will be hidden within the overt event of a major power blackout across this country. Specifically, I am speaking about a banking collapse in which the effects of the event are not immediately felt given the chaos in the period immediately following the grid collapse. An economic collapse is coming and the banks have been preparing for this eventuality for over a year.
This article is not written for the novice who is just waking up. This lengthy article is written for my colleagues and those that fully understand how high the stakes truly are. It is likely that we have reached the end of the road as far as the Republic is concerned and I believe that the following paragraphs accurately describe how this is going to be accomplished.

The Petrodollar Is In Trouble

On one hand, the globalists have made no secret of the fact that they seek to introduce a global currency to the world. However, that time has not yet come for the roll out of a global currency because the United States military is not done being used as the world’s policeman for the global elite as they are still attempting to consolidate their personal power and control in such places as the Middle East by eliminating all political and economic resistance to their dastardly plans. Therefore, in the interim, the Petrodollar must be preserved because without a sound dollar, the US military will be limited in its ability to impose the elite’s will upon humanity. The banks and their subsidiary corporations must control all oil and as much property as possible prior to any collapse being implemented because when the planned economic collapse is over and the central bankers control the lions share of the world’s assets, they can dictate terms to humanity.

The Short Term Goal of Preserving the Petrodollar

In order to preserve the Petrodollar, Iran must be made to stop selling its oil for gold to the Russians, Chinese and the Indians and these nations must be forced to return to the Federal Reserve to purchase American dollars before purchasing oil. To that end, the US has attempted to overthrow Assad in Syria as a first step which will culminate in attacking and occupying key Iranian oil fields. Yet, Assad has proven resourceful. To accomplish the goal of deposing Assad, the US military must be brought into the conflict in order to break the stalemate between the CIA backed al-Qaeda (Syrian) rebels and Assad’s forces. From the globalist perspective, Syria must be conquered as a precursor to subjugating Iran and that is not going so well.
Short of unseating Assad, the establishment needs an immediate game changing event to break in order to break the stalemate in Syria, thus the false flag chemical weapons attack was perpetrated in Damascus and Assad was falsely blamed and all of this is being done as a pretext to US invasion. However, the globalists have played this hand too often and the world is not buying what Obama and Kerry are selling.
If consensus is not offered by Congress to go ahead with the attack on Syria, a Plan B must be quickly initiated which consists of perpetrating a false flag attack within the United States, and subsequently blaming Syria and Iran, thus providing justification for retaliation against the two nations.
Subsequently, no approval from Congress will be required because the United States will be under martial law resulting from the false flag attacks.

Summary of the Elite’s Position

bank runIn summary, the elite want a global currency, but they need to consolidate their holdings in preparation of a planned economic collapse. To accomplish this goal, the central bankers need to control the oil fields and temporarily keep the dollar alive. Syria and Iran must be conquered to that end. Mark my words, Saudi Arabia is next on the central bankers invasion list.
A false flag event, or event(s) could serve to move Congress towards war if Syria and/or Iran can be shouldered with the blame. If the central bankers can subjugate the entire Middle East with the US military, the dollar and the rest of the world’s fiat currencies will be collapsed when the last drop of oil is obtained and all military and political opposition is eliminated. Following that, a world currency will be forced upon the people of the world. It will likely be digitized and to buy and sell, you will have to take an implantable chip. I wished I was saying the latter statement in jest, I am not.
If Obama does not get Congress’ permission to attack Syria, look for Obama to take the false flag route in order to do an end run around Congress. Although I do not discount any of the false flag scenarios which are surfacing as I write these words, I will focus exclusively on the 11/13 blackout.

The Banks Have Been Preparing for a Collapse Since Last Year

If the banks had any notion that a massive power outage was coming, they would seek to minimize their exposure by severely limiting the amount of loans they had in circulation and they would continue to acquire as many hard assets as possible (e.g. houses and shopping centers) and they would do so at breakneck speed. To limit the amount of capital in circulation, subsequent lending practices would make loaning money next to impossible. Further, the banks would seek to act upon a newly granted legal right to seize control of deposits once the blackout came. Well, this is exactly what we see happening on all points.

