AIPAC`s Fed Candidate Stanley Fischer on a Warpath
Transcription
AIPAC`s Fed Candidate Stanley Fischer on a Warpath
KC & Associates Investigations Research Associates Quinault Valley Guns & Blades / Urban Escape & Evasion Course For 1st Responders International Relations * Military * Terrorism * Business * Security www.kcandassociates.org [email protected] Kathleen Louise dePass Press Agent/Publicist .360.288.2652 From the desk of Craig B Hulet? Report: NSA Intercepting Laptops Ordered Online, Installing Spyware Documents Reveal Top NSA Hacking Unit The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks The growing use of license plate readers and its threat to privacy Graphs by MIT Students Show the Enormously Intrusive Nature of Metadata and Dianne Feinstein Admits That Her 'NSA Reform' Bill Is About Protecting Existing Surveillance Programs Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic Latest batch of documents leaked shows NSA's power to pwn. The Israeli Criminals behind the NSA Spy Scandal AIPAC's Fed Candidate Stanley Fischer on a Warpath against Iran Declassified Files on Israeli Nuclear Smuggling Revealed Benjamin Netanyahu at Heli Trading Company involved / More Israel disclosures in Snowden’s trove of 'significant stories' – Greenwald Sovereign Citizens A Growing Domestic Threat to Law Enforcement by the FBI’s Counterterrorism Analysis Section Feds announce test sites for drone aircraft / I worked on the US drone program. The public should know what really goes on Navy’s 757-Sized Drone Will Provide Big-Time Surveillance Drone Survival Guide Surveillance Attack Military surveillance Domestic surveillance Consumer For Unofficial use only Global Drone deployment U.S. Military English / Pashto Leaked Photos of Chemtrail Dispersal System This bogey don’t hunt! Hulet, Out! FBI Drops Law Enforcement as 'Primary' Mission’ to ‘National Security The absurdly dangerous militarization of America’s police Tone Deaf NSA Officials Tell Reporter It's Time to Reform the First Amendment Rampant Prosecutorial Misconduct Why aren’t the Wall Street criminals prosecuted? “Electronic Surveillance Of Private Citizens … Subversive Of Constitutional Government” Was One Of The Articles Of Impeachment Against President Richard Nixon Approved By A Bipartisan 28 To 10 Vote Of The House Judiciary Committee On July 27, 1974 Why Isn’t Obama Impeached for Mass Surveillance? WashingtonsBlog Report: NSA Intercepting Laptops Ordered Online, Installing Spyware With each new story we hear of the NSA’s spying program, things get a little bit crazier—a little more Hollywood, and a lot more galling. From planting agents in video games like World of Warcraft to a spy satellite adorned with a worlddevouring, tentacled octopus (pictured above) the NSA has shown time and again that it’s willing to go to just about any length to gather intelligence on both domestic and foreign citizens. The latter isn’t problematic beyond diplomatic tension. Spy agencies are, by design, bankrolled to spy on allies and enemies abroad. When it comes to domestic spying, however, we run into problems. The latest report, this time via Der Spiegel and based on internal NSA documents, reveals that the NSA, in conjunction with the CIA and FBI, has begun intercepting laptops purchased online in order to install (quite literal) spyware and even hardware on the machines. The NSA terms this “interdiction.” Agents divert shipments to secret warehouses, carefully open the packages, install the software and/or hardware, and send them on their way. According to the report, this operation is carried out by the NSA’s elite hacking unit, or TAO—not to be confused with the much less imposing Taoism—though there are few details on the scope or targets of the program. The spy agency reportedly has backdoor access to numerous hardware and software systems from prominent tech companies such as Cisco, Dell, and Western Digital, among others. The NSA can even exploit Microsoft Windows error reports to find weak spots in compromised machines in order to install Trojans and other viruses. The Der Spiegel report also notes that the NSA has successfully tapped into some of the massive, under-sea fiber-optic cables that connect the global data infrastructure, in particular the “SEA-MEWE-4″ cable system. “This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India,” Der Spiegel reports, ”all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle.” As the aforementioned giant octopus logo proudly proclaims: “Nothing is beyond our reach.” Lately it appears that this is not so much boasting as a simple statement of fact. The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks Inside TAO: Documents Reveal Top NSA Hacking Unit By SPIEGEL Staff Documents Reveal Top NSA Hacking Unit By SPIEGEL Staff The NSA's TAO hacking unit is considered to be the intelligence agency's top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting. In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn't budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410. In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States' foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA's radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again. It was thanks to the garage door opener episode that Texans learned just how far the NSA's work had encroached upon their daily lives. For quite some time now, the intelligence agency has maintained a branch with around 2,000 employees at Lackland Air Force Base, also in San Antonio. In 2005, the agency took over a former Sony computer chip plant in the western part of the city. A brisk pace of construction commenced inside this enormous compound. The acquisition of the former chip factory at Sony Place was part of a massive expansion the agency began after the events of Sept. 11, 2001. On-Call Digital Plumbers One of the two main buildings at the former plant has since housed a sophisticated NSA unit, one that has benefited the most from this expansion and has grown the fastest in recent years -- the Office of Tailored Access Operations, or TAO. This is the NSA's top operative unit -- something like a squad of plumbers that can be called in when normal access to a target is blocked. According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO's area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO's disposal have become -- and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks. The unit is "akin to the wunderkind of the US intelligence community," says Matthew Aid, a historian who specializes in the history of the NSA. "Getting the ungettable" is the NSA's own description of its duties. "It is not about the quantity produced but the quality of intelligence that is important," one former TAO chief wrote, describing her work in a document. The paper seen by SPIEGEL quotes the former unit head stating that TAO has contributed "some of the most significant intelligence our country has ever seen." The unit, it goes on, has "access to our very hardest targets." A Unit Born of the Internet Defining the future of her unit at the time, she wrote that TAO "needs to continue to grow and must lay the foundation for integrated Computer Network Operations," and that it must "support Computer Network Attacks as an integrated part of military operations." To succeed in this, she wrote, TAO would have to acquire "pervasive, persistent access on the global network." An internal description of TAO's responsibilities makes clear that aggressive attacks are an explicit part of the unit's tasks. In other words, the NSA's hackers have been given a government mandate for their work. During the middle part of the last decade, the special unit succeeded in gaining access to 258 targets in 89 countries -- nearly everywhere in the world. In 2010, it conducted 279 operations worldwide. Indeed, TAO specialists have directly accessed the protected networks of democratically elected leaders of countries. They infiltrated networks of European telecommunications companies and gained access to and read mails sent over Blackberry's BES email servers, which until then were believed to be securely encrypted. Achieving this last goal required a "sustained TAO operation," one document states. This TAO unit is born of the Internet -- created in 1997, a time when not even 2 percent of the world's population had Internet access and no one had yet thought of Facebook, YouTube or Twitter. From the time the first TAO employees moved into offices at NSA headquarters in Fort Meade, Maryland, the unit was housed in a separate wing, set apart from the rest of the agency. Their task was clear from the beginning -- to work around the clock to find ways to hack into global communications traffic. Recruiting the Geeks To do this, the NSA needed a new kind of employee. The TAO workers authorized to access the special, secure floor on which the unit is located are for the most part considerably younger than the average NSA staff member. Their job is breaking into, manipulating and exploiting computer networks, making them hackers and civil servants in one. Many resemble geeks -- and act the part, too. Indeed, it is from these very circles that the NSA recruits new hires for its Tailored Access Operations unit. In recent years, NSA Director Keith Alexander has made several appearances at major hacker conferences in the United States. Sometimes, Alexander wears his military uniform, but at others, he even dons jeans and a t-shirt in his effort to court trust and a new generation of employees. The recruitment strategy seems to have borne fruit. Certainly, few if any other divisions within the agency are growing as quickly as TAO. There are now TAO units in Wahiawa, Hawaii; Fort Gordon, Georgia; at the NSA's outpost at Buckley Air Force Base, near Denver, Colorado; at its headquarters in Fort Meade; and, of course, in San Antonio. One trail also leads to Germany. According to a document dating from 2010 that lists the "Lead TAO Liaisons" domestically and abroad as well as names, email addresses and the number for their "Secure Phone," a liaison office is located near Frankfurt -- the European Security Operations Center (ESOC) at the so-called "Dagger Complex" at a US military compound in the Griesheim suburb of Darmstadt. But it is the growth of the unit's Texas branch that has been uniquely impressive, the top secret documents reviewed by SPIEGEL show. These documents reveal that in 2008, the Texas Cryptologic Center employed fewer than 60 TAO specialists. By 2015, the number is projected to grow to 270 employees. In addition, there are another 85 specialists in the "Requirements & Targeting" division (up from 13 specialists in 2008). The number of software developers is expected to increase from the 2008 level of three to 38 in 2015. The San Antonio office handles attacks against targets in the Middle East, Cuba, Venezuela and Colombia, not to mention Mexico, just 200 kilometers (124 miles) away, where the government has fallen into the NSA's crosshairs. Targeting Mexico Mexico's Secretariat of Public Security, which was folded into the new National Security Commission at the beginning of 2013, was responsible at the time for the country's police, counterterrorism, prison system and border police. Most of the agency's nearly 20,000 employees worked at its headquarters on Avenida Constituyentes, an important traffic artery in Mexico City. A large share of the Mexican security authorities under the auspices of the Secretariat are supervised from the offices there, making Avenida Constituyentes a one-stop shop for anyone seeking to learn more about the country's security apparatus. Operation WHITETAMALE That considered, assigning the TAO unit responsible for tailored operations to target the Secretariat makes a lot of sense. After all, one document states, the US Department of Homeland Security and the United States' intelligence agencies have a need to know everything about the drug trade, human trafficking and security along the US-Mexico border. The Secretariat presents a potential "goldmine" for the NSA's spies, a document states. The TAO workers selected systems administrators and telecommunications engineers at the Mexican agency as their targets, thus marking the start of what the unit dubbed Operation WHITETAMALE. Workers at NSA's target selection office, which also had Angela Merkel in its sights in 2002 before she became chancellor, sent TAO a list of officials within the Mexican Secretariat they thought might make interesting targets. As a first step, TAO penetrated the target officials' email accounts, a relatively simple job. Next, they infiltrated the entire network and began capturing data. Soon the NSA spies had knowledge of the agency's servers, including IP addresses, computers used for email traffic and individual addresses of diverse employees. They also obtained diagrams of the security agencies' structures, including video surveillance. It appears the operation continued for years until SPIEGEL first reported on it in October. The technical term for this type of activity is "Computer Network Exploitation" (CNE). The goal here is to "subvert endpoint devices," according to an internal NSA presentation that SPIEGEL has viewed. The presentation goes on to list nearly all the types of devices that run our digital lives -"servers, workstations, firewalls, routers, handsets, phone switches, SCADA systems, etc." SCADAs are industrial control systems used in factories, as well as in power plants. Anyone who can bring these systems under their control has the potential to knock out parts of a country's critical infrastructure. The most well-known and notorious use of this type of attack was the development of Stuxnet, the computer worm whose existence was discovered in June 2010. The virus was developed jointly by American and Israeli intelligence agencies to sabotage Iran's nuclear program, and successfully so. The country's nuclear program was set back by years after Stuxnet manipulated the SCADA control technology used at Iran's uranium enrichment facilities in Natanz, rendering up to 1,000 centrifuges unusable. The special NSA unit has its own development department in which new technologies are developed and tested. This division is where the real tinkerers can be found, and their inventiveness when it comes to finding ways to infiltrate other networks, computers and smartphones evokes a modern take on Q, the legendary gadget inventor in James Bond movies. Having Fun at Microsoft's Expense One example of the sheer creativity with which the TAO spies approach their work can be seen in a hacking method they use that exploits the error-proneness of Microsoft's Windows. Every user of the operating system is familiar with the annoying window that occasionally pops up on screen when an internal problem is detected, an automatic message that prompts the user to report the bug to the manufacturer and to restart the program. These crash reports offer TAO specialists a welcome opportunity to spy on computers. When TAO selects a computer somewhere in the world as a target and enters its unique identifiers (an IP address, for example) into the corresponding database, intelligence agents are then automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft. An internal presentation suggests it is NSA's powerful XKeyscore spying tool that is used to fish these crash reports out of the massive sea of Internet traffic. The automated crash reports are a "neat way" to gain "passive access" to a machine, the presentation continues. Passive access means that, initially, only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person's computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim's computer. Although the method appears to have little importance in practical terms, the NSA's agents still seem to enjoy it because it allows them to have a bit of a laugh at the expense of the Seattle-based software giant. In one internal graphic, they replaced the text of Microsoft's original error message with one of their own reading, "This information may be intercepted by a foreign sigint system to gather detailed information and better exploit your machine." ("Sigint" stands for "signals intelligence.") One of the hackers' key tasks is the offensive infiltration of target computers with so-called implants or with large numbers of Trojans. They've bestowed their spying tools with illustrious monikers like "ANGRY NEIGHBOR," "HOWLERMONKEY" or "WATERWITCH." These names may sound cute, but the tools they describe are both aggressive and effective. According to details in Washington's current budget plan for the US intelligence services, around 85,000 computers worldwide are projected to be infiltrated by the NSA specialists by the end of this year. By far the majority of these "implants" are conducted by TAO teams via the Internet. Increasing Sophistication Until just a few years ago, NSA agents relied on the same methods employed by cyber criminals to conduct these implants on computers. They sent targeted attack emails disguised as spam containing links directing users to virus-infected websites. With sufficient knowledge of an Internet browser's security holes -- Microsoft's Internet Explorer, for example, is especially popular with the NSA hackers -- all that is needed to plant NSA malware on a person's computer is for that individual to open a website that has been specially crafted to compromise the user's computer. Spamming has one key drawback though: It doesn't work very often. Nevertheless, TAO has dramatically improved the tools at its disposal. It maintains a sophisticated toolbox known internally by the name "QUANTUMTHEORY." "Certain QUANTUM missions have a success rate of as high as 80%, where spam is less than 1%," one internal NSA presentation states. A comprehensive internal presentation titled "QUANTUM CAPABILITIES," which SPIEGEL has viewed, lists virtually every popular Internet service provider as a target, including Facebook, Yahoo, Twitter and YouTube. "NSA QUANTUM has the greatest success against Yahoo, Facebook and static IP addresses," it states. The presentation also notes that the NSA has been unable to employ this method to target users of Google services. Apparently, that can only be done by Britain's GCHQ intelligence service, which has acquired QUANTUM tools from the NSA. A favored tool of intelligence service hackers is "QUANTUMINSERT." GCHQ workers used this method to attack the computers of employees at partly government-held Belgian telecommunications company Belgacom, in order to use their computers to penetrate even further into the company's networks. The NSA, meanwhile, used the same technology to target highranking members of the Organization of the Petroleum Exporting Countries (OPEC) at the organization's Vienna headquarters. In both cases, the trans-Atlantic spying consortium gained unhindered access to valuable economic data using these tools. The NSA's Shadow Network The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of "covert" routers and servers. It appears the NSA also incorporates routers and servers from nonNSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely. (Click here to read a related article on the NSA's "implants".) In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person's computer. Of course, a cookie doesn't automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint. A Race Between Servers Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID. This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer. The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: "Wait for client to initiate new connection," "Shoot!" and "Hope to beat server-to-client response." Like any competition, at times the covert network's surveillance tools are "too slow to win the race." Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document. Tapping Undersea Cables At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world's ocean floors. One document labeled "top secret" and "not for foreigners" describes the NSA's success in spying on the "SEA-ME-WE-4" cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle. The document proudly announces that, on Feb. 13, 2013, TAO "successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)." With the help of a "website masquerade operation," the agency was able to "gain access to the consortium's management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network." It appears the government hackers succeeded here once again using the QUANTUMINSERT method. The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. "More operations are planned in the future to collect more information about this and other cable systems," it continues. But numerous internal announcements of successful attacks like the one against the undersea cable operator aren't the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO's ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides. Spying Traditions Live On To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work. Responding to a query from SPIEGEL, NSA officials issued a statement saying, "Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies." The statement added that TAO's "work is centered on computer network exploitation in support of foreign intelligence collection." The officials said they would not discuss specific allegations regarding TAO's mission. Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors. Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer. These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world." Even in the Internet Age, some traditional spying methods continue to live on. REPORTED BY JACOB APPELBAUM, LAURA POITRAS, MARCEL ROSENBACH, CHRISTIAN STÖCKER, JÖRG SCHINDLER AND HOLGER STARK Related SPIEGEL ONLINE links: Shopping for Spy Gear Catalog Advertises NSA Toolbox (12/29/2013) http://www.spiegel.de/international/world/0,1518,940994,00.html Friendly Fire How GCHQ Monitors Germany, Israel and the EU (12/20/2013) http://www.spiegel.de/international/world/0,1518,940135,00.html Oil Espionage How the NSA and GCHQ Spied on OPEC (11/11/2013) http://www.spiegel.de/international/world/0,1518,932777,00.html Fresh Leak on US Spying NSA Accessed Mexican President's Email (10/20/2013) http://www.spiegel.de/international/world/0,1518,928817,00.html Quantum Spying GCHQ Used Fake LinkedIn Pages to Target Engineers (11/11/2013) http://www.spiegel.de/international/world/0,1518,932821,00.html Ally and Target US Intelligence Watches Germany Closely (08/12/2013) http://www.spiegel.de/international/world/0,1518,916029,00.html Related internet links "Washington Post": Bericht über Cyber-Attacken 2011 http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensivecyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cbfd7ce041d814_story.html Feds move to block discovery in NSA lawsuits By JOSH GERSTEIN | 1/8/14 8:57 PM EST The Justice Department moved Wednesday night to block the plaintiffs in the most successful legal challenges to the National Security Agency's call-tracking program from obtaining more details about how the surveillance effort operates. In a motion filed with U.S. District Court Judge Richard Leon, government lawyers asked the judge to halt further proceedings before him while appeals go forward in a pair of lawsuits brought by conservative legal activist Larry Klayman. The suits led last month to Leon's landmark ruling that the NSA's call database, aimed at making it easier for the government to trace leads in potential terrorism cases, likely violated the Fourth Amendment to the U.S. Constitution. "Even if the mere collection of information about Plaintiffs’ communications constitutes a Fourth Amendment search...conclusively resolving the reasonableness of that search ultimately could risk or require disclosure of exceptionally sensitive and classified intelligence information regarding the nature and scope of the international terrorist threat to the United States, and the role that the NSA’s intelligence-gathering activities have played in meeting that threat," the government motion states. "Plaintiffs have made clear their intentions to seek discovery of this kind of still-classified information, concerning targets and subjects, participating providers, and other operational details of the challenged NSA intelligence programs," the motion (posted here) adds. "Contentious litigation over the availability of classified information to litigate these cases against the Government Defendants, and the significant risks to national security if such information were disclosed, could and should be avoided by allowing the Court of Appeals to rule first on the legal viability of Plaintiffs’ claims against the Government Defendants." Klayman's past litigation has been known for being as impactful and sometimes more impactful in the discovery phase, where lawyers demand documents and conduct depositions, as in its ultimate outcome. So, the government's desire to head that process off for now, and perhaps entirely, is understandable. Klayman didn't immediately respond to an e-mail seeking comment for this item, but made clear in an interview last month that he was eager to start demanding information on the NSA's surveillance efforts. "We’re heading to discovery. We’ve got an entree into the NSA,” he crowed just after Leon issued his ruling determining that the mass collection of phone data was probably unconstitutional. The conclusion led Leon to order a halt to NSA's gathering of phone data on Klayman and one of his clients, but the judge halted that part of his order pending appeal. The new government filing also underscores a still unresolved aspect of the NSA call-tracking effort: just how comprehensive it is. "Although the Government has acknowledged that the program involves the collection and aggregation of a large volume of data from multiple providers, it has not represented in this litigation, nor does the record contain any representations by the Government, that the program captures information about all (or even virtually all) telephone calls to, from, or within the United States," the Justice Department lawyers wrote. The motion goes on to point to a declassified Foreign Intelligence Surveillance Court order from August that stated: "production of all call detail records of all persons in the United States has never occurred under this program." While not noted in the new motion, a report from an outside group President Barack Obama tapped to examine surveillance efforts added more granularity about the program to the public record last month. "The meta-data captured by the program covers only a portion of the records of only a few telephone service providers,” the Review Group report said. Drone Survival Guide Surveillance Attack Military surveillance Domestic surveillance Consumer For Unofficial use only Global Drone deployment U.S. Military English / Pashto 21st century birdwatching Our ancestors could spot natural predators from far by their silhouettes. Are we equally aware of the predators in the present-day? Drones are remote-controlled planes that can be used for anything from surveillance and deadly force, to rescue operations and scientific research. Most drones are used today by military powers for remote-controlled surveillance and attack, and their numbers are growing. The Federal Aviation Administration (FAA) predicted in 2012 that within 20 years there could be as many as 30.000 drones flying over U.S. Soil alone. As robotic birds will become commonplace in the near future, we should be prepared to identify them. This survival guide is an attempt to familiarise ourselves and future generations, with a changing technological environment. This document contains the silhouettes of the most common drone species used today and in the near future. Each indicating nationality and whether they are used for surveillance only or for deadly force. All drones are drawn in scale for size indication. From the smallest consumer drones measuring less than 1 meter, up to the Global Hawk measuring 39,9 meter in length. To keep this document widely available it can be downloaded in .pdf or .doc format. New translations will be made available over time. DISCLAIMER This document is for information purposes only, with the intent of free distribution of publicly available information. We do not condone violent or destructive behavior against people or property in any way or form. All content may be freely shared, adapted, and translation for noncommercial purposes. Available for free on the website. www.dronesurvivalguide.org Hiding from Drones Drones are equipped with extremely powerful camera’s which can detect people and vehicles at an altitude of several kilometers. Most drones are equipped with night vision, and/or infrared vision camera’s, so-called FLIR sensors. These can see human heat signatures from far away, day or night. However there are ways to hide from drones. 