Snowden Documents Show Extent Of NZ Spying On South Pacific Nations March 7 2015 | From: NBR
Note: After publishing this article it would appear that the National Business Review has been leaned upon by the Prime Ministers Office in a lame attempt to whitewash this story - As may be seen in the revised link above. The oringinal NBR article is referenced below.
The article is now entitled "John Key Rejects Snowden Docs As 'Outdated'". The cabal is in a failing backslide and their inept minions cannot thwart exposures prior to media release now.
Documents released to media today by the US National Security Agency (NSA) leaker Edward Snowden show New Zealand signals intelligence agencies spy on South Pacific nations.
The documents, dated at July 2009 and entitled “GCSB SIGINT Development Quarterly Report” are a series of official reports disseminated among the so-called Five Eyes countries.
They show New Zealand has been spying on the digital communications of various South Pacific nations. The communications collected reportedly include digital, email, telephone metadata, landline and mobile conversations and other forms.
Prime Minister John Key stated yesterday that he believed the information expected for release would be “wrong.”
However, the reports are all stamped with the logo of the Government Communications Security Bureau (GCSB) with a redacted address, presumably that of the director of the GCSB.
The internal report states that the GCSB in 2009 was facing a “rapid pace” of technological change throughout the South Pacific as newer cable communications began to supersede older methods such as satellite communications.
Targets for the GCSB include Fiji, Samoa, New Caledonia and Vanuatu.
The collection site is listed as the GCSB’s signals intelligence station at Waihopai in Marlborough.
Other documents from Mr Snowden are expected to be released over the coming days.
Greens Scream, Tech Liberty Raises Practical Concerns As Customs Asks For Right To Demand Passwords March 7 2015 | From: NationalBusinessReview
Customs wants the right to demand people disclose passwords for laptops, smartphones and other gadgets as they enter New Zealand even if it has no warrant – and the threat of up to three months' jail if they refuse.
The agency's call comes in a discussion paper on proposed changes to the Customs and Excise Act (1996).
Customs says it wants to move with the times and align our law with "comparable countries, such as Australia, the US, Canada and the UK." It sees inspecting an electronic device potentially becoming part of a routine bag search.
Greens ICT spokesman Gareth Hughes says "These proposed new powers are unnecessary and an affront to Kiwis’ privacy. Customs can already access travellers’ electronic devices if they get a warrant, such as for anti-money laundering and anti-terrorism purposes or other suspected criminal activities. There needs to be a clear threshold and due process for law enforcement agencies accessing private electronic devices. No agency should be able to demand access to private information without a very good reason."
Bad for business
Labour's Clare Curran notes Customs also wants people to hand over keys to encrypted files without a warrant.
She says that's bad for business.
“This is another example of New Zealand falling into line with its Five Eyes partners, the US, Australia, Canada and the UK and is another step toward the erosion of civil liberties and privacy," she says.
“It’s also a disturbing new piece of evidence that encryption as a business model is under threat. It could lead to stifling innovation of new businesses which provide encryption services and even dissuade people from travelling to a country with such draconian laws."
Tech Liberty co-founder and NZ Council for Civil Liberties chairman Thomas Beagle is also concerned about privacy implications. "This is particularly a problem when there is solid evidence that Customs has already been doing searches at the border at the request of the Police rather than for the customs purposes enabled by law," he says.
He also raises practical issues.
"We think the proposal is not going to achieve what Customs want it to, and there is too much risk of innocents being caught up in it," he says.
"Anyone with criminal digital content is going to store it on Dropbox or similar, travel with a clean laptop and then download the files when they get here."
"Or if they are silly enough to travel with sensitive files, how high would the penalty be for not handing over the password have to be to make it worth while giving it up?"
He adds that if someone refuses to hand over the combination for a lock on a brief case, that's only a shor- term problem. A Customs officer can literally force the issue with a hammer and chisel.
But if someone is asked for the password for a laptop, they can always weigh the threat of three months' jail for not handing it over versus the penalty they could face for, say, having evidence of money laundering or participating in a child porn ring on their computer, Mr Beagle says.
The problem for a Customs officer is that they have no way of telling if someone is refusing to hand over a password out of sheepishness, or if there is major offending involved. It could be that someone has simply forgotten their password in the stress of the situation.
"As for those worried that otherwise people might escape, we do have a policeforce with extensive powers granted by the Search & Surveillance Act (2012)," he says. Additionally, Customers already has the right to inspect electronic devices under the d Countering Financing of Terrorism Act (2009)."
"But of course it would have to have probable cause and get permission from a judge," he says.
The Tech Liberty co-founder prefers that route. "Customs has long been suspected of exceeding its powers to do searches on behalf of the Police," he claims.
Breaking: Google Gives New Meaning To “Orwellian” March 3 2015 | From: JonRappoport
“…if all records told the same tale — then the lie passed into history and became truth.”
(1984, George Orwell)
“The internet is stuffed with garbage. Anti-vaccination websites make the front page of Google, and fact-free ‘news’ stories spread like wildfire. Google has devised a fix – rank websites according to their truthfulness.”
Great idea, right? Sure it is. The author of the article lets the cat out of the bag right away with his comment about “anti-vaccination” websites.
These sites will obviously be shoved into obscurity by Google because they’re “garbage”…whereas “truthful” pro-vaccine sites will dominate top ranked pages on the search engine.
This is wonderful if you believe what the CDC tells you about vaccine safety and efficacy. The CDC: an agency that opens its doors every day with lies and closes them with more lies.
The New Scientist article continues:
“A Google research team is adapting [a] model to measure the trustworthiness of a [website] page, rather than its reputation across the web. Instead of counting incoming links, the [ranking] system – which is not yet live – counts the number of incorrect facts within a page. ‘A source that has few false facts is considered to be trustworthy,’ says the team…The score they compute for each page is its Knowledge-Based Trust score.”
Right. Google, researchers of truth. Assessors of trustworthiness. Who in the world could have a problem with that?
Answer: anyone with three live brain cells.
Here’s the New Scientist’s capper. It’s a beaut:
“The [truth-finding] software works by tapping into the Knowledge Vault, the vast store of facts that Google has pulled off the internet. Facts the web unanimously agrees on are considered a reasonable proxy for truth. Web pages that contain contradictory information are bumped down the rankings.”
Right. Uh-huh. So Google, along with its friends at the CIA, will engineer a new and improved, greater flood of (dis)information across the Web. And this disinfo will constitute an overwhelming majority opinion…and will become the standard for measuring truth and trustworthiness.
Think about what kinds of websites will rise like foul cream to the top of Google page rankings:
“All vaccines are marvelously safe and effective, and parents who don’t vaccinate their kids should be prosecuted for felonies.”
“GMOs are perfectly safe. ‘The science’ says so.”
“The FBI has never organized a synthetic terror event and then stung the morons it encouraged.”
“Common Core is the greatest system of education yet devised by humans.”
“People who believe conspiracies exist have mental disorders.”
In other words: (fake) consensus reality becomes reality. Which is the situation we have now, but the titanic pile of fakery will rise much, much higher.
Also, think about this: the whole purpose of authentic investigative reporting is puncturing the consensus…but you’ll have to search Google for a long time to find it.
In the field of medical fraud, an area I’ve been researching for 25 years, the conclusions of standard published studies (which are brimming with lies) will occupy page after page of top Google rankings.
Let me offer a counter-example to the Google “knowledge team.” Here is a woman who has examined, up close and personal, more medical studies in her career than the entire workforce of Google. She is Dr. Marcia Angell. For 20 years, she was an editor at The New England Journal of Medicine.
On January 15, 2009, the New York Review of Books published her stunning statement: “It is simply no longer possible to believe much of the clinical research that is published, or to rely on the judgment of trusted physicians or authoritative medical guidelines. I take no pleasure in this conclusion, which I reached slowly and reluctantly over my two decades as an editor of The New England Journal of Medicine.”
In two sentences, Angell carries more weight than 20,000 blowhard “science bloggers,” to say nothing of lying drug companies and that criminal agency called the FDA.
Angell torpedoes an entire range of medical literature, based on her hard-won experience.
But you can be sure that when it comes to “medical facts,” the Google “truth team” will ascribe absolutely no merit (ranking) to her conclusion or its implications.
You may say, “But these search engines are already slanting the truth.”
The new Google program is going to double down. It’s going to set up its own Ministry of Truth. It’s going to standardize algorithms that unerringly bring about officially favored lies.
Stories on vote fraud?
Stories contradicting the official line on mass shootings?
Stories on the US government funding terrorist groups?
Stories on the hostile planetary intentions of Globalists?
Stories on corporate criminals? Secrets of the Federal Reserve?
Stories on major media censoring scandals?
Counter-consensus stories on 9/11, the JFK assassination, the US bankers and corporations who funded both sides in WW2? All anti-establishment versions of history?
After Google launches this Ministry of Truth program, you’ll have to put on diving gear and go deep underwater to find any trace of them.
Welcome to a new day.
“It was a bright cold day in April, and the clocks were striking thirteen.” (Opening line, 1984, Orwell)
Let’s take all this one step further. Google’s director of research is Ray Kurzweil, who many people know as the promoter of a “utopian” plan to hook the population up (through direct brain-machine interface) to a vast super-computer.
The super-computer will pass along virtually all human knowledge. Kurzweil believes such a momentous breakthrough will endow humans with a mystical level of consciousness.
Even if this technological wet dream could be realized, we can now see what “connecting to all human knowledge” means:
It means accepting all official knowledge. Being blind to counter-knowledge. It’s time to reverse AI (Artificial Intelligence) and call it IA (Intelligent Androids).
IAs would be humans who are programmed to be androids. IAs accept truth as it delivered to them by official sources.
Google makes its contribution by promoting official sources. And hiding other sources. Yes, this surely seems like Nirvana. You will be fed the Good and protected from the Evil.
Thank you, Google. When are you going to apply for non-profit status and open your Holy Church of Information?
“Today’s sermon will be delivered by the director of the CIA. It is titled, ‘Data: everything you need to know, everything you must not believe.’ Breathe deeply. Your neuronal circuits are now being tuned to our channel…”
The Great SIM Heist: How Spies Stole The Keys To The Encryption Castle February 25 2015 | From: TheIntercept
American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.
The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.
The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.
In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted.
Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
As part of the covert operations against Gemalto, spies from GCHQ - with support from the NSA - mined the private communications of unwitting engineers and other company employees in multiple countries.
Gemalto was totally oblivious to the penetration of its systems - and the spying on its employees:
“I’m disturbed, quite concerned that this has happened,” Paul Beverly, a Gemalto executive vice president, told The Intercept.
“The most important thing for me is to understand exactly how this was done, so we can take every measure to ensure that it doesn’t happen again, and also to make sure that there’s no impact on the telecom operators that we have served in a very trusted manner for many years. What I want to understand is what sort of ramifications it has, or could have, on any of our customers.”
He added that “the most important thing for us now is to understand the degree” of the breach.
Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment.
“Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union.
“The news of this key theft will send a shock wave through the security community.”
Snowden Documentary CitizenFour Grabs Oscar February 24 2015 | From: RT
A Laura Poitras’ film about NSA whistleblower Edward Snowden has won Hollywood’s highest accolade by snatching the Oscar for Best Documentary.
“The disclosures of Edward Snowden don’t only expose a threat to our privacy but to our democracy itself," Poitras said during her acceptance speech. "When the most important decisions being made affecting all of us are made in secret, we lose our ability to check the powers that control," she pointed out, thanking Edward Snowden "for his courage, and for the many other whistleblowers."
Poitras added that she is sharing the award with Glenn Greenwald and "other journalists who are exposing truth." She was joined on stage by editor Mathilde Bonnefoy, producer Dirk Wilutzky and Snowden’s girlfriend, Lindsay Mills.
As the filmmaker and her collaborators walked offstage on Sunday night, Oscar host Neil Patrick Harris couldn't help quipping: "The subject of 'CitizenFour,' Edward Snowden, could not be here tonight for some treason."
