December 30, 2010

Seattle Transit Agency Rejects Bus Ads Exposing Israeli War Crimes

SEATTLE — Israeli war crimes almost exposed, let the cover-up continue..
King County Metro Transit will not allow bus ads alleging "Israeli war crimes" after all (and caving to the Jews, NOW won't allow ANY outside advertising).

Transit officials Thursday rejected a proposed ad from the Seattle Mideast Awareness Campaign that ties alleged war crimes to U.S. military aid.

That proposed ad, expected to appear next week, sparked a furor, with thousands of comments flooding into the transit agency as two groups said they planned to run their own ads to counter the "Israeli war crimes" message.

Metro Transit said Thursday it also would not be allowing the counter ads.

In addition, King County Executive Dow Constantine, citing the potential for disruption to transit service, on Thursday approved an interim policy from Metro Transit that calls for a halt to the acceptance of any new noncommercial advertising on King County buses, according to a news release.

Read more:

Nigeria to drop Dick Cheney Charges after Bush plea bargains to Save his War Criminal Buddy

Nigeria's anti-corruption police have dropped charges against Dick Cheney, the former US vice-president, over a multi-million dollar bribery case after the energy firm Halliburton agreed to pay up to $250m (£161m) in fines.

The move followed the intervention of ex-president George Bush Sr and former secretary of state James Baker, according to Nigerian press reports.

The country's Economic and Financial Crimes Commission (EFCC) said it met officials representing Cheney and Halliburton in London last week after filing 16-count charges relating to the construction of a liquefied natural gas plant in the conflict-ridden Niger delta.

Femi Babafemi, a spokesman for the EFCC, said: "There was a plea bargain on the part of the company to pay $250m as fines in lieu of prosecution."

The sum consists of $120m (£77m) in penalties and the repatriation of $130m (£83m) trapped in Switzerland, he added.

Babafemi said he expected Nigeria's attorney general Mohammed Adoke to ratify the decision . "I can tell you authoritatively that an agreement has been reached."

Several Nigerian newspapers added that Bush and Baker took part in negotiations through conference calls with Adoke and other officials, but Babafemi could not confirm this.

Houston-based engineering firm KBR, a former Halliburton unit, pleaded guilty last year to US charges that it paid $180m in bribes between 1994 and 2004 to Nigerian officials to secure $6bn in contracts for the Bonny Island liquefied natural gas project in the delta. KBR and Halliburton reached a $579m settlement in America but Nigeria, France and Switzerland have conducted their own investigations into the case.

Last week, the EFCC charged Halliburton chief executive David Lesar, Cheney, and two other executives. It also filed charges against Halliburton as a company, which was headed by Cheney during the 1990s, and four associated businesses.

Campaigners in the Niger delta expressed disappointment at the plea bargain. Celestine AkpoBari, programme officer at Social Action Nigeria, said: "I would have loved to see Dick Cheney in chains in our court and facing justice in our prisons. That would have been a very big point that would have lifted Nigeria out of its woes."

Kentebe Ebiaridor, a project assistant at Environment Rights Action, suggested that Bush and Baker took part to protect America's huge oil interests in the region. "They are trying not to jeopardise the relationship," he said. "But if Dick Cheney is guilty, he should be brought to book."

December 28, 2010

Canada's Spy Agency CSEC Comes up from the Basement into new $880m Compound

At a time when most government agencies are cutting and slashing, a little-known spy agency led by a Rhodes Scholar is the envy of Ottawa for its planned billion-dollar headquarters.

A rising force in the national-security apparatus, the Communications Security Establishment Canada (CSEC) is an electronic-eavesdropping agency that gathers intelligence from abroad. Led by 68-year-old military veteran John Adams, the agency keeps its operations quiet, reporting only to Canada’s military and civilian leadership.

For the first time since he took over the agency in 2005, Mr. Adams has discussed CSEC’s mission and future, which includes plans for an $880-million headquarters housing hundreds of mathematicians, engineers and computer scientists by 2015.

News of the planned 72,000 square-metre compound is raising eyebrows around the national capital, given few people outside of government know what CSEC is or what it does.

But “if you were to ask the Canadian Forces if there is anyone that has saved Canadian lives in Afghanistan, they would point to us,” Mr. Adams told The Globe and Mail. He said that well over half of the “actionable intelligence” that soldiers use in Afghanistan comes from his agency.

This work is distinct from that done by a far better known spy agency –the Canadian Security Intelligence Service.

The difference between the two boils down to tradecraft and jurisdiction.