1. Day camouflage: Hide in the shadows of buildings or trees. Use thick forests as natural camouflage or use camouflage nets. 2. Night camouflage: hide inside buildings or under protection of trees or foliage. Do not use flashlights or vehicle spot lights, even at long distances. Drones can easily spot this during night missions. 3. Heat camouflage: Emergency blankets (so-called space blankets) made of Mylar can block infrared rays. Wearing a space blanket as a poncho at night will hide your heat signature 4. 5. 6. 7. 8. from infrared detection. Also in summer when the temperature is between 36°C and 40°C, infrared camera’s cannot distinguish between body and its surroundings. Wait for bad weather. Drones cannot operate in high winds, smoke, rainstorms or heavy weather conditions. No wireless communication. Using mobile phones or GPS based communication will possibly compromise your location. Spreading reflective pieces of glass or mirrored material on a car on a roof will confuse the drone’s camera. Decoys. Use mannequins or human-sized dolls to mislead the drone’s reconnaissance. ‘Evading Thermal Imaging And Radar Detection’, United States Militia, Special Forces. Hacking Drones Drones are remote controlled. The pilots operating the drone can be thousands of kilometers away at Ground Control stations. The control link is the satellite transmitted datalink by which the pilot controls the plane. By jamming or intercepting the datalink, one can interfere with the drones controls. The data link can be encrypted but often is not. 1. Interception. A sophisticated technique is using sky grabber software with a satellite dish and a TV tuner to intercept the drone’s frequencies. Communication from and to the drone can be intercepted. 2. Interference. By broadcasting on different frequencies or pack of frequencies the link between the drone pilot and the drone can be disconnected. 3. GPS spoofing. Small, portable GPS transmitters can send fake GPS signals and disrupt the Drones navigation systems. This can be used, for example, to steer drones into selfdestruction flight paths or even hijack them and land them on a runway. Sources: ‘Health Ranger’s intelligence analysis of military drones: payloads, countermeasures and more’, www.naturalnews.com, July 16, 2012. By Mike Adams ‘The Al-Qaida Papers - Drones’, This document is one of several found by The Associated Press in buildings recently occupied by al-Qaida fighters in Timbuktu, Mali. Associated Press, Feb 2013. DRONE SURVIVAL GUIDE TWENTY-FIRST CENTURY BIRDWATCHING Our ancestors could spot natural predators from far by their silhouettes. Are we equally aware of the predators in the present-day? Drones are remote-controlled planes that can be used for anything from surveillance and deadly force, to rescue operations and scientific research. Most drones are used today by military powers for remote-controlled surveillance and attack, and their numbers are growing. The Federal Aviation Administration (FAA) predicted in 2012 that within 20 years there could be as many as 30.000 drones flying over U.S. Soil alone. As robotic birds will become commonplace in the near future, we should be prepared to identify them. This survival guide is an attempt to familiarise ourselves and future generations, with a changing technological environment. This document contains the silhouettes of the most common drone species used today and in the near future. Each indicating nationality and whether they are used for surveillance only or for deadly force. All drones are drawn in scale for size indication. From the smallest consumer drones measuring less than 1 meter, up to the Global Hawk measuring 39,9 meter in length. Want to know more about the motivation behind this project? Read the FAQ ORDER THE DRONE SURVIVAL GUIDE ON ALUMINIUM PAPER English/Pashto edition. Offset printed on Chromolux ALU-E mirrored paper. Size 48 x 33 cm. EUR 10 incl. shipping. Order via paypal below. Due to the increased interest after the Gizmodo article, Popular Science, and The Verge, organizing orders and shipping may take longer than usual. Top of Form ABOUT THE DRONE SURVIVAL GUIDE The guide contains tactics for hiding from drones and interfering with the drones’ sensors, collected from various online sources. Health Ranger’s intelligence analysis of military drones: payloads, countermeasures and more’, by Mike Adams and ‘The Al-Qaida Papers - Drones’, Associated Press, Feb 2013. To keep this document widely available it can be downloaded in .pdf or .doc format. Send a new translation to us and receive a free printed Drone Survival Guide. All translations will be shared here. The Drone Survival Guide is collected and translated as a form of civil initiative, not for profit and without government or commercial funding and/or support. Want to know more? Read the FAQ A REFLECTIVE FORM One of the techniques for misleading a drone's camera is putting reflective material on the rooftops of houses or cars (glass, mirror) to try to reflect sunlight into the drone's camera, making this poster a useful tool to interfere with the drone's sensors. On a more associative level the mirrored material reminds us that drone surveillance is ultimately people watching people. In a way we are looking at ourselves through sophisticated mirrors. DISCLAIMER This document is for information purposes only, with the intent of free distribution of publicly available information. We do not condone violent or destructive behavior against people or property in any way or form. All content may be freely shared, adapted, and translation for non-commercial purposes. DRONE SURVIVAL GUIDE FREQUENTLY ASKED QUESTIONS Are drones dangerous? Drone is a popularized name for Unmanned Aerial Vehicles (UAV) which is used to designate anything from a remote controlled toy quadcopter, to a CIA predator, to small unmanned planes used to monitor illegal fishing. Technologies are used for better or worse, and the same goes for drones. Drones are never dangerous as a phenomenon, but they can be used with harmful intent. We should be aware of how governments and other parties use them and if legislation and monitoring is properly installed. By promoting awareness I hope we can engage in a public discussion about for what purpose, and in what circumstances we should allow the use of drones. Will the Drone Survival Guide (DSG) protect me from drones? Of course not. The DSG is an art project to inform citizens worldwide about the dangers and capabilities of drones used by governments worldwide. It has some tips how to hide from the drone's sensors and how they work, but it is very naieve to think you will be safe if you follow these instructions if you were targeted by a drone with harmful intent. Even a small drone used as a toy can fall out of the sky and hurt you, so keep looking up! Are you promoting actions of violence against drones? Explicitly not. The DSG is intented for the purpose of sharing public information, and call for peaceful activism in creating awareness to limit the use of drones against people. This project is pacifist in nature and I am absolutely against all forms of violence against people or property. Are you helping / aiding enemies of NATO with this guide? Of course not. The drone countermeasures in the guide have been publicly available for years, in various newssources and blogs. They are not very sophisticated and most of them you could figure out yourself. They won't be of much help in an actual battle scenario. Note that 87 nations in the world have drones, so countermeasures apply to all sides. Please be aware that all of the countermeasures are about misleading the drone's sensors and I am against any violence against people or property. What is that Arabic looking text on your guide? It is not Arabic but Pashto, a language spoken in Pakistan and Afghanistan. Not coincidentally the area where most drones are deployed worldwide, and many civilians lose their life because of them. Making the DSG bilingual is a statement that we should remember to address not just an English speaking audience when we talk about peaceful activism. A goal for me would be to use the posters in the Pashto speaking area for educational and peaceful activist purposes, together with a local, nonpolitical organisation. Why are all these translations on the site? Readers / visitors of the site sent me their translations because I put out an open call. I check the basics, but I am not able to check all the languages so I cannot promise the quality or the content of the translations is up to any standard. All translations are made available freely to use, and I think it is a great thing so many people are helping me. When your translation chosen for the site, you will receive a free poster. How do I order? You can use the Paypal link on the site. Price of one poster is 10 euro including shipping worldwide. Somehow the link takes you to a Dutch language environment and I don't know how to fix this. Try Google translate or changing the language within the paypal site. If you want more posters simply order several times or e-mail me for an international money transfer. Who are you? I am a self-employed artist/graphic designer from the Netherlands with an interest in coming up with projects that promote public discussion on issues that I think need to be discussed. Who paid you? Are you affiliated with a political organisation? This project I did as a civilian and I paid for the production myself. I did not receive any funding or subisidiary for making it and I am not affiliated with any political organisation. I am a self-employed artist/designer. Where's my poster? I ordered it a week ago! There was a lot of attention and many orders came in. I will try to take care of them as quick and accurate as possible, but it might take a bit longer than usual. Everyone that placed an order will receive their guide. Navy’s 757-Sized Drone Will Provide Big-Time Surveillance By Allen McDuffee 01.07.14 Northrop Grumman’s MQ-4C Triton unmanned aircraft system. Photo: Alan Radecki/Northrop Grumman A new drone with the mammoth wingspan of a Boeing 757 is set to give the U.S. Navy some serious surveillance power. Northrop Grumman and the Navy say they’ve just completed the ninth flight trial of the Triton unmanned aircraft system (UAS), an improvement upon its predecessor in the Air Force, the Global Hawk. With its 130-foot wingspan, Triton will provide high-altitude, real-time intelligence, surveillance and reconnaissance (ISR) from a sensor suite that supplies a 360-degree view at a radius of over 2,000 nautical miles, allowing monitoring from higher and farther away than any of its competitors. But should a closer look be necessary, unique de-icing and lightning protection capabilities allow Triton to plunge through the clouds to get a closer view and automatically classify ships. And in recent tests, the drone was able to easily recover from perturbations in its flight path caused by turbulence. Although Triton has a higher degree of autonomy than the most autonomous drones, operators on the ground will be able to obtain high-resolution imagery, use radar for target detection and provide information-sharing capabilities to other military units. Thus far, Triton has completed flights up to 9.4 hours at altitudes of 50,000 feet at the company’s manufacturing facility in Palmdale, California. According to Northrop Grumman, Triton could support missions up to 24 hours. Northrop Grumman reported earlier that Triton had demonstrated structural strength of the drone’s wing — a key capability that will allow the aircraft to descend from high altitudes to make positive identification of targets during surveillance missions — even when it was subjected to a load at 22 percent above the Navy’s requirement. “During surveillance missions using Triton, Navy operators may spot a target of interest and order the aircraft to a lower altitude to make positive identification,” said Mike Mackey, Northrop Gumman’s Triton UAS program director, in a statement. “The wing’s strength allows the aircraft to safely descend, sometimes through weather patterns, to complete this maneuver.” Under an initial contract of $1.16 billion in 2008, the Navy has ordered 68 of the MQ-4C Triton drones with expected delivery in 2017 — a slip from the initial anticipated date of December 2015. I worked on the US drone program. The public should know what really goes on Few of the politicians who so brazenly proclaim the benefits of drones have a real clue how it actually works (and doesn't) Heather Linebaugh theguardian.com, Sunday 29 December 2013 Whenever I read comments by politicians defending the Unmanned Aerial Vehicle Predator and Reaper program – aka drones – I wish I could ask them a few questions. I'd start with: "How many women and children have you seen incinerated by a Hellfire missile?" And: "How many men have you seen crawl across a field, trying to make it to the nearest compound for help while bleeding out from severed legs?" Or even more pointedly: "How many soldiers have you seen die on the side of a road in Afghanistan because our ever-so-accurate UAVs [unmanned aerial vehicles] were unable to detect an IED [improvised explosive device] that awaited their convoy?" Few of these politicians who so brazenly proclaim the benefits of drones have a real clue of what actually goes on. I, on the other hand, have seen these awful sights first hand. I knew the names of some of the young soldiers I saw bleed to death on the side of a road. I watched dozens of military-aged males die in Afghanistan, in empty fields, along riversides, and some right outside the compound where their family was waiting for them to return home from the mosque. The US and British militaries insist that this is an expert program, but it's curious that they feel the need to deliver faulty information, few or no statistics about civilian deaths and twisted technology reports on the capabilities of our UAVs. These specific incidents are not isolated, and the civilian casualty rate has not changed, despite what our defense representatives might like to tell us. What the public needs to understand is that the video provided by a drone is not usually clear enough to detect someone carrying a weapon, even on a crystal-clear day with limited cloud and perfect light. This makes it incredibly difficult for the best analysts to identify if someone has weapons for sure. One example comes to mind: "The feed is so pixelated, what if it's a shovel, and not a weapon?" I felt this confusion constantly, as did my fellow UAV analysts. We always wonder if we killed the right people, if we endangered the wrong people, if we destroyed an innocent civilian's life all because of a bad image or angle. It's also important for the public to grasp that there are human beings operating and analysing intelligence these UAVs. I know because I was one of them, and nothing can prepare you for an almost daily routine of flying combat aerial surveillance missions over a war zone. UAV proponents claim that troops who do this kind of work are not affected by observing this combat because they are never directly in danger physically. But here's the thing: I may not have been on the ground in Afghanistan, but I watched parts of the conflict in great detail on a screen for days on end. I know the feeling you experience when you see someone die. Horrifying barely covers it. And when you are exposed to it over and over again it becomes like a small video, embedded in your head, forever on repeat, causing psychological pain and suffering that many people will hopefully never experience. UAV troops are victim to not only the haunting memories of this work that they carry with them, but also the guilt of always being a little unsure of how accurate their confirmations of weapons or identification of hostile individuals were. Of course, we are trained to not experience these feelings, and we fight it, and become bitter. Some troops seek help in mental health clinics provided by the military, but we are limited on who we can talk to and where, because of the secrecy of our missions. I find it interesting that the suicide statistics in this career field aren't reported, nor are the data on how many troops working in UAV positions are heavily medicated for depression, sleep disorders and anxiety. Recently, the Guardian ran a commentary by Britain's secretary of state for defence, Philip Hammond. I wish I could talk to him about the two friends and colleagues I lost, within a year of leaving the military, to suicide. I am sure he has not been notified of that little bit of the secret UAV program, or he would surely take a closer look at the full scope of the program before defending it again. The UAVs in the Middle East are used as a weapon, not as protection, and as long as our public remains ignorant to this, this serious threat to the sanctity of human life – at home and abroad – will continue. Editor's note: Heather Linebaugh does not possess any classified material and has honored her nondisclosure agreement since the time of her discharge Exclusive: Leaked Photos of Chemtrail Dispersal System The mere existence of such a contraption does nothing to prove such is being used for nefarious reasons at all. If some one, any one company had come to me in 1979 and asked me to design such a transportable system I could have done so at the time with sufficient funds, that is the kind of things Pen & Quill, Inc. were prepared to do and capable of producing. What is, or may be dispensed using such equipment is obvious, from pesticides to fertilizer; from insect deterrent (mosquitos, blowflies); to any sort of useful, though maybe environmentally questionable, product. The mere existence proves nothing but that the equipment exists for any number of obvious reasons. Now should they find a product being delivered in substantial quantities that could harm, alter one’s mind or brain function, cripple or kill leaving no known trace evidence of wrong-doing, that would be news. The claim that someone, some asshole may have called it a nigger-killer being sent to Africa simply tells us there remains a shitload of shitheads in the white world (Jews and Hispanics as well as others often partake of such a dysphemism as well of course) working in plants throughout the world! (We didn’t all know that already?) That racism is on the rise, not generally dissipated by any stretch of the imagination? If one could find such less than extraordinary manufactured equipment “in use” proving (the chemical compound revealed that is) its nefarious intent, then that would be both news and an exclusive topic for spreading; until such time the equipment is found dispensing something toxic or dangerous to humans it means nothing, other than the fear-inducement herein reported by the original source, silly sensationalism that it is, it is more of the same ranting of demented frightened children, big children true enough, but child-like in every respect. This bogey don’t hunt! Hulet, Out! by Grimnir Freeman • November 27, 2013 • 86 Comments These are photos and descriptions provided to me by a confidential informant of what appears to be a chemtrail dispersal system. You be the judge, but it seems very likely that chemtrails are exactly what this system is for. Pump Inlet and Outlet - This picture is of the diesel motor that powers the system. The pump itself is the big disc shaped thing to the left of the big cylinder sticking up with a hose coming out of it. Ducts - These are the ducts the fluid travels to and from the pump in. Tanks - Approximately 4 1/2 feet high and 5 1/2 feet long each. They are installed on a cargo handling system in the main cabin, close to the over-wing exits. One tank is emptied through the widow plug on one side of the plane. Then the unit is switched over to the other tank, which sprays out of the other side of the plane. Sprayer screws on end - This is the part that actually sticks out of the window plug. The window plug is on the end that sticks out to show how it goes. Just behind the pipe beside the white bottle is the sprayer that screws on the end after the system is installed in the aircraft. New window plug - The existing window plug is taken out and this one is put in. The rubber somewhat seals around the pipe, but not well enough to pressurize the aircraft. It would be unable to fly above 10,000 feet unless everyone inside wore oxygen masks. Sprayer Exhaust Closeup - This is the left side of the aircraft. There is a sprayer coming out of one window plug, and an exhaust duct coming out of the other for the engine. Sprayer Closeup - This is the right side of the aircraft with the sprayer installed. Sprayer and Exhaust Installed - View from in front of the left wing. This system explains so much. For years working in the industry I was always on the lookout for anything indicative of a sprayer system. I had a little doubt about the chemtrail story because I never saw evidence of a sprayer system in all the years I worked on airplanes. It didn't dawn on me it would be removable. This system is made so that it can be installed quickly, used, and then removed as desired. When not installed, the aircraft can be used as a normal 737 cargo plane. The system can also be moved from one aircraft to another. Main cabin windows are held in by just a few screws. If I remember correctly, it is eight screws per window. Then put the other window plugs in. I have been told there is also accommodation for releasing a fluid tank from the drain for the deactivated aft lav. This is a 737 cargo plane that has been converted from a passenger plane. They are very common. The workers at the facility saw this thing on a test run in front of the hangar. Water was used in the test. It came out of the sprayers in a fine mist. If sprayed from several thousand feet, people on the ground would never know they had been sprayed. My friend said they were testing to see the spray pattern and next they were going to move the spray nozzles to the back windows and test again. Officially it is said to be a sprayer for oil dispersant. That was the second explanation. The first was that it was a big crop duster. The company realized the workers weren't buying that, and laughing about it. They knew enough about aircraft to know that was impossible. So they changed the story. The supervisors in the plant call it a nigger-killer. (assholes!) The aircraft is going to be sent to Africa when it leaves this facility. When this facility was leased by another company, I worked there for 15 years. There was another aircraft that came through there years ago that requested BLOOD RESISTANT CARPET!!! The scary thing is, there was carpet like that available. Now you tell me why they would know they would need blood resistant carpet ahead of time??? Anyway, I just thought it was noteworthy that this plane was also bound for Africa. Here is a link to a discussion on other aerial spraying systems: Aerial Spraying Sovereign Citizens Sovereign Citizens A Growing Domestic Threat to Law Enforcement By the FBI’s Counterterrorism Analysis Section Sovereign Citizens A Growing Domestic Threat to Law Enforcement By the FBI’s Counterterrorism Analysis Section © Thinkstock.com They could be dismissed as a nuisance, a loose network of individuals living in the United States who call themselves “sovereign citizens” and believe that federal, state, and local governments operate illegally. Some of their actions, although quirky, are not crimes. The offenses they do commit seem minor, like creating false license plates, driver’s licenses, and even currency. However, a closer look at sovereign citizens’ more severe crimes, from financial scams to impersonating or threatening law enforcement officials, gives reason for concern. If someone challenges (e.g., a standard traffic stop for false license plates) their ideology, the behavior of these sovereign-citizen extremists quickly can escalate to violence. Since 2000, lone-offender sovereigncitizen extremists have killed six law enforcement officers. In 2010, two Arkansas police officers stopped sovereign-citizen extremists Jerry Kane and his 16-year-old son Joseph during a routine traffic stop on Interstate 40. Joseph Kane jumped out of the vehicle and opened fire with an AK-47 assault rifle, killing both officers. The sovereign-citizen threat likely will grow as the nationwide movement is fueled by the Internet, the economic downturn, and seminars held across the country that spread their ideology and show people how they can tap into funds and eliminate debt through fraudulent methods. As sovereign citizens’ numbers grow, so do the chances of contact with law enforcement and, thus, the risks that incidents will end in violence. Law enforcement and judicial officials must understand the sovereign-citizen movement, be able to identify indicators, and know how to protect themselves from the group’s threatening tactics. Ideology and Motivation The FBI considers sovereign-citizen extremists as comprising a domestic terrorist movement, which, scattered across the United States, has existed for decades, with well-known members, such as The FBI considers Terry Nichols, who helped plan the Oklahoma City, Oklahoma, sovereign-citizen bombing. Sovereign citizens do not represent an anarchist group, extremists as nor are they a militia, although they sometimes use or buy illegal comprising a domestic weapons. Rather, they operate as individuals without established terrorist movement… leadership and only come together in loosely affiliated groups to train, help each other with paperwork, or socialize and talk about their ideology. They may refer to themselves as “constitutionalists” or “freemen,” which is not necessarily a connection to a specific group, but, rather, an indication that they are free from government control. They follow their own set of laws. While the philosophies and conspiracy theories can vary from person to person, their core beliefs are the same: The government operates outside of its jurisdiction. Because of this belief, they do not recognize federal, state, or local laws, policies, or regulations.1 One prevalent sovereign-citizen theory is the Redemption Theory, which claims the U.S. government went bankrupt when it abandoned the gold standard basis for currency in 1933 and began using citizens as collateral in trade agreements with foreign governments.2 These beliefs can provide a gateway to illegal activity because such individuals believe the U.S. government does not act in the best interests of the American people. By announcing themselves as sovereign citizens, they are emancipated from the responsibilities of being a U.S. citizen, including paying taxes, possessing a state driver’s license, or obeying the law. Illegal Activity The Redemption Theory belief leads to their most prevalent method to defraud banks, credit institutions, and the U.S. government: the Redemption Scheme. Sovereign citizens believe that when the U.S. government removed itself from the gold standard, it rendered U.S. currency as a valueless credit note, exchanging one credit document (such as a dollar bill) for another. They assert that the U.S. government now uses citizens as collateral, issuing social security numbers and birth