Total Intelligence (by @TransAlchemy)
Music by Crystal Castles (‘baptism’)
OODA helps our clients identify, manage, and respond to global risks and uncertainties while exploring emerging opportunities and developing robust and adaptive strategies for the future. OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, investment and due diligence, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments. Our team has been at the forefront of next-generation threat/risk analysis and global business trends for almost two decades. OODA maintains a diverse network of international specialists drawn from industry, government, and academia in the United States and dozens of international locations. Our team maintains expertise in a variety of disciplines including counterterrorism, information warfare, low-intensity political violence, computer security, intelligence, predictive analysis, risk and threat management, economic & geopolitical analysis, law enforcement, crisis response, national security, and defense policy.
#MarchAgainstMonsanto - 25 May 2013 - #MAM
World Wide March Against Monsanto
#MassIncarceration #InfoGraphic -
There are now more Americans in jail than were in Stalin’s Gulag Archipelago
May 9, 2013
There are now more Americans in jail — 6 million — than there were in Stalin’s Gulag, reports Fareed Zakaria, in a column called “Incarceration Nation.”
And it’s not just a relative population thing.
The U.S. has 760 prisoners per 100,000 citizens. How does that compare to other countries?
It’s 7-10X as high:
- Japan has 63 per 100,000,
- Germany has 90 per 100,000
- France has 96 per 100,000
- South Korea has 97 per 100,000
- Britain has 153 per 100,000
And it’s a rapidly exaggerating trend: In 1980, the U.S. only had 150 prisoners per 100,000 citizens. More than half of America’s 6 million prisoners are in jail for drug convictions, with 80% of those in jail for “possession.”
In his speech yesterday, Obama said that information available online fuels ‘violent agendas’ through ‘hateful propaganda’ that drives terrorism. Warning that ‘internet materials’ are fueling domestic terror threats and actually causing people to go out and commit mass acts of terrorism, Obama is once again following in the footsteps of his fellow control freak associates in assaulting the openness of the internet that is now a hot spring for alternative news amid the frozen depths of the mainstream media.
In the speech, Obama said:
“Today, a person can consume hateful propaganda, commit themselves to a violent agenda and learn how to kill without leaving their home.”
The simple reality is that the internet is the largest threat to corrupt government officials. It’s how we managed to break open the entire IRS scandal that has blown up in Obama’s face and led to calls for criminal action against top officials responsible for targeting Constitution-based groups with phony financial assaults. It’s also how we know about the truth surrounding Benghazi and what went down there. An event that has also generated serious awareness and even calls for impeachment.
Internet-Based Alt News Growing At Record Levels
So it should come as no surprise to find that Obama and others want the internet to be not only monitored by the government, but regulated as well. By using the ever-looming threat of domestic terrorism, it is simple to trace back extremists to certain internet sites that can be used as catalysts to enact legislation that endangers and annihilates internet freedom. Specifically, people like myself and others can be targeted in these crackdowns in order to give alternative news sources a bad name.
Obama’s latest speech is similar to his previous, in which he warns against those who question what he calls our ‘brave’ new government and warn of tyranny and corruption within it. The bottom line is that Obama is setting the stage here, as he has been for quite a while along with others, for an informational crusade against websites and blogs that dare to criticize government. Already labeled as ‘conspiracy’ and ‘extremist’ websites for even asking the simplest questions of government, the fight against net neutrality and alternative news sources is about to be taken to a whole new level.
Biometric Database of All Adult Americans Hidden in Immigration Reform | #GIG | #NWO | #GlobalInformationGrid | #InternetOfThings | #SystemsOfControl | #InvasionOfPrivacy
The immigration reform measure the Senate began debating yesterday would create a national biometric database of virtually every adult in the U.S., in what privacy groups fear could be the first step to a ubiquitous national identification system.
Buried in the more than 800 pages of the bipartisan legislation (.pdf) is language mandating the creation of the innocuously-named “photo tool,” a massive federal database administered by the Department of Homeland Security and containing names, ages, Social Security numbers and photographs of everyone in the country with a driver’s license or other state-issued photo ID.
Employers would be obliged to look up every new hire in the database to verify that they match their photo.