As the filmmaker and her collaborators walked offstage on Sunday night, Oscar host Neil Patrick Harris couldn't help quipping: "The subject of 'CitizenFour,' Edward Snowden, could not be here tonight for some treason."
In response to the news, Snowden, who was charged under the federal Espionage Act and is currently living in asylum in Russia, wrote in a statement, released by the American Civil Liberties Union:
“When Laura Poitras asked me if she could film our encounters, I was extremely reluctant. I’m grateful that I allowed her to persuade me. The result is a brave and brilliant film that deserves the honor and recognition it has received."
“My hope is that this award will encourage more people to see the film and be inspired by its message that ordinary citizens, working together, can change the world,” Snowden said.
The documentary features a series of face-to-face meetings between Berlin-based filmmaker Laura Poitras, who appeared to be on the US Homeland Security “watch list” at one point, and the whistleblower Snowden, who got in touch with Poitras last January when she was working on a feature about surveillance in the post-9/11 era.
"Every border you cross, every purchase you make, every call you dial is in the hands of a system whose reach is unlimited but whose safeguards are not," Edward Snowden warns in the documentary’s trailer:
Digital Electronic “Internet of Things” (IoT) And “Smart Grid Technologies” To Fully Eviscerate Privacy February 19 2015 | From: GlobalResearch
The “Internet of Things” (IoT) and Smart Grid technologies will together be aggressively integrated into the developed world’s socioeconomic fabric with little-if-any public or governmental oversight.
This is the overall opinion of a new report by the Federal Trade Commission, which has announced a series of “recommendations” to major utility companies and transnational corporations heavily invested in the IoT and Smart Grid, suggesting that such technologies should be rolled out almost entirely on the basis of “free market” principles so as not to stifle “innovation.”
As with the Food and Drug Administration and the Environmental Protection Agency, the FTC functions to provide the semblance of democratic governance and studied concern as it allows corporate monied interests and prerogatives to run roughshod over the body politic.
The IoT refers to all digital electronic and RFID-chipped devices wirelessly connected to the internet. The number of such items has increased dramatically since the early 2000s. In 2003 an estimated 500 million gadgets were connected, or about one for every twelve people on earth. By 2015 the number has grown 50 fold to an estimated 25 billion, or 3.5 units per person. By 2020 the IoT is expected to double the number of physical items it encompasses to 50 billion, or roughly 7 per individual
The IoT is developing in tandem with the “Smart Grid,” comprised of tens of millions of wireless transceivers (a combination cellular transmitter and receiver) more commonly known as “smart meters.” Unlike conventional wireless routers, smart meters are regarded as such because they are equipped to capture, store, and transmit an abundance of data on home energy usage with a degree of precision scarcely imagined by utility customers. On the contrary, energy consumers are typically appeased with persuasive promotional materials from their power company explaining how smart meter technology allows patrons to better monitor and control their energy usage.
Almost two decades ago media sociologist Rick Crawford defined Smart Grid technology as “real time residential power line surveillance” (RRPLS). These practices exhibited all the characteristics of eavesdropping and more. “Whereas primitive forms of power monitoring merely sampled one data point per month by checking the cumulative reading on the residential power meter,” Crawford explains,
"Modern forms of RRPLS permit nearly continued digital sampling. This allows watchers to develop a fine-grained profile of the occupants’ electrical appliance usage. The computerized RRPLS device may be placed on-site with the occupants’ knowledge and assent, or it may be hidden outside and surreptitiously attached to the power line feeding into the residence.
This device records a log of both resistive power levels and reactive loads as a function of time. The RRPLS device can extract characteristic appliance “signatures” from the raw data. For example, existing [1990s] RRPLS devices can identify whenever the sheets are thrown back from a water bed by detecting the duty cycles of the water bed heater. RRPLS can infer that two people shared a shower by noting an unusually heavy load on the electric water heater and that two uses of the hair dryer followed."
A majority of utility companies are reluctant to acknowledge the profoundly advanced capabilities of these mechanisms that have now been effectively mandated for residential and business clients. Along these lines, when confronted with questions on whether the devices are able to gather usage data with such exactitude, company representatives are apparently compelled to feign ignorance or demur.
i210Yet the features Crawford describes and their assimilation with the IoT are indeed a part of General Electric’s I-210+C smart meter, among the most widely-deployed models in the US. This meter is equipped with not one, not two, but three transceivers, the I-210+C’s promotional brochure explains
One of the set’s transceivers uses ZigBee Pro protocols, “one of several wireless communication standards in the works to link up appliances, light bulbs, security systems, thermostats and other equipment in home and enterprises.” With most every new appliance now required to be IoT-equipped, not only will consumer habits be increasingly monitored through energy usage, but over the longer term lifestyle and thus behavior will be transformed through power rationing, first in the form of “tiered usage,” and eventually in a less accommodating way through the remote control of “smart” appliances during peak hours
Information gathered from the combined IoT and Smart Grid will also be of immense value to marketers that up to now have basically been excluded from the domestic sphere. As an affiliate of WPP Pic., the world’s biggest ad agency put it, the data harvested by smart meters “opens the door to the home. Consumers are leaving a digital footprint that opens the door to their online habits and to their shopping habits and their location, and the last thing that is understood is the home, because at the moment when you shut the door, that’s it.”
ESAs the FTC’s 2015 report makes clear, this is the sort of retail (permissible) criminality hastened by the merging of Smart Grid and IoT technologies also provides an immense facility for wholesale criminals to scan and monitor various households’ activities as potential targets for robbery, or worse.
The FTC, utility companies and smart meter manufacturers alike still defer to the Federal Communications Commission as confirmation of the alleged safety of Smart Grid and smart meter deployment. This is the case even though the FCC is not chartered to oversee public health and, basing its regulatory procedure on severely outdated science, maintains that microwave radiation is not a threat to public health so long as no individual’s skin or flesh have risen in temperature.
Yet in the home and workplace the profusion of wireless technologies such as ZigBee will compound the already significant collective radiation load of WiFi, cellular telephony, and the smart meter’s routine transmissions. The short term physiological impact will likely include weakened immunity, fatigue, and insomnia that can hasten terminal illnesses.
Perhaps the greatest irony is how the Internet of Things, the Smart Grid and their attendant “Smart Home” are sold under the guise of convenience, personal autonomy, even knowledge production and wisdom. “The more data that is created,” Cisco gushes, “the more knowledge and wisdom people can obtain. IoT dramatically increases the amount of data available for us to process. This, coupled with the Internet’s ability to communicate this data, will enable people to advance even further.”
In light of the grave privacy and health-related concerns posed by this techno tsunami, the members of a sane society might seriously ask themselves exactly where they are advancing, or being compelled to advance to.
Is Your Computer Hard Drive Hiding An NSA Spy Program? February 18 2015 | From: Infowars
Majority of the world's computers now spy for the NSA. According to Kaspersky Lab, the Moscow-based security software maker, the NSA has managed to insert spying software on most computer hard drives.
The program is hidden on hard drives manufactured by Western Digital, Seagate, Toshiba and other top manufacturers, Reuters reports.
Kaspersky did not pinpoint the country responsible for the software, but said it is closely related to Stuxnet, the cyber weapon developed by the Americans and the Israelis, with help from the Germans and the British.
Stuxnet was used to sabotage Iran’s effort to enrich uranium for its nuclear program.
A former NSA employee told the news agency the NSA values the hard drive spy program as much as Stuxnet.
Kaspersky said its research discovered the program on personal computers in 30 countries. Most of the infections were on computers in Iran, Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria.
Although Kaspersky said the targets include government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, it is not unreasonable to conclude it is used to spy on American citizens engaged in political activity the establishment considers threatening.
“I have long viewed this as one of the most important stories in the Snowden archive because it puts a face on the NSA’s surveillance overreach and illustrates, yet again — that domestic spying abuses usually target minorities, marginalized groups, and dissidents,” Greenwald said.
Citizen Four: The Edward Snowden Documentary February 13 2015 | From: CitizenFour
Citizen Four is a real life thriller (currently in cinemas), unfolding by the minute, giving audiences unprecedented access to filmmaker Laura Poitras and journalist Glenn Greenwald’s encounters with Edward Snowden in Hong Kong, as he hands over classified documents providing evidence of mass indiscriminate and illegal invasions of privacy by the National Security Agency (NSA).
Poitras had already been working on a film about surveillance for two years when Snowden contacted her, using the name “CITIZENFOUR,” in January 2013. He reached out to her because he knew she had long been a target of government surveillance, stopped at airports numerous times, and had refused to be intimidated.
When Snowden revealed he was a high-level analyst driven to expose the massive surveillance of Americans by the NSA, Poitras persuaded him to let her film.
Citizen Four places you in the room with Poitras, Greenwald, and Snowden as they attempt to manage the media storm raging outside, forced to make quick decisions that will impact their lives and all of those around them.
Citizen Four not only shows you the dangers of governmental surveillance—it makes you feel them. After seeing the film, you will never think the same way about your phone, email, credit card, web browser, or profile, ever again.
Automakers Stumped: Report Says Hackers Can Hijack Almost Any Car February 12 2015 | From: RT
Almost all automobiles sold today contain systems that can potentially be compromised by hackers, a United States Senator warns, but automakers appear largely unaware of the implications, according to his report.
Sen. Ed Markey (D-Massachusetts) is calling on the world’s automobile makers to implement mandatory safeguards after his congressional inquiry revealed a widespread absence of security and privacy protection with regards to cars currently being sold around the world.
Security that could curb hacking against automobiles or allow sensitive information to be compromised must be put in place by the auto industry, Markey’s office warns in the report published Monday, and current protection, when it’s brought to bear, is largely inconsistent.
The report warns modern automobiles are increasingly collecting sensitive information about personal driving habits and history, which is often held indefinitely and then offered to third-parties, in turn allowing companies the ability to keep detailed information about not just car performance, but also where a driver has traveled.
"Drivers have come to rely on these new technologies, but unfortunately the automakers haven’t done their part to protect us from cyber-attacks or privacy invasions. Even as we are more connected than ever in our cars and trucks, our technology systems and data security remain largely unprotected,”
Sen. Markey, a member of the Commerce, Science and Transportation Committee, said in a statement on Monday.
“We need to work with the industry and cyber-security experts to establish clear rules of the road to ensure the safety and privacy of 21st-century American drivers.”
Markey’s team considered studies by the Pentagon’s Defense Advanced Research Projects Agency (DARPA) in 2013 and 2014 in preparing the report, and sent questionnaires to 20 automakers inquiring about each manufacturer’s technology, security precautions and privacy policies.
Only 16 of the automakers responded, according to this week’s report, but their answers were enough to leave Sen. Markey’s office issuing a plea for car companies to increase security measures concerning the cars’ increasingly advanced technologies and privacy protections for the data it records.
The Police State Is Upon Us - Paul Craig Roberts February 1 2015 | From: PaulCraigRoberts
Anyone paying attention knows that 9/11 has been used to create a police/warfare state. Years ago NSA official William Binney warned Americans about the universal spying by the National Security Agency, to little effect. Recently Edward Snowden proved the all-inclusive NSA spying by releasing spy documents, enough of which have been made available by Glenn Greenwald to establish the fact of NSA illegal and unconstitutional spying, spying that has no legal, constitutional, or “national security” reasons.
Yet the people are not up in arms. The people of the western countries have accepted the government’s offenses against them as necessary protection against “terrorists.”
Neither Congress, the White House, or the Judiciary has done anything about the wrongful spying, because the spying serves the government. Law and the Constitution are expendable when the few who control the government have their “more important agendas.”
Bradley Manning warned us of the militarization of US foreign policy and the murderous consequences, and Julian Assange of WikiLeaks posted leaked documents proving it.
Were these whistleblowers and honest journalists, who alerted us to the determined attack on our civil liberty, rewarded with invitations to the White House and given medals of honor in recognition of their service to American liberty?