certificates to register people in trade agreements with other countries. Each citizen has a monetary net worth, which they believe is kept in a U.S. Treasury Direct account, valued from $630,000 to more than $3 million. These accounts, they claim, are in a third-party’s name, a “strawman,” that they can access, which they commonly refer to as “freeing money from the strawman.” In essence, it is extorting money from the U.S. Alfred P. Murrah Federal Building, Treasury Department. Sovereign citizens file legitimate IRS Oklahoma City. and Uniform Commercial Code forms for illegitimate purposes, believing that doing so correctly will compel the U.S. Treasury to fulfill its debts, such as credit card debts, taxes, and mortgages.3 At a minimum, these activities create a voluminous influx of documents that clog the courts and other government agencies. But, the idea behind the Redemption Theory also leads sovereign citizens to find criminal sources of income as they travel the country, teach fraudulent tactics to others for a fee, and participate in white collar crimes. The latter offenses include mail, bank, mortgage, and wire fraud; money laundering; tax violations; and illegal firearms sales and purchases. At seminars, sovereign citizens charge participants a fee in exchange for information on Redemption Theory schemes and other methods to avoid paying taxes, sometimes even selling materials, such as CDs or DVDs. They also sell fraudulent documents—including drivers’ licenses, passports, diplomat identification, vehicle registrations, concealed firearms permits, law enforcement credentials, and insurance forms—to other sovereign citizens and illegal immigrants and charge fees for “consultant services” to prepare sovereign-citizen paperwork. Several recent incidents highlight their activities. In Sacramento, California, two sovereign-citizen extremists were convicted of running a fraudulent insurance scheme, operating a company completely outside of state insurance regulatory authorities. The men sold “lifetime memberships” to customers and promised to pay any accident claims against members. The company collected millions of dollars, but paid only small auto insurance claims and ignored large ones.4 In Kansas City, Missouri, three sovereign-citizen extremists were convicted in a phony diplomatic credential scandal. They charged customers between $450 and $2,000 for a diplomatic identification card that bestowed “sovereign status,” supposedly to enjoy diplomatic immunity from paying taxes and from stops and arrests by law enforcement.5 In Las Vegas, Nevada, four men affiliated with the sovereign-citizen-extremist movement were arrested by the Nevada Joint Terrorism Task Force on federal money laundering, tax evasion, and weapons charges. The undercover investigation revealed that two of the suspects allegedly laundered more than a million dollars and collected fees for their services.6 One example of a white collar crime that escalated into a standoff includes a New Hampshire husband and wife convicted of federal income tax evasion, failure to honor federal payroll taxes, and other conspiracy fraud charges. Elaine A. and Edward L. Brown, both sovereign-citizen extremists in their 60s, never appeared at their 2007 trial or at sentencing. In protest, the Browns barricaded themselves in their home during the summer and fall of 2007, receiving supporters, issuing militant and threatening statements, and stockpiling weapons and explosives. They were charged with weapons offenses after their arrest in October 2007 when law enforcement discovered pipe bombs, improvised explosive devices made of gun powder cans with nails and screws taped to the outside, and a large cache of handguns and rifles that included .50-caliber rifles.7 However, even when sovereign citizens go to prison for crimes, they continue criminal activity behind bars. Inmates provide a new population for them to sway to adopt the sovereign-citizen ideology; they then can train these inmates to help them defraud banks, credit institutions, and the U.S. government. They can create fraudulent businesses from inside prison walls and complete fraudulent financial documents to receive lines of credit from legitimate banks. The learning system goes both ways—inmates can teach sovereign citizens new criminal methods that they can use either from inside the prison or when they are released. Indicators It is important Sovereign citizens often produce documents that contain peculiar or out-of-place language. In some cases, they speak their own language or will write only in certain colors, such as in red crayon. Several indicators can help identify these individuals. to realize sovereign citizens’ tactics to harass and intimidate law enforcement, court, and government officials, as well as financial institution employees. References to the Bible, The Constitution of the United States, U.S. Supreme Court decisions, or treaties with foreign governments8 Personal names spelled in all capital letters or interspersed with colons (e.g., JOHN SMITH or Smith: John) Signatures followed by the words “under duress,” “Sovereign Living Soul” (SLS), or a copyright symbol (©) Personal seals, stamps, or thumb prints in red ink The words “accepted for value”9 They also carry fraudulent drivers’ licenses to indicate their view that law enforcement does not have the authority to stop their vehicle or may write “No Liability Accepted” above their signature on a driver’s license to signify that they do not accept it as a legitimate identification document. Intimidation, Obstruction, and Protection It is important to realize sovereign citizens’ tactics to harass and intimidate law enforcement, court, and government officials, as well as financial institution employees. Methods can range from refusing to cooperate with requests, demanding an oath of office or proof of jurisdiction, filming interactions with law enforcement that they later post on the Internet, and filing frivolous lawsuits or liens against real property. They convene their own special courts that issue fake but realisticlooking indictments, warrants, and other documents. They also can use real government documents, including suspicious activity reports, in an attempt to damage the credit or financial history of specific individuals. While these efforts may seem obviously fraudulent, it is important to address these actions, which can have devastating outcomes for the individuals they target. The sovereign citizens’ efforts also can be a gateway for them to harass, terrorize, and target others in hopes of changing behaviors that they perceive as threatening. The Court Security Improvement Act of 2007 is one protection for officials who the sovereign citizens could target. The provisions under Title 18 created a new criminal offense for false liens against the real or personal property of officers or federal government employees, including judges and prosecutors. It also created as a new crime the disclosure of personal, identifying information to intimidate or incite violence against these individuals.10 Conclusion Although the sovereign-citizen movement does not always rise to violence, Although the sovereign-citizen movement does not always rise to violence, its members’ illegal activities and past violent—including fatal—incidents against law enforcement make it a group that should be approached with knowledge and caution. It is important that law enforcement be aware of sovereign citizens’ tactics so agencies can warn the public of potential scams, spot illegal activity and understand its potential severity, and be prepared for and protect against violent behavior or backlash through intimidation and harassment. its members’… activities…make it a group that should be approached with knowledge and caution. Endnotes 1 U.S. Department of Justice, Federal Bureau of Investigation, Domestic Terrorism Operations Unit and Domestic Terrorism Analysis Unit, Sovereign Citizen Danger to Law Enforcement (Washington, DC, 2010). 2 U.S. Department of Justice, Federal Bureau of Investigation, Domestic Terrorism Operations Unit II, Sovereign Citizens: An Introduction for Law Enforcement (Washington, DC, 2010). 3 U.S. Department of Justice, Federal Bureau of Investigation, Domestic Terrorism Analysis Unit, Sovereign Citizen Extremist Movement (Washington, DC, 2011). U.S. Attorney’s Office, Eastern District of California, “Two ‘Sovereign Citizens’ Sentenced in Illegal Insurance Scam,” press release, 2/24/2010; http://sacramento.fbi.gov/dojpressrel/pressrel10/sc022410.htm (accessed June 14, 2011). 4 U.S. Attorney’s Office, Western District of Missouri, “Three Men Sentenced for Conspiracy to Use Fake Diplomatic Identification,” press release, 2/8/2010; http://kansascity.fbi.gov/dojpressrel/pressrel10/kc020810.htm (accessed June 14, 2011). 5 U.S. Department of Justice, U.S. Attorney, District of Nevada, “Members of Anti-Government Movement Arrested on Federal Money Laundering, Tax Evasion and Weapons Charges,” press release, 3/6/2009; http://www.justice.gov/usao/nv/press/march2009/davis030609.htm (accessed June 14, 2011). 6 U.S. Department of Justice and U.S. Attorney’s Office-District of New Hampshire, press releases, 1/18/2007 and 7/9/2009, “Jury Convicts Lebanon Dentist and Husband in Tax Case,” and “Edward and Elaine Brown Convicted”; http://www.justice.gov/tax/usaopress/2007/txdv07WEM_Browns.pdf and http://www.atf.gov/press/releases/2009/07/070909-bos-edward-and-elaine-brownconvicted.html (accessed June 14, 2011). 7 8 The authors wish to stress that the majority of individuals who carry or refer to these resources are law-abiding citizens. However, in some instances, possession of these items may serve as one indicator of a sovereign-citizen extremist. 9 Sovereign Citizens: An Introduction for Law Enforcement. 10 Court Security Improvement Act of 2007; http://www.gpo.gov/fdsys/pkg/PLAW110publ177/pdf/PLAW-110publ177.pdf (accessed June 14, 2011). Mr. Hunter is an intelligence analyst in the FBI’s Counterterrorism Analysis Section. Dr. Heinke is the counterterrorism coordinator for the State Ministry of the Interior in Bremen, Germany. FBI Drops Law Enforcement as 'Primary' Mission JOHN HUDSON JANUARY 5, 2014 The FBI's creeping advance into the world of counterterrorism is nothing new. But quietly and without notice, the agency has finally decided to make it official in one of its organizational fact sheets. Instead of declaring "law enforcement" as its "primary function," as it has for years, the FBI fact sheet now lists "national security" as its chief mission. The changes largely reflect the FBI reforms put in place after September 11, 2001, which some have criticized for de-prioritizing law enforcement activities. Regardless, with the 9/11 attacks more than a decade in the past, the timing of the edits is baffling some FBI-watchers. "What happened in the last year that changed?" asked Kel McClanahan, a Washington-based national security lawyer. McClanahan noticed the change last month while reviewing a Freedom of Information Act (FOIA) request from the agency. The FBI fact sheet accompanies every FOIA response and highlights a variety of facts about the agency. After noticing the change, McClanahan reviewed his records and saw that the revised fact sheets began going out this summer. "I think they're trying to rebrand," he said. "So many good things happen to your agency when you tie it to national security." Although a spokesman with the agency declined to weigh in on the timing of the change, he said the agency is just keeping up with the times. "When our mission changed after 9/11, our fact sheet changed to reflect that," FBI spokesman Paul Bresson told Foreign Policy. He noted that the FBI's website has long-emphasized the agency's national security focus. "We rank our top 10 priorities and CT [counterterrorism] is first, counterintel is second, cyber is third," he said. "So it is certainly accurate to say our primary function is national security." On numerous occasions, former FBI Director Robert Mueller also emphasized the FBI's national security focus in speeches and statements. FBI historian and Marquette University professor Athan Theoharis agreed that the changes reflect what's really happening at the agency, but said the timing isn't clear. "I can't explain why FBI officials decided to change the fact sheet... unless in the current political climate that change benefits the FBI politically and undercuts criticisms," he said. He mentioned the negative attention surrounding the FBI's failure in April to foil the bomb plot at the Boston Marathon by Dzhokhar and Tamerlan Tsarnaev. Whatever the reason, the agency's increased focus on national security over the last decade has not occurred without consequence. Between 2001 and 2009, the FBI doubled the amount of agents dedicated to counterterrorism, according to a 2010 Inspector's General report. That period coincided with a steady decline in the overall number of criminal cases investigated nationally and a steep decline in the number of white-collar crime investigations. "Violent crime, property crime and white-collar crime: All those things had reductions in the number of people available to investigate them," former FBI agent Brad Garrett told Foreign Policy. "Are there cases they missed? Probably." Last month, Robert Holley, the special agent in charge in Chicago, said the agency's focus on terrorism and other crimes continued to affect the level of resources available to combat the violent crime plaguing the city. "If I put more resources on violent crime, I'd have to take away from other things," he told The Chicago Tribune. According to a 2007 Seattle Post-Intelligencer investigation, the Justice Department did not replace 2,400 agents assigned to focus on counterterrorism in the years following 9/11. The reductions in white-collar crime investigations became obvious. Back in 2000, the FBI sent prosecutors 10,000 cases. That fell to a paltry 3,500 cases by 2005. "Had the FBI continued investigating financial crimes at the same rate as it had before the terror attacks, about 2,000 more white-collar criminals would be behind bars," the report concluded. As a result, the agency fielded criticism for failing to crack down on financial crimes ahead of the Great Recession and losing sight of real-estate fraud ahead of the 2008 subprime mortgage crisis. In many ways, the agency had no choice but to de-emphasize white-collar crime. Following the 9/11 attacks, the FBI picked up scores of new responsibilities related to terrorism and counterintelligence while maintaining a finite amount of resources. What's not in question is that government agencies tend to benefit in numerous ways when considered critical to national security as opposed to law enforcement. "If you tie yourself to national security, you get funding and you get exemptions on disclosure cases," said McClanahan. "You get all the wonderful arguments about how if you don't get your way, buildings will blow up and the country will be less safe." - See more at: http://thecable.foreignpolicy.com/posts/2014/01/02/us_customs_not_sorry_for_destroying_11_rare_ flutes_of_renowned_musician#sthash.oUfy2XXS.dpuf Police becoming more militarized as wars wind down Story by Jana Eschbach / CBS 12 FORT PIERCE, Fla. - Of the 60,000 cities in this country one of the top ranked for gun violence is on the Treasure Coast. New Orleans, Detroit, Baltimore and Miami are among the top. Coming in at number 56 is the relatively small city of Fort Pierce where there were 150 shootings this past year. Now their police officers say they are using military type tactical equipment to fight crime. The new MRAP looks like a tank on wheels. "Mine response ambush protection." said Officer Keith Holmes , who applied to acquire the MRAP from the US Military for the Fort Pierce Police Department, "The military was pretty much handing them out to the different cities and I put in the application for it, and we got pushed through due to the violence in the city we have here." Used last in Afghanistan, "They brought this back from Afghanistan and now its in Fort Pierce.. for officer rescues, search warrants, things like that that an officer would need protection." Holmes said. "If we need it, we have it," said Police Chief Sean Baldwin, "we've had around 150 shootings this year." Chief Baldwin said the gun violence was not the direct reason for getting the MRAP. But, the city ranked as number 56 in the nation for the most gun violence, according to statistics compiled by the Centers for Disease Control. "It's for a the potential of a terrorist attack or even something more locally.. A shooting incident when we have hostages, or an officer down that needs to be rescued, that's what this is for." Chief Baldwin said. Still many libertarians argue the police departments these days are becoming too militarized. "I agree to a certain extent its overkill but for the cost, for $2000, yes its what we need." said Officer Holmes. Purchased through a program from the U-s Military for $2,000, an armored swat vehicle could cost in the $150,000 range. "You know, it is overkill, until we need it. And you know we don't get to forecast that. We don't know what dangers we are going to face." Chief Baldwin said. The military is unloading hundreds of these types of vehicles post Operation Enduring Freedom. More and more police agencies are signing up to use retired military equipment. To see the list of most dangerous cities for gun violence the list is at: Tone Deaf NSA Officials Tell Reporter It's Time to Reform the First Amendment Daniel Drezner has a fairly incredible short blog post over at Foreign Policy magazine about his experience visiting the NSA as the organization is seeking to ramp up its PR campaign about how it's not actually evil. We've already covered the 60 Minutes debacle, but in many ways this piece is just as enlightening, as he notes just how incredibly tone deaf NSA officials appear to be -- unable to understand why people are upset about what they're doing. The NSA's biggest strategic communications problem, however, is that they've been so walled off from the American body politic that they have no idea when they're saying things that sound tonedeaf. Like expats returning from a long overseas tour, NSA staffers don't quite comprehend how much perceptions of the agency have changed. The NSA stresses in its mission statement and corporate culture that it "protects privacy rights." Indeed, there were faded banners proclaiming that goal in our briefing room. Of course, NSAers see this as protecting Americans from foreign cyber-intrusions. In a post-Snowden era, however, it's impossible to read that statement without suppressing a laugh. It might be an occupational hazard, but NSA officials continue to talk about the threat environment as if they've been frozen in amber since 2002. To them, the world looks increasingly unsafe. Syria is the next Pakistan, China is augmenting its capabilities to launch a financial war on the United States, and the next terrorist attack on American soil is right around the corner. They could very well be correct -- except that the American public has become inured to such warnings over the past decade, and their response has been to tell politicians to focus on things at home and leave the rest of the world alone. A strategy of "trust us, the world is an unsafe place" won't resonate now the way it did in the immediate wake of the Sept. 11 attacks. But, perhaps the most tone deaf of all, was the statement from one NSA official suggesting that it's time to reform the First Amendment, because he's not at all happy about how reporters have covered the NSA recently. As Drezner notes, he's not sure if it's a joke or not, but it really doesn't matter. That seems like something you should not joke about if you're an NSA person, given everything that's going on. The NSA's attitude toward the press is, well, disturbing. There were repeated complaints about the ways in which recent reportage of the NSA was warped or lacking context. To be fair, this kind of griping is a staple of officials across the entire federal government. Some of the NSA folks went further, however. One official accused some media outlets of "intentionally misleading the American people," which is a pretty serious accusation. This official also hoped that the Obama administration would crack down on these reporters, saying, "I have some reforms for the First Amendment." It seems that the public might have some reforms for the intelligence community as well. And those would actually be constitutional, unlike what that particular NSA officials had in mind for free speech and the press. There's even more in the Drezner piece that is well worth reading, including the how the NSA was unable to properly manage his own personal information which he had to send them in order to get his pass to come for a visit. Feds announce test sites for drone aircraft January 2, 2014 > By MICHELLE RINDELS Associated Press LAS VEGAS (AP) - Six states were named Monday by federal officials to develop test sites for drones - a critical next step for the burgeoning industry that could one day produce thousands of unmanned aircraft for use by businesses, farmers and researchers. Alaska, Nevada, New York, North Dakota, Texas and Virginia will host the research sites, providing diverse climates, geography and air traffic environments as the Federal Aviation Administration seeks to safely introduce commercial drones into U.S. airspace. Members of Congress and other politicians lobbied intensely to bring the work to their states. Representatives were jubilant about the likelihood that the testing will draw companies interested in cashing in on the fledgling industry. An industry-commissioned study has predicted more than 70,000 jobs would develop in the first three years after Congress loosens drone restrictions on U.S. skies. The same study projects an average salary range for a drone pilot between $85,000 and $115,000. "This is wonderful news for Nevada that creates a huge opportunity for our economy," said U.S. Sen. Harry Reid, D-Nevada. In New York, Sen. Charles Schumer, a Democrat, called the announcement a boon for his state. Drones have been mainly used by the military, but governments, businesses, farmers and others are making plans to join the market. Many universities are starting or expanding curriculum involving drones. The FAA does not currently allow commercial use of drones, but it is working to develop operational guidelines by the end of 2015, although officials concede the project may take longer than expected. The FAA projects some 7,500 commercial drones could be aloft within five years of getting widespread access to the skies above America. "Today was an important step," said attorney Ben Gielow of the Association for Unmanned Vehicle Systems International, noting the announcement came after months of delays and data gathering. "I think we're all anxious to get this moving." The competition for a test site was robust, with 25 entities in 24 states submitting proposals, FAA Administrator Michael Huerta said during a conference call with reporters. At least one of the six sites chosen by the FAA will be up and running within 180 days, while the others are expected to come online in quick succession, he said. However, the designation as a test site doesn't come with a financial award from the government. In choosing Alaska, the FAA cited a diverse set of test site locations in seven climatic zones. New York's site at Griffiss International Airport will look into integrating drones into the congested northeast airspace. And Nevada offered proximity to military aircraft from several bases, Huerta said. The extent that lobbying influenced the selection of the sites was unclear. "Politics likely always plays a role in some level in this, but I couldn't tell you specifically what the politics were," said Brendan M. Schulman, part of a New York City-based law group focused on drone issues. "Part of the selection ... is an evaluation of the dedication and seriousness the sites were showing in pursuing this." The testing will determine whether drones can detect and avoid aircraft and other obstacles, and if they can operate safety when contact is lost with operators. The growing use of drones has sparked criticism among conservatives and liberals who fear the creation of a surveillance state in which authorities track and scrutinize every move of citizens. "I just don't like the concept of drones flying over barbecues in New York to see whether you have a Big Gulp in your backyard or whether you are separating out your recyclables according to the city mandates," said Sen. Rand Paul, R-Ky., referring to a New York City ban on supersized soft drinks. Paul has introduced a bill that would prohibit drones from checking for criminal or regulatory violations without a warrant. Huerta said his agency is sensitive to privacy concerns involving drones. Test sites must have a written plan for data use and retention, and will be required to conduct an annual review of privacy practices that involves public comment. That policy provided little comfort for the American Civil Liberties Union. "Someday drones will be commonplace in U.S. skies and, before that happens, it's imperative that Congress enact strong, nationwide privacy rules," ACLU attorney Catherine Crump said in a statement. Associated Press writers Dave Kolpack in Fargo, N.D., and Chris Carola in Albany, N.Y., contributed to this report. Copyright 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. “Electronic Surveillance Of Private Citizens … Subversive Of Constitutional Government” Was One Of The Articles Of Impeachment Against President Richard Nixon Approved By A Bipartisan 28 To 10 Vote Of The House Judiciary Committee On July 27, 1974 Posted on January 8, 2014 by WashingtonsBlog Why Isn’t Obama Impeached for Mass Surveillance? One of the crimes against the Constitution for which the House Judiciary Committee voted to impeach Nixon was: The electronic surveillance of private citizens … subversive of constitutional government …. 2 former presidents, a vice president and a judge all warn that the NSA’s current mass surveillance is tyranny. Top American constitutional experts say that spying by the Obama administration is worse than the spying done by Nixon. Why isn’t Obama impeached for such tyranny? In fact, historians say that the NSA’s spying is worse than the Stasi East Germans. They also say that NSA spying is exactly the type of oppression that the Founding Fathers launched the Revolutionary War to stop. And see this. Where is America’s immune system? 