Jul 12, 2013

Breaking News: Obama's Snowden Legal Attack Team Is After A Radio Shock Jock & Libertarian Activist Adam Kokesh

Background essential to understanding this post properly:
Listen to Amy Goodman's #podcast: "This Year’s Best-Kept Secret: The Next Generation of Community Radio."
Peter King & Bill O ReiIlly's - In Your Face - Hypocrisy
Notes On The Emergence Of The Fascist Police State In D USA 
NSA: What Happened To America? Land Of The Free & Home Of the Brave... Traitors?


A look at the breaking news the media hasn't covered yet...

Reason For Excessive Use of Force & High Profile Judges Involvement in this case:
The doubters are wrong: Edward Snowden is a game-changer, and a new public opinion poll shows it.






In this report of what happened you can tell high tech surveillance was being used, you can tell there was preparation & excessive violence (see case link below for full explanation):








Then something strange happened...

Magistrate Judge John F. Anderson issued the search warrant for Adam's home and is also the judge who issued the extradition warrant for Edward Snowden. 




i.e. Excessive Violence Cause By Overreactions By People With Gun Phobias

General Background: 
Reflection of Cultural Perspectives Through Gardening
Gun Phobia: An Epidemic Of Fear?
Guns 1: Intro To The North-South "Gun Culture" Divide



Case Study:




This movie begins with "In a world where..."

This makes it sound like a fake story doesn't it?

This is how you use real-life stories in a fictional format. The war crimes committed in Bosnia are well-known by now so the context is real.

Planes can do re-reconnaissance and take images with infra-red scans and do so regularly



Slough spy plane uncovers 210 suspected 'sheds with beds' 

Investigations of the illegal occupation of sheds in Slough by migrant workers has led to 210 new outbuildings being identified by a thermal-imaging plane.

The council estimates there are between 700 and 3,000 so-called "sheds with beds", many of which are unfit for human habitation.

The authority said most also do not comply with building regulations.

Images, taken by the plane in February, will be used on a 3D map of the town.

The work was carried out as part of a £24,000 project to deal with the problem of illegal occupation of buildings in the town.

Only one of the 211 new outbuildings found by the plane had an energy performance certificate, a legal requirement for permanent rented accommodation.

The council will now investigate if the "sheds" are being used as illegal dwellings.

The information gathered will also be used by police and emergency services.



The above technology in satellite form was in the above movie BUT in a positive context:

Extract: Burnett falls into the very mass graves that he and Stackhouse had photographed and hides under a dead body. As the Serb patrol gets to the graves, they inspect the area for Burnett, but then withdraw. Burnett, horrified by what he sees, continues to run. Reigart sees this on satellite and contacts the media to inform them of Burnett's situation, much to Piquet's anger.


Another Hollywood movie Correlation:


Movie: Behind Enemy Lines 


Thermal Imaging Scene EXTRACT:

Hackman uses some spectacular satellite technology to pinpoint where Burnett is. He can watch an infrared image of the Serbs closing in on him. Burnett is on the run but falls down a small hill. Hackman is watching all this but from his infrared view, it looks like Burnett has been shot. Hackman and the men watching can't figure out why the Serbs are walking all around Burnett but not approaching him. Next thing you know, the Serbs leave.

We cut back to Burnett and discover that he is in a sea of dead bodies, mass murdered by the Serbs. He was hiding underneath a body so the Serbs never saw him. There were also many newly planted trees around to help eventually hide the mass burial ground.



When the technology exists it will be used for good or bad depending on the level of transparency in the Government. The lower the transparency the easier to use for bad stuff. Note: The US has no transparency.


Hollywood Introduction To Google Earth In Non-Transparent Hands:

The "Enemy Of the State" uses an example of old technology that Google nowadays gives away for free called "Google Earth"{Bet you can find your house by typing your address into Google Earth :)}:


Enemy of the State by MovieTrailerJunkie 

(Video source)


Another Hollywood Correlation (notice that the correlation statistic used by the GOP Led Obama Administration is the same level of certainty used by Eagle Eye)...