No. Bradley Manning is in federal prison, and so would be Julian Assad and Edward Snowden if Washington could get its hands on them.
Binney escaped the Police State’s clutches, because he did not take any documents with which to prove his allegations, and thus could be dismissed as “disgruntled” and as a “conspiracy kook,” but not arrested as a “spy” who stole “national secrets.”
Glenn Greenwald - The journalist entrusted by Edward Snowden for the initial NSA material releases
Greenwald, so far, is too prominent to be hung for reporting the truth. But he is in the crosshairs, and the Police State is using other cases to close in on him.
These are only five of the many people who have provided absolute total proof that the Bill of Rights has been overthrown. Washington continues to present itself to the world as the “home of the free,” the owner of the White Hat, while Washington demonstrates its lack of mercy by invading or bombing seven countries on false pretenses during the past 14 years, displacing, killing, and maiming millions of Muslims who never raised a fist against the US.
Many commentators have written articles and given interviews about government’s ever expanding police powers. The totality of the American Police State is demonstrated by its monument in Utah, where an enormous complex has been constructed in which to store every communication of every American. Somehow a son or daughter checking on an aged parent, a working mother checking on her children’s child care, a family ordering a pizza, and sweethearts planning a date are important matters of national security.
Some educated and intelligent people understand the consequences, but most Americans perceive no threat as they “have nothing to hide.”
The Founding Fathers who wrote the Bill of Rights and attached it to the US Constitution did not have anything to hide, but they clearly understood, unlike modern day Americans, that freedom depended completely on strictly limiting the ability of government to intrude upon the person.
Those limits provided by the Founding Fathers are gone. The hoax “war on terror” demolished them.
Today not even the relationships between husband and wife and parents and children have any protection from arbitrary intrusions by the state. Essentially, government has destroyed the family along with civil liberty.
In Police State America, authorities can enter your home on the basis of an anonymous “tip” that you are, or might be, somehow, abusing your children, or exposing them to medicines that are not in containers with child-proof caps or to household bleach that is not under lock and key, and seize your children into state custody on the grounds that you present a danger to your children.
The government does not have to tell you who your accuser is. It can be your worst enemy or a disgruntled employee, but the tipster is protected. However, you and your family are not.
The authorities who receive these tips treat them as if they are valid. A multi-member goon squad shows up at your house. This is when the utterly stupid “I have nothing to hide” Americans discover that they have no rights, regardless of whether they have anything to hide.
We owe this police power over parents and children to “child advocates” who lobbied for laws based on their fantasies that all parents are serial rapists of children, and if not, are medieval torturers, trained by the CIA, who physically and psychologically abuse their children.
In the opinion of “child advocates,” children are brought into the world in order to be abused by parents. Dogs and cats and the fish in the fishbowl are not enough. Parents need children to abuse, too, just as the Police and the Police State need people to abuse.
Of course, sometimes real child abuse occurs. But it is not the routine event that the Child Protective Services Police assume. A sincere investigation, such as was missing in the report on the home-schooled children, would have had one polite person appear at the door to explain to the parents that there had been a complaint that their children were being exposed to a poisonous substance in the home.
The person should have listened to the parents, had a look at the children, and if there was any doubt about the water purifier, ask that its use be discontinued until its safety could be verified. But nothing sensible happened, because the Police State does not have to be sensible.
Instead, a half dozen goon thugs show up. The parents are put outside in the snow for 5 hours while the children are scared to death with questions and then carried away from their home, mother, and father.
In pur Police State countries, this is called Protecting Children. We owe this tyranny to the idiot “child advocates.”
It is no longer important to protect children from child molesters, unless they are Catholic child pedophiles. But it is absolutely necessary to protect children from their parents.
So, yes, dear insouciant American fool, whether you have anything to hide or not, you are in grave danger, and so are your children, in Police State America.
You can no longer rely on the Constitution to protect you.
This is the only way that you can protect yourself: grovel before your neighbors, your co-workers, your employees and employers, and, most definitely, before “public authority” and your children, as your children can report you. Don’t complain about anything. Do not get involved in protests. Don’t make critical comments on the Internet or on your telephone calls.
Don’t homeschool. Don’t resist vaccines. Turn your backs to leaders who could liberate you as it is too dangerous to risk the failure of liberation. Be an abject, cowardly, obedient, servile member of the enserfed, enslaved American population. Above all, be thankful to Big Brother who protects you from terrorists and Russians.
You, dear insouciant, stupid, American are back on the Plantation. Perhaps that is your natural home. In his masterful A People’s History of the United States, Howard Zinn documents that despite their best efforts the exploited and abused American people have never been able to prevail against the powerful private interests that control the government. Whenever in American history the people rise up they are struck down by brute force.
Zinn makes totally clear that “American freedom, democracy, liberty, blah-blah” are nothing but a disguise for the rule over America by money.
Wave the flag, sing patriot songs, see enemies where the government tells you to see them, and above all, never think. Just listen. The government and its presstitute media will tell you what you must believe.
How The CIA Made Google January 29 2015 | From: Medium
Insurge Intelligence, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information.
Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’
The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors.
The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: NSA mass surveillance, a permanent state of global war, and a new initiative to transform the US military into Skynet.
In the wake of the Charlie Hebdo attacks in Paris, western governments are moving fast to legitimize expanded powers of mass surveillance and controls on the internet, all in the name of fighting terrorism.US and European politicians have called to protect NSA-style snooping, and to advance the capacity to intrude on internet privacy by outlawing encryption.
One idea is to establish a telecoms partnership that would unilaterally delete content deemed to “fuel hatred and violence” in situations considered “appropriate.” Heated discussions are going on at government and parliamentary level to explore cracking down on lawyer-client confidentiality.
What any of this would have done to prevent the Charlie Hebdo attacks remains a mystery, especially given that we already know the terrorists were on the radar of French intelligence for up to a decade.
There is little new in this story. The 9/11 atrocity was the first of many terrorist attacks, each succeeded by the dramatic extension of draconian state powers at the expense of civil liberties, backed up with the projection of military force in regions identified as hotspots harbouring terrorists. Yet there is little indication that this tried and tested formula has done anything to reduce the danger. If anything, we appear to be locked into a deepening cycle of violence with no clear end in sight.
As our governments push to increase their powers, Insurge Intelligence can now reveal the vast extent to which the US intelligence community is implicated in nurturing the web platforms we know today, for the precise purpose of utilizing the technology as a mechanism to fight global ‘information war’ — a war to legitimize the power of the few over the rest of us. The lynchpin of this story is the corporation that in many ways defines the 21st century with its unobtrusive omnipresence: Google.
Google styles itself as a friendly, funky, user-friendly tech firm that rose to prominence through a combination of skill, luck, and genuine innovation. This is true. But it is a mere fragment of the story. In reality, Google is a smokescreen behind which lurks the US military-industrial complex.
The inside story of Google’s rise, revealed here for the first time, opens a can of worms that goes far beyond Google, unexpectedly shining a light on the existence of a parasitical network driving the evolution of the US national security apparatus, and profiting obscenely from its operation.
The Shadow Network
For the last two decades, US foreign and intelligence strategies have resulted in a global ‘war on terror’ consisting of prolonged military invasions in the Muslim world and comprehensive surveillance of civilian populations. These strategies have been incubated, if not dictated, by a secret network inside and beyond the Pentagon.
Established under the Clinton administration, consolidated under Bush, and firmly entrenched under Obama, this bipartisan network of mostly neoconservative ideologues sealed its dominion inside the US Department of Defense (DoD) by the dawn of 2015, through the operation of an obscure corporate entity outside the Pentagon, but run by the Pentagon.
In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. But the inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit.
Known as the ‘Highlands Forum,’ this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the network around the Highlands Forum has become increasingly successful in dominating US defense policy.
Giant defense contractors like Booz Allen Hamilton and Science Applications International Corporation are sometimes referred to as the ‘shadow intelligence community’ due to the revolving doors between them and government, and their capacity to simultaneously influence and profit from defense policy.
But while these contractors compete for power and money, they also collaborate where it counts. The Highlands Forum has for 20 years provided an off the record space for some of the most prominent members of the shadow intelligence community to convene with senior US government officials, alongside other leaders in relevant industries.
I first stumbled upon the existence of this network in November 2014, when I reported for VICE’s Motherboard that US defense secretary Chuck Hagel’s newly announced ‘Defense Innovation Initiative’ was really about building Skynet — or something like it, essentially to dominate an emerging era of automated robotic warfare.
That story was based on a little-known Pentagon-funded ‘white paper’ published two months earlier by the National Defense University (NDU) in Washington DC, a leading US military-run institution that, among other things, generates research to develop US defense policy at the highest levels. The white paper clarified the thinking behind the new initiative, and the revolutionary scientific and technological developments it hoped to capitalize on.
The Highlands Forum
The co-author of that NDU white paper is Linton Wells, a 51-year veteran US defense official who served in the Bush administration as the Pentagon’s chief information officer, overseeing the National Security Agency (NSA) and other spy agencies. He still holds active top-secret security clearances, and according to a report by Government Executive magazine in 2006 he chaired the ‘Highlands Forum’, founded by the Pentagon in 1994.
New Scientist magazine (paywall) has compared the Highlands Forum to elite meetings like “Davos, Ditchley and Aspen,” describing it as “far less well known, yet… arguably just as influential a talking shop.” Regular Forum meetings bring together “innovative people to consider interactions between policy and technology. Its biggest successes have been in the development of high-tech network-based warfare.”
Linton Wells II (right) former Pentagon chief information officer and assistant secretary of defense for networks, at a recent Pentagon Highlands Forum session. Rosemary Wenchel, a senior official in the US Department of Homeland Security, is sitting next to him
Given Wells’ role in such a Forum, perhaps it was not surprising that his defense transformation white paper was able to have such a profound impact on actual Pentagon policy. But if that was the case, why had no one noticed?
Despite being sponsored by the Pentagon, I could find no official page on the DoD website about the Forum. Active and former US military and intelligence sources had never heard of it, and neither did national security journalists. I was baffled.
The Pentagon’s Intellectual Capital Venture Firm
In the prologue to his 2007 book, A Crowd of One: The Future of Individual Identity, John Clippinger, an MIT scientist of the Media Lab Human Dynamics Group, described how he participated in a “Highlands Forum” gathering, an “invitation-only meeting funded by the Department of Defense and chaired by the assistant for networks and information integration.”
This was a senior DoD post overseeing operations and policies for the Pentagon’s most powerful spy agencies including the NSA, the Defense Intelligence Agency (DIA), among others. Starting from 2003, the position was transitioned into what is now the undersecretary of defense for intelligence. The Highlands Forum, Clippinger wrote, was founded by a retired US Navy captain named Dick O’Neill. Delegates include senior US military officials across numerous agencies and divisions — “captains, rear admirals, generals, colonels, majors and commanders” as well as “members of the DoD leadership.”
What at first appeared to be the Forum’s main website describes Highlands as “an informal cross-disciplinary network sponsored by Federal Government,” focusing on “information, science and technology.” Explanation is sparse, beyond a single ‘Department of Defense’ logo.
But Highlands also has another website describing itself as an “intellectual capital venture firm” with “extensive experience assisting corporations, organizations, and government leaders.” The firm provides a “wide range of services, including: strategic planning, scenario creation and gaming for expanding global markets,” as well as “working with clients to build strategies for execution.” ‘The Highlands Group Inc.,’ the website says, organizes a whole range of Forums on these issue.
For instance, in addition to the Highlands Forum, since 9/11 the Group runs the ‘Island Forum,’ an international event held in association with Singapore’s Ministry of Defense, which O’Neill oversees as “lead consultant.” The Singapore Ministry of Defense website describes the Island Forum as “patterned after the Highlands Forum organized for the US Department of Defense.” Documents leaked by NSA whistleblower Edward Snowden confirmed that Singapore played a key role in permitting the US and Australia to tap undersea cables to spy on Asian powers like Indonesia and Malaysia.