01/07/2014 Graphs by MIT Students Show the Enormously Intrusive Nature of Metadata By Kade Crockford, Director, ACLU of Massachusetts Technology for Liberty Project at 11:47am You've probably heard politicians or pundits say that “metadata doesn't matter.” They argue that police and intelligence agencies shouldn't need probable cause warrants to collect information about our communications. Metadata isn’t all that revealing, they say, it’s just numbers. But the digital metadata trails you leave behind every day say more about you than you can imagine. Now, thanks to two MIT students, you don't have to imagine—at least with respect to your email. Deepak Jagdish and Daniel Smilkov's Immersion program maps your life, using your email account. After you give the researchers access to your email metadata—not the content, just the time and date stamps, and “To” and “Cc” fields—they’ll return to you a series of maps and graphs that will blow your mind. The program will remind you of former loves, illustrate the changing dynamics of your professional and personal networks over time, mark deaths and transitions in your life, and more. You’ll probably learn something new about yourself, if you study it closely enough. (The students say they delete your data on your command.) Whether or not you grant the program access to your data, watch the video embedded below to see Jagdish and Smilkov show illustrations from Immersion and talk about what they discerned about themselves from looking at their own metadata maps. While you’re watching, remember that while the NSA and FBI are collecting our phone records in bulk, and using advanced computer algorithms to make meaning from them, state and local government officials can often also get this information without a warrant. When President Obama said that the phone surveillance program “isn’t about” “listening to your telephone calls,” he was deflecting attention from the terrifying fact that there’s nothing currently stopping the government from amassing and data-mining every scrap of metadata in the world about us. He made it sound like metadata spying isn't a big deal, when it's pretty much the golden ticket. Metadata surveillance is extremely powerful, and we are all subject to it, constantly. If you want to see something resembling what the NSA sees when it looks at your data, give Jagdish and Smilkov’s program a try. Then tell the government: get a warrant. See also this post on Immersion by the ACLU's Matt Harwood. This is an edited version of a post first published on the ACLU of Massachusetts' Privacy SOS blog. Tuesday, January 7, 2014 The growing use of license plate readers and its threat to privacy Law enforcement agencies throughout the nation are increasingly adopting automated license plate recognition (ALPR) technologies, which function to automatically capture an image of the vehicle’s license plate, transform that image into alphanumeric characters, compare the plate number acquired to one or more databases of vehicles of interest, and alert the officer when a vehicle of interest has been observed, all within a matter of seconds.(spying on citizens & tracking our every movement) For more about how license plate readers are spying on our every movement click here, here & here. This project was designed to assess ALPR implementation among law enforcement agencies in the United States, and to identify emerging implementation practices to provide operational and policy guidance to the field. A random sample of 444 local, state, and tribal law enforcement agencies was surveyed. A total of 305 agencies responded to the initial survey (68.7%). Three-quarters of respondents (235 agencies, 77.0%) indicated that they were not using ALPR, while 70 agencies (23.0%) responded that they were using ALPR. A longer, more detailed survey was sent to the 70 agencies who confirmed they were using ALPR, and 40 agencies (57.1%) responded. Survey respondents had typically implemented mobile ALPR systems (95%), and were primarily using ALPR for auto theft (69%), vehicle and traffic enforcement (28%), and investigations (25%). Agencies reported increases in stolen vehicle recoveries (68%), arrests (55%), and productivity (50%). Fewer than half (48%) had developed ALPR policies. Over half (53%) updated their ALPR hot lists wirelessly, and nearly half (43%) updated their hot lists once each day. A total of 40% of respondents retain ALPR data for six months or less (n=16). Five respondents (13%) indicated they retain ALPR data indefinitely, while two indicated that retention is based on the storage capacity of the equipment installed. Realizing the core business values that ALPR promises, however, can only be achieved through proper planning, implementation, training, deployment, use, and management of the technology and the information it provides. Like all tools and technologies available to law enforcement, ALPR must also be carefully managed. Policies must be developed and strictly enforced to ensure the quality of the data, the security of the system, compliance with applicable laws and regulations, and the privacy of information gathered. (It's all about the money, corporate funding & profitability are responsible for spying in the name of terrorism) Dianne Feinstein Admits That Her 'NSA Reform' Bill Is About Protecting Existing Surveillance Programs from the oops dept See, there's a problem when you lie: you always forget how to keep your story straight. You may remember, for example, that Senator Dianne Feinstein, at the end of October, released a bill that pretended to be about reforming the NSA and its surveillance programs. The bill was spun in a way that was designed to make people think it was creating real reforms, with a fact sheet claiming that it "prohibited" certain actions around bulk data collection, but which actually codified them in the law, by including massive loopholes. It was an incredibly cynical move by Feinstein and her staff, pretending that their bill to actually give the NSA even greater power and to legalize its abuses, was about scaling back the NSA. But that's the spin they put on it -- which almost no one bought. But, it seems that even Feinstein has forgotten that her bill is supposed to pretend that it's about reining in the NSA. On Tuesday, the Senate Intelligence Committee met with the White House's task force, to discuss its recommendations for surveillance reform (which don't go far enough, but go way beyond what Feinstein wants). In discussing what happened in the meeting, Feinstein basically lets slip that she disagrees with the reforms suggested, and that support for her bill means that others are against reform as well: Those recommendations were criticized by supporters of the NSA’s programs, including Intelligence Committee chair Dianne Feinstein, D-Calif., who has said that taking the information out of the government’s hands could put the country at risk. Feinstein has spoken out against proposed reforms that would require as much, and has sponsored her own committee bill that would preserve the agency’s methods. “Our bill passed by 11-4, so you know there’s substantial support for the programs,” she said. In other words, "my bill is for people who already support these programs." Exactly the opposite of what her marketing and public statements about the bill have been. Oops. Next time, she should try to not misrepresent her own bill, and maybe she can keep her story straight. Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic Latest batch of documents leaked shows NSA's power to pwn. by Sean Gallagher - Dec 31, 2013 A diagram of an NSA BIOS-based attack, brought to you by sneakernet. NSA leaks Worried about snooping, India won’t partner with Google for elections How should states fight the NSA? Turn off the water, say some Report: Obama set to approve “public advocate” position, more NSA reforms NSA dreams of quantum computer that can break encryption Snowden speaks from Moscow: “The mission’s already accomplished” The National Security Agency’s sophisticated hacking operations go way beyond using software vulnerabilities to gain access to targeted systems. The agency has a catalog of tools available that would make James Bond’s Q jealous, providing NSA analysts access to just about every potential source of data about a target. In some cases, the NSA has modified the firmware of computers and network hardware—including systems shipped by Cisco, Dell, Hewlett-Packard, Huawei, and Juniper Networks—to give its operators both eyes and ears inside the offices the agency has targeted. In others, the NSA has crafted custom BIOS exploits that can survive even the reinstallation of operating systems. And in still others, the NSA has built and deployed its own USB cables at target locations—complete with spy hardware and radio transceiver packed inside. Documents obtained by Der Spiegel reveal a fantastical collection of surveillance tools dating back to 2007 and 2008 that gave the NSA the power to collect all sorts of data over long periods of time without detection. The tools, ranging from back doors installed in computer network firmware and software to passively powered bugs installed within equipment, give the NSA a persistent ability to monitor some targets with little risk of detection. While the systems targeted by some of the “products” listed in the documents are over five years old and are likely to have been replaced in some cases, the methods and technologies used by all the exploit products could easily still be in use in some form in ongoing NSA surveillance operations. Special delivery There’s no indication from the documents that the manufacturers played any role in the development or delivery of the backdoors (something that manufacturers are now loudly telling their customers, too). The documents, which appear to be pages from a catalog of capabilities provided by the NSA's ANT division for the NSA’s Tailored Access Operations (TAO) division, show that many of the tools on offer are ordinary Windows exploits designed to use parts of the operating system to “phone home” to the NSA with data; like most malware, these packages can be dropped in place remotely and are probably the least interesting of the new revelations. Hardware- and firmware-based backdoors, by contrast, require laying hands on the actual target systems. In some cases, the NSA’s operators install backdoor hardware and firmware directly onto the systems by “interdiction”—the systems are diverted during shipping to “load stations” where the surveillance components are installed. (This interception may have been accomplished with the cooperation of shipping companies or other government agencies; details of the process remain murky.) In other cases, the NSA uses an insider with a USB device or remote access tools deployed by other means to gain access to computer systems, allowing the NSA to “reflash” their low-level BIOS firmware. Either way, the altering of systems’ firmware or hardware gives the NSA the ability to install backdoors that can survive a total operating system wipe and re-installation. One BIOS attack, called SWAP, was developed by the NSA to attack a number of types of computers and operating systems by loading surveillance and control software at boot-up. SWAP uses the Host Protected Area on a computer’s hard drive to store the payload and installs it before the operating system boots. More specialized BIOS attacks were developed to take advantage of motherboard-based System Management Mode (SMM) capabilities on Dell and Hewlett-Packard servers. Dell PowerEdge servers were targeted with an implant called DEITYBOUNCE, while HP Proliant 360DL G5 servers were targeted with one called IRONCHEF. Both allowed NSA operators to gain remote control of systems in SMM mode—giving the agency firmware-level control over infected servers and the ability to do things like run “rootkits” on the server operating system. The ANT "product" listing for IRONCHEF, the BIOS attack on HP servers, showing an example attack scenario where remote operators use a covert wireless network to take control of servers. Network hardware is also a target for the NSA’s BIOS attacks. For example, one collection of BIOS hacks called the “MONTANA” family (SCHOOLMONTANA, SIERRAMONTANA, and STUCCOMONTANA), was designed to target Juniper Networks routers using the JUNOS operating system—a FreeBSD derivative. Once installed, the hacked BIOS actually modifies the operating system kernel in memory when the router is booted, giving an NSA remote operations center full command and control over the router and allowing for selected network traffic to be sent back to the operations center over an external network connection. Even physically replacing the CompactFlash memory card the router boots from wouldn't get rid of this back door. Juniper routers weren’t the only targets of these sorts of BIOS “implants,” either—firewalls and routers from Cisco and Huawei were also on the 2007 menu for firmware and software exploits. Such router exploits didn’t even require interception of the hardware but could in many cases be remotely installed by way of another hack. For systems where a BIOS hack is impractical, the NSA has other tools to install a persistent backdoor. One, called GINSU, uses a PCI bus device installed on the computer. An implant called BULLDOZER creates a stealth wireless bridge, providing radio-based remote control of the backdoor to TAO operators. If the rootkit on the system (called KONGUR) is removed by a system re-installation, the GINSU backdoor can re-install the software on the next boot-up. Enlarge / GINSU allows the NSA to slice and dice computers' hard drives and control them remotely over a covert radio connection. Reach out and touch someone An implanted wireless device is the NSA’s go-to approach for dealing with “air-gapped” networks—networks that don’t have an Internet connection for security reasons. There are a number of other implanted devices that the NSA has in its TAO arsenal, including USB and Ethernet implants that can transmit short-range radio signals and more robust implanted hardware for longerrange transmissions. These radio links create a shadow Internet that allows the NSA to move data out of an adversary’s network and into its TURMOIL and X-KEYSCORE collection system. The COTTONMOUTH series of implants are USB devices that provide a covert wireless bridge into a target network. They can be integrated into any USB plug, so check your mouse. For networks that the NSA can't get to physically, there's NIGHTSTAND, a self-contained Wi-Fi hacking system that can break into networks up to eight miles away, in optimum conditions. NIGHTSTAND hijacks the target network and uses packet injection attacks to install exploits on the target network's computers. Combined with a Windows exploit called SOMBERKNAVE, which uses a computer's Wi-Fi adapter to "phone home" with data, it could be used to collect data from target computers even when they're not intentionally connected to a network. Enlarge / According to the ANT catalog, the NIGHTSTAND Wi-FI exploit system's attack is "undetectable by the user." But why stop at network data? The NSA also uses some fairly exotic tools to grab computer video, keyboard strokes, and even audio from inside more difficult-to-reach places by using passive electronic devices that are actually powered by radar. These devices, charged by a specially tuned continuous wave radio signal sent from a portable radar unit (operating at as little as 2W up to as much as 1kW of power in the 1-2GHz range), send back a data stream as a reflected signal, allowing the NSA’s operators to tune in and view what’s happening on a computer screen or even listen to what’s being said in the room as they paint the target with radio frequency energy—as well as giving a relative rough location of devices within a building for the purposes of tracking or targeting. Hacking smartphones The 2007 NSA wish book for analysts also includes a number of software tools that allow data to be stolen from a variety of smartphones and dumb cell phones. One software hack, called DROPOUTJEEP, is a software implant for Apple iOS devices that allows the NSA to remotely control and monitor nearly all the features of an iPhone, including geolocation, text messages, and the microphone and camera. (Researcher and developer Jake Appelbaum, who helped write the Spiegel article revealing the documents, said separately this week that the NSA claims DROPOUTJEEP installations are always successful.) Another package, called TOTEGHOSTLY, does the same for phones based on the Windows Mobile embedded operating system. Both the DROPOUTJEEP and TOTEGHOSTLY releases mentioned in the 2007 product listing required “close access methods” for installation—in other words, a human being getting up close and personal with the phone to install it. “A remote installation capacity will be pursued for a future release,” the document states. But another tool, called MONKEYCALENDAR, allowed the NSA to remotely install location-tracking software onto any GSM phone by way of a software implant for SIM cards. But these aren't the only way the NSA can get to cell phone data. Also in the bag of tricks are a number of wireless monitoring devices, as well as “networks in a box” and other gear that can pose as cell towers and networks—intercepting devices as they enter an area and grabbing up their voice, data, and SMS traffic. A "tripwire" program called CANDYGRAM can send out alerts whenever a cell phone hits a specified cell tower. Old tricks, new tricks It’s important to note that the exploits in the documents are largely over five years old, so they don’t necessarily give a complete picture of what the NSA is capable of today. That doesn’t mean that these techniques are no longer in circulation—given the stubbornness of Windows XP, many of the exploits developed for older Windows platforms may have years left in them, and some of the adversaries the NSA is trying to monitor don’t have Fortune 500 hardware refresh rates. A frequent defense of what the NSA does with its bag of tricks is that in many ways it is no different from what other countries (including China, Russia, and France) try to do to the United States and other countries via their intelligence organizations. These documents show the key way the NSA is different—its vast technical resources and ability to essentially put itself into the supply chain for technology flowing to the rest of the world. US officials have long suspected China of doing the same thing with hardware from companies such as Huawei and ZTE, but these documents essentially spell out that "interdiction" is part of the US intelligence strategy, too. The exposure of the techniques and capabilities of the NSA creates another problem for the agency, in that it provides those hard-to-get-at organizations the TAO was created to go after with an idea of how the NSA has targeted and will target them. It also creates a problem for companies like Cisco and Juniper, who now face the same sort of scrutiny the US and others put Huawei under for its connections to the Chinese military. Even if Dell, HP, Cisco, and Juniper had no hand in creating the backdoors for their products, the documents will undoubtedly be used against them the next time they try to sell hardware to a foreign government. ROBOTICS FUTURISTIC HUMAN LIKE ROBOTS UNVEILED AT THE DARPA ROBOTICS CHALLENGE JANUARY 9, 2014 1 COMMENT The DARPA Robotics Challenge (DRC) is a two-year Pentagon-funded competition which pushes the contestants to design the most humanistic robots possible. The aim of the challenge is to develop robots that will be able to perform human-like functions in environments and conditions that are not suitable or safe for human beings. The first physical trials were held on the 20th of December at Homestead-Miami Speedway in Florida. The trials consisted of a series of eight tasks which included an obstacle course and various other challenges. Here is a look at some of the contenders of the DRC. 1. THOR and THOR-OP These two bots belong to the same team with THOR being the taller and more capable of the pair. THOR (Tactical Hazardous Operations Robot) is the closest to simulating human stability and musculature. This stable movement is due to THOR’s series of elastic actuators which give it a bouncing gait. However, THOR was declared unready for the competition this year and so THOROP (Open Platform) was used in place of it’s big brother. With a smaller height and a more Asimolike movement, THOR-OP isn’t as able as THOR, but still competent enough to perform most of the tasks at the trials (such as opening doors, turning valves, etc.). THOR-OP will only be carrying the team for this year’s trials as THOR will be brought back into action in 2014. 2. CHIMP The team at Carnegie Mellon University (CMU) is familiar to DARPA’s challenges. They won the the 2007 Urban Challenge with an autonomous pickup truck. The team has developed a 400-pound humanoid that resembles an ape more than a human due to its disproportionately long arms (10 feet when opened completely). The robot has tank treads attached to each limb to help it cover longer distances, so it doesn’t have to worry about balancing itself. When standing, CHIMP has a total height of 5′ 2″. CHIMP also uses 3-D mapping instead of a live feed camera to provide the controllers with feedback. 3. Valkyrie This creation was submitted by NASA and developed by the Johnson Space Center. The robot stands 6′ 2″ tall and has a fabric enclosed frame. The defining feature of the Valkyrie, however, is not the external looks but the large variety of cameras placed all over the robots frame including head, torso, feet, knees and arms. Valkyrie had an edge at the trials this week due to JSC’s experience with robots such as Robonaut and Robonaut 2. 4. RoboSimian The second entry by NASA was created by Jet Propulsion’s Lab and looks the least like a humanoid. In fact, the RoboSimian doesn’t look like any biological creature. The creators say that the robot does have an ape-like profile but other than that, the lack of a head or face or any distinct standing position make the RoboSimian stand out from the other robots at the DRC. The robot’s four limbs have a large number of joints which give it an incredible amount of mobility, even allowing the limbs to fold into themselves. The body has cameras at different angles so that it can scuttle around without having to turn around. This incredible mobility is sure to give the RoboSimian an advantage in certain tasks at the trials. 5. Hubo Hubo is probably the lightest of the robots at the DRC. The robot has the size and strength of a 10year old boy and it’s weight of 130 pounds makes it easy for it to be carried by a human to the place where it is to be used. This gives Hubo a real world advantage. Besides this, the team that developed Hubo has a few replacements to take over in case one of the robots breaks down or malfunctions. The DRC-Hubo is a foot taller than its predecessor and 20 percent heavier, but it’s still lightweight and mobile enough to perform the tasks at the trials. The stalk-like head does look slightly scary but it gives Hubo an elevated view and greater visibility. 6. HRP-2-Based Robot This mysterious robot built by the Japan-based team, Schaft, Inc. doesn’t even have a name yet. This robot is the one to beat at the DRC as all other teams say that it will be able to complete the mobility-based tasks with relative ease. The water-cooled motors powered by fast discharge batteries give the robot great amounts of power on demand. The roboticists of the University of Tokyo have recorded their robots performance around the lab and it is quite impressive in terms of mobility. One point of interest which is irrelevant to the robot itself is the fact that Schaft, Inc. was acquired by Google this year, which only makes this team a greater competitor in the DRC. 7. Atlas All of the previous teams were Track A teams and built both the hardware and software for the DRC. The Track B participants which will develop only the software, were provided with their own robots – the Atlas robot by Boston Dynamics. The robot does have a reputation for tripping due to its lack of stability. The recent acquisition of Boston Dynamics by Google has just made the DRC slightly more interesting. The last time Google swooped in on a DARPA competition, the internet giant ended up creating its own driverless car. This time around Google’s participation could create the humanoids we’ve seen in movies for so many years or it could delay the process to next year’s rounds in December 2014. Intel announces Edison, a computer the size of an SD card By Sean Hollister on January 6, 2014 Don't miss stories Follow The Verge Intel built a processor for wearable computing, and now it has a tiny computer where that processor can live. At CES 2014, Intel CEO Brian Krzanich announced Edison, "a full Pentium-class PC" that's the size and shape of the SD card you might otherwise put in your camera. It's powered by a dual-core Quark SOC, runs Linux, and has built-in Wi-Fi and Bluetooth connectivity, according to the company. Intel even has a specific app store designed for Edison, and a special version of Wolfram that will come to the tiny computer. To demonstrate the potential for Edison, Intel showed a concept for a "Nursery 2.0." In the concept, a baby was wearing a Mimo onesie outfitted with sensors tracking things like temperature, and Edison was used to display that information on, of all things, a coffee mug. When the baby was comfortable, blinking lights on the mug show a happy green smiling face, but when something is wrong that face turns red. A much more useful application, however, involved using Edison to switch on a bottle warmer when your baby starts to stir, that way it's ready come feeding time. Singularity: The robots are coming to steal our jobs By Jane Wakefield Technology reporter Are robots on the verge of real intelligence? If you worry that the robots are coming, don't, because they are already here. Artificial intelligence agents are already involved in every aspect of our lives - they keep our inboxes free of spam, they help us make our web transactions, they fly our planes and if Google gets its way will also soon drive our cars for us. "AI's are embedded in the fabric of our everyday lives," head of AI at Singularity University, Neil Jacobstein, told the BBC. "They are used in medicine, in law, in design and throughout automotive industry." And each day the algorithms that power away, making decisions behind the scenes, are getting smarter. It means that one of the biggest quests of the modern world - the search to make machines as intelligent as humans - could be getting tantalisingly close. Mr Jacobstein predicts that artificial intelligence will overtake human intelligence in the mid-2020s, begging the question - what will a society dominated by machine intelligence look like and what exactly will be our role in it? Stealing jobs? Will we work side by side with robots? We may get to put our feet up more, for a start. Chinese company Hon Hai, the world's largest contract electronics manufacturer, has announced it intends to build a robot-making factory and replace 500,000 workers with robots over the next three years. But not having a job will also mean not having a wage, a radical change for a world used to working for a living. "AIs will cause significant unemployment but that doesn't equate with poverty," said Mr Jacobstein. "AIs and other exponential technologies are going to generate vast amounts of wealth. "We have to be willing to change the social contract we have with people about how wealth is distributed." He tends towards the optimistic view of machines and humans working in perfect harmony, side by side. "The best combination for problem solving is a human and a computer," he said. Dangerous future Author and documentary-maker James Barrat sits in a very different camp. He is so worried about the onslaught of artificial intelligence that he has written a book about it. Our Final Invention examines whether the increasing domination of artificial intelligence is going to mean the end of the human era. "Advanced AI is a dual-use technology, like nuclear fission. Fission can illuminate cities or incinerate them. At advanced levels, AI will be even more volatile and dangerous than fission, and it's already being weaponised in autonomous drones and battlefield robots," Barrat told the BBC. "More than any other science it forces us to probe ourselves - what are these things we call intelligence, conscience, emotion? But in looking inward we better see our own predilection for irrational violence and technological recklessness. Our innovation always runs far ahead of our stewardship," he said. The robot revolution may be some way off if a competition organised by the Pentagon's research unit Darpa in December is anything to go by. Videos posted online showed the robots remained much slower than humans, often unsteady on their feet with some failing to complete any of the challenges. Google bot Will Google build a real robot next? Nonetheless there is a buzz around robots and artificial intelligence at the moment. Google has just bought eight robotic firms, while Facebook has its very own AI lab. Speculation is rife about what Google will do with its new acquisition. Google robots could be very powerful, thinks Mr Barrat. "That's one route to human level