The Effects of a Power Grid Take Down On Banking

A power grid take down would absolutely cripple the banking system since nearly all banking transactions are electronic. To minimize exposure to the banks, the Federal Reserve Chairman, Ben Bernanke, has moved to severely limit the amount of loans that are in the system. An power grid shut down could potentially prevent the banks from ever getting their investments back from lenders because an economic crash could prevent the banks from recovering even a small percentage of their losses because much of the collateralization of outstanding loans would be destroyed under such a set of circumstances. Subsequently, before banks will be targeted for a take down, lending must be brought to a crawl and that is exactly what has been happening for the past two years and the trend curve towards banks not lending money is exponentially growing.
MERS Robo signers
MERS Robo signers
I also believe the anticipation for a banking shutdown explains some of the abhorrent behavior by the five megabanks as they move to steal as many houses and properties as possible by creating a robo signing MERS system which produces so many mortgage notes for one property that the banks stand a good chance, in court, of confusing a judge and thus stealing millions of properties. These heinous practices have been fully exposed by people such as Dave Kreiger of Clouded Titles. Many State Attorney Generals’ have brought law suits against the banks for these mortgage practices, but nobody has gone to jail because to the establishment, this is acceptable behavior.
The coming banking collapse also explains why the Federal Reserve is printing themselves $40 billion dollars in Mortgage Backed Securities, every month, so that they can buy of up distressed properties from money printed out of thin air. When the collapse comes, he who holds the most hard assets, wins! A fiat currency is not a hard asset, a house and a shopping mall are.
To soften the blow of the banking collapse that is coming, America is in the final days of the last great American garage sale as the Federal Reserve and her key banks are literally stealing as much property as they can. The Federal Reserve has positioned themselves to literally own nearly every piece of property following a banking collapse and most American homeowners will be turned into serfs under the control of the banks after the coming economic collapse. What will emerge on the other side of a collapse will be a neo-feudal fascist police state surveillance grid where individual liberty and private ownership of anything will be gone forever!

Why the Military Option is Preferable

At this point, some are wondering why the globalists would prefer the military option in the Middle East as compared to perpetrating a banking collapse within a contrived black out. The answer is as old as central banking itself. The globalists love war for a number of reasons. First, war is the biggest money making “racket” on the planet. And secondly, any possible military and political opposition to the establishment to a New World Order will be wiped out through military conquest. Finally, I truly believe that the sociopaths comprising the central banking cartel are completely insane and they literally enjoy the power rush they will get from killing millions, if not billions of innocent people. When one serves Satan, one loves to enjoy the death and destruction associated with traveling on the highway to hell.

The Real False Flag Event Is Embedded Within the Primary False Flag

A grid shut down and the imposition of martial law is certainly a plausible goal of the elite. However, if a successful war cannot be prosecuted against Syria and Iran, the Petrodollar will fail and will fail fairly quickly. A grid shutdown, accompanied by a bank failure would allow the international banking cartel to abandon the dollar and issue a new world currency that they control. You see, it would not just be the US that would experience a banking collapse, it would be the whole world because the collapse of the dollar will collapse every other currency except for Gold. And didn’t the Goldman Sachs brokers lead a sell-off of Gold from their investors, while at the same time, the elite commenced a gold buying program at rock bottom prices this last spring? What did Goldman Sachs know?

