US Police Can Copy Your iPhone’s Contents In Under Two Minutes

US Police Can Copy Your iPhone’s Contents In Under Two Minutes

It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes.

The CelleBrite UFED is a handheld device that Michigan officers have been using since August 2008 to copy information from mobile phones belonging to motorists stopped for minor traffic violations. The device can circumvent password restrictions and extract existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags.

 

In short, it can copy everything on your smartphone in a matter of minutes.

Learning that the police had been using mobile forensic devices, the American Civil Liberties Union (ACLU) has issued freedom of information requests which demand that state officials open up the data collected, to better assess if penalised motorists warrant having their data copied.

Michigan State Police were more than happy to provide the information – as long as the ACLU paid $544,680. Obviously not pocket change.

“Law enforcement officers are known, on occasion, to encourage citizens to cooperate if they have nothing to hide,” ACLU staff attorney Mark P. Fancher wrote. “No less should be expected of law enforcement, and the Michigan State Police should be willing to assuage concerns that these powerful extraction devices are being used illegally by honoring our requests for cooperation and disclosure.”

Once the data is obtained, the device’s “Physical Analyzer” can map both existing and deleted locations on Google Earth, porting location data and image geotags on Google Maps.

The ACLU’s main worry is that the handheld is quietly being used to bypass Fourth Amendment protections against unreasonable searches:

“With certain exceptions that do not apply here, a search cannot occur without a warrant in which a judicial officer determines that there is probable cause to believe that the search will yield evidence of criminal activity.

A device that allows immediate, surreptitious intrusion into private data creates enormous risks that troopers will ignore these requirements to the detriment of the constitutional rights of persons whose cell phones are searched.”

The next time you are Michigan, be sure drive carefully!

SOURCE:
http://thenextweb.com/us/2011/04/20/us-police-can-copy-your-iphones-contents-in-under-two-minutes/

CLINTON BODY COUNT: Associates that ended up DEAD

CLINTON BODY COUNT: Associates that ended up DEAD

Here is the latest body count that we have. All of these people have been connected with the Clintons in some form or another. We have not included any deaths that could not be verified or connected to the Clinton scandals. All deaths are listed chronologically by date.  Accurate to circa 2001

Susan Coleman: Rumors were circulating in Arkansas of an affair with Bill Clinton. She was found dead with a gunshot wound to the head at 7 1/2 months pregnant. Death was an apparent suicide.

Larry Guerrin: Was killed in February 1987 while investigating the INSLAW case.

Kevin Ives & Don Henry: Initial cause of death was reported to be the result of falling asleep on a railroad track in Arkansas on August 23, 1987. This ruling was reported by the State medical examiner Fahmy Malak. Later it was determined that Kevin died from a crushed skull prior to being placed on the tracks. Don had been stabbed in the back. Rumors indicate that they might have stumbled upon a Mena drug operation.

Keith Coney: Keith had information on the Ives/Henry deaths. Died in a motorcycle accident in July 1988 with unconfirmed reports of a high speed car chase.

Keith McKaskle: McKaskle has information on the Ives/Henry deaths. He was stabbed to death in November 1988.

Gregory Collins: Greg had information on the Ives/Henry deaths. He died from a gunshot wound to the face in January 1989.

Jeff Rhodes: He had information on the deaths of Ives, Henry & McKaskle. His burned body was found in a trash dump in April 1989. He died of a gunshot wound to the head and there was some body mutilation, leading to the probably speculation that he was tortured prior to being killed.

James Milam: Milam had information on the Ives & Henry deaths. He was decapitated. The state Medical examiner, Fahmy Malak, initially ruled death due to natural causes.

Richard Winters: Winters was a suspect in the deaths of Ives & Henry. He was killed in a “robbery” in July 1989 which was subsequently proven to be a setup.

Jordan Kettleson: Kettleson had information on the Ives & Henry deaths. He was found shot to death in the front seat of his pickup in June 1990.

Alan Standorf: An employee of the National Security Agency in electronic intelligence. Standorf was a source of information for Danny Casalaro who was investigating INSLAW, BCCI, etc. Standorf’s body was found in the backseat of a car at Washington National Airport on Jan 31, 1991.

Dennis Eisman: An attorney with information on INSLAW. Eisman was found shot to death on April 5, 1991.

Danny Casalaro: Danny was a free-lance reporter and writer who was investigating the “October Surprise”, INSLAW and BCCI. Danny was found dead in a bathtub in a Sheraton Hotel room in Martinsburg, West Virginia. Danny was staying at the hotel while keeping appointments in the DC area pertinent to his investigation. He was found with his wrists slashed. At least one, and possibly both of his wrists were cut 10 times. All of his research materials were missing and have never been recovered.

Victor Raiser: The National Finance Co-Chair for “Clinton for President.” He died in a airplane crash on July 30, 1992.

R. Montgomery Raiser: Also involved in the Clinton presidential campaign. He died in the same plane crash as Victor.

Paul Tully: Tulley was on the Democratic National Committee. He was found dead of unknown causes in his hotel room on September 24, 1992. No autopsy was ever allowed.

Ian Spiro: Spiro had supporting documentation for grand jury proceedings on the INSLAW case. His wife and 3 children were found murdered on November 1, 1992 in their home. They all died of gunshot wounds to the head. Ian’s body was found several days later in a parked car in the Borego Desert. Cause of death? The ingestion of cyanide. FBI report indicated that Ian had murdered his family and then committed suicide.

Paula Gober: A Clinton speech writer. She died in a car accident on December 9, 1992 with no known witnesses.

Jim Wilhite: Wilhite was an associate of Mack McClarty’s former firm. Wilhite died in a skiing accident on December 21, 1992. He also had extensive ties to Clinton with whom he visited by telephone just hours before his death.

Steve Willis, Robert Williams, Todd McKeahan & Conway LeBleu:   Died Feburary 28, 1993 by gunfire at Waco. All four were examined by a pathologist and died from identical wounds to the left temple. All four had been body guards for Bill Clinton, three while campaigning for President and when he was Governor of Arkansas.They also were the ONLY 4 BATF agents killed at Waco.

Sgt. Brian Haney, Sgt. Tim Sabel, Maj. William Barkley, Capt. Scott Reynolds: Died: May 19, 1993 – All four men died when their helicopter crashed in the woods near Quantico, Va. – Reporters were barred from the site, and the head of the fire department responding to the crash described it by saying, “Security was tight,” with “lots of Marines with guns.” A videotape made by a firefighter was seized by the Marines. All four men had escorted Clinton on his flight to the carrier Roosevelt shortly before their deaths.

John Crawford: An attorney with information on INSLAW. He died from a heart attack in Tacoma in April of 1993.

John Wilson: Found dead from an apparent hanging suicide on May 18, 1993. He was a former Washington DC council member and claimed to have info on Whitewater.

Paul Wilcher: A lawyer who was investigating drug running out of Mena, Arkansas and who also sought to expose the “October Surprise”, BCCI and INSLAW. He was found in his Washington DC apartment dead of unknown causes on June 22, 1993.

Vincent Foster: A White House deputy counsel and long-time personal friend of Bill and Hillary’s. Found on July 20, 1993, dead of a gunshot wound to the mouth — a death ruled suicide.  Was found in a park, yet was covered head to toe in carpet fibers.  Dried blood on the face had miraculously dripped upwards, against gravity. Despite having his car near the park, there were no keys to be found on, nor near his person.  The missing keys showed up in the victim’s pocket, once the body had made it back to the morgue; leading investigators to believe they simply missed it.

Jon Parnell Walker: An investigator for the RTC who was looking into the linkage between the Whitewater and Madison S&L bankruptcy. Walker “fell” from the top of the Lincoln Towers Building.

Stanley Heard & Steven Dickson: They were members of the Clinton health care advisory committee. They died in a plane crash on September 10, 1993.

Jerry Luther Parks: Parks was the Chief of Security for Clinton’s national campaign headquarters in Little Rock. Gunned down in his car on September 26, 1993 near the intersection of Chenal Parkway and Highway 10 west of Little Rock. Parks was shot through the rear window of his car. The assailant then pulled around to the driver’s side of Park’s car and shot him three more times with a 9mm pistol. His family reported that shortly before his death, they were being followed by unknown persons, and their home had been broken into (despite a top quality alarm system). Parks had been compiling a dossier on Clinton’s illicit activities. The dossier was stolen.

Ed Willey: A Clinton fundraiser. He died of a self-inflicted gunshot wound on November 30, 1993. His death came the same day his wife, Kathleen, was sexually assaulted in the White House by Bill Clinton.

Gandy Baugh: Baugh was Lasater’s attorney and committed suicide on January 8, 1994. Baugh’s partner committed suicide exactly one month later on February 8, 1994.

Herschell Friday: A member of the presidential campaign finance committee. He died in an airplane explosion on March 1, 1994.

Ronald Rogers: Rogers died on March 3, 1994 just prior to releasing sensitive information to a London newspaper. Cause of death? Undetermined.

Kathy Furguson: A 38 year old hospital worker whose ex-husband is a co- defendant in the Paula Jones sexual harassment law suit. She had information supporting Paula Jone’s allegations. She died of an apparent suicide on May 11, 1994 from a gunshot wound to the head.

Bill Shelton: Shelton was an Arkansas police officer and was found dead as an apparent suicide on kathy Ferguson’s grave (Kathy was his girl friend), on June 12, 1994. This “suicide” was the result of a gunshot wound to the back of the head.

Stanley Huggins: Huggins, 46, was a principal in a Memphis law firm which headed a 1987 investigation into the loan practices of Madison Guaranty S&L. Stanley died in Delaware in July 1994 — reported cause of death was viral pneumonia.

Paul Olson: A Federal witness in investigations to drug money corruption in Chicago politics, Paul had just finished 2 days of FBI interviews when his plane ride home crashed, killing Paul and 130 others on Sept 8 1994. The Sept. 15, 1994 Tempe Tribune newspaper reported that the FBI suspected that a bomb had brought down the airplane.

Calvin Walraven: 24 year on Walraven was a key witness against Jocelyn Elder’s son’s drug case. Walraven was found dead in his apartment with a gunshot wound to the head. Tim Hover, a Little Rock police spokesman says no foul play is suspected.

Alan G. Whicher: Oversaw Clinton’s Secret Service detail. In October 1994 Whicher was transferred to the Secret Service field office in the Murrah Building in Oklahoma City. Whatever warning was given to the BATF agents in that building did not reach Alan Whicher, who died in the bomb blast of April 19th 1995.

Duane Garrett: Died July 26, 1995-A lawyer and a talk show host for KGO-AM in San Fransisco, Duane was the campaign finance chairman for Diane Fienstien’s run for the senate, and was a friend and fundraiser for Al Gore. Garrett was under investigation for defrauding investors in Garrett’s failed sports memorabilia venture. There was talk of a deal to evade prosecution. On July 26th, Garrett canceled an afternoon meeting with his lawyer because he had to meet some people at the San Fransisco airport. Three hours later he was found floating in the bay under the Golden Gate Bridge.

Ron Brown: The Commerce Secretary died on  April 3, 1996, in an Air Force jet carrying Brown and 34 others, including 14 business executives on a trade mission to Croatia, crashed into a mountainside. The Air Force, in a 22-volume report issued in June of 1996, confirmed its initial judgment that the crash resulted from pilot errors and faulty navigation equipment At the time of Brown’s death, Independent Counsel Daniel Pearson was seeking to determine whether Brown had engaged in several sham financial transactions with longtime business partner Nolanda Hill shortly before he became secretary of commerce.

Charles Meissner: died: UNK – Following Ron Brown’s death, John Huang was placed on a Commerce Department contract that allowed him to retain his security clearance
by Charles Meissner. Shortly thereafter, Meissner died in the crash of a small plane.   He was an Assistant Secretary of Commerce for International Economic Policy.

William Colby: Retired CIA director was found dead on May 6,1996 after his wife reported him missing on April 27,1996. Apparently, Colby decided to go on a impromptu canoeing excursion and never returned. Colby who had just started writing for Strategic Investment newsletter, worried many in the intelligent community. Colby’s past history of divulging CIA secrets in the past were well known. Strategic Investor had covered the Vince Foster suicide and had hired handwriting experts to review Foster’s suicide note.

Admiral Jeremy Boorda: Died on May 16,1996 after he went home for lunch and decided to shoot himself in the chest (by one report, twice) rather than be interviewed by Newsweek magazine that afternoon. Explanations for Boorda’s suicide focused on a claim that he was embarrassed over two “Valor” pins he was not authorized to wear.

Lance Herndon: Herndon a 41 year old computer specialist and a  prominent entrepreneur who received a presidential appointment in 1995 died August 10, 1996 under suspicious circumstances. He   appeared to have died from a blow to the head. Police said no weapons were found at his  mansion, adding that Mr. Herndon had not been shot or stabbed and there was no evidence of forced entry or theft.

Neil Moody: Died -August 25, 1996 Following Vincent Foster’s murder, Lisa Foster married James Moody, a judge in Arkansas, on Jan 1, 1996. Near the time Susan McDougal first went to jail for contempt, Judge Moor’s son, Neil died in a car crash. There were other reports that Neil Moody had discovered something very unsettling among his stepmother’s private papers and was threatening to go public with it just prior to the beginning of the Democratic National Convention. He was alleged to have been talking to Bob Woodward of the Washington Post about a blockbuster story. Witnesses said they saw Neil Moody sitting in his car arguing with another person just prior to His car suddenly speeding off out of control and hitting a brick wall.

Barbara Wise: Wise a 14-year Commerce Department employee found dead and partially naked in her office following a long weekend. She worked in the same section as John Huang. Officially, she is said to have died of natural causes.

Doug Adams: Died January 7, 1997- A lawyer in Arkansas who got involved trying to help the people who were being swindled out of their life savings. Adams was found in his vehicle with a gunshot wound to his head in a Springfield Mo. hospital parking lot.

Mary C. Mahoney: 25, murdered at the Georgetown Starbuck’s coffee bar over the 4th of July ’97 weekend. She was a former White House intern who worked with John Huang. Apparently she knew Monica Lewinsky and her sexual encounters with Bill Clinton. Although not verified, it has been said that Lewinsky told Linda Tripp that she did not want to end up like Mahoney.

Ronald Miller: Suddenly took ill on October 3rd,1997 and steadily worsened until his death 9 days later. (This pattern fits Ricin poisoning.) Owing to the strangeness of the illness, doctors at the Integris Baptist Medical Center referred the matter to the Oklahoma State Medical Examiner’s Office. The Oklahoma State Medical Examiner’s Office promptly ran tests on samples of Ron Miller’s blood, but has refused to release the results or even to confirm that the tests were ever completed.

Had been investigated by authorities over the sale of his company, Gage Corp. to Dynamic Energy Resources, Inc. was the man who tape recorded Gene and Nora Lum and turned those tapes (and other records) over to congressional oversight investigators. The Lums were sentenced to prison for campaign finance violations, using “straw donors” to conceal the size of their contributions to various candidates. Indeed, Dynamic Energy Resources, Inc. had hired Ron Brown’s son Michael solely for the purpose of funneling $60,000 through him to the Commerce Secretary, according to Nolanda Hill’s testimony.

