This post was published at Jerome Corsi
An amicus brief to a lawsuit filed against Roger Stone and the Trump campaign raises troubling questions over the right to political speech.
Of all the various twists and turns of the year-and-a-half-long national drama known as #Russiagate, the effort to marginalize and stigmatize dissent from the consensus Russia-Trump narrative, particularly by former intelligence and national-security officials and operatives, is among the more alarming.
An invasion-of-privacy lawsuit, filed in July 2017 by a former DNC official and two Democratic donors, alleges that they suffered ‘significant distress and anxiety and will require lifelong vigilance and expense’ because their personal information was exposed as a result of the e-mail hack of the DNC, which, the suit claims, was part of a conspiracy between Roger Stone and the Trump campaign.
This post was published at Zero Hedge on Fri, 12/29/2017 –.
Famed NSA Whistleblower Edward Snowden has just launched Haven, an app for people to transform any Android smartphone into a high-tech security system for detecting intrusions.
Snowden, while currently on the run from the CIA, hiding somewhere in Moscow until 2020, has found enough time to launch his new mobile security app last Friday for the sufficiently paranoid person (e.g. activists, dissidents, journalists, & etc).
This post was published at Zero Hedge on Dec 25, 2017.
A “left-wing extremist” group in Germany associated with Antifa published a list of 54 police officers believed to have taken part in raids of suspected rioters protesting the G20 summit in Hamburg, with the group calling for the public to ‘dox’ the officers by sending in their personal information.
“We would be pleased about tips regarding where they live or can be met privately,” reads the post
The list was posted Sunday evening on an extremist website, reports Die Welt, and is thought to be revenge for the publication by Hamburg investigators of over 100 photos and videos G20 riot participants in the hopes that the public will assist in their investigation. German Police prepare for G20 riots Hamburg
The German Police Union (GdP) has called the list of officers “abominable, defamatory and the result of a fundamental attitude that glorifies and exerts violence,” noting the danger of “left-wing extremist terrorists” who “stir up hatred,” adding that “this must be stopped and done quickly.”
This post was published at Zero Hedge on Dec 20, 2017.
It’s amazing when the fox guards the chicken house, and it’s no more apparent than with the recent testimony before Congress by FBI Director Christopher Wray.
As sections of the Foreign Intelligence Surveillance Act (FISA) are set to expire on December 31, 2017, Wray testified to Congress that there has been absolutely no abuse of Section 702 of FISA.
In a repeat of a statement he made on October 13 of this year to the Heritage Foundation, Wray said, ‘There’s been no evidence of any kind of abuse of power under Section 702 despite the oversight … with the three branches of government and quite a few years of experience now.’
Now, FISA is presumed to be a way that our intelligence communities gather information electronically on those they claim are potential terrorists, but sometimes gather it on perfectly innocent people.
In my opinion, FISA flies in the face of the Fourth Amendment’s protections.
However, demonstrating that Wray’s claim is completely invalid, investigative reporter Sharyl Attkisson pointed out the following known abuse.
In 2011, the Foreign Intelligence Surveillance Court (FISC) found some collection of internet data by the National Security Agency (NSA) to be illegal and unconstitutional, capturing tens of thousands of U. S. communications without a warrant. That would seem to be an abuse.
This post was published at The Daily Sheeple on DECEMBER 16, 2017.
Authored by Justin Raimondo via AntiWar.com,
It was the Holy Grail of #TheResistance, the smoking gun they had been desperately searching for, solid evidence that Trump had colluded with the Russians to steal the presidency from its rightful owner: an email written and sent before WikiLeaks published the DNC material directing Trump’s attention to the data dump and even offering an ‘encryption key,’ whatever that may be, so he could get a jump start on the news cycle.
Except it wasn’t true.
CNN, which initially reported the story, had the date of the email wrong: a 14 had somehow morphed into a 4. It turns out that CNN had never actually seen the email, but only had it described by ‘multiple sources.’ CBS ran a story supposedly ‘confirming’ the provenance of the incriminating email, and MSNBC followed suit with former Los Angeles Times national security reporter Ken Dilanian, whose reputation as a mouthpiece for the CIA is well-earned: Dilanian went on the air endorsing the story and tying it into the by now elaborate conspiracy theories that preoccupy #TheResistance.
This post was published at Zero Hedge on Dec 13, 2017.
‘He sees you when you’re sleeping
He knows when you’re awake
He knows when you’ve been bad or good
So be good for goodness sake!’
– ‘Santa Claus Is Coming to Town’
Just in time for Christmas, the Deep State wants to give America the gift that keeps on giving: never-ending mass surveillance.
I’m not referring to the kind of surveillance carried out by that all-knowing and all-seeing Jolly Old St. Nick and his informant the Elf on the Shelf (although, to be fair, they have helped to acclimate us to a world in which we’re always being watched and judged by higher authorities).