Eagle Eye...





Moment Of Zen from Eagle Eye...


"We had an FBI consultant on the picture and he told me that 1 in 5 phone calls that we make are recorded and logged and I laughed at him and then he played back a phone call I had had two years prior to joining the picture." Shia LaBeouf



Given FBI acknowledgment that it monitors phone calls on a massive scale, with help from the NSA, gov't denials are hard to understand.

i.e. Excessive Violence Cause By Overreactions By People With Gun Phobias



APPENDIX


    NSA revelations over the last month


All linked here

* * * * *

How Microsoft handed the NSA access to encrypted messages

12 Jul 2013: Documents show company collaborated closely with NSA and FBI to help agencies intercept data

********
The Snowden video sequel and Brazil fallout

 8 Jul 2013: Glenn Greenwald: The worldwide debate over US surveillance which the NSA whistleblower was eager to provoke is clearly emerging

********

The NSA's mass and indiscriminate spying on Brazilians

7 Jul 2013: Glenn Greenwald: As it does in many non-adversarial countries, the surveillance agency is bulk collecting the communications of millions of citizens of Brazil

********

NSA collected US email records in bulk for more than two years under Obama

27 Jun 2013: • Secret program launched by Bush continued 'until 2011'
• Fisa court renewed collection order every 90 days
• Current NSA programs still mine US internet metadata

********

How the NSA is still harvesting your online data

27 Jun 2013: Files show vast scale of current NSA metadata programs, with one stream alone celebrating 'one trillion records processed'

********

GCHQ taps fibre-optic cables for secret access to world's communications

25 June 2013 British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA

********

The top secret rules that allow NSA to use US data without a warrant

20 Jun 2013: Fisa court submissions show broad scope of procedures governing NSA's surveillance of Americans' communication

********

Fisa court oversight: a look inside a secret and empty process

19 Jun 2013: Glenn Greenwald: Obama and other NSA defenders insist there are robust limitations on surveillance but the documents show otherwise

********

Boundless Informant: the NSA's secret tool to track global surveillance data

11 Jun 2013: Revealed: The NSA's powerful tool for cataloguing global surveillance data – including figures on US collection • Boundless Informant: mission outlined in four slides

********
Obama orders US to draw up overseas target list for cyber-attacks

7 Jun 2013: Exclusive: Top-secret directive steps up offensive cyber capabilities to 'advance US objectives around the world'
********

NSA Prism program taps in to user data of Apple, Google and others

7 Jun 2013: • Top-secret Prism program claims direct access to servers of firms including Google, Apple and Facebook


********

NSA collecting phone records of millions of Verizon customers daily

6 Jun 2013: Exclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama administration




Article:

This article originally appeared on GlobalPost.