Sandy Hume: On Sunday, February 22nd, 1998, Sandy Hume, the 28 year old son of journalist Britt Hume, was reportedly found dead in his Arlington, Virginia home. Aside from the statement that this was an “apparent” suicide, there remains in place a total media blackout on this story, possibly out of concern that the actual facts will not withstand public scrutiny. Worked for Hill magazine, about Congress for Congress.

Jim McDougal: Bill and Hillary Clinton friend, banker, and political ally, sent to prison for  eighteen felony convictions. A key whitewater witness, dies of a heart attack on March, 8 1998. As of this writing allegations that he was given an injection of the diuretic lasix has not been denied or confirmed.
Died on March 8, 1998

Johnny Lawhon: 29, died March 29, 1998- The Arkansas transmission specialist who discovered a pile of Whitewater documents in the trunk of an abandoned car on his property and turned them over to Starr, was killed in a car wreck two weeks after the McDougal death.. Details of the “accident” have been sketchy — even from the local Little Rock newspaper.

Charles Wilbourne Miller: 63, was found dead of a gunshot wound to the head on November 17, 1998  in a shallow pit about 300 yards from his ranch house near Little Rock. Police found a .410 gauge shotgun near Miller’s body and a Ruger .357-caliber revolver submerged in water. Investigators concluded the Ruger was the weapon used by Miller to kill himself. Yet, two rounds in the handgun’s cylinder had been spent.

He had long served as executive vice president and member of the board of directors for a company called Alltel and was deeply involved in his own software engineering company until the day he died. Alltel is the successor to Jackson Stephens’ Systematics, the company that provided the software for the White House’s “Big Brother” data base system and that was behind the administration’s plan to develop the secret computer “Clipper” chip to bug every phone, fax and email transmission in America.

Carlos Ghigliotti: 42, was found dead in his home just outside of Washington D.C. on April 28, 2000. There was no sign of a break-in or struggle at the firm of Infrared Technology  where the badly decomposed body of Ghigliotti was found. Ghigliotti had not been seen for several weeks.

Ghigliotti, a thermal imaging analyst hired by the House Government Reform Committee to review tape of the siege, said he determined the FBI fired shots on April 19, 1993. The FBI has explained the light bursts on infrared footage as reflections of sun rays on shards of glass or other debris that littered the scene.

“I conclude this based on the groundview videotapes taken from several different angles simultaneously and based on the overhead thermal tape,” Ghigliotti told The Washington Post last October. “The gunfire from the ground is there, without a doubt.”

Ghigliotti said the tapes also confirm the Davidians fired repeatedly at FBI agents during the assault, which ended when flames raced through the compound. About 80 Branch Davidians perished that day, some from the fire, others from gunshot wounds.

Mark Corallo, a spokesman for the congressional committee chaired by Rep. Dan Burton, R-Ind., said that police found the business cards of a committee investigator in Ghigliotti’s office. Corallo said Ghigliotti’s work for the committee ended some time ago.

Tony Moser: 41, was killed as he crossed a street in Pine Bluff, Ark on on June 10, 2000. Killed 10 days after being named a columnist for the Democrat-Gazette newspaper and two days after penning a stinging indictment of political corruption in Little Rock.

Police have concluded that no charges will be filed against the unnamed driver of a 1995 Chevrolet pickup, which hit Moser as he was walking alone in the middle of unlit Rhinehart Road about 10:10 p.m

Police say they have ruled out foul play and will file no charges against the driver because he was not intoxicated and there was no sign of excessive speed.

“Published originally at EtherZone.com : republication allowed with this notice and hyperlink intact.”

 

Homeland Security is Searching Facebook & Twitter For These Words

Homeland Security is Searching Facebook & Twitter For These Words

The Department of Homeland Security monitors your updates on social networks, including Facebook and Twitter, to uncover “Items Of Interest” (IOI), according to an internal DHS document released by the EPIC. That document happens to include a list of the baseline terms for which the DHS–or more specifically, a DHS subcontractor hired to monitor social networks–use to generate real-time IOI reports. (Although the released PDF is generally all reader-selectable text, the list of names was curiously embedded as an image of text, preventing simple indexing. We’ve fixed that below.)

To be fair, the DHS does have an internal privacy policy that attempts to strip your “PII”–Personally Identifiable Information–from the aggregated tweets and status updates, with some broad exceptions:

1) U.S. and foreign individuals in extremis situations involving potential life or death circumstances; (this is no change)
2) Senior U.S. and foreign government officials who make public statements or provide public updates;
3) U.S. and foreign government spokespersons who make public statements or provide public updates;
4) U.S. and foreign private sector officials and spokespersons who make public statements or provide public updates;
5) Names of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and/or social media in real time to keep their audience situationally aware and informed;
6) Current and former public officials who are victims of incidents or activities related to Homeland Security; and
7) Terrorists, drug cartel leaders or other persons known to have been involved in major crimes of Homeland Security interest, (e.g., mass shooters such as those at Virginia Tech or Ft. Hood) who are killed or found dead.

In addition, the Media Monitoring Capability team can transmit personal information to the DHS National Operations Center over the phone as deemed necessary.

The MMC watch may provide the name, position, or other information considered to be PII to the NOC over the telephone when approved by the appropriate DHS OPS authority. But that information must not be stored in a database that could be searched by an individual’s PII.

In addition to the following list of terms, the DHS can also add additional search terms circumstantially as deemed necessary.

DHS Media Monitoring Terms

2.13 Key Words & Search Terms

This is a current list of terms that will be used by the NOC when monitoring social media sites to provide situational awareness and establish a common operating picture. As natural or manmade disasters occur, new search terms may be added.

The new search terms will not use PII in searching for relevant
mission-related information.

DHS & Other Agencies

  • Department of Homeland Security (DHS)
  • Federal Emergency Management Agency (FEMA)
  • Coast Guard (USCG)
  • Customs and Border Protection (CBP)
  • Border Patrol
  • Secret Service (USSS)
  • National Operations Center (NOC)
  • Homeland Defense
  • Immigration Customs Enforcement (ICE)
  • Agent
  • Task Force
  • Central Intelligence Agency (CIA)
  • Fusion Center
  • Drug Enforcement Agency (DEA)
  • Secure Border Initiative (SBI)
  • Federal Bureau of Investigation (FBI)
  • Alcohol Tobacco and Firearms (ATF)
  • U.S. Citizenship and Immigration Services (CIS)
  • Federal Air Marshal Service (FAMS)
  • Transportation Security Administration (TSA)
  • Air Marshal
  • Federal Aviation Administration (FAA)
  • National Guard
  • Red Cross
  • United Nations (UN)

Domestic Security

  • Assassination
  • Attack
  • Domestic security
  • Drill
  • Exercise
  • Cops
  • Law enforcement
  • Authorities
  • Disaster assistance
  • Disaster management
  • DNDO (Domestic Nuclear Detection Office)
  • National preparedness
  • Mitigation
  • Prevention
  • Response
  • Recovery
  • Dirty Bomb
  • Domestic nuclear detection
  • Emergency management
  • Emergency response
  • First responder
  • Homeland security
  • Maritime domain awareness (MDA)
  • National preparedness initiative
  • Militia
  • Shooting
  • Shots fired
  • Evacuation
  • Deaths
  • Hostage
  • Explosion (explosive)
  • Police
  • Disaster medical assistance team (DMAT)
  • Organized crime
  • Gangs
  • National security
  • State of emergency
  • Security
  • Breach
  • Threat
  • Standoff
  • SWAT
  • Screening
  • Lockdown
  • Bomb (squad or threat)
  • Crash
  • Looting
  • Riot
  • Emergency Landing
  • Pipe bomb
  • Incident
  • Facility

HAZMAT & Nuclear

  • Hazmat
  • Nuclear
  • Chemical Spill
  • Suspicious package/device
  • Toxic
  • National laboratory
  • Nuclear facility
  • Nuclear threat
  • Cloud
  • Plume
  • Radiation
  • Radioactive
  • Leak
  • Biological infection (or event)
  • Chemical
  • Chemical burn
  • Biological
  • Epidemic
  • Hazardous
  • Hazardous material incident
  • Industrial spill
  • Infection
  • Powder (white)
  • Gas
  • Spillover
  • Anthrax
  • Blister agent
  • Exposure
  • Burn
  • Nerve agent
  • Ricin
  • Sarin
  • North Korea

Health Concern + H1N1

  • Outbreak
  • Contamination
  • Exposure
  • Virus
  • Evacuation
  • Bacteria
  • Recall
  • Ebola
  • Food Poisoning
  • Foot and Mouth (FMD)
  • H5N1
  • Avian
  • Flu
  • Salmonella
  • Small Pox
  • Plague
  • Human to human
  • Human to ANIMAL
  • Influenza
  • Center for Disease Control (CDC)
  • Drug Administration (FDA)
  • Public Health
  • Toxic
  • Agro Terror
  • Tuberculosis (TB)
  • Agriculture
  • Listeria
  • Symptoms
  • Mutation
  • Resistant
  • Antiviral
  • Wave
  • Pandemic
  • Infection
  • Water/air borne
  • Sick
  • Swine
  • Pork
  • Strain
  • Quarantine
  • H1N1
  • Vaccine
  • Tamiflu
  • Norvo Virus
  • Epidemic
  • World Health Organization (WHO and components)
  • Viral Hemorrhagic Fever
  • E. Coli

Infrastructure Security

  • Infrastructure security
  • Airport
  • CIKR (Critical Infrastructure & Key Resources)
  • AMTRAK
  • Collapse
  • Computer infrastructure
  • Communications infrastructure
  • Telecommunications
  • Critical infrastructure
  • National infrastructure
  • Metro
  • WMATA
  • Airplane (and derivatives)
  • Chemical fire
  • Subway
  • BART
  • MARTA
  • Port Authority
  • NBIC (National Biosurveillance Integration Center)
  • Transportation security
  • Grid
  • Power
  • Smart
  • Body scanner
  • Electric
  • Failure or outage
  • Black out
  • Brown out
  • Port
  • Dock
  • Bridge
  • Canceled
  • Delays
  • Service disruption
  • Power lines

Southwest Border Violence

  • Drug cartel
  • Violence
  • Gang
  • Drug
  • Narcotics
  • Cocaine
  • Marijuana
  • Heroin
  • Border
  • Mexico
  • Cartel
  • Southwest
  • Juarez
  • Sinaloa
  • Tijuana
  • Torreon
  • Yuma
  • Tucson
  • Decapitated
  • U.S. Consulate
  • Consular
  • El Paso
  • Fort Hancock
  • San Diego
  • Ciudad Juarez
  • Nogales
  • Sonora
  • Colombia
  • Mara salvatrucha
  • MS13 or MS-13
  • Drug war
  • Mexican army
  • Methamphetamine
  • Cartel de Golfo
  • Gulf Cartel
  • La Familia
  • Reynose
  • Nuevo Leon
  • Narcos
  • Narco banners (Spanish equivalents)
  • Los Zetas
  • Shootout
  • Execution
  • Gunfight
  • Trafficking
  • Kidnap
  • Calderon
  • Reyosa
  • Bust
  • Tamaulipas
  • Meth Lab
  • Drug trade
  • Illegal immigrants
  • Smuggling (smugglers)
  • Matamoros
  • Michoacana
  • Guzman
  • Arellano-Felix
  • Beltran-Leyva
  • Barrio Azteca
  • Artistics Assassins
  • Mexicles
  • New Federation

Terrorism

  • Terrorism
  • Al Queda (all spellings)
  • Terror
  • Attack
  • Iraq
  • Afghanistan
  • Iran
  • Pakistan
  • Agro
  • Environmental terrorist
  • Eco terrorism
  • Conventional weapon
  • Target
  • Weapons grade
  • Dirty bomb
  • Enriched
  • Nuclear
  • Chemical weapon
  • Biological weapon
  • Ammonium nitrate
  • Improvised explosive device
  • IED (Improvised Explosive Device)
  • Abu Sayyaf
  • Hamas
  • FARC (Armed Revolutionary Forces Colombia)
  • IRA (Irish Republican Army)
  • ETA (Euskadi ta Askatasuna)
  • Basque Separatists
  • Hezbollah
  • Tamil Tiger
  • PLF (Palestine Liberation Front)
  • PLO (Palestine Libration Organization)
  • Car bomb
  • Jihad
  • Taliban
  • Weapons cache
  • Suicide bomber
  • Suicide attack
  • Suspicious substance
  • AQAP (Al Qaeda Arabian Peninsula)
  • AQIM (Al Qaeda in the Islamic Maghreb)
  • TTP (Tehrik-i-Taliban Pakistan)
  • Yemen
  • Pirates
  • Extremism
  • Somalia
  • Nigeria
  • Radicals
  • Al-Shabaab
  • Home grown
  • Plot
  • Nationalist
  • Recruitment
  • Fundamentalism
  • Islamist

Weather/Disaster/Emergency

  • Emergency
  • Hurricane
  • Tornado
  • Twister
  • Tsunami
  • Earthquake
  • Tremor
  • Flood
  • Storm
  • Crest
  • Temblor
  • Extreme weather
  • Forest fire
  • Brush fire
  • Ice
  • Stranded/Stuck
  • Help
  • Hail
  • Wildfire
  • Tsunami Warning Center
  • Magnitude
  • Avalanche
  • Typhoon
  • Shelter-in-place
  • Disaster
  • Snow
  • Blizzard
  • Sleet
  • Mud slide or Mudslide
  • Erosion
  • Power outage
  • Brown out
  • Warning
  • Watch
  • Lightening
  • Aid
  • Relief
  • Closure
  • Interstate
  • Burst
  • Emergency Broadcast System

Cyber Security

  • Cyber security
  • Botnet
  • DDOS (dedicated denial of service)
  • Denial of service
  • Malware
  • Virus
  • Trojan
  • Keylogger
  • Cyber Command
  • 2600
  • Spammer
  • Phishing
  • Rootkit
  • Phreaking
  • Cain and abel
  • Brute forcing
  • Mysql injection
  • Cyber attack
  • Cyber terror
  • Hacker
  • China
  • Conficker
  • Worm
  • Scammers
  • Social media

Yes, the Department of Homeland Security is searching social media for…”social media”.

SOURCE:
http://animalnewyork.com/2012/02/the-department-of-homeland-security-is-searching-your-facebook-and-twitter-for-these-words/

By: Joel Johnson, February 27, 2012

Report: Worldwide Opposition to Monsanto Growing

Report: Worldwide Opposition to Monsanto Growing

“Farmers worldwide are resisting for food sovereignty, but the rest of the world must join us.”

– Common Dreams staff

A report released today shows that worldwide opposition to the biotechnology giant Monsanto and “the agro-industrial model that it represents” is growing.

(photo: Alexis Baden-Mayer / Millions Against Monsanto)

La Via Campesina, Friends of the Earth International, and Combat Monsanto, the groups who issued the report, show that small farmers, groups and communities in every continent are rising up to resist Monsanto’s products and environmental harm. While Monsanto’s — and other giant agribusinesses’ — approach, including genetically modified crops, has been shown to hurt biodiversity, local food knowledge and the environment, the report shows that “food sovereignty is a real and feasible alternative.”