The Highlands Group website also reveals that Highlands is partnered with one of the most powerful defense contractors in the United States. Highlands is “supported by a network of companies and independent researchers,” including “our Highlands Forum partners for the past ten years at SAIC; and the vast Highlands network of participants in the Highlands Forum.”
SAIC stands for the US defense firm, Science Applications International Corporation, which changed its name to Leidos in 2013, operating SAIC as a subsidiary. SAIC/Leidos is among the top 10 largest defense contractors in the US, and works closely with the US intelligence community, especially the NSA. According to investigative journalist Tim Shorrock, the first to disclose the vast extent of the privatization of US intelligence with his seminal book Spies for Hire, SAIC has a “symbiotic relationship with the NSA: the agency is the company’s largest single customer and SAIC is the NSA’s largest contractor.”
CFR’s RAND Corporation: Terror From “Everywhere” Requires More Surveillance January 15 2015 | From: InfoWars
The end game is to monitor every citizen in real-time.
Three suspected French terrorists and a fourth who allegedly crossed the border into Syria have provided ample opportunity to ramp up the police and surveillance state.
Stephanie Pezard, a RAND Corporation political scientist with a specialty in French policy, told CBC News there is:
“only so much you can do to prevent attacks that basically can come from everywhere. It’s going to be mostly intelligence services that will have to make sure that everyone on their watch list is being watched.”
In the United States, the terrorist watch list is massive. The FBI’s terrorist Screening Database or TSDB as of 2008 consisted of 400,000 unique names and over 1,000,000 records. Names are provided by the Department of Homeland Security, the State Department, the Justice Department, the Department of Defense and other federal agencies.
Monitoring a small percentage of the names included would require a sprawling intelligence apparatus that would rival East Germany’s Stasi, Nazi Germany’s Gestapo or the KGB in the Soviet Union.
The NSA is currently the largest and most powerful intelligence organization in the world.
“The NSA will play an integral part in permanent surveillance,” writes David Hamilton for the WikiLeaks Press.
“Technological advancements will upgrade the NSA’s surveillance capabilities to real time surveillance.
Millions of innocent people have been the subject of surveillance and millions more will become subjects of surveillance.”
Not surprisingly, RAND is behind the propaganda effort to radically expand the size and scope of the surveillance grid.
Real-time monitoring of “terrorists,” that is say all who pose a serious threat to the establishment, is a primary objective of the global elite.
The end game for the NSA is not merely to monitor a million or so people included in a terror database, but the entire population.
The “RAND National Defense Research Institute is a federally-funded Council on Foreign Relations ‘think-tank’ sponsored by the Office of the Secretary of Defense and headed by Council on Foreign Relations member Michael D. Rich. Clients include the Pentagon, AT&T, Chase Manhattan Bank, IBM, Republican Party, U.S. Air Force, U.S. Department of Energy and NASA.
The interlocking leadership between the trustees at RAND, and the Ford, Rockefeller, and Carnegie foundations is a classic case of Bilderberg modus operandi,” writes Daniel Estulin in his book on the Bilderberg Group.
Is Your TV Spying On You? January 14 2015 | From: DailyMail
It sounds like science fiction but many new TVs can watch you - telling advertisers your favourite shows or even filming you on the sofa. And there's no off switch!
You are sitting in bed in your pyjamas, drinking a cup of cocoa. A loved one lies next to you, watching late-night television. Pillow talk is exchanged. An alarm clock is set. Eventually the lights are turned out.
Earlier, you sat on the living-room sofa eating supper, before loading the dishwasher and heading upstairs.
You have, in other words, just enjoyed a perfectly normal night, in a perfectly normal home. The curtains are drawn, the central heating turned up. It’s cosy, relaxing and, above all, completely private. Or so you thought.
The truth turns out to be quite the opposite. For on the other side of the world, people you didn’t know existed are keeping a beady eye on your every move.
These characters can see what clothes you have been wearing and what food you’ve eaten. They heard every word you said, and logged every TV show you watched. Some are criminals, others work for major corporations. And now they know your most intimate secrets.
It may sound like a plot summary for a futuristic science-fiction movie. But real-life versions of this Orwellian scenario are being played out every day in towns and cities across the globe — and in most cases the victims have no idea.
At fault is a common electronic device invented nearly a century ago and found in almost every modern household: the domestic television set.
Put simply, our TVs have started spying on us.
Last week, there was a high-profile case in point. An IT consultant called Jason Huntley, who lives in a village near Hull, uncovered evidence that a flat-screen television, which had been sitting in his living room since the summer, was secretly invading his family’s privacy.
He began investigating the £400 LG device after noticing that its home screen appeared to be showing him ‘targeted’ adverts — for cars, and Knorr stock cubes — based on programmes he’d just been watching.
Huntley decided to monitor information that the so-called smart TV — which connects to the internet — was sending and receiving. He did this by using his laptop effectively as a bridge between his television and the internet receiver, so the laptop was able to show all the data being sucked out of his set.
He soon discovered that details of not just every show he watched but every button he pressed on his remote control were being sent back to LG’s corporate headquarters in South Korea.
There, the electronics company appeared to be using its customers’ data to make money. A promotional video shown to commercial clients suggested that data was being used to provide ‘the ad experience you have always dreamed of’.
The information Huntley’s TV had sent — without his knowledge — included the contents of his private digital video collection, which he’d watched on the television. This included camcorder footage of family celebrations containing images of his wife and two young children.
Most worrying of all, the device continued sending such information to Korea even after Huntley had adjusted the television’s default settings to ‘opt out’ of data sharing.
Huntley wrote about the findings on his blog. After his case was picked up by mainstream news outlets, LG announced an investigation. ‘Customer privacy is a top priority,’ the firm said. ‘We are looking into reports that certain viewing information on LG smart TVs was shared without consent.’
LG has also removed its promotional video about targeted advertising from its website.
The Information Commissioner’s Office says it is now investigating the firm for a ‘possible breach’ of the Data Protection Act. Jason Huntley, meanwhile, tells me he is ‘very suspicious and also a little worried’ by the affair.
‘I don’t think we’ve heard the last of this. Who knows what else these televisions are doing that we don’t know about?’
It doesn’t take much digging to find out. Talk to any IT security expert and they will tell you that Huntley’s discovery is probably the tip of the iceberg.
What’s to blame is the continuing rise of smart televisions, which account for most new TV sets sold and are predicted to be in more than half of British homes by 2016. These high-tech devices differ from traditional televisions in that they are not just passive boxes that receive a signal and transfer it to a backlit screen.
Instead, they are essentially computers that connect to the internet — and so also send information back the other way.
In theory, this can be extremely useful. For example, many smart TVs have shopping ‘apps’ to access Amazon. They connect to iTunes. They allow us to watch YouTube, instantly download films via Netflix, stream BBC shows on iPlayer, and talk to friends using the video phone link Skype.
But in practice, like almost every type of computer, they can be all-too-easily hacked. And unlike PCs, almost all of which have fairly good anti-virus ‘firewalls’, smart TVs have little or no such software.
Indeed, most have been designed so that outside software — including anti-virus programmes — can never be installed.
This year, Luigi Auriemma, an IT security researcher and computer programmer from Malta, demonstrated the risks that these devices pose when he showed it was possible to hack into several types of Samsung smart television.
After accessing the devices via the internet, Auriemma was able to control them: turning the TVs off and on, and secretly accessing data they held about a user’s viewing habits.
Had he been a criminal, he could also have obtained details of the credit cards that users had uploaded to access pay-per-view TV, download films or use shopping apps.
Other experts recently made the chilling discovery that it is possible to remotely access the video cameras built into the front of thousands of smart televisions, and spy on the users in their own home.
One such expert is Kurt Stammberger, who works for the IT security firm Mocana. He says the company was recently asked by a television manufacturer to do ‘penetration tests’ on its devices.
‘We weren’t just able to find out what someone was watching, and had watched,’ he says. ‘We could also install “spyware” that could, if they had a video camera, allow us to see through that camera — without even activating the little light that indicates it’s on.
‘It was a fairly straightforward thing to do. People who work in IT often place tape over their computer’s camera lens [in a laptop they are usually set into the inside of the lid] unless they want to actually use it, because it’s so common to hack them. We should all do the same with smart TVs.’
Such an attack, which Stammberger describes as ‘frighteningly easy’ to mount, could provide voyeuristic hackers with a chance to snoop on unsuspecting home-owners in their living rooms or bedrooms.
You have only to witness the extraordinary success of the critically acclaimed Channel 4 show Gogglebox, in which consenting families allow the viewing public to watch them watching television, to appreciate how enticing that prospect could be.
More commercially minded hackers could use such an attack to steal commercial secrets. It could even be used to spy on foreign powers.
‘It’s a serious prospect and I would be very surprised if the Government ever puts in a big order for TVs from, for example, a Chinese manufacturer such as Huawei,’ adds Stammberger, referring to the giant corporation that has been banned in America because of fears over espionage.
‘But supply chains these days are so long and so complex that it’s very rare to buy an electronic device that doesn’t have some sort of Chinese component in it.’
Gangs based largely in Eastern Europe and Russia, meanwhile, are already using so-called ‘data-mining’ programmes to trawl the internet looking for smart TVs in which owners have entered their credit card details. A single search can yield thousands of results.
According to Roger Grimes, who has written eight books on IT security and worked in the field for 28 years, the gangs then sell lists of hacked credit card numbers to fellow criminals.
Card details that were obtained within the past 24 hours sell for around £2.20 each. Older ones are cheaper because there is more chance the cards could have been changed or stopped.
‘What we are starting to see now is really just a foretaste of what’s going to be happening in the next couple of decades,’ says Grimes.
‘Thanks firstly to mobile devices, and now smart TVs, we are entering a brave new world where there will be computers everywhere. Bad guys will take advantage of that.’
And we may not even be safe in our own living rooms.
I found myself writing a comment on The Standard this morning in reaction to their publishing Brian Gould’s piece explaining why Labour outsmarted National when they voted with them to allow warrantless spying on Kiwi’s.
I found myself writing about New Zealand’s Labour party lead by Andrew Little compromising on the right of New Zealanders to be free of unlimited “Governmental” spying on them and the history leading up to these law changes.
I found myself writing about Andrew Little’s and Labour’s reprehensible and dangerous lack of insight in the Geopolitical developments over the last 13 years. In fact since the events of 9/11.
Let me explain what I mean with unlimited spying:
When you allow a “Government” even the tiniest window of unwarranted (= uncontrolled by the third arm of Government = Elite using police or other spy agencies for their own ends) spying on it’s population you might as well give them unlimited spy time. Spying is done in secret and you can count on it the clock will only start ticking when somebody finds out they are being spied on.
History is filled with examples of what happens if a people accept the fact that their “Government” spies on them. It always ends bad and it is always used to crush dissent. It is also always brought in under the exact same motivation:
There is an enemy in our midst and we are in danger. In order to make sure the enemy doesn’t hurt us we have to be able to spy on everyone.
The difference between what populations hear and what “Governments” mean by this is also always the same.
The populations hears: We, the “Government” and you, the righteous, solid, law abiding citizens of this country, are under thread from the enemy within (Communists, Catholics, Protestants, Capitalists, Jews, Muslims, take your pick throughout history). As solid, law abiding citizens you have nothing to fear. This is your “Government” protecting you.
What the “Government” is actually saying: We (the “Government”) are under thread and the enemy could be who ever we are saying it is. And yes, that could be you, the solid, law abiding citizen who finally cracks after enforced austerity, also known as looting by the elite represented by the aforementioned “Government”, erosion of civil liberties, endless wars perpetrated by the “Government” and other things that drive normal, solid, law abiding people to a breaking point.
The population subjected to this kind of behaviour always finds out what the “Government” actually meant when their family members and loved ones start to disappear. Because the consequence of allowing your “Government” to spy on its population. It is always more repression as the population starts to wake up to their new reality and starts to protest when innocents die or disappear.