1) Can you hear me now?
The Guardian reported on June 6 that, according to documents leaked by Edward Snowden, the Obama administration enabled the National Security Agency to collect caller information from Verizon through a “business records” provision of the Patriot Act, established under President George W. Bush. The government ordered Verizon to hand over call information on a daily basis, including the time, location and duration of calls. The Bush administration began collecting such information in October 2001 from AT&T, Verizon and BellSouth, which USA Today reported in 2006.
The consequence:
While US officials sought to reassure the public that such surveillance was legal and part of an ongoing program vital to national security, many Americans called the domestic spying an unnecessary invasion of privacy and lamented that it was even legal in the first place. A national debate quickly erupted.
2) Yes we scan
Snowden also leaked a secret 41-slide PowerPoint presentation apparently used to train US intelligence personnel. The slides detail the NSA’s involvement in a then-clandestine program called PRISM.
PRISM is the NSA effort to collect massive amounts of data from internet companies such as email content, search histories and file transfers tied to potential terrorism or espionage suspects. The PowerPoint presentation confirmed that the NSA is able to directly access the servers of “major US service providers,” describing collaboration with tech companies like YouTube, Skype, Google and Apple. Google, Apple, and others in the tech industry, however, denied awareness of the program.
PRISM began in 2007 with Microsoft and expanded to include Apple in 2012. To be subject toPRISM surveillance, there need only be “reasonable suspicion” that one of the suspects is outside the United States. Unlike the Verizon court-ordered collaboration, the government can access live information, photos, video chats and data from social networks directly through the companies’ servers without required consent or individual court orders. One slide puts the cost of the program at $20 million per year.
The consequence:
Domestically, PRISM was criticized for its ability to collect data on US citizens unintentionally. Also, the revelations coincided with a meeting between Chinese President Xi Jinping and US President Barack Obama, adding tension to an already heated dialogue over cyber-espionage between the two countries. The summit in California was focused on US accusations of Chinese cyberattacks; but the US had little credibility in the wake of the Snowden leaks. China was adamant that it too was the victim of US attacks. EU countries were also brought into the mix, and European citizens now worry they have been spied upon through the PRISM program.
3) Boundless Informant
Boundless Informant is a tool that allows the NSA to compile and track the “metadata” it collects around the world. In the month of March alone, nearly 3 billion pieces of information were collected from US networks and 97 billion pieces worldwide, the Guardian reported on June 8.
A “global heat map” sorts the intelligence sources by country, type, and volume, allowing quick analysis of which countries are most targeted, as well as when the information was gathered. The program is reviewed periodically, according to the documents, with operators able to make recommendations for future improvement.
The consequence:
Boundless Informant proved that despite assurances to Congress to the contrary, the NSA does keep track of the surveillance it performs on US citizens. James Clapper, director of national intelligence, defended the government’s use of the PRISM program and condemned “reckless disclosures” of its details by media. It was the first time Clapper named the program publicly. The intelligence director now faces criticism that he misled Congress when he earlier said the NSA did not have the tools to assess the extent of information gathered on US citizens. Clapper remains adamant that any information gathered on US citizens is “unwitting,” rather than the result of targeted surveillance.
4) The United States is hacking China
Snowden, speaking with The South China Morning Post, gave his first press interview with an outlet other than the Guardian after revealing himself as the source of the leaks on June 12. He said he would stay in Hong Kong until he is “asked to leave,” and said that he took up his previous role as a consultant with Booz Allen Hamilton with the intent of disseminating state secrets. (Snowden would later fly to Moscow and initiate asylum applications with more than 20 countries, many of them denied.) Snowden also told the South China Morning Post that the NSA has been hacking mainland Chinese and Hong Kong computers since 2009. He claimed the NSA hacked networks at the Chinese University of Hong Kong, home to the Hong Kong Internet Exchange and Hong Kong’s main terminal for all internet traffic.
The consequence:
Snowden’s statements hardened the standoff between China and the United States over hacking. Hong Kong Secretary for Security Lai Tung-kwok announced that the Hong Kong Internet Exchange has been monitored but appears unaffected, while Chinese University announced that it has not found evidence of hacking on its servers.
The domestic debate in the United States began to reach a fever pitch. A Gallup Poll conducted between June 10 and June 11 placed support among Americans for Snowden’s actions at 44 percent, while 42 percent said his actions were wrong. Still, the poll found that 57 percent of respondents did not support the NSA’s surveillance programs as outlined in the leaked documents, while 37 percent approved.