intelligence. A high quality personal assistant wouldn't be just a smartphone - it'd have a humanoid body. Why humanoid? So it can drive your car, use your tools, bounce the baby, act as your bodyguard if need be," he said. start adding silicon to themselves? Will people If the rise of the robots is inevitable - albeit a few years off - then it is also a logical step that humans will eventually be eliminated from the decision chain entirely, meaning AIs will be controlling other AIs. That was already happening in our laptops and computers, said Mr Jacobstein. "Anti-virus software is basically AI techniques that is being used to detect other AIs that we call viruses and worms," he said. But he acknowledges that controls to make sure that the phrase "robot failure" doesn't replace "human failure" would have to be built into future AI systems. "We would build the same layered control system we need in everyday life with humans. We want to look at the risks and build controls that stops that rogue behaviour," he said. Brain upgrade Our brains haven't had a major upgrade for 50,000 years ” End Quote Neil Jacobstein Singularity University While Mr Jacobstein remains sanguine about the robot takeover, he is well aware that many see it as the stuff of nightmares. "Some people ask, 'How do you sleep at night knowing the prospects for artificial intelligence?' but it isn't artificial intelligence that keeps me awake at night, it is human stupidity," he said. For him, the only way that humans will keep up with the robots is to become more like them. "Our brains haven't had a major upgrade for 50,000 years and if your laptop or smartphone hadn't had an upgrade in five years you might be concerned about that," he said. Already we have access to AI's such as Siri and Google Now and are pretty much constantly connected to the web via our smartphones, so it isn't so much of a step to imagine a future where silicon is embedded in our skulls. And it could be the only way for us to keep up with the robots DO YOU REALLY THINK MCDONALDS WILL BE PAYING BURGER FLIPPERS $15 PER HOUR? Posted on 12th January 2014 by Administrator Liberal do-gooders are so funny when they attempt to control the world. Their latest media aided cause is doubling the pay of fast food workers so they can have a living wage. Fast food jobs are for teenagers and adult dullards. You can’t earn a living working as a fast food worker. It seems only liberals don’t get it. Obama and his minions can push for an increase in the minimum wage and doubling of fast food wages, but it will just result in more people joining his free shit SNAP army. You can bet that McDonalds, Wendys, Burger King and every other bottom line oriented corporation is experimenting with RoboBurgerBoy. Robots will be replacing more dullards over the coming years. Meet the Robot That Makes 360 Gourmet Burgers Per Hour By Brian Merchant No human hand touched this hamburger. It was made entirely by robots One robot, rather—a 24 square foot gourmet-hamburger-flipping behemoth built by Momentum Machines. It looks like this: The San Francisco-based robotics company debuted its burger-preparing machine last year. It can whip up hundreds of burgers an hour, take custom orders, and it uses top-shelf ingredients for its inputs. Now Momentum is proposing a chain of ‘smart restaurants’ that eschew human cooks altogether. Food Beast points us to the Momentum’s official release, where the company blares: “Fast food doesn’t have to have a negative connotation anymore. With our technology, a restaurant can offer gourmet quality burgers at fast food prices. Our alpha machine replaces all of the hamburger line cooks in a restaurant. It does everything employees can do except better.” And what might this robotic burger cook of the future do better than the slow, inefficient, wagesucking line cooks of yore? It slices toppings like tomatoes and pickles only immediately before it places the slice onto your burger, giving you the freshest burger possible. …custom meat grinds for every single customer. Want a patty with 1/3 pork and 2/3 bison ground after you place your order? No problem. It’s more consistent, more sanitary, and can produce ~360 hamburgers per hour. Furthermore, the “labor savings allow a restaurant to spend approximately twice as much on high quality ingredients and the gourmet cooking techniques make the ingredients taste that much better.” Hear that? Without all those cumbersome human workers, your hamburger will be twice as good. For the same cost. I don’t doubt this is where we’re heading; robots are making inroads in manufacturing, farming, and they’re doing more domestic work around the house, too. Yeah, robots are taking our jobs, and it’s not a question of if, but when and how. Economists often treat the service industry as some last bastion of downsize-proof labor, but, clearly, robots will make sandwiches and take orders, too. A future where we can get gourmet burgers, cheaply and on the quick, sounds pretty nice. But that future will also have structural unemployment, unless we start taking major strides to rethink and reform how we work in a world where robots are doing much of the heavy lifting. If we can, with robots flipping all the burgers, and the right social policies, maybe at least a semi-techno-utopia is on the way… Rampant Prosecutorial Misconduct By THE EDITORIAL BOARD In the justice system, prosecutors have the power to decide what criminal charges to bring, and since 97 percent of cases are resolved without a trial, those decisions are almost always the most important factor in the outcome. That is why it is so important for prosecutors to play fair, not just to win. This obligation is embodied in the Supreme Court’s 1963 holding in Brady v. Maryland, which required prosecutors to provide the defense with any exculpatory evidence that could materially affect a verdict or sentence. Yet far too often, state and federal prosecutors fail to fulfill that constitutional duty, and far too rarely do courts hold them accountable. Last month, Alex Kozinski, the chief judge of the United States Court of Appeals for the Ninth Circuit, issued the most stinging indictment of this systemic failure in recent memory. “There is an epidemic of Brady violations abroad in the land,” Judge Kozinski wrote in dissent from a ruling against a man who argued that prosecutors had withheld crucial evidence in his case. “Only judges can put a stop to it.” The defendant, Kenneth Olsen, was convicted of producing ricin, a toxic poison, for use as a weapon. Federal prosecutors knew — but did not tell his lawyers or the court — that an investigation of the government’s forensic scientist, whose lab tests were critical to the case, had revealed multiple instances of sloppy work that had led to wrongful convictions in earlier cases. A state court found the scientist was “incompetent and committed gross misconduct.” Yet the majority of the federal appeals court panel ruled that the overall evidence of Mr. Olsen’s guilt — including websites he visited and books he bought — was so overwhelming that the failure to disclose the scientist’s firing would not have changed the outcome. This is the all-too-common response by courts confronted with Brady violations. Judge Kozinski was right to castigate the majority for letting the prosecution refuse to turn over evidence “so long as it’s possible the defendant would’ve been convicted anyway,” as the judge wrote. This creates a “serious moral hazard,” he added, particularly since prosecutors are virtually never punished for misconduct. According to the Center for Prosecutor Integrity, multiple studies over the past 50 years show that courts punished prosecutorial misconduct in less than 2 percent of cases where it occurred. And that rarely amounted to more than a slap on the wrist, such as making the prosecutor pay for the cost of the disciplinary hearing. Brady violations are, by their nature, hard to detect, but Judge Kozinski had no trouble coming up with more than two dozen examples from federal and state courts just in the last few years, and those are surely the tip of the iceberg. According to the National Registry of Exonerations, 43 percent of wrongful convictions are the result of official misconduct. The Brady problem is in many ways structural. Prosecutors have the task of deciding when a piece of evidence would be helpful to the defense. But since it is their job to believe in the defendant’s guilt, they have little incentive to turn over, say, a single piece of exculpatory evidence when they are sitting on what they see as a mountain of evidence proving guilt. The lack of professional consequences for failing to disclose exculpatory evidence only makes the breach of duty more likely. As Judge Kozinski wrote, “Some prosecutors don’t care about Brady because courts don’t make them care.” Courts should heed Judge Kozinski’s call, but it will take more than judges to fix the problem. Prosecutors’ offices should adopt a standard “open file” policy, which would involve turning over all exculpatory evidence as a rule, thus reducing the potential for error. Fighting prosecutorial misconduct is not only about protecting the innocent. It is, as Judge Kozinski wrote, about preserving “the public’s trust in our justice system,” and the foundation of the rule of law. KC & Associates Investigations Research Associates Quinault Valley Guns & Blades / Urban Escape & Evasion Course For 1st Responders International Relations * Military * Terrorism * Business * Security www.kcandassociates.org [email protected] Kathleen Louise dePass Press Agent/Publicist .360.288.2652 Triste cosa es no tener amigos, pero más triste ha de ser no tener enemigos porque quién no tenga enemigos señal es de que no tiene talento que haga sombra, ni carácter que impresione, ni valor temido, ni honra de la que se murmure, ni bienes que se le codicien, ni cosa alguna que se le envidie. A sad thing it is to not have friends, but even sadder must it be not having any enemies; that a man should have no enemies is a sign that he has no talent to outshine others, nor character that inspires, nor valor that is feared, nor honor to be rumored, nor goods to be coveted, nor anything to be envied. -Jose Marti From the desk of Craig B Hulet? Why aren’t the Wall Street criminals prosecuted? What prevails in America is not democracy, but a revival of what in former epochs was called aristocratic privilege Why aren’t the Wall Street criminals prosecuted? By Barry Grey 7 January 2014 In May 2012, only days after JPMorgan Chase’s Jamie Dimon revealed that his bank had lost billions of dollars in speculative bets, President Barack Obama publicly defended the multimillionaire CEO, calling him “one of the smartest bankers we’ve got.” What Obama did not mention is that Dimon is a criminal. The New York Times reported Sunday that the government will shortly announce the latest in a long list of sweetheart settlements with Wall Street banks involved in criminal wrongdoing. Federal regulators and prosecutors will, as early as this week, make public a “deferred prosecution” deal letting JPMorgan and its top executives off the hook for their complicity in the $20 billion Ponzi scheme run by disgraced financier Bernie Madoff. In return for payment of some $2 billion in fines, the biggest US bank and its CEO will be allowed to avoid a criminal indictment or admission of guilt, even as they acknowledge the government’s list of illegal actions carried out by the bank during its twenty-year relationship with Madoff. There is ample evidence, including internal emails from senior executives, proving that top management was well aware that Madoff, who kept his firm’s accounts at JPMorgan, was running a scam. Madoff himself, in a 2011 interview from prison, said, “There were people at the bank who knew what was going on.” JPMorgan chose not to warn US regulators and to continue its lucrative relationship with the Ponzi schemer. (See: “US in sweetheart deal with JPMorgan over complicity in Madoff Ponzi scheme”). This is a violation of federal laws, including the Bank Secrecy Act. The settlement amounts to an acknowledgment that Dimon was a criminal co-conspirator with Madoff. Yet Madoff has been sentenced to 150 years in prison, while Dimon is going scot-free. Dimon and his bank were complicit in a fraud that cost thousands of retirees their life savings and bankrupted a number of charities. But this is only a small part of the human tragedy and social carnage from multiple swindles and frauds carried out by JPMorgan. Over the past two years, Dimon’s bank has settled charges that it palmed off toxic mortgage securities on false pretenses, filed false reports to conceal over $6 billion in losses from soured derivatives bets, manipulated energy prices, forged foreclosure documents to force families out of their homes, charged credit card holders for services it did not provide, and defrauded pension funds and other institutional investors. It is currently being investigated for its role in rigging Libor, the global benchmark interest rate, and bribing Chinese officials. JPMorgan is not the exception; it is the rule. Virtually every major bank that operates on Wall Street has settled charges of fraud and criminality on a staggering scale. In 2011, the Senate Permanent Subcommittee on Investigations released a 630-page report on the financial crash of 2008 documenting what the committee chairman called “a financial snake pit rife with greed, conflicts of interest and wrongdoing.” These multiple crimes by serial lawbreakers have had very real and very destructive consequences. The entire world has been plunged into an economic slump that has already lasted more than five years and shows no signs of abating. Tens of millions of families have lost their homes as a result of predatory mortgages pushed by JPMorgan and other Wall Street banks. The collapse of the housing and credit markets in 2007-2008 as a result of rampant speculation and fraud has bankrupted entire countries—Greece, Ireland, Iceland and Spain, to name a few. Detroit and other cities have been thrown into bankruptcy as a result of bankers’ machinations. Governments all over the world have used the economic crisis as an opportunity to carry out a relentless assault on the working class, ripping up the social gains achieved in the course of a century of struggle. Millions of lives have been destroyed by homelessness, hunger and disease as a result of the practices of the Jamie Dimons of the world. And while billions of people have grown poorer, Dimon and his fellow plutocrats have grown richer than ever. Their banks, shielded by bribed politicians, regulators and governments, have raked in record profits, subsidized by trillions in taxpayer bailouts and virtually free cash provided by the Federal Reserve. Dimon was paid $23.1 million in 2011 and $11.5 million in 2012, adding to a personal fortune that is in the hundreds of millions. With the $2 billion in fines to be levied in the Madoff settlement, JPMorgan will have paid out $20 billion in legal costs just over the past year. The scale of the fines is an indication of the colossal dimensions of the crimes committed by the bank, but they represent only a small fraction of the immense wealth it controls. The fines have been calibrated by the Obama administration, in negotiations with Dimon, to avoid threatening the bank’s viability. JPMorgan, which has reported more than $20 billion in annual profits over the past several years, boasts that it has set aside $28 billion to cover fines and legal costs. As of July 2011, it had $244 billion cash on hand. All of the criminal activities of the bankers, and the resulting social devastation, have been motivated by personal greed. These are parasites whose behavior can be described only as sociopathic. Dimon and his like do not even remotely contribute to the betterment of society. Corruption is nothing new to American capitalism. But unlike the robber barons of past eras, today’s plutocrats are not associated with the development of the productive forces, such as steel and auto. People like Dimon make their fortunes from the manipulation of money—chiefly other people’s money. The criminality that pervades capitalism today is bound up with activities that are entirely parasitic and destructive of the productive forces. More is involved here than subjective personality traits. Dimon and his counterparts on Wall Street are personifications of a system characterized by staggering levels of social inequality. The criminality they exhibit is the inevitable manifestation of a society where the richest 0.1 percent control 10.3 percent of income, and the wealthiest 1 percent control 35 percent of the wealth. Such levels of inequality shape the legal and political structures and are ultimately incompatible with democracy. Not a single Wall Street bank or leading banker has been criminally indicted and prosecuted, let alone jailed, for his or her crimes. That this is the result of a deliberate policy on the part of the Obama administration was spelled out last March by Attorney General Eric Holder. Testifying before the Senate Judiciary Committee, Holder explained that the federal government chooses not to prosecute top bankers because “if we do bring a criminal charge, it will have a negative impact on the national economy, perhaps the world economy.” This is an admission that the Wall Street parasites are above the law. What prevails in America is not democracy, but a revival of what in former epochs was called aristocratic privilege. Under feudalism, the aristocracy enjoyed immunity from the laws that applied to ordinary people. Today’s financial aristocracy is, in practice, similarly immunized. This is a country where 2 million people are behind bars. Every day people are hauled into court and thrown into jail for committing crimes whose principal cause is economic destitution. American society is remorseless in its treatment of the poor, but infinitely forgiving when it comes to the atrocities of the rich. It is this reactionary social layer that controls the levers of political power, from the White House to Congress and the courts. It dominates the major political parties and bribes its representatives. It owns the mass media. The bankers cannot be called to account for their crimes because they control the political system and because criminality has become an essential feature of the US and global financial system. To attack any part of it threatens to unravel the entire rotten edifice. It is the task of the working class to break the stranglehold of the financial plutocracy. This is a revolutionary task. Financial fraud and criminality are embedded in the very structure of the capitalist system. The working class must organize itself independently in a struggle against the financial elite and all of its parties and institutions. It must expropriate the vast wealth obtained by the bankers through illegal and antisocial means and use it to provide jobs and social services to the masses of people. This is the only basis for bringing criminals like Jamie Dimon to justice. This is just the starting point for a fundamental restructuring of society. The subordination of the financial system to the personal accumulation of wealth must be ended. The banks and major corporations must be taken out of private hands and placed under public ownership and democratic control, so that they can be used as instruments of international economic planning, as part of a socialist economy geared to human need, not private profit. From the comments: [–]bankregulatorburner [score hidden] 6 hours ago* Burner account. I had a career as both a bank regulator as well as a second career running the department within an investment bank that was responsible for ensuring compliance with the laws. The system is screwed up, but not for the reasons in this article or otherwise commonly kicked around on the internet. A view from inside the system... I was hired right out of college to audit and investigate banks, investment banks, trading firms, etc. for compliance with securities and banking laws. I had zero experience with banking or securities trading but was hired by a quasi governmental agency to audit the largest and most complex companies in the world. I was earning a quasi governmental salary at the time. Once i had a few years under my belt, and because i was relatively bright, i was hired on the 'street side' at an investment bank for about twice as much money to help them deal with the regulators. At the lower ranks the regulators just become a training ground for the bright and motivated that go to work at the investment banks and the remainder of the staff at the regulators, in large part are those who were maybe not as bright, polished, or motivated enough to get a job at an investment bank. Because there is such a large disparity in compensation, the talent flows to the banking side. At the top side of the regulator staff, it is very rare for directors to to be chosen from the inside and are typically picked up from the 'street side'. These individuals have desires of putting in a few years back at the regulator simply to pad the resume so they can go back out to the 'street side' and aim for the top compliance job as Chief Compliance Officer of a very large investment bank which pays 10 fold more at millions per year. Because of these motivations, they tend to 1) write soft policy and 2) be somewhat soft on enforcement since they will want back into the club at some point and want to be viewed as very 'business friendly'. Because the talent draw is to the banking side you will just have much brighter talent pool of people at the investment banks in the regulatory/compliance department. Wall street tends to be one of the most powerful draws of talent in the world. This has changed over the years, but more than ever top end quantitative doctors are being hired from the best schools in the world in banking for securities development, trading algorithms, and risk mitigation analysis. To put it bluntly... the directors at the banks are definitely 'the smartest guys in the room'. The people making the money at the banks are just way ahead of the curve and doing things either 1) before the regulators even understand what is going on, 2) before the regulators can get through the bureaucracy to create a law to address a problem, 3) or are so well versed in the laws that that brush right up against the laws without overstepping. Not that infrequently i would hear from directors at investment banks that they were put into positions that they really had a hard time dealing with because certain things were legal (because regulators were to slow to understand what was going on) and profitable and therefore they would have to make a business decision to do these things to fulfill their legal obligation to act in the best interest of their client despite their moral objection. For what its worth, I got out of the business completely because of the lack of soul, but there is a lot less 'corruption', 'deviousness', 'class warfare', 'heartlessness', etc. than people think. There is however greed, but its not necessarily a bad thing. In general, people want to make lots of money because they want a big house for their family, security for their kids, a nice car, fancy clothes, etc. but people work really hard for it and genuinely do not want to break the law or do any harm. They will however do everything within their power to make as much money as possible within the framework of the system. The regulatory system is just woefully understaffed, not talented enough, burdened with bureaucracy, and structured in a way to be soft and slow on enforcement and policy writing. On January 2, 2013, David Eckert failed to make a complete stop when he pulled out of a Walmart store in Deming, NM. A police officer then asked David to get out of his car and claimed he saw Eckert “clenching his buttocks” which supposedly was a sign that Eckert had drugs in his anal cavity. According to news reports, Eckert voluntarily consented to a search of his car by a K-9 unit. No drugs were found. But the police officers involved were not satisfied and Eckert was then put in investigative detention while they secured a warrant from a judge to search his body. Then Eckert’s humiliating examination began at a nearby medical center. Here is a summary from the local NBC TV station KOB 4 about what Mr. Eckert went through. 1. Eckert’s abdominal area was X-rayed; no narcotics were found. 2. Doctors then performed an exam of Eckert’s anus with their fingers; no narcotics were found. 3. Doctors performed a second exam of Eckert’s anus with their fingers; no narcotics were found. 4. Doctors penetrated Eckert’s anus to insert an enema. Eckert was forced to defecate in front of doctors and police officers. Eckert watched as doctors searched his stool. No narcotics were found. 5. Doctors penetrated Eckert’s anus to insert an enema a second time. Eckert was forced to defecate in front of doctors and police officers. Eckert watched as doctors searched his stool. No narcotics were found. 6. Doctors penetrated Eckert’s anus to insert an enema a third time. Eckert was forced to defecate in front of doctors and police officers. Eckert watched as doctors searched his stool. No narcotics were found. 7. Doctors then X-rayed Eckert again; no narcotics were found. 