More Evidence of a Planned Banking Collapse

There is additional evidence to support the assertion of a coming banking collapse which comes from the top of the international banking institutions, the Bank of International Settlements (BIS). There are new standards which have been introduced called the Base III accord, which severely limits lending. The public cover story states that these policies will soften the blow to banks resulting from “severe” economic events such as a banking collapse. In this case, I contend that the severe economic events are already planned and the banks are storing capital and money in anticipation of a banking collapse.
In support of BIS’ policies which severely restrict lending, Bernanke recently stated that “With these revisions to our capital rules, banking organizations will be better able to withstand periods of financial stress, thus contributing to the overall health of the U.S. economy.” Bank of America, Bank of New York Mellon, Citigroup and JP Morgan Stanley are among the banks that Bernanke stated must raise 4.5 billion dollars by 2019 in order to remain solvent and he called for bank loans to be severely limited in the interim. Bernanke further stated that until that goal is reached, banks need to be cautious about lending. What? The banks only have to raise 4.5 billion dollars to reach solvency before resuming normal lending? The amount that the banks need to raise, is ridiculously low! This is clearly a cover story for public consumption which is designed to limit lending in anticipation of a banking collapse.
$4.5 Billion Dollars.....
“Only $4.5 Billion Dollars…..
Further, the Bank of International Settlements (BIS) and the Basel Committee on Banking Supervisors (BCBS) has applied the underlying pressure on US banks to liquidate soft assets in order to appease global markets to not loan money. The European Central Bank (ECB) is clearly preparing for the complete financial collapse of fiat currencies across the planet. Joining the Federal Reserve and the BIS in this plot to collapse the currencies of the world is the Bank of England. Bank of Canada, the Swiss National Bank and the Bank of Japan.

Why Is the Currency Collapse Being Embedded in the 11/13 Blackout?

Uncle Ben
Uncle Ben
In this era of mistrust in which Obama enjoys only a 9% approval rating, what would happen across the country if on a Friday, Ben Bernanke announced that the banking system had collapsed, but would reopen on Monday? If bank customers did not have access to their full bank accounts on the following Monday, DHS might have to use some of that 2.2 billion rounds of ammunition that they have acquired in the past several months in order to restore order.The elite would like to avoid this kind of a confrontation at this point in time.
Instead, if a “blackout” were to occur which supposedly destroyed bank records in a bogus EMP attack, the banks would “collapse”, and the collapse would hardly be noticed in the immediate aftermath. And make no mistake about it, the banks will not truly collapse, they will come to a soft landing. Your resources will be the only ones that will be collapsed as this will be the biggest wealth transfer in the history of the planet and this event will make the bailouts seem miniscule by comparison.
A blackout and the ensuing chaos would be the perfect time to pretend to collapse the banks and not risk incurring the wrath of the public. Amid the extreme social unrest accompanying a massive blackout, the banking issue would be secondary in importance by comparison because people would be on the streets looking for food by the third day following the blackout. Looting, rioting and starvation would rule the day. The amount of computer digits in one’s bank account, would become a very secondary issue. 
In the midst of the chaos and the violence, martial law would imposed and America would never be the same.

In the Aftermath of the Blackout

At the end of the day, the world’s central banking cartel will not allow the dollar to collapse due to a global shift away from the Petrodollar. If there is a going to be a collapse of the dollar, these banksters will control the collapse so that they may control what comes in the place of the dollar.
Certainly, the bankers would love to continue to use the US military to subjugate the Middle East and its resources. However, if invading Syria and Iran are not cost effective, and American and international public opinion continues to run against this action, a blackout followed by a banking collapse would constitute an effective Plan B. The Petrodollar would be gone and a brand new currency would be unveiled in its place following a planned collapse. And after the United States is placed under strict martial law following the blackout and banking collapse, a war could be commenced to subjugate the Middle East because domestic opposition would have also been suppressed.
What follows most banking collapses? Banking collapses are usually followed by a reformed or revamped currency in which bank customers would be compensated by offering pennies on the dollar. I believe that this strategy was beta tested twice in the past couple of years in order to gauge the public’s reaction to being ripped off. When MF Global was deliberately collapsed and John Corzine stole over a billion dollars of customer segregated accounts, the resolve of the account holders was tested. Currently, only pennies on the dollar are being paid back to the MF Global customers. Also, in September of 2012, in a very similar case to MF Global, the Illinois Seventh Circuit Court of Appeals ruled that once a depositor puts their money in the bank, the money belongs to the bank. There was no rioting, very little mainstream media coverage and people are still fighting to get pennies on the dollar. The Greeks make Americans look like a bunch of pansies as they at least turned over a few cars in their expression of frustration at the thieving ways of the central banking cartel. In short, the central bankers know they can get away with stealing from the public.