So here is what wrote on the Standard:
Just a bit of history (I know, who needs history but you know history repeats itself if you don’t learn from it so bear with me Iprent). Around 1999 a thesis was published. It was called Rebuilding America’s defenses. It was published by a group of what we now know to be dual citizen neo-liberals calling themselves the Project for a New American Century. In it they called for a “New Pearl Harbor”.
They got their New Pearl Harbor on 9/11 and a law was quickly rolled out and pushed through under urgency. It was called the Patriot law. Turns out that law was written long before 9/11 happened.
The result was wholesale spying, TSA groin groping at airports, a no fly list, the wholesale militarization of the US police to name a few of the changes in the US.
Now what does that have to do with Andrew Little’s and Labour’s stance on the illegal “spy at will” laws (Being safe from governmental spying in your own home is a very basic human right) they just voted in, you ask?
Their compliance with the law changes proposed by our US sock puppet prime Minister show that they are dangerously naive in assuming that the law will only be used to spy on possible Muslim terrorists.
It shows that they are dangerously naive and still suffer from “We are Islands very far away from everything else so we don’t have to learn about global politics and what happened in other countries that have so far accepted unwarranted spying on their own citizens as a result of what happened on 9/11itis”.
Even if you believe the claptrap of what we have been told about who perpetrated 9/11 and why, it behooves the party Brian Gould calls THE OPPOSITION to be aware of how spy laws and no fly lists have affected the populations of other countries. If they can’t look over the border and see the bigger picture they have no place in our government!
Additionally you might want to ask yourself why Brian Gould as a member of the MSM is grooming his audience to once again look at the other head of the same dragon as the SOLE opposition party. It seems to me to be a clear case of “you will elect the people we have chosen for you to elect”.
Perhaps our puppet masters are aware that the Teflon on John Key is wearing thin and they know the populace is restless and wants a change.
At least they now know that in Andrew Little they are getting a “reasonable” man willing to “compromise” the privacy of the people of New Zealand away in favor of “safety”.
It all reminds me of a quote from Benjamin Franklin: “Those who are willing to give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.”
We have just taken the next step on Naomi Wolfs list towards Fascism and nobody seems to notice. Least of all Andrew Little and the Labour party.
New Zealand Prime Minister Uses Bogus Islamic State Threat As Excuse To Ramp Up National Security And Surveillance Powers November 6 2014 | From: NewZealandHerald
It is well known outside the cabal-run corporate media that the "Islamic State" is in fact a CIA / MOSSAD run front used as a problem-reaction-solution vehicle to further the globalist, fasacist Zionist agenda. Also see: US Allies Against ISIS Are Actually ISIS’ Main Allies
On the watch list
Government agencies had a watch list of between 30 and 40 people of concern in the "foreign fighter'' context, he said.
“These are people in or from New Zealand who are in various ways participating in extremist behaviour."
In addition to those on the watch list, another 30 or 40 were on a list of people requiring further investigation.
He said five New Zealand citizens or residents were known to be fighting in Syria but the number fighting in the region could be larger because dual citizens or New Zealanders could have left from other countries.
Others were Isis supporters who had tried to travel to Iraq and Syria to fight and who had had their passports cancelled.
Mr Key also announced a funding boost of $7 million for Security Intelligence Service across the current and next financial year to increase the number of staff to monitor and investigate foreign fighters.
He set out plans to change the law to give SIS greater powers of surveillance including video surveillance on private property, with a warrant, which the police but the SIS cannot do.
He also want the SIS to have the ability to conduct surveillance without a warrant for 48 hours in situations deemed urgent. It can take at least 48 hours to prepare paperwork for a warrant.
Mr Key said in such cases, if the warrant was not granted, any material collected would be destroyed.
New legislation would also give the Minister of Internal Affairs power to cancel passports for up to three years, and temporarily suspend passports for up to 10 working days in urgent cases.
Mr Key described the changes as "responsible and narrow" and said they would be subject to a sunset clause.
He said the rise of such a well-resourced, globally-focused terrorist group which was highly skilled in social media recruitment was a "game changer" for this country. "ISIL exposes us to a type of threat that we lack both the legislative tools and resources to combat."
He was limited in what information he could reveal, but said there were individuals here who were attracted to carrying out similar attacks to those seen in Australia and Canada.
Mr Key said he wanted to stress that none of the people causing concern in New Zealand were representative of the Muslim community as a whole.
"The Muslim community is a peaceful one, which makes a valuable contribution to New Zealand.
"I know the vast majority of Muslim New Zealanders are as distressed by the actions of ISIL and its violent extremist message as anyone else."
Parliament this afternoon debated Mr Key's speech and proposed law changes.
Acting Labour leader Annette King said Labour broadly supported the law changes and said they "appear to be justified".
She warned that the 48-hour pre-warrant surveillance power by the SIS should not become the norm, however.
The law changes will have a sunset clause, pending a major review of intelligence agencies and their powers in the middle of next year.
She welcome the fact that the bill, once introduced, would be going to a select committee where, she said, the law would be closely examined to see if it was workable, necessary and framed appropriately.
Comment: The reality that history proves is that government never relinquish power once gained. Most of the underling politicians involved in this mess are too lowly to even be aware of what they are putting together. The draconian march towards fascism is being implemented piece by piece, leveraged by inventedfalse-flag threats.
While most of the sheeple are still seemingly incapable of thinking for themselves, behaving like 'deer in the headlights' - the tide is turning and more and more are starting to realise that these sorts of powers, as history shows, are intended by 'those at the top' to one day be deployed indiscriminately, carte blanche - across the board.
The Former Head Of The NSA And CIA Makes Statements That Imply John Key Is Lying About Mass Surveillance November 6 2014 | From: TV3
In a 3rd Degree report from TV3 that goes right inside both the NSA and GCSB, spies respond to mass surveillance allegations. The NSA confirms it has operatives working in New Zealand.
The Government Communications Security Bureau (GCSB) has responded to election week allegations it carries out mass surveillance on New Zealanders, denying its programmes are for anything other than cyber security.
Senior spies at the GCSB's headquarters in Wellington came forward this week, speaking with 3rd Degree, because of concerns of what they see as misconceptions among the New Zealand public.
Allegations by American whistleblower Edward Snowden, a former worker at US spy organisation the National Security Agency (NSA), claim the NSA maintains bases in New Zealand, collects metadata about New Zealanders and has worked with the GCSB to tap the Southern Cross internet cable to extract data.
Surveillance: The Hidden Ways You’re Tracked October 29 2014 | From: BBC
Just how much of your life is watched? Security expert Bruce Schneier points out that it is more than most people think, says Chris Baraniuk.
Do you have secrets? Security expert Bruce Schneier has little patience for those who say they don’t.
When asked about government and corporate surveillance, there are some who shrug their shoulders and say they have nothing to fear because they have nothing to hide. Schneier’s response? “I ask them their salary and they won’t tell me. I ask them about their sexual fantasy world and they won’t tell me.
The whole ‘I have nothing to hide’ thing is stupid, that’s a dumb comment,” he says. What’s more, your day-to-day behaviour is monitored in ways you wouldn’t even realise, so these details and many more could be open for all to see – and use against you. And that’s a problem, even if you happen to trust your government to use the data for good.
Schneier, who spoke at BBC Future’s World-Changing Ideas Summit on 21 October (see video, above), helped journalist Glenn Greenwald analyse Edward Snowden’s leaked documents from the National Security Agency. The controversy was recently documented in the film Citizenfour, and consciously or not, Schneier’s sentiments echo Snowden’s own words in an early email to the film’s director Laura Poitras:
"Every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route, is in the hands of a system whose reach is unlimited but whose safeguards are not.”
Indeed, pretty much everything you do can be tracked now, says Schneier. “Everything involves a computer. You know that your Kindle tracks how fast you read, right? Everything you do online, everything you do on your phone, everything you do that involves any kind of payment system.”
As an example, Schneier told the World-Changing Ideas Summit that things as simple as taxi passenger and fare data could be easily de-anonymised once combined with location data, as the data analytics firm Neustar showed recently. Visit a strip club, for instance, and it’d no longer be private.
In general, assume your movements are being watched. It’s a fact already made glaringly obvious in London, when the local transport authority’s public bicycle data was unwittingly made public. Individual commuters’ journeys were easily chalked up on Google maps.
Sophisticated smartphone applications are now capable of building up detailed pictures not just of our location, but the context of our environment. In a recent paper, researchers provided the example of an app called CarSafe which is able to learn the driving habits of users by interpreting data from the two cameras on modern smartphones.
Schneier also pointed out at the summit that many of the mobile phone towers in your vicinity may not have been set up by your network provider, but governments – both domestic and foreign – who want to find out who’s walking by and what they’re up to. The secretive nature of these masts makes it difficult to know how they are used, he says.
“The British government will not even acknowledge that they use them. We know they do, but they won’t even acknowledge that. The FBI does acknowledge that they use them, but is very secretive about how,” he explains. “Someone found that there are 80-100 of these in Washington DC not run by the US government. We don’t know who’s running them.”
Public wi-fi raises yet more issues, since routers that pick up your mobile phone signal are now able to triangulate your position accurately enough to tell which aisle you’re in at the supermarket. If the “MAC address” of your device – a unique identification code for your device visible to a network – can be matched to you then whoever has that data might know very intricate details of where you, personally, have spent your time.
“If the government said you have to have a tracking device, for certain you would rebel,” notes Schneier. “But the government doesn’t have to say that because you do it willingly and they just get a copy of the data.”
And so might anyone else. The same vulnerabilities exploited by intelligence agencies could be similarly exploited by corporations, insurance firms, health providers, or even malicious hackers, criminals or terrorists – the very people surveillance is supposed to target.
“We need to choose between security and surveillance,” Schneier told the summit audience. It’s just not possible to build electronic devices that keep data secret from everybody except, say, government officials trying to track the movements of terrorists. “Everybody gets to spy or nobody gets to spy.”
But recently the rapidly increasing popularity of such tools has ignited consternation at the FBI. James Comey, the Bureau’s director, has said that encryption offered by companies like Apple and Google deprives law enforcement authorities of information which could be crucial to solving crimes or saving lives.
For Tom Gaffney, technical director at information security firm F-Secure, which markets software that protects users’ privacy online, the comments rang hollow. “Effectively, the government is forcing people down the route of using these tools because of their lack of transparency, their desire to track every bit of our data rather than concentrating on criminals,” he says.
Gaffney also points out that data collected by private companies, whether encrypted or not, can still be held more or less forever, and there’s no way of knowing for sure how it will be used or sold in the future.
The point of recognising all of this is to better understand the consequences of using free services which rely on monetising our data via advertising to remain profitable. And Schneier argues that all government tracking should be legal and targeted to individuals already suspected of criminal activity, rather than having universal surveillance through which private experiences belonging to millions of innocent citizens are recorded and stored.
The information we create as we navigate the world, both physically and digitally, is sometimes referred to as a “data footprint”. This sounds relatively benign, which is why the term is a poor metaphor.
The true data footprint you leave behind everywhere you go and after practically everything you do is much, much more detailed than a trace in the sand. It’s who you are: from your most public persona right down to your most private moments.
Glenn Greenwald was one of the first reporters to see - and write about - the Edward Snowden files, with their revelations about the United States' extensive surveillance of private citizens.
In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you’re “not doing anything you need to hide."
Glenn Greenwald is the journalist who has done the most to expose and explain the Edward Snowden files.
Why you should listen
As one of the first journalists privy to NSA whistleblower Edward Snowden’s archives, Glenn Greenwald has a unique window into the inner workings of the NSA and Britain's GCHQ. A vocal advocate for civil liberties in the face of growing post-9/11 authoritarianism, Greenwald was a natural outlet for Snowden, who’d admired his combative writing style in Salon and elsewhere.