This piece of the Border Security, Economic Opportunity, and Immigration Modernization Act is aimed at curbing employment of undocumented immigrants. But privacy advocates fear the inevitable mission creep, ending with the proof of self being required at polling places, to rent a house, buy a gun, open a bank account, acquire credit, board a plane or even attend a sporting event or log on the internet. Think of it as a government version of Foursquare, with Big Brother cataloging every check-in.
“It starts to change the relationship between the citizen and state, you do have to get permission to do things,” said Chris Calabrese, a congressional lobbyist with the American Civil Liberties Union. “More fundamentally, it could be the start of keeping a record of all things.”
For now, the legislation allows the database to be used solely for employment purposes. But historically such limitations don’t last. The Social Security card, for example, was created to track your government retirement benefits. Now you need it to purchase health insurance.
“The Social Security number itself, it’s pretty ubiquitous in your life,” Calabrese said.
David Bier, an analyst with the Competitive Enterprise Institute, agrees with the ACLU’s fears.
“The most worrying aspect is that this creates a principle of permission basically to do certain activities and it can be used to restrict activities,” he said. “It’s like a national ID system without the card.”
For the moment, the debate in the Senate Judiciary Committee is focused on the parameters of legalization for unauthorized immigrants, a border fence and legal immigration in the future.
The committee is scheduled to resume debate on the package Tuesday.
It is within the nature of mankind for a disproportionately small percentage of men to attempt to exert control over the greater multidinous horde. The primary method of control is achieved through violent oppression.
Violence is required as most people will not willingly submit to control by others, be it few or many. For violence to be perpetrated, weapons are required. Our history as a species can be defined, in large measure, by the vehicles of violence (weapons) employed at the point in history being addressed.
#REALNESS - The #FBI Fosters, Funds and Equips American Terrorists! (by @corbettreport)
TRANSCRIPT AND SOURCES: http://www.corbettreport.com/?p=7276
The Boston Marathon bombing has provoked shock, grief and outrage from around the world. After decades of conditioning, the public automatically equates such terrorism with Muslim radicals. But the evidence shows that every major terror plot on American soil in the past 10 years has been fostered, funded and equipped by one organization: the FBI.
The battle for control of cyberspace is turning nasty, with young hackers, pirates and activists facing long prison sentences. We report from the frontline
Are you a “Critical Infrastructure Sector?” If so, then the Justice Department is giving you their stamp of approval to monitor private communications on your networks; an act which, according to the non-partisan Congressional Research Service, is a questionable legal use of an Executive Order. Through two recent Freedom of Information Act lawsuits, the Electronic Privacy Information Center (EPIC) recently revealed that the Justice Department has authorized internet providers — most prominently AT&T — to intercept and monitor communications on their networks. Its good news for these sectors: they get to freely violate existing federal wiretap laws. It’s bad news for you and me, though. Through these acts we lose major privacy rights; namely not having our communications and private data tracked. Worse yet, it’s due to a government-corporate partnership. Sounds bad? What is worse is that it ignores the actual cyber security issues we have, and it sets a terrifying precedent for the future.
The program in question began as an effort between the Defense Department, the Department of Homeland Security, and commercial defense contractors to protect military and commercial defense companies from cyber threats, in particular data theft. While the risk of cyber attacks on our military is a valid concern, it is clear now that this was not all that was on the architects of this project’s mind.
Deputy Defense Secretary William J. Lyn said at the time of the program’s inception: “It is possible to imagine attacks on military networks or on critical infrastructure like the transportation system and energy sector that cause severe economic damage, physical destruction or even loss of life.”
No less than two years later, President Obama signed an Executive Order expanding this service to the same “critical infrastructure.” The president’s public renunciation of SOPA and CISPA is thus puzzling; those acts would accomplish many of the same goals and would be doing so legally. Obama’s Executive Order, on the other hand, is not legal.
But what’s most telling is that these safeguards are doing nothing to stop the underlying problem in the majority of these attacks: our global economic rival and current frenemy, China.