Subjugation As Easy As 1 – 2 – 3

The elite have a very simple plan for subjugating this country. Here is the elite’s three step plan:
1. Power grid collapse on 11/13 lasting five to seven days.
2. The banking system collapses within the blackout event  and this event will almost go unnoticed in the midst of the chaos.
3. Martial law is rolled out and all political opposition is swiftly dealt with.
Once this three step plan is implemented, it would take an act of God to turn this country around. And, some feel that this country is already under God’s judgment and His help will not be forthcoming.
Any street fighter will tell you the importance of getting in the first punch. We have that opportunity in a very narrow window of time to land that first punch. If these events were to be exposed to the masses in the coming days and few short weeks we have left, and we were to be relentless in calling attention to what is unfolding, perhaps we could temporarily push these events back. We would not be able to stop it, but we might delay the onset of humanity’s darkest days. However, if we think we can wait until we are in crisis to finally fight for our lives, our liberty and our property, we will be sadly disappointed and soundly defeated. This is what Hitler and Stalin dreamed about doing. As my friend Jim Marrs would accurately say, the Fourth Reich is being unveiled as we speak.
What will follow the unveiling of the Fourth Reich is frightening and that will be the topic of the next article in this series. 

Buyer Beware: “Extreme” Genetically Engineered Synbio Vanilla Coming to Natural Products


synbio vanilla to replace real vanilla in natural productsAs a consumer, I do depend on the term “natural” to identify products I feel comfortable feeding my family. I do read labels. Even my kids read labels.  I trust in ingredients I can pronounce and have heard of before.  Vanilla, is obviously, one of those ingredients that gives me assurance over the synthetic, gluten containing vanillin.

Now, the FDA is poised to approve an “extreme” genetically engineered version of vanilla called Synbio that could be allowed in products labeled “natural”.

What is Synbio Vanilla?


Friends of the Earth (FOE) explains:
A new ingredient straight out of a petri dish is about to enter the global food supply in many of our favorite foods including ice cream. And like many of the products of genetic engineering, it won’t be labeled — instead it is being marketed as “natural”. But this ingredient is anything but “natural”.
This product, synbio vanilla,  is made via an extreme form of genetic engineering called synthetic biology,  and is on its way to market should the FDA approve it this next year.  Synbio vanilla was designed to replace natural vanillin flavoring from vanilla beans, which are grown by small family farmers in rainforests across the globe. Instead, synbio is made in labs using synthetic DNA and reprogrammed, genetically engineered yeast. This new synbio vanilla doesn’t come from a plant at all but will be labeled as “natural” on product labels.
Similarly to genetic engineered products, synbio vanilla has been virtually untested, unregulated, and is anything but “natural” or “sustainable”.
I do disagree with FOE that vanillin is natural, considering it can be made from lignin, “a byproduct of paper pulp manufacture” and not sourced in a vanilla bean at all.
According to Wikipedia:
Natural “vanilla extract” is a mixture of several hundred different compounds in addition to vanillin. Artificial vanilla flavoring is a solution of pure vanillin, usually of synthetic origin. Because of the scarcity and expense of natural vanilla extract, there has long been interest in the synthetic preparation of its predominant component. The first commercial synthesis of vanillin began with the more readily available natural compound eugenol. Today, artificial vanillin is made either from guaiacol or from lignin, a constituent of wood, which is a byproduct of the pulp industry.
Natural vanilla is native to Mexico and is actually the pod of an orchid.  It is the second most expensive spice (saffron is first) because it is so labor intensive to produce.   Thus, Evolva, Synbio Vanilla’s producer, and the International Flavors and Fragrances is hoping the FDA labels this new product “Generally Regarded As Safe” requiring minimal testing and self-evaluation.

Can we trust Evolva to self-evaluate the safety of its extreme genetically engineered Synbio Vanilla?

Synbio Vanilla will be the ”first major use of synthetic biology in our food”.  It could be found in “natural” ice cream, cookies, cereals, soymilks, etc.

What is synthetic biology?

All living organisms contain an instruction set that determines what they look like and what they do. These instructions are encoded in the organisms’s DNA — long and complex strings of molecules embedded in every living cell. This is an organism’s genetic code (or “genome”).
Humans have been altering the genetic code of plants and animals for millennia, by selectively breeding individuals with desirable features…
More recent advances however, have enabled scientists to make new sequences of DNA from scratch. By combining these advances with the principles of modern engineering, scientists can now use computers and laboratory chemicals to design organisms that do new things—like produce biofuels or excrete the precursors of medical drugs. To many people, this is the essence of synthetic biology.
Below we have listed several of the more commonly referenced definitions:
“Synthetic biology is a) the design and construction of new biological parts, devices and systems and b) the re-design of existing natural biological systems for useful purposes.”
If you are opposed to Synbio Vanilla, you can take action here.

