Wednesday, March 12, 2014

The Pentagon Plan to Create Mutant "Super-Soldiers"

Monsters, Inc., The Pentagon’s Plan to Create Super-Warriors

The great wizard, leader of the Wise, once known to all the world as a force for good, has turned bitter, fearful–and ambitious. Aping the ways of the evil he once fought–brutality, dominance, greed, terror–he descends to his secret laboratory, where, with black arts of alchemy and fiendish technology, he breeds a race of mutant warriors, “iron bodied and iron willed”: fierce fighters who can attack day and night, without rest, their combat spirit kept soaring by spikes of lightning from the wizard’s wand.
A scene from Tolkein’s Lord of the Rings, where the corrupted wizard Saruman fashions his monstrous Uruk-Hai to wage a relentless, remorseless war for dominion? No; unfortunately it’s a very real scheme now being pursued by the Pentagon, whose dope wizards and gene splicers are working on the creation of the “Extended Performance War Fighter,” the Daily Telegraph and Christian Science Monitor report.
Pentagon dark lord Donald Rumsfeld is shoveling billions of tax dollars into the research furnaces of federal laboratories and private universities across the land in the wide-ranging effort to spawn “super soldiers,” fired by drugs and electromagnetic “brain zaps” to fight without ceasing for days on end. The work is being directed by the Defense Advanced Research Projects Agency (DARPA)–yes, the same outfit now laboring under convicted terrorist-conspirator John Poindexter to build the “Total Information Awareness” network that will allow the government to monitor the electronic records and communications of every citizen.
The DARPA “war fighter enhancement” programs–an acceleration of bipartisan biotinkering that’s been going on for years–will involve injecting young men and women with hormonal, neurological and genetic concoctions; implanting microchips and electrodes in their bodies to control their internal organs and brain functions; and plying them with drugs that deaden some of their normal human tendencies: the need for sleep, the fear of death, the reluctance to kill their fellow human beings.
The research is “very aggressive and wide open,” says Admiral Stephen Baker of the Center for Defense Information. Indeed, the U.S. Special Operations Command envisions the creation of “iron bodied and iron willed personnel” who can “resist the mental and physiological effects of sleep deprivation” while relying on “ergogenic substances” to “manage” the “environmental and mentally induced stress” of the battlefield. Their bodies juiced, their brains swaddled in Prozacian haze, the enhanced warfighters can churn relentlessly, remorselessly toward dominion.
And the term “creation” is not just fanciful rhetoric: some of the research now underway involves actually altering the genetic code of soldiers, modifying bits of DNA to fashion a new type of human specimen, one that functions like a machine, killing tirelessly for days and nights on end. These mutations will “revolutionize the contemporary order of battle” and guarantee “operational dominance across the whole range of potential U.S. military employments,” the DARPA wizards enthuse.
Of course, the Pentagon is not waiting on sci-fi technology to enhance the physical abilities of its warfighters; old-fashioned off-the-shelf “additives” have long been shoved down soldiers’ throats. For example, the use of amphetamines for pilots has been widespread for decades; during the first Bush-Saddam War, whole squadrons were cranked up on the stuff. Not only is the gobbling of speed officially sanctioned, it’s actively encouraged, even implicitly mandated–careers can be derailed for pilots who refuse to drug themselves.
The results of this dope-peddling were clearly seen on the new imperial frontier of Afghanistan last spring, when two U.S. pilots–hopped up on speed–killed four Canadian allies in a “friendly fire” bombing raid. The pilots, now facing legal charges, say Air Force brass pressured them into taking the mind-altering drug before the fatal flight.
But such glitches are inevitable in any grand scientific undertaking, and DARPA remains undeterred in its bold quest to “push the limits of human input/output,” advance the “symbiotic relationship between man and machine,” and customize “pharmaceutical technology” to “embolden the warfighter and his superiors,” as military scientists declared at a Pentagon-sponsored conference on “future warfare.”
What happens to the burnt-out husks of these “iron” soldiers after their minds and bodies have been eaten way by relentless modification and ceaseless toil is, of course, of no concern to the Bush Regime. Even now, the White House is cutting back on health benefits to military veterans–even going so far as to order veterans hospitals not to advertise their available services, lest broken soldiers actually seek to claim the promise of support their government once gave them. For men like Bush–protected scions of privilege who sit out wars in safety, in booze-addled luxury–such promises are just cynical sucker ploys, aimed at coaxing decent soldiers into acting as the hitmen of empire, then discarding them when they’re no longer needed.
How very strange it is: those who want to turn American soldiers into mindless, drug-addled mutants and send them off to kill and die in far-flung wars of imperial conquest are seen as patriots, noble leaders, doing the will of God; while those who would rather see these good men and women called home, treated with honor and respect–their talents and dedication applied solely to the defense of their own great country, not pressed into the service of a greedy, rapacious elite–are denounced as “traitors,” “anti-American agitators,” “allies of terrorism.”
But such is the inversion of values–the wisdom gone astray and turned to fell practice–that now rules in Bush’s Washington, and in the Pentagon’s fiery crucibles of war.
CHRIS FLOYD is a columnist for the Moscow Times and a regular contributor to CounterPunch. He can be reached at: cfloyd72@hotmail.com

