http://www.zerohedge.com/contributed/2013-07-25/fed-economist-fired-investigating-suspicious-9-11-cash-transfers-and-steve-ke
Fed Economist Fired for Investigating Suspicious 9-11 Cash Transfers; and Steve Keen Exposes Financial Fallacies
Submitted by EB on 07/25/2013 07:23 -0400
Would you be surprised to learn that tens of billions in cold, hard cash was shuffled around just prior to 9-11 by none other than the Fed itself? Probably not. Here's a graph, illustrating the change in USD currency production over a ten week period prior to 9-11 compared to the average over the five years prior (which, by the way, includes the Y2K money printing orgy in the year 2000 itself, which skews the average higher):
That's right. The average increase was $8 billion over five years, but it exploded to $18 billion just prior to that fateful day. None other than a Federal Reserve economist discovered this and was promptly fired for his efforts to reveal the cause. The official story involves an Argentine currency crisis. Clearly, this required his termination. We interviewed him, and this is his story at 2:49 in:
We also discuss shipments of cash to Afghanistan and Iraq. And, Justine Underhill explains just who Benny's money-printing IOER profligacy is actually benefitting (answer: foreign banks, a topic covered on Zero Hedge here and by us at EPJ here).
http://www.infowars.com/oath-keeper-founder-targeted-in-attempted-set-up/
Oath Keepers Founder Targeted in Attempted Set Up
Unknown assailant impersonated Stewart Rhodes in an e-mail with child pornography attachment.
Kit Daniels
Infowars.com
July 25, 2013
Infowars.com
July 25, 2013
Pretending to be Oath Keepers founder Stewart Rhodes, an unknown assailant sent a child pornography e-mail to People Against the NDAA (PANDAA) founder Dan Johnson in a failed attempt to frame both Rhodes and Johnson for felony charges.
The impersonator used a tormail.org anonymous e-mail account with ‘Stewart Rhodes’ listed as the sender name and even included Rhodes’ signature block.
Johnson, however, knew that Rhodes did not use Tor e-mail and did not open the attached PDFs.
PANDAA’s Internet security expert determined that the PDFs contained child pornography.
“Someone was trying to get Dan to open up these PDFs and download child pornography onto his computer,” Rhodes said. “That was a direct attack on him but also an attack on me because it purported to be from me.”
“It had my name embedded and Oath Keepers name embedded in the files.”
Rhodes said that this attempted framing of him and Johnson is part of a continuing scheme to try and set up freedom activists with felonies.
As we recently reported earlier this month, Luke Rudkowski of We Are Change received an anonymous e-mail from someone claiming to be a Bilderberg insider with attached photos from this year’s meeting inside the Grove Hotel.
The photos also turned out to be child pornography.
After Rudkowski went public, he had a follow-up exchange with the unknown, alleged assailants who admitted they were trying to set him up as well as other activists.
Rhodes and Johnson are both working together on anti-NDAA legislation intended to completely nullify the unconstitutional law.
Oath Keepers is a non-partisan organization of current and former first responders and military veterans who have pledged to uphold the Constitution and to not obey unconstitutional orders given by predatory government officials.
The organization is well-known in the liberty community for their Push Cards, wallet-sized cards that emphasize ten unconstitutional orders that oath keepers will not obey, such as “We will NOT obey orders to disarm the American people” and “We will NOT obey any orders to confiscate the property of the American people, including food and other essential supplies.”
Constitutionalists routinely ask first responders and veterans seeking public office if they are oath keepers.
Homeland Security’s Future Home: A Former Mental Hospital
Chris Mills frequently gives tours of St. Elizabeths Hospital, a former mental institution where the U.S. Department of Homeland Security is building a $4.5 billion headquarters. It’s the largest construction project in the District of Columbia since the Pentagon was completed in 1943. So there’s a lot of ground to cover. Mills prefers to chauffeur his guests around the place in a golf cart.
A cheerful 55-year-old with a neatly trimmed mustache, Mills, who is managing the project for DHS, tells visitors to look out for animals. There are loads. Herds of deer, a flock of wild turkeys, and a bald eagle reside in the fenced-in facility. They might not last long outside. St. Elizabeths is located in Anacostia, one of D.C.’s toughest neighborhoods. But they have little to fear inside the high-security fences. “It’s like the wild kingdom in here,” Mills says with a chuckle.