No, this particular bit of Yuletide gift-giving comes courtesy of the Deep State (a.k.a. the Surveillance State, Police State, Shadow Government and black-ops spy agencies).
If this power-hungry cabal gets its way, the government’s power to spy on its citizens will soon be all-encompassing and permanent.
As it now stands, Section 702 of the Foreign Intelligence Surveillance Act – the legal basis for two of the National Security Agency’s largest mass surveillance programs, ‘PRISM’ and ‘Upstream’ – is set to expire at the end of 2017.
This post was published at The Daily Sheeple on DECEMBER 13, 2017.
The Deep State surveillance network, powered by technology developed by NSA whistleblower Edward Snowden, is in full effect. Over the last several weeks we’ve learned that not only did the Obama White House deploy a vast spy net over anyone within President Donald Trump’s political and business orbit while he was still a candidate for office, but that they were actively monitoring other organizations and individuals such as Blackwater founder Eric Prince.
Now, according to David Knight of Infowars, the President is turning the tables and is reportedly considering hiring private spies to counter the Deep State’s attacks on his Presidency.
Via The Intercept:
The sources say the plans have been pitched to the White House as a means of countering ‘deep state’ enemies in the intelligence community seeking to undermine Donald Trump’s presidency.
This post was published at shtfplan on December 10th, 2017.
A retired Central Intelligence Agency Agent, who is reported to be working with Blackwater founder Erik Prince, has allegedly claimed that it was National Security Advisor H. R. McMaster (You know him as an Islamic apologist in our government) worked alongside the National Security Agency (NSA) to surveil Donald Trump Jr., Eric Trump, Steve Bannon and others, according to a report that’s come out this week.
The report came from The Intercept, and in that report, it was revealed that the Trump administration is ‘considering a set of proposals developed by Blackwater founder Erik Prince and a retired CIA officer – with assistance from Oliver North, a key figure in the Iran-Contra scandal – to provide CIA Director Mike Pompeo and the White House with a global, private spy network that would circumvent official U. S. intelligence agencies, according to several current and former U. S. intelligence officials and others familiar with the proposals.
The sources say the plans have been pitched to the White House as a means of countering ‘deep state’ enemies in the intelligence community seeking to undermine Donald Trump’s presidency.’
This post was published at The Daily Sheeple on DECEMBER 6, 2017.
The Russia-gate prosecutors have taken the scalp of ex- National Security Adviser (and retired Lt. Gen.) Flynn for lying to the FBI. But this case shows how dangerously far afield this ‘scandal’ has gone…
Russia-gate enthusiasts are thrilled over the guilty plea of President Trump’s former National Security Adviser Michael Flynn for lying to the FBI about pre-inauguration conversations with the Russian ambassador, but the case should alarm true civil libertarians.
What is arguably most disturbing about this case is that then-National Security Adviser Flynn was pushed into a perjury trap by Obama administration holdovers at the Justice Department who concocted an unorthodox legal rationale for subjecting Flynn to an FBI interrogation four days after he took office, testing Flynn’s recollection of the conversations while the FBI agents had transcripts of the calls intercepted by the National Security Agency.
In other words, the Justice Department wasn’t seeking information about what Flynn said to Russian Ambassador Sergey Kislyak – the intelligence agencies already had that information. Instead, Flynn was being quizzed on his precise recollection of the conversations and nailed for lying when his recollections deviated from the transcripts.
This post was published at Zero Hedge on Dec 3, 2017.
On the heels of Lenovo’s massive $3.5 million fine for preinstalling adware on laptops without users’ consent, Hewlett-Packard is jumping in with both feet when it comes to installing spyware on its PCs without the consumer’s permission.
According to numerous reports gathered by Computer World, the brand is deploying a telemetry client (a system data that is uploaded by the Connected User Experience and Telemetry component), on customer computers without asking permission.
The software, which was first identified on November 15 of this year, is called ‘HP Touchpoint Analytics Service’ and appears to replace the self-managed HP Touchpoint Manager solution. According to the official productivity description, it features ‘the tools you need to ensure all your managed devices’ security – and brings you greater peace of mind’. The problem is, it’s installing itself without permission and is wreaking havoc on customers’ systems.
And the consumers are noticing:
This post was published at shtfplan on November 28th, 2017.
Retired National Security Agency (NSA) chief technology officer William Binney is being branded as a “conspiracy theorist” by corporate media outlets, most notably, the Comcast-owned National Broadcasting Corporation, for co-authoring a controversial memo issued this past summer by a group of former intelligence officers – Veteran Intelligence Professionals for Sanity.