Mystery of Malaysia Airlines Flight MH370

//  http://tvaraj.com/2014/03/10/mystery-of-malaysia-airlines-flight-mh370/
.
Myself . By T.V. Antony Raj.
.
Boeing 777-200ER Malaysia AL (MAS) 9M-MRO, the missing aircraft (Source: Laurent ERRERA from L'Union, France)
Boeing 777-200ER Malaysia AL (MAS) 9M-MRO, the missing aircraft (Source: Laurent ERRERA from L’Union, France)
On Saturday, March 8, 2014, a Malaysia Airlines Flight 370 (MH370) took off from the Kuala Lumpur International Airport, Kuala Lumpur, Malaysia, at 00:21 MST (March 7, 16:21 UTC) with 227 passengers and 12 crew members on board. It was a scheduled six-hour flight to Beijing Capital International Airport, Beijing, China. This international passenger flight operated by a Boeing 777-200ER was also designated under a codeshare agreement as China Southern Airlines Flight 748 (CZ748).
Fliight path of Malaysia Airlines MH370 (Source - Sailsbystars)
Fliight path of Malaysia Airlines MH370 (Source – Sailsbystars)
At 07:24 MST, Malaysia Airlines issued a media statement confirming that the aircraft was last seen on Air Traffic Control (ATC) radar at 02:40 MST (March 7, 18:40 UTC) at 6°55′15″N 103°34′43″E, approximately 100 miles (180 km) North of Kuala Terengganu, Malaysia. After that the aircraft ceased all communications, and the transponder signal was lost just before it was to be passed off to the Ho Chi Minh Area Control Center in Vietnam. Authorities in Thailand and China informed their Malaysian counterparts that the aircraft had not entered their airspace.
According to the military radar of Malaysia’s air force, the aircraft might have changed course and turned back toward Kuala Lumpur before disappearing and officials don’t know why the plane would have turned around. The pilots didn’t tell ATC that they were doing so.
Captain Zaharie Ahmad Shah, pilot of the Malaysia Airlines Flight MH370
Captain Zaharie Ahmad Shah, pilot of the Malaysia Airlines Flight MH370. (Source: beforeitsnews.com)
Fariq Abdul Hamid, First officer of the Malaysia Airlines Flight MH370.
Fariq Abdul Hamid, First officer of Flight MH370. (Source: beforeitsnews.com)
Malaysia Airlines said the 12 missing crew members on the flight were Malaysian. The plane’s pilot Captain Zaharie Ahmad Shah, a 53-year-old has been with the airline for over 30 years, and the plane’s first officer Fariq Hamid, a 27-year-old  joined the airline in 2007.
Malaysia Airlines said the plane’s pilot Captain Zaharie Ahmad Shah, a 53-year-old who has been with the airline for over 30 years, and the plane’s first officer Fariq Hamid, a 27-year-old who joined the airline in 2007 are Malaysians.
Of the 227 passengers on board, there were 154 from China and Taiwan, 38 Malaysians, seven Indonesians, six Australians, five Indians, four French, three from the U.S., and others from Indonesia, New Zealand, Canada, Ukraine, Russia, Austria, Italy, and the Netherlands. Among the passengers were a delegation of respected painters and calligraphers, employees of an American semiconductor company, a group of Buddhists returning from a religious gathering in Kuala Lumpur, a three-generation family, nine senior travelers and five children less than five years old.
What puzzles all is the fact that before vanishing from the radar screens the aircraft did not relay any distress signal, or convey any indications of bad weather or technical problems; and it was carrying a sufficient amount of fuel for an additional 7.5 hours of flight.
The Aviation Herald website reported that Subang Air Traffic Control lost radar and radio contact with the aircraft at 01:22 MST and officially advised Malaysia Airlines at 02:40 MST that the aircraft was missing. But, a Malaysia Airlines spokesperson said that the last conversation between the flight crew and air traffic control in Malaysia had been around 01:30 MST, and stated that the plane had not disappeared from air traffic control systems in Subang until 02:40 MST, which is long enough for the plane to have been flying across Vietnam.
The ATC requested another Malaysia Airlines flight, en route to Japan that took off about half an hour ahead of MH370, to contact the unresponsive aircraft. The captain established contact with the crew of MH370 just after 01:30 MST, but reported that he could not hear them clearly as they were ‘mumbling’.
A joint search-and-rescue effort by American, Australian, Chinese, Filipino, Indonesian, Malaysian, Singaporean, Thai, and Vietnamese authorities, is now under way mainly over the South China Sea.
On March 8, Vietnamese Navy reported that they located oil slicks in the Gulf of Thailand, about 50 nautical miles (93 km) south of Vietnam’s Thổ Chu Island.
On March 8, Vietnamese Navy reported that they located oil slicks in the Gulf of Thailand, about 50 nautical miles (93 km) south of Vietnam’s Thổ Chu Island. One oil slick, was between 6 and 12 miles (10 – 20 km) long. A Vietnamese Civil Aviation Department aircraft spotted two large oil slicks that authorities suspect might be from the MAS jetliner. The slicks, each between 6 and 9 miles (10 – 15 km) long and 500 meters apart, were spotted 140 nautical miles (260 km) south of the Thổ Chu Island off southern Vietnam.
On March 9, Vietnamese aircraft spotted what they suspected was one of the doors belonging to the ill-fated Malaysia Airlines Flight MH370 off southern Vietnam. Since it was too dark to ascertain whether the object was part of the missing plane, they decided to investigate the site in the morning. However, on Monday, Vietnamese officials said that they had not been able to locate the object spotted on Sunday that was thought to be part of a Malaysia Airlines Boeing 777 plane.
Officials are now investigating the possibility of a midair disintegration.
How did this aircraft with with 227 passengers and 12 crew members on board disappear without any trace? In the following video Aviation expert David Gleave explains how a plane can ‘vanish’ off radar and what clues investigators will be looking for in the search for the missing plane and the mystery deepens.
.