“This new report documents the intense opposition to this powerful transnational company, which peddles its genetically modified products seemingly without regard for the associated social, economic and environmental costs,” said Martin Drago, Friends of the Earth International’s Food Sovereignty programme coordinator.

“This report demonstrates that the increasingly vocal objections from social movements and civil society organisations are having an impact on the introduction of GM crops.” said Josie Riffaud from La Via Campesina.

The report notes that an “unprecedented agribusiness offensive underway, under the banner of the new ‘green economy’” positioning giant agribusiness companies like Monsanto to have even greater control. The report’s highlighting the “offensive” echoes a report issued last month on global water security from the Defense Intelligence Agency that also pushed biotechnology and agricultural exports rather than agroecology and food sovereignty.

“Who will hold Monsanto responsible for the global depletion of biodiversity, soil erosion, and violations of peasant rights wrought by the application of petroleum-based inputs required by industrial agriculture?” asked Dena Hoff of the National Family Farm Coalition / La Via Campesina North America. “Farmers worldwide are resisting for food sovereignty, but the rest of the world must join us,” she added.

* * *

Selections from the report:

France

‘Les Faucheurs Volontaires’: tactical non-violent resistance against GM

The Voluntary Reapers or ‘Faucheurs Volontaires’ are a group of self-organised non-violent French activists that have led several direct actions to ‘neutralise’ field tests set up by GM corporations and, to a lesser extent, unauthorised fields cultivated by pro-GM farmers. Jose Bové has been an important actor in the movement and a spokesman for the anti-GM activists, although this organisation does not recognise any leadership as such.

The Voluntary Reapers act openly and unmasked, and they claim responsibility for all their actions, sometimes turning themselves in to the police. They argue that civil disobedience is necessary in order to strengthen democracy and defend the common good against private interests backed by public authorities. They personally assume the civil and penal consequences of their actions in court, and use these trials to deliver their views against Monsanto and GMOs to the public.

In August 2010, 60 faucheurs volontaires and 15 farmers were sentenced to two months suspended prison sentences, after they tore up 70 GM grapevines, which were being cultivated as part of a GM trial in Colmar in Alsace, in north-eastern France.

(photo: Ernest Morales)

* * *

India

Nationwide actions

In August 2011, energised by the success in achieving a temporary ban on Bt brinjal, farmers and activists carried out ‘Monsanto, Quit India’ protests across the country to coincide with Independence Day, drawing parallels with the anti-colonial, civil disobedience ‘Quit India’ movement that campaigned against British rule. Just as political sovereignty was demanded previously, farmers and consumers are now calling for food sovereignty. Monsanto is targeted as it is an archetypal, aggressive foreign corporation that hurts farmers and small-scale, safe domestic food producers.

The Tamil Nadu Farmers’ Association, for example, organised a day of action in Coimbatore, mobilising in solidarity with other farmers opposing the monopolisation of the Indian seed industry by corporations like Monsanto.

In Uttar Pradesh, the Bhartiya Kissan Union led a five-day long protest against GM crop trials, celebrating the agro-ecological approaches that have successfully produced high rice yields in the region. Other protests have taken place in the states of Orissa, Andhra Pradesh, Bihar, Karnataka, Maharashtra, Punjab, Madhya Pradesh and Gujarat.68

* * *

Haiti

Haitians oppose seed aid

In June 2010, more than 10,000 Haitians took to the streets under the initiative of Papaye Peasant Movement (MPP), a member of La Via Campesina, to oppose Monsanto and demand food sovereignty, including local control over native seeds. This popular opposition to Monsanto stems from its announcement, in May 2010, that it had made a shipment of over 60 tons of hybrid maize and vegetable seeds to Haiti and anticipated sending another 400 tons over the next year, with the support of USAID. But these hybrid seeds cannot be replanted from one season to another and require massive amounts of pesticides, making farmers dependent on corporate seed and chemicals producers. Monsanto stated that this decision was made at the World Economic Forum in Davos, Switzerland, and it seems that Haitian officials were not involved in the discussions.

Haitian peasant leader Chavannes Jean-Baptiste from the Peasant Movement of Papaye (MPP), part of La Via Campesina, has described Monsanto’s seed aid as the “next earthquake.” This donation sparked suspicion and anger as the local seed heritage is vanishing because of the increasing domination of multinational seed and agrochemical corporations. Globally, FAO estimates that in the last century around 75% of genetic diversity of agricultural crops has been lost.  InHaiti, around 65% of the population is made up of subsistence farmers living in rural areas.

* * *

(Related video: Haitian farmers burning Monsanto’s “gift” of seeds:)

* * *

U.S.

Stopping the spread of GM crops into national wildlife refuges

According to the non-profit alliance of Public Employees for Environmental Responsibility (PEER), the US government has been collaborating with Monsanto to secure agricultural export markets, removing barriers to the spread of GM crops, including into national wildlife refuges.

However, most of these crops are modified to be resistant to Monsanto’s Roundup herbicide, which is causing an over-reliance on these toxic agricultural chemicals that have spawned an epidemic of herbicide-resistant ‘superweeds’. The spread of these superweeds within national wildlife refuges could have a devastating impact on biodiversity.

Nevertheless, in recent years farming on these refuges has been opened up to GMOs, primarily Monsanto’s Roundup resistant crops. However, legal battles led by PEER and the Centre for Food Safety (CFS) forced the US Fish & Wildlife Service (FWS) to end the planting of GM crops in 12 states.

* * *

South Africa

South African farmers reject GM maize

A solid body of scientific evidence shows that organic matter is the most important trait in making soils more resilient to drought and erratic rainfall. No such evidence exists for GM crops. Biotechnology has proved unable to develop drought-resistant seeds, which would require major changes to the plant’s metabolism; and no GM crops have yet been developed that are yield enhancing.

In October 2011, however, South African authorities approved imports of Bayer CropScience’s GM rice, LL62, which is engineered to be resistant to glufosinate ammonium. Famers and civil society organisations strongly opposed this decision on the grounds that it may contaminate non-GM rice varieties. Moreover, the herbicide glufosinate is toxic, can be harmful for reproductive health, and is therefore slated for an EU ban in the near future.

In the same month, the Lutzville Emerging Farmers Forum and the Food Sovereignty Campaign protested alongside residents of this West Coast region, to reject the GM maize experiments for drought resistance being conducted by Monsanto in collaboration with South Africa’s Agricultural Research Council (ARC). Monsanto’s engineered traits are present in an estimated 75% of all GM maize cultivated in South Africa.

* * *

Conclusions

As shown in this report, Monsanto and agribusiness in general are increasingly unwelcome wherever they operate. They ruin local agriculture and harm communities with their attempts to dominate food production systems.

As a result of Monsanto’s presence, local seeds are becoming illegal, biodiversity is disappearing, land is being contaminated, and farmers and agricultural workers are being poisoned, criminalised and displaced from their land. Local food producers aiming to feed communities have to compete with huge corporations whose sole objective is to make profits. […]

We are calling for collective action from all of those who share our vision of a sustainable world. There has never been a more important time to globalise our struggles, and globalise hope.

SOURCE:
http://www.commondreams.org/headline/2012/04/04-5

By: Common Dreams, April 4, 2012

How the US Uses Sexual Humiliation as a Political Tool to Control the Masses

How the US Uses Sexual Humiliation as a Political Tool to Control the Masses

In a five-four ruling this week, the supreme court decided that anyone can be strip-searched upon arrest for any offense, however minor, at any time. This horror show ruling joins two recent horror show laws: the NDAA, which lets anyone be arrested forever at any time, and HR 347, the “trespass bill”, which gives you a 10-year sentence for protesting anywhere near someone with secret service protection. These criminalizations of being human follow, of course, the mini-uprising of the Occupy movement.Bagram airbase was used by the US to detain its ‘high-value’ targets during the ‘war on terror’ and is still Afghanistan’s main military prison. Photograph: Dar Yasin/AP

Is American strip-searching benign? The man who had brought the initial suit, Albert Florence, described having been told to “turn around. Squat and cough. Spread your cheeks.” He said he felt humiliated: “It made me feel like less of a man.”

In surreal reasoning, justice Anthony Kennedy explained that this ruling is necessary because the 9/11 bomber could have been stopped for speeding. How would strip searching him have prevented the attack? Did justice Kennedy imagine that plans to blow up the twin towers had been concealed in a body cavity? In still more bizarre non-logic, his and the other justices’ decision rests on concerns about weapons and contraband in prison systems. But people under arrest – that is, who are not yet convicted – haven’t been introduced into a prison population.

Our surveillance state shown considerable determination to intrude on citizens sexually. There’s the sexual abuse of prisoners at Bagram – der Spiegel reports that “former inmates report incidents of … various forms of sexual humiliation. In some cases, an interrogator would place his penis along the face of the detainee while he was being questioned. Other inmates were raped with sticks or threatened with anal sex”. There was the stripping of Bradley Manning is solitary confinement. And there’s the policy set up after the story of the “underwear bomber” to grope US travelers genitally or else force them to go through a machine – made by a company, Rapiscan, owned by terror profiteer and former DHA czar Michael Chertoff – with images so vivid that it has been called the “pornoscanner”.

Believe me: you don’t want the state having the power to strip your clothes off. History shows that the use of forced nudity by a state that is descending into fascism is powerfully effective in controlling and subduing populations.

The political use of forced nudity by anti-democratic regimes is long established. Forcing people to undress is the first step in breaking down their sense of individuality and dignity and reinforcing their powerlessness. Enslaved women were sold naked on the blocks in the American south, and adolescent male slaves served young white ladies at table in the south, while they themselves were naked: their invisible humiliation was a trope for their emasculation. Jewish prisoners herded into concentration camps were stripped of clothing and photographed naked, as iconic images of that Holocaust reiterated.

One of the most terrifying moments for me when I visited Guantanamo prison in 2009 was seeing the way the architecture of the building positioned glass-fronted shower cubicles facing intentionally right into the central atrium – where young female guards stood watch over the forced nakedness of Muslim prisoners, who had no way to conceal themselves. Laws and rulings such as this are clearly designed to bring the conditions of Guantanamo, and abusive detention, home.

I have watched male police and TSA members standing by side by side salaciously observing women as they have been “patted down” in airports. I have experienced the weirdly phrased, sexually perverse intrusiveness of the state during an airport “pat-down”, which is always phrased in the words of a steamy paperback (“do you have any sensitive areas? … I will use the back of my hands under your breasts …”). One of my Facebook commentators suggested, I think plausibly, that more women are about to be found liable for arrest for petty reasons (scarily enough, the TSA is advertising for more female officers).

I interviewed the equivalent of TSA workers in Britain and found that the genital groping that is obligatory in the US is illegal in Britain. I believe that the genital groping policy in America, too, is designed to psychologically habituate US citizens to a condition in which they are demeaned and sexually intruded upon by the state – at any moment.

The most terrifying phrase of all in the decision is justice Kennedy’s striking use of the term “detainees” for “United States citizens under arrest”. Some members of Occupy who were arrested in Los Angeles also reported having been referred to by police as such. Justice Kennedy’s new use of what looks like a deliberate activation of that phrase is illuminating.

Ten years of association have given “detainee” the synonymous meaning in America as those to whom no rights apply – especially in prison. It has been long in use in America, habituating us to link it with a condition in which random Muslims far away may be stripped by the American state of any rights. Now the term – with its associations of “those to whom anything may be done” – is being deployed systematically in the direction of … any old American citizen.

Where are we headed? Why? These recent laws criminalizing protest, and giving local police – who, recall, are now infused with DHS money, military hardware and personnel – powers to terrify and traumatise people who have not gone through due process or trial, are being set up to work in concert with a see-all-all-the-time surveillance state. A facility is being set up in Utah by the NSA to monitor everything all the time: James Bamford wrote in Wired magazine that the new facility in Bluffdale, Utah, is being built, where the NSA will look at billions of emails, texts and phone calls. Similar legislation is being pushed forward in the UK.

With that Big Brother eye in place, working alongside these strip-search laws, – between the all-seeing data-mining technology and the terrifying police powers to sexually abuse and humiliate you at will – no one will need a formal coup to have a cowed and compliant citizenry. If you say anything controversial online or on the phone, will you face arrest and sexual humiliation?

Remember, you don’t need to have done anything wrong to be arrested in America any longer. You can be arrested for walking your dog without a leash. The man who was forced to spread his buttocks was stopped for a driving infraction. I was told by an NYPD sergeant that “safety” issues allow the NYPD to make arrests at will. So nothing prevents thousands of Occupy protesters – if there will be any left after these laws start to bite – from being rounded up and stripped naked under intimidating conditions.

Why is this happening? I used to think the push was just led by those who profited from endless war and surveillance – but now I see the struggle as larger. As one internet advocate said to me: “There is a race against time: they realise the internet is a tool of empowerment that will work against their interests, and they need to race to turn it into a tool of control.”

As Chris Hedges wrote in his riveting account of the NDAA: “There are now 1,271 government agencies and 1,931 private companies that work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States, the Washington Post reported in a 2010 series by Dana Priest and William M Arken. There are 854,000 people with top-secret security clearances, the reporters wrote, and in Washington, DC, and the surrounding area 33 building complexes for top-secret intelligence work are under construction or have been built since September 2011.”

This enormous new sector of the economy has a multi-billion-dollar vested interest in setting up a system to surveil, physically intimidate and prey upon the rest of American society.

Now they can do so by threatening to demean you sexually – a potent tool in the hands of any bully.

SOURCE:
http://www.commondreams.org/view/2012/04/06-8

By: Naomi Wolf, April 6, 2012

Young Girl Exposes Canadian Banking FRAUD

Young Girl Exposes Canadian Banking FRAUD

This is my daughter. She gave this speech at a businees meeting in front of 600 people. Her eyes have been opened to a scam that is being perpetrated upon Canadians and the rest of the world.

I am the owner of this video.

Please copy the following
http://www.youtube.com/watch?v=axS-QdUkMqk
and add “Corrupt Canadian Banking System” to the description if you choose to re-upload

Feel free to use it freely without altering the content in a manner that would draw conclusions unintended by the speech but please redirect people back to the original post.

Please also see these great resources for more information and people who are trying their best to enact the necessary change in our country and the world:

Documentary (really good)
http://www.ohcanadamovie.com/

Bill Abram;’s mini documentary (really good)
http://www.youtube.com/watch?v=q7HMt5MgsDg

The Case against the Bank of Canada (lawsuit to have the BOC reinstated as our lender)

http://www.youtube.com/watch?feature=player_embedded&v=TN2USVC6QYQ

Torie’s Interview with Dan Dicks from Press For Truth:

http://www.youtube.com/watch?v=4YaDD3Dx0FA&feature=watch_response

A special thank you to John and Lisa Brombal for inviting our daughter to speak at their business meeting.

Map of US Police Departments’ Policies on Tracking Cell-Phone Use Without a Warrant

Map of US Police Departments’ Policies on Tracking Cell-Phone Use Without a Warrant


ACLU affiliates across America requested information on local law enforcement’s use of cell-phone tracking, and received a wealth of disturbing information about the extent of wireless tracking. They produced a map showing which police departments were discovered to be tracking people’s phones without a warrant, either by getting gutless phone companies to fink out their own customers for warrantless fishing expeditions, or by buying some kind of “cell phone tracking equipment.”