CSIS – Canada’s human-intelligence, or “HumInt” agency – has its people and agents train their actual eyes and ears on security threats inside the country.

CSEC – the “signals-intelligence” or “SigInt” counterpart – relies almost wholly on technology to hear what people are saying abroad (spying on Canadians is illegal). Since being formed in the 1940s, this agency has rarely told anyone the fruits of its findings, save for its two masters – the Department of National Defence and the Privy Council Office.

On paper, the two agencies’ mandates don’t overlap, but in practise their operations are running together more than ever. That’s why the new CSEC complex is being built next to CSIS’ current headquarters – and why architects are planning to install a glass bridge connecting the two.

As envisioned, the seven-building CSEC complex will be the equivalent of a 90-storey skyscraper turned on its side – a highly secure compound outfitted with the latest high-tech gear. Two nearby electrical generating stations will power the agency’s computers, which suck in millions of conversations from around the world each day and scour them for intelligence information.

CSEC’s 1,700 staff and $300-million budget are double what they were a decade ago. Yet the agency’s bricks-and-mortar surroundings have been neglected. Some staff complain that a wall-sized mainframe computer has even fallen through an old floor. The current complex, a scattering of Cold War-era buildings near Carleton University, can no longer suck enough energy off the grid to sustain operations.

“We’ve run out of power,” said Mr. Adams, whose facilities use about as much energy as a small town. “We’ve got 700 people buried in a basement.”

Now the plan is to bring staff out of their subterranean cloisters and into collaborative work spaces, ones where cryptologists and engineers work together in bright rooms surrounded by daylight and foliage.

The plan doesn’t just envision $880-million in construction costs. According to a union representing CSEC employees, there is also a somewhat unique arrangement that will commit Ottawa to spend up to $5-billion more over the next 34 years. These costs are part of a “public-private partnership” – incorporating a complex mix of debt-servicing costs, standard-operating payments and an unusual facilities-management deal with a private consortium.

December 26, 2010

Patriot App lets you Spy on Your Fellow Citizens, and Reports Directly to the Communist U.S. Govt

In yet another move towards an East Germany type snitch society, a company called Citizens Concept has launched an App with the catchy name, “PatriotApp.” Apparently this App is named after the Patriot Act and we all know how wonderful and patriotic that Orwellian, Constitution destroying law has been.

Just ask Susan Lindauer who was arrested as an Iraqi agent under the Patriot Act when she was clearly working for the U.S. government but had information that the Republican leadership did not want to hear!

This App allows citizens to snitch on their neighbors just as Hitler convinced thousands of Germans to tell on their own neighbors and family.

The App essentially connects your phone to the FBI, EPA, GAO, and CDCs tip line. Why would American citizens need to report suspicious activity to the EPA, the same agency who literally let our gulf been chemically raped by millions of gallons of toxic Corexit?

Are Americans expected to report tips to the FBI so that the FBI can go out and give the “suspicious” person fake bombs and claim they were scary Muslim terrorists?

PatriotApps -

Citizen Concepts announces the launch of PatriotAppTM, the world’s first iPhone application that empowers citizens to assist government agencies in creating safer, cleaner, and more efficient communities via social networking and mobile technology. This app was founded on the belief that citizens can provide the most sophisticated and broad network of eyes and ears necessary to prevent terrorism, crime, environmental negligence, or other maliciousbehavior.

More efficient communities? Is this App eventually going to be used and connected to the green police? Are American citizens being lined up to snitch on their neighbors if their “carbon input” is too high?

MSNBC, the same company who received millions in bailout money and has labeled 9/11 Truthers as terrorists had this to say:


Launched in September, the PatriotApp allows people to report criminal or suspicious activity to several federal agencies, including the FBI, EPA, CDC and GAO (Government Accountability Office), the office responsible for investigating public funds. It also includes RSS feeds for the FBI’s Most Wanted list and the Department of Homeland Security’s threat level, and allows people to report workplace harassment and discrimination.

The app doesn’t grant a user privileged access to these agencies; rather, it bundles each group’s Internet tip line (ITL) — the website feature used to report incidents — and makes them mobile-phone friendly, and even enables users to send pictures. While it offers users a direct portal to each site’s ITL, the user must still go through the same process — and obey the same policies and warnings — as they would if accessing the site on a computer.

Playing off the Patriot Act name, “the app was founded on the belief that citizens can provide the most sophisticated and broad network of eyes and ears necessary to prevent terrorism, crime, environmental negligence, or other malicious behavior,” according to

Our country is headed towards a Nazi style police state. DHS in stores nationwide, citizens being urged to snitch on their neighbors, and Americans being arrested for “thought” crime.