How could Malaysia Airlines plane just disappear

This disappearance of Malaysia Airlines Flight MH370 without a trace reminds me of the Bermuda Triangle, The Devil’s Sea, and the vile vortices where a number of aircraft and ships are said to have disappeared under mysterious circumstances.
The Bermuda Triangle, also known as the Devil’s Triangle, is an undefined region in the western part of the North Atlantic Ocean, where a number of aircraft and ships are said to have disappeared under mysterious circumstances.
The Dragon’s Triangle, also known as the Formosa Triangle, and the “Pacific Bermuda Triangle”, is a region of the Pacific around Miyake Island, about 100 km south of Tokyo. The Japanese call it the Ma-no Umi meaning the Devil’s Sea. The Dragon’s Triangle, is one of 12 Vile Vortices, originally plotted by Ivan T. Sanderson. The size and area varies with the reports that originated from the 1950s. Various reports locate it 68 miles (110 km) from an unspecified part of Japan’s east coast, 300 miles (480 km) from the coast, and one report places it near Iwo Jima which is 650 nautical miles (750 miles; 1,200 km) south of mainland Tokyo.
The Dragon's Triangle by Charles BerlitzCharles Berlitz, author of books on paranormal phenomena, states in his entertaining book The Dragon’s Triangle (1989) that in the peacetime years between 1952-54 Japan lost five military vessels with over 700 crew members. The Japanese government then sent a research vessel with over 100 scientists on board to study the Devil’s Sea, and that vessel too vanished. According to Berlitz, that sea region was officially declared a danger zone on Japanese maps.
However, in 1995, Larry Kusche published his book “The Bermuda Triangle Mystery Solved” in which he mentions that the Japanese research vessel that Berlitz mentioned was named Kaiyo Maru No 5. It had a crew of 31 aboard. While investigating the activity of an undersea volcano, Myōjin-shō, about 300 km south of the Devil’s Sea, it was destroyed by an eruption on September 24, 1952. He also stated that the “military vessels” mentioned by Berlitz were fishing vessels lost between April 1949 and October 1953.  Some of them were lost outside the Devil’s Sea, far away from the Japanese mainland, between Miyake Island and Iwo Jima, 1200 km to the south. He also points out that hundreds of fishing boats were lost around Japan every year.
The Vile Vortices is a term referring to twelve geographic areas or twelve vertex points of a planetary grid that are alleged by Ivan Sanderson to have been the sites of mysterious disappearances. He identified them in 1972 in an article published in Saga magazine titled “The Twelve Devil’s Graveyards Around the World.”
Ten of Ivan Sanderson’s 12 vortices set at regular intervals around the earth. The North and South Pole account for the 11th and 12th vortices.
Ten of Ivan Sanderson’s 12 vortices set at regular intervals around the earth. The North and South Pole account for the 11th and 12th vortices.
Sanderson asserts that twelve “vortices” are situated along particular lines of latitude. The best known of the so-called “vortices” is the Bermuda Triangle. Others include Algerian Megaliths to the south of Timbuktu, the Indus Valley in Pakistan, especially the city of Mohenjo Daro, Hamakulia Volcano in Hawaii, the “Devil’s Sea” near Japan and the South Atlantic Anomaly. Five of the vortices are on the same latitude to the north of the equator; five are on the same latitude to the south. The other two are the north and south poles.
Now, the location where the aircraft was last seen on Air Traffic Control (ATC) radar at 02:40 MST (March 7, 18:40 UTC) was at 6°55′15″N 103°34′43″E, approximately 100 miles (180 km) North of Kuala Terengganu, Malaysia. This location is 2,632 nautical miles (3029 miles; 4874 km) from Tokyo (24°47′N 141°19′E), and 2415 nautical miles (2779 miles; 4472 km) from Iwo Jima (24°47′N 141°19′E) and is a bit far away from the Dragon’s Triangle and not near any of Ivan Sanderson’s vile vortices.
So, up to now, the mystery of the disappearance of Malaysia Airlines  Boeing 777 (Flight MH370) continues.
.
RELATED ARTICLES
.

