NSA is going Willy-Nilly everywhere (contrary to Obama speech)

21 08 2013

Wall St. Journal – New Details Show Broader NSA Surveillance Reach

Programs Cover 75% of Nation’s Traffic, Can Snare Emails

By SIOBHAN GORMAN and JENNIFER VALENTINO-DEVRIES
WASHINGTON—The National Security Agency—which possesses only limited legal authority to spy on U.S. citizens—has built a surveillance network that covers more Americans’ Internet communications than officials have publicly disclosed, current and former officials say.

The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.

The NSA’s filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system’s broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones. . . . (more)

http://online.wsj.com/article/SB10001424127887324108204579022874091732470.html





Manipulation of Social Media by US Military & 1%er Goons

15 08 2013

3 Creepy Items

US Military Caught Manipulating Social Media, Running Mass Propaganda Accounts
It has been common knowledge to anyone paying attention within the alternative news community for years, but once again the media is now admitting that the US military and intelligence agencies are indeed running massive propaganda campaigns that cover a vast array of online networks.

Daily Kos – HBGary, Themis, bloggers, and traditional media: What a tangled Web
In a nutshell, a security firm called HBGary, apparently hired by the legal firm Hunton and Williams on behalf of Bank of America and the Chamber of Commerce—at the recommendation of the Justice Department—boasted about attempts to infiltrate the group called Anonymous, the loose affiliation of hackers supporting WikiLeaks. Anonymous certainly showed HBGary, hacking the vaunted security company’s system and obtaining something like 75,000 exceedingly incriminating e-mails “to launch a highly sophisticated campaign to subvert and sabotage the enemies of their clients. In some cases these plans involved illegal actions. The targets were journalists, labor unions, and political opponents.

. . . and this most foul example of Face Book abuse

 





Russia Gets Underwater Drones

16 07 2013

Underwater drones a necessary luxury for Russian Navy

The rescue vessel “Igor Belousov”, currently under construction for the Russian Navy, is going to receive autonomous underwater vehicles for rescue operations and deep-sea research. Manned mini-submarines and unmanned vehicles occupy an increasingly important place in the structure of the naval forces of different countries of the world, and are used for both combat and “humanitarian” missions. Such systems are able to significantly increase the effectiveness of surface ships and submarines by means of providing constant and careful control of the underwater space. 

As technology developed, underwater vehicles (originally created as a means of studying the seabed) acquired much wider functions beyond search-and-rescue works and carrying out special operations. . . . (more)

http://english.ruvr.ru/2012_05_31/76591881/





On Edward Snowden and Brit Spook, Gareth Williams By Trowbridge H. Ford

15 06 2013

Finally waking from my slumber, thanks to the alleged spying and disappearance of CIA/NSA agent Edward Snowden.

(1)

Seems he went missing with a lot of information that his handlers thought would interest the Chinese Ministry of State Security, not only its mass data mining of the messages of Americans but also its hacking of Chinese sites.

It was believed that Beijing would be happy to take the spy/leaker in, like Sweden was happy to take in leaker/spy David Hemler before the Palme assassination, and the Chinese were most happy to take in leaker/spy Gareth Williams after he learned of the Manhattan 11 fiasco.

While Hemler’s spying led nowhere, resulting in his languishing away in Sweden for all these years, Wlliams was discovered to be a massive problem, and was cruelly murdered by CIA and NSA.

Snowden seems to have been a leaker like Hemler, a leaker whose revelations did nothing to help Sweden while his feedback to NSA apparently let Washington know that Stockholm was not prepared for the Palme shooting – the surprise which was planned to result in a non-nuclear conclusion to the Cold War, and would have if it had not been for the spying that the Agency’s Rick Ames, the Bureau’s Robert Hanssen, et al. did for Moscow, and the counter measures it took to prevent what it would have won if it had gone ahead.

Snowden seems to be a replacement for Williams, but he is only interested in making Beijing look like a plotting Yellow Peril – what a Chinese mainland newspaper, The Global News as I recall, has completely scuttled by announcing that its Ministry of State Security recruited Snowden as a spy, probably through some kind of honey trap.

The Denver Post got onto the story, even posting it on its web site, thanks to the prodding of its Pulitzer prize-winning photographer Steven R. Nickerson. Nickerson must have read my articles about what happened to Williams et al., and thought that Snowden’s disappearance was something similar.