Many law enforcement agencies track cell phones quite frequently. For example, based on invoices from cell phone companies, it appears that Raleigh, N.C. tracks hundreds of cell phones a year. The practice is so common that cell phone companies have manuals for police explaining what data the companies store, how much they charge police to access that data, and what officers need to do to get it.

Most law enforcement agencies do not obtain a warrant to track cell phones, but some do, and the legal standards used vary widely. Some police departments protect privacy by obtaining a warrant based upon probable cause when tracking cell phones. For example, police in the County of Hawaii, Wichita, and Lexington, Ky. demonstrate probable cause and obtain a warrant when tracking cell phones. If these police departments can protect both public safety and privacy by meeting the warrant and probable cause requirements, then surely other agencies can as well.

Unfortunately, other departments do not always demonstrate probable cause and obtain a warrant when tracking cell phones. For example, police in Lincoln, Neb. obtain even GPS location data, which is more precise than cell tower location information, on telephones without demonstrating probable cause. Police in Wilson County, N.C. obtain historical cell tracking data where it is “relevant and material” to an ongoing investigation, a standard lower than probable cause.

Police use various methods to track cell phones. Most commonly, law enforcement agencies obtain cell phone records about one person from a cell phone carrier. However, some police departments, like in Gilbert, Ariz., have purchased their own cell tracking technology.

SOURCE:
http://boingboing.net/2012/04/02/map-of-us-police-departments-t.html

By: Cory Doctorow, April 2, 2012

US Mercenary “Took Part” in Gaddafi Killing; Sent to Assist Syrian opposition

US Mercenary “Took Part” in Gaddafi Killing; Sent to Assist Syrian opposition

(Photo:REUTERS – Zohra Bensemra)

US government officials requested that an American private security firm contact Syrian opposition figures in Turkey to see “how they can help in regime change,” the CEO of one of these firms told Stratfor in a company email obtained by WikiLeaks and Al-Akhbar.

James F. Smith, former director of Blackwater, is currently the Chief Executive of SCG International, a private security firm with experience in Afghanistan, Iraq, and Libya. In what appears to be his first email to Stratfor, Smith stated that his “background is CIA” and his company is comprised of “former DOD [Department of Defense], CIA and former law enforcement personnel.”

“We provide services for those same groups in the form of training, security and information collection,” he explained to Stratfor. (doc-id5441475)

In a 13 December 2011 email to Stratfor’s VP for counter-terrorism Fred Burton, which Burton shared with Stratfor’s briefers, Smith claimed that “[he] and Walid Phares were getting air cover from Congresswoman [Sue] Myrick to engage Syrian opposition in Turkey (non-MB and non-Qatari) on a fact finding mission for Congress.”

Walid Phares, named by the source as part of the “fact finding team,” is a Lebanese-American citizen and currently co-chairs Republican presidential candidate Mitt Romney’s Middle East advisory group.

In a profile of Walid Phares published in Salon, As’ad AbuKhalil details Phares’ history with right-wing militias during the Lebanese civil war.

Sue Myrick, who allegedly was providing “air cover” for the “fact finding team”, is a Republican Congresswoman from North Carolina who has a track record of extremist pro-zionist and anti-Islamic views.

These include leading the charge against Dubai Ports World’s attempt to buy major American ports in 2006 – labeling the Islamic Society of North America as a group of “radical jihadists” – and demanding that former President Jimmy Carter’s citizenship be revoked for daring to meet with Hamas leaders in 2008.

Currently, Myrick is a member of the United States House Permanent Select Committee on Intelligence, a congressional committee charged with overseeing the American intelligence community, and is also involved with the Department of Defense and the US military.

In his email, the “true mission” for the “fact finding” team, Smith told Burton, was how “they can help in regime change.”

Furthermore, the email added that Smith intended to offer “his services to help protect the opposition members, like he had underway in Libya.” He also said that Booz Allen Hamilton, an American consulting firm regularly contracted by the US government for civil and defense projects, “is also working [with] the Agency on a similar request.” (doc-id 5331882)

Smith had originally contacted Stratfor through an email to its founder George Friedman on 15 February 2011 in order to thank the private intelligence firm for its “excellent service of intelligence reporting and analysis.”

“Outstanding just doesn’t cut it – professionally competent, salient, germane, concise are all descriptors that describe your organization’s work product,” he added quite lovingly. (doc-id 257534)

This email was forwarded by Friedman to Burton, who gradually built a friendly relationship with Smith.

By September, Smith had become a major source for Stratfor. Codenamed LY700, he provided intelligence to Burton on developments in Libya – where Smith and his company were contracted to protect Libyan National Transitional Council (NTC) members and train Libyan rebel fighters after the implementation of the no-fly zone in March 2011. (doc-id 121087)

Smith’s intelligence impressed Burton, who in praising him to his peers reeled off another one of his signature racist slurs, “Good skinny. This is what is defined as a credible source. Not some windbag Paki academic belching and passing gas.” (doc-id 5280688)

One of Smith’s contacts was Mehdi al-Harati, an Irish-Libyan who was the commander of the Tripoli Revolutionary Brigade and deputy commander of the Tripoli Military Council prior to his resignation on 11 October 2011. (doc-id 966063)

During his involvement with Stratfor, Smith provided intelligence on missing surface-to-air missiles (SAMs) (doc-id 5321612) and allegedly “took part” in the killing of former Libyan dictator Muammar Gaddafi. (doc-id 3980511)

On the same day Burton was informed of Smith’s new assignment to Syria, he requested an overview of the Syrian opposition from the Startfor briefers, Zucha and Aflano.

Zucha in turn contacted Ashley Harrison, a tactical analyst, for more in-depth info about the Syrian opposition. Harrison responded with an attached 14-page document detailing key groups and their leaders. (doc-id 5355211)

The trail of emails ends December 13, days before the Stratfor mail servers were reportedly hacked, with Burton saying that his source “is meeting w/specific people described as key leaders.” (doc-id 5293788)

SOURCE:
http://english.al-akhbar.com/content/blackwater-veteran-took-part-gaddafi-killing-asked-us-help-syrian-opposition

By: Yazan al-Saadi, March 19, 2012

The 10 Major Food Companies – Flowchart Infographic

The 10 Major Food Companies – Flowchart Infographic

 

Wholesale and distribution

A vast global transportation network is required by the food industry in order to connect its numerous parts. These include suppliers, manufacturers, warehousing, retailers and the end consumers. There are also companies that add vitamins, minerals, and other necessary requirements during processing to make up for those lost during preparation. Wholesale markets for fresh food products have tended to decline in importance in OECD countries as well as in Latin America and some Asian countries as a result of the growth of supermarkets, which procure directly from farmers or through preferred suppliers, rather than going through markets.

The constant and uninterrupted flow of product from distribution centers to store locations is a critical link in food industry operations. Distribution centers run more efficiently, throughput can be increased, costs can be lowered, and manpower better utilized if the proper steps are taken when setting up a material handling system in a warehouse. [1]

Retail

With populations around the world concentrating in urban areas,[5] food buying is increasingly removed from all aspects of food production. This is a relatively recent development, having taken place mainly over the last 50 years. The supermarket is the defining retail element of the food industry, where tens of thousands of products are gathered in one location, in continuous, year-round supply. Restaurants, Cafes, Bakeries and Mobile trucks are also ways consumers can purchase food.

Food preparation is another area where change in recent decades has been dramatic. Today, two food industry sectors are in apparent competition for the retail food dollar. The grocery industry sells fresh and largely raw products for consumers to use as ingredients in home cooking. The food service industry by contrast offers prepared food, either as finished products, or as partially prepared components for final “assembly”.

Food industry technologies

Sophisticated technologies define modern food production. They include many areas. Agricultural machinery, originally led by the tractor, has practically eliminated human labor in many areas of production. Biotechnology is driving much change, in areas as diverse as agrochemicals, plant breeding and food processing. Many other areas of technology are also involved, to the point where it is hard to find an area that does not have a direct impact on the food industry. Computer technology is also a central force, with computer networks and specialized software providing the support infrastructure to allow global movement of the myriad components involved.

Marketing

As consumers grow increasingly removed from food production, the role of product creation, advertising, and publicity become the primary vehicles for information about food. With processed food as the dominant category, marketers have almost infinite possibilities in product creation.

Media & Marketing

A key tool for FMCG marketing managers targeting the supermarket industry includes national titles like The Grocer in the U.K., Checkout in Ireland, Progressive Grocer in the U.S., and Private Label Europe for the entire of the European Union.it

 

http://en.wikipedia.org/wiki/Food_industry

http://www.foodprocessing.com/top100/index.html

Operation COLTAN: Raising Awareness of the Slave Labor Exploitation Super Mineral

Operation COLTAN: Raising Awareness of the Slave Labor Exploitation Super Mineral

Coltan: What You Should Know

What is Coltan?
Coltan is short for Columbite-tantalite – a black tar-like mineral found in major quantities in the Congo.. The Congo possesses 80 percent of the world’s coltan. When coltan is refined it becomes a heat resistant powder that can hold a high electric charge. The properties of refined coltan is a vital element in creating devices that store energy or capacitors, which are used in a vast array of small electronic devices, especially in mobile phones, laptop computers, pagers, and other electronic devices.

Who are the primary exploiters of Coltan in the Congo?
Rwanda, Uganda, Burundi and their proxy militias are the primary exploiters of coltan in the Congo. In an 18 month period Rwanda made $250 million as a result of exploitation of coltan in the Congo. Although Rwanda and Uganda possess little or no coltan, during the period of the war in the Congo, their exports escalated exponentially. For example, Rwanda’s coltan export went from less than 50 tons in 1995 to almost 250 tons in 1998. Zero cassiterite was transported from the Congo to Uganda in 1998, however by 2000 151 drums were transported.

The United Nations notes in its 2001 report on the Illegal Exploitation of Natural Resources in the congo that “The consequences of illegal exploitation has been twofold: (a)massive availability of financial resources for the Rwandan Patriotic Army, and the individual enrichment of top Ugandan military commanders and civilians; (b) the emergence of of illegal networks headed by either top military officers or businessmen.”

Foreign Corporate exploitation
Although the countries mentioned above directly exploit coltan, foreign multi-national corporations have been deeply involved in the exploitation of coltan in the Congo. The coltan mined by rebels and foreign forces is sold to foreign corporations. Although, the United Nations in its reports on the Congo do not directly blame the multi-national corporations for the conflict in the Congo, the United Nations does say that these companies serve as “the engine of the conflict in the DRC.

Major United States players include:
Cabot Corporation, Boston, MA
OM Group, Cleveland, Ohio
AVX, Myrtle Beach, SC
Eagle Wings Resources International, Ohio
Trinitech International, Ohio
Kemet Electronics Corporation, Greenville, SC
Vishay Sprague. Malvern, PA

Corporations from other countries have been a part of the coltan exploitation chain. These companies include but are not limited to Germany’s HC Starc and EPCOS, China’s Nigncxia, and Belgium’s George Forrest International.

Once the coltan is processed and converted to capacitors, it is then sold to companies such as Nokia, Motorola, Compaq, Alcatel, Dell, Hewlett-Packard , IBM, Lucent, Ericsson and Sony for use in a wide assortment of everyday products ranging from cell phones to computer chips and game consoles.

What are some of the uses of coltan in modern society?
• Laptop computers
• Cellular phones
• Jet engines
• Rockets
• Cutting tools
• Camera lenses
• X-ray film
• Ink jet printers
• Hearing aids
• Pacemakers
• Airbag protection systems
• Ignition and motor control modules, GPS, ABS systems in automobiles
• Game consoles such as playstation, xbox and nintendo
• Video cameras
• Digital still cameras
• Sputtering targets
• Chemical process equipment
• Cathodic protection systems for steel structures such as bridges, water tanks
• Prosthetic devices for humans – hips, plates in the skull, also mesh to repair bone removed after damage by cancer
• Suture clips
• Corrosion resistant fasteners, screws, nuts, bolts
• High temperature furnace parts.
• High temperature alloys for air and land based turbines

Links and Resources

Coltan Wiki Facts
Guns, Money and Cell Phones
United Nations Coltan Primer
Congo’s Coltan Rush!


POLE Institute Report “The Coltan Phenomenon!” (PDF)
Columbium and Tantulum: US Geological Survey (PDF)
China and Congo’s Coltan Connection (PDF)

Congo War – 4 Million Dead (PDF)
Coltan Facts (PDF)
FFI Coltan Report (PDF)

 

The components controlling the flow of electricity in mobile phones are composed of the refined mineral known as Coltan. With more and more people using mobile phones the demand for Coltan has increased significantly.

Mobile phones fuel Congo conflict

The largest reserves of Coltan are to be found in the Democratic Republic of the Congo, and much of the finance sustaining the civil wars in Africa, especially in the Democratic Republic of the Congo, is directly connected to Coltan profits. Coltan is extracted under terrible working conditions in mines in Eastern Congo.

The United Nations reports child labour in Africa has significantly increased in Coltan mines. In some regions of the Congo, about 30 percent of schoolchildren are now forced to work in the mines.

It can be dangerous to ask questions

“The control over these resources works through maintaining local militia and exploiting cheap labour to excavate the mines”, says Antony Grange, Country Coordinator with experience from the DanChurchAid work in DRC Congo. “Attempting to oppose these practices locally is very risky business, as DanChurchaid’s former partner “Héritiers de la Justice” knows all too well since they have experienced several assassination of their staff members in the recent years. Only international pressure may stop this development,” says Antony Grange.

International pressure is important

When Denmark become a member of the UN Security Council, the Danish Government put the actions to promote peace and stability in Africa on top of the agenda, and they promised to put a focus on the role natural recourses play as a cause to many conflicts. Income from oil, diamonds and export of woods, continues to fuel armed conflicts.

A call to action

However, Denmark has not managed to convince the Security Council to strengthen the present activities. Therefore the Danish development NGOs now call on the Minister for Foreign Affairs to bring the issue to the table and to work for more efficient tools for the UN to punish those who make profit out of the conflict resources. The organisation also calls for a permanent position within the UN, with a mandate to work for prevention of conflicts financed by natural resources such as oil, woods, and minerals.

Zombie Survival Maps Show Danger Zones, Armories and Food Sources for Entire U.S.

Zombie Survival Maps Show Danger Zones, Armories and Food Sources for Entire U.S.

How safe are you when the zombies come for your brain? Photo: Google Maps/Doejo

 

The Walking Dead teaches us that well-stocked pantries and armories are paramount to the survival of the human race after a zombie infestation. Canned food and ammunition: You can never have enough of these key essentials.

Enter the Map of the Dead from Doejo, which overlays zombie danger zones and potential supply locations on a Google Map of your local haunts. Red areas denote population centers where zombies might graze, while dark gray zones cover parks and wilderness areas, which are most likely to be walker-free. Supply locations are annotated with helpful descriptions — liquor stores, hospitals, gun shops, military bases and cemeteries are just some of the locations highlighted.