Since his original Guardian exposés of Snowden’s revelations, Pulitzer winner Greenwald continues to stoke public debate on surveillance and privacy both in the media, on The Intercept, and with his new book No Place to Hide -- and suggests that the there are more shocking revelations to come.
Five Eyes ‘Spy Fee’: NZ Annually Forks Out Over $100 Million For Intelligence Funding October 22 2014 | From: RT
The taxpayers in New Zealand are spending $103 million a year on intelligence as a kind of membership fee for the country to be part of the Five Eyes surveillance club together with the US, UK, Australia and Canada, a declassified report said.
The so-called ‘Murdoch Report’ from 2009 was made public on the request of the New Zealand Herald newspaper under the country’s Official Information Act.
The document, which was put together by former Zealand’s Secretary of Foreign Affairs and Trade, Simon Murdoch, reviewed the operations of the country’s spy agencies after 9/11 when their intelligence-sharing relations with the US were undergoing a major transformation.
The report indicated that – since September 11, 2001 – the New Zealand’s intelligence community had doubled in staff numbers and more than tripled in funding, reaching to $103 million.
According to Murdoch, this money should be viewed:
“In the context of the annual ‘subscription’ paid by New Zealand to belong to the 5-Eyes community whose annual capital investment and operating outlays would dwarf ours".
"It helps explain why the niche contributions that we can make to 5-Eyes burden sharing are so important and why agency heads strive to be responsive to partner demand," he added.
The issue of New Zealand Intelligence Corps (NZIC) working hard on behalf of its Five Eyes partners is raised in several places in the report.
New Zealand had to prove itself as a “niche contributor with capacity constraints, but some high quality competencies,” Murdoch said.
The document listed a range of security challenges faced by New Zealand, including cyber threats to IT infrastructure, "imported or homegrown Islamic militancy" as well as the spread of weapons of mass destruction.
Threats also included "trans-boundary criminality, civilizational friction, and resource rivalry and energy brinkmanship."
New Zealand Herald said that large sections of the report it received were blanked out, particularly, the areas, which appear to focus on the relationships with Five Eyes’ partners.
The country’s intelligence agencies have always tried to avoid disclosure of the contribution they make to the Five Eyes alliance.
However, there is speculation that New Zealand is involved in satellite interception due to its favorable geographical positioning in the Pacific Ocean.
The island state’s humble reputation is also believed to have been used as a staging point for electronic spying on countries that are less friendly towards the US or UK.
The Five Eyes alliance was formed after World War II so that the British Commonwealth and the US could share intelligence information on the Soviet Union and its allies.
The ‘Five Eyes’ term has its origins as a shorthand for the "AUS/CAN/NZ/UK/US EYES ONLY" classification level.
After 9/11, the alliance further expanded its surveillance capabilities, making monitoring the Internet one of its top priorities.
New Zealand: Another "Five Eyes" Country On The UN Security Counsel And One More Step Closer To War? October 18 2014 | From: AotearoaAWiderPerspective / Stuff
World affairs: Containing the “madness” of Islamic State militants, preventing a repeat of what has occurred in Gaza this year, and finding a lasting solution to tensions in the Ukraine are among New Zealand’s priorities if elected. New Zealand’s priorities as a security counsel member.
With the election of New Zealand, sold to us like we actually have an independent vote, another five eye country hell bent on war in the Middle East has ascended to the Security Counsel.
Our Priorities? Yep, fighting the “mad” Muslims, more bombs on Gaza cause they are mad there too, NATO to the rescue of Ukraine and getting rid of Veto rights for “the bad guys” hidden under the “All veto states are culpable” meme so read China and Russia.
We will be a good little state serving the Empire where countries such as Spain and Venezuela will give the US some serious headaches I hope. World war III here we come!
In a vote at the UN’s New York headquarters on Thursday local time (Friday morning NZT), New Zealand picked up 145 votes, claiming one of the “Western Europe and other nations” seats – ahead of Turkey and Spain – in the first round of voting.
New Zealand will take its seat on the council for two years, starting on January 1, 2015. The last time New Zealand sat on the council was 1993-94. It had earlier stints in 1953/54 and 1966.
It has been hailed a victory for small states by Prime Minister John Key, who said it came after hard work over a decade lobbying for the seat.
“We have worked very hard on the bid for close to a decade because we believe that New Zealand can make a positive difference to world affairs and provide a unique and independent voice at the world’s top table."
“It has been more than 20 years since New Zealand was last on the Council and we are ready to contribute again."
“It was a tough campaign against Spain and Turkey, two much bigger countries and close friends.”
Sophisticated Surveillance Coming To Auckland October 2 2014 | From: Stuff
Surveillance technology that uses high definition cameras and software that can put names to faces and owners to cars is coming to Auckland. The surveillance has the capability to also scan social media and news websites.
Auckland Transport, the regional transport provider, announced the multi-million dollar deal in June, and California's Hewlett-Packard Development Company said today it has the contract.
No dollar sum is given. They call it a "visionary Big Data" project and in a statement said Auckland has selected HP "to drive groundbreaking future cities initiative".
All the data gathered by the cameras will be processed by HP cloud servers based in Palo Alto, California.
Auckland Transport's Chief Information Officer Roger Jones is quoted by HP as saying: "The safety and well-being of our citizens is always our top priority and the Future Cities initiative is a big step in the right direction".
"Only HP could comprehensively deliver the custom solution, expertise and ecosystem at this scale to transform our vision into reality."
The vast amount of data including text, images, audio and real-time video will be analysed by HP's system.
"The system will leverage data from a variety of sources, including thousands of security and traffic management cameras, a vast network of road and environmental sensors as well as real-time social media and news feeds," HP said.
"We are proud to work with such an innovative and forward-thinking government agency like Auckland Transport,"HP's Big Data group manager Colin Mahony said.
An Auckland Transport spokesman said there were currently five video systems and this move would consolidate things into one processing system.
"We are not installing new cameras, this is a back end system for the approximately 800 cameras we have access to covering intersections, railway and busway stations."
"The system will be used to monitor traffic flows, vandalism and safety. We will not be using any capability which identifies faces or number plates."
He said Auckland Transport was in ongoing discussions with the Privacy Commissioner and would not proceed until all protocols had been signed off on.
Auckland Council's memorandum of understanding, which was used to create the contract, provides draft "Surveillance Principles".
It refers to live feeds and says these should be trained on "specific crime and safety hot-spots", traffic management areas and real-time matters being investigated or responded to by police.
"should not be used for surveillance or monitoring of specific individuals (whether or not identifiable by name, and whether not facilitated by supporting technology) except in respect of specific criminal acts or organised crime or other reasonably suspected criminal behaviour (including terrorism) on the basis of such evidence or reasonable suspicion of criminal offending,"
... the principles state..
Police are also told they should not provide access to the data to any other agencies in New Zealand or abroad except where that complies in all respects with the terms of these surveillance principles and New Zealand law.
John Key: “You Want To Spy? You Make The “Business” Plan, I’ll Change The Law!” September 16 2014 | From: AotearoaAWiderPerspective
When David Farrar on Kiwi blog alleges that Sir Bruce Ferguson Agrees with John Key and that the GCSB never collected whole sale data on all New Zealanders and that is saying something because Ferguson is not a fan of the Prime Minister and therefor it must mean Kim Dotcom, Glen Greenwald and Snowden must be full of shit he is doing what he has alwasy done: Lying Spinning.
You see, Sir Bruce Ferguson was the GCSB chef until 2011. By the time the GCSB illegally spied on Kim Dotcom he had left the building and it was Hugh Wolfensohn who was acting director at the time who had “authorized” the illegal probes. Not just on Kim Dotcom but also on around 80 other New Zealanders.
What Snowden is testifying too is the fact that John Key presided over the development of a “Business” plan for whole sale data collection in 2012 AFTER Sir Bruce Ferguson had left and before the date of 8 May 2013 at which John Key presented the change in law required to enable wholesale spying legally
Mr Key said cyber attacks in 2011 led the Cabinet to approve an investigation into wider cyber protection which he stopped in March 2013.
Wider cyber protection I hope you will agree with me is just a spin name for wholesale spying on an entire population.
Leading up to the “Moment of truth” event John Key at first denied that there was wholesale data gathering going but that is not the issue here.
The issue is that the Prime minister of this country was involved in organizing wholesale spying on his population by a FOREIGN and very controversial spying agency (NSA) with the help of a NSA financed group (GCSB) to whom he appointed a hand picked dare I say it HENCHMAN and former schoolmate Ian Fletcher in what Sir Bruce Ferguson said was a very disturbing manner at a time this was highly illegal and without telling his population.
He also told his population that there would be not way the amendment to the law would enable anybody to collect wholesale data while he knew very well that it would.
The amendment was passed under urgency which is essentially a very nasty way of bullying laws into existence without due process in the manner used by the National party.
You have to ask yourself the question as to why John Key who came here to help New Zealand or so he said, made it possible for foreign intelligence gatherers to collect large amounts of data from people who are not accused of being engaged in any criminal activities. It is clearly not in New Zealand’s interest to have their privacy being invaded in such a wholesale manner.
In Holland we have a saying: U vraagt, wij draaien. It essentially stands for: you tell me what you want me to do and I’ll jump. The question is who asked and who did John Key jump for?
Dotcom's 'Moment Of Truth': With Glenn Greenwald, Edward Snowden, Julian Assange, Bob Amsterdam And Kim Dotcom September 15 2014 | From: WakeUpKiwi
The following is a brief summary taken as-it-happened: (See below for video)
Laila Harre introduced the panel and speaks about democracy and the global importance of this event, making reference to the 'Powers that Were'.
Greenwald gave Key a fairly good dressing down over his unprofessional remarks ('henchman' and 'loser') and his knee-jerk reaction to what Key suspected might be revealed tonight. He noted that Key has responsed by de-classifying information that had selectively been 'classified' without being actually declared a risk to national security.
He noted that despite the Prime Minister stating that Greenwald is being paid to be here, he is not. Greenwald turned down financial compensation and asked that his usual speaking fee be donated to charity.
Greenwald pointed out that while people have different opinions on Edward Snowden, the quality and accuracy of the information Snowden released has never been questioned.
He said that while Key said that mass surveillance on New Zealanders was only a proposal that was ultimately dismissed, internal discussion within the NSA termed "Project Speargun" as underway, with Phase One (the undersea cable connections) being completed.
Greenwald pointed out that Key lied blatantly that the new internet bill would give the government any new powers for data collection.
Greenwald comments that
the assumption was made that the law would pass in time such that actions taken by the government that were illegal at the time, would be covered once the legislation came into effect.
In his summary, he makes reference to Key's statement regarding resignation and the information recently disclosed.
Snowden pointed out that the NSA actually has facilities in New Zealand that John Key is aware of, one of those being in Auckland and one further north.
He described his most recent role at the NSA and spoke about XKeyscore and how it operates within the FVEY (Five Eyes) Network comprised of the security services of the US, UK, Canada, Australia and New Zealand.
He descibed how the NSA has access to everyone's data, including how he could go about reading John Key's email and how he knows mass surveillance is happening in New Zealand as part of the NSA network is located here in NZ.
Snowden questioned Keys decisions in determining what New Zealanders should and should not know about data collection - and his motives for sudden document de-classification.
He asked the question, 'why did the release of this information not matter last year when New Zealander's rights were on the line, but it is relevant now that one persons [the Prime Minister's] reputation is on the line?'
Snowden reiterated that the NSA's proposed programs that were not legal in NZ at the time, and while they were illegally underway - said that NZ needed to pass new legislation in order to make the actions legal. And so a foreign power, the US, by way of the NSA - is dictating law in NZ.
After a humourous moment with a vacuum cleaner, Assange pays tribute to New Zealand's own Nicky Hager for paving the way to this type of information release in the early 1990's with his book Secret Power.
He goes on to discuss the Five Eyes Alliance and how New Zealand, in conjunction with the other Five Eyes countries have tried to go about creating a new structure of civilisation - and how the people of New Zealand are not likely to back the actions of their government in the creation of such an Orwellian undertaking - should they be aware of it.