8. Doctors prepared Eckert for surgery, sedated him, and then performed a colonoscopy where a scope with a camera was inserted into Eckert’s anus, rectum, colon, and large intestines. No narcotics were found. His attorney, Shannon Kennedy has filed a lawsuit against the City of Deming, Deming police officers on behalf of Eckert. “This is essentially medical anal rape, numerous times over a 12-hour period,” Kennedy said. “I can’t imagine anything more horrifying than what happened to our client.” Eckert later received a bill for his torture from the hospital, which threatened to turn him over to a collections agency if he failed to pay. Eckert is said to be so traumatized by the experience it is reported he is a prisoner in his own home and afraid to come out. Chris Hedges The Last Gasp of American Democracy Posted on Jan 5, 2014 AP/Manuel Balce Ceneta He got the memo: The National Security Agency director, Gen. Keith Alexander, testifies on Capitol Hill in December at a Senate Judiciary Committee hearing on “Continued Oversight of U.S. Government Surveillance Authorities.” By Chris Hedges This is our last gasp as a democracy. The state’s wholesale intrusion into our lives and obliteration of privacy are now facts. And the challenge to us—one of the final ones, I suspect—is to rise up in outrage and halt this seizure of our rights to liberty and free expression. If we do not do so we will see ourselves become a nation of captives. The public debates about the government’s measures to prevent terrorism, the character assassination of Edward Snowden and his supporters, the assurances by the powerful that no one is abusing the massive collection and storage of our electronic communications miss the point. Any state that has the capacity to monitor all its citizenry, any state that has the ability to snuff out factual public debate through control of information, any state that has the tools to instantly shut down all dissent is totalitarian. Our corporate state may not use this power today. But it will use it if it feels threatened by a population made restive by its corruption, ineptitude and mounting repression. The moment a popular movement arises—and one will arise—that truly confronts our corporate masters, our venal system of total surveillance will be thrust into overdrive. The most radical evil, as Hannah Arendt pointed out, is the political system that effectively crushes its marginalized and harassed opponents and, through fear and the obliteration of privacy, incapacitates everyone else. Our system of mass surveillance is the machine by which this radical evil will be activated. If we do not immediately dismantle the security and surveillance apparatus, there will be no investigative journalism or judicial oversight to address abuse of power. There will be no organized dissent. There will be no independent thought. Criticisms, however tepid, will be treated as acts of subversion. And the security apparatus will blanket the body politic like black mold until even the banal and ridiculous become concerns of national security. I saw evil of this kind as a reporter in the Stasi state of East Germany. I was followed by men, invariably with crew cuts and wearing leather jackets, whom I presumed to be agents of the Stasi— the Ministry for State Security, which the ruling Communist Party described as the “shield and sword” of the nation. People I interviewed were visited by Stasi agents soon after I left their homes. My phone was bugged. Some of those I worked with were pressured to become informants. Fear hung like icicles over every conversation. The Stasi did not set up massive death camps and gulags. It did not have to. The Stasi, with a network of as many as 2 million informants in a country of 17 million, was everywhere. There were 102,000 secret police officers employed full time to monitor the population—one for every 166 East Germans. The Nazis broke bones; the Stasi broke souls. The East German government pioneered the psychological deconstruction that torturers and interrogators in America’s black sites, and within our prison system, have honed to a gruesome perfection. The goal of wholesale surveillance, as Arendt wrote in “The Origins of Totalitarianism,” is not, in the end, to discover crimes, “but to be on hand when the government decides to arrest a certain category of the population.” And because Americans’ emails, phone conversations, Web searches and geographical movements are recorded and stored in perpetuity in government databases, there will be more than enough “evidence” to seize us should the state deem it necessary. This information waits like a deadly virus inside government vaults to be turned against us. It does not matter how trivial or innocent that information is. In totalitarian states, justice, like truth, is irrelevant. The object of efficient totalitarian states, as George Orwell understood, is to create a climate in which people do not think of rebelling, a climate in which government killing and torture are used against only a handful of unmanageable renegades. The totalitarian state achieves this control, Arendt wrote, by systematically crushing human spontaneity, and by extension human freedom. It ceaselessly peddles fear to keep a population traumatized and immobilized. It turns the courts, along with legislative bodies, into mechanisms to legalize the crimes of state. The corporate state, in our case, has used the law to quietly abolish the Fourth and Fifth amendments of the Constitution, which were established to protect us from unwarranted intrusion by the government into our private lives. The loss of judicial and political representation and protection, part of the corporate coup d’état, means that we have no voice and no legal protection from the abuses of power. The recent ruling supporting the National Security Agency’s spying, handed down by U.S. District Judge William H. Pauley III, is part of a very long and shameful list of judicial decisions that have repeatedly sacrificed our most cherished constitutional rights on the altar of national security since the attacks of 9/11. The courts and legislative bodies of the corporate state now routinely invert our most basic rights to justify corporate pillage and repression. They declare that massive and secret campaign donations—a form of legalized bribery—are protected speech under the First Amendment. They define corporate lobbying—under which corporations lavish funds on elected officials and write our legislation—as the people’s right to petition the government. And we can, according to new laws and legislation, be tortured or assassinated or locked up indefinitely by the military, be denied due process and be spied upon without warrants. Obsequious courtiers posing as journalists dutifully sanctify state power and amplify its falsehoods—MSNBC does this as slavishly as Fox News—while also filling our heads with the inanity of celebrity gossip and trivia. Our culture wars, which allow politicians and pundits to hyperventilate over nonsubstantive issues, mask a political system that has ceased to function. History, art, philosophy, intellectual inquiry, our past social and individual struggles for justice, the very world of ideas and culture, along with an understanding of what it means to live and participate in a functioning democracy, are thrust into black holes of forgetfulness. The political philosopher Sheldon Wolin, in his essential book “Democracy Incorporated,” calls our system of corporate governance “inverted totalitarianism,” which represents “the political coming of age of corporate power and the political demobilization of the citizenry.” It differs from classical forms of totalitarianism, which revolve around a demagogue or charismatic leader; it finds its expression in the anonymity of the corporate state. The corporate forces behind inverted totalitarianism do not, as classical totalitarian movements do, replace decaying structures with new structures. They instead purport to honor electoral politics, freedom of expression and the press, the right to privacy and the guarantees of law. But they so corrupt and manipulate electoral politics, the courts, the press and the essential levers of power as to make genuine democratic participation by the masses impossible. The U.S. Constitution has not been rewritten, but steadily emasculated through radical judicial and legislative interpretation. We have been left with a fictitious shell of democracy and a totalitarian core. And the anchor of this corporate totalitarianism is the unchecked power of our systems of internal security. Our corporate totalitarian rulers deceive themselves as often as they deceive the public. Politics, for them, is little more than public relations. Lies are told not to achieve any discernable goal of public policy, but to protect the image of the state and its rulers. These lies have become a grotesque form of patriotism. The state’s ability through comprehensive surveillance to prevent outside inquiry into the exercise of power engenders a terrifying intellectual and moral sclerosis within the ruling elite. Absurd notions such as implanting “democracy” in Baghdad by force in order to spread it across the region or the idea that we can terrorize radical Islam across the Middle East into submission are no longer checked by reality, experience or factually based debate. Data and facts that do not fit into the whimsical theories of our political elites, generals and intelligence chiefs are ignored and hidden from public view. The ability of the citizenry to take self-corrective measures is effectively stymied. And in the end, as in all totalitarian systems, the citizens become the victims of government folly, monstrous lies, rampant corruption and state terror. The Romanian poet Paul Celan captured the slow ingestion of an ideological poison—in his case fascism—in his poem “Death Fugue”: Black milk of dawn we drink it at dusk we drink it at noon and at daybreak we drink it at night we drink it and drink it we are digging a grave in the air there’s room for us all We, like those in all emergent totalitarian states, have been mentally damaged by a carefully orchestrated historical amnesia, a state-induced stupidity. We increasingly do not remember what it means to be free. And because we do not remember, we do not react with appropriate ferocity when it is revealed that our freedom has been taken from us. The structures of the corporate state must be torn down. Its security apparatus must be destroyed. And those who defend corporate totalitarianism, including the leaders of the two major political parties, fatuous academics, pundits and a bankrupt press, must be driven from the temples of power. Mass street protests and prolonged civil disobedience are our only hope. A failure to rise up—which is what the corporate state is counting upon—will see us enslaved. The absurdly dangerous militarization of America’s police More and more local departments are splurging for heavy-duty combat machinery. Here's why we should all be nervous JIM HIGHTOWER, ALTERNET (Credit: Reuters/Philip Andrews) This article originally appeared on AlterNet. What a Christmas little Bastrop had! It’s still a mystery how Santa Claus got it down the chimney, but Bastrop got a nifty present that most children could only dream about: A big honkin’, steel-clad war toy called MRAP. But Bastrop is not a six-year-old child, and an MRAP is not a toy. Bastrop is a Texas county of some 75,000 people, and MRAP stands for “Mine-Resistant Ambush Protected.” It’s a heavilyarmored military vehicle weighing about 15 tons — one of several versions of fighting machines that have become the hot, must-have playthings of police departments all across the country. Are the good people of Bastrop facing some imminent terrorist threat that warrants military equipment? No, it’s a very pleasant, laid-back place. And while the county is named for a 19th century land developer and accused embezzler, it’s never been a haven for particularly dangerous criminals — indeed, the relatively few crimes in Bastrop today don’t rise above the level of routine police work. Even the sheriff’s department, which is the proud owner of the MRAP tank, says it doesn’t have a specific use for the machine, but “It’s here if we need it.” Well, yeah … but that same feeble rational would apply if the county decided to get an atom bomb — you just never know when a big mushroom cloud might come in handy! What we have here is the absurdly dangerous militarization of America’s police departments. Our sprawling Department of Homeland Security and the Pentagon (which gave the MRAP to Bastrop) are haphazardly spreading war equipment, war techniques and a war mentality to what are supposed to be our communities’ peacekeepers and crime solvers. Having the technology and mindset for military actions, local authorities will find excuses to substitute them for honest police work, turning common citizens into “enemies.” As a spokesman for the Bastrop sheriff’s department said of the MRAP, “With today’s society … there’s no way the thing won’t be used.” How comforting is that? But now, let’s turn from the battlefield to the gridiron. In the ever-escalating competition to be the No. 1 big-time college football program in the nation, Ohio State University bulked up last fall with a monster recruit named Maxx. Actually, it’s not the coaching staff that signed up this brute, but the OSU campus police department. And the recruit’s full name is MaxxPro — not a player, but a 19-ton armored fighting vehicle built by a pentagon contractor to withstand “ballistic arms fire, mine fields, IEDs, and Nuclear, Biological and Chemical environments.” Wow, college games really have gotten rough! But the campus PD, which received the MaxxPro as a gift from the Pentagon (ie, us taxpayers), says it’s not just playing games, but deploying Maxx for things like hostage scenarios, killers loose on campus, and extreme flooding of up to three feet. Well, have such things been a problem at OSU? Uh … no. Would a huge, slow, gas-guzzling vehicle designed for warfare be effective if any of the above were actually to occur? No response. Oh, by the way, operating these machines requires specially trained personnel — is anyone in the department qualified? Again, no answer. Also, the vehicles are subject to frequent rollovers, and they lack the ability to go off-road or to maneuver in confined areas. That doesn’t sound ideal for a college campus. Not to worry, though, for the gendarmes said they were adjusting Maxx to fit their needs. How? Removing the top gun turret and repainting the vehicle. OSU police finally admitted that Maxx would mostly be used to drive them around campus and provide a police “presence” on football game days. Great — police authorities now believe they need a show of military force to keep tailgaters in check. Five Economic Reforms Millennials Should Be Fighting For Guaranteed jobs, universal basic incomes, public finance and more 30 Comment 8466 Fast-food workers protest outside of a Burger King in Los Angeles. Patrick T. Fallon/Bloomberg via Getty Images By Jesse A. Myerson January 3, 2014 10:00 AM ET It's a new year, but one thing hasn't changed: The economy still blows. Five years after Wall Street crashed, America's banker-gamblers have only gotten richer, while huge swaths of the country are still drowning in personal debt, tens of millions of Americans remain unemployed – and the new jobs being created are largely low-wage, sub-contracted, part-time grunt work. Millennials have been especially hard-hit by the downturn, which is probably why so many people in this generation (like myself) regard capitalism with a level of suspicion that would have been unthinkable a decade ago. But that egalitarian impulse isn't often accompanied by concrete proposals about how to get out of this catastrophe. Here are a few things we might want to start fighting for, pronto, if we want to grow old in a just, fair society, rather than the economic hellhole our parents have handed us. 1. Guaranteed Work for Everybody Unemployment blows. The easiest and most direct solution is for the government to guarantee that everyone who wants to contribute productively to society is able to earn a decent living in the public sector. There are millions of people who want to work, and there's tons of work that needs doing – it's a no-brainer. And this idea isn't as radical as it might sound: It's similar to what the federal Works Progress Administration made possible during Roosevelt's New Deal, and Dr. Martin Luther King, Jr. vocally supported a public-sector job guarantee in the 1960s. A job guarantee that paid a living wage would anchor prices, drive up conditions for workers at megacorporations like Walmart and McDonald's, and target employment for the poor and long-term unemployed – people to whom conventional stimulus money rarely trickles all the way down. The program would automatically expand during private-sector downturns and contract during privatesector upswings, balancing out the business cycle and sending people from job to job, rather than job to unemployment, when times got tough. Some economists have proposed running a job guarantee through the non-profit sector, which would make it even easier to suit the job to the worker. Imagine a world where people could contribute the skills that inspire them – teaching, tutoring, urban farming, cleaning up the environment, painting murals – rather than telemarketing or whatever other stupid tasks bosses need done to supplement their millions. Sounds nice, doesn't it? 2. Social Security for All But let's think even bigger. Because as much as unemployment blows, so do jobs. What if people didn't have to work to survive? Enter the jaw-droppingly simple idea of a universal basic income, in which the government would just add a sum sufficient for subsistence to everyone's bank account every month. A proposal along these lines has been gaining traction in Switzerland, and it's starting to get a lot of attention here, too. We live in the age of 3D printers and self-replicating robots. Actual human workers are increasingly surplus to requirement – that's one major reason why we have such a big unemployment problem. A universal basic income would address this epidemic at the root and provide everyone, in the words of Duke professor Kathi Weeks, "time to cultivate new needs for pleasures, activities, senses, passions, affects, and socialities that exceed the options of working and saving, producing and accumulating." Put another way: A universal basic income, combined with a job guarantee and other social programs, could make participation in the labor force truly voluntary, thereby enabling people to get a life. 3. Take Back The Land Ever noticed how much landlords blow? They don't really do anything to earn their money. They just claim ownership of buildings and charge people who actually work for a living the majority of our incomes for the privilege of staying in boxes that these owners often didn't build and rarely if ever improve. In a few years, my landlord will probably sell my building to another landlord and make off with the appreciated value of the land s/he also claims to own – which won't even get taxed, as long as s/he ploughs it right back into more real estate. Think about how stupid that is. The value of the land has nothing to do with my idle, remote landlord; it reflects the nearby parks and subways and shops, which I have access to thanks to the community and the public. So why don't the community and the public derive the value and put it toward uses that benefit everyone? Because capitalism, is why. The most mainstream way of flipping the script is a simple land-value tax. By targeting wealthy real estate owners and their free rides, we can fight inequality and poverty directly, make disastrous asset price bubbles impossible and curb Wall Street's hideous bloat. There are cooler ideas out there, too: Municipalities themselves can be big-time landowners, and groups can even create largescale community land trusts so that the land is held in common. In any case, we have to stop letting rich people pretend they privately own what nature provided everyone. 4. Make Everything Owned by Everybody Hoarders blow. Take, for instance, the infamous one percent, whose ownership of the capital stock of this country leads to such horrific inequality. "Capital stock" refers to two things here: the buildings and equipment that workers use to produce goods and services, and the stocks and bonds that represent ownership over the former. The top 10 percent's ownership of the means of production is represented by the fact that they control 80 percent of all financial assets. This detachment means that there's a way easier way to collectivize wealth ownership than having to stage uprisings that seize the actual airplanes and warehouses and whatnot: Just buy up their stocks and bonds. When the government does that, it's called a sovereign wealth fund. Think of it like a big investment fund that buys up assets from the private sector and pays dividends to all permanent U.S. residents in the form of a universal basic income. Alaska actually already has a fund like this in place. If it's good enough for Levi Johnston, it's good enough for you. 5. A Public Bank in Every State You know what else really blows? Wall Street. The whole point of a finance sector is supposed to be collecting the surplus that the whole economy has worked to produce, and channeling that surplus wealth toward its most socially valuable uses. It is difficult to overstate how completely awful our finance sector has been at accomplishing that basic goal. Let's try to change that by allowing state governments into the banking game. There is only one state that currently has a public option for banking: North Dakota. When North Dakotans pay state taxes, the money gets deposited in the state's bank, which in turn offers cheap loans to farmers, students and businesses. The Bank of North Dakota doesn't make seedy, destinedto-default loans, slice them up inscrutably and sell them on a secondary market. It doesn't play around with incomprehensible derivatives and allow its executives to extract billions of dollars. It just makes loans and works with debtors to pay them off. If that idea – or any of the others described in this piece – sounds good to you, there's a bitter political struggle to be waged. Let's get to work. Read more: http://www.rollingstone.com/politics/news/five-economic-reforms-millennials-shouldbe-fighting-for-20140103#ixzz2q2NHOaS7 Follow us: @rollingstone on Twitter | RollingStone on Facebook News Contact: HHS Press Office 202-690-6343 FOR IMMEDIATE RELEASE January 3, 2014 Obama administration takes additional steps to strengthen the federal background check system Continuing efforts to keep guns out of potentially dangerous hands Today, as part of President Obama’s continuing efforts to reduce gun violence, the Department of Health and Human Services issued a Notice of Proposed Rulemaking (NPRM) to remove unnecessary legal barriers under the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule that may prevent states from reporting certain information to the National Instant Criminal Background Check System (NICS). The NICS helps to ensure that guns are not sold to those prohibited by law from having them, including felons, those convicted of domestic violence, and individuals involuntarily committed to a mental institution. To date, background checks have prevented over two million guns from falling into the wrong hands. However, the background check system is only as effective as the information that is available to it. According to a 2012 Government Accountability Office report, 17 states had submitted fewer than 10 records of individuals prohibited for mental health reasons. Additional records have been submitted over the past year as a result of federal and state actions, but there is more work to be done. “There is a strong public safety need for this information to be accessible to the NICS, and some states are currently under-reporting or not reporting certain information to the NICS at all,” said HHS Secretary Kathleen Sebelius. “This proposed rulemaking is carefully balanced to protect and preserve individuals’ privacy interests, the patient-provider relationship, and the public’s health and safety.” On April 23, 2013, the department published an Advance Notice of Proposed Rulemaking requesting the public’s input on how HIPAA may affect some states’ ability to report to the NICS and ways in which these barriers could be addressed without discouraging individuals from seeking mental health services. Over 2,000 comments were received from individuals, state agencies, health care providers, professional organizations, consumer advocacy groups, and other stakeholders. The NPRM announced today would modify the HIPAA Privacy Rule to permit certain HIPAAcovered entities to disclose to the NICS the identities of persons prohibited by federal law from possessing or receiving a firearm for reasons related to mental health. Seeking help for mental health problems or getting treatment does not make someone legally prohibited from having a firearm, and nothing in this proposed rule changes that. Furthermore, nothing in this proposed rule would require reporting on general mental health visits or other routine mental health care, or exempt providers solely performing these treatment services from existing privacy rules. The proposal would give states and certain covered entities added flexibility to ensure accurate but limited information is reported to the NICS, which would not include clinical, diagnostic, or other mental health information. Instead, certain covered entities would be permitted to disclose the minimum necessary identifying information about individuals who have been involuntarily committed to a mental institution or otherwise have been determined by a lawful authority to be a danger to themselves or others or to lack the mental capacity to manage their own affairs. Importantly, the proposed permission focuses on those entities performing relevant commitments, adjudications, or data repository functions. The proposed modifications would merely permit, and not require, covered entities to report to the NICS. In addition, the proposed rule would not change the existing permitted uses and disclosures of protected health information under the HIPAA Privacy Rule. The NPRM will be available for review beginning at 4:15pm on Friday, January 3, 2014, at: http://www.federalregister.gov. Comments can be submitted to http://www.regulations.gov. SHOCKING EVIDENCE HITLER ESCAPED GERMANY Newly declassified FBI, U.S. intel files raise startling questions Adolf Hitler and Eva Braun WASHINGTON – Everyone knows Adolf Hitler committed suicide by gunshot in his underground bunker on April 30, 1945. At least, that has been the conventional wisdom. Now comes WND senior staff reporter Jerome R. Corsi’s new book, “Hunting Hitler: New Scientific Evidence That Hitler Escaped Germany.” Examining declassified FBI and U.S. military intelligence files, Corsi makes a compelling case that U.S. investigators suspected from the beginning Hitler had escaped. For political purposes, the evidence indicates, they were willing to go along with the cover story that in the final days of World War II, Hitler married his mistress, Eva Braun, and the two took their lives in a joint-suicide ritual just before the Soviet army entered Berlin. But the truth is, no one actually saw Hitler commit suicide. There are no photographs documenting a joint suicide of Hitler and Eva Braun, and the bodies of the two were never recovered or preserved for positive identification. Get Jerome Corsi’s “Hunting Hitler: New Scientific Evidence That Hitler Escaped Germany” at WND’s Superstore. In 2009, Corsi pointed out, Nicholas Bellatoni, the Connecticut state archaeologist, was allowed by the Russian Federation State Archive in Moscow to examine skull fragments the Russians have claimed for decades are proof Hitler committed suicide. Bellatoni’s startling findings prompted Corsi to investigate further. “What caused me to question Hitler’s suicide was Bellatoni’s DNA analysis that proved conclusively the skull fragments belonged not to Hitler, but to a 40-year-old woman unrelated to Eva Braun,” Corsi said. In “Hunting Hitler,” Corsi posits Hitler made his way to Argentina with the help of U.S. intelligence agents that had been secretly working with the Nazis since 1943. Allen Dulles, then an agent of the Office of Strategic Services, or OSS, the predecessor agency to the CIA, was communicating secretly with top Nazis from his office in Bern, Switzerland, Corsi said. Corsi brings to light many troubling questions, including: Why were the Americans unable to obtain physical evidence of Hitler’s remains after the Russians absconded with his body? Why did both Stalin and Eisenhower doubt Hitler’s demise? Why did nobody in Hitler’s bunker hear any shots fired? Did U.S. intelligence agents in Europe, including the OSS and Allen Dulles (who later headed the CIA under President Eisenhower), aid Hitler’s escape, as they did with so many other Nazis? Argentinean media reported Hitler arrived in the country and it continued to report his presence. Why have the findings not made it to the US? Corsi relies on autopsy reports, interrogation transcripts, documents from Soviet archives, CIA reports, extensive research in the National Archives and Records Administration in Washington, D.C., and in College Park, Md., and more to back up his case. Did U.S. intelligence help Hitler get away? His evidence is shockingly abundant, and his clear argument lends credence to a new theory that disembowels the double-suicide narrative. “The story Hitler and Eva Braun committed suicide was a cover story, designed by U.S. intelligence agents at the end of World War II to facilitate the escape not only of Hitler and Eva Braun, but also of top Nazi war criminals such as Adolf Eichmann who was discovered in 1960 hiding in Argentina,” Corsi argued. He presents documentary evidence Allen Dulles’ wartime mission in Switzerland included helping Martin Bormann, Hitler’s secretary, to funnel billions of dollars of Nazi ill-gotten financial gain out of Germany and invest in the U.S. and Argentinian stock markets to provide a financial cushion to survive in hiding after the war. In the National Archives at College Park, Corsi discovered a clipping from the U.S. military newspaper “The Stars and Stripes” published Oct. 8, 1945, reporting a shocking statement made by General Dwight D. Eisenhower, then the supreme commander of the Allied Forces. The short piece read: “There is ‘reason to believe’ that