The map uses Google APIs and keyword searches to determine the location types that appear on the maps. The developers at Doejo are looking into adding more location types, such as schools, pawn shops and barricades. Unfortunately, certain keywords are currently returning too many false positives for these types of landmarks.

As for user-generated content — in other words, crowd-sourced supply and hiding place annotation — it’s something Doejo is exploring, but has no definite plans to implement. Which might be good. You don’t want to share your favorite fortified sniper perch with the whole world.

Still, with the Doejo maps, you can better plan for the coming zombie apocalypse, and even other natural disasters. At Gadget Lab, we scanned not only our local San Francisco environs, but also Chicago and New York City to determine safe zones should the worst come to pass. (We briefly considered a quick survey of Los Angeles, but decided that traffic snarls will doom the City of Angels to a quick and unstoppable zombie epidemic. Sorry, LA. We’ll miss your movie blockbusters and sunny beaches.)

Here’s a quick look at how well our three metropolitan areas are set up for riding out the zombie plague.

Manhattan

 


Shut down the bridges and start rooting out the undead. Photo: Google Maps/Doejo

Manhattan is an island, which gives it an advantage over outlaying areas, insomuch that once the city shuts down the bridges and tunnels, survivors can start rooting out the water-locked zombies. On the flipside, a quick look at the map shows only three gun stores.

Sure, you can kill a zombie with a well-placed smack to the head, but who wants to get that close to something that wants to chew on your shoulder? Also, be careful about that military base between the two cemeteries — it’s actually just a recruitment center. And, of course, stay far away from cemeteries, which are typically popular spawning points for the undead.

As with all the Doejo maps of metropolitan areas, the Manhattan map only shows major stores, and leaves out neighborhood bodegas. So make friends with the owners of these stores right now. A few pleasantries today could prove fruitful tomorrow.

Chicago

 


Zombies don’t want deep dish, they want brains. Photo: Google Maps/Doejo

The Windy City is surrounded by suburbs on three sides. That much open space could help the citizens of Chicago escape early in the infestation. That said, if you’re trapped in the city, it’s best to stay near the shore, as it’s easier to defend three sides than four. Plus, if you have an escape boat, you can head to Canada where the zombies are allegedly nicer.

Four military bases are within the immediate Chicago area, and could potentially help keep zombie infestation to a minimum. Or, conversely, the soldiers could become zombies — military-trained zombies with access to guns. It’s a judgement call. You have the map, so at least you know your options.

San Francisco

 


All those peace rallies could suddenly become zombie buffets. Photo: Google Maps/Doejo

San Francisco has the advantage of being at the tip of a peninsula. Shutting down the two bridges the lead into the city should be no problem. The disadvantage of San Francisco is that it’s San Francisco, home of pacifism and protest. People here may not have the gumption to mount an effective counter-attack, and no amount of pacifistic protesting will stop a zombie from popping open your skull, and devouring your brain like it’s soup inside a sourdough bread bowl.

Our lack of local gun stores is especially disturbing. Hopefully, the thin design of the MacBook Air — you can find four or five in every local hipster cafe — will help these notebooks serve as effective weapons for zombie decapitation.

San Francisco’s saving grace may be its DIY resourcefulness. Within a few days of the collapse of society, someone will probably have an open-source 3D printable weapon that not only kills zombies, but also offers a much lower carbon footprint than your average bullet.

Plus, San Francisco moved all of it’s dead to the nearby suburb of Colma. That should cut down on the first wave of zombies that wander the streets lusting for brraaaiiinnnsss.

SOURCE:
http://www.wired.com/gadgetlab/?p=96515

By: Roberto Baldwin, April 11, 2012

Supreme Court Makes It Even More Impossible for Torture Victims to Win Lawsuits

Supreme Court Makes It Even More Impossible for Torture Victims to Win Lawsuits

The US Supreme Court unanimously decided that foreign political organizations and multinational corporations cannot be sued for the torture or extrajudicial killing of persons abroad under an anti-torture law passed in 1992. The law only gives people the right to sue “an individual,” “who acted under the authority of a foreign nation,” according to the Los Angeles Times.

The decision came in a lawsuit filed by the family of a US citizen, Azzam Rahim, who was tortured and killed in the Palestinian Territory by Palestine Liberation Organization (PLO) intelligence officers. It was Justice Sonia Sotomayor, who President Barack Obama appointed to the Supreme Court, that spoke for the decision. She explained the text of the Torture Victims Protection Act of 1991 “convinces us that Congress did not extend liability to organizations, sovereign or not. There are no doubt valid arguments for such an extension. But Congress has seen fit to proceed in more modest steps in the Act, and it is not the province of this branch to do otherwise.”

This outcome is not just a blow for the family of Rahim but also those concerned with human rights. If one considers the intent of the law, it seems like Rahim’s family should not have been scoffed at as they were for bringing the lawsuit. (Chief Justice John Roberts laughed at the lawyer for the family, Jeffrey Fisher, during arguments in Court.)

President George H.W. Bush, who signed the law, intended this to be legislation that would push Congress to ratify the Convention Against Torture:

I regret that the legislation proposed by the Administration to implement the United Nations Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment has not yet been enacted. This proposed implementing legislation would provide a tougher and more effective response to the problem, putting in place for torturers the same international “extradite or prosecute” regime we have for terrorists. The Senate gave its advice and consent to the Torture Convention on October 27, 1990, but the United States cannot proceed to become a party until the necessary implementing legislation is in place. I again call upon the Congress to take prompt action to approve the Torture Convention implementing legislation.

The law was already considered a law that would not apply to the US Armed Forces or law enforcement operations that were carried out under US law.

UN Special Rapporteur on Torture Juan Mendez submitted a brief to the court in support of Rahim that outlined the fact that the Torture Convention is supposed to help “prevent torture” by “persons who act, de jure or de facto, in the name of, in conjunction with, or at the behest of the State Party.” In other words, being a government official doesn’t make one immune to prosecution. Any person who is complicit or participates in torture is to be criminalized. There are to be civil remedies in place to compensate and give justice to victims of torture. What this ruling does then is undercut the United States’ responsibility to uphold the Torture Convention.

Aside from the reality that the US government finds it has no obligation to do what signatories to the Torture Convention are expected to do, the ruling is troublesome on another level because the comments from Supreme Court justices suggest if the family of Rahim knew the names of people that had tortured and killed him then they might not have had a weak case.

Now, against scholarly understanding of international law, the Court has effectively rendered precedents where non-state actors, like corporations, have been held liable for torture moot. As the Yale Law School Center for Global Legal Challenges demonstrates in a brief, they are contradicting the US State Department policy:

The U.S. State Department has routinely acknowledged that non-state groups and organizations have engaged in torture. See, e.g., U.S. Dep’t of State,  Democratic Republic of the Congo: Country Reports on Human Rights Practices (Feb. 23, 2000) (citing credible reports that “Mai Mai groups fighting on the side of the Government committed * * * torture * * * of civilians”); U.S. Dep’t of State, Sri Lanka: Country Reports on Human Rights Practices (Mar. 4, 2002) (“[T]wo former Tamil terrorist organizations aligned with the former PA Government * * * have been implicated in cases involving extrajudicial killing [and] torture.”).

It was already difficult for torture victims to win lawsuits. In December 2011, a federal judge dismissed a lawsuit by a former Guantanamo detainee claiming US military officials had tortured him repeatedly. A federal appeals court dismissed torture cases against Abu Ghraib contractors in September 2011. The Ninth Circuit dismissed a suit against Jeppesen Dataplan that alleged they had “knowingly aided in the rendition and subsequent torture of terror suspects by the CIA,” after the Obama Justice Department invoked a state secrets privilege. A federal appeals court did allow a lawsuit against former Secretary of Defense Donald Rumsfeld for authorizing torture to move forward, but a district court dismissed another lawsuit against him for authorizing the torture of detainees by US military personnel in Iraq and Afghanistan. And, months before that, a lawsuit brought by convicted terrorist Jose Padilla against US Defense Secretary Robert Gates and Rumsfeld for their role in his torture and isolation on a Navy military brig was thrown out and the Obama Justice Department determined that Bush administration lawyers that had crafted legal justification for torture had engaged in no “professional misconduct.”

If torture is illegal, it is only prohibited from being expressly included in policies of agencies or departments. It most certainly is something agents, military personnel and government officials can engage in and avoid prosecution. Given that reality, the narrow interpretation is not necessarily surprising. Using this case to create a precedent that grants cover to corporations that engage in torture is in line with the culture of impunity that has been fostered by US government. Unfortunately, if torture victims want justice, the United States is one of the last countries they should turn to for reparations at this point in history.

By: Kevin Gosztola Wednesday April 18, 2012 6:40 pm

Source: http://dissenter.firedoglake.com/2012/04/18/supreme-court-makes-it-even-more-impossible-for-torture-victims-to-wi-suits/

The Way of the Drone: Emblem for an Empire of Cowards

The Way of the Drone: Emblem for an Empire of Cowards

A few months back, I reposted here an article that I wrote 10 years ago, before the invasion of Iraq: a fictional scenario of how the Terror War would play out on the ground of the target nations — and in the minds of those sent to wage these campaigns. I was reminded of that piece by a story in the latest Rolling Stone.

The RS story, by Michael Hastings, depicts the drone mentality now consuming the US military-security apparatus, a process which makes the endless slaughter of the endless Terror War cheaper, easier, quieter. I didn’t anticipate the development in my proleptic piece; the first reported “kill” by American drones, in Yemen, had taken place just a few weeks before my article appeared in the Moscow Times.

(One of the victims of this historic first drawing of blood was an American citizen, by the way. Thus from the very beginning, the drone war — presented as noble shield to defend American citizens from harm — has been killing American citizens, along with the hundreds and hundreds and hundreds and hundreds of innocent men and women around the world being murdered without warning — and without any chance to defend themselves or take shelter — by cowards sitting in padded seats behind computer consoles thousands of miles away, following orders from the even greater cowards who strut around the Pentagon, CIA headquarters and the White House.)

But what brought my earlier piece to mind was a brief mention of the “military slang” now being used to designate the victims of the drones. Below are a few snippets from my 2002 post, a fictional email by an occupation soldier to a friend:

      Yo, Ed! I’m looking out the window of Watchtower 19 in Force Zone Seven. They’re loading up the dead wagon. Three friendlies, two uncardeds, the usual collateral – and one bug. We zapped the market before the bug got his hard-on – another one of those Czech AK-47 knock-offs that our friendly neighborhood warlord keeps bringing in. He says he doesn’t know how the bugs get hold of them – they drop down from heaven, I guess …

… I’d just come off night patrol in Deep-City Zone, hardcore bugland, backing up some Special Ops doing a Guantanamo run on terrorperp suspects. Banging down doors, barrel in the face of some shrieking bug-woman in her black bag, children scuttling in the dark like rats, the perp calling down an airstrike from Allah on our heads. You know the drill. You know the jangle. Not even the new meds can keep you blanked out completely.

So there’s always the overstep somewhere. Woman’s cheekbone cracking from a backhand, some kid stomped or booted out of the way. Some perp putting his hand in one of those damned dresses they wear, going for who knows what – Koran? Mosquito bite? Scimitar? Czech special? – and you open up. More shrieking, more screaming – and then the splatter on the wall.

In the new Rolling Stone story, Hastings tells us how America’s brave drone warriors view their victims:

    For a new generation of young guns, the experience of piloting a drone is not unlike the video games they grew up on. Unlike traditional pilots, who physically fly their payloads to a target, drone operators kill at the touch of a button, without ever leaving their base – a remove that only serves to further desensitize the taking of human life. (The military slang for a man killed by a drone strike is “bug splat,” since viewing the body through a grainy-green video image gives the sense of an insect being crushed.)

“Bugs” being “splattered.” This is what Barack Obama — who has expanded the drone death squads beyond the imaginings of George W. Bush — and all of his brave button pushers and joystick riders think of the defenseless human beings they are killing (including 174 children by last count).

This has been the attitude underlying the Terror War since its beginnings. When I wrote my piece with its “bug” imagery, I was only reflecting what was already obvious and pervasive, both in the military-security war machine and in much of the general public. Anyone designated by those in power as an “enemy” — for any reason, known or unknown, or for no reason at all — is considered a subhuman, an insect, whose destruction is meaningless, without moral content, like swatting a fly on the wall. (As, for example, in this 2008 piece about a figure much lauded by progressives at the time: “Crushing the Ants.”)

There is not only a tolerance for this official program of state murder; there is an absolute enthusiasm for it. Our rulers heartily enjoy ordering people to be killed. (And to be tortured, as we noted here last week.) It makes them feel good. It makes them feel “hard,” in every sense of the word. As Hastings notes:

    From the moment Obama took office, according to Washington insiders, the new commander in chief evinced a “love” of drones. “The drone program is something the executive branch is paying a lot of attention to,” says Ken Gude, vice president of the Center for American Progress. “These weapons systems have become central to Obama.” In the early days of the administration, then-chief of staff Rahm Emanuel would routinely arrive at the White House and demand, “Who did we get today?”

Here are some examples of what Rahm and his then-boss, the Nobel Peace Prize Laureate, were “getting” with their flying deaths squads:

    But for every “high-value” target killed by drones, there’s a civilian or other innocent victim who has paid the price. The first major success of drones – the 2002 strike that took out the leader of Al Qaeda in Yemen – also resulted in the death of a U.S. citizen. More recently, a drone strike by U.S. forces in Afghanistan in 2010 targeted the wrong individual – killing a well-known human rights advocate named Zabet Amanullah who actually supported the U.S.-backed government. The U.S. military, it turned out, had tracked the wrong cellphone for months, mistaking Amanullah for a senior Taliban leader. A year earlier, a drone strike killed Baitullah Mehsud, the head of the Pakistani Taliban, while he was visiting his father-in-law; his wife was vaporized along with him. But the U.S. had already tried four times to assassinate Mehsud with drones, killing dozens of civilians in the failed attempts. One of the missed strikes, according to a human rights group, killed 35 people, including nine civilians, with reports that flying shrapnel killed an eight-year-old boy while he was sleeping. Another blown strike, in June 2009, took out 45 civilians, according to credible press reports.

And of course there is this, the follow-up to the “extrajudicial killing” of U.S. citizen Anwar al-Awlaki. After killing al-Awlaki — without ever charging him with a single crime — the Obama administration then murdered his 16-year-old son (as we noted here last year). Hastings writes:

      In the days following the killing, Nasser and his wife received a call from Anwar’s 16-year-old son, Abdulrahman al-Awlaki, who had run away from home a few weeks earlier to try to find his now-deceased father in Yemen. “He called us and gave us his condolences,” Nasser recalls. “We told him to come back, and he promised he would. We really pressed him, me and his grandmother.”

The teenage boy never made it home. Two weeks after that final conversation, his grandparents got another phone call from a relative. Abdulrahman had been killed in a drone strike in the southern part of Yemen, his family’s tribal homeland. The boy, who had no known role in Al Qaeda or any other terrorist operation, appears to have been another victim of Obama’s drone war: Abdulrahman had been accompanying a cousin when a drone obliterated him and seven others. The suspected target of the killing – a member of Al Qaeda in the Arabian Peninsula – is reportedly still alive; it’s unclear whether he was even there when the strike took place.