New UN Report: Small Scale Organic is the Only Way to Feed the World

Posted by March 11, 2014 in Farming, Health-Wellness
 | NaturalSociety | March 11 2014
farmWe are all aware at this point that we need to transform the way we think about farming. Our food system is broken, and the same paradigm that created its systemic problems will not fix them. According to a new publication from the U.N. Commission on Trade and Development (UNCTAD), small scale, organic farming can create strong local food systems – the only viable, sustainable way to feed the word.
Sixty experts from around the world weighed in on the problem in Trade and Environment Review 2013: Wake Up Before it is Too Late, which includes a commentary from IATP. Within its pages were a detailed look at more sustainable agriculture, better research, re-allocation of land use, reform of global trade rules and climate change.
The report calls for ‘ecological intensification,’ or a shift from conventional mono-culture planting to independent, small-scale production and permaculture, which can create a mosaic of sustainable regenerative systems which can feed all of us.
In an article previously featured at Natural Society, Russians Prove Small Scale Organic CAN Feed the World, this suggestion by the UN has already been put into place. Small scale gardens and farms helped feed Russia even through a collapsing economy. Many of the key indicators in the report are the types of transformative action agriculture has already undergone in places like this small town in the UK, and despite government agencies forcing people to dig up their well-established organic gardens grown on their own properties.
The UNCTAD report the following as needs to transform our food supply:
  • Increase soil carbon content and better integration between crop and livestock production
  • Increase incorporation of agroforestry and wild vegetation
  • Reduce greenhouse gas emissions of livestock production
  • Reduce GHGs through sustainable peatland, forest, and grassland management
  • Optimize organic and inorganic fertilizer use, including through closed nutrient cycles in agriculture
  • Reduce waste throughout food chains
  • Change dietary patterns toward climate-friendly food consumption
  • Reform the international trade regime for food and agriculture
Notice that nowhere in the report does it suggest the reduction of herbicide and pesticides or GMO foods. Instead, while offering some sound advice, it also focuses on trade negotiations with the WTO and North American Free Trade Agreement (NAFTA). While these agreements undermined locally-based food trade, and they should be reconsidered, it does not address the support of Big Ag instead of the local farmer – in the US and elsewhere.
Fortunately, the report does not support the Trans Pacific Partnership (TPP) and the U.S.-EU Trade and Investment Partnership (TTIP), which is really just another way to monopolize the food supply like Monsanto’s attempt to monopolize seed.
Another report issued in 2007 by the International Assessment of Agricultural Knowledge, Science and Technology for Development (IAASTD) with a similar list of international experts came to similar conclusions. The report stated that ‘business as usual was not an option,’ and policy transformation must take place ‘before it is too late.’

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

Featured photo - How the NSA Plans to Infect ‘Millions’ of Computers with Malware One presentation outlines how the NSA performs “industrial-scale exploitation” of computer networks across the world.
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.
The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.
The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”
In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.
Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.
“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”
Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”
“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”
The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”

“Owning the Net”

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.
To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices.
In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations.
But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
“One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).”
The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.”
In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations.
The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.
Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers.
The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”
The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