Synthetic biology does not belong in our food supply!

Image:  vanilla stick with flower on Bigstock 

Most Internet Users Demand Anonymity, Admit It's Not Going to Happen

Photo via Harshad Sharma/Flickr   
http://motherboard.vice.com/blog/internet-users-demand-anonymity-admit-its-not-going-to-happen
The recent explosion in Tor usage has been a heartening sign that the people of the internet don't want to be tracked. But, as we've learned, efforts to remain anonymous in the modern internet are largely futile.
A new poll from Pew Internet highlights that stark contrast, finding that the vast majority of internet users wish to be more anonymous online, yet a smaller majority also believes that it's impossible to be completely anonymous in 2013.
Of the 792 internet users in the poll, a total of 86 percent "have tried to be anonymous online and taken at least one step to try to mask their behavior or avoid being tracked." Such behavior under the terms of the Pew poll could be things as simple as deleting one's browser history.
When you get down to more serious steps, like using fake emails or encryption, the numbers get a lot lower, as you can see in Pew's graph below. One number I find relatively surprising is that only 25 percent of respondents had posted anonymous comments.
Partly this is due to many users not posting comments at all, but also hints at a broader trend online: Comment systems, along with social networks and everything else, are increasingly requiring people to use their real names. (Yes, I know this includes Motherboard.)

The poll found that user behaviors bounced back and forth between being anonymous and forthcoming with their sharing. As you'd probably expect, it's heavily dependent on how old the user is. First, look at this graph showing how different age groups use anonymity tactics:

Younger internet users are more likely to take steps to protect their privacy (and clean up their old posting history) than older groups. This is speculation, but I think this trend is partly due to younger users better understanding the privacy tools at their disposal and because they are more invested in their personal lives online. Put another way, when you share more of yourself online, you're more likely to be concerned about hiding the private bits.
Yet at the same time, younger users are also more likely to post material online that's attached to their own name. I also find it fascinating that younger folks have such a markedly larger interest in using "recognizable" usernames. We all hold our pun-laden handles dear, don't we.

Again, not a surprise given that younger folks have put more of their lives online than older generations. Again, what is surprising is that so few people have posted somewhere without revealing their actual name. That not for lack of wanting to; the poll found that 59 percent of users think people should be able to use the internet completely anonymously, while 33 percent think no one should.
Those numbers were reversed when asked if anonymity is even possible. 59 percent said anonymous web usage is completely impossible, while 37 percent said it is. (Curiously, 64 percent of women felt anonymity is impossible, while just 54 percent of men did. I'd love to hear theories as to why this is.)
Given what we know now about the massive surveillance state, it would seem that no one is anonymous online if the NSA or the equivalent really wants to track you down. But perhaps of more concern to users is the gradual erosion of anonymity in more public places.
Yes, the NSA having backdoors into email encryption is a massive issue, but the web's transition into a more corporate, public place where we all leave digital trails clearly attached to our verified selves is more of a philosophical quandary.
On the one hand, it makes sense for Google, Facebook, and all the other behemoths now powering the web to try to get users to be as public as possible—it's good for targeted advertising, and it also makes networks stronger. Admit it: It's easier to use Facebook knowing that you can just find your friend George Stevenson, and not have to search for xXxXGeorgec000lguyXXxx.
On the other, the internet has become more integral to our lives than ever, and yet our privacy standards online appear to be eroding faster than they have in meatspace. A large part of this has to do with our own personal choices, of course; no one is compelling you to be an oversharer. At the same time, if the internet is a second dimension to our lives, we can't simply treat it as a purely public forum. There has to be recourses for us to do things in private, just as there are in real life.
It's not anything sinister, either. Would you want your neighbor to know everything you watch on Netflix? Maybe you don't care, but it'd also be annoying as hell to have that one guy always bugging you in the hallway about the latest episode of King of the Hill you watched. It goes the same online. Sometimes we want to have anonymous interactions simply because we don't want other clowns butting into our own space. Yet that type of casual anonymity is slipping away.
@derektmead