5) Britain targets G20 members
Another PowerPoint presentation leaked on June 16 outlines how the Government Communications Headquarters (GCHQ), Britain’s equivalent to the NSA, used real-time surveying of delegates’ phone communications at the G20 Summit in 2009. The intent of the surveillance was to gain diplomatic advantage at the meetings, which came in the wake of the 2008 financial crisis. British officials could obtain real-time readings of calls made by targeted persons and read their emails without notice.
There is specific mention in the slides of targeting “the Turkish finance minister and possibly 15 others in his party,” according to the Guardian. The slides suggest “senior level” members of government in Gordon Brown’s administration, Britain’s prime minister at the time, were aware of the intelligence gathering and that the information “was passed to British ministers.” The presentation also alludes to such covert techniques being neither unprecedented nor unique.
The consequence:
The revelations incited ire from Russia, Turkey and South Africa, all of which had diplomats directly targeted at various times during the summit. While there is consensus that many countries engage in similar acts of espionage, the publicity was nonetheless damaging to the UK government’s reputation. The news added to mounting concern in the international community about links between UK’s GCHQ and the NSA’s PRISM program.
6) NSA procedures
On June 20, the Guardian revealed two more documents obtained by Snowden (viewable hereand here). Signed by Attorney General Eric Holder in 2009, the documents shed light on procedures sanctioned by the Foreign Intelligence Surveillance Court. According to the documents, the NSA can keep (and make use of) information inadvertently gathered on US citizens for a period of up to five years — without a warrant — but only if the information is deemed to be relevant in preventing national security threats or to aid further investigations. The information can be sent to allied governments or foreign organizations, so long as the person’s identity is anonymous.
The consequence:
While the documents outline the circumstances the NSA must destroy data collected from US citizens, as well as the rigorous steps analysts are supposed to take to make sure a target is outside the United States, they also reveal several ways the NSA can continue to use data collected on US citizens. The revelations appear to contradict statements by Obama and others that the NSA cannot access data on US citizens without a warrant.
Patrick McFarland, inspector general for the US Office of Personnel Management, meanwhile, announced an ongoing probe into whether a proper background check was conducted before Snowden was given a Top Secret/Sensitive Compartmented Information-level clearance.
The investigation focused on the operations of US Investigations Services (USIS), a Virginia-based information and security company employed by the government to conduct background checks. US government officials came under fire during a Senate subcommittee hearing investigating why the NSA hired Snowden despite discrepancies on his resume. Booz Allen Hamilton noted potential issues but failed to act and USIS, which screened Snowden for his government security clearance before his work with Booz Allen Hamilton, was similarly unsuccessful in acting on any suspicous elements.
7) Friends who hack together stay together
The Guardian revealed slides on June 21 created by the UK’s GCHQ with titles like “Mastering the Internet” and “Global Telecoms Exploitation.” The slides outline Tempora, an 18-month-old program the GCHQ uses to store metadata for up to 30 days and content data for up to three days, allowing the agency to sift through reams of information legally.
The documents show the extent to which the GCHQ has been able to tap 200 fiber-optic cables laid beneath the Atlantic Ocean, potentially accessing over “21 petabytes of communications data a day.”
The slides indicate that private companies are required to give GCHQ discreet access to tap the cables. The United Kingdom shared that information with the NSA beginning in 2011, giving the US spy agency unlimited access to GCHQ data. The slides show that “850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.”
The consequence:
Officials and private citizens raised concerns on both sides of the Atlantic that there is insufficient oversight and limited restrictions on the UK’s fiber-optic surveillance system. The close-knit relationship between the US and UK intelligence agencies, as well as the NSA’s unfiltered access to Britain’s world-leading cyber-surveillance stores, came under heightened scrutiny. Some diplomats worried that the revelations could negatively impact EU-US trade discussions, and that China-US cybersecurity talks, already on a tentative footing, could suffer as well.
8) NSA targets China’s largest research hub and major telecommunications provider
Speaking to The South China Morning Post, Snowden said on June 23 that the NSA has hacked into computer networks at Tsinghua University an unknown number of times. Snowden said on a single day in January 63 computers and servers were hacked. Snowden argued that the internal and external IP addresses he disclosed could only come from hacking or physical access to the computers.