Circumventing Encryption

The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.
One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.
An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.
The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption.
It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
Previous reports have alleged that the NSA worked with Israel to develop the Stuxnet malware, which was used to sabotage Iranian nuclear facilities. The agency also reportedly worked with Israel to deploy malware called Flame to infiltrate computers and spy on communications in countries across the Middle East.
According to the Snowden files, the technology has been used to seek out terror suspects as well as individuals regarded by the NSA as “extremist.” But the mandate of the NSA’s hackers is not limited to invading the systems of those who pose a threat to national security.
In one secret post on an internal message board, an operative from the NSA’s Signals Intelligence Directorate describes using malware attacks against systems administrators who work at foreign phone and Internet service providers. By hacking an administrator’s computer, the agency can gain covert access to communications that are processed by his company. “Sys admins are a means to an end,” the NSA operative writes.
The internal post – titled “I hunt sys admins” – makes clear that terrorists aren’t the only targets of such NSA attacks. Compromising a systems administrator, the operative notes, makes it easier to get to other targets of interest, including any “government official that happens to be using the network some admin takes care of.”
Similar tactics have been adopted by Government Communications Headquarters, the NSA’s British counterpart. As the German newspaper Der Spiegel reported in September, GCHQ hacked computers belonging to network engineers at Belgacom, the Belgian telecommunications provider.
The mission, codenamed “Operation Socialist,” was designed to enable GCHQ to monitor mobile phones connected to Belgacom’s network. The secret files deem the mission a “success,” and indicate that the agency had the ability to covertly access Belgacom’s systems since at least 2010.
Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications.
Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
The implants also track phone calls sent across the network via Skype and other Voice Over IP software, revealing the username of the person making the call. If the audio of the VOIP conversation is sent over the Internet using unencrypted “Real-time Transport Protocol” packets, the implants can covertly record the audio data and then return it to the NSA for analysis.
But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.

“Mass exploitation potential”

Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network.
According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds.
There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious.
Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.                                          http://vimeo.com/88822483
The documents show that QUANTUMHAND became operational in October 2010, after being successfully tested by the NSA against about a dozen targets.
According to Matt Blaze, a surveillance and cryptography expert at the University of Pennsylvania, it appears that the QUANTUMHAND technique is aimed at targeting specific individuals. But he expresses concerns about how it has been covertly integrated within Internet networks as part of the NSA’s automated TURBINE system.
“As soon as you put this capability in the backbone infrastructure, the software and security engineer in me says that’s terrifying,” Blaze says.
“Forget about how the NSA is intending to use it. How do we know it is working correctly and only targeting who the NSA wants? And even if it does work correctly, which is itself a really dubious assumption, how is it controlled?”
In an email statement to The Intercept, Facebook spokesman Jay Nancarrow said the company had “no evidence of this alleged activity.” He added that Facebook implemented HTTPS encryption for users last year, making browsing sessions less vulnerable to malware attacks.
Nancarrow also pointed out that other services besides Facebook could have been compromised by the NSA. “If government agencies indeed have privileged access to network service providers,” he said, “any site running only [unencrypted] HTTP could conceivably have its traffic misdirected.”
A man-in-the-middle attack is a similar but slightly more aggressive method that can be used by the NSA to deploy its malware. It refers to a hacking technique in which the agency covertly places itself between computers as they are communicating with each other.
This allows the NSA not only to observe and redirect browsing sessions, but to modify the content of data packets that are passing between computers.
The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party. The same technique is sometimes used by criminal hackers to defraud people.
A top-secret NSA presentation from 2012 reveals that the agency developed a man-in-the-middle capability called SECONDDATE to “influence real-time communications between client and server” and to “quietly redirect web-browsers” to NSA malware servers called FOXACID. In October, details about the FOXACID system were reported by the Guardian, which revealed its links to attacks against users of the Internet anonymity service Tor.
But SECONDDATE is tailored not only for “surgical” surveillance attacks on individual suspects. It can also be used to launch bulk malware attacks against computers.
According to the 2012 presentation, the tactic has “mass exploitation potential for clients passing through network choke points.”
Blaze, the University of Pennsylvania surveillance expert, says the potential use of man-in-the-middle attacks on such a scale “seems very disturbing.” Such an approach would involve indiscriminately monitoring entire networks as opposed to targeting individual suspects.
“The thing that raises a red flag for me is the reference to ‘network choke points,’” he says. “That’s the last place that we should be allowing intelligence agencies to compromise the infrastructure – because that is by definition a mass surveillance technique.”
To deploy some of its malware implants, the NSA exploits security vulnerabilities in commonly used Internet browsers such as Mozilla Firefox and Internet Explorer.
The agency’s hackers also exploit security weaknesses in network routers and in popular software plugins such as Flash and Java to deliver malicious code onto targeted machines.
The implants can circumvent anti-virus programs, and the NSA has gone to extreme lengths to ensure that its clandestine technology is extremely difficult to detect. An implant named VALIDATOR, used by the NSA to upload and download data to and from an infected machine, can be set to self-destruct – deleting itself from an infected computer after a set time expires.
In many cases, firewalls and other security measures do not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers appear confident in their ability to circumvent any security mechanism that stands between them and compromising a computer or network. “If we can get the target to visit us in some sort of web browser, we can probably own them,” an agency hacker boasts in one secret document. “The only limitation is the ‘how.’”