Assange noted that the 'powers that be' within the GCSB have exchanged the rights of New Zealanders in order to have this position within the Five Eyes Alliance. New Zealand is seen as a junior partner by some, however it is equal in status to the other countries in the alliance, except the United States.
He noted that covert agencies are not to be trusted as there is no scrutiny of them.
Dotcom thanked Snowden and Assange for what they are doing for all internet users worldwide.
Assange pointed out that all three of them (Dotcom, Snowden and himself) share the same prosecutor. He referenced that fact that the US is making efforts for their laws to be applied worldwide.
They are applying their laws in NZ, taking control of the New Zealand police force and attempting to dictate extraditions - the US effectively annexing New Zealand by way of the major power factions in Washington DC. This becomes a problem for the whole world, with 69 nations being called into extradition cases by the the NSA in Alexandria, Virginia.
Dotcom notes that there are two ways we can fight surveillance, the first being politically, and the second being encryption.
Both Julian and Edward were connected to the broadcast via Mega's new fully encrypoted video conferencing solution.
Amsterdam made reference to Key playing golf with Obama after the New Year holiday in Hawaii. He notes "free trade" and how Canada is now under 80% foreign ownership.
He warns that the TPP Agreement would see the loss of New Zealand's sovereignty and how this "free trade" agreement is driven by vested interests and Hollywood, forcing other countries to change their Intellectual Property laws to suit these interests.
Greenwald warns that with Key's background as a currency trader [with Merryl Lynch], he is now playing with a limited number of chips and is imporvising, with one of those chips being New Zealand law.
He noted that the New Zealand Law Society complained to the United Nations about our governments use of expediency in passing these laws.
He stated also:
"As I hear the use of the word 'terror' on the streets of Auckland - who is attacking New Zealand?"
Our governments are trying to alienate us from eachother and they are using terror to invade our homes, and to invade our internet accounts and to invade our most private constitutional rights.
These trade representatives have agreed amongst themselves that they need secrecy so we don't get pissed off - and they have that secrecy for four years.
In a democracy is that really how these trade aggrements should be undertaken?
He points out that our governments have agreed to this and that is how these agreements are taking place.
There is an exportation of American law and a militarisation of justice.
Amsterdam referenced the topic of dirty politics and observed that what is happening here in New Zealand now is like Watergate with email.
He suggests a Royal Inguiry into the behaviour of the Key government.
Amsterdam also observed that in the era of the internet, our Prime Minister, ( who is inherently a trader who doesn't adhere to the fundamental principles of human rights) that with what was done with the raid on Dotcoms home in a democratic society - the leader of that government should have resigned on that day.
Add to that, the recently uncovered information; as a country we really need to come together and put the feet of the next government to the fire - that what are or fundament rights cannot be taken away.
History shows that when a government becomes empowered with information that it will ultimately turn on its own citizens.
"It is time to stop the TPPA under its present conditions."
Laila Harre Sums up
Harre thanks Nicky Hager for kicking off this whole sequence of events with his book Dirty Politics and the framework that it provided.
She advised that with this education that people bear all of this in mind when the Prime Minister finds his diary and begins to make his excuses tomorrow.
Video:(Duration is 2:06 - Broadcast begins at 0:22)
Overview: GCSB Has Engaged In Mass Surveillance Of New Zealanders - Greenwald September 14 2014 | From: NationalBusinessReview
An overview of the developing story in the lead-up to the Dotcom / Assange / Greenwald event tomorrow, Monday September 15.
American journalist Glenn Greenwald says John Key's repeated claim that the GCSB has not undertaken mass surveillance of New Zealanders is a lie.
Mr Greenwald, who has been hired to speak at Kim Dotcom's "Moment of Truth" event at the Auckland Town Hall on Monday, told TV3's The Nation he has been working on documents for months, which revealed the interception of emails, telephone calls and all types of communications.
"The statement from the GCSB to New Zealand citizens last year that they do not engage in mass surveillance on New Zealanders is one that is not truthful," said the Pulitzer Prize winner, who is best known for covering the Edward Snowden leaks during his time with UK paper The Guardian.
"What I can tell you for certain is that the Government does engage in extraordinary amounts of analysis of metadata - meaning who's talking to who and for how long ... on a massive indiscriminate scale, not just internationally, but on New Zealanders as well."
He added that"New Zealand spends an extraordinary amount of resources, for a country of this size, on electronic surveillance, and every single thing that the NSA does that we have been reporting on over the last year and a couple of months involves New Zealand directly. They are full-fledged allies of this effort."
New Zealand spies on a variety of countries on behalf of the United States, Mr Greenwald said.
For now, some voters will be left scratching their heads. Mr Greenwald and the Internet Party have thrown accussations at the PM, and the Mr Key has returned fire. And lots of insults have been thrown, too (failing to rise above the "henchman" fray, Mr Greenwald called the PM "unhinged"). But so far, neither side has tabled any evidence to back up its claims.
Prime Minister John Key has gone on the counter-attack, rubbishing claims by visiting US journalist Glenn Greenwald and labelling him "Dotcom's little henchman".
"There is no mass surveillance of New Zealanders by the GCSB and there never has been," Mr Key told media.
"Mr Dotcom's little henchman will be proven to be incorrect because he is incorrect."
Mr Key told TV3 a mass surveillance plan was considered in response to cyber attacks targeting New Zealand businesses in 2011. But it was never implemented, he said. He would declassify sensitive documents to prove that point and debunk Mr Greenwald's theory.
That promise angered the Internet Party, which released a joint statemetn from Hone Harawira and Laila Harre saying:
"The reported intention of the Prime Minister to arrange the selective declassification and release of documents for his own political purposes represents an abuse of the Prime Minister’s authority in his capacity as the Minister in charge of the GCSB and the SIS ...
If the purpose of classification is to protect our national interests, then what has changed today? Either these documents should have been previously released or they have been withheld to suit the Prime Ministers personal political agenda?"
The PM believed Mr Greenwald was jumping to conclusions based on partial information.
"There are a variety of reasons why, in the international environment we collect information. But when it comes to New Zealanders, there is no mass surveillance, there never has been mass surveillance. Dotcom's little henchman is wrong and unfortunately, he might have hacked some information but not all of it," Mr Key said.
"Mark my words: I'm right and he's wrong and I'll prove I'm right."
Mr Key said he stood by his statement last year that he would resign if the GCSB was shown to have conducted mass surveillance.
Kim Dotcom's "Moment of Truth" event takes place at the Auckland City Town Hall on September 15 from 7pm. Doors open from 6pm, free entry.
NSA Search Engine ICREACH Allows Law Enforcement To Scour Data On Citizens August 27 2014 | From: RT
The United States National Security Agency has built a massive information sharing system intended to allow intelligence community analysts from across the US government access hundreds of billions of records detailing the lives of people the world over.
This “Google-like” search engine, according to journalist Ryan Gallagher at The Intercept, was developed by the NSA as early as 2007, but was only made publicly available on Monday this week thanks to classified documents disclosed to the news site by former intelligence contractor Edward Snowden.
According to the leaked documents and Gallagher's own reporting, the ICREACH search engine created by the NSA lets analysts from nearly two-dozen other government agencies, including the Federal Bureau of Investigation and the Drug Enforcement Agency, among others, share an array of sensitive details collected by the US intelligence community and its partners concerning not just foreign terror suspects, but “millions of records on American citizens who have not been accused of any wrongdoing,” Gallagher wrote.
"The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy,” Gallagher added.
With the latest article to stem from the trove of classified files pilfered by Snowden last year, however, details for the first time are now being made available about just how widespread that information sharing is, opening new questions concerning the intelligence community's seemingly endless resources.
Check Out The Creepy Picture Google Paints Of Your Daily Habits August 23 2014 | From: OccupyCorporatism
Google has been quietly painting a picture of your daily whereabouts and travel habits with the use of your Android or Apple smartphones.
With the use of tracking map apps such as Google Maps, Facebook and Foursquare, Google knows users must log into their Google account and immediately has a reference point to begin recording the adventures of millions of citizens all across the world.
Google has created Sounds of Street View (SSV) with a UK based hearing-aid corporation that will utilize “Google’s Street View programming interface, people and businesses will be able to place a sound as well as a location marker on the online map.”
Stephen Griffin, developer for SSV explained:
“The concept seems to have sparked people’s imaginations, so hopefully we can start getting some great projects entered soon.
“Our hope is that we get some great ‘everyday’ soundscapes but also a few really out-there concepts too, such as the internal atmosphere from one of the many Street View stadiums around the world, or perhaps the underwater expeditions!”
One purpose for implementing this “immersive technology” is to lay the foundation for future corporations to have a new “promotional opportunity” and possibly create the next wave in deceptive marketing practices.
“There’s also potential for businesses, tour operators and such to think about how they communicate their brand/service when they get their own Street View internal tours. Sound adds a whole new atmospheric element to somewhere like, say, a restaurant, where you could have a welcoming message at the door, an ambient atmosphere to get potential clientele to gain a more thorough vibe.”
Jon Rappoport's Prediction About Facebook Comes True August 21 2014 | From: JonRappoport
Two years ago, I wrote about the origins of Facebook. The company had gone public with its IPO, which was tanking badly.
Here are key excerpts from the article:
“But now the Facebook stock has tanked. On Friday, August 17,  it weighed in at half its initial IPO price. For the first time since the IPO, venture-capital backers were legally permitted to sell off their shares, and some did, at a loss.”
“This has the earmarks of a classic shakeout and squeeze play…First, they [insiders] drive down the price of the stock, then they trade it at low levels that discourage and demoralize the public and even semi-insiders. As the stock continues to tank, they quietly buy up as much of it as they can. Finally, when the price hits a designated rock bottom, they shoot it up all the way to new highs and win big.”
“The company is too important as a data-mining asset of the intelligence community to let it fall into disrepair and chaos.”
“The media will play along, pretending the eventual upswing-recovery of Facebook stock happens for fundamental reasons connected to the company’s ‘better level of performance’. The media take this approach to every stock and every company, to avoid letting the public know how massive manipulation actually runs these trading markets.”
Okay. So let’s look at what’s happened to Facebook stock since I wrote those words two years ago.
From August 2012 all the way to July 2013, the stock presented a quite discouraging picture. It stayed in the 20-30 range, looked like it was going nowhere, and never threatened to move up to its original offering price of 40.
Exactly. This prompted many holders to dump their shares, affording insiders the opportunity to scoop them up at bargain-basement prices.
Finally, in July 2013, the insiders began the long march upward, which has continued to this day. As I write this, Facebook stock is selling at $75.39 a share, a new high.
Analysts, of course, attribute this boom to company “earnings beating projections.”
They always find a reason. They’ll say anything. “The weather last year was unusually cold.”
The fact is, Facebook was in good hands all the way. The heavy hitters took the price way down, kept it there, accumulated many, many shares, and then marched the price up to the sky.
In Facebook, the CIA and other intelligence agencies have had a great front for their data-mining work, and they weren’t going to let it fail.
As for the future, the insiders could take FB shares down again, let them languish, and then rocket them up. Why make just one big score when you can double-dip and make two?
Prime Minister Is Lying Over Nicky Hager's SIS Allegation - Phil Goff August 17 2014 | From: NationalBusinessReview
Labour front bencher Phil Goff says Prime Minister John Key is lying over allegations involving the SIS made in Nicky Hager's Dirty Politics.
The book claims Whale Oil blogger Cameron Slater was tipped off to ask the Security Intelligence Service for confidential documents about a briefing Mr Goff was given in 2011 (after controvesy over whether the then Labour leader had been briefed, or not, over an affair involving alleged spying by Israeli backpackers).
Mr Key says he didn’t have anything to do with the briefing papers being handed over afer an Official Information Act request, and that he didn’t speed up the process.