Maybe you little commie wannabes can get this app for your iPhone after filling out your InfraGard application. Run along now and be sure to report this site you communist bastards..

December 23, 2010

“Monitoring America” the US Govt's new “See something, say something” Spy Network

The Washington Post today reports on the vast growing domestic spying apparatus that the federal government is using, in conjunction with the Pentagon, to target millions of law-abiding American citizens who have not been accused of any wrongdoing.

In a lengthy report entitled “Monitoring America”, the Post details how a vast centralized snooping machine is being constructed and employed by local, state and federal agencies as well as military investigators, to collect, store and analyze swathes of personal information.

Everything contained within the Post’s article has already been reported and covered in depth by this website and others in the alternative media that have consistently warned of the threat of the exponential rise of the big brother spy system over the past decade.

The report details Homeland Security head Janet Napolitano’s recent “See something, say something” campaign, which encompasses the federal government hooking up with Wal-Mart, Amtrak, major sports leagues, hotel chains and metro riders to encourage citizens to file “suspicious activity reports” if they see any activity they think could be criminal or terroristic.

The government defines a suspicious activity as “observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity” related to terrorism.

As we reported recently, critics of the program have been literally dubbed insane by it’s coordinators, despite legitimate concerns over asking citizens to effectively spy on each other for the government.

The Washington Post report notes that such suspicious activity reports are just one piece of information being collected at the local and state levels and fed into a vast “Guardian” database via fusion centers, which ultimately connect to the FBI, the DHS and even the Department of Defense.

According to the report, the spook network includes 4,058 federal, state and local organizations.

Intelligence centers run by states across the country have access to personal information about millions of Americans, including unlisted cell phone numbers, insurance claims, driver’s license photographs and credit reports.

Dozens of the fusion centers were created after 9/11 to identify potential threats and “improve the way information is shared”. The centers use law enforcement analysts and sophisticated computer systems to compile, or fuse, disparate tips and clues and pass along the refined information to other agencies.

The centers have received billions in funding from the Department of Homeland Security and also work in conjunction with the military arm of the DHS, NORTHCOM.

They also have subscriptions to private information-broker services that keep records about Americans’ locations, employment history, financial holdings, associates, relatives, firearms licenses and the like.

Some of these data-brokers, such as one in Maryland called Entersect, claim to hold records about 98 percent of Americans.

The Washington Post report also details how equipment developed for use against insurgents and fighters in combat situations such as in Afghanistan is now being employed by police and law enforcement agencies to collect information on the American people.

From military-grade infrared cameras, to hand-held, wireless fingerprint scanners, to facial recognition surveillance cameras, to license plate readers, to Predator drones along the borders – all are being used to snap pictures and video and record swathes of information. This will all then be fed into a giant database, cross referenced with every other piece of information collected, analyzed and stored.

This year for the first time, the FBI, the DHS and the Defense Department are able to search each other’s fingerprint databases, said Myra Gray, head of the Defense Department’s Biometrics Identity Management Agency, speaking to an industry group recently. “Hopefully in the not-too-distant future,” she said, “our relationship with these federal agencies – along with state and local agencies – will be completely symbiotic.”

The justification is, as always, the war on terror, but the targets of the information gathering are everyday Americans.

As the Washington Post report also notes, Homeland Security and its state and local partners have routinely targeted peaceful and lawful groups and individuals as part of its surveillance reporting.

As we have seen from the MIAC report, DHS spying on tea Party and second amendment activists in Pennsylvania and a host of other examples in recent years, the federal government has little interest in Muslim extremists and has instead targeted Americans knowledgeable of their rights and critical of big government as the primary domestic terror threat. The feds have defined “terrorist propaganda” as any material critical of the state. The Department of Defense characterizes peaceful protest as “low level terrorism” in its own report.

Over the years we have seen countless instances of unaccountable government and military programs that have been in operation for decades, all centered around covertly spying and gathering information on American citizens.

We have extensively documented such programs from COINTELPRO through to Operation CHAOS, the Defense Department’s Counterintelligence Field Activity and the recent NSA warrantless wiretapping.

Large corporations such as Google, AT&T, Facebook and Yahoo to name but a few are also intimately involved in the overarching program. Those corporations have specific government arms that are supplying the software, hardware and tech support to US intelligence agencies in the process of creating a vast closed source database for global spy networks to share information.