How Government Spooks Are Making Bank In Silicon Valley

Image: NSA public archivehttp://motherboard.vice.com/blog/nsa-silicon-valley-cyber-security
As much as Silicon Valley's techno-libertarians would like to believe that they discovered the first semiconductors buried in the California wilderness, the relationship between Big Government and the nation's tech capital is long, complicated, and well-documented. The internet itself was a military research project, and government R&D funding has pushed along technologies ranging from GPS to Siri. Tech companies have made a fortune off government contracts, and intelligence agencies have even unleashed their own personal venture capital firms to invest in tech startups and recruit top tech talent to help mine through mountains of surveillance data.
But recently, the revolving door of the Military-Information Complex has started to swing both ways. As the New York Times reported recently, over the last year former military and intelligence operatives have flocked to Silicon Valley, where they are founding startups that specialize in helping other firms avert cyber-threats. As the market for cyber-security grows, these security analysts are leveraging the skills and connections they acquired in government intelligence agencies into a flood of venture capital cash: In 2012 alone, venture firms poured more than $1 billion into security startups, more than double the amount in 2010, according to the National Venture Capital Association.
To find out more about the intelligence community's Western migration, I spoke to Jay Kaplan, a 27-year-old former NSA analyst who left the agency in February to co-found Synack, a Menlo Park security startup that aims to safely crowd source penetration testing for enterprise companies. Based on the "bug bounty" programs used by big tech companies like Google and Microsoft, Synack formalizes the model on a more trustworthy platform, acting as an intermediary between companies and a vetted global community of white hat hackers that Kaplan and his co-founder Mark Kuhr have curated based on connections and experience they developed while working in the NSA's Counterterrorism Division at Fort Meade, Md. The company, which recently raised $1.5 million in seed funding from Valley VC heavyweights like Kleiner Perkins Caufield & Byers and Allegis Capital, is proof of the premium that the tech world is willing to pay for an inside understanding of the national security apparatus.
MOTHERBOARD: Your company, Synack, is trying to crowdsource vulnerability testing to a vetted community of part-time, white hat hackers. How exactly does that model work?
Basically, the way the process works is that a customer comes to us and they say, 'We need to make sure that our internet-based properties are secure—we don't want anyone to hack into them, we don't want any type of adversary or someone with nefarious intent to gain access to customer records or do anything malicious. So they come to us, and that's where the penetration-testing model comes in.
There are a couple of consultancies that do this type of work. We're a little bit different though, because we don't just hire people in-house to perform this work. We recruit a global community of researchers, and we incentivize them differently — it's not on a time-materials basis, they get paid when they actually discover security vulnerabilities. So after a company engages us, we list that on our web portal and we then have a pre-recruited researcher community on board [for our hackathons.]
We've gained access to these researchers either through previous connections we've had, or through other experts in the industry, and also through recruiting efforts that we've done. These guys have been vetted through various steps to make sure that they are actually a trusted community, which allows us to leverage them for more sensitive types of testing.
What's the vetting process like?
We keep some of that under wraps, so I can't really speak to that in its entirety. But there are a couple of gates that we make our researchers go through. The first is a skills assessment to make sure that they are truly experts in the specific areas we're recruiting for. Beyond that we have a series of steps to tie these researchers back to their identities, to prove that they are who they say they are and aren't anonymous or using alias. We're also currently formulating a series of steps to go even further into their backgrounds and ensure that they can be trusted by customers.
So it's like the Google bounty program, except that you guys get to pick the hackers. Do you think that companies are looking for more trustworthy way to test their vulnerabilities?
At the end of the day, when you're performing security assessments, a company is only going to be as secure as the people performing those assessments. You want the widest range of expertise that you possibly can obtain. In today's industry, if you hire out an outside consulting firm, you're going to get one or two guys, with varying levels of expertise, performing the work over a set period of time, usually about a week. They're going to submit a report to that company at the end of the engagement, and that company is going to pay a flat fee for that type of engagement.
That model is just fundamentally broken. By leveraging hundreds, if not thousands, of researchers around the world for any particular engagement, [we're] getting a much wider range of expertise.  Because our researchers are incentivized only when they find issues, it makes them think more creatively….It really mimics adversarial intent and motivation and that's ultimately what we're trying to achieve.
A company like Google, they spend millions of dollars on security — they still can't stay ahead of their security problems. They're receiving hundreds of submissions a day through their bounty program...These are from people around the world who are doing research, [whom] Google has not engaged with directly, and Google is paying out a ton of money to these guys.
That's how we conceptualized [Synack] initially. We decided to formalize it, and make it accessible to any company in a more trusted environment, so they can utilize this type of testing for unreleased products and internal infrastructure, which I think is going to be a real game changer.