Asked if he took the PM at his word, Mr Goff replied;
"No. I regret to have to say that, but the prime minister’s lying. Every OIA request to the SIS will go across John Key’s desk. Now, there’s some other factors that are pertinent to this. I was rung up by the head of the SIS to say he’d had an OIA release and he was telling me that he was going to release it.
I said, ‘Who’s it from?’ He said, ‘A Mr Slater.’ I said, ‘What’s his first name?’ ‘Cameron Slater.’ I said, ‘You know who Cameron Slater is, don’t you?’ ‘Oh, yes, I do.’ ‘When did you get it?’ ‘I got it today.’ ‘When are you intending to release it?’ ‘Today’.
That is unheard of. I’ve been in politics for 30 years. I don’t know of anyone who has had an OIA returned in less than 20 days, and I don’t know anybody that’s got an OIA released from the SIS in that way."
When The Nation interviewer Lisa Owen put it to Mr Goff that , "You were in a war of words with [then SIS head Warren] Tucker at that time. It was clear that there was a degree of animosity there. Wouldn’t it be in his interest to get that information out to embarrass you?", he replied:
"Warren Tucker is a civil servant. As head of the SIS he does nothing that is inconsistent with what John Key or whoever is prime minister of the day asks him to do.
Other people, including the Dominion Post and Radio New Zealand, put in identical OIAs. They did not receive that for a long time. The fact that Slater received this is clearly under instruction from John Key, and it’s disingenuous of him to deny that. It’s dishonest."
New Nicky Hager Book: 'You Will Not Believe What You Read' August 13 2014 | From: NewZealandHerald
Dirty Politics: Nicky Hager’s new book on the Key Government launched at Unity
Dirty Politics, the new book from author and investigative journalist Nicky Hager, will feature leaked emails between National Party figures and right-wing bloggers.
The book, which has been released in Wellington tonight, aims to tell the story of "how attack politics is poisoning NZ's political environment".
It includes email correspondence between Whaleoil blogger Cameron Slater and Jason Ede, one of the Prime Minister John Key's press secretaries, in relation to information found on Labour's website.
Mr Hager said the Prime Minister's office had been "collaborating" with National Party "proxies" who were carrying out attacks on behalf of Mr Key while working to preserve his image.
The book shows Mr Slater and Mr Ede discussed the information and how to avoid being caught.
"Part of the book is about how John Key has cultivated a very respectable image of being friendly and relaxed but at the same time there has been another part of his politics which New Zealanders have not seen or understood."
Speaking to reporters this evening, Mr Hager said the book was about the "unseen side of Mr Key's political management".
He denied he had a political agenda in releasing the book so close to the election.
"Any person, any of you who had access to the documents I have would have leapt at the chance to use this information because it's so illuminating about the Government."
"That's what the job is - to tell people before the election."
He said he got the material early this year and could have taken more time with the book.
"But I've worked like a dog because I believe that people have a total right to know this before the election.
"So have I hurried it out before the election - totally. Is it politically motivated? It's motivated by the public interest that I think people have in knowing what's going on."
Mr Hager said his book would show Mr Key"has some very serious questions to answer".
Many of those questions were about his long term press advisers who were doing things like "going inside the Labour Party's computers", organising other dirty tricks and feeding material to bloggers Mr Slater and David Farrar to orchestrate personal attacks.
"When you read the book you're going to find chapter after chapter of remarkable things that him as leader of the party... he's got a lot to answer for.
"In some cases it's political blackmail, there are many cases of digging sexual dirt to try and scare and threaten people. There are many cases that looked to the country as if they were spontaneous acts of politics which were actually orchestrated from the ninth floor."
Mr Hager described Mr Slater as an "obnoxious" blogger whose attacks on a young man killed in a car crash earlier this year had led to hackers attacking the Whaleoil website.
He said the attack knocked out the Whaleoil site for a number of days during which time a hacker had come away with "thousands and thousands" of documents.
He said the papers revealed an "an astonishingly cynical and ugly view" of the way National's "proxies" behaved in politics.
Mr Hager said people would become increasingly astonished as they read through the book because the "dirty politics" only got worse.
"You will not believe what you read and how bloody awful it is."
In a speech prior to the launch, the book was described as one which"implicates John Key and senior National Party staff".
It ''revolves around a cast of Key, Cameron Slater, Jason Ede, David Farrar, Judith Collins and other National Party figures''.
"It shows a very different side of John Key and his Government than most New Zealanders know'', the book's publishers said.
Hager's earlier books have included Seeds of Distrust, which threatened to ankle-tap former Prime Minister Helen Clark as she headed into the 2002 election.
Mr Hager followed with The Hollow Men which gave voters an inside look at the manipulations of National's 2005 campaign. His 2010 book Other People's Wars exposed New Zealand's intelligence and military activities in Afghanistan and Iraq during the "War of Terror" - a stark contrast to the friendly, public relations-driven view the New Zealand Defence Force had offered.
His previous access to well-placed intelligence sources have driven speculation he was preparing to release Edward Snowden-sourced documents about New Zealand's involvement in the US-led Five Eyes spying alliance. But talk around Wellington yesterday had some leaning towards an expose on political manipulations.
Ahead of today's launch, Prime Minister John Key dismissed Mr Hager saying:"Most people know that Nicky Hager is a screaming left-wing conspiracy theorist."
It's a view which is in contrast to praise from US journalism legend Seymour Hersh, who last year said: "Nicky Hager has more knowledge and understanding of the American intelligence world in Afghanistan - both its good and its very bad points - than any reporter I know."
The release of the latest book has been carried out in total secrecy. Publicity for the book ahead of the launch has been non-existent, although the launch itself at Wellington's Unity Books has become today's must-attend Wellington function.
Media commentator Russell Brown said Mr Key's comments should be seen as preparing the ground for whatever might be coming by attempting to diminish Mr Hager's credibility.
"They are generally stories people don't want told,"he said of Mr Hager's work."You can see that in the push back which comes before the book comes out."
Mr Brown, AUT's Journalist In Residence and frontman with Toi Iti for Maori Television's Media Take, said Mr Hager had proven his credentials repeatedly and should be regarded as credible.
"One very valuable thing about Nicky is that he operates at a different level to most journalists. He has a strong sense in the public interest. He can take a long time to get the detail right. We're lucky to have someone in his position."
Mr Brown said Mr Hager's books fell into either the "barnstormer" or "technical" category and he expected this one would be greeted as a "barnstormer".
Mr Hager's first book was Secret Power, published in 1996. It was a world-exclusive and remains the authoritative text on the United States-led pre-digital spying network called Echelon.
CIA MKULTRA: They Intended To Use Drugs For “Everything” August 13 2014 | From: JonRappoport
Drugs to transform individuals… and even, by implication, society. Drug research going far beyond the usual brief descriptions of MKULTRA. The intention is there, in the record.
A CIA document was included in the transcript of the 1977 US Senate Hearings on MKULTRA, the CIA’s mind-control program.
The document is found in Appendix C, starting on page 166. It’s simply labeled “Draft,” dated 5 May 1955.
It begins: “A portion of the Research and Development Program of [CIA’s] TSS/Chemical Division is devoted to the discovery of the following materials and methods:”
What followed was a list of hoped-for drugs and their uses.
First, a bit of background: MKULTRA did not end in 1962, as advertised. It was shifted over to the Agency’s Office of Research and Development.
John Marks is the author of the groundbreaking book, The Search for the Manchurian Candidate, which exposed MKULTRA. Marks told me a CIA representative informed him that the continuation of MKULTRA, after 1962, was carried out with a greater degree of secrecy, and he, Marks, would never see a scrap of paper about it.
I’m printing below, the list of the 1955 intentions of the CIA regarding their own drug research. The range of those intentions is stunning. All statements are direct quotes from the “Draft” document.
Some of my comments gleaned from studying the list:
The CIA wanted to find substances which would “promote illogical thinking and impulsiveness.” Serious consideration should be given to the idea that psychiatric medications, food additives, herbicides, and industrial chemicals (like fluorides) would eventually satisfy that requirement.
The CIA wanted to find chemicals that “would produce the signs and symptoms of recognized diseases in a reversible way.” This suggests many possibilities—among them the use of drugs to fabricate diseases and thereby give the false impression of germ-caused epidemics.
The CIA wanted to find drugs that would “produce amnesia.” Ideal for discrediting whistleblowers, dissidents, certain political candidates, and other investigators. (Scopolamine, for example.)
The CIA wanted to discover drugs which would produce “paralysis of the legs, acute anemia, etc.” A way to make people decline in health as if from diseases.
The CIA wanted to develop drugs that would “alter personality structure” and thus induce a person’s dependence on another person. How about dependence in general? For instance, dependence on institutions, governments?
The CIA wanted to discover chemicals that would “lower the ambition and general working efficiency of men.” Sounds like a general description of the devolution of society.
As you read the list yourself, you’ll see more implications/possibilities.
Here, from 1955, are the types of drugs the MKULTRA men at the CIA were looking for:
Substances which will promote illogical thinking and impulsiveness to the point where the recipient would be discredited in public.
Substances which increase the efficiency of mentation and perception.
Materials which will prevent or counteract the intoxicating effect of alcohol.
Materials which will promote the intoxicating effect of alcohol.
Materials which will produce the signs and symptoms of recognized diseases in a reversible way so that they may be used for malingering, etc.
Materials which will render the induction of hypnosis easier or otherwise enhance its usefulness.
Substances which will enhance the ability of individuals to withstand privation, torture and coercion during interrogation and so-called “brain-washing”.
Materials and physical methods which will produce amnesia for events preceding and during their use.
Physical methods of producing shock and confusion over extended periods of time and capable of surreptitious use.
Substances which produce physical disablement such as paralysis of the legs, acute anemia, etc.
Substances which will produce “pure” euphoria with no subsequent let-down.
Substances which alter personality structure in such a way that the tendency of the recipient to become dependent upon another person is enhanced.
A material which will cause mental confusion of such a type that the individual under its influence will find it difficult to maintain a fabrication under questioning.
Substances which will lower the ambition and general working efficiency of men when administered in undetectable amounts.
Substances which promote weakness or distortion of the eyesight or hearing faculties, preferably without permanent effects.
A knockout pill which can surreptitiously be administered in drinks, food, cigarettes, as an aerosol, etc., which will be safe to use, provide a maximum of amnesia, and be suitable for use by agent types on an ad hoc basis.
A material which can be surreptitiously administered by the above routes and which in very small amounts will make it impossible for a man to perform any physical activity whatsoever.
That’s the list.
At the end of this 1955 CIA document, the author [unnamed] makes these remarks:
“In practice, it has been possible to use outside cleared contractors for the preliminary phases of this [research] work. However, that part which involves human testing at effective dose levels presents security problems which cannot be handled by the ordinary contactors".
“The proposed [human testing] facility [deletion] offers a unique opportunity for the secure handling of such clinical testing in addition to the many advantages outlined in the project proposal".
"The security problems mentioned above are eliminated by the fact that the responsibility for the testing will rest completely upon the physician and the hospital. [one line deleted] will allow [CIA] TSS/CD personnel to supervise the work very closely to make sure that all tests are conducted according to the recognized practices and embody adequate safeguards.”
In other words, this was to be ultra-secret. No outside contractors at universities for the core of the experiments, which by the way could be carried forward for decades.
A secret in-house facility. Over the years, more facilities could be created.
If you examine the full range of psychiatric drugs developed since 1955, you’ll see that a number of them fit the CIA’s agenda:
Speed-type chemicals, which addle the brain over the long term, to treat so-called ADHD.
Anti-psychotic drugs, to render patients more and more dependent on others (and government) as they sink into profound disability and incur motor brain damage.
And of course, the SSRI antidepressants, like Prozac and Paxil and Zoloft, which produce extreme and debilitating highs and lows - and also push people over the edge into committing violence.
These drugs drag the whole society down into lower and lower levels of consciousness and action.
If that’s the goal of a very powerful and clandestine government agency…it’s succeeding.