The facility at Tsinghua University is one of six backbone networks that comprise the China Education and Research Network (CERNET), through which internet data for millions of Chinese can be accessed. The system was the first of its kind and is now the largest national research hub in the world. It is owned by the Ministry of Education and maintained by the university and other colleges.
The South China Morning Post also published the allegation from Snowden that US agents hacked the Hong Kong headquarters of Pacnet, a privately-owned company that provides the majority of fiber-optic cables in the Asia Pacific and has stations across the region. Most Pacnet cables bring internet connections to and from the United States, where some of the world’s largest cloud computing and internet search engines are based.
The consequence:
Following Snowden’s latest revelations, China’s Ministry of Foreign Affairs created a new office for handling “diplomatic activities involving cyber security.” Chinese diplomats said China has been the victim of US hacking many times before, and that the issue would be discussed as part of a US-China “strategic and security dialogue.” Despite concerns that the issue could derail any progress diffusing tension over cybersecurity issues, talks between the two countries were set to continue.
9) Fail-safe switch
Glenn Greenwald, the Guardian journalist who received Snowden’s first leak, told The Daily Beast that the rest of Snowden’s files have been disseminated around the world. If something unforeseen befalls Snowden, Greenwald reported, more information will inevitably be leaked.
Greenwald said that though the still-secret documents are encrypted, Snowden has made arrangements for the passwords to reach those with the files if he is unable to access them himself.
Greenwald also said Snowden gave him many more documents than those so far released and believes Snowden has even more on top of that. The documents are said to be stored on four laptops in Snowden’s possession. Greenwald said he does not wish to publish any details of the NSA’s surveillance systems that could foster or enable security breaches, nor does Snowden.
The consequence:
The fact that Snowden made multiple copies of the classified intelligence he carries created renewed angst among US officials. New questions were raised as to whether the US intelligence community can adequately stem the current leak and prevent future breaches from occurring.
10) NSA surveils Europe
German news magazine Der Spiegel revealed on June 29 it had seen part of a 2010 document, obtained by Snowden, showing that the NSA spied on European citizens and EU officials.
The document reportedly specifies Europeans as a “location target,” with Germans singled out as a major focus of US eavesdropping. The document also mentions telecommunications hacking — first reported by EU officials five years ago — of the EU Council of Ministers and the European Council at the Justus Lipsius Building in Brussels. Calls from an NSA-occupied building at the NATO headquarters outside of Brussells, according to the document, were traced to the Lipsius Building.
The consequence:
Europeans erupted in anger over the new allegations. German Justice Minister Sabine Leutheusser-Schnarrenberger said: “If the media reports are accurate, then this recalls the methods used by enemies during the Cold War.”
Grievences with the US surveillance program were particularly evident in Germany where, after a frank conversation between German Chancellor Angela Merkel and Obama during his visit to Berlin earlier in the month, cybersecurity was a hot topic.
11) Dozens of embassies hacked
On July 1, The Guardian revealed a 2007 document that named 38 embassies and missions that were “targets” of US surveillance, including the EU embassy in Washington and its mission in New York.
It was unclear, according to The Guardian, whether those on the list were targets of the NSA only, or if agencies like the CIA and FBI were also watching them. The document described bugging fax machines with listening devices and listed the names of programs like “Wabash,” an operation directed at the French embassy in Washington.
The list of countries targeted was not limited to EU members or the traditional enemies of the United States, but instead includes the likes of India and Mexico, as well as Greece and Turkey. Gaining insider knowledge of diplomatic relations between the targeted states and the United States was the primary goal of the targeted surveillance, The Guardian reported.
The consequence:
The intelligence leak may have jeopardized the largest attempted free trade agreement in the world, with negotiations between the EU and United States set to begin on July 8 in Washington, DC on a new free trade pact. French President Francois Hollande made public his anger over the covert operations, saying that any future negotiations will be contingent on the United States ceasing all unauthorized surveillance of EU buildings and personnel. US officials have tried to smooth over the dispute, but the success of the trade agreement may still hang in the balance.


More Related Articles:


SWAT teams burst through doors armed to the teeth, terrifying (and killing) children. How did we get here?

Despite his words, Obama will go to extreme lengths to prevent whistleblower Edward Snowden from securing asylum in Latin America.

Democracy movements are growing globally and taking hold within the US.

No comments:

Post a Comment