Then he’s off in his golf cart with his passengers. His boss, Jeffery Orner, DHS’s chief readiness support officer, who oversees all of the department’s real estate, has come along for the ride. There’s a DHS public-relations person on board, too. She sits in the back, smiling and saying nothing. Everybody is wearing hard hats and DHS safety vests.
http://beforeitsnews.com/spies-and-intelligence/2013/07/major-police-state-escalation-pentagon-to-deploy-huge-blimps-over-washington-dc-for-360-degree-surveillance-video-2445060.html
A pair of high-tech Army blimps is coming to the greater Washington, DC area, and soon they will be able to provide the military with surveillance powers that spans hundreds of millions of acres from North Carolina to Niagara Falls, Canada.
The airships are part of Raytheon’s Joint Land Attack Cruise Missile Defense Elevated Netted Sensor System, or JLENS, and when all is said and done they’ll offer the United States military what the defense contractor calls “an affordable elevated, persistent over-the-horizon sensor system” that relies on “a powerful integrated radar system to detect, track and target a variety of threats.”
Raytheon has just wrapped up a six-week testing period in the state of Utah and is now sending its JLENS fleet to the Aberdeen Proving Ground in Maryland. Once there, the Army intends to get some hands-on experience that will eventually culminate in launching the pair of airships over Washington, DC.
Its like the civil war meets 1984. In the civil war, they used huge blimps as observation posts to spy on confederate movements and such. These however are not your average blimps. These are ’1984′ blimps, they can see for 320 miles in any direction. This is a major escalation by the police state and I think a message to people that says, your the real enemy.
This goes hand in hand I think with the military carrying out drills in major american cities across America, scaring the crap out of unsuspecting civilians. The system is turning on its own citizens just as our forefathers predicted they would.
Cnet Source Claims U.S. Government Trying to Obtain Keys to Encrypted Web Sessions from Companies
July 25, 2013
Source: Cnet
The U.S. government has attempted to obtain the master encryption keys that Internet companies use to shield millions of users’ private Web communications from eavesdropping.
These demands for master encryption keys, which have not been disclosed previously, represent a technological escalation in the clandestine methods that the FBI and the National Security Agency employ when conducting electronic surveillance against Internet users.
If the government obtains a company’s master encryption key, agents could decrypt the contents of communications intercepted through a wiretap or by invoking the potent surveillance authorities of the Foreign Intelligence Surveillance Act. Web encryption — which often appears in a browser with a HTTPS lock icon when enabled — uses a technique called SSL, or Secure Sockets Layer.
“The government is definitely demanding SSL keys from providers,” said one person who has responded to government attempts to obtain encryption keys. The source spoke with CNET on condition of anonymity.
The person said that large Internet companies have resisted the requests on the grounds that they go beyond what the law permits, but voiced concern that smaller companies without well-staffed legal departments might be less willing to put up a fight. “I believe the government is beating up on the little guys,” the person said. “The government’s view is that anything we can think of, we can compel you to do.”
Read More...
The U.S. government has attempted to obtain the master encryption keys that Internet companies use to shield millions of users’ private Web communications from eavesdropping.
These demands for master encryption keys, which have not been disclosed previously, represent a technological escalation in the clandestine methods that the FBI and the National Security Agency employ when conducting electronic surveillance against Internet users.
If the government obtains a company’s master encryption key, agents could decrypt the contents of communications intercepted through a wiretap or by invoking the potent surveillance authorities of the Foreign Intelligence Surveillance Act. Web encryption — which often appears in a browser with a HTTPS lock icon when enabled — uses a technique called SSL, or Secure Sockets Layer.
“The government is definitely demanding SSL keys from providers,” said one person who has responded to government attempts to obtain encryption keys. The source spoke with CNET on condition of anonymity.
The person said that large Internet companies have resisted the requests on the grounds that they go beyond what the law permits, but voiced concern that smaller companies without well-staffed legal departments might be less willing to put up a fight. “I believe the government is beating up on the little guys,” the person said. “The government’s view is that anything we can think of, we can compel you to do.”
Read More...
NSA Claims It Is Unable to Search its Own Emails Due to Having an “Antiquated” System
July 25, 2013
Source: All Gov.
It can vacuum up emails, phone calls, text messages from all over the country and the globe, and sift through mountains of metadata looking for signs of terrorists plots. But the National Security Agency (NSA) can’t conduct a common search of its own emails.