Hitler may still be alive, according to a remark made by Gen. Eisenhower to Dutch newspapermen. The general’s statement reversed his previous opinion that Hitler was dead.” Corsi asks why Eisenhower’s shocking claim has gone largely unreported in U.S. newspapers and history books even until today. Was Hitler on the U-530? Tracing Hitler’s escape route, Corsi found in the National Archives documentary evidence Hitler got to Argentina in a German submarine, the U-530 that mysteriously surfaced outside the harbor at Mar del Plata under the command of Otto Wermuth and his executive officer, Karl Felix Schuller, after having spent weeks making surreptitious drops of passengers along Argentina’s Atlantic shore. Hidden away in the National Archives, Corsi found a U.S. naval intelligence report written July 18, 1945, by the Naval Attaché in Buenos Aires who notified Washington there was reason to believe U-530 had landed Adolf Hitler and Eva Braun in the south of Argentina before the submarine journeyed on to surrender at Mar del Plata. Corsi had newspaper reports translated of Hitler and Braun being welcomed by wealthy Nazi sympathizers among Argentina’s large German community. The Germans there had constructed a mansion hidden away in the dense mountain forests of Bariloche to provide the Nazi führer with comfort and security in his elder years. Argentine newspaper report Corsi writes: In 1943, architect Alejandro Bustillo, at the request of German supporters of Hitler then living in Argentina, designed and constructed an elaborate resort residence for Hitler and Eva Braun, Residencia Inalco, located in a remote area between San Carlos de Bariloce Villa La Angostura, bordering the Nahuel Haupi Lake, outside the city of Bariloche, in the province of Río Negro, Argentina.” In southern Argentina in the region of the Andes adjoining Chile, he writes, “the surroundings and the Hitler residence were selected and designed to have a distinct feel of Hitler’s Obersalzberg retreat above the town of Berchtesgaden in the Bavarian Alps. Hitler moved into the residence in June 1947.” Tests on skull fragment cast doubt on Adolf Hitler suicide story Bone with bullet hole found by Russians in 1946 came from an unknown woman, not the German leader The Observer, Uki Goñi 26 September 2009 A general view of what Russian officials claim to be a fragment of Adolf Hitler's skull, at an exhibition in Moscow, Wed April 26, 2000. Photograph: Mikhail Metzel/AP In countless biographies of Adolf Hitler the story of his final hours is recounted in the traditional version: committing suicide with Eva Braun, he took a cyanide pill and then shot himself on 30 April 1945, as the Russians bombarded Berlin. Some historians expressed doubt that the Führer had shot himself, speculating that accounts of Hitler's death had been embellished to present his suicide in a suitably heroic light. But a fragment of skull, complete with bullet hole, which was taken from the bunker by the Russians and displayed in Moscow in 2000, appeared to settle the argument. Until now. In the wake of new revelations, the histories of Hitler's death may need to be rewritten – and left open-ended. American researchers claim to have demonstrated that the skull fragment, secretly preserved for decades by Soviet intelligence, belonged to a woman under 40, whose identity is unknown. DNA analyses performed on the bone, now held by the Russian State Archive in Moscow, have been processed at the genetics lab of the University of Connecticut. The results, broadcast in the US by a History Channel documentary, Hitler's Escape, astonished scientists. According to Connecticut archaeologist and bone specialist Nick Bellantoni, it was clear from the outset that something was amiss. "The bone seemed very thin; male bone tends to be more robust," he said. "And the sutures where the skull plates come together seemed to correspond to someone under 40." In April 1945 Hitler turned 56. Bellantoni had flown to Moscow to inspect the gruesome Hitler trophies at the State Archive, which included the skull fragment as well as bloodstains from the bunker sofa on which Hitler and Braun were believed to have committed suicide. He was allowed only one hour with the Hitler trove, during which time he applied cotton swabs and took DNA samples. "I had the reference photos the Soviets took of the sofa in 1945 and I was seeing the exact same stains on the fragments of wood and fabric in front of me, so I knew I was working with the real thing." The samples were then flown back to Connecticut. At the university's centre for applied genetics, Linda Strausbaugh closed her lab for three days to work exclusively on the Hitler project. "We used the same routines and controls that would have been used in a crime lab," she said. To her surprise, a small amount of viable DNA was extracted. She then replicated this through a process known as molecular copying to provide enough material for analysis. "We were very lucky to get a reading, despite the limited amount of genetic information," she said. The result was extraordinary. According to witnesses, the bodies of Hitler and Braun had been wrapped in blankets and carried to the garden just outside the Berlin bunker, placed in a bomb crater, doused with petrol and set ablaze. But the skull fragment the Russians dug up outside the Führerbunker in 1946 could never have belonged to Hitler. The skull DNA was incontestably female. The only positive physical proof that Hitler had shot himself had suddenly been rendered worthless. The result is a mystery reopened and, for conspiracy theorists the tantalising possibility that Hitler did not die in the bunker. For decades after the war the fate of Hitler's corpse was shrouded in secrecy. No picture or film was made public. As the Soviet Army secured control of Berlin in May 1945, Russian forensic specialists under the command of the counterintelligence unit Smersh (an acronym for "Death to Spies") dug up what was presumed to be the dictator's body outside the bunker and performed a post-mortem examination behind closed doors. A part of the skull was absent, presumably blown away by Hitler's suicide shot, but what remained of his jaw coincided with his dental records, a fact reportedly confirmed when the Russians showed his surviving dental work to the captured assistants of Hitler's dentist. The autopsy also reported that Hitler, as had been rumoured, had only one testicle. But Stalin remained suspicious. In 1946 a second secret mission was dispatched to Berlin. In the same crater from which Hitler's body had been recovered, the new team found what it believed was the missing skull fragment with a bullet exit wound through it. The Russians also took fragments of Hitler's bloodstained sofa. Even this failed to satisfy Stalin, who clamped a secrecy order on all matters related to Hitler's death. Unknown to the world, Hitler's corpse was interred at a Smersh centre in Magdeburg, East Germany. There it remained long after Stalin's death in 1953. Finally, in 1970, the KGB dug up the corpse, cremated it and secretly scattered the ashes in a river. Only the jawbone, the skull fragment and the bloodstained sofa segments were preserved in the deep archives of Soviet intelligence. The bunker was destroyed in 1947 and eventually paved over. Then, in 2000, the Russian State Archive in Moscow staged an exhibition, The Agony of the Third Reich. The skull fragment was displayed, but only photographs of Hitler's jawbone were on view. The head of the archive, Sergei Mironenko, said he had no doubt the skull fragment was authentic. "It is not just some bone we found in the street, but a fragment of a skull that was found in a hole where Hitler's body had been buried," he said. In the wake of Bellantoni and Strausbaugh's findings, Mironenko's confidence was clearly misplaced. But could the fragment of skull belong to Eva Braun, who died at 33 and was laid alongside her beloved Führer in the same crater? "We know the skull corresponds to a woman between the ages of 20 and 40," said Bellantoni, but he is sceptical about the Braun thesis. "There is no report of Eva Braun having shot herself or having been shot afterwards. It could be anyone. Many people were killed around the bunker area." Sixty-four years later, the world is still in the dark about what really happened in Hitler's bunker on 30 April 1945. Uki Goñi is author of The Real Odessa (Granta), about the escape of Nazi war criminals from Europe Arianna Huffington announces launch of World Post news website Tony Blair and Bill Gates among new site's contributors • Backers include 'homeless billionaire' Nicolas Berggruen theguardian.com, Arianna Huffington arrives for Glamour Magazine's Women Of The Year event in New York in November. Photograph: Carlo Allegri/Reuters The 1% are about to get their own publication. The digital media titan Arianna Huffington and the billionaire investor Nicolas Berggruen on Wednesday announced the launch of World Post, a comment and news website that looks set to become a platform for some of the most powerful people on the planet. Inevitably, the World Post will be launched at the World Economic Forum in Davos, Switzerland, this month. Many of its contributors including former British prime minister Tony Blair, Microsoft’s Bill Gates and Google’s Eric Schmidt are regulars at the annual jamboree for the world’s most connected people. Many are also advisers to the Berggruen Institute, the billionaire investor’s nonpartisan policy think tank. Berggruen, known as the “homeless billionaire” because he prefers living in hotels to owning houses, said the 50/50 venture with Huffington Post owner AOL would not just be a platform for the world’s elite. “You have to start somewhere,” he said. “A lot of these people are knowledgable. On the other hand you will see a lot of unknown voices, young voices and from places that are not that obvious.” Huffington said: “You can have all those heads of state and major business people, etcetera etcetera, writing right next to an unemployed man from Spain, a student from Brazil. The great heart of HuffPo is no hierarchy.” The site will have its own stand-alone presence but will also replace the Huffington Post’s current world section. The Huffington Post will run the advertising side of the business and will also organise conferences and sponsored sections. Neither side will comment on how much funding has been put into the business. Berggruen said World Post would be run for profit. “I think that’s healthy,” he said. “But if we were going to make an investment in the most exciting areas to make an investment, it probably wouldn’t be this. If it doesn’t make money, we will still support it,” he said. “We’re not in it just to make money. "It has to be profitable to be sustainable,” Huffington said. The Huffington Post is now in 10 countries and will use its locally based journalists as well as three new dedicated foreign correspondents in Beijing, Beirut and Cairo to supply content for World Post alongside its other contributors. More hires are expected. But Huffington said its main strength would be in its ability to collaborate with local new organisations as well as its top level contributors. “Collaboration is the key, especially in the linked economy,” said Huffington. “Recognising that you are not going to do the only good coverage. If you can bring your reader what other good work is being done, you improve their experience. That’s really what the heart of World Post is about.” The publication's initial editorial board has deep ties to media companies around the world. Alongside Huffington and Berggruen it includes Juan Luis Cebrian, founding editor of El Pais, Dileep Padgaonkar, consulting editor of the Times of India, Yoichi Funabashi, former editor-inchief of Asahi Shimbun, and Pierre Omidyar, founder and chairman of eBay and backer of a new investigative reporting organisation, First Look Media, set up with former Guardian journalist Glenn Greenwald. Huffington said 42% of the Huffington Post’s 94m unique visitors each month come from outside the US. “Just over two years ago we didn’t have an international edition anywhere,” she said. “We have an incredible opportunity to use the pieces we already have on the board to speak to our existing audience and grow that audience simply by embracing the fact that we are an international entity,” said Peter Goodman, executive business and global news editor for the Huffington Post. The launch comes amid a wave of new money going into media ventures. Berggruen said it was clear that traditional news organisations were still struggling and that many more would fail. “I think there will be a few media voices that really have weight and will survive but fewer and fewer,” he said. Berggruen, an avid art collector, said World Post would also move beyond public policy and would address issues that interest people around the world including the environment, health and the arts. “Culture is much bigger than politics. It will be about science, art. Anything that captures our imagination and our lives,” he said. Another board member Nathan Gardels, a syndication expert, media fellow at the World Economic Forum and editor of New Perspectives Quarterly, said the news industry was regaining an international perspective unseen since the end of the cold war. “Most of the world’s media has fragmented then rationalized and then re-localized,” he said. Thirty years ago the news was much more international, he said, “despite the fact that we are more interdependent than ever.” “There is definitely an audience now for an international perspective. There may not be enough people in Los Angeles who want that but globally I think there is.” The Israeli Criminals Behind the NSA Spy Scandal June 13, 2013 At the center of the NSA scandal is a gang of Israeli high-tech criminals which is connected to the false-flag terror attacks of 9-11. These connections underline the involvement of the same Israeli criminals to both 9-11 and the NSA's secret program to collect and store our personal information and conversations, which came about mainly as a consequence of 9-11. Two Israeli companies, Narus and Verint, are involved in the National Security Agency (NSA) spy scandal in which copies of our phone calls and email data are sent to secret rooms at NSA buildings across the country. These Israeli companies are closely connected to Unit 8200, the electronic espionage unit of the Israeli military. (Narus was acquired by Boeing in 2010.) Jacob "Kobi" Alexander The founder and former chairman of Verint is wanted by the FBI for a long list of crimes. He is veteran Israeli intelligence officer. Jacob "Kobi" Alexander, the former head of Comverse, the parent company of Verint, is a wanted criminal who has fled U.S. justice to Africa and probably subsequently to Israel. It is important to note that Kobi Alexander and Comverse were closely connected to Odigo, the Israeli messaging system that was used to warn Israelis to stay away from the World Trade Center on 9-11. Furthermore, the NSA has used Israeli encryption software from RSA Security, Inc. since 2006, which means that Israelis hold the encryption keys to the entire NSA computer network. The Israelis obviously have easy access to everything at the NSA. The following video clip is of James Bamford discussing the two Israeli companies, Narus and Verint, who are involved in the massive collection of our telephone and Internet data. Bamford was on "Democracy Now!" on October 14, 2008, discussing the role of these Israeli companies, who are closely tied to Israeli intelligence. To have access to personal phone calls and emails allows Israeli intelligence to blackmail and control people, like General David Petraeus, who was forced to resign from his position as director of the C.I.A. after an extra-marital affair was revealed by unknown agents who had access to his personal email. James Bamford on Democracy Now! - October 14, 2008 Video Link - http://youtu.be/hI_k9Xt00YE Bamford wrote an article entitled "Shady Companies With Ties to Israel Wiretap the U.S. for the NSA" for Wired.com in April 2012 in which he discussed the Israeli companies and the criminals who ran them: In addition to constructing the Stellar Wind center, and then running the operation, secretive contractors with questionable histories and little oversight were also used to do the actual bugging of the entire U.S. telecommunications network. According to a former Verizon employee briefed on the program, Verint, owned by Comverse Technology, taps the communication lines at Verizon, which I first reported in my book The Shadow Factory in 2008. Verint did not return a call seeking comment, while Verizon said it does not comment on such matters. At AT&T the wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004. Narus did not return a call seeking comment. What is especially troubling is that both companies have had extensive ties to Israel, as well as links to that country’s intelligence service, a country with a long and aggressive history of spying on the U.S. In fact, according to Binney, the advanced analytical and data mining software the NSA had developed for both its worldwide and international eavesdropping operations was secretly passed to Israel by a mid-level employee, apparently with close connections to the country. The employee, a technical director in the Operations Directorate, “who was a very strong supporter of Israel,” said Binney, “gave, unbeknownst to us, he gave the software that we had, doing these fast rates, to the Israelis.” Several of the top people involved in these Israeli wiretapping companies are if fact criminals who are currently wanted for serious crimes committed in the United States, as Bamford explains in the 2012 article: Like Narus, Verint was founded in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.” In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.” According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’aretz in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.” Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties. When asked about these contractors, the NSA declined to “verify the allegations made.” Kobi Alexander is also closely connected to the 9-11 criminal atrocity. Alexander and Comverse are connected to the Israeli Odigo messaging company through which warnings were sent to the Israelis who were expected to be at work at the World Trade Center on 9-11. As I explained in an article entitled "Why was Kobi Alexander Allowed to Flee? The Israeli Fugitive, Odigo, and the Forewarning of 9/11" in August 2006: The case of the Israeli criminal Kobi Alexander is like the proverbial "tip of the iceberg." While Alexander's crimes, through which he became immensely wealthy, are now evident, they are but a very small piece of a much larger Zionist criminal network – connected to the 9/11 terror attacks – which remains hidden beneath the surface. Alexander, former head of the Israel-based Comverse Technology, was, until his crimes were discovered, one of the highest paid executives in the United States. In the year 2000, for example, he reportedly earned some $102.5 million, with $93 million coming from the "exercise of options." We now know that most of Alexander's money was made through the fraudulent "exercise of options." Comverse Technology, the U.S.-based "parent company" of an older and much bigger Israelbased company with the same name, is the owner of the Verint, Ulticom, Starhome, Mercom and Startel companies. The key positions in these companies are all held by Israeli nationals. Alexander, was recently allowed to flee the United States after he and two other former Comverse executives were charged with securities, mail and wire fraud by U.S. prosecutors in Brooklyn, New York. A warrant has been issued for his arrest... While Alexander is obviously connected with Israel's military intelligence apparatus and George Soros through the mutually owned investment fund ComSor, what is not widely reported is his company's close links with Odigo, the Israeli-run instant messaging company that received – and conveyed – urgent warning messages about the imminent terror attacks on the World Trade Center, several hours before the first plane hit... Shortly after 9-11, Odigo was completely taken over by Comverse Technology, which had been part owner of Odigo since early 2000, if not earlier. Shortly after 9/11, five executives from Comverse were reported to have profited by more than $267 million from "insider trading." Avner Ronen, the "founder" of Odigo, was Vice President of Business Development of Comverse Technology in October 2005. This indicates that Ronen and Alexander, both Israeli military officers with computer backgrounds, have been close business partners since early 2000. Sources and Recommended Reading: "Israelis Hold Keys to NSA/US Military Computer Networks," by Christopher Bollyn, June 16, 2006, also published as "Israeli Code on U.S. Government Computers" in Solving 9-11: The Original Articles, p. 157 http://rense.com/general72/sisi.htm "Narus knows what you are doing on the network" by Om Malik, Forbes, August 11, 1999 http://www.forbes.com/1999/08/11/feat.html "Shady Companies With Ties to Israel Wiretap the U.S. for the NSA" by James Bamford, Wired.com, April 3, 2012 http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/all/ "Why was Kobi Alexander Allowed to Flee? The Israeli Fugitive, Odigo, and the Forewarning of 9/11" by Christopher Bollyn, August 24, 2006, also published as "The Israeli Fugitive and the Forewarning of 9-11" in Solving 9-11: The Original Articles, p. 162 http://www.bollyn.com/why-was-kobi-alexander-allowed-to-flee/ Declassified Files on Israeli Nuclear Smuggling Revealed Benjamin Netanyahu at Heli Trading Company involved Posted by: TP Newswire Tags: american smuggler israel, Benjamin Netanyahu, Benjamin Netanyahu nuclear, Benjamin Netanyahu spy, iran israel, Iran nuclear weapons, is israel nuclear, israel attack, israel iran nuclear, israel nuclear smuggling, israel nuclear technology, israel nuclear weapons, israeli nuclear weapons, nuclear iran, nuclear-weapons, Richard Kelly Smyth Posted date: July 30, 2012 | Comment Washington, U.S.A. — The following is being released by the Institute for Research: Middle Eastern Policy – The FBI partially declassified and released files linking Israeli Prime Minister Benjamin Netanyahu to a nuclear technology smuggling ring that targeted the United States. The declassified files are now publicly available online at http://www.IRmep.org/ila/krytons/06272012_milco_mdr.pdf FBI agents interviewed indicted American smuggler Richard Kelly Smyth on April 16-17, 2002, at the U.S. attorney’s office in Los Angeles. The secret interview report details how during trips to Israel Smyth’s handler placed him in contact with Benjamin Netanyahu at Heli Trading Company. The FBI report suggests that “Smyth and [Netanyahu] would meet in restaurants in Tel Aviv and in [Netanyahu's] home and/or business. It was not uncommon for [Netanyahu] to ask Smyth for unclassified material.” Smyth was indicted in the mid-1980s for smuggling 800 dual use “krytrons” without proper export licenses through a multi-front company network. Smyth fled the U.S. and lived abroad, supported by unknown means, until he was captured by Interpol and returned to the U.S. in 2001. He was convicted in 2002. During the 2002 Smyth counterintelligence debriefing, the FBI learned that the Israeli Ministry of Defense ordered and paid an Israeli company called Heli Trading for krytrons. Heli in turn sourced them fromCalifornia-based MILCO in a clandestine operation codenamed “Project Pinto.” The report reveals how MILCO illegally shipped other prohibited military articles under general Commerce Department export licenses rather than smuggling them out via Israeli diplomatic pouches. Released on the Internet on July 4, 2012, the files have been the subject of reporting in the Israeli press, including Israeli National News, Ma’ariv and The Marker. Some U.S. alternative media also explored the implications of the formerly secret files including Antiwar.com, Tikkun Olam, Mondoweiss and CounterPunch. WBAI radio and the Scott Horton Show have hosted interviews. Although the FBI report has now been sent to the New York Times, Washington Post, all members of Congress and United Nations members, no top-tier establishment news coverage, Congressional or UN investigations have been made public. On Friday, National Public Radio syndicated host Diane Rehmimmediately disconnected IRmep Research Director Grant F. Smith when he asked her reporter roundtable to assess the implications of the Netanyahu espionage ring. An audio clip of the brief exchange is available at: http://www.IRmep.org/NPR.mp3 IRmep is a private nonprofit that studies how warranted law enforcement and civil action can improve U.S. Middle East policy. More Israel disclosures in Snowden’s trove of 'significant stories' – Greenwald Published time: January 07, 2014 10:52 Combo of file pictures shows US journalist Glenn Greenwald (L, October 9, 2013 in Brasilia) and Glenn Greenwald, the investigative journalist who first published Edward Snowden leaks, said that the NSA whistleblower still has "a huge number of very significant stories to reveal," including those relating to Israel. "There definitely are stories left that involve the Middle East, that involve Israel. The reporting is going to continue at roughly the same pace that has been happening," the former Guardian journalist said in an interview with Channel 10 television station that aired Monday night. "I don’t want to preview any stories that aren’t yet published, but it’s definitely the case that there are a huge number of very significant stories that are left to report," the Brazil-based Greenwald said, adding that the journalists will continue releasing stories "at roughly the same pace that has been happening." "We have only had these documents for seven months, which, given their volume and complexity, is not a very long time," he noted. Documents leaked in December by former NSA contractor, Edward Snowden, revealed that the US National Security Agency worked hand in hand with the UK's GCHQ to target email addresses belonging to the then-serving Israeli Prime Minister Ehud Olmert and Defense Minister Ehud Barak, among others. According to an exclusive report by the Israeli news agency, Debka, specializing in intelligence and security news, after 2009 Washington introduced "a high-powered, multilayered system of intelligence-gathering” – especially against Israel, about which neither Snowden nor the Israelis have been forthcoming. This system, the agency claimed, had a "single narrow focus: to pick up the slightest murmur or clue suggesting that Israel was about to launch an attack on Iran’s nuclear sites, which it had threatened to do without prior notice to Washington." "Listening in on the laconic conversations Prime Minister Binyamin Netanyahu held with Ehud Barak was not enough. What the spies were told to look for was out-of-the-way conduct, such as an order placed suddenly for a large quantity of aircraft fuel, or the import of an unusual amount of emergency medical equipment," Debka's report concluded. The Israeli Parliament (Photo by James Emery / flickr.com) The NSA responded to media reports claiming it had spied on top Israeli brass by saying that it is "not going to comment publicly on every specific alleged intelligence activity," while NSA spokeswoman, Bernadette Meehan, added that the US "gathers foreign intelligence of the type gathered by all nations." After Snowden's revelations top Israeli politicians demanded that the US stop "systematically spying" on Israel. Although Prime Minister Benjamin Netanyahu's Office at first chose to stifle the scandal, with the growing public outrage he has, however, demanded investigation into the matter. "In the close ties between Israel and the United States, there are things that must not be done and that are not acceptable to us," Netanyahu said speaking to the left-wing Likud party meeting in the Knesset on December 23. A number of Israeli politicians and lawmakers said that Israel had to use the revelations of US spying to press Washington to free jailed Israeli agent, Jonathan Pollard, a spy jailed for passing classified material to Israel while working as a US Naval intelligence analyst. He revealed information that Iran, Syria, Iraq and Libya were busy developing weapons of mass destruction to attack Israel. The whistleblower pleaded guilty and received a life sentence in 1987. In 1995 Israel granted him citizenship, and has lobbied for his release since then. Pollard has already spent nearly 30 years in a federal prison, an all-time record, as no one in US history has ever been given a life sentence for a similar offense, whose average time is usually between two and four years. Greenwald said Israel was "absolutely right" in linking the NSA spying to the Jonathan Pollard case because "it does underlie, underscore exactly the hypocrisy that lies at the center of so much of what the US government does." "When the US government goes around the world criticizing other countries for spying on allies and prosecuting them, are they going to maintain that with a straight face when they’re doing exactly that?" the journalist wondered. Snowden’s previous NSA files that made headlines across the world have revealed US operations targeting Brazilian President Dilma Rousseff’s cellphone as well as Angela Merkel’s. "The United States government loves to claim that the value of surveillance is to stop terrorism. Does the United States government think that Angela Merkel is a terrorist or that Israel’s democratically elected officials are involved in terrorism?" Greenwald wrapped up. Israeli ministers demand end to US spying, but Netanyahu lets revelations 'pass quietly' Published time: December 22, 2013 13:40 Top Israeli politicians want the US to stop "systematically spying" on Israel after revelations that the NSA intercepted emails of former top brass. Much to everybody's surprise, the Prime Minister’s Office has chosen to stifle the scandal, however. "The secret is out," Transportation Minister Yisrael Katz said Sunday. "The US is systematically spying on the defense and diplomatic leadership here in Israel. Is this how friends treat each other?" Housing Minister Uri Ariel said on Israel Radio he expected the US to admit wrongdoing. The NSA responded to media reports claiming it had spied on Israeli government officials by saying that it is "not going to comment publicly on every specific alleged intelligence activity," Haaretz newspaper reported. NSA spokeswoman Bernadette Meehan added that the US "gathers foreign intelligence of the type gathered by all nations." Labor Member of Knesset Nachman Shai said: "The silence of Israeli officials following these reports is disappointing and shameful." "We cannot let such revelations pass quietly. Like Germany and Brazil, we should ask the US for clarification, or at least confirmation that such spying has stopped." Documents leaked last week by former NSA contractor Edward Snowden revealed that the UK's GCHQ intelligence agency worked hand in hand with that of the US to target email addresses belonging to the then-serving Israeli Prime Minister Ehud Olmert and Defense Minister Ehud Barak, among others. Former Israeli Prime Minister Ehud Olmert.