Where I was brought into the picture was about two weeks ago when persons claiming to be from the Bureau asked by repeated phone calls on my international land-line if I was Steven Nickerson or knew him or had been dealing with him.

While the callers may well have been from some other agency, most likely the CIA and NSA, and hoping by acting like the FBI would scare me into making damaging admissions, I ignored the questions until, in utter disgust, I denied everything.

Clearly the callers not only hoped to connect me to Nickerson’s revelations but also to make it look like I am a deep Chinese agent.

The CIA has never gotten over its failed attempts to kill me, and the Bureau still hasn’t gotten over its failed attempts to set me up as ‘Jihad Jane’s lover/assassin of Swedish cartoonist Lars Vilks.

 

(2)

Seems Snowden’s helping British spook Gareth Williams hack the lap top computers of the Manhattan 11 – what resulted in his being killed when he threatened to tell China’s Ministry of State Security all about it – is what caused Snowden to look for other work in 2009.

By that time Williams colleague at GCHQ, Gudrun Loftus, had also been killed because she was preparing to take up his mission of exposing how Anglo-American data-miners had been abusing their powers.

When the CIA/NSA decided to set Snowden up as another victim of an apparent Chinese honey-trap, he too decided to go on the warpath, fearing that he too might be murdered because of what he had done, and knew, as he alluded in an interview with the Washington Post’s Barton Gelman.

By going public with all the information he had hurriedly gathered, he stopped any plans to kill him, and made attempts to extradite him more difficult.

He has learned a lot about being his own spy/whistle-blower in order to survive.






The Guardian has NSA surveillance revelations A – Z

9 06 2013

Edward Snowden: the whistleblower behind the NSA surveillance revelations

The NSA Files

The RegisterForget phones, PRISM plan shows internet firms give NSA everything

cryptome has more . . .

ALSO –

America’s Eight Most Unwanted Terrorists
by David R. Hoffman





Anonymous Hacks Stratfor

21 02 2013

Anonymous Operation Last Resort has struck successfully again, leaking crucial files from an investment banking firm allegedly linked to intelligence firm Stratfor. . . .

http://www.zdnet.com/anonymous-oplastresort-hacks-investment-firm-cites-stratfor-ties-7000011465/

LINK –  http://youtu.be/xeAmSthnXCw





Former British agent set to expose new intelligence boss’s role in infiltration of IRA

11 11 2012

The Observer   [earlier report]

By Jamie Doward

In the back streets of Belfast, Jonathan Evans, the new director-general of MI5, was known as ‘Bob’ to the agents who fed him crucial information that helped lead to the downfall of the IRA.

He cut his teeth in the murky world of bombings, kneecappings and disinformation, where a bad decision could cost the life of an agent or allow a terrorist bomb to reach its target. . . .

http://www.guardian.co.uk/politics/2007/mar/11/northernireland.immigrationpolicy

. . .  NOW this big fight over outing MI5 goons in a big public trial –

‘Bob’ to be subpoenaed in Fulton case

[snip] . . .  Fulton’s lawyers claim the security service promised him a pension and a new identity. He already has a number of FRU members who have pledged to give evidence corroborating his claims. Last December, the judge hearing the case in the High Court in Belfast ruled that Fulton could call any witness who can provide evidence as to his value as an undercover agent. The Observer understands Fulton’s solicitors will subpoena Evans after their client identified him in the newspapers last week, following the spy chief’s promotion.  . . .

http://sluggerotoole.com/2007/03/11/bob-to-be-subpoenaed-in-fulton-case/

with comment by Trowbridge H. Ford

” . . . .  And regarding ‘MI’s claims about the FRU saving Gerry Adams on several occasions, no one should believe a word of it.
Take the one about the doctored ammunition, for example, where 20 bullets were fired, and Adams was hit four times, as I recall. They penetrated the man’s body, and if the shooting had not been stopped, and Adams rushed to the hospital for emergency surgery, he would have died. Furthermore, the leading assassin John Gregg never mentioned any doubts about the ammo, only regret that he had not killed Adams.   . . . “


oh, and all you sue-happy assassins bugging bloggers over this story:

we invoke  the doctrine of “fair use”. The doctrine of fair use has been codified in section 107 of the copyright law.