We are now witnessing the coordination and mass consolidation of scores of these operations into one all encompassing panopticon program.

After 9/11 the work of 16 different intelligence agencies, including the CIA and the giant National Security Agency, which eavesdrops on international communications, as well as the Energy Department and the Drug Enforcement Administration was centralized under the office of the Director of National Intelligence.

Why such rampant centralization? Why is the military now so intent on fusing itself with the federal government via Homeland security and through the FBI and why are the targets of their operations always American citizens?

We are constantly bombarded with the notion that the biggest threat we face is from those who reject and abhor western values, yet the government and military continue to relentlessly focus their anti-terror activity directly upon freedom loving American people, while telling them they would be completely insane to voice any concern

Tories to Announce Deal Forming North America 'Perimeter'

John Ivison, National Post · Wednesday, Dec. 8, 2010

Already signed by The US and Mexico in March 2010, this bill will be signed by the US and Canada in January 2011. New name, same game... Welcome to the NAU boys.

The Conservative government is set to announce a landmark security and trade deal with the United States, designed to create a perimeter around North America and allow people and goods to flow more freely across the border.

Sources suggested that Prime Minister Stephen Harper and President Barack Obama will sign the broad-ranging agreement in Washington as early as next month.

“It’s big on ideals but maybe not so great on details,” said one person familiar with the negotiations. “But it does use the word ‘perimeter’ many times...The question is, will it reduce the compliance burden at the Canada-U.S. border?”

The New Border Vision is being billed as a 21st century border management system that will include new common consumer product regulations, a pre-clearance agreement for goods crossing the border to expedite waiting times and the use of advanced technology to utilize biometric data for travelers at airports and land crossings, according to people familiar with the plan.

The new framework will likely be discussed when the U.S. Secretary of State, Hillary Clinton, visits Ottawa this Monday but government sources said the announcement will not be made by Ms. Clinton. A spokesman for the Public Safety Minister, Vic Toews, said: “No such announcement is planned. We don’t comment on hearsay or speculation.” A spokeswoman for the U.S. Embassy in Ottawa refused to comment.

Colin Robertson, a senior research fellow with the Canadian Defence and Foreign Affairs Institute, said the agreement is an attempt by the Canadian government to link security to improved access to the U.S. for Canadians.

“‘Perimeter’ is a vital word because back in the Chrétien government days we couldn’t use it because we would get caught up in the sovereignty allergy we too often have,” he said. “It makes a lot of sense.”

The U.S. announced a similar deal with Mexico in March. It included moves to expedite travel and commerce such as secure transit lanes for pre-cleared rail and truck shipments, as well as passenger pre-clearance for individuals.

Business is likely to welcome a more coordinated perimeter approach to regulation and security but one exporter remained skeptical. “A vision without money is a hallucination,” he said.

The U.S. and Canada have taken piecemeal steps to coordinate their efforts against common threats like terrorism. Last year, Canada signed on to the NEXUS membership card and Free and Secure Trade (FAST) trusted traveller programs as a valid means of identification at the border. However, more sweeping agreements have foundered in the past, notably the Security and Prosperity Partnership agreement signed in 2005 by former Prime Minister Paul Martin, ex-U.S. President George W. Bush and former Mexican President Vicente Fox.

The SPP was aimed at reducing the cost of trade and improving the flow of people and information but became a lightning rod for criticism on both sides of the border. In the U.S., CNN anchor Lou Dobbs argued the SPP was part of a plan to merge the U.S., Canada and Mexico into a North American Union, while a number of organizations criticized the agreement for its secrecy.

In Canada, NDP leader Jack Layton said the process was not just unconstitutional but “non-constitutional” because there were no oversight mechanisms. By 2009, all three governments had abandoned the SPP, which is “no longer an active initiative,” according to its website.

Mr. Robertson said that increased integration could impact areas like immigration and refugee policy but was unlikely to lead to a European Union-style agreement. “Economic union would mean a common currency and, over the last couple of years, it has been definitively proven that we are far better off with our own currency,” he said.

Read more:

December 22, 2010

Perimeter with U.S. could hurt Canada’s Sovereignty: Opposition

OTTAWA — The opposition is accusing the Harper government of ceding Canadian sovereignty through a proposed deal with the United States that would establish a security perimeter around the two countries as a way to stimulate trade.

While refusing to confirm the talks, the Conservatives defended their efforts to smooth the flow of goods and people across the U.S. border, which businesses complain has been “thickening” with security red tape in recent years.