Covert Infrastructure

The TURBINE implants system does not operate in isolation.
It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England.
The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet.
When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack.
The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter.
Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
What’s more, the TURBINE system operates with the knowledge and support of other governments, some of which have participated in the malware attacks.
Classification markings on the Snowden documents indicate that NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.
GCHQ, the British agency, has taken on a particularly important role in helping to develop the malware tactics. The Menwith Hill satellite eavesdropping base that is part of the TURMOIL network, located in a rural part of Northern England, is operated by the NSA in close cooperation with GCHQ.
Top-secret documents show that the British base – referred to by the NSA as “MHS” for Menwith Hill Station – is an integral component of the TURBINE malware infrastructure and has been used to experiment with implant “exploitation” attacks against users of Yahoo and Hotmail.
In one document dated 2010, at least five variants of the QUANTUM hacking method were listed as being “operational” at Menwith Hill. The same document also reveals that GCHQ helped integrate three of the QUANTUM malware capabilities – and test two others – as part of a surveillance system it operates codenamed INSENSER.
GCHQ cooperated with the hacking attacks despite having reservations about their legality. One of the Snowden files, previously disclosed by Swedish broadcaster SVT, revealed that as recently as April 2013, GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware due to “legal/policy restrictions.” A representative from a unit of the British surveillance agency, meeting with an obscure telecommunications standards committee in 2010, separately voiced concerns that performing “active” hacking attacks for surveillance “may be illegal” under British law.
In response to questions from The Intercept, GCHQ refused to comment on its involvement in the covert hacking operations. Citing its boilerplate response to inquiries, the agency said in a statement that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.”
Whatever the legalities of the United Kingdom and United States infiltrating computer networks, the Snowden files bring into sharp focus the broader implications. Under cover of secrecy and without public debate, there has been an unprecedented proliferation of aggressive surveillance techniques. One of the NSA’s primary concerns, in fact, appears to be that its clandestine tactics are now being adopted by foreign rivals, too.
“Hacking routers has been good business for us and our 5-eyes partners for some time,” notes one NSA analyst in a top-secret document dated December 2012. “But it is becoming more apparent that other nation states are honing their skillz [sic] and joining the scene.”
———
Documents published with this article:

The Sandy Hook-Psychopharma Connection 

By Tony Mead* // http://memoryholeblog.com/2014/03/12/the-sandy-hook-psychopharma-connection/
There is a possibility that Peter and Adam Lanza never existed. There is, for example, limited evidence of their lives before 2009. Do you want to know who does exist ? The author of a 7,600 word article that is supposedly based on several interviews with Peter Lanza.