The memo opined that the leak of Democratic National Committee e-mails during the 2016 presidential campaign were not the result of Russian state-sponsored hacking but the result of an inside job by a DNC staffer who loaded the purloined e-mails onto a thumb drive. That view is contrary to an assessment made in a 2017 intelligence assessment by 17 US intelligence agencies. That assessment claimed that Russian government-sponsored hackers broke into the email servers of the DNC and then provided the emails to WikiLeaks. However, the assessment was not the unanimous view of 17 US intelligence agencies, but merely four – the Central Intelligence Agency, the National Security Agency, the Federal Bureau of Investigation. It was provided a chapeau of legitimacy by the Director of National Intelligence. Contrary to news reports, the Defense Intelligence Agency, the State Department Bureau of Intelligence and Research, and intelligence elements of the military services did not provide input to the assessment.
This post was published at Zero Hedge on Nov 28, 2017.
Shortly after Wired first profiled the NSA’s new super spycenter in Bluffdale, Utah (one year before Snowden confirmed that much of the agency’s activity involved spying on US citizens and soon to be presidents), speculation emerged as to how much data storage capacity this brand new US spy hub would have. According to a then-estimate by Forbes, the storage capacity at the Bluffdale facility was between 3 and 12 exabytes ( 1 exabyte is 1 billion gigabytes) based on analysis of unclassified blueprints, although some had vastly greater estimates ranging from yottabytes (in Wired) to 5 zettabytes (on NPR), a.k.a. words that most probably can’t pronounce but translate to ‘a lot.‘
And, in retrospect, it appears to not have been enough, because on Monday, Amazon Web Services announced it was now offering a commercial cloud service to the US Intelligence Community (i.e. spies on both foreign targets and US presidential campaigns) called, directly enough “Secret Region” that can operate workloads up to the Secret U. S. security classification level.
‘Today we mark an important milestone as we launch the AWS Secret Region,’ said Teresa Carlson, Vice President, Amazon Web Services Worldwide Public Sector. ‘AWS now provides the U. S. Intelligence Community a commercial cloud capability across all classification levels: Unclassified, Sensitive, Secret, and Top Secret. The U. S. Intelligence Community can now execute their missions with a common set of tools, a constant flow of the latest technology and the flexibility to rapidly scale with the mission. The AWS Top Secret Region was launched three years ago as the first air-gapped commercial cloud and customers across the U. S. Intelligence Community have made it a resounding success. Ultimately, this capability allows more agency collaboration, helps get critical information to decision makers faster, and enables an increase in our Nation’s Security.’
This post was published at Zero Hedge on Nov 20, 2017.
William Binney is the former National Security Agency (NSA) official who created NSA’s mass surveillance program for digital information. He says that if the Russian government had conspired with Trump, hacked the Democratic National Committee’s computer, or in any way influenced the outcome of the last US presidential election, the National Security Agency would have the digital evidence. The fact that we have been listening to the unsubstantiated charges that comprise ‘Russiagate’ for more than one year without being presented with a scrap of evidence is complete proof that Russiagate is entirely fake news.
The fake news originated with CIA director John Brennan and FBI director Comey conspiring with the DNC in an effort to discredit and unseat President Trump and at a minimum prevent him from damaging the vast power and profit of the military/security complex by normalizing relations with Russia.
Consider what this means. The directors of the CIA and FBI made up a totally false story about a newly elected President and fed the lies to the presstitutes and Congress. The presstitutes never asked for a drop of evidence and enlarged the Brennan/Comey lie with a claim that all 17 US intelligence agencies had concluded that Russia had interferred. In actual fact, a handful of carefuly selected people in three of the agenies had prepared, perhaps under duress, a conditional report that had no evidence behind it.
This post was published at Paul Craig Roberts on November 17, 2017.
WikiLeaks has released part 1 of its new Vault 8 series following its popular and widely distributed Vault 7 series which exposed CIA spyware and malware capabilities.
The new release ‘will enable investigative journalists, forensic experts, and the general public to better identify and understand covert CIA infrastructure components,’ the international whistleblower coalition wrote.
The CIA’s master virus control system known as ‘Hive’ was exposed previously last April by WikiLeaks.
‘Described as a multi-platform malware suite, Hive provides ‘customisable implants’ for Windows, Solaris, MikroTik (software used in Internet routers), Linux OS, and AVTech Network Video Recorders, used for CCTV recording.
A 2015 user guide for the malware suite reveals the initial release of Hive was in 2010. The guide goes on to describes the software as having two primary functions – a beacon and interactive shell. Both are designed to provide a starting point for CIA cyber agents to deploy other tools that have been included in the WikiLeaks Vault 7 series release.
The implants communicate via HTTPS with the web server using a cover domain. Each cover domain is connected to an IP address that is hooked into a Virtual Private Server (VPS) provider. This forwards all incoming traffic to a ‘Blot’ server.
This post was published at The Daily Sheeple on NOVEMBER 10, 2017.