(AFP Photo / Saul Loeb) Snowden’s previous NSA files have revealed US operations targeting Brazilian President Dilma Rousseff’s cellphone and that of Angela Merkel. Earlier this week the German Chancellor told Der Spiegel that the Obama administration’s tactics are on a par with those of the notorious East Germany police, the Stasi. Prime Minister Benjamin Netanyahu has kept silent on the revelations. His only reaction came when a number of Israeli politicians called on Washington to release Jonathan Pollard, a spy jailed for passing classified material to Israel while working as a US Naval intelligence analyst. Israel doesn't need a "special incident to talk about the release of Jonathan Pollard," Netanyahu said. "We are dealing with this with every US president, including with President Obama, all the time, including now," he added during his weekly cabinet meeting. The "Prisoner of Zion" revealed information that Iran, Syria, Iraq and Libya were busy developing weapons of mass destruction to attack Israel. The whistleblower pleaded guilty and received a life sentence in 1987. In 1995 Israel granted him citizenship, and has lobbied for his release since then. Pollard has already spent nearly 30 years in a federal prison, an all-time record, as no one in the US history has ever been given a life sentence for similar offense, whose median time is between two and four years. Meanwhile, one member of Knesset who heads the parliamentary lobby pushing for Pollard’s release said that "the most recent revelations about spying and surveillance by the US against its ally needs to light a red light of morality for any logical person." "There needs to be reciprocity in any relationship between countries," Ayelet Shaked said on Sunday. "It is inconceivable that while Pollard has been rotting in an American prison for decades for spying, which was considered an unforgivable crime by the American government, we are now informed that the US has been spying against Israel, and this is just swept under the rug." Jonathan Pollard.(Reuters) Israeli investigative journalist David Bedein has proposed a tit-for-tat way-out. "The way to facilitate the freedom of Jonathan Pollard is to cordially request the government of Israel to detain an identified operative of the American government and to exchange him for Pollard." He said that people who ask the White House to free Pollard "on moral grounds" have a deep misconception about the US. "America does not run according to sentiments. The US operates according to interests at hand and according to the rules of hardball diplomacy," Bedein wrote on his blog. AIPAC's Fed Candidate Stanley Fischer on a Warpath against Iran Dual-citizen nominee's lifetime benefit to Israel comes at a heavy cost to America By Grant F. Smith, Director of Research, IRmep The rushed campaign to insert Stanley Fischer straight from his position leading Israel's central bank into the number two spot at the Federal Reserve has allowed little time for research into the appointee's career or for informed public debate about his record. Like the failed recent Obama administration-Israel lobby pincer move to ram approval for U.S. military strikes on Syria through Congress, avoiding such due diligence through velocity may actually be the only means for successful Senate confirmation. Some of Fischer's accomplishments—from co-authoring a seminal textbook on macroeconomics to handling economic crisis at the IMF have—not surprisingly—been recalled by his many supporters. Other doings that shed light on Fischer's controversial attributes—such as overhauling how U.S. aid and trade packages are delivered to Israel—have been mostly ignored. Appointing an openly dual IsraeliAmerican citizen into the most important central bank in the world could be a watershed moment. While the doors of federal government have long swung open for Israel-lobby appointees focusing most—if not all—their energies on advancing the interests of a foreign state, any who were actually Israeli dual citizens have traditionally kept that a closely-guarded secret. Fischer's long-term boosters, including the American Israel Public Affairs Committee (AIPAC), likely want to accustom Americans to openly dual citizens circulating between top roles in the U.S. and Israeli governments. A closer examination of Fischer reveals that average Americans have good reason to oppose his appointment, because his lifelong achievements for Israel have imposed high costs and few benefits to the United States while making peace more difficult to achieve. Economics Stanley Fischer was born in Northern Rhodesia in 1943. He studied at London School of Economics and received a PhD in economics from MIT. He taught and chaired the MIT economics department and co-authored a leading macroeconomics textbook with Rudiger Dornbusch. Fischer joined the World Bank in 1988 and became the first deputy managing director of the International Monetary Fund (IMF) in 1994. He oversaw emergency bailout lending and austerity programs over Mexico, Thailand, Indonesia, Russia, Brazil and Argentina. High flying Citigroup—under the helm of Sanford "Sandy" Weill—recruited Fischer in 2002. There he rose to become vice president with a seven-figure pay package. Israel Fischer has not only been an ardent supporter of Israel, his professional efforts began when he took sabbatical leave to Israel in 1972 and 19761977. He was a visiting scholar at the Bank of Israel in 1980. More importantly for Israel, Stanley Fischer won an appointment to the Reagan administration's U.S.-Israel Joint Economic Discussion Group that dealt with Israel's 1984-1985 economic crisis. In October of 1984, Israeli Prime Minister Shimon Peres arrived in Washington asking an initially reluctant Reagan Administration for an additional $1.5 billion in U.S. emergency funding—over and above the already-promised aid $5.6 billion aid package.[i] The help amounted to U.S. taxpayers funding each Israeli citizen $1,650. Another key component of the plan called for a largely unilateral lowering of U.S. tariffs and trade barriers to Israel, a program initially called "Duty Free Treatment for U.S. Imports from Israel" but later repackaged and sold as America's first "free trade" agreement. Over time the FTA reversed a previously balanced U.S.-Israel trading relationship for one that has produced a cumulative deficit to the U.S. that passed $100 billion in 2013. Seventy American industry groups opposed to the give-away in 1984 were disenfranchised when Israeli Economics Minister Dan Halpern and AIPAC illegally obtained a classified compendium of their industry, market and trade secrets to use against them in lobbying and public relations. An FBI espionage and theft of government property investigation was quashed before it could narrow in on those inside the U.S. government who delivered the secrets to Halpern. The U.S.-Israel Joint Economic Discussion Group fundamentally transformed U.S. aid to Israel forever. Before the Reagan administration, most U.S. aid to Israel took the form of loans that had to be repaid with interest. After the input of Fischer's team, subsequent U.S. aid was delivered in the form of outright grants paid directly from the U.S. Treasury—never to be repaid or conditioned when Israel took actions the U.S. opposed. Like many of Fischer's later IMF austerity programs, the Joint Discussion Group initially announced that strings attached to the aid would make it temporary. Secretary of State George Shultz insisted during a 1985 address to AIPAC that "Israel must pull itself out of its present economic trauma . . . . No one can do it for them . . .our help will be of little avail if Israel does not take the necessary steps to cut government spending, improve productivity, open up its economy and strengthen the mechanisms of economic policy. Israel and its government must make the hard decisions." [ii] Shultz wanted to make the huge American cash transfer conditional on major Israeli economic reforms, but intense AIPAC lobbying in Congress threatened to make the State Department influence irrelevant. In the end, Congress delivered aid without Israeli sacrifices, such as selling off bloated state-owned industries and spending belt-tightening. The proposed privatization of $5 billion in state enterprises threatened too much bureaucratic "turf" and too many jobs, so Israel put them on hold. Fischer apologetically characterized the Likud years as a "wasted opportunity by a government that should have known better."[iii] Not until 1996 were Fischer's proscribed economic remedies adopted by American neoconservative consultants to Benjamin Netanyahu as minor points in the "Clean Break" manifesto for Israeli regional hegemony. They remain among the few unimplemented tasks in a plan that called for military action against Iraq, Syria, and Lebanon. Despite the absence of any real economic reforms that would take Israel off the American taxpayer dole, Fischer co-wrote a blustering 1986 article for the Wall Street Journal called "Israel Has Made Aid Work" that AIPAC circulated widely as an official memorandum of its achievements. "Israel is the largest single recipient of economic aid from the U.S. This is partly because the economic stability of Israel is uncertain and is important to U.S. national interests. Therefore a report on the progress of the Israeli economy is relevant to policy decisions to be made here." Fischer never bothered to substantiate his premise, that U.S. national interests were somehow served by the bailout or that any aid given to Israel produced tangible benefits. Instead Fischer delivered a fusillade of dry and all but unreadable statistics about Israel's temporary economic performance. Issues of long-term importance to most Americans, such as returning U.S. aid to the traditional format of loans to be repaid and the likely impact of the FTA on U.S. jobs went unaddressed by Fischer. Fischer's core achievement—that the transformation of aid from loans to outright taxpayer give-aways—has been unchanged since 1986. The premises behind this everincreasing entitlement and one-sided FTA performance are likewise never reexamined by Congress—despite the fact that a majority of polled Americans have come to oppose aid increases to Israel. Fischer's rare admonitions that Israel be held to account, unlike the economies he transformed through biting IMF austerity programs, have remained nothing more than lip service. At the end of 2004 Israel's U.N. ambassador recruited Fischer to become the head of Israel's central bank, asking, "Why not be our governor?"[iv] Fischer accepted and initially provided endless amusement to reporters by insisting on speaking Hebrew during press conferences and refusing to speak English. Initial concerns that Fischer's global stature and experience would overshadow and chafe the relevant players in Israel proved unfounded as Fischer moved energetically into his new role. AIPAC continued to trumpet Fischer's accomplishments steering Israel through the global financial crisis, though beneath the surface he was performing far more serious tasks for Israel and its global lobby. Iran Sanctions As Bank of Israel governor, Stanley Fischer played a central role in coordinating the implementation of AIPAC-generated sanctions against Iran—ostensibly over its nuclear program. Stuart Levey, the head of the U.S. Treasury Department's division for "Terrorism and Financial Intelligence," an office created after heavy AIPAC lobbying, met often with Fischer in Israel alongside the Prime Minister, Foreign Minister and chiefs of both the Mossad and Shin Bet to explore how to "supplement" UN sanctions and end-run Russian and Chinese opposition.[v] The Levey-Fischer strategy was "to work outside the context of the Security Council to engage the private sector and let it know about the risks of doing business with Tehran" particularly against European banks that had only partially drawn back their business dealings with Iran. In 2010, Israel dispatched Fischer to meet with Chinese and Russian "counterparts" in order to financially isolate Iran.[vi] Fischer's final official duties for the Israeli government included drilling for "big crisis" scenarios—specifically, Fischer told an Israeli television station—the unavoidable financial fallout of a military attack on Iran.[vii] "We do plans, we do scenarios, we do exercises about how the central [bank] will work in various situations."[viii] After years targeting Iran, Fischer became convinced in his final months in Israel that sanctions alone were not enough to collapse its economy. Fischer reluctantly concluded that even as Iranian economic prospects "continue to go down" the country would likely "find a way to continue to keep economic life going." [ix] Fischer suddenly resigned and left the Bank of Israel on June 30, before completing his second five-year term. Israelis into the Fed and then where? The last time Fischer's name was floated to lead a major organization was during a rushed Bush administration attempt at damage control. In 2007, the controversial architect of the Iraq invasion and later World Bank President Paul Wolfowitz was engulfed in an ethics scandal over his pay and promotion package for Shaha Ali Riza. In two short years leading the institution, Wolfowitz catalyzed the alienation of most divisions within the bank and the distrust of economics ministries around the world. Fischer, along with Robert Zoellick and Robert Kimmitt and a handful of others, was considered as an emergency replacement while the administration and stakeholders strategized on how to ease Wolfowitz out with a minimum of scandal.[x] In the end, Fischer stayed put in Israel. It came as a surprise to many when The Wall Street Journal and Israel's Channel 2 news simultaneously reported in early December 2013 that the White House was "close to nominating" Fischer to be appointee Janet Yellen's second-in-command at the U.S. central bank.[xi] Media reports initially indicated that Fischer's candidacy-to-Senate-confirmation would proceed on greased skids—with no Senate debate—taking only a week so that the pair could quickly take over the Fed in January. However, the Senate concluded its 2013 business without taking up the matter. The earliest date the measure could be put up for a vote is January 6, 2014. Even that date might slip since Senator Rand Paul and Minority Leader Mitch McConnell plan to delay the vote unless a long-languishing measure to "Audit the Fed" is also put up for a vote. This rushed approach has meant relatively little reporting on the deeper implications of having an openly dual Israeli-American citizen a heartbeat away from Fed chairmanship. That is unfortunate, since Israel and its U.S. supporters have many hidden reasons for wanting stronger influence at the Fed that they would likely prefer not to discuss. That the Fed is a key player in Iran sanctions implementation is certainly no secret. The Fed has been an equal partner in levying hundreds of millions in fines against foreign banks such as R.B.S, Barclays, Standard and Chartered and H.S.B.C. which were charged with violating the Iran sanctions regime. Although AIPAC never mentions it, American exporters have been seriously hurt by sanctions on Iran and the punitive secondary boycott. A coalition representing the US Chamber of Commerce, the Business Roundtable, Coalition for American Trade, the National Foreign Trade Council and others urged Congress not to enact sanctions provisions they estimated would cost $25 billion and 210,000 American jobs. (PDF) Keeping such a costly regime in place despite thawing relations and any hard evidence of an Iranian nuclear weaponization program has therefore required immense ongoing efforts by Israel lobbying groups. An equally important target for Fischer and Israel may be—somewhat ironically given their pro-boycott programs—anti-boycott activities. In the 1970-80s the Federal Reserve played an active "moral suasion" role chastising and corralling U.S. banks away from any activity that Israel construed as compliant with the Arab League economic boycott. An expert with deep experience enforcing the international boycott of Iran, Fischer is likely aware of the many active American grass-roots campaigns aimed at ending the Israeli occupation of Palestinians through targeted boycotts. These boycotts range from efforts to get retailers to stop carrying manufactured goods produced in the occupied West Bank (Ahava and Soda Stream), to overturning contracts with firms providing services in occupied territories (Veolia), to academic boycotts and even efforts to get labor union pensions to divest from Israel bonds. Working more closely with Israel and AIPAC, the Fed could become a vital node for reinterpreting and enforcing old or new laws aimed at outlawing and punishing groups organizing such grass-roots activities by targeting U.S. bank accounts and freezing their financial flows. Fischer may also want to launch "exercises" to prepare the U.S. financial system for the fallout of Israeli military attacks on Iran. New bills in Congress drafted by AIPAC call not only for additional sanctions aimed at thwarting a fledgling deal on Iran's nuclear program (favored 2-to-1 by Americans). AIPAC's bill forces the U.S. to "have Israel's back" in the event of a unilateral Israeli strike. If Israel has already decided to attack Iran, it would benefit immensely from having Fischer inside the Fed, protecting the financial flows Israel now regards as all but a birthright from its primary global underwriter. Less wellknown is the Fed's authority to authorize foreign bank acquisitions. Any future Israeli campaign to further entwine its banks into the U.S. financial system through acquisitions would likely find a much more welcoming regulator in Fischer. Whatever the real motivation for Fischer's sudden, inexplicably rushed insertion into the Federal Reserve, it is also worthwhile to note longstanding Fed policies have correctly considered U.S. citizenship to be preferable for at least one key position, "because of the special nature of the supervisory function, the need to ensure confidentiality of information, and the delegated nature of the function." Unfortunately, that policy preference covers only Fed bank examiners rather than top leadership—the Federal Reserve Act is silent on the wisdom of installing a revolving door for returning U.S. citizens who took on dual citizenship as a condition of serving a foreign government. AIPAC, Fischer's co-author of harmful U.S. economic policies on behalf of Israel, likely sees the Fischer appointment as an important test case to assess American tolerance for openly dual Israeli-American citizens running key U.S. federal agencies. In 2009 former AIPAC research director Martin Indyk, who was at the center of AIPAC's research division during the FTA push, said that "the US-Israel Free Trade Agreement served as a wedge that opened up the Congress to free trade agreements across the world, including the NAFTA agreement." Likewise, if Fischer can be "wedged" into the Fed, it begs the question of why former Israeli ambassador to the U.S. and historian Michael Oren could not someday lead the Near East division of the State Department. From AIPAC's perspective, having qualified Israelis directly run key divisions of the U.S. Treasury such as Terrorism and Financial Intelligence, rather than indirectly through AIPAC-vetted appointees such as Stuart Levey and his hand-picked successor David Cohen, could probably boost the volume of taxpayer give-aways while improving coordination with Israel. Given AIPAC and Israel's overly large influence on U.S. military initiatives in the region, the lobby may now feel the moment is right for appointing Israeli generals into the Joint Chiefs at the Department of Defense. This, AIPAC may well reason, would be much more convenient than constantly arranging visiting Israeli military and intelligence delegations that increasingly serve as sole briefers (rather than DoD or the American intelligence community) of members of the US Congress. Soon after word of his Fed nomination spread, Fischer again made uncharacteristically harsh statements about Israel at an NYU Law School forum. As reported in The Jewish Week, Fischer told the audience that Israel is not seeking peace "to the extent that it should" and that it is "divided between those who want to settle the West Bank and those who seek peace." Fischer—who had every chance to pull U.S. and Israeli financial levers that could have forced Israel out of occupied territories or forced compliance with International law—never did. Adding to suspicion that the statement was simply more empty "lip service" aimed at building popular support among Americans tired of war, was the reporter of the quote—former AIPAC lobbyist Douglas Bloomfield. In 1986 Bloomfield was grilled as a key suspect (PDF) in the 1985 FBI investigation of AIPAC for espionage during the FTA negations If Americans were ever polled on it—and they never are—the majority who now object to increasing aid to Israel would also likely object to quasi-governmental and governmental positions being staffed by people who—by citizenship or sheer strength of identity politics—are primarily occupied with advancing Israeli interests rather than those of the United States. It is obvious that the real reason AIPAC and its economic luminaries such as Fischer never substantiate any of the advertised benefits the U.S.-Israel "special relationship" delivers to America in return for all of the costs is simple—there simply aren't any. As greater numbers of Americans become aware that the entire "special relationship" framework is sustained by nothing more than Israel lobby campaign-finance and propaganda networks, the harder the lobby will have to work to forcibly wedge operatives like Fischer into positions where they can thwart growing public opposition— whether it takes the form of boycotts or grassroots opposition to the U.S. fighting more wars for Israel. In the very short term, Americans can only fight such undue Israel lobby influence by again—like during the drive to attack Syria—staging a mass action to demand their senators reject Stanley Fischer's nomination. [i] Oberdorfer, Don "Will U.S. Dollars Fix Israel's Economy?" The Washington Post, June 9 1985 Oberdorfer, Don "Will U.S. Dollars Fix Israel's Economy?" The Washington Post, June 9 1985 [iii] Passell, Peter "Need Zionism Equal Socialism?" The New York Times, July 2, 1992 [iv] Maital, Shlomo "Stanley Fischer: the man and the plan," The Jerusalem Report, February 7, 2005 [v] BBC Monitoring Middle East, March 5, 2007 [vi] Keinon, Herb "Russia won't back crippling sanctions." Comment comes day before high-level US-Israel meeting on Iran" The Jerusalem Post, February 25, 2010 [vii] Williams, Dan "Iran Stepping Up Its Atomic Efforts" - The Gazette, August 13, 2012 [viii] "Bank of Israel governor: Sanctions won't collapse Iran economy. Islamic Republic will likely find way to 'keep economic life going,' says Fischer in interview with CNBC" The Jerusalem Post, October 24, 2012. [ix] "Bank of Israel governor: Sanctions won't collapse Iran economy. Islamic Republic will likely find way to 'keep economic life going,' says Fischer in interview with CNBC" The Jerusalem Post, October 24, 2012. [x] Weisman, Steven R. "Wolfowitz Said to Push for Deal to Let Him Quit" The New York Times, May 17, 2007 [xi] "Fischer set to be tapped as vice chair of US Federal Reserve" the Times of Israel, December 11, 2013 [ii] Craig B Hulet was both speech writer and Special Assistant for Special Projects to Congressman Jack Metcalf (Retired); he has been a consultant to federal law enforcement DEA, ATF&E of Justice/Homeland Security for over 25 years; he has written four books on international relations and philosophy, his latest is The Hydra of Carnage: Bush’s Imperial War-making and the Rule of Law - An Analysis of the Objectives and Delusions of Empire. He has appeared on over 12,000 hours of TV and Radio: The History Channel “DeCoded”; He is a regular on Coast to Coast AM w/ George Noory and Coffee Talk KBKW; CNN, C-Span ; European Television "American Dream" and The Arsenio Hall Show; The Carl Nelson Show live in DC and Trending with Carl Nelson syndicated live; he has written for Soldier of Fortune Magazine, International Combat Arms, Financial Security Digest, etc.; Hulet served in Vietnam 1969-70, 101st Airborne, C Troop 2/17th Air Cav and graduated 3rd in his class at Aberdeen Proving Grounds Ordnance School MOS 45J20 Weapons. He remains a paid analyst and consultant in various areas of geopolitical, business and security issues: terrorism and military affairs. Hulet lives in the ancient old growth Quinault Rain Forest.