China accounted for 41% of the world’s computer attack traffic in the fourth quarter of 2012 and it is heavily suspected that hundreds of attacks are actually coming from the Chinese militaryitself. Adding fuel to that fire, a Chinese general just claimed that these cyber attacks are potentially as powerful as a nuclear weapon. If they are able to attack this powerfully, are we simply waiting for an electronic 9/11 to hit us before our electronic privacy is taken away forever? This act certainly sets the precedent for removing our privacy with its vague notion of what “critical infrastructure” is, which could potentially be interpreted as broadly as the infamous “interstate commerce” has been. If it is, than “critical infrastructure” could mean almost anything; and all our electronic privacy could be washed away. Coming at a time when Americans are becoming more wary of government intrusions into their privacy, this act is an embarrassment to our country and a failure of our leadership.
A brief overview of the Rockefellers, the rise of John D. Rockefeller, and how he made one of the world’s largest fortunes in the oil business during the late 19th and early 20th centuries. A look at Rockefeller-Morgan alliance: one of the largest joint private empires in the world. Sensing a profound discord among the nations of North America, Europe and Japan, the Trilateral Commission was founded by David Rockefeller to foster substantive political and economic dialogue across the world. The Rockefellers, money and domestic US politics, what’s their agenda, who do they support, how much money do they spend on lobbying? How do they exert pressure to obtain favorable policy?
We Are Anonymous.
We Are Legion.
We Do Not Forgive.
We Do Not Forget.
You Should Have Expected Us.
Share by MasterPirate ™
Why Is Barrett Brown Facing 100 Years in Prison? | #FreeBB #FreeAnons #PersonaManagement #SpreadThis
It was announced on Wednesday morning that Barrett Brown, a man who became a very public talking head for AnonOps (the brain trust that is arguably the cortex of the hacktivist group Anonymous, even though theretechnically isn’t one) is facing up to 100 years in jail for three separate indictments. Two of the indictments—the threatening of an FBI officer in a YouTube video and the concealing of evidence—do not seem worthy of such a harsh sentence, considering a man in Houston recieved only 42 months for threatening to blow up an FBI building, and a former dentist got 18 months for threatening to kill an FBI agent. The third, however, pertains to Barrett Brown’s pasting of a link in an Anonymous IRC chat room to a document full of credit card numbers and their authentication codes that was stolen from the security company Stratfor, in the midst of a hack that released over five million internal emails. Those emails were published to Wikileaks. Some writers have rightfully raised their concerns about the legalities behind sharing a link that points to stolen material (which is why I have not linked to those five million emails) and whether or not that should be an indictable offense. However, Barrett’s work and research into Stratfor tells a much more complicated and disturbing story than a pile of stolen Visa cards.
It’s obvious by looking at the most recent posts on Barrett Brown’s blog that while he is highly interested in Stratfor, it wasn’t the credit card information that motivated him. When those five million emails leaked, a product called TrapWire, which was created by a company called Abraxas, was revealed to the public at large. And it caused a media shitstorm. In 2005, the founder of Abraxas and former head of the CIA’s European division, Richard Helms, described TrapWire as software that is installed inside of surveillance camera systems that is, “more accurate than facial recognition” with the ability to “draw patterns, and do threat assessments of areas that may be under observation from terrorists.” As Russia Today reported, one of the leaked emails, allegedly written by Stratfor’s VP of Intelligence, Fred Burton, stated that TrapWire was at “high-value targets” in “the UK, Canada, Vegas, Los Angeles, NYC.”
TrapWire has since largely been dismissed as nothing to “freak out” over, and that hopefully is the case. However, far beyond what the surveillance software itself can or can’t do, the revelation that TrapWire exists has caused a chain reaction of discoveries that have seemingly revealed a mob of very powerful cybersecurity firms.
Barrett Brown was doing some very serious investigating into a company called Cubic from San Diego, that was alleged to own TrapWire as a subsidiary of their firm. This is an allegation that they officially denied. However, these tax filings from 2010 that Barrett uncovered clearly state that Cubic had in fact merged with Abraxas Corporation. If you click through and take a look, you can see that Richard Helms’s name is right there on the top of the first page.
Alongside Abraxas and Cubic on those tax filings is another company called Ntrepid. According to Florida State’s records of corporations, Richard Helms is the director of that company. In 2011, Barrett’s work helped lead the Guardian to their report that Ntrepid won a $2.76 million-dollar contract from Centcom (U.S. Central Command), to create “online persona management” software, also known as “sockpuppetry.” To break it down in plain English, online persona management was created to populate social networks with a bunch of fake and believable social media personas to “influence internet conversations and spread pro-American propaganda.”