Andrew Solomon is the son of Howard Solomon, the CEO of pharmaceutical giant Forest Laboratories which had research and development expenditures  of about $1,000,000,000 last year. Forest Laboratories produces Lexapro and Namenda in Ireland while their Headquarters is located in Bermuda. This way they pay $0 in Corporate Tax.
In February 2014, Actavis announced it would acquire Forest Laboratories for around $25 billion. Howard retired in Dec 2013 and stands to make a killing thanks to the announced buyout that will increase his share values incredibly.
Namenda will no longer be available to Alzheimer Patients beginning Aug 15, 2014. It is being taken off the Market and the patients will need to switch to NamendaXR. They are not doing this because of any discovered dangers, not because it has been over-prescribed to mild cases even though it is only recommended for moderate to severe, not because it has been shown that there is little to no effect proven in case studies— but because the Patent expires which means other brands will be able to compete with generics. Forest Laboratories doesn’t want that, so they are forcing their patients to switch to the ‘time-release’ version, of which there is no known generic replacement. This is the type of company created by Howard Solomon.
Educated at Yale and Cambridge, Andrew Solomon became the poster child for the pharmaceutical industry when, at 31, he was able to overcome depression with the help of Celexa, which put Forest Laboratories on the map. Celexa became one of the fastest selling anti-depressants on the market, despite the danger it posed if prescribed to younger patients. In fact, FDA approval was based to a significant degree on the results experienced by Andrew Solomon.
In 2011, Howard Solomon was publicly reprimanded for aggressive marketing of Anti-depressants to children. Forest Labs was fined $313 Million and faced being excluded by the Office of Inspector General. This would mean no more dealings with Medicaid, Medicare and the Veteran’s Administration.
Although touted as the poster child for anti-depressants, Andrew Solomon is really one of the greatest examples of how these drugs lead to a life-long addiction. After some time on a combination of anti-depressant drugs, Andrew decided to quit ‘cold turkey’. The subsequent withdrawal symptoms were more than he could take so he was prescribed more medication to deal with his withdrawal produced anxiety. He began medically treating his depression in 1994 and as of March 2013 was still taking 5 different prescription medications daily!
(Note that it has been reported that Adam Lanza was prescribed Lexapro to deal with his issues, but stopped taking it after several days. The implication is that if only he had taken his medication, perhaps the mass murder could have been prevented.)
So, this is the author of the ‘alleged’ interview with Peter Lanza. I say ‘alleged’, because there is no way to verify that this actually took place. In the article, he states that he met with Lanza on 6 different occasions with one session lasting up to 7 hours !! Yet, the article itself seems to be full of 3rd party observations with very little inside information that only Peter would know. It is also full of contradiction.
Why do you suppose Peter Lanza would have sought out this guy to be the only one to do his exclusive interview with? For instance, Peter is quoted as saying “nothing annoyed him more in our conversations than speculation—by me, the media, or anyone else”. This is coming from the man who is also quoted, in the same article as saying “his son would have killed him, too, given the chance” ?!
The piece is also riddled with contradictory and conflicting information. In one part it says that Adam had sensory issues and did not want to touch anything, including metal door handles. It also says at one point he was unable to tie his own shoes. Yet, it is also claimed that Nancy decided it would be a good idea to take him to the local gun ranges so that he could fire a weapon. This not only defies logic, it has been repeatedly proven to be untrue as every gun range within a 50 mile radius has denied any knowledge of either Nancy or Adam having been there.
The article implies that Adam’s Asperger’s syndrome somehow ‘masked his schizophrenia’. None of his medical records have been made public and there is no evidence to validate that he was either autistic or schizophrenic.
It is reported here that he was home-schooled for 4 years and yet there were other reports that he attended Newtown High School! This entire article is a fabricated propaganda piece being used to further the agenda and to try to justify some of the preposterous evidence presented in the 7,000 page Police Report that is so difficult to decipher that a separate panel is being considered to analyze the report.
I could pick apart the story piece by piece to show you that it makes no sense. I could also show you how, in the 7,000 page Police Report, they fail to provide us with anything but inconsistencies and contradictions. Even the ‘photographic evidence’ is nonsensical. Who would furnish a $1.2 Million house with 20 year old crappy furniture? The staging of the pictures is blatantly obvious. Of course, that is not what I wish to do.
What I want to do is to awaken you to the prospect that this whole Sandy Hook story is a fabricated lie! There is so much evidence to prove that there has been manipulation and distortion of the truth throughout. It is right there for one to examine, if only they would take the time to look.
Andrew Solomon is a member of the Council on Foreign Relations. The Council on Foreign Relations (CFR) is an American nonprofit, nonpartisan membership organization, publisher, and think tank specializing in U.S. foreign policy and international affairs. The CFR is considered to be the nation’s “most influential foreign-policy think tank”. Its membership has included senior politicians, more than a dozen Secretaries of State, CIA directors, bankers, lawyers, professors, and senior media figures. It is essentially run by the Rockefeller Family and is probably the most influential body in the broad engineering our Society.
We are all so busy living our day to day lives, working at our jobs and taking care of our kids. But, this is something that requires our attention! It is through events like these that our history is altered. Mainstream media continues to propagate this story as if it is fact. Over the past few days the story of how Peter Lanza finally came forward to speak about the ‘killings’ has been covered by NBC, CNN, MSNBC and on countless internet sites. Yet no one anywhere got to see him or even a recent picture of him.
He told the story (through pill-popping elitist Andrew Solomon) of how, with proper mental health care and perhaps intervention by the State, this horrible event could have been avoided. As of 2012, more than 25% of children are on prescription medication. Imagine how much more profit can be made if we could get that number to 50% !!
With the advent of Obamacare, everyone will be subjected to certain ‘requirements’. We already have to have specific vaccinations to allow our children to attend Public Schools. It is a very small leap to think that they will require psychological profiling to determine a propensity to violence. These tests must be performed to prevent violence in our schools. Once diagnosed, it will be a requirement for the child to follow the recommended treatment, including proper medication.
This is not somewhere out in the distant future. This is in our hands right here, right now. I don’t want my children or my grandchildren subjected to this form of controlled personality management. Do you?
So there- now you have it. You have been informed of why there should be concern over what is happening in our society as a result of the Sandy Hook Hoax. Gun Control is just a small part of it. Now comes the push for mental health reform and the pharmaceutical industry is in it up to their elbows. How can you just sit by idly and let them take away the Freedoms that we have fought for ? If you call yourself a Patriot, a lover of this country, now is the time to stand up and be heard. We will not allow this to happen to our children!! The lies must end!!
I have always said that I would be the first to point out that “The Emperor has no clothes!” Now it is your turn.
*Tony Mead is co-administrator of the Sandy Hook Hoax Facebook page.