Jay Kaplan, left, and Mark Kuhr, right, ditched the NSA's Counterterrorism Division to found security firm Synack. Photo courtesy of Jay Kaplan.
You and your partner met as interns at the Defense Department's Information Systems Agency, and then spent four years with the NSA's SIGINT division. How does your background inform what you're doing at Synack?
I've spent a ton of time in the the penetration-testing vulnerability space on the offensive side, looking at a variety of different technologies from around the world. At the end of the day, we came to the realization that when you put the right type of people in the same room and have a lot of people working on a problem, you're usually pretty successful.
Having those connections also gave us the ability to tap into a really interesting research community and we're able to leverage talent that they never really would have access to before. Because the model lets people do this work on the side, companies have the ability to leverage talent from engineers at some of the biggest companies, they are able to leverage talent within the government, they are able to leverage talent overseas. It's a really powerful model because you get access to these guys who would never really be doing work for a normal consultancy.
Why do you think so many former intelligence operatives are leaving the government for startup life?
I don't think it is necessarily a new trend, however it's clear that many innovative and entrepreneurial careers launch at intelligence organizations working on extremely difficult problems — some are the the same problems that have direct applicability to private sector growth segments causing these opportunistic government employees to leave their jobs. There is a long history of public to private sector migration, whether in the security space or elsewhere — I think we're seeing more prevalence in the news recently that could give off the perception of a growing market.
So far, Synack has been focusing on enterprise customers. Do you think the government would ever use your product?
The government is traditionally pretty conservative, especially on the security front. However, we are centering our entire model around trust, and because of that, I think it's absolutely possible that the government could engage in this type of work. We see government agencies getting breached quite frequently — I think [our] model has proven itself, I think it would be extremely effective and valuable for them, so I certainly do see it as a possibility.
I think the government is starting to be a lot more open-minded about private technology solutions that can make them more secure. The government realizes that they can't develop everything in house, and [that] private industry is going to come up with a lot of innovative technologies that they can leverage….But that's probably all I can speak to.

Obama secretly had court reverse NSA ban of spying on Americans in 2011. Video of Obama 2007 - About NO SPYING - Freedoms more Important!

This video and article needs to be passed to all who are still asleep and believe in Obama.

The article has the fact that Obama went to a court secretly in 2011 and asked for restrictions reversed for the NSA to spy on Americans and their phone calls. He was given what he wanted.

From Article:

The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases, according to interviews with government officials and recently declassified material.
In addition, the court extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years — and more under special circumstances, according to the documents, which include a recently released 2011 opinion by U.S. District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court.
What had not been previously acknowledged is that the court in 2008 imposed an explicit ban — at the government’s request — on those kinds of searches, that officials in 2011 got the court to lift the bar and that the search authority has been used.
Together the permission to search and to keep data longer expanded the NSA’s authority in significant ways without public debate or any specific authority from Congress. 
Amazing what the article says is the Bush administration actually made sure a ban was in place for the NSA but then Obama requested the ban be lifted.  Is there any doubt that it occurred in 2011, the year before the election?  Seems to me, he may have been pulling a 'Watergate' but didn't have to send people in to place a microphone in offices.

Here is Senator Obama in 2007 - LISTEN TO This man! He says NO SPYING Against Americans our Liberties need to stay in tact with our Freedoms!  WOW what an awesome speech.