“We do in fact work in harmony and co-operation with the Americans. The Conservative government believes it’s essential that our borders with the United States be bridges between us, and not barriers,” Public Safety Minister Vic Toews told the House of Commons, adding that the government has taken action to “ensure our borders are closed to crime and open for business.”

But Liberal leader Michael Ignatieff said the Conservatives can’t be trusted to stand up for Canada’s sovereignty.

“The Conservatives bowed to the Americans on softwood lumber. They asked for Washington’s approval before acting on the environment. They bought American fighter jets without inviting offers here, in Canada,” Mr. Ignatieff said. “With a record like this, how can Canadians be confident that the government will protect Canada’s sovereignty and the freedom of its citizens in their secret negotiations with the Americans on the border?”

The opposition was reacting to reports this week that the government is negotiating an agreement with the U.S. that would allow “pre-cleared” rail and truck shipments to pass more quickly across the border. The deal, which could be signed as early as January, would see the two countries harmonize regulations in certain areas, such as consumer-product safety, the National Post reported. It’s also believed the deal would involve closer co-operation on law enforcement and the screening of individuals through tools such as biometrics.

The U.S. signed a similar deal this spring with Mexico, the other signatory to the North American Free-Trade Agreement.

A representative for Canadian industry welcomed the talks, saying border bureaucracy has become a “huge issue” for companies that rely on integrated North American supply chains.

“It’s really an issue about manufacturing competitiveness in North America,” said Jayson Myers, chief executive of Manufacturers and Exporters. “What we’re seeing is more and more information requirements, more and more regulatory and compliance requirements, more and more security requirements, more and more fees being charged.”

Industry Minister Tony Clement said there’s “no question” that border thickening has affected trade between the two countries.

“We’re always concerned that homeland security in the United States always trumps everything. It trumps our trade patterns, and I know that the Americans have concerns about security, as they should, but we also have to trade with one another,” Mr. Clement told reporters.

Canada should look to other increasing integration of markets in certain regions, such as the European Union and Southeast Asia, he added. “They do a lot better job of making sure that their supply chains are more integrated, for instance. And so this is a comparative advantage they have over North America. So we’ve got to do a better job because we’re losing business to the world.”

NDP Leader Jack Layton said the security-perimeter proposal should be debated in the House of Commons before being adopted.

“Some people think that maybe Canada should be deeply integrated with the U.S., and because we watch the same TV shows, we should become the same country, virtually. I don’t agree with that, and I don’t think the majority of Canadians do,” he said.

Read more:

WTF? OMG, LOL! CIA gives WikiLeaks taskforce STUPID name

On a lighter note, the STUPID FUCKS at the CIA have launched a taskforce to assess the impact of 250,000 leaked US diplomatic cables. Its name? WikiLeaks Task Force, or WTF for short.

The group will scour the released documents to survey damage caused by the disclosures. One of the most embarrassing revelations was that the US state department had drawn up a list of information it would like on key UN figures – it later emerged the CIA had asked for the information.

"Officially, the panel is called the WikiLeaks Task Force. But at CIA headquarters, it's mainly known by its all-too-apt acronym: WTF," the Washington Post reported.

WTF is more commonly associated with the Facebook and Twitter profiles of teenagers than secret agency committees. Given that its expanded version is usually an expression of extreme disbelief, perhaps the term is apt for the CIA's investigation.

Earlier this month the Guardian revealed that the CIA was responsible for drafting the data "wishlist" that the US state department wanted on UN secretary general, Ban Ki-moon, and other senior members of the organisation. The Washington Post said the panel was being led by the CIA's counterintelligence centre, although it has drawn in two dozen members from departments across the agency.

Although the CIA has featured in some WikiLeaks disclosures, relatively little of its own information has entered the ether, the paper reported. A recently retired former high-ranking CIA official told the Post this was because the agency "has not capitulated to this business of making everything available to outsiders.

"They don't even make everything available to insiders. And by and large the system has worked," he said.

While most of the agency's correspondence is understood to be classified at the same "secret" level as the leaked cables that ended up online, it is understood the CIA uses systems different from those of other government agencies.
Acronyms sometimes suck
Acronyms. Pithy and useful when you get them right, embarrassing and memorable when you fail to spot the pun.

Long before the internet revived the TLA (three-letter acronym), there was MAD, one of the more appropriate constructions, which stood for mutually assured destruction, the doctrine under which everyone dies if nuclear devices were deployed.

Change one letter, and you get BAD, or British Association of Dermatologists – as in: "I'd love a BAD practitioner to look at my skin."