Hacked Email from U.S. Army Attache in Ukraine - For False Flags to occur so U.S. can take military action against Russia



Putin is a big thorn in the U.S. side and they want to do something about him.  The U.S. created the problem in Ukraine to be able to control the country and the resources.  The U.S. was/is behind the revolution due to them wanting the President out who was pro Russia and not Europe.

The U.S. and Western governments inserted a Pro-European acting President.  That President even called on the U.S. giving them nuclear weapons a couple of days ago. 

First paragraph of article:
KIEV, Ukraine — Ukraine may have to arm itself with nuclear weapons if the United States and other world powers refuse to enforce a security pact that obligates them to reverse the Moscow-backed takeover of Crimea, a member of the Ukraine parliament told USA TODAY.

The U.S. media is acting as if Russia invaded the country, when in reality the U.S. is the one who invaded the country before Russia.  Russia is only protecting their assets in Crimea.

The U.S. went in and got all of Ukraine's gold reserves and flew it to the U.S. for 'safe keeping'.

A source in the Ukrainian government confirmed that the transfer of the gold reserves of Ukraine to the United States was ordered by the acting PM Arseny Yatsenyuk.

Now, if anyone is willing to read the TRUTH about Ukraine and the history of what is happening and why, this article details the TRUTH about the situation.   It is a long article but it is worth the read, because it is of course about the resources that Ukraine has and how the Western governments want those, besides to in dept the country through IMF loans.    Russia was staying out of Ukraine's problems overall, until they got forced into it, with the U.S. causing the revolution.

Remember China has come out and blamed the U.S. for what is happening in Ukraine. 

We know how the U.S. will create false flags so they can do a military action, just like they tried in Syria, with the chemical attack that was really caused by Saudi Arabia.

A Jason Gresh emails were hacked, he is the Assistant Army Attache at the U.S. embassy in Ukraine.  The emails discuss setting up bombs and a false flag to blame Russia.  As he says in the email, so "the Pentagon and Company can act."

What he means by company, I would love to know.  What company is this?   The U.S. government?  Is that the 'company' he means?

Video with the hacked email from Jason Gresh to the acting Ukraine PM assistant:

Link to emails

Translated Emails from Ukrainian to English below video:

Proof US Staging False Flag For WW3



)

Email from Jason Gresh:

Events are moving rapidly in Crimea. Our friends in Washington expect more decisive actions from your network.
I think it’s time to implement the plan we discussed lately. Your job is to cause some problems to the transport hubs in the south-east in order to frame-up the neighbor.
It will create favorable conditions for Pentagon and the Company to act.
Do not waste time, my friend.
Respectfully,
JP
Jason P. Gresh
Lieutenant Colonel, U.S. Army
Assistant Army Attaché
U.S. Embassy, Kyiv
Tankova 4, Kyiv, Ukraine 04112
(380-44) 521 – 5444 | Fax (380-44) 521 – 5636

TRANSLATED EMAILS IN VIDEO AND FROM LINK - UKRAINIAN TO ENGLISH:  ALL ABOUT DOING A FALSE FLAG. 

EMAIL TO IGOR FROM UKRAINE OFFICIAL
Oleg , an urgent need poshumity on behalf of Russians at the airport in Melitopol. This should be done by March 15 . Sam understands why.
First of all you must contact Pasha Tarasenko. You must know him , he is a local Liberty and has a theme.
Before you arrive 10-12 boys from the Centre. Top fighters Trident . Chief Mike there , you should know it too . Details will know him. We need people to meet and provide everything you need.
Proceed with caution. Speak only Russian. 25 team is executing combat missions , so do not do them much damage to aircraft . There is a lot of scrap metal, with it you can do anything . Damaged aircraft you specify. It is essential that all was as real attack neighbor's Special Forces. But without corpses.
Give me again your account. The money will come in time, do not worry.
See the appendix . This is an example of action. Decisions are made in person.
EMAIL FROM IGOR :
Basil , you must quickly carry out proactive in Melitopol. There's 25 aviation brigade . Must zamaraty our sworn friends and good neighbors. I think you understand me.
Just proceed carefully and cautiously. 25 brigade combat mission out , so do not do them much damage to aircraft . There is already damaged aircraft , that He can do everything. Yihny board numbers you give. Remember , you need everything to be as real attack of the Russian Special Forces.
Brigade commander there is a reasonable man . Details of know he will not, but in extreme cases it can turn to. We did come.

Who Igor is:

COL Igor PROTSYK
Chief, Bilateral Military Cooperation Division
Main Directorate for Military Cooperation and PKO
General Staff, Armed Forces of Ukraine
tel +38044 481-5407
cell +38067 407 97 40
e-mail: i.v.protsyk@mil.gov.ua
e-mail: protsyk@ukr.net