It can vacuum up emails, phone calls, text messages from all over the country and the globe, and sift through mountains of metadata looking for signs of terrorists plots. But the National Security Agency (NSA) can’t conduct a common search of its own emails.
This according to Justin Elliott at ProPublica, who filed a Freedom of Information Act request with the spy agency to obtain copies of emails between NSA employees and those working for the National Geographic Channel to learn more about the agency’s public relations efforts following a friendly documentary on the NSA aired by the cable operation.
Elliott was told by an NSA official that they couldn’t complete his request because their email system is too “antiquated and archaic” to perform bulk searches.
“There’s no central method to search an email at this time with the way our records are set up, unfortunately,” NSA Freedom of Information Act officer Cindy Blacker told Elliott.
The kind of email search necessitated by Elliott’s request is performed all the time by large corporations facing lawsuits. But, somehow, the most powerful intelligence-gathering operation in the U.S. government can’t do the same thing.
“It’s just baffling,” Mark Caramanica of the Reporters Committee for Freedom of the Press told ProPublica. “This is an agency that’s charged with monitoring millions of communications globally and they can’t even track their own internal communications in response to a FOIA request.”
-Noel Brinkerhoff
To Learn More:
NSA Says It Can’t Search Its Own Emails (by Justin Elliott, ProPublica)
NSA Claims Inability to Search Agency's Own Emails (RT)
Majority of Americans Disapprove of NSA Surveillance Operations (by Noel Brinkerhoff, AllGov)
NSA and FBI Secretly Mining Data from Internet Service Providers (by Noel Brinkerhoff, AllGov)
Elliott was told by an NSA official that they couldn’t complete his request because their email system is too “antiquated and archaic” to perform bulk searches.
“There’s no central method to search an email at this time with the way our records are set up, unfortunately,” NSA Freedom of Information Act officer Cindy Blacker told Elliott.
The kind of email search necessitated by Elliott’s request is performed all the time by large corporations facing lawsuits. But, somehow, the most powerful intelligence-gathering operation in the U.S. government can’t do the same thing.
“It’s just baffling,” Mark Caramanica of the Reporters Committee for Freedom of the Press told ProPublica. “This is an agency that’s charged with monitoring millions of communications globally and they can’t even track their own internal communications in response to a FOIA request.”
-Noel Brinkerhoff
To Learn More:
NSA Says It Can’t Search Its Own Emails (by Justin Elliott, ProPublica)
NSA Claims Inability to Search Agency's Own Emails (RT)
Majority of Americans Disapprove of NSA Surveillance Operations (by Noel Brinkerhoff, AllGov)
NSA and FBI Secretly Mining Data from Internet Service Providers (by Noel Brinkerhoff, AllGov)
NSA's New Spy Facilities are 7 Times Bigger Than the Pentagon: Virtual Prison Planet
Submitted by Michaelwiseguy on Thu, 07/25/2013 - 19:52
The NSA's New Spy Facilities are 7 Times Bigger Than the Pentagon
"He works at one of the three-letter intelligence agencies and oversees construction of a $1.2 billion surveillance data center in Utah that is 15 times the size of MetLife Stadium, home to the New York Giants and Jets. Long Island native Harvey Davis, a top National Security Agency official, needs that commanding presence. His role is to supervise infrastructure construction worldwide for NSA, which is part of the Defense Department. That involves tending to logistics, military installations, as well as power, space and cooling for all NSA data centers.
In May, crews broke ground on a $792 million computing center at the agency’s headquarters near Baltimore that will complement the Utah site. Together the Utah center and Maryland’s 28-acre computer farm span 228 acres—more than seven times the size of the Pentagon."
------------
"Even some former Pentagon officials say citizens should know NSA’s intentions for the Utah data center. “When you have this much centralization of capabilities, which in government terms can translate into real power—that and resources—it’s important that the public be able to look at these things and figure out what they are doing,” says a cyber official who recently left Defense and now works as a private contractor. The official is not involved in the project and was not authorized to speak on behalf of the department.
A 2012 article in Wired reported that NSA needs the megaplex partially because the Pentagon wants to expand the military global communications network to manage yottabytes of data. “A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude,” the article said. “Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text.” NSA officials told Government Executive, however, they do not discuss such operational details."
It's a prison for our virtual selves. Enjoy your virtual incarceration.
No comments:
Post a Comment