Unfortunately the spoilsports at BAD usually put "the" before the acronym on the association's website, although there are a couple of slips: "To find out how to write BAD clinical guidelines, please click here," being one of them.

Many other good examples are given on the Unfortunate Acronyms website, also known as ASS – Acronyms Sometimes Suck.

Another in the field of medicine is DOH, the website of the Washington state department of health ( Hardly encouraging for those planning a visit, given its connotations with the general incompetence personified by Homer in the Simpsons.

The Boston Redevelopment Authority doesn't shy away from using its abbreviated form.

Almost unbelievably, there is a Breakthrough Urban Ministries operating two homeless shelters in Chicago. Unsurprisingly, the organisation does not use its acronym when promoting its services, preferring to shorten the name to Breakthrough.

The Phoenix Islands Settlement Scheme is often described as one of the last attempts at colonisation by the British empire.

The plan was to reduce overpopulation on the Gilbert islands in the South Pacific by moving numbers of people to the neighbouring Phoenix islands.

The outbreak of the second world war hampered the move, and only one of the eight islands is now believed to be inhabited – and the islands are threatened by rising sea levels.

December 20, 2010

Socialist Houston Police Test Drone to Spy on Citizens

These communist bastards even THREATENED the newscasters by LYING that the airspace was restricted and warned of FAA actions against the newscrew if they didnt leave immediately. A blatant LIE to protect this story from being told. There will be more test flights coming and then the drones will hit the skies to spy on American citizens. Each can stay aloft from 17-24 hours of surveillance without refueling.

Just WHO are the TERRORISTS again?

Homeland Security Nazis have over 161,000 Files on American Citizens

The FBI is assembling a massive database on thousands of Americans, many of whom have not been accused of any crime, the Washington Post's Dana Priest and William Arkin report. The reporters' latest look at the country's ballooning national security system focuses on the role that local agencies -- often staffed by people with little to no counter-terrorism training -- have played in combating terrorism since 2001.

Here are five striking revelations in their piece:

1. The FBI's Nationwide Suspicious Activity Reporting Initiative, or SAR, currently contains 161,948 suspicious activity files, into which authorities can put information they've gathered about the people at the center of the files: employment history, financial documents, phone numbers, photos. In many cases, the people in the files have not been accused of any crime but have attracted the suspicions of a local cop, FBI agent or even fellow citizen. The files have led to five arrests but no convictions, the FBI says. Some of the files are unclassified so that local police agencies and even businesses can submit reports on anyone they deem suspicious.

2. The Department of Homeland Security does not know how much it spends in funding state fusion centers, which synthesize security information from all state agencies and feed information to SAR. But since 2001, the department has doled out $31 billion to states and localities for domestic security initiatives.

3. Local officials at these fusion centers are tasked with understanding terrorism, but have little or no training. To fill the void, self-styled experts with fairly extreme views on the scope of the Muslim terrorist threat are asked to come in and train local authorities, the Post reports. Professed ex-terrorist Walid Shoebat told a group at the first annual South Dakota Fusion Center Conference in Sioux Falls this year that they should monitor local Muslim student groups and mosques and try to tap their phones. "You can find out a lot of information that way," he said.

National intelligence officials told the Post they preferred that people with "evidence-based" approaches to Islam were lecturing instead, but that no guidelines are in place to determine the qualifications of a given speaker.

4. The localities are often left without guidance from the Department of Homeland Security, which can lead to confusion about the counter-terrorism actions they're supposed to be carrying out. Virginia's fusion center named historically black colleges as "potential" terrorism hubs; Maryland State Police infiltrated local groups that lobbied for bike lanes and human rights; and a contractor in Pennsylvania writing an intelligence bulletin flagged meetings of the Tea Party Patriots Coalition and environmental activists.

5. Many states and towns are taking the unprecedented amounts of money handed out to fight terrorists and are using it instead to fight crime. "We have our own terrorists, and they are taking lives every day," Memphis Police Director Larry Godwin said.

(Screenshot of the Post's interactive map of state and local counter-terrorism agencies)

December 19, 2010

US Intelligence Report: Iran Capable of Striking US by 2014

Get ready for another waste of billions of dollars, and thousands, if not millions of lives in the next war being lined up by the psychotic war whore's running the USA.

US Intelligence Report: Iran with Capability to Strike US by 2014

By John Greenewald, Jr.

A recently discovered US Intelligence Report from the Defense Intelligence Agency (DIA) has a striking revelation – Iran may have the capability to attack the United States by 2014 with an ICBM missile. This report is released amidst allegations that Iran’s nuclear program is progressing to the point of nuclear weapon capabilities.

The document, labeled a Military Intelligence Digest with a SECRET security marking, states that, “An ICBM with a Non-Rotating Earth (NRE) range of 10,000 kilometers would provide the Iranians with missile coverage of Alaska but would not allow them to target CONUS [Continental United States], owing to rotational effects of the Earth.” The report goes on to state that, “Iran might have the capability to develop and produce an ICBM that can strike the United States in the next 10 to 15 years.”

The release of this report was due to a Freedom of Information Act (FOIA) request by The Black Vault internet archive (, a website devoted to obtaining and archiving declassified government documents released via the FOIA, filed back in 1997.

It took the U.S. Defense Intelligence Agency (DIA) nearly 13 years for them to process the request, which only yielded three pages of material; 85% of which is completely blacked out. Although open to interpretation, the DIA stated that some of the material was “Not Responsive to the Request,” even though the original request asked for information pertaining to an Iranian missile hitting the United States, and the blacked out paragraphs under the heading, “The Future of Iran’s Long-Range Ballistic Missile Program (U).”

Subsequent requests have been filed for the rest of the report, and another 11 documents have been forwarded to other agencies for possible declassification.

As of 13 years and four months after the initial filing of the FOIA request by The Black Vault, those documents have not been received.

The documents released by the DIA can be downloaded at:

December 12, 2010

WIKILeaks, US Excuse to Police the Internet

Anyone who has studied the craft of intelligence and of disinformation, a clear pattern emerges in the Wikileaks drama. The focus is put on select US geopolitical targets, appearing as Hillary Clinton put it "to justify US sanctions against Iran." They claim North Korea with China's granting of free passage to Korean ships despite US State Department pleas, send dangerous missiles to Iran. Saudi Arabia's ailing King Abdullah reportedly called Iran's President a Hitler.

Excuse to police the Internet?

What is emerging from all the sound and Wikileaks fury in Washington is that the entire scandal is serving to advance a long-standing Obama and Bush agenda of policing the until-now free Internet. Already the US Government has shut the Wikileaks server in the United States though no identifiable US law has been broken.

The process of policing the Web was well underway before the current leaks scandal. In 2009 Democratic Senator Jay Rockefeller and Republican Olympia Snowe introduced the Cybersecurity Act of 2009 (S.773). It would give the President unlimited power to disconnect private-sector computers from the internet. The bill "would allow the president to 'declare a cyber-security emergency' relating to 'non-governmental' computer networks and do what's necessary to respond to the threat." We can expect that now this controversial piece of legislation will get top priority when a new Republican House and the Senate convene in January.

The US Department of Homeland Security, an agency created in the political hysteria following 9/11 2001 that has been compared to the Gestapo, has already begun policing the Internet. They are quietly seizing and shutting down internet websites (web domains) without due process or a proper trial. DHS simply seizes web domains that it wants to and posts an ominous "Department of Justice" logo on the web site. See an example at Over 75 websites were seized and shut in a recent week. Right now, their focus is websites that they claim "violate copyrights," yet the website that was seized by DHS contained no copyrighted content whatsoever. It was merely a search engine website that linked to destinations where people could access copyrighted content. Step by careful step freedom of speech can be taken away. Then what?

Just a little more background on the “hero” Jullian Assange and Wikileaks…

Wikileaks was started up in Dec. of 2006. Oddly enough, as a supposed “leak” site, a dissident site, it was given a great deal of immediate mainstream attention from the likes of the Washington Post, TIME magazine, and even Cass Sunstein the now Obama administration official who wrote a paper on how to “cognitively infiltrate” dissident groups in order to steer them in a direction that is useful to the powers that be.

The TIME magazine article is curious because it seems that right off the bat they were telling us how to interpret Wikileaks in such a way that sounded strangely familiar to George W. Bush back just after 9/11…

“By March, more than one million leaked documents from governments and corporations in Asia, the Middle East, sub-Saharan Africa and the former Soviet Bloc will be available online in a bold new collective experiment in whistle-blowing. That is, of course, as long as you don’t accept any of the conspiracy theories brewing that could be a front for the CIA or some other intelligence agency.” TIME Jan. 2007 (emphasis added)

Now remember and read closely… this article was written PRIOR to Wikileaks’ first big “leak”, which according to the article was to occur sometime in March of 2007.