Ntrepid also has a product they call Tartan, that’s detailed in this internal presentation hosted by the Wall Street Journal. In Ntrepid’s own parlance, they describe Tartan as a program that can “Analyze illicit organizations and less structured social networks by identifying: Ranks of influence within human networks… [and can] end the use of [online] aliases.” Clearly they are looking to dismantle the smoke and mirrors that groups like Anonymous maintain, by hanging out in chatrooms where they do not need to identify themselves officially, with many private communications happening at once. This creates a difficult-to-penetrate den, where people can easily hide online. Evidently, Ntrepid is seeking to pull all of that apart with Tartan.
Corporate info on Tartan.
In another document on Ntrepid letterhead, titled “Tartan Influence Model: Anarchist Groups,” Tartan is positioned as a software tool that can help combat domestic protestors who operate in “an amorphous network of anarchist and protest groups” and suggests that these groups are prone to violence. They name Occupy Wall Street and Occupy D.C. as part of the problem, and have “built Occupy networks through online communication with anarchists.” By identifying the threat of anarchistic, supposedly violent protestors, Tartan sells its services by saying their software “identifies the hidden relationships among organizers of seemingly unrelated movements… To mitigate the ability of anarchists to incite violence… Law enforcement must identify the complex network of relationships among anarchist leaders.” So, beyond taking apart movements that exist solely online, Tartan is looking to come out and crush real world protest movements as well.
A lot of this information and the connections between it all would not be easy to figure out were it not for Barrett Brown. For one, Barrett started ProjectPM, a wiki that is completely dedicated to piecing together all of this information about surveillance companies in the United States. He even got on the phone with a representative at Cubic to tell them that their company was full of liars and that they do in fact own TrapWire. Without Barrett Brown, tons of this research would likely have gone unearthed. Besides a few journalists, not many people have been looking into this information. The one other group that does is called Telecomix, the guys who are famous for supplying dial-up internet lines to areas of the world with oppressive dictatorships, and who I interviewed about the Gaza conflict here. They operate the Bluecabinet Wiki, and they worked very closely with Barrett Brown to uncover more information about the network of cybersecurity firms.
I talked to one of the volunteers at Telecomix, who strongly believes in the work that Barrett did to connect all of these very confusing dots: “I haven’t seen reporters really taking a hard look at what Barrett Brown, the investigative journalist, was researching and where it leads to. His discovery that TrapWire = Abraxas and that there is CIA involvement is very important. Do you know in Berlin right now a game was started to destroy surveillance cameras in public places? Barrett apparently was reading through the emails of HBGary and Stratfor, linking the data to the specific surveillance companies and contractors… It is an extremely time consuming task.”
Barrett Brown was not a hacker. He did not infiltrate any systems, nor did he appear to know how to do anything of the sort (he did try to take down the Mexican drug cartels in 2011, but that is a whole other story). Barrett was an investigative journalist who has been published in the Guardian, Vanity Fair,Huffington Post, and Business Week. He closely (perhaps too closely) aligned himself with Anonymous, and dug into some very serious, complicated, and high-level issues pertaining to the future of America’s cyberwar conquests. In light of recent news that the Pentagon wants 4,000 new “hackers for cyber command,” it’s clear that the US’ infrastructure for private cyber defense companies is only growing, and their motives are oftentimes confusing and frightening.
Clearly there is so much more to the Stratfor leak than a bunch of credit card numbers—and the truth behind it all, along with Barrett Brown’s possible century-long jail sentence—is a scary prospect for journalists, privacy advocates, and internet activists alike. As Barrett Brown himself said regarding the leak of Stratfor emails and the credit card numbers within them that some hackers from Anonymous used to donate money to charities: “Much of the media has focused on the fact that some participants in the attack chose to use obtained customer credit card numbers to make donations to charitable causes. Although this aspect of the operation is indeed newsworthy, and, like all things, should be scrutinized and criticized as necessary, the original purpose and ultimate consequence of the operation has been largely ignored.”
Thanx @PamelaDrew ~ ‘Whistleblowers fight fear to expose world’s dark secrets’
RT talks to the Director of the Centre for Investigative Journalism, Gavin MacFadyen, about the difficulties whistleblowers face when trying to promote transparency.