The news devastated the family. “My wife weeps every day and every morning for her grandson,” says Nasser, a former high-ranking member of the Yemenite government. “He was a nice, gentle boy who liked to swim a lot. This is a boy who did nothing against America or against anything else. A boy. He is a citizen of the United States, and there are no reasons to kill him except that he is Anwar’s son.”

The boy was probably killed in a “signature strike,” where bold and brave CIA analysts sit back in their chairs and observe people going about their business in a foreign country far away. If their activities look “suspicious” according to some arbitrary, secret criteria, then they can be slaughtered instantly by a drone missile — even if the attackers have no idea whatsoever who the targets are or what they are actually doing. Plotting terrorism, or praying? Organizing jihad, or holding a wedding? Building bombs, or having lunch? The attackers don’t know — and can’t know. They simply put down their Cheetohs and fire the missile. Who cares? It’s just “bug splatter.”

And the fact is, no one does care. As Hastings notes, this hideous program of murder and terror has been fully embraced by the political elite and by society at large. And our rulers are now bringing it back home with a vengeance, putting more and more Americans under the unsleeping eye of government drones watching their every move, looking for the “signature” of “suspicious” behaviour. Hastings notes:

    In the end, it appears, the administration has little reason to worry about any backlash from its decision to kill an American citizen – one who had not even been charged with a crime. A recent poll shows that most Democrats overwhelmingly support the drone program, and Congress passed a law in February that calls for the Federal Aviation Administration to “accelerate the integration of unmanned aerial systems” in the skies over America. Drones, which are already used to fight wildfires out West and keep an eye on the Mexican border, may soon be used to spy on U.S. citizens at home: Police in Miami and Houston have reportedly tested them for domestic use, and their counterparts in New York are also eager to deploy them.

History affords few if any examples of a free people — in such a powerful country, under no existential threat, undergoing no invasion, no armed insurrection, no natural disaster or epidemic or societal collapse — giving up their own freedoms so meekly, so mutely. Most Americans like to boast of their love of freedom, their rock-ribbed independence and their fiercely-held moral principles: yet they are happy to see the government claim — and use — the power to murder innocent people whenever it pleases while imposing an ever-spreading police state regimen on their lives and liberties. Sheep doped with Rohypnol would put up a stronger fight than these doughty patriots.

Hasting’s story should be read in full. In its straightforward marshalling of facts and refusal to simply parrot the spin of the powerful (something we used to call “journalism,” kids; ask your grandparents about it, they might remember), it lays out the hideous reality of our times. I am tempted to call it an important story — but I know that it will sink with scarcely a ripple into the abyss of our toxic self-regard. A few will read it and be horrified; the rest will stay riveted on the oh-so-exciting and oh-so-important race to see who will get to perpetuate this vile and murderous system for the next four years.

WRITTEN BY CHRIS FLOYD
WEDNESDAY, 18 APRIL 2012 08:37

Source: http://www.chris-floyd.com/component/content/article/1-latest-news/2235-the-way-of-the-drone-emblem-for-an-empire-of-cowards.html

Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most Of Your Emails

Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most Of Your Emails

In his first television interview since he resigned from the National Security Agency over its domestic surveillance program, William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower. Binney was a key source for investigative journalist James Bamford’s recent exposé in Wired Magazine about how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain near-bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls, Google searches and other personal data.

Binney served in the NSA for over 30 years, including a time as technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could “create an Orwellian state.” Today marks the first time Binney has spoken on national television about NSA surveillance. This interview is part of a 5-part special on state surveillance. Click here to see segment 2, 3, 4 and 5. [includes rush transcript]

Bitcoins & The Future Of Online Currency

Bitcoins & The Future Of Online Currency

Bitcoins are not mere drug currency.
Bitcoins are not failing.
Okay?
Are we clear about that?

Good.

The future of online commerce looks to rely less and less on the physical amount of money you have in your bank accounts and wallets and more on what you could call “digital” wallets: online reservoirs where you store money. Really, we already use some variation of a digital wallet, we just don’t easily acknowledge it. You work, you get paid via direct deposit, numbers change in your checking account, you use debit and credit cards to make transactions, you go back to work. Rinse, repeat. You hardly ever see cash unless you deliberately withdraw it from an ATM. Anymore, our money consists of strings of number values running through some computer located who knows where. We just confidently assume that all that money is actually staying or going where it should be staying or going.

While that describes our current model of commerce, it also serves as a fair portrait of Bitcoins, the emerging currency exclusive to the Internet.

If you’re familiar with Bitcoins and run an online business, how do you feel about accepting this form of currency? Cash currency has never kept somebody from getting ripped off, so what is the main hesitation for you and your business when it comes to accepting an exclusively online currency? If you’re unsteady about it right now, what would you like to see change with Bitcoins (or any type of online currency) before you were more comfortable with using it? Or, are you totally onboard with this form of currency already? Share your thoughts with us and other readers below in the comments.

Essentially, Bitcoins are an intangible currency, really no different in action than the numbers bouncing up and down in your bank account. Alternately, instead of representing sums of physical currency, Bitcoins are literally a majestic sequence of unique numbers that can be traded for goods. Instead of swapping wads of bound fibers and inks that are woven together into this germy thing we call cash, Bitcoins exist in a purely digital tapestry. It’s an experiment in decentralized currency, and while it’s been a good experiment and still has some growing to do, it doesn’t show any signs of disappearing anytime soon.

While it’s still got some time to really appreciate and grow stronger as a currency, a purely online currency will exist in one form or another. It won’t ever replace your tangible currency, but work alongside it for all of your online consumer decisions.

To find out more about the current state of Bitcoins and what will happen with them in the near (and far) future, I got in touch with Gavin Andresen, the Lead Core Bitcoin Developer, about the developments of the past year regarding Bitcoins and why this novel currency could feature prominently in the future of online commerce.

Bitcoins: A Primer

Money as an object is meaningless. It’s paper and and some inks and, thanks to people, lots of bacteria. It’s an arbitrary token that merely represents a commercial promissory value people can earn in exchange for goods or services that can then either be saved or spent on other goods or services. Dollars, euros, yen, pounds, rupees, tobacco leaves, rands – it doesn’t matter what object you invest value into, it’s the idea behind the currency that buttresses its value. The Bitcoin is no different.

The only difference is that, as opposed to physical money that you’ll stuff into your pockets and wallets, you will likely never actually hold a Bitcoin (yes, there are physical versions of Bitcoins if you absolutely must have a real version to thumb around in your palms). Just because you’re likely to never touch one, though, doesn’t mean that Bitcoins are any less valuable than the bills you have folded up in your right pocket. Instead, think of it like this: you are no more likely to hold a Bitcoin in your hand than you are to hold Pythagoras’ theorem in your hand.

What does distinguish this disembodied currency from its corporeal familiars, however, is that Bitcoins are not dependent on anything except the people who produce and use it. No governments, no banks, no organizations – just people. A truly anarchistic, peer-to-peer currency.

For a simplified explanation for how the Bitcoin market works on a consumer level, have a look at this video put together by We Use Coins.

The currency, however, doesn’t just fall into your lap like a prize from a cereal box, nor is it just magically conjured up from the imagination like the latest Internet meme. The production of Bitcoins is best explained through the simile of gold mining. Instead of boring through a mountain to unearth precious metals, new Bitcoins are generated by unlocking a mathematical sequence called a block chain and are doled out in increments of 50. The people that produce these Bitcoins, then, are known as miners (that’s actually the technical term for Bitcoin producers, too, not just a metaphorical descriptor). These miners, however, have traded in their helmets and pickaxes in exchange for loads of GPU firepower and very sophisticated software capable of deciphering the block chains. The software works in tandem across a network to solve these cryptographic proofs and the miner who is the first to solve the block chain will receive the 50 Bitcoins. Once a block chain has been unlocked, it is added to a ledger in order to prevent those Bitcoins from double-spending.

Eventually, as more blocks are solved, fewer Bitcoins will be generated because the block chains will be worth fewer new coins. Solving a block chain today is worth 50 new Bitcoins, but as of this December that reward will be reduced to 25 Bitcoins. Some time off in the future, it will be reduced again to 12.5. The gradual reduction in rewards works to mitigate the generation of new Bitcoins so as to avoid flooding the market, which would result in a devalued currency.

As more miners work to generate Bitcoins, the difficulty in unlocking the block chains increases so as ensure that a new block is generated only every 10 minutes on average. The increased difficulty of unlocking a block chain’s sequence is designed in such a way that, over time, the maximum capacity of Bitcoins that will be generated will be 21 million. Added to the multiplied difficulty of solving subsequent block chains, more and more computer power is required, which some have said could be a deterrent for would-be miners from working on the more difficult block chains. Andresen disagrees with the argument that hardware needs are becoming preventive. “Mining Bitcoins is becoming increasingly energy efficient,” he says. “Bitcoin miners want to pay as little as they can for electricity, so they’re constantly working to make mining more efficient.”

Energy requirements wouldn’t really matter in the grand scheme of Bitcoin production anyways, Andresen explains, as the Bitcoin production process is smart enough to adjust for variations in the miner work force. “The Bitcoin system adjusts itself so that the target number of Bitcoins are created about every 10 minutes, no matter how many miners there are.”

He adds, “The number of Bitcoin miners has almost nothing to do with how quickly Bitcoin transactions are processed, so it doesn’t matter to the Bitcoin system how much energy or how many miners are working – as long as there is one, the system will work.”

The production of Bitcoins isn’t infinite, though. In fact, there is a fixed amount that will ever be produced: 21 million. Although that peak Bitcoin mark isn’t expected to be reached until 2140, the number of Bitcoins generated will begin to taper off toward zero well before that, at which point miners will then be compensated with Bitcoin transaction fees. As the generation of Bitcoins decreases over time, the cost of a transaction using Bitcoins will increase, which these blocks exist to verify. In lieu of transaction fees, though, Andresen postulates that miners could also be compensated by a “more complicated arrangement between merchants that want their transactions confirmed quickly and securely.” One way or another, though, the monetary reward for generating Bitcoins will always be present.

As of this year, over 8 million Bitcoins have been generated. The first block of Bitcoins to be unlocked was completed by Satoshi Nakamoto, who could be considered the progenitor of Bitcoins. As Wired Magazine’s Benjamin Wallace covered extensively in a piece about bitcoins last year, Nakamoto might be best understood as the Tyler Durden of the Bitcoin culture. An effluvium of mystery envelopes Nakamoto as no one is certain of who he is or where he came from or, most intriguing, where he disappeared to following his last public communication near the end of 2010. It’s rumored the name was a pseudonym or that Nakamoto was actually a collective of developers. It’s even been suggested that Nakamoto was a nom de guerre for assorted bodies of the United States government. Nobody knows, and every major player in the Bitcoin industry denies being Nakamoto.

At this point, though, as the Bitcoin system is beginning to become more stabilized and the project is on the cusp of transcending any one person, does the origin of Bitcoins really matter anymore? It’s been around long enough to confidently assess that dealing in Bitcoins is likely not some kind of Faustian gamble. Besides, one of the prominent features of Bitcoins is its near-anonymity of the users who deal with it, a quality celebrated by Bitcoin proponents. If the currency users are mostly anonymous, why then shouldn’t the progenitor of Bitcoins be anonymous, too? If the shoe fits, right? We could all be Nakamoto and none of us would be Nakamoto. To obsess over the origin of Bitcoins threatens to belie the hard work that the currency’s current legion of developers are doing in order to bolster Bitcoins into a formidable, viable option for online commerce.

The Problem With Bitcoins

The Bitcoin has had a tumultuous twelve months. Perhaps its biggest mainstream debut to date happened in June 2011 when Gawker’s Adrian Chen published a piece about the underbelly of the Internet, the Silk Road, where you can buy, among other things, any fashion of drugs (drugs I didn’t even think existed anymore) one desires. Because of the anonymity that accompanies the use of Bitcoins, the Silk Road trades exclusively in the currency. As Gawker’s story was many people’s introduction to Bitcoins, the piece carelessly marginalized it as The Currency for underground drug trafficking on the Internet.

Regardless of Gawker’s oversights, Bitcoins blew up. The value of Bitcoins skyrocketed after Chen’s piece began to circulate and inspire interest in legions of new potential customers of Silk Road. Consequently, Senator Chuck Schumer called for a federal investigation into the Silk Roadin order to hopefully shut it down. Now that the Bitcoin market had attracted the attention of the United States government, the popularity of the currency continued skyward.

The boom was short-lived, though, as it was not an organic and sustainable growth. It was an artificial trend born from a sudden onslaught of sensational media attention that ballooned the value of the currency. Being at the mercy of the public’s caprice, though, the value of Bitcoins crashed back to Earth a month later. By August, it had returned to its pre-Gawker levels.

Five months after the Gawker piece, Wired was preparing the toe-tags for Bitcoins, citing the currency’s sustainability problems and increasing lack of interest in the continued production of Bitcoins.

Andresen concurs that Bitcoins were pushed out onto the main stage long before the system was ready to handle that kind of attention. “We had a press avalanche last year,” he says, “Where the first couple of mainstream articles about Bitcoin caught the attention of other reporters, who in turn also wrote about it, which then triggered even more press.”

He continues, “That was both great and terrible for the project: great because it drew a lot more technical and business talent to look at Bitcoin and start Bitcoin-related projects, but terrible because when people realized that Bitcoin still has a lot of growing up to do, the speculative bubble popped.”

It’s misleading to say that Bitcoins failed because of that popped bubble. True, investing in Bitcoins currently isn’t as profitable as it was for a brief period last year, but that kind of inflation was artificially generated and really should never have happened in the first place. More, it’s probably not the last time the Bitcoin will encounter some heavy turbulence. “I think it is very likely the same thing will happen again sometime in the next few years as other parts of the world discover Bitcoin or it is re-discovered in Europe and the U.S.,” Andresen says. “I expect the wild price fluctuations to diminish over time as Bitcoin infrastructure grows up and speculators start to get a better idea of the real value of Bitcoin.”

That’s Money 101 for you, though: the potent volatility of supply and demand working upon, for better or worse, the unpredictable engines of human interest. Adding to the uncertainty is the fact that, most obviously, people already have a form (if not multiple forms) of currency, which has likely created an erroneous impression for the laity that Bitcoins are a second-class currency.

Then again, Bitcoins were never really intended to launch like an unstoppable money-missile into the future. Nakamoto, Andresen, and other Bitcoin developers have always cautioned investors that Bitcoins should at best be considered an experiment. “I tell people to only invest time or money in Bitcoin that they can afford to lose,” Andresen says. “There are a lot of things that could possibly derail it, ranging from some fundamental flaw in the algorithm that everybody has missed (he doesn’t see this as a likely possibility at this point) to world-wide government regulation (also unlikely, he says) to some alternative rising up and replacing Bitcoin.”

In a way, the story thus far of Bitcoins as an unpredictable investment is the quintessential story of the Internet as a whole. Every prominent company that currently claims a seat among the pantheon of technology giants – Apple, Google, Facebook, Twitter, IBM, et al. – has come into that position due to the rise and fall of previous online ventures. The lessons gleaned from the decline of previous companies like the Myspaces and Friendsters and Lycos is likely the only reason the current generation of tech leaders have managed to prevail for so long. In the end, the diminished presence of these companies is less a woeful tale of failure and more a triumphant testament to how resilient and efficient the evolution of ideas has been on the Internet, especially in such a short amount of time.

With Bitcoins, it remains to be seen if it will eventually be minted as a mainstay in online culture or merely serve as an early milestone in the continuing evolution of online currency. Andresen is optimistic, though, that Bitcoins are here to stay even in light of competing online currencies possibly popping up in the future. “I think to overcome Bitcoin’s head-start, an alternative will either have to have a large company or government backing it and marketing it. Or else, it will have to be radically better in some way,” he says.

“There seems to be a perception that Bitcoin is in a winner-take-all race against other currencies; either everybody in the world will be using it for all of their online purchases in 50 years or it will not exist. I think the online payment world will like our current world of currencies – different currencies used in different places. The online payments won’t be divided by geography, though it might be divided by language or culture or social network.”

As it were, the currency network’s public image may have taken a bruising last year, but the reports of Bitcoin’s demise appear to have been exaggerated.

The Currency of the Future?

For now, the Bitcoin experiment appears to have weathered the Great Media Blitzkrieg of 2011. Bitcoins’ value is once again growing at the organic rate it was intended to grow at. So… to 2140 and beyond, right?

“I’m not even going to try to predict what will happen in the year 2140,” Andresen is quick to say. His focus is more attuned to the more immediate future of Bitcoins. “In December of this year, the Bitcoin will be 4 years old and the number of new Bitcoins produced will be cut in half. I think we will learn a lot when that happens and that will give some insight into what will happen over the years as Bitcoin production slowly drops to zero.”

Like any model of currency, it’d be a risk to really put all of your eggs into the Bitcoins basket. The currency could have long-term staying power. Then again, it could exist as a prototype that ends up producing a more advanced model of online currency and eventually be supplanted by something like a Bitcoin 2.0, for lack of a better term. Either way, some version of Bitcoin will continue to grow and become a part of our future experience with online commerce.

“I think there will eventually be one dominant currency that is used for 80% of worldwide online transactions,” Andresen predicts, “but I think there will always be alternatives. The most likely outcome in my lifetime, the next 40 years or so, is most people will use their national currencies when purchasing goods and services from other people in their own countries but will use something else for international payments.”

Naturally, as Bitcoins continue to evolve, developers like Andresen are working hard at ensuring the private security of Bitcoin users. Andresen says his past six months have been spent building “multi-signature transactions” for the Bitcoin network. He explains the multi-signature security feature as thus: “They are kind of like if you took all of the paper money in your wallet and then tore it in half and put half in your safe deposit box and kept the other half in your house. A robber would have to break into both your house and your safe deposit box to steal your money.”

You’d be hard pressed to find that kind of security with your current stash of cash if for nothing else but because it would be ungodly inconvenient for the consumer, to say nothing of the ambitious thief. Andresen says that’s one of the major advantages Bitcoins will have over our current terrestrial currency: you can conjunctively store your Bitcoins in two places at once so that in order to use them, a person would need access to both storage sites. One location where you might store your Bitcoins could be a secure website run by a bank which acts as the proverbial safe deposit box for Bitcoins whereas the other could be your computer or smartphone.

“To steal your Bitcoins, thieves would have to break into both your computer or smartphone andyour bank. And, it would be impossible for anybody at the bank to steal them without first breaking into your computer.”

The infrastructure for this multi-signature security technology is still in production, he says, but he expects that by the end of this year “there will be easy-to-use, incredibly secure and convenient solutions for storing and spending Bitcoins.”

With that kind of unprecedented level of security, it’s even possible that in the future Bitcoins might become a wise means for stashing your savings.

While the security advances will likely be a strong draw for future Bitcoin investors, perhaps of equal importance to the gradual growth of Bitcoins will be its acceptance as a form of payment with more online businesses, but that’s all in due time. As the reliability and legitimacy of Bitcoins is developed over time, don’t be surprised to see more online businesses begin accepting it. For now, though, the goal is to nurse the Bitcoin economy to a level where it will persevere the next blizzard of media attention the developers anticipate in the coming years. It’s possible Bitcoins may endure another “rise-and-fall” inflation in the future, but hopefully it won’t so easily shake the faith of the masses, at least as badly as last year’s roller coaster appears to have done.

In the meantime and in-between time, reconsider what those figures in your bank account really mean to you. You might see dollars or whatever your country’s currency happens to be, but the reality is that what you’re using these days intrinsically isn’t so far removed from Bitcoins. The Bitcoin experiment may or may not survive to 2140 but even if the Bitcoin itself were to disappear, the very idea of it is powerful enough that the development of an online currency will undoubtedly continue.

Source: http://www.webpronews.com/bitcoins-the-future-of-online-currency-2012-04

Opinion: Why we need Anonymous 2.0

Opinion: Why we need Anonymous 2.0

by Lisa Vaas on April 24, 2012

A few thoughts on the “hacktivist” group Anonymous that came out of Josh Corman and Brian “Jericho” Martin’s keynote at theSOURCE security conference in Boston last week:

  1. Hacktivist is a sloppy term. A small percentage of those who claim affiliation with the ideology, or movement, or brand, or whatever we wind up calling it, are hackers or activists (5 to 10 percent are skilled hackers or activists, while the lowest common denominators “don’t do much” and are “glorified cheerleaders, at best”, they said).
  2. We need a better, more efficient Anonymous.

Before we explore their rationale for Anonymous 2.0, it’s worthwhile to know why Corman – director of Security Intelligence for Akamai – and Jericho – a “hacker turned security mouthpiece” – care, and why they think we all should.

Here’s how Jericho explained it:

"Most problems on the Internet don't affect us. With Anonymous—and we're using Anonymous as an example for this presentation, but it could be anybody: Anonymous or a splinter group [such as LulzSec] or the next [group] that comes along—almost everyone is involved. Vigilantes, 'good guys,' analysts ... with civilians stuck in the middle. Those whose information is doxed, those people are getting affected more than anyone. If you're affected, you're involved. … Look at [Anonymous's] influence. From analysts, to law enforcement, to former members, to the media, to organized crime, to foreign nation states. "

Nobody in technology, nor in business, for that matter, can get away from fighting Anonymous or other similar groups, whether the fight transpires in media or anywhere else, he said.

So that’s why they care, and why we must. Beyond our own, personal involvement, a broader concern is that much of what we lay at the Anonymous doorstep may be branded as such merely as a smokescreen.

As Corman noted, this amorphous thing we call “Anonymous” has become the perfect scape goat. Anonymous members continually drop in and out of affiliation with, or actions taken on behalf of, the group.

Any attack can be labelled with the Anonymous brand, regardless of whether it was sincerely done under activist principles or is simply branded that way to cover the tracks of, say, a nation state (sound familiar? “Suspicious attack. Must be China!”).

For all the mayhem they’ve caused, much of what “Anonymous” has “done” (I use quotes because there’s often [usually?] no way to determine actual perpetrators) is to simply exploit low-hanging fruit, Jericho said, thus erecting worthwhile signposts to cyber security flaws.

As Corman put it:

"Anonymous has held up a mirror to our defects. [They've done] nothing really hard. They've just showed us how insecure we are [with regards to] basic Internet hygiene. If they turned up the heat, it would be even worse."

In a nutshell, if we can’t deal with the worst the Anonymous-affiliated have to offer, “we’re f*cked,” Jericho said. If that word offends you, “you have to get out of the industry,” because sooner or later, in one fashion or another, you’ll likely have to deal with Anonymous.

Which leads to why we we should wish for, or even need, a better, more efficient Anonymous.

As it is, Jericho said, Anonymous are “a crude, blunt weapon”. Why not a better Anonymous? One that’s more efficient and that gets stuff done with less collateral damage? One that doesn’t dox the personal information of innocent people and put them and their families at risk?

The pair have concocted a three-step plan for Anonymous 2.0. It’s fully laid out in part 5 of their “Building a Better Anonymous” series.

The steps for creating what they call a “a straw man of ‘organized chaos'”:

 

  • Statement of belief, values, objectives, and first principles – i.e. WHY you have come together
  • Code of conduct and operational parameters – i.e. HOW you conduct your pursuit of your common goals
  • A plan for streamlining success, increasing potency, and mitigating risks – i.e. WHAT will make you more successful

 

Would such codification cause the group to splinter? Hopefully. The group needs to specialize, Corman and Jericho said. An Anonymous splinter devoted to free-speech issues would be a boon if it could devote itself to the task at hand, for example.

Does Anonymous agree with the proposals? Anonymous has no unified voice, the keynoters said, so it’s a moot question — it is, after all, a composite, rather than a singular, monolithic group, and there are any number of levels of allegiance and reasons for participating.

But some regular actors in the movement have agreed with the tenets – one plus of a codified Anonymous is the ability to disavow a given action that goes against the stated objectives of the group.

Jericho pointed to the recently announced MalSec (Malicious Security) group as an example of how new splinter groups might codify their beliefs. From their YouTube video:

"For many years we have watched as more unconstitutional laws are proposed and passed and as censorship, disinformation, and corruption have become the norm."

"In an attempt to bring these acts to a halt, we are targeting the very people that have attempted to do us harm. We do, however, fervently believe in free speech. Everyone should be able to express themselves freely, even if others disapprove. As such, we have decided never to remove the original data, when a website of an enemy is defaced."

That’s a start. That’s a statement of a belief – free speech – and a practice – refraining from removing original data. Thus the group can disavow fraudulently labelled MalSec actions.

Now, regarding the term hacktivist: I’ve used it. Lots of journalists have used it. I’m not going to use it anymore.

When Corman and Jericho polled the audience to ask how many thought that the law was winning in its fight against Anonymous, only one hand went up.

That only shows that Anonymous has won the media, Jericho said, whereas the law has failed to engage our attention.

The keynoters’ research has shown that some 184 Anonymous actors have been arrested and charged in 14 countries. Only one in three Anonymous-branded actions make the news, one in five make the news on tech sites, and only one in 30 make the mainstream news.

These are guestimates. The point is, law enforcement is making busts. They need to rattle their sabers more, and we journalists need to pay attention.

We also need a better term than hacktivist, which embodies the romantic type of Robin Hood image that Hollywood, journalists and the public adore.

“The Anonymous affiliated” is kludgy. But perhaps we won’t be able to come up with a better term until Anonymous itself draws its boundaries, making it possible for a given action to be rightfully branded or justifiably disavowed.

If you can think of a better term to use in the meantime, please share it in the comments section.

And kudos to Corman and Jericho for opening up such a thoughtful discussion about a topic that’s too easily simplified and romanticized.

Source: http://nakedsecurity.sophos.com/2012/04/24/opinion-why-we-need-anonymous-2-0/

First Man Arrested With Drone Evidence Vows to Fight Case

First Man Arrested With Drone Evidence Vows to Fight Case

The tiny town of Lakota, N.D., is quickly becoming a key testing ground for the legality of the use of unmanned drones by law enforcement after one of its residents became the first American citizen to be arrested with the help of a Predator surveillance drone.

The bizarre case started when six cows wandered onto Rodney Brossart’s 3,000 acre farm. Brossart, an alleged anti-government “sovereignist,” believed he should have been able to keep the cows, so he and two family members chased police off his land with high powered rifles.

[Photos: North Korea Prepares for Rocket Launch]

After a 16-hour standoff, the Grand Forks police department SWAT team, armed with a search warrant, used an agreement they’ve had with Homeland Security for about three years, and called in an unmanned aerial vehicle to pinpoint Brossart’s location on the ranch. The SWAT team stormed in and arrested Brossart on charges of terrorizing a sheriff, theft, criminal mischief, and other charges, according to documents.

Brossart says he “had no clue” they used a drone during the standoff until months after his arrest.

“We’re not laying over here playing dead on it,” says Brossart, who is scheduled to appear in court on April 30. He believes what the SWAT team did was “definitely” illegal.

“We’re dealing with it, we’ve got a couple different motions happening in court fighting [the drone use].”

Repeated calls to Brossart’s attorney were not returned. Douglas Manbeck, who is representing the state of North Dakota in the case, says the drone was used after warrants were already issued.

“The alleged crimes were already committed long before a drone was even thought of being used,” he says. “It was only used to help assure there weren’t weapons and to make [the arrest] safer for both the Brossarts and law enforcement.”

“I know it’s a touchy subject for anyone to feel that drones are in the air watching them, but I don’t think there was any misuse in this case,” he added.

While there’s no precedent for the use of unmanned drones by law enforcement, John Villasenor, an expert on information gathering and drone use with the Washington, D.C.-based Brookings Institution, says he’d be “floored” if the court throws the case out. Using a drone is no different than using a helicopter, he says.

“It may have been the first time a drone was used to make an arrest, but it’s certainly not going to be the last,” Villasenor says. “I would be very surprised if someone were able to successfully launch a legal challenge [in Brossart’s case].”

[Expert: Ability to Disable Drones Needed Before They Become Terrorist Weapons]

Villasenor points to two Supreme Court cases—California v. Ciraolo in 1986 and Florida v. Riley in 1989— that allow law enforcement to use “public navigable airspace, in a physically nonintrusive manner” to gather evidence to make an arrest.

By summertime, there may be many more cases like Brossart’s—on May 14, the government must begin issuing permits for drone use by law enforcement.

Currently, about 300 law enforcement agencies and research institutions—including the Grand Forks SWAT team—have “temporary licenses” from the FAA to use drones. Currently, drones are most commonly used by Homeland Security along America’s borders.

Bill Macki, head of the Grand Forks SWAT team, says Brossart’s case was the first and only time they’ve used a drone to help make an arrest—they tried one other time (to search for an armed, suicidal individual), but gusty weather conditions made navigation impossible.

[The Coming Drone Revolution: What You Should Know]

With a population of less than 70,000, it doesn’t make sense for the Grand Forks police department to own a helicopter, but the ability to call in a drone when necessary can provide a similar purpose.

SOURCE:
http://www.usnews.com/news/articles/2012/04/09/first-man-arrested-with-drone-evidence-vows-to-fight-case

By: Jason Koebler, April 9, 2012

Why Walking through a Doorway Makes You Forget

Why Walking through a Doorway Makes You Forget

 

Turn the handle and leave the past behind.Image: iStock/Robert Vautour

The French poet Paul Valéry once said, “The purpose of psychology is to give us a completely different idea of the things we know best.”  In that spirit, consider a situation many of us will find we know too well:  You’re sitting at your desk in your office at home. Digging for something under a stack of papers, you find a dirty coffee mug that’s been there so long it’s eligible forcarbon dating.  Better wash it. You pick up the mug, walk out the door of your office, and head toward the kitchen.  By the time you get to the kitchen, though, you’ve forgotten why you stood up in the first place, and you wander back to your office, feeling a little confused—until you look down and see the cup.

So there’s the thing we know best:  The common and annoying experience of arriving somewhere only to realize you’ve forgottenwhat you went there to do.  We all know why such forgetting happens: we didn’t pay enough attention, or too much time passed, or it just wasn’t important enough.  But a “completely different” idea comes from a team of researchers at the University of Notre Dame.  The first part of their paper’s title sums it up:  “Walking through doorways causes forgetting.

Gabriel Radvansky, Sabine Krawietz and Andrea Tamplin seated participants in front of a computer screen running a video game in which they could move around using the arrow keys.  In the game, they would walk up to a table with a colored geometric solid sitting on it. Their task was to pick up the object and take it to another table, where they would put the object down and pick up a new one. Whichever object they were currently carrying was invisible to them, as if it were in a virtual backpack.

Sometimes, to get to the next object the participant simply walked across the room. Other times, they had to walk the same distance, but through a door into a new room. From time to time, the researchers gave them a pop quiz, asking which object was currently in their backpack.  The quiz was timed so that when they walked through a doorway, they were tested right afterwards.  As the title said, walking through doorways caused forgetting: Their responses were both slower and less accurate when they’d walked through a doorway into a new room than when they’d walked the same distance within the same room.

This “doorway effect” appears to be quite general.  It doesn’t seem to matter, for instance, whether the virtual environments are displayed on a 66” flat screen or a 17” CRT.  In one study, Radvansky and his colleagues tested the doorway effect in real rooms in their lab.  Participants traversed a real-world environment, carrying physical objects and setting them down on actual tables.  The objects were carried in shoeboxes to keep participants from peeking during the quizzes, but otherwise the procedure was more or less the same as in virtual reality.  Sure enough, the doorway effect revealed itself:  Memory was worse after passing through a doorway than after walking the same distance within a single room.

Is it walking through the doorway that causes the forgetting, or is it that remembering is easier in the room in which you originally took in the information?  Psychologists have known for a while that memory works best when the context during testing matches the context during learning; this is an example of what is called the encoding specificity principle.  But the third experiment of the Notre Dame study shows that it’s not just the mismatching context driving the doorway effect.  In this experiment (run in VR), participants sometimes picked up an object, walked through a door, and then walked through a second door that brought them either to a new room or back to the first room.  If matching the context is what counts, then walking back to the old room should boost recall. It did not.

SOURCE:
http://www.scientificamerican.com/article.cfm?id=why-walking-through-doorway-makes-you-forget

By: Charles B. Brenner and Jeffrey M. Zacks, December 13, 2011

Bucky Balls Could Double Your Lifespan

Bucky Balls Could Double Your Lifespan

Buckminster fullerene molecules, the naturally occurring spheres made up of 60 carbon atoms, have long been suspected to have biological benefits. Now, a study that set out to establish if they were toxic when administered orally has proven quite the opposite—they almost doubled the lifespan of the rats that they were fed to.

The experiments, which were carried out at the Université Paris Sud, France, set out to assess what adverse reactions might be caused by ingesting Bucky balls orally. To do that, they fed three groups of rats differently. Along with their normal diet, one group was held as a control; a second was fed olive oil; and a third group was fed olive oil doped with a 0.8 mg/ml concentration of Buckminster fullerene.

The results, which appear in Biomaterials, took the researchers by surprise. The control group had a median lifespan of 22 months, and the olive oil group one of 26 months. But the Bucky ball group? They stuck it out for 42 months. That’s almost double the control group.

The researchers have established that the effect is mediated by a reduction in oxidative stress—an imbalance in living cells that contributes to ageing. To say these results are important is an understatement: the desire to live longer runs strong in many of us, and it’s a feat scientists have been hoping to achieve for centuries.

But while it’s a remarkable finding, it’s worth remembering that it’s just a single study. It’s going to take a hell of a lot more work before the scientific community is completely convinced that we should all be splashing Bucky-enriched olive oil on our salads, that’s for sure. [Biomaterialsvia Extreme Longevity]

SOURCE:
http://gizmodo.com/5902703/bucky-balls-could-double-your-lifespan

By: Jamie Condliffe, April 17, 2012

Suicide Riddle of Weapons Expert Who Worked With David Kelly

Suicide Riddle of Weapons Expert Who Worked With David Kelly

  • Body of Dr Richard Holmes discovered in a field four miles from the Porton Down defence establishment
  • Police said there were no suspicious circumstances in latest case but revealed scientist was ‘under a great deal of stress’
  • He resigned from Porton Down last month, but it is unclear why

By NICK CONSTABLE and IAN GALLAGHER

PUBLISHED: 16:58 EST, 21 April 2012 | UPDATED: 17:45 EST, 21 April 2012

A weapons expert who worked with Dr David Kelly at the Government’s secret chemical warfare laboratory has been found dead in an apparent suicide.

In circumstances strongly reminiscent of Dr Kelly’s own mysterious death nine years ago, the body of Dr Richard Holmes was discovered in a field four miles from the Porton Down defence establishment in Wiltshire. It is not yet known how he died.

Mr Holmes, 48, had gone missing two days earlier after telling his wife he was going out for a walk – just as Dr Kelly did before he was found dead at an Oxfordshire beauty spot in July 2003.

Police said there were no suspicious circumstances in the latest case but revealed that Dr Holmes  had ‘recently been under a great deal of stress’.

He resigned from Porton Down last month, although the centre yesterday refused to explain why.
Inevitably, the parallels between the two cases will arouse the suspicions of conspiracy theorists.

Despite Lord Hutton’s ruling eight years ago that Dr Kelly committed suicide, many people – among them a group of doctors – believe his inquiry was insufficient and have demanded a full inquest.

Some believe Dr Kelly, who kept an office at Porton Down right up until his death, was murdered. He was outed as being the source of a BBC report that Downing Street ‘sexed up’ evidence of Iraq’s weapons of mass destruction to justify going to war.

Although it is not clear if the two scientists were close, one source told The Mail on Sunday that they were friendly when they worked at Porton Down in the Nineties.

At the time, Dr Holmes ran a project organising the installation of chemical protection equipment in RAF Sentinel spy planes, while Dr Kelly was head of microbiology and frequently toured the former Soviet Union as a weapons inspector.

After the first Gulf War, Dr Holmes is also thought to have worked on the production of chemical protection suits for troops. In 1991 he was the joint author of a scientific paper about an RAF chemical and biological protection system.

Yesterday, a Porton Down spokesman confirmed Dr Holmes had quit his job but declined to comment further. ‘It is not our policy to speak openly about any individual who works for us,’ she said.

Before finding his body, Wiltshire Police made a public appeal for information but warned people not to approach Dr Holmes for their own safety because they believed he had been ‘looking at information on the internet regarding self-harm and the use of toxic substances’.

Friends of Dr Holmes say this disclosure irritated his family, who questioned why a scientist engaged in chemical warfare research would ‘need to Google toxic substances’.

Dr Holmes’s widow, Susan, is  a chemist who also works at  Porton Down as head of business administration.

One of the Government’s most sensitive and secretive military facilities, the site has long been the focus of controversy.

Three years ago hundreds of ex-servicemen who were used as chemical warfare guinea pigs there between 1939 and 1989 were given compensation and an apology from the Ministry of Defence.

They were tested with the nerve agent sarin, but some of those involved claimed they had been  told they were taking part in cold-remedy trials.

Many suffered serious illnesses after exposure to the gas, which was developed by the Nazis during the Second World War.

An inquest into Dr Holmes’s death was opened and adjourned by Wiltshire Coroner David Ridley last week. Coroner’s officer Paul Tranter said Dr Holmes’s family had grown concerned for his wellbeing after  he failed to return from a walk on April 11.

A search party involving police and members of the other emergency services began combing waste ground close to his home in the Bishopsdown area of Salisbury.

Police discovered his body half a mile away in a field used regularly by dog-walkers and joggers in the village of Laverstock.

Mr Tranter said the results of tests carried out to establish the cause of death would not be known for several weeks.

He added: ‘Police do not consider this death to be suspicious in any way, nor do they believe there was any third-party involvement.’

Read more: http://www.dailymail.co.uk/news/article-2133201/Dr-Richard-Holmes-Suicide-riddle-weapons-expert-worked-David-Kelly.html#ixzz1t7H0ew6T

 

Thirteen Ways Government Tracks Us

Thirteen Ways Government Tracks Us

Privacy is eroding fast as technology offers government increasing ways to track and spy on citizens.  The Washington Post reported there are 3,984 federal, state and local organizations working on domestic counterterrorism.  Most collect information on people in the US. (Source)

Here are thirteen examples of how some of the biggest government agencies and programs track people.

One.  The National Security Agency (NSA) collects hundreds of millions of emails, texts and phone calls every day and has the ability to collect and sift through billions more.  WIRED just reported NSA is building an immense new data center which will intercept, analyze and store even more electronic communications from satellites and cables across the nation and the world.  Though NSA is not supposed to focus on US citizens, it does. (Source)

Two.  The Federal Bureau of Investigation (FBI) National Security Branch Analysis Center (NSAC) has more than 1.5 billion government and private sector records about US citizens collected from commercial databases, government information, and criminal probes. (Source)

Three.  The American Civil Liberties Union and the New York Times recently reported that cellphones of private individuals in the US are being tracked without warrants by state and local law enforcement all across the country.  With more than 300 million cellphones in the US connected to more than 200,000 cell phone towers, cellphone tracking software can pinpoint the location of a phone and document the places the cellphone user visits over the course of a day, week, month or longer. (Source)

Four.  More than 62 million people in the US have their fingerprints on file with the FBI, state and local governments.  This system, called the Integrated Automated Fingerprint Identification System (IAFIS), shares information with 43 states and 5 federal agencies.   This system conducts more than 168,000 checks each day. (Source)

Five.  Over 126 million people have their fingerprints, photographs and biographical information accessible on the US Department of Homeland Security Automated Biometric Identification System (IDENT).  This system conducts about 250,000 biometric transactions each day.  The goal of this system is to provide information for national security, law enforcement, immigration, intelligence and other Homeland Security Functions. (Source)

Six.  More than 110 million people have their visas and more than 90 million have their photographs entered into the US Department of State Consular Consolidated Database (CCD).  This system grows by adding about 35,000 people a day.  This system serves as a gateway to the Department of State Facial Recognition system, IDENT and IAFSIS. (Source)

Seven.  DNA profiles on more than 10 million people are available in the FBI coordinated Combined DNA index System (CODIS) National DNA Index. (Source)

Eight.  Information on more than 2 million people is kept in the Intelligence Community Security Clearance Repository, commonly known as Scattered Castles.  Most of the people in this database are employees of the Department of Defense (DOD) and other intelligence agencies. (Source)

Nine.  The DOD also has an automated biometric identification system (ABIS) to support military operations overseas.  This database incorporates fingerprint, palm print, face and iris matching on 6 million people and is adding 20,000 more people each day. (Source)

Ten.  Information on over 740,000 people is included in the Terrorist Identities Datamart Environment (TIDE) of the National Counterterrorism Center.  TIDE is the US government central repository of information on international terrorist identities.  The government says that less than 2 percent of the people on file are US citizens or legal permanent residents.  They were just given permission to keep their non-terrorism information on US citizens for a period of five years, up from 180 days. (Source)

Eleven.  Tens of thousands of people are subjects of facial recognition software.  The FBI has been working with North Carolina Department of Motor Vehicles and other state and local law enforcement on facial recognition software in a project called “Face Mask.”  For example, the FBI has provided thousands of photos and names to the North Carolina DMV which runs those against their photos of North Carolina drivers.  The Maricopa Arizona County Sheriff’s Office alone records 9,000 biometric mug shots a month. (Source)

Twelve.  The FBI operates the Nationwide Suspicious Activity Reporting Initiative (SAR) that collects and analyzes observations or reports of suspicious activities by local law enforcement.   With over 160,000 suspicious activity files, SAR stores the profiles of tens of thousands of Americans and legal residents who are not accused of any crime but who are alleged to have acted suspiciously. (Source)

Thirteen.  The FBI admits it has about 3,000 GPS tracking devices on cars of unsuspecting people in the US right now, even after the US Supreme Court decision authorizing these only after a warrant for probable cause has been issued. (Source)

The Future

The technology for tracking and identifying people is exploding as is the government appetite for it.

Soon, police everywhere will be equipped with handheld devices to collect fingerprint, face, iris and even DNA information on the spot and have it instantly sent to national databases for comparison and storage.

Bloomberg News reports the newest surveillance products “can also secretly activate laptop webcams or microphones on mobile devices,” change the contents of written emails mid-transmission, and use voice recognition to scan phone networks. (Source)

The advanced technology of the war on terrorism, combined with deferential courts and legislators, have endangered both the right to privacy and the right of people to be free from government snooping and tracking.  Only the people can stop this.

SOURCE:
http://www.infowars.com/thirteen-ways-government-tracks-us/

By: Bill Quigley, April 9, 2012

Cops can request a copy of your complete Facebook activity

Cops can request a copy of your complete Facebook activity

If police officers were to file a subpoena for your Facebook information, they would receive a printout of the data from the social network. This printout would be so detailed, complete and creepy that you should strive to be a good law-abiding citizen, just to prevent it from ever existing.

We have just learned about the true nature of Facebook’s responses to subpoenas thanks to documents uncovered by the Boston Phoenix, an alternative weekly.

While researching a story about a man dubbed the “Craigslist Killer,” reporters at the Phoenix had access to “a huge trove of case files released by the Boston Police Department.” And in the process of sifting through all of those documents, they discovered the Boston Police’s subpoena of the suspect’s Facebook information— as well as the data provided by the social network.

The data — which really did come in the form of an old-fashioned paper printout rather than as a digital file of some sort — included all of the suspect’s wall posts, photos he’d uploaded, photos he’d been tagged in, a list of his Facebook friends, and “a long table of login and IP data.” Based on a look at the actual documents, it appears the login and IP data actually lists which parts of Facebook the individual accessed — down to the photos, groups and profiles he viewed.

According to a published FAQ, this is Facebook’s fairly extensive law enforcement policy:

We work with law enforcement where appropriate and to the extent required by law to ensure the safety of the people who use Facebook. We may disclose information pursuant to subpoenas, court orders, or other requests (including criminal and civil matters) if we have a good faith belief that the response is required by law. This may include respecting requests from jurisdictions outside of the United States where we have a good faith belief that the response is required by law under the local laws in that jurisdiction, apply to users from that jurisdiction, and are consistent with generally accepted international standards.

We may also share information when we have a good faith belief it is necessary to prevent fraud or other illegal activity, to prevent imminent bodily harm, or to protect ourselves and you from people violating our Statement of Rights and Responsibilities. This may include sharing information with other companies, lawyers, courts or other government entities.

If you’d like to see how the information looks, the printout of the “Craigslist Killer” suspect, who committed suicide before the trial could reach a resolution, has been posted online by the Boston Phoenix. Both the Boston Police as well as the Boston Phoenix have redacted parts of the documents. From what we can tell, Facebook doesn’t censor any data before responding to a subpoena, but we have asked the social network for confirmation.

Want more tech news, silly puns, or amusing links? You’ll get plenty of all three if you keep up with Rosa Golijan, the writer of this post, by following her on Twitter, subscribing to her Facebook posts, or circling her on Google+.

SOURCE:
http://www.technolog.msnbc.msn.com/technology/technolog/cops-can-request-copy-your-complete-facebook-activity-686527

By: Rosa Golijan, April 9, 2012