So why would TIME magazine be writing about them in the first place if they hadn’t done anything yet? Also, let’s not pass up on that delicious irony: this is TIME magazine singing the praises of a supposed “leak” site which will supposedly expose all kinds of “conspiracy theories” while at the same time telling their readers NOT to believe in those silly “conspiracy theories” circulating about Wikileaks. Just so long as you believe the “right” conspiracy theories, you’ll be alright I guess. This of course perfectly matches Jullian Assange’s own statements about 9/11.

TIME goes on to explain that the Wikileaks version will be the “correct” version (even though they had yet to publish anything at that point… pretty far out on that credibility limb for TIME if you ask me…)

“Instead of a couple of academic specialists, Wikileaks will provide a forum for the entire global community to examine any document relentlessly for credibility, plausibility, veracity and falsifiability,” its organizers write on the site’s FAQ page. “They will be able to interpret documents and explain their relevance to the public. If a document is leaked from the Chinese government, the entire Chinese dissident community can freely scrutinize and discuss it…” TIME Jan. 2007

You have to remember, Wikileaks first started targeting China obviously and as we all know from history, typically dissident movements within targeted nations are often funded and run by covert CIA operations. Since Wikileaks started off with a host of Chinese dissidents, it would be logical to assume that at least some of them have links back to the agency. But it gets better.

Few of you might know that just prior to the unveiling of Wikileaks, the intelligence world had an unveiling of their own… a “social media” based resource called “Intellipedia”. Some of you might find this interesting…

“With its own versions of a certain search engine and a certain online encyclopedia, the intelligence community is evolving its use of tools now widespread in the commercial sector, generating both success and controversy.

The new tools include a federated search engine called Oogle and Intellipedia, a controversial intelligence data-sharing tool based on Wiki social software technology.” GCN Sept. 2006

So we see that in Sept. of 2006 there is a concerted effort in the intelligence community to embark on several new “pedia” type programs one which serves as a data-base and another which works like a Google search engine. Why wouldn’t there be a third?

BBCNews, Siprnet: Where the leaked cables came from, 29 November, 2010, accessed in

Ken Dilanian, Inside job: Stolen diplomatic cables show U.S. challenge of stopping authorized users, Los Angeles Times, November 29, 2010, accessed in,0,6716809.story

December 03, 2010

Commie-Jew Lieberman proposes anti-TRUTH legislation

Senator Joseph Lieberman and other lawmakers on Thursday introduced legislation that would make it a federal crime for anyone to publish the name of a U.S. intelligence source, in a direct swipe at the secret-spilling website WikiLeaks.

“The recent dissemination by Wikileaks of thousands of State Department cables and other documents is just the latest example of how our national security interests, the interests of our allies, and the safety of government employees and countless other individuals are jeopardized by the illegal release of classified and sensitive information,” said Lieberman in a written statement.

“This legislation will help hold people criminally accountable who endanger these sources of information that are vital to protecting our national security interests,” he continued.

The so-called SHIELD Act (Securing Human Intelligence and Enforcing Lawful Dissemination) would amend a section of the Espionage Act that already forbids publishing classified information on U.S. cryptographic secrets or overseas communications intelligence — i.e., wiretapping. The bill would extend that prohibition to information on HUMINT, human intelligence, making it a crime to publish information “concerning the identity of a classified source or informant of an element of the intelligence community of the United States,” or “concerning the human intelligence activities of the United States or any foreign government” if such publication is prejudicial to U.S. interests.

Leaking such information in the first place is already a crime, so the measure is aimed squarely at publishers.

Lieberman (ID-CT) has been going after WikiLeaks with a fury he once reserved for video-game zombies, pressuring first Amazon, and then data-visualization company Tableau, to blacklist the organization in the wake of this week’s State Department leak.

Lieberman’s proposed solution to WikiLeaks could have implications for journalists reporting on some of the more unsavory practices of the intelligence community. For example, former Panamanian dictator Manuel Noriega was once a paid CIA asset. Would reporting that now be a crime?

Lieberman and his henchman have gone after and others in order to CEASE TRUTH from spreading to the USA and the World about the deceit, lies, espionage and utter decay of the integrity of the once great 'democracy' of the United States of America. Censorship and book-burning come to mind in regards to the strong arm tactics used to try and stifle from exposing the truth about the savage cabal running rampant through American politics.

Learn this, you cannot silence truth with deception. The Collective Mind of the World seeks truth and shall receive the truth it seeks..

Fuck you Jew-Lieberman and the communist